Powered by Deep Web Technologies
Note: This page contains sample records for the topic "owner local privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Localization privacy  

Science Conference Proceedings (OSTI)

Location-aware technology and its applications are fundamental to ubiquitous computing. Essential to this technology is object localization and identification. RFID (radio frequency identification) technology has been shown to be very effective for identification ... Keywords: RFID, localization privacy, location privacy, location-aware applications, object localization

Mike Burmester

2012-01-01T23:59:59.000Z

2

MEMORANDUM OWNER(S)  

Office of Legacy Management (LM)

OWNER(S) OWNER(S) -------- past : Lb-J ' 0-c @+a+~-~% current: -- ________________________ ------7--- -- Owner cantacted 0 yes 4t no; if yes, date contacted TYPE OF OPERATION ----------------- q Research & Development 0 Facility Type 0 Production scale testing 0 Manufacturing 0 Pilat Scale 0 Bench Scale Process i Theoretical Studies Sample & Analysis 0 Production 0 Di5posal/Storage TYPE OF CONTRACT ----_----------- 0 Prime q Subcontractor Cl Purchase Order 0 University 0 Research Organization 0 Government Spohscred Facility 0 Other --------------------- . 0 Other information (i.e., cost + fixed fee, unit price, time 84 material, e,tc:) ------- 'Canfract/Purchase Order # --. CONTRACTING PERIOD: r4J~--___-----___---_____________ ----- OWNERSHIP:

3

Protecting location privacy: optimal strategy against localization attacks  

Science Conference Proceedings (OSTI)

The mainstream approach to protecting the location-privacy of mobile users in location-based services (LBSs) is to alter the users' actual locations in order to reduce the location information exposed to the service provider. The location obfuscation ... Keywords: location inference attacks, location privacy, location-based services, optimal defense strategy, privacy protection, service quality, stackelberg bayesian games

Reza Shokri; George Theodorakopoulos; Carmela Troncoso; Jean-Pierre Hubaux; Jean-Yves Le Boudec

2012-10-01T23:59:59.000Z

4

OWNER(S) Past:  

Office of Legacy Management (LM)

--------------__ --------------__ CITY: ' -* -I c.l.&&!,Ck -------------------------- OWNER(S) ------__ Past: Owner contacted q yes current: -------------------------- if yea, date contacted ------_---___ TYPE OF OPERATION --------~~_~----_ q Research & Development 0 Production scale testing 0 Pilot Scale 0 Bench Scale Process,. 0 Theoretical Studies 0 Sample & Analysis 0 Production 0 Disposal/Storage 0 Facility Type a Manufacturing (I University, 0 Research Organization 0 Government Sponsored Facility 0 Other ~~~--~~~---~~~------_ TYPE OF CONTRACT ---_---__------_ 0 Prinie 0 Subcantractbr 0 Purchase Order 0 Other information (i.e., cast + fixed fee, unit price, time b material, qtc) ----'w-- ~~--~~-~~~----~~----________ Contract/Purchase ' Order

5

SUBJECT: OWNER(S)  

Office of Legacy Management (LM)

HEHORANDUH HEHORANDUH ;;&; DC&b ------w--v SUBJECT: OWNER(S) -------- P1st a Owner contrctmd TYPE OF OPERATION ----------------- 0 Research I Development 0 Facility Type 0 Production scale testing 0 Pilot Scrlr 0 Bench Seal0 Procemm 0 Theoretical Studier 0 Sample & Anrlyri l 0 Production x Dimpomrl/Storrgr 0 Hmufrcturing 0 University 0 Rmsmarch Organization 0 Government Sponmored Facility 0 Other -II---------------- TYPE OF CONTRACT ----u---------- 0 d ime Subcontract& 0 Purchrre Order 0 Other information (i.e., comt -w-e--- Contrrct/Purchrsa Order 0 CONTRACTING PERIOD: ------------------ . OWNERSHIPa AEC/HED OWNED m---w LANDS 0 BUILDINSS 0 EQUIPMENT 0 ORE OR RAW HA-I-L 0 FINAL PRODUCT q WASTE & RESIDUE 0 AEC/HED LEASED ---w-w E 0 0

6

OWNER(S)  

Office of Legacy Management (LM)

l . . l . . ; * 3Tb'-j .I OWNER(S) rf yea, date contacted ___ TYPE OF OPERATION --~~----~---__--_ aResearch & Development q Facility Type 0 Production scale testing Et Pilot Scale q Hanufacturing 0 Bench Scale Process 0 University 0 Theoretical Studies 0 Research Organization Cl 0 Government Sponsored Facility Sample SC Analysis Cl Other --------__----___--_ 3 Production 1 Disposal/Storage TYPE OF CONTRACT --~_---__---____ m.p rime SC5 sLta4rM-J / Cl Subcqntractor 0 Purchase Order 0 Other information (i.e., cost + fixed fee, unit price? Contract/Purchase Order # ~~~ti~ --------------------_____________ AECf MED OWNED -_--_ LANDS BUILDINGS ' EQUIPMENT ORE OR RAW MATL [3 FINAL PRODUCT 0 WASTE & RESIDUE q GOVT OWNED ----- GOUT LEASED -----_ E

7

OWNER(S)  

Office of Legacy Management (LM)

_----- _----- past: %J +c - fl*+;o.rrq -____------------- Owner contacted 0 yes Curr@nt: ______ -----------L-----l- if yes, date contacted TYPE OF OPERATION Reeearch & Development 0 Facility Type 0 Production scale testing Cl Pilot Scale 0 Bench Scale Process 0 0 Research Organization Theoretical Studies 0 0 Government Sponsored Facility ~ ~*a;~a.a~~plysis 0 Other ~~~~~~~~------____--- 0 Production 0 DispdsalfStoraqe TYPE OF CONTRACT ---------------- 0 Prime 0 Subcontractor 0 Purchase Order 0 Other information (i.e., cost + fixed fee, unit price, time & mater!&, etc) ------- --------------------LA------ ~~------------~~~-~--------- Contract/Purchase Order # ~-----~-~~~~~~~--~~~_____________ CONTRACTING PERIOD: f?Ar! lts' d' ------------------ ___-_ +----a-

8

OWNER(S)  

Office of Legacy Management (LM)

------ - ------ - Past: ~~~-~~~-~~~~~~~~~~rrent: Owner contacted q yes tina;-. ____ c-lti&pJ-~ lf yes, date contacted -_---__---___ TYPE OF OPERATION -_-----_--_--____ q Research & Development 0 Production scale testing 0 Pilot Scale 0 Bench Scale Process : 'Theoretical Studier Sample & Analysis G Production 0 Disposal/Storage TYPE OF CONTRACT ~-~~~----~~----_ &, Facility Type q Manufacturing 0 University a Research Organizaticn a Other information (i.e., cost + fixed fee,, unit price, -_---- yryoi -37 J-1 4:~zL~~:~:q~&- ,-antract,purchase Order # ,L,U,-37-?\- ---------------------------- --------------------_____________ my~mx~~ai_~Gi~~~Q : _I 7 v 3 _ I 9 V-Y, ---_--_------------------------------ OWNERSHIP: AEC/MED AEC/MED GOUT GOUT

9

PRIVACY IMPACT ASSESSMENT: Occupational Medicine Assistant PIA  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Medicine Medicine - Assistant PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Deparlment of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT iDafe 'Depauwerltal El.ment& iSlte June 10, 2009 Idaho National Laboratory Name :of,lnfonnation Systetnol"'ITiPtoJect Occupational Medicine - Assistant Exhlblt;ProJect UID Indirect funded Occupational Safety and Health NewPIA 0 Update D N T 'tl I Contact Information arne I e . , Phone, Email System Owner Local Privacy Act Offtcer

10

PRIVACY IMPACT ASSESSMENT: INL E-IDR  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INL INL E-IDR (Invention Disclosure Record) PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. I MODULE 1- PRIVACY NEEDS ASSESSMENT Date O..parlmental Element & Site 6/10/09 Idaho National Laboratory Building: 654 BUilding Name: EROS Name of Information System or IT Project E-IDR (Invention Disclosure Record) Exhibit Project UID 61104 NewPIA GJ Update D N T 'tl I Contact Information arne, I e Ph E ' I one, mal System Owner Wendy Skinner Local Privacy Act

11

Can historic neighborhoods compete? Analysis of and recommendations for local incentives for owner-occupied historic housing  

E-Print Network (OSTI)

This research study sets out to determine what incentives and programs are being utilized throughout the country and in Texas to keep historic residential neighborhoods maintained and vibrant. For this purpose, federal, state and local programs have been surveyed to discover what programs are being utilized and which might be successful in Texas cities. Also surveyed were prospective homebuyers to determine what incentives and maintenance assistance could induce them to purchase, or to consider purchasing, an older home versus a new home in a builder community. The responses of the prospective homebuyers? survey indicates that there is a good deal of interest in older homes among prospective homebuyers. A program to assist them should be based on education, making pertinent information and resources available, and providing financial relief for those purchasing and rehabilitating an older or historic home.

Rowe, Rebecca Elizabeth

2004-12-01T23:59:59.000Z

12

Realities of Chiller Plant Operation: Utility Impacts on Owner...  

NLE Websites -- All DOE Office Websites (Extended Search)

plant operating costs. The building owner, another engineering consultant, and the local utility representatives were confused by the rates and missed an opportunity to cut...

13

Privacy Act  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy Act Privacy Act Privacy Act Code of Federal Regulations (CFR) for the Privacy Act is 10CFR 1008 Privacy Act of 1974 and Amendments (as of Jan 2, 1991) From GPO US Code on CD-ROM (GPO S/N 052-001-004-00439-6) $30.00 -CITE- 5 USC Sec. 552a -EXPCITE- TITLE 5 PART I CHAPTER 5 SUBCHAPTER II -HEAD- Sec. 552a. Records maintained on individuals -EXPCITE- TITLE 5 PART I CHAPTER 5 SUBCHAPTER II -HEAD- Sec. 552a. Records maintained on individuals -STATUTE- (a) Definitions. - For purposes of this section - (1) the term 'agency' means agency as defined in section 552(e) (FOOTNOTE 1) of this title; (FOOTNOTE 1) See References in Text note below. (2) the term 'individual' means a citizen of the United States or an alien lawfully admitted for permanent residence (3) the term 'maintain' includes maintain, collect, use, or disseminate;

14

PRIVACY IMPACT ASSESSMENT: INL Manchester Software  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Manchester Manchester Software 1099 Reporting PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program. Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date 06/09/09 Departmental Idaho National Laboratory Element &Site Building Name: lAB Name of Infonnatlon Manchester Software 1099 Reporting System or IT Project Exhibit Project UID 202021 New PIA GJ Update D Name, Title I Contact Information Phone, Email Bryan Larson, System Owner 208-526-8685 Technical Lead, Manchester

15

PRIVACY IMPACT ASSESSMENT: Visitor Dosimeter Badge Tracking  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Visitor Visitor Dosimeter Badge Tracking PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetexUneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date June 11, 2009 Deparbnental Idaho National Laboratory Element & Site Building 616 Willow Creek Building Name of Information Visitor Dosimeter Badge Tracking System or IT Project Exhibit Project UID 217975 New PIA ~ Update D Name, Title I Contact Information Phone, Email Lynn Rockhold System Owner I' 1\ I \ \ ( y P II 114 I' "I

16

TO: FILE MEMORANDUM SUBJECT: ALTERNATE OWNER(S)  

Office of Legacy Management (LM)

SUBJECT: SUBJECT: ALTERNATE OWNER(S) -__----- Owner csntacted r~ yes current: --------------------A----- if yes, date contacted TYPE OF OPERATION ------------_____ Research & Development 0 Facility Type 0 Production seal e testing 0 Pilot Scale 0 Bench Scale Process i Theoretical Studi es Sample & Analysis Producti on Di spas.31 /Storage a' Manufacturing q University 0 Research Organization 0 Government Sponsored Facility Cl Other ~~~~~~~----~~-------- 0 0 Prime q Other information (i.e., cast 0 Subcontractor 0 'Purchase Order + fixed fee, unit piice, pi time & material, gtc) ~~-----_------~~_-------~-~- .Contract./Purchaee Order # fi~k~ti;3 -----------_---------------- CONTRACTING PEXIOD: tit-k ------------------ would -------------------------------------

17

Privacy Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy Privacy Privacy/Security This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

18

Energy Privacy Steering Committee  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) Privacy Steering Committee (EPSC) advises the Senior Agency Official for Privacy (SAOP) and the Department’s Privacy Program regarding policies and program...

19

Differential privacy under fire  

Science Conference Proceedings (OSTI)

Anonymizing private data before release is not enough to reliably protect privacy, as Netflix and AOL have learned to their cost. Recent research on differential privacy opens a way to obtain robust, provable privacy guarantees, and systems like PINQ ...

Andreas Haeberlen; Benjamin C. Pierce; Arjun Narayan

2011-08-01T23:59:59.000Z

20

User_OrgOwner_Overview  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Organization Owner Overview Organization Owner Overview © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Organization Owner Overview Purpose The purpose of this job aid is to guide organization owners through the step-by-step process of available features within SuccessFactors Learning. The organization dashboard is a collection of charts and data tables that summarize learning data for your organizations and sub-organizations. Note: Depending on how permissions were configured in, access to the following features will vary for each organization. Task A. Organization Dashboard From the Home page, roll-over the Organization tab and select Dashboard from the list. 1 1 Succession Planner 7 Steps

Note: This page contains sample records for the topic "owner local privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Casablanca Carlos American Electric Power Transmission Owner  

E-Print Network (OSTI)

(Facilitator) Chantal PJM Interconnection Not Applicable Horstmann John Dayton Power & Light Company (The) Transmission Owner Issermoyer John PPL Electric Utilities Corp. dba PPL Utilities Transmission Owner

Pjm Interconnection Llc; Teleconference Webex Participants; Firstenergy Solutions; Corp Transmission Owner; Boltz Jeff; Firstenergy Solutions; Corp Transmission Owner; Fecho Thomas; Indiana Michigan; Power Company; Transmission Owner; Patten Kevin; Company Transmission Owner

2012-01-01T23:59:59.000Z

22

Owners of nuclear power plants  

Science Conference Proceedings (OSTI)

Commercial nuclear power plants in this country can be owned by a number of separate entities, each with varying ownership proportions. Each of these owners may, in turn, have a parent/subsidiary relationship to other companies. In addition, the operator of the plant may be a different entity as well. This report provides a compilation on the owners/operators for all commercial power reactors in the United States. While the utility industry is currently experiencing changes in organizational structure which may affect nuclear plant ownership, the data in this report is current as of July 1996. The report is divided into sections representing different aspects of nuclear plant ownership.

Hudson, C.R.; White, V.S.

1996-11-01T23:59:59.000Z

23

PRIVACY IMPACT ASSESSMENT: IDAHO NATIONAL LABORATORY-TRAIN PIA  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IDAHO IDAHO NATIONAL LABORATORY-TRAIN PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetext/neword/206/02061.pdf Please complete electronically: no hand-wrltten submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element &Site June 11, 2009 Idaho National Laboratory Name of Infonnatlon SY8tem or IT Project Training Records and Information Network (TRAIN) Exhibit Project UID 70 NewPIA [!J Update D N T Otl I Contact Information ame, I e Ph E " I one, mal SY8tem Owner Carla J. Drake, Manager (208) 526-0841 Systems Approach

24

Realities of Chiller Plant Operation: Utility Impacts on Owner Operating  

NLE Websites -- All DOE Office Websites (Extended Search)

Realities of Chiller Plant Operation: Utility Impacts on Owner Operating Realities of Chiller Plant Operation: Utility Impacts on Owner Operating Costs and Societal Environmental Issues Speaker(s): Don Aumann Date: March 21, 2000 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Satkartar K. Kinney Don Aumann, a Senior Consultant from BKi in Oakland, will present an overview of two projects he completed for the electric utility industry. The first, a case study evaluation of a hybrid chiller plant in Jefferson City, Missouri, demonstrates the importance of carefully evaluating the impact of utility rate structures on plant operating costs. The building owner, another engineering consultant, and the local utility representatives were confused by the rates and missed an opportunity to cut chiller-plant operating costs by about 20%, totaling $15,000 per year. In

25

Department of Energy Idaho - Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Web Policies No Fear Act Site Map Privacy Phone Book You are here: DOE-ID Home > Privacy Privacy General Disclaimer This system is made available by an agency of the United States...

26

Buildings Performance Database Helps Building Owners, Investors...  

NLE Websites -- All DOE Office Websites (Extended Search)

Buildings Performance Database Helps Building Owners, Investors Evaluate Energy Efficient Buildings Buildings Performance Database June 2013 A new database of building features and...

27

Understanding privacy policies  

Science Conference Proceedings (OSTI)

Their is growing recognition that users of web-based systems want to understand, if not control, what customer's data is stored by whom, for what purpose, for what duration, and with whom it is shared. We inform current language-based privacy efforts ... Keywords: Clone detection, Domain-specific languages, Empirical study, Language understanding, Language usage, P3P, Policy compliance, Policy enforcement, Privacy, Privacy policies, Software language engineering, Software linguistics, Software metrics, Web-based systems

Ralf Lämmel; Ekaterina Pek

2013-04-01T23:59:59.000Z

28

WIPP Privacy Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

WIPP Privacy Policy and Disclaimers NOTICE: The Waste Isolation Pilot Plant (WIPP) Internet Server is provided as a service of the Department of Energy (DOE) for distribution of...

29

Property:Owners | Open Energy Information  

Open Energy Info (EERE)

Owners Owners Jump to: navigation, search Property Name Owners Property Type Page Description A unique list of owners of all power plants in the area. Automatically populated using ask query on Property: Owner of Category: Energy Generation Facility with property InGeothermalResourceArea set to the the variable vName of the Geothermal Resource Area Subproperties This property has the following 301 subproperties: A Abraham Hot Springs Geothermal Area Adak Geothermal Area Akun Strait Geothermal Area Akutan Fumaroles Geothermal Area Alum Geothermal Area Alvord Hot Springs Geothermal Area Arrowhead Hot Springs Geothermal Area Ashton Warm Springs Geothermal Area Astor Pass Geothermal Area Augusta Mountains Geothermal Area B Bailey Bay Hot Springs Geothermal Area Baker Hot Spring Geothermal Area

30

Relations among privacy notions  

Science Conference Proceedings (OSTI)

This article presents a hierarchy of privacy notions that covers multiple anonymity and unlinkability variants. The underlying definitions, which are based on the idea of indistinguishability between two worlds, provide new insights into the relation ... Keywords: Adversarial model, anonymity, privacy notions, unlinkability

Jens-Matthias Bohli; Andreas Pashalidis

2011-05-01T23:59:59.000Z

31

Privacy in (mobile) Telecommunications Services  

Science Conference Proceedings (OSTI)

Telecommunications services are for long subject to privacy regulations. At stake are traditionally: privacy of the communication and the protection of traffic data. Privacy of the communication is legally founded. Traffic data subsume under the notion ... Keywords: data protection, ethics, location data, privacy, telecommunications, traffic data

Jacques Penders

2004-12-01T23:59:59.000Z

32

Privacy-Preserving Friends Troubleshooting Network  

E-Print Network (OSTI)

Abstract — Content sharing is a popular use of peer-to-peer systems because of their inherent scalability and low cost of maintenance. In this paper, we leverage this nature of peer-topeer systems to tackle a new problem: automatic misconfiguration troubleshooting. In this setting, machine configurations from peers are shared to diagnose misconfigurations on a sick machine. The key challenges are preserving privacy of individual configuration data and ensuring the integrity of peer contributions. To this end, we construct the Friends Troubleshooting Network (FTN), a peer-to-peer overlay network, where the links between peer machines reflect the friendship of their owners. Our FTN manifests recursive trust rather than transitive trust. To achieve privacy, we use the general scheme of a historyless and futureless random-walk for routing, during which search is carried out simultaneously with secure parameter aggregation for the purpose of troubleshooting. Our design has been guided by the characteristics of a real-world friends network, the MSN Instant Messenger (IM) network. We have prototyped our FTN system and analyzed the tradeoff between privacy and protocol efficiency. I.

Qiang Huang; Helen J. Wang; Nikita Borisov

2005-01-01T23:59:59.000Z

33

Definition: Generator Owner | Open Energy Information  

Open Energy Info (EERE)

Generator Owner Entity that owns and maintains generating units.1 References Glossary of Terms Used in Reliability Standards An LikeLike UnlikeLike You like this.Sign Up...

34

JOBAID-ORGANZIATION OWNER OVERVIEW | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OWNER OVERVIEW JOBAID-ORGANZIATION OWNER OVERVIEW The purpose of this job aid is to guide organization owners through the step-by-step process of available features within...

35

Business Owners: Respond to an Energy Emergency | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Respond to an Energy Emergency Respond to an Energy Emergency Business Owners: Respond to an Energy Emergency Business Owners: Respond to an Energy Emergency Ensure your building is safe to occupy-Initially allow only essential, critical-operations staff into restricted areas. Ask your local or State health department for guidance on determining the safety of your building. Decide whether to activate backup power-If your backup generator doesn't automatically turn on during a power outage, you'll have to determine when to activate backup systems. First determine whether power is likely to be restored within 24 hours. If not, you may want to activate those systems to protect your business assets. Learn more Contact your fuel supplier-If you rely on fuel supplies for your business, vehicles, generators, and other equipment, contact your fuel

36

Business Owners: Prepare for Fuel Shortages | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fuel Shortages Fuel Shortages Business Owners: Prepare for Fuel Shortages Business Owners: Prepare for Fuel Shortages You may need fuel for vehicles, generators, and other equipment to continue operating your business during an emergency. During a shortage, local authorities and fuel suppliers will prioritize getting fuel to key assets such as emergency operations centers, hospitals, food supply dealers, water supply plants, and telecommunication networks. Plan ahead to help make sure you have adequate supplies. Review your fuel supply contracts-Arrange priority contacts with fuel suppliers, including an out-of-region supplier, and include language for providing fuel supplies during an emergency. Can your fuel suppliers operate with no power? Do they have gravity-fed systems? What if your fuel

37

NETL: Privacy Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy Policy Privacy Policy Privacy Policy National Energy Technology Laboratory strives to protect the privacy of website visitors. Information collected is strictly limited to the following: Information Collected and Stored Automatically The IP address, a number that is automatically assigned to each computer that connects to the World Wide Web; Date and time of website access; Pages browsed. NETL reviews this information in an effort to make the website more useful and informative. This information is used solely as a source of anonymous statistical information; NETL does not track or record information about individuals or their visits. This information is NOT shared with anyone beyond NETL website home page staff, except when required by law enforcement investigation.

38

PRIVACY IMPACT ASSESSMENT: Office  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Office Office of Workforce Development for Teachers and Scientists Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextineword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element & Site August 1, 2009 U.S. Department of Energy; Office of Science; Office of Workforce Development for Teachers and Scientists (WDTS) System location - Pacific Northwest National Laboratory, Richland, WA Name of Information iPASS System for DOE Office of Science laboratory fellowship programs, including

39

Privacy | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

issues. The Program is based on the Privacy Act of 1974, as implemented by Office of Management and Budget Circular A-130, the E-Government Act of 2002, and Departmental policies....

40

PRIVACY IMPACT ASSESSMENT: Office  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Office Office of Information Resources - FOIAXpress Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetext/neword/206/02061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Depamnf!l1tal Elel1l~nt&$ite july 23, 2009 Office of Information Resources Office of Management DOE Headquarters, Germantown, Germantown Computer Center Server Room Nameonl1fol'l11i1tion Sysleijlprl'f 'Project FOIAXpress ExhibitProj~tUID TBD NeWPIA ~ Update D Please indicate whether this is a new

Note: This page contains sample records for the topic "owner local privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Energy Efficiency: Helping Home Owners and Businesses Understand...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Efficiency: Helping Home Owners and Businesses Understand Energy Usage Energy Efficiency: Helping Home Owners and Businesses Understand Energy Usage November 7, 2013 - 3:55pm...

42

Letter of Intent: Commercial Real Estate Developer/Owner | ENERGY STAR  

NLE Websites -- All DOE Office Websites (Extended Search)

Letter of Intent: Commercial Real Estate Developer/Owner Letter of Intent: Commercial Real Estate Developer/Owner Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and managers Existing buildings Commercial new construction Industrial energy management Small business Service providers Service and product providers Verify applications for ENERGY STAR certification Design commercial buildings Energy efficiency program administrators Commercial and industrial program sponsors Associations State and local governments Federal agencies Tools and resources Training In This Section Campaigns Commercial building design Communications resources Energy management guidance Financial resources Portfolio Manager Products and purchasing Recognition Research and reports Service and product provider (SPP) resources

43

Privacy Policy | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy Policy Data.gov is committed to protecting the privacy and security of visitors to this website. Data.gov does not collect personal information when you visit our website...

44

The Privacy Act of 1974  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Privacy Act of 1974 Privacy Act of 1974 The Privacy Act of 1974, 5 U.S.C. §552a, governs an agency's collection, storage, and use of information about an individual. The Privacy Act protects the privacy of individuals by establishing fair information practices for the collection, maintenance, use, and dissemination of information by federal agencies. Frequently Asked Questions Who is an individual for the purposes of the Privacy Act? A (living) citizen of the United States or an alien lawfully admitted for permanent legal residence.  Deceased individuals are not covered by the Privacy Act, and their executors or next-of- kin can not pursue a Privacy Act claim on their behalf.

45

DOE Privacy Steering Committee Charter  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Privacy Steering Committee Charter Privacy Steering Committee Charter A. OBJECTIVE The purpose of the Department of Energy (DOE) Privacy Steering Committee (EPSC) is to advise the Senior Agency Official for Privacy (SAOP) and the Department's Privacy Program, providing recommendations to improve policies and program initiatives including breach response and notification, Privacy Impact Assessments, and other privacy matters. The EPSC is an essential component of DOE's ongoing efforts to identify processes to eliminate the unnecessary use of SSNs, and to safeguard Personally Identifiable Information (PII) while mitigating risks where the use of SSNs is authorized by a law, regulation or DOE Directive to fulfill a mission of the Department. B. AUTHORITY The EPSC is established at the direction of the Senior Agency Official for Privacy (SAOP).

46

A comparison of noxious facilities` impacts for home owners versus renters  

Science Conference Proceedings (OSTI)

The siting of noxious facilities, such as hazardous waste facilities, is often vigorously opposed by local residents, and thus it is now common for local residents to be compensated for the presence of the facility. One technique that has been employed to implicitly value noxious facilities is the intercity hedonic approach, which examines the wage and land rent premia between cities that result from the presence of the facility. However, most of the focus has been on the behavior of home owners as opposed to renters. Since these two groups of residents vary on numerous dimensions such as marital status, age, sex, and personal mobility, it would not be surprising to find different marginal valuations of local site characteristics. The authors use 1980 Census data to derive separate estimates for owners and renters of the implicit value placed on eight different types of noxious facilities. They find that renters and owners differ in their response to noxious facilities, although the differences are not systematic. Furthermore, the differences between owners and renters are not primarily due to differential mobility or socio-demographic factors. Controlling those factors decreases the differences between renters` and owners` implicit valuations of noxious facilities by less than 10%. Unmeasured differences between the two groups, such as tastes, risk aversion, or commitment to the community, must account for the remaining difference in valuations. These findings suggest that policymakers should separately consider the responses of owners and renters when estimating noxious facility impacts.

Clark, D.E. [Marquette Univ., Milwaukee, WI (United States). Dept. of Economics]|[Argonne National Lab., IL (United States); Nieves, L.A. [Argonne National Lab., IL (United States)

1995-01-01T23:59:59.000Z

47

Facebook: Threats to Privacy  

E-Print Network (OSTI)

End-users share a wide variety of information on Facebook, but a discussion of the privacy implications of doing so has yet to emerge. We examined how Facebook affects privacy, and found serious flaws in the system. Privacy on Facebook is undermined by three principal factors: users disclose too much, Facebook does not take adequate steps to protect user privacy, and third parties are actively seeking out end-user information using Facebook. We based our end-user findings on a survey of MIT students and statistical analysis of Facebook data from MIT, Harvard, NYU, and the University of Oklahoma. We analyzed the Facebook system in terms of Fair Information Practices as recommended by the Federal Trade Commission. In light of the information available and the system that protects it, we used a threat model to analyze specific privacy risks. Specifically, university administrators are using Facebook for disciplinary purposes, firms are using it for marketing purposes, and intruders are exploiting security holes. For each threat, we analyze the efficacy of the current protection, and where solutions are inadequate, we make recommendations on how to address the issue.

Harvey Jones; José Hiram Soltren

2005-01-01T23:59:59.000Z

48

Privacy is a process, not a PET: a theory for effective privacy practice  

Science Conference Proceedings (OSTI)

Privacy research has not helped practitioners -- who struggle to reconcile users' demands for information privacy with information security, legislation, information management and use -- to improve privacy practice. Beginning with the principle that ... Keywords: framework, privacy, security, trust

Anthony Morton; M. Angela Sasse

2012-09-01T23:59:59.000Z

49

Security and Privacy Notice  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

50

PNNL: Security & Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

51

FOIA/Privacy Act  

NLE Websites -- All DOE Office Websites (Extended Search)

Freedom of Information Act/Privacy Act Freedom of Information Act/Privacy Act The Oak Ridge Office of Chief Counsel is responsible for administering policies, programs, and procedures to ensure DOE compliance with the Freedom of Information Act (FOIA) and the Privacy Act (PA), 5 U.S.C. 552 and 5 U.S.C. 552a, respectively. DOE continuously gathers site specific information about its facilities and record repositories. Links to DOE sites and major contractors are found at Energy.gov. The resources on these pages are provided to aid in finding answers to your questions about programs of the Department of Energy and to obtain information that is publicly available without submitting a FOIA request. If the information is not available here or on another Department website, submit a Freedom of Information Act request electronically.

