National Library of Energy BETA

Sample records for module security bypass

  1. V-216: Drupal Monster Menus Module Security Bypass and Script...

    Office of Environmental Management (EM)

    6: Drupal Monster Menus Module Security Bypass and Script Insertion Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and Script Insertion Vulnerabilities August...

  2. V-186: Drupal Login Security Module Security Bypass and Denial...

    Office of Environmental Management (EM)

    is caused due to an error within the delay feature and can be exploited to consume all web server instances via multiple failed login attempts. IMPACT: Drupal Login Security...

  3. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

  4. U-234: Oracle MySQL User Login Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    Oracle MySQL is prone to a security bypass vulnerability Attackers can exploit this issue to bypass certain security restrictions.

  5. NSM Secure UI Crypto Module Security Policy

    E-Print Network [OSTI]

    NSM Secure UI Crypto Module Security Policy Version: 1.4 Revision Date: April 1, 2010 This document. #12;McAfee, Inc NSM Secure UI Crypto Module Security Policy Page 2 of 15 CHANGE RECORD Revision Date Module Security Policy Page 3 of 15 Contents 1 Module Overview

  6. Photovoltaic-module bypass-diode encapsulation. Annual report

    SciTech Connect (OSTI)

    Not Available

    1983-06-20

    The design and processing techniques necessary to incorporate bypass diodes within the module encapsulant are presented in this annual report. A comprehensive survey of available pad-mounted PN junction and Schottky diodes led to the selection of Semicon PN junction diode cells for this application. Diode junction-to-heat spreader thermal resistance measurements, performed on a variety of mounted diode chip types and sizes, have yielded values which are consistently below 1/sup 0/C per watt, but show some instability when thermally cycled over the temperature range from -40 to 150/sup 0/C. Based on the results of a detailed thermal analysis, which covered the range of bypass currents from 2 to 20 amperes, three representative experimental modules, each incorporating integral bypass diode/heat spreader assemblies of various sizes, were designed and fabricated. Thermal testing of these modules has enabled the formation of a recommended heat spreader plate sizing relationship. The production cost of three encapsulated bypass diode/heat spreader assemblies were compared with similarly rated externally-mounted packaged diodes. An assessment of bypass diode reliability, which relies heavily on rectifying diode failure rate data, leads to the general conclusion that, when proper designed and installed, these devices will improve the overall reliability of a terrestrial array over a 20 year design lifetime.

  7. V-162: Apache Struts "ParameterInterceptor" Security Bypass Vulnerabil...

    Broader source: Energy.gov (indexed) [DOE]

    to enable method execution and execute arbitrary methods, bypassing Struts and OGNL library protections. 2. Any unsanitized String variable exposed by an action and have it...

  8. Breaking parameter modulated chaotic secure communication system

    E-Print Network [OSTI]

    G. Alvarez; F. Montoya; M. Romera; G. Pastor

    2003-11-20

    This paper describes the security weakness of a recently proposed secure communication method based on parameter modulation of a chaotic system and adaptive observer-based synchronization scheme. We show that the security is compromised even without precise knowledge of the chaotic system used.

  9. U-188: MySQL User Login Security Bypass and Unspecified Vulnerability

    Broader source: Energy.gov [DOE]

    An error when verifying authentication attempts can be exploited to bypass the authentication mechanism.

  10. T-570: HP Security Bulletin- HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass.

  11. Cummings Engineering's Secure Mobility Suite B Crypto Module

    E-Print Network [OSTI]

    Cummings Engineering's Secure Mobility Suite B Crypto Module FIPS 140-2 Level 1 Security Policy Version: 1.1 Last Updated: April 15, 2013 Cummings Engineering Consultants, Inc. 145 S. 79th St., Suite 26 Chandler, Arizona 85226 Office: 480-809-6024 Fax: 866-884-9570 #12;Cummings Engineering's Secure Mobility

  12. V-186: Drupal Login Security Module Security Bypass and Denial of Service

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeedofDepartment ofDeploymentDepartment

  13. "Order Module--DOE O 470.4B, SAFEGUARDS AND SECURITY PROGRAM...

    Office of Environmental Management (EM)

    "Order Module--DOE O 470.4B, SAFEGUARDS AND SECURITY PROGRAM, DOE O 471.6, INFORMATION SECURITY, DOE O 473.3 "Order Module--DOE O 470.4B, SAFEGUARDS AND SECURITY PROGRAM, DOE O...

  14. Approved Module Information for CS3190, 2014/5 Module Title/Name: Information Security Module Code: CS3190

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    -- Operation and limitations of common information safeguards -- Current leading technologies and standards information from unstructured sources at a level sufficient to keep up to date and communicate with computing of information security. Legal, ethical and human aspects of security. Module Delivery Methods of Delivery

  15. Module No: 410318Social Security LawModule Title: Co-requisite:Labor LawPre-requisite

    E-Print Network [OSTI]

    Module No: 410318Social Security LawModule Title: Co-requisite:Labor LawPre-requisite: Module Type: specialization required electiveModule level: Third year Evening StudyDaytime StudyCredit Hours: 3 Credit Hours Instructor Name E-mailOffice Number Office Phone Academic rank Module coordinator S

  16. Module No: 420476Crimes Against State SecurityModule Title: Criminal law (general part)Pre-requisite

    E-Print Network [OSTI]

    Module No: 420476Crimes Against State SecurityModule Title: Criminal law (general part)Pre-requisite: Module Type: specialization required electiveModule level: fourth year Evening StudyDaytime Study Office Phone Academic rank Instructor Name E-mailOffice Number Office Phone Academic rank Module

  17. V-216: Drupal Monster Menus Module Security Bypass and Script Insertion

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities |Vulnerabilities | Department

  18. T-646: Debian fex authentication bypass | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of "auth-ID" when uploading files and can be exploited to bypass the authentication mechanism. PLATFORM: Debian fex ABSTRACT: Debian security discovered that fex, a web service...

  19. Approved Module Information for CS4520, 2014/5 Module Title/Name: Information Security Module Code: CS4520

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    students to take an active role in the design, planning, evaluation and management of secure information -- Ability to analyse security risks and deliver a fit-for-purpose information security management system security * Professional/Subject-Specific Skills -- Ability identify risks in software programs, computer

  20. Security camera resolution measurements: Horizontal TV lines versus modulation transfer function measurements.

    SciTech Connect (OSTI)

    Birch, Gabriel Carisle; Griffin, John Clark

    2015-01-01

    The horizontal television lines (HTVL) metric has been the primary quantity used by division 6000 related to camera resolution for high consequence security systems. This document shows HTVL measurements are fundamen- tally insufficient as a metric to determine camera resolution, and propose a quantitative, standards based methodology by measuring the camera system modulation transfer function (MTF), the most common and accepted metric of res- olution in the optical science community. Because HTVL calculations are easily misinterpreted or poorly defined, we present several scenarios in which HTVL is frequently reported, and discuss their problems. The MTF metric is discussed, and scenarios are presented with calculations showing the application of such a metric.

  1. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  2. U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass...

    Broader source: Energy.gov (indexed) [DOE]

    1027448 Bugtraq ID: 55250 EMC.com CVE-2012-2285 IMPACT ASSESSMENT: High Discussion EMC Cloud Tiering Appliance (CTA) is prone to a security-bypass vulnerability that may allow...

  3. V-236: MediaWiki CentralAuth Extension Authentication Bypass...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    an error when handling auto-logins and can be exploited to bypass the authentication mechanism by providing a valid username within the "centralauthUser" cookie. IMPACT: Security...

  4. BYPASS SYSTEM FOR SHUNTING OF ELECTROMAGNETS FOR ACCELERATORS AND STORAGE RINGS

    E-Print Network [OSTI]

    Kozak, Victor R.

    power source of the electromagnet and energy dump to a ballast load. The bypass module is remotely monitored and controlled through a CAN-bus. The SHUNT-20 modules are made by the Switch Mode Technology with application of the up-to-date components in the "Euromechanics" standard. INTRODUCTION Designing of compact

  5. Experimental and Analytic Study on the Core Bypass Flow in a Very High Temperature Reactor

    SciTech Connect (OSTI)

    Richard Schultz

    2012-04-01

    Core bypass flow has been one of key issues in the very high temperature reactor (VHTR) design for securing core thermal margins and achieving target temperatures at the core exit. The bypass flow in a prismatic VHTR core occurs through the control element holes and the radial and axial gaps between the graphite blocks for manufacturing and refueling tolerances. These gaps vary with the core life cycles because of the irradiation swelling/shrinkage characteristic of the graphite blocks such as fuel and reflector blocks, which are main components of a core's structure. Thus, the core bypass flow occurs in a complicated multidimensional way. The accurate prediction of this bypass flow and counter-measures to minimize it are thus of major importance in assuring core thermal margins and securing higher core efficiency. Even with this importance, there has not been much effort in quantifying and accurately modeling the effect of the core bypass flow. The main objectives of this project were to generate experimental data for validating the software to be used to calculate the bypass flow in a prismatic VHTR core, validate thermofluid analysis tools and their model improvements, and identify and assess measures for reducing the bypass flow. To achieve these objectives, tasks were defined to (1) design and construct experiments to generate validation data for software analysis tools, (2) determine the experimental conditions and define the measurement requirements and techniques, (3) generate and analyze the experimental data, (4) validate and improve the thermofluid analysis tools, and (5) identify measures to control the bypass flow and assess its performance in the experiment.

  6. Photovoltaic power generation system free of bypass diodes

    DOE Patents [OSTI]

    Lentine, Anthony L.; Okandan, Murat; Nielson, Gregory N.

    2015-07-28

    A photovoltaic power generation system that includes a solar panel that is free of bypass diodes is described herein. The solar panel includes a plurality of photovoltaic sub-modules, wherein at least two of photovoltaic sub-modules in the plurality of photovoltaic sub-modules are electrically connected in parallel. A photovoltaic sub-module includes a plurality of groups of electrically connected photovoltaic cells, wherein at least two of the groups are electrically connected in series. A photovoltaic group includes a plurality of strings of photovoltaic cells, wherein a string of photovoltaic cells comprises a plurality of photovoltaic cells electrically connected in series. The strings of photovoltaic cells are electrically connected in parallel, and the photovoltaic cells are microsystem-enabled photovoltaic cells.

  7. Thermal Bypass Air Barriers in the 2009 International Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Thermal Bypass Air Barriers in the 2009 International Energy Conservation Code - Building America Top Innovation Thermal Bypass Air Barriers in the 2009 International Energy...

  8. Demonstrated Petroleum Reduction Using Oil Bypass Filter Technology...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Demonstrated Petroleum Reduction Using Oil Bypass Filter Technology on Heavy and Light Vehicles Demonstrated Petroleum Reduction Using Oil Bypass Filter Technology on Heavy and...

  9. Supported PV module assembly

    SciTech Connect (OSTI)

    Mascolo, Gianluigi; Taggart, David F.; Botkin, Jonathan D.; Edgett, Christopher S.

    2013-10-15

    A supported PV assembly may include a PV module comprising a PV panel and PV module supports including module supports having a support surface supporting the module, a module registration member engaging the PV module to properly position the PV module on the module support, and a mounting element. In some embodiments the PV module registration members engage only the external surfaces of the PV modules at the corners. In some embodiments the assembly includes a wind deflector with ballast secured to a least one of the PV module supports and the wind deflector. An array of the assemblies can be secured to one another at their corners to prevent horizontal separation of the adjacent corners while permitting the PV modules to flex relative to one another so to permit the array of PV modules to follow a contour of the support surface.

  10. Security Policy: Radio Network Controller

    E-Print Network [OSTI]

    Security Policy: Radio Network Controller Encryption Module Controller (RNC EMC) Cryptographic, 2007 Security Policy: RNC EMC Page 1 of 22 #12;Security Policy: RNC EMC Page 2 of 22 #12;Table...........................................................14 7. IDENTIFICATION AND AUTHENTICATION POLICY

  11. Exhaust gas bypass valve control for thermoelectric generator

    DOE Patents [OSTI]

    Reynolds, Michael G; Yang, Jihui; Meisner, Greogry P.; Stabler, Francis R.; De Bock, Hendrik Pieter (Peter) Jacobus; Anderson, Todd Alan

    2012-09-04

    A method of controlling engine exhaust flow through at least one of an exhaust bypass and a thermoelectric device via a bypass valve is provided. The method includes: determining a mass flow of exhaust exiting an engine; determining a desired exhaust pressure based on the mass flow of exhaust; comparing the desired exhaust pressure to a determined exhaust pressure; and determining a bypass valve control value based on the comparing, wherein the bypass valve control value is used to control the bypass valve.

  12. EVALUATING TRADEOFFS BETWEEN ENVIRONMENTAL FLOW PROTECTIONS AND AGRICULTURAL WATER SECURITY

    E-Print Network [OSTI]

    Merenlender, Adina

    environmental policy associated with the greatest impacts to water users. Surprisingly, the moderate environmental flow policy had larger impacts to bypass flows than the unregulated management scenarioEVALUATING TRADEOFFS BETWEEN ENVIRONMENTAL FLOW PROTECTIONS AND AGRICULTURAL WATER SECURITY T. E

  13. Bypass diode for a solar cell

    DOE Patents [OSTI]

    Rim, Seung Bum (Palo Alto, CA); Kim, Taeseok (San Jose, CA); Smith, David D. (Campbell, CA); Cousins, Peter J. (Menlo Park, CA)

    2012-03-13

    Bypass diodes for solar cells are described. In one embodiment, a bypass diode for a solar cell includes a substrate of the solar cell. A first conductive region is disposed above the substrate, the first conductive region of a first conductivity type. A second conductive region is disposed on the first conductive region, the second conductive region of a second conductivity type opposite the first conductivity type.

  14. AVTA: Oil Bypass Filter Specifications and Test Procedures

    Broader source: Energy.gov [DOE]

    PuraDYN Oil Bypass Filtration System Evaluation Test Plan methodology is used in the testing of all oil bypass filters on the buses at the Idaho National Laboratory.

  15. U-169: Sympa Multiple Security Bypass Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEventScripting Attacks

  16. V-237: TYPO3 Security Bypass Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report1538-1950 TimelineUtility-Scale Solar

  17. Bypass apparatus and method for series connected energy storage devices

    DOE Patents [OSTI]

    Rouillard, Jean (Saint-Luc, CA); Comte, Christophe (Montreal, CA); Daigle, Dominik (St-Hyacinthe, CA)

    2000-01-01

    A bypass apparatus and method for series connected energy storage devices. Each of the energy storage devices coupled to a common series connection has an associated bypass unit connected thereto in parallel. A current bypass unit includes a sensor which is coupled in parallel with an associated energy storage device or cell and senses an energy parameter indicative of an energy state of the cell, such as cell voltage. A bypass switch is coupled in parallel with the energy storage cell and operable between a non-activated state and an activated state. The bypass switch, when in the non-activated state, is substantially non-conductive with respect to current passing through the energy storage cell and, when in the activated state, provides a bypass current path for passing current to the series connection so as to bypass the associated cell. A controller controls activation of the bypass switch in response to the voltage of the cell deviating from a pre-established voltage setpoint. The controller may be included within the bypass unit or be disposed on a control platform external to the bypass unit. The bypass switch may, when activated, establish a permanent or a temporary bypass current path.

  18. Communication Parvoviral nuclear import: bypassing the host

    E-Print Network [OSTI]

    Panté, Nelly

    Short Communication Parvoviral nuclear import: bypassing the host nuclear-transport machinery Sarah the mechanisms underlying parvovirus' nuclear import. Recently, it was found that microinjection of MVM into the cytoplasm of Xenopus oocytes causes damage to the nuclear envelope (NE), suggesting that the nuclear

  19. DATE: NVLAP LAB CODE: INFORMATION TECHNOLOGY SECURITY TESTING

    E-Print Network [OSTI]

    ­ Software 1 Testing (Security Levels 1 to 3) 17CMS2 = Cryptographic Modules ­ Software 2 Testing (Security of this document. 17/CMS1 Cryptographic Modules ­ Software 1 Testing (Security Levels 1 to 3) 17CMS1/01 All testCMS2 Cryptographic Modules ­ Software 2 Testing (Security Levels 4

  20. PV module mounting method and mounting assembly

    DOE Patents [OSTI]

    Lenox, Carl J.S.; Johnson, Kurt M.

    2013-04-23

    A method for mounting PV modules to a deck includes selecting PV module layout pattern so that adjacent PV module edges are spaced apart. PV mounting and support assemblies are secured to the deck according to the layout pattern using fasteners extending into the deck. The PV modules are placed on the PV mounting and support assemblies. Retaining elements are located over and secured against the upper peripheral edge surfaces of the PV modules so to secure them to the deck with the peripheral edges of the PV modules spaced apart from the deck. In some examples a PV module mounting assembly, for use on a shingled deck, comprises flashing, a base mountable on the flashing, a deck-penetrating fastener engageable with the base and securable to the deck so to secure the flashing and the base to the shingled deck, and PV module mounting hardware securable to the base.

  1. Increasing security in inter-chip communication

    DOE Patents [OSTI]

    Edwards, Nathan J; Hamlet, Jason; Bauer, Todd; Helinski, Ryan

    2014-10-28

    An apparatus for increasing security in inter-chip communication includes a sending control module, a communication bus, and a receiving control module. The communication bus is coupled between the sending control module and the receiving control module. The sending control module operates to send data on the communication bus, disable the communication bus when threats are detected, or both.

  2. Heat exchanger bypass system for an absorption refrigeration system

    DOE Patents [OSTI]

    Reimann, Robert C. (Lafayette, NY)

    1984-01-01

    A heat exchanger bypass system for an absorption refrigeration system is disclosed. The bypass system operates to pass strong solution from the generator around the heat exchanger to the absorber of the absorption refrigeration system when strong solution builds up in the generator above a selected level indicative of solidification of strong solution in the heat exchanger or other such blockage. The bypass system includes a bypass line with a gooseneck located in the generator for controlling flow of strong solution into the bypass line and for preventing refrigerant vapor in the generator from entering the bypass line during normal operation of the refrigeration system. Also, the bypass line includes a trap section filled with liquid for providing a barrier to maintain the normal pressure difference between the generator and the absorber even when the gooseneck of the bypass line is exposed to refrigerant vapor in the generator. Strong solution, which may accumulate in the trap section of the bypass line, is diluted, to prevent solidification, by supplying weak solution to the trap section from a purge system for the absorption refrigeration system.

  3. Electrical and thermal finite element modeling of arc faults in photovoltaic bypass diodes.

    SciTech Connect (OSTI)

    Bower, Ward Isaac; Quintana, Michael A.; Johnson, Jay

    2012-01-01

    Arc faults in photovoltaic (PV) modules have caused multiple rooftop fires. The arc generates a high-temperature plasma that ignites surrounding materials and subsequently spreads the fire to the building structure. While there are many possible locations in PV systems and PV modules where arcs could initiate, bypass diodes have been suspected of triggering arc faults in some modules. In order to understand the electrical and thermal phenomena associated with these events, a finite element model of a busbar and diode was created. Thermoelectrical simulations found Joule and internal diode heating from normal operation would not normally cause bypass diode or solder failures. However, if corrosion increased the contact resistance in the solder connection between the busbar and the diode leads, enough voltage potentially would be established to arc across micron-scale electrode gaps. Lastly, an analytical arc radiation model based on observed data was employed to predicted polymer ignition times. The model predicted polymer materials in the adjacent area of the diode and junction box ignite in less than 0.1 seconds.

