National Library of Energy BETA

Sample records for organizations global security

  1. Organized by Academy for Global Nuclear Safety and Security Agent,

    E-Print Network [OSTI]

    Furui, Sadaoki

    Research Collaboration Center, Tokyo Tech. Fukushima Daiichi Nuclear Power Plants on March 20, 2011Organized by Academy for Global Nuclear Safety and Security Agent, Tokyo Institute of Technology Energy Agency (JAEA) Institute of Nuclear Materials Management (INMM) Japan Chapter International Nuclear

  2. Global Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    weapons from the James Martin center for Nonproliferation Studies Homeland Security Digital Library HSDL is the nation's premier research collection of open-source resources...

  3. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  4. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  5. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  6. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not findGeoscience/EnvironmentGlobal Security Global Security We

  7. Supporting Organizations | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the following three organizations: Measurement Science and Systems Engineering Division Nuclear Security and Isotope Technology Division Computational Sciences and Engineering...

  8. Global Material Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia NationalSecurityNuclear SecurityOfficesPrograms

  9. Global Environmental Change and Human Security

    E-Print Network [OSTI]

    Kunnas, Jan

    2011-01-01

    impacts and responses to environmental change making it anhuman security or environmental change if the lecturer isReview: Global Environmental Change and Human Security By

  10. Global Institute for Water Security National Hydrology Research Centre

    E-Print Network [OSTI]

    Saskatchewan, University of

    Global Institute for Water Security National Hydrology Research Centre 11 Innovation Boulevard Modelling The Global Institute for Water Security (GIWS) and the School for Environment and Sustainability

  11. Global Material Security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (Journalvivo Low-Dose Low LETUseful LinksGlass StrongerGlobal Material

  12. PACIFIC NORTHWEST NATIONAL LABORATORY'S CENTER FOR GLOBAL SECURITY

    E-Print Network [OSTI]

    the Treaty The Comprehensive Nuclear Test Ban Treaty puts a cap on the development of nuclear weapons by banning nuclear weapon testing. The Treaty Organization will verify the ban on nuclear tests, operatingHOSTED BY: · PACIFIC NORTHWEST NATIONAL LABORATORY'S CENTER FOR GLOBAL SECURITY · THE NUCLEAR

  13. Global climate change and international security

    SciTech Connect (OSTI)

    Rice, M.

    1991-01-01

    On May 8--10, 1991, the Midwest Consortium of International Security Studies (MCISS) and Argonne National Laboratory cosponsored a conference on Global Climate Change and International Security. The aim was to bring together natural and social scientists to examine the economic, sociopolitical, and security implications of the climate changes predicted by the general circulation models developed by natural scientists. Five themes emerged from the papers and discussions: (1) general circulation models and predicted climate change; (2) the effects of climate change on agriculture, especially in the Third World; (3) economic implications of policies to reduce greenhouse gas emissions; (4) the sociopolitical consequences of climate change; and (5) the effect of climate change on global security.

  14. Global climate change and international security.

    SciTech Connect (OSTI)

    Karas, Thomas H.

    2003-11-01

    This report originates in a workshop held at Sandia National Laboratories, bringing together a variety of external experts with Sandia personnel to discuss 'The Implications of Global Climate Change for International Security.' Whatever the future of the current global warming trend, paleoclimatic history shows that climate change happens, sometimes abruptly. These changes can severely impact human water supplies, agriculture, migration patterns, infrastructure, financial flows, disease prevalence, and economic activity. Those impacts, in turn, can lead to national or international security problems stemming from aggravation of internal conflicts, increased poverty and inequality, exacerbation of existing international conflicts, diversion of national and international resources from international security programs (military or non-military), contribution to global economic decline or collapse, or international realignments based on climate change mitigation policies. After reviewing these potential problems, the report concludes with a brief listing of some research, technology, and policy measures that might mitigate them.

  15. Global Food Security Strategic Plan 2011-2016

    E-Print Network [OSTI]

    Rambaut, Andrew

    Global Food Security Strategic Plan 2011-2016 Updated November 2013 #12;All images used summary 1 2. Introduction 2 3. Vision 2 4. Context 3 Global food security drivers and challenges 4 5. The Global Food Security programme 6 i Operating principles 6 ii Partners and affiliates 6 iii Added value

  16. Cooley joins Y-12's Global Security and Strategic Partnerships...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to have someone with Jill's depth and breadth of expertise on our staff," said Morris Hassler of Global Security and Strategic Partnerships. "Her international experience...

  17. Global Biofuel Production and Food Security: Implications for Asia Pacific

    E-Print Network [OSTI]

    Global Biofuel Production and Food Security: Implications for Asia Pacific 56th AARES Annual Conference Fremantle, Western Australia 7-10 February 2012 William T. Coyle #12;Global Biofuel Production and Food Security: Making the Connection --Past analysis and the evidence about biofuels and spiking

  18. RISK MANAGEMENT FRAMEWORK: HELPING ORGANIZATIONS IMPLEMENT EFFECTIVE INFORMATION SECURITY PROGRAMS

    E-Print Network [OSTI]

    RISK MANAGEMENT FRAMEWORK: HELPING ORGANIZATIONS IMPLEMENT EFFECTIVE INFORMATION SECURITY PROGRAMS of Standards and Technology The management of risks to information technology (IT) systems is a fundamental component of every organization's information security program. An effective risk management process enables

  19. Office of Global Material Security | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, About This Site Budget IG Web Policy...

  20. Energy & Global Security Directorate Organization Chart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansas NuclearElectronic StructureElyElectro NitrationEnergetics

  1. Global Security Sciences | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (Journalvivo Low-Dose Low LETUseful LinksGlass StrongerGlobalOn TheGlobal

  2. Tag: global security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorking With U.S. Coal StocksSuppliers Tag: Suppliers Displaying 1global

  3. Global Security Analysis and Training Program | Y-12 National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (Journalvivo Low-Dose Low LETUseful LinksGlass StrongerGlobalOn The

  4. SUCCESS FACTORS IN INFORMATION SECURITY IMPLEMENTATION IN ORGANIZATIONS

    E-Print Network [OSTI]

    Williamson, John

    SUCCESS FACTORS IN INFORMATION SECURITY IMPLEMENTATION IN ORGANIZATIONS Maryam Al-Awadi University This paper will explore and identify success factors related to the implementation of information security was to identify those factors required to ensure successful implementation of information security, particularly

  5. Supporting Decentralized, Security focused Dynamic Virtual Organizations across the Grid

    E-Print Network [OSTI]

    Kent, University of

    Supporting Decentralized, Security focused Dynamic Virtual Organizations across the Grid R and subsequently manage secure virtual organisations (VO) is one of the key challenges facing the Grid community in the education domain. We believe that this federated VO security model for fine grained access to Grid services

  6. Human, Organization, and Technology Centred Improvement of IT Security Administration

    E-Print Network [OSTI]

    HOT Admin: Human, Organization, and Technology Centred Improvement of IT Security Administration Objectives 1. To devise a methodology for evaluating the effectiveness of IT security administration tools; 2. To develop guidelines and techniques for designing effective tools for security administrators. Problem

  7. Securing the Sustainability of Global Medical Nuclear Supply Chains

    E-Print Network [OSTI]

    Nagurney, Anna

    Medical Nuclear Supply Chains Through Economic Cost Recovery, Risk Management, and Optimization, to appear with associated increased volumes of waste. Indeed, according to Kramer (2011), the South African Nuclear EnergySecuring the Sustainability of Global Medical Nuclear Supply Chains Through Economic Cost Recovery

  8. Global plutonium management: A security option

    SciTech Connect (OSTI)

    Sylvester, K.W.B.

    1998-12-31

    The US surplus plutonium disposition program was created to reduce the proliferation risk posed by the fissile material from thousands of retired nuclear weapons. The Department of Energy has decided to process its Put into a form as secure as Pu in civilian spent fuel. While implementation issues have been considered, a major one (Russian reciprocity) remains unresolved. Russia has made disposition action conditional on extracting the fuel value of its Pu but lacks the infrastructure to do so. Assistance in the construction of the required facilities would conflict with official US policy opposing the development of a Pu fuel cycle. The resulting stagnation provides impetus for a reevaluation of US nonproliferation objectives and Pu disposition options. A strategy for satisfying Russian fuel value concerns and reducing the proliferation risk posed by surplus weapons-grade plutonium (WGPu) is proposed. The effectiveness of material alteration (e.g., isotopic, chemical, etc.{hor_ellipsis}) at reducing the desire, ability and opportunity for proliferation is assessed. Virtually all the security benefits attainable by material processing can be obtained by immobilizing Pu in large unit size/mass monoliths without a radiation barrier. Russia would be allowed to extract the Pu at a future date for use as fuel in a verifiable manner. Remote tracking capability, if proven feasible, would further improve safeguarding capability. As an alternate approach, the US could compensate Russia for its Pu, allowing it to be disposed of or processed elsewhere. A market based method for pricing Pu is proposed. Surplus Pu could represent access to nuclear fuel at a fixed price at a future date. This position can be replicated in the uranium market and priced using derivative theory. The proposed strategy attempts to meet nonproliferation objectives by recognizing technical limitations and satisfying political constraints.

  9. Security Standards for the Global Information Grid Gary Buda, Booz Allen & Hamilton, Linthicum, MD 21090

    E-Print Network [OSTI]

    Lee, Ruby B.

    1 Security Standards for the Global Information Grid Gary Buda, Booz Allen & Hamilton, Linthicum security of the Global Information Grid (GIG). The context for "hardening" this infrastructure also describes the Department of Defense (DoD) activities aimed toward defining security requirements

  10. ITL BULLETIN FOR MARCH 2011 MANAGING INFORMATION SECURITY RISK: ORGANIZATION, MISSION

    E-Print Network [OSTI]

    ITL BULLETIN FOR MARCH 2011 MANAGING INFORMATION SECURITY RISK: ORGANIZATION, MISSION AND INFORMATION SYSTEM VIEW Shirley Radack, Editor Computer Security Division Information Technology Laboratory. Managing information security risk is an essential element of the organization's overall risk management

  11. Increasing homogeneity in global food supplies and the implications for food security

    E-Print Network [OSTI]

    Rieseberg, Loren

    Increasing homogeneity in global food supplies and the implications for food security Colin K Trust, 53115 Bonn, Germany; g CGIAR Research Program on Climate Change, Agriculture, and Food Security to the world's food supplies has been considered a potential threat to food security. However, changes

  12. REVISED CATALOG OF SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS AND ORGANIZATIONS: FOR USE IN BOTH

    E-Print Network [OSTI]

    REVISED CATALOG OF SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS AND ORGANIZATIONS: FOR USE and expanded its catalog of security controls to help organizations protect their information and information, the revised catalog brings together, for the first time, comprehensive information about security controls

  13. Revised draft The effects of global shocks on poverty and food security in Vietnam

    E-Print Network [OSTI]

    Coxhead, Ian

    Revised draft The effects of global shocks on poverty and food security in Vietnam Ian Coxhead and Vu Hoang Linh1 Abstract Vietnam, a transitional economy, has faced a series of shocks from global-Madison, USA. Vu Hoang Linh is Research Fellow, Indochina Research & Consulting, Hanoi, Vietnam. The authors

  14. President Obama Hosts Global Nuclear Security Summit | National Nuclear

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPosterNational Nuclear SecuritySecurityNuclear

  15. Radiological and Nuclear Security in A Global Context

    E-Print Network [OSTI]

    Jones, Nick

    2010-01-01

    This paper considers the state of nuclear and radiological security in the UK and abroad and reports on the methods that could be employed by terrorists with radiological or nuclear material to cause destruction. It is shown that despite current safeguards that problems arise due to materials that are unaccounted for and poor implementation of detection regimes in some geographical regions. The prospect of a future terrorist event that involves nuclear or radiological materials seems likely despite best efforts of prevention.

  16. Energy and Global Security Directorate Organization Chart | Argonne

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES October 27th, 2010 Thanks forEnergySurety: A

  17. National Security Campus design team wins global award | National Nuclear

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD |Updated 9/15/11Plant)

  18. How can STFC contribute to the Global Food Security [GFS] Programme?

    E-Print Network [OSTI]

    of logistics to reduce food waste and food miles HPC: · Modelling of processes · Optimising of processesHow can STFC contribute to the Global Food Security [GFS] Programme? STFC will be running funding an overview of the end to end chain of food in society. Consider each area on the diagram and then answer

  19. Capturing Value in a Global Innovation Network: A Comparison of Radical and Incremental Innovation

    E-Print Network [OSTI]

    Dedrick, Jason; Kraemer, Kenneth L; Linden, Greg

    2007-01-01

    the benefits from the global innovation system could quicklyVirtuous? Organizing for innovation. Harvard Business ReviewGlobalization: National Innovation and Security. Washington

  20. Global biosurveillance: enabling science and technology. Workshop background and motivation: international scientific engagement for global security

    SciTech Connect (OSTI)

    Cui, Helen H

    2011-01-18

    Through discussion the conference aims to: (1) Identify core components of a comprehensive global biosurveillance capability; (2) Determine the scientific and technical bases to support such a program; (3) Explore the improvement in biosurveillance to enhance regional and global disease outbreak prediction; (4) Recommend an engagement approach to establishing an effective international community and regional or global network; (5) Propose implementation strategies and the measures of effectiveness; and (6) Identify the challenges that must be overcome in the next 3-5 years in order to establish an initial global biosurveillance capability that will have significant positive impact on BioNP as well as public health and/or agriculture. There is also a look back at the First Biothreat Nonproliferation Conference from December 2007. Whereas the first conference was an opportunity for problem solving to enhance and identify new paradigms for biothreat nonproliferation, this conference is moving towards integrated comprehensive global biosurveillance. Main reasons for global biosurveillance are: (1) Rapid assessment of unusual disease outbreak; (2) Early warning of emerging, re-emerging and engineered biothreat enabling reduced morbidity and mortality; (3) Enhanced crop and livestock management; (4) Increase understanding of host-pathogen interactions and epidemiology; (5) Enhanced international transparency for infectious disease research supporting BWC goals; and (6) Greater sharing of technology and knowledge to improve global health.

  1. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  2. Sustainable Development and Globalization: New Challenges and Opportunities for Work Organization

    E-Print Network [OSTI]

    Ashford, Nicholas

    2004-01-01

    The relationship between industrialization and its effects on the environment has captured the serious attention of national governments and international organizations, especially in light of increasing globalization. ...

  3. Global environmental security: Research and policy strategies for the 1990s

    SciTech Connect (OSTI)

    Lazaro, M.A.; Wang, Hua

    1992-09-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions.

  4. Global environmental security: Research and policy strategies for the 1990s

    SciTech Connect (OSTI)

    Lazaro, M.A.; Wang, Hua.

    1992-01-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions.

  5. Soil Security: Solving the Global Soil Crisis Andrea Koch, Alex McBratney, Mark Adams, Damien Field, Robert Hill,

    E-Print Network [OSTI]

    Lehmann, Johannes

    Soil Security: Solving the Global Soil Crisis Andrea Koch, Alex McBratney, Mark Adams, Damien Field England Michael Zimmermann University of Natural Resources and Life Sciences Vienna Abstract Soil degradation is a critical and growing global problem. As the world population increases, pressure on soil also

  6. Global climate change and international security. Report on a conference held at Argonne National Laboratory, May 8--10, 1991

    SciTech Connect (OSTI)

    Rice, M.

    1991-12-31

    On May 8--10, 1991, the Midwest Consortium of International Security Studies (MCISS) and Argonne National Laboratory cosponsored a conference on Global Climate Change and International Security. The aim was to bring together natural and social scientists to examine the economic, sociopolitical, and security implications of the climate changes predicted by the general circulation models developed by natural scientists. Five themes emerged from the papers and discussions: (1) general circulation models and predicted climate change; (2) the effects of climate change on agriculture, especially in the Third World; (3) economic implications of policies to reduce greenhouse gas emissions; (4) the sociopolitical consequences of climate change; and (5) the effect of climate change on global security.

  7. How America can look within to achieve energy security and reduce global warming.

    SciTech Connect (OSTI)

    Richter, B.; Goldston, D.; Crabtree, G.; Glicksman, L.; Goldstein, D.; Greene, D.; Kammen, D.; Levin, M.; Lubell, M.; Savitz, M.; Sperling, D.; Schlachter, F.; Scofield, J.; Dawson, J.

    2008-12-01

    Making major gains in energy efficiency is one of the most economical and effective ways our nation can wean itself off its dependence on foreign oil and reduce its emissions of greenhouse gases. Transportation and buildings, which account for two thirds of American energy usage, consume far more than they need to, but even though there are many affordable energy efficient technologies that can save consumers money, market imperfections inhibit their adoption. To overcome the barriers, the federal government must adopt policies that will transform the investments into economic and societal benefit. And the federal government must invest in research and development programs that target energy efficiency. Energy efficiency is one of America's great hidden energy reserves. We should begin tapping it now. Whether you want the United States to achieve greater energy security by weaning itself off foreign oil, sustain strong economic growth in the face of worldwide competition or reduce global warming by decreasing carbon emissions, energy efficiency is where you need to start. Thirty-five years ago the U.S. adopted national strategies, implemented policies and developed technologies that significantly improved energy efficiency. More than three decades have passed since then, and science and technology have progressed considerably, but U.S. energy policy has not. It is time to revisit the issue. In this report we examine the scientific and technological opportunities and policy actions that can make the United States more energy efficient, increase its security and reduce its impact on global warming. We believe the findings and recommendations will help Congress and the next administration to realize these goals. Our focus is on the transportation and buildings sectors of the economy. The opportunities are huge and the costs are small.

  8. Enterprise transformation & lean implementation in a globally dispersed organization

    E-Print Network [OSTI]

    Katyal, Abhishek

    2010-01-01

    In July 2007, the Supply Planning Organization (SPO) decided to begin its Lean journey. Through some analysis the decision was made to take a culture first approach and then follow with the use of Lean tools. The time had ...

  9. A policy-oriented language for expressing security specifications Carlos Ribeiro and Paulo Ferreira

    E-Print Network [OSTI]

    Ferreira, Paulo

    A policy-oriented language for expressing security specifications by Carlos Ribeiro and Paulo Fax: +351 213145843 email: Carlos.Ribeiro@inesc.pt Abstract Organizations' authorization policies the organization. Having a single global security policy specification would promote both security clarity

  10. Global distribution and climate forcing of marine organic aerosol: 1. Model improvements and evaluation

    SciTech Connect (OSTI)

    Meskhidze, N.; Xu, J.; Gantt, Brett; Zhang, Yang; Nenes, Athanasios; Ghan, Steven J.; Liu, Xiaohong; Easter, Richard C.; Zaveri, Rahul A.

    2011-11-23

    Marine organic aerosol emissions have been implemented and evaluated within the National Center of Atmospheric Research (NCAR)'s Community Atmosphere Model (CAM5) with the Pacific Northwest National Laboratory's 7-mode Modal Aerosol Module (MAM-7). Emissions of marine primary organic aerosols (POA), phytoplanktonproduced isoprene- and monoterpenes-derived secondary organic aerosols (SOA) and methane sulfonate (MS{sup -}) are shown to affect surface concentrations of organic aerosols in remote marine regions. Global emissions of submicron marine POA is estimated to be 7.9 and 9.4 Tg yr{sup -1}, for the Gantt et al. (2011) and Vignati et al. (2010) emission parameterizations, respectively. Marine sources of SOA and particulate MS{sup -} (containing both sulfur and carbon atoms) contribute an additional 0.2 and 5.1 Tg yr{sup -1}, respectively. Widespread areas over productive waters of the Northern Atlantic, Northern Pacific, and the Southern Ocean show marine-source submicron organic aerosol surface concentrations of 100 ngm{sup -3}, with values up to 400 ngm{sup -3} over biologically productive areas. Comparison of long-term surface observations of water insoluble organic matter (WIOM) with POA concentrations from the two emission parameterizations shows that despite revealed discrepancies (often more than a factor of 2), both Gantt et al. (2011) and Vignati et al. (2010) formulations are able to capture the magnitude of marine organic aerosol concentrations, with the Gantt et al. (2011) parameterization attaining better seasonality. Model simulations show that the mixing state of the marine POA can impact the surface number concentration of cloud condensation nuclei (CCN). The largest increases (up to 20 %) in CCN (at a supersaturation (S) of 0.2 %) number concentration are obtained over biologically productive ocean waters when marine organic aerosol is assumed to be externally mixed with sea-salt. Assuming marine organics are internally-mixed with sea-salt provides diverse results with increases and decreases in the concentration of CCN over different parts of the ocean. The sign of the CCN change due to the addition of marine organics to seasalt aerosol is determined by the relative significance of the increase in mean modal diameter due to addition of mass, and the decrease in particle hygroscopicity due to compositional changes in marine aerosol. Based on emerging evidence for increased CCN concentration over biologically active surface ocean areas/periods, our study suggests that treatment of sea spray in global climate models (GCMs) as an internal mixture of marine organic aerosols and sea-salt will likely lead to an underestimation in CCN number concentration.