52

Danish Wind Turbine Owners Association | Open Energy Information  

Open Energy Info (EERE)

Owners Association Owners Association Jump to: navigation, search Name Danish Wind Turbine Owners' Association Place Aarhus C, Denmark Zip DK-8000 Sector Wind energy Product Danish Wind Turbine Ownersâ€(tm) Association is a non-profit, independent association overseeing wind turbine ownersâ€(tm) mutual interests regarding the authorities, political decision-makers, utilities and wind turbine manufacturers. References Danish Wind Turbine Owners' Association[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Danish Wind Turbine Owners' Association is a company located in Aarhus C, Denmark . References ↑ "Danish Wind Turbine Owners' Association" Retrieved from "http://en.openei.org/w/index.php?title=Danish_Wind_Turbine_Owners_Association&oldid=344068

53

Privacy/Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

54

Smart Meter Privacy: A Utility-Privacy Framework  

E-Print Network (OSTI)

End-user privacy in smart meter measurements is a well-known challenge in the smart grid. The solutions offered thus far have been tied to specific technologies such as batteries or assumptions on data usage. Existing solutions have also not quantified the loss of benefit (utility) that results from any such privacy-preserving approach. Using tools from information theory, a new framework is presented that abstracts both the privacy and the utility requirements of smart meter data. This leads to a novel privacy-utility tradeoff problem with minimal assumptions that is tractable. Specifically for a stationary Gaussian Markov model of the electricity load, it is shown that the optimal utility-and-privacy preserving solution requires filtering out frequency components that are low in power, and this approach appears to encompass most of the proposed privacy approaches.

Rajagopalan, S Raj; Mohajer, Soheil; Poor, H Vincent

2011-01-01T23:59:59.000Z

55

DOE Privacy Best Practices/ Enabling Technologies Subcommittee...  

NLE Websites -- All DOE Office Websites (Extended Search)

More Documents & Publications Energy Privacy Steering Committee 90-day Interim Report on Shale Gas Production - Secretary of Energy Advisory Board Elements of a Federal Privacy...

56

INTERNET PRIVACY, IG-0493 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

here Home INTERNET PRIVACY, IG-0493 INTERNET PRIVACY, IG-0493 Recently enacted appropriations law required agency Inspectors General to report within 60 days on the collection...

57

Enhancing Privacy in Participatory Sensing Applications with Multidimensional Data  

SciTech Connect

Participatory sensing applications rely on individuals to share local and personal data with others to produce aggregated models and knowledge. In this setting, privacy is an important consideration, and lack of privacy could discourage widespread adoption of many exciting applications. We present a privacy-preserving participatory sensing scheme for multidimensional data which uses negative surveys. Multidimensional data, such as vectors of attributes that include location and environment fields, pose a particular challenge for privacy protection and are common in participatory sensing applications. When reporting data in a negative survey, an individual participant randomly selects a value from the set complement of the sensed data value, once for each dimension, and returns the negative values to a central collection server. Using algorithms described in this paper, the server can reconstruct the probability density functions of the original distributions of sensed values, without knowing the participants actual data. As a consequence, complicated encryption and key management schemes are avoided, conserving energy. We study trade-offs between accuracy and privacy, and their relationships to the number of dimensions, categories, and participants. We introduce dimensional adjustment, a method that reduces the magnification of error associated with earlier work. Two simulation scenarios illustrate how the approach can protect the privacy of a participant's multidimensional data while allowing useful population information to be aggregated.

Groat, Michael [University of New Mexico, Albuquerque; Forrest, Stephanie [University of New Mexico, Albuquerque; Horey, James L [ORNL; Edwards, Benjamin [University of New Mexico, Albuquerque; He, Wenbo [University of Nebraska, Lincoln

2012-01-01T23:59:59.000Z

58

TO: FILE GiR FROM: SUBJECT: I OWNER(S) Past: Current:  

Office of Legacy Management (LM)

3 749 3 749 '*,. .,;L ----.-. _ 5' . iMEMORANDUM TO: FILE GiR FROM: , SUBJECT: I OWNER(S) ------__ Past: ------------------_----~ Current: Owner contacted q yes qnnc; ~~-~~~---------~~--_______ if yes, date contacted 1 ! I TYPE OF OPERATION --~_--___~---_--_ $ Research b Development a Facility Type 1 I 0 Production scale testing 0 Pilot Scale Bench Scale Process Theoretical 'Studies 0 Sample & Analysis G Production E Disposal/Storage 0 Research 0 Uther --------------T------ I T'/PE OF CONTRACT -----------_____ 0 Prime I2 C! Subcontractor Other information (i.e.:, cost q Purchase Order + fixed fee, unit Arice, time 84 material, etr) i ------- 'I ----------------------i__--_ Contract/Purchase Qrdei. W -----------I--k---j----- ~PJKJbL-I @J OWNERSHIP:

59

PRIVACY/SECURITY NOTICE  

NLE Websites -- All DOE Office Websites (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

60

PP-82-3 The Joint Owners of the Highgate Interconnection Facilities...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 The Joint Owners of the Highgate Interconnection Facilities PP-82-3 The Joint Owners of the Highgate Interconnection Facilities Presidential Permit authorizing The Joint Owners...

Note: This page contains sample records for the topic "owner local privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Integrating Security and Privacy Requirements into ...  

Science Conference Proceedings (OSTI)

... Page 4. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 4 Unconventional Threats Affecting Security and Privacy Connectivity ...

2011-11-15T23:59:59.000Z

62

Managing Security and Privacy Risk in Healthcare ...  

Science Conference Proceedings (OSTI)

... Page 4. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 4 Unconventional Threats Affecting Security and Privacy Connectivity ...

2012-06-05T23:59:59.000Z

63

Information fusion in data privacy: A survey  

Science Conference Proceedings (OSTI)

In this paper, we review the role of information fusion in data privacy. To that end, we introduce data privacy, and describe how information and data fusion are used in some fields of data privacy. Our study is focused on the use of aggregation for ... Keywords: Data privacy, Information fusion, Microaggregation, Record linkage

Guillermo Navarro-Arribas; Vicenç Torra

2012-10-01T23:59:59.000Z

64

Property:Owner | Open Energy Information  

Open Energy Info (EERE)

property of type Page. property of type Page. Subproperties This property has the following 1 subproperty: G GRR/Section 4-FD-a - Exploration Permit BLM Pages using the property "Owner" Showing 25 pages using this property. (previous 25) (next 25) A AB Tehachapi Wind Farm + Coram Energy + AFCEE MMR Turbines + AFCEE + AG Land 1 + AG Land Energy LLC + AG Land 2 + AG Land Energy LLC + AG Land 3 + AG Land Energy LLC + AG Land 4 + AG Land Energy LLC + AG Land 5 + AG Land Energy LLC + AG Land 6 + AG Land Energy LLC + AVTEC + AVTEC + Aberdeen Biomass Facility + Sierra Pacific Industries + Adair Wind Farm I + Shafer Systems + Adair Wind Farm II + MidAmerican Energy + Aero Turbine + AeroTurbine Energy Company + Aeroman Repower Wind Farm + Coram Energy + Affinity Wind Farm + Affinity Wind LLC +

65

Step 8: Work with the building owner to complete the ENERGY STAR lifecycle  

NLE Websites -- All DOE Office Websites (Extended Search)

8: Work with the building owner to complete the ENERGY STAR 8: Work with the building owner to complete the ENERGY STAR lifecycle Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and managers Existing buildings Commercial new construction Industrial energy management Small business Service providers Service and product providers Verify applications for ENERGY STAR certification Design commercial buildings Energy efficiency program administrators Commercial and industrial program sponsors Associations State and local governments Federal agencies Tools and resources Training In this section Why you should design to earn the ENERGY STAR Follow EPA's step-by-step process Step 1: Assemble a team Step 2: Set an energy performance target Step 3: Evaluate your target using ENERGY STAR tools Step 4: Design to be energy efficient

66

Secretaries Chu and Donovan to Host Conference Call on Home Owners  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Donovan to Host Conference Call on Home Owners Donovan to Host Conference Call on Home Owners Energy-Saving Improvements Program Secretaries Chu and Donovan to Host Conference Call on Home Owners Energy-Saving Improvements Program April 20, 2011 - 12:00am Addthis WASHINGTON - Thursday, April 21st, U.S. Department of Energy Secretary Steven Chu and U.S. Housing and Urban Development Secretary Shaun Donovan will launch a new pilot program intended to offer homeowners low-cost financing to help make their homes more energy efficient. The Federal Housing Administration's (FHA) new PowerSaver Program will offer homeowners up to $25,000 to finance the installation of insulation, duct sealing, replacement doors and windows, HVAC systems, water heaters, solar panels, and geothermal systems. Donovan and Chu will speak with reporters following a tour of a local

67

Community Resilience: Workshops on Private Sector and Property Owner Requirements for Recovery and Restoration from a Diasaster  

SciTech Connect

This report summarizes the results of a proejct sponsored by DTRA to 1) Assess the readiness of private-sector businesses, building owners, and service providers to restore property and recover operations in the aftermath of a wide-area dispersal of anthrax; and 2) Understand what private property owners and businesses "want and need" from federal, state, and local government to support recovery and restoration from such an incident.

Judd, Kathleen S.; Stein, Steven L.; Lesperance, Ann M.

2008-12-22T23:59:59.000Z

68

A comparison of noxious facilities` impacts for home owners versus renters  

SciTech Connect

The siting of noxious facilities, such as hazardous waste facilities, is often vigorously opposed by local residents. As a result, one would expect people`s residential and employment choices to reflect a desire to avoid proximity to such facilities. Ibis behavior would in turn affect labor and housing prices. One technique that has been employed to implicitly value impacts of noxious facilities is the intercity hedonic approach, which examines the wage and land rent differentials among cities that result from environmental amenities and disamenities. However, most of the research focus has been on the behavioral response of home owners as opposed to renters. Since these two groups of residents vary on numerous dimensions such as marital status, age, sex, and personal mobility, it would not be surprising to find different marginal valuations of local site characteristics. We use 1980 Census data to derive separate estimates for owners and renters of the implicit value placed on eight different types of noxious facilities. Although the magnitude of the responses of renters and owners to noxious facilities and other environmental characteristics varies, the signs are generally consistent. The differences in values between owners and renters are not primarily due to differential mobility or sociodemographic factors. Controlling those factors decreases the differences between renters` and owners` implicit valuations by less than 10%. Unmeasured differences in characteristics between the two groups, such as tastes, risk aversion, or commitment to the community, must account for the remaining difference in valuations. These findings suggest that policymakers should separately consider the responses of owners and renters when estimating noxious facility impacts.

Clark, D.E. [Marquette Univ., Milwaukee, WI (United States). Dept. of Economics]|[Argonne National Lab., IL (United States); Nieves, L.A. [Argonne National Lab., IL (United States)

1996-09-01T23:59:59.000Z

69

"A Regulator's Privacy Guide to Third-Party Data Access for Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

"A Regulator's Privacy Guide to Third-Party Data Access for Energy "A Regulator's Privacy Guide to Third-Party Data Access for Energy Efficiency" Now Available "A Regulator's Privacy Guide to Third-Party Data Access for Energy Efficiency" Now Available January 4, 2013 - 9:32am Addthis The State and Local Energy Efficiency Action Network's (SEE Action) Customer Information and Behavior Working Group has released "A Regulator's Privacy Guide to Third-Party Data Access for Energy Efficiency." Funded by the Office of Electricity Delivery and Energy Reliability, the guide summarizes the range of approaches taken by states on privacy and security issues related to third-party access to customer data gathered under electric and gas ratepayer-funded energy efficiency programs and through mechanisms such as advanced metering infrastructure.

70

"A Regulator's Privacy Guide to Third-Party Data Access for Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

"A Regulator's Privacy Guide to Third-Party Data Access for Energy "A Regulator's Privacy Guide to Third-Party Data Access for Energy Efficiency" Now Available "A Regulator's Privacy Guide to Third-Party Data Access for Energy Efficiency" Now Available January 4, 2013 - 9:32am Addthis The State and Local Energy Efficiency Action Network's (SEE Action) Customer Information and Behavior Working Group has released "A Regulator's Privacy Guide to Third-Party Data Access for Energy Efficiency." Funded by the Office of Electricity Delivery and Energy Reliability, the guide summarizes the range of approaches taken by states on privacy and security issues related to third-party access to customer data gathered under electric and gas ratepayer-funded energy efficiency programs and through mechanisms such as advanced metering infrastructure.

71

Rights and Duties of Mines and Mine Owners, General (Missouri)  

Energy.gov (U.S. Department of Energy (DOE))

This legislation addresses general operational guidelines for mine owners regarding public notices, fees, land and mineral ownership, requirements for mining in certain municipalities, and mining...

72

DOE O 206.1, Department of Energy Privacy Program  

Directives, Delegations, and Requirements

The order establishes Departmental implementation of agency statutory and regulatory requirements for privacy, specifically those provided in the Privacy Act ...

2009-01-16T23:59:59.000Z

73

Privacy-enhanced web personalization  

Science Conference Proceedings (OSTI)

Consumer studies demonstrate that online users value personalized content. At the same time, providing personalization on websites seems quite profitable for web vendors. This win-win situation is however marred by privacy concerns since personalizing ...

Alfred Kobsa

2007-01-01T23:59:59.000Z

74

Visiting With Santa Fe Small Business Owners | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Visiting With Santa Fe Small Business Owners Visiting With Santa Fe Small Business Owners Visiting With Santa Fe Small Business Owners May 10, 2012 - 9:02am Addthis Dot Harris Dot Harris The Honorable Dot Harris, Director, Office of Economic Impact and Diversity You've got to do your homework in order to contract with the federal government. Whether you are a large or small business owner, learning the ins and outs of government contracting takes dedication, perseverance, and taking advantage of opportunities to meet face-to-face with procurement experts and other businesses. That's where our Small Business Roundtables, Business Opportunity Sessions, conference booths, and Regional Small Business Summits come in. We want to meet directly with small business owners, managers, and staffers, to hear what you need to learn from us to make the contracting

75

Tips for Renters and Property Owners | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Tips for Renters and Property Owners Tips for Renters and Property Owners Tips for Renters and Property Owners July 5, 2012 - 4:51pm Addthis Tips for Renters and Property Owners If you rent, or if you own a rental unit, you can use many of the tips throughout this guide to save money and energy. Renters You can reduce your utility bills by following the tips in these sections: Lighting Heating and Cooling (if you control the thermostat) Appliances Home Office and Home Electronics Windows Transportation Encourage your landlord to follow these tips as well. They'll save energy and money, improving your comfort and lowering your utility bills even more. Property Owners Nearly all of the information in this guide applies to rental units. The section on Your Home's Energy Use focuses on air leaks, insulation, heating

76

OpenTag: Privacy protection for RFID  

E-Print Network (OSTI)

Radio frequency identification's use in retail is good for pervasive computing, but raises considerable privacy issues. OpenTag programmable tags address privacy issues while remaining fully compatible with the supply-chain ...

Holtzman, Henry N.

77

Privacy: is there an app for that?  

Science Conference Proceedings (OSTI)

Users of social networking sites (SNSs) increasingly must learn to negotiate privacy online with multiple service providers. Facebook's third-party applications (apps) add an additional layer of complexity and confusion for users seeking to understand ... Keywords: Facebook, adverse privacy events, privacy, social networking applications

Jennifer King; Airi Lampinen; Alex Smolen

2011-07-01T23:59:59.000Z

78

Microsoft Word - 2.9 Chemical Owners 0913.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

Chemical Owners Chemical Owners AFRD Line Management personnel who authorize the use of chemicals in their group's work retain responsibility for ensuring that the chemicals are properly inventoried, labeled, stored, used, and disposed. They may choose to remain Chemical Owners as described in the LBNL Chemical Hygiene and Safety Plan and manage the chemicals themselves, or delegate chemical management tasks to appropriately trained AFRD or matrixed personnel who have knowledge of the chemicals' hazards, controls, and procedures for using and storing them safely. The chemical inventory for each AFRD work area must be maintained on the Chemical Management System. When chemical management tasks are delegated, the AFRD Line Management personnel must also

79

DOE Privacy Steering Committee Meeting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EPSC Subcommittees EPSC Subcommittees EPSC Subcommittees EPSC Subcommittees April 23, 2009 April 23, 2009 Subcommittee Charge/Outcomes Members Chairs* Best Practices/ Enabling Technologies Subcommittee Charge of the Subcommittee The Best Practices/ Enabling Technologies Subcommittee will serve as a forum for the development and promotion of Privacy best practices, as well as for the review of available technologies that support and enable the mission of Privacy. Best practices may be drawn from the public and private sectors. Technology solutions may include consideration of enterprise licensing agreements, and experience of other Federal agencies. Best Practices and Technology will assess agency and industry solutions to develop implementation and performance measurement benchmarks.

80

Privacy Impact Assessment | OSTI, US Dept of Energy, Office of Scientific  

Office of Scientific and Technical Information (OSTI)

Privacy Impact Assessment Privacy Impact Assessment Name of Project: Web Domains Maintained by the Office of Scientific and Technical Information (OSTI) Bureau: U.S. Department of Energy, Office of Science Project's Unique ID: N/A Contact Information: [Mailing address for 1 through 5 below is: DOE Office of Scientific and Technical Information, P.O. Box 62, Oak Ridge, TN 37831.] Who is the person completing this document? (Name, title, organization, and contact information.) Valerie S. Allen, Technical Information Specialist allenv@osti.gov, Telephone 865-576-3469 Who is the system owner? (Name, organization, and contact information.) Judy C. Gilmore, OSTI Acting Assistant Director for Program Integration gilmorej@osti.gov, Telephone 865-576-5600 Who is the system manager for this system or application? (Name,

Note: This page contains sample records for the topic "owner local privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Best Practices: Elements of a Federal Privacy Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Best Practices: Best Practices: Elements of a Federal Privacy Program Version 1.0 Sponsored By: Federal CIO Council Privacy Committee June 2010 Best Practices: Elements of a Federal Privacy Program June 2010 Page i Contents Acknowledgements __________________________________________________________________ ii Purpose ____________________________________________________________________________ 1 Introduction: Privacy Stewardship and Governance _________________________________________ 3 Element 1 -Leadership ________________________________________________________________ 6 Element 2 - Privacy Risk Management and Compliance Documentation _________________________ 9 Element 3 - Information Security _______________________________________________________ 14

82

An online experiment of privacy authorization dialogues for social applications  

Science Conference Proceedings (OSTI)

Several studies have documented the constantly evolving privacy practices of social networking sites and users' misunderstandings about them. Researchers have criticized the interfaces to "configure" privacy preferences as opaque, uninformative, and ... Keywords: information privacy, online social networks (osns), privacy awareness and control, privacy notice and consent, third-party applications (apps)

Na Wang; Jens Grossklags; Heng Xu

2013-02-01T23:59:59.000Z

83

Secretaries Chu and Donovan to Host Conference Call on Home Owners...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Donovan to Host Conference Call on Home Owners Energy-Saving Improvements Program Secretaries Chu and Donovan to Host Conference Call on Home Owners Energy-Saving Improvements...

84

In Pursuit of Privacy on a Public Internet  

E-Print Network (OSTI)

In Pursuit of Privacy on a Public Internet by Marc MendoncaUser privacy on the Internet has been an increasing concernof Privacy on a Public Internet A thesis submitted in

Mendonca, Marc

2012-01-01T23:59:59.000Z

85

Business Owners: Prepare a Business Recovery Plan | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

a Business Recovery Plan a Business Recovery Plan Business Owners: Prepare a Business Recovery Plan Business Owners: Prepare a Business Recovery Plan Smart business owners develop and test a written business recovery plan to support them through disasters and help them stay in operation. Planning ahead will help your company get back to business more quickly. Consider your risks-How might a disaster affect your business operations? What natural disasters are most likely where you operate? Identify your critical business functions-What resources and personnel will you need to restore or reproduce these functions during a recovery? Assign disaster response duties to your employees. Identify critical suppliers-Identify suppliers, providers, shippers, resources, and other businesses you typically interact with and

86

Energy Efficiency: Helping Home Owners and Businesses Understand Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Efficiency: Helping Home Owners and Businesses Understand Efficiency: Helping Home Owners and Businesses Understand Energy Usage Energy Efficiency: Helping Home Owners and Businesses Understand Energy Usage November 7, 2013 - 3:55pm Addthis Building 90, an 89,000-square foot office building at Berkeley Lab, served as the commercial setting for the miscellaneous and electronic loads (MELs) study. 460 meters were placed throughout the building to serve as a representative sample of a wide range of device types. | Photo courtesy of Berkeley Lab. Building 90, an 89,000-square foot office building at Berkeley Lab, served as the commercial setting for the miscellaneous and electronic loads (MELs) study. 460 meters were placed throughout the building to serve as a representative sample of a wide range of device types. | Photo courtesy of

87

Public Roundtable- Data Access and Privacy Issues Related to...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Transcript of...

88

Freedom of Information Act (FOIA) and Privacy Act Requests |...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Freedom of Information Act (FOIA) and Privacy Act Requests Freedom of Information Act (FOIA) and Privacy Act Requests Calibration Facilities Ecosystem Management Team Environmental...

89

Public Roundtable- Data Access and Privacy Issues Related to...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Transcript...

90

texas well owner network More than a million private water  

E-Print Network (OSTI)

texas well owner network More than a million private water wells in Texas provide water to citi and are at a greater risk for exposure to compromised water quality. The Texas Water Resources Institute along with the Texas AgriLife Extension Service's Department of Soil and Crop Sciences and Department of Biological

91

Maintainability Implemented by Third-Party Contractor for Public Owner  

E-Print Network (OSTI)

is implementation of a computerized maintenance management system CMMS . The CMMS is a tool used to establish maintenance strategy for systems Construction manager · Conduct construction practices that do not alter by NASA, the owner. The policy directive endorses a maintenance management pro- gram capable of developing

Sheridan, Jennifer

92

Privacy in mobile technology for personal healthcare  

Science Conference Proceedings (OSTI)

Information technology can improve the quality, efficiency, and cost of healthcare. In this survey, we examine the privacy requirements of mobile computing technologies that have the potential to transform healthcare. Such mHealth technology enables ... Keywords: HIPAA, Privacy framework, e-health, electronic health record, home healthcare, mHealth, medicine, mobile healthcare, personal health record

Sasikanth Avancha; Amit Baxi; David Kotz

2012-11-01T23:59:59.000Z

93

Protecting consumer privacy from electric load monitoring  

Science Conference Proceedings (OSTI)

The smart grid introduces concerns for the loss of consumer privacy; recently deployed smart meters retain and distribute highly accurate profiles of home energy use. These profiles can be mined by Non Intrusive Load Monitors (NILMs) to expose much of ... Keywords: load monitor, privacy, smart meter

Stephen McLaughlin; Patrick McDaniel; William Aiello

2011-10-01T23:59:59.000Z

94

POPCORN: privacy-preserving charging for emobility  

Science Conference Proceedings (OSTI)

Upcoming years will see a massive deployment of electric vehicles and, combined with this, of charging infrastructure. This will require protocols and standards that will control authentication, authorization, and billing of electric-vehicle charging. ... Keywords: electric vehicle charging, iso/iec 15118, privacy, privacy enhancing technologies, security

Christina Höfer, Jonathan Petit, Robert Schmidt, Frank Kargl

2013-11-01T23:59:59.000Z

95

Employing PRBAC for privacy preserving data publishing  

Science Conference Proceedings (OSTI)

Issues about privacy-preserving data mining have emerged globally, but still the main problem is that non-sensitive information or unclassified data, one is able to infer sensitive information that is not supposed to be disclosed. Based on our previous ... Keywords: access control, data mining, data publishing, privacy

Anour F. A. Dafa-Alla; Gyoyong Sohn; Keun Ho Ryu

2009-11-01T23:59:59.000Z

96

Towards the development of privacy-aware systems  

Science Conference Proceedings (OSTI)

Privacy and data protection are pivotal issues in nowadays society. They concern the right to prevent the dissemination of sensitive or confidential information of individuals. Many studies have been proposed on this topic from various perspectives, ... Keywords: Privacy policy, Privacy-Aware Access Control, Privacy-related legal requirements, Requirements Engineering

Paolo Guarda; Nicola Zannone

2009-02-01T23:59:59.000Z

97

A privacy expectations and security assurance offer system  

Science Conference Proceedings (OSTI)

Consumers accessing web sites for information or to purchase products face limited opportunity to express their privacy preferences, and even less recourse if security violations lead to inadvertent disclosure of privacy sensitive information. A privacy ... Keywords: e-commerce, incentives, insurance, privacy

Jeffrey Hunker

2008-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "owner local privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Privacy | Department of Energy  

Office of Legacy Management (LM)

Search Search link to facebook link to twitter Email Signup Sign up for updates Go Search form Search Energy.gov Public Services Public Services Home Vehicles Vehicles Home Alternative Fuel Vehicles Batteries Biofuels Clean Cities Fuel Economy Hydrogen & Fuel Cells Manufacturing Energy Economy Energy Economy Home Funding Opportunities Prices & Trends State & Local Government Homes Homes Home Heating & Cooling Heating & Cooling Home Heat Pumps Home Cooling Home Heating Home Design & Remodeling Home Weatherization Home Weatherization Home Home Energy Audits Insulation Sealing Your Home Ventilation Landscaping Saving Electricity Saving Electricity Home Appliances & Electronics Buying and Making Electricity Lighting Water Heating Windows, Doors & Skylights Building Design

102

Business Owners: Prepare for Utility Disruptions | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

for Utility Disruptions for Utility Disruptions Business Owners: Prepare for Utility Disruptions Business Owners: Prepare for Utility Disruptions Have a plan in place in case a natural disaster or other hazard knocks out your business's electricity or natural gas service. Identify energy utilities-The utilities that are absolutely necessary to running your business. How might a disaster impact the availability of those utilities? Determine backup options-Contact your utility companies to discuss potential backup options, such as portable generators to provide power. Learn how and when to turn off utilities-For example, if you turn off your natural gas, a professional technician must turn it back on. Learn more Consider using backup generators-Generators can power the most important aspects of your business in an emergency. This will involve:

103

River resort owners find LPG a power behind their success  

SciTech Connect

This paper reports on a restaurant and resort which runs entirely on LPG. It has two generators converted to LPG that supply the power for the complex. Energy supplied from the propane is used in the kitchens, to drive the water pump and provide electricity for lighting and other power needs, and to heat the swimming pool. Far more importantly for the owners has been the fuel cost savings of at least 60%.

1991-01-01T23:59:59.000Z

104

NETL: Your Rights under the FOIA, the Privacy Act, and other Privacy Laws  

NLE Websites -- All DOE Office Websites (Extended Search)

FOIA/Privacy Act FOIA/Privacy Act Your Rights under the FOIA, the Privacy Act, and other Privacy Laws The Freedom of Information Act and Privacy Act Division/Office is responsible for administering policies, programs, and procedures to ensure DOE compliance with the Freedom of Information Act (FOIA) and the Privacy Act (PA), 5 U.S.C. 552 and 5 U.S.C. 552a, respectively. The resources on these pages are provided to aid in finding answers to your questions about programs of the Department of Energy and to obtain information that is publicly available without submitting a FOIA request. If the information is not available here, submit a Freedom of Information Act request electronically. To assist obtaining publicly available information, we suggest you first conduct a search on the specific topic or information you are seeking using

105

DOE NSTB Researchers Demonstrate R&D Successes to Asset Owners...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE NSTB Researchers Demonstrate R&D Successes to Asset Owners at EnergySec Conference DOE NSTB Researchers Demonstrate R&D Successes to Asset Owners at EnergySec Conference...

106

PRIVACY IMPACT ASSESSMENT: Integrated Safety Management Workshop  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Integrated Integrated Safety Management Workshop Registration PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element&·Slte 16/Jun/09 Idaho National Laboratory Engineering Research Office Building (EROB) Name of-Information System or IT Project Integrated Safety Management Workshop Registration Exhibit Project UID 207765 NewPIA D Update 0 DOE PIA - ISMS Workshop Finallxw.doc N T "tl I

107

PRIVACY IMPACT ASSESSMENT: Human Resources Personal Information  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Human Human Resources - Personal Information Change Request PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetext/neword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element & Site Idaho National Engineering Laboratory Engineering Research Office Building (EROB) Name of Information Human Resources - Personal Information Change Request System or IT Project Business Enclave Exhibit Project UID 106800 NewPIA ~ Update D N T 'tl I Contact Information arne,

108

Privacy Act Statement | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Statement | National Nuclear Security Administration Statement | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Privacy Act Statement Home > About Us > Our Operations > NNSA Office of General Counsel > Privacy Act (PA) of 1974 > Privacy Act Statement Privacy Act Statement Agency forms used to collect personal information protected by the Act must

109

PRIVACY IMPACT ASSESSMENT: OCIO HSPD-12 Physical  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OCIO OCIO - HSPD-12 Physical and Logical System PIA Template Version 4- June, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element & Site August 27,2009 Office of the Chief Information Officer DOE Headquarters, Forrestal, 8H-065 Name of Information System or IT Project HSPD-12 Physical and Logical Access System Exhibit Project UID Project's Unique 10: 019-60-01-17-01-8062-04-404-140 (2010 UID) NewPIA D Update ~ HSPD-12

110

2013 Privacy Awareness Training | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

You are here You are here Home » 2013 Privacy Awareness Training 2013 Privacy Awareness Training October 11, 2013 5:00PM EDT Registration link: OLC Course type: Online Course Location: Online Course Description: This course is designed to address the importance of privacy, and to ensure that DOE employees are aware of the vital role they play in safeguarding privacy and protecting Personally Identifiable Information (PII). Audience: All Headquarters Federal and contractor employees and detailees with access to Federal information resources and all remote Federal and support services contractor employees provided access to the Federal Information Resources. This DOECAST does not apply to M&O contractors. M&O contractors should follow their respective guidelines for training.

111

A technology perspective on worldwide privacy regulations  

Science Conference Proceedings (OSTI)

In this paper we provide an overview of the worldwide privacy regulatory landscape from a technology perspective. We focus on data-centric definitions of personal information and then examine how these differ across different regulatory frameworks, such ...