  4. Ultralight photovoltaic modules for unmanned aerial vehicles

    SciTech Connect (OSTI)

    Nowlan, M.J.; Maglitta, J.C.; Darkazalli, G.; Lamp, T.

    1997-12-31

    New lightweight photovoltaic modules are being developed for powering high altitude unmanned aerial vehicles (UAVs). Modified low-cost terrestrial solar cell and module technologies are being applied to minimize vehicle cost. New processes were developed for assembling thin solar cells, encapsulant films, and cover films. An innovative by-pass diode mounting approach that uses a solar cell as a heat spreader was devised and tested. Materials and processes will be evaluated through accelerated environmental testing.

  5. Bypass diode for a solar cell

    DOE Patents [OSTI]

    Rim, Seung Bum; Kim, Taeseok; Smith, David D; Cousins, Peter J

    2013-11-12

    Methods of fabricating bypass diodes for solar cells are described. In once embodiment, a method includes forming a first conductive region of a first conductivity type above a substrate of a solar cell. A second conductive region of a second conductivity type is formed on the first conductive region. In another embodiment, a method includes forming a first conductive region of a first conductivity type above a substrate of a solar cell. A second conductive region of a second conductivity type is formed within, and surrounded by, an uppermost portion of the first conductive region but is not formed in a lowermost portion of the first conductive region.

  6. Module Handbook Module title

    E-Print Network [OSTI]

    . Students learn about selected topics from inorganic chemistry, biochemistry, materials chemistryModule Handbook Module title Module title in English Credits Degree of compulsion Level Learning Theory of Functional Materials 6 Compulsory Basic A systematic foundation for quantum physics

  7. Protecting Kernels from Untrusted Modules using Dynamic Binary Instrumentation

    E-Print Network [OSTI]

    Goel, Ashvin

    Protecting Kernels from Untrusted Modules using Dynamic Binary Instrumentation University · virtualization · Secure only modules whose source code is available (BGI, · LXFI, etc.) · Many modules is manageable · Data consistency is challenging Dynamic Binary Instrumentation Goals and Approach Challenges Two

  8. V-190: ASUS RT-N66U Router AiCloud Security Bypass Security Issue |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConductMultiple vulnerabilities

  9. Hemodynamic Changes following Aortic Valve Bypass: A Mathematical Approach

    E-Print Network [OSTI]

    Benevento, Emilia

    Aortic valve bypass (AVB) has been shown to be a viable solution for patients with severe aortic stenosis (AS). Under this circumstance, the left ventricle (LV) has a double outlet. The objective was to develop a mathematical ...

  10. Module No: 420171Penal law (general part)Module Title: Co-requisite: crimes against

    E-Print Network [OSTI]

    Module No: 420171Penal law (general part)Module Title: Co-requisite: crimes against property and persons, crimes against state national security Introduction to LawPre-requisite: Module Type: department requirementModule level: First year Evening StudyDaytime StudyCredit Hours: 3 Credit Hours Lecture Time

  11. Rankine cycle load limiting through use of a recuperator bypass

    DOE Patents [OSTI]

    Ernst, Timothy C.

    2011-08-16

    A system for converting heat from an engine into work includes a boiler coupled to a heat source for transferring heat to a working fluid, a turbine that transforms the heat into work, a condenser that transforms the working fluid into liquid, a recuperator with one flow path that routes working fluid from the turbine to the condenser, and another flow path that routes liquid working fluid from the condenser to the boiler, the recuperator being configured to transfer heat to the liquid working fluid, and a bypass valve in parallel with the second flow path. The bypass valve is movable between a closed position, permitting flow through the second flow path and an opened position, under high engine load conditions, bypassing the second flow path.

  12. Initial Hydrologic Feasibility Analysis of the Proposed Ship Channel Bypass (lower Sacramento River, California

    E-Print Network [OSTI]

    Church, Tami C.

    2012-01-01

    bypass could reduce flood risk by routing water away frommainstem, thereby reducing flood risk in downstream areas,

  13. Postal Security Device Security Policy

    E-Print Network [OSTI]

    Postal Security Device Security Policy FRAMA AG PSD - I Version: R01.06 Date: 25.05.2007 Doc.-ID: DE_FNKPSD_510_SPE File name: DE_FNKPSD_510_SPE_R0106_EN.Security Policy PSD Author: Bernd Zinke, Timo » Non-Confidential « #12;Security Policy FRAMA AG CH-3438 LAUPERSWIL / BERN TITLE: POSTAL SECURITY

  14. Banner Job Installation Security Form Office of Information Technology

    E-Print Network [OSTI]

    Karsai, Istvan

    Banner Job Installation Security Form Office of Information Technology 424 Roy S. Nicks Hall, Box: ______________________________ Job Description: ______________________________ Section 3. Security Information Banner Module 70728 Johnson City, Tennessee 37614 (423) 439-4648 · oithelp@etsu.edu Section 1. Requestor Information

  15. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  16. Cycling firing method for bypass operation of bridge converters

    DOE Patents [OSTI]

    Zabar, Zivan (99-72 66th Rd., Apt. 9N, Forest Hills, NY 11375)

    1982-01-01

    The bridge converter comprises a number of switching elements and an electronic logic system which regulated the electric power levels by controlling the firing, i.e., the initiation of the conduction period of the switching elements. Cyclic firing of said elements allows the direct current to bypass the alternating current system with high power factor and negligible losses.

  17. ORISE: Securing the Golden State from threats foreign and domestic

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    exercise planning, and the Emergency Operations Center's role in cyber security. These training modules were each provided free of charge to local agencies and most participants...

  18. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO...

  19. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  20. Development of By-Pass Blending Station System 

    E-Print Network [OSTI]

    Liu, M.; Barnes, D.; Bunz, K.; Rosenberry, N.

    2003-01-01

    Temperature 0.0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1.0 30 40 50 60 70 80 90 100 Ambient Temeprature Ra ti o Load Ratio Power Savings Ratio W/O DP Reset Differential Pressure Ratio Power Savings With DP Reset ICEBO 2003, Development of By-pass Blending...

  1. T-531: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500

    Broader source: Energy.gov [DOE]

    The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) permits the viewing of CIFS shares even when CIFS file browsing has been disabled, which allows remote authenticated users to bypass intended access restrictions via CIFS requests, aka Bug ID CSCsz80777.

  2. A solar module fabrication process for HALE solar electric UAVs

    SciTech Connect (OSTI)

    Carey, P.G.; Aceves, R.C.; Colella, N.J.; Williams, K.A.; Sinton, R.A.; Glenn, G.S.

    1994-12-12

    We describe a fabrication process used to manufacture high power-to-weight-ratio flexible solar array modules for use on high-altitude-long-endurance (HALE) solar-electric unmanned air vehicles (UAVs). These modules have achieved power-to-weight ratios of 315 and 396 W/kg for 150{mu}m-thick monofacial and 110{mu}m-thick bifacial silicon solar cells, respectively. These calculations reflect average module efficiencies of 15.3% (150{mu}m) and 14.7% (110{mu}m) obtained from electrical tests performed by Spectrolab, Inc. under AMO global conditions at 25{degrees}C, and include weight contributions from all module components (solar cells, lamination material, bypass diodes, interconnect wires, and adhesive tape used to attach the modules to the wing). The fabrication, testing, and performance of 32 m{sup 2} of these modules will be described.

  3. Blue Coat Systems, Inc. Blue Coat Systems, Software Cryptographic Module

    E-Print Network [OSTI]

    Blue Coat Systems, Inc. Blue Coat Systems, Software Cryptographic Module SW Version: 1.0 FIPS 140: Blue Coat Systems, Inc. Corsec Security, Inc. 420 N. Mary Avenue Sunnyvale, CA 94085 United States://www.corsec.com #12;Security Policy, Version 1.9 April 24, 2014 Blue Coat Systems, Software Cryptographic Module Page

  4. Oil Bypass Filter and Diesel Engine Idling Wear-Rate Evaluations...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2005deerzirker.pdf More Documents & Publications Demonstrated Petroleum Reduction Using Oil Bypass Filter Technology on Heavy and Light Vehicles Development of Partial Filter...

  5. Module Configuration

    DOE Patents [OSTI]

    Oweis, Salah (Ellicott City, MD); D'Ussel, Louis (Bordeaux, FR); Chagnon, Guy (Cockeysville, MD); Zuhowski, Michael (Annapolis, MD); Sack, Tim (Cockeysville, MD); Laucournet, Gaullume (Paris, FR); Jackson, Edward J. (Taneytown, MD)

    2002-06-04

    A stand alone battery module including: (a) a mechanical configuration; (b) a thermal management configuration; (c) an electrical connection configuration; and (d) an electronics configuration. Such a module is fully interchangeable in a battery pack assembly, mechanically, from the thermal management point of view, and electrically. With the same hardware, the module can accommodate different cell sizes and, therefore, can easily have different capacities. The module structure is designed to accommodate the electronics monitoring, protection, and printed wiring assembly boards (PWAs), as well as to allow airflow through the module. A plurality of modules may easily be connected together to form a battery pack. The parts of the module are designed to facilitate their manufacture and assembly.

  6. Global Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    weapons from the James Martin center for Nonproliferation Studies Homeland Security Digital Library HSDL is the nation's premier research collection of open-source resources...

  7. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  8. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  9. Efficient Computation of Spinning Modal Radiation Through an Engine Bypass Duct

    E-Print Network [OSTI]

    Huang, Xun

    Efficient Computation of Spinning Modal Radiation Through an Engine Bypass Duct Xun Huang, Xiaoxian out of a duct with flow. The sound propagation inside a generic engine bypass duct, refractions compared on a canonical case of sound propagation out of a semi-infinite duct with flow. Good agreements

  10. AIAA 2008-2877 Sound Radiation from a Generic Bypass Duct with

    E-Print Network [OSTI]

    Huang, Xun

    1 AIAA 2008-2877 Sound Radiation from a Generic Bypass Duct with Bifurcations Xiaoxian Chen1 , Xun, United Kingdom The influence of bifurcations in an aero-engine bypass duct on noise radiation of the simulations were compared with those of a clean duct case. A circumferential mode of m=12 with radial mode

  11. Rankine cycle condenser pressure control using an energy conversion device bypass valve

    DOE Patents [OSTI]

    Ernst, Timothy C; Nelson, Christopher R; Zigan, James A

    2014-04-01

    The disclosure provides a waste heat recovery system and method in which pressure in a Rankine cycle (RC) system of the WHR system is regulated by diverting working fluid from entering an inlet of an energy conversion device of the RC system. In the system, an inlet of a controllable bypass valve is fluidly coupled to a working fluid path upstream of an energy conversion device of the RC system, and an outlet of the bypass valve is fluidly coupled to the working fluid path upstream of the condenser of the RC system such that working fluid passing through the bypass valve bypasses the energy conversion device and increases the pressure in a condenser. A controller determines the temperature and pressure of the working fluid and controls the bypass valve to regulate pressure in the condenser.

  12. Safeguards and Security and Cyber Security RM

    Office of Environmental Management (EM)

    using security measures such as badging, pre-employment investigation and fitness for duty, training, and security awareness? Cyber Security CS-1 Has the project...

  13. V-017: Apache Tomcat Security Bypass and Denial of Service Vulnerabili...

    Broader source: Energy.gov (indexed) [DOE]

    in versions 6.0.0-6.0.35 and 7.0.0-7.0.27. 2) An error within DIGEST authentication mechanism does not properly check server nonces. This weakness is reported in versions...

  14. V-162: Apache Struts "ParameterInterceptor" Security Bypass Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of ElectricScriptingDepartment of Energy

  15. V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConductMultipleAccount Password

  16. V-017: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects |SummitVOCs| Department of

  17. V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report1538-1950 TimelineUtility-Scale Solar throughVulnerability

  18. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    System-of-systems analysis Visualization tools for complex information Next-generation smart grid technologies Quantum computing, security, and data fusion For more information,...

  19. CYSEP --A CYBER-SECURITY PROCESSOR FOR 10GBPS NETWORKS AND BEYOND H. Jonathan Chao

    E-Print Network [OSTI]

    Chao, Jonathan

    1 of 9 CYSEP -- A CYBER-SECURITY PROCESSOR FOR 10GBPS NETWORKS AND BEYOND H. Jonathan Chao the architecture of a Cyber- Security Processor (CYSEP) which can serve as a key module for enhancing security-speed operation. 1 INTRODUCTION In this paper, we describe the architecture of a Cyber- Security Processor (CYSEP

  20. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  1. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  2. Pre-test CFD Calculations for a Bypass Flow Standard Problem

    SciTech Connect (OSTI)

    Rich Johnson

    2011-11-01

    The bypass flow in a prismatic high temperature gas-cooled reactor (HTGR) is the flow that occurs between adjacent graphite blocks. Gaps exist between blocks due to variances in their manufacture and installation and because of the expansion and shrinkage of the blocks from heating and irradiation. Although the temperature of fuel compacts and graphite is sensitive to the presence of bypass flow, there is great uncertainty in the level and effects of the bypass flow. The Next Generation Nuclear Plant (NGNP) program at the Idaho National Laboratory has undertaken to produce experimental data of isothermal bypass flow between three adjacent graphite blocks. These data are intended to provide validation for computational fluid dynamic (CFD) analyses of the bypass flow. Such validation data sets are called Standard Problems in the nuclear safety analysis field. Details of the experimental apparatus as well as several pre-test calculations of the bypass flow are provided. Pre-test calculations are useful in examining the nature of the flow and to see if there are any problems associated with the flow and its measurement. The apparatus is designed to be able to provide three different gap widths in the vertical direction (the direction of the normal coolant flow) and two gap widths in the horizontal direction. It is expected that the vertical bypass flow will range from laminar to transitional to turbulent flow for the different gap widths that will be available.

  3. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  4. Secure PVM

    SciTech Connect (OSTI)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  5. Evaluation of a Stirling engine heater bypass with the NASA Lewis nodal-analysis performance code

    SciTech Connect (OSTI)

    Sullivan, T.J.

    1986-05-01

    In support of the US Department of Energy's Stirling Engine Highway Vehicle Systems program, the NASA Lewis Research Center investigated whether bypassing the P-40 Stirling engine heater during regenerative cooling would improve the engine thermal efficiency. The investigation was accomplished by using the Lewis nodal-analysis Stirling engine computer model. Bypassing the P-40 Stirling engine heater at full power resulted in a rise in the indicated thermal efficiency from 40.6 to 41.0 percent. For the idealized (some losses not included) heater bypass that was analyzed, this benefit is not considered significant.

  6. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  7. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  8. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  9. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity Security

  10. Programmable Multi-Chip Module

    DOE Patents [OSTI]

    Kautz, David (Lenexa, KS); Morgenstern, Howard (Lee's Summit, MO); Blazek, Roy J. (Overland Park, KS)

    2005-05-24

    A multi-chip module comprising a low-temperature co-fired ceramic substrate having a first side on which are mounted active components and a second side on which are mounted passive components, wherein this segregation of components allows for hermetically sealing the active components with a cover while leaving accessible the passive components, and wherein the passive components are secured using a reflow soldering technique and are removable and replaceable so as to make the multi-chip module substantially programmable with regard to the passive components.

  11. Programmable Multi-Chip Module

    DOE Patents [OSTI]

    Kautz, David (Lenexa, KS); Morgenstern, Howard (Lee's Summit, MO); Blazek, Roy J. (Overland Park, KS)

    2004-11-16

    A multi-chip module comprising a low-temperature co-fired ceramic substrate having a first side on which are mounted active components and a second side on which are mounted passive components, wherein this segregation of components allows for hermetically sealing the active components with a cover while leaving accessible the passive components, and wherein the passive components are secured using a reflow soldering technique and are removable and replaceable so as to make the multi-chip module substantially programmable with regard to the passive components.

  12. Programmable multi-chip module

    DOE Patents [OSTI]

    Kautz, David; Morgenstern, Howard; Blazek, Roy J.

    2004-03-02

    A multi-chip module comprising a low-temperature co-fired ceramic substrate having a first side on which are mounted active components and a second side on which are mounted passive components, wherein this segregation of components allows for hermetically sealing the active components with a cover while leaving accessible the passive components, and wherein the passive components are secured using a reflow soldering technique and are removable and replaceable so as to make the multi-chip module substantially programmable with regard to the passive components.

  13. Demonstration of a hitless bypass switch using nanomechanical perturbation for high-bitrate transparent networks

    E-Print Network [OSTI]

    Chatterjee, Rohit

    We demonstrate an optical hitless bypass switch based on nanomechanical proximity perturbation for high-bitrate transparent networks. Embedded in a single-level ?-imbalanced Mach-Zehnder interferometer, the two ...

  14. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio August 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Security

  15. INSTITUTE FOR CYBER SECURITY Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio August-world impact #12;INSTITUTE FOR CYBER SECURITY Institute for Cyber Security Founded June 2007: still in start

  16. Security for grids

    E-Print Network [OSTI]

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-01-01

    differences between Grid security and host or site securityof requirements for Grid security in order to achieve thecompletely. Index Terms — Grid security, authentication,

  17. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  18. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  19. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  20. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  1. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  2. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  3. Faculty Information Security Guide

    E-Print Network [OSTI]

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  4. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  5. Thermionic modules

    DOE Patents [OSTI]

    King, Donald B. (Albuquerque, NM); Sadwick, Laurence P. (Salt Lake City, UT); Wernsman, Bernard R. (Clairton, PA)

    2002-06-18

    Modules of assembled microminiature thermionic converters (MTCs) having high energy-conversion efficiencies and variable operating temperatures manufactured using MEMS manufacturing techniques including chemical vapor deposition. The MTCs incorporate cathode to anode spacing of about 1 micron or less and use cathode and anode materials having work functions ranging from about 1 eV to about 3 eV. The MTCs also exhibit maximum efficiencies of just under 30%, and thousands of the devices and modules can be fabricated at modest costs.

  6. Module No: 420244International Humanitarian Module Title

    E-Print Network [OSTI]

    Module No: 420244International Humanitarian law Module Title: Co-requisite:public international law 1Pre-requisite: Module Type: specialization requirementModule level: Second year Evening Study-mailOffice Number Office Phone Academic rank Instructor Name E-mailOffice Number Office Phone Academic rank Module

  7. module.h

    E-Print Network [OSTI]

    /* OS-9 module header definitions */ /* Executable memory module */ typedef struct { unsigned m_sync, /* sync bytes ($87cd) */ m_size, /* module size ...

  8. Photovoltaic module mounting system

    DOE Patents [OSTI]

    Miros, Robert H. J. (Fairfax, CA); Mittan, Margaret Birmingham (Oakland, CA); Seery, Martin N. (San Rafael, CA); Holland, Rodney H. (Novato, CA)

    2012-04-17

    A solar array mounting system having unique installation, load distribution, and grounding features, and which is adaptable for mounting solar panels having no external frame. The solar array mounting system includes flexible, pedestal-style feet and structural links connected in a grid formation on the mounting surface. The photovoltaic modules are secured in place via the use of attachment clamps that grip the edge of the typically glass substrate. The panel mounting clamps are then held in place by tilt brackets and/or mid-link brackets that provide fixation for the clamps and align the solar panels at a tilt to the horizontal mounting surface. The tilt brackets are held in place atop the flexible feet and connected link members thus creating a complete mounting structure.

