National Library of Energy BETA

Sample records for medicine homeland security

  1. Homeland Security and Defense Applications

    ScienceCinema (OSTI)

    None

    2015-01-09

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

  2. Homeland Security and Defense Applications

    SciTech Connect (OSTI)

    None

    2014-11-06

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

  3. Homeland Security and Emergency Management Coordination (HSEMC...

    National Nuclear Security Administration (NNSA)

    Homeland Security and Emergency Management Coordination (HSEMC) Program | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  4. Reimbursable Work for Department of Homeland Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-02-28

    To authorize a modified process for the acceptance, performance, and administration of work from the Department of Homeland Security (DHS) by Department of Energy (DOE) contractor and federally operated laboratories, sites, and other facilities.

  5. U.S. Homeland Security R&D Budgets

    SciTech Connect (OSTI)

    Halvorson, C S

    2009-03-30

    The FY09 budgets for homeland security research and development programs in the U.S. are summarized. Homeland security policy developments that can influence future efforts are discussed. Initial indications of the new administration direction on homeland security R&D are summarized. An overview of the Optics and Photonics in Global Homeland Security V conference is presented.

  6. Homeland Security Issues for Facilities 

    E-Print Network [OSTI]

    McClure, J. D.; Fisher, D.; Fenter, T.

    2004-01-01

    The events of September 11, 2001, along with the Oklahoma City bombing and Washington, DC area sniper attacks have forever changed America's sense of security. Federal, state, and local governments, businesses, and individual homeowners have become...

  7. Data Sciences Technology for Homeland Security Information Management

    E-Print Network [OSTI]

    Data Sciences Technology for Homeland Security Information Management and Knowledge Discovery for Homeland Security Information Management and Knowledge Discovery Authors Tamara Kolda, Sandia National, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security

  8. Improving Vigilance for Homeland Security Personnel

    E-Print Network [OSTI]

    McShea, Daniel W.

    Improving Vigilance for Homeland Security Personnel Robert Hubal, PhD, RTI International Stephen labeled FAPV long employed by RTI. ­ Variation in simulated environment `parameters'. #12;· Focus: · Acquired materials from a separate RTI project. · Reusing simulation materials from another RTI project

  9. Homeland Security: What Can Data Science Do?

    E-Print Network [OSTI]

    , Control and Interoperability Center for Advanced Data Analysis A Department of Homeland Security "halves" of the DHS Center for Visual and Data Analytics (CVADA), founded as the CCI Center by DHS in 2009.g.: ŲAssessing risks in waterways (NJ DOT) ŲPlanning for evacuations during heat events from climate change (CDC

  10. Before the Senate Homeland Security and Governmental Affairs...

    Energy Savers [EERE]

    and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security Before the Senate Homeland...

  11. Reimbursable Work for the Department of Homeland Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-08-17

    The Order establishes DOE policies and procedures for the acceptance, performance, and administration of reimbursable work directly funded by the Department of Homeland Security.

  12. National Security Issues at Department of Homeland Security and Department of Wednesday, November 18th

    E-Print Network [OSTI]

    Farritor, Shane

    Seminar: National Security Issues at Department of Homeland Security and Department of Energy Transformational & Applied Research Directorate U.S. Department of Homeland Security Domestic Nuclear Detection Directorate at the Department of Homeland Security's Domestic Nuclear Detection Office. In this role, he

  13. Science and Technology Challenges for Homeland Security

    SciTech Connect (OSTI)

    Murray, C A

    2006-03-24

    Preventing and protecting against catastrophic terrorism is a complex and dynamic challenge. Small groups or individuals can use advanced technology to cause massive destruction, and the rapid pace of technology and ease of information dissemination continually gives terrorists new tools. A 100% defense is not possible. It's a numbers problem--there are simply too many possible targets to protect and too many potential attack scenarios and adversaries to defend against. However, science and technology (S&T) is a powerful force multiplier for defense. We must use S&T to get ahead of the game by making terrorist attacks more difficult to execute, more likely to be interdicted, and less devastating in terms of casualties, economic damage, or lasting disruption. Several S&T areas have potential to significantly enhance homeland security efforts with regard to detecting radiation, pathogens, explosives, and chemical signatures of weapons activities. All of these areas require interdisciplinary research and development (R&D), and many critically depend on advances in materials science. For example, the science of nuclear signatures lies at the core of efforts to develop enhanced radiation detection and nuclear attribution capabilities. Current radiation detectors require cryogenic cooling and are too bulky and expensive. Novel signatures of nuclear decay, new detector materials that provide high resolution at ambient temperatures, and new imaging detectors are needed. Such technologies will improve our ability to detect and locate small, distant, or moving sources and to discriminate threat materials from legitimate sources. A more complete understanding of isotopic ratios via secondary ion mass spectrometry (SIMS), NanoSIMS, or yet-to-be-developed technologies is required to elucidate critical characteristics of nuclear materials (e.g., isotopics, age, reprocessing) in order to identify their source and route history. S&T challenges abound in the biodefense arena as well. Improved biodetectors are needed--autonomous instruments that continuously monitor the environment for threat pathogens, promptly alert authorities in the event of a positive detection, and have an extremely low false alarm rate. Because many threat pathogens are endemic to various regions of the world, the natural microbial environment must be characterized so that background detections can be distinguished from a deliberate release. In addition, most current detection approaches require an a priori knowledge of the pathogens of concern and thus won't work in the face of a new, naturally occurring disease, such as a mutated avian influenza that effects humans, or a deliberately manipulated organism. Thus, we must move from species-specific detection to function-based detection based on a fundamental understanding of the mechanisms and genetic markers of infectivity, pathogenicity, antibiotic resistance, and other traits that distinguish a harmful organism from an innocuous one. Last but not least, new vaccines and treatments are needed, which in turn require in-depth understanding of cellular surfaces, protein folding, and myriad nano-bio aspects of host-pathogen interactions. Much attention is being devoted to countering weapons-of-mass-destruction terrorism, since Al-Qaeda and other terrorist groups have repeatedly stated their intention to acquire and use nuclear, chemical, or biological weapons. However, terrorists in Iraq and elsewhere continue to wreak havoc using improvised explosive devices. Thus, there is a pressing security need for better methods for detecting explosive materials and devices. Transformational S&T such as pulsed fast-neutron analysis or terahertz spectroscopy for material- and element-specific imaging offer the promise of greatly improved explosive detection. For bioscience-based approaches, the development of highly multiplexed transducer arrays and molecular recognition methods that mimic biological systems would similarly provide the foundation for vastly improved capabilities. Likewise, new materials an

  14. Reimbursable Work for the Department of Homeland Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-08-17

    The Order establishes DOE policies and procedures for the acceptance, performance, and administration of reimbursable work directly funded by the Department of Homeland Security. Admin Chg 2, dated 6-30-14, supersedes DOE O 484.1 Admin Chg 1. Certified 1-15-15

  15. Reimbursable Work for the Department of Homeland Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-08-17

    The Order establishes DOE policies and procedures for the acceptance, performance, and administration of reimbursable work directly funded by the Department of Homeland Security. Cancels DOE N 481.1 and DOE N 251.62. Admin Chg 1, dated 3-14-11.

  16. Germanium detectors in homeland security at PNNL

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Stave, S.

    2015-05-01

    Neutron and gamma-ray detection is used for non-proliferation and national security applications. While lower energy resolution detectors such as NaI(Tl) have their place, high purity germanium (HPGe) also has a role to play. A detection with HPGe is often a characterization due to the very high energy resolution. However, HPGe crystals remain small and expensive leaving arrays of smaller crystals as an excellent solution. PNNL has developed two similar HPGe arrays for two very different applications. One array, the Multisensor Aerial Radiation Survey (MARS) detector is a fieldable array that has been tested on trucks, boats, and helicopters. The CASCADESmore »HPGe array is an array designed to assay samples in a low background environment. The history of HPGe arrays at PNNL and the development of MARS and CASCADES will be detailed in this paper along with some of the other applications of HPGe at PNNL.« less

  17. Homeland Security vs. the Madisonian Impulse: State Building and Anti-Statism after September 11

    E-Print Network [OSTI]

    Stowsky, Jay; Kroenig, Matthew

    2005-01-01

    Inspector General of the Homeland Security Department, and BearingPoint, a consulting firm hired by TSA. The reports

  18. Overview of accelerators with potential use in homeland security

    SciTech Connect (OSTI)

    Garnett, Robert W. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-01-01

    Quite a broad range of accelerators have been applied to solving many of the challenging problems related to homeland security and defense. These accelerator systems range from relatively small, simple, and compact, to large and complex, based on the specific application requirements. They have been used or proposed as sources of primary and secondary probe beams for applications such as radiography and to induce specific reactions that are key signatures for detecting conventional explosives or fissile material. A brief overview and description of these accelerator systems, their specifications, and application will be presented. Some recent technology trends will also be discussed.

  19. Overview of accelerators with potential use in homeland security

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Garnett, Robert W.

    2015-01-01

    Quite a broad range of accelerators have been applied to solving many of the challenging problems related to homeland security and defense. These accelerator systems range from relatively small, simple, and compact, to large and complex, based on the specific application requirements. They have been used or proposed as sources of primary and secondary probe beams for applications such as radiography and to induce specific reactions that are key signatures for detecting conventional explosives or fissile material. A brief overview and description of these accelerator systems, their specifications, and application will be presented. Some recent technology trends will also bemore »discussed.« less

  20. Northwest Regional Technology Center, May 2014 Page 1 of 2 Around The Region In Homeland Security

    E-Print Network [OSTI]

    Security (DHS) Domestic Nuclear Detection Office (DNDO), recently visited PNNL. The goals of the trip wereNorthwest Regional Technology Center, May 2014 Page 1 of 2 Around The Region In Homeland Security, and recovery. The center enables homeland security solutions for emergency responder communities and federal

  1. Testing and Evaluation Protocol for Spectroscopy-Based Portal Monitors Used for Homeland Security

    E-Print Network [OSTI]

    Testing and Evaluation Protocol for Spectroscopy- Based Portal Monitors Used for Homeland Security................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

  2. Testing and Evaluation Protocol for Handheld Radionuclide Identifiers for Use in Homeland Security

    E-Print Network [OSTI]

    Testing and Evaluation Protocol for Handheld Radionuclide Identifiers for Use in Homeland Security................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

  3. Testing and Evaluation Protocol for Alarming Personal Radiation Detectors for Homeland Security

    E-Print Network [OSTI]

    Requirements [R4] NIST Handbook 150-23, NVLAP Radiation Detection Instruments 3. Compliance Level InformationTesting and Evaluation Protocol for Alarming Personal Radiation Detectors for Homeland Security T Radiation Detectors for Homeland Security EFF. DATE 2013-05-17 REV. 3.00 PAGE 1 of 5 Testing and Evaluation

  4. Modeling and Simulation of Hazardous Material Releases for Homeland Security Applications

    E-Print Network [OSTI]

    Magee, Joseph W.

    i Modeling and Simulation of Hazardous Material Releases for Homeland Security Applications DRAFT in the breakout track on Hazardous Material Release at the workshop on Homeland Security Modeling & Simulation...........................................................................................................................................................1 2. Introduction to Hazardous Material Releases (HMR) and Associated DHS Guidance

  5. Economics Definitions, Methods, Models, and Analysis Procedures for Homeland Security Applications

    E-Print Network [OSTI]

    Economics Definitions, Methods, Models, and Analysis Procedures for Homeland Security Applications, Programmer Computational Economics Group January 29, 2010 SAND2010-4315 #12;2 This page intentionally blank #12;3 Economics Definitions, Methods, Models, and Analysis Procedures for Homeland Security

  6. Testing and Evaluation Protocol for Portable Radiation Detection Instrumentation for Homeland Security

    E-Print Network [OSTI]

    Testing and Evaluation Protocol for Portable Radiation Detection Instrumentation for Homeland and Evaluation Protocol for Portable Radiation Detection Instrumentation for Homeland Security 1. Scope with the following documents: [R1] ANSI N42.33, "American National Standard for Portable Radiation Detection

  7. Testing and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland Security

    E-Print Network [OSTI]

    Testing and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland..........................................................................................................3 #12;TEST AND EVALUATION PROTOCOL TEP NO. N42.35 PREPARED BY: DIV682 TITLE: Radiation Detection and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland Security 1. Scope

  8. Around The Region In Homeland Security January 2015

    E-Print Network [OSTI]

    ://biodetectionresource.pnnl.gov. Cybersecurity workshop showcases nationwide R&D The Cyber Security Division 2014 R&D Showcase and Technical collaboration and innovation. The 3-day event hosted by the DHS S&T Cyber Security Division welcomed researchers Center of Excellence, the mobile security application archiving technology was featured at the Cyber

  9. Homeland Security Challenges Facing Small Water Systems in Texas 

    E-Print Network [OSTI]

    Dozier, Monty; Theodori, Gene L.; Jensen, Ricard

    2007-05-31

    threats that they face. EPA provides assistance to small systems through education work- shops and seminars, reports and guidelines, and tutorials on CD. In 2005 EPA published the Water Security Action Plan, which outlines research needs to help water...

  10. Homeland security R&D roadmapping : risk-based methodological options.

    SciTech Connect (OSTI)

    Brandt, Larry D.

    2008-12-01

    The Department of Energy (DOE) National Laboratories support the Department of Homeland Security (DHS) in the development and execution of a research and development (R&D) strategy to improve the nation's preparedness against terrorist threats. Current approaches to planning and prioritization of DHS research decisions are informed by risk assessment tools and processes intended to allocate resources to programs that are likely to have the highest payoff. Early applications of such processes have faced challenges in several areas, including characterization of the intelligent adversary and linkage to strategic risk management decisions. The risk-based analysis initiatives at Sandia Laboratories could augment the methodologies currently being applied by the DHS and could support more credible R&D roadmapping for national homeland security programs. Implementation and execution issues facing homeland security R&D initiatives within the national laboratories emerged as a particular concern in this research.

  11. Homeland Security Presidential Directive HSPD-7 (December 17, 2003) |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy A plug-inPPLforLDRD Report11,SecurityHome solar systems can save you energy

  12. Northwest Regional Technology Center, January 2014 Page 1 of 2 Around The Region In Homeland Security

    E-Print Network [OSTI]

    Northwest Regional Technology Center, January 2014 Page 1 of 2 Around The Region In Homeland Security January 2014 The Northwest Regional Technology Center (NWRTC) is a virtual resource center resolutions to seek out growth opportunities both personally and professionally. Conveniently the Disaster

  13. Technical article Wiley Handbook of Science and Technology for Homeland Security Article ID: IS24 Page 1

    E-Print Network [OSTI]

    Hayat, Majeed M.

    Technical article Wiley Handbook of Science and Technology for Homeland Security Article ID: IS24 Spectrometer; Feature Selection Abstract The potential use of nanotechnology for hyperspectral (HS article Wiley Handbook of Science and Technology for Homeland Security Article ID: IS24 Page 2

  14. Preliminary Benchmarking Efforts and MCNP Simulation Results for Homeland Security

    SciTech Connect (OSTI)

    Robert Hayes

    2008-04-18

    It is shown in this work that basic measurements made from well defined source detector configurations can be readily converted in to benchmark quality results by which Monte Carlo N-Particle (MCNP) input stacks can be validated. Specifically, a recent measurement made in support of national security at the Nevada Test Site (NTS) is described with sufficient detail to be submitted to the American Nuclear Society’s (ANS) Joint Benchmark Committee (JBC) for consideration as a radiation measurement benchmark. From this very basic measurement, MCNP input stacks are generated and validated both in predicted signal amplitude and spectral shape. Not modeled at this time are those perturbations from the more recent pulse height light (PHL) tally feature, although what spectral deviations are seen can be largely attributed to not including this small correction. The value of this work is as a proof-of-concept demonstration that with well documented historical testing can be converted into formal radiation measurement benchmarks. This effort would support virtual testing of algorithms and new detector configurations.

  15. Homeland security: safeguarding America's future with energy efficiency and renewable energy technologies

    SciTech Connect (OSTI)

    None, None

    2002-08-01

    The State Energy Advisory Board (STEAB) presents this 10th annual report following the one-year anniversary of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. This event has had profound impacts on all segments of American society, not the least of which is this country’s energy sector. Long before September 11, a number of energy issues grabbed the nation’s attention, including opening the Arctic National Wildlife Refuge to oil and natural gas exploration, the power crisis in California, nationwide natural gas and gasoline price increases, and the administration’s May 2001 National Energy Policy. However, the events of September 11 refocused attention on the prominent role energy plays in the country’s homeland security. For the most part, the energy aspects of homeland security have focused on the physical security of critical energy emergency planning and energy infrastructure, such as power plants, refineries, and power and fuel transmission systems. While STEAB recognizes the importance of protecting our existing energy infrastructure, this should not be the sole focus of homeland security as it relates to energy.

  16. Status Summary of 3He and Neutron Detection Alternatives for Homeland Security

    SciTech Connect (OSTI)

    Kouzes, Richard T.; Ely, James H.

    2010-04-28

    This is a short summary whitepaper on results of our alternatives work: Neutron detection is an important aspect of interdiction of radiological threats for homeland security purposes since plutonium, a material used for nuclear weapons, is a significant source of fission neutrons [Kouzes 2005]. Because of the imminent shortage of 3He, which is used in the most commonly deployed neutron detectors, a replacement technology for neutron detection is required for most detection systems in the very near future [Kouzes 2009a]. For homeland security applications, neutron false alarms from a detector can result in significant impact. This puts a strong requirement on any neutron detection technology not to generate false neutron counts in the presence of a large gamma ray-only source [Kouzes et al. 2008].

  17. ARCHITECTURE AND ALGORITHM FOR HIGH PERFORMANCE FAULT-TOLERANT REPLICATION OF SENSITIVE MILITARY AND HOMELAND SECURITY C3I DATABASE

    E-Print Network [OSTI]

    Guturu, Parthasarathy

    AND HOMELAND SECURITY C3I DATABASE MESSAGES Parthasarathy Guturut Electrical Engineering Department, University ofNorth Texas, Denton, TX 76203-0470 ABSTRACT Replicated databases are used by Military and Homeland. In this paper, we propose a rep- licated database nodal architecture in which nodes are organized into multiple

  18. High-Resolution Laser-Induced Breakdown Spectroscopy used in Homeland Security and Forensic Applications

    SciTech Connect (OSTI)

    Martin, Madhavi Z; Wullschleger, Stan D; Vass, Arpad Alexander; Martin, Rodger Carl; Grissino-Mayer, Henri

    2006-01-01

    The technique of laser-induced breakdown spectroscopy (LIBS) to detect elements for a variety of homeland security applications such as nuclear materials identification and inventory,and forensic applications has been demonstrated. For nuclear materials applications, we detected and profiled metals in coatings that were used to encapsulate nuclear fuel. Multivariate analysis has been successfully employed in the quantification of elements present in treated wood and engineered wood composites. These examples demonstrate that LIBS-based techniques are inherently well suited for diverse environmental applications related to homeland security. Three key advantages are evident: (1) small samples (mg) are sufficient; (2) samples can be analyzed by LIBS very rapidly, and (3) biological materials such as human and animal bones and wood can be analyzed with minimal sample preparation. For forensic applications they have used LIBS to determine differences in animal and human bones. They have also applied this technique in the determination of counterfeit and non-counterfeit currency. They recently applied LIBS in helping to solve a murder case.