  11. Predicted change in global secondary organic aerosol concentrations in response to future climate, emissions, and land use change

    E-Print Network [OSTI]

    Heald, C. L.; Henze, D. K.; Horowitz, L. W.; Feddema, Johannes J.; Lamarque, J. F.; Guenther, A.; Hess, P. G.; Vitt, F.; Seinfeld, J. H.; Goldstein, A. H.; Fung, I.

    2008-03-01

    The sensitivity of secondary organic aerosol (SOA) concentration to changes in climate and emissions is investigated using a coupled global atmosphere-land model driven by the year 2100 IPCC A1B scenario predictions. The Community Atmosphere Model...

  12. Systems integration for global sustainability

    E-Print Network [OSTI]

    2015-01-01

    air pollution, and energy security policy. Energy Policy 38,Mima, European climate–energy security nexus: A model based16). Coupling global energy security policy with climate

  13. Characterizing, Classifying, and Understanding Information Security Laws and Regulations: Considerations for Policymakers and Organizations Protecting Sensitive Information Assets

    E-Print Network [OSTI]

    Thaw, David Bernard

    2011-01-01

    assets. Current information security law in the Unitedimplications for information security professionalism inbeing abundant in the information security community: Yes,

  14. The AeroCom Evaluation and Intercomparison of Organic Aerosol in Global Models

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Tsigaridis, Kostas [Columbia Univ., New York, NY (United States). Center for Climate Systems Research; NASA Goddard Inst. for Space Studies, New York, NY (United States); Daskalakis, N. [Univ. of Crete, Heraklion (Greece). Environmental Chemical Processes Lab.; Foundation for Research and Technology Hellas, Patras (Greece); Inst. of Chemical Engineering; Kanakidou, M. [Univ. of Crete, Heraklion (Greece). Environmental Chemical Processes Lab.; ; Adams, P. J. [Carnegie Mellon Univ., Pittsburgh, PA (United States). Dept. of Civil and Environmental Engineering and Dept. of Engineering and Public Policy; Artaxo, Paulo [Univ. of Sao Paulo (Brazil). Dept of Applied Physics; Bahadur, R. [Univ. of California, San Diego, CA (United States). Scripps Inst. of Oceanography; Balkanski, Y. [Lab. des Sciences du Climat et de l'Environnement, Gif-sur-Yvette (France); Bauer, S. [Columbia Univ., New York, NY (United States). Center for Climate Systems Research; NASA Goddard Inst. for Space Studies, New York, NY (United States); Bellouin, N. [Met Office Hadley Centre, Exeter (United Kingdom); Benedetti, Angela [ECMWF, Reading (United Kingdom); Bergman, T. [Finnish Meteorological Inst., Kuopio (Finland); Berntsen, T. [Univ. of Oslo (Norway). Dept. of Geosciences; CICERO, Oslo (Norway); Beukes, J. P. [North-West Univ., Potchestroom (South Africa). Environmental Sciences and Management; Bian, Huisheng [Univ. of Maryland, Baltimore County, MD (United States). Joint Center for Environmental Technology; Carslaw, K. S. [Univ. of Leeds (United Kingdom). School of Earth and Environment; Chin, M. [NASA Goddard Space Flight Center (GSFC), Greenbelt, MD (United States); Curci, Gabriele [Univ. of L'Aquila (Italy). Dept of Physics CETEMPS; Diehl, Thomas [NASA Goddard Space Flight Center (GSFC) and Universities Space Research Association, Greenbelt, MD (United States); Easter, Richard C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Ghan, Steven J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Gong, S. [Meteorological Service of Canada, Toronto (Canada). Air Quality Research Branch; Hodzic, Alma [National Center for Atmospheric Research, Boulder, CO (United States); Hoyle, Christopher R. [Paul Scherrer Inst. (PSI), Villigen (Switzerland); Swiss Federal Inst. for Forest Snow and Landscape Research (WSL) - Inst. for Snow and Avalanche Research (SLF), Davos (Switzerland); Iversen, T. [ECMWF, Reading (United Kingdom); Univ. of Oslo (Norway). Dept. of Geosciences; Norwegian Meteorological Inst., Oslo (Norway); Jathar, S. [Carnegie Mellon Univ., Pittsburgh, PA (United States). Dept. of Civil and Environmental Engineering; Jimenez, J. L. [Univ. of Colorado, Boulder, CO (United States). Dept. of Chemistry and Biochemistry; Kaiser, J. W. [ECMWF, Reading (United Kingdom); King's College London (United Kingdom). Dept. of Geography; Max Planck Society, Mainz (Germany). Max Planck Inst. for Chemistry, Dept. of Atmospheric Chemistry; ; Kirkevag, A. [Norwegian Meteorological Inst., Oslo (Norway); Koch, Dorothy [Columbia Univ., New York, NY (United States). Center for Climate Systems Research; NASA Goddard Inst. for Space Studies, New York, NY (United States); Kokkola, H. [Finnish Meteorological Inst., Kuopio (Finland); Lee, Y. H. [Carnegie Mellon Univ., Pittsburgh, PA (United States). Dept. of Civil and Environmental Engineering; Lin, G. [Univ. of Michigan, Ann Arbor, MI (United States). Dept. of Atmospheric, Oceanic, and Space Science; Liu, Xiaohong [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Luo, Gan [State Univ. of New York (SUNY), Albany, NY (United States); Ma, Xiaoyan [Environment Canada, Victoria, BC (Canada); Mann, G. W. [Univ. of Leeds (United Kingdom). National Centre for Atmospheric Science and School of Earth and Environment; Mihalopoulos, Nikos [Univ. of Crete, Heraklion (Greece). Environmental Chemical Processes Lab.; Morcrette, J. -J. [ECMWF, Reading (United Kingdom); Muller, J. F. [Belgian Inst. for Space Aeronomy, Brussels (Belgium); Myhre, G. [Center for International Climate and Environmental Research (CICERO), Oslo (Norway)

    2014-01-01

    This paper evaluates the current status of global modeling of the organic aerosol (OA) occurrence in the troposphere and analyzes the differences calculated between models as well as between models and observations. Thirty-one global chemistry/transport and general circulation models have participated in this intercomparison, in the framework of AeroCom phase II. The simulation of OA varies greatly between models in terms of the magnitude of primary emissions, secondary OA (SOA) formation, the number of OA species used (2 to 62), the complexity of OA parameterizations (gas-particle partitioning, chemical aging, multiphase chemistry, aerosol microphysics), and the OA physical, chemical and optical properties. The diversity of the global OA simulation results has increased since earlier AeroCom experiments, mainly due to the increasing complexity of the SOA parameterization in models, and the implementation of new, highly uncertain, OA sources. Diversity of over an order of magnitude exists in the modeled vertical distribution of OA that deserves a dedicated future study. Furthermore, although the OA/OC ratio depends on OA sources and atmospheric processing and is important for model evaluation against OA and OC observations, it is resolved only by few global models. The median global primary OA source strength is 56 Tg a-1 (range 34 - 144 Tg a-1) and the median secondary OA source strength (natural and anthropogenic) is 19 Tg a-1 (range 13-121 Tg a-1). Among the models that take into account the semi-volatile SOA nature, the median source is calculated to be 51 Tg a-1 (range 16-121 Tg a-1), much larger than the median value of the models that calculate SOA in a more simplistic way (19 Tg a-1; range 13-20 Tg a-1, with one model at 37 Tg a-1). The median atmospheric burden of OA is 1.4 Tg (24 models in the range of 0.6-2.0 Tg and 4 between 2.4-3.8 Tg) with a median OA lifetime of 5.4 days (range 3.8-9.6 days). In models that reported both OA and sulfate burdens, the median value of the OA/sulfate burden ratio of is calculated to be 0.77; 13 models calculate a ratio lower than 1, and 9 models higher than 1. For 26 models that reported OA deposition fluxes, the median wet removal is 70 Tg a-1 (range 28-209 Tg a-1), which is on average 85% of the total OA deposition.

  15. National Nuclear Security Administration | Department of Energy

    Office of Environmental Management (EM)

    Administration National Nuclear Security Administration National Nuclear Security Administration More Documents & Publications Global Threat Reduction Initiative U.S. Global Threat...

  16. The AeroCom Evaluation and Intercomparison of Organic Aerosol in Global Models

    SciTech Connect (OSTI)

    Tsigaridis, Kostas; Daskalakis, N.; Kanakidou, M.; Adams, P. J.; Artaxo, Paulo; Bahadur, R.; Balkanski, Y.; Bauer, S.; Bellouin, N.; Benedetti, Angela; Bergman, T.; Berntsen, T.; Beukes, J. P.; Bian, Huisheng; Carslaw, K. S.; Chin, M.; Curci, Gabriele; Diehl, Thomas; Easter, Richard C.; Ghan, Steven J.; Gong, S.; Hodzic, Alma; Hoyle, Christopher R.; Iversen, T.; Jathar, S.; Jimenez, J. L.; Kaiser, J. W.; Kirkevag, A.; Koch, Dorothy; Kokkola, H.; Lee, Y. H.; Lin, G.; Liu, Xiaohong; Luo, Gan; Ma, Xiaoyan; Mann, G. W.; Mihalopoulos, Nikos; Morcrette, J. -J.; Muller, J. F.; Myhre, G.; Myriokefalitakis, S.; Ng, Nga L.; O'Donell, D.; Penner, J. E.; Pozzoli, L.; Pringle, K. J.; Russell, Lynn; Schulz, M.; Sciare, J.; Seland, O.; Shindell, Drew; Sillman, S.; Skeie, R. B.; Spracklen, D. V.; Stavrakou, T.; Steenrod, Stephen D.; Takemura, T.; Tiitta, P.; Tilmes, S.; Tost, H.; van Noije, T.; van Zyl, P. G.; von Salzen, Knut; Yu, Fangqun; Wang, Zaizi; Wang, Zhilli; Zaveri, Rahul A.; Zhang, Hua; Zhang, Kai; Zhang, Qi; Zhang, Xiaoye

    2014-10-15

    This paper evaluates the current status of global modeling of the organic aerosol (OA) occurrence in the troposphere and analyzes the differences calculated between models as well as between models and observations. Thirty-one global chemistry/transport and general circulation models have participated in this intercomparison, in the framework of AeroCom phase II. The simulation of OA varies greatly between models in terms of the magnitude of primary emissions, secondary OA (SOA) formation, the number of OA species used (2 to 62), the complexity of OA parameterizations (gas-particle partitioning, chemical aging, multiphase chemistry, aerosol microphysics), and the OA physical, chemical and optical properties. The diversity of the global OA simulation results has increased since earlier AeroCom experiments, mainly due to the increasing complexity of the SOA parameterization in models, and the implementation of new, highly uncertain, OA sources. Diversity of over an order of magnitude exists in the modeled vertical distribution of OA that deserves a dedicated future study. Furthermore, although the OA/OC ratio depends on OA sources and atmospheric processing and is important for model evaluation against OA and OC observations, it is resolved only by few global models. The median global primary OA source strength is 56 Tg a-1 (range 34 - 144 Tg a-1) and the median secondary OA source strength (natural and anthropogenic) is 19 Tg a-1 (range 13-121 Tg a-1). Among the models that take into account the semi-volatile SOA nature, the median source is calculated to be 51 Tg a-1 (range 16-121 Tg a-1), much larger than the median value of the models that calculate SOA in a more simplistic way (19 Tg a-1; range 13-20 Tg a-1, with one model at 37 Tg a-1). The median atmospheric burden of OA is 1.4 Tg (24 models in the range of 0.6-2.0 Tg and 4 between 2.4-3.8 Tg) with a median OA lifetime of 5.4 days (range 3.8-9.6 days). In models that reported both OA and sulfate burdens, the median value of the OA/sulfate burden ratio of is calculated to be 0.77; 13 models calculate a ratio lower than 1, and 9 models higher than 1. For 26 models that reported OA deposition fluxes, the median wet removal is 70 Tg a-1 (range 28-209 Tg a-1), which is on average 85% of the total OA deposition.

  17. Global

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (Journalvivo Low-Dose Low LETUseful LinksGlass Stronger thanGlenn T.4Global

  18. The AeroCom evaluation and intercomparison of organic aerosol in global models

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Tsigaridis, K.; Daskalakis, N.; Kanakidou, M.; Adams, P. J.; Artaxo, P.; Bahadur, R.; Balkanski, Y.; Bauer, S. E.; Bellouin, N.; Benedetti, A.; et al

    2014-10-15

    This paper evaluates the current status of global modeling of the organic aerosol (OA) in the troposphere and analyzes the differences between models as well as between models and observations. Thirty-one global chemistry transport models (CTMs) and general circulation models (GCMs) have participated in this intercomparison, in the framework of AeroCom phase II. The simulation of OA varies greatly between models in terms of the magnitude of primary emissions, secondary OA (SOA) formation, the number of OA species used (2 to 62), the complexity of OA parameterizations (gas-particle partitioning, chemical aging, multiphase chemistry, aerosol microphysics), and the OA physical, chemicalmore »and optical properties. The diversity of the global OA simulation results has increased since earlier AeroCom experiments, mainly due to the increasing complexity of the SOA parameterization in models, and the implementation of new, highly uncertain, OA sources. Diversity of over one order of magnitude exists in the modeled vertical distribution of OA concentrations that deserves a dedicated future study. Furthermore, although the OA / OC ratio depends on OA sources and atmospheric processing, and is important for model evaluation against OA and OC observations, it is resolved only by a few global models. The median global primary OA (POA) source strength is 56 Tg a–1 (range 34–144 Tg a?1) and the median SOA source strength (natural and anthropogenic) is 19 Tg a–1 (range 13–121 Tg a?1). Among the models that take into account the semi-volatile SOA nature, the median source is calculated to be 51 Tg a–1 (range 16–121 Tg a?1), much larger than the median value of the models that calculate SOA in a more simplistic way (19 Tg a–1; range 13–20 Tg a–1, with one model at 37 Tg a?1). The median atmospheric burden of OA is 1.4 Tg (24 models in the range of 0.6–2.0 Tg and 4 between 2.0 and 3.8 Tg), with a median OA lifetime of 5.4 days (range 3.8–9.6 days). In models that reported both OA and sulfate burdens, the median value of the OA/sulfate burden ratio is calculated to be 0.77; 13 models calculate a ratio lower than 1, and 9 models higher than 1. For 26 models that reported OA deposition fluxes, the median wet removal is 70 Tg a–1 (range 28–209 Tg a?1), which is on average 85% of the total OA deposition. Fine aerosol organic carbon (OC) and OA observations from continuous monitoring networks and individual field campaigns have been used for model evaluation. At urban locations, the model–observation comparison indicates missing knowledge on anthropogenic OA sources, both strength and seasonality. The combined model–measurements analysis suggests the existence of increased OA levels during summer due to biogenic SOA formation over large areas of the USA that can be of the same order of magnitude as the POA, even at urban locations, and contribute to the measured urban seasonal pattern. Global models are able to simulate the high secondary character of OA observed in the atmosphere as a result of SOA formation and POA aging, although the amount of OA present in the atmosphere remains largely underestimated, with a mean normalized bias (MNB) equal to –0.62 (–0.51) based on the comparison against OC (OA) urban data of all models at the surface, –0.15 (+0.51) when compared with remote measurements, and –0.30 for marine locations with OC data. The mean temporal correlations across all stations are low when compared with OC (OA) measurements: 0.47 (0.52) for urban stations, 0.39 (0.37) for remote stations, and 0.25 for marine stations with OC data. The combination of high (negative) MNB and higher correlation at urban stations when compared with the low MNB and lower correlation at remote sites suggests that knowledge about the processes that govern aerosol processing, transport and removal, on top of their sources, is important at the remote stations. There is no clear change in model skill with increasing model complexity with regard to OC or OA mass concentration. As a

  19. Global Security 2009

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    network Personal emails from managers to Interns and Post Docs Internal news portal announcements for launch and success KPIs Users: 793 Ideas: 27 Comments: 35 Votes: 106...

  20. Global Security 2009

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy A plug-inPPLforLDRD Report11, SolarMat 4" |a,-DepartmentMarkedDepartment3744

  1. Strengthening Global Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effect Photovoltaics -7541C.3X-rays3

  2. Waste Isolation Pilot Plant Transportation Security

    Office of Environmental Management (EM)

    Senior Management Operational Management Implementation OOB NTP Transportation Logistics OSO Operations Management Organization Security WIPP Security Conditions * TRU Waste...

  3. A Model for Role Administration Using Organization Lab. for Information Security Technology

    E-Print Network [OSTI]

    Sandhu, Ravi

    A Model for Role Administration Using Organization Structure Sejong Oh Lab. for Information administration is a major issue. ARBAC97 is a well-known solution for decentralized RBAC administration. ARBAC97 authorizes administrative roles by means of `role ranges' and `prerequisite conditions'. Although attractive

  4. Global niche markets and local development : clientelism and fairtrade farmer organizations in Paraguay's sugar industry

    E-Print Network [OSTI]

    Setrini, Gustavo

    2011-01-01

    Globalization has transformed the markets in which agricultural goods are traded, placing new demands on farmers around the world. In developing countries, smallholder and peasant farmers lack many of the resources needed ...

  5. Global Distribution and Climate Forcing of Marine Organic Aerosol - Part 2: Effects on Cloud Properties and Radiative Forcing

    SciTech Connect (OSTI)

    Gantt, Brett; Xu, Jun; Meskhidze, N.; Zhang, Yang; Nenes, Athanasios; Ghan, Steven J.; Liu, Xiaohong; Easter, Richard C.; Zaveri, Rahul A.

    2012-07-25

    A series of simulations with the Community Atmosphere Model version 5 (CAM5) with a 7-mode Modal Aerosol Model were conducted to assess the changes in cloud microphysical properties and radiative forcing resulting from marine organic aerosols. Model simulations show that the anthropogenic aerosol indirect forcing (AIF) predicted by CAM5 is decreased in absolute magnitude by up to 0.09 Wm{sup -2} (7 %) when marine organic aerosols are included. Changes in the AIF from marine organic aerosols are associated with small global increases in low-level incloud droplet number concentration and liquid water path of 1.3 cm{sup -3} (1.5 %) and 0.22 gm{sup -2} (0.5 %), respectively. Areas especially sensitive to changes in cloud properties due to marine organic aerosol include the Southern Ocean, North Pacific Ocean, and North Atlantic Ocean, all of which are characterized by high marine organic emission rates. As climate models are particularly sensitive to the background aerosol concentration, this small but non-negligible change in the AIF due to marine organic aerosols provides a notable link for ocean-ecosystem marine low-level cloud interactions and may be a candidate for consideration in future earth system models.

  6. Program Areas | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program Areas image Oak Ridge National Laboratory (ORNL) has a robust...