  9. Photovoltaic module mounting system

    SciTech Connect (OSTI)

    Miros, Robert H. J.; Mittan, Margaret Birmingham; Seery, Martin N; Holland, Rodney H

    2012-09-18

    A solar array mounting system having unique installation, load distribution, and grounding features, and which is adaptable for mounting solar panels having no external frame. The solar array mounting system includes flexible, pedestal-style feet and structural links connected in a grid formation on the mounting surface. The photovoltaic modules are secured in place via the use of attachment clamps that grip the edge of the typically glass substrate. The panel mounting clamps are then held in place by tilt brackets and/or mid-link brackets that provide fixation for the clamps and align the solar panels at a tilt to the horizontal mounting surface. The tilt brackets are held in place atop the flexible feet and connected link members thus creating a complete mounting structure.

  10. Nuclear security

    SciTech Connect (OSTI)

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  11. Investigation on the Core Bypass Flow in a Very High Temperature Reactor

    SciTech Connect (OSTI)

    Hassan, Yassin

    2013-10-22

    Uncertainties associated with the core bypass flow are some of the key issues that directly influence the coolant mass flow distribution and magnitude, and thus the operational core temperature profiles, in the very high-temperature reactor (VHTR). Designers will attempt to configure the core geometry so the core cooling flow rate magnitude and distribution conform to the design values. The objective of this project is to study the bypass flow both experimentally and computationally. Researchers will develop experimental data using state-of-the-art particle image velocimetry in a small test facility. The team will attempt to obtain full field temperature distribution using racks of thermocouples. The experimental data are intended to benchmark computational fluid dynamics (CFD) codes by providing detailed information. These experimental data are urgently needed for validation of the CFD codes. The following are the project tasks: • Construct a small-scale bench-top experiment to resemble the bypass flow between the graphite blocks, varying parameters to address their impact on bypass flow. Wall roughness of the graphite block walls, spacing between the blocks, and temperature of the blocks are some of the parameters to be tested. • Perform CFD to evaluate pre- and post-test calculations and turbulence models, including sensitivity studies to achieve high accuracy. • Develop the state-of-the art large eddy simulation (LES) using appropriate subgrid modeling. • Develop models to be used in systems thermal hydraulics codes to account and estimate the bypass flows. These computer programs include, among others, RELAP3D, MELCOR, GAMMA, and GAS-NET. Actual core bypass flow rate may vary considerably from the design value. Although the uncertainty of the bypass flow rate is not known, some sources have stated that the bypass flow rates in the Fort St. Vrain reactor were between 8 and 25 percent of the total reactor mass flow rate. If bypass flow rates are on the high side, the quantity of cooling flow through the core may be considerably less than the nominal design value, causing some regions of the core to operate at temperatures in excess of the design values. These effects are postulated to lead to localized hot regions in the core that must be considered when evaluating the VHTR operational and accident scenarios.

  12. A Secure Cryptographic Token Interface Christian Cachin

    E-Print Network [OSTI]

    Cachin, Christian

    Module [26] found in many personal computers, to high-security HSMs used by the finance industry such as IBM's 4764 cryptoprocessor [18]. Two prominent token interfaces used in industry are PKCS #11 [25 of California, Los Angeles, Department of Computer Science, 3714 Boelter Hall, Los Angeles CA 90095, USA

  13. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  14. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  15. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  16. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  17. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  18. Electronic security device

    DOE Patents [OSTI]

    Eschbach, Eugene A. (Richland, WA); LeBlanc, Edward J. (Kennewick, WA); Griffin, Jeffrey W. (Kennewick, WA)

    1992-01-01

    The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

  19. Electronic security device

    DOE Patents [OSTI]

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-03-17

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

  20. 2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

  1. 2014 Headquarters Facilities Master Security Plan- Chapter 3, Personnel Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Describes DOE Headquarters Personnel Security procedures for acquiring, maintaining, and passing security clearances.

  2. Using Operational Security (OPSEC) to Support a Cyber Security...

    Energy Savers [EERE]

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  3. Thermoelectric module

    DOE Patents [OSTI]

    Kortier, William E. (Columbus, OH); Mueller, John J. (Columbus, OH); Eggers, Philip E. (Columbus, OH)

    1980-07-08

    A thermoelectric module containing lead telluride as the thermoelectric mrial is encapsulated as tightly as possible in a stainless steel canister to provide minimum void volume in the canister. The lead telluride thermoelectric elements are pressure-contacted to a tungsten hot strap and metallurgically bonded at the cold junction to iron shoes with a barrier layer of tin telluride between the iron shoe and the p-type lead telluride element.

  4. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  5. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

  6. TITLE: HIPAA PRIVACY AND INFORMATION SECURITY TRAINING FOR COLUMBIA UNIVERSITY MEDICAL CENTER WORKFORCE

    E-Print Network [OSTI]

    Columbia University

    . The online training includes two modules. o HIPAA Privacy o Security Essentials Workforce members shall "Compliance") and select training module TC0019 (HIPAA: Health Insurance Portability and Accountability Act) is provided through the online training modules. It is the responsibility of each school to assure that all

  7. EFFECTS OF GRAPHITE SURFACE ROUGHNESS ON BYPASS FLOW COMPUTATIONS FOR AN HTGR

    SciTech Connect (OSTI)

    Rich Johnson; Yu-Hsin Tung; Hiroyuki Sato

    2011-07-01

    Bypass flow in a prismatic high temperature gas reactor (HTGR) occurs between graphite blocks as they sit side by side in the core. Bypass flow is not intentionally designed to occur in the reactor, but is present because of tolerances in manufacture, imperfect installation and expansion and shrinkage of the blocks from heating and irradiation. It is desired to increase the knowledge of the effects of such flow, which has been estimated to be as much as 20% of the total helium coolant flow. Computational fluid dynamic (CFD) simulations can provide estimates of the scale and impacts of bypass flow. Previous CFD calculations have examined the effects of bypass gap width, level and distribution of heat generation and effects of shrinkage. The present contribution examines the effects of graphite surface roughness on the bypass flow for different relative roughness factors on three gap widths. Such calculations should be validated using specific bypass flow measurements. While such experiments are currently underway for the specific reference prismatic HTGR design for the next generation nuclear plant (NGNP) program of the U. S. Dept. of Energy, the data are not yet available. To enhance confidence in the present calculations, wall shear stress and heat transfer results for several turbulence models and their associated wall treatments are first compared for flow in a single tube that is representative of a coolant channel in the prismatic HTGR core. The results are compared to published correlations for wall shear stress and Nusselt number in turbulent pipe flow. Turbulence models that perform well are then used to make bypass flow calculations in a symmetric onetwelfth sector of a prismatic block that includes bypass flow. The comparison of shear stress and Nusselt number results with published correlations constitutes a partial validation of the CFD model. Calculations are also compared to ones made previously using a different CFD code. Results indicate that increasing surface roughness increases the maximum fuel and helium temperatures as do increases in gap width. However, maximum coolant temperature variation due to increased gap width is not changed by surface roughness.

  8. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Infrastructure Demonstration for Energy reliability and Security) (web link) program to demonstrate: · Cyber-securityEnergy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  9. Photovoltaic module and module arrays

    DOE Patents [OSTI]

    Botkin, Jonathan; Graves, Simon; Lenox, Carl J. S.; Culligan, Matthew; Danning, Matt

    2013-08-27

    A photovoltaic (PV) module including a PV device and a frame, The PV device has a PV laminate defining a perimeter and a major plane. The frame is assembled to and encases the laminate perimeter, and includes leading, trailing, and side frame members, and an arm that forms a support face opposite the laminate. The support face is adapted for placement against a horizontal installation surface, to support and orient the laminate in a non-parallel or tilted arrangement. Upon final assembly, the laminate and the frame combine to define a unitary structure. The frame can orient the laminate at an angle in the range of 3.degree.-7.degree. from horizontal, and can be entirely formed of a polymeric material. Optionally, the arm incorporates integral feature(s) that facilitate interconnection with corresponding features of a second, identically formed PV module.

  10. Photovoltaic module and module arrays

    DOE Patents [OSTI]

    Botkin, Jonathan (El Cerrito, CA); Graves, Simon (Berkeley, CA); Lenox, Carl J. S. (Oakland, CA); Culligan, Matthew (Berkeley, CA); Danning, Matt (Oakland, CA)

    2012-07-17

    A photovoltaic (PV) module including a PV device and a frame. The PV device has a PV laminate defining a perimeter and a major plane. The frame is assembled to and encases the laminate perimeter, and includes leading, trailing, and side frame members, and an arm that forms a support face opposite the laminate. The support face is adapted for placement against a horizontal installation surface, to support and orient the laminate in a non-parallel or tilted arrangement. Upon final assembly, the laminate and the frame combine to define a unitary structure. The frame can orient the laminate at an angle in the range of 3.degree.-7.degree. from horizontal, and can be entirely formed of a polymeric material. Optionally, the arm incorporates integral feature(s) that facilitate interconnection with corresponding features of a second, identically formed PV module.

  11. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia, and reactorsystemoverviews. Training in Action: Gulf Nuclear Energy InfrastructureInstitute In2011,SandiateamedwiththeNuclearSecurity energy safety, security,safeguards,andnonproliferation. Training Sandia National Laboratories experts

  12. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  13. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  14. Security | Department of Energy

    Office of Environmental Management (EM)

    Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top...

  15. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  16. AMPHIBIANS AND REPTILES OF THE GREAT FALLS BYPASSED REACHES IN SOUTH CAROLINA

    E-Print Network [OSTI]

    Dorcas, Michael E.

    of the Catawba River situated only slightly north of the juncture of the Piedmont and Upper Coastal Plain of the amphibians and reptiles inhabiting the Great Falls Bypassed Reaches of the Catawba River in South Carolina salamanders, 7 turtles, 6 lizards, and 11 snakes. No species of amphibian or reptile considered rare

  17. Module Embedding Atanas Radenski

    E-Print Network [OSTI]

    Radenski, Atanas

    Module Embedding 1 Atanas Radenski Computer Science Department UNC-WSSU, P. O. Box 19479 Winston module embedding that enables the building of new modules from existing ones through inheritance for this mechanism. Module embedding is beneficial when modules and classes are used in combination and need

  18. Working with Modules within Python

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Using Modules within Python The EnvironmentModules python package gives access to the module system from within python. The EnvironmentModules python package has a single...

  19. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    society. www.ists.dartmouth.edu THE DARTMOUTH CYBER SECURITY INITIATIVE The Dartmouth Cyber Security, TECHNOLOGY, AND SOCIETY THE DARTMOUTH CYBER SECURITY INITIATIVE #12;The number of laptop thefts at Dartmouth, and Society; and the Dartmouth Cyber Security Initiative offer the following solutions: · Whole

  20. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  1. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  2. Marine asset security and tracking (MAST) system

    DOE Patents [OSTI]

    Hanson, Gregory Richard (Clinton, TN); Smith, Stephen Fulton (Loudon, TN); Moore, Michael Roy (Corryton, TN); Dobson, Eric Lesley (Charleston, SC); Blair, Jeffrey Scott (Charleston, SC); Duncan, Christopher Allen (Marietta, GA); Lenarduzzi, Roberto (Knoxville, TN)

    2008-07-01

    Methods and apparatus are described for marine asset security and tracking (MAST). A method includes transmitting identification data, location data and environmental state sensor data from a radio frequency tag. An apparatus includes a radio frequency tag that transmits identification data, location data and environmental state sensor data. Another method includes transmitting identification data and location data from a radio frequency tag using hybrid spread-spectrum modulation. Another apparatus includes a radio frequency tag that transmits both identification data and location data using hybrid spread-spectrum modulation.

  3. Page 1Securing the Microsoft Cloud Securing the

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Page 1Securing the Microsoft Cloud Securing the Microsoft Cloud #12;Page 2Securing the Microsoft to have confidence in Microsoft as their preferred cloud provider. Our security policies and practices their security and compliance related needs. Securing the Microsoft Cloud #12;Page 3Securing the Microsoft Cloud

  4. Sediment-adsorbed total mercury flux through Yolo Bypass, the primary floodway and wetland in the Sacramento Valley, California

    E-Print Network [OSTI]

    Springborn, M; Singer, MB; Singer, MB; Dunne, T

    2011-01-01

    sediment transport in the Sacramento River, California.Sediment transport Mass balance Yolo Bypass California a b sand transport of total mercury and methyl mercury in the Sacramento River basin, California.

  5. Ballasted photovoltaic module and module arrays

    DOE Patents [OSTI]

    Botkin, Jonathan (El Cerrito, CA); Graves, Simon (Berkeley, CA); Danning, Matt (Oakland, CA)

    2011-11-29

    A photovoltaic (PV) module assembly including a PV module and a ballast tray. The PV module includes a PV device and a frame. A PV laminate is assembled to the frame, and the frame includes an arm. The ballast tray is adapted for containing ballast and is removably associated with the PV module in a ballasting state where the tray is vertically under the PV laminate and vertically over the arm to impede overt displacement of the PV module. The PV module assembly can be installed to a flat commercial rooftop, with the PV module and the ballast tray both resting upon the rooftop. In some embodiments, the ballasting state includes corresponding surfaces of the arm and the tray being spaced from one another under normal (low or no wind) conditions, such that the frame is not continuously subjected to a weight of the tray.

  6. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Summit | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  7. Shield Module Design Considerations

    E-Print Network [OSTI]

    McDonald, Kirk

    Shield Module Design Considerations Adam Carroll Van Graves July 3, 2014 #12;2 Managed by UT-Battelle for the U.S. Department of Energy Shield Module Design Considerations 3 July 2014 Overview · Capability to remotely remove and reinstall the shield modules is required · Shield module concept is He-cooled tungsten

  8. Building Extensible and Secure Networks

    E-Print Network [OSTI]

    Popa, Lucian

    2011-01-01

    adoption of cloud computing is security, as customers oftenpreserving security when migrating to the cloud computingto the security principals used in the cloud access control

  9. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    for Environment and National Security Scripps Institution ofMultiplying Threats to National Security Higher temperaturesefforts to protect national security. Page 2 The U.S. Armed

  10. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  11. Mechanism of RNA polymerase II bypass of oxidative cyclopurine DNA lesions

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Walmacq, Celine; Wang, Lanfeng; Chong, Jenny; Scibelli, Kathleen; Lubkowska, Lucyna; Gnatt, Averell; Brooks, Philip J.; Wang, Dong; Kashlev, Mikhail

    2015-01-20

    In human cells, the oxidative DNA lesion 8,5'-cyclo-2'-deoxyadenosine (CydA) induces prolonged stalling of RNA polymerase II (Pol II) followed by transcriptional bypass, generating both error-free and mutant transcripts with AMP misincorporated immediately downstream from the lesion. Here, we present biochemical and crystallographic evidence for the mechanism of CydA recognition. Pol II stalling results from impaired loading of the template base (5') next to CydA into the active site, leading to preferential AMP misincorporation. Such predominant AMP insertion, which also occurs at an abasic site, is unaffected by the identity of the 5´-templating base, indicating that it derives from nontemplated synthesismore »according to an A rule known for DNA polymerases and recently identified for Pol II bypass of pyrimidine dimers. Subsequent to AMP misincorporation, Pol II encounters a major translocation block that is slowly overcome. The translocation block combined with the poor extension of the dA.rA mispair reduce transcriptional mutagenesis. Moreover, increasing the active-site flexibility by mutation in the trigger loop, which increases the ability of Pol II to accommodate the bulky lesion, and addition of transacting factor TFIIF facilitate CydA bypass. Thus, blocking lesion entry to the active site, trans-lesion A rule synthesis, and translocation block are common features of transcription across different bulky DNA lesions.« less

  12. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  13. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  14. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  15. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY

  16. nevada national security site

    National Nuclear Security Administration (NNSA)

    7%2A en Nevada National Security Site operator recognized for green fleet http:www.nnsa.energy.govblognevada-national-security-site-operator-recognized-green-fleet

    The...

  17. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  18. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  19. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    Pew Project on National Security, Energy and Climate http://of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.

  20. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  1. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  2. cyber security guru

    E-Print Network [OSTI]

    Sandhu, Ravi

    cyber security guru By: Virginia Scott Posted: 4/17/07 UTSA has received a grant from the Texas Emerging Fund to create an institute for cyber security research. According to UTSA industry and educational initiatives in Texas. The creation of UTSA's Institute for Cyber Security Research

  3. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  4. Diesel particulate trap protection against uncontrolled regeneration via selective flow modulation

    SciTech Connect (OSTI)

    Pattas, K.; Samaras, Z.; Kyriakis, N.; Mihaildis, A.; Manikas, T. [Aristotle Univ. of Thessaloniki (Greece)

    1996-09-01

    Possible techniques to protect the filter against a failure scenario, so far reported, include filter by-passing and limiting the engine A/F ratio. Both techniques aim at controlling the oxygen content of the exhaust gas and thus reducing the oxidation rate in the filter. In this paper a new method for the protection of the trap is presented. This method, called Selective Flow Modulation (SFM) aims at controlling the reaction rate via the modulation of the exhaust gas flow through the filter. For the practical application of such a method, it is necessary to split the filter into at least two parts and to use at least one device for the flow modulation. In addition, a number of different possible SFM configurations are presented and their characteristics are analyzed together with the experimental results of the technique applied on two engines, one heavy and one light duty.

  5. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  6. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  7. Advanced silicon photonic modulators

    E-Print Network [OSTI]

    Sorace, Cheryl M

    2010-01-01

    Various electrical and optical schemes used in Mach-Zehnder (MZ) silicon plasma dispersion effect modulators are explored. A rib waveguide reverse biased silicon diode modulator is designed, tested and found to operate at ...

  8. Modulating lignin in plants

    DOE Patents [OSTI]

    Apuya, Nestor; Bobzin, Steven Craig; Okamuro, Jack; Zhang, Ke

    2013-01-29

    Materials and methods for modulating (e.g., increasing or decreasing) lignin content in plants are disclosed. For example, nucleic acids encoding lignin-modulating polypeptides are disclosed as well as methods for using such nucleic acids to generate transgenic plants having a modulated lignin content.

  9. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  10. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  11. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  12. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important is critical October 7, 2009 GAANN ­ Computer Systems Security 1 #12;GAANN - Computer Systems Security

  13. Federated Cloud Security Architecture for Secure and Agile Clouds

    E-Print Network [OSTI]

    Xu, Shouhuai

    Federated Cloud Security Architecture for Secure and Agile Clouds Weiliang Luo, Li Xu, Zhenxin Zhan. This chapter introduces the novel federated cloud security architecture that includes proactive cloud defense technologies for secure and agile cloud development. The federated security architecture consists of a set

  14. Where computer security meets national security1 Helen Nissenbaum

    E-Print Network [OSTI]

    Nissenbaum, Helen

    of International Relations. Key words: cyber-security, computer security, securitization Introduction OverWhere computer security meets national security1 Helen Nissenbaum Department of Culture conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile

  15. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu, Ram Krishnan and Gregory B. White Institute for Cyber Security University of Texas at San Antonio #12;Secure Information ­ Security mechanisms such as authentication, cryptography, trusted hardware, etc. #12;Community Cyber

  16. Implementing Advances in Transport Security Technologies | Department...

    Office of Environmental Management (EM)

    Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies More...