  19. Neutron Generators Developed at LBNL for Homeland Security and Imaging Applications

    E-Print Network [OSTI]

    Reijonen, Jani

    2006-01-01

    NEUTRON GENERATORS DEVELOPED AT LBNL FOR HOMELAND SECURITYtypes of advanced D-D (neutron energy 2.5 MeV), D-T (14MeV) and T-T (0–9 MeV) neutron generators for wide range of

  20. Northwest Regional Technology Center, November 2014 Page 1 of 2 Around The Region In Homeland Security

    E-Print Network [OSTI]

    Infrastructure First Responder Ebola Protection Cyber Security Awareness Managing a Weapons Program relevant cyber security problems by developing the tools, methods, and technologies that will enable" exhibit for a first-hand look at advancements in cyber security and explosives detection, including PNNL

  1. HomelandHomeland SecuritySecurity

    E-Print Network [OSTI]

    and category: 5: Privileged Information . Department of Energy review required before public release Name............................................................................................................... 3 Energy .......................................................................................................5 Banking and Finance.....

  2. Proposed new accelerator design for homeland security x-ray applicatio...

    Office of Scientific and Technical Information (OSTI)

    in a very high count-rate environment. Typical accelerators for security applications offer large but short bursts of x-rays, suitable for current-mode integrated imaging. In...

  3. Northwest Regional Technology Center, April 2013 Page 1 of 2 Around The Region In Homeland Security

    E-Print Network [OSTI]

    a venue for information sharing and education about cybersecurity concerns, advancements and resources Office of Electricity Delivery & Energy Reliability · Samara Moore, National Security Staff; Director is National 9-1-1 Education Month, and public organizations are working to educate the community about

  4. Proposed new accelerator design for homeland security x-ray applications

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Clayton, James; Shedlock, Daniel; Langeveld, Willem G.J.; Bharadwaj, Vinod; Nosochkov, Yuri

    2015-01-01

    Two goals for security scanning of cargo and freight are the ability to determine the type of material that is being imaged, and to do so at low radiation dose. One commonly used technique to determine the effective Z of the cargo is dual-energy imaging, i.e. imaging with different x-ray energy spectra. Another technique uses the fact that the transmitted x-ray spectrum itself also depends on the effective Z. Spectroscopy is difficult because the energy of individual x rays needs to be measured in a very high count-rate environment. Typical accelerators for security applications offer large but short bursts ofmore »x-rays, suitable for current-mode integrated imaging. In order to perform x-ray spectroscopy, a new accelerator design is desired that has the following features: 1) increased duty factor in order to spread out the arrival of x-rays at the detector array over time; 2) x-ray intensity modulation from one delivered pulse to the next by adjusting the accelerator electron beam instantaneous current so as to deliver adequate signal without saturating the spectroscopic detector; and 3) the capability to direct the (forward peaked) x-ray intensity towards high-attenuation areas in the cargo (“fan-beam-steering”). Current sources are capable of 0.1% duty factor, although usually they are operated at significantly lower duty factors (~0.04%), but duty factors in the range 0.4-1.0% are desired. The higher duty factor can be accomplished, e.g., by moving from 300 pulses per second (pps) to 1000 pps and/or increasing the pulse duration from a typical 4 ?s to 10 ?s. This paper describes initial R&D to examine cost effective modifications that could be performed on a typical accelerator for these purposes, as well as R&D for fan-beam steering.« less

  5. Proposed new accelerator design for homeland security x-ray applications

    SciTech Connect (OSTI)

    Clayton, James; Shedlock, Daniel; Langeveld, Willem G.J.; Bharadwaj, Vinod; Nosochkov, Yuri

    2015-01-01

    Two goals for security scanning of cargo and freight are the ability to determine the type of material that is being imaged, and to do so at low radiation dose. One commonly used technique to determine the effective Z of the cargo is dual-energy imaging, i.e. imaging with different x-ray energy spectra. Another technique uses the fact that the transmitted x-ray spectrum itself also depends on the effective Z. Spectroscopy is difficult because the energy of individual x rays needs to be measured in a very high count-rate environment. Typical accelerators for security applications offer large but short bursts of x-rays, suitable for current-mode integrated imaging. In order to perform x-ray spectroscopy, a new accelerator design is desired that has the following features: 1) increased duty factor in order to spread out the arrival of x-rays at the detector array over time; 2) x-ray intensity modulation from one delivered pulse to the next by adjusting the accelerator electron beam instantaneous current so as to deliver adequate signal without saturating the spectroscopic detector; and 3) the capability to direct the (forward peaked) x-ray intensity towards high-attenuation areas in the cargo (“fan-beam-steering”). Current sources are capable of 0.1% duty factor, although usually they are operated at significantly lower duty factors (~0.04%), but duty factors in the range 0.4-1.0% are desired. The higher duty factor can be accomplished, e.g., by moving from 300 pulses per second (pps) to 1000 pps and/or increasing the pulse duration from a typical 4 ?s to 10 ?s. This paper describes initial R&D to examine cost effective modifications that could be performed on a typical accelerator for these purposes, as well as R&D for fan-beam steering.

  6. Mathematical Model Applications to Disease and Homeland ...

    E-Print Network [OSTI]

    Mathematical Model Applications to Disease and Homeland Security The events of ... but have no data or reliable information that would help in the planning or ...

  7. Department of Homeland Security | NISAC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submit theCovalent BondingMeeting | Department| DepartmentWesternEngineers

  8. Homeland Security Presidential Directive 7

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergy HeadquartersFuelB IMSofNewsletterGuidingUpdate Webinar Slides HomeHome Performance7,

  9. Federal technology transfer requirements :a focused study of principal agencies approaches with implications for the Department of Homeland Security.

    SciTech Connect (OSTI)

    Koker, Denise; Micheau, Jill M.

    2006-07-01

    This report provides relevant information and analysis to the Department of Homeland Security (DHS) that will assist DHS in determining how to meet the requirements of federal technology transfer legislation. These legal requirements are grouped into five categories: (1) establishing an Office of Research and Technology Applications, or providing the functions thereof; (2) information management; (3) enabling agreements with non-federal partners; (4) royalty sharing; and (5) invention ownership/obligations. These five categories provide the organizing framework for this study, which benchmarks other federal agencies/laboratories engaged in technology transfer/transition Four key agencies--the Department of Health & Human Services (HHS), the U.S. Department of Agriculture (USDA), the Department of Energy (DOE), and the Department of Defense (DoD)--and several of their laboratories have been surveyed. An analysis of DHS's mission needs for commercializing R&D compared to those agencies/laboratories is presented with implications and next steps for DHS's consideration. Federal technology transfer legislation, requirements, and practices have evolved over the decades as agencies and laboratories have grown more knowledgeable and sophisticated in their efforts to conduct technology transfer and as needs and opinions in the federal sector have changed with regards to what is appropriate. The need to address requirements in a fairly thorough manner has, therefore, resulted in a lengthy paper. There are two ways to find summary information. Each chapter concludes with a summary, and there is an overall ''Summary and Next Steps'' chapter on pages 57-60. For those readers who are unable to read the entire document, we recommend referring to these pages.

  10. Report on Department of Homeland Security Sponsored Research Project at Lawrence Livermore National Laboratory on Preparation for an Improvised Nuclear Device Event

    SciTech Connect (OSTI)

    A., B

    2008-07-31

    Following the events of September 11th, a litany of imaginable horribles was trotted out before an anxious and concerned public. To date, government agencies and academics are still grappling with how to best respond to such catastrophes, and as Senator Lieberman's quote says above, now is the time to plan and prepare for such events. One of the nation's worst fears is that terrorists might detonate an improvised nuclear device (IND) in an American city. With 9/11 serving as the catalyst, the government and many NGOs have invested money into research and development of response capabilities throughout the country. Yet, there is still much to learn about how to best respond to an IND event. My summer 2008 internship at Lawrence Livermore National Laboratory afforded me the opportunity to look in depth at the preparedness process and the research that has been conducted on this issue. While at the laboratory I was tasked to collect, combine, and process research on how cities and the federal government can best prepare for the horrific prospect of an IND event. Specific projects that I was involved with were meeting reports, research reviews, and a full project report. Working directly with Brooke Buddemeier and his support team at the National Atmospheric Release Advisory Center, I was able to witness first hand, preparation for meetings with response planners to inform them of the challenges that an IND event would pose to the affected communities. In addition, I supported the Homeland Security Institute team (HSI), which was looking at IND preparation and preparing a Congressional report. I participated in meetings at which local responders expressed their concerns and contributed valuable information to the response plan. I specialized in the psycho-social aspects of an IND event and served as a technical advisor to some of the research groups. Alongside attending and supporting these meetings, I worked on an independent research project which collected information from across disciplines to outline where the state of knowledge on IND response is. In addition, the report looked at meetings that were held over the summer in various cities. The meetings were attended by both federal responders and local responders. The meetings explored issues regarding IND preparation and how to mitigate the effects of an IND detonation. Looking at the research and current preparation activity the report found that the state of knowledge in responding and communicating is a mixed bag. Some aspects of an IND attack are well understood, some are not, but much is left to synthesize. The effects of an IND would be devastating, yet much can be done to mitigate those effects through education, preparation, and research. A major gap in current knowledge is how to effectively communicate with the public before an attack. Little research on the effectiveness of public education has been done, but it is likely that educating the public about the effects of an IND and how to best protect oneself could save many lives.

  11. The U.S. Department of Energy's Brookhaven National Laboratory P.O. Box 5000, Upton NY 11973 631 344-2345 www.bnl.gov Homeland Security

    E-Print Network [OSTI]

    -sponsored with the Department of Energy's National Nuclear Security Administration (NNSA), the Environmental Measurement Energy, Environment, and National Security Directorate (631) 344-4420, cjc@bnl.gov Port securityThe U.S. Department of Energy's Brookhaven National Laboratory · P.O. Box 5000, Upton NY 11973

  12. Testing and Evaluation Protocol for Backpack-Based Radiation Detection Systems Used for Homeland

    E-Print Network [OSTI]

    Testing and Evaluation Protocol for Backpack- Based Radiation Detection Systems Used for Homeland Radiation Detection Systems Used for Homeland Security EFF. DATE 2013-05-30 REV. 2.00 PAGE 1 of 10 Testing and Evaluation Protocol for Backpack- Based Radiation Detection Systems Used for Homeland Security 1. Scope

  13. Global Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    weapons from the James Martin center for Nonproliferation Studies Homeland Security Digital Library HSDL is the nation's premier research collection of open-source resources...

  14. Large-Area Plasma-Panel Radiation Detectors for Nuclear Medicine Imaging to Homeland Security and the Super Large Hadron Collider

    E-Print Network [OSTI]

    Friedman, Peter S; Chapman, J Wehrley; Levin, Daniel S; Weaverdyck, Curtis; Zhou, Bing; Benhammou, Yan; Etzion, Erez; Moshe, M Ben; Silver, Yiftah; Beene, James R; Varner, Robert L

    2010-01-01

    A new radiation sensor derived from plasma panel display technology is introduced. It has the capability to detect ionizing and non-ionizing radiation over a wide energy range and the potential for use in many applications. The principle of operation is described and some early results presented.

  15. Large-Area Plasma-Panel Radiation Detectors for Nuclear Medicine Imaging to Homeland Security and the Super Large Hadron Collider

    E-Print Network [OSTI]

    Peter S. Friedman; Robert Ball; J. Wehrley Chapman; Daniel S. Levin; Curtis Weaverdyck; Bing Zhou; Yan Benhammou; Erez Etzion; M. Ben Moshe; Yiftah Silver; James R. Beene; Robert L. Varner Jr.

    2010-07-03

    A new radiation sensor derived from plasma panel display technology is introduced. It has the capability to detect ionizing and non-ionizing radiation over a wide energy range and the potential for use in many applications. The principle of operation is described and some early results presented.

  16. Reimbursable Work for Department of Homeland Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-04-21

    This revised Notice contains additional information and direction to cognizant DOE contracting officers and other affected Federal and contractor personnel identifying the processes and requirements to ensure the efficient implementation of the MOA. DOE N 251.62, dated 04-21-05, extends this directive until 4-21-06. Cancels DOE N 481.1.

  17. Testing and Evaluation Protocol for Mobile and Transportable Radiation Monitors Used for Homeland

    E-Print Network [OSTI]

    Radiation Detection Instruments 3. Compliance Level Information Instrument under test might meet allTesting and Evaluation Protocol for Mobile and Transportable Radiation Monitors Used for Homeland and Transportable Radiation Monitors Used for Homeland Security EFF. DATE 2013-05-28 REV. 2.00 PAGE 1 of 5 Testing

  18. Testing and Evaluation Protocol for Spectroscopic Personal Radiation Detectors (SPRDs) for Homeland

    E-Print Network [OSTI]

    Procedures and General Requirements [R4] NIST Handbook 150-23, NVLAP Radiation Detection Instruments 3Testing and Evaluation Protocol for Spectroscopic Personal Radiation Detectors (SPRDs) for Homeland Radiation Detectors (SPRDs) for Homeland Security. EFF. DATE 2013-05-30 REV. 2.00 PAGE 1 of 5 Testing

  19. Before the House Subcommittee on Emerging Threats, Cyber Security...

    Office of Environmental Management (EM)

    Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and...

  20. UW Medicine About this Tool

    E-Print Network [OSTI]

    20070423 UW Medicine About this Tool "Information Security for Residents"... Purpose: Provide for Information Security #12;20070423 UW Medicine Information Security Overview Information Security is not just about computers, it is how we go about our business here at UW Medicine. Information Security

  1. Homeland 

    E-Print Network [OSTI]

    Casmey, W. H. [author

    2012-03-05

    Little is known about the distribution of black corals in the northwestern Gulf of Mexico. Of thirty-nine species of black coral documented in the Western Atlantic, thirty have been previously documented by various studies in the Gulf of Mexico...

  2. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  3. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  4. Office of Headquarters Personnel Security Operations

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

  5. Unmanned and Unattended Response Capability for Homeland Defense

    SciTech Connect (OSTI)

    BENNETT, PHIL C.

    2002-11-01

    An analysis was conducted of the potential for unmanned and unattended robotic technologies for forward-based, immediate response capabilities that enables access and controlled task performance. The authors analyze high-impact response scenarios in conjunction with homeland security organizations, such as the NNSA Office of Emergency Response, the FBI, the National Guard, and the Army Technical Escort Unit, to cover a range of radiological, chemical and biological threats. They conducted an analysis of the potential of forward-based, unmanned and unattended robotic technologies to accelerate and enhance emergency and crisis response by Homeland Defense organizations. Response systems concepts were developed utilizing new technologies supported by existing emerging threats base technologies to meet the defined response scenarios. These systems will pre-position robotic and remote sensing capabilities stationed close to multiple sites for immediate action. Analysis of assembled systems included experimental activities to determine potential efficacy in the response scenarios, and iteration on systems concepts and remote sensing and robotic technologies, creating new immediate response capabilities for Homeland Defense.

  6. Active, Non-Intrusive Inspection Technologies for Homeland Defense

    SciTech Connect (OSTI)

    James L. Jones

    2003-06-01

    Active, non-intrusive inspection or interrogation technologies have been used for 100 years - with the primary focus being radiographic imaging. During the last 50 years, various active interrogation systems have been investigated and most have revealed many unique and interesting capabilities and advantages that have already benefited the general public. Unfortunately, except for medical and specific industrial applications, these unique capabilities have not been widely adopted, largely due to the complexity of the technology, the overconfident reliance on passive detection systems to handle most challenges, and the unrealistic public concerns regarding radiation safety issues for a given active inspection deployment. The unique homeland security challenges facing the United States today are inviting more "out-of-the-box" solutions and are demanding the effective technological solutions that only active interrogation systems can provide. While revolutionary new solutions are always desired, these technology advancements are rare, and when found, usually take a long time to fully understand and implement for a given application. What's becoming more evident is that focusing on under-developed, but well-understood, active inspection technologies can provide many of the needed "out-of-the-box" solutions. This paper presents a brief historical overview of active interrogation. It identifies some of the major homeland defense challenges being confronted and the commercial and research technologies presently available and being pursued. Finally, the paper addresses the role of the Idaho National Engineering and Environmental Laboratory and its partner, the Idaho Accelerator Center at Idaho State University, in promoting and developing active inspection technologies for homeland defense.

  7. PNNLs Data Intensive Computing research battles Homeland Security threats

    ScienceCinema (OSTI)

    David Thurman; Joe Kielman; Katherine Wolf; David Atkinson

    2012-12-31

    The Pacific Northwest National Laboratorys (PNNL's) approach to data intensive computing (DIC) is focused on three key research areas: hybrid hardware architecture, software architectures, and analytic algorithms. Advancements in these areas will help to address, and solve, DIC issues associated with capturing, managing, analyzing and understanding, in near real time, data at volumes and rates that push the frontiers of current technologies.

  8. Directionally Sensitive Neutron Detector For Homeland Security Applications 

    E-Print Network [OSTI]

    Spence, Grant

    2012-02-14

    KAERI Korean Atomic Energy Research Institute MC Monte Carlo Mathematical Model MCNPX Monte Carlo N- Particle Extended NaI Sodium Iodide PMT Photomultiplier Tube PTRAC Particle Tracing Function of MCNPX PVT Polyvynal Taluene RPMs... tubes, and the flat blue and pink plates in front of the 3He tubes are the PVT detectors. ...................................................................................................... 45 Fig. 23. MCNPX...

  9. Capacities and Research in Homeland Security The University at Buffalo

    E-Print Network [OSTI]

    Krovi, Venkat

    , and Biophotonics (ILPB) and the Center for Spin Effects and Quantum Information in Nanostructures (CSEQuIN) conduct multidisciplinary science and technology programs focusing on the development of: (1) high capacity data storage devices for "smart sensor" systems to detect biological and chemical agents. These research directions

  10. Before Senate Committee on Homeland Security and Governmental...

    Broader source: Energy.gov (indexed) [DOE]

    Operational Plan and Desktop Reference for the Disability Employment Program ITP Mining: Education Roadmap for Mining Professionals (December 2002) Mentoring to Increase...