D. A. Chapin; A. C. Nelson; B. S. Gerber

2009-03-01T23:59:59.000Z

112

PRIVACY IMPACT ASSESSMENT: INL Energy Employees' Occupational  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INL INL Energy Employees' Occupational Illness Compensation Program Act (EEOICPA) Tracking Database PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance Is provided In the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element &Site June 11, 2009 Idaho National Laboratory Building 616 Willow Creek Building Name of Information Energy Employees' Occupational Illness Compensation Program Act (EEOICPA) System or IT ProJect Tracking Database Exhibit Project

113

PRIVACY IMPACT ASSESSMENT: OCCUPATIONAL MEDICINE- INL OCCUPATIONAL  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OCCUPATIONAL OCCUPATIONAL MEDICINE- INL OCCUPATIONAL MEDICAL SUVEILLANCE SYSTEM (OMSS) PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Dllte DepartmentAll Element~&Slte 06-16-2009 Idaho National Laboratory Building Number: WCB Building Name: WCB Name of Information System!«)r IT Project Occupational Medical Surveillance System (OMSS) ExhlbllProJect UIO 72 NewPIA D Update 0 DOE PIA - OMSS Finallxw.doc

114

PRIVACY IMPACT ASSESSMENT: Occupational Safety Health Occupational  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Occupational Occupational Safety & Health - Occupational Injury & Illness System PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1 J Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date June 12, 2009 Departmental Idaho National Laboratory Element & Site Name of Infonnatlon Occupational Injury & Illness System (01&15) System or IT Project Exhibit Project UID 136 New PIA ~ Update D Name, Title Contact Information Phone, Email Anthony J. Kavran (208) 526-5826

115

Privacy Protection for Social Networking APIs  

E-Print Network (OSTI)

Social networking APIs integrate third-party content into the site and give third-party developers access to user data. These open interfaces enable popular site enhancements but pose serious privacy risks by exposing user data to third-party developers. We address the privacy risks associated with social networking APIs by presenting a privacy-by-proxy design for a privacypreserving API that is motivated by an analysis of the data needs and uses of Facebook applications. Our study of 150 popular Facebook applications reveals that nearly all applications could maintain their functionality using a limited interface that only provides access to an anonymized social graph and placeholders for user data. Since the platform host can control the third party applications ’ output, privacy-by-proxy can be accomplished without major changes to the platform architecture or applications by using new tags and data transformations.

Adrienne Felt; David Evans

2008-01-01T23:59:59.000Z

116

Microsoft Word - Privacy 0818.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Empowering Consumers ) DOE-HQ-2009-0003-0818 Empowering Consumers ) DOE-HQ-2009-0003-0818 And the Smart Grid: Data Access, Third Party ) (Noticed May 11, 2010) Use, and Privacy ) ) Comments of San Diego Gas & Electric Company San Diego Gas & Electric Company ("SDG&E") submits these comments in response to the above-enumerated Request for Information noticed by the Department on May 11, 2010. SDG&E is a regulated electric and gas utility operating pursuant to authorities granted to it by the Federal Energy Regulatory Commission and the State of California. SDG&E serves 3.4 million consumers in the San Diego and southern Orange County areas of California via 1.4 million electric meters and 830,000 gas meters. SDG&E's sister company, the Southern California Gas

117

Privacy Protection for Social Networking Platforms,” Web 2.0 Security and Privacy  

E-Print Network (OSTI)

Social networking platforms integrate third-party content into social networking sites and give third-party developers access to user data. These open interfaces enable popular site enhancements but pose serious privacy risks by exposing user data to third-party developers. We address the privacy risks associated with social networking APIs by presenting a privacy-by-proxy design for a privacy-preserving API. Our design is motivated by an analysis of the data needs and uses of Facebook applications. We studied 150 popular Facebook applications and found that nearly all applications could maintain their functionality using a limited interface that only provides access to an anonymized social graph and placeholders for user data. Since the platform host can control the third party applications’ output, privacy-by-proxy can be accomplished by using new tags and data transformations without major changes to either the platform architecture or applications.

Adrienne Felt; David Evans

2008-01-01T23:59:59.000Z

118

Which idling reduction system is most economical for truck owners?  

NLE Websites -- All DOE Office Websites (Extended Search)

Which idling reduction system is Which idling reduction system is most economical for truck owners? Linda Gaines Center for Transportation Research Argonne National Laboratory Commercial Vehicle Engineering Congress and Exposition Rosemont, Il October 7-9, 2008 The price of diesel is high *Idling a Class 8 truck uses 0.6-1.2 gallons per hour *That can total over $50 a night! *So even without regulations, there's an incentive to reduce idling *Even if the price goes down more, idling reduction makes sense 2 Why do sleepers idle overnight? For services to resting driver and friend y Heating, ventilation, and air conditioning (HVAC) y Power for appliances 8TV, microwave, refrigerator, computer, hair drier To keep fuel and engine warm To mask out noises and smells Because other drivers do it

119

Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule  

Science Conference Proceedings (OSTI)

Organizations collect personal information from individuals to carry out their business functions. Federal privacy regulations, such as the Health Insurance Portability and Accountability Act (HIPAA), mandate how this collected information can be shared ... Keywords: HIPAA, obligations, policy analysis, privacy policy

Omar Chowdhury; Andreas Gampe; Jianwei Niu; Jeffery von Ronne; Jared Bennatt; Anupam Datta; Limin Jia; William H. Winsborough

2013-06-01T23:59:59.000Z

120

Privacy Rights and Protection: Foreign Values in Modern Thai Context  

Science Conference Proceedings (OSTI)

The concept of privacy as a basic human right which has to be protected by law is a recently adopted concept in Thailand, as the protection of human rights was only legally recognized by the National Human Rights Act in 1999. Moreover, along with other ... Keywords: Buddhism, Thai culture, data protection, human rights, privacy protection, privacy rights, smart ID cards

Krisana Kitiyadisai

2005-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "owner local privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Keeping up appearances: understanding the dimensions of incidental information privacy  

Science Conference Proceedings (OSTI)

We conducted a survey of 155 participants to examine privacy concerns relating to the viewing of incidental information (i.e. traces of previous activity unrelated to the task at hand) in web browsers. We have identified several dimensions of privacy ... Keywords: collaboration, incidental information, privacy, survey, web browsing

Kirstie Hawkey; Kori M. Inkpen

2006-04-01T23:59:59.000Z

122

Efficient zero-knowledge identification schemes which respect privacy  

Science Conference Proceedings (OSTI)

At first glance, privacy and zero-knowledgeness seem to be similar properties. A scheme is private when no information is revealed on the prover and in a zero-knowledge scheme, communications should not leak provers' secrets. Until recently, privacy ... Keywords: identification, privacy, zero-knowledge

Julien Bringer; Hervé Chabanne; Thomas Icart

2009-03-01T23:59:59.000Z

123

SmokeScreen: flexible privacy controls for presence-sharing  

Science Conference Proceedings (OSTI)

Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both trusted social relations and untrusted strangers. In this paper, we present ... Keywords: location privacy, mobile computing, pervasive computing, presence-sharing, social networks

Landon P. Cox; Angela Dalton; Varun Marupadi

2007-06-01T23:59:59.000Z

124

Verification of data pattern for interactive privacy preservation model  

Science Conference Proceedings (OSTI)

The research problem of privacy-preserving data publishing is to release microdata in an aggregated form using distinguished techniques that will effectively conceal sensitive and private information but can be used by external users to exercise data ... Keywords: data mining, differential privacy, privacy preservation

Sujoy Ray; Mohammad Fahim Nizam; Swagata Das; Benjamin C. M. Fung

2011-03-01T23:59:59.000Z

125

Smart Meter Privacy: A Utility-Privacy Framework S. Raj Rajagopalan, Lalitha Sankar, Soheil Mohajer, H. Vincent Poor  

E-Print Network (OSTI)

Smart Meter Privacy: A Utility-Privacy Framework S. Raj Rajagopalan, Lalitha Sankar, Soheil Mohajer in smart meter measurements is a well-known challenge in the smart grid. The solutions offered thus far and the utility requirements of smart meter data. This leads to a novel privacy-utility tradeoff problem

Sankar, Lalitha

126

FOIA Reading Room - privacy act  

NLE Websites -- All DOE Office Websites (Extended Search)

Reading Room - pricacy act Reading Room - pricacy act CH Frequently Requested Documents Under FOIA Administrative Electronic FOIA Form Privacy Act Advisory (Microsoft Word(tm) document) DOE-CH Government Purchase Card Cardholders: December 2012 CH Organizational Chart: Current Version Policies and Procedures - Office of Science (including Chicago Office) Office of Hearings and Appeals Decisions Department of Justice Cases and Legal Documents Department of Energy Directives DOE Office of Inspector General Reports Responses Under FOIA FY10 Management and Operating Contracts "FY2012 Laboratory Performance Report Cards" The following management and operating prime contracts under the jurisdiction of DOE-CH have been renewed and posted for your convenience. Modifications that change, delete, or add language to any portion of these contracts (referred to as "M" Mods) will be posted as expeditiously as possible after execution. It is at the discretion of the Contractors whether or not they include modifications that change the amount obligated by the Government. Ames Laboratory - Contract No. No.DE-AC02-07CH11358

127

NETL: Contact Info and Privacy Act Advisory  

NLE Websites -- All DOE Office Websites (Extended Search)

Contact Info and Privacy Act Advisory To contact us: National Energy Technology Laboratory 626 Cochrans Mill Road P.O. Box 10940 Pittsburgh, PA 15236-0940 Phone: 412-386-6167 PRIVACY ACT ADVISORY: Authority: 5 U.S.C. 301, 5 U.S.C. 552, Freedom of Information Act (FOIA); and Title 10, Code of Federal Regulations, Part 1004. Purpose: To allow individuals to file electronic FOIA requests; to track all FOIA requests from receipt to response to compile statistics for the Annual FOIA Report; to research and respond to FOIA requests; to maintain case files to comply with records disposal requirements; and to maintain an administrative record to support any litigation. Routine Use: Records related to the FOIA request will be maintained in DOE-55 "Freedom of Information and Privacy Act (FOIA/PA) Requests for Records." A record

128

Discriminatory Lossy Source Coding: Side Information Privacy  

E-Print Network (OSTI)

A lossy source coding problem is studied in which a source encoder communicates with two decoders, one with and one without correlated side information with an additional constraint on the privacy of the side information at the uninformed decoder. Two cases of this problem arise depending on the availability of the side information at the encoder. The set of all feasible rate-distortion-equivocation tuples are characterized for both cases. The difference between the informed and uninformed cases and the advantages of encoder side information for enhancing privacy are highlighted for a binary symmetric source with erasure side information and Hamming distortion.

Tandon, Ravi; Poor, H Vincent

2011-01-01T23:59:59.000Z

129

Analyzing Facebook privacy settings: User expectations vs. reality  

E-Print Network (OSTI)

The sharing of personal data has emerged as a popular activity over online social networking sites like Facebook. As a result, the issue of online social network privacy has received significant attention in both the research literature and the mainstream media. Our overarching goal is to improve defaults and provide better tools for managing privacy, but we are limited by the fact that the full extent of the privacy problem remains unknown; there is little quantification of the incidence of incorrect privacy settings or the difficulty users face when managing their privacy. In this paper, we focus on measuring the disparity between the desired and actual privacy settings, quantifying the magnitude of the problem of managing privacy. We deploy a survey, implemented as a Facebook application, to 200 Facebook users recruited via Amazon Mechanical Turk. We find that 36 % of content remains shared with the default privacy settings. We also find that, overall, privacy settings match users ’ expectations only 37 % of the time, and when incorrect, almost always expose content to more users than expected. Finally, we explore how our results have potential to assist users in selecting appropriate privacy settings by examining the user-created friend lists. We find that these have significant correlation with the social network, suggesting that information from the social network may be helpful in implementing new tools for managing privacy.

Yabing Liu; Balachander Krishnamurthy; Krishna P. Gummadi

2011-01-01T23:59:59.000Z

130

Friends Only: Examining a Privacy-Enhancing Behavior in Facebook  

E-Print Network (OSTI)

Privacy practices in social network sites often appear paradoxical, as content-sharing behavior stands in conflict with the need to reduce disclosure-related harms. In this study we explore privacy in social network sites as a contextual information practice, managed by a process of boundary regulation. Drawing on a sample survey of undergraduate Facebook users, we examine a particular privacy-enhancing practice: having a friends-only Facebook profile. Particularly, we look at the association between network composition, expectancy violations, interpersonal privacy practices and having a friends-only profile. We find that expectancy violations by weak ties and increased levels of interpersonal privacy management are positively associated with having a friends-only profile. We conclude with a discussion of how these findings may be integrated into the design of systems to facilitate interaction while enhancing individual privacy. Author Keywords Social network sites, social networking, Facebook, privacy,

Fred Stutzman; Jacob Kramer-duffield

2010-01-01T23:59:59.000Z

131

PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

'" '" " * .1 * PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS HANDLING SYSTEM: FREEDOM OF INFORMAnON ACT/ PRIVACY ACT PIA Template Version - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/02061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Oeparbn~ntal Element" Site June 4, 2009 Office of Legacy Management, Morgantown, WV Name of Information System or IT Project LM Records Handling System (LMRHS01) - Freedom of Information Act/Privacy

132

DOE/NNSA Facility Management Contracts Facility Owner Contractor  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Facility Management Contracts Facility Management Contracts Facility Owner Contractor Award Date End Date Options/Award Term Ultimate Potential Expiration Date Contract FY Competed Parent Companies/ LLC Partners DOE Site Procurement Director DOE Contracting Officer SLAC National Accelerator Laboratory (SLAC) SC Stanford University DE-AC03-76SF00515 1/25/1981 9/30/2017 9/30/2017 M&O 1981 Stanford University Barbara Jackson 865-576-0976 Kyong H. Watson 650-926-5203 Pacific Northwest National Laboratory (PNNL) SC Battelle Memorial Institute DE-AC05-76RL01830 12/30/2002 9/30/2017 9/30/2017 M&O 1965 Battelle Memorial Institute Barbara Jackson 865-576-0976 Ryan Kilbury 509-372-4030 Brookhaven National Laboratory (BNL) SC Brookhaven Science Associates, LLC DE-AC02-98CH10886 1/5/1998 1/4/2015 1/4/2015 M&O 1998 Battelle Memorial Institute

133

DOE/NNSA Facility Management Contracts Facility Owner Contractor  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Facility Management Contracts Facility Management Contracts Facility Owner Contractor Award Date End Date Options/Award Term Ultimate Potential Expiration Date Contract FY Competed Parent Companies/ LLC Partners DOE Site Procurement Director DOE Contracting Officer SLAC National Accelerator Laboratory (SLAC) SC Stanford University DE-AC03-76SF00515 1/25/1981 9/30/2017 9/30/2017 M&O 1981 Stanford University Barbara Jackson 865-576-0976 Kyong H. Watson 650-926-5203 Pacific Northwest National Laboratory (PNNL) SC Battelle Memorial Institute DE-AC05-76RL01830 12/30/2002 9/30/2017 9/30/2017 M&O 1965 Battelle Memorial Institute Barbara Jackson 865-576-0976 Ryan Kilbury 509-372-4030 Brookhaven National Laboratory (BNL) SC Brookhaven Science Associates, LLC DE-AC02-98CH10886 1/5/1998 1/4/2015 1/4/2015 M&O 1998 Battelle Memorial Institute

134

Keywords Europe Home-owners Housing wealth Pensions Welfare  

E-Print Network (OSTI)

Abstract Notwithstanding current market volatility, there has been exceptional expansion in owner-occupied housing sectors and increases in house prices across European countries in recent decades. In the EU, individual wealth held in housing equity, especially among older people, has been considered a substantial reserve that could be tapped into to meet future pension needs as the ageing of the population becomes a greater stress on European welfare states. This paper seeks to take the notion of ‘property-based welfare’ further by examining, in principle at least, how home ownership may function as a pension across EU states. This firstly involves very approximate estimates of the types of, and rates of, income homeowners could hypothetically generate from their homes, including forms of income in kind. Secondly, criteria are identified to estimate how ‘adequate ’ such potential incomes are in relation to working incomes and in bringing retired households above poverty levels. Thirdly, different circumstances across EU member states with regard to existing housing and pension arrangements are examined. Broad national groupings appear evident, with housing income having least impact in older member states in central and northern Europe. The paper concludes that while the potential outcome of housing wealth is country specific, in many cases, greater dependency on home ownership in welfare provision, particularly if it is used as a substitute rather than a complement to existing arrangements, may have adverse consequences for many.

John Doling; Richard Ronald; J. Doling; R. Ronald; R. Ronald

2009-01-01T23:59:59.000Z

135

C4PS: colors for privacy settings  

Science Conference Proceedings (OSTI)

The ever increasing popularity of Facebook and other Online Social Networks has left a wealth of personal and private data on the web, aggregated and readily accessible for broad and automatic retrieval. Protection from both undesired recipients and ... Keywords: access control, online social networks, privacy

Thomas Paul; Martin Stopczynski; Daniel Puscher; Melanie Volkamer; Thorsten Strufe

2012-04-01T23:59:59.000Z

136

PHEmail: designing a privacy honoring email system  

Science Conference Proceedings (OSTI)

Controlling one's personal and private information could help alleviate one of the greatest harms facing the Internet today - the loss of attention due to the over abundance of unsolicited email (spam). If one could control the dissemination and usage ... Keywords: design, email application, privacy, social network, spam

David Nguyen; Khai Truong

2003-04-01T23:59:59.000Z

137

Privacy, Technology, and Aging: A Proposed Framework  

E-Print Network (OSTI)

the development, adoption, and use of home-based ubiquitous technologies for older adults. We began with a five, adoption, and use of home-based ubiquitous technologies are highly contextual, individualized and aging can inform the development of a privacy framework for home-based technologies that can contribute

Camp, L. Jean

138

Personalized Face Verification System Using Owner-Specific Cluster-Dependent LDA-Subspace  

Science Conference Proceedings (OSTI)

In this paper, we propose an owner-specific cluster-dependent linear discriminant analysis (OSCD-LDA) method, and apply it to develop a personalized face verification system. Before the owner enrollment, our system first divides all the training face ...

Hsien-Chang Liu; Chan-Hung Su; Yueh-Hsuan Chiang; Yi-Ping Hung

2004-08-01T23:59:59.000Z

139

DOE NSTB Researchers Demonstrate R&D Successes to Asset Owners at EnergySec  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NSTB Researchers Demonstrate R&D Successes to Asset Owners at NSTB Researchers Demonstrate R&D Successes to Asset Owners at EnergySec Conference DOE NSTB Researchers Demonstrate R&D Successes to Asset Owners at EnergySec Conference More than 150 energy sector leaders-including nearly 100 asset owners and operators-gathered at the 2009 EnergySec Annual Summit in Seattle, WA, on Sept. 23-24, where researchers from the Department of Energy's National SCADA Test Bed (NSTB) Program gave a four-hour demonstration and presentation of their Roadmap-related control systems security work. DOE NSTB Researchers Demonstrate R&D Successes to Asset Owners at EnergySec Conference More Documents & Publications DOE/OE National SCADA Test Bed Fiscal Year 2009 Work Plan Security is Not an Option DOE National SCADA Test Bed Program Multi-Year Plan

140

DOE NSTB Researchers Demonstrate R&D Successes to Asset Owners at EnergySec  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE NSTB Researchers Demonstrate R&D Successes to Asset Owners at DOE NSTB Researchers Demonstrate R&D Successes to Asset Owners at EnergySec Conference DOE NSTB Researchers Demonstrate R&D Successes to Asset Owners at EnergySec Conference October 1, 2009 - 1:26pm Addthis More than 150 energy sector leaders-including nearly 100 asset owners and operators-gathered at the 2009 EnergySec Annual Summit in Seattle, WA, on Sept. 23-24, where researchers from the Department of Energy's National SCADA Test Bed (NSTB) Program gave a four-hour demonstration and presentation of their Roadmap-related control systems security work. EnergySec is an information sharing forum with more than 230 utility members representing 75 energy companies across the nation. Its fifth annual conference drew asset owners, vendors, and government

Note: This page contains sample records for the topic "owner local privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

NBP RFI: Data Access, Third Party Use and Privacy- Comments of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Access, Third Party Use and Privacy- Comments of Utilities Telecom Council NBP RFI: Data Access, Third Party Use and Privacy- Comments of Utilities Telecom Council The Utilities...

142

NBP RFI: Data Access, Third Party Use and Privacy- Comments of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Third Party Use and Privacy- Comments of Baltimore Gas & Electric Company NBP RFI: Data Access, Third Party Use and Privacy- Comments of Baltimore Gas & Electric Company...

143

Privacy-friendly Energy-metering via Homomorphic Encryption  

E-Print Network (OSTI)

revealed is minimal. There is one issue though, for leakage or fraud detection and smart-grid optimizationPrivacy for the Smart Grid: Embedding Privacy into the Design of Electricity Conservation, 17 Nov 2009. www.ipc.on.ca/images/Resources/pbd-smartpriv-smartgrid Standards, 1 Dec 2009. http://epic.org/privacy/ smartgrid/EPIC_Smart_Grid-Cybersecurity_12-01-09.2.pdf. [Har

Jacobs, Bart

144

Privacy Act (PA) of 1974 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

unwarranted invasions of their privacy stemming from federal agencies' collection, maintenance, use, and disclosure of personal information about them. Therefore, unlike the...

145

Best Practices: Elements of a Federal Privacy Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and information systems. 42 The SAOPCPO plays a key role, in conjunction with the CIO, CISO, the Chief Security Officer, and other officials having privacy related...

146

PRIVACY IMPACT ASSESSMENT: SPRO Physical Security Major Application  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Assessments, for requirements and additional gUidance for conducting a PIA: http:www.directives.doe.govpdfsdoedoetexUneword206o2061.pdf MODULE I - PRIVACY NEEDS...

147

Security and Privacy Controls for Federal Information Systems ...  

Science Conference Proceedings (OSTI)

Page 1. NIST Special Publication 800-53 Revision 4 Security and Privacy Controls for Federal Information Systems and Organizations Appendix F ...

2013-05-09T23:59:59.000Z

148

Security and Privacy Controls for Federal Information Systems  

Science Conference Proceedings (OSTI)

NIST Special Publication 800-53. Revision 4. Security and Privacy Controls for Federal Information Systems. and Organizations. JOINT TASK FORCE ...

2013-06-18T23:59:59.000Z

149

Privacy Act Links to Relates Sites | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Proposed Rules, and Notices of Federal agencies and organizations, as well as Executive Orders and other Presidential Documents. The Privacy Act Issuances Compilation contains...

150

U.S. DEPARTMENT OF ENERGY PRIVACY ACT INFORMATION REQUEST  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PRIVACY ACT INFORMATION REQUEST PRIVACY ACT INFORMATION REQUEST (NOTE: Use of this form is recommended, but is not mandatory) To request Information or Action under the Act, complete appropriate Items in Part I. and establish identity in accordance with instructions on Reverse Side. Retain copy; submit original to the appropriate Privacy Act Officer at the U.S. Department of Energy Headquarters or Field location. . Fax PA Form to 202-586-8151 Attention: Privacy Act Office. NOTE: Records will be provided in CD format unless otherwise stated. Part II is For Agency Use Only. FALSE STATEMENTS SUBJECT TO CRIMINAL PENALTIES. PLEASE SEE REVERSE SIDE. (Please Print) PART I - REQUESTER (Please Print)

151

Enhancing Privacy in Participatory Sensing Applications with Multidimensional Data  

Science Conference Proceedings (OSTI)

Participatory sensing applications rely on individuals to share personal data to produce aggregated models and knowledge. In this setting, privacy concerns can discourage widespread adoption of new applications. We present a privacy-preserving participatory sensing scheme based on negative surveys for both continuous and multivariate categorical data. Without relying on encryption, our algorithms enhance the privacy of sensed data in an energy and computation efficient manner. Simulations and implementation on Android smart phones illustrate how multidimensional data can be aggregated in a useful and privacy-enhancing manner.

Forrest, Stephanie [University of New Mexico, Albuquerque; He, Wenbo [University of Nebraska, Lincoln; Groat, Michael [University of New Mexico, Albuquerque; Edwards, Benjamin [University of New Mexico, Albuquerque; Horey, James L [ORNL

2013-01-01T23:59:59.000Z

152

Climate VISION: Security and Privacy Notices  

Office of Scientific and Technical Information (OSTI)

SECURITY AND PRIVACY NOTICES SECURITY AND PRIVACY NOTICES Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation is prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of

153

Privacy & Security Notice | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy & Security Notice Privacy & Security Notice Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The U.S. Department of Energy (DOE) monitors this web site for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation is prohibited. Evidence of such acts may be disclosed to law enforcement authorities and

154

Group Member Names: ________________________________________________ Scenario: You are the owner of a potato plant in Idaho. You have recently won a contract  

E-Print Network (OSTI)

: ________________________________________________ ________________________________________________ ________________________________________________ Scenario: You are the owner of a potato plant in Idaho. You have recently won a contract to supply Mc

Provancher, William

155

Connecting Distributed Energy Resources to the Grid: Their Benefits to the DER Owner etc.  

SciTech Connect

The vision of the Distributed Energy Research Program (DER) program of the U.S. Department of Energy (DOE) is that the United States will have the cleanest and most efficient and reliable energy system in the world by maximizing the use of affordable distributed energy resources. Electricity consumers will be able to choose from a diverse number of efficient, cost-effective, and environmentally friendly distributed energy options and easily connect them into the nation's energy infrastructure while providing benefits to their owners and other stakeholders. The long-term goal of this vision is that DER will achieve a 20% share of new electric capacity additions in the United States by 2010, thereby helping to make the nation's electric power generation and delivery system more efficient, reliable, secure, clean, economical, and diverse in terms of fuel use (oil, natural gas, solar, hydroelectric, etc.) and prime mover resource (solar, wind, gas turbines, etc.). Near- and mid-term goals are to develop new technologies for implementing and operating DER and address barriers associated with DER usage and then to reduce costs and emissions and improve the efficiency and reliability of DER. Numerous strategies for meeting these goals have been developed into a research, development, and demonstration (RD&D) program that supports generation and delivery systems architecture, including modeling and simulation tools. The benefits associated with DER installations are often significant and numerous. They almost always provide tangible economic benefits, such as energy savings or transmission and distribution upgrade deferrals, as well as intangible benefits, such as power quality improvements that lengthen maintenance or repair intervals for power equipment. Also, the benefits routinely are dispersed among end users, utilities, and the public. For instance, an end user may use the DER to reduce their peak demand and save money due to lower demand charges. Reduced end user peak demand, in turn, may lower a distribution system peak load such that upgrades are deferred or avoided. This could benefit other consumers by providing them with higher reliability and power quality as well as avoiding their cost share of a distribution system upgrade. In this example, the costs of the DER may be born by the end user, but that user reaps only a share of the benefits. This report, the first product of a study to quantify the value of DER, documents initial project efforts to develop an assessment methodology. The focus of currently available site-specific DER assessment techniques are typically limited to two parties, the owner/user and the local utility. Rarely are the impacts on other stakeholders, including interconnected distribution utilities, transmission system operators, generating system operators, other local utility customers, local and regional industry and business, various levels of government, and the environment considered. The goal of this assessment is to quantify benefits and cost savings that accrue broadly across a region, recognizing that DER installations may have local, regional, or national benefits.

Poore, WP

2003-07-09T23:59:59.000Z

156

MOTION TO INTERVENE OF THE NEW YORK TRANSMISSION OWNERS PP-230-4 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

MOTION TO INTERVENE OF THE NEW YORK TRANSMISSION OWNERS PP-230-4 MOTION TO INTERVENE OF THE NEW YORK TRANSMISSION OWNERS PP-230-4 MOTION TO INTERVENE OF THE NEW YORK TRANSMISSION OWNERS PP-230-4 Pursuant to Rules 212 and 214 of the Rules of Practice and Procedure, 18 C.F.R. §§ 385.212 and 385.214 (2010), Central Hudson Gas & Electric Corporation, Consolidated Edison Company of New York, Inc., Long Island Power Authority, New York Power Authority, New York State Electric & Gas Corporation, Niagara Mohawk Power Corporation d/b/a National Grid, Orange and Rockland Utilities, Inc., and Rochester Gas and Electric Corporation (referred to herein as the "New York Transmission Owners"), individually and collectively move to intervene in the above-captioned proceeding and request an opportunity to comment on International Transmission Company's d/b/a/ ITCTransmission

157

Security and privacy threats in IoT architectures  

Science Conference Proceedings (OSTI)

In this paper, we describe developments towards the Internet of Things (IoT) and discuss architecture visions for the IoT. Our emphasis is to analyze the known and new threats for the security, privacy and trust (SPT) at different levels of architecture. ... Keywords: IoT architecture, energy consumption, future internet, privacy, security, trust

Denis Kozlov; Jari Veijalainen; Yasir Ali

2012-02-01T23:59:59.000Z

158

RFID, privacy and the perception of risk: A strategic framework  

Science Conference Proceedings (OSTI)

Against the background of the first RFID-Rollouts by large retailers in North America and Europe, this paper concerns itself with the perception of RFID technology as a risk to privacy. The objective of our contribution is to identify, at a relatively ... Keywords: Privacy, RFID, Risk perception, Technology acceptance

Frédéric Thiesse

2007-06-01T23:59:59.000Z

159

Do online social network friends still threaten my privacy?  