  17. Cyber Security & Smart Grid 

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01

    and interoperability ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Vulnerabilities In The Legacy Power Grid ? SCADA Security ? Supervisory Control and Data Acquisition (SCADA) systems are used extensively to control and monitor the national... & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart Grid Networks...

  18. In: J. Waterway, Port, Coastal, and Ocean Engineering, 126(3): 305-313, 2000. Reservoir Model of Ebb-Tidal Shoal Evolution and Sand Bypassing

    E-Print Network [OSTI]

    US Army Corps of Engineers

    of Ebb-Tidal Shoal Evolution and Sand Bypassing By Nicholas C. Kraus,1 Member, ASCE ABSTRACT A mathematical model is presented for calculating the change in volume and sand-bypassing rate at ebb reservoir can fill to a maximum (equilibrium) volume. The ratio of the input longshore sand transport rate

  19. Supervisory Industrial Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  20. Oil Security Metrics Model

    SciTech Connect (OSTI)

    Greene, David L.; Leiby, Paul N.

    2005-03-06

    A presentation to the IWG GPRA USDOE, March 6, 2005, Washington, DC. OSMM estimates oil security benefits of changes in the U.S. oil market.

  1. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  2. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  3. Natlonal Nuclear Security Admlnlstratlon

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Natlonal Nuclear Security Admlnlstratlon Washington, DC 20585 January 18, 2007 OFFICE OF THE ADMINISTRATOR MEMORANDUM FOR The Deputy Secretary FROM: SUBJECT: Linton F. Brooks...

  4. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Washington, DC 20585 MEMORANDUM FOR THE ADMINISTRATOR FROM: THEODORE D. SHERRY II 4 flA. * -. SUBJECT: REFERENCE: NATIONAL SECURITY ENTI's'E FIELD COUNCIL CHAIR ACTION:...

  5. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    30 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 25, 2012 Recognizing employee and retiree volunteer efforts LOS ALAMOS, NEW...

  6. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  7. THIS TRAINING MODULE IS APPROVED FOR NON-COMMERCIAL USE ONLY. Copyright protected by the University of North Carolina at Chapel Hill, 2013-15

    E-Print Network [OSTI]

    McLaughlin, Richard M.

    THIS TRAINING MODULE IS APPROVED FOR NON-COMMERCIAL USE ONLY. Copyright protected by the University of North Carolina at Chapel Hill, 2013-15 Welcome to the HIPAA, Privacy & Security Training Module #12 health information. This training module addresses the essential elements of maintaining the privacy

  8. Modulated Tool Path Chip Breaking Operation | Y-12 National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass map shines light on77 PAGEMission MissionModelingModified polynomial

  9. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  10. Cloud Security by Max Garvey

    E-Print Network [OSTI]

    Tolmach, Andrew

    Cloud Security Survey by Max Garvey #12;Cloudy Cloud is Cloudy What is the cloud? On Demand Service, performance SECaaS - Cloud hosted security measures Certifications - measurements for cloud security. #12;Cloud Questions If you have $0 security budget, could cloud be a security improvement? Who owns the data

  11. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    research programs. These programs, which include Cyber Security, Pervasive Information TechnologiesComputer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security

  12. Open cycle ocean thermal energy conversion steam control and bypass system

    DOE Patents [OSTI]

    Wittig, J. Michael (West Goshen, PA); Jennings, Stephen J. (Radnor Township, Delaware County, PA)

    1980-01-01

    Two sets of hinged control doors for regulating motive steam flow from an evaporator to a condenser alternatively through a set of turbine blades in a steam bypass around the turbine blades. The evaporator has a toroidal shaped casing situated about the turbine's vertical axis of rotation and an outlet opening therein for discharging motive steam into an annular steam flow path defined between the turbine's radially inner and outer casing structures. The turbine blades extend across the steam flow path intermediate the evaporator and condenser. The first set of control doors is arranged to prevent steam access to the upstream side of the turbine blades and the second set of control doors acts as a bypass around the blades so as to maintain equilibrium between the evaporator and condenser during non-rotation of the turbine. The first set of control doors preferably extend, when closed, between the evaporator casing and the turbine's outer casing and, when open, extend away from the axis of rotation. The second set of control doors preferably constitute a portion of the turbine's outer casing downstream from the blades when closed and extend, when open, toward the axis of rotation. The first and second sets of control doors are normally held in the open and closed positions respectively by locking pins which may be retracted upon detecting an abnormal operating condition respectively to permit their closing and opening and provide steam flow from the evaporator to the condenser.

  13. 2014 Headquarters Facilities Master Security Plan- Chapter 1, Physical Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

  14. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Environmental Management (EM)

    be completed each year by all those who hold a security clearance; and the Security Termination Briefing, which is conducted when a person no longer requires a security clearance....

  15. The Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure Computing Corporation

    E-Print Network [OSTI]

    Andersen, Dave

    Computing Corporation Stephen Smalley, Peter Loscocco National Security Agency Mike Hibler, David AndersenThe Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure be flexible in their support for security policies, providing sufficient mechanisms for supporting the wide

  16. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not findGeoscience/EnvironmentGlobal Security Global Security We

  17. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Exchange of Information Develop security tools that: · Integrate information from different communication channels · Provide flexible reporting (reports adapted to the recipient) · Communicate security information Security practitioners perform many activities: · Information exchanged in different formats across

  18. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Cases Security Cases RSS June 19, 2015 PSH-15-0011 - In the Matter of Personnel Security Hearing On June 19, 2015, an OHA Administrative Judge (AJ) issued a decision in...

  19. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    Computer Security Incident Handling Guide Recommendationsof the National Institute of Standards Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD Tom Millar United States Computer Emergency Readiness Team National Cyber Security Division

  20. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  1. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  2. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Ensuring the Safe Containment

  3. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear

  4. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  5. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1.

  6. CIOs Uncensored: Security Smarts.

    SciTech Connect (OSTI)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNL’s “defense in depth” approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability – and your last line of defense.

  7. Engineering secure software 

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01

    -the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar...

  8. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  9. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W the computational, physics

  10. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  11. Bracket for photovoltaic modules

    DOE Patents [OSTI]

    Ciasulli, John; Jones, Jason

    2014-06-24

    Brackets for photovoltaic ("PV") modules are described. In one embodiment, a saddle bracket has a mounting surface to support one or more PV modules over a tube, a gusset coupled to the mounting surface, and a mounting feature coupled to the gusset to couple to the tube. The gusset can have a first leg and a second leg extending at an angle relative to the mounting surface. Saddle brackets can be coupled to a torque tube at predetermined locations. PV modules can be coupled to the saddle brackets. The mounting feature can be coupled to the first gusset and configured to stand the one or more PV modules off the tube.

  12. Module No: 410336Personal Statutes for Non-Module Title

    E-Print Network [OSTI]

    Module No: 410336Personal Statutes for Non- Muslims Module Title: Co-requisite:Introduction of Islamic Jurisprudence Pre-requisite: Module Type: specialization requirementModule level: Third Year Academic rank Module coordinator 307384Assistant Professor Dr. Fuad Sartawi ResearchTutorial Guidance

  13. Module No: 410319Copyrights and Neighboring Module Title

    E-Print Network [OSTI]

    Module No: 410319Copyrights and Neighboring Rights Module Title: Co-requisite:Effects of ObligationsPre-requisite: Module Type: specialization elective requirementModule level: Third Year Evening Academic rank Module coordinator e-bataineh@philadelphia.edu.joAssistant Professor Dr. Iyad Bataineh

  14. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  15. Secure Virtualization with Formal Methods

    E-Print Network [OSTI]

    Sturton, Cynthia

    2013-01-01

    cloud computing, virtualization software has a variety of security-cloud computing, researchers have proposed using system virtualization software as a platform to increase the security

  16. Program Areas | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program Areas image Oak Ridge National Laboratory (ORNL) has a robust...

  17. Office of Secure Transportation Activities

    Office of Environmental Management (EM)

    6th, 2012 WIPP Knoxville, TN OFFICE OF SECURE TRANSPORTATION Agency Integration Briefing Our Mission To provide safe and secure ground and air transportation of nuclear weapons,...

  18. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Activities Transportation Security Rulemaking Activities at the U.S. Nuclear Regulatory Commission NRC Transportation Security (Part 73 SNF Update and Part 37 Category 1...

  19. National Nuclear Security Administration Overview

    Office of Environmental Management (EM)

    May 11, 2011 Ahmad Al-Daouk Manager, National Security Department (NSD) National Nuclear Security Administration (NNSA) Service Center - Albuquerque, NM May 11, 2011 - Page 2...

  20. U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication...

    Broader source: Energy.gov (indexed) [DOE]

    McAfee Email Gateway (MEG) 7.0.0 and 7.0.1 (MEG 6.7.x is NOT affected.) McAfee Email and Web Security (EWS) 5.6 Patch 3 and earlier McAfee Email and Web Security (EWS) 5.5 Patch 6...

  1. A High Bandwidth, Bypass, Transient-Mode SigmaDelta DCDC Switching Boost Regulator with Wide LC Compliance

    E-Print Network [OSTI]

    Rincon-Mora, Gabriel A.

    compensation circuit. However, sliding-mode boost DC-DC converters designed to tolerate wide LC variations proposes a switching boost converter with a high bandwidth, bypass, path that yields fast transient of boost converters [2] and the resulting instability, the above requirement is more pronounced

  2. Multi-Objective Analysis for Ecosystem Reconciliation on an Engineered Floodplain: The Yolo Bypass in California's Central Valley

    E-Print Network [OSTI]

    Pasternack, Gregory B.

    by restoring natural hydrologic and successional processes. However levees, dams, and development prevent-exist. Flood control bypasses are a particularly promising location for reconciling historical fish and bird-objective optimization to help planners choose management options that best improve habitat quality for fish and birds

  3. CFD Analysis of Core Bypass Flow and Crossflow in the Prismatic Very High Temperature Gas-cooled Nuclear Reactor 

    E-Print Network [OSTI]

    Wang, Huhu 1985-

    2012-12-13

    effect. The bypass flow occurs when the coolant flow into gaps between fuel blocks. These gaps are formed as a result of carbon expansion and shrinkage induced by radiations and manufacturing and installation errors. Hot spots may appear in the core...

  4. V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution...

    Office of Environmental Management (EM)

    Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code...

  5. Approved Module Information for PD2003, 2014/5 Module Title/Name: Engineering Principles 2 Module Code: PD2003

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for PD2003, 2014/5 Module Title/Name: Engineering Principles 2 Module Code: PD2003 School: Engineering and Applied Science Module Type: Standard Module New Module? No Module? No Module Dependancies Pre-requisites: Engineering Principles (PD1803). Co-requisites: None Specified Module

  6. Approved Module Information for BF2210, 2014/5 Module Title/Name: Making Managerial Decisions Module Code: BF2210

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for BF2210, 2014/5 Module Title/Name: Making Managerial Decisions Module Code: BF2210 School: Aston Business School Module Type: Standard Module New Module? No Module Credits: 20 Module Management Information Module Leader Name Florian Gebreiter Email Address gebreif1

  7. Approved Module Information for LPM040, 2014/5 Module Title/Name: Rethinking European Integration Module Code: LPM040

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for LPM040, 2014/5 Module Title/Name: Rethinking European Integration Module Code: LPM040 School: Languages and Social Sciences Module Type: Standard Module New Module? Yes Module Credits: 20 Module Management Information Module Leader Name Nathaniel Copsey Email Address n

  8. Approved Module Information for LEM039, 2014/5 Module Title/Name: Grammar Module Code: LEM039

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for LEM039, 2014/5 Module Title/Name: Grammar Module Code: LEM039 School: Languages and Social Sciences Module Type: Standard Module New Module? Not Specified Module Credits: 20 Module Management Information Module Leader Name Urszula Clark Email Address u

  9. Approved Module Information for LS3006, 2014/5 Module Title/Name: Hispanic Film Module Code: LS3006

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for LS3006, 2014/5 Module Title/Name: Hispanic Film Module Code: LS3006 School: Languages and Social Sciences Module Type: Standard Module New Module? Not Specified Module Credits: 10 Module Management Information Module Leader Name Raquel Medina Email Address r

  10. Approved Module Information for LT2102, 2014/5 Module Title/Name: Inventory Control Module Code: LT2102

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for LT2102, 2014/5 Module Title/Name: Inventory Control Module Code: LT2102 School: Engineering and Applied Science Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name James Stone Email Address j

  11. Approved Module Information for PY2217, 2014/5 Module Title/Name: Personality Practical (JH) Module Code: PY2217

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for PY2217, 2014/5 Module Title/Name: Personality Practical (JH) Module Code: PY2217 School: Life and Health Sciences Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name Ed Walford Email Address e

  12. Approved Module Information for BS3347, 2014/5 Module Title/Name: Economics of Entrepreneurship Module Code: BS3347

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for BS3347, 2014/5 Module Title/Name: Economics of Entrepreneurship Module Code: BS3347 School: Aston Business School Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name Anna Rebmann Email Address rebmanna

  13. Approved Module Information for PY3351, 2014/5 Module Title/Name: Child Development Module Code: PY3351

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for PY3351, 2014/5 Module Title/Name: Child Development Module Code: PY3351 School: Life and Health Sciences Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name Claire Farrow Email Address farrowc

  14. Approved Module Information for CE2110, 2014/5 Module Title/Name: Process Laboratory Module Code: CE2110

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for CE2110, 2014/5 Module Title/Name: Process Laboratory Module Code: CE2110 School: Engineering and Applied Science Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name John Brammer Email Address brammejg

  15. Approved Module Information for LK2004, 2014/5 Module Title/Name: Global Society Module Code: LK2004

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for LK2004, 2014/5 Module Title/Name: Global Society Module Code: LK2004 School: Languages and Social Sciences Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name Demelza Jones Email Address jonesd4@aston

  16. Approved Module Information for CH3117, 2014/5 Module Title/Name: Literature Research Project Module Code: CH3117

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for CH3117, 2014/5 Module Title/Name: Literature Research Project Module Code: CH3117 School: Engineering and Applied Science Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name Andrew James Sutherland Email Address

  17. Approved Module Information for LE1008, 2014/5 Module Title/Name: Grammar & Meaning Module Code: LE1008

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for LE1008, 2014/5 Module Title/Name: Grammar & Meaning Module Code: LE1008 School: Languages and Social Sciences Module Type: Standard Module New Module? Not Specified Module Credits: 10 Module Management Information Module Leader Name Jack Grieve Email Address grievej1

  18. Approved Module Information for BN3385, 2014/5 Module Title/Name: Effective Project Delivery Module Code: BN3385

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for BN3385, 2014/5 Module Title/Name: Effective Project Delivery Module Code: BN3385 School: Aston Business School Module Type: Standard Module New Module? No Module Credits: 20 Module Management Information Module Leader Name Panagiotis Petridis Email Address petridip

  19. Approved Module Information for BS1163, 2014/5 Module Title/Name: Introduction to Microeconomics Module Code: BS1163

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for BS1163, 2014/5 Module Title/Name: Introduction to Microeconomics Module Code: BS1163 School: Aston Business School Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name David Morris Email Address morrisd5@aston

  20. Approved Module Information for LEM016, 2014/5 Module Title/Name: Methodology Module Code: LEM016

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for LEM016, 2014/5 Module Title/Name: Methodology Module Code: LEM016 School: Languages and Social Sciences Module Type: Standard Module New Module? No Module Credits: 20 Module Management Information Module Leader Name Muna Morris-Adams Email Address adamsmm

  1. Approved Module Information for BF2251, 2014/5 Module Title/Name: Financial Management Module Code: BF2251

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for BF2251, 2014/5 Module Title/Name: Financial Management Module Code: BF2251 School: Aston Business School Module Type: Standard Module New Module? No Module Credits: 20 Module Management Information Module Leader Name Colin Chapman Email Address chapmac1@aston

  2. Approved Module Information for LT2315, 2014/5 Module Title/Name: Rail Transport Module Code: LT2315

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for LT2315, 2014/5 Module Title/Name: Rail Transport Module Code: LT2315 School: Engineering and Applied Science Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name P Connor Email Address connorp

  3. Approved Module Information for ME2018, 2014/5 Module Title/Name: Quality Engineering Module Code: ME2018

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for ME2018, 2014/5 Module Title/Name: Quality Engineering Module Code: ME2018 School: Engineering and Applied Science Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name David Upton Email Address uptondp

  4. Approved Module Information for LI2008, 2014/5 Module Title/Name: Communication across Cultures Module Code: LI2008

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for LI2008, 2014/5 Module Title/Name: Communication across Cultures Module Code: LI2008 School: Languages and Social Sciences Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name Olga Castro Email Address o

  5. Approved Module Information for CE4018, 2014/5 Module Title/Name: Advanced Particle Processing Module Code: CE4018

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for CE4018, 2014/5 Module Title/Name: Advanced Particle Processing Module Code: CE4018 School: Engineering and Applied Science Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name Mark Leaper Email Address m

  6. Approved Module Information for SE4031, 2014/5 Module Title/Name: Extended Integrative Option Module Code: SE4031

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for SE4031, 2014/5 Module Title/Name: Extended Integrative Option Module Code: SE4031 School: Engineering and Applied Science Module Type: Standard Module New Module? No Module Credits: 30 Module Management Information Module Leader Name Trevor Oliver Email Address t

  7. Approved Module Information for LT1312, 2014/5 Module Title/Name: Literature Review Project Module Code: LT1312

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for LT1312, 2014/5 Module Title/Name: Literature Review Project Module Code: LT1312 School: Engineering and Applied Science Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name David Carpenter Email Address d

  8. Approved Module Information for LS2017, 2014/5 Module Title/Name: Contemporary Latin America Module Code: LS2017

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for LS2017, 2014/5 Module Title/Name: Contemporary Latin America Module Code: LS2017 School: Languages and Social Sciences Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name Stephanie Panichelli-Batalla Email Address

  9. Approved Module Information for CE3013, 2014/5 Module Title/Name: Particle Processing Module Code: CE3013

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for CE3013, 2014/5 Module Title/Name: Particle Processing Module Code: CE3013 School: Engineering and Applied Science Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name Mark Leaper Email Address m

  10. Approved Module Information for LE2057, 2014/5 Module Title/Name: Computer Mediated Communication Module Code: LE2057

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for LE2057, 2014/5 Module Title/Name: Computer Mediated Communication Module Code: LE2057 School: Languages and Social Sciences Module Type: Standard Module New Module? Not Specified Module Credits: 20 Module Management Information Module Leader Name Nur Hooton Email Address n

  11. Approved Module Information for BS3325, 2014/5 Module Title/Name: Competition Policy -Theory Module Code: BS3325

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for BS3325, 2014/5 Module Title/Name: Competition Policy - Theory Module Code: BS3325 School: Aston Business School Module Type: Standard Module New Module? Yes Module Credits: 10 Module Management Information Module Leader Name Matt Olczak Email Address olczakm