  11. National Atmospheric Release Advisory Center (NARAC) Capabilities for Homeland Security

    SciTech Connect (OSTI)

    Sugiyama, G; Nasstrom, J; Baskett, R; Simpson, M

    2010-03-08

    The Department of Energy's National Atmospheric Release Advisory Center (NARAC) provides critical information during hazardous airborne releases as part of an integrated national preparedness and response strategy. Located at Lawrence Livermore National Laboratory, NARAC provides 24/7 tools and expert services to map the spread of hazardous material accidentally or intentionally released into the atmosphere. NARAC graphical products show affected areas and populations, potential casualties, and health effect or protective action guideline levels. LLNL experts produce quality-assured analyses based on field data to assist decision makers and responders. NARAC staff and collaborators conduct research and development into new science, tools, capabilities, and technologies in strategically important areas related to airborne transport and fate modeling and emergency response. This paper provides a brief overview of some of NARAC's activities, capabilities, and research and development.

  12. Purdue Homeland Security J. Eric Dietz, PhD, PE

    E-Print Network [OSTI]

    Ginzel, Matthew

    vehicle and Smart Grid · 2012 Indianapolis Super Bowl ­ Developing methods for using social networking evacuation RHRC location and resources #12;Crossroads Smart Grid Training Program ­ $9 million DOE Grant · Partnership with Ivy Tech Community College · Smart Grid connects electricity distribution grid with two

  13. The Department of Homeland Security (DHS) Funding Opportunity Announcement (FOA)

    E-Print Network [OSTI]

    Rhode Island, University of

    on the "Search Grants" tab. Enter the FOA Number located on the cover of this announcement. Click and development activities. See "Appendix B - Terms and Conditions" for additional details of substantial

  14. Before the Senate Homeland Security and Governmental Affairs...

    Broader source: Energy.gov (indexed) [DOE]

    Kidd, Program Manager Federal Energy Management Program, Office of Energy Efficiency and Renewable Energy Subject: Cutting the Federal Government's Energy Bill: An Examination of...

  15. Passive Neutron Detection in Ports for Homeland Security Applications 

    E-Print Network [OSTI]

    Pedicini, Eowyn E

    2013-05-07

    for the detection of SNM being carried on small, personal watercraft. Previous work examined the possibility of using active neutron detectors to induce fission in SNM and detect the response. This thesis examines the possibility of detecting SNM using passive 3He...

  16. Homeland Security Science, Technology, Engineering, Mathematics Career Development Program Report

    SciTech Connect (OSTI)

    Bryson, Kathleen H.

    2009-11-06

    Report including the background, reserach and recommendations to expand the current DHS HS-STEM Career Development Program.

  17. Applications to Homeland Security from the Katrina and Rita Hurricanes 

    E-Print Network [OSTI]

    2006-01-01

    PREDICTORS OF AGGRESSION An Undergraduate Research Scholars Thesis by KATRINA GODBEE Submitted to Honors and Undergraduate Research Texas A&M University in partial fulfillment of the requirements for the designation as an UNDERGRADUATE... ........................................................................................................................... 16 1 ABSTRACT Personality Predictors of Aggression. (May 2015) Katrina Godbee Department of Psychology Texas A&M University Research Advisor: Dr. Arnold LeUnes & Dr. Tony Bourgeois Department of Psychology Texas A&M University...

  18. Indiana Department of Homeland Security - NNPP Exercise | Department of

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996How to Apply for an SESIn September 2013,2013

  19. NAMP Participates in Homeland Security Exercise | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i nAand DOEDepartment of Energy Motion toCITIZENSHarris, with the Oak Ridge

  20. Notices DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i nAand DOEDepartmentNew JerseyEnergybenefits of6107 / Wednesday, June 4,008

  1. Before Senate Committee on Homeland Security and Governmental Affairs

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i n c i p a l De p uBUS SERVICE SUBSIDIESDepartmentandEnergySubcommittee on

  2. Before the Senate Homeland Security and Governmental Affairs Subcommittee

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i n c i p a l De p uBUSEnergy CyberDepartment of EnergyInfrastructure

  3. Before the Senate Homeland Security and Governmental Affairs Subcommittee

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i n c i p a l De p uBUSEnergy CyberDepartment of EnergyInfrastructureon

  4. Homeland Security and Emergency Management Coordination (HSEMC) Program |

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy, Ph.D.Food Drive Holiday FoodPages default

  5. How ORISE is Making a Difference: Homeland Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy, Ph.D.Food Drive HolidayHours UsedFire

  6. Homeland Security | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (JournalvivoHigh energyHighland Viewdefault SignEnergy ScoreHome andof

  7. ORISE: California Homeland Security Exercise and Evaluation Program (HSEEP)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesseworkSURVEY UNIVERSE The 2014 surveyNuclearHowAsseton

  8. Before the Senate Homeland Security and Governmental Affairs Subcommittee

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram:Y-12Power, Inc |Bartlesville EnergyDepartmenton Contracting Oversight |

  9. Homeland, California: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy Resources JumpNew Jersey: EnergyHollyHoma Hills,Homeland, California: Energy

  10. Critical Infrastructure and Cyber Security 

    E-Print Network [OSTI]

    Doll, Abby; Pirrong, Renee; Jennings, Matthew; Stasny, George; Giblin, Andy; Shaffer, Steph; Anderson, Aimee

    2011-01-01

    cyber security. They designated responsibility for cyber-security to the newly formed Department of Homeland Security, a duty that has continued to today 3. The group was tasked with creating a method of protecting the critical components.... 2010. 15 Mar. 2011. http://www.d tic.mil/doctrine/new_pubs/jp1_02.pdf 10 Comments on the Economic and Security Implications Of Recent Developments in the World Oil Market , 107th Cong. (2000) (testimony of Robert E. Ebel). http...

  11. Return to the Homeland: Travels in Nigeria by Ola Washington

    E-Print Network [OSTI]

    Amankulor, J. Ndukaku

    1989-01-01

    of America during her visit to Nigeria. The imponant thingshowed that she went to Nigeria having a positive attitudethe Homeland; Travels in Nigeria - No Snakes, No Monkeys, No

  12. Oak Ridge National Laboratory National Security Programs

    E-Print Network [OSTI]

    Security Challenges #12;3 OAK RIDGE NATIONAL LABORATORY U. S. DEPARTMENT OF ENERGY How Will Our Enemies and Homeland Security #12;OAK RIDGE NATIONAL LABORATORY U. S. DEPARTMENT OF ENERGY Nuclear Nonproliferation $27,050 Cleanup $7,481 Science $359M National Security $278M Energy $170M Cleanup $0.8M Total $1.08B

  13. The Center for Information Systems Security Studies and

    E-Print Network [OSTI]

    The Center for Information Systems Security Studies and Research (CISR) has created the ISSE) and the Department of Homeland Security (DHS) have designated NPS as a Center of Academic Excellence in Information developments where cyber security is a concern. Information Systems Security Engineering (ISSE) Certificate

  14. Secure Information Sharing and Dissemination in the Context of Public Security

    E-Print Network [OSTI]

    Secure Information Sharing and Dissemination in the Context of Public Security Professor Nabil R. Adam Director, The Center for Information Management Integration & Connectivity (CIMIC) Executive://cimic.rutgers.edu/~adam/ Abstract In the context of homeland security, one of the key challenges in such environment is achieving

  15. Lawrence Livermore National Laboratory / Energy Security and

    E-Print Network [OSTI]

    Blake Natural Gas Infrastructure, Bill Pickles S2TAR GEN IV, AAA, and AFCI, Bill Halsey GeothermalLawrence Livermore National Laboratory / Energy Security and Technology Program Jeffrey Stewart is to provide research in the areas of national and homeland security and other important areas to DOE

  16. Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)

    SciTech Connect (OSTI)

    Price, D E; Durling, R L

    2005-10-10

    The Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging Lawrence Livermore National Laboratory's expertise in weapons systems and in sparse information analysis to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented.

  17. August 2012 CIP Report Focuses on Smart Grid Security

    Broader source: Energy.gov [DOE]

    The August 2012 issue of The CIP Report from George Mason University's Center for Infrastructure Protection and Homeland Security highlights the significance and challenges to securing the smart grid. The report includes an overview of smart grid security by Deputy Assistant Secretary Hank Kenchington and the findings for reducing cyber risks from the Workshop on Securing the Smart Grid: Best Practices in Supply Chain Security, Integrity, and Resilience.

  18. NIST Computer Security Division csrc.nist.gov Summary of NIST SP 800-53 Revision 4,

    E-Print Network [OSTI]

    , the Intelligence Community, the Committee on National Security Systems, the Department of Homeland Security, and UNIST Computer Security Division csrc.nist.gov Summary of NIST SP 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations Kelley Dempsey Computer Security

  19. Primer Control System Cyber Security Framework and Technical Metrics

    SciTech Connect (OSTI)

    Wayne F. Boyer; Miles A. McQueen

    2008-05-01

    The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

  20. Occupational Medicine Workshops and Webinars

    Office of Energy Efficiency and Renewable Energy (EERE)

    The DOE Annual Occupational Medicine Workshop & Webinar (OMWW) is a valuable training opportunity established by the Office of Health, Safety, and Security in support of hundreds of medical and allied health professionals located at over four dozen locations across the Department. Their vital work in the field of Occupational Medicine encompasses medical qualification examinations, injury and illness management, disability management, workers’ compensation, and much more.

  1. Medicine and Veterinary Medicine Postgraduate Opportunities

    E-Print Network [OSTI]

    Maizels, Rick

    Medicine and Veterinary Medicine Imaging Postgraduate Opportunities MSc/Dip/Cert by online distance of students with backgrounds in clinical medicine (Radiology, Radiography, Surgery, Medicine and Veterinary medicine); basic sciences & engineering (Biology, Biomedical Sciences, Physics, Engineering, Chemistry

  2. Control Systems Security Test Center - FY 2004 Program Summary

    SciTech Connect (OSTI)

    Robert E. Polk; Alen M. Snyder

    2005-04-01

    In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nation’s critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

  3. Faculty of Medicine Graduate School of Medicine

    E-Print Network [OSTI]

    Miyashita, Yasushi

    2007--2008 Faculty of Medicine Graduate School of Medicine PROSPECTUS The University of Tokyo #12;#12;Welcome to Faculty of Medicine, Graduate School of Medicine The University of Tokyo Takao Shimizu Dean, Faculty of Medicine, Graduate School of Medicine The University of Tokyo The Faculty of Medicine

  4. Faculty of Medicine Graduate School of Medicine

    E-Print Network [OSTI]

    Miyashita, Yasushi

    2005--2006 Faculty of Medicine Graduate School of Medicine PROSPECTUS The University of Tokyo #12;#12;Welcome to Faculty of Medicine, Graduate School of Medicine The University of Tokyo Nobutaka Hirokawa Dean, Faculty of Medicine, Graduate School of Medicine The University of Tokyo The University of Tokyo Graduate

  5. Medicinal Herbman

    E-Print Network [OSTI]

    Hacker, Randi

    2010-07-21

    Broadcast Transcript: Japanese gardens are admired for their understated elegance, their meditation/movement fusion, their precise placement of essential elements such as water and stone. In this last way at least, Medicinal Herbman is typically...

  6. The DHS CCICADA Center In July 2009, the U.S. Department of Homeland Security (DHS)

    E-Print Network [OSTI]

    Neimark, Alexander V.

    and computational foundations for deriving knowledge and practical understanding from massive amounts, uncertainty, and manipulation. - 2 - Risk Management Plans (RMP) No RMP Rainfall (P = probabilityof storm identification and attribution Response and planning for natural disasters Sensor location for nuclear

  7. Incorporating Sustainability into Lease and Build Agreements; U.S. Department of Homeland Security (DHS)

    SciTech Connect (OSTI)

    2015-05-26

    This fact sheet discusses the benefits of incorporating sustainability into lease and build agreements.

  8. Northwest Regional Technology Center, August 2011 Page 1 of 2 Around The Region In Homeland Security

    E-Print Network [OSTI]

    active ports. For example, next-generation infrared cameras can work in high- humidity environments like-cost sensors, is simple, quick, and ad hoc. It can identify collapse precursors and display a threat level and development project at PNNL, in conjunction with QinetiQ North America, is identifying and evaluating areas

  9. Northwest Regional Technology Center, June 2013 Page 1 of 2 Around The Region In Homeland Security

    E-Print Network [OSTI]

    Radiological Nuclear Detection (PRND) initiatives. The purposes of the event were to provide information about capabilities and approaches to investigate suspect radiological/nuclear threats, to understand potential a workshop at Seattle's Joint Training Facility to better understand first responder biodetection

  10. Northwest Regional Technology Center, July 2014 Page 1 of 2 Around The Region In Homeland Security

    E-Print Network [OSTI]

    important is the future of technical innovation in helping to detect, deter and prevent acts of terror? Jay innovation is so important. We have a few items that always top our list that would make us more effective of the biodetection products, discuss the PNNL Biodetection Technologies Product Guide, and provided a forum

  11. U.S. Department of Homeland Security Student and Exchange Visitor Program

    E-Print Network [OSTI]

    Fernandez, Eduardo

    Minnesota http://www.dps.state.mn.us/dvs/index.html Mississippi http://www://publicsafety.utah.gov/dld/ Vermont http://www.aot.state.vt.us/dmv/dmvhp.htm Virginia http://www.dmv.state.va.us/ Washington http://www.dol.wa.gov/ Washington, DC http://dmv.dc.gov/main.shtm West Virginia http://www.wvdot.com/6_MOTORISTS/DMV/6g1_licenses

  12. FEMA Fiscal Year (FY) 2015 Tribal Homeland Security Grant Program (THSGP) Notice of Funding Opportunity (NOFO)

    Broader source: Energy.gov [DOE]

    The FY 2015 THSGP supports the building, sustainment and delivery of core capabilities to enable Tribes to strengthen their capacity to prevent, protect against, mitigate, respond to, and recover from potential terrorist attacks and other hazards.

  13. Economics definitions, methods, models, and analysis procedures for Homeland Security applications.

    SciTech Connect (OSTI)

    Ehlen, Mark Andrew; Loose, Verne William; Vargas, Vanessa N.; Smith, Braeton J.; Warren, Drake E.; Downes, Paula Sue; Eidson, Eric D.; Mackey, Greg Edward

    2010-01-01

    This report gives an overview of the types of economic methodologies and models used by Sandia economists in their consequence analysis work for the National Infrastructure Simulation&Analysis Center and other DHS programs. It describes the three primary resolutions at which analysis is conducted (microeconomic, mesoeconomic, and macroeconomic), the tools used at these three levels (from data analysis to internally developed and publicly available tools), and how they are used individually and in concert with each other and other infrastructure tools.

  14. Northwest Regional Technology Center, February 2011 Page 1 of 2 Around The Region In Homeland Security

    E-Print Network [OSTI]

    Association, will conduct the Sixth Annual Fundamentals of Grants Management Workshop for grantees currently, is designed to enhance grantees' ability to administer FEMA grant funding. Suggested attendees include current grantees, direct recipients of FEMA funding, subrecipients of FEMA funding, and individuals with limited

  15. Proposed New Accelerator Design for Homeland Security X-Ray Applicatio...

    Office of Scientific and Technical Information (OSTI)

    Bibtex Format Close 0 pages in this document matching the terms "" Search For Terms: Enter terms in the toolbar above to search the full text of this document for pages...

  16. ORISE: U.S. Department of Homeland Security Summer Research Team Program

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass map shinesSolarNewsusceptometer underIRossybelle Perales ResearchRaquel

  17. ORISE: U.S. Department of Homeland Security is seeking faculty, graduate

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you notHeatMaRIEdioxideUser WorkEP PowerresourcesScientific

  18. Proposed New Accelerator Design for Homeland Security X-Ray Applications

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTech ConnectSpeeding accessusers'(xā‰¤2)Article)SciTechon MPASReport) | SciTechReport)

  19. Proposed New Accelerator Design for Homeland Security X-Ray Applications

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTech ConnectSpeeding accessusers'(xā‰¤2)Article)SciTechon MPASReport) |

  20. Faculty of Medicine Graduate School of Medicine

    E-Print Network [OSTI]

    Miyashita, Yasushi

    2009--2010 Faculty of Medicine Graduate School of Medicine PROSPECTUS The University of Tokyo #12;#12;A Message From the Dean of Faculty and Graduate School of Medicine, the University of Tokyo Takao Shimizu Dean, Faculty and Graduate School of Medicine The University of Tokyo Faculty of Medicine

  1. Faculty of Medicine Graduate School of Medicine

    E-Print Network [OSTI]

    Miyashita, Yasushi

    2015 2016 Faculty of Medicine Graduate School of Medicine PROSPECTUS The University of Tokyo #12;#12;A Message From the Dean of Faculty and Graduate School of Medicine, the University of Tokyo Kohei Miyazono Dean, Faculty and Graduate School of Medicine The University of Tokyo Faculty of Medicine

  2. Faculty of Medicine Graduate School of Medicine

    E-Print Network [OSTI]

    Miyashita, Yasushi

    2011--2012 Faculty of Medicine Graduate School of Medicine PROSPECTUS The University of Tokyo #12;#12;A Message From the Dean of Faculty and Graduate School of Medicine, the University of Tokyo Kohei Miyazono Dean, Faculty and Graduate School of Medicine The University of Tokyo Faculty of Medicine

  3. Department of Homeland Security, Science and Technology Directorate, Borders and Maritime Security Division: Renewable Energy Research Roadmap

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submit theCovalent BondingMeeting | Department| DepartmentWesternEngineersNREL is a

  4. Faculty of Medicine Faculty Education Office (Medicine)

    E-Print Network [OSTI]

    Faculty of Medicine Faculty Education Office (Medicine) Print Candidate Name: UCAS Number: Graduate Medicine Degree Checklist It is not possible to provide a comprehensive list of all degrees that fulfil our

  5. Control Systems Cyber Security Standards Support Activities

    SciTech Connect (OSTI)

    Robert Evans

    2009-01-01

    The Department of Homeland Security’s Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSP’s current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

  6. SCHOOL of MEDICINE School of Medicine

    E-Print Network [OSTI]

    California at Riverside, University of

    SCHOOL of MEDICINE School of Medicine A next generation med school for the next generation of med students ABOUT THE UCR SCHOOL OF MEDICINE Built upon more than three decades of medical education experience, the new UCR School of Medicine is committed to expanding and diversifying the physician workforce

  7. Postal Security Device Security Policy

    E-Print Network [OSTI]

    Postal Security Device Security Policy FRAMA AG PSD - I Version: R01.06 Date: 25.05.2007 Doc.-ID: DE_FNKPSD_510_SPE File name: DE_FNKPSD_510_SPE_R0106_EN.Security Policy PSD Author: Bernd Zinke, Timo » Non-Confidential « #12;Security Policy FRAMA AG CH-3438 LAUPERSWIL / BERN TITLE: POSTAL SECURITY

  8. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  9. Today, there are almost 90 federal agencies that are rapidly upgrad-ing and enhancing their language resources. For national security, the

    E-Print Network [OSTI]

    Hill, Wendell T.

    their language resources. For national security, the globalization of business, and a better understanding lives are at stake on foreign soil, or we think about homeland security, then increasing the nation's foreign language capacity is a vital national security priority." At the University of Maryland, new

  10. Medicine and Medical Center

    E-Print Network [OSTI]

    Faculty of Medicine and Medical Center (FM/AUBMC) #12;418 Faculty of Medicine and Medical Center (FM/AUBMC) Graduate Catalogue 2015­16 Faculty of Medicine and Medical Center (FM/AUBMC) Officers. Sayegh Executive Vice President for Medicine and Global Strategy and the Raja N. Khuri Dean

  11. Genome Medicine 2009, 11

    E-Print Network [OSTI]

    Dehene, Frank

    Genome Medicine 2009, 11::88 Correspondence BBrriiddggiinngg tthhee ggaapp bbeettwweeeenn Care Medicine and CRISMA laboratory, University of Pittsburgh School of Medicine, Scaife 602, 3550 Biotechnology Center, University of Torino, Via Nizza 52, I, 10126 Torino, Italy; 10Institutionen för Medicin

  12. Medicine and Medical Center

    E-Print Network [OSTI]

    Faculty of Medicine and Medical Center (FM/AUBMC) #12;400 Faculty of Medicine and Medical Center (FM/AUBMC) Graduate Catalogue 2014­15 Faculty of Medicine and Medical Center (FM/AUBMC) Officers Vice President for Medical Affairs and the Raja N. Khuri Dean of the Faculty of Medicine Ziyad Ghazzal

  13. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO...