  7. Confronting Water and Food Dilemmas A conference for mee ng the challenges for global water and food security.

    E-Print Network [OSTI]

    Confronting Water and Food Dilemmas A conference for mee ng the challenges for global water resources in semi-arid regions and on the role of global sys- tems in ameliora ng local and regional water by impor ng water intensive food commodi- es, and having iden fied the concept of virtual water. Break out

  8. There is an increasing order in digitized technology. This increasing order requires high qualitative document management system which can be used in secure fashion especially for organization with

    E-Print Network [OSTI]

    Abstract There is an increasing order in digitized technology. This increasing order requires high qualitative document management system which can be used in secure fashion especially for organization with different branches and different location. In this paper we propose a qualitative document management

  9. Expanding Global Network: Discovery to Delivery The United States ranks #1 in innovation. Purdue is preparing for the 21st century global

    E-Print Network [OSTI]

    challenges ­ global health, global competitiveness, global energy security, global warming, global with the Bayero University, Nigeria (K. Beaver) Frontiers in applications of carbon nanotubes and graphene

  10. Fluidized Bed Steam Reforming (FBSR) Mineralization for High Organic and Nitrate Waste Streams for the Global Nuclear Energy Partnership (GNEP)

    SciTech Connect (OSTI)

    Jantzen, C.M.; Williams, M.R. [Savannah River National Laboratory, Aiken, SC (United States)

    2008-07-01

    Waste streams that may be generated by the Global Nuclear Energy Partnership (GNEP) Advanced Energy Initiative may contain significant quantities of organics (0-53 wt%) and/or nitrates (0-56 wt%). Decomposition of high nitrate streams requires reducing conditions, e.g. organic additives such as sugar or coal, to reduce the NOx in the off-gas to N{sub 2} to meet the Clean Air Act (CAA) standards during processing. Thus, organics will be present during waste form stabilization regardless of which GNEP processes are chosen, e.g. organics in the feed or organics for nitrate destruction. High organic containing wastes cannot be stabilized with the existing HLW Best Developed Available Technology (BDAT) which is HLW vitrification (HLVIT) unless the organics are removed by preprocessing. Alternative waste stabilization processes such as Fluidized Bed Steam Reforming (FBSR) operate at moderate temperatures (650-750 deg. C) compared to vitrification (1150-1300 deg. C). FBSR converts organics to CAA compliant gases, creates no secondary liquid waste streams, and creates a stable mineral waste form that is as durable as glass. For application to the high Cs-137 and Sr-90 containing GNEP waste streams a single phase mineralized Cs-mica phase was made by co-reacting illite clay and GNEP simulated waste. The Cs-mica accommodates up to 30% wt% Cs{sub 2}O and all the GNEP waste species, Ba, Sr, Rb including the Cs-137 transmutation to Ba-137. For reference, the cesium mineral pollucite (CsAlSi{sub 2}O{sub 6}), currently being studied for GNEP applications, can only be fabricated at {>=}1000 deg. C. Pollucite mineralization creates secondary aqueous waste streams and NOx. Pollucite is not tolerant of high concentrations of Ba, Sr or Rb and forces the divalent species into different mineral host phases. The pollucite can accommodate up to 33% wt% Cs{sub 2}O. (authors)

  11. FLUIDIZED BED STEAM REFORMING MINERALIZATION FOR HIGH ORGANIC AND NITRATE WASTE STREAMS FOR THE GLOBAL NUCLEAR ENERGY PARTNERSHIP

    SciTech Connect (OSTI)

    Jantzen, C; Michael Williams, M

    2008-01-11

    Waste streams that may be generated by the Global Nuclear Energy Partnership (GNEP) Advanced Energy Initiative may contain significant quantities of organics (0-53 wt%) and/or nitrates (0-56 wt%). Decomposition of high nitrate streams requires reducing conditions, e.g. organic additives such as sugar or coal, to reduce the NO{sub x} in the off-gas to N{sub 2} to meet the Clean Air Act (CAA) standards during processing. Thus, organics will be present during waste form stabilization regardless of which GNEP processes are chosen, e.g. organics in the feed or organics for nitrate destruction. High organic containing wastes cannot be stabilized with the existing HLW Best Developed Available Technology (BDAT) which is HLW vitrification (HLVIT) unless the organics are removed by preprocessing. Alternative waste stabilization processes such as Fluidized Bed Steam Reforming (FBSR) operate at moderate temperatures (650-750 C) compared to vitrification (1150-1300 C). FBSR converts organics to CAA compliant gases, creates no secondary liquid waste streams, and creates a stable mineral waste form that is as durable as glass. For application to the high Cs-137 and Sr-90 containing GNEP waste streams a single phase mineralized Cs-mica phase was made by co-reacting illite clay and GNEP simulated waste. The Cs-mica accommodates up to 30% wt% Cs{sub 2}O and all the GNEP waste species, Ba, Sr, Rb including the Cs-137 transmutation to Ba-137. For reference, the cesium mineral pollucite (CsAlSi{sub 2}O{sub 6}), currently being studied for GNEP applications, can only be fabricated at {ge} 1000 C. Pollucite mineralization creates secondary aqueous waste streams and NO{sub x}. Pollucite is not tolerant of high concentrations of Ba, Sr or Rb and forces the divalent species into different mineral host phases. The pollucite can accommodate up to 33% wt% Cs{sub 2}O.

  12. Effect of Terrestrial and Marine Organic Aerosol on Regional and Global Climate: Model Development, Application, and Verification with Satellite Data

    SciTech Connect (OSTI)

    Meskhidze, Nicholas; Zhang, Yang; Kamykowski, Daniel

    2012-03-28

    In this DOE project the improvements to parameterization of marine primary organic matter (POM) emissions, hygroscopic properties of marine POM, marine isoprene derived secondary organic aerosol (SOA) emissions, surfactant effects, new cloud droplet activation parameterization have been implemented into Community Atmosphere Model (CAM 5.0), with a seven mode aerosol module from the Pacific Northwest National Laboratory (PNNL)���¢��������s Modal Aerosol Model (MAM7). The effects of marine aerosols derived from sea spray and ocean emitted biogenic volatile organic compounds (BVOCs) on microphysical properties of clouds were explored by conducting 10 year CAM5.0-MAM7 model simulations at a grid resolution 1.9�������°��������2.5�������° with 30 vertical layers. Model-predicted relationship between ocean physical and biological systems and the abundance of CCN in remote marine atmosphere was compared to data from the A-Train satellites (MODIS, CALIPSO, AMSR-E). Model simulations show that on average, primary and secondary organic aerosol emissions from the ocean can yield up to 20% increase in Cloud Condensation Nuclei (CCN) at 0.2% Supersaturation, and up to 5% increases in droplet number concentration of global maritime shallow clouds. Marine organics were treated as internally or externally mixed with sea salt. Changes associated with cloud properties reduced (absolute value) the model-predicted short wave cloud forcing from -1.35 Wm-2 to -0.25 Wm-2. By using different emission scenarios, and droplet activation parameterizations, this study suggests that addition of marine primary aerosols and biologically generated reactive gases makes an important difference in radiative forcing assessments. All baseline and sensitivity simulations for 2001 and 2050 using global-through-urban WRF/Chem (GU-WRF) were completed. The main objective of these simulations was to evaluate the capability of GU-WRF for an accurate representation of the global atmosphere by exploring the most accurate configuration of physics options in GWRF for global scale modeling in 2001 at a horizontal grid resolution of 1�������° x 1�������°. GU-WRF model output was evaluated using observational datasets from a variety of sources including surface based observations (NCDC and BSRN), model reanalysis (NCEP/ NCAR Reanalysis and CMAP), and remotely-sensed data (TRMM) to evaluate the ability of GU-WRF to simulate atmospheric variables at the surface as well as aloft. Explicit treatment of nanoparticles produced from new particle formation in GU-WRF/Chem-MADRID was achieved by expanding particle size sections from 8 to 12 to cover particles with the size range of 1.16 nm to 11.6 �������µm. Simulations with two different nucleation parameterizations were conducted for August 2002 over a global domain at a 4�������º by 5�������º horizontal resolution. The results are evaluated against field measurement data from the 2002 Aerosol Nucleation and Real Time Characterization Experiment (ANARChE) in Atlanta, Georgia, as well as satellite and reanalysis data. We have also explored the relationship between ���¢��������clean marine���¢������� aerosol optical properties and ocean surface wind speed using remotely sensed data from the Cloud-Aerosol Lidar with Orthogonal Polarization (CALIOP) on board the CALIPSO satellite and the Advanced Microwave Scanning Radiometer (AMSR-E) on board the AQUA satellite. Detailed data analyses

  13. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  14. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    research programs. These programs, which include Cyber Security, Pervasive Information TechnologiesComputer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security

  15. Before House Subcommittee on Africa, Global Health, Global Human...

    Office of Environmental Management (EM)

    House Subcommittee on Africa, Global Health, Global Human Rights, and International Organizations, Committee on Foreign Affairs Before House Subcommittee on Africa, Global Health,...

  16. Global Solutions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not findGeoscience/EnvironmentGlobal Security Global Security

  17. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    30 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 25, 2012 Recognizing employee and retiree volunteer efforts LOS ALAMOS, NEW...

  18. Life Cycle Assessment of the Energy Independence and Security Act of 2007: Ethanol - Global Warming Potential and Environmental Emissions

    SciTech Connect (OSTI)

    Heath, G. A.; Hsu, D. D.; Inman, D.; Aden, A.; Mann, M. K.

    2009-07-01

    The objective of this study is to use life cycle assessment (LCA) to evaluate the global warming potential (GWP), water use, and net energy value (NEV) associated with the EISA-mandated 16 bgy cellulosic biofuels target, which is assumed in this study to be met by cellulosic-based ethanol, and the EISA-mandated 15 bgy conventional corn ethanol target. Specifically, this study compares, on a per-kilometer-driven basis, the GWP, water use, and NEV for the year 2022 for several biomass feedstocks.

  19. USING PERFORMANCE MEASUREMENTS TO EVALUATE AND STRENGTHEN INFORMATION SYSTEM SECURITY

    E-Print Network [OSTI]

    USING PERFORMANCE MEASUREMENTS TO EVALUATE AND STRENGTHEN INFORMATION SYSTEM SECURITY Shirley about the security of information systems for the decision makers of organizations. When organizations to strengthen the overall security of their information and their information systems. Organizations

  20. Global Material Security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFESOpportunitiesNERSC Getting Started at

  1. Recommended Security Controls for Federal Information Systems...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Federal Information Systems and Organizations Note: CNTL NO. Table D2: Security Control Base Lines (Derived From Appendix F) Minimum Requirements: FedRamp Security Controls...

  2. The Global Brain is Neither Global nor a Brain

    E-Print Network [OSTI]

    Rocha, Luis

    The Global Brain is Neither Global nor a Brain Adaptive Webs for Heterarchies Luis Mateus Rocha-organism or a global brain? The Global Brain Is Neither Global nor a Brain #12;!Disembodied Brain Disembodied brains on symbol-matter requirements for open-ended evolution) The Global Brain Is Neither Global Nor a Brain #12

  3. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  4. System and method for secure group transactions

    DOE Patents [OSTI]

    Goldsmith, Steven Y. (Rochester, MN)

    2006-04-25

    A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.

  5. Office of Global Material Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia4) August 2012 Guidance/%2A0348Diversity in theAPAC

  6. Principal Associate Director - Global Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-Rich Matrices in HydrothermalMagneticAiterPrincipal Associate

  7. Interoperable and Secure Communication for Cyber Physical Systems in the Energy Grid

    E-Print Network [OSTI]

    Lee, Eun Kyu

    2014-01-01

    Electric Sector Cyber- security Organization Resource (Grid Interoperability Panel - Cyber Security Working Group.Guidelines for Smart Grid Cyber Security. Sep. 2010. [84] M.

  8. NNSA: Securing Domestic Radioactive Material | National Nuclear...

    National Nuclear Security Administration (NNSA)

    established the Global Threat Reduction Initiative (GTRI) in the Office of Defense Nuclear Nonproliferation to, as quickly as possible, identify, secure, remove andor...

  9. Finance, IT Operations & Information Security Dear Colleagues,

    E-Print Network [OSTI]

    1 Finance, IT Operations & Information Security Dear Colleagues, It is hard not to be mindful financial institutions or e-commerce organizations. On December 6, SEAS' Information Security Office held some basic security awareness information. More information on how to remain secure during the busy

  10. Computer Security Division 2008 Annual Report

    E-Print Network [OSTI]

    played an active role in implementation planning for the Comprehensive National Cyber Security InitiativeComputer Security Division 2008 Annual Report #12;TAble of ConTenTS Welcome 1 Division Organization 2 The Computer Security Division Responds to the Federal Information Security Management Act

  11. The effect of surface irradiance on the absorption spectrum of chromophoric dissolved organic matter in the global ocean

    E-Print Network [OSTI]

    Siegel, David A.

    The effect of surface irradiance on the absorption spectrum of chromophoric dissolved organic 2012 Keywords: Marine CDOM Solar irradiation Surface Photobleaching Photoproduction a b s t r a c Oceans were irradiated over several days with full-spectrum light under a solar simulator at in situ

  12. A model for remote estimation of ultraviolet absorption by chromophoric dissolved organic matter based on the global

    E-Print Network [OSTI]

    Siegel, David A.

    climate. These include photo- and biogeochemical cycling of organic material, release of sulfur and carbon of photo- chemical rate processes and CDOM cycling in the open ocean due to its simplicity and optimization to be critical for determining visible light abso

  13. Postal Security Device Security Policy

    E-Print Network [OSTI]

    Postal Security Device Security Policy FRAMA AG PSD - I Version: R01.06 Date: 25.05.2007 Doc.-ID: DE_FNKPSD_510_SPE File name: DE_FNKPSD_510_SPE_R0106_EN.Security Policy PSD Author: Bernd Zinke, Timo » Non-Confidential « #12;Security Policy FRAMA AG CH-3438 LAUPERSWIL / BERN TITLE: POSTAL SECURITY

  14. Water Scarcity, Security and democracy

    E-Print Network [OSTI]

    Water Scarcity, Security and democracy: a Mediterranean Mosaic edited by Francesca de châtel, Gail holst-WarhaFt and taMMo steenhuis #12;#12;Water Scarcity, Security and democracy: a mediterranean moSaic #12;© 2014 by Global Water Partnership Mediterranean, Cornell University and the Atkinson Center

  15. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  16. Carbon Dioxide & Global Warming

    E-Print Network [OSTI]

    Miami, University of

    Carbon Dioxide & Global Warming University of MiaMi rosenstiel sChool of Marine anD atMospheriC s , organic carbon, and other chemicals that contribute to global warming in a variety of studies. DownCienCe 4600 rickenbacker Causeway Miami, florida 33149 http://www.rsmas.miami.edu the Chemistry of Global

  17. Meteorology as Infrastructural Globalism

    E-Print Network [OSTI]

    Edwards, Paul N.

    the history of a global governance institution, the World Me- teorological Organization (WMO), from its (from the 1967 inauguration of the Intelsat system) and global environmental monitoring (from the UN Confer- ence on the Human Environment, 1972). Throughout, Hewson sees global governance institutions

  18. Information Security Specialist | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Security Specialist Information Security Specialist Submitted by admin on Sun, 2015-09-13 00:15 Job Summary Organization Name Department Of Energy Agency SubElement...

  19. Digest of Global Initiatives (June 16, 2011)

    E-Print Network [OSTI]

    Pittendrigh, Barry

    it comes to clean energy, energy security, environmental stabilitDigest of Global Initiatives (June 16, 2011) Active or Pending: Active Title: Eco, and practical protocols for the best solutions for global energy, climate, and environmental problems. More than

  20. Global patterns and controls of soil organic carbon dynamics as simulated by multiple terrestrial biosphere models: Current status and future directions

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Tian, Hanqin; Lu, Chaoqun; Yang, Jia; Banger, Kamaljit; Huntzinger, Deborah N.; Schwalm, Christopher R.; Michalak, Anna M.; Cook, Robert; Ciais, Philippe; Hayes, Daniel; et al

    2015-06-05

    Soil is the largest organic carbon (C) pool of terrestrial ecosystems, and C loss from soil accounts for a large proportion of land-atmosphere C exchange. Therefore, a small change in soil organic C (SOC) can affect atmospheric carbon dioxide (CO?) concentration and climate change. In the past decades, a wide variety of studies have been conducted to quantify global SOC stocks and soil C exchange with the atmosphere through site measurements, inventories, and empirical/process-based modeling. However, these estimates are highly uncertain, and identifying major driving forces controlling soil C dynamics remains a key research challenge. This study has compiled century-longmore »(1901–2010) estimates of SOC storage and heterotrophic respiration (Rh) from 10 terrestrial biosphere models (TBMs) in the Multi-scale Synthesis and Terrestrial Model Intercomparison Project and two observation-based data sets. The 10 TBM ensemble shows that global SOC estimate ranges from 425 to 2111 Pg C (1 Pg = 10ą? g) with a median value of 1158 Pg C in 2010. The models estimate a broad range of Rh from 35 to 69 Pg C yr?ą with a median value of 51 Pg C yr?ą during 2001–2010. The largest uncertainty in SOC stocks exists in the 40–65°N latitude whereas the largest cross-model divergence in Rh are in the tropics. The modeled SOC change during 1901–2010 ranges from –70 Pg C to 86 Pg C, but in some models the SOC change has a different sign from the change of total C stock, implying very different contribution of vegetation and soil pools in determining the terrestrial C budget among models. The model ensemble-estimated mean residence time of SOC shows a reduction of 3.4 years over the past century, which accelerate C cycling through the land biosphere. All the models agreed that climate and land use changes decreased SOC stocks, while elevated atmospheric CO? and nitrogen deposition over intact ecosystems increased SOC stocks—even though the responses varied significantly among models. Model representations of temperature and moisture sensitivity, nutrient limitation, and land use partially explain the divergent estimates of global SOC stocks and soil C fluxes in this study. In addition, a major source of systematic error in model estimations relates to nonmodeled SOC storage in wetlands and peatlands, as well as to old C storage in deep soil layers.« less

  1. Welcome to the Pressure Cooker: How Climate Change is Making Our World More Violent and Less Secure -Presented by Dr. Marc Levy, Deputy Director,

    E-Print Network [OSTI]

    Kavanagh, Karen L.

    on environmental security, on global environmental governance, and on sustainability indicators. He has served

  2. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO...

  3. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  4. U.S. Homeland Security R&D Budgets

    SciTech Connect (OSTI)

    Halvorson, C S

    2009-03-30

    The FY09 budgets for homeland security research and development programs in the U.S. are summarized. Homeland security policy developments that can influence future efforts are discussed. Initial indications of the new administration direction on homeland security R&D are summarized. An overview of the Optics and Photonics in Global Homeland Security V conference is presented.

  5. cybersecurity.pnnl.gov Securing the Nation's Critical Infrastructure

    E-Print Network [OSTI]

    : » Global Threat Intelligence » Electric Grid Security » Cyber Physical Systems » Bio-inspired Security and evaluating safeguards, we can provide a better defense against threats or adversaries. Electric Grid Security PNNL is leading the charge to secure a safer and more reliable grid. We are currently developing cyber

  6. Analysis of the optical coupling of wavelength-shifting fibers to organic liquid scintillator filled fluoropolymer tubes for industrial and nuclear security applications

    E-Print Network [OSTI]

    Schools, Chad C

    2014-01-01

    Industrial and nuclear security applications continue to push radiation detection development into new and exciting frontiers. In this work, an innovative detection module is developed and tested for use in a cosmic ray ...

  7. Enterprise Information Security Management Framework [EISMF

    E-Print Network [OSTI]

    Sharma, Dhirendra, S.M. Massachusetts Institute of Technology

    2011-01-01

    There are several technological solutions available in the market to help organizations with information security breach detection and prevention such as intrusion detection and prevention systems, antivirus software, ...

  8. Policy Paper 37: Energy and Security in Northeast Asia: Proposals for Nuclear Cooperation

    E-Print Network [OSTI]

    Kaneko, Kumao; Suzuki, Atsuyuki; Choi, Jor-Shan; Fei, Edward

    1998-01-01

    Policy Papers 35-37, Energy and Security in Northeast Asia,regional and global energy and security politics. In PolicyPolicy Paper 24, Energy and Security in Northeast Asia). 2

  9. Table of Contents Division Organization 2

    E-Print Network [OSTI]

    Security and Forensics 33 NIST Cloud Computing Project 34 Policy Machine 35 Security for Grid#12;2002 Table of Contents Welcome 1 Division Organization 2 The Computer Security Division Implements the 3 Federal Information Security Management Act of Security Management and Assurance Group 4

  10. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  11. Formalizing Information Security Knowledge Stefan Fenz

    E-Print Network [OSTI]

    Formalizing Information Security Knowledge Stefan Fenz Vienna University of Technology Vienna ontology which provides an on- tological structure for information security domain knowl- edge. Besides of the considered organization is incorporated. An evaluation conducted by an information security expert team has

  12. October 2012 Cyber Security Test Bed

    E-Print Network [OSTI]

    McShea, Daniel W.

    1 October 2012 Cyber Security Test Bed Project Leads Brent Rowe, RTI International The inadequacy of U.S. small and medium businesses' cyber security poses great risk to these businesses and to all U.S. organizations and individuals.1 To test strategies for improving the level of cyber security

  13. Global trends in agriculture and food systems

    E-Print Network [OSTI]

    Delaware, University of

    development * Corresponding author: Danish Research Centre for Organic Food and Farming (DARCOF), P.O. Box 501 Global trends in agriculture and food systems Marie Trydeman Knudsen*, Niels Halberg, Jřrgen E .................................................................................16 Global trends in organic agriculture

  14. Global Cool Cities Alliance

    Broader source: Energy.gov [DOE]

    The Department of Energy (DOE) is currently supporting the Global Cool Cities Alliance (GCCA), a non-profit organization that works with cities, regions, and national governments to speed the...