  12. Approved Module Information for BL1179, 2014/5 Module Title/Name: Accounting for Law Module Code: BL1179

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for BL1179, 2014/5 Module Title/Name: Accounting for Law Module Code: BL1179 School: Aston Business School Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name Angela Stanhope Email Address a

  13. Approved Module Information for BFM120, 2014/5 Module Title/Name: Investment Management Module Code: BFM120

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for BFM120, 2014/5 Module Title/Name: Investment Management Module Code: BFM120 School: Aston Business School Module Type: Standard Module New Module? No Module Credits: 15 Module Management Information Module Leader Name Colin Chapman Email Address chapmac1@aston

  14. Approved Module Information for PY2216, 2014/5 Module Title/Name: Neuroscience Practicals Module Code: PY2216

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for PY2216, 2014/5 Module Title/Name: Neuroscience Practicals Module Code: PY2216 School: Life and Health Sciences Module Type: Standard Module New Module? Yes Module Credits: 10 Module Management Information Module Leader Name Ed Walford Email Address e

  15. Approved Module Information for BHM348, 2014/5 Module Title/Name: Employee Relations & Counselling Module Code: BHM348

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for BHM348, 2014/5 Module Title/Name: Employee Relations & Counselling Module Code: BHM348 School: Aston Business School Module Type: Standard Module New Module? No Module Credits: 15 Module Management Information Module Leader Name M Carter Email Address cartermr

  16. Approved Module Information for LT1307, 2014/5 Module Title/Name: Principles of Economics Module Code: LT1307

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for LT1307, 2014/5 Module Title/Name: Principles of Economics Module Code: LT1307 School: Engineering and Applied Science Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name David Carpenter Email Address d

  17. Approved Module Information for ME2050, 2014/5 Module Title/Name: Dynamics and Control Module Code: ME2050

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for ME2050, 2014/5 Module Title/Name: Dynamics and Control Module Code: ME2050 School: Engineering and Applied Science Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name Xianghong Ma Email Address max

  18. Approved Module Information for BHM328, 2014/5 Module Title/Name: Strategic Business Sustainability Module Code: BHM328

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for BHM328, 2014/5 Module Title/Name: Strategic Business Sustainability Module Code: BHM328 School: Aston Business School Module Type: Standard Module New Module? No Module Credits: 15 Module Management Information Module Leader Name H Borland Email Address borlanhm

  19. Approved Module Information for BF2244, 2014/5 Module Title/Name: Strategic Finance Module Code: BF2244

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for BF2244, 2014/5 Module Title/Name: Strategic Finance Module Code: BF2244 School: Aston Business School Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name Colin Chapman Email Address chapmac1@aston

  20. Approved Module Information for CE3102, 2014/5 Module Title/Name: Reaction Engineering Module Code: CE3102

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for CE3102, 2014/5 Module Title/Name: Reaction Engineering Module Code: CE3102 School: Engineering and Applied Science Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name Feroz Kabir Email Address kabirf

  1. Approved Module Information for LE2053, 2014/5 Module Title/Name: Variations of English Module Code: LE2053

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for LE2053, 2014/5 Module Title/Name: Variations of English Module Code: LE2053 School: Languages and Social Sciences Module Type: Standard Module New Module? Not Specified Module Credits: 20 Module Management Information Module Leader Name Jack Grieve Email Address grievej1

  2. Approved Module Information for BF3314, 2014/5 Module Title/Name: Derivatives Module Code: BF3314

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for BF3314, 2014/5 Module Title/Name: Derivatives Module Code: BF3314 School: Aston Business School Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name Winifred Huang-Meier Email Address w

  3. Approved Module Information for PY3472, 2014/5 Module Title/Name: Autistic Spectrum Module Code: PY3472

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for PY3472, 2014/5 Module Title/Name: Autistic Spectrum Module Code: PY3472 School: Life and Health Sciences Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name Gina Rippon Email Address rippong@aston.ac.uk Telephone

  4. Approved Module Information for CE3112, 2014/5 Module Title/Name: Nanomaterials Module Code: CE3112

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for CE3112, 2014/5 Module Title/Name: Nanomaterials Module Code: CE3112 School: Engineering and Applied Science Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name Qingchun Yuan Email Address q.yuan@aston.ac.uk Telephone

  5. Approved Module Information for CE1002, 2014/5 Module Title/Name: Design and Build Module Code: CE1002

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for CE1002, 2014/5 Module Title/Name: Design and Build Module Code: CE1002 School: Engineering and Applied Science Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name Paul Andrew Tack Email Address tackpa

  6. Approved Module Information for LG2018, 2014/5 Module Title/Name: Metropolis Berlin Module Code: LG2018

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for LG2018, 2014/5 Module Title/Name: Metropolis Berlin Module Code: LG2018 School: Languages and Social Sciences Module Type: Standard Module New Module? Not Specified Module Credits: 10 Module Management Information Module Leader Name Uwe Schütte Email Address u

  7. Approved Module Information for PD2002, 2014/5 Module Title/Name: Commercial Practice Module Code: PD2002

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for PD2002, 2014/5 Module Title/Name: Commercial Practice Module Code: PD2002 School: Engineering and Applied Science Module Type: Standard Module New Module? No Module Credits: 20 Module Management Information Module Leader Name Jon Hewitt Email Address Not Specified

  8. Approved Module Information for BN2290, 2014/5 Module Title/Name: Operational Research Techniques Module Code: BN2290

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for BN2290, 2014/5 Module Title/Name: Operational Research Techniques Module Code: BN2290 School: Aston Business School Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name Ozren Despic Email Address o

  9. Approved Module Information for LT1319, 2014/5 Module Title/Name: Air Transport Module Code: LT1319

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for LT1319, 2014/5 Module Title/Name: Air Transport Module Code: LT1319 School: Engineering and Applied Science Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name James Stone Email Address j.stone@aston.ac.uk Telephone

  10. Encapsulation of High Temperature Thermoelectric Modules | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Encapsulation of High Temperature Thermoelectric Modules Encapsulation of High Temperature Thermoelectric Modules Presents concept for hermetic encapsulation of TE modules...

  11. Membrane module assembly

    DOE Patents [OSTI]

    Kaschemekat, J.

    1994-03-15

    A membrane module assembly is described which is adapted to provide a flow path for the incoming feed stream that forces it into prolonged heat-exchanging contact with a heating or cooling mechanism. Membrane separation processes employing the module assembly are also disclosed. The assembly is particularly useful for gas separation or pervaporation. 2 figures.

  12. Membrane module assembly

    DOE Patents [OSTI]

    Kaschemekat, Jurgen (Palo Alto, CA)

    1994-01-01

    A membrane module assembly adapted to provide a flow path for the incoming feed stream that forces it into prolonged heat-exchanging contact with a heating or cooling mechanism. Membrane separation processes employing the module assembly are also disclosed. The assembly is particularly useful for gas separation or pervaporation.

  13. Module Safety Issues (Presentation)

    SciTech Connect (OSTI)

    Wohlgemuth, J.

    2012-02-01

    Description of how to make PV modules so that they are less likely to turn into safety hazards. Making modules inherently safer with minimum additional cost is the preferred approach for PV. Safety starts with module design to ensure redundancy within the electrical circuitry to minimize open circuits and proper mounting instructions to prevent installation related ground faults. Module manufacturers must control the raw materials and processes to ensure that that every module is built like those qualified through the safety tests. This is the reason behind the QA task force effort to develop a 'Guideline for PV Module Manufacturing QA'. Periodic accelerated stress testing of production products is critical to validate the safety of the product. Combining safer PV modules with better systems designs is the ultimate goal. This should be especially true for PV arrays on buildings. Use of lower voltage dc circuits - AC modules, DC-DC converters. Use of arc detectors and interrupters to detect arcs and open the circuits to extinguish the arcs.

  14. Module Handbook Fernstudium

    E-Print Network [OSTI]

    Berns, Karsten

    Module Handbook Fernstudium postgradual Nanotechnology (Master of Science) Infineon Technology, Munich Distance studies postgraduate #12;Module name Fundamentals of Quantum Mechanics Lecturer apl. Prof is to present the fundamental concepts of quantum physics in a way that a clear understanding of the theoretical

  15. On Building Secure SCADA Systems using Security Eduardo B. Fernandez

    E-Print Network [OSTI]

    Wu, Jie

    On Building Secure SCADA Systems using Security Patterns Eduardo B. Fernandez Dept. of Comp. Sci, also known as the supervisory, control, and data acquisition (SCADA) system. On the other hand systems. This paper aims to propose methods to build a secure SCADA system using security patterns

  16. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  17. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  18. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu Dept. of Computer Science Institute for Cyber Security University of Texas at San Antonio Email: ravi.sandhu@utsa.edu Ram Krishnan Dept. of Electrical and Computer Engineering Institute for Cyber Security University

  19. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio June 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  20. 1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE

    E-Print Network [OSTI]

    Upadhyaya, Shambhu

    , there are 100+ centers ­ Based on curriculum mapping to CNSS (committee of National Security Standards) 4011 at Google (2010) · Threats to national security ­ Insider attacks ­ Examples: Bradley Manning leaked1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE Professor S. Upadhyaya Department

  1. A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY

    E-Print Network [OSTI]

    Sussex, University of

    EN A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY Brussels, 12 December 2003 #12;1 EN's complex problems on its own Introduction Europe has never been so prosperous, so secure nor so free problems on its own. Europe still faces security threats and challenges. The outbreak of conflict

  2. Particle Image Velocimetry Measurements and Analysis of Bypass Data for a Scaled 6mm Gap

    SciTech Connect (OSTI)

    J.R. Wolf; T.E. Conder; R.R. Schultz

    2012-09-01

    The purpose of the fluid dynamics experiments in the MIR (Matched Index of-Refraction) flow system at Idaho National Laboratory (INL) is to develop benchmark databases for the assessment of Computational Fluid Dynamics (CFD) solutions of the momentum equations, scalar mixing, and turbulence models for the flow ratios between coolant channels and bypass gaps in the interstitial regions of typical prismatic standard fuel element (SFE) or upper reflector block geometries of typical Modular High-temperature Gas-cooled Reactors (MHTGR) in the limiting case of negligible buoyancy and constant fluid properties. The experiments will use optical techniques, primarily particle image velocimetry (PIV) in the INL Matched Index of Refraction (MIR) flow system.

  3. A preliminary assessment of beryllium dust oxidation during a wet bypass accident in a fusion reactor

    SciTech Connect (OSTI)

    Brad J. Merrill; Richard L. Moore; J. Phillip Sharp

    2008-09-01

    A beryllium dust oxidation model has been developed at the Idaho National Laboratory (INL) by the Fusion Safety Program (FSP) for the MELCOR safety computer code. The purpose of this model is to investigate hydrogen production from beryllium dust layers on hot surfaces inside a fusion reactor vacuum vessel (VV) during in-vessel loss-of-cooling accidents (LOCAs). This beryllium dust oxidation model accounts for the diffusion of steam into a beryllium dust layer, the oxidation of the dust particles inside this layer based on the beryllium-steam oxidation equations developed at the INL, and the effective thermal conductivity of this beryllium dust layer. This paper details this oxidation model and presents the results of the application of this model to a wet bypass accident scenario in the ITER device.

  4. SecuritySmart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity SecuritySecuritySmart

  5. Photovoltaic module and interlocked stack of photovoltaic modules

    DOE Patents [OSTI]

    Wares, Brian S.

    2014-09-02

    One embodiment relates to an arrangement of photovoltaic modules configured for transportation. The arrangement includes a plurality of photovoltaic modules, each photovoltaic module including a frame. A plurality of individual male alignment features and a plurality of individual female alignment features are included on each frame. Adjacent photovoltaic modules are interlocked by multiple individual male alignment features on a first module of the adjacent photovoltaic modules fitting into and being surrounded by corresponding individual female alignment features on a second module of the adjacent photovoltaic modules. Other embodiments, features and aspects are also disclosed.

  6. 2014 Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

  7. 2014 Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

  8. BROADER National Security Missions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Metal Chips (U) Uranium Trioxide (UO 3 ) UO 2 (NO 3 ) 2 Ur anyl Nitrate Ammonium Uranyl Carbonate (NH 4 ) 2 UO 2 (CO 3 ) 4 DEVELOP NEW NATIONAL SECURITY MISSIONS Y-12 has...

  9. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  10. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  11. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  12. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  13. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  14. Policy Paper 35: Energy and Security in Northeast Asia: Fueling Security

    E-Print Network [OSTI]

    Calder, Kent; Fesharaki, Fereidun; Shirk, Susan L.; Stankiewicz, Michael

    1998-01-01

    Deese (editors). Energy and Security. 3. Fereidun Fesharaki,Energy and Security in Northeast Asia: Fueling Security Anrising energy demand. Energy and Security in Northeast Asia

  15. Secure Quantum Key Distribution

    E-Print Network [OSTI]

    Hoi-Kwong Lo; Marcos Curty; Kiyoshi Tamaki

    2015-05-20

    Secure communication plays a crucial role in the Internet Age. Quantum mechanics may revolutionise cryptography as we know it today. In this Review Article, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After a brief introduction to recent experimental progress and challenges, we survey the latest developments in quantum hacking and counter-measures against it.

  16. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  17. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  18. Module bay with directed flow

    SciTech Connect (OSTI)

    Torczynski, John R. (Albuquerque, NM)

    2001-02-27

    A module bay requires less cleanroom airflow. A shaped gas inlet passage can allow cleanroom air into the module bay with flow velocity preferentially directed toward contaminant rich portions of a processing module in the module bay. Preferential gas flow direction can more efficiently purge contaminants from appropriate portions of the module bay, allowing a reduced cleanroom air flow rate for contaminant removal. A shelf extending from an air inlet slit in one wall of a module bay can direct air flowing therethrough toward contaminant-rich portions of the module bay, such as a junction between a lid and base of a processing module.

  19. Security systems engineering overview

    SciTech Connect (OSTI)

    Steele, B.J.

    1996-12-31

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

  20. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  1. Water heater control module

    DOE Patents [OSTI]

    Hammerstrom, Donald J

    2013-11-26

    An advanced electric water heater control system that interfaces with a high temperature cut-off thermostat and an upper regulating thermostat. The system includes a control module that is electrically connected to the high-temperature cut-off thermostat and the upper regulating thermostat. The control module includes a switch to open or close the high-temperature cut-off thermostat and the upper regulating thermostat. The control module further includes circuitry configured to control said switch in response to a signal selected from the group of an autonomous signal, a communicated signal, and combinations thereof.

  2. Sonication standard laboratory module

    DOE Patents [OSTI]

    Beugelsdijk, Tony (Los Alamos, NM); Hollen, Robert M. (Los Alamos, NM); Erkkila, Tracy H. (Los Alamos, NM); Bronisz, Lawrence E. (Los Alamos, NM); Roybal, Jeffrey E. (Santa Fe, NM); Clark, Michael Leon (Menan, ID)

    1999-01-01

    A standard laboratory module for automatically producing a solution of cominants from a soil sample. A sonication tip agitates a solution containing the soil sample in a beaker while a stepper motor rotates the sample. An aspirator tube, connected to a vacuum, draws the upper layer of solution from the beaker through a filter and into another beaker. This beaker can thereafter be removed for analysis of the solution. The standard laboratory module encloses an embedded controller providing process control, status feedback information and maintenance procedures for the equipment and operations within the standard laboratory module.

  3. Modulated curvaton decay

    SciTech Connect (OSTI)

    Assadullahi, Hooshyar; Wands, David [Institute of Cosmology and Gravitation, University of Portsmouth, Dennis Sciama Building, Burnaby Road, Portsmouth PO1 3FX (United Kingdom); Firouzjahi, Hassan [School of Astronomy, Institute for Research in Fundamental Sciences (IPM), P. O. Box 19395-5531, Tehran (Iran, Islamic Republic of); Namjoo, Mohammad Hossein, E-mail: hooshyar.assadullahi@port.ac.uk, E-mail: firouz@mail.ipm.ir, E-mail: mh.namjoo@mail.ipm.ir, E-mail: david.wands@port.ac.uk [Yukawa Institute for theoretical Physics, Kyoto University, Kyoto 606-8502 (Japan)

    2013-03-01

    We study primordial density perturbations generated by the late decay of a curvaton field whose decay rate may be modulated by the local value of another isocurvature field, analogous to models of modulated reheating at the end of inflation. We calculate the primordial density perturbation and its local-type non-Gaussianity using the sudden-decay approximation for the curvaton field, recovering standard curvaton and modulated reheating results as limiting cases. We verify the Suyama-Yamaguchi inequality between bispectrum and trispectrum parameters for the primordial density field generated by multiple field fluctuations, and find conditions for the bound to be saturated.

  4. Approved Module Information for CS2020, 2014/5 Module Title/Name: Software Engineering Module Code: CS2020

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for CS2020, 2014/5 Module Title/Name: Software Engineering Module Code: CS2020 School: Engineering and Applied Science Module Type: Standard Module New Module? No Module Electronic Engineering and Computer Science. Available to Exchange Students? Yes Module Dependancies Pre

  5. Approved Module Information for BMM645, 2014/5 Module Title/Name: International Marketing Management Module Code: BMM645

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Management Module Code: BMM645 School: Aston Business School Module Type: Standard Module New Module? No Module Credits: 15 Module Management Information Module Leader Name Aarti Sood Email Address a.sood3 are expected to attend lectures and seminars as well as to take part in classroom discussions. The module

  6. Module Title: Project Module Code: OPTO6005

    E-Print Network [OSTI]

    Molinari, Marc

    Ibsen, Dr Ping Hua, Prof James Wilkinson Contact (email ID) sm@orc.soton.ac.uk, mi@orc.soton.ac.uk, ph2@orc.soton.ac.uk, jsw@orc.soton.ac.uk Is the module subject to external accreditation? No If yes and optical labs of the ORC 3. Train in technical and hands-on research skills to gain technical insight

  7. Module No: 410121Introduction to Commercial Module Title

    E-Print Network [OSTI]

    Module No: 410121Introduction to Commercial Law Module Title: Co-requisite: Commercial Papers/ Companies and Bankruptcy/International Trade Law- Maritime Law Introduction to LawPre-requisite: Module Type: department prerequisiteModule level: First year Evening StudyDaytime StudyCredit Hours: 3 Credit Hours

  8. Approved Module Information for BF3358, 2014/5 Module Title/Name: Investments Module Code: BF3358

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    School: Aston Business School Module Type: Standard Module New Module? No Module Credits: 10 Module learned how to measure the performance of an investment strategy. ? Transferable Skill ? have conducted performance measurement Portfolio return measurement. Risk adjusted performance measures. Attribution analysis

  9. GREET Pretreatment Module

    SciTech Connect (OSTI)

    Adom, Felix K.; Dunn, Jennifer B.; Han, Jeongwoo

    2014-09-01

    A wide range of biofuels and biochemicals can be produced from biomass via different pretreatment technologies that yield sugars. This report documents the material and energy flows that occur when fermentable sugars from four lignocellulosic feedstocks (corn stover, miscanthus, switchgrass, and poplar) are produced via dilute acid pretreatment and ammonia fiber expansion. These flows are documented for inclusion in the pretreatment module of the Greenhouses Gases, Regulated Emissions, and Energy Use in Transportation (GREET) model. Process simulations of each pretreatment technology were developed in Aspen Plus. Material and energy consumption data from Aspen Plus were then compiled in the GREET pretreatment module. The module estimates the cradle-to-gate fossil energy consumption (FEC) and greenhouse gas (GHG) emissions associated with producing fermentable sugars. This report documents the data and methodology used to develop this module and the cradle-to-gate FEC and GHG emissions that result from producing fermentable sugars.