Science Conference Proceedings (OSTI)

A user's online social network (OSN) friends commonly share information on their OSN profiles that might also characterize the user him-/herself. Therefore, OSN friends are potentially jeopardizing users' privacy. Previous studies demonstrated that third ... Keywords: attribute prediction, facebook, homophily, online social networks, privacy

Sebastian Labitzke; Florian Werling; Jens Mittag; Hannes Hartenstein

2013-02-01T23:59:59.000Z

160

Privacy-friendly energy-metering via homomorphic encryption  

Science Conference Proceedings (OSTI)

The first part of this paper discusses developments wrt. smart (electricity) meters (simply called E-meters) in general, with emphasis on security and privacy issues. The second part will be more technical and describes protocols for secure communication ... Keywords: homomorphic encryption, privacy, smart-metering

Flavio D. Garcia; Bart Jacobs

2010-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "owner local privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Secure and privacy-preserving execution model for data services  

Science Conference Proceedings (OSTI)

Data services have almost become a standard way for data publishing and sharing on top of the Web. In this paper, we present a secure and privacy-preserving execution model for data services. Our model controls the information returned during service ... Keywords: RDF views, data services, privacy preservation

Mahmoud Barhamgi, Djamal Benslimane, Said Oulmakhzoune, Nora Cuppens-Boulahia, Frederic Cuppens, Michael Mrissa, Hajer Taktak

2013-06-01T23:59:59.000Z

162

Class-Restricted Clustering and Microperturbation for Data Privacy  

Science Conference Proceedings (OSTI)

The extensive use of information technologies by organizations to collect and share personal data has raised strong privacy concerns. To respond to the public's demand for data privacy, a class of clustering-based data masking techniques is increasingly ... Keywords: confidentiality, data perturbation, information theory, microaggregation, minimum spanning tree

Xiao-Bai Li, Sumit Sarkar

2013-04-01T23:59:59.000Z

163

A PLA-based privacy-enhancing user modeling framework and its evaluation  

Science Conference Proceedings (OSTI)

Reconciling personalization with privacy has been a continuing interest in user modeling research. This aim has computational, legal and behavioral/attitudinal ramifications. We present a dynamic privacy-enhancing user modeling framework that supports ... Keywords: Compliance, Disclosure behavior, Performance evaluation, Privacy laws, Privacy preferences, Product line architecture, User experiment, User modeling

Yang Wang; Alfred Kobsa

2013-03-01T23:59:59.000Z

164

Judicial support systems: ideas for a privacy ontology-based case analyzer  

Science Conference Proceedings (OSTI)

Nowadays, ontology is applied as an integral part of many applications in several domains, especially in the world of law. The ontology based judicial support system is believed as a useful tool to support, for example, the legal argumentation assistant ... Keywords: privacy directives, privacy ontology, privacy ontology structure, privacy principles, woolf reforms

Yan Tang; Robert Meersman

2005-10-01T23:59:59.000Z

165

PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

,. - -i * PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS HANDLING SYSTEM: FERNALD HISTORICAL RECORDS SYSTEM PIA Template Version - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/02061.pdf Please complete electronically: no hand-written slibmisslons will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element & SIte· June 4, 2009 Office of Legacy Management, Morgantown, WV Name of Information System or IT Project LM Records Handling System (LMRHS01) - Fernald Historical Records System exhIbit Project UIO 019-10-01-31-02-1014-00

166

PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

-. -. ., ,-- -.' * PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS HANDLING SYSTEM: ELECTRONIC RECORDS KEEPING SYSTEM PIA Template Version - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1. Department of Energy Privacy Program, Appendix A. Privacy Impact Assessments. for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetext/neword/206/02061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Deparbnental Element & Site . June 4, 2009 Office of Legacy Management, Morgantown, WV :;:~:f~~r~;;:reC: LM Records Handling System (LMRHS01) - Electronic Records Keeping System exhibit Project UID 019-10-01-31-02-1014-00

167

PRIVACY IMPACT ASSESSMENT: INL INGSM2009 PIA Template Version  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

* * PRIVACY IMPACT ASSESSMENT: INL INGSM2009 PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetext/neword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT D.. June 16, 2009 Deparlnient~", Element &Site Idaho National Laboratory N.....,e,df'llnformatlon 10th International Nuclear Graphite Specialists Meeting registration web site. ,SY8tem,orIT Project exhibit Project UID Enterprise Architecture Application 10 - 223419 NewPIA D Update 0 System

168

Privacy Act | U.S. DOE Office of Science (SC)  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy Act Privacy Act Integrated Support Center (ISC) ISC Home About Services Freedom of Information Act (FOIA) Privacy Act Compilation of Systems of Records Energy Employees Occupational Illness Compensation Program Act (EEOICPA) How to Submit a Privacy Act Request Reference Links Categorical Exclusion Determinations Contact Information Integrated Support Center Roxanne Purucker U.S. Department of Energy 9800 S. Cass Avenue Argonne, IL 60439 P: (630) 252-2110 Larry Kelly U.S. Department of Energy 200 Administration Road Oak Ridge, TN 37830 P: (865) 576-0885 Privacy Act Print Text Size: A A A RSS Feeds FeedbackShare Page General Disclaimer This system is made available by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of

169

PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

* PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS HANDLING SYSTEM ROCKY FLATS ENVIRONMENTAL RECORDS DATABASE PIA Template Version - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element & Site June 4,2009 Office of Legacy Management, Morgantown, WV Name of Information LM Records Handling System (LMRHS01) - Rocky Flats Environmental Records System or IT Project Database exhibit Project UID 019-10-01-31-02-1014-00

170

Department of Energy Adopts Rules to Protect Consumer Privacy | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Department of Energy Adopts Rules to Protect Consumer Privacy Department of Energy Adopts Rules to Protect Consumer Privacy Department of Energy Adopts Rules to Protect Consumer Privacy March 15, 2010 - 4:17pm Addthis The Weatherization Assistance Program (WAP) enables states to provide financial assistance to qualifying consumers who want to improve the energy-efficiency of their homes. In response to concerns about the potential disclosure by the States of personal information they collect from WAP applicants, the Department has issued an interim final rule that requires states to apply the standards of the Freedom of Information Act that protect the privacy of potentially sensitive personal information. These protections will ensure a consistent and balanced approach towards the twin goals of consumer privacy and government transparency. The entire

171

How to Submit a Privacy Act Request | U.S. DOE Office of Science (SC)  

NLE Websites -- All DOE Office Websites (Extended Search)

How to Submit a Privacy Act Request How to Submit a Privacy Act Request Integrated Support Center (ISC) ISC Home About Services Freedom of Information Act (FOIA) Privacy Act Compilation of Systems of Records Energy Employees Occupational Illness Compensation Program Act (EEOICPA) How to Submit a Privacy Act Request Privacy Act Request Form .pdf file (99KB) Reference Links Categorical Exclusion Determinations Contact Information Integrated Support Center Roxanne Purucker U.S. Department of Energy 9800 S. Cass Avenue Argonne, IL 60439 P: (630) 252-2110 Larry Kelly U.S. Department of Energy 200 Administration Road Oak Ridge, TN 37830 P: (865) 576-0885 Privacy Act How to Submit a Privacy Act Request Print Text Size: A A A RSS Feeds FeedbackShare Page Related Links Privacy Act Request Form .pdf file (99KB) You may request your own Privacy Act records by submitting a request in

172

PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OFFICE OFFICE OF LEGACY MANAGEMENT: RECORDS HANDLING SYSTEM: ENERGY EMPLOYEES OCCUPATIONAL ILLNESS COMPENSATION PROGRAM ACT PIA Template Version - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance Is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/02061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE I - PRIVACY NEEDS ASSESSMENT Date Departmental Element &Site June 4, 2009 Office of Legacy Management, Morgantown, WV Name of Information LM Records Handling System (LMRHS01) - Energy Employees Occupational Illness System or IT Project Compensation Program Act exhibit

173

Privacy Act Fees and Time Limits | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Fees and Time Limits | National Nuclear Security Administration Fees and Time Limits | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Privacy Act Fees and Time Limits Home > About Us > Our Operations > NNSA Office of General Counsel > Privacy Act (PA) of 1974 > Privacy Act Fees and Time Limits Privacy Act Fees and Time Limits The Act provides agencies to assess fees only for the cost of reproducing

174

Freedom of Information Act/Privacy Act Requests | National Nuclear...  

National Nuclear Security Administration (NNSA)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Freedom of Information ActPrivacy Act Requests Home > About Us > Our Operations > NNSA Office of General...

175

Imagined communities: awareness, information sharing, and privacy on the facebook  

Science Conference Proceedings (OSTI)

Online social networks such as Friendster, MySpace, or the Facebook have experienced exponential growth in membership in recent years. These networks offer attractive means for interaction and communication, but also raise privacy and security concerns. ...

Alessandro Acquisti; Ralph Gross

2006-06-01T23:59:59.000Z

176

Weatherization Assistance for Low-Income Persons: Maintaining the Privacy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Weatherization Assistance for Low-Income Persons: Maintaining the Weatherization Assistance for Low-Income Persons: Maintaining the Privacy of Applicants for and Recipients of Services Weatherization Assistance for Low-Income Persons: Maintaining the Privacy of Applicants for and Recipients of Services Amending regulations to require all States and other service providers that participate in the Weatherization Assistance Program (WAP) to treat all requests for information concerning applicants and recipients of WAP funds in a manner consistent with the Federal government's treatment of information requested under the Freedom of Information Act (FOIA), 5 U.S.C. 552, including the privacy protections contained in Exemption (b)(6) of the FOIA, 5 U.S.C. 552(b)(6). Weatherization Assistance for Low-Income Persons: Maintaining the Privacy

177

PRIVACY IMPACT ASSESSMENT: INL PERSONNEL SECURITY SECIMS PIA  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PERSONNEL PERSONNEL SECURITY - SECIMS PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element;& Site Name of Infonnatlon Syetemor Ilf Project Exhibit ProJect UIO NewPIA D Update ~ June 11, 2009 Idaho National Laboratory Willow Creek Building RIOT-Center INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE 311 DOE PIA - SECIMS Finallxw.doc N T 'tl I Contact Information arne I e . , Phone, Email

178

PRIVACY IMPACT ASSESSMENT: Shaw Areva MOX Services, LLC MOX  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

. . ,-) ')7 73?Â¥i5": )~"'f"YC-:;'~dt?f(~"'f9'FrrZ , . PRIVACY IMPACT ASSESSMENT: Shaw Areva MOX Services, LLC MOX Services Unclassified Information System Template - January 30, 2009, Version 2 Department of Energy Privacy Impact Assessment (pIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: hltp:llwww.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. (803) 819-22700 Dstlnson@moxprolect.com Dave Stinson, President and Chief Executive Officer, Shaw AREVA MOX Services, LLC NNSA Shaw AREVA MOX Services Savannah River Site, Aiken SC .. .. . ": .' . ' .... .- ...: ......

179

Privacy Act Fees and Time Limits | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Privacy Act Fees and Time Limits The Act provides agencies to assess fees only for the cost of reproducing records. However, it is the policy of the DOE to provide an individual...

180

Bunker: a privacy-oriented platform for network tracing  

Science Conference Proceedings (OSTI)

ISPs are increasingly reluctant to collect and store raw network traces because they can be used to compromise their customers' privacy. Anonymization techniques mitigate this concern by protecting sensitive information. Trace anonymization can be performed ...

Andrew G. Miklas; Stefan Saroiu; Alec Wolman; Angela Demke Brown

2009-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "owner local privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Privacy-preserving anonymization of set-valued data  

Science Conference Proceedings (OSTI)

In this paper we study the problem of protecting privacy in the publication of set-valued data. Consider a collection of transactional data that contains detailed information about items bought together by individuals. Even after removing all personal ...

Manolis Terrovitis; Nikos Mamoulis; Panos Kalnis

2008-08-01T23:59:59.000Z

182

A privacy-aware architecture for a web rating system  

Science Conference Proceedings (OSTI)

Net Trust is a fraud-detection application that enhances security while protecting privacy. Net Trust identifies fraudulent Web sites by aggregating individual opinions, user-selected browsing histories, and third-party information. In this paper, we ...

C. Viecco; A. Tsow; L. J. Camp

2009-03-01T23:59:59.000Z

183

A privacy-preserving index for range queries  

Science Conference Proceedings (OSTI)

Database outsourcing is an emerging data management paradigm which has the potential to transform the IT operations of corporations. In this paper we address privacy threats in database outsourcing scenarios where trust in the service provider is limited. ...

Bijit Hore; Sharad Mehrotra; Gene Tsudik

2004-08-01T23:59:59.000Z

184

Proceedings of the Sixth Symposium on Usable Privacy and Security  

Science Conference Proceedings (OSTI)

Welcome to the Sixth Symposium On Usable Privacy and Security! This year's program features 16 technical papers, two workshops, 17 posters, 11 posters published in the past year at other conferences, a panel, five discussion sessions, and an invited ...

Lorrie Faith Cranor

2010-07-01T23:59:59.000Z

185

Flybynight: mitigating the privacy risks of social networking  

E-Print Network (OSTI)

Social networking websites are enormously popular, but they present a number of privacy risks to their users, one of the foremost of which being that social network service providers are able to observe and accumulate the information that users transmit through the network. We aim to mitigate this risk by presenting a new architecture for protecting information published through the social networking website, Facebook, through encryption. Our architecture makes a trade-off between security and usability in the interests of minimally affecting users ' workflow and maintaining universal accessibility. While active attacks by Facebook could compromise users ' privacy, our architecture dramatically raises the cost of such potential compromises and, importantly, places them within a framework for legal privacy protection because they would violate a user?s reasonable expectation of privacy. We have built a prototype Facebook application implementing our architecture, addressing some of the limitations of the Facebook platform through proxy cryptography.

Matthew M. Lucas; Nikita Borisov

2008-01-01T23:59:59.000Z

186

Intelligent content-based privacy assistant for facebook  

E-Print Network (OSTI)

Abstract—Although most online social networks now offer fine-grained controls of information sharing, these are rarely used, both because their use imposes additional burden on the user and because there are too many control settings for an average user to handle. To mitigate this problem, we have developed an Intelligent Privacy Assistant for Facebook that partially automates the assignment of sharing permissions, taking into account the content of the information published and user’s high-level sharing policies. The Assistant uses a novel social web privacy language, employs named entity recognition algorithms to annotate sensitive parts of published information and an answer set programming system to evaluate user’s privacy policies and determine the list of safe recipients. On a test scenario, the Assistant reached 73.8 % and 95.2 % performance in correctly determining safe and unsafe recipients, respectively. Keywords-privacy protection, social web, information extraction, policies, Facebook I.

Michal Jakob; Zbyn?k Moler; Michal P?chou?ek; Roman Vaculín

2011-01-01T23:59:59.000Z

187

PRIVACY IMPACT ASSESSMENT: INL Education Programs PIA Template  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Education Education Programs PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE I - PRIVACY NEEDS ASSESSMENT Date Departmental Elernent'& (Site 24/Jun/09 Idaho National Laboratory Information Operations and Research Center (IORC) Nameofll,f..,rrnatlon INL Education Programs System or IfPi'()ject Business Enclave Exhibit Proj.ctlUO NA NewPIA D Update [~] DOE PIA - INL Education Program Finallxw.doc N T "tl I Contact Information arne,

188

Privacy Act (PA) of 1974 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

(PA) of 1974 | National Nuclear Security Administration (PA) of 1974 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Privacy Act (PA) of 1974 Home > About Us > Our Operations > NNSA Office of General Counsel > Privacy Act (PA) of 1974 Privacy Act (PA) of 1974 The purpose of the Privacy Act of 1974 (Act), Title 5, United States Code,

189

Cogeneration for industrial and mixed-use parks. Volume 3. A guide for park developers, owners, and tenants. Final report  

SciTech Connect

Using cogeneration in mixed-use and industrial parks can cut energy costs ad smooth out peak load demands - benefits for servicing utilities and park owners and tenants. The two handbooks developed by this project can help utilities identify existing or planned parks as potential cogeneration sites as well as help developers and park owners evaluate the advantages of cogeneration. The second handbook (volume 3) describes the benefits of cogeneration for park developers, owners, and tenants.

Schiller, S.R.; Minicucci, D.D.; Tamaro, R.F.

1986-05-01T23:59:59.000Z

190

Cyber Security and Privacy Landscape of the Electric Sector  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2012-12-20T23:59:59.000Z

191

Cyber Security and Privacy Landscape of the Electric Sector  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2012-10-01T23:59:59.000Z

192

A rhetorical analysis of the right to privacy  

E-Print Network (OSTI)

Although no guarantee exists in the Constitution to a right to privacy, it is now generally accepted that individuals have a right to be "let alone.'' In this thesis, I will propose an alternative formulation of the right to privacy, using insights gleaned from rhetorical and communication theory. I will bring "outside'' perspectives to the legal problem of privacy. The right to privacy as established in Griswold holds promise as a coherent interpretive model for evaluating the constitutionality of statutes concerning civil liberties. The systematic consideration of Kenneth Burke's writings on constitutions helps to clarify disputes in methods of constitutional interpretation, and helps to defend the right to privacy against texualists and original intent theorists. Expanding the analysis of privacy to its cultural implications, Michel Foucault's concept of "governmentality'' aids in charting the foundations of the power relationships animating contemporary society. New technologies and the Internet threaten to monopolize on the distribution of power in society. Consequently these technologies threaten the fulfillment of the ideal of a liberal political order. The understanding of the shift in the distribution of power within society facilitates recognition of the importance of subtle manifestation of resistance to the totalizing power of these technologies.

Spatz, George Reynolds

1999-01-01T23:59:59.000Z

193

The Failure of Online Social Network Privacy Settings  

E-Print Network (OSTI)

Increasingly, people are sharing sensitive personal information via online social networks (OSN). While such networks do permit users to control what they share with whom, access control policies are notoriously difficult to configure correctly; this raises the question of whether OSN users ’ privacy settings match their sharing intentions. We present the results of an empirical evaluation that measures privacy attitudes and intentions and compares these against the privacy settings on Facebook. Our results indicate a serious mismatch: every one of the 65 participants in our study confirmed that at least one of the identified violations was in fact a sharing violation. In other words, OSN users ’ privacy settings are incorrect. Furthermore, a majority of users cannot or will not fix such errors. We conclude that the current approach to privacy settings is fundamentally flawed and cannot be fixed; a fundamentally different approach is needed. We present recommendations to ameliorate the current problems, as well as provide suggestions for future research. 1 Related Work To the best of our knowledge this is the first attempt to measure the correctness of privacy settings by first surveying user’s sharing intentions, to aid the process of identifying potential violations, then confirming the potential violations with the user. We argue that this method produces a more accurate evaluation compared

Michelle Madejski; Maritza Johnson; Steven M. Bellovin

2011-01-01T23:59:59.000Z

194

Privacy Preservation Technologies in Internet of Things  

E-Print Network (OSTI)

Since the beginning of the Internet thirty years ago, we have witnessed a number of changes in the application of communication technologies. Today, the Internet can be described to a large extent as a ubiquitous infrastructure that is always accessible. After the era of connecting places and connecting people, the Internet of the future will also connect things. The idea behind the resulting Internet of Things is to seamlessly gather and use information about objects of the real world during their entire lifecycle. In this paper, we consider different approaches to technological protection of user data privacy in the world of Internet of Things. In particular,we consider what kind of security problems are being faced and what level of protection can be provided by applying approaches based on secure multi-party computations.

Sen, Jaydip

2010-01-01T23:59:59.000Z

195

Guide to Combined Heat and Power Systems for Boiler Owners and Operators  

Science Conference Proceedings (OSTI)

Combined heat and power (CHP) or cogeneration is the sequential production of two forms of useful energy from a single fuel source. In most CHP applications, chemical energy in fuel is converted to both mechanical and thermal energy. The mechanical energy is generally used to generate electricity, while the thermal energy or heat is used to produce steam, hot water, or hot air. Depending on the application, CHP is referred to by various names including Building Cooling, Heating, and Power (BCHP); Cooling, Heating, and Power for Buildings (CHPB); Combined Cooling, Heating, and Power (CCHP); Integrated Energy Systems (IES), or Distributed Energy Resources (DER). The principal technical advantage of a CHP system is its ability to extract more useful energy from fuel compared to traditional energy systems such as conventional power plants that only generate electricity and industrial boiler systems that only produce steam or hot water for process applications. By using fuel energy for both power and heat production, CHP systems can be very energy efficient and have the potential to produce electricity below the price charged by the local power provider. Another important incentive for applying cogeneration technology is to reduce or eliminate dependency on the electrical grid. For some industrial processes, the consequences of losing power for even a short period of time are unacceptable. The primary objective of the guide is to present information needed to evaluate the viability of cogeneration for new or existing industrial, commercial, and institutional (ICI) boiler installations and to make informed CHP equipment selection decisions. Information presented is meant to help boiler owners and operators understand the potential benefits derived from implementing a CHP project and recognize opportunities for successful application of cogeneration technology. Topics covered in the guide follow: (1) an overview of cogeneration technology with discussions about benefits of applying cogeneration technology and barriers to implementing cogeneration technology; (2) applicable federal regulations and permitting issues; (3) descriptions of prime movers commonly used in CHP applications, including discussions about design characteristics, heat-recovery options and equipment, fuels and emissions, efficiency, maintenance, availability, and capital cost; (4) electrical generators and electrical interconnection equipment; (5) cooling and dehumidification equipment; (6) thermodynamic cycle options and configurations; (7) steps for evaluating the technical and economic feasibility of applying cogeneration technology; and (8) information sources.

Oland, CB

2004-08-19T23:59:59.000Z

196

Selective collision based medium access control protocol for proactive protection of privacy for RFID  

Science Conference Proceedings (OSTI)

RFID is rapidly being deployed because of its versatility. However, the privacy problem cannot be handled effectively because of limited capability of RFID tags. We propose a secure medium access control(MAC) protocol to solve the privacy problem. Our ...

JuSung Park; Jeonil Kang; DaeHun Nyang

2005-12-01T23:59:59.000Z

197

Blur Filtration Fails to Preserve Privacy for Home-Based Video Conferencing  

E-Print Network (OSTI)

Blur Filtration Fails to Preserve Privacy for Home-Based Video Conferencing CARMAN NEUSTAEDTER, S. and Boyle, M. (2006). Blur Filtration Fails to Preserve Privacy for Home-Based Video Conferencing

Greenberg, Saul

198

Privacy-preserving data mining through data publishing and knowledge model sharing  

Science Conference Proceedings (OSTI)

For the past decade or so, the needs for organizations to share data for knowledge discovery and data mining have increased significantly. Meanwhile, privacy issues have become widely recognized and motivated the research on privacy-preserving data mining ...

Hongwei Tian / Weining Zhang

2012-01-01T23:59:59.000Z

199

The Design of a Context-Aware Home Media Space for Balancing Privacy and Awareness  

E-Print Network (OSTI)

. Specifically, we detail how and why: 1. existing privacy mechanisms are leveraged for use in home-based video

Greenberg, Saul

200

A framework for context-aware privacy of sensor data on mobile systems  

Science Conference Proceedings (OSTI)

We study the competing goals of utility and privacy as they arise when a user shares personal sensor data with apps on a smartphone. On the one hand, there can be value to the user for sharing data in the form of various personalized services and recommendations; ... Keywords: Android, behavioral privacy, context-awareness, inferences, ipShield, model-based privacy

Supriyo Chakraborty; Kasturi Rangan Raghavan; Matthew P. Johnson; Mani B. Srivastava

2013-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "owner local privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Home is safer than the cloud!: privacy concerns for consumer cloud storage  

Science Conference Proceedings (OSTI)

Several studies ranked security and privacy to be major areas of concern and impediments of cloud adoption for companies, but none have looked into end-users' attitudes and practices. Not much is known about consumers' privacy beliefs and expectations ... Keywords: cloud storage, cross-cultural, privacy, social factors, usability

Iulia Ion; Niharika Sachdeva; Ponnurangam Kumaraguru; Srdjan ?apkun

2011-07-01T23:59:59.000Z

202

The language of privacy: Learning from video media space analysis and design  

Science Conference Proceedings (OSTI)

Video media spaces are an excellent crucible for the study of privacy. Their design affords opportunities for misuse, prompts ethical questions, and engenders grave concerns from both users and nonusers. Despite considerable discussion of the privacy ... Keywords: Human-computer interaction, autonomy, computer-supported cooperative work (CSCW), confidentiality, environmental psychology, privacy, social interaction, solitude, user interface design, video media spaces

Michael Boyle; Saul Greenberg

2005-06-01T23:59:59.000Z

203

Facility Name Facility Name Facility FacilityType Owner Developer EnergyPurchaser  

Open Energy Info (EERE)

Name Facility Name Facility FacilityType Owner Developer EnergyPurchaser Name Facility Name Facility FacilityType Owner Developer EnergyPurchaser Place GeneratingCapacity NumberOfUnits CommercialOnlineDate WindTurbineManufacturer FacilityStatus Coordinates D Metals D Metals D Metals Definition Small Scale Wind Valley City OH MW Northern Power Systems In Service AB Tehachapi Wind Farm AB Tehachapi Wind Farm AB Tehachapi Definition Commercial Scale Wind Coram Energy AB Energy Southern California Edison Co Tehachapi CA MW Vestas In Service AFCEE MMR Turbines AFCEE MMR Turbines AFCEE MMR Turbines Definition Commercial Scale Wind AFCEE Air Force Center for Engineering and the Environment Distributed generation net metered Camp Edwards Sandwich MA MW GE Energy In Service AG Land AG Land AG Land Definition Community Wind AG Land Energy LLC

204

Solar PV Project Financing: Regulatory and Legislative Challenges for Third-Party PPA System Owners (Revised)  

NLE Websites -- All DOE Office Websites (Extended Search)

23 23 Revised February 2010 Solar PV Project Financing: Regulatory and Legislative Challenges for Third-Party PPA System Owners Katharine Kollins Duke University Bethany Speer and Karlynn Cory National Renewable Energy Laboratory National Renewable Energy Laboratory 1617 Cole Boulevard, Golden, Colorado 80401-3393 303-275-3000 * www.nrel.gov NREL is a national laboratory of the U.S. Department of Energy Office of Energy Efficiency and Renewable Energy Operated by the Alliance for Sustainable Energy, LLC Contract No. DE-AC36-08-GO28308 Technical Report NREL/TP-6A2-46723 Revised February 2010 Solar PV Project Financing: Regulatory and Legislative Challenges for Third-Party PPA System Owners Katharine Kollins Duke University Bethany Speer and Karlynn Cory

205

Navigating computer science research through waves of privacy concerns: discussions among computer scientists at Carnegie Mellon University  

Science Conference Proceedings (OSTI)

Computer Science research and practice are raising growing privacy concerns among the public and government. Computer technology's increasing ability to capture, organize, interpret and share data about individuals raises questions about what privacy ... Keywords: data mining, ethics, face recognition, institutional review board, personal assistants, privacy, privacy technology, surveillance

Latanya Sweeney

2004-03-01T23:59:59.000Z

206

Microsoft Word - Privacy_Contact_Listing_September_21_2010  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

US Department of Energy US Department of Energy Privacy Act Officers Contact Listing As of September 21, 2010 Chief Privacy Officer Jerry Hanley U.S. Department of Energy 1000 Independence Avenue, SW Washington, DC 20585 jerry.hanley@hq.doe.gov Phone: (202) 586-0483 Fax: (202) 586-0575 Operations Offices Chicago Office Miriam Legan U.S. Department of Energy Chicago Office 9800 S. Cass Avenue Argonne, IL 60439 miriam.legan@ch.doe.gov Phone: 630-252-2041 Fax: 630-252-2183 Idaho Operations Office Clayton Ogilvie U.S. Department of Energy 1955 Fremont Ave. MS 1203 Idaho Falls, Idaho 83415

207

On mental privacy: the having of mental states  

E-Print Network (OSTI)

In three chapters this thesis seeks to demonstrate that (i) there historically has been no consensus in the use of the term 'mental privacy' and that several problematic doctrines are based on confused accounts of this term; (ii) there are contemporary debates which are maintained, in large order, by the opposing sides subscribing to different notions of mental privacy; and (iii) a preliminary investigation makes clear that both mental states with propositional content and mental states with non-propositional content are private in that both require the agent to have the state.