  14. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  15. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    SciTech Connect (OSTI)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  16. www.medicine.gu.se Minnesanteckningar forskarutbildningsutskottet, inst. fr medicin

    E-Print Network [OSTI]

    www.medicine.gu.se Minnesanteckningar forskarutbildningsutskottet, inst. för medicin 2015 inflammationsforskning hälsas välkommen som ny ledamot i FUU. Per Ladenvall vid avd. för molekylär och klinisk medicin

  17. School of Medicine Degree options

    E-Print Network [OSTI]

    Brierley, Andrew

    136 School of Medicine Medicine Degree options BSc (Single Honours Degree) Medicine Entrance Applied Sciences`Pathway to Medicine'at Perth College The School of Medicine has formed a partnership Andrews. More information can be found on the School of Medicine web pages ( http://medicine

  18. Personalized medicine: selected Web resources

    E-Print Network [OSTI]

    Stimson, Nancy F

    2009-01-01

    Genomic and Personalized Medicine. 1 st ed. Amsterdam, thePersonalized medicine: selected Web resources Nancy F.Keywords: personalized medicine; personalized health care;

  19. Sports Medicine for Emergency Medicine Physicians, Too Few to Maintain the Fellowship in Emergency Medicine

    E-Print Network [OSTI]

    Delasobera, Bronson E; Davenport, Moira; Milzman, David

    2012-01-01

    Acad Emerg Med. Western Journal of Emergency Medicine1. Grindel SH. Sports medicine training in the UnitedM, Milzman D. Sports medicine fellowship Address for

  20. Facility for Rare Isotope Beams: The Journey Has Begun on DOE...

    Office of Environmental Management (EM)

    level. New knowledge in this arena will yield exciting applications for society in medicine, homeland security, industry, and beyond. Acting Provost June Youatt kicked off the...

  1. School of Medicine Degree options

    E-Print Network [OSTI]

    Brierley, Andrew

    126 School of Medicine Medicine Degree options BSc (Single Honours Degree) Medicine Entrance level. HNC Applied Sciences`Pathway to Medicine'at Perth College The School of Medicine has formed at St Andrews. More information can be found on the School of Medicine webpages or from Perth College T

  2. National Security Technology Incubator Business Plan

    SciTech Connect (OSTI)

    None

    2007-12-31

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

  3. Cyber Security and Resilient Systems

    SciTech Connect (OSTI)

    Robert S. Anderson

    2009-07-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

  4. Homeland Security Exercise and Evaluation Program (HSEEP) Public Announcement, Dartmouth Emergency Medical Services NNE Collegiate Drill Day

    E-Print Network [OSTI]

    Bucci, David J.

    Medical Services NNE Collegiate Drill Day Dartmouth EMS Collegiate Day Drill, 2013 PUBLIC ANNOUNCEMENT's medical response to a crisis situation. The exercise will involve a fictional medical and trauma drill and

  5. Testimony before a Joint Meeting of the Senate Finance Committee and the Senate Transportation and Homeland Security Committee

    E-Print Network [OSTI]

    potentially important historical lessons. When we experienced a rapid run-up in the price of oil in the late 70s and early 1980s corresponding once again to a rapid increase in the price of oil which caused, projected fuel efficiencies, their impact on fuel tax revenues, and construction commodity prices. I will do

  6. PRACTICE OF MEDICINE III PRACTICE OF MEDICINE IV PRACTICE OF MEDICINE V

    E-Print Network [OSTI]

    Puglisi, Joseph

    PRACTICE OF MEDICINE III PRACTICE OF MEDICINE IV PRACTICE OF MEDICINE V PRACTICE OF MEDICINE I PRACTICE OF MEDICINE II SpringWinterAutumn Year3,4,[5] Year2 SCHOLARLY CONCENTRATIONS Year1 · Cells to Tissues · Molecular Foundations of Medicine · Applied Biochemistry · Genetics · Development & Disease

  7. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  8. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  9. Safeguards and Security and Cyber Security RM

    Office of Environmental Management (EM)

    using security measures such as badging, pre-employment investigation and fitness for duty, training, and security awareness? Cyber Security CS-1 Has the project...

  10. CS2SAT: THE CONTROL SYSTEMS CYBER SECURITY SELF-ASSESSMENT TOOL

    SciTech Connect (OSTI)

    Kathleen A. Lee

    2008-01-01

    The Department of Homeland Security National Cyber Security Division has developed the Control System Cyber Security Self-Assessment Tool (CS2SAT) that provides users with a systematic and repeatable approach for assessing the cyber-security posture of their industrial control system networks. The CS2SAT was developed by cyber security experts from Department of Energy National Laboratories and with assistance from the National Institute of Standards and Technology. The CS2SAT is a desktop software tool that guides users through a step-by-step process to collect facility-specific control system information and then makes appropriate recommendations for improving the system’s cyber-security posture. The CS2SAT provides recommendations from a database of industry available cyber-security practices, which have been adapted specifically for application to industry control system networks and components. Each recommendation is linked to a set of actions that can be applied to remediate-specific security vulnerabilities.

  11. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    System-of-systems analysis Visualization tools for complex information Next-generation smart grid technologies Quantum computing, security, and data fusion For more information,...

  12. Occupational Medicine - Assistant PIA, Idaho National Laboratory...

    Energy Savers [EERE]

    Occupational Medicine - Assistant PIA, Idaho National Laboratory Occupational Medicine - Assistant PIA, Idaho National Laboratory Occupational Medicine - Assistant PIA, Idaho...

  13. PIA - Richland Occupational Medicine Contract | Department of...

    Energy Savers [EERE]

    PIA - Richland Occupational Medicine Contract PIA - Richland Occupational Medicine Contract PIA - Richland Occupational Medicine Contract PDF icon PIA - Richland Occupational...

  14. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  15. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  16. A comparison of Mexico's Border Industry Program with the Border Industry Program of South Africa and its Bantu homelands 

    E-Print Network [OSTI]

    Notzon, Brian Anthony

    1973-01-01

    A COMPARISON OF MEXICO'S BORDER INDUSTRY PROGRAM WITH THE BORDER INDUSTRY PROGRAM OF SOUTH AFRICA AND ITS BANTU HOMELANDS A Thesis by BRIAN ANTHONY NOTZON Submitted to the Graduate College of Texas ASM University in partial fulfillment... of the requirement for the degree of MASTER OF SCIENCE May 1973 Ma)or Sub)ect: Economics A COMPARISON OP MEXICO'S BORDER INDUSTRY PROGRAM WITH THE BORDER INDUSTRY PROGRAM OF SOUTH AFRICA AND ITS BANTU HOMELANDS A Thesis by BRIAN ANTHONY NOTZON Approved...

  17. Secure PVM

    SciTech Connect (OSTI)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  18. College of Medicine Promotion & Tenure

    E-Print Network [OSTI]

    Wu, Shin-Tson

    College of Medicine Promotion & Tenure Guidelines 3/4/2014 #12;Table of Contents INTRODUCTION.....................................................................................................................................3 COLLEGE OF MEDICINE GENERAL REQUIREMENTS..................................................................................10 TENURE-TRACK FACULTY DEPARTMENT OF INTERNAL MEDICINE

  19. Narrative medicine and narrative writing.

    E-Print Network [OSTI]

    Shapiro, Johanna

    2012-01-01

    of Teachers of Family Medicine Conference on Medical Studentin narra- tive-based medicine. Lit Med 2011;29(2):396-411.3. 7. Charon R. Narrative medicine: honoring the stories of

  20. Gender Equity in Academic Medicine

    E-Print Network [OSTI]

    Sheridan, Jennifer

    Gender Equity in Academic Medicine Molly Carnes, MD, MS Professor of Medicine, Psychiatry equity and why it is important for academic medicine? · How social science research helps us understand

  1. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  2. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  3. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  4. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity Security

  5. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

  6. PAIN MEDICINE CENTER INSTITUTE FOR TRANSLATIONAL NEUROSCIENCE AT NORTHWESTERN MEDICINE

    E-Print Network [OSTI]

    Chisholm, Rex L.

    PAIN MEDICINE CENTER INSTITUTE FOR TRANSLATIONAL NEUROSCIENCE AT NORTHWESTERN MEDICINE Pain diseases such as diabetes and stroke. The outpatient Pain Medicine Center within the Department of Anesthesiology at Northwestern Medicine offers hope to patients with chronic pain. Starting with a comprehensive

  7. 65School of Chinese Medicine Master of Chinese Medicine (MCM)

    E-Print Network [OSTI]

    Cheung, Yiu-ming

    65School of Chinese Medicine Master of Chinese Medicine (MCM) (One-year Full-time or Two-year Part and enhance students' ability in proficiently applying Chinese medicine theories and methods to clinical practice as well as research in and development of Chinese medicine. After taking the programme, students

  8. www.medicine.gu.se Minnesanteckningar Forskarutbildningsutskottet, inst. fr medicin

    E-Print Network [OSTI]

    www.medicine.gu.se Minnesanteckningar ­ Forskarutbildningsutskottet, inst. för medicin 2015, forskare vid avd. för molekylär och klinisk medicin hälsas välkommen som ny ledamot i FUU. Pauline ersätter informerade om hur antagningarna granskas vid avd. för molekylär och klinisk medicin. De vanligaste bristerna

  9. Translational Medicine/ Evidence Based Practice Translational Medicine 2

    E-Print Network [OSTI]

    Finley Jr., Russell L.

    Translational Medicine/ Evidence Based Practice Years I-IV 2014-2015 Year II Translational Medicine 2 Year 2 students practice the Translational Medicine skills learned in first year in small group journal discussions with clinical research faculty. Objectives of Translational Medicine 2: · Assess

  10. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio August 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Security

  11. INSTITUTE FOR CYBER SECURITY Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio August-world impact #12;INSTITUTE FOR CYBER SECURITY Institute for Cyber Security Founded June 2007: still in start

  12. NSM Secure UI Crypto Module Security Policy

    E-Print Network [OSTI]

    NSM Secure UI Crypto Module Security Policy Version: 1.4 Revision Date: April 1, 2010 This document. #12;McAfee, Inc NSM Secure UI Crypto Module Security Policy Page 2 of 15 CHANGE RECORD Revision Date Module Security Policy Page 3 of 15 Contents 1 Module Overview

  13. Health & Medicine Heart Disease

    E-Print Network [OSTI]

    Rogers, John A.

    See Also: Health & Medicine Heart Disease· Medical Imaging· Vioxx· Matter & Energy Electronics· Technology· Medical Technology· Reference Artificial heart· Biosensor· Circuit design· Machine· Science and stretchable electronics can map waves of electrical activity in the heart with better resolution and speed

  14. Network medicine Tony Pawsona

    E-Print Network [OSTI]

    strategies can be imple- mented. Transforming medicine into a network driven endeavour will require development. The average price of bringing a drug to market is now approximately 860M USD [1

  15. Security for grids

    E-Print Network [OSTI]

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-01-01

    differences between Grid security and host or site securityof requirements for Grid security in order to achieve thecompletely. Index Terms — Grid security, authentication,

  16. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  17. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  18. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  19. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  20. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  1. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  2. Faculty Information Security Guide

    E-Print Network [OSTI]

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  3. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  4. Nuclear security

    SciTech Connect (OSTI)

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  5. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  6. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  7. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  8. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  9. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  10. 2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

  11. Personal Genomics, Personalized Medicine,

    E-Print Network [OSTI]

    Napp, Nils

    /Science Translational Medicine panel discussion; MLA 2012 #12;Timeline: Human Genome Sequence HSLS, U.Pitt 1995 2014 2000 2003 2007 2007 2010 Human Genome Draft Sequence Complete Human Reference Genome Individual Human of a free living organism: Haemophilus Influenzae #12;Personal Genome Project HSLS, U.Pitt #12;Why get

  12. 2014 Headquarters Facilities Master Security Plan- Chapter 3, Personnel Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Describes DOE Headquarters Personnel Security procedures for acquiring, maintaining, and passing security clearances.

  13. Using Operational Security (OPSEC) to Support a Cyber Security...

    Energy Savers [EERE]

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  14. SCHOOL OF MEDICINE CURRICULUM GUIDE

    E-Print Network [OSTI]

    Finley Jr., Russell L.

    SCHOOL OF MEDICINE YEAR IV CURRICULUM GUIDE WAYNE STATE UNIVERSITY SCHOOL OF MEDICINE 2014-2015 Curriculum Guides are subject to revision. Updates will be posted to the electronic version of this Curriculum Guide that can be found on the School of Medicine website. Curriculum Guide 2014-2015 Revised 03

  15. Translational Biology, Medicine, and Health

    E-Print Network [OSTI]

    Crawford, T. Daniel

    Translational Biology, Medicine, and Health PhDProgram Admissions The program seeks highly. PhD Program in Translational Biology, Medicine, and Health Focus Areas Cancer Development, Aging 24016 avanwart@vt.edu · www.tbmh.vt.edu www . tbmh.vt.edu #12;Translational Biology, Medicine

  16. SCHOOL OF MEDICINE RESEARCH ROADMAP

    E-Print Network [OSTI]

    Chapman, Michael S.

    SCHOOL OF MEDICINE RESEARCH ROADMAP October 2011 #12;OHSU School of Medicine Research Roadmap internal and external stakeholders and the public. #12;OHSU School of Medicine Research Roadmap October human health and well-being. At the Research Roadmap Retreat in December 2010, I issued a charge

  17. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  18. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

  19. College of Veterinary Medicine and Biomedical Sciences

    E-Print Network [OSTI]

    , protein, lipid and carbohydrate biochemistry, medicinal chemistry, enzymology, metabolomics, genomics

  20. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Infrastructure Demonstration for Energy reliability and Security) (web link) program to demonstrate: · Cyber-securityEnergy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  1. Engage States on Energy Assurance and Energy Security

    SciTech Connect (OSTI)

    Kara Colton; John Ratliff; Sue Gander; Darren Springer; Greg Dierkers

    2008-09-30

    The NGA Center's 'Engaging States on Energy Security and Energy Assurance' has been successful in achieving the stated project purposes and objectives both in the initial proposal as well as in subsequent revisions to it. Our activities, which involve the NGA Center for Best Practices (The NGA Center) Homeland Security and Technology Division, included conducting tabletop exercises to help federal and state homeland security and energy officials determine roles and actions for various emergency scenarios. This included efforts to education state official on developing an energy assurance plan, harmonizing approaches to controlling price volatility, implementing reliability standards, understanding short and long-term energy outlooks and fuel diversification, and capitalizing on DOE's research and development activities. Regarding our work on energy efficiency and renewable energy, the NGA Center's Environment, Energy and Natural Resources Division hosted three workshops which engaged states on the clean energy and alternative transportation fuel and also produced several reports on related topics. In addition, we convened 18 meetings, via conference call, of the Energy Working Group. Finally, through the NGA Center's Front and Center newsletter articles, the NGA Center disseminated promising practices to a wide audience of state policymakers. The NGA Center also hosted a number of workshops and web conferences designed to directly engage states on the deliverables under this Cooperative Agreement. Through the NGA Center's written products and newsletter articles, the NGA Center was able to disseminate promising practices to a wide audience of state policymakers.

  2. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia, and reactorsystemoverviews. Training in Action: Gulf Nuclear Energy InfrastructureInstitute In2011,SandiateamedwiththeNuclearSecurity energy safety, security,safeguards,andnonproliferation. Training Sandia National Laboratories experts

  3. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  4. National Security Technologies VPP 2012

    Energy Savers [EERE]

    for other Federal Agencies, such as the Defense Threat Reduction Agency, National Aeronautics and Space Administration, Nuclear Regulatory Commission, Department of Homeland...

  5. Cyber Security Testing and Training Programs for Industrial Control Systems

    SciTech Connect (OSTI)

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  6. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  7. Security | Department of Energy

    Office of Environmental Management (EM)

    Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top...

  8. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  9. Osteopathic Emergency Medicine Programs Infrequently Publish in High-Impact Emergency Medicine Journals

    E-Print Network [OSTI]

    Baskin, Sean M.; Lin, Christina; Carlson, Jestin N.