  15. SECURING WIRELESS SECURING WIRELESS

    E-Print Network [OSTI]

    in implementing a family of voluntary industry standards developed by the Institute of Electrical and Electronics, in 2002. This guide assists organizations in implementing a family of voluntary industry standardsInformation Technology Laboratory National Institute of Standards and Technology National Institute of Standards

  16. Climate-derived tensions in Arctic security.

    SciTech Connect (OSTI)

    Backus, George A.; Strickland, James Hassler

    2008-09-01

    Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

  17. Global Statistics

    E-Print Network [OSTI]

    Crow, Ben D

    2006-01-01

    of Globalization: Statistics Weiss, L. (1997). "of Globalization: Statistics Milanovic, B. (1999). Truethe focus of global statistics, particularly in relation to

  18. Lateral stakeholder alignment in the Global Water Partnership

    E-Print Network [OSTI]

    Parrot, Katherine W

    2007-01-01

    This research evaluates stakeholder alignment in a global multi-stakeholder organization called the Global Water Partnership (GWP). The GWP represents a new breed of organization, a Global Multi-Stakeholder Network ...

  19. Safeguards and Security and Cyber Security RM

    Office of Environmental Management (EM)

    using security measures such as badging, pre-employment investigation and fitness for duty, training, and security awareness? Cyber Security CS-1 Has the project...

  20. Security Issues in OpenStack Rostyslav Slipetskyy

    E-Print Network [OSTI]

    specification for security assessment of cloud computing services. At the same time different organizations try to create their own guidelines for cloud security. We start our work with comparing available cloud security. Trondheim, June 2011 Rostyslav Slipetskyy iii #12;iv #12;List of Tables 3.1 Cloud Computing Security Issues

  1. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    System-of-systems analysis Visualization tools for complex information Next-generation smart grid technologies Quantum computing, security, and data fusion For more information,...

  2. Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 6th, 2005 Information Systems Security: a Model for HIPAA Security Compliance

    E-Print Network [OSTI]

    Tappert, Charles

    Systems Security: a Model for HIPAA Security Compliance Kathleen M. Bravo Abstract The healthcare industry are struggling with preparedness. HIPAA security differs from current security measures that organizations have in place in that organizations cannot pick and choose which measures to implement but, instead, must adhere

  3. Secretary Chu to Focus on Opportunities for Global Cooperation...

    Broader source: Energy.gov (indexed) [DOE]

    also address needed energy investments in security, sustainable development and global poverty alleviation. Following his trip to Rome, Secretary Chu will travel to the United...

  4. NNSA's Global Threat Reduction Initiative Removes More Than One...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Threat Reduction Initiative Removes More Than One Ton of Food | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  5. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  6. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  7. Office of Global Material Security | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster SessionPrograms | National Nuclear

  8. Tag: Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorking With U.S. Coal Stocks atDownstreamMotorCharm4.2ES&H

  9. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  10. Secure PVM

    SciTech Connect (OSTI)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  11. Brokering strategic partnerships between Asian and western biopharmaceutical companies in the global biologics market : assessment of capabilities of Asian participants in the biologics contract manufacturing organization marketplace

    E-Print Network [OSTI]

    Chun, Soo Jin, S.M. Massachusetts Institute of Technology

    2009-01-01

    It has become increasingly important for companies in the biopharmaceutical industry to maximize the clinical, commercial and economic impact of their products on a global scale. In this context, both Western and Asian ...

  12. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  13. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  14. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  15. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity Security

  16. Globalization Nationalized

    E-Print Network [OSTI]

    Mazlish, Bruce

    Globalism and globalization have been seen as competitors to other allegiances, namely regionalism and nationalism. A look at recent efforts at reconceptualizing global history in China, Korea and the U.S., however, suggests ...

  17. On the Effectiveness of Global Private Regulation: The Implementation of the Equator Principles by Multinational Banks

    E-Print Network [OSTI]

    Meyerstein, Ariel

    2011-01-01

    Organizations and Global Environmental Governance. Biermann,driven (NSMD) global environmental governance: a cross-Governance: Lessons from the Finnish Forest Certification Experience." Global Environmental

  18. Energy and Global Security | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not find what youSummerEmploymentMedia AdvisoriesPortalAbout

  19. Control Systems Cyber Security Standards Support Activities

    SciTech Connect (OSTI)

    Robert Evans

    2009-01-01

    The Department of Homeland Security’s Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSP’s current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

  20. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  1. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio August 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Security

  2. INSTITUTE FOR CYBER SECURITY Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio August-world impact #12;INSTITUTE FOR CYBER SECURITY Institute for Cyber Security Founded June 2007: still in start

  3. NSM Secure UI Crypto Module Security Policy

    E-Print Network [OSTI]

    NSM Secure UI Crypto Module Security Policy Version: 1.4 Revision Date: April 1, 2010 This document. #12;McAfee, Inc NSM Secure UI Crypto Module Security Policy Page 2 of 15 CHANGE RECORD Revision Date Module Security Policy Page 3 of 15 Contents 1 Module Overview

  4. Security for grids

    E-Print Network [OSTI]

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-01-01

    differences between Grid security and host or site securityof requirements for Grid security in order to achieve thecompletely. Index Terms — Grid security, authentication,

  5. Integrated Safeguards and Security Management (ISSM) Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The purpose of this Policy is to formalize an Integrated Safeguards and Security Management (ISSM) framework. Safeguards and security management systems provide a formal, organized process for planning, performing, assessing, and improving the secure conduct of work in accordance with risk-based protection strategies. These systems are institutionalized through Department of Energy (DOE) directives and contracts. Does not cancel other directives. Canceled by DOE P 470.1A.

  6. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  7. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  8. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  9. Safety and Security Technologies for Radioactive Material Shipments

    Office of Environmental Management (EM)

    Technologies Study Emerging Technologies Continued 7. Nanopiezoelectronics. 8. Plastic thin-film organic solar cells. 9. Container integrity. Safety & Security Technologies...

  10. Department of Energy Cyber Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2012-12-06

    Modifications correct changes to the composition of Senior DOE Management organizations, name change from DOE Cyber Incident Response Capability to Joint Cybersecurity Coordination Center and transfer of responsibility for communications security and TEMPEST to the Office of Health, Safety and Security.

  11. University of Connecticut Information Technology Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    University of Connecticut Information Technology Security Incident Response Plan #12;- i - Revision management issue for all organizations, including the University of Connecticut. Furthermore, as more or framework within which University of Connecticut incident handlers can work to ensure a complete

  12. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  13. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  14. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  15. Faculty Information Security Guide

    E-Print Network [OSTI]

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  16. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  17. A Comprehensive and Comparative Metric for Information Security

    E-Print Network [OSTI]

    Breu, Ruth

    A Comprehensive and Comparative Metric for Information Security Steffen Weiß1 , Oliver Weissmann2 security GmbH, Germany Abstract Measurement of information security is important for organizations , Falko Dressler1* 1 Dept. of Computer Science 7, University of Erlangen, Germany 2 atsec information

  18. Security Risk Management via Dynamic Games with Learning

    E-Print Network [OSTI]

    Alpcan, Tansu

    Security Risk Management via Dynamic Games with Learning Praveen Bommannavar Management Science@stanford.edu Abstract--This paper presents a game theoretic and learning approach to security risk management based agent, e.g. security and risk management division of the organization, which aims to mitigate risks. We

  19. Nuclear security

    SciTech Connect (OSTI)

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  20. MIT Joint Program on the Science and Policy of Global Change

    E-Print Network [OSTI]

    MIT Joint Program on the Science and Policy of Global Change Future United States Energy Security paper #12;1 Future United States Energy Security Concerns John Deutch Department of Chemistry the connection between energy and security, especially how the energy security issues that we face in the future

  1. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  2. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  3. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  4. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  5. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  6. 2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

  7. NIST Computer Security Division csrc.nist.gov Summary of NIST SP 800-53 Revision 4,

    E-Print Network [OSTI]

    , the Intelligence Community, the Committee on National Security Systems, the Department of Homeland Security, and UNIST Computer Security Division csrc.nist.gov Summary of NIST SP 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations Kelley Dempsey Computer Security

  8. 2014 Headquarters Facilities Master Security Plan- Chapter 3, Personnel Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Describes DOE Headquarters Personnel Security procedures for acquiring, maintaining, and passing security clearances.

  9. Using Operational Security (OPSEC) to Support a Cyber Security...

    Energy Savers [EERE]

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  10. The Global Energy Challenge

    ScienceCinema (OSTI)

    Crabtree, George

    2010-01-08

    The expected doubling of global energy demand by 2050 challenges our traditional patterns of energy production, distribution and use.   The continued use of fossil fuels raises concerns about supply, security, environment and climate.  New routes are needed for the efficient conversion of energy from chemical fuel, sunlight, and heat to electricity or hydrogen as an energy carrier and finally to end uses like transportation, lighting, and heating. Opportunities for efficient new energy conversion routes based on nanoscale materials will be presented, with emphasis on the sustainable energy technologies they enable.

  11. Principles of Security: Human, Cyber, and Biological

    E-Print Network [OSTI]

    Stacey, Blake C

    2013-01-01

    Cybersecurity attacks are a major and increasing burden to economic and social systems globally. Here we analyze the principles of security in different domains and demonstrate an architectural flaw in current cybersecurity. Cybersecurity is inherently weak because it is missing the ability to defend the overall system instead of individual computers. The current architecture enables all nodes in the computer network to communicate transparently with one another, so security would require protecting every computer in the network from all possible attacks. In contrast, other systems depend on system-wide protections. In providing conventional security, police patrol neighborhoods and the military secures borders, rather than defending each individual household. Likewise, in biology, the immune system provides security against viruses and bacteria using primarily action at the skin, membranes, and blood, rather than requiring each cell to defend itself. We propose applying these same principles to address the c...

  12. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  13. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

  14. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Infrastructure Demonstration for Energy reliability and Security) (web link) program to demonstrate: · Cyber-securityEnergy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  15. China's Global Oil Strategy

    E-Print Network [OSTI]

    Thomas, Bryan G

    2009-01-01

    attributed to seeking energy security, and many argue thats Worldwide Quest for Energy Security, (Paris: OCED/IEA,s Worldwide Quest for Energy Security, (Paris: OCED/IEA,

  16. An Experience Report on Undergraduate Cyber-Security Education and Outreach

    E-Print Network [OSTI]

    An Experience Report on Undergraduate Cyber-Security Education and Outreach Michael E. Locasto Terms Security Keywords cyber security training, SISMAT 1. INTRODUCTION Organizations face a critical training in cyber security tools. At the same time, information secu- rity problems (e.g., recovering from

  17. Global Predictions 

    E-Print Network [OSTI]

    Swyden, Courtney

    2006-01-01

    stream_source_info Global Predictions.pdf.txt stream_content_type text/plain stream_size 7503 Content-Encoding ISO-8859-1 stream_name Global Predictions.pdf.txt Content-Type text/plain; charset=ISO-8859-1 Every morning... drought index is based on a daily water balance, where a drought factor is calculated with precipitation and soil moisture,? Srinivasan said. Global Predictions Story by Courtney Swyden Global Predictions Lab uses advanced technologies to forecast...

  18. GLOBAL THREAT REDUCTION INITIATIVE REACTOR CONVERSION PROGRAM: STATUS AND CURRENT PLANS

    SciTech Connect (OSTI)

    Staples, Parrish A.; Leach, Wayne; Lacey, Jennifer M.

    2009-10-07

    The U.S. Department of Energy’s National Nuclear Security Administration (NNSA) Reactor Conversion Program supports the minimization, and to the extent possible, elimination of the use of high enriched uranium (HEU) in civilian nuclear applications by working to convert research and test reactors and radioisotope production processes to the use of low enriched uranium (LEU). The Reactor Conversion Program is a technical pillar of the NNSA Global Threat Reduction Initiative (GTRI) which is a key organization for implementing U.S. HEU minimization policy and works to reduce and protect vulnerable nuclear and radiological material domestically and abroad.

  19. DOE/NNSA visits Mumbai in support of India's Global Center for...

    National Nuclear Security Administration (NNSA)

    visits Mumbai in support of India's Global Center for Nuclear Energy Partnership | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission...

  20. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia, and reactorsystemoverviews. Training in Action: Gulf Nuclear Energy InfrastructureInstitute In2011,SandiateamedwiththeNuclearSecurity energy safety, security,safeguards,andnonproliferation. Training Sandia National Laboratories experts

  1. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  2. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  3. Security | Department of Energy

    Office of Environmental Management (EM)

    Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top...

  4. Embracing the Cloud for Better Cyber Security

    SciTech Connect (OSTI)

    Shue, Craig A; Lagesse, Brent J

    2011-01-01

    The future of cyber security is inextricably tied to the future of computing. Organizational needs and economic factors will drive computing outcomes. Cyber security researchers and practitioners must recognize the path of computing evolution and position themselves to influence the process to incorporate security as an inherent property. The best way to predict future computing trends is to look at recent developments and their motivations. Organizations are moving towards outsourcing their data storage, computation, and even user desktop environments. This trend toward cloud computing has a direct impact on cyber security: rather than securing user machines, preventing malware access, and managing removable media, a cloud-based security scheme must focus on enabling secure communication with remote systems. This change in approach will have profound implications for cyber security research efforts. In this work, we highlight existing and emerging technologies and the limitations of cloud computing systems. We then discuss the cyber security efforts that would support these applications. Finally, we discuss the implications of these computing architecture changes, in particular with respect to malware and social engineering.

  5. Cyber Security and Resilient Systems

    SciTech Connect (OSTI)

    Robert S. Anderson

    2009-07-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

  6. Global energy and global precipitation

    E-Print Network [OSTI]

    1 Global energy and global precipitation or Why doesn't precipitation increase as Clausias expect precipitation to increase at the same rate. · Rest of this brief talk is to show you why Heat Flux (S) 20 W/m2 Atmospheric heating from precipitation LP Atmosphere has small heat capacity. So

  7. Visualizing Cyber Security: Usable Workspaces

    SciTech Connect (OSTI)

    Fink, Glenn A.; North, Christopher L.; Endert, Alexander; Rose, Stuart J.

    2009-10-11

    An environment that supports cyber analytics work should enable multiple, simultaneous investigations, information foraging, and provide a solution space for organizing data. We describe our study of cyber security professionals and visualizations in a large, high-resolution display work environment. We discuss the tasks and needs of analysts that such an environment can support and present several prototypes designed to support these needs. We conclude with a usability evaluation of the prototypes and additional lessons learned.

  8. Welcome to Los Alamos National Laboratory: A premier national security science laboratory

    SciTech Connect (OSTI)

    Wallace, Terry [Los Alamos National Laboratory

    2012-06-25

    Dr Wallace presents visitors with an overview of LANL's national security science mission: stockpile stewardship, protecting against the nuclear threat, and energy security & emerging threats, which are underpinned by excellence in science/technology/engineering capabilities. He shows visitors a general Lab overview of budget, staff, and facilities before providing a more in-depth look at recent Global Security accomplishments and current programs.

  9. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    society. www.ists.dartmouth.edu THE DARTMOUTH CYBER SECURITY INITIATIVE The Dartmouth Cyber Security, TECHNOLOGY, AND SOCIETY THE DARTMOUTH CYBER SECURITY INITIATIVE #12;The number of laptop thefts at Dartmouth, and Society; and the Dartmouth Cyber Security Initiative offer the following solutions: · Whole

  10. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  11. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  12. Deputy Secretary Sell Highlights Cooperation in Global Energy...

    Broader source: Energy.gov (indexed) [DOE]

    Wednesday on the first stop of his three-nation swing, which will also take him to Ukraine and Georgia, to promote global energy security and nuclear non-proliferation. While...

  13. Global Change and Sustainability Center Spring Seminar Series

    E-Print Network [OSTI]

    Tipple, Brett

    science. His research interests include sustainable development, Muslim and South Asian politicsGlobal Change and Sustainability Center Spring Seminar Series " Environment, Development & Security in the Age of Climate Change Adaptation

  14. Simulating land use change in China from a global perspective

    E-Print Network [OSTI]

    Palmer, Paul

    drivers of population growth and socio-economic development to agricultural yield changes and alternative productivity and stable relationships with global food suppliers are important determinants of food security

  15. Page 1Securing the Microsoft Cloud Securing the

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Page 1Securing the Microsoft Cloud Securing the Microsoft Cloud #12;Page 2Securing the Microsoft to have confidence in Microsoft as their preferred cloud provider. Our security policies and practices their security and compliance related needs. Securing the Microsoft Cloud #12;Page 3Securing the Microsoft Cloud

  16. Situated Usability Testing for Security Systems

    SciTech Connect (OSTI)

    Greitzer, Frank L.

    2011-03-02

    While usability testing is well established, assessing the usability of security software, tools, or methods deserves more careful consideration. It has been argued that dealing with security has become too difficult for individuals or organizations to manage effectively or to use conveniently. As difficult as it is for system administrators and developers to deal with, security is even more challenging for casual users. Indeed, it is much too easy for casual/home users to configure the security of their systems in non-optimal ways that leave their systems inadvertently insecure. This is exacerbated by the fact that casual users are focused on matters other than security, and likely would prefer not even to think about security. This brief report argues that when security and/or privacy are part of the equation, traditional methods for usability testing should be re-considered. The purpose of this brief report is to argue for and outline a method associated with a new approach to usability testing for examining usable security issues.

  17. 2010-11 Princeton Global Scholar Giacomo Luciani

    E-Print Network [OSTI]

    Singh, Jaswinder Pal

    2010-11 Princeton Global Scholar Giacomo Luciani Giacomo Luciani is the director of the Dubai economy of the Middle East, as well as the economics of energy in the Persian Gulf and the Arab world the rest of the world. He currently leads research on security of oil supplies within the SECURE project

  18. Global warming, global research, and global governing

    SciTech Connect (OSTI)

    Preining, O.

    1997-12-31

    The anticipated dangers of Global Warming can be mitigated by reducing atmospheric greenhouse gas concentrations, especially CO{sub 2}. To reach acceptable, constant levels within the next couple of centuries it might be necessary to accept stabilization levels higher than present ones, The annual CO{sub 2} emissions must be reduced far below today`s values. This is a very important result of the models discussed in the 1995 IPCC report. However, any even very modest scenario for the future must take into account a substantial increase in the world population which might double during the 21st century, There is a considerable emission reduction potential of the industrialized world due to efficiency increase, However, the demand for energy services by the growing world population will, inspite of the availability of alternative energy resources, possibly lead to a net increase in fossil fuel consumption. If the climate models are right, and the science community believes they are, we will experience a global warming of the order of a couple of degrees over the next century; we have to live with it. To be prepared for the future it is essential for us to use new research techniques embracing not only the familiar fields of hard sciences but also social, educational, ethical and economic aspects, We must find a way to build up the essential intellectual capacities needed to deal with these kinds of general problems within all nations and all societies. But this is not Although, we also have to find the necessary dynamical and highly flexible structures for a global governing using tools such as the environmental regime. The first step was the Framework Convention On Climate Change, UN 1992; for resolution of questions regarding implementations the Conference of the Parties was established.

  19. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Summit | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  20. Global Warming

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (Journalvivo Low-Dose Low LETUseful LinksGlass StrongerGlobalOn1 Global

  1. Building Extensible and Secure Networks

    E-Print Network [OSTI]

    Popa, Lucian

    2011-01-01

    adoption of cloud computing is security, as customers oftenpreserving security when migrating to the cloud computingto the security principals used in the cloud access control

  2. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    for Environment and National Security Scripps Institution ofMultiplying Threats to National Security Higher temperaturesefforts to protect national security. Page 2 The U.S. Armed

  3. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  4. On Pictorial Organization

    E-Print Network [OSTI]

    Wollheim, Richard

    2002-01-01

    , 2001 © Copyright 200~ by Department of Philosophy University of Kansas On Pictorial Organization Richard Wollhcim U nivcrsity of California, Berkeley 1. Paintings arc organized objects. That much we know, and, in an area where not much is secure... painting works or doesn't work has something to do with its organization, and this idea gains support from the fact that it is only at a late stage in the creative process that the painter will start to think about the painting's working. No serious...

  5. Global product development : a framework for organizational diagnosis

    E-Print Network [OSTI]

    Martínez, Víctor Takahiro Endo

    2008-01-01

    The main purpose of this thesis is to present an approach for analyzing product development organizations in a globalizing world. The fragmentation and distribution of several product development activities in the global ...

  6. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  7. China's Global Oil Strategy

    E-Print Network [OSTI]

    Thomas, Bryan G

    2009-01-01

    s Worldwide Quest for Energy Security, (Paris: OCED/IEA,s Worldwide Quest for Energy Security, (Paris: OCED/IEA,China’s Quest for Energy Security, (Washington: RAND Project

  8. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  9. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  10. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY

  11. nevada national security site

    National Nuclear Security Administration (NNSA)

    7%2A en Nevada National Security Site operator recognized for green fleet http:www.nnsa.energy.govblognevada-national-security-site-operator-recognized-green-fleet

    The...

  12. Office of Heath, Safety and Security Now Two New Offices

    Office of Energy Efficiency and Renewable Energy (EERE)

    To serve you better, DOE has structured the former HSS into to new organizations: the Office Independent Enterprise Assessment (IEA); and Office of Environment, Health, Safety and Security (EHSS).