Dembitzer, Simon David

1998-01-01T23:59:59.000Z

208

DOE NSTB Researchers Demonstrate R&D Successes to Asset Owners at EnergySec Conference  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NSTB Researchers Demonstrate R&D Successes to Asset Owners at EnergySec Conference NSTB Researchers Demonstrate R&D Successes to Asset Owners at EnergySec Conference October 1, 2009 More than 150 energy sector leaders-including nearly 100 asset owners and operators-gathered at the 2009 EnergySec Annual Summit in Seattle, WA, on Sept. 23-24, where researchers from the Department of Energy's National SCADA Test Bed (NSTB) Program gave a four-hour demonstration and presentation of their Roadmap-related control systems security work. EnergySec is an information sharing forum with more than 230 utility members representing 75 energy companies across the nation. Its fifth annual conference drew asset owners, vendors, and government representatives for presentations and discussions on NERC CIP standards, collaborative industry efforts

209

"Table HC3.2 Living Space Characteristics by Owner-Occupied Housing Units, 2005"  

U.S. Energy Information Administration (EIA) Indexed Site

2 Living Space Characteristics by Owner-Occupied Housing Units, 2005" 2 Living Space Characteristics by Owner-Occupied Housing Units, 2005" " Million U.S. Housing Units" ,," Owner-Occupied Housing Units (millions)","Type of Owner-Occupied Housing Unit" ," Housing Units (millions) " ,,,"Single-Family Units",,"Apartments in Buildings With--" "Living Space Characteristics",,,"Detached","Attached","2 to 4 Units","5 or More Units","Mobile Homes" "Total",111.1,78.1,64.1,4.2,1.8,2.3,5.7 "Floorspace (Square Feet)" "Total Floorspace1" "Fewer than 500",3.2,1.1,"Q","Q","Q","Q",0.4 "500 to 999",23.8,7.2,3.5,0.3,0.3,0.9,2.2

210

"Table HC3.13 Lighting Usage Indicators by Owner-Occupied Housing Unit Zone, 2005"  

U.S. Energy Information Administration (EIA) Indexed Site

3 Lighting Usage Indicators by Owner-Occupied Housing Unit Zone, 2005" 3 Lighting Usage Indicators by Owner-Occupied Housing Unit Zone, 2005" " Million U.S. Housing Units" ,," Owner-Occupied Housing Units (millions)","Type of Owner-Occupied Housing Unit" ,"U.S. Housing Units (millions" ,,,"Single-Family Units",,"Apartments in Buildings With--" "Lighting Usage Indicators",,,"Detached","Attached","2 to 4 Units","5 or More Units","Mobile Homes" "Total U.S. Housing Units",111.1,78.1,64.1,4.2,1.8,2.3,5.7 "Indoor Lights Turned On During Summer" "Number of Lights Turned On" "Between 1 and 4 Hours per Day",91.8,65,54.3,3.3,1.5,1.6,4.4 "1.",28.6,17.9,14,0.9,0.6,0.7,1.7

211

"Table HC3.4 Space Heating Characteristics by Owner-Occupied Housing Unit, 2005"  

U.S. Energy Information Administration (EIA) Indexed Site

4 Space Heating Characteristics by Owner-Occupied Housing Unit, 2005" 4 Space Heating Characteristics by Owner-Occupied Housing Unit, 2005" " Million U.S. Housing Units" ,," Owner-Occupied Housing Units (millions)","Type of Owner-Occupied Housing Unit" ," Housing Units (millions)" ,,,"Single-Family Units",,"Apartments in Buildings With--" "Space Heating Characteristics",,,"Detached","Attached","2 to 4 Units","5 or More Units","Mobile Homes" "Total",111.1,78.1,64.1,4.2,1.8,2.3,5.7 "Do Not Have Space Heating Equipment",1.2,0.6,0.3,"N","Q","Q","Q" "Have Main Space Heating Equipment",109.8,77.5,63.7,4.2,1.8,2.2,5.6

212

"Table HC3.8 Water Heating Characteristics by Owner-Occupied Housing Unit, 2005"  

U.S. Energy Information Administration (EIA) Indexed Site

8 Water Heating Characteristics by Owner-Occupied Housing Unit, 2005" 8 Water Heating Characteristics by Owner-Occupied Housing Unit, 2005" " Million U.S. Housing Units" ,," Owner-Occupied Housing Units (millions)","Type of Owner-Occupied Housing Unit" ,"U.S. Housing Units (millions" ,,,"Single-Family Units",,"Apartments in Buildings With--" "Water Heating Characteristics",,,"Detached","Attached","2 to 4 Units","5 or More Units","Mobile Homes" "Total",111.1,78.1,64.1,4.2,1.8,2.3,5.7 "Number of Water Heaters" "1.",106.3,74.5,60.9,4,1.8,2.2,5.5 "2 or More",3.7,3.3,3,"Q","Q","Q","Q" "Do Not Use Hot Water",1.1,0.3,"Q","Q","N","Q","Q"

213

"Table HC3.5 Space Heating Usage Indicators by Owner-Occupied Housing Unit, 2005"  

U.S. Energy Information Administration (EIA) Indexed Site

5 Space Heating Usage Indicators by Owner-Occupied Housing Unit, 2005" 5 Space Heating Usage Indicators by Owner-Occupied Housing Unit, 2005" " Million U.S. Housing Units" ,," Owner-Occupied Housing Units (millions)","Type of Owner-Occupied Housing Unit" ," Housing Units (millions)" ,,,"Single-Family Units",,"Apartments in Buildings With--" "Space Heating Usage Indicators",,,"Detached","Attached","2 to 4 Units","5 or More Units","Mobile Homes" "Total U.S. Housing Units",111.1,78.1,64.1,4.2,1.8,2.3,5.7 "Do Not Have Heating Equipment",1.2,0.6,0.3,"N","Q","Q","Q" "Have Space Heating Equipment",109.8,77.5,63.7,4.2,1.8,2.2,5.6

214

"Table HC3.7 Air-Conditioning Usage Indicators by Owner-Occupied Housing Unit, 2005"  

U.S. Energy Information Administration (EIA) Indexed Site

7 Air-Conditioning Usage Indicators by Owner-Occupied Housing Unit, 2005" 7 Air-Conditioning Usage Indicators by Owner-Occupied Housing Unit, 2005" " Million U.S. Housing Units" ,," Owner-Occupied Housing Units (millions)","Type of Owner-Occupied Housing Unit" ,"U.S. Housing Units (millions)" ,,,"Single-Family Units",,"Apartments in Buildings With--" "Air Conditioning Usage Indicators",,,"Detached","Attached","2 to 4 Units","5 or More Units","Mobile Homes" "Total",111.1,78.1,64.1,4.2,1.8,2.3,5.7 "Do Not Have Cooling Equipment",17.8,11.3,9.3,0.6,"Q",0.4,0.9 "Have Cooling Equipment",93.3,66.8,54.7,3.6,1.7,1.9,4.8 "Use Cooling Equipment",91.4,65.8,54,3.6,1.7,1.9,4.7

215

"Table HC3.11 Home Electronics Characteristics by Owner-Occupied Housing Unit, 2005"  

U.S. Energy Information Administration (EIA) Indexed Site

1 Home Electronics Characteristics by Owner-Occupied Housing Unit, 2005" 1 Home Electronics Characteristics by Owner-Occupied Housing Unit, 2005" " Million U.S. Housing Units" ,," Owner-Occupied Housing Units (millions)","Type of Owner-Occupied Housing Unit" ,"U.S. Housing Units (millions)" ,,,"Single-Family Units",,"Apartments in Buildings With--" "Home Electronics Characteristics",,,"Detached","Attached","2 to 4 Units","5 or More Units","Mobile Homes" "Total",111.1,78.1,64.1,4.2,1.8,2.3,5.7 "Personal Computers" "Do Not Use a Personal Computer ",35.5,20.3,14.8,1.2,0.6,0.9,2.8 "Use a Personal Computer",75.6,57.8,49.2,2.9,1.2,1.4,3 "Number of Desktop PCs"

216

"Table HC3.9 Home Appliances Characteristics by Owner-Occupied Housing Unit, 2005"  

U.S. Energy Information Administration (EIA) Indexed Site

HC3.9 Home Appliances Characteristics by Owner-Occupied Housing Unit, 2005" HC3.9 Home Appliances Characteristics by Owner-Occupied Housing Unit, 2005" " Million U.S. Housing Units" ,," Owner-Occupied Housing Units (millions)","Type of Owner-Occupied Housing Unit" ,"U.S. Housing Units (millions" ,,,"Single-Family Units",,"Apartments in Buildings With--" "Home Appliances Characteristics",,,"Detached","Attached","2 to 4 Units","5 or More Units","Mobile Homes" "Total U.S.",111.1,78.1,64.1,4.2,1.8,2.3,5.7 "Cooking Appliances" "Conventional Ovens" "Use an Oven",109.6,77.3,63.4,4.1,1.8,2.3,5.6 "1.",103.3,71.9,58.6,3.9,1.6,2.2,5.5 "2 or More",6.2,5.4,4.8,"Q","Q","Q","Q"

217

"Table HC3.6 Air Conditioning Characteristics by Owner-Occupied Housing Units, 2005"  

U.S. Energy Information Administration (EIA) Indexed Site

6 Air Conditioning Characteristics by Owner-Occupied Housing Units, 2005" 6 Air Conditioning Characteristics by Owner-Occupied Housing Units, 2005" " Million U.S. Housing Units" ,," Owner-Occupied Housing Units (millions)","Type of Owner-Occupied Housing Unit" ,"U.S. Housing Units (millions" ,,,"Single-Family Units",,"Apartments in Buildings With--" "Air Conditioning Characteristics",,,"Detached","Attached","2 to 4 Units","5 or More Units","Mobile Homes" "Total",111.1,78.1,64.1,4.2,1.8,2.3,5.7 "Do Not Have Cooling Equipment",17.8,11.3,9.3,0.6,"Q",0.4,0.9 "Have Cooling Equipment",93.3,66.8,54.7,3.6,1.7,1.9,4.8 "Use Cooling Equipment",91.4,65.8,54,3.6,1.7,1.9,4.7

218

"Table HC3.1 Housing Unit Characteristics by Owner-Occupied Housing Unit, 2005"  

U.S. Energy Information Administration (EIA) Indexed Site

Housing Unit Characteristics by Owner-Occupied Housing Unit, 2005" Housing Unit Characteristics by Owner-Occupied Housing Unit, 2005" " Million Housing Units" ,," Owner-Occupied Housing Units (millions)","Type of Owner-Occupied Housing Unit" ,"U.S. Housing Units (millions" ,,,"Single-Family Units",,"Apartments in Buildings With--" "Housing Unit Characteristics",,,"Detached","Attached","2 to 4 Units","5 or More Units","Mobile Homes" "Total",111.1,78.1,64.1,4.2,1.8,2.3,5.7 "Census Region and Division" "Northeast",20.6,13.4,10.4,1.4,1,0.3,0.4 "New England",5.5,3.8,3.1,"Q",0.3,"Q","Q" "Middle Atlantic",15.1,9.6,7.3,1.3,0.6,"Q","Q"

219

Local Option - Local Improvement Districts | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Local Option - Local Improvement Districts Local Option - Local Improvement Districts Local Option - Local Improvement Districts < Back Eligibility Commercial Industrial Multi-Family Residential Residential Program Info State Oregon Program Type PACE Financing Provider Oregon Department of Energy '''''Note: The Federal Housing Financing Agency (FHFA) issued a [http://www.fhfa.gov/webfiles/15884/PACESTMT7610.pdf statement] in July 2010 concerning the senior lien status associated with most PACE programs. In response to the FHFA statement, most local PACE programs have been suspended until further clarification is provided. ''''' Property-Assessed Clean Energy (PACE) financing effectively allows property owners to borrow money to pay for energy improvements. The amount borrowed is typically repaid via a special assessment on the property over a period

220

Security and privacy issues for the network of the future  

Science Conference Proceedings (OSTI)

The vision towards the Network of the Future cannot be separated from the fact that today's networks, and networking services are subject to sophisticated and very effective attacks. When these attacks first appeared, spoofing and distributed denial-of-service ... Keywords: networks, privacy, security

Giannis F. Marias; João Barros; Markus Fiedler; Andreas Fischer; Harald Hauff; Ralph Herkenhoener; Antonio Grillo; Alessandro Lentini; Luisa Lima; Charlott Lorentzen; Wojciech Mazurczyk; Hermann de Meer; Paulo F. Oliveira; George C. Polyzos; Enric Pujol; Krzysztof Szczypiorski; João P. Vilela; Tiago T. V. Vinhoza

2012-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "owner local privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Cyber Security and Privacy Landscape of the Electric Sector  

Science Conference Proceedings (OSTI)

This project provides ongoing updates on the status of research and development activities, federal and state policy and regulatory proposals, standards and guidance document development, key personnel, and organizations that are funding or executing smart grid cyber security and privacy activities.

2012-04-17T23:59:59.000Z

222

Model-based context privacy for personal data streams  

Science Conference Proceedings (OSTI)

Smart phones with increased computation and sensing capabilities have enabled the growth of a new generation of applications which are organic and designed to react depending on the user contexts. These contexts typically define the personal, social, ... Keywords: context streams, context-awareness, dynamic bayesian networks, information leakage, privacy

Supriyo Chakraborty; Kasturi Rangan Raghavan; Mani Srivastava; Harris Teague

2012-10-01T23:59:59.000Z

223

Analysis of privacy in online social networks of runet  

Science Conference Proceedings (OSTI)

In recent years, social networking sites (SNSs) gained high popularity among Internet users as they combine the best of both worlds: befriending people outside real life situations and staying in touch with people already known. An important aspect of ... Keywords: information revelation, privacy, security, social networking sites, trust

Slava Kisilevich; Florian Mansmann

2010-09-01T23:59:59.000Z

224

Protecting the sink location privacy in wireless sensor networks  

Science Conference Proceedings (OSTI)

Wireless sensor networks (WSNs) are widely deployed to collect data in military and civilian applications today. Due to the open nature of a WSN, it is relatively easy for an adversary to eavesdrop and trace packets in order to capture the receiver. ... Keywords: Location privacy, Receiver, Sink, WSN

Lin Yao, Lin Kang, Pengfei Shang, Guowei Wu

2013-06-01T23:59:59.000Z

225

Location privacy and resilience in wireless sensor networks querying  

Science Conference Proceedings (OSTI)

Due to the wireless nature of communication in sensor networks, the communication patterns between sensors could be leaked regardless of the adoption of encryption mechanisms-those would just protect the message content. However, communication patterns ... Keywords: Location privacy, Probabilistic algorithm, Resiliency, Security, Wireless sensor networks

Roberto Di Pietro; Alexandre Viejo

2011-03-01T23:59:59.000Z

226

Privacy nudges for social media: an exploratory Facebook study  

Science Conference Proceedings (OSTI)

Anecdotal evidence and scholarly research have shown that a significant portion of Internet users experience regrets over their online disclosures. To help individuals avoid regrettable online disclosures, we employed lessons from behavioral decision ... Keywords: facebook, nudge, online disclosure, privacy, soft paternalism

Yang Wang, Pedro Giovanni Leon, Kevin Scott, Xiaoxuan Chen, Alessandro Acquisti, Lorrie Faith Cranor

2013-05-01T23:59:59.000Z

227

Trusting to learn: trust and privacy issues in serious games  

Science Conference Proceedings (OSTI)

Organizations are increasingly investing in technology-enhanced learning systems to improve their employees' skills. Serious games are one example; the competitive and fun nature of games is supposed to motivate employee participation. But any system ... Keywords: privacy, serious games, technology-enhanced learning, trust

Miguel Malheiros; Charlene Jennett; Will Seager; M. Angela Sasse

2011-06-01T23:59:59.000Z

228

Private sector video surveillance in Toronto: not privacy compliant!  

Science Conference Proceedings (OSTI)

We report on the findings of a fieldwork study conducted on private sector video surveillance and signage in the Toronto area. The presence and operation of over 140 video surveillance camera schemes by large service providing corporations, in 2 major ... Keywords: PIPEDA, privacy, private sector, regulation, video surveillance

Andrew Clement; Joseph Ferenbok; Roxanna Dehghan; Laura Kaminker; Simeon Kanev

2012-02-01T23:59:59.000Z

229

Locanyms: towards privacy-preserving location-based services  

Science Conference Proceedings (OSTI)

Recent advances in geolocated capacities, secure and verified positioning techniques, ubiquitous connectivity, as well as mobile and embedded systems, have led to the development of a plethora of Location-Based Services (LBS), personalizing the services ... Keywords: location-based services, privacy, ubiquitous computing

Sebastien Gambs; Marc-Olivier Killijian; Matthieu Roy; Moussa Traore

2012-05-01T23:59:59.000Z

230

Stalking online: on user privacy in social networks  

Science Conference Proceedings (OSTI)

With the extreme popularity of Web and online social networks, a large amount of personal information has been made available over the Internet. On the other hand, advances in information retrieval, data mining and knowledge discovery technologies have ... Keywords: attacks, privacy, social networks, web

Yuhao Yang; Jonathan Lutes; Fengjun Li; Bo Luo; Peng Liu

2012-02-01T23:59:59.000Z

231

Security and privacy for geospatial data: concepts and research directions  

Science Conference Proceedings (OSTI)

Geospatial data play a key role in a wide spectrum of critical data management applications, such as disaster and emergency management, environmental monitoring, land and city planning, and military operations, often requiring the coordination among ... Keywords: GIS, geospatial data, privacy, security

Elisa Bertino; Bhavani Thuraisingham; Michael Gertz; Maria Luisa Damiani

2008-11-01T23:59:59.000Z

232

Measuring long-term location privacy in vehicular communication systems  

Science Conference Proceedings (OSTI)

Vehicular communication systems are an emerging form of communication that enables new ways of cooperation among vehicles, traffic operators, and service providers. However, many vehicular applications rely on continuous and detailed location information ... Keywords: Accumulated information, Entropy, Location privacy, Metric, Vehicular communication systems

Zhendong Ma; Frank Kargl; Michael Weber

2010-07-01T23:59:59.000Z

233

Trust enhanced ubiquitous payment without too much privacy loss  

Science Conference Proceedings (OSTI)

Computational models of trust have been proposed for use in ubicomp environments for deciding whether to allow customers to pay with an e-purse or not. In order to build trust in a customer, a means to link transactions using the same e-purse is required. ... Keywords: context, payment, privacy, trust, ubicomp

Jean-Marc Seigneur; Christian Damsgaard Jensen

2004-03-01T23:59:59.000Z

234

Proceedings of the Ninth Symposium on Usable Privacy and Security  

Science Conference Proceedings (OSTI)

Welcome to the Ninth Symposium On Usable Privacy and Security! This year's program features 15 technical papers, three workshops, 25 posters, 5 posters/papers published in the past year at other conferences, a panel, two lightning talks and demo sessions, ...

Lorrie Faith Cranor, Lujo Bauer, Konstantin Beznosov

2013-07-01T23:59:59.000Z

235

Impact of Personal Privacy Devices for WAAS Aviation Users  

E-Print Network (OSTI)

Impact of Personal Privacy Devices for WAAS Aviation Users Grace Xingxin Gao, Kazuma Gunning, Todd or monitored. Figure 1 lists some examples of PPDs currently for sale on Internet. They are low-cost jamming [3], potentially aviation users. Figure 1. PPDs for Sale on Internet Aviation users rely on Wide Area

Stanford University

236

Privacy-preserving smart metering with multiple data Consumers  

Science Conference Proceedings (OSTI)

The increasing diffusion of Automatic Meter Reading (AMR) and the possibility to open the system to third party services has raised many concerns about the protection of personal data related to energy, water or gas consumption, from which details about ... Keywords: Data privacy, Multiparty computation, Smart grid

Cristina Rottondi, Giacomo Verticale, Antonio Capone

2013-05-01T23:59:59.000Z

237

Privacy in the Smart Grid Smart Grid 101  

E-Print Network (OSTI)

Privacy in the Smart Grid #12;Smart Grid 101 Energy and information flows in many directions, from Distributed Generation & StorageThird party services #12;#12;Smart Grid Hopes/Promises #1 ­Better Utilization Grid Hopes/ Promisses (II) "The Smart Grid will:" · Reduce CO2 emissions by up to 480 MMT by 2020

Hoepman, Jaap-Henk

238

Solar PV Project Financing: Regulatory and Legislative Challenges for Third-Party PPA System Owners  

DOE Green Energy (OSTI)

Residential and commercial end users of electricity who want to generate electricity using on-site solar photovoltaic (PV) systems face challenging initial and O&M costs. The third-party ownership power purchase agreement (PPA) finance model addresses these and other challenges. It allows developers to build and own PV systems on customers? properties and sell power back to customers. However, third-party electricity sales commonly face five regulatory challenges. The first three challenges involve legislative or regulatory definitions of electric utilities, power generation equipment, and providers of electric services. These definitions may compel third-party owners of solar PV systems to comply with regulations that may be cost prohibitive. Third-party owners face an additional challenge if they may not net meter, a practice that provides significant financial incentive to owning solar PV systems. Finally, municipalities and cooperatives worry about the regulatory implications of allowing an entity to sell electricity within their service territories. This paper summarizes these challenges, when they occur, and how they have been addressed in five states. This paper also presents alternative to the third-party ownership PPA finance model, including solar leases, contractual intermediaries, standardized contract language, federal investment tax credits, clean renewable energy bonds, and waived monopoly powers.

Kollins, K.; Speer, B.; Cory, K.

2009-11-01T23:59:59.000Z

239

Table HC3.4 Space Heating Characteristics by Owner-Occupied Housing Unit, 2005  

U.S. Energy Information Administration (EIA) Indexed Site

.4 Space Heating Characteristics by Owner-Occupied Housing Unit, 2005 .4 Space Heating Characteristics by Owner-Occupied Housing Unit, 2005 Million U.S. Housing Units Total................................................................ 111.1 78.1 64.1 4.2 1.8 2.3 5.7 Do Not Have Space Heating Equipment....... 1.2 0.6 0.3 N Q Q Q Have Main Space Heating Equipment.......... 109.8 77.5 63.7 4.2 1.8 2.2 5.6 Use Main Space Heating Equipment............ 109.1 77.2 63.6 4.2 1.8 2.1 5.6 Have Equipment But Do Not Use It.............. 0.8 0.3 Q N Q Q Q Main Heating Fuel and Equipment Natural Gas.................................................. 58.2 41.8 35.3 2.8 1.2 1.0 1.6 Central Warm-Air Furnace........................ 44.7 34.8 29.7 2.3 0.7 0.6 1.4 For One Housing Unit........................... 42.9 34.3 29.5 2.3 0.6 0.6 1.4 For Two Housing Units..........................

240

Privacy Act Advisory | U.S. DOE Office of Science (SC)  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy Act Advisory Privacy Act Advisory Integrated Support Center (ISC) ISC Home About Services Freedom of Information Act (FOIA) Privacy Act Advisory Exemptions How to Submit a FOIA Request Fee Waiver and Reduction Criteria Electronic Reading Room ISC Conventional Reading Rooms Reference Links Privacy Act Categorical Exclusion Determinations Contact Information Integrated Support Center Roxanne Purucker U.S. Department of Energy 9800 S. Cass Avenue Argonne, IL 60439 P: (630) 252-2110 Larry Kelly U.S. Department of Energy 200 Administration Road Oak Ridge, TN 37830 P: (865) 576-0885 Freedom of Information Act (FOIA) Privacy Act Advisory Print Text Size: A A A RSS Feeds FeedbackShare Page To Contact Us Freedom of Information Act/Privacy Act Officer U.S. Department of Energy SC Integrated Support Center - Chicago

Note: This page contains sample records for the topic "owner local privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Freedom of Information Act (FOIA) and Privacy Act Requests | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Freedom of Information Act (FOIA) Freedom of Information Act (FOIA) and Privacy Act Requests Freedom of Information Act (FOIA) and Privacy Act Requests FOIA and Privacy Act Requests FOIA Requests FOIA information can be found at http://energy.gov/management/office-management/operational-management/freedom-information-act. Privacy Act Requests Privacy Act requests can not be submitted electronically. They must be submitted in writing or in person to: Cathy Harrell U.S. Department of Energy 1000 Independence Avenue, SW Washington, DC 20585 Be sure to include as much information as you can about when and where you worked, what records you are requesting, sign the request, and include copies of 2 forms of ID or a photo ID. You must either have your request notarized or 1) acknowledge that you understand the criminal penalty in the Privacy Act for requesting or

242

Privacy and identifiability in clinical research, personalized medicine, and public health surveillance  

E-Print Network (OSTI)

Electronic transmission of protected health information has become pervasive in research, clinical, and public health investigations, posing substantial risk to patient privacy. From clinical genetic screenings to publication ...

Cassa, Christopher A

2008-01-01T23:59:59.000Z

243

Lessons Learned From Implementation of Westinghouse Owners Group Risk-Informed Inservice Inspection Methodology for Piping  

SciTech Connect

Risk-informed inservice inspection (ISI) programs have been in use for over seven years as an alternative to current regulatory requirements in the development and implementation of ISI programs for nuclear plant piping systems. Programs using the Westinghouse Owners Group (WOG) (now known as the Pressurized Water Reactor Owners Group - PWROG) risk-informed ISI methodology have been developed and implemented within the U.S. and several other countries. Additionally, many plants have conducted or are in the process of conducting updates to their risk-informed ISI programs. In the development and implementation of these risk-informed ISI programs and the associated updates to those programs, the following important lessons learned have been identified and are addressed. Concepts such as 'loss of inventory', which are typically not modeled in a plant's probabilistic risk assessment (PRA) model for all systems. The importance of considering operator actions in the identification of consequences associated with a piping failure and the categorization of segments as high safety significant (HSS) or low safety significant (LSS). The impact that the above considerations have had on the large early release frequency (LERF) and categorization of segments as HSS or LSS. The importance of automation. Making the update process more efficient to reduce costs associated with maintaining the risk-informed ISI program. The insights gained are associated with many of the steps in the risk-informed ISI process including: development of the consequences associated with piping failures, categorization of segments, structural element selection and program updates. Many of these lessons learned have impacted the results of the risk-informed ISI programs and have impacted the updates to those programs. This paper summarizes the lessons learned and insights gained from the application of the WOG risk-informed ISI methodology in the U.S., Europe and Asia. (authors)

Stevenson, Paul R.; Haessler, Richard L. [Westinghouse Electric Company, LLC (United States); McNeill, Alex [Dominion Energy, Innsbrook Technical Center (United States); Pyne, Mark A. [Duke Energy (United States); West, Raymond A. [Dominion Nuclear Connecticut, Inc. - Dominion Generation (United States)

2006-07-01T23:59:59.000Z

244

Cyber Security and Privacy Industry Tracking Newsletter, April 2012  

Science Conference Proceedings (OSTI)

EPRI’s tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2012-04-11T23:59:59.000Z

245

Cyber Security and Privacy Industry Tracking Newsletter, April, 2013  

Science Conference Proceedings (OSTI)

EPRI’s tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2013-03-26T23:59:59.000Z

246

Cyber Security and Privacy Industry Tracking Newsletter, July 2013  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2013-06-25T23:59:59.000Z

247

Cyber Security and Privacy Industry Tracking Newsletter: December 2012  

Science Conference Proceedings (OSTI)

The Electric Power Research Institute (EPRI) remains committed to supporting the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts, EPRI works diligently to stay abreast of the present state of standards and guideline developments, as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups and insights into future activities.This ...

2012-12-28T23:59:59.000Z

248

Cyber Security and Privacy Industry Tracking Newsletter, October 2013  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2013-10-11T23:59:59.000Z

249

Cyber Security and Privacy Industry Tracking Newsletter, October 2012  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2012-09-26T23:59:59.000Z

250

Cyber Security and Privacy Industry Tracking Newsletter, July 2012  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2012-07-02T23:59:59.000Z

251

Citizen's Attitudes about Privacy While Accessing Government and Private  

E-Print Network (OSTI)

This paper reports the results of an investigation on citizens' attitudes and concerns regarding privacy and security on the Web, in general, and on the government websites they may visit, in particular. We examine to what extent those concerns can be alleviated by using a Secure Private Portal that protects citizen's personally identifying information when accessing government websites. The research project had two main goals: (a) to develop a comprehensive psychological instrument to assess citizens' attitudes and concerns regarding privacy and security on the Web; (b) to test the impact a Secure Private Portal may have on those concerns and on the way citizens use Government Websites. In order to accomplish these goals researchers from Columbia Business School and from Columbia departments of Computer Science and Psychology, developed and ran a web-based survey. Participants were recruited using online advertising through Google.com and provided their responses on the web. Early analyses of the results indicate a very high level of citizens' concerns regarding privacy and security of their personal data. Some of the concerns can appropriately be addressed only by fundamental policy changes. Furthermore, the results suggest that citizens perceive those sites which use secure portals as much safer and are more likely to visit them again. The results may indicate a new strategy for the presentation and design of government websites.

Websites Results Of; Salvatore J. Stolfo; Eric Johnson; Tomislav Pavlicic; Stephen Jan

2003-01-01T23:59:59.000Z

252

Plug-in privacy for Smart Metering billing  

E-Print Network (OSTI)

Smart Metering is a concept that allows to collect fine-grained consumption profiles from customers by replacing traditional electricity meters with Smart Meters in customers' households. The recorded consumption profile is the basis for the calculation of time-dependent tariffs but also allows deduction of the inhabitant's personal schedules and habits. The current reporting of such consumption profiles only protects this data from 3rd parties but falls short to protect the customer's privacy from illegitimate abuse by the supplier itself. We propose a privacy-preserving profile reporting protocol that enables billing for time-dependent tariffs without disclosing the actual data of the consumption profile to the supplier. Our approach relies on a zero-knowledge proof based on Pedersen Commitments performed by a plug-in privacy component that is put into the communication link between Smart Meter and supplier's back-end systems and requires no change to Smart Meter hardware and only little change to the softw...

Jawurek, Marek; Kerschbaum, Florian

2010-01-01T23:59:59.000Z

253

Managing the Costs of Informational Privacy: Pure Bundling as a Strategy in the Individual Health Insurance Market  

Science Conference Proceedings (OSTI)

Advances in genetic testing and data mining technologies have increased the availability of genetic information to insurance companies and insureds (applicants and policy holders) in the individual health insurance market (IHIM). Regulators, concerned ... Keywords: Bundling Information Privacy Insurance Markets Insurey Words And Phrases Ance Policy Privacy Privacy Cost

Matt E. Thatcher; Eric K. Clemons

2000-08-01T23:59:59.000Z

254

Privacy and security issues in cloud computing: The role of institutions and institutional evolution  

Science Conference Proceedings (OSTI)

Cloud computing is likened and equated to the Industrial Revolution. Its transformational nature is, however, associated with significant security and privacy risks. This paper investigates how the contexts provided by formal and informal institutions ... Keywords: Cloud computing, Contradictions, Institutional changes, Institutions, Privacy and security, Trust production process

Nir Kshetri

2013-05-01T23:59:59.000Z

255

Security and privacy implications of cloud computing: lost in the cloud  

Science Conference Proceedings (OSTI)

Cloud computing - the new paradigm, the future for IT consumer utility, the economy of scale approach, the illusion of un infinite resources availability, yet the debate over security and privacy issues is still undergoing and a common policy framework ... Keywords: cloud computing, data, information, network, privacy, security

Vassilka Tchifilionova

2010-03-01T23:59:59.000Z

256

Tracking website data-collection and privacy practices with the iWatch web crawler  

Science Conference Proceedings (OSTI)

In this paper we introduce the iWatch web crawler, a tool designed to catalogue and analyze online data practices and the use of privacy related indicators and technologies. Our goal in developing iWatch was to make possible a new type of analysis of ... Keywords: P3P, cookies, data-collection practices, demographics, legislative impact, privacy, web-crawling, webbugs

Carlos Jensen; Chandan Sarkar; Christian Jensen; Colin Potts

2007-07-01T23:59:59.000Z

257

Privacy-preserving smart metering with regional statistics and personal enquiry services  

Science Conference Proceedings (OSTI)

In smart grid, households may send the readings of their energy usage to the utility and a third-party service provider which provides analyzed statistics data to users. User privacy becomes an important issue in this application. In this paper, we propose ... Keywords: authentication, privacy, smart metering

Cheng-Kang Chu; Joseph K. Liu; Jun Wen Wong; Yunlei Zhao; Jianying Zhou

2013-05-01T23:59:59.000Z

258

"I know what you did last summer": query logs and user privacy  

Science Conference Proceedings (OSTI)

We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of users in web search query logs. We study the application of simple classifiers to map a sequence of queries into the gender, age, and location of the user ... Keywords: k-anonymity, privacy, query log analysis

Rosie Jones; Ravi Kumar; Bo Pang; Andrew Tomkins

2007-11-01T23:59:59.000Z

259

"Don't trust anyone": Privacy protection for location-based services  

Science Conference Proceedings (OSTI)

We present a decentralized approach that exploits the capability of mobile devices to form wireless personal ad-hoc networks in order to protect the privacy of users who access location-based services. The novelty of our approach is that users do not ... Keywords: Anonymity, Location-based service, Obfuscation, Privacy, Trust

Tanzima Hashem; Lars Kulik

2011-02-01T23:59:59.000Z

260

Resuscitating privacy-preserving mobile payment with customer in complete control  

Science Conference Proceedings (OSTI)

Credit/debit card payment transactions do not protect the privacy of the customer. Once the card is handed over to the merchant for payment processing, customers are "no longer in control" on how their card details and money are handled. This leads to ... Keywords: Customer centric payment model, Near field communication (NFC), Privacy, RFID, Secure mobile payment, Smartphone application

Divyan Munirathnam Konidala; Made Harta Dwijaksara; Kwangjo Kim; Dongman Lee; Byoungcheon Lee; Daeyoung Kim; Soontae Kim

2012-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "owner local privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Notice of Privacy Practices THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE  

E-Print Network (OSTI)

extent of the law. In addition to various laws governing your privacy, we have our own privacy policies medical treatment you have received and about payment for health care you have received. It is our policy, counterintelligence, and other national security activities. 5. Individual Rights Access. You have the right

Salama, Khaled

262

Privacy-awareness information for web forums: results from an empirical study  

Science Conference Proceedings (OSTI)

While interacting with others on the internet, users share a lot of personal data with a potentially large but "invisible" audience. An important issue is maintaining control over personal data and therefore, in the first place, users need to be aware ... Keywords: empirical study, forum, privacy, privacy awareness, social software, social web, user-centered design

Stefanie Pötzsch; Peter Wolkerstorfer; Cornelia Graf

2010-10-01T23:59:59.000Z

263

A comparative study of online privacy regulations in the U.S. and China  

Science Conference Proceedings (OSTI)

Online privacy seeks to protect the identity of individuals who use the internet to collect information or express opinions. However, given the proliferating vehicles through which one's identity can be ascertained, the question remains as to what policies ... Keywords: China, Internet, Privacy, United States

Yanfang Wu; Tuenyu Lau; David J. Atkin; Carolyn A. Lin

2011-08-01T23:59:59.000Z

264

Genomic Research and Data-Mining Technology: Implications for Personal Privacy and Informed Consent  

Science Conference Proceedings (OSTI)

This essay examines issues involving personal privacy and informed consent that arise at the intersection of information and communication technology (ICT) and population genomics research. I begin by briefly examining the ethical, legal, and social ... Keywords: data mining, deCODE Genetics, distributional group profiles, epidemiology, genetic exceptionalism, genomic research, informed consent, non-distributional group profiles, personal privacy, population genomics

Herman T. Tavani

2004-03-01T23:59:59.000Z

265

Legal concepts meet technology: a 50-state survey of privacy laws  

Science Conference Proceedings (OSTI)

Informational privacy consists of the ability to control how others use our personal information. Over the past several decades, we have lost a significant degree of control as a result of advances in information processing technology and the rise of ... Keywords: data disposal, data security, personally identifying information, privacy, state law

Miriam B. Russom; Robert H. Sloan; Richard Warner

2011-12-01T23:59:59.000Z

266

My profile is my password, verify me!: the privacy/convenience tradeoff of facebook connect  

Science Conference Proceedings (OSTI)

We performed a laboratory experiment to study the privacy tradeoff offered by Facebook Connect: disclosing Facebook profile data to third-party websites for the convenience of logging in without creating separate accounts. We controlled for trustworthiness ... Keywords: facebook connect, privacy, user study

Serge Egelman

2013-04-01T23:59:59.000Z

267

Android and iOS users' differences concerning security and privacy  

Science Conference Proceedings (OSTI)

We compare Android and iOS users according to their demographic differences, security and privacy awareness, and reported behavior when installing apps. We present an exploratory study based on an online survey with more than 700 German students and ... Keywords: android, ios, iphone, personal data, privacy awareness, security awareness, smartphone

Zinaida Benenson; Freya Gassmann; Lena Reinfelder

2013-04-01T23:59:59.000Z

268

UDP: Usage-based Dynamic Pricing with Privacy Preservation for Smart Grid  

E-Print Network (OSTI)

UDP: Usage-based Dynamic Pricing with Privacy Preservation for Smart Grid Xiaohui Liang, Student for smart grid in a community environment, which enables the electricity price to correspond-preserving manner. Index Terms--Smart grid; dynamic price; privacy preserva- tion; community-specific I

Shen, Xuemin "Sherman"

269

Table HC1-5a. Housing Unit Characteristics by Type of Owner-Occupied Housing Unit,  

U.S. Energy Information Administration (EIA) Indexed Site

5a. Housing Unit Characteristics by Type of Owner-Occupied Housing Unit, 5a. Housing Unit Characteristics by Type of Owner-Occupied Housing Unit, Million U.S. Households, 2001 Housing Unit Characteristics RSE Column Factor: Total Owner- Occupied Units Type of Owner-Occupied Housing Unit RSE Row Factors Single-Family Apartments in Buildings With Mobile Homes Two to Four Units Five or More Units 0.4 0.4 1.8 2.1 1.4 Total ............................................... 72.7 63.2 2.1 1.8 5.7 6.7 Census Region and Division Northeast ...................................... 13.0 10.8 1.1 0.5 0.6 11.4 New England .............................. 3.5 3.1 0.2 Q 0.1 16.9 Middle Atlantic ............................ 9.5 7.7 0.9 0.4 0.4 13.4 Midwest ......................................... 17.5 16.0 0.3 Q 1.0 10.3 East North Central ......................