    2014-01-01

    Journal of Emergency Medicine Volume XV, NO . 7 : Novemberin an academic family medicine department. Teach Learn Med.activity in internal medicine residency training programs. J

  10. A Novel Approach to Internal Medicine Education for Emergency Medicine Residents

    E-Print Network [OSTI]

    Gemme, S R; Cohn, J; Smith, J

    2014-01-01

    to discuss internal medicine topics. At the completion ofprogram on an internal medicine topic of interest. A six-compared to an internal medicine floor. The overall quality

  11. Challenges and Opportunities in Academic Hospital Medicine: Report from the Academic Hospital Medicine Summit

    E-Print Network [OSTI]

    Flanders, Scott A.; Centor, Bob; Weber, Valerie; McGinn, Thomas; DeSalvo, Karen; Auerbach, Andrew

    2009-01-01

    Association of Professors of Medicine Brad Sharpe, M.D. ,Staff, Society of Hospital Medicine Amy Woodward, Supportof General Internal Medicine. Disclosures: Dr. Auerbach is a

  12. Measurable Control System Security through Ideal Driven Technical Metrics

    SciTech Connect (OSTI)

    Miles McQueen; Wayne Boyer; Sean McBride; Marie Farrar; Zachary Tudor

    2008-01-01

    The Department of Homeland Security National Cyber Security Division supported development of a small set of security ideals as a framework to establish measurable control systems security. Based on these ideals, a draft set of proposed technical metrics was developed to allow control systems owner-operators to track improvements or degradations in their individual control systems security posture. The technical metrics development effort included review and evaluation of over thirty metrics-related documents. On the bases of complexity, ambiguity, or misleading and distorting effects the metrics identified during the reviews were determined to be weaker than necessary to aid defense against the myriad threats posed by cyber-terrorism to human safety, as well as to economic prosperity. Using the results of our metrics review and the set of security ideals as a starting point for metrics development, we identified thirteen potential technical metrics - with at least one metric supporting each ideal. Two case study applications of the ideals and thirteen metrics to control systems were then performed to establish potential difficulties in applying both the ideals and the metrics. The case studies resulted in no changes to the ideals, and only a few deletions and refinements to the thirteen potential metrics. This led to a final proposed set of ten core technical metrics. To further validate the security ideals, the modifications made to the original thirteen potential metrics, and the final proposed set of ten core metrics, seven separate control systems security assessments performed over the past three years were reviewed for findings and recommended mitigations. These findings and mitigations were then mapped to the security ideals and metrics to assess gaps in their coverage. The mappings indicated that there are no gaps in the security ideals and that the ten core technical metrics provide significant coverage of standard security issues with 87% coverage. Based on the two case studies and evaluation of the seven assessments, the security ideals demonstrated their value in guiding security thinking. Further, the final set of core technical metrics has been demonstrated to be both usable in the control system environment and provide significant coverage of standard security issues.

  13. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    society. www.ists.dartmouth.edu THE DARTMOUTH CYBER SECURITY INITIATIVE The Dartmouth Cyber Security, TECHNOLOGY, AND SOCIETY THE DARTMOUTH CYBER SECURITY INITIATIVE #12;The number of laptop thefts at Dartmouth, and Society; and the Dartmouth Cyber Security Initiative offer the following solutions: · Whole

  14. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  15. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  16. Day, night and all-weather security surveillance automation synergy from combining two powerful technologies

    SciTech Connect (OSTI)

    Morellas, Vassilios; Johnson, Andrew [Honeywell Labs, 3660, Technology Drive, Minneapolis MN 5518 (United States); Johnston, Chris [Honeywell ACS, 1985 Douglas Drive North, Golden Valley MN 55422 (United States); Roberts, Sharon D.; Francisco, Glen L. [L-3 Communications Infrared Products, 13532 N. Central Expressway, Dallas TX 75243 (United States)

    2006-07-01

    Thermal imaging is rightfully a real-world technology proven to bring confidence to daytime, night-time and all weather security surveillance. Automatic image processing intrusion detection algorithms are also a real world technology proven to bring confidence to system surveillance security solutions. Together, day, night and all weather video imagery sensors and automated intrusion detection software systems create the real power to protect early against crime, providing real-time global homeland protection, rather than simply being able to monitor and record activities for post event analysis. These solutions, whether providing automatic security system surveillance at airports (to automatically detect unauthorized aircraft takeoff and landing activities) or at high risk private, public or government facilities (to automatically detect unauthorized people or vehicle intrusion activities) are on the move to provide end users the power to protect people, capital equipment and intellectual property against acts of vandalism and terrorism. As with any technology, infrared sensors and automatic image intrusion detection systems for global homeland security protection have clear technological strengths and limitations compared to other more common day and night vision technologies or more traditional manual man-in-the-loop intrusion detection security systems. This paper addresses these strength and limitation capabilities. False Alarm (FAR) and False Positive Rate (FPR) is an example of some of the key customer system acceptability metrics and Noise Equivalent Temperature Difference (NETD) and Minimum Resolvable Temperature are examples of some of the sensor level performance acceptability metrics. (authors)

  17. Page 1Securing the Microsoft Cloud Securing the

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Page 1Securing the Microsoft Cloud Securing the Microsoft Cloud #12;Page 2Securing the Microsoft to have confidence in Microsoft as their preferred cloud provider. Our security policies and practices their security and compliance related needs. Securing the Microsoft Cloud #12;Page 3Securing the Microsoft Cloud

  18. SCHOOL OF MEDICINE CURRICULUM GUIDE

    E-Print Network [OSTI]

    Finley Jr., Russell L.

    SCHOOL OF MEDICINE YEAR 2 CURRICULUM GUIDE WAYNE STATE UNIVERSITY SCHOOL OF MEDICINE 2015-2016 PLEASE READ THE INTRODUCTORY PAGES VERY CAREFULLY. THEY CONTAIN IMPORTANT POLICY GUIDELINES. Curriculum guides are subject to revision. Updated versions of the Curriculum Guide will be posted on the School

  19. Medicinal Chemistry and Enzyme Kinetics

    E-Print Network [OSTI]

    Truhlar, Donald G

    Prof. Donald G. Truhlar, Department of Chemistry, February 2007 Recent Results ·Novel analytic functionMedicinal Chemistry and Enzyme Kinetics Elizabeth Amin and C. R. Wagner, Medicinal Chemistry Jiali Gao, Chemistry Don Truhlar, Chemistry February 2007 #12;Zn Metalloprotein Force Field Design ·Zn

  20. www.medicine.usask.ca College of Medicine Accreditation Decision: Summary Version

    E-Print Network [OSTI]

    Peak, Derek

    www.medicine.usask.ca College of Medicine Accreditation Decision: Summary Version This is a summary letter is available at medicine.usask.ca Background The U of S College of Medicine was placed on Warning of Saskatchewan College of Medicine on probation. The College of Medicine remains fully accredited while it works

  1. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Summit | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  2. Studienordnung fr den Masterstudiengang ,,Community Medicine

    E-Print Network [OSTI]

    Greifswald, Ernst-Moritz-Arndt-Universität

    1 Studienordnung für den Masterstudiengang ,,Community Medicine and Epidemiologic Research" an der-Moritz-Arndt-Universität Greifswald folgende Fachprüfungsordnung für den Masterstudiengang ,,Community Medicine and Epidemiologic ,,Community Medicine and Epidemiologic Research" vom 30. Januar 2012 das Studium in diesem Studiengang

  3. Emergency Medicine Clerkship Directors: Current Work Force

    E-Print Network [OSTI]

    Wald, David A.; Khandelwal, Sorabh; Manthey, David E.; Way, David P.; Ander, Douglas S.; Thibodeau, Lorraine

    2014-01-01

    XV, NO. 4 : July 2014 Western Journal of Emergency MedicineWC, Gill AM, Jordan R. Emergency medicine clerkship direc-of and for the internal medicine clerkship directors: How

  4. Building Extensible and Secure Networks

    E-Print Network [OSTI]

    Popa, Lucian

    2011-01-01

    adoption of cloud computing is security, as customers oftenpreserving security when migrating to the cloud computingto the security principals used in the cloud access control

  5. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    for Environment and National Security Scripps Institution ofMultiplying Threats to National Security Higher temperaturesefforts to protect national security. Page 2 The U.S. Armed

  6. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  7. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  8. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  9. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  10. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY

  11. nevada national security site

    National Nuclear Security Administration (NNSA)

    7%2A en Nevada National Security Site operator recognized for green fleet http:www.nnsa.energy.govblognevada-national-security-site-operator-recognized-green-fleet

    The...

  12. Before the Senate Homeland Security and Governmental Affairs Subcommittee on Oversight of Government Management, the Workforce, and the District of Columbia

    Broader source: Energy.gov [DOE]

    Subject: Strengthening the Federal Acquisition Workforce: Government-wide Leadership and Initiatives By: John Bashista, Deputy Director, Office of Procurement and Assistance Management, Office of Management

  13. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  14. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  15. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    Pew Project on National Security, Energy and Climate http://of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.

  16. 24-hour security contact (0115) 951 3013

    E-Print Network [OSTI]

    Aickelin, Uwe

    Medicine and Science Reception 27 Stables Bioenergy & Brewing Science South Laboratory Veterinary Medicine

  17. Nuclear medicine imaging system

    DOE Patents [OSTI]

    Bennett, Gerald W. (East Moriches, NY); Brill, A. Bertrand (Shoreham, NY); Bizais, Yves J. C. (Upton, NY); Rowe, R. Wanda (Upton, NY); Zubal, I. George (Upton, NY)

    1986-01-01

    A nuclear medicine imaging system having two large field of view scintillation cameras mounted on a rotatable gantry and being movable diametrically toward or away from each other is disclosed. In addition, each camera may be rotated about an axis perpendicular to the diameter of the gantry. The movement of the cameras allows the system to be used for a variety of studies, including positron annihilation, and conventional single photon emission, as well as static orthogonal dual multi-pinhole tomography. In orthogonal dual multi-pinhole tomography, each camera is fitted with a seven pinhole collimator to provide seven views from slightly different perspectives. By using two cameras at an angle to each other, improved sensitivity and depth resolution is achieved. The computer system and interface acquires and stores a broad range of information in list mode, including patient physiological data, energy data over the full range detected by the cameras, and the camera position. The list mode acquisition permits the study of attenuation as a result of Compton scatter, as well as studies involving the isolation and correlation of energy with a range of physiological conditions.

  18. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  19. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  20. cyber security guru

    E-Print Network [OSTI]

    Sandhu, Ravi

    cyber security guru By: Virginia Scott Posted: 4/17/07 UTSA has received a grant from the Texas Emerging Fund to create an institute for cyber security research. According to UTSA industry and educational initiatives in Texas. The creation of UTSA's Institute for Cyber Security Research

  1. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  2. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    (VPP related); 2) Accreditation Association for Ambulatory Healthcare (occupational medicine); and 3) American Association for Laboratory Accreditation (A2LA) re-accredited the...

  3. Nicole Gurtler Genomics and Medicine

    E-Print Network [OSTI]

    Brutlag, Doug

    Gurtler 1 Nicole Gurtler Genomics and Medicine Final Paper Genomics and Multiple Sclerosis The recent breakthroughs in genomics have contributed greatly to the advancement of multiple sclerosis than previously maintenance-oriented treatments. What is Multiple Sclerosis? "Multiple sclerosis (MS

  4. Ginny Scholtes Genomics and Medicine

    E-Print Network [OSTI]

    Brutlag, Doug

    Ginny Scholtes Genomics and Medicine Professor Douglas Brutlag December 2, 2010 How Hard Could It Be? The Integration of Personal Genomics into Medical Practice Personal genomics carries incredible potential to revolutionize the way

  5. Statistical foundations for precision medicine

    E-Print Network [OSTI]

    Manrai, Arjun Kumar

    2015-01-01

    Physicians must often diagnose their patients using disease archetypes that are based on symptoms as opposed to underlying pathophysiology. The growing concept of "precision medicine" addresses this challenge by recognizing ...

  6. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  7. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  8. THE PRECISION MEDICINE INITIATIVE WHAT IS IT?

    E-Print Network [OSTI]

    Bandettini, Peter A.

    THE PRECISION MEDICINE INITIATIVE WHAT IS IT? Precision medicine is an emerging approach, environment, and lifestyle. The Precision Medicine Initiative will generate the scientific evidence needed to move the concept of precision medicine into clinical practice. WHY NOW? The time is right because of

  9. West Virginia University 1 School of Medicine

    E-Print Network [OSTI]

    Mohaghegh, Shahab

    West Virginia University 1 School of Medicine Degrees Offered · M.D., Doctor of Medicine · M.D./Ph.D., Joint Doctor of Medicine and Doctor of Philosophy · Ph.D., in Biochemistry and Molecular Biology · Ph.D., Pharmaceutical and Pharmacological Sciences · M.D./M.P.H., Doctor of Medicine and Master of Public Health · M

  10. The USF Health Morsani College of Medicine

    E-Print Network [OSTI]

    Meyers, Steven D.

    The USF Health Morsani College of Medicine TOMORROW'S PHYSICIANS #12;#12;USF HEALTH MORSANI COLLEGE OF MEDICINE | UNIVERSITY OF SOUTH FLORIDA | USF HEALTH DOWNTOWN 3 TheMorsaniCollegeofMedicine Academics HEALTH MORSANI COLLEGE OF MEDICINE | UNIVERSITY OF SOUTH FLORIDA | USF HEALTH DOWNTOWN4 BAND-AIDS ONLY GO

  11. West Virginia University 1 School of Medicine

    E-Print Network [OSTI]

    Mohaghegh, Shahab

    West Virginia University 1 School of Medicine Degrees Offered · M.D., Doctor of Medicine · M.D. /Ph.D., Joint Doctor of Medicine and Doctor of Philosophy · Ph.D. in Biochemistry and Molecular Biology · Ph of Physical Therapy · Ph.D., Pharmaceutical and Pharmacological Sciences · M.D. /M.P.H., Doctor of Medicine

  12. Department of Medicine Annual Report 2015

    E-Print Network [OSTI]

    He, Chuan

    Department of Medicine Annual Report 2015 #12;B Depar tment of Medicine 12015 Annual Repor t I am delighted to present the Department of Medicine FY 15 Annual Report. This year's theme focuses on the impact medicine. Our clinicians, researchers and educators are dedicated to solving complex medical problems

  13. Occupational and Environmental Clinical Medicine II

    E-Print Network [OSTI]

    Finley Jr., Russell L.

    Occupational and Environmental Medicine Years I-IV 2014-2015 Year II Clinical Medicine II · Toxicology- 4 lecture unit · Clinical Correlations: Poisoned Patient- 2 lecture unit Year I Clinical MedicineDetroit · Earthworks · Greening of Detroit Street Medicine · Detroit Clean Up Clinical Education Year III Family

  14. West Virginia University 1 School of Medicine

    E-Print Network [OSTI]

    Mohaghegh, Shahab

    West Virginia University 1 School of Medicine Other Content Degrees Offered · M.D., Doctor of Medicine · M.D. /Ph.D., Joint Doctor of Medicine and Doctor of Philosophy · Ph.D., in Biochemistry of Physical Therapy · Ph.D., Pharmaceutical and Pharmacological Sciences · M.D./M.P.H., Doctor of Medicine

  15. West Virginia University 1 School of Medicine

    E-Print Network [OSTI]

    Mohaghegh, Shahab

    West Virginia University 1 School of Medicine Degrees Offered · M.D., Doctor of Medicine · M.D. /Ph.D., Joint Doctor of Medicine and Doctor of Philosophy · Ph.D. in Biochemistry and Molecular Biology · Ph.D., Pharmaceutical and Pharmacological Sciences · M.D. /M.P.H., Doctor of Medicine and Master of Public Health · Ph

  16. The Ohio State University College of Medicine

    E-Print Network [OSTI]

    Clark, Bunny

    The Ohio State University College of Medicine Approved by Arts and Sciences Integrative Approaches, and possibilities of integrating Complementary and Alternative Medicine (CAM), into traditional western approaches of Medicine U 5 (a GEC under Culture and Ideas) and ALLIED MED 607: The Role of Integrative Medicine

  17. Full Program | U.S. DOE Office of Science (SC)

    Office of Science (SC) Website

    Welch .pdf file (3.2MB) , Professor of Radiology, Washington University School of Medicine 11:30 a.m. Importance and Role of Isotopes to the Department of Homeland Security...

  18. "ONE WORLD, ONE HEALTH, ONE MEDICINE" While there are many species, there is only ONE MEDICINE....

    E-Print Network [OSTI]

    Kay, Mark A.

    "ONE WORLD, ONE HEALTH, ONE MEDICINE" While there are many species, there is only ONE MEDICINE.... The concept of "One Medicine" embodies the view that human and veterinary medicine are dependent Medicine" is credited to Dr. Calvin Schwabe (1927­2006) , a veterinary epidemiologist and parasitologist

  19. The future of infrastructure security : a workshop held at Sandia National Laboratories.

    SciTech Connect (OSTI)

    Garcia, Pablo; Turnley, Jessica Glicken; Parrott, Lori K.

    2013-05-01

    Sandia National Laboratories hosted a workshop on the future of infrastructure security on February 27-28, 2013, in Albuquerque, NM. The 17 participants came from backgrounds as diverse as federal policy, the insurance industry, infrastructure management, and technology development. The purpose of the workshop was to surface key issues, identify directions forward, and lay groundwork for cross-sectoral and cross-disciplinary collaborations. The workshop addressed issues such as the problem space (what is included ininfrastructure' problems?), the general types of threats to infrastructure (such as acute or chronic, system-inherent or exogenously imposed) and definitions ofsecure and resilient' infrastructures. The workshop concluded with a consideration of stakeholders and players in the infrastructure world, and identification of specific activities that could be undertaken by the Department of Homeland Security (DHS) and other players.

  20. University of Toledo College of Medicine Department of Public Health & Preventive Medicine

    E-Print Network [OSTI]

    Azad, Abdul-Majeed

    1 University of Toledo College of Medicine Department of Public Health & Preventive Medicine Master have been exempted by the Program Director at the Department of Public Health & Preventive Medicine

  1. Teaching Humanities in Medicine: The University of Massachusetts Family Medicine Residency Program Experience

    E-Print Network [OSTI]

    Silk, Hugh; Shields, Sara

    2012-01-01

    Charon R. Narrative and medicine. N Eng J Med 2004;350:862-California, Irvine, College of Medicine. Acad Med. 2003;78:University Faculty of Medicine, Nova Scotia, Canada, 1992–

  2. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  3. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  4. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  5. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN Ā­ Computer Systems Security Ā· What is computer systems security? Ā­ The protection of all aspects of a computer system from unauthorized use Ā· Why is it important is critical October 7, 2009 GAANN Ā­ Computer Systems Security 1 #12;GAANN - Computer Systems Security

  6. Federated Cloud Security Architecture for Secure and Agile Clouds

    E-Print Network [OSTI]

    Xu, Shouhuai

    Federated Cloud Security Architecture for Secure and Agile Clouds Weiliang Luo, Li Xu, Zhenxin Zhan. This chapter introduces the novel federated cloud security architecture that includes proactive cloud defense technologies for secure and agile cloud development. The federated security architecture consists of a set

  7. Where computer security meets national security1 Helen Nissenbaum

    E-Print Network [OSTI]

    Nissenbaum, Helen

    of International Relations. Key words: cyber-security, computer security, securitization Introduction OverWhere computer security meets national security1 Helen Nissenbaum Department of Culture conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile

  8. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu, Ram Krishnan and Gregory B. White Institute for Cyber Security University of Texas at San Antonio #12;Secure Information ­ Security mechanisms such as authentication, cryptography, trusted hardware, etc. #12;Community Cyber

  9. Implementing Advances in Transport Security Technologies | Department...

    Office of Environmental Management (EM)

    Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies More...