  13. National Security Technology Incubator Operations Plan

    SciTech Connect (OSTI)

    2008-04-30

    This report documents the operations plan for developing the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI program will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The NSTI program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). The operation plan includes detailed descriptions of the structure and organization, policies and procedures, scope, tactics, and logistics involved in sustainable functioning of the NSTI program. Additionally, the operations plan will provide detailed descriptions of continuous quality assurance measures based on recommended best practices in incubator development by the National Business Incubation Association (NBIA). Forms that assist in operations of NSTI have been drafted and can be found as an attachment to the document.

  14. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  15. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  16. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    Pew Project on National Security, Energy and Climate http://of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.

  17. Foiling the Flu Bug Global Partnerships for Nuclear Energy

    E-Print Network [OSTI]

    1 1663 Foiling the Flu Bug Global Partnerships for Nuclear Energy Dark Universe Mysteries WILL NOT NEED TESTING Expanding Nuclear Energy the Right Way GLOBAL PARTNERSHIPS AND AN ADVANCED FUEL CYCLE sense.The Laboratory is operated by Los Alamos National Security, LLC, for the Department of Energy

  18. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  19. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  20. cyber security guru

    E-Print Network [OSTI]

    Sandhu, Ravi

    cyber security guru By: Virginia Scott Posted: 4/17/07 UTSA has received a grant from the Texas Emerging Fund to create an institute for cyber security research. According to UTSA industry and educational initiatives in Texas. The creation of UTSA's Institute for Cyber Security Research

  1. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  2. Managing Tensions In A Globalizing Environment 

    E-Print Network [OSTI]

    Shoemaker, Martha McArdell

    2010-10-12

    Globalizing processes often place the social cohesion of organizations at risk when multinational people experience and exhibit tensions from their diverse cultural and language norms. This study uses discourse analysis ...

  3. Military implications of global warming. Strategy research project

    SciTech Connect (OSTI)

    Greene, P.E.

    1999-05-20

    The 1998 National Security Strategy repeatedly cites global environmental issues as key to the long-term security of the United States. Similarly, US environmental issues also have important global implications. This paper analyzes current US Policy as it pertains to global warming and climate change. It discusses related economic factors and environmental concerns. It assesses current White House policy as it relates to the US military. It reviews the Department of Defense strategy for energy conservation and reduction of greenhouse gases. Finally, it offers recommendations and options for military involvement to reduce global warming. Global warming and other environmental issues are important to the US military. As the United States leadership in environmental matters encourages global stability, the US military will be able to focus more on readiness and on military training and operations.

  4. ORAU Science Education Program (SEP) Global Change Education...

    Broader source: Energy.gov (indexed) [DOE]

    Organization Contact Us Contact Us Home Operational Management Services Offices ORAU Science Education Program (SEP) Global Change Education Program (GCEP) PIA, Office of...

  5. A Framework for the Management of Information Security Jussipekka Leiwo, Chandana Gamage and Yuliang Zheng

    E-Print Network [OSTI]

    Zheng, Yuliang

    A Framework for the Management of Information Security Jussipekka Leiwo, Chandana Gamage,chandag,yuliangg@fcit.monash.edu.au Abstract Information security is based on access control models and cryptographic techniques of comprehensive information security within organizations. There is a need to study upper level issues

  6. Master of Science in Information SecurityFlexible, Applied, Master's Degrees.

    E-Print Network [OSTI]

    Snider, Barry B.

    GPS ONLINE Master of Science in Information SecurityFlexible, Applied, Master's Degrees. Join our professionals in both the private and public sectors. The Master of Science in Information Security provides its risks to the security of proprietary information in an organization. Understand the technical

  7. Your mission-critical workloads require the highest levels of performance and security,

    E-Print Network [OSTI]

    Greenberg, Albert

    , ease of use and speed benefits of multi-tenant cloud, combined with the enterprise-grade security transform the way you deliver services to your organization. Extend the Security of your VPN IBM Cloud with the security features of an IBM cloud. Instead of using the public Internet to transport data, this "cloud

  8. Supporting Secure Ad-hoc User Collaboration in Grid Environments Markus Lorch, Dennis Kafura

    E-Print Network [OSTI]

    Cao, Yong

    Supporting Secure Ad-hoc User Collaboration in Grid Environments Markus Lorch, Dennis Kafura is a key requirement. Current grid security mechanisms support individual users who are members of well-defined virtual organizations. Recent research seeks to provide manageable grid security services for self

  9. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    SciTech Connect (OSTI)

    Sheldon, Frederick T; Krings, Axel; Yoo, Seong-Moo; Mili, Ali; Trien, Joseph P

    2006-01-01

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

  10. Review: Global Climate Change

    E-Print Network [OSTI]

    Smith, Jennifer

    2013-01-01

    introduction to global climate change, the greenhouseReview: Global Climate Change: A Primer By Orrin H PilkeyPilkey, Keith C. Global Climate Change: a primer. Durham,

  11. An Overview of the Security Concerns in Enterprise Cloud Computing

    E-Print Network [OSTI]

    Bisong, Anthony; Rahman, M; 10.5121/ijnsa.2011.3103

    2011-01-01

    Deploying cloud computing in an enterprise infrastructure bring significant security concerns. Successful implementation of cloud computing in an enterprise requires proper planning and understanding of emerging risks, threats, vulnerabilities, and possible countermeasures. We believe enterprise should analyze the company/organization security risks, threats, and available countermeasures before adopting this technology. In this paper, we have discussed security risks and concerns in cloud computing and enlightened steps that an enterprise can take to reduce security risks and protect their resources. We have also explained cloud computing strengths/benefits, weaknesses, and applicable areas in information risk management.

  12. Help for the Developers of Control System Cyber Security Standards

    SciTech Connect (OSTI)

    Robert P. Evans

    2008-05-01

    A Catalog of Control Systems Security: Recommendations for Standards Developers (Catalog), aimed at assisting organizations to facilitate the development and implementation of control system cyber security standards, has been developed. This catalog contains requirements that can help protect control systems from cyber attacks and can be applied to the Critical Infrastructures and Key Resources of the United States and other nations. The requirements contained in the catalog are a compilation of practices or various industry bodies used to increase the security of control systems from both physical and cyber attacks. They should be viewed as a collection of recommendations to be considered and judiciously employed, as appropriate, when reviewing and developing cyber security standards for control systems. The recommendations in the Catalog are intended to be broad enough to provide any industry using control systems the flexibility needed to develop sound cyber security standards specific to their individual security requirements.

  13. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  14. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  15. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  16. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important is critical October 7, 2009 GAANN ­ Computer Systems Security 1 #12;GAANN - Computer Systems Security

  17. Federated Cloud Security Architecture for Secure and Agile Clouds

    E-Print Network [OSTI]

    Xu, Shouhuai

    Federated Cloud Security Architecture for Secure and Agile Clouds Weiliang Luo, Li Xu, Zhenxin Zhan. This chapter introduces the novel federated cloud security architecture that includes proactive cloud defense technologies for secure and agile cloud development. The federated security architecture consists of a set

  18. Where computer security meets national security1 Helen Nissenbaum

    E-Print Network [OSTI]

    Nissenbaum, Helen

    of International Relations. Key words: cyber-security, computer security, securitization Introduction OverWhere computer security meets national security1 Helen Nissenbaum Department of Culture conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile

  19. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu, Ram Krishnan and Gregory B. White Institute for Cyber Security University of Texas at San Antonio #12;Secure Information ­ Security mechanisms such as authentication, cryptography, trusted hardware, etc. #12;Community Cyber

  20. Implementing Advances in Transport Security Technologies | Department...

    Office of Environmental Management (EM)

    Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies More...

  1. Cyber Security & Smart Grid 

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01

    and interoperability ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Vulnerabilities In The Legacy Power Grid ? SCADA Security ? Supervisory Control and Data Acquisition (SCADA) systems are used extensively to control and monitor the national... & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart Grid Networks...

  2. Supervisory Industrial Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  3. Oil Security Metrics Model

    SciTech Connect (OSTI)

    Greene, David L.; Leiby, Paul N.

    2005-03-06

    A presentation to the IWG GPRA USDOE, March 6, 2005, Washington, DC. OSMM estimates oil security benefits of changes in the U.S. oil market.

  4. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  5. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  6. Natlonal Nuclear Security Admlnlstratlon

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Natlonal Nuclear Security Admlnlstratlon Washington, DC 20585 January 18, 2007 OFFICE OF THE ADMINISTRATOR MEMORANDUM FOR The Deputy Secretary FROM: SUBJECT: Linton F. Brooks...

  7. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Washington, DC 20585 MEMORANDUM FOR THE ADMINISTRATOR FROM: THEODORE D. SHERRY II 4 flA. * -. SUBJECT: REFERENCE: NATIONAL SECURITY ENTI's'E FIELD COUNCIL CHAIR ACTION:...

  8. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  9. Global warming: A Northwest perspective

    SciTech Connect (OSTI)

    Scott, M.J.; Counts, C.A.

    1990-02-01

    The Northwest Power Planning Council convened a symposium in Olympia, Washington, on the subject of global climate change ( the greenhouse effect'') and its potential for affecting the Pacific Northwest. The symposium was organized in response to a need by the Power Council to understand global climate change and its potential impacts on resource planning and fish and wildlife planning for the region, as well as a need to understand national policy developing toward climate change and the Pacific Northwest's role in it. 40 figs., 15 tabs.

  10. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  11. Cloud Security by Max Garvey

    E-Print Network [OSTI]

    Tolmach, Andrew

    Cloud Security Survey by Max Garvey #12;Cloudy Cloud is Cloudy What is the cloud? On Demand Service, performance SECaaS - Cloud hosted security measures Certifications - measurements for cloud security. #12;Cloud Questions If you have $0 security budget, could cloud be a security improvement? Who owns the data

  12. The Resilient Economy: Integrating Competitiveness and Security

    SciTech Connect (OSTI)

    Debbie van Opstal

    2009-01-07

    Globalization, technological complexity, interdependence, terrorism, climate and energy volatility, and pandemic potential are increasing the level of risk that societies and organizations now face. Risks also are increasingly interrelated; disruptions in one area can cascade in multiple directions. The ability to manage emerging risks, anticipate the interactions between different types of risk, and bounce back from disruption will be a competitive differentiator for companies and countries alike in the 21st century. What Policymakers Should Know The national objective is not just homeland protection, but economic resilience: the ability to mitigate and recover quickly from disruption. Businesses must root the case for investment in resilience strategies to manage a spectrum of risks, not just catastrophic ones. Making a business case for investment in defenses against low-probability events (even those with high impact) is difficult. However, making a business case for investments that assure business continuity and shareholder value is not a heavy lift. There are an infinite number of disruption scenarios, but only a finite number of outcomes. Leading organizations do not manage specific scenarios, rather they create the agility and flexibility to cope with turbulent situations. The investments and contingency plans these leading companies make to manage a spectrum of risk create a capability to respond to high-impact disasters as well. Government regulations tend to stovepipe different types of risk, which impedes companies abilities to manage risk in an integrated way. Policies to strengthen risk management capabilities would serve both security and competitiveness goals. What CEOs and Boards Should Know Operational risks are growing rapidly and outpacing many companies abilities to manage them. Corporate leadership has historically viewed operational risk management as a back office control function. But managing operational risks increasingly affects real-time financial performance. The 835 companies that announced a supply chain disruption between 1989 and 2000 experienced 33 percent to 40 percent lower stock returns than their industry peers. Twenty-five percent of companies that experienced an IT outage of two to six days went bankrupt immediately. Ninety-three percent of companies that lost their data center for 10 days or more filed for bankruptcy within a year.

  13. How America Can Look Within to Achieve Energy Security and Reduce...

    Office of Scientific and Technical Information (OSTI)

    to Achieve Energy Security and Reduce Global Warming Making major gains in energy efficiency is one of the most economical and effective ways our nation can wean itself off its...

  14. 2014 Headquarters Facilities Master Security Plan- Chapter 1, Physical Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

  15. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Environmental Management (EM)

    be completed each year by all those who hold a security clearance; and the Security Termination Briefing, which is conducted when a person no longer requires a security clearance....

  16. The Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure Computing Corporation

    E-Print Network [OSTI]

    Andersen, Dave

    Computing Corporation Stephen Smalley, Peter Loscocco National Security Agency Mike Hibler, David AndersenThe Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure be flexible in their support for security policies, providing sufficient mechanisms for supporting the wide

  17. Design tools for complex dynamic security systems.

    SciTech Connect (OSTI)

    Byrne, Raymond Harry; Rigdon, James Brian; Rohrer, Brandon Robinson; Laguna, Glenn A.; Robinett, Rush D. III; Groom, Kenneth Neal; Wilson, David Gerald; Bickerstaff, Robert J.; Harrington, John J.

    2007-01-01

    The development of tools for complex dynamic security systems is not a straight forward engineering task but, rather, a scientific task where discovery of new scientific principles and math is necessary. For years, scientists have observed complex behavior but have had difficulty understanding it. Prominent examples include: insect colony organization, the stock market, molecular interactions, fractals, and emergent behavior. Engineering such systems will be an even greater challenge. This report explores four tools for engineered complex dynamic security systems: Partially Observable Markov Decision Process, Percolation Theory, Graph Theory, and Exergy/Entropy Theory. Additionally, enabling hardware technology for next generation security systems are described: a 100 node wireless sensor network, unmanned ground vehicle and unmanned aerial vehicle.

  18. Promoting India's development: energy security and climate security are convergent goals

    SciTech Connect (OSTI)

    Rajan, Gupta; Shankar, Harihar; Joshi, Sunjoy

    2009-01-01

    This paper investigates three aspects of the energy-climate challenges faced by India. First, we examine energy security in light of anticipated growth in power generation in response to the national goal of maintaining close to 10% growth in GDP. Second, we examine possible options for mitigation and adaptation to climate change for India that it can take to the coming Copenhagen meeting on climate change. Lastly, we introduce an open web based tool for analyzing and planning global energy systems called the Global Energy Observatory (GEO).

  19. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Exchange of Information Develop security tools that: · Integrate information from different communication channels · Provide flexible reporting (reports adapted to the recipient) · Communicate security information Security practitioners perform many activities: · Information exchanged in different formats across

  20. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Cases Security Cases RSS June 19, 2015 PSH-15-0011 - In the Matter of Personnel Security Hearing On June 19, 2015, an OHA Administrative Judge (AJ) issued a decision in...

  1. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    Computer Security Incident Handling Guide Recommendationsof the National Institute of Standards Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD Tom Millar United States Computer Emergency Readiness Team National Cyber Security Division

  2. Security Policy: Radio Network Controller

    E-Print Network [OSTI]

    Security Policy: Radio Network Controller Encryption Module Controller (RNC EMC) Cryptographic, 2007 Security Policy: RNC EMC Page 1 of 22 #12;Security Policy: RNC EMC Page 2 of 22 #12;Table...........................................................14 7. IDENTIFICATION AND AUTHENTICATION POLICY

  3. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  4. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  5. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Ensuring the Safe Containment

  6. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear

  7. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  8. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1.

  9. CIOs Uncensored: Security Smarts.

    SciTech Connect (OSTI)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNL’s “defense in depth” approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability – and your last line of defense.

  10. Engineering secure software 

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01

    -the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar...

  11. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  12. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W the computational, physics

  13. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  14. Global hydrological cycle response to rapid and slow global warming

    E-Print Network [OSTI]

    Kuang, Zhiming

    Global hydrological cycle response to rapid and slow global warming and Jiaxu Zhang #12;· Anthropogenic global warming causes "robust" changes in the global in the global hydrological cycle due to anthropogenic global warming Atmospheric radiative

  15. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  16. Secure Virtualization with Formal Methods

    E-Print Network [OSTI]

    Sturton, Cynthia

    2013-01-01

    cloud computing, virtualization software has a variety of security-cloud computing, researchers have proposed using system virtualization software as a platform to increase the security

  17. Office of Secure Transportation Activities

    Office of Environmental Management (EM)

    6th, 2012 WIPP Knoxville, TN OFFICE OF SECURE TRANSPORTATION Agency Integration Briefing Our Mission To provide safe and secure ground and air transportation of nuclear weapons,...

  18. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Activities Transportation Security Rulemaking Activities at the U.S. Nuclear Regulatory Commission NRC Transportation Security (Part 73 SNF Update and Part 37 Category 1...

  19. National Nuclear Security Administration Overview

    Office of Environmental Management (EM)

    May 11, 2011 Ahmad Al-Daouk Manager, National Security Department (NSD) National Nuclear Security Administration (NNSA) Service Center - Albuquerque, NM May 11, 2011 - Page 2...

  20. The climate change and energy security nexus

    SciTech Connect (OSTI)

    King, Marcus Dubois; Gulledge, Jay

    2013-01-01

    The study of the impacts of climate change on national and interna-tional security has grown as a research field, particularly in the last five years. Within this broad field, academic scholarship has concentrated primarily on whether climate change is, or may become, a driver of violent conflict. This relationship remains highly contested. However, national security policy and many non-governmental organizations have identified climate change as a threat multiplier in conflict situations. The U.S. Department of Defense and the United Kingdom's Ministry of Defense have incorporated these findings into strategic planning documents such as the Quadrennial Defense Review and the Strategic Defence and Security Review. In contrast to the climate-conflict nexus, our analysis found that academic scholarship on the climate change and energy security nexus is small and more disciplinarily focused. In fact, a search of social science litera-ture found few sources, with a significant percentage of these works attribut-able to a single journal. Assuming that policymakers are more likely to rely on broader social science literature than technical or scientific journals, this leaves a limited foundation. This then begged the question: what are these sources? We identified a body of grey literature on the nexus of climate change and energy security of a greater size than the body of peer-reviewed social science literature. We reviewed fifty-eight recent reports, issue briefs, and transcripts to better understand the nexus of climate change and energy security, as well as to gain insight about the questions policymakers need answered by those undertaking the research. In this article, we describe the nature of the sources reviewed, highlight possible climate change and energy security linkages found within those sources, identify emerging risks, and offer conclusions that can guide further research.

  1. On Building Secure SCADA Systems using Security Eduardo B. Fernandez

    E-Print Network [OSTI]

    Wu, Jie

    On Building Secure SCADA Systems using Security Patterns Eduardo B. Fernandez Dept. of Comp. Sci, also known as the supervisory, control, and data acquisition (SCADA) system. On the other hand systems. This paper aims to propose methods to build a secure SCADA system using security patterns

  2. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  3. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  4. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu Dept. of Computer Science Institute for Cyber Security University of Texas at San Antonio Email: ravi.sandhu@utsa.edu Ram Krishnan Dept. of Electrical and Computer Engineering Institute for Cyber Security University

  5. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio June 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  6. 1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE

    E-Print Network [OSTI]

    Upadhyaya, Shambhu

    , there are 100+ centers ­ Based on curriculum mapping to CNSS (committee of National Security Standards) 4011 at Google (2010) · Threats to national security ­ Insider attacks ­ Examples: Bradley Manning leaked1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE Professor S. Upadhyaya Department

  7. A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY

    E-Print Network [OSTI]

    Sussex, University of

    EN A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY Brussels, 12 December 2003 #12;1 EN's complex problems on its own Introduction Europe has never been so prosperous, so secure nor so free problems on its own. Europe still faces security threats and challenges. The outbreak of conflict

  8. SecuritySmart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity SecuritySecuritySmart

  9. Coalitional Game Theory for Security Risk Management Walid Saad1, Tansu Alpcan2, Tamer Basar3, and Are Hjrungnes1

    E-Print Network [OSTI]

    Alpcan, Tansu

    Coalitional Game Theory for Security Risk Management Walid Saad1, Tansu Alpcan2, Tamer Bas¸ar3--Quantitative models for security risk management in organizations are recently receiving an increased attention protocol are analyzed. Index Terms--risk management, coalitional game theory, game theory, security. I

  10. Today, there are almost 90 federal agencies that are rapidly upgrad-ing and enhancing their language resources. For national security, the

    E-Print Network [OSTI]

    Hill, Wendell T.

    their language resources. For national security, the globalization of business, and a better understanding lives are at stake on foreign soil, or we think about homeland security, then increasing the nation's foreign language capacity is a vital national security priority." At the University of Maryland, new

  11. 2014 Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

  12. 2014 Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

  13. Global food security under climate change Josef Schmidhuber*

    E-Print Network [OSTI]

    5 million and 170 million additional people at risk of hunger by 2080) strongly depending on assumed who are at high risk of temporarily or permanently losing their access to the resources needed is climate variability, e.g., landless agricul- tural laborers, who almost wholly depend on agricultural

  14. GEOGRAPHY 288: FOOD SECURITY, FOOD SYSTEMS and GLOBAL CHANGE

    E-Print Network [OSTI]

    Lopez-Carr, David

    This seminar will explore geographic traditions and new frontiers in research on the challenges of reconciling on household economics and rural development, and in the context of recent research on the impacts of climate feedback towards the improved development of their own research paper. To achieve these goals, · Discussion

  15. 100% container scanning : security policy implications for global supply chains

    E-Print Network [OSTI]

    Bennett, Allison C. (Allison Christine)

    2008-01-01

    On August 3, 2007, President George Bush signed into law HR1 the "Implementing Recommendations of the 9/11 Commission Act of 2007." The 9/11 Act requires 100% scanning of US-bound containers at foreign seaports by 2012 ...