270

47318 Federal Register / Vol. 77, No. 153 / Wednesday, August 8, 2012 / Rules and Regulations bluefin tuna landed by owners of  

E-Print Network (OSTI)

bluefin tuna landed by owners of vessels not permitted to do so under § 635.4, or purchase, receive, or transfer, or attempt to purchase, receive, or transfer Atlantic bluefin tuna without the appropriate valid Federal Atlantic tunas dealer permit issued under § 635.4. Purchase, receive, or transfer or attempt

271

The consumer's guide to earth sheltered housing: A step-by-step workbook for prospective owners  

SciTech Connect

Earth sheltered homes have captured the imagination of many homeowners seeking the cost and energy savings features they offer. This book provides the discussion of the advantages and disadvantages of such homes and includes illustrations showing interiors and exteriors with advise to owners on dealine with architects and contractors.

Rollwagen, M.

1985-01-01T23:59:59.000Z

272

Table HC7-5a. Home Office Equipment by Type of Owner-Occupied Housing Unit,  

U.S. Energy Information Administration (EIA) Indexed Site

5a. Home Office Equipment by Type of Owner-Occupied Housing Unit, 5a. Home Office Equipment by Type of Owner-Occupied Housing Unit, Million U.S. Households, 2001 Home Office Equipment RSE Column Factor: Total Owner- Occupied Units Type of Owner-Occupied Housing Unit RSE Row Factors Single-Family Apartments in Buildings With Mobile Home Two to Four Units Five or More Units 0.3 0.3 2.1 3.0 1.6 Total ............................................... 72.7 63.2 2.1 1.8 5.7 6.7 Households Using Office Equipment .......................... 67.5 59.0 2.0 1.7 4.8 7.0 Personal Computers 1 ................... 45.7 41.1 1.3 0.9 2.4 8.6 Number of Desktop PCs 1 .................................................. 34.1 30.5 1.0 0.7 1.9 9.7 2 or more .................................... 7.4 7.0 Q Q 0.2 18.4 Number of Laptop PCs 1 ..................................................

273

EI04~ PRIVACY IMPACT ASSESSMENT: INL PeopleSoft Human Resource  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EI04~ PRIVACY IMPACT ASSESSMENT: INL PeopleSoft - Human Resource System PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT June 11, 2009 oep"rtrnental Element &Site Idaho National Laboratory (INL) Building Number: REC 608 Building Name: IORC Name 'of Infonnatlon System, or IT Project INL PeopleSoft - Human Resource System exhibit ProJect UID 157044 NewPIA D Update ~ _____ i DOE PIA - Peoplesoft Final.doc

274

An Information-Theoretic Privacy Criterion for Query Forgery in Information Retrieval  

E-Print Network (OSTI)

In previous work, we presented a novel information-theoretic privacy criterion for query forgery in the domain of information retrieval. Our criterion measured privacy risk as a divergence between the user's and the population's query distribution, and contemplated the entropy of the user's distribution as a particular case. In this work, we make a twofold contribution. First, we thoroughly interpret and justify the privacy metric proposed in our previous work, elaborating on the intimate connection between the celebrated method of entropy maximization and the use of entropies and divergences as measures of privacy. Secondly, we attempt to bridge the gap between the privacy and the information-theoretic communities by substantially adapting some technicalities of our original work to reach a wider audience, not intimately familiar with information theory and the method of types.

Rebollo-Monedero, David; Forné, Jordi

2011-01-01T23:59:59.000Z

275

Online query answering with differential privacy: a utility-driven approach using Bayesian inference  

E-Print Network (OSTI)

Data privacy issues frequently and increasingly arise for data sharing and data analysis tasks. In this paper, we study the problem of online query answering under the rigorous differential privacy model. The existing interactive mechanisms for differential privacy can only support a limited number of queries before the accumulated cost of privacy reaches a certain bound. This limitation has greatly hindered their applicability, especially in the scenario where multiple users legitimately need to pose a large number of queries. To minimize the privacy cost and extend the life span of a system, we propose a utility-driven mechanism for online query answering using Bayesian statistical inference. The key idea is to keep track of the query history and use Bayesian inference to answer a new query using previous query answers. The Bayesian inference algorithm provides both optimal point estimation and optimal interval estimation. We formally quantify the error of the inference result to determine if it satisfies t...

Xiao, Yonghui

2012-01-01T23:59:59.000Z

276

Safety Evaluation Report related to Hydrogen Control Owners Group assessment of Mark 3 containments  

DOE Green Energy (OSTI)

Title 10 of the Code of Federal Regulations (10 CFR), Section 50.44 Standards for Combustible Gas Control System in Light-Water-Cooled Power Reactors,'' requires that systems be provided to control hydrogen concentration in the containment atmosphere following an accident to ensure that containment integrity is maintained. The purpose of this report is to provide regulatory guidance to licensees with Mark III containments with regard to demonstrating compliance with 10 CFR 50.44, Section (c)(3)(vi) and (c)(3)(vii). In this report, the staff provides its evaluation of the generic methodology proposed by the Hydrogen Control Owners Group. This generic methodology is documented in Topical Report HGN-112-NP, Generic Hydrogen Control Information for BWR/6 Mark III Containments.'' In addition, the staff has recommended that the vulnerability to interruption of power to the hydrogen igniters be evaluated further on a plant-specific basis as part of the individual plant examination of the plants with Mark III containments. 10 figs., 1 tab.

Li, C.Y.; Kudrick, J.A.

1990-10-01T23:59:59.000Z

277

location privacy based on trusted computing and secure logging  

E-Print Network (OSTI)

Many operators of cellphone networks now offer locationbased services to their customers, whereby an operator often outsources service provisioning to a third-party provider. Since a person’s location could reveal sensitive information about the person, the operator must ensure that the service provider processes location information about the operator’s customers in a privacy-preserving way. So far, this assurance has been based on a legal contract between the operator and the provider. However, there has been no technical mechanism that lets the operator verify whether the provider adheres to the privacy policy outlined in the contract. We propose an architecture for location-based services based on Trusted Computing and Secure Logging that provides such a technical mechanism. Trusted Computing lets an operator query the configuration of a location-based service. The operator will hand over location information to the service only if the service is configured such that the service provider cannot get access to location information using software-based attacks. This includes passive attacks, where the provider monitors information flowing into and out of its service, and active attacks, where the provider modifies or injects customer queries to the service. We introduce several requirements that must be satisfied by a location-based service to defend against passive attacks. Furthermore, we present Secure Logging, an auditing mechanism to defend against active attacks.

Urs Hengartner

2008-01-01T23:59:59.000Z

278

STEPS TO ESTABLISH A REAL-TIME TRANSMISSION MONITORING SYSTEM FOR TRANSMISSION OWNERS AND OPERATORS WITHIN THE  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

STEPS TO ESTABLISH A REAL-TIME TRANSMISSION MONITORING STEPS TO ESTABLISH A REAL-TIME TRANSMISSION MONITORING SYSTEM FOR TRANSMISSION OWNERS AND OPERATORS WITHIN THE EASTERN AND WESTERN INTERCONNECTIONS A REPORT TO CONGRESS PURSUANT TO SECTION 1839 OF THE ENERGY POLICY ACT OF 2005 Prepared by United States Department of Energy & Federal Energy Regulatory Commission February 3, 2006 Report to Congress Joint Report by the Department of Energy and Federal Energy Regulatory Commission on Steps to Establish a Real-Time Transmission Monitoring System for Transmission Owners and Operators within the Eastern and Western Interconnections February 2006 Executive Summary In August 2003, an electrical outage in one state precipitated a cascading blackout across seven other states and as far north as a province in Canada, leaving more than 50 million

279

Pettisville Local Schools | Open Energy Information  

Open Energy Info (EERE)

Pettisville Local Schools Pettisville Local Schools Jump to: navigation, search Name Pettisville Local Schools Facility Pettisville Local Schools Sector Wind energy Facility Type Community Wind Facility Status In Service Owner Pettisville Local Schools Developer Pettisville Local Schools Energy Purchaser Pettisville Local Schools Location Wauseon OH Coordinates 41.52792917°, -84.22510743° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":41.52792917,"lon":-84.22510743,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

280

OSTIblog Online Privacy Policy | OSTI, US Dept of Energy, Office of  

Office of Scientific and Technical Information (OSTI)

Online Privacy Policy Online Privacy Policy We at OSTI.gov are committed to protecting the privacy and security of your visits to this Website. Outlined below is our online privacy policy. If you have questions about this policy, please let us know. Collection and disclosure of information: To ensure we are able to communicate effectively with visitors to our web site, we collect some information that can be directly associated with a specific person. We call this "Personal Information," and it includes, by way of illustration, names, addresses, telephone numbers and e-mail addresses. We collect Personal Information from eligible individuals who affirmatively request to receive e-mail or other services from us. We collect this Personal Information in order to provide these eligible individuals with

Note: This page contains sample records for the topic "owner local privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

The Role of Narcissism on Concerns for SNS Privacy: Vulnerable Narcissism in Threatening Situations.  

E-Print Network (OSTI)

??This study aims to identify psychological factors that predict one’s likelihood to disengage with privacy-threatening activities on Social Networking Sites (SNS). Particularly, it pays special… (more)

Kwolek, Elizabeth A.

2012-01-01T23:59:59.000Z

282

Evaluating Laplace Noise Addition to Satisfy Differential Privacy for Numeric Data  

Science Conference Proceedings (OSTI)

Laplace noise addition is often advanced as an approach for satisfying differential privacy. There have been several illustrations of the application of Laplace noise addition for count data, but no evaluation of its performance for numeric data. In ...

Rathindra Sarathy; Krishnamurty Muralidhar

2011-04-01T23:59:59.000Z

283

NBP RFI: Data Access, Third Party Use and Privacy- Comments of Utilities  

NLE Websites -- All DOE Office Websites (Extended Search)

Use and Privacy- Comments of Use and Privacy- Comments of Utilities Telecom Council NBP RFI: Data Access, Third Party Use and Privacy- Comments of Utilities Telecom Council The Utilities Telecom Council hereby comments in response to the Department of Energy (DOE) request for information on data access, third party use, and privacy. In summary, UTC submits that the innovative deployment by energy utilities of smart meters and smart control systems will create a smart energy grid that will unlock the value of what has been called the Energy Information Economy2. Smart energy grids will create an environment in which consumers will have greater abilities to manage their own energy usage and utilities will have new tools to affect grid-wide energy efficiencies never before possible. The key to all this is data. How to provide secure access to it

284

Proceedings of the 3rd symposium on Usable privacy and security  

Science Conference Proceedings (OSTI)

Welcome to the Third Symposium On Usable Privacy and Security! This year's program features 13 technical papers, a workshop, two tutorials, 16 posters, a panel, three discussion sessions, and an invited talk. Continuing the tradition of interesting SOUPS ...

Lorrie Faith Cranor

2007-07-01T23:59:59.000Z

285

Cyber Security and Privacy Landscape of the Electric Sector: Release 2  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies, such as the Department of Energy (DOE), the Department of Homeland Security (DHS), the Department of Defense (DOD), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the eff...

2012-07-02T23:59:59.000Z

286

DEPARTMENT OF ENERGY DATA ACCESS AND PRIVACY ISSUES RELATED TO SMART GRID  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DEPARTMENT OF ENERGY DEPARTMENT OF ENERGY DATA ACCESS AND PRIVACY ISSUES RELATED TO SMART GRID TECHNOLOGIES October 5, 2010 i TABLE OF CONTENTS INTRODUCTION AND EXECUTIVE SUMMARY.................................................................... 1 Overview of Data Access and Privacy Concerns ....................................................................... 2 Summary of Recommendations .................................................................................................. 3 KEY FINDINGS ............................................................................................................................. 4 Consumer education and flexibility in both technology and pace of deployment will be critical to the long-term success of Smart Grid technologies. ................................................................ 7

287

Assessment of Technology Used to Protect the Privacy of Energy Usage Data  

Science Conference Proceedings (OSTI)

This EPRI Technical Update Report discusses proposed privacy enhancing technologies (PETs) that are applicable to advanced metering infrastructure (AMI) deployments.BackgroundNew laws are beginning to come into effect in California and Colorado in the United States and in European countries such as Germany. Ohio and the European Commission are contemplating additional laws.Potential privacy problems arise from the granularity and detail of ...

2012-12-31T23:59:59.000Z

288

Cyber Security and Privacy Landscape of the Electric Sector, Release 5  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2013-03-27T23:59:59.000Z

289

Zero-knowledge device authentication: Privacy & security enhanced RFID preserving business value and consumer convenience  

E-Print Network (OSTI)

expected to enhance the operational efficiency of supply chain processes and customer service as well as adding digital functionality to products that were previously non-digital such as, e.g., washing machines automatically adapting to the clothes put into the machine. However, consumer response clearly shows significant concern and resistance related to consumer tracking and profiling as well as problems related to government tracking, criminal or terrorist abuse etc. Multiple conferences warn that RFID take-up is likely dependant on solving the privacy and security problems early. These concerns are not adequately addressed by current technology and legislation. In this paper, we present a model of the lifecycle of RFID tags used in the retail sector and identify the different actors who may interact with a tag. The lifecycle model is analysed in order to identify potential threats to the privacy of consumers and define a threat model. We suggest that the in-store problem is more related to lack of privacy solutions for the consumer himself than for the RFID. We propose a solution to the RFID privacy problem, which through zero-knowledge protocols and consumer control of keys has the potential to ensure consumer privacy needs without reducing corporate value from utilising the potential of RFID. We propose that securing RFIDs will require a physical redesign of RFIDs but that this can be done without leaving security and privacy issues to consent or regulation.

Stephan J. Engberg; Morten B. Harning; Christian Damsgaard Jensen

2004-01-01T23:59:59.000Z

290

Microsoft Word - DOE comments privacy - 7-6 _2_.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DEPARTMENT OF ENERGY In the Matter of Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy ) ) ) ) ) ) ) COMMENTS OF VERIZON AND VERIZON WIRELESS The development and deployment of smart grid technology hold tremendous promise towards improving the efficiency and reliability of our nation's energy systems and empowering consumers to make better decisions about the use of electricity. Because effective communications networks will be central to the success of smart grid technology, Verizon is working closely with utilities, the developers of energy management systems, and others to use its extensive wireline and wireless broadband networks and related expertise to quickly and efficiently realize the promise of smart grid

291

The University of Texas at Austin Web Privacy Policy Office of the Chief Information Officer Written By: Chief Information Security Officer/  

E-Print Network (OSTI)

The University of Texas at Austin Web Privacy Policy Office of the Chief Information Officer....................................................................................................................5 13. Texas Public Information Act ..........................................................................................................................................6 1. Purpose The University of Texas at Austin (U. T. Austin) is committed to ensuring the privacy

Texas at Austin, University of

292

State and local governments | ENERGY STAR Buildings & Plants  

NLE Websites -- All DOE Office Websites (Extended Search)

State and local governments State and local governments Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and managers Existing buildings Commercial new construction Industrial energy management Small business Service providers Service and product providers Verify applications for ENERGY STAR certification Design commercial buildings Energy efficiency program administrators Commercial and industrial program sponsors Associations State and local governments Federal agencies Tools and resources Training In this section Policies that specify the use of ENERGY STAR tools Campaigns and incentive programs that incorporate ENERGY STAR Lead by example Gather support Develop programs and policies Host a competition Use financing vehicles Promote energy efficiency State and local governments

293

Channels and sources used to gather equine-related information by college-age horse owners and enthusiasts  

E-Print Network (OSTI)

This thesis identifies the equine-related topics that are important to Texas college-age horse owners and enthusiasts and the channels/sources they use to get equine-related information. Little research has focused on this group to determine their information needs. Therefore, two focus groups were conducted in 2008 in Texas with college-age horse owners and enthusiasts to conduct a needs assessment. Participants were separated into competitive and recreational groups depending on their level of participation in the industry. They were asked what topics they consider important and what channels/sources they use to gain desired information. Training was the most mentioned topic overall, and the most mentioned by recreational participants. Alternative medical treatments was the most mentioned topic by competitive participants. Competitive participants reported a smaller number of topics as important, indicating that they have specialized information needs. Recreational participants emphasized broader, less specialized topics. Participants showed an interest in relevant and controversial topics affecting the equine industry. Participants also used a combination of channels/sources and competitive and recreational participants often placed importance on different channels/sources. Face-to-face communication was important to both groups. Magazines were important to competitive participants, while the Internet was important to recreational participants. Competitive participants doubted the trustworthiness of sources available through the Internet, but wanted more reliable sources to be made available in the future. Participants preferred to get information from industry specialist sources, such as trainers, veterinarians, other owners and enthusiasts, breed associations, and equine magazines. Participants’ perceptions of trustworthiness were affected by the source’s ability to demonstrate equine-specific knowledge and the source’s reputation and success among equine industry members. The results suggests that the influence of the Internet has altered the traditional models of communication in which source selection determines channel use. In this study, the participants’ Internet channel selection often determined their source use. The results also suggests that communicators wanting to reach this audience should target specific topics to competitive and recreational audiences, use a multi-channel approach, establish trustworthiness, and explore the changing role of the Internet in agricultural communication.

Sullivan, Erin Alene

2008-12-01T23:59:59.000Z

294

Design and Evaluation of an Architecture for Location Privacy  

E-Print Network (OSTI)

Many operators of cellphone networks now offer location-based services to their customers, whereby an operator often outsources service provisioning to a third-party provider. Since a person’s location could reveal sensitive information about the person, the operator must ensure that the service provider processes location information about the operator’s customers in a privacy-preserving way. We propose an architecture for location-based services based on Trusted Computing and Secure Logging. Trusted Computing lets an operator query the configuration of a location-based service. The operator will hand over location information to the service only if the service is configured such that the service provider cannot get access to location information using software-based attacks. This includes passive attacks, where the provider monitors the composition or the timing of information flowing into and out of its service, and active attacks, where the provider modifies or injects customer queries to the service. We introduce several requirements that must be satisfied by a location-based service to defend against passive attacks. Furthermore, we present Secure Logging, an auditing mechanism to defend against active attacks. We present an implementation of our architecture and demonstrate its usefulness by building two sample location-based services on top of it. The evaluation of our architecture shows that its processing delay is hardly noticeable and that timing attacks are very unlikely to succeed. 1

Urs Hengartner

2008-01-01T23:59:59.000Z

295

NBP RFI: Data Access, Third Party Use, and Privacy- Comments of Oncor  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NBP RFI: Data Access, Third Party Use, and Privacy- Comments of NBP RFI: Data Access, Third Party Use, and Privacy- Comments of Oncor Electric Deliverty Company LLC NBP RFI: Data Access, Third Party Use, and Privacy- Comments of Oncor Electric Deliverty Company LLC Oncor Electric Delivery Company LLC (Oncor) is a regulated electric transmission and distribution utility that serves the north-central, eastern and western parts of Texas, including the cities of Dallas and Fort Worth. Oncor operates the largest electric transmission and distribution system in Texas, delivering power to over 3 million homes and businesses and operating approximately 117,000 miles of distribution and transmission lines in Texas. Oncor operates in a unique market in which only competitive Retail Electric Providers (REPs) who are not utilities sell electricity to

296

NBP RFI: Data Access, Third Party Use, and Privacy- Comments of Oncor  

NLE Websites -- All DOE Office Websites (Extended Search)

Use, and Privacy- Comments of Use, and Privacy- Comments of Oncor Electric Deliverty Company LLC NBP RFI: Data Access, Third Party Use, and Privacy- Comments of Oncor Electric Deliverty Company LLC Oncor Electric Delivery Company LLC (Oncor) is a regulated electric transmission and distribution utility that serves the north-central, eastern and western parts of Texas, including the cities of Dallas and Fort Worth. Oncor operates the largest electric transmission and distribution system in Texas, delivering power to over 3 million homes and businesses and operating approximately 117,000 miles of distribution and transmission lines in Texas. Oncor operates in a unique market in which only competitive Retail Electric Providers (REPs) who are not utilities sell electricity to end-use consumers, and the transmission and distribution utilities (who are

297

Understanding Motivations for Facebook Use: Usage Metrics, Network Structure, and Privacy  

E-Print Network (OSTI)

This study explores the links between motives for using a social network service and numerical measures of that activity. Specifically, it identified motives for Facebook use by employing a Uses and Gratifications (U&G) approach and then investigated the extent to which these motives can be predicted through usage and network metrics collected automatically via the Facebook API. In total, 11 Facebook usage metrics and eight personal network metrics served as predictors. Results showed that all three variable types in this expanded U&G frame of analysis (covering social antecedents, usage metrics, and personal network metrics) effectively predicted motives and highlighted interesting behaviors. To further illustrate the power of this framework, the intricate nature of privacy in social media was explored and relationships drawn between privacy attitudes (and acts) and measures of use and network structure. Author Keywords Uses and gratifications; social network sites; social networks; Facebook; privacy; computer-mediated communication.

Tasos Spiliotopoulos; Ian Oakley

2013-01-01T23:59:59.000Z

298

Message from the Owner of the Improved Financial Performance Initiative of the Presidents Management Agenda:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

I am enthusiastic and proud to be the owner of the Improved Financial Performance initiative of the President's Management Agenda (PMA) in the Department of Energy (DOE). The Department has received clean opinions on its annual financial statements for six straight years with no material internal control weaknesses identified by the auditors. Further, DOE was successful in maintaining its clean opinion for the FY 2004 financial statements while accelerating issuance to 45 days after the end of the fiscal year. For the third quarter of FY 2004, when the Department of Energy received a Green status score on Improved Financial Performance, DOE was one of only five agencies with a Green status score on this initiative. I am enormously proud

299

Microsoft Word - UTC Comments DOE RFI Data Access Privacy Final.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Before the Before the Department of Energy Washington, D.C. 20585 In the Matter of Implementing the National Broadband Plan by Empowering Consumers and The Smart Grid: Data Access, Third Party Use and Privacy ) ) ) ) NBP RFI: Data Access, Third Party Use and Privacy COMMENTS OF UTILITIES TELECOM COUNCIL Michael Oldak, Vice President & General Counsel Brett Kilbourne, Director of Regulatory Service & Associate Counsel Utilities Telecom Council 1901 Pennsylvania Avenue, NW Fifth Floor Washington, DC 20006 202-872-0030 July 12, 2010 TABLE OF CONTENTS Introduction .................................................................................................................................... 2 Questions....................................................................................................................................... 3

300

State and local government resources | ENERGY STAR Buildings & Plants  

NLE Websites -- All DOE Office Websites (Extended Search)

State and local government resources State and local government resources Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and managers Existing buildings Commercial new construction Industrial energy management Small business Service providers Service and product providers Verify applications for ENERGY STAR certification Design commercial buildings Energy efficiency program administrators Commercial and industrial program sponsors Associations State and local governments Federal agencies Tools and resources Training In This Section Campaigns Commercial building design Communications resources Energy management guidance Financial resources Portfolio Manager Products and purchasing Recognition Research and reports Service and product provider (SPP) resources Success stories

Note: This page contains sample records for the topic "owner local privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

IBEW Local 103 Wind Farm | Open Energy Information  

Open Energy Info (EERE)

IBEW Local 103 Wind Farm IBEW Local 103 Wind Farm Jump to: navigation, search Name IBEW Local 103 Wind Farm Facility IBEW Local 103 Sector Wind energy Facility Type Small Scale Wind Facility Status In Service Owner IBEW Local 103 Developer IBEW Local 103 Energy Purchaser IBEW Local 103 Location Dorchester MA Coordinates 42.3071°, -71.0331° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":42.3071,"lon":-71.0331,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

302

Selling power back to the grid in a secure and privacy-preserving manner  

Science Conference Proceedings (OSTI)

Smart grid facilitates a customer to sell unused or self-generated power back to the grid. This not only helps the power operator to reduce power generation, but also brings customers a means of getting revenue. However, the process of power selling ... Keywords: anonymous credential, authentication, blind signature, power selling, privacy-preservation, smart grid

Tat Wing Chim; Siu Ming Yiu; Lucas Chi Kwong Hui; Victor On Kwok Li; Tin Wing Mui; Yu Hin Tsang; Chun Kin Kwok; Kwun Yin Yu

2012-10-01T23:59:59.000Z

303

Pythia: a privacy aware, peer-to-peer network for social search  

Science Conference Proceedings (OSTI)

Emerging "live social search" systems such as Aardvark.com allow users to pose questions to their social network in real time. People can thus obtain answers from real humans for questions that prove too complex for web searches. Centralized systems ... Keywords: peer-to-peer, privacy, question-and-answer systems, social search

Shirin Nilizadeh; Naveed Alam; Nathaniel Husted; Apu Kapadia

2011-10-01T23:59:59.000Z

304

Conflicts between privacy and property: The discourse in personal and organizational knowledge  

Science Conference Proceedings (OSTI)

The paper critically examines knowledge ownership when personal or organizational knowledge is transferred between individuals or between individuals and organizations. Employing a form of discourse analysis, we analyse the data from three complementary ... Keywords: Knowledge transfer, Organizational knowledge, Personal knowledge, Privacy rights, Property rights, Strategic knowledge

Alina Dulipovici; Richard Baskerville

2007-06-01T23:59:59.000Z

305

IPv6 stateless address autoconfiguration: balancing between security, privacy and usability  

Science Conference Proceedings (OSTI)

Included in the IPv6 suite is a method for devices to automatically configure their own addresses in a secure manner. This technique is called Cryptographically Generated Addresses (CGAs). CGA provides the ownership proof necessary for an IPv6 address ... Keywords: IPv6 address autoconfiguration, IPv6 security, users' privacy

Ahmad AlSa'deh, Hosnieh Rafiee, Christoph Meinel

2012-10-01T23:59:59.000Z

306

Understanding motivations for facebook use: usage metrics, network structure, and privacy  

Science Conference Proceedings (OSTI)

This study explores the links between motives for using a social network service and numerical measures of that activity. Specifically, it identified motives for Facebook use by employing a Uses and Gratifications (U&G) approach and then investigated ... Keywords: computer-mediated communication, facebook, privacy, social network sites, social networks, uses and gratifications

Tasos Spiliotopoulos; Ian Oakley

2013-04-01T23:59:59.000Z

307

An optimal probabilistic solution for information confinement, privacy, and security in RFID systems  

Science Conference Proceedings (OSTI)