  10. Digital optical conversion module

    DOE Patents [OSTI]

    Kotter, D.K.; Rankin, R.A.

    1988-07-19

    A digital optical conversion module used to convert an analog signal to a computer compatible digital signal including a voltage-to-frequency converter, frequency offset response circuitry, and an electrical-to-optical converter. Also used in conjunction with the digital optical conversion module is an optical link and an interface at the computer for converting the optical signal back to an electrical signal. Suitable for use in hostile environments having high levels of electromagnetic interference, the conversion module retains high resolution of the analog signal while eliminating the potential for errors due to noise and interference. The module can be used to link analog output scientific equipment such as an electrometer used with a mass spectrometer to a computer. 2 figs.

  11. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  12. A flexible framework for secure and efficient program obfuscation.

    SciTech Connect (OSTI)

    Solis, John Hector

    2013-03-01

    In this paper, we present a modular framework for constructing a secure and efficient program obfuscation scheme. Our approach, inspired by the obfuscation with respect to oracle machines model of [4], retains an interactive online protocol with an oracle, but relaxes the original computational and storage restrictions. We argue this is reasonable given the computational resources of modern personal devices. Furthermore, we relax the information-theoretic security requirement for computational security to utilize established cryptographic primitives. With this additional flexibility we are free to explore different cryptographic buildingblocks. Our approach combines authenticated encryption with private information retrieval to construct a secure program obfuscation framework. We give a formal specification of our framework, based on desired functionality and security properties, and provide an example instantiation. In particular, we implement AES in Galois/Counter Mode for authenticated encryption and the Gentry-Ramzan [13]constant communication-rate private information retrieval scheme. We present our implementation results and show that non-trivial sized programs can be realized, but scalability is quickly limited by computational overhead. Finally, we include a discussion on security considerations when instantiating specific modules.

  13. Photovoltaic module reliability workshop

    SciTech Connect (OSTI)

    Mrig, L. (ed.)

    1990-01-01

    The paper and presentations compiled in this volume form the Proceedings of the fourth in a series of Workshops sponsored by Solar Energy Research Institute (SERI/DOE) under the general theme of photovoltaic module reliability during the period 1986--1990. The reliability Photo Voltaic (PV) modules/systems is exceedingly important along with the initial cost and efficiency of modules if the PV technology has to make a major impact in the power generation market, and for it to compete with the conventional electricity producing technologies. The reliability of photovoltaic modules has progressed significantly in the last few years as evidenced by warranties available on commercial modules of as long as 12 years. However, there is still need for substantial research and testing required to improve module field reliability to levels of 30 years or more. Several small groups of researchers are involved in this research, development, and monitoring activity around the world. In the US, PV manufacturers, DOE laboratories, electric utilities and others are engaged in the photovoltaic reliability research and testing. This group of researchers and others interested in this field were brought together under SERI/DOE sponsorship to exchange the technical knowledge and field experience as related to current information in this important field. The papers presented here reflect this effort.

  14. Unconditionally Secure Quantum Signatures

    E-Print Network [OSTI]

    Ryan Amiri; Erika Andersson

    2015-08-08

    Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols - signatures based on the Rivest-Adleman-Shamir (RSA) algorithm, the digital signature algorithm (DSA), and the elliptic curve digital signature algorithm (ECDSA) - are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally secure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  15. Security analysis of communication system based on the synchronization of different order chaotic systems

    E-Print Network [OSTI]

    G. Alvarez; L. Hernandez; J. Munoz; F. Montoya; Shujun Li

    2005-06-27

    This work analyzes the security weakness of a recently proposed communication method based on chaotic modulation and masking using synchronization of two chaotic systems with different orders. It is shown that its application to secure communication is unsafe, because it can be broken in two different ways, by high-pass filtering and by reduced order system synchronization, without knowing neither the system parameter values nor the system key.

  16. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopment Top Scientific Impact Since its SearchSecurity

  17. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345 UnlimitedSecure

  18. national security campus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReporteeo | National Nuclear Securityhr | Nationalnational security

  19. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorking With U.S. Coal StocksSuppliers Tag: Supplierssecurity Tag: security

  20. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLosThe 26thI D- 6 0 4 2 r m m m m port m fm f mphysical security |

  1. Method of treating emissions of a hybrid vehicle with a hydrocarbon absorber and a catalyst bypass system

    DOE Patents [OSTI]

    Roos, Bryan Nathaniel; Gonze, Eugene V; Santoso, Halim G; Spohn, Brian L

    2014-01-14

    A method of treating emissions from an internal combustion engine of a hybrid vehicle includes directing a flow of air created by the internal combustion engine when the internal combustion engine is spinning but not being fueled through a hydrocarbon absorber to collect hydrocarbons within the flow of air. When the hydrocarbon absorber is full and unable to collect additional hydrocarbons, the flow of air is directed through an electrically heated catalyst to treat the flow of air and remove the hydrocarbons. When the hydrocarbon absorber is not full and able to collect additional hydrocarbons, the flow of air is directed through a bypass path that bypasses the electrically heated catalyst to conserve the thermal energy stored within the electrically heated catalyst.

  2. Thermoelectrics Partnership: Automotive Thermoelectric Modules...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    More Documents & Publications Novel Nanostructured Interface Solution for Automotive Thermoelectric Modules Application Thermoelectrics Partnership: Automotive...

  3. INJECTIVE MODULES FOR UNIFORM ALGEBRAS

    E-Print Network [OSTI]

    White, Michael C.

    of right Banach A-modules as mod-A and the class of Banach A-bimodules as A-mod-A. We shall refer to the module maps in each case as morphisms. Modules will be denoted by upper-case Roman letters, morphisms ), bounded linear maps are denoted by lower-case Roman letters. The assumption that all modules

  4. Approved Module Information for PH2502, 2014/5 Module Title/Name: Pharmaceutical

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for PH2502, 2014/5 Module Title/Name: Pharmaceutical Microbio Credits: 20 Module Management Information Module Leader Name Deborah Lowry Email Address lowryd to Exchange Students? Not Specified Module Learning Information Module Aims: Pharmaceutical Microbiology

  5. Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

    Office of Environmental Management (EM)

    4, Cyber Security Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2015 2015 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security...

  6. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  7. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  8. Securities Class Actions and Bankrupt Companies

    E-Print Network [OSTI]

    Park, James J.

    2014-01-01

    the utility of securities class actions. Certainly, contextthe merit of securities class actions. UCLA | SCHOOL OF LAWof James J. Park, Securities Class Actions and Bankrupt

  9. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  10. Review of digital image security in Dermatology

    E-Print Network [OSTI]

    Nielson, Colton; West, Cameron; Shimizu, Ikue

    2015-01-01

    encrypted communications, cloud security breaches, and phonebreaches in security demonstrate, such cloud storage ofand security rules 22 Audits of CSP data center operations and cloud

  11. Integrated Security System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems architecture Integrated...

  12. Data security on the national fusion grid

    E-Print Network [OSTI]

    Burruss, Justine R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  13. Security on the US Fusion Grid

    E-Print Network [OSTI]

    Burruss, Justin R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  14. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    CERT. (2010, Dec) Technical Cyber Security Alerts. [Online].a broad overview of cyber security incidents in the laststrategic war and viable cyber security solutions should be

  15. Mathematical and Statistical Opportunities in Cyber Security

    E-Print Network [OSTI]

    Meza, Juan

    2009-01-01

    development approach to cyber security. Report submitted to2007. Committee on Improving Cyber- security Research in theOpportunities in Cyber Security ? Juan Meza † Scott

  16. Security and United States Immigration Policy

    E-Print Network [OSTI]

    Totten, Robbie James

    2012-01-01

    2009 [1981]. American National Security, 6th ed. Baltimore,1977. Economic Issues and National Security. Lawrence, KS:Immigration and National Security. Westport, CT: Praeger

  17. Office of Security Assessments | Department of Energy

    Energy Savers [EERE]

    Security Assessments Office of Security Assessments MISSION The Office of Security Assessments is responsible for the independent evaluation of the effectiveness of safeguards and...

  18. Analysis of the optical coupling of wavelength-shifting fibers to organic liquid scintillator filled fluoropolymer tubes for industrial and nuclear security applications

    E-Print Network [OSTI]

    Schools, Chad C

    2014-01-01

    Industrial and nuclear security applications continue to push radiation detection development into new and exciting frontiers. In this work, an innovative detection module is developed and tested for use in a cosmic ray ...

  19. U.S. Department of Energy FreedomCAR & Vehicle Technologies Program Oil Bypass Filter Technology Evaluation Final Report

    SciTech Connect (OSTI)

    L. R. Zirker; J. E. Francfort; J. J. Fielding

    2006-03-01

    This Oil Bypass Filter Technology Evaluation final report documents the feasibility of using oil bypass filters on 17 vehicles in the Idaho National Laboratory (INL) fleet during a 3-year test period. Almost 1.3 million test miles were accumulated, with eleven 4-cycle diesel engine buses accumulating 982,548 test miles and six gasoline-engine Chevrolet Tahoes accumulating 303,172 test miles. Two hundred and forty oil samples, taken at each 12,000-mile bus servicing event and at 3,000 miles for the Tahoes, documented the condition of the engine oils for continued service. Twenty-eight variables were normally tested, including the presence of desired additives and undesired wear metals such as iron and chrome, as well as soot, water, glycol, and fuel. Depending on the assumptions employed, the INL found that oil bypass filter systems for diesel engine buses have a positive payback between 72,000 and 144,000 miles. For the Tahoes, the positive payback was between 66,000 and 69,000 miles.

  20. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Broader source: Energy.gov (indexed) [DOE]

    A vulnerability was reported in Cisco Secure Access Control System. A remote user can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4,...

  1. AUDIT REPORT Security at the Nevada National Security Site

    Broader source: Energy.gov (indexed) [DOE]

    Security at the Nevada National Security Site OAS-L-15-06 May 2015 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections . Department of Energy...

  2. Security Requirements Engineering Support for Security-Annotated Business Processes

    E-Print Network [OSTI]

    Security Requirements Engineering Support for Security-Annotated Business Processes Elda Paja1 that business analysts are not secu- rity experts and assume that this will be bolted on later. Fortunately

  3. Technical Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-09-02

    This order implements the Department of Energy (DOE) Technical Security Program (TSP). This program represents the convergence of two distinct disciplines: Counterintelligence (CI) and Security Countermeasures. The elements of the TSP are driven by national level, interagency programs that are codified in various laws, Executive Orders, national polices and directives. Supersedes DOE M 470.4-4A Chg 1, dated 10-12-2010, Section D – Technical Surveillance Countermeasures (Official Use Only) and classified annex (Secret); and DOE M 205.1-3 (Official Use Only) and Part II (Secret), dated 4-17-2006.

  4. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD |UpdatedSecurity|National

  5. Global Material Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia NationalSecurityNuclear SecurityOfficesPrograms

  6. Approved Module Information for BHM346, 2014/5 Module Title/Name: Organisational Behaviour: Theory &

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for BHM346, 2014/5 Module Title/Name: Organisational Behaviour: Theory & Practice Module Code: BHM346 School: Aston Business School Module Type: Standard Module New Module? No Module Credits: 15 Module Management Information Module Leader Name Yves Guillaume Email Address guilyrf2

  7. Approved Module Information for CE2106, 2014/5 Module Title/Name: Reaction Kinetics & Equilibrium

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for CE2106, 2014/5 Module Title/Name: Reaction Kinetics & Equilibrium Thermodynamics Module Code: CE2106 School: Engineering and Applied Science Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name Mark Leaper Email Address

  8. Approved Module Information for BNM803, 2014/5 Module Title/Name: Developing Business Systems

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for BNM803, 2014/5 Module Title/Name: Developing Business Systems Workshop Module Code: BNM803 School: Aston Business School Module Type: Standard Module New Module? No Module Credits: 15 Module Management Information Module Leader Name Email Address Not Specified Telephone

  9. Secure Storage Architectures

    SciTech Connect (OSTI)

    Aderholdt, Ferrol; Caldwell, Blake A; Hicks, Susan Elaine; Koch, Scott M; Naughton, III, Thomas J; Pogge, James R; Scott, Stephen L; Shipman, Galen M; Sorrillo, Lawrence

    2015-01-01

    The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention on elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to help with this issue, which are a particular instances of the more general challenge of efficient host/guest IO that is the focus of interfaces like virtio. A collection of bridging technologies have been identified in Chapter 4, which can be helpful to overcome the limitations and challenges of supporting efficient storage for secure enclaves. The synthesis of native filesystem security mechanisms and bridging technologies led to an isolation-centric storage architecture that is proposed in Chapter 5, which leverages isolation mechanisms from different layers to facilitate secure storage for an enclave. Recommendations: The following highlights recommendations from the investigations done thus far. - The Lustre filesystem offers excellent performance but does not support some security related features, e.g., encryption, that are included in GPFS. If encryption is of paramount importance, then GPFS may be a more suitable choice. - There are several possible Lustre related enhancements that may provide functionality of use for secure-enclaves. However, since these features are not currently integrated, the use of Lustre as a secure storage system may require more direct involvement (support). (*The network that connects the storage subsystem and users, e.g., Lustre s LNET.) - The use of OpenStack with GPFS will be more streamlined than with Lustre, as there are available drivers for GPFS. - The Manilla project offers Filesystem as a Service for OpenStack and is worth further investigation. Manilla has some support for GPFS. - The proposed Lustre enhancement of Dynamic-LNET should be further investigated to provide more dynamic changes to the storage network which could be used to isolate hosts and their tenants. - The Linux namespaces offer a good solution for creating efficient restrictions to shared HPC filesystems. However, we still need to conduct a thorough round of storage/filesystem benchmarks. - Vendor products should be more closely reviewed, possibly to include evaluation of performance/protection of select products. (Note, we are investigation the opti

  10. SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011

    E-Print Network [OSTI]

    SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011 Choose brands and models of mobile devices that have the options referenced below. Use all available security options that your or sensitive university information in un-approved off-campus services, such as public cloud based services

  11. Wireless Security: Secure and Public Networks Villanova University

    E-Print Network [OSTI]

    36 Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science kory.kirk@villanova.edu www.korykirk.com/ Abstract Due to the increasing amount of wireless, train stations and cafes, there is a need for a wireless protocol that allows public access to secure

  12. Modified two-way protocol for quantum secure direct communication with the presence of channel loss and noise

    E-Print Network [OSTI]

    Jianyong Hu; Bo Yu; Mingyong Jing; Liantuan Xiao; Suotang Jia

    2015-03-02

    Quantum secure direct communication can effectively save the computing resource and improve the communication rate. In this paper, we present a coding scheme based on the single-photons modulation which can perform the two-way protocol for quantum secure direct communication with the presence of channel loss and noise. To the modified two-way protocol, the information bits can only be extracted from a batch of qubits, therefore, the leakage of a few qubits would not cause the leakage of information bits. The security condition, the information bit rate and the security communication distance are discussed.

  13. Integrated reservoir characterization of a Tulare steamflood finds bypassed oil - South Belridge Field, Kern County, California

    SciTech Connect (OSTI)

    Walter, D.R.; Wylie, A.S. Jr.; Broussard, K.A. (Santa Fe Energy Resources, Bakersfield, CA (United States))

    1996-01-01

    Reservoir quality and producibility are directly related to the characteristics of the depositional lithofacies. Electric log gamma ray/resistivity profiles were used to define facies trends within the Tulare steamflood at South Belridge. Channel and non-channel facies profiles are distinctive across the lease with the channel sands having the better quality reservoir and greater net pay values. Sidewall core permeabilities were averaged over the main producing Tulare intervals with the channels averaging 2000-3000 millidarcies and non-channels 200-500 millidarcies. This supports the lithofacies trend and net pay maps. Although the approach is qualitative, it illustrates the dramatic permeability contrast between the channel and non-channel lithofacies. Temperature maps using downhole temperature surveys and flowline temperatures indicate channel facies temperatures up to 300[degrees] with the non-channel facies having 90[degrees] to 100[degrees] temperatures (near ambient). Higher temperatures also relate to higher average daily production rates for channel associated wells. Channel wells averaged greater than 30 BOPD while non-channel wells averaged 10 BOPD or less. New and replacement well nations have been high graded resulting in favorable production responses. Integration of the lithofacies, permeability and temperature data plus ongoing preventive production optimization work has led to a more efficient Tulare steamflood and identification of bypassed oil on the King-Ellis lease in the South Belridge Field.

  14. Integrated reservoir characterization of a Tulare steamflood finds bypassed oil - South Belridge Field, Kern County, California

    SciTech Connect (OSTI)

    Walter, D.R.; Wylie, A.S. Jr.; Broussard, K.A. [Santa Fe Energy Resources, Bakersfield, CA (United States)

    1996-12-31

    Reservoir quality and producibility are directly related to the characteristics of the depositional lithofacies. Electric log gamma ray/resistivity profiles were used to define facies trends within the Tulare steamflood at South Belridge. Channel and non-channel facies profiles are distinctive across the lease with the channel sands having the better quality reservoir and greater net pay values. Sidewall core permeabilities were averaged over the main producing Tulare intervals with the channels averaging 2000-3000 millidarcies and non-channels 200-500 millidarcies. This supports the lithofacies trend and net pay maps. Although the approach is qualitative, it illustrates the dramatic permeability contrast between the channel and non-channel lithofacies. Temperature maps using downhole temperature surveys and flowline temperatures indicate channel facies temperatures up to 300{degrees} with the non-channel facies having 90{degrees} to 100{degrees} temperatures (near ambient). Higher temperatures also relate to higher average daily production rates for channel associated wells. Channel wells averaged greater than 30 BOPD while non-channel wells averaged 10 BOPD or less. New and replacement well nations have been high graded resulting in favorable production responses. Integration of the lithofacies, permeability and temperature data plus ongoing preventive production optimization work has led to a more efficient Tulare steamflood and identification of bypassed oil on the King-Ellis lease in the South Belridge Field.

  15. Sputter deposition of thin film MIM capacitors on LTCC substrates for RF bypass and filtering applications

    SciTech Connect (OSTI)

    Murray, Jack [Missouri University of Science and Technology; O'Keefe, Matthew J. [Missouri University of Science and Technology; Wilder, Kristina [Missouri University of Science and Technology; Eatinger, Ryan [Kansas State University; Kuhn, William [Kansas State University; Krueger, Daniel S. [Honeywell Federal Manufacturing & Technologies; Wolf, J. Ambrose [Honeywell Federal Manufacturing & Technologies

    2011-08-31

    Thin film capacitors for RF bypass and filtering applications were sputter deposited onto low temperature co-fired ceramic (LTCC) substrates. The capacitors were configured in a metal-insulator-metal (MIM) design featuring 200 nm thick Al electrodes and a 300 nm thick Al{sub 2}O{sub 3} dielectric layer, with dimensions varied between ~150x150 ?m and ~750x750 ?m. DC current-voltage measurements (E ? 5 MV/cm) coupled with impedance analysis (?15 MHz) was used to characterize the resulting devices. More than 90% of the devices functioned as capacitors with high DC resistance (>20 M?) and low loss (tan ? <0.1). A second set of capacitors were made under the same experimental conditions with device geometries optimized for high frequency (?200 MHz) applications. These capacitors featured temperature coefficient of capacitance (TCC) values between 500 and 1000 ppm/°C as well as low loss and high self-resonant frequency performance (ESR <0.6 Ohms at self-resonance of 5.7 GHz for 82 pF). Capacitance and loss values were comparable between the capacitor structures of similar areas at the different frequency regimes.