  16. Global Safeguards and Security Educational Center Course Offerings

    E-Print Network [OSTI]

    @ornl.gov Transportation DOE/NNSA SG100, Packaging and Offsite Transportation of Nu clear Material ­ Workshop (4­5 days) POC: Matt Feldman, 865.946.1291, feldmanmr@ornl.gov DOE/NNSA SG600, Test Guide for Type B Packages ­ Workshop (1 day) POC: Matt Feldman, 865.946.1291, feldmanmr@ornl.gov DOE/NNSA Packaging Workshop

  17. Securing the Sustainability of Global Medical Nuclear Supply Chains

    E-Print Network [OSTI]

    Nagurney, Anna

    of Molybdenum-99, 99Mo, is the most commonly used medical radioisotope, used in more than 80 for medical diagnostic purposes. By using medical radioisotope techniques, health professionals can enable medical procedures are performed in the United States using Technetium-99m. Over 100,000 hospitals

  18. Plant genetics, sustainable agriculture and global food security.

    E-Print Network [OSTI]

    Ronald, Pamela

    2011-01-01

    effects have resulted from commercialization of ge- netically engineered crops (Board on Agriculture and Natural Resources,

  19. William Rees appointed to new Global Security leadership position

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservationBio-Inspired SolarAbout /Two0Photos andSeminarsDesign » Design William

  20. Deputy Secretary Sell Highlights Cooperation in Global Energy Security and

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy A plug-in electricLaboratoryof Energy ElevenLGJulyHailsofmonth,AccessNuclear

  1. Facility will focus on bioenergy, global food security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvan Racah861 ANNUAL|Facility OperationsFacility will

  2. NNSA Computers Lead Global List | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJessework usesof Energy Moving Basic NERSCKeyNuclearBudgetComputers Lead

  3. Energy and Global Security Directorate 2015 Strategic Plan | Argonne

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansasCommunities EnergyU.S. DOEEnergy StorageTricks Lead toJohn MaplesNational

  4. The Global Threat Reduction Initiative's Orphan Source Recovery Project in the Russian Federation

    SciTech Connect (OSTI)

    Russell, J. W. [NSTec; Ahumada, A. D. [NSTec; Blanchard, T. A. [NNSA

    2012-06-04

    After 9/11, officials at the United States Department of Energy (DOE), National Nuclear Security Administration (NNSA) grew more concerned about radiological materials that were vulnerable to theft and illicit use around the world. The concern was that terrorists could combine stolen radiological materials with explosives to build and detonate a radiological dispersal device (RDD), more commonly known as a “dirty bomb.” In response to this and other terrorist threats, the DOE/NNSA formed what is now known as the Global Threat Reduction Initiative (GTRI) to consolidate and accelerate efforts to reduce and protect vulnerable nuclear and radiological materials located at civilian sites worldwide. Although a cooperative program was already underway in the Russian Federation to secure nuclear materials at a range of different facilities, thousands of sealed radioactive sources remained vulnerable at medical, research, and industrial sites. In response, GTRI began to focus efforts on addressing these materials. GTRI’s Russia Orphan Source Recovery Project, managed at the Nevada National Security Site’s North Las Vegas facility, was initiated in 2002. Throughout the life of the project, Joint Stock Company “Isotope” has served as the primary Russian subcontractor, and the organization has proven to be a successful partner. Since the first orphan source recovery of an industrial cobalt-60 irradiator with 647 curies (Ci) at an abandoned facility in Moscow in 2003, the GTRI Orphan Source Recovery Project in the Russian Federation has accomplished substantial levels of threat reduction. To date, GTRI has recovered and securely disposed of more than 5,100 sources totaling more that 628,000 Ci. This project serves as an extraordinary example of how international cooperation can be implemented by partners with mutual interests to achieve significant goals.

  5. INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

  6. BROADER National Security Missions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Metal Chips (U) Uranium Trioxide (UO 3 ) UO 2 (NO 3 ) 2 Ur anyl Nitrate Ammonium Uranyl Carbonate (NH 4 ) 2 UO 2 (CO 3 ) 4 DEVELOP NEW NATIONAL SECURITY MISSIONS Y-12 has...

  7. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  8. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  9. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  10. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  11. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  12. Policy Paper 35: Energy and Security in Northeast Asia: Fueling Security

    E-Print Network [OSTI]

    Calder, Kent; Fesharaki, Fereidun; Shirk, Susan L.; Stankiewicz, Michael

    1998-01-01

    Deese (editors). Energy and Security. 3. Fereidun Fesharaki,Energy and Security in Northeast Asia: Fueling Security Anrising energy demand. Energy and Security in Northeast Asia

  13. Secure Quantum Key Distribution

    E-Print Network [OSTI]

    Hoi-Kwong Lo; Marcos Curty; Kiyoshi Tamaki

    2015-05-20

    Secure communication plays a crucial role in the Internet Age. Quantum mechanics may revolutionise cryptography as we know it today. In this Review Article, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After a brief introduction to recent experimental progress and challenges, we survey the latest developments in quantum hacking and counter-measures against it.

  14. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  15. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  16. Security systems engineering overview

    SciTech Connect (OSTI)

    Steele, B.J.

    1996-12-31

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

  17. Feedstock Economics for Global Steam Crackers 

    E-Print Network [OSTI]

    McCormack, G.; Pavone, T.

    1990-01-01

    of annuunceme"ts of new global capac i ty. Many of the announcements have been made by organizations with no previous background in petrochemica Is, "'ho believe they possess strategic competit1ve advantages for success 1n the business. The choice... plants based upon five alternative feedstocks, and then modifying the data for 10 global regions in which significant new ethylene capacity has been announced. The five feedstocks considered are: ethane, propane, butane, wide range naphtha...

  18. Global Indirect Effects of U.S. Corn Ethanol Production: A Review of the Evidence

    E-Print Network [OSTI]

    Grissino-Mayer, Henri D.

    change issues at the Center for Energy Research and Development (CERD), Nigeria from 1991-1996. HeGlobal Indirect Effects of U.S. Corn Ethanol Production: A Review of the Evidence Energy security to gasoline over the next few decades. Specifically, the Energy Independence and Security Act of 2007 (EISA

  19. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  20. Global Warming Observations

    E-Print Network [OSTI]

    Schofield, Jeremy

    Global Warming Observations: 1. Global temperature has been gradually rising in recent years #15 in range 8000 12000 nm { CFC's, methane and N 2 O important for global warming even though concentra- tions in concentration of \\greenhouse gases" like CO 2 What determines global temperature? Energy budget of earth: 1

  1. Global Health Seminar Series

    E-Print Network [OSTI]

    Klein, Ophir

    Bay Area Global Health Seminar Series Moving beyond millennium targets in global health: The challenges of investing in health and universal health coverage Although targets can help to focus global health efforts, they can also detract attention from deeper underlying challenges in global health

  2. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  3. Unconditionally Secure Quantum Signatures

    E-Print Network [OSTI]

    Ryan Amiri; Erika Andersson

    2015-08-08

    Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols - signatures based on the Rivest-Adleman-Shamir (RSA) algorithm, the digital signature algorithm (DSA), and the elliptic curve digital signature algorithm (ECDSA) - are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally secure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  4. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopment Top Scientific Impact Since its SearchSecurity

  5. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345 UnlimitedSecure

  6. national security campus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReporteeo | National Nuclear Securityhr | Nationalnational security

  7. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorking With U.S. Coal StocksSuppliers Tag: Supplierssecurity Tag: security

  8. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLosThe 26thI D- 6 0 4 2 r m m m m port m fm f mphysical security |

  9. Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

    Office of Environmental Management (EM)

    4, Cyber Security Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2015 2015 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security...

  10. Macroeconomic Risk Factors and the Role of Mispriced Credit in the Returns from International Real Estate Securities

    E-Print Network [OSTI]

    Pavlov, Andrey; Steiner, Eva; Wachter, Susan

    2014-01-01

    We examine the canonical influence of global market, currency and inflation risks on the returns from international real estate securities. In addition, we study how mispricing of credit in the local banking systems is related to the returns from...

  11. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  12. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  13. Securities Class Actions and Bankrupt Companies

    E-Print Network [OSTI]

    Park, James J.

    2014-01-01

    the utility of securities class actions. Certainly, contextthe merit of securities class actions. UCLA | SCHOOL OF LAWof James J. Park, Securities Class Actions and Bankrupt

  14. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  15. Review of digital image security in Dermatology

    E-Print Network [OSTI]

    Nielson, Colton; West, Cameron; Shimizu, Ikue

    2015-01-01

    encrypted communications, cloud security breaches, and phonebreaches in security demonstrate, such cloud storage ofand security rules 22 Audits of CSP data center operations and cloud

  16. Integrated Security System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems architecture Integrated...

  17. Data security on the national fusion grid

    E-Print Network [OSTI]

    Burruss, Justine R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  18. Security on the US Fusion Grid

    E-Print Network [OSTI]

    Burruss, Justin R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  19. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    CERT. (2010, Dec) Technical Cyber Security Alerts. [Online].a broad overview of cyber security incidents in the laststrategic war and viable cyber security solutions should be

  20. Mathematical and Statistical Opportunities in Cyber Security

    E-Print Network [OSTI]

    Meza, Juan

    2009-01-01

    development approach to cyber security. Report submitted to2007. Committee on Improving Cyber- security Research in theOpportunities in Cyber Security ? Juan Meza † Scott

  1. Security and United States Immigration Policy

    E-Print Network [OSTI]

    Totten, Robbie James

    2012-01-01

    2009 [1981]. American National Security, 6th ed. Baltimore,1977. Economic Issues and National Security. Lawrence, KS:Immigration and National Security. Westport, CT: Praeger

  2. Office of Security Assessments | Department of Energy

    Energy Savers [EERE]

    Security Assessments Office of Security Assessments MISSION The Office of Security Assessments is responsible for the independent evaluation of the effectiveness of safeguards and...

  3. griculture must be transformed. Although global food production is

    E-Print Network [OSTI]

    Lehmann, Johannes

    `greenmanures',theeconomiccostof producingfoodinthiswayandtheneteffecton greenhouse-gasemissions6 .Inaddition,farming genetically modified crops is widely thoughtA griculture must be transformed. Although global food production is increasing, today's farming, food security (people's access to food and the qual- ity of that food), human health, and economic

  4. Global Focus Microscope The Global Health Challenge

    E-Print Network [OSTI]

    . To address this need, we developed the Global Focus Microscope (GFM): a portable, battery- powered, inverted digi- tal images, the Global Focus Microscope comes with shelf for an iPhone 4. Figure 1. From left to right: Malaria parasites imaged at 1000x in bright field mode, tuberculosis imaged at 400x in bright

  5. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Broader source: Energy.gov (indexed) [DOE]

    A vulnerability was reported in Cisco Secure Access Control System. A remote user can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4,...

  6. AUDIT REPORT Security at the Nevada National Security Site

    Broader source: Energy.gov (indexed) [DOE]

    Security at the Nevada National Security Site OAS-L-15-06 May 2015 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections . Department of Energy...

  7. Security Requirements Engineering Support for Security-Annotated Business Processes

    E-Print Network [OSTI]

    Security Requirements Engineering Support for Security-Annotated Business Processes Elda Paja1 that business analysts are not secu- rity experts and assume that this will be bolted on later. Fortunately

  8. A threshold area ratio of organic to conventional agriculture causes recurrent pathogen outbreaks in organic agriculture

    E-Print Network [OSTI]

    Kolokolnikov, Theodore

    A threshold area ratio of organic to conventional agriculture causes recurrent pathogen outbreaks in organic agriculture S. Adl a, , D. Iron b , T. Kolokolnikov b a Department of Biology, Dalhousie 2011 Available online 21 March 2011 Keywords: Allodeposition Diffusive logistic equations Food security

  9. Technical Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-09-02

    This order implements the Department of Energy (DOE) Technical Security Program (TSP). This program represents the convergence of two distinct disciplines: Counterintelligence (CI) and Security Countermeasures. The elements of the TSP are driven by national level, interagency programs that are codified in various laws, Executive Orders, national polices and directives. Supersedes DOE M 470.4-4A Chg 1, dated 10-12-2010, Section D – Technical Surveillance Countermeasures (Official Use Only) and classified annex (Secret); and DOE M 205.1-3 (Official Use Only) and Part II (Secret), dated 4-17-2006.

  10. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD |UpdatedSecurity|National

  11. Tensions in collaborative cyber security and how they affect incident detection and response

    SciTech Connect (OSTI)

    Fink, Glenn A.; McKinnon, Archibald D.; Clements, Samuel L.; Frincke, Deborah A.

    2009-12-01

    Security often requires collaboration, but when multiple stakeholders are involved, it is typical for their priorities to differ or even conflict with one another. In today’s increasingly networked world, cyber security collaborations may span organizations and countries. In this chapter, we address collaboration tensions, their effects on incident detection and response, and how these tensions may potentially be resolved. We present three case studies of collaborative cyber security within the U.S. government and discuss technical, social, and regulatory challenges to collaborative cyber security. We suggest possible solutions, and present lessons learned from conflicts. Finally, we compare collaborative solutions from other domains and apply them to cyber security collaboration. Although we concentrate our analysis on collaborations whose purpose is to achieve cyber security, we believe that this work applies readily to security tensions found in collaborations of a general nature as well.

  12. Microporoelastic modeling of organic-rich shales

    E-Print Network [OSTI]

    Khosh Sokhan Monfared, Siavash

    2015-01-01

    Due to their abundance, organic-rich shales are playing a critical role in re-defining the world's energy landscape leading to shifts in global geopolitics. However, technical challenges and environmental concerns continue ...

  13. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    SciTech Connect (OSTI)

    Rogers,E.; deBoer,G.; Crawford, C.; De Castro, K.; Landers, J.

    2009-10-19

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." Gen. Eugene Habiger, a former "Assistant Secretary for Safeguards and Security" at the U.S. Department of Energy’s (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that "good security is 20% equipment and 80% people." Although eliminating the "human factor" is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  14. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    SciTech Connect (OSTI)

    Crawford, Cary E.; de Boer, Gloria; De Castro, Kara; Landers, John; Rogers, Erin

    2010-10-01

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the “human factor.” Gen. Eugene Habiger, a former “Assistant Secretary for Safeguards and Security” at the U.S. Department of Energy’s (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that “good security is 20% equipment and 80% people.”1 Although eliminating the “human factor” is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  15. Secure Storage Architectures

    SciTech Connect (OSTI)

    Aderholdt, Ferrol; Caldwell, Blake A; Hicks, Susan Elaine; Koch, Scott M; Naughton, III, Thomas J; Pogge, James R; Scott, Stephen L; Shipman, Galen M; Sorrillo, Lawrence

    2015-01-01

    The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention on elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to help with this issue, which are a particular instances of the more general challenge of efficient host/guest IO that is the focus of interfaces like virtio. A collection of bridging technologies have been identified in Chapter 4, which can be helpful to overcome the limitations and challenges of supporting efficient storage for secure enclaves. The synthesis of native filesystem security mechanisms and bridging technologies led to an isolation-centric storage architecture that is proposed in Chapter 5, which leverages isolation mechanisms from different layers to facilitate secure storage for an enclave. Recommendations: The following highlights recommendations from the investigations done thus far. - The Lustre filesystem offers excellent performance but does not support some security related features, e.g., encryption, that are included in GPFS. If encryption is of paramount importance, then GPFS may be a more suitable choice. - There are several possible Lustre related enhancements that may provide functionality of use for secure-enclaves. However, since these features are not currently integrated, the use of Lustre as a secure storage system may require more direct involvement (support). (*The network that connects the storage subsystem and users, e.g., Lustre s LNET.) - The use of OpenStack with GPFS will be more streamlined than with Lustre, as there are available drivers for GPFS. - The Manilla project offers Filesystem as a Service for OpenStack and is worth further investigation. Manilla has some support for GPFS. - The proposed Lustre enhancement of Dynamic-LNET should be further investigated to provide more dynamic changes to the storage network which could be used to isolate hosts and their tenants. - The Linux namespaces offer a good solution for creating efficient restrictions to shared HPC filesystems. However, we still need to conduct a thorough round of storage/filesystem benchmarks. - Vendor products should be more closely reviewed, possibly to include evaluation of performance/protection of select products. (Note, we are investigation the opti

  16. SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011

    E-Print Network [OSTI]

    SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011 Choose brands and models of mobile devices that have the options referenced below. Use all available security options that your or sensitive university information in un-approved off-campus services, such as public cloud based services

  17. Wireless Security: Secure and Public Networks Villanova University

    E-Print Network [OSTI]

    36 Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science kory.kirk@villanova.edu www.korykirk.com/ Abstract Due to the increasing amount of wireless, train stations and cafes, there is a need for a wireless protocol that allows public access to secure

  18. 2013 COMPLIANCE DOCUMENT Wesleyan University 2013 Annual Campus Safety and Security/Fire Safety Report

    E-Print Network [OSTI]

    Thomas, Ellen

    Opportunity Statement 3 ANNUAL SECURITY REPORT 4 PREPARATION OF THE ANNUAL SECURITY REPORT AND DISCLOSURE Crimes Involving Students and Student Organizations at Off-Campus Locations 6 REPORTING CRIMES AND OTHER Environmental Health & Safety, Physical Plant, and other departments in the Division of Student Affairs. We also

  19. Reinventing Africa into a Global Supplier of Food Goods: An Analysis of Agri-business Development, Sustainability, Supply Chain Integration and Export in Developing Economies

    E-Print Network [OSTI]

    Chisholm, Lisa M.

    2011-01-01

    Africa into a Global Supplier of Food Goods: An Analysis ofAfrica into a Global Supplier of Food Goods: An Analysis ofthe continent into a global supplier of organic, exotic and

  20. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  1. NISTIR 7497 Security Architecture Design

    E-Print Network [OSTI]

    NISTIR 7497 Security Architecture Design Process for Health Information Exchanges (HIEs) Matthew Scholl Kevin Stine Kenneth Lin Daniel Steinberg #12;NISTIR 7497 Security Architecture Design Process Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899 Kenneth Lin

  2. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  3. Cows Causing Global Warming

    E-Print Network [OSTI]

    Hacker, Randi

    2008-08-06

    Broadcast Transcript: Remember when President Reagan blamed trees for air pollution? Well now the Japanese are blaming cows for global warming. Apparently, the methane emissions from burping cows account for 5% of all global greenhouse gases. Simple...

  4. Review: Globalization of Water

    E-Print Network [OSTI]

    Tennant, Matthew Aaron

    2009-01-01

    Review: Globalization of Water: Sharing the Planet’sAshok K. Globalization of Water: Sharing the Planet’s140) liters of virtual water (p. 15). This is one of the

  5. Globalization of biopharmaceutical manufacturing

    E-Print Network [OSTI]

    Pande, Rachna

    2011-01-01

    The biomanufacturing industry is changing due to increasing globalization. However, it is changing differently from other high tech industries like software/ semiconductor/ automobiles. In this study we use global ...

  6. Secure Communications in the Smart Grid Jeff Naruchitparames and Mehmet Hadi Gunes

    E-Print Network [OSTI]

    Gunes, Mehmet Hadi

    energy-based electric power pro- duction to decrease dependence on foreign oil, increased use of electric. In this direction, organizations such as the GridWise Alliance aim at standard- izing the security protocols

  7. (Managing the global environment)

    SciTech Connect (OSTI)

    Rayner, S.F.

    1989-10-03

    The conference was stimulated by concern that policy makers increasingly have to make environmental management decisions in the absence of solidly established scientific consensus about ecological processes and the consequences of human actions. Often, as in the case of climate change, some decisions may have to be made in the absence of information that is desirable but may not be available for years to come, if ever. Six topics were identified as running throughout the Congress. These were: the epistemology and history of the sciences or disciplines concerned with the environment, including the scientific basis of rationality and modes of dealing with uncertainty and complexity; the social, economic, and institutional conditions for the production of knowledge bearing on the environment, including the politics of research and the improvement of scientific data; the structuring and institutionalization of expert assessments on national and international levels, including the global distribution of expertise; the means of establishing scientific information, the role of the media in transmitting and processing knowledge about the environment, and the organization of public environmental debate; and decision making and management under conditions of uncertainty; and, finally the relationship between science and ethics. 13 refs.