In this paper, we provide the following contributions to enhance the security of RFID based systems. First, we assume that among multiple servers storing the information related to the tags some of them can be compromised. For this new threat scenario, ... Keywords: Information confinement, Privacy, Probabilistic algorithm, RFID systems, Security

Roberto Di Pietro; Refik Molva

2011-05-01T23:59:59.000Z

308

Notice of Privacy Practices University of Connecticut Effective Date: April 14, 2003  

E-Print Network (OSTI)

providers of service may have different policies or notices regarding the information they maintain about this notice of our legal duties and privacy policy practices with respect to your PHI; and Follow the terms, counterintelligence, and other national security activities authorized by law. Protective Services for the President

Holsinger, Kent

309

A spotlight on security and privacy risks with future household robots: attacks and lessons  

Science Conference Proceedings (OSTI)

Future homes will be populated with large numbers of robots with diverse functionalities, ranging from chore robots to elder care robots to entertainment robots. While household robots will offer numerous benefits, they also have the potential to introduce ... Keywords: cyber-physical systems, domestic robots, household robots, multi-robot attack, privacy, robots, security, single-robot attack, ubiquitous robots

Tamara Denning; Cynthia Matuszek; Karl Koscher; Joshua R. Smith; Tadayoshi Kohno

2009-09-01T23:59:59.000Z

310

Protecting Privacy Against Record Linkage Disclosure: A Bounded Swapping Approach for Numeric Data  

Science Conference Proceedings (OSTI)

Record linkage techniques have been widely used in areas such as antiterrorism, crime analysis, epidemiologic research, and database marketing. On the other hand, such techniques are also being increasingly used for identity matching that leads to the ... Keywords: data partitioning, data swapping, privacy, record linkage

Xiao-Bai Li; Sumit Sarkar

2011-12-01T23:59:59.000Z

311

Privacy-preserving screen capture: Towards closing the loop for health IT usability  

Science Conference Proceedings (OSTI)

As information technology permeates healthcare (particularly provider-facing systems), maximizing system effectiveness requires the ability to document and analyze tricky or troublesome usage scenarios. However, real-world health IT systems are typically ... Keywords: Health IT, Privacy, Redaction, Security, Usability

Joseph Cooley, Sean Smith

2013-08-01T23:59:59.000Z

312

A semantic framework to protect the privacy of electronic health records with non-numerical attributes  

Science Conference Proceedings (OSTI)

Structured patient data like Electronic Health Records (EHRs) are a valuable source for clinical research. However, the sensitive nature of such information requires some anonymisation procedure to be applied before releasing the data to third parties. ... Keywords: Electronic health records, Privacy, SNOMED CT, Semantic similarity, Statistical disclosure control

Sergio MartíNez; David SáNchez; Aida Valls

2013-04-01T23:59:59.000Z

313

Anonyfrag: an anonymization-based approach for privacy-preserving BPaaS  

Science Conference Proceedings (OSTI)

Many cloud providers offer on demand applications as BPaaS "Business Process as a Service" through multi-tenant cloud platforms, allowing many companies to outsource their business processes. That is, an increasing amount of personal data involved in ... Keywords: anonymity, business process, cloud privacy

Mehdi Bentounsi; Salima Benbernou; Cheikh S. Deme; Mikhail J. Atallah

2012-08-01T23:59:59.000Z

314

Adaptive information-sharing for privacy-aware mobile social networks  

Science Conference Proceedings (OSTI)

Personal and contextual information are increasingly shared via mobile social networks. Users' locations, activities and their co-presence can be shared easily with online "friends", as their smartphones already access such information from embedded ... Keywords: decision-making, information-sharing, machine learning, privacy, user study

Igor Bilogrevic, Kévin Huguenin, Berker Agir, Murtuza Jadliwala, Jean-Pierre Hubaux

2013-09-01T23:59:59.000Z

315

Against Classification Attacks: A Decision Tree Pruning Approach to Privacy Protection in Data Mining  

Science Conference Proceedings (OSTI)

Data-mining techniques can be used not only to study collective behavior about customers, but also to discover private information about individuals. In this study, we demonstrate that decision trees, a popular classification technique for data mining, ... Keywords: computers, data mining, databases/artificial intelligence, decision trees, entropy, privacy, probability, pruning, public sector, relative entropy, society

Xiao-Bai Li; Sumit Sarkar

2009-11-01T23:59:59.000Z

316

Third-party Apps on Facebook: Privacy and the Illusion of Control  

E-Print Network (OSTI)

Little research examines the privacy threats associated with the use of third-party apps on Facebook. To address this gap in the literature, we systematically study third-party apps ' current practices for privacy notice and consent by: i) collecting data from the 1800 most popular Facebook apps to record their data collection practices concerning users and their friends, and ii) developing our own Facebook app to conduct a number of tests to identify problems that exist in the current design of authentication dialogs for third-party apps on Facebook. To address these problems, we propose two new interface designs for third-party apps ’ authentication dialogs to: i) increase user control of apps' data access and restrict apps ' publishing ability during the process of adding them to users ’ profiles, and ii) alert users when their global privacy settings on Facebook are violated by apps. This research provides both conceptual and empirical insights in terms of design recommendations to address privacy concerns toward third-party apps on Facebook.

Na Wang; Heng Xu; Jens Grossklags

2011-01-01T23:59:59.000Z

317

A Privacy Preservation Model for Facebook-Like Social Network Systems  

E-Print Network (OSTI)

Recent years have seen unprecedented growth in the popularity of social network systems, with Facebook being an archetypical example. Due to the distributed nature of access control in Facebook-style social network systems, it is difficult for a user to anticipate the privacy consequence of such actions as modifying a privacy setting or befriending another user. This work takes a first step in addressing this challenge, by proposing an access control model that formalizes and generalizes the privacy preservation mechanism of Facebook. The model can be instantiated into a family of Facebook-style social network systems, each with a recognizably different access control mechanism, so that Facebook is but one instantiation of the model. We also demonstrate that the model can be instantiated to express policies that, on the one hand, are not currently supported by Facebook, but on the other hand possess rich and natural social significance. This work thus deepens our understanding of the design space of privacy preservation mechanisms for social network systems, and lays out a formal framework for policy analysis in these systems.

Philip W. L. Fong; Mohd Anwar; Zhen Zhao

2009-01-01T23:59:59.000Z

318

DOE Convenes Multi-stakeholder Process to Address Privacy for Data Enabled by Smart Grid Technologies  

Energy.gov (U.S. Department of Energy (DOE))

DOE's Office of Electricy Delivery and Energy Reliability (OE) issued a notice of an open meeting on Tuesday, February 26, 2013 (9:30 a.m. to 4:30 p.m. ET) of the smart grid data privacy multi...

319

Privacy-friendly Aggregation for the Smart-grid Klaus Kursawe1  

E-Print Network (OSTI)

Privacy-friendly Aggregation for the Smart-grid Klaus Kursawe1 , George Danezis2 , and Markulf additional information about the individual meter readings. 1 Introduction. Smart-grid deployments issue for electricity metering, and will be one significant use-case in the upcoming smart grid

Danezis, George

320

Competitive Privacy in the Smart Grid: An Information-theoretic Approach  

E-Print Network (OSTI)

Advances in sensing and communication capabilities as well as power industry deregulation are driving the need for distributed state estimation in the smart grid at the level of the regional transmission organizations (RTOs). This leads to a new competitive privacy problem amongst the RTOs since there is a tension between sharing data to ensure network reliability (utility/benefit to all RTOs) and withholding data for profitability and privacy reasons. The resulting tradeoff between utility, quantified via fidelity of its state estimate at each RTO, and privacy, quantified via the leakage of the state of one RTO at other RTOs, is captured precisely using a lossy source coding problem formulation for a two RTO network. For a two-RTO model, it is shown that the set of all feasible utility-privacy pairs can be achieved via a single round of communication when each RTO communicates taking into account the correlation between the measured data at both RTOs. The lossy source coding problem and solution developed he...

Sankar, Lalitha; Tandon, Ravi; Poor, H Vincent

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "owner local privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

A theory and toolkit for the mathematics of privacy : methods for anonymizing data while minimizing information loss  

E-Print Network (OSTI)

Privacy laws are an important facet of our society. But they can also serve as formidable barriers to medical research. The same laws that prevent casual disclosure of medical data have also made it difficult for researchers ...

Katirai, Hooman

2006-01-01T23:59:59.000Z

322

Design and application of a Health Insurance Portability and Accountability Act-compliant privacy framework for pervasive healthcare  

Science Conference Proceedings (OSTI)

With an increasing emphasis on pervasive healthcare services, providing a high degree of privacy to patients is becoming a major challenge due to: (a) an increased number of avenues, such as device, access points, switches and database; (b) ... Keywords: EHR, HIPAA, Health Insurance Portability and Accountability Act, e-health, electronic health records, electronic healthcare, electronic medical records, mobile communications, pervasive healthcare, privacy, security, wireless health

Srilaxmi Malladi; Upkar Varshney

2008-04-01T23:59:59.000Z

323

Local Option - Property Assessed Clean Energy | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

You are here You are here Home » Local Option - Property Assessed Clean Energy Local Option - Property Assessed Clean Energy < Back Eligibility Commercial Residential Savings Category Heating & Cooling Commercial Heating & Cooling Heating Home Weatherization Commercial Weatherization Sealing Your Home Cooling Appliances & Electronics Design & Remodeling Windows, Doors, & Skylights Ventilation Heat Pumps Commercial Lighting Lighting Water Heating Other Bioenergy Solar Buying & Making Electricity Wind Program Info Funding Source American Recovery and Reinvestment Act (ARRA) Energy Efficiency Conservation Block Grant (EECBG) Start Date 04/01/2010 State Maine Program Type PACE Financing Property-Assessed Clean Energy (PACE) financing effectively allows property owners to borrow money to pay for energy improvements. The amount borrowed

324

Privacy and Security Research Group workshop on network and distributed system security: Proceedings  

Science Conference Proceedings (OSTI)

This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System. Selected papers were processed separately for inclusion in the Energy Science and Technology Database.

Not Available

1993-05-01T23:59:59.000Z

325

Multi-User Privacy: The Gray-Wyner System and Generalized Common Information  

E-Print Network (OSTI)

The problem of preserving privacy when a multivariate source is required to be revealed partially to multiple users is modeled as a Gray-Wyner source coding problem with K correlated sources at the encoder and K decoders in which the kth decoder, k = 1, 2, ...,K, losslessly reconstructs the kth source via a common link and a private link. The privacy requirement of keeping each decoder oblivious of all sources other than the one intended for it is introduced via an equivocation constraint at each decoder such that the total equivocation summed over all decoders is E. The set of achievable rates-equivocation tuples is completely characterized. Using this characterization, two different definitions of common information are presented and are shown to be equivalent.

Tandon, Ravi; Poor, H Vincent

2011-01-01T23:59:59.000Z

326

Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population  

E-Print Network (OSTI)

In this paper, we propose an HB-like protocol for privacy-preserving authentication of RFID tags, whereby a tag can remain anonymous and untraceable to an adversary during the authentication process. Previous proposals of such protocols were based on PRF computations. Our protocol can instead be used on low-cost tags that may be incapable of computing standard PRFs. Moreover, since the underlying computations in HB protocols are very efficient, our protocol also reduces reader load compared to PRF-based protocols. We suggest a tree-based approach that replaces the PRF-based authentication from prior work with a procedure such as HB+ or HB#. We optimize the tree- traversal stage through usage of a "light version" of the underlying protocol and shared random challenges across all levels of the tree. This provides significant reduction of the communication resources, resulting in a privacy-preserving protocol almost as efficient as the underlying HB+ or HB#

Halevi, Tzipora; Halevi, Shai

2009-01-01T23:59:59.000Z

327

Local Option - Municipal Energy Districts | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Local Option - Municipal Energy Districts Local Option - Municipal Energy Districts Local Option - Municipal Energy Districts < Back Program Info State California Program Type PACE Financing ''''Note: The Federal Housing Financing Agency (FHFA) issued a [http://www.fhfa.gov/webfiles/15884/PACESTMT7610.pdf statement] in July 2010 concerning the senior lien status associated with most PACE programs. In response to the FHFA statement, most local PACE programs have been suspended until further clarification is provided.'''' Property-Assessed Clean Energy (PACE) financing effectively allows property owners to borrow money to pay for energy improvements. The amount borrowed is typically repaid via a special assessment on the property over a period of years. California has authorized local governments to establish such

328

Ubiquitous Computing Acceptance Model: end user concern about security, privacy and risk  

Science Conference Proceedings (OSTI)

This study integrates cognitive and affective attitudes as the primary factors of influence to formulate a Ubiquitous Computing Acceptance Model (UCAM), which is intended to predict whether potential users will accept ubiquitous computing (u-computing). ... Keywords: UCAM, behavioural intention, mobile communications, perceived ease of use, perceived risk, pervasive computing, privacy, security, trust, ubiquitous city, ubiquitous computing acceptance model, ubiquitous u-city, usefulness, user attitudes, user intentions

Dong-Hee Shin

2010-02-01T23:59:59.000Z

329

A privacy preservation model for Facebook-style social network systems  

E-Print Network (OSTI)

Recent years have seen unprecedented growth in the popularity of social network systems, with Facebook being an archetypical example. The access control paradigm behind the privacy preservation mechanism of Facebook is distinctly different from such existing access control paradigms as Discretionary Access Control, Role-Based Access Control, Capability Systems, and Trust Management Systems. This work takes a first step in deepening the understanding of this access control paradigm, by proposing an access control model that formalizes and generalizes the privacy preservation mechanism of Facebook. The model can be instantiated into a family of Facebook-style social network systems, each with a recognizably different access control mechanism, so that Facebook is but one instantiation of the model. We also demonstrate that the model can be instantiated to express policies that are not currently supported by Facebook but possess rich and natural social significance. This work thus delineates the design space of privacy preservation mechanisms for Facebook-style social network systems, and lays out a formal framework for policy analysis in these systems.

Philip W. L. Fong; Mohd Anwar; Zhen Zhao

2009-01-01T23:59:59.000Z

330

Hearing on “Online Privacy, Social Networking, and Crime Victimization” Before the Committee on the Judiciary Subcommittee on Crime, Terrorism, and Homeland Security U.S. House of Representatives  

E-Print Network (OSTI)

Washington, DCMr. Chairman and Members of the Committee, thank you for the opportunity to testify today. My name is Marc Rotenberg, and I am the President of the Electronic Privacy Information Center. EPIC was established to focus public attention on emerging privacy and civil liberties issue. I also teach Information Privacy Law at Georgetown University Law Center. I want to thank you for holding this hearing today and also thank Chairman Conyers for his May letter to Facebook. EPIC has a particular interest in privacy and social networking services. We filed two complaints at the Federal Trade Commission in the last year following decisions by Facebook to change its privacy policies and the privacy settings of its users. We also filed a complaint when Google introduced Buzz, its social network service, because the company essentially opted in all of its Gmail users. We believe it is vitally important to protect the privacy of users of these services, and many users agree. To be clear, we do not object to social network services—they are enormously valuable—but we do believe that there are serious privacy risks to

Marc Rotenberg

2010-01-01T23:59:59.000Z

331

Local Information  

NLE Websites -- All DOE Office Websites (Extended Search)

Local Information Local Information Local Information Welcome to Golden, Colorado, the location of the 2014 Electrical Safety Workshop. Visiting NREL The National Renewable Energy Laboratory (NREL) has research facilities and offices at several locations in Golden, Colorado (near Boulder), and in Washington, D.C. In Golden, you'll find the NREL Education Center, along with many of our research laboratories and administrative offices. The National Wind Technology Center is a separate facility located about 5 miles south of Boulder. Read more » Transportation NREL is accessible via bus on the Regional Transportation District (RTD) Route 20 from Aurora and Denver. Route 20 travels along 20th Avenue and ends at the NREL Education Center. Visit the RTD Web site or call 303-299-6000 to plan your trip or for more

332

Local Option - Energy Improvement Loan Program (Wyoming) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Local Option - Energy Improvement Loan Program (Wyoming) Local Option - Energy Improvement Loan Program (Wyoming) Local Option - Energy Improvement Loan Program (Wyoming) < Back Savings Category Energy Sources Buying & Making Electricity Other Program Info Start Date 7/1/2011 State Wyoming Program Type PACE Financing '''''Note: The Federal Housing Financing Agency (FHFA) issued a [http://www.fhfa.gov/webfiles/15884/PACESTMT7610.pdf statement] in July 2010 concerning the senior lien status associated with most PACE programs.''''' Property-Assessed Clean Energy (PACE) financing effectively allows property owners to borrow money to pay for energy improvements. The amount borrowed is typically repaid via a special assessment on the property over a period of years. Wyoming has authorized local governments to establish such

333

RIVACY IMPACT ASSESSMENT: SPRO Business Operations General Support  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

RIVACY IMPACT ASSESSMENT: SPRO - Business Operations General Support System PIA Template Version 3 - May, 2009 iiiiiiiiiiiiiii Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/02061.pdf MODULE I - PRIVACY NEEDS ASSESSMENT Date Departmental Element & Site July 21, 2009 Office of Fossil Energy Strategic Petroleum Reserve Office - New Orleans, LA 70123 Name of Information System or IT Project Unclassified Business Operations General Support System (GSS) exhibit Project UID UPI Code: 019-20-01-16-02-3612-00 NewPIA 0 Update D N T 'tl I Contact Information arne, I e Ph E 'I one, mal System Owner Local Privacy

334

Local Option - Property Assessed Clean Energy | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Property Assessed Clean Energy Property Assessed Clean Energy Local Option - Property Assessed Clean Energy < Back Eligibility Commercial Industrial Savings Category Heating & Cooling Commercial Heating & Cooling Heating Home Weatherization Commercial Weatherization Sealing Your Home Cooling Design & Remodeling Windows, Doors, & Skylights Ventilation Construction Heat Pumps Appliances & Electronics Commercial Lighting Lighting Insulation Bioenergy Manufacturing Buying & Making Electricity Solar Water Heating Wind Program Info State Michigan Program Type PACE Financing Property-Assessed Clean Energy (PACE) financing effectively allows property owners to borrow money to pay for energy improvements. The amount borrowed is repaid via a special assessment on the property over a period of years.

335

The New York City Local Law 84 Benchmarking Report, 2013 | ENERGY STAR  

NLE Websites -- All DOE Office Websites (Extended Search)

The New York City Local Law 84 Benchmarking Report, 2013 The New York City Local Law 84 Benchmarking Report, 2013 Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and managers Existing buildings Commercial new construction Industrial energy management Small business Service providers Service and product providers Verify applications for ENERGY STAR certification Design commercial buildings Energy efficiency program administrators Commercial and industrial program sponsors Associations State and local governments Federal agencies Tools and resources Training In This Section Campaigns Commercial building design Communications resources Energy management guidance Financial resources Portfolio Manager Products and purchasing Recognition Research and reports Service and product provider (SPP) resources

336

The New York City Local Law 84 Benchmarking Report | ENERGY STAR Buildings  

NLE Websites -- All DOE Office Websites (Extended Search)

The New York City Local Law 84 Benchmarking Report The New York City Local Law 84 Benchmarking Report Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and managers Existing buildings Commercial new construction Industrial energy management Small business Service providers Service and product providers Verify applications for ENERGY STAR certification Design commercial buildings Energy efficiency program administrators Commercial and industrial program sponsors Associations State and local governments Federal agencies Tools and resources Training In This Section Campaigns Commercial building design Communications resources Energy management guidance Financial resources Portfolio Manager Products and purchasing Recognition Research and reports Service and product provider (SPP) resources Success stories

337

SPP sales flyer for local government | ENERGY STAR Buildings & Plants  

NLE Websites -- All DOE Office Websites (Extended Search)

local government local government Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and managers Existing buildings Commercial new construction Industrial energy management Small business Service providers Service and product providers Verify applications for ENERGY STAR certification Design commercial buildings Energy efficiency program administrators Commercial and industrial program sponsors Associations State and local governments Federal agencies Tools and resources Training In This Section Campaigns Commercial building design Communications resources Energy management guidance Financial resources Portfolio Manager Products and purchasing Recognition Research and reports Service and product provider (SPP) resources Success stories Target Finder Technical documentation

338

Local Option - Energy-Efficiency Improvement Loans | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy-Efficiency Improvement Loans Energy-Efficiency Improvement Loans Local Option - Energy-Efficiency Improvement Loans < Back Eligibility Commercial Industrial Residential Program Info State Wisconsin Program Type PACE Financing '''''Note: The Federal Housing Financing Agency (FHFA) issued a [http://www.fhfa.gov/webfiles/15884/PACESTMT7610.pdf statement] in July 2010 concerning the senior lien status associated with most PACE programs. In response to the FHFA statement, most local PACE programs have been suspended until further clarification is provided. ''''' Property-Assessed Clean Energy (PACE) financing effectively allows property owners to borrow money to pay for energy improvements. The amount borrowed is typically repaid via a special assessment on the property over a period of years. Wisconsin has authorized certain local governments to establish

339

Local Option - Property Tax Exemption for Renewable Energy Systems |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Property Tax Exemption for Renewable Energy Systems Property Tax Exemption for Renewable Energy Systems Local Option - Property Tax Exemption for Renewable Energy Systems < Back Eligibility Agricultural Commercial General Public/Consumer Industrial Residential Savings Category Bioenergy Buying & Making Electricity Solar Heating & Cooling Water Heating Wind Maximum Rebate Varies (local option) Program Info Start Date 8/3/2007 State Colorado Program Type Property Tax Incentive Rebate Amount Varies (local option) Colorado enacted legislation in April 2007 ([http://www.leg.state.co.us/clics/clics2007a/csl.nsf/fsbillcont3/31EEE26A... SB 145]) to authorize counties and municipalities to offer property or sales tax rebates or credits to residential and commercial property owners who install renewable energy systems on their property.

340

Local Option - Clean Energy Loan Program | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Clean Energy Loan Program Clean Energy Loan Program Local Option - Clean Energy Loan Program < Back Eligibility Commercial Low-Income Residential Residential Program Info State Maryland Program Type PACE Financing '''''Note: The Federal Housing Financing Agency (FHFA) issued a [http://www.fhfa.gov/webfiles/15884/PACESTMT7610.pdf statement] in July 2010 concerning the senior lien status associated with most PACE programs. In response to the FHFA statement, most local PACE programs have been suspended until further clarification is provided. ''''' Property-Assessed Clean Energy (PACE) financing effectively allows property owners to borrow money to pay for energy improvements. The amount borrowed is typically repaid via a special assessment on the property over a period of years. Maryland has authorized local governments to establish such

Note: This page contains sample records for the topic "owner local privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Electronic access to information and the privacy paradox: rethinking practical obscurity and its impact on electronic freedom of information  

Science Conference Proceedings (OSTI)

This article addresses the U.S. Supreme Court's formulation of "practical obscurity" in Reporters Committee v. Department of Justice, a seminal case interpreting the U.S. Freedom of Information Act (FOIA). By examining lower federal court opinions ... Keywords: department of Justice, electronic information, freedom of information, privacy, reporters Committee for Freedom of the Press

Charles N. Davis

2003-01-01T23:59:59.000Z

342

The University of Texas at Austin Web Privacy Policy Office of the Chief Information Officer Written By: Chief Information Security Officer/  

E-Print Network (OSTI)

The University of Texas at Austin Web Privacy Policy Office of the Chief Information Officer.......................................................................................................................5 13. Texas Public Information Act.............................................................................................. Error! Bookmark not defined. 1. Purpose The University of Texas at Austin (U. T. Austin) is committed

Texas at Austin, University of

343

Quantum Locality?  

Science Conference Proceedings (OSTI)

Robert Griffiths has recently addressed, within the framework of a ‘consistent quantum theory’ (CQT) that he has developed, the issue of whether, as is often claimed, quantum mechanics entails a need for faster-than-light transfers of information over long distances. He argues, on the basis of his examination of certain arguments that claim to demonstrate the existence of such nonlocal influences, that such influences do not exist. However, his examination was restricted mainly to hidden-variable-based arguments that include in their premises some essentially classical-physics-type assumptions that are fundamentally incompatible with the precepts of quantum physics. One cannot logically prove properties of a system by attributing to the system properties alien to that system. Hence Griffiths’ rejection of hidden-variable-based proofs is logically warranted. Griffiths mentions the existence of a certain alternative proof that does not involve hidden variables, and that uses only macroscopically described observable properties. He notes that he had examined in his book proofs of this general kind, and concluded that they provide no evidence for nonlocal influences. But he did not examine the particular proof that he cites. An examination of that particular proof by the method specified by his ‘consistent quantum theory’ shows that the cited proof is valid within that restrictive framework. This necessary existence, within the ‘consistent’ framework, of long range essentially instantaneous influences refutes the claim made by Griffiths that his ‘consistent’ framework is superior to the orthodox quantum theory of von Neumann because it does not entail instantaneous influences. An added section responds to Griffiths’ reply, which cites a litany of ambiguities that seem to restrict, devastatingly, the scope of his CQT formalism, apparently to buttress his claim that my use of that formalism to validate the nonlocality theorem is flawed. But the vagaries that he cites do not upset the proof in question. It is show here in detail why the precise statement of this theorem justifies the specified application of CQT. It is also shown, in response to his challenge, why a putative proof of locality that he has proposed is not valid.

Stapp, Henry

2011-11-10T23:59:59.000Z

344

Archbold Local Schools Wind Turbine | Open Energy Information  

Open Energy Info (EERE)

Archbold Local Schools Wind Turbine Archbold Local Schools Wind Turbine Jump to: navigation, search Name Archbold Local Schools Wind Turbine Facility Archbold Local Schools Wind Turbine Sector Wind energy Facility Type Community Wind Facility Status In Service Owner Archbold Area Local Schools District Developer Archbold Area Local Schools District Energy Purchaser Archbold Area Local Schools District Location Archbold OH Coordinates 41.51543828°, -84.31605577° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":41.51543828,"lon":-84.31605577,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

345

Local Option - Contractual Assessments for Energy Efficient Improvements |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Contractual Assessments for Energy Efficient Contractual Assessments for Energy Efficient Improvements Local Option - Contractual Assessments for Energy Efficient Improvements < Back Eligibility Agricultural Commercial Industrial Multi-Family Residential Residential Program Info State Texas Program Type PACE Financing '''''Note: The Federal Housing Financing Agency (FHFA) issued a [http://www.fhfa.gov/webfiles/15884/PACESTMT7610.pdf statement] in July 2010 concerning the senior lien status associated with most PACE programs. In response to the FHFA statement, most local PACE programs have been suspended until further clarification is provided. ''''' Property-Assessed Clean Energy (PACE) financing effectively allows property owners to borrow money to pay for energy improvements. The amount borrowed is typically repaid via a special assessment on the property over a period

346

Local Option - Property-Assessed Clean Energy Financing (Rhode Island) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Property-Assessed Clean Energy Financing (Rhode Property-Assessed Clean Energy Financing (Rhode Island) Local Option - Property-Assessed Clean Energy Financing (Rhode Island) < Back Eligibility Residential Savings Category Other Alternative Fuel Vehicles Hydrogen & Fuel Cells Solar Buying & Making Electricity Program Info State Rhode Island Program Type PACE Financing '''''Note: The Federal Housing Financing Agency (FHFA) issued a statement in July 2010 concerning the senior lien status associated with most PACE programs. In response to the FHFA statement, most local PACE programs have been suspended until further clarification is provided. ''''' Property-Assessed Clean Energy (PACE) financing effectively allows property owners to borrow money to pay for energy improvements. The amount borrowed is typically repaid via a special assessment on the property over a period

347

www.mdpi.com/journal/ijerph Restaurant and Bar Owners ’ Exposure to Secondhand Smoke and Attitudes Regarding Smoking Bans in Five Chinese Cities  

E-Print Network (OSTI)

Abstract: Despite the great progress made towards smoke-free environments, only 9 % of countries worldwide mandate smoke-free restaurants and bars. Smoking was generally not regulated in restaurants and bars in China before 2008. This study was designed to examine the public attitudes towards banning smoking in these places in China. A convenience sample of 814 restaurants and bars was selected in five Chinese cities and all owners of these venues were interviewed in person by questionnaire in 2007. Eighty six percent of current nonsmoking subjects had at least one-day exposure to secondhand smoke (SHS) at work in the past week. Only 51 % of subjects knew SHS could cause heart disease. Only 17 % and 11 % of subjects supported prohibiting smoking completely in restaurants and in bars, respectively, while their support for restricting smoking to designated areas was much higher. Fifty three percent of subjects were willing to prohibit or restrict smoking in their own venues. Of those unwilling to do so, 82 % thought smokingInt. J. Environ. Res. Public Health 2011, 8 1521

Ruiling Liu; S. Katharine Hammond; Andrew Hyl; Mark J. Travers; Yan Yang; Yi Nan; Guoze Feng; Qiang Li; Yuan Jiang

2011-01-01T23:59:59.000Z

348

Solar and Wind Easements and Local Option Rights Laws | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Local Option Rights Laws Local Option Rights Laws Solar and Wind Easements and Local Option Rights Laws < Back Eligibility Commercial Fed. Government Industrial Local Government Nonprofit Residential Schools State Government Savings Category Heating & Cooling Commercial Heating & Cooling Solar Heating Buying & Making Electricity Water Heating Wind Program Info State Nebraska Program Type Solar/Wind Access Policy Provider Nebraska Energy Office Nebraska's solar and wind easement provisions allow property owners to create binding solar and wind easements for the purpose of protecting and maintaining proper access to sunlight and wind. Originally designed only to apply to solar, the laws were revised in March 1997 (Bill 140) to include wind. Counties and municipalities are permitted to develop zoning

349

ESCORT: a decentralized and localized access control system for mobile wireless access to secured domains  

Science Conference Proceedings (OSTI)

In this work we design and implement ESCORT, a backward compatible, efficient, and secure access control system, to facilitate mobile wireless access to secured wireless LANs. In mobile environments, a mobile guest may frequently ... Keywords: decentralized access control, identity privacy, location privacy, mobile privacy, wireless security

Jiejun Kong; Shirshanka Das; Edward Tsai; Mario Gerla

2003-09-01T23:59:59.000Z

350

Locality phase prediction  

Science Conference Proceedings (OSTI)

As computer memory hierarchy becomes adaptive, its performance increasingly depends on forecasting the dynamic program locality. This paper presents a method that predicts the locality phases of a program by a combination of locality profiling and run-time ... Keywords: dynamic optimization, locality analysis and optimization, phase hierarchy, program phase analysis and prediction, reconfigurable architecture

Xipeng Shen; Yutao Zhong; Chen Ding

2004-12-01T23:59:59.000Z

351

A Distributed k-Anonymity Protocol for Location Privacy,” Centre for Applied Cryptographic Research  

E-Print Network (OSTI)

Abstract—To benefit from a location-based service, a person must reveal her location to the service. However, knowing the person’s location might allow the service to re-identify the person. Location privacy based on k-anonymity addresses this threat by cloaking the person’s location such that there are at least k ? 1 other people within the cloaked area and by revealing only the cloaked area to a location-based service. Previous research has explored two ways of cloaking: First, have a central server that knows everybody’s location determine the cloaked area. However, this server needs to be trusted by all users and is a single point of failure. Second, have users jointly determine the cloaked area. However, this approach requires that all users trust each other, which will likely not hold in practice. We propose a distributed approach that does not have these drawbacks. Our approach assumes that there are multiple servers, each deployed by a different organization. A user’s location is known to only one of the servers (e.g., to her cellphone provider), so there is no single entity that knows everybody’s location. With the help of cryptography, the servers and a user jointly determine whether the k-anonymity property holds for the user’s area, without the servers learning any additional information, not even whether the property holds. A user learns whether the k-anonymity property is satisfied and no other information. The evaluation of our sample implementation shows that our distributed k-anonymity protocol is sufficiently fast to be practical. Moreover, our protocol integrates well with existing infrastructures for location-based services, as opposed to the previous research. I.