  16. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  17. NISTIR 7497 Security Architecture Design

    E-Print Network [OSTI]

    NISTIR 7497 Security Architecture Design Process for Health Information Exchanges (HIEs) Matthew Scholl Kevin Stine Kenneth Lin Daniel Steinberg #12;NISTIR 7497 Security Architecture Design Process Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899 Kenneth Lin

  18. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  19. Approved Module Information for ME3023, 2014/5 Module Title/Name: Energy Efficiency Module Code: ME3023

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    for assessing thermal processes in industry. Key issues associated with energy usage and reduction includingApproved Module Information for ME3023, 2014/5 Module Title/Name: Energy Efficiency Module Code: ME3023 School: Engineering and Applied Science Module Type: Standard Module New Module? No Module Credits

  20. Approved Module Information for ME2045, 2014/5 Module Title/Name: Solid Mechanics Module Code: ME2045

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    and comprehensive theory as well as practical application of the fundamental principles of mechanics and materialsApproved Module Information for ME2045, 2014/5 Module Title/Name: Solid Mechanics Module Code: ME2045 School: Engineering and Applied Science Module Type: Standard Module New Module? No Module Credits

  1. Approved Module Information for BHM347, 2014/5 Module Title/Name: Assessment Performance & Reward Module Code: BHM347

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for BHM347, 2014/5 Module Title/Name: Assessment Performance & Reward Module Code: BHM347 School: Aston Business School Module Type: Standard Module New Module? No Module Practitioners: Recruitment and Selection (including Selection Assessment) Performance Measurement Management

  2. Approved Module Information for ME2502, 2014/5 Module Title/Name: Engineering for Industry Module Code: ME2502

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for ME2502, 2014/5 Module Title/Name: Engineering for Industry Module Code: ME2502 School: Engineering and Applied Science Module Type: Standard Module New Module? No Module) Programmes in which available: BEng Design Engineering. BSc Industrial Product Design. BSc Product Design

  3. Approved Module Information for PD1803, 2014/5 Module Title/Name: Engineering Principles Module Code: PD1803

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for PD1803, 2014/5 Module Title/Name: Engineering Principles Module Code: PD1803 School: Engineering and Applied Science Module Type: Standard Module New Module? No Module; * have a knowledge and understanding of and be able to apply the basic engineering principles

  4. Approved Module Information for ME1601, 2014/5 Module Title/Name: Engineering Science Module Code: ME1601

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for ME1601, 2014/5 Module Title/Name: Engineering Science Module Code: ME1601 School: Engineering and Applied Science Module Type: Standard Module New Module? No Module/MEng Mechanical Engineering. BEng/MEng Electromechanical Engineering. BEng Design Engineering. BEng

  5. Photovoltaic module and interlocked stack of photovoltaic modules

    DOE Patents [OSTI]

    Wares, Brian S.

    2012-09-04

    One embodiment relates to an arrangement of photovoltaic modules configured for transportation. The arrangement includes a plurality of photovoltaic modules, each photovoltaic module including a frame having at least a top member and a bottom member. A plurality of alignment features are included on the top member of each frame, and a plurality of alignment features are included on the bottom member of each frame. Adjacent photovoltaic modules are interlocked by the alignment features on the top member of a lower module fitting together with the alignment features on the bottom member of an upper module. Other embodiments, features and aspects are also disclosed.

  6. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  7. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  8. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  9. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  10. Research Data Data Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    Research Data Data Security Survey Collection FAQs Q: I am not a UConn Health Center employee; can multiple projects that share common data? Yes. As long as the projects have common fields as you would in SurveyMonkey; data forms, e.g. Case Report Forms (CRF); or a combination of both. For any

  11. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  12. ARMY Energy Security Considerations

    E-Print Network [OSTI]

    energy waste in existing facilities; Increase energy efficiency in renovation and new constructionARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy · · · · FOREIGN OIL 2

  13. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  14. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  15. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    2011-01-01

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  16. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  17. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  18. Supporting Organizations | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the following three organizations: Measurement Science and Systems Engineering Division Nuclear Security and Isotope Technology Division Computational Sciences and Engineering...

  19. Protocol, Security Assistance- January 2007

    Broader source: Energy.gov [DOE]

    Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security.

  20. Critical Infrastructure and Cyber Security 

    E-Print Network [OSTI]

    Doll, Abby; Pirrong, Renee; Jennings, Matthew; Stasny, George; Giblin, Andy; Shaffer, Steph; Anderson, Aimee

    2011-01-01

    cyber security. They designated responsibility for cyber-security to the newly formed Department of Homeland Security, a duty that has continued to today 3. The group was tasked with creating a method of protecting the critical components.... 2010. 15 Mar. 2011. http://www.d tic.mil/doctrine/new_pubs/jp1_02.pdf 10 Comments on the Economic and Security Implications Of Recent Developments in the World Oil Market , 107th Cong. (2000) (testimony of Robert E. Ebel). http...

  1. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  2. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  3. Power module assembly

    DOE Patents [OSTI]

    Campbell, Jeremy B. (Torrance, CA); Newson, Steve (Redondo Beach, CA)

    2011-11-15

    A power module assembly of the type suitable for deployment in a vehicular power inverter, wherein the power inverter has a grounded chassis, is provided. The power module assembly comprises a conductive base layer electrically coupled to the chassis, an insulating layer disposed on the conductive base layer, a first conductive node disposed on the insulating layer, a second conductive node disposed on the insulating layer, wherein the first and second conductive nodes are electrically isolated from each other. The power module assembly also comprises a first capacitor having a first electrode electrically connected to the conductive base layer, and a second electrode electrically connected to the first conductive node, and further comprises a second capacitor having a first electrode electrically connected to the conductive base layer, and a second electrode electrically connected to the second conductive node.

  4. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Victoria, University of

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  5. Approved Module Information for EE3WSN, 2014/5 Module Title/Name: Wireless Sensor Networks Module Code: EE3WSN

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for EE3WSN, 2014/5 Module Title/Name: Wireless Sensor Networks Module Code: EE3WSN School: Engineering and Applied Science Module Type: Standard Module New Module? No Module

  6. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  7. January 2005 INTEGRATING IT SECURITY

    E-Print Network [OSTI]

    in a cost- effective manner. The implementation of IT security and capital planning practices withinJanuary 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS released Special Publication (SP) 800-65, Inte grating IT Security into the Capital Planning and Investment

  8. Guidelines on Security and Privacy

    E-Print Network [OSTI]

    Guidelines on Security and Privacy in Public Cloud Computing WayneJansen TimothyGrance Special Publication 800-144 #12;ii NIST Special Publication 800-144 Guidelines on Security and Privacy in Public Cloud and Ramaswamy Chandramouli, also from NIST, provided input on cloud security in early drafts. Thanks also go

  9. Long Pulse Modulators

    E-Print Network [OSTI]

    Eckoldt, J

    2015-01-01

    Long pulse modulators are used to produce high-voltage, high-power pulses with durations of several hundred microseconds up to some milliseconds. The loads are one or more klystrons for producing RF power to accelerate the particle beam in superconducting cavities. After years of development and improvements in different institutes a variety of topologies exist, and are presented. The basics of modulators, pulse requirements and klystrons are explained. Additionally, the charging of internal energy storage will be addressed. The outlook for future developments is given.

  10. Secretary Richardson Accepts Recommendations for Improving Security...

    National Nuclear Security Administration (NNSA)

    Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

  11. Waste Isolation Pilot Plant Transportation Security

    Office of Environmental Management (EM)

    Senior Management Operational Management Implementation OOB NTP Transportation Logistics OSO Operations Management Organization Security WIPP Security Conditions * TRU Waste...

  12. National Nuclear Security Administration Overview | Department...

    Office of Environmental Management (EM)

    Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National Transportation...

  13. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  14. Independent Oversight Review, National Nuclear Security Administration...

    Office of Environmental Management (EM)

    Nuclear Security Administration Production Office - February 2014 Independent Oversight Review, National Nuclear Security Administration Production Office - February 2014 February...

  15. Enhancing Transportation Energy Security through Advanced Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transportation Energy Security through Advanced Combustion and Fuels Technologies Enhancing Transportation Energy Security through Advanced Combustion and Fuels Technologies 2005...

  16. Method of monolithic module assembly

    DOE Patents [OSTI]

    Gee, James M. (Albuquerque, NM); Garrett, Stephen E. (Albuquerque, NM); Morgan, William P. (Albuquerque, NM); Worobey, Walter (Albuquerque, NM)

    1999-01-01

    Methods for "monolithic module assembly" which translate many of the advantages of monolithic module construction of thin-film PV modules to wafered c-Si PV modules. Methods employ using back-contact solar cells positioned atop electrically conductive circuit elements affixed to a planar support so that a circuit capable of generating electric power is created. The modules are encapsulated using encapsulant materials such as EVA which are commonly used in photovoltaic module manufacture. The methods of the invention allow multiple cells to be electrically connected in a single encapsulation step rather than by sequential soldering which characterizes the currently used commercial practices.

  17. SECURITY TECHNIQUES Chris J Mitchell1

    E-Print Network [OSTI]

    Mitchell, Chris

    SECURITY TECHNIQUES Chris J Mitchell1 Introduction In this paper we consider the range of security security has been exerted. However, the techniques described are of general applicability by a security technique; in doing so we will distinguish between security features and security techniques (or

  18. Security and Privacy in the Networked World

    E-Print Network [OSTI]

    Sandhu, Ravi

    -World Impact! Perennial State of Cyber Security Micro-security Macro-security #12; What is the value of being Cyber Security Conundrum #12;Cyber security as reconciliation of tradeoffs Finding Goldilocks Holistic1 Security and Privacy in the Networked World Prof. Ravi Sandhu Executive Director and Endowed

  19. The unreasonable ineffectiveness of security engineering

    E-Print Network [OSTI]

    Pavlovic, Dusko

    of security does not apply only to software, as we also speak of bank security, national security, secureThe unreasonable ineffectiveness of security engineering: An overview Dusko Pavlovic Kestrel" [32]. After several decades of security research, we are tempted to ask the opposite question: Are we

  20. IY5512: Part 2 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    ; ­ introduction to security evaluation criteria. Information Security Group Agenda · Design principles · DesignIY5512: Part 2 1 Information Security Group IY5512 Computer Security Part 2: Design & evaluation · This part of the course covers: ­ fundamental security design principles; ­ a security design methodology

  1. Module Title: Metamaterials, Nanophotonics and Plasmonics Module Code: OPTO6004

    E-Print Network [OSTI]

    Molinari, Marc

    1 Module Title: Metamaterials, Nanophotonics and Plasmonics Module Code: OPTO6004 Core introduction to the three cornerstones of future photonic technologies, namely metamaterials, plasmonics. Comprehend the concept of metamaterials and underlying principles of their operation A3. Learn about

  2. Detailed Course Module Description | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Detailed Course Module Description Detailed Course Module Description This document lists the course modules for building science courses offered at Cornell's Collaborator...

  3. Formed photovoltaic module busbars

    DOE Patents [OSTI]

    Rose, Douglas; Daroczi, Shan; Phu, Thomas

    2015-11-10

    A cell connection piece for a photovoltaic module is disclosed herein. The cell connection piece includes an interconnect bus, a plurality of bus tabs unitarily formed with the interconnect bus, and a terminal bus coupled with the interconnect bus. The plurality of bus tabs extend from the interconnect bus. The terminal bus includes a non-linear portion.

  4. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr.

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  5. Module Handbook Specialisation Biomass Energy

    E-Print Network [OSTI]

    Damm, Werner

    Module Handbook Specialisation Biomass Energy 2nd Semester for the Master Programme REMA/EUREC Course 2008/2009 University of Zaragoza Specialisation Provider: Biomass Energy #12;Specialisation Biomass Energy, University of Zaragoza Modul: Introduction and Basic Concepts

  6. Hierarchical classification of modulation signals 

    E-Print Network [OSTI]

    Kim, Nam Jin

    2002-01-01

    This thesis addresses the problem of classifying both analog and digital modulation signals using different kinds of classifiers. The classification of modulation signals has both civilian and military applications. A total of 31 statistical signal...

  7. COSC 472 Network Security Annie Lu 1 COSC 472 Network Security

    E-Print Network [OSTI]

    Lu, Enyue "Annie"

    Network Security Annie Lu Background · Information Security requirements have changed in recent times to protect data during transmission #12;COSC 472 Network Security Annie Lu 6 Security · Information Security Security Annie Lu Computer Security · the protection afforded to an automated information system in order

  8. The Cyber Security Crisis

    ScienceCinema (OSTI)

    Spafford, Eugene [Purdue University, West Lafayette, Indiana, United States

    2009-09-01

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  9. Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links

    E-Print Network [OSTI]

    Mahmud, Syed Masud

    Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links Syed Masud Mahmud, remote diagnostic, etc. will significantly increase the complexity of a vehicle's software modules. From time to time, the vehicle's software may need to be updated due to many reasons

  10. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  11. Security Administration Production Office,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345Secure

  12. 2014 Headquarters Facilities Master Security Plan- Chapter 11, Incidents of Security Concern

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern Describes DOE Headquarters procedures for reporting, investigating, and correcting Incidents of Security Concern.

  13. NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security...

    National Nuclear Security Administration (NNSA)

    Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  14. Approved Module Information for LE3028, 2014/5 Module Title/Name: Corpus Linguistics Module Code: LE3028

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    from primary sources (i.e. corpora) and secondary sources (e.g. dictionaries) Carrying outApproved Module Information for LE3028, 2014/5 Module Title/Name: Corpus Linguistics Module Code Module Credits: 20 Module Management Information Module Leader Name Garry Plappert Email Address g

  15. Approved Module Information for LE1083, 2014/5 Module Title/Name: Words & Meaning Module Code: LE1083

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    and use data and information from primary sources (e.g. corpora) and secondary sources (e.g. dictionariesApproved Module Information for LE1083, 2014/5 Module Title/Name: Words & Meaning Module Code: LE Module Credits: 20 Module Management Information Module Leader Name Garry Plappert Email Address g

  16. Approved Module Information for BM2243, 2014/5 Module Title/Name: Digital Marketing Module Code: BM2243

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for BM2243, 2014/5 Module Title/Name: Digital Marketing Module Code: BM School & Subject Groups(and %): Pre-requisites for this module are: BM1134 Introduction to Marketing OR BM2257 Marketing Available to Exchange Students? Not Specified Module Learning Information Module

  17. Approved Module Information for BMM604, 2014/5 Module Title/Name: Marketing Strategy Module Code: BMM604

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for BMM604, 2014/5 Module Title/Name: Marketing Strategy Module Code: Masters Available to Exchange Students? Not Specified Module Dependancies Pre-requisites: Marketing Management (BMM601). Co-requisites: None Specified Module Learning Information Module Aims: The Marketing

  18. Approved Module Information for BMM656, 2014/5 Module Title/Name: Marketing Consultancy Module Code: BMM656

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for BMM656, 2014/5 Module Title/Name: Marketing Consultancy Module Code: MSc in Market Research and Consultancy. Available to Exchange Students? Not Specified Module Learning Information Module Aims: The Marketing Consultancy module offers a unique learning experience

  19. Approved Module Information for BF2262, 2014/5 Module Title/Name: Management Accounting Module Code: BF2262

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for BF2262, 2014/5 Module Title/Name: Management Accounting Module Code Accounting (BF1101). Co-requisites: None Specified Module Learning Information Module Aims: This module aims to provide you with an overview of the management accounting function within business, enabling you

  20. Approved Module Information for BFM204, 2014/5 Module Title/Name: Management Accounting Module Code: BFM204

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for BFM204, 2014/5 Module Title/Name: Management Accounting Module Code in Accounting and Finance. Available to Exchange Students? Not Specified Module Learning Information Module Aims: This module studies the functions and techniques of cost and management accounting. Students will examine

  1. Module isolation devices

    DOE Patents [OSTI]

    Carolan, Michael Francis; Cooke, John Albert; Buzinski, Michael David

    2010-04-27

    A gas flow isolation device includes a gas flow isolation valve movable from an opened condition to a closed condition. The module isolation valve in one embodiment includes a rupture disk in flow communication with a flow of gas when the module isolation valve is in an opened condition. The rupture disk ruptures when a predetermined pressure differential occurs across it causing the isolation valve to close. In one embodiment the valve is mechanically linked to the rupture disk to maintain the valve in an opened condition when the rupture disk is intact, and which permits the valve to move into a closed condition when the rupture disk ruptures. In another embodiment a crushable member maintains the valve in an open condition, and the flow of gas passed the valve upon rupturing of the rupture disk compresses the crushable member to close the isolation valve.

  2. TED AND KARYN HUME CENTER FOR NATIONAL SECURITY AND TECHNOLOGY

    E-Print Network [OSTI]

    Ha, Dong S.

    Networks, Crypto, Formal Methods, Cloud, IPv6, Hardware Security, Visualization, Policy/Law Applications Security IPv6 Security Cloud Security and Privacy Secure Virtualization Anonymous Computation VisualizationTED AND KARYN HUME CENTER FOR NATIONAL SECURITY AND TECHNOLOGY Cybersecurity: Observations

  3. Detailed Course Module Description

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum Based| Department8, 20153Danielthrough theKDesertDesigningCourse Module

  4. PARTICLE IMAGE VELOCIMETRY MEASUREMENTS IN A REPRESENTATIVE GAS-COOLED PRISMATIC REACTOR CORE MODEL: FLOW IN THE COOLANT CHANNELS AND INTERSTITIAL BYPASS GAPS

    SciTech Connect (OSTI)

    Thomas E. Conder; Richard Skifton; Ralph Budwig

    2012-11-01

    Core bypass flow is one of the key issues with the prismatic Gas Turbine-Modular Helium Reactor, and it refers to the coolant that navigates through the interstitial, non-cooling passages between the graphite fuel blocks instead of traveling through the designated coolant channels. To determine the bypass flow, a double scale representative model was manufactured and installed in the Matched Index-of-Refraction flow facility; after which, stereo Particle Image Velocimetry (PIV) was employed to measure the flow field within. PIV images were analyzed to produce vector maps, and flow rates were calculated by numerically integrating over the velocity field. It was found that the bypass flow varied between 6.9-15.8% for channel Reynolds numbers of 1,746 and 4,618. The results were compared to computational fluid dynamic (CFD) pre-test simulations. When compared to these pretest calculations, the CFD analysis appeared to under predict the flow through the gap.