  8. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  9. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  10. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  11. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  12. Research Data Data Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    Research Data Data Security Survey Collection FAQs Q: I am not a UConn Health Center employee; can multiple projects that share common data? Yes. As long as the projects have common fields as you would in SurveyMonkey; data forms, e.g. Case Report Forms (CRF); or a combination of both. For any

  13. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  14. ARMY Energy Security Considerations

    E-Print Network [OSTI]

    energy waste in existing facilities; Increase energy efficiency in renovation and new constructionARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy · · · · FOREIGN OIL 2

  15. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  16. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    2011-01-01

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  17. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  18. Protocol, Security Assistance- January 2007

    Broader source: Energy.gov [DOE]

    Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security.

  19. Critical Infrastructure and Cyber Security 

    E-Print Network [OSTI]

    Doll, Abby; Pirrong, Renee; Jennings, Matthew; Stasny, George; Giblin, Andy; Shaffer, Steph; Anderson, Aimee

    2011-01-01

    cyber security. They designated responsibility for cyber-security to the newly formed Department of Homeland Security, a duty that has continued to today 3. The group was tasked with creating a method of protecting the critical components.... 2010. 15 Mar. 2011. http://www.d tic.mil/doctrine/new_pubs/jp1_02.pdf 10 Comments on the Economic and Security Implications Of Recent Developments in the World Oil Market , 107th Cong. (2000) (testimony of Robert E. Ebel). http...

  20. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  1. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  2. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Victoria, University of

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  3. Environmental Impact on Applied Technology- Global Warming CFCs & VOCs 

    E-Print Network [OSTI]

    Gilbert, J. S.

    1989-01-01

    Hardly a day goes by that the threats to our environment are not brought to our attention. Whether you are following oil spills, groundwater contamination, global warming, chlorofluorocarbons (CFCs) or volatile organic compounds (VOCs), you must...

  4. Between adaptation and resistance : labor responses to globalization in France

    E-Print Network [OSTI]

    Ancelovici, Marcos, 1971-

    2008-01-01

    This dissertation aims at accounting for labor responses to globalization in France. It addresses this issue through a comparative study of two labor organizations-the French Democratic Labor Confederation (CFDT) and the ...

  5. GLOBAL MONITORING OF URANIUM HEXIFLORIDE CYLINDERS NEXT STEPS IN DEVELOPMENT OF AN ACTION PLAN

    SciTech Connect (OSTI)

    Hanks, D.

    2010-06-09

    Over 40 industrial facilities world-wide use standardized uranium hexafluoride (UF{sub 6}) cylinders for transport, storage and in-process receiving in support of uranium conversion, enrichment and fuel fabrication processes. UF{sub 6} is processed and stored in the cylinders, with over 50,000 tU of UF{sub 6} transported each year in these International Organization for Standardization (ISO) qualified containers. Although each cylinder is manufactured to an ISO standard that calls for a nameplate with the manufacturer's identification number (ID) and the owner's serial number engraved on it, these can be quite small and difficult to read. Recognizing that each facility seems to use a different ID, a cylinder can have several different numbers recorded on it by means of metal plates, sticky labels, paint or even marker pen as it travels among facilities around the world. The idea of monitoring movements of UF{sub 6} cylinders throughout the global uranium fuel cycle has become a significant issue among industrial and safeguarding stakeholders. Global monitoring would provide the locations, movements, and uses of cylinders in commercial nuclear transport around the world, improving the efficiency of industrial operations while increasing the assurance that growing nuclear commerce does not result in the loss or misuse of cylinders. It should be noted that a unique ID (UID) attached to a cylinder in a verifiable manner is necessary for safeguarding needs and ensuring positive ID, but not sufficient for an effective global monitoring system. Modern technologies for tracking and inventory control can pair the UID with sensors and secure data storage for content information and complete continuity of knowledge over the cylinder. This paper will describe how the next steps in development of an action plan for employing a global UF{sub 6} cylinder monitoring network could be cultivated using four primary UID functions - identification, tracking, controlling, and accounting.

  6. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  7. January 2005 INTEGRATING IT SECURITY

    E-Print Network [OSTI]

    in a cost- effective manner. The implementation of IT security and capital planning practices withinJanuary 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS released Special Publication (SP) 800-65, Inte grating IT Security into the Capital Planning and Investment

  8. Guidelines on Security and Privacy

    E-Print Network [OSTI]

    Guidelines on Security and Privacy in Public Cloud Computing WayneJansen TimothyGrance Special Publication 800-144 #12;ii NIST Special Publication 800-144 Guidelines on Security and Privacy in Public Cloud and Ramaswamy Chandramouli, also from NIST, provided input on cloud security in early drafts. Thanks also go

  9. CHILLING CONSIDERATIONS GLOBAL WARMING

    E-Print Network [OSTI]

    Schwartz, Stephen E.

    CHILLING CONSIDERATIONS REGARDING GLOBAL WARMING Stephen E. Schwartz http IS INCREASING Global carbon dioxide concentration over the last thousand years Polar ice cores #12;Mann et al 1000-1850) 1998 THE TEMPERATURE'S RISING #12;GLOBAL ANNUAL TEMPERATURE ANOMALY, 1880-2008 0.8 0.6 0.4 0

  10. SCIENTIFIC EVIDENCE GLOBAL WARMING

    E-Print Network [OSTI]

    Schwartz, Stephen E.

    SCIENTIFIC EVIDENCE FOR GLOBAL WARMING Stephen E. Schwartz Jefferson's Ferry Public Affairs century. The warmest year of the millennium was 1998. #12;EVIDENCE OF GLOBAL WARMING OTHER THAN SURFACE TEMPERATURE ANOMALY The global ocean has warmed significantly since the late 1940s: more than half

  11. Global Information Technologies

    E-Print Network [OSTI]

    Keromytis, Angelos D.

    Global Information Technologies: Concepts, Methodologies, Tools, and Applications Felix B. Tan in the United States of America by Information Science Reference (an imprint of IGI Global) 701 E. Chocolate (an imprint of IGI Global) 3 Henrietta Street Covent Garden London WC2E 8LU Tel: 44 20 7240 0856 Fax

  12. GLOBAL TAXONOMY INITIATIVE

    E-Print Network [OSTI]

    Grant, Taran

    #12;THE GLOBAL TAXONOMY INITIATIVE: Using Systematic Inventories to Meet Country and Regional Needs (COP) to the Convention on Biological Diversity (CBD) has endorsed a GlobalTaxonomy Initiative (GTI workshop, The Global Taxonomy Initiative: Shortening the Distance between Discovery and Delivery, made

  13. Conceptualizing Energy Security

    E-Print Network [OSTI]

    Winzer, Christian

    12 a whole on a national level. Some environmental threats such as climate change or solar storms affect all countries simultaneously and therefore have impacts on a global level. Apart from the threat itself, the spread of threat impacts is also... of occurrence reflects more than a heuristic, as in the case of political disruptions or terrorist attacks. And finally threats can be unknown, as in the case of anthropogenic global warming, which was not discovered as a potential risk until its impacts...

  14. Secretary Richardson Accepts Recommendations for Improving Security...

    National Nuclear Security Administration (NNSA)

    Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

  15. National Nuclear Security Administration Overview | Department...

    Office of Environmental Management (EM)

    Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National Transportation...

  16. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  17. Independent Oversight Review, National Nuclear Security Administration...

    Office of Environmental Management (EM)

    Nuclear Security Administration Production Office - February 2014 Independent Oversight Review, National Nuclear Security Administration Production Office - February 2014 February...

  18. Enhancing Transportation Energy Security through Advanced Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transportation Energy Security through Advanced Combustion and Fuels Technologies Enhancing Transportation Energy Security through Advanced Combustion and Fuels Technologies 2005...

  19. Nevada National Security Site Groundwater Program Welcomes Peer Review Team

    Broader source: Energy.gov [DOE]

    Recently, an independent peer review team was invited to assess the groundwater characterization program at the Nevada National Security Site (NNSS). This nationally recognized group of experts, from various external organizations, will examine the computer modeling approach developed to better understand how historic underground nuclear testing in Yucca Flat affected the groundwater.

  20. Global assessment of ocean carbon export by combining satellite observations

    E-Print Network [OSTI]

    Siegel, David A.

    Global assessment of ocean carbon export by combining satellite observations and food-web models D Studies, University of Tasmania, Hobart, Tasmania, Australia Abstract The export of organic carbon from cycle. Here we introduce a mechanistic assessment of the global ocean carbon export using satellite

  1. Global Political Economy Wednesdays 5:30-8:10 PM

    E-Print Network [OSTI]

    Global Political Economy Fall 2013 Wednesdays 5:30-8:10 PM Location: ENG (Engelhard Hall) 213 Ajai economy, and the interaction between countries, regulatory systems and organizations. Attention of MNCs in the global economy. The role of economic, social and political institutions is also a central

  2. Global Political Economy Wednesdays 5:30-8:10 PM

    E-Print Network [OSTI]

    Global Political Economy Fall 2014 Wednesdays 5:30-8:10 PM Location: 1 Washington Park, 508 Ajai economy, and the interaction between countries, regulatory systems and organizations. Attention of MNCs in the global economy. The role of economic, social and political institutions is also a central

  3. SECURITY TECHNIQUES Chris J Mitchell1

    E-Print Network [OSTI]

    Mitchell, Chris

    SECURITY TECHNIQUES Chris J Mitchell1 Introduction In this paper we consider the range of security security has been exerted. However, the techniques described are of general applicability by a security technique; in doing so we will distinguish between security features and security techniques (or

  4. Security and Privacy in the Networked World

    E-Print Network [OSTI]

    Sandhu, Ravi

    -World Impact! Perennial State of Cyber Security Micro-security Macro-security #12; What is the value of being Cyber Security Conundrum #12;Cyber security as reconciliation of tradeoffs Finding Goldilocks Holistic1 Security and Privacy in the Networked World Prof. Ravi Sandhu Executive Director and Endowed

  5. The unreasonable ineffectiveness of security engineering

    E-Print Network [OSTI]

    Pavlovic, Dusko

    of security does not apply only to software, as we also speak of bank security, national security, secureThe unreasonable ineffectiveness of security engineering: An overview Dusko Pavlovic Kestrel" [32]. After several decades of security research, we are tempted to ask the opposite question: Are we

  6. IY5512: Part 2 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    ; ­ introduction to security evaluation criteria. Information Security Group Agenda · Design principles · DesignIY5512: Part 2 1 Information Security Group IY5512 Computer Security Part 2: Design & evaluation · This part of the course covers: ­ fundamental security design principles; ­ a security design methodology

  7. Global environmental markets: Equity and efficiency

    SciTech Connect (OSTI)

    Chichilnisky, G.

    1997-12-31

    Global markets trading rights to emit greenhouse gases are now actively considered by the United Nations. This leads to a new phenomenon: environmental markets in a global scale. Is this new, or are these markets simply a global manifestation of a trend towards market solutions? This paper will show that there is a fundamental difference between global environmental markets and standard stock exchanges. Because the atmosphere of the planet is one and the same for all, these markets trade {open_quotes}public goods{close_quotes} which are, however, privately produced. These are different from all the goods that are traded in markets today. Efficiency in these markets dictates different rules, involving a more equitable allocation of property rights on environmental use, and this requires new institutional arrangements. There is a need for a new institution, an International Bank for Environmental Settlements (IBES), which can lead to organized trading and ensures market integrity and efficiency.

  8. Management Principles for Nonproliferation Organizations

    SciTech Connect (OSTI)

    Frazar, Sarah L.; Hund, Gretchen

    2012-03-06

    This paper identifies business models and six management principles that can be applied by a nonproliferation organization to maximize the value and effectiveness of its products. The organizations responsible for reducing the nuclear proliferation threat have experienced a substantial growth in responsibility and visibility since the September 11 attacks. Since then, the international community has witnessed revelations of clandestine nuclear facilities, nuclear black markets, periodic nuclear tests, and a resurgence of interest by countries worldwide in developing nuclear capabilities. The security environment will likely continue to evolve in unexpected ways since most of the proliferation threats with which the world will be forced to contend remain unforeseen. To better prepare for and respond to this evolving security environment, many nonproliferation organizations are interested in finding new or better ways to increase the effectiveness and efficiency of their operations. Of course, all organizations, whether they are market driven or non-profit, must operate effectively and efficiently if they are to succeed. Indeed, as this study demonstrates, many of the management principles that this study recommends can help all organizations succeed. However, this study pays particular attention to nonproliferation organizations because of the mission they are responsible for fulfilling. Nonproliferation organizations, including nonproliferation programs that operate within a larger national security organization, are responsible for reducing the threat of nuclear, chemical and biological weapons. These organizations have an enduring mandate from the public and the international community not to fail in the completion of their mission for failure could have detrimental impacts on international security, public health and the environment. Moreover, the public expects nonproliferation organizations and programs to fulfill their mission, even when resources are limited. They are expected to anticipate and react quickly to prevent a potential threat while staying accountable to their public stakeholders, many of whom remain unaware of the very threats the organization is trying to address. When budgets are flush, it is easy to believe that money will solve all problems; but during times of economic hardship, managers must rely on creative and cost-effective management approaches to implement their missions. Fortunately, managers of nonproliferation organizations can draw on a wealth of research on organizational design and culture to help them identify the management strategies most appropriate for them. Such research can help nonproliferation managers think about their own organizational structures and cultures and adapt accepted management principles to their unique organizational mission. This analytical process is not straight forward, as some managers may find themselves taking risks that others might not take, such as making ostensibly risky investments for the common good, or supporting creative thinking to help mission accomplishment. Some management principles that are relatively straightforward for other organizations may be difficult to envision and implement in a nonproliferation organization. Therefore, the goal of this study is to help nonproliferation managers identify management principles that can be implemented in a nonproliferation organization and, in the process, help maximize the value of the organization's products and effectiveness of its mission.

  9. Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents Yang Liu1, Armin Sarabi1, Jing Zhang1, Parinaz Naghizadeh1

    E-Print Network [OSTI]

    Liu, Mingyan

    Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents Yang Liu1, Armin Sarabi1, Jing In this study we characterize the extent to which cyber security incidents, such as those referenced by Verizon to understand the extent to which one can forecast if an organization may suffer a cyber security incident

  10. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr.

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  11. Climate Induced Spillover and Implications for U.S. Security.

    SciTech Connect (OSTI)

    Tidwell, Vincent C.; Naugle, Asmeret Bier; Backus, George A.; Lott, Kathryn Marie; Keller, Elizabeth; Kobos, Peter H.; Villa, Daniel

    2015-11-01

    Developing nations incur a greater risk to climate change than the developed world due to poorly managed human/natural resources, unreliable infrastructure and brittle governing/economic institutions. These vulnerabilities often give rise to a climate induced “domino effect” of reduced natural resource production-leading to economic hardship, social unrest, and humanitarian crises. Integral to this cascading set of events is increased human migration, leading to the “spillover” of impacts to adjoining areas with even broader impact on global markets and security. Given the complexity of factors influencing human migration and the resultant spill-over effect, quantitative tools are needed to aid policy analysis. Toward this need, a series of migration models were developed along with a system dynamics model of the spillover effect. The migration decision models were structured according to two interacting paths, one that captured long-term “chronic” impacts related to protracted deteriorating quality of life and a second focused on short-term “acute” impacts of disaster and/or conflict. Chronic migration dynamics were modeled for two different cases; one that looked only at emigration but at a national level for the entire world; and a second that looked at both emigration and immigration but focused on a single nation. Model parameterization for each of the migration models was accomplished through regression analysis using decadal data spanning the period 1960-2010. A similar approach was taken with acute migration dynamics except regression analysis utilized annual data sets limited to a shorter time horizon (2001-2013). The system dynamics spillover model was organized around two broad modules, one simulating the decision dynamics of migration and a second module that treats the changing environmental conditions that influence the migration decision. The environmental module informs the migration decision, endogenously simulating interactions/changes in the economy, labor, population, conflict, water, and food. A regional model focused on Mali in western Africa was used as a test case to demonstrate the efficacy of the model.

  12. COSC 472 Network Security Annie Lu 1 COSC 472 Network Security

    E-Print Network [OSTI]

    Lu, Enyue "Annie"

    Network Security Annie Lu Background · Information Security requirements have changed in recent times to protect data during transmission #12;COSC 472 Network Security Annie Lu 6 Security · Information Security Security Annie Lu Computer Security · the protection afforded to an automated information system in order

  13. The Cyber Security Crisis

    ScienceCinema (OSTI)

    Spafford, Eugene [Purdue University, West Lafayette, Indiana, United States

    2009-09-01

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  14. Fermilab | About | Organization | Fermilab Organization | Explanation...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Symbols Line Organization: sectors, divisions, sections Line Organization Matrix Organization: centers, projects and programs utilizing resources spanning the entire...

  15. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  16. Security Administration Production Office,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345Secure

  17. China's Global Oil Strategy

    E-Print Network [OSTI]

    Thomas, Bryan G

    2009-01-01

    International Energy Agency (IEA), China’s Worldwide QuestSecurity, (Paris: OCED/IEA, 2000), 74. Thomas Woodrow, “TheInternational Energy Agency (IEA), China’s Worldwide Quest

  18. Assessment And Testing of Industrial Devices Robustness Against Cyber Security Attacks

    E-Print Network [OSTI]

    Tilaro, F

    2011-01-01

    CERN (European Organization for Nuclear Research),like any organization, needs to achieve the conflicting objectives of connecting its operational network to Internet while at the same time keeping its industrial control systems secure from external and internal cyber attacks. With this in mind, the ISA-99[0F1] international cyber security standard has been adopted at CERN as a reference model to define a set of guidelines and security robustness criteria applicable to any network device. Devices robustness represents a key link in the defense-in-depth concept as some attacks will inevitably penetrate security boundaries and thus require further protection measures. When assessing the cyber security robustness of devices we have singled out control system-relevant attack patterns derived from the well-known CAPEC[1F2] classification. Once a vulnerability is identified, it needs to be documented, prioritized and reproduced at will in a dedicated test environment for debugging purposes. CERN - in collaboration ...

  19. 38 September/October 2010 global aquaculture advocate global aquaculture advocate September/October 2010 39 The global seafood industry is at a

    E-Print Network [OSTI]

    , they are falling increasingly short of a growing world demand for sea- food. It is anticipated that by 2030 while ensuring the viability of this sector and its key roles in food provi- sion, safety and security of trophic levels that share the environment and take advantage of organic and inorganic nutrients made

  20. 2014 Headquarters Facilities Master Security Plan- Chapter 11, Incidents of Security Concern

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern Describes DOE Headquarters procedures for reporting, investigating, and correcting Incidents of Security Concern.

  1. NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security...

    National Nuclear Security Administration (NNSA)

    Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  2. Using and losing land to feed a growing world It's taken a long time, but the issue of global climate change

    E-Print Network [OSTI]

    Ellis, Erle C.

    of the need to confront energy security and global warming. We finally acknowledge that our addiction fixation on global warming at the expense of other issues. Learning from the research my colleagues and I have done over the past decade, I fear we are neglecting "the other" inconvenient truth: a global

  3. 2006 U.S. Department of Energy Strategic Plan: Discovering the Solutions to Power and Secure America’s Future

    SciTech Connect (OSTI)

    None,

    2006-10-11

    The Department of Energy Organization Act, which created DOE, was enacted in 1977 and DOE officially came into existence in October of that year. That law brought together for the first time, not only most of the government’s energy programs, but also science and technology programs and defense responsibilities that included the design, construction, and testing of nuclear weapons. Over its history, DOE has shifted its emphasis and focus as the energy and security needs of the Nation have changed. Today, DOE stands at the forefront of helping the Nation meet our energy, scientific, environmental, and national security goals. These include developing and deploying new energy technologies, reducing our dependence on foreign energy sources, protecting our nuclear weapons stockpile, and ensuring that America remains competitive in the global marketplace. To help achieve these goals, President Bush has launched two key initiatives: the American Competitiveness Initiative (ACI) and the Advanced Energy Initiative (AEI). The President launched these initiatives recognizing that science, technology, and engineering hold the answers to many of the critical challenges our world faces. These new initiatives to spur scientific innovation and technology development expand DOE’s continuing support for the competitive energy markets, both domestically and internationally, and of policies that facilitate continued private investment in the energy sector. In addition, DOE supports the demonstration and deployment of energy technologies through collaborative efforts with the private sector and public sector entities.

  4. TED AND KARYN HUME CENTER FOR NATIONAL SECURITY AND TECHNOLOGY

    E-Print Network [OSTI]

    Ha, Dong S.