  10. Cyber Security & Smart Grid 

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01

    and interoperability ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Vulnerabilities In The Legacy Power Grid ? SCADA Security ? Supervisory Control and Data Acquisition (SCADA) systems are used extensively to control and monitor the national... & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart Grid Networks...

  11. Undergraduate study 2016 www.nottingham.ac.uk/medicine

    E-Print Network [OSTI]

    Qu, Rong

    Medicine Undergraduate study 2016 www.nottingham.ac.uk/medicine For general undergraduate enquiries: www.nottingham.ac.uk/faqs #12;21 School of Medicine www.nottingham.ac.uk/medicine School of Medicine www.nottingham.ac.uk/medicine Welcome to the School of Medicine You are about to embark

  12. Supervisory Industrial Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  13. Oil Security Metrics Model

    SciTech Connect (OSTI)

    Greene, David L.; Leiby, Paul N.

    2005-03-06

    A presentation to the IWG GPRA USDOE, March 6, 2005, Washington, DC. OSMM estimates oil security benefits of changes in the U.S. oil market.

  14. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  15. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  16. Natlonal Nuclear Security Admlnlstratlon

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Natlonal Nuclear Security Admlnlstratlon Washington, DC 20585 January 18, 2007 OFFICE OF THE ADMINISTRATOR MEMORANDUM FOR The Deputy Secretary FROM: SUBJECT: Linton F. Brooks...

  17. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Washington, DC 20585 MEMORANDUM FOR THE ADMINISTRATOR FROM: THEODORE D. SHERRY II 4 flA. * -. SUBJECT: REFERENCE: NATIONAL SECURITY ENTI's'E FIELD COUNCIL CHAIR ACTION:...

  18. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    30 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 25, 2012 Recognizing employee and retiree volunteer efforts LOS ALAMOS, NEW...

  19. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  20. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  1. Cloud Security by Max Garvey

    E-Print Network [OSTI]

    Tolmach, Andrew

    Cloud Security Survey by Max Garvey #12;Cloudy Cloud is Cloudy What is the cloud? On Demand Service, performance SECaaS - Cloud hosted security measures Certifications - measurements for cloud security. #12;Cloud Questions If you have $0 security budget, could cloud be a security improvement? Who owns the data

  2. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    research programs. These programs, which include Cyber Security, Pervasive Information TechnologiesComputer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security

  3. 2014 Headquarters Facilities Master Security Plan- Chapter 1, Physical Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

  4. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Environmental Management (EM)

    be completed each year by all those who hold a security clearance; and the Security Termination Briefing, which is conducted when a person no longer requires a security clearance....

  5. AND NUCLEAR MEDICINE; DIAGNOSIS; DISEASES; GAMMA CAMERAS; GENETICS...

    Office of Scientific and Technical Information (OSTI)

    Converting energy to medical progress nuclear medicine NONE 62 RADIOLOGY AND NUCLEAR MEDICINE; DIAGNOSIS; DISEASES; GAMMA CAMERAS; GENETICS; NUCLEAR MEDICINE; PATIENTS; RADIATION...

  6. Occupational Medicine Implications of Engineered Nanoscale Particulate Matter

    E-Print Network [OSTI]

    Kelly, Richard J.

    2008-01-01

    New England Journal of Medicine 1993, 329, 7. S. v. Klot; A.34 of 42 Occupational Medicine Implications of Engineered35 of 42 Occupational Medicine Implications of Engineered

  7. Simulation in Medical School Education: Review for Emergency Medicine

    E-Print Network [OSTI]

    Chakravarthy, Bharath; ter Haar, Elizabeth; Bhat, Srinidhi Subraya; McCoy, Christopher Erik; Denmark, T. Kent; Lotfipour, Shahram

    2011-01-01

    training within emergency medicine residency programs, 2003–Western Journal of Emergency Medicine Volume XII, NO . 4 :train and evaluate emergency medicine residents. Acad Emerg

  8. The Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure Computing Corporation

    E-Print Network [OSTI]

    Andersen, Dave

    Computing Corporation Stephen Smalley, Peter Loscocco National Security Agency Mike Hibler, David AndersenThe Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure be flexible in their support for security policies, providing sufficient mechanisms for supporting the wide

  9. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not findGeoscience/EnvironmentGlobal Security Global Security We

  10. College of Medicine BCH Biochemistry

    E-Print Network [OSTI]

    MacAdam, Keith

    College of Medicine BCH Biochemistry KEY: # = new course * = course changed = course dropped University of Kentucky 2013-2014 Undergraduate Bulletin 1 BCH 395 INDEPENDENT WORK IN BIOCHEMISTRY. (3 FUNDAMENTALS OF BIOCHEMISTRY. (3) Descriptive chemistry of amino acids and proteins, carbohydrates, lipids

  11. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Exchange of Information Develop security tools that: · Integrate information from different communication channels · Provide flexible reporting (reports adapted to the recipient) · Communicate security information Security practitioners perform many activities: · Information exchanged in different formats across

  12. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Cases Security Cases RSS June 19, 2015 PSH-15-0011 - In the Matter of Personnel Security Hearing On June 19, 2015, an OHA Administrative Judge (AJ) issued a decision in...

  13. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    Computer Security Incident Handling Guide Recommendationsof the National Institute of Standards Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD Tom Millar United States Computer Emergency Readiness Team National Cyber Security Division

  14. Security Policy: Radio Network Controller

    E-Print Network [OSTI]

    Security Policy: Radio Network Controller Encryption Module Controller (RNC EMC) Cryptographic, 2007 Security Policy: RNC EMC Page 1 of 22 #12;Security Policy: RNC EMC Page 2 of 22 #12;Table...........................................................14 7. IDENTIFICATION AND AUTHENTICATION POLICY

  15. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  16. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  17. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Ensuring the Safe Containment

  18. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear

  19. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  20. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1.

  1. CIOs Uncensored: Security Smarts.

    SciTech Connect (OSTI)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNL’s “defense in depth” approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability – and your last line of defense.

  2. Engineering secure software 

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01

    -the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar...

  3. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  4. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W the computational, physics

  5. Correlation of the Emergency Medicine Resident In-Service Examination with the American Osteopathic Board of Emergency Medicine Part I

    E-Print Network [OSTI]

    Levy, David; Dvorkin, Ronald; Schwartz, Adam; Zimmerman, Steven; Li, Feiming

    2014-01-01

    Journal of Emergency Medicine Volume XV, NO . 1 : FebruaryAmerican Board of Physical Medicine and Rehabilitation PartAmerican Board of Internal Medicine certifying examination.

  6. Los Alamos Shows Airport Security Technology at Work

    ScienceCinema (OSTI)

    Espy, Michelle; Schultz, Larry; Hunter, James

    2014-06-24

    Los Alamos scientists have advanced a Magnetic Resonance Imaging (MRI) technology that may provide a breakthrough for screening liquids at airport security. They've added low-power X-ray data to the mix, and as a result have unlocked a new detection technology. Funded in part by the Department of Homeland Security's Science and Technology Directorate, the new system is named MagRay. The goal is to quickly and accurately distinguish between liquids that visually appear identical. For example, what appears to be a bottle of white wine could potentially be nitromethane, a liquid that could be used to make an explosive. Both are clear liquids, one would be perfectly safe on a commercial aircraft, the other would be strictly prohibited. How to tell them apart quickly without error at an airport security area is the focus of Michelle Espy, Larry Schultz and their team. In this video, Espy and the MagRay team explain how the new technology works, how they've developed an easy operator interface, and what the next steps might be in transitioning this technology to the private sector.

  7. THE INSTITUTES AT NORTHWESTERN MEDICINE AT NORTHWESTERN

    E-Print Network [OSTI]

    Chisholm, Rex L.

    with evidence-based complementary and alternative medicine practices from around the world to deliver care, acupuncture, naturopathic medicine, nutrition counseling, health psychology, bodywork, energy with an article profiling its accomplishments. In 2008, we led Northwestern's acceptance into the Consortium

  8. THE INSTITUTES AT NORTHWESTERN MEDICINE FOR TRANSLATIONAL

    E-Print Network [OSTI]

    Chisholm, Rex L.

    neurodegenerative diseases, what are their genetic implications, and how can they be treated? · What degeneration (CBD), Parkinson's disease (PD), Lewy body dementia (LBD), motor neuron disease (MND MEDICINE COGNITIVE NEUROLOGY AND ALZHEIMER'S DISEASE CENTER #12;THE INSTITUTES AT NORTHWESTERN MEDICINE

  9. THE CANCER INSTITUTES AT NORTHWESTERN MEDICINE

    E-Print Network [OSTI]

    Chisholm, Rex L.

    THE CANCER INSTITUTES AT NORTHWESTERN MEDICINE INTERNATIONAL RELATIONS PROGRAM THE INSTITUTES AT NORTHWESTERN MEDICINE #12;To maximize Northwestern's scientific contributions to the field of cancer Comprehensive Cancer Center of Northwestern University are partnering to create robust research collaborations

  10. UNIVERSITY OF CONNECTICUT SCHOOL OF MEDICINE

    E-Print Network [OSTI]

    UNIVERSITY OF CONNECTICUT SCHOOL OF MEDICINE SCHOOL OF DENTAL MEDICINE Summer Fellowship Program Application The University of Connecticut Health Center Office of Student Affairs Farmington Connecticut 06030-1905 Deadline for application: March 15th #12;College Undergraduate

  11. University of Connecticut School of Medicine

    E-Print Network [OSTI]

    Oliver, Douglas L.

    University of Connecticut School of Medicine Department of Psychiatry University of Connecticut Health Center, John Dempsey Hospital, Farmington CT University of Connecticut School of Medicine, Department of Psychiatry, UHP Outpatient Clinic, West Hartford CT University of Connecticut School

  12. SIGN HERE : informed consent in personalized medicine

    E-Print Network [OSTI]

    Ahmed, Abdul-Kareem H

    2013-01-01

    The next era of medicine will be one of personalization, scientists and physicians promise. Personalized medicine is a refined clinical approach in which clinicians will utilize your genomic information to help you prevent ...

  13. Regenerative Medicine: Learning from Past Examples

    E-Print Network [OSTI]

    Couto, Daniela S.

    Regenerative medicine products have characteristically shown great therapeutic potential, but limited market success. Learning from the past attempts at capturing value is critical for new and emerging regenerative medicine ...

  14. COLLEGE OF MEDICINE University of Central Florida

    E-Print Network [OSTI]

    Wu, Shin-Tson

    COLLEGE OF MEDICINE University of Central Florida POLICY ON STUDENT SURVEYS The purpose will not be used for publication outside the College of Medicine. Procedures: 1. Research Surveys: a. May

  15. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  16. RADIOCHEMISTRY, AND NUCLEAR CHEMISTRY; NUCLEAR MEDICINE; HISTORICAL

    Office of Scientific and Technical Information (OSTI)

    The early days Richards, P. 38 RADIATION CHEMISTRY, RADIOCHEMISTRY, AND NUCLEAR CHEMISTRY; NUCLEAR MEDICINE; HISTORICAL ASPECTS; TECHNETIUM 99; COLLOIDS; MOLYBDENUM...

  17. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  18. Secure Virtualization with Formal Methods

    E-Print Network [OSTI]

    Sturton, Cynthia

    2013-01-01

    cloud computing, virtualization software has a variety of security-cloud computing, researchers have proposed using system virtualization software as a platform to increase the security

  19. Program Areas | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program Areas image Oak Ridge National Laboratory (ORNL) has a robust...

  20. Office of Secure Transportation Activities

    Office of Environmental Management (EM)

    6th, 2012 WIPP Knoxville, TN OFFICE OF SECURE TRANSPORTATION Agency Integration Briefing Our Mission To provide safe and secure ground and air transportation of nuclear weapons,...

  1. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Activities Transportation Security Rulemaking Activities at the U.S. Nuclear Regulatory Commission NRC Transportation Security (Part 73 SNF Update and Part 37 Category 1...

  2. National Nuclear Security Administration Overview

    Office of Environmental Management (EM)

    May 11, 2011 Ahmad Al-Daouk Manager, National Security Department (NSD) National Nuclear Security Administration (NNSA) Service Center - Albuquerque, NM May 11, 2011 - Page 2...

  3. Methodological Review Data integration and genomic medicine

    E-Print Network [OSTI]

    Petropoulos, Michalis

    Methodological Review Data integration and genomic medicine Brenton Louie a,*, Peter Mork b 2006 Abstract Genomic medicine aims to revolutionize health care by applying our growing understanding the opportunities of genomic medicine as well as identify the informatics challenges in this domain. We also review

  4. Faculty of Medicine and Health Sciences

    E-Print Network [OSTI]

    St Andrews, University of

    Faculty of Medicine and Health Sciences Postgraduate Courses 2015-16 Entry #12;Contents 01 Welcome to the Faculty of Medicine and Health Sciences 02 Why Study With Us? 04 Research Degrees 06 Norwich Research Park;01 Welcome to the Faculty of Medicine and Health Sciences This brochure describes the broad range

  5. Veterinary Medicine and Science Undergraduate study 2016

    E-Print Network [OSTI]

    Qu, Rong

    Veterinary Medicine and Science Undergraduate study 2016 www.nottingham.ac.uk/vet For general-enquiries@nottingham.ac.uk w: www.nottingham.ac.uk/faqs #12;Welcome to the School of Veterinary Medicine and Science Contents 3-year course. I strongly encourage you to consider applying to study veterinary medicine and surgery

  6. UNIVERSITY OF SOUTH FLORIDA COLLEGE OF MEDICINE

    E-Print Network [OSTI]

    Meyers, Steven D.

    UNIVERSITY OF SOUTH FLORIDA COLLEGE OF MEDICINE STRATEGIC PLAN 2010/11 ­ 2014/15 #12;OUR STRATEGIC of Medicine (COM) has accepted that challenge. The College has embarked on an aggressive strategic plan in a collaborative model across all three missions for medicine, nursing, public health, physical therapy, athletic

  7. Integrating Medicine and Science From AAASFrom AAAS

    E-Print Network [OSTI]

    Napp, Nils

    Integrating Medicine and Science From AAASFrom AAAS Publisher of Science Magazineg Chief Scientific Advisor Elias Zerhouni, MD Editor Katrina L. Kelner, PhD #12;Science Translational MedicineScience Translational Medicine · Authoritative commentariesAuthoritative commentaries · Cutting-edge original research W

  8. Personalized Medicine Is Not Just for People

    E-Print Network [OSTI]

    Napp, Nils

    Personalized Medicine Is Not Just for People: Genomics in Companion and Food Animals Kristine Alpi, MLS, MPH, AHIP William R. Kenan, Jr. Library of Veterinary Medicine North Carolina State University (L) · Personalized Veterinary Medicine · Out of Rockville and Laurel. FDA-CVM initiatives span individualized

  9. The Ohio State University College of Medicine

    E-Print Network [OSTI]

    Clark, Bunny

    The Ohio State University College of Medicine Integrative Approaches to Health and Wellness Minor 43210 (614) 292-1706 http://medicine.osu.edu/hrsFaculty contact: Crystal Dunlevy, EdD, Crystal, and possibilities of integrating Complementary and Alternative Medicine (CAM) into traditional western approaches

  10. International Graduate School in Molecular Medicine Ulm

    E-Print Network [OSTI]

    Pfeifer, Holger

    International Graduate School in Molecular Medicine Ulm IGradU Funded by the Excellence Initiative. External funding in the field of Molecular Medicine totals an annual budget of approximately 45 million Graduate School in Molecular Medicine Ulm founded in February 2006 and funded by the Excellence Initiative

  11. Book Reviews Computational Linguistics in Medicine

    E-Print Network [OSTI]

    Book Reviews Computational Linguistics in Medicine Werner Schneider and A-L Sagvall Hein, Editors of an international conference on Computational Linguistics in Medicine and the sub- stantive results reported in many, medicine relies for its daily operations on the ability of its practitioners to draw upon information

  12. The Ohio State University College of Medicine

    E-Print Network [OSTI]

    Clark, Bunny

    The Ohio State University College of Medicine Bioethics Minor Center for Bioethics and Medical.bolt@osumc.edu) www.medicine.osu.edu/orgs/bioethics The Bioethics Minor is designed to support and further undergraduate students' learning about the ethical issues surrounding advances in biology and medicine

  13. Research Committee February 2011 Faculty of Medicine

    E-Print Network [OSTI]

    Research Committee February 2011 Faculty of Medicine 1 Research Committee (RC) - Faculty of Medicine Bylaws A. RC Composition 1. The Dean or her/his representative as Chairperson 2. The Associate subjects or experimental animals to the Faculty of Medicine Review Board (IRB/ACC ) for review and approval

  14. Faculty of Medicine, Tbingen Shaping the future

    E-Print Network [OSTI]

    Ould Ahmedou, Mohameden

    Faculty of Medicine, Tübingen Shaping the future around people Healthcare Research and Medical in the fields of clinical medicine and biomedical basic research, for example milestones such as vaccines. The Faculty of Medicine, Eberhard Karls University of Tübingen, contributed materially to these achievements

  15. www.medicine.usask.ca College of Medicine Accreditation Decision: Summary Version, October 2015

    E-Print Network [OSTI]

    Peak, Derek

    www.medicine.usask.ca College of Medicine Accreditation Decision: Summary Version, October 2015 documents are available at medicine.usask.ca Effective October 16, 2015, the Undergraduate Medical Education Program at the University of Saskatchewan's College of Medicine is returned to full accreditation

  16. Fall 2015 Translational Medicine Program: Translational Medicine PhD Program Place: TIGP Building, Auditorium 207

    E-Print Network [OSTI]

    Chen, Sheng-Wei

    Fall 2015 Translational Medicine Program: Translational Medicine PhD Program Place: TIGP Building 09/16 09:30-10:50 Pharmacogenomics & translational medicine 11:00-12:20 Drug development and translational medicine Translational research 2 09/23 09:30-10:50 Glycomedicine and human diseases 11

  17. 67School of Chinese Medicine Master of Pharmaceutical Sciences in Chinese Medicine

    E-Print Network [OSTI]

    Cheung, Yiu-ming

    67School of Chinese Medicine Master of Pharmaceutical Sciences in Chinese Medicine (MPharm) (One medicine. It aims at upgrading students' ability to comprehend and master the theoretical knowledge of CM assurance, drug safety assessment, production management and trading of Chinese medicines and/or healthcare

  18. Introduction The School of Medicine/Graduate School of Medicine aims

    E-Print Network [OSTI]

    Banbara, Mutsunori

    30 Introduction Guide Entrance Life Career Inquiries Medicine The School of Medicine/Graduate School of Medicine aims to establish Japan's, and eventually, the world's best center of excellence, clinical medicine, and medical administration. We have adopted many new systems typified through

  19. UCD School of Veterinary Medicine Strategic Plan 2012-2017 School of Veterinary Medicine

    E-Print Network [OSTI]