  5. Information Systems and Computing/Office of Information Security www.upenn.edu/computing/security security@isc.upenn.edu

    E-Print Network [OSTI]

    Fang-Yen, Christopher

    ". And Penn actually offers a couple of "home grown" cloud services for secure file sharing and transferInformation Systems and Computing/Office of Information Security www.upenn.edu/computing/security security@isc.upenn.edu "phishing"...? Information Systems and Computing/Office of Information Security

  6. Aviation security: A system's perspective

    SciTech Connect (OSTI)

    Martin, J.P.

    1988-01-01

    For many years the aviation industry and airports operated with security methods and equipment common to most other large industrial complexes. At that time, the security systems primarily provided asset and property protection. However, soon after the first aircraft hijacking the focus of security shifted to emphasize the security requirements necessary for protecting the traveling public and the one feature of the aviation industry that makes it unique---the airplane. The airplane and its operation offered attractive opportunities for the homesick refugee, the mentally unstable person and the terrorist wanting to make a political statement. The airport and its aircraft were the prime targets requiring enhanced security against this escalated threat. In response, the FAA, airport operators and air carriers began to develop plans for increasing security and assigning responsibilities for implementation.

  7. East Asian Security in 2025 

    E-Print Network [OSTI]

    Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

    2008-01-01

    Are • Reagan Heavin – Energy • Adam Hudson – State Capacity • Brandon Krueger – Military • Sean O’Neil – Demographics • Griffin Rozell – Balance of Power • Matt Suma – Economy East Asian Security in 2025 China: Competition, Cooperation, Plateau? Reagan Heavin... Adam Hudson Brandon Krueger Sean O’Neil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda • Conclusions • Projections • Drivers • Four Outcomes • Questions East Asian Security in 2025 Conclusions • China will rise to great power...

  8. SUPPLEMENTARY NOTES Discussion of Prism modules and predicted interactions (Fig. 4)

    E-Print Network [OSTI]

    Kishony, Roy

    enzymes of the pentose phosphate pathway or gluconeogenesis, which are part of a given bypass, are further

  9. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  10. Noise Secured Internet

    E-Print Network [OSTI]

    Geraldo A. Barbosa

    2006-02-28

    This work shows how a secure Internet can be implemented through a fast key distribution system that uses physical noise to protect the transmitted information. Starting from a shared random sequence $K_0$ between two (or more) users, longsequences $R$ of random bits can be shared. The signals sent over the Internet are deterministic but have a built-in Nature-made uncertainty that protects the shared sequences. After privacy amplification the shared $R$ random bits --encrypted by noise-- are subsequently utilized in one-time-pad data ciphering.

  11. Security | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopment Top Scientific Impact Since its SearchSecurity Enhancing

  12. Energy Security Center

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES October 27th, 2010 Thanks forEnergy ScienceEnergy Security

  13. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES October 27th, 2010 Thanks forEnergy ScienceEnergy Security

  14. Security, Safety and Health

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergy BillsNo.Hydrogen4 » Searchwith First JamesofAward509 WeekSecurity8, Fourth

  15. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities GeneralWake-ImagingNotSecurity Home

  16. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities GeneralWake-ImagingNotSecurity Home

  17. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National NuclearSecurityor

  18. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National

  19. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001 Energy

  20. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001 Energy24,

  1. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001

  2. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001Y-12

  3. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you notHeatMaRIEdioxide capture CS SeminarsNRELNuclear Security

  4. Energy Security Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansasCommunities EnergyU.S. DOE Office of99SavingTrilateralUnionSecurity

  5. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)GeothermalFuel MagnetizationTransportationVideos HomePower HomeSecurity

  6. dnn | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, Shaping the future of nuclear...

  7. Web Engineering Security: Essential Elements

    E-Print Network [OSTI]

    Glisson, W.B.; Welland, R.; The Second International Conference on Availability, Reliability and Security (ARES).; 2007.; Vienna, Austria pp 707-714 IEEE [More Details

    Glisson,W.B. Welland,R. The Second International Conference on Availability, Reliability and Security (ARES). 2007. Vienna, Austria pp 707-714 IEEE

  8. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 “Climate change acts as a threat

  9. testmenu | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    testmenu | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  10. taiwan | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    taiwan | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  11. Energy Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    through these relationships that will transition into technologies that address DOE Roadmap challenges. R&D Activities: Real-time digital simulator Advanced security...

  12. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

  13. Cyber Security | More Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant,...

  14. hrp | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    hrp | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  15. sliderphotos | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sliderphotos | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  16. Trident | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Trident | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  17. Nike | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nike | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  18. Implementing Information Security and Its Technology: A Line Management Perspective

    E-Print Network [OSTI]

    Barletta, William A.

    2005-01-01

    of an integrated information security and privacy program.An institution's information security program forms thefrom the chief information security officer, chief security

  19. PIA - WEB Physical Security Major Application | Department of...

    Energy Savers [EERE]

    PIA - WEB Physical Security Major Application PIA - WEB Physical Security Major Application PIA - WEB Physical Security Major Application PDF icon PIA - WEB Physical Security Major...

  20. SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

    E-Print Network [OSTI]

    SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National and to protect their systems and information from security threats and risks. There have been many past efforts

  1. Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security of

    E-Print Network [OSTI]

    2007-01-01

    Information Systems 32 (2007) 1166­1183 Security Attack Testing (SAT)--testing the security have been devoted into integrating security issues into information systems development practices reserved. Keywords: Information systems development methodology; Integrating security and software

  2. The National Security Policy Process: The National Security Council and Interagency System

    E-Print Network [OSTI]

    Huang, Wei

    The National Security Policy Process: The National Security Council and Interagency System By Alan Update: August 15, 2011 #12;THIS PAGE INTENTIONALLY BLANK 2 #12;Table of Contents The National Security Policy Process: The National Security Council and Interagency System

  3. GEORG-AUGUST-UNIVERSITT Computer Security

    E-Print Network [OSTI]

    Grabowski, Jens

    » Cybercrime and cyberterrorism » Information technology of little use without security 3 #12;GEORGGEORG-AUGUST-UNIVERSITÄT GÖTTINGEN Computer Security Overview and Introduction Computer Security Security @ Göttingen » Research group for comuter security » Prof. Dr. Konrad Rieck » 4 PhD students (+ 2

  4. Security Policies for Downgrading Stephen Chong

    E-Print Network [OSTI]

    Myers, Andrew C.

    @cs.cornell.edu ABSTRACT A long-standing problem in information security is how to specify and enforce expressive security that incorporates them, allowing secure downgrading of information through an explicit declassification operation of Com- puting and Information Systems]: Security and Protection General Terms: Security, Languages

  5. Your Safety and Security at Syracuse University

    E-Print Network [OSTI]

    Raina, Ramesh

    programs to disclose campus crime statistics and security information. A 1998 amendment renamed the lawYour Safety and Security at Syracuse University A comprehensive report on campus security and fire and security measures on and around our campus. The need for security encompasses more than personal safety

  6. Computer Security Division 2009 Annual Report

    E-Print Network [OSTI]

    Security 12 Smart Grid Cyber Security 13 Supply Chain Risk Management 13 Cryptographic Validation Programs Computing Project 36 Policy Machine 36 Security for Grid and Pervasive Systems 38 Security OntologiesComputer Security Division 2009 Annual Report #12;Table of Contents Welcome 1 Division

  7. System and method for secure group transactions

    DOE Patents [OSTI]

    Goldsmith, Steven Y. (Rochester, MN)

    2006-04-25

    A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.

  8. Processing module operating methods, processing modules, and communications systems

    DOE Patents [OSTI]

    McCown, Steven Harvey; Derr, Kurt W.; Moore, Troy

    2014-09-09

    A processing module operating method includes using a processing module physically connected to a wireless communications device, requesting that the wireless communications device retrieve encrypted code from a web site and receiving the encrypted code from the wireless communications device. The wireless communications device is unable to decrypt the encrypted code. The method further includes using the processing module, decrypting the encrypted code, executing the decrypted code, and preventing the wireless communications device from accessing the decrypted code. Another processing module operating method includes using a processing module physically connected to a host device, executing an application within the processing module, allowing the application to exchange user interaction data communicated using a user interface of the host device with the host device, and allowing the application to use the host device as a communications device for exchanging information with a remote device distinct from the host device.

  9. Phase modulation in RF tag

    DOE Patents [OSTI]

    Carrender, Curtis Lee; Gilbert, Ronald W.

    2007-02-20

    A radio frequency (RF) communication system employs phase-modulated backscatter signals for RF communication from an RF tag to an interrogator. The interrogator transmits a continuous wave interrogation signal to the RF tag, which based on an information code stored in a memory, phase-modulates the interrogation signal to produce a backscatter response signal that is transmitted back to the interrogator. A phase modulator structure in the RF tag may include a switch coupled between an antenna and a quarter-wavelength stub; and a driver coupled between the memory and a control terminal of the switch. The driver is structured to produce a modulating signal corresponding to the information code, the modulating signal alternately opening and closing the switch to respectively decrease and increase the transmission path taken by the interrogation signal and thereby modulate the phase of the response signal. Alternatively, the phase modulator may include a diode coupled between the antenna and driver. The modulating signal from the driver modulates the capacitance of the diode, which modulates the phase of the response signal reflected by the diode and antenna.

  10. SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013)

    E-Print Network [OSTI]

    2013-01-01

    system engineer. A tool is developed to support the steps supporting this methodology and help to bridge the smart metering domain. Copyright © 2013 John Wiley & Sons, Ltd. KEYWORDS model-based engineering; security engineering; security ontology; domain-specific modelling; embedded systems; smart metering

  11. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The vendor has issued a fix: 1. Cisco Secure ACS version 5.1: File 5-1-0-44-6.tar.gpg - ACS 5.1.0.44 cumulative patch 6 2. Cisco Secure ACS version 5.2: File...

  12. PRACTICAL SECURITY Implementing Security Education at a Small Community College

    E-Print Network [OSTI]

    Whatcom Community College Abstract: This paper discusses modifying an existing two-year degree to include, and introducing an information security specialty into an existing degree can be challenging. At Whatcom Community ASSURANCE CURRICULUM At the beginning of the 2003-2004 academic year, Whatcom had one security course

  13. Approved Module Information for BFM223, 2014/5 Module Title/Name: Sustainability Accounting &

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for BFM223, 2014/5 Module Title/Name: Sustainability Accounting & Accountability Module Code: BFM223 School: Aston Business School Module Type: Standard Module New Module of this module is to introduce students to the different theories that underpin sustainability accounting

  14. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

  15. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1993-04-01

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  16. Approved Module Information for LIM016, 2014/5 Module Title/Name: The EU: A Web of Institutions Module Code: LIM016

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for LIM016, 2014/5 Module Title/Name: The EU: A Web of Institutions Module Code: LIM016 School: Languages and Social Sciences Module Type: Standard Module New Module? Not Specified Module Credits: 10 Module Management Information Module Leader Name Helena Farrand-Carrapico Email

  17. Approved Module Information for CS2410, 2014/5 Module Title/Name: Internet Applications and Techniques Module Code: CS2410

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for CS2410, 2014/5 Module Title/Name: Internet Applications and Techniques Module Code: CS2410 School: Engineering and Applied Science Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name Hongxia (Helen) Wang Email

  18. Approved Module Information for CH3102, 2014/5 Module Title/Name: Advances in Biomaterials Science Module Code: CH3102

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for CH3102, 2014/5 Module Title/Name: Advances in Biomaterials Science Module Code: CH3102 School: Engineering and Applied Science Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name Brian J Tighe Email Address tighebj

  19. Approved Module Information for LK3004, 2014/5 Module Title/Name: Corporate Power in a Globalised World Module Code: LK3004

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for LK3004, 2014/5 Module Title/Name: Corporate Power in a Globalised World Module Code: LK3004 School: Languages and Social Sciences Module Type: Standard Module New Module? Not Specified Module Credits: 10 Module Management Information Module Leader Name Gary Fooks Email Address g

  20. Approved Module Information for LG2025, 2014/5 Module Title/Name: The Legacy of National Socialism Module Code: LG2025

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for LG2025, 2014/5 Module Title/Name: The Legacy of National Socialism Module Code: LG2025 School: Languages and Social Sciences Module Type: Standard Module New Module? Not Specified Module Credits: 10 Module Management Information Module Leader Name Uwe Schütte Email Address u

  1. Approved Module Information for LP2007, 2014/5 Module Title/Name: Comparative Government and Politics Module Code: LP2007

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for LP2007, 2014/5 Module Title/Name: Comparative Government and Politics Module Code: LP2007 School: Languages and Social Sciences Module Type: Standard Module New Module? Not Specified Module Credits: 20 Module Management Information Module Leader Name Ed Turner Email Address e

  2. Approved Module Information for LT2F09, 2014/5 Module Title/Name: Data Analysis Module Code: LT2F09

    E-Print Network [OSTI]

    Rebollo-Neira, Laura

    Approved Module Information for LT2F09, 2014/5 Module Title/Name: Data Analysis Module Code: LT2F09 School: Engineering and Applied Science Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name Constant Iannacci Email Address c

  3. Approved Module Information for AM20CP, 2014/5 Module Title/Name: Numerical Methods II Module Code: AM20CP

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for AM20CP, 2014/5 Module Title/Name: Numerical Methods II Module Code: AM20CP School: Engineering and Applied Science Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name Juan Neirotti Email Address neirotjp

  4. Approved Module Information for LP3024, 2014/5 Module Title/Name: Political Parties and Party Systems Module Code: LP3024

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for LP3024, 2014/5 Module Title/Name: Political Parties and Party Systems Module Code: LP3024 School: Languages and Social Sciences Module Type: Standard Module New Module? Not Specified Module Credits: 10 Module Management Information Module Leader Name Ed Turner Email Address e

  5. Approved Module Information for BHM349, 2014/5 Module Title/Name: Employee Relations in Context Module Code: BHM349

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for BHM349, 2014/5 Module Title/Name: Employee Relations in Context Module Code: BHM349 School: Aston Business School Module Type: Standard Module New Module? No Module Credits: 15 Module Management Information Module Leader Name Vidu Badigannavar Email Address badiganv

  6. Approved Module Information for AM30PD, 2014/5 Module Title/Name: Partial Differential Equations Module Code: AM30PD

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for AM30PD, 2014/5 Module Title/Name: Partial Differential Equations Module Code: AM30PD School: Engineering and Applied Science Module Type: Standard Module New Module? No Module Credits: 20 Module Management Information Module Leader Name David Saad Email Address saadd

  7. Approved Module Information for LYM002, 2014/5 Module Title/Name: Globalisation and Social Change Module Code: LYM002

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for LYM002, 2014/5 Module Title/Name: Globalisation and Social Change Module Code: LYM002 School: Languages and Social Sciences Module Type: Standard Module New Module? Not Specified Module Credits: 20 Module Management Information Module Leader Name Christian Bolsmann Email

  8. Approved Module Information for EE3DTR, 2014/5 Module Title/Name: Digital Transmission Module Code: EE3DTR

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for EE3DTR, 2014/5 Module Title/Name: Digital Transmission Module Code: EE3DTR School: Engineering and Applied Science Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name Sonia Boscolo Email Address s

  9. Approved Module Information for LPM027, 2014/5 Module Title/Name: International Ethics and Literature Module Code: LPM027

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for LPM027, 2014/5 Module Title/Name: International Ethics and Literature Module Code: LPM027 School: Languages and Social Sciences Module Type: Standard Module New Module? Not Specified Module Credits: 20 Module Management Information Module Leader Name Amanda Beattie Email Address a

  10. Approved Module Information for LG3015, 2014/5 Module Title/Name: East Germany on Film Module Code: LG3015

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for LG3015, 2014/5 Module Title/Name: East Germany on Film Module Code: LG3015 School: Languages and Social Sciences Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name Claudia Gremler Email Address c

  11. Approved Module Information for AM30AT, 2014/5 Module Title/Name: Approximation Theory and Methods Module Code: AM30AT

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for AM30AT, 2014/5 Module Title/Name: Approximation Theory and Methods Module Code: AM30AT School: Engineering and Applied Science Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name Roberto Alamino Email Address

  12. Approved Module Information for BFM102B, 2014/5 Module Title/Name: Valuation of Investments Module Code: BFM102B

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for BFM102B, 2014/5 Module Title/Name: Valuation of Investments Module Code: BFM102B School: Aston Business School Module Type: Standard Module New Module? Not Specified Module Credits: 15 Module Management Information Module Leader Name Leonidas Tsiaras Email Address

  13. Approved Module Information for BNM805, 2014/5 Module Title/Name: Foundations in Business Systems Module Code: BNM805

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for BNM805, 2014/5 Module Title/Name: Foundations in Business Systems Module Code: BNM805 School: Aston Business School Module Type: Standard Module New Module? No Module Credits: 15 Module Management Information Module Leader Name Andreas Schroeder Email Address schroeda

  14. Approved Module Information for LP2029, 2014/5 Module Title/Name: Introduction to Political Economy I Module Code: LP2029

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for LP2029, 2014/5 Module Title/Name: Introduction to Political Economy I Module Code: LP2029 School: Languages and Social Sciences Module Type: Standard Module New Module? Not Specified Module Credits: 10 Module Management Information Module Leader Name Balazs Szent-Ivanyi Email

  15. Approved Module Information for AM20LM, 2014/5 Module Title/Name: Linear Mathematics Module Code: AM20LM

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for AM20LM, 2014/5 Module Title/Name: Linear Mathematics Module Code: AM20LM School: Engineering and Applied Science Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name Tomas Johansson Email Address johansst

  16. Approved Module Information for BFM102A, 2014/5 Module Title/Name: Valuation of Investments Module Code: BFM102A

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for BFM102A, 2014/5 Module Title/Name: Valuation of Investments Module Code: BFM102A School: Aston Business School Module Type: Standard Module New Module? No Module Credits: 15 Module Management Information Module Leader Name Hugh Colaco Email Address colacoh

  17. Approved Module Information for AM20MC, 2014/5 Module Title/Name: Multi Variate Calculus Module Code: AM20MC

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for AM20MC, 2014/5 Module Title/Name: Multi Variate Calculus Module Code: AM20MC School: Engineering and Applied Science Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name Sotos C Generalis Email Address generasc

  18. Approved Module Information for BFM114, 2014/5 Module Title/Name: Quantitative Methods for Finance Module Code: BFM114

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for BFM114, 2014/5 Module Title/Name: Quantitative Methods for Finance Module Code: BFM114 School: Aston Business School Module Type: Standard Module New Module? No Module Credits: 15 Module Management Information Module Leader Name D Gilder Email Address gilderd

  19. Approved Module Information for LEM032, 2014/5 Module Title/Name: Linguistic Investigation and Evidence Module Code: LEM032

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for LEM032, 2014/5 Module Title/Name: Linguistic Investigation and Evidence Module Code: LEM032 School: Languages and Social Sciences Module Type: Standard Module New Module? Not Specified Module Credits: 20 Module Management Information Module Leader Name Tim Grant Email Address t

  20. Approved Module Information for BS2209, 2014/5 Module Title/Name: International Business Environment 2 Module Code: BS2209

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for BS2209, 2014/5 Module Title/Name: International Business Environment 2 Module Code: BS2209 School: Aston Business School Module Type: Standard Module New Module? No Module Credits: 10 Module Management Information Module Leader Name Yama Temouri Email Address temoury1