    Networks, Crypto, Formal Methods, Cloud, IPv6, Hardware Security, Visualization, Policy/Law Applications Security IPv6 Security Cloud Security and Privacy Secure Virtualization Anonymous Computation VisualizationTED AND KARYN HUME CENTER FOR NATIONAL SECURITY AND TECHNOLOGY Cybersecurity: Observations

  5. Engineering the global ecosystem

    E-Print Network [OSTI]

    Stringfellow, William T.; Jain, Ravi

    2010-01-01

    of humans deliberately engineering agricultural landscapes.010-0302-8 EDITORIAL Engineering the global ecosystemtale about human explorers engineering the ecosystem of Mars

  6. Information Systems and Computing/Office of Information Security www.upenn.edu/computing/security security@isc.upenn.edu

    E-Print Network [OSTI]

    Fang-Yen, Christopher

    ". And Penn actually offers a couple of "home grown" cloud services for secure file sharing and transferInformation Systems and Computing/Office of Information Security www.upenn.edu/computing/security security@isc.upenn.edu "phishing"...? Information Systems and Computing/Office of Information Security

  7. Aviation security: A system's perspective

    SciTech Connect (OSTI)

    Martin, J.P.

    1988-01-01

    For many years the aviation industry and airports operated with security methods and equipment common to most other large industrial complexes. At that time, the security systems primarily provided asset and property protection. However, soon after the first aircraft hijacking the focus of security shifted to emphasize the security requirements necessary for protecting the traveling public and the one feature of the aviation industry that makes it unique---the airplane. The airplane and its operation offered attractive opportunities for the homesick refugee, the mentally unstable person and the terrorist wanting to make a political statement. The airport and its aircraft were the prime targets requiring enhanced security against this escalated threat. In response, the FAA, airport operators and air carriers began to develop plans for increasing security and assigning responsibilities for implementation.

  8. East Asian Security in 2025 

    E-Print Network [OSTI]

    Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

    2008-01-01

    Are • Reagan Heavin – Energy • Adam Hudson – State Capacity • Brandon Krueger – Military • Sean O’Neil – Demographics • Griffin Rozell – Balance of Power • Matt Suma – Economy East Asian Security in 2025 China: Competition, Cooperation, Plateau? Reagan Heavin... Adam Hudson Brandon Krueger Sean O’Neil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda • Conclusions • Projections • Drivers • Four Outcomes • Questions East Asian Security in 2025 Conclusions • China will rise to great power...

  9. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  10. Noise Secured Internet

    E-Print Network [OSTI]

    Geraldo A. Barbosa

    2006-02-28

    This work shows how a secure Internet can be implemented through a fast key distribution system that uses physical noise to protect the transmitted information. Starting from a shared random sequence $K_0$ between two (or more) users, longsequences $R$ of random bits can be shared. The signals sent over the Internet are deterministic but have a built-in Nature-made uncertainty that protects the shared sequences. After privacy amplification the shared $R$ random bits --encrypted by noise-- are subsequently utilized in one-time-pad data ciphering.

  11. Security | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopment Top Scientific Impact Since its SearchSecurity Enhancing

  12. Energy Security Center

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES October 27th, 2010 Thanks forEnergy ScienceEnergy Security

  13. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES October 27th, 2010 Thanks forEnergy ScienceEnergy Security

  14. Security, Safety and Health

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergy BillsNo.Hydrogen4 » Searchwith First JamesofAward509 WeekSecurity8, Fourth

  15. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities GeneralWake-ImagingNotSecurity Home

  16. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities GeneralWake-ImagingNotSecurity Home

  17. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National NuclearSecurityor

  18. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National

  19. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001 Energy

  20. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001 Energy24,

  1. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001

  2. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001Y-12

  3. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you notHeatMaRIEdioxide capture CS SeminarsNRELNuclear Security

  4. Energy Security Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansasCommunities EnergyU.S. DOE Office of99SavingTrilateralUnionSecurity

  5. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)GeothermalFuel MagnetizationTransportationVideos HomePower HomeSecurity

  6. dnn | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, Shaping the future of nuclear...

  7. Web Engineering Security: Essential Elements

    E-Print Network [OSTI]

    Glisson, W.B.; Welland, R.; The Second International Conference on Availability, Reliability and Security (ARES).; 2007.; Vienna, Austria pp 707-714 IEEE [More Details

    Glisson,W.B. Welland,R. The Second International Conference on Availability, Reliability and Security (ARES). 2007. Vienna, Austria pp 707-714 IEEE

  8. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 “Climate change acts as a threat

  9. testmenu | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    testmenu | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  10. taiwan | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    taiwan | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  11. Energy Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    through these relationships that will transition into technologies that address DOE Roadmap challenges. R&D Activities: Real-time digital simulator Advanced security...

  12. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

  13. Cyber Security | More Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant,...

  14. hrp | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    hrp | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  15. sliderphotos | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sliderphotos | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  16. Trident | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Trident | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  17. Nike | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nike | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  18. MIT Joint Program on the Science and Policy of Global Change

    E-Print Network [OSTI]

    for Global Change Science (CGCS) and the Center for Energy and Environmental Policy Research (CEEPRMIT Joint Program on the Science and Policy of Global Change Unemployment Effects of Climate Policy on the Science and Policy of Global Change is an organization for research, independent policy analysis

  19. Implementing Information Security and Its Technology: A Line Management Perspective

    E-Print Network [OSTI]

    Barletta, William A.

    2005-01-01

    of an integrated information security and privacy program.An institution's information security program forms thefrom the chief information security officer, chief security

  20. PIA - WEB Physical Security Major Application | Department of...

    Energy Savers [EERE]

    PIA - WEB Physical Security Major Application PIA - WEB Physical Security Major Application PIA - WEB Physical Security Major Application PDF icon PIA - WEB Physical Security Major...

  1. SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

    E-Print Network [OSTI]

    SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National and to protect their systems and information from security threats and risks. There have been many past efforts

  2. Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security of

    E-Print Network [OSTI]

    2007-01-01

    Information Systems 32 (2007) 1166­1183 Security Attack Testing (SAT)--testing the security have been devoted into integrating security issues into information systems development practices reserved. Keywords: Information systems development methodology; Integrating security and software

  3. The National Security Policy Process: The National Security Council and Interagency System

    E-Print Network [OSTI]

    Huang, Wei

    The National Security Policy Process: The National Security Council and Interagency System By Alan Update: August 15, 2011 #12;THIS PAGE INTENTIONALLY BLANK 2 #12;Table of Contents The National Security Policy Process: The National Security Council and Interagency System

  4. GEORG-AUGUST-UNIVERSITT Computer Security

    E-Print Network [OSTI]

    Grabowski, Jens

    » Cybercrime and cyberterrorism » Information technology of little use without security 3 #12;GEORGGEORG-AUGUST-UNIVERSITÄT GÖTTINGEN Computer Security Overview and Introduction Computer Security Security @ Göttingen » Research group for comuter security » Prof. Dr. Konrad Rieck » 4 PhD students (+ 2

  5. Security Policies for Downgrading Stephen Chong

    E-Print Network [OSTI]

    Myers, Andrew C.

    @cs.cornell.edu ABSTRACT A long-standing problem in information security is how to specify and enforce expressive security that incorporates them, allowing secure downgrading of information through an explicit declassification operation of Com- puting and Information Systems]: Security and Protection General Terms: Security, Languages

  6. Your Safety and Security at Syracuse University

    E-Print Network [OSTI]

    Raina, Ramesh

    programs to disclose campus crime statistics and security information. A 1998 amendment renamed the lawYour Safety and Security at Syracuse University A comprehensive report on campus security and fire and security measures on and around our campus. The need for security encompasses more than personal safety

  7. Computer Security Division 2009 Annual Report

    E-Print Network [OSTI]

    Security 12 Smart Grid Cyber Security 13 Supply Chain Risk Management 13 Cryptographic Validation Programs Computing Project 36 Policy Machine 36 Security for Grid and Pervasive Systems 38 Security OntologiesComputer Security Division 2009 Annual Report #12;Table of Contents Welcome 1 Division

  8. Global Change Sustainability

    E-Print Network [OSTI]

    Tipple, Brett

    Global Change and Sustainability Center The GCSC is an inclusionary and interdisciplinary hub that promotes, coordinates, and conducts local to global environmental- and sustainability-related research to complex environmental and sustainability issues and challenges. 2012 Annual Report #12;1GCSC 2012 ANNUAL

  9. Organizing Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesseworkSURVEYI/O Streams for Large-scaleOrganizationAboutOrganizingOrganizing

  10. SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013)

    E-Print Network [OSTI]

    2013-01-01

    system engineer. A tool is developed to support the steps supporting this methodology and help to bridge the smart metering domain. Copyright © 2013 John Wiley & Sons, Ltd. KEYWORDS model-based engineering; security engineering; security ontology; domain-specific modelling; embedded systems; smart metering

  11. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The vendor has issued a fix: 1. Cisco Secure ACS version 5.1: File 5-1-0-44-6.tar.gpg - ACS 5.1.0.44 cumulative patch 6 2. Cisco Secure ACS version 5.2: File...

  12. PRACTICAL SECURITY Implementing Security Education at a Small Community College

    E-Print Network [OSTI]

    Whatcom Community College Abstract: This paper discusses modifying an existing two-year degree to include, and introducing an information security specialty into an existing degree can be challenging. At Whatcom Community ASSURANCE CURRICULUM At the beginning of the 2003-2004 academic year, Whatcom had one security course

  13. Electronic security device

    DOE Patents [OSTI]

    Eschbach, Eugene A. (Richland, WA); LeBlanc, Edward J. (Kennewick, WA); Griffin, Jeffrey W. (Kennewick, WA)

    1992-01-01

    The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

  14. Electronic security device

    DOE Patents [OSTI]

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-03-17

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

  15. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

  16. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1993-04-01

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  17. Evaluation Report on "The Department's Unclassified Cyber Security Program"

    SciTech Connect (OSTI)

    None

    2009-10-01

    Industry experts report that security challenges and threats are continually evolving as malicious activity has become more web-based and attackers are able to rapidly adapt their attack methods. In addition, the number of data breaches continues to rise. In an effort to mitigate and address threats and protect valuable information, the Department of Energy anticipated spending about $275 million in Fiscal Year (FY) 2009 to implement cyber security measures necessary to protect its information technology resources. These systems and data are designed to support the Department's mission and business lines of energy security, nuclear security, scientific discovery and innovation, and environmental responsibility. The Federal Information Security Management Act of 2002 (FISMA) provides direction to agencies on the management and oversight of information security risks, including design and implementation of controls to protect Federal information and systems. As required by FISMA, the Office of Inspector General conducts an annual independent evaluation to determine whether the Department's unclassified cyber security program adequately protects its information systems and data. This memorandum and the attached report present the results of our evaluation for FY 2009. The Department continued to make incremental improvements in its unclassified cyber security program. Our evaluation disclosed that most sites had taken action to address weaknesses previously identified in our FY 2008 evaluation report. They improved certification and accreditation of systems; strengthened configuration management of networks and systems; performed independent assessments; and, developed and/or refined certain policies and procedures. In addition, the Department instituted a centralized incident response organization designed to eliminate duplicative efforts throughout the Department. As we have noted in previous reports, the Department continued to maintain strong network perimeter defenses against malicious intruders and other externals threats. These are positive accomplishments. However, in our judgment, additional action is required to further enhance the Department's unclassified cyber security program and help reduce risks to its systems and data. For example, our current review identified opportunities for improvements in areas such as security planning and testing, systems inventory, access controls, and configuration management. In particular, we issued a number of findings at sites managed by the National Nuclear Security Administration (NNSA). We also identified weaknesses across various Department program elements. Issues that warrant further attention include: (1) Weaknesses such as outdated security plans and not completing annual security control self-assessments were identified at several sites; (2) The Department had not yet resolved systems inventory issues and had yet to deploy a complex-wide automated asset management tool to help track information technology resources and identify interfaces between systems or networks; (3) Although certain improvements had been made to enhance access controls, we noted deficiencies such as a lack of periodic account reviews and inadequate password management at a number of sites; and (4) Previously identified weaknesses in configuration management had been corrected, however, we found problems related to weak administrator account settings and failure to install software patches, as well as incomplete implementation of the Federal Desktop Core Configuration. These internal control weaknesses existed, at least in part, because certain cyber security roles and responsibilities were not clearly delineated. Program officials also had not effectively performed monitoring and review activities essential for evaluating the adequacy of cyber security performance. In some cases, officials had not ensured that weaknesses discovered during audits and other evaluations were recorded and tracked to resolution in the organizations' Plans of Action and Milestones. Our testing disclosed that about 39 p

  18. Organic Superconductors

    SciTech Connect (OSTI)

    Charles Mielke

    2009-02-27

    Intense magnetic fields are an essential tool for understanding layered superconductors. Fundamental electronic properties of organic superconductors are revealed in intense (60 tesla) magnetic fields. Properties such as the topology of the Fermi surface and the nature of the superconducting order parameter are revealed. With modest maximum critical temperatures~13K the charge transfer salt organic superconductors prove to be incredibly valuable materials as their electronically clean nature and layered (highly anisotropic) structures yield insights to the high temperature superconductors. Observation of de Haas-van Alphen and Shubnikov-de Haas quantum oscillatory phenomena, magnetic field induced superconductivity and re-entrant superconductivity are some of the physical phenomena observed in the charge transfer organic superconductors. In this talk, I will discuss the nature of organic superconductors and give an overview of the generation of intense magnetic fields; from the 60 tesla millisecond duration to the extreme 1000 tesla microsecond pulsed magnetic fields.

  19. Risk-driven Security Testing versus Test-driven Security Risk Analysis

    E-Print Network [OSTI]

    Střlen, Ketil

    Risk-driven Security Testing versus Test-driven Security Risk Analysis Gencer Erdogan1 the combinations of se- curity testing and security risk analysis depending on whether it is viewed from a security testing perspective or a security risk analysis perspective. The main focus in the former view is security

  20. GM-Security and Semantic Security Revisited Yevgeniy Dodis Matthias Ruhl

    E-Print Network [OSTI]

    Dodis, Yevgeniy

    GM-Security and Semantic Security Revisited Yevgeniy Dodis Matthias Ruhl MIT Laboratory give a simple proof that GM-security and semantic security are equivalent security no- tions for public security definitions which are still the mostly used ones today. The two notions are called `GM

  1. Effective Ways of Secure, Private and Trusted Cloud Computing

    E-Print Network [OSTI]

    Kumar, Pardeep; Chauhan, Durg Singh; Gupta, P K; Diwakar, Manoj

    2011-01-01

    Cloud computing is an Internet-based computing, where shared resources, software and information, are provided to computers and devices on-demand. It provides people the way to share distributed resources and services that belong to different organization. Since cloud computing uses distributed resources in open environment, thus it is important to provide the security and trust to share the data for developing cloud computing applications. In this paper we assess how can cloud providers earn their customers' trust and provide the security, privacy and reliability, when a third party is processing sensitive data in a remote machine located in various countries? A concept of utility cloud has been represented to provide the various services to the users. Emerging technologies can help address the challenges of Security, Privacy and Trust in cloud computing.

  2. Techniques for enhanced physical-layer security

    E-Print Network [OSTI]

    Pinto, Pedro C.

    Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications ...

  3. Security Services for Next Generation Healthcare

    E-Print Network [OSTI]

    Fisher, Kathleen

    /HIT). The availability of electronic healthcare information dramatically changes the information security threat) available online, and thus new information privacy and security requirements were also stipulated in the Act. Among the new information security requirements, specific data confidentiality and integrity

  4. Office of Headquarters Personnel Security Operations

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

  5. Trusted Cloud: Microsoft Azure Security, Privacy,

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Trusted Cloud: Microsoft Azure Security, Privacy, and Compliance April 2015 #12;Trusted Cloud................................................................. 18 #12;Trusted Cloud: Microsoft Azure Security, Privacy, and Compliance | April, 2015 Introduction: Microsoft Azure Security, Privacy, and Compliance | April, 2015 #12;3 Contents Introduction

  6. Energy and Security in Northeast Asia

    E-Print Network [OSTI]

    May, Michael; Johnson, Celeste; Fei, Edward; Suzuki, Tatsujiro

    1996-01-01

    plants as a form of energy security in the absence of suffi-can be drawn. The energy security situation and outlook areregional cooperation on energy and security issues in Asia.

  7. POLICYProfessional Perspectives on Energy Security, Economics,

    E-Print Network [OSTI]

    TheGoalsof ENERGY POLICYProfessional Perspectives on Energy Security, Economics Security, Economics, and the Environment The Goals of Energy Policy: Professional Perspectives on Energy Security, Economics, and the Environment EXECUTIVE SUMMARY Energy-related incidents and issues ­ the BP

  8. Security Design and Information Aggregation in Markets

    E-Print Network [OSTI]

    Chen, Yiling

    Security Design and Information Aggregation in Markets Yiling Chen Anthony M. Kwasnica Abstract that information aggregation ability of markets is affected by the security design. Behavior of individual Keywords: Security design; Information aggregation; Information market; Price convergence. 1 Introduction

  9. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    Analysis of electric grid security under terrorist threat’,and a guideline to smart grid security in NIST-IR 7628. Al-the current security posture of the power grid, (2) develop

  10. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    myths and facts behind cyber security risks for industrialJ. and Hieb, J. [2007], ‘Cyber security risk assessment forOn Cyber Security for Networked Control Systems by Saurabh

  11. NISTIR 7359 Information Security Guide For

    E-Print Network [OSTI]

    is directed to develop cyber security standards, guidelines, and associated methods and techniques. ITLNISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12;NISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew

  12. Departmental Personnel Security- Policy and Procedures

    Broader source: Energy.gov [DOE]

    Departmental Personnel Security provides centralized and authoritative policy guidance and ensures consistent and effective implementation of the DOE personnel security program Department-wide to include the National Nuclear Security Administration.

  13. INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO

    E-Print Network [OSTI]

    Radack, Editor Computer Security Division Information Technology Laboratory National Institute-35, Guide to Information Technology Security Ser vices, Recommendations of the National InstituteJune 2004 INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO SELECT, IMPLEMENT, AND MANAGE Shirley

  14. Reporting Incidents Of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-04-03

    To enhance the Department of Energy (DOE) Incidents of Security Concern Reporting Program through more consistent reporting, better information tracking, and interactive coordination. DOE N 251.54, dated 07/08/03, extends this directive until 07/08/04. Cancels Deputy Secretary Glauthier memorandum, subject: Reporting Security Incidents, dated 9-7-99.

  15. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

  16. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

  17. Distributed Internet Security and Measurement

    E-Print Network [OSTI]

    New Mexico, University of

    , New Mexico May, 2009 #12;Distributed Internet Security and Measurement by Josh Karlin B.A., Computer#12;Distributed Internet Security and Measurement by Josh Karlin B.A., Computer Science for the Degree of Doctor of Philosophy Computer Science The University of New Mexico Albuquerque, New Mexico May

  18. A global warning for global warming

    SciTech Connect (OSTI)

    Paepe, R.

    1996-12-31

    The problem of global warming is a complex one not only because it is affecting desert areas such as the Sahel leading to famine disasters of poor rural societies, but because it is an even greater threat to modern well established industrial societies. Global warming is a complex problem of geographical, economical and societal factors together which definitely are biased by local environmental parameters. There is an absolute need to increase the knowledge of such parameters, especially to understand their limits of variance. The greenhouse effect is a global mechanism which means that in changing conditions at one point of the Earth, it will affect all other regions of the globe. Industrial pollution and devastation of the forest are quoted as similar polluting anthropogenic activities in far apart regions of the world with totally different societies and industrial compounds. The other important factor is climatic cyclicity which means that droughts are bound to natural cycles. These natural cycles are numerous as is reflected in the study of geo-proxydata from several sequential geological series on land, ice and deepsea. Each of these cycles reveals a drought cycle which occasionally interfere at the same time. It is believed that the present drought might well be a point of interference between the natural cycles of 2,500 and 1,000 years and the man induced cycle of the last century`s warming up. If the latter is the only cycle involved, man will be able to remediate. If not, global warming will become even more disastrous beyond the 21st century.

  19. Issues in Security Service Discovery and Routing

    SciTech Connect (OSTI)

    Sholander, P.; Tarman, T.

    1999-04-07

    The Security Specification, Version 1.0 allows security services to be provided by many devices in a network. It correctly presumes that if a virtual circuit needs these security services, then network topology and device policy will act to ensure that the appropriate security services are applied to the virtual circuit. This contribution moves that the Security Service Discovery and Routing function be included in the Security Version 2.0 work scope.

  20. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01. Cancels DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, and Chapter IX of DOE M 5632.1C-1