    California at Davis, University of

    UCD School of Veterinary Medicine ­ Strategic Plan 2012-2017 - 0 - School of Veterinary Medicine University of California, Davis 2012-2017 Strategic Plan #12;UCD School of Veterinary Medicine ­ Strategic School of Veterinary Medicine ­ Strategic Plan 2012-2017 - 2 - The Strategic Planning Process · Planning

  20. 1Annual Report AY 2013 Department of Medicine Table of Contents Department of Medicine

    E-Print Network [OSTI]

    Zapletal, Jindrich

    #12;1Annual Report AY 2013 Department of Medicine Table of Contents Department of Medicine TABLE. Internal Medicine Residency Training Program b. Subspecialty Fellowship Programs c. Student Education and Metabolism c. Gastroenterology d. General Internal Medicine e. Hematology and Medical Oncology f. Infectious

  1. www.medicine.usask.ca College of Medicine Accreditation Decision: Summary Version, April 2015

    E-Print Network [OSTI]

    Peak, Derek

    www.medicine.usask.ca College of Medicine Accreditation Decision: Summary Version, April 2015 and follow-up correspondence received in 2014. The full documents are available at medicine.usask.ca Background The Undergraduate Medical Education Program at the U of S College of Medicine was placed

  2. 1 School of Medicine and Health Sciences SCHOOL OF MEDICINE AND

    E-Print Network [OSTI]

    Vertes, Akos

    1 School of Medicine and Health Sciences SCHOOL OF MEDICINE AND HEALTH SCIENCES Dean J. Akman.M. Alexander The School of Medicine and Health Sciences offers a broad range of undergraduate and graduate programs in medicine and health sciences. GW Health Sciences (http:// smhs

  3. south carolina medicineUniversity of South Carolina School of Medicine

    E-Print Network [OSTI]

    Griggs, Jerrold R.

    south carolina medicineUniversity of South Carolina School of Medicine SUMMER 2015 Dr. John Eberth to identify a dean to lead the University of South Carolina School of Medicine. The committee tapped South challenging early years. In this issue of South Carolina Medicine magazine, we pay tribute to Dean Macdonald

  4. Merle Waxman Director of the Office for Women in Medicine, Yale School of Medicine

    E-Print Network [OSTI]

    Merle Waxman Director of the Office for Women in Medicine, Yale School of Medicine A listening ear ANALYSIS: EXCLUSIVE 26 INTERNATIONAL INNOVATION #12;At Yale School of Medicine, Merle Waxman is working. As Ombudsperson and Director of the Office for Women in Medicine, she is perfectly positioned to identify

  5. www.medicine.usask.ca/renewal College of Medicine Renewal Implementation Plan: Summary Version

    E-Print Network [OSTI]

    Peak, Derek

    www.medicine.usask.ca/renewal College of Medicine Renewal Implementation Plan: Summary Version This is a brief overview of the College of Medicine renewal process and The Way Forward (implementation plan). Complete details and the full plan are available at medicine.usask.ca/renewal Renewal Recap In 2012

  6. University of Connecticut Health Center School of Dental Medicine

    E-Print Network [OSTI]

    Oliver, Douglas L.

    University of Connecticut Health Center School of Dental Medicine Application for Admission of Connecticut School of Dental Medicine

  7. On Building Secure SCADA Systems using Security Eduardo B. Fernandez

    E-Print Network [OSTI]

    Wu, Jie

    On Building Secure SCADA Systems using Security Patterns Eduardo B. Fernandez Dept. of Comp. Sci, also known as the supervisory, control, and data acquisition (SCADA) system. On the other hand systems. This paper aims to propose methods to build a secure SCADA system using security patterns

  8. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  9. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  10. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu Dept. of Computer Science Institute for Cyber Security University of Texas at San Antonio Email: ravi.sandhu@utsa.edu Ram Krishnan Dept. of Electrical and Computer Engineering Institute for Cyber Security University

  11. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio June 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  12. 1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE

    E-Print Network [OSTI]

    Upadhyaya, Shambhu

    , there are 100+ centers ­ Based on curriculum mapping to CNSS (committee of National Security Standards) 4011 at Google (2010) · Threats to national security ­ Insider attacks ­ Examples: Bradley Manning leaked1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE Professor S. Upadhyaya Department

  13. A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY

    E-Print Network [OSTI]

    Sussex, University of

    EN A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY Brussels, 12 December 2003 #12;1 EN's complex problems on its own Introduction Europe has never been so prosperous, so secure nor so free problems on its own. Europe still faces security threats and challenges. The outbreak of conflict

  14. SecuritySmart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity SecuritySecuritySmart

  15. 2014 Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

  16. 2014 Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

  17. BROADER National Security Missions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Metal Chips (U) Uranium Trioxide (UO 3 ) UO 2 (NO 3 ) 2 Ur anyl Nitrate Ammonium Uranyl Carbonate (NH 4 ) 2 UO 2 (CO 3 ) 4 DEVELOP NEW NATIONAL SECURITY MISSIONS Y-12 has...

  18. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  19. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  20. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  1. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  2. Microsoft PowerPoint - 5_SCOTT_SLAVENS_Power Point PSA presentation...

    National Nuclear Security Administration (NNSA)

    Homeland Security Investigations SSA Greg Slavens CPIC Colorado Springs Counter-Proliferation Investigations 2 Homeland Security Investigations HSI Jurisdictional Authorities ...

  3. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  4. Policy Paper 35: Energy and Security in Northeast Asia: Fueling Security

    E-Print Network [OSTI]

    Calder, Kent; Fesharaki, Fereidun; Shirk, Susan L.; Stankiewicz, Michael

    1998-01-01

    Deese (editors). Energy and Security. 3. Fereidun Fesharaki,Energy and Security in Northeast Asia: Fueling Security Anrising energy demand. Energy and Security in Northeast Asia

  5. Secure Quantum Key Distribution

    E-Print Network [OSTI]

    Hoi-Kwong Lo; Marcos Curty; Kiyoshi Tamaki

    2015-05-20

    Secure communication plays a crucial role in the Internet Age. Quantum mechanics may revolutionise cryptography as we know it today. In this Review Article, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After a brief introduction to recent experimental progress and challenges, we survey the latest developments in quantum hacking and counter-measures against it.

  6. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  7. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  8. Security systems engineering overview

    SciTech Connect (OSTI)

    Steele, B.J.

    1996-12-31

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

  9. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ā?? tunnelsā?¯, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  10. Rationale and Development of a Security Assurance Index with Application toward the Development of a World Risk Index

    SciTech Connect (OSTI)

    M. M. Plum; G. A. Beitel, PhD

    2006-06-01

    Assurance categories were previously developed to support the Department of Homeland Security’s efforts in the mitigation of Cyber Control System events. Defined according to the risk of life and economic loss, the minimum range is designated by policy, whereas the maximum limit seems to be constrained only by limits and interdependencies of the event. Use of this life / assets scale has proven to be helpful in managing risk due to the scale's ease of use, communication, and understanding. Suggestions have been made that this scale could be applied to all events of terror, disaster, and calamity of an international scale, with equally good results. This paper presents the history of some existing scales of disaster and assurance, the rationale behind the development of the original Security Assurance Index, and our proposed scale of disaster and calamity as a World Risk Index.

  11. Transportation Secure Data Center: Real-World Data for Transportation Planning and Land Use Analysis (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2013-01-01

    The National Renewable Energy Laboratory (NREL) and the U.S. Department of Transportation (DOT) have launched the free, web-based Transportation Secure Data Center (TSDC). The TSDC (www.nrel.gov/tsdc) preserves respondent anonymity while making vital transportation data available to a broad group of users through secure, online access. The TSDC database provides free-of-charge web-based access to valuable transportation data that can be used for: Transit planning, Travel demand modeling, Homeland Security evacuation planning, Alternative fuel station planning, and Validating transportation data from other sources. The TSDC's two levels of access make composite data available with simple online registration, and allow researchers to use detailed spatial data after completing a straight forward application process.

  12. Reassessing Residential Design in Hawaii: Design Construction Building Analysis and Publishing Design Guidelines for a Passive-Design Model Home on Hawaiian Homeland 

    E-Print Network [OSTI]

    Meder, S.

    2006-01-01

    , University of Hawaii Sea Grant College Program Hawaii University of Hawaii School of Architecture ABSTRACT Hawaii is more reliant on fossil fuel for its electrical generation than any other state in the nation. Hawaii has the highest... Hawaii’s homes comfortable. This paper will describe a project where the State Department of Hawaii Homelands, the University of Hawaii School of Architecture, the Committee on the Environment for the Honolulu Chapter of American Institute...

  13. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  14. SC e-journals, Medicine

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield MunicipalTechnical Report:Speeding accessby aLEDSpeeding FINAL2-4260Earth SciencesMedicine ACM

  15. Unconditionally Secure Quantum Signatures

    E-Print Network [OSTI]

    Ryan Amiri; Erika Andersson

    2015-08-08

    Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols - signatures based on the Rivest-Adleman-Shamir (RSA) algorithm, the digital signature algorithm (DSA), and the elliptic curve digital signature algorithm (ECDSA) - are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally secure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  16. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopment Top Scientific Impact Since its SearchSecurity

  17. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345 UnlimitedSecure

  18. national security campus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReporteeo | National Nuclear Securityhr | Nationalnational security

  19. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorking With U.S. Coal StocksSuppliers Tag: Supplierssecurity Tag: security

  20. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLosThe 26thI D- 6 0 4 2 r m m m m port m fm f mphysical security |

  1. Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

    Office of Environmental Management (EM)

    4, Cyber Security Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2015 2015 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security...

  2. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  3. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  4. Securities Class Actions and Bankrupt Companies

    E-Print Network [OSTI]

    Park, James J.

    2014-01-01

    the utility of securities class actions. Certainly, contextthe merit of securities class actions. UCLA | SCHOOL OF LAWof James J. Park, Securities Class Actions and Bankrupt

  5. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  6. Review of digital image security in Dermatology

    E-Print Network [OSTI]

    Nielson, Colton; West, Cameron; Shimizu, Ikue

    2015-01-01

    encrypted communications, cloud security breaches, and phonebreaches in security demonstrate, such cloud storage ofand security rules 22 Audits of CSP data center operations and cloud

  7. Integrated Security System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems architecture Integrated...

  8. Data security on the national fusion grid

    E-Print Network [OSTI]

    Burruss, Justine R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  9. Security on the US Fusion Grid

    E-Print Network [OSTI]

    Burruss, Justin R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  10. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    CERT. (2010, Dec) Technical Cyber Security Alerts. [Online].a broad overview of cyber security incidents in the laststrategic war and viable cyber security solutions should be

  11. Mathematical and Statistical Opportunities in Cyber Security

    E-Print Network [OSTI]

    Meza, Juan

    2009-01-01

    development approach to cyber security. Report submitted to2007. Committee on Improving Cyber- security Research in theOpportunities in Cyber Security ? Juan Meza † Scott

  12. Security and United States Immigration Policy

    E-Print Network [OSTI]

    Totten, Robbie James

    2012-01-01

    2009 [1981]. American National Security, 6th ed. Baltimore,1977. Economic Issues and National Security. Lawrence, KS:Immigration and National Security. Westport, CT: Praeger

  13. Office of Security Assessments | Department of Energy

    Energy Savers [EERE]

    Security Assessments Office of Security Assessments MISSION The Office of Security Assessments is responsible for the independent evaluation of the effectiveness of safeguards and...

  14. Open Access Planning and Implementation in the College of Medicine and Veterinary Medicine 

    E-Print Network [OSTI]

    Krzak, Anna

    2015-08-05

    Presentation given by Anna Krzak about the implementation of Open Access plans in the University of Edinburgh's College of Medicine and Veterinary Medicine at the LOCH workshop at the University of Edinburgh on August 5th 2015....

  15. Home Biology Medicine Technology Products News Definition Dictionary Movies Links Whole Site Goog

    E-Print Network [OSTI]

    Chiao, Jung-Chih

    Home Biology Medicine Technology Products News Definition Dictionary Movies Links Search RSS Whole Site Goog Navigation Links Biology News Medicine News Biology Products Medicine Products Biology Definition Medicine Definition Biology Technology Medicine Technology Biology Dictionary Medicine Dictionary

  16. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Broader source: Energy.gov (indexed) [DOE]

    A vulnerability was reported in Cisco Secure Access Control System. A remote user can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4,...

  17. AUDIT REPORT Security at the Nevada National Security Site

    Broader source: Energy.gov (indexed) [DOE]

    Security at the Nevada National Security Site OAS-L-15-06 May 2015 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections . Department of Energy...

  18. Security Requirements Engineering Support for Security-Annotated Business Processes

    E-Print Network [OSTI]

    Security Requirements Engineering Support for Security-Annotated Business Processes Elda Paja1 that business analysts are not secu- rity experts and assume that this will be bolted on later. Fortunately

  19. Technical Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-09-02

    This order implements the Department of Energy (DOE) Technical Security Program (TSP). This program represents the convergence of two distinct disciplines: Counterintelligence (CI) and Security Countermeasures. The elements of the TSP are driven by national level, interagency programs that are codified in various laws, Executive Orders, national polices and directives. Supersedes DOE M 470.4-4A Chg 1, dated 10-12-2010, Section D – Technical Surveillance Countermeasures (Official Use Only) and classified annex (Secret); and DOE M 205.1-3 (Official Use Only) and Part II (Secret), dated 4-17-2006.

  20. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD |UpdatedSecurity|National

  1. Global Material Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia NationalSecurityNuclear SecurityOfficesPrograms

  2. The Role of WestJEM in Promoting International Emergency Medicine

    E-Print Network [OSTI]

    Langdorf, Mark I.; Della Corte, Francesco; Petrino, Roberta

    2009-01-01

    2009 Western Journal of Emergency Medicine Countriesof European Master in Disaster Medicine students across thethe Mediterranean Emergency Medicine Congress. REFERENCES

  3. UC Davis School of Medicine Match Results -2013

    E-Print Network [OSTI]

    Leistikow, Bruce N.

    Medicine SACRAMENTO CA UC Davis Med Ctr-CA Emergency Medicine SACRAMENTO CA UC Davis Med Ctr-CA Emergency Medicine SACRAMENTO CA UC San Francisco-CA Emergency Medicine SAN FRANCISCO CA Sutter Health-CA Family Med/Sacramento SACRAMENTO CA Swedish Medical Center-WA Family Med/SeaMar SEATTLE WA Arrowhead Reg Med Ctr-CA Family Medicine

  4. UC Davis School of Medicine Match Results -2008

    E-Print Network [OSTI]

    Leistikow, Bruce N.

    -CA Emergency Medicine SACRAMENTO CA UC Davis Med Ctr-CA Emergency Medicine SACRAMENTO CA Sutter Health-CA Family Med/Sacramento SACRAMENTO CA Contra Costa Reg Med Ctr-CA Family Medicine MARTINEZ CA Kaiser Perm-Woodland Hills-CA Family Medicine WOODLAND HILLS CA Methodist Hosp-Sacramento-CA Family Medicine SACRAMENTO CA

  5. Programme Specification Title of programme: MSc Genomic Medicine

    E-Print Network [OSTI]

    Huang, Xun

    1 Programme Specification Title of programme: MSc Genomic Medicine This specification provides Medicine Interim Exit awards Postgraduate Diploma in Genomic Medicine / Postgraduate Certificate in Genomic Medicine/ Postgraduate Certificate in the Principles of Genomic Medicine. FHEQ level of final award 7 UCAS

  6. Help create a UNLV School of Medicine by

    E-Print Network [OSTI]

    Walker, Lawrence R.

    MEDICINE School of MEDICINE School of A FIRST- CLASS GIFT Help create a UNLV School of Medicine of Medicine demonstrates our community's commitment to the school and can enhance the accreditation process's School of Medicine will be one of the most important factors in the future success and reputation

  7. Secure Storage Architectures

    SciTech Connect (OSTI)

    Aderholdt, Ferrol; Caldwell, Blake A; Hicks, Susan Elaine; Koch, Scott M; Naughton, III, Thomas J; Pogge, James R; Scott, Stephen L; Shipman, Galen M; Sorrillo, Lawrence

    2015-01-01

    The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention on elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to help with this issue, which are a particular instances of the more general challenge of efficient host/guest IO that is the focus of interfaces like virtio. A collection of bridging technologies have been identified in Chapter 4, which can be helpful to overcome the limitations and challenges of supporting efficient storage for secure enclaves. The synthesis of native filesystem security mechanisms and bridging technologies led to an isolation-centric storage architecture that is proposed in Chapter 5, which leverages isolation mechanisms from different layers to facilitate secure storage for an enclave. Recommendations: The following highlights recommendations from the investigations done thus far. - The Lustre filesystem offers excellent performance but does not support some security related features, e.g., encryption, that are included in GPFS. If encryption is of paramount importance, then GPFS may be a more suitable choice. - There are several possible Lustre related enhancements that may provide functionality of use for secure-enclaves. However, since these features are not currently integrated, the use of Lustre as a secure storage system may require more direct involvement (support). (*The network that connects the storage subsystem and users, e.g., Lustre s LNET.) - The use of OpenStack with GPFS will be more streamlined than with Lustre, as there are available drivers for GPFS. - The Manilla project offers Filesystem as a Service for OpenStack and is worth further investigation. Manilla has some support for GPFS. - The proposed Lustre enhancement of Dynamic-LNET should be further investigated to provide more dynamic changes to the storage network which could be used to isolate hosts and their tenants. - The Linux namespaces offer a good solution for creating efficient restrictions to shared HPC filesystems. However, we still need to conduct a thorough round of storage/filesystem benchmarks. - Vendor products should be more closely reviewed, possibly to include evaluation of performance/protection of select products. (Note, we are investigation the opti

  8. SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011

    E-Print Network [OSTI]

    SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011 Choose brands and models of mobile devices that have the options referenced below. Use all available security options that your or sensitive university information in un-approved off-campus services, such as public cloud based services

  9. Wireless Security: Secure and Public Networks Villanova University

    E-Print Network [OSTI]

    36 Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science kory.kirk@villanova.edu www.korykirk.com/ Abstract Due to the increasing amount of wireless, train stations and cafes, there is a need for a wireless protocol that allows public access to secure

  10. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  11. NISTIR 7497 Security Architecture Design

    E-Print Network [OSTI]

    NISTIR 7497 Security Architecture Design Process for Health Information Exchanges (HIEs) Matthew Scholl Kevin Stine Kenneth Lin Daniel Steinberg #12;NISTIR 7497 Security Architecture Design Process Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899 Kenneth Lin

  12. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  13. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  14. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  15. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  16. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  17. Research Data Data Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    Research Data Data Security Survey Collection FAQs Q: I am not a UConn Health Center employee; can multiple projects that share common data? Yes. As long as the projects have common fields as you would in SurveyMonkey; data forms, e.g. Case Report Forms (CRF); or a combination of both. For any

  18. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  19. ARMY Energy Security Considerations

    E-Print Network [OSTI]

    energy waste in existing facilities; Increase energy efficiency in renovation and new constructionARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy · · · · FOREIGN OIL 2

  20. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  1. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  2. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    2011-01-01

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  3. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  4. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  5. Supporting Organizations | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the following three organizations: Measurement Science and Systems Engineering Division Nuclear Security and Isotope Technology Division Computational Sciences and Engineering...

  6. Protocol, Security Assistance- January 2007

    Broader source: Energy.gov [DOE]

    Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security.

  7. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  8. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  9. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Victoria, University of

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  10. Gray, W. D. (2003). Cognitive factors in homeland defense: The role of human factors in the novel intelligence from massive data (NIMD) project, Human Factors and Ergonomics Society (pp. 1017-1018). Santa Monica, CA: Human

    E-Print Network [OSTI]

    Gray, Wayne

    2003-01-01

    intelligence from massive data (NIMD) project, Human Factors and Ergonomics Society (pp. 1017-1018). Santa Monica, CA: Human Factors and Ergonomics Society. COGNITIVE FACTORS IN HOMELAND DEFENSE: THE ROLE

  11. John A. Burns School of Medicine (JABSOM) Doctor of Medicine Early Acceptance Program (DMEAP) for Entering Hawaii Resident Freshman

    E-Print Network [OSTI]

    John A. Burns School of Medicine (JABSOM) Doctor of Medicine Early Acceptance Program (DMEAP: _____________________________________ Date of Birth (mm/dd/yyyy): _________________ Describe why you want to pursue a career in medicine (Please type) Print Form #12;John A. Burns School of Medicine (JABSOM) Doctor of Medicine Early Acceptance

  12. SCHOOL OF MEDICINE YEAR III CURRICULUM GUIDE

    E-Print Network [OSTI]

    Finley Jr., Russell L.

    1 SCHOOL OF MEDICINE YEAR III CURRICULUM GUIDE WAYNE STATE UNIVERSITY SCHOOL OF MEDICINE 2015-2016 Clinical Curriculum Guide 2015 -2016 Revised 06/23/15 KS/SET #12;2 Table of Contents A MESSAGE FROM ....................................................................................... 11 Overview of the Clinical Curriculum ...................................................... 11

  13. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  14. January 2005 INTEGRATING IT SECURITY

    E-Print Network [OSTI]

    in a cost- effective manner. The implementation of IT security and capital planning practices withinJanuary 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS released Special Publication (SP) 800-65, Inte grating IT Security into the Capital Planning and Investment

  15. Guidelines on Security and Privacy

    E-Print Network [OSTI]

    Guidelines on Security and Privacy in Public Cloud Computing WayneJansen TimothyGrance Special Publication 800-144 #12;ii NIST Special Publication 800-144 Guidelines on Security and Privacy in Public Cloud and Ramaswamy Chandramouli, also from NIST, provided input on cloud security in early drafts. Thanks also go

  16. Secretary Richardson Accepts Recommendations for Improving Security...

    National Nuclear Security Administration (NNSA)

    Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

  17. Waste Isolation Pilot Plant Transportation Security

    Office of Environmental Management (EM)

    Senior Management Operational Management Implementation OOB NTP Transportation Logistics OSO Operations Management Organization Security WIPP Security Conditions * TRU Waste...

  18. National Nuclear Security Administration Overview | Department...

    Office of Environmental Management (EM)

    Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National Transportation...

  19. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  20. Independent Oversight Review, National Nuclear Security Administration...

    Office of Environmental Management (EM)

    Nuclear Security Administration Production Office - February 2014 Independent Oversight Review, National Nuclear Security Administration Production Office - February 2014 February...

  1. Enhancing Transportation Energy Security through Advanced Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transportation Energy Security through Advanced Combustion and Fuels Technologies Enhancing Transportation Energy Security through Advanced Combustion and Fuels Technologies 2005...

  2. Idaho National Laboratory Small Business Program Vision & Opportunity

    E-Print Network [OSTI]

    contributor in national and homeland security, alternate and renewable energy and science and technology Studies Nuclear Programs Energy Security Global Security Homeland Security National Defense A leader in critical infrastructure protection for security of energy supply and delivery National & Homeland

  3. Department of Anatomy & Neurobiology Boston University School of Medicine

    E-Print Network [OSTI]

    Spence, Harlan Ernest

    Department of Anatomy & Neurobiology Boston University School of Medicine Masters Program of Medicine Vesalius Program Master of Science in Anatomy & Neurobiology #12;Department of Anatomy & Neurobiology Boston University School of Medicine Masters Program Guidelines Revised Summer 2015 2

  4. Prfungs-und Studienordnung fr den weiterbildenden Masterstudiengang ,,Community Medicine

    E-Print Network [OSTI]

    Greifswald, Ernst-Moritz-Arndt-Universität

    1 Prüfungs- und Studienordnung für den weiterbildenden Masterstudiengang ,,Community Medicine für den weiterbildenden Masterstudiengang ,,Community Medicine and Epidemiologic Research Masterstudiengang ,,Community Medicine and Epidemiologic Research". Im Übrigen gilt für alle weiteren Studien- und

  5. Molly Carnes, MD, MS Professor, Depts of Medicine,

    E-Print Network [OSTI]

    Sheridan, Jennifer

    Molly Carnes, MD, MS Professor, Depts of Medicine, Psychiatry, and Industrial & Systems Engineering University of Wisconsin-Madison Careers in Academic Medicine:Careers in Academic Medicine: Evaluation at

  6. Generation to Generation: The Heart of Family Medicine

    E-Print Network [OSTI]

    Winter, Robin O

    2012-01-01

    A New Course in Age-based Medicine at the University Medicalthe practice of Family Medicine. The use of the movie, Up,American Board of Family Medicine Official Definition of

  7. Department of Anatomy & Neurobiology Boston University School of Medicine

    E-Print Network [OSTI]

    Spence, Harlan Ernest

    Department of Anatomy & Neurobiology Boston University School of Medicine Ph.D. Program Boston University School of Medicine Doctor of Philosophy in Anatomy & Neurobiology #12; Department of Anatomy & Neurobiology Boston University School of Medicine Ph.D. Program Guidelines Revised

  8. Targeted Needs Assessment of Off Service Residents in Emergency Medicine

    E-Print Network [OSTI]

    Kessler, Chad S; Tolia, Vaishal; Singh, Navpaul

    2010-01-01

    Journal of Emergency Medicine Volume XI, no . 5 : DecemberSan Francisco, school of medicine. Acad Med. 2007; 82(4):Council for Internal Medicine Task Force on the Internal

  9. Health, Medicine and Aging Concentration Concentrations in Sociology

    E-Print Network [OSTI]

    Turc, Catalin

    Sociology Health, Medicine and Aging Concentration Concentrations in Sociology Students majoring. The 4 concentrations are: · Crime, Law and Justice · Health, Medicine and Aging · Gender, Work and Family · Social Inequality Health, Medicine and Aging Concentration Undergraduate students majoring

  10. SECURITY TECHNIQUES Chris J Mitchell1

    E-Print Network [OSTI]

    Mitchell, Chris

    SECURITY TECHNIQUES Chris J Mitchell1 Introduction In this paper we consider the range of security security has been exerted. However, the techniques described are of general applicability by a security technique; in doing so we will distinguish between security features and security techniques (or

  11. Security and Privacy in the Networked World

    E-Print Network [OSTI]

    Sandhu, Ravi

    -World Impact! Perennial State of Cyber Security Micro-security Macro-security #12; What is the value of being Cyber Security Conundrum #12;Cyber security as reconciliation of tradeoffs Finding Goldilocks Holistic1 Security and Privacy in the Networked World Prof. Ravi Sandhu Executive Director and Endowed

  12. The unreasonable ineffectiveness of security engineering

    E-Print Network [OSTI]

    Pavlovic, Dusko

    of security does not apply only to software, as we also speak of bank security, national security, secureThe unreasonable ineffectiveness of security engineering: An overview Dusko Pavlovic Kestrel" [32]. After several decades of security research, we are tempted to ask the opposite question: Are we

  13. IY5512: Part 2 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    ; ­ introduction to security evaluation criteria. Information Security Group Agenda · Design principles · DesignIY5512: Part 2 1 Information Security Group IY5512 Computer Security Part 2: Design & evaluation · This part of the course covers: ­ fundamental security design principles; ­ a security design methodology

  14. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr.

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  15. Computational Medicine Marc Gissler Markus Becker Rdiger Schmedding

    E-Print Network [OSTI]

    Teschner, Matthias

    Computational Medicine Marc Gissler Markus Becker RĆ¼diger Schmedding Marc Metzger Matthias Teschner Medicine - Applications Marc Gissler Markus Becker RĆ¼diger Schmedding Marc Metzger Matthias Teschner

  16. 2015 DOE Annual Occupational Medicine Workshop & Webinar (OMWW...

    Broader source: Energy.gov (indexed) [DOE]

    DOE Annual Occupational Medicine Workshop & Webinar (OMWW) - March 16-17, 2015 The DOE Annual Occupational Medicine Workshop & Webinar (OMWW) is a valuable training opportunity...

  17. Health Citizenship: Essays in Social Medicine and Biomedical Politics

    E-Print Network [OSTI]

    Porter, Dorothy PhD

    2011-01-01

    in Social Medicine and Biomedical Politics Dorothy Porter,and practices that impact biomedical inquiry. General Editorin Social Medicine and Biomedical Politics Dorothy Porter

  18. COSC 472 Network Security Annie Lu 1 COSC 472 Network Security

    E-Print Network [OSTI]

    Lu, Enyue "Annie"

    Network Security Annie Lu Background · Information Security requirements have changed in recent times to protect data during transmission #12;COSC 472 Network Security Annie Lu 6 Security · Information Security Security Annie Lu Computer Security · the protection afforded to an automated information system in order

  19. The Cyber Security Crisis

    ScienceCinema (OSTI)

    Spafford, Eugene [Purdue University, West Lafayette, Indiana, United States

    2009-09-01

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  20. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  1. Security Administration Production Office,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345Secure

  2. 2014 Headquarters Facilities Master Security Plan- Chapter 11, Incidents of Security Concern

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern Describes DOE Headquarters procedures for reporting, investigating, and correcting Incidents of Security Concern.

  3. NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security...

    National Nuclear Security Administration (NNSA)

    Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  4. TED AND KARYN HUME CENTER FOR NATIONAL SECURITY AND TECHNOLOGY

    E-Print Network [OSTI]

    Ha, Dong S.

    Networks, Crypto, Formal Methods, Cloud, IPv6, Hardware Security, Visualization, Policy/Law Applications Security IPv6 Security Cloud Security and Privacy Secure Virtualization Anonymous Computation VisualizationTED AND KARYN HUME CENTER FOR NATIONAL SECURITY AND TECHNOLOGY Cybersecurity: Observations

  5. West Virginia University 1 School of Medicine

    E-Print Network [OSTI]

    Mohaghegh, Shahab

    access to a full range of research and clinical facilities, including a new laboratory building. These School of Medicine graduate and professional programs complement programs in the other health professions

  6. Northwestern University Feinberg School of Medicine

    E-Print Network [OSTI]

    Chisholm, Rex L.

    1 Northwestern University Feinberg School of Medicine Web Content Style Guide June 2013 #12 ...................................................................................................................................3 What We Know About Web Users Feinberg site, and focus their information for greatest impact to web readers. The document also includes

  7. DIGESTIVE HEALTH CENTER AT NORTHWESTERN MEDICINE

    E-Print Network [OSTI]

    Chisholm, Rex L.

    DIGESTIVE HEALTH CENTER AT NORTHWESTERN MEDICINE FUNCTIONAL BOWEL PROGRAM #12;"Northwestern. Through our Functional Bowel Program within the Digestive Health Center, we emphasize multidisciplinary for H. pylori, and carbohydrate testing for lactose, sucrose, and fructose intolerance. DIGESTIVE HEALTH

  8. Music, Medicine, and the Art of Listening

    E-Print Network [OSTI]

    van Roessel, Peter; Shafer, Audrey

    2006-01-01

    C. Australian Doctors' Orchestra: mixing music and medicine.Med J Aust. Music Helps Physicians Heal Themselves. NPR:November 15, Arjmand SB. Music lessons. Acad Med. 2006;81:

  9. Open Bibliography for Science, Technology, and Medicine

    E-Print Network [OSTI]

    Jones, Richard; MacGillivray, Mark; Murray-Rust, Peter; Pitman, Jim; Sefton, Peter; O'Steen, Ben; Waites, William

    2011-07-04

    The concept of Open Bibliography in science, technology and medicine (STM) is introduced as a combination of Open Source tools, Open specifications and Open bibliographic data. An Openly searchable and navigable network of bibliographic information...

  10. ORISE: Radiation Emergency Medicine - Continuing Medical Education...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Radiation Emergency Medicine Dates Scheduled Register Online October 20-23, 2015 February 9-12, 2016 March 8-11, 2016 April 5-8, 2016 June 14-17, 2016 August 9-12, 2016 Fee: 200...

  11. Value creation through modernizing Chinese medicine

    E-Print Network [OSTI]

    Sun, Lizhe

    2007-01-01

    My first hypothesis in this thesis is that there is significant value vested in traditional Chinese medicine that can be captured by converting them into ethical drugs through scientific analysis, screening and validation. ...

  12. In-Training Practice Patterns of Combined Emergency Medicine/Internal Medicine Residents, 2003-2007

    E-Print Network [OSTI]

    Kessler, Chad S; Gonzalez, Andrew A; Stallings, Leonard A; Templeman, Todd A

    2011-01-01

    medicine residents during training. Ann Int Med. 2006;145:et al Table 3. Perceived training deficits of current (2008)specialty elective training during residency Administrative

  13. Information Systems and Computing/Office of Information Security www.upenn.edu/computing/security security@isc.upenn.edu

    E-Print Network [OSTI]

    Fang-Yen, Christopher

    ". And Penn actually offers a couple of "home grown" cloud services for secure file sharing and transferInformation Systems and Computing/Office of Information Security www.upenn.edu/computing/security security@isc.upenn.edu "phishing"...? Information Systems and Computing/Office of Information Security

  14. Aviation security: A system's perspective

    SciTech Connect (OSTI)

    Martin, J.P.

    1988-01-01

    For many years the aviation industry and airports operated with security methods and equipment common to most other large industrial complexes. At that time, the security systems primarily provided asset and property protection. However, soon after the first aircraft hijacking the focus of security shifted to emphasize the security requirements necessary for protecting the traveling public and the one feature of the aviation industry that makes it unique---the airplane. The airplane and its operation offered attractive opportunities for the homesick refugee, the mentally unstable person and the terrorist wanting to make a political statement. The airport and its aircraft were the prime targets requiring enhanced security against this escalated threat. In response, the FAA, airport operators and air carriers began to develop plans for increasing security and assigning responsibilities for implementation.

  15. UC Davis School of Medicine Match Results -2015

    E-Print Network [OSTI]

    Leistikow, Bruce N.

    SACRAMENTO CA UC San Francisco-Fresno-CA Emergency Medicine FRESNO CA UC San Francisco-Fresno-CA Emergency Mem Med Ctr-CA Family Medicine LONG BEACH CA Methodist Hosp-Sacramento-CA Family Medicine SACRAMENTO CA Methodist Hosp-Sacramento-CA Family Medicine SACRAMENTO CA Methodist Hosp-Sacramento-CA Family

  16. http://ebm.sagepub.com/ Experimental Biology and Medicine

    E-Print Network [OSTI]

    Kenis, Paul J. A.

    http://ebm.sagepub.com/ Experimental Biology and Medicine http://ebm.sagepub.com/content/239: Society for Experimental Biology and Medicine can be found at:Experimental Biology and Medicine and Medicine 2014; 239: 394­403. DOI: 10.1177/1535370214522179 Introduction The intracellular redox environment

  17. Supporting Clinical Research AAAS/Science Translational Medicine Panel

    E-Print Network [OSTI]

    Napp, Nils

    for Translational Medicine Jennifer A. Lyon, MS, MLIS, AHIP Clinical Research Librarian UF Health Science Center

  18. East Asian Security in 2025 

    E-Print Network [OSTI]

    Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

    2008-01-01

    Are • Reagan Heavin – Energy • Adam Hudson – State Capacity • Brandon Krueger – Military • Sean O’Neil – Demographics • Griffin Rozell – Balance of Power • Matt Suma – Economy East Asian Security in 2025 China: Competition, Cooperation, Plateau? Reagan Heavin... Adam Hudson Brandon Krueger Sean O’Neil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda • Conclusions • Projections • Drivers • Four Outcomes • Questions East Asian Security in 2025 Conclusions • China will rise to great power...

  19. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  20. Noise Secured Internet

    E-Print Network [OSTI]

    Geraldo A. Barbosa

    2006-02-28

    This work shows how a secure Internet can be implemented through a fast key distribution system that uses physical noise to protect the transmitted information. Starting from a shared random sequence $K_0$ between two (or more) users, longsequences $R$ of random bits can be shared. The signals sent over the Internet are deterministic but have a built-in Nature-made uncertainty that protects the shared sequences. After privacy amplification the shared $R$ random bits --encrypted by noise-- are subsequently utilized in one-time-pad data ciphering.

  1. Security | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopment Top Scientific Impact Since its SearchSecurity Enhancing

  2. Energy Security Center

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES October 27th, 2010 Thanks forEnergy ScienceEnergy Security

  3. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES October 27th, 2010 Thanks forEnergy ScienceEnergy Security

  4. Security, Safety and Health

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergy BillsNo.Hydrogen4 Ā» Searchwith First JamesofAward509 WeekSecurity8, Fourth

  5. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities GeneralWake-ImagingNotSecurity Home

  6. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities GeneralWake-ImagingNotSecurity Home

  7. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National NuclearSecurityor

  8. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National

  9. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001 Energy

  10. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001 Energy24,

  11. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001

  12. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001Y-12

  13. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you notHeatMaRIEdioxide capture CS SeminarsNRELNuclear Security

  14. Energy Security Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansasCommunities EnergyU.S. DOE Office of99SavingTrilateralUnionSecurity

  15. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)GeothermalFuel MagnetizationTransportationVideos HomePower HomeSecurity

  16. dnn | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, Shaping the future of nuclear...

  17. Web Engineering Security: Essential Elements

    E-Print Network [OSTI]

    Glisson, W.B.; Welland, R.; The Second International Conference on Availability, Reliability and Security (ARES).; 2007.; Vienna, Austria pp 707-714 IEEE [More Details

    Glisson,W.B. Welland,R. The Second International Conference on Availability, Reliability and Security (ARES). 2007. Vienna, Austria pp 707-714 IEEE

  18. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 “Climate change acts as a threat

  19. testmenu | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    testmenu | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  20. taiwan | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    taiwan | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...