Ge Zhong; Urs Hengartner

2008-01-01T23:59:59.000Z

352

Enhancing User Privacy in Location-based Services,” Centre for Applied Cryptographic Research  

E-Print Network (OSTI)

The ubiquity of cellphones has lead to the introduction of location-based services, which are services tailored to the current location of cellphone users. For example, a cellphone user can retrieve a list of interesting, nearby places, or parents are notified when a child (i.e., her cellphone) leaves a boundary area. Location is a sensitive piece of information, so location-based services raise privacy concerns. In this paper, we identify and address one such concern. Namely, a company providing location-based services will become aware of the location of cellphone users. Therefore, the company can, maybe inadvertently, leak this information to unauthorized entities. We study the question whether it is possible for the company to provide its services without learning the location of cellphone users. We present an architecture that provides this property and show that the architecture is powerful enough to provide various, existing location-based services. Our architecture exploits Trusted Computing and Private Information Retrieval algorithms for implementing location-based services. With the help of Trusted Computing, we ensure that a location-based service operates as expected by a cellphone user and that location information becomes inaccessible to a location-based service upon a compromise of the service. With the help of Private Information Retrieval, we avoid that a company providing a location-based service becomes indirectly aware of the location of cellphone users by observing which of its location-specific information is being accessed. We also discuss an implementation of the proposed approach and alternative design strategies. 1

Urs Hengartner

2006-01-01T23:59:59.000Z

353

Local Option - Sales and Use Tax Exemption for Renewable Energy Systems |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sales and Use Tax Exemption for Renewable Energy Sales and Use Tax Exemption for Renewable Energy Systems Local Option - Sales and Use Tax Exemption for Renewable Energy Systems < Back Eligibility Agricultural Commercial General Public/Consumer Industrial Residential Savings Category Bioenergy Buying & Making Electricity Solar Heating & Cooling Water Heating Wind Maximum Rebate Varies (local option) Program Info Start Date 8/3/2007 State Colorado Program Type Sales Tax Incentive Rebate Amount Varies (local option) Colorado enacted legislation in April 2007 ([http://www.leg.state.co.us/clics/clics2007a/csl.nsf/fsbillcont3/31EEE26A... SB 145]) to authorize counties and municipalities to offer property or sales tax rebates or credits to residential and commercial property owners who install renewable energy systems on their property.

354

The Premier Information Source for Professionals Who Track Environmental and Energy Policy. 1996-2011 E&E Publishing, LLC Privacy Policy Site Map  

E-Print Network (OSTI)

The Premier Information Source for Professionals Who Track Environmental and Energy Policy. © 1996 testified before Congress in recent years on the economics of climate change and energy policy. He has also-2011 E&E Publishing, LLC Privacy Policy Site Map 11. TREASURY: Tufts economics professor picked to lead

Tufts University

355

Privacy Crisis due to Crisis Response on the Web Shao-Yu Wu, Ming-Hung Wang and Kuan-Ta Chen  

E-Print Network (OSTI)

--In recent disasters, the web has served as a medium of communication among disaster response teams are normally the top concerns in designing disaster response web services, where a design of free-formed inputs disclosure and privacy leakage. In this paper, using a case study of a real-life disaster response service

Chen, Sheng-Wei

356

When excessive perturbation goes wrong and why IPUMS-International relies instead on sampling, suppression, swapping, and other minimally harmful methods to protect privacy of census microdata  

Science Conference Proceedings (OSTI)

IPUMS-International disseminates population census microdata at no cost for 69 countries. Currently, a series of 212 samples totaling almost a half billion person records are available to researchers. Registration is required for researchers to gain ... Keywords: IPUMS-international, data dissemination, data privacy, microdata samples, population census, statistical disclosure controls

Lara Cleveland; Robert McCaa; Steven Ruggles; Matthew Sobek

2012-09-01T23:59:59.000Z

357

An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Yogesh Simmhan, Alok Gautam Kumbhare, Baohua Cao, and Viktor Prasanna  

E-Print Network (OSTI)

An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds Yogesh are increasingly upgrading to Smart Grids that use bi-directional communication with the consumer to enable an information-driven approach to distributed energy management. Clouds offer features well suited for Smart Grid

Prasanna, Viktor K.

358

Positioning using local maps  

Science Conference Proceedings (OSTI)

It is often useful to know the positions of nodes in a network. However, in a large network it is impractical to build a single global map. In this paper, we present a new approach for distributed localization called Positioning using Local Maps (PLM). ... Keywords: Localization, Multidimensional scaling, Multilateration, Relative position estimation

Yi Shang; Wheeler Ruml; Markus P. J. Fromherz

2006-03-01T23:59:59.000Z

359

Local Bézout Theorem  

Science Conference Proceedings (OSTI)

We give an elementary proof of what we call the Local Bezout Theorem. Given a system of n polynomials in n indeterminates with coefficients in a Henselian local domain, (V,m,k), which residually defines an isolated point in k^n of multiplicity r, we ... Keywords: Henselian rings, Local Bézout Theorem, Roots continuity, Stable computations

M. Emilia Alonso; Henri Lombardi

2010-10-01T23:59:59.000Z

360

Local Incentives (Massachusetts)  

Energy.gov (U.S. Department of Energy (DOE))

The Massachusetts Office of Business Development helps companies to identify communities interested in offering locally-negotiated incentives, such as Tax Increment Financing (TIF), Special Tax...

Note: This page contains sample records for the topic "owner local privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Local Structure from Diffraction  

Science Conference Proceedings (OSTI)

Mar 14, 2012 ... Neutron and X-Ray Studies of Advanced Materials V: Centennial: Local .... we use both the high-flux neutrons at the Spallation Neutron Source ...

362

Local Option - Contractual Assessments for Renewable Energy and/or Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Contractual Assessments for Renewable Energy and/or Contractual Assessments for Renewable Energy and/or Energy Efficiency Local Option - Contractual Assessments for Renewable Energy and/or Energy Efficiency < Back Eligibility Agricultural Commercial Industrial Residential Program Info Start Date 08/14/2009 State Illinois Program Type PACE Financing '''''Note: The Federal Housing Financing Agency (FHFA) issued a [http://www.fhfa.gov/webfiles/15884/PACESTMT7610.pdf statement] in July 2010 concerning the senior lien status associated with most PACE programs. In response to the FHFA statement, most local PACE programs have been suspended until further clarification is provided. ''''' Property-Assessed Clean Energy (PACE) financing effectively allows property owners to borrow money to pay for energy improvements. The amount borrowed

363

State and Local Incentives  

Energy.gov (U.S. Department of Energy (DOE))

To help you make energy efficiency improvements in your commercial building, your state and/or local community might offer incentives or have special programs. See the following resources for more...

364

Severe Local Storms Forecasting  

Science Conference Proceedings (OSTI)

Knowledge of severe local storms has been increasing rapidly in recent years as a result of both observational studies and numerical modeling experiments. This paper reviews that knowledge as it relates to development of new applications for ...

Robert H. Johns; Charles A. Doswell III

1992-12-01T23:59:59.000Z

365

Local entropy generation analysis  

SciTech Connect

Second law analysis techniques have been widely used to evaluate the sources of irreversibility in components and systems of components but the evaluation of local sources of irreversibility in thermal processes has received little attention. While analytical procedures for evaluating local entropy generation have been developed, applications have been limited to fluid flows with analytical solutions for the velocity and temperature fields. The analysis of local entropy generation can be used to evaluate more complicated flows by including entropy generation calculations in a computational fluid dynamics (CFD) code. The research documented in this report consists of incorporating local entropy generation calculations in an existing CFD code and then using the code to evaluate the distribution of thermodynamic losses in two applications: an impinging jet and a magnetic heat pump. 22 refs., 13 figs., 9 tabs.

Drost, M.K.; White, M.D.

1991-02-01T23:59:59.000Z

366

Wireless Local Loop  

Science Conference Proceedings (OSTI)

Wireless local loop systems are available to provide both broadband and narrowband services to customers. Narrowband systems are generally either based on cordless or mobile standards, or a manufacturer‘s proprietary technology. They are generally ...

R. P. Merrett; P. V. E. Beastall; S. J. Buttery

1998-10-01T23:59:59.000Z

367

Localization and Tracking  

E-Print Network (OSTI)

Abstract—Reliable obstacle detection and localization is a key issue for driver assistance systems, particularly in urban environments. In this study a multi-modal perception approach is investigated, the objective being to enhance vehicle localization and dynamic object tracking in a world-centric map. A 3D ego-localization is achieved by merging information from a stereo vision system and data obtained from vehicle sensors. Mobile objects are detected using a multi-layer lidar that is also used to identify a constrained search space within the multiple target tracking process. Object localization and tracking is then performed in the fixed frame, which facilitates analysis and understanding of the scene. Experimental results using real world data are performed to evaluate the performance of the multi-modal system, and these are presented to show the effectiveness of the approach. Index Terms—Multi-modal perception, visual odometry, object tracking, dynamic map, intelligent vehicles. I.

Sergio A. Rodríguez F; Vincent Frémont; Véronique Cherfaoui

2013-01-01T23:59:59.000Z

368

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 1 EPPA: An Efficient and Privacy-Preserving  

E-Print Network (OSTI)

to smart grid operation center, data aggregation is performed directly on ciphertext at local gateways be matched by the power supply and transmission capacity in the electric power grid. While swift advances electricity distribution. Modernizing the aging power system is currently a strategic plan in many countries

Shen, Xuemin "Sherman"

369

Lithium Local Pseudopotential Using  

E-Print Network (OSTI)

Lithium Local Pseudopotential Using DFT Sergio Orozco Student Advisor: Chen Huang Faculty Mentor Lithium LPS Test Lithium LPS #12;Density Functional Theory (DFT) Successful quantum mechanical approach (1979) #12;Building LPS for Lithium Create a LPS using NLPS density for Lithium Test LPS by comparing

Petta, Jason

370

Local microwave background radiation  

E-Print Network (OSTI)

An inquiry on a possible local origin for the Microwave Background Radiation is made. Thermal MBR photons are contained in a system called {\\it magnetic bottle} which is due to Earth magnetic field and solar wind particles, mostly electrons. Observational tests are anticipated.

Domingos S. L. Soares

2006-07-11T23:59:59.000Z

371

PARTNERSHIP AMONG LOCAL  

E-Print Network (OSTI)

) IN GENERAL- The term `qualified fuel cell property' means a fuel cell power plant which-- (i) has a nameplate 0.5 kilowatt of capacity of such property. (C) FUEL CELL POWER PLANT- The term `fuel cell powerA MODEL PARTNERSHIP AMONG LOCAL LEADERS SIMPLE, SMART REFORM TO PROMOTE JOB GROWTH The Fuel Cell

372

Chemical Plume Source Localization  

Science Conference Proceedings (OSTI)

This paper addresses the problem of estimating a likelihood map for the location of the source of a chemical plume using an autonomous vehicle as a sensor probe in a fluid flow. The fluid flow is assumed to have a high Reynolds number. Therefore, the ... Keywords: Autonomous vehicles, Bayesian inference methods, chemical plume tracing, online mapping, online planning, plume source localization

Shuo Pang; J. A. Farrell

2006-10-01T23:59:59.000Z

373

Mining Local Buffer Data  

Science Conference Proceedings (OSTI)

Web mining employs the techniques of data mining to extract information from the Web for a variety of purposes. The usual sources of data are the log files of WWW or proxy servers. The paper examines the possibility of using the local browser buffer ... Keywords: Behavioural Targeting, Browser Cache, Cacheability, Data Mining, Heaps Law, Internet, Latency, Zipf Law

Andrzej Siemi?ski

2008-06-01T23:59:59.000Z

374

Local and global recoding methods for anonymizing set-valued data  

Science Conference Proceedings (OSTI)

In this paper, we study the problem of protecting privacy in the publication of set-valued data. Consider a collection of supermarket transactions that contains detailed information about items bought together by individuals. Even after removing all ... Keywords: Anonymity, Database privacy, Set-valued data

Manolis Terrovitis; Nikos Mamoulis; Panos Kalnis

2011-02-01T23:59:59.000Z

375

Visiting Fermilab - Local Accommodations  

NLE Websites -- All DOE Office Websites (Extended Search)

Local Accommodations Local Accommodations Aurora Fox Valley Inn 2450 North Farnsworth Avenue Aurora, Illinois (Approx. 4 miles from Fermilab Wilson Hall) Telephone: 630-851-2000 Baymont Inn & Suites 1585 Naperville-Wheaton Road Naperville, Illinois (Approx. 8 miles from Fermilab Wilson Hall) Telephone: 630-357-0022 Comfort Inn & Suites 1555 E. Fabyan Parkway Geneva, IL (Approx. 4 miles from Fermilab Wilson Hall) 630-208-8811 Courtyard by Marriott 1155 E. Diehl Road Naperville, Illinois (Approx. 8 miles from Fermilab Wilson Hall) Telephone: 630-505-0550 Extended Stay America (All rooms have kitchenettes) 1575 Bond Street (Route 59 & Diehl Road) Naperville, Illinois (Approx. 7 miles from Fermilab Wilson Hall) Telephone: 630-983-0000 Lisle Hilton 3303 Corporate West Drive Lisle, Illinois

376

Bayesian Radiation Source Localization  

Science Conference Proceedings (OSTI)

Locating illicit radiological sources using gamma ray or neutron detection is a key challenge for both homeland security and nuclear nonproliferation. Localization methods using an array of detectors or a sequence of observations in time and space must provide rapid results while accounting for a dynamic attenuating environment. In the presence of significant attenuation and scatter, more extensive numerical transport calculations in place of the standard analytical approximations may be required to achieve accurate results. Numerical adjoints based on deterministic transport codes provide relatively efficient detector response calculations needed to determine the most likely location of a true source. Probabilistic representations account for uncertainty in the source location resulting from uncertainties in detector responses, the approximations that are used, and the potential for nonunique solutions. A Bayesian approach improves on previous likelihood methods for source localization by allowing the incorporation of all available information to help constrain solutions.

Jarman, Kenneth D.; Miller, Erin A.; Wittman, Richard S.; Gesh, Christopher J.

2011-07-01T23:59:59.000Z

377

Local Option- Property Assessed Clean Energy Financing (Arkansas)  

Energy.gov (U.S. Department of Energy (DOE))

Property-Assessed Clean Energy (PACE) financing effectively allows property owners to borrow money to pay for energy improvements. The amount borrowed is typically repaid via property taxes, with a...

378

Solar and Wind Easements and Local Option Rights Laws  

Energy.gov (U.S. Department of Energy (DOE))

Nebraska's solar and wind easement provisions allow property owners to create binding solar and wind easements for the purpose of protecting and maintaining proper access to sunlight and wind. ...

379

DOE Facility Management Contracts Facility Owner Contractor  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Univ. Of Chicago Argonne Univ. Of Chicago Argonne LLC 7/31/2006 9/30/2011 4 yrs Award Term Earned/additional 11 yrs Award Term Available 9/30/2026 M&O 2006 http://www.anl.gov/contract/ Patricia Schuneman 630-252-2956 Sergio Martinez 630-252-2075 Kristin Palmer 630-252-2127 Oak Ridge Environmental Management EM Bechtel Jacobs Co LLC 12/18/1997 12/31/2011 12/31/2011 Environmental Mgmt 1998 http://www.oakridge.doe.gov/external/Home/Procurement/RecentAwards/tabid/101/De fault.aspx Barbara Jackson 865-576-0976 Karen Shears 865-241-6411 Ames National Laboratory SC Iowa State University 12/4/2006 12/31/2011 4yrs Award Term Earned/additional 11yrs Award Term Available 12/31/2026 M&O 2007 http://www.ameslab.gov/operations/resources/contract Patricia Schuneman

380

Certification of Timesharing LOGON ID Owner Responsibilities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FORM AD-798 FORM AD-798 (3-78) Section 1 - Section 2 - Section 3 - Section 4 - Section 5 - Hi - 3 Dates (Include all Within-Grade Increases) (Begin with most recent date in Card 20) Service Periods For Which Retirement Deductions Were Withdrawn (Begin with old- est period in Card 30) Service Periods For Which Retirement Deductions Were Not Withheld (Begin with old- est period in Card 40) Periods of Separation Prior to 10/1/56 (Begin with most recent date in Card 50) Request Number 1 45 49 50 20 30 40 50 / / / / / / / / / / / / / / / / / / / / / / / / 21 31 41 51 / / / / / / / / / / / / / / / / 22 32 42 52 / / / / / / / / / / / / / / / / 23 33 43 53 / / / / / / / / / / / / / / / / 24 34 44 54 / / / / / / / / / / / / / / / / 25 35 45 55 / / / / / / / / / / / / / / / / 26 36 46 56 / / / / / / / / / / / / / / / / 27 37 47 57 / / / / / / / / / / / / / / / / 28 38 48 58 / / / / / / / / / / / / / / / / 29 39 49 59 / / / / / / / / / / / / / / / / 11 11 11 11 12 12 12 12 13 13 13 13 18 18 18 18 19 19 19 19 24 24 24 24 25 25 25 29 29 29 30 30 30 32 32 32 33 33 33 35 35 35 52 53 58 59 62 63 68 69 70 75

Note: This page contains sample records for the topic "owner local privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

DOE Facility Management Contracts Facility Owner Contractor  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Ultimate Potential Ultimate Potential Expiration Date Contract FY Competed Parent Companies INEEL (AMWTP Ops) EM Bechtel BWXT Idaho LLC (Under Protest) 6/15/1999 3/31/2011 2 three month option periods until protest resolved 9/30/2011 M&O 1999 Bechtel National, Inc. (67%) and Babcock and Wilcox Company (33%) Portsmouth Remediation EM LATA/Parallax 1/10/2005 6/30/2010 2/28/2011 Site Clean up 2005 Los Alamos Technical Associates (LATA) 51%; Parallax (name changed to ES Performance Plus) 49% Paducah Remediation EM LATA Environmental Services of Kentucky 4/22/2010 7/21/2015 7/21/2015 Site Clean up 2009 Los Alamos Technical Associates, Inc. 100% West Valley Demonstration Project EM West Valley Environmental Svcs 6/29/2007 6/30/2011 6/30/2011 Site Clean up 2007 URS -60% Jacobs - 20% ECC - 10% Paralax - 10%

382

DOE Facility Management Contracts Facility Owner Contractor  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7292008 9302013 one 5 Yr Option Avaialble 9302018 M&O 2008 http:www.eere.energy.govgoldenNRELPrime.aspx Carol Battershell 303-275- 1438 Steve Scott 303-275-4724...

383

DOE Facility Management Contracts Facility Owner Contractor  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

transition) transition) 6/15/1999 6/30/2011 2 three month option periods 9/30/2011 M&O 1999 http://www.id.energy.gov/PSD/AMWTPHomepage.html Mike Adams 208-526-5277 Wendy Bauer 208-526-2808 Paducah Remediation EM LATA Environmental Services of Kentucky 4/22/2010 7/21/2015 7/21/2015 Site Clean up 2009 http://www.emcbc.doe.gov/dept/contracting/primecontracts.php Pam Thompson 859-219-4056 Bill Creech 859-219-4044 Argonne National Laboratory SC UChicago Argonne, LLC 7/31/2006 9/30/2015 4 yrs Award Term Earned/additional 11 yrs Award Term Available 9/30/2026 M&O 2006 http://www.anl.gov/contract/ Patricia Schuneman 630-252-2956 Sergio Martinez 630-252-2075 Kristin Palmer 630-252-2127 Oak Ridge Environmental Management

384

DOE Facility Management Contracts Facility Owner Contractor  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

UChicago Argonne, LLC UChicago Argonne, LLC 7/31/2006 9/30/2011 4 yrs Award Term Earned/additional 11 yrs Award Term Available 9/30/2026 M&O 2006 http://www.anl.gov/contract/ Patricia Schuneman 630-252-2956 Sergio Martinez 630-252-2075 Kristin Palmer 630-252-2127 Oak Ridge Environmental Management EM Bechtel Jacobs Co LLC 12/18/1997 12/31/2011 12/31/2011 Environmental Mgmt 1998 http://www.oakridge.doe.gov/external/Home/Procurement/RecentAwards/tabid/101/De fault.aspx Barbara Jackson 865-576-0976 Karen Shears 865-241-6411 Ames National Laboratory SC Iowa State University 12/4/2006 12/31/2011 4yrs Award Term Earned/additional 11 yrs Award Term Available 12/31/2026 M&O 2007 http://www.ameslab.gov/operations/resources/contract Patricia Schuneman

385

Scott Roseman: Owner, New Leaf Community Markets  

E-Print Network (OSTI)

history, first met Roseman while she was an undergraduate student at UCSC doing an internship in alternative energy

Reti, Irene H.

2010-01-01T23:59:59.000Z

386

Corporate Law's Current-Owner Bias  

E-Print Network (OSTI)

reported on firms’ financial statements do not reflect theto the firm’s financial statements. Following the corporatein the footnotes to firms’ financial statements, and thus is

Fried, Jesse M.

2005-01-01T23:59:59.000Z

387

Corporate Law's Current-Owner Bias  

E-Print Network (OSTI)

reported on firms’ financial statements do not reflect theto the firm’s financial statements. Following the corporatein the footnotes to firms’ financial statements, and thus is

Fried, Jesse M.

2006-01-01T23:59:59.000Z

388

Scott Roseman: Owner, New Leaf Community Markets  

E-Print Network (OSTI)

there was some kind of, say, cod-type fish that was eitheror yellow, we didn’t carry a cod fish that was red. It wasn’

Reti, Irene H.

2010-01-01T23:59:59.000Z

389

Scott Roseman: Owner, New Leaf Community Markets  

E-Print Network (OSTI)

worked for the Alternative Energy Co-op, an organizationdoing an internship in alternative energy systems. After theat what was called the Alternative Energy Co-op, which was a

Reti, Irene H.

2010-01-01T23:59:59.000Z

390

Definition: Transmission Owner | Open Energy Information  

Open Energy Info (EERE)

facilities.1 Related Terms Transmission Operatortransmission lines, transmission line, transmission lines References Glossary of Terms Used in Reliability Standards An in...

391

How do PEV owners respond to  

NLE Websites -- All DOE Office Websites (Extended Search)

Utility System Load Profiles Figure 1 shows the Southern California Edison (SCE) hourly load profile for the top 12 days of summer (red line), the top 3 days in winter (dashed...

392

DOE Facility Management Contracts Facility Owner Contractor  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Susan E. Bechtol 509-376-3388 Advanced Mixed Waste Treatment Plant (INEEL) EM Idaho Treatment Group, LLC DE-AC07-091D-14813 5272011 9302015 No options 9302015...

393

DOE Facility Management Contracts Facility Owner Contractor  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Laboratory SC Stanford University 1251981 9302017 9302017 M&O 1981 http:www-group.slac.stanford.edulegalcontract.asp Barbara Jackson 865- 576-0976 Tyndal Lindler...

394

DOE Facility Management Contracts Facility Owner Contractor  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

865- 576-0976 Heather Houk 865-576-1894 Advanced Mixed Waste Treatment Plant (INEEL) EM Idaho Treatment Group, LLC 5272011 9302015 No options 9302015 Site Clean upfacility...

395

Localized Hardfacing Repair Techniques, RRAP45  

Science Conference Proceedings (OSTI)

Hardfacing overlays provide a hard, corrosive-resistant wear surface for critical valve, pump, and other component materials susceptible to one or more of the various wear mechanisms. As a result of being hard, these materials are also difficult to deposit and even more difficult to repair. When faced with a repair, owners either replace the hardfaced component or go through a time-consuming and difficult repair task. This report presents repair practices utilized by hardfacing alloy manufacturers, valve...

1997-12-19T23:59:59.000Z

396

State and Local Baldrige Programs  

Science Conference Proceedings (OSTI)

State, local, and regional Baldrige-based award programs use the ... organizational excellence and competitiveness in their states and regions. ...

2013-05-15T23:59:59.000Z

397

Robust Algorithms for Object Localization  

Science Conference Proceedings (OSTI)

Model-based localization, the task of estimating an object‘s pose from sensed and corresponding model features, is a fundamental task in machine vision. Exact constant time localization algorithms have been developed for the case where the sensed ... Keywords: object localization, object registration, resultants

Aaron Wallack; Dinesh Manocha

1998-05-01T23:59:59.000Z

398

STEP 2: To Be Completed by SOFC Privacy Policy "State law requires that you be informed of the following: (1) you are entitled to request to be informed about the information about  

E-Print Network (OSTI)

Part: 68 Mail Stop: STEP 2: To Be Completed by SOFC Privacy Policy "State law requires that you: STEP 4: Vendor, email invoice to ldarling@stuact.tamu.edu or mail invoice to SOFC Mail Stop 1236. STEP contact person: (Please notify SOFC @ 845-1114 if event is cancelled) Vendor phone number: Faculty

Behmer, Spencer T.

399

Privacy issues with DNA databases and retention of individuals' DNA information by law enforcement agencies: the holding of the European Court of Human Rights case S and Marper v. United Kingdom should be adapted to American Fourth Amendment jurisprudence  

Science Conference Proceedings (OSTI)

When law enforcement agencies collect, retain, and use individuals' DNA information in DNA databases for crime prevention purposes the presumption of innocence is reduced for those individuals. Collection and use of DNA information has benefits, greatly ... Keywords: DNA, DNA databases, European Court of Human Rights, comparative law, constitutional law, criminal procedure, fourth amendment, privacy

Michael Lwin

2010-06-01T23:59:59.000Z

400

Entanglement quantification by local unitaries  

E-Print Network (OSTI)

Invariance under local unitary operations is a fundamental property that must be obeyed by every proper measure of quantum entanglement. However, this is not the only aspect of entanglement theory where local unitaries play a relevant role. In the present work we show that the application of suitable local unitary operations defines a family of bipartite entanglement monotones, collectively referred to as "shield entanglement". They are constructed by first considering the (squared) Hilbert- Schmidt distance of the state from the set of states obtained by applying to it a given local unitary. To the action of each different local unitary there corresponds a different distance. We then minimize these distances over the sets of local unitaries with different spectra, obtaining an entire family of different entanglement monotones. We show that these shield entanglement monotones are organized in a hierarchical structure, and we establish the conditions that need to be imposed on the spectrum of a local unitary f...

Monras, A; Giampaolo, S M; Gualdi, G; Davies, G B; Illuminati, F

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "owner local privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Attacks on Local Searching Tools  

E-Print Network (OSTI)

The Google Desktop Search is an indexing tool, currently in beta testing, designed to allow users fast, intuitive, searching for local files. The principle interface is provided through a local web server which supports an interface similar to Google.com's normal web page. Indexing of local files occurs when the system is idle, and understands a number of common file types. A optional feature is that Google Desktop can integrate a short summary of a local search results with Google.com web searches. This summary includes 30-40 character snippets of local files. We have uncovered a vulnerability that would release private local data to an unauthorized remote entity. Using two different attacks, we expose the small snippets of private local data to a remote third party.

Nielson, Seth James; Wallach, Dan S

2011-01-01T23:59:59.000Z

402

Local Suppliers, Local Jobs: Sitting Down with Matthew Coapman | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Local Suppliers, Local Jobs: Sitting Down with Matthew Coapman Local Suppliers, Local Jobs: Sitting Down with Matthew Coapman Local Suppliers, Local Jobs: Sitting Down with Matthew Coapman July 30, 2010 - 10:51am Addthis Joshua DeLung Matthew Coapman sat behind a computer for six years after college, selling advertising space across the country for major brands. When his company starting shutting down, he wasn't defeated - he saw an opportunity to reinvent himself and help his community as well. Changing Charlotte "I realized the biggest need in our community was energy conservation in the places we live and work," says Coapman, now two years into starting his business - Energy Tight. "I knew it would take getting dirty to do it, but having an experience with customers where we can give them a combination of comfort and value in their homes makes it worth it."

403

Local Suppliers, Local Jobs: Sitting Down with Matthew Coapman | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Local Suppliers, Local Jobs: Sitting Down with Matthew Coapman Local Suppliers, Local Jobs: Sitting Down with Matthew Coapman Local Suppliers, Local Jobs: Sitting Down with Matthew Coapman July 30, 2010 - 10:51am Addthis Joshua DeLung Matthew Coapman sat behind a computer for six years after college, selling advertising space across the country for major brands. When his company starting shutting down, he wasn't defeated - he saw an opportunity to reinvent himself and help his community as well. Changing Charlotte "I realized the biggest need in our community was energy conservation in the places we live and work," says Coapman, now two years into starting his business - Energy Tight. "I knew it would take getting dirty to do it, but having an experience with customers where we can give them a combination of comfort and value in their homes makes it worth it."

404

Sample State and Local Ballots  

Science Conference Proceedings (OSTI)

Sample State and Local Ballots. ... We thank the election officials who have contributed to this effort. State, County/Municipality, Ballot, Election, Date, ...

2010-10-05T23:59:59.000Z

405

Residential Price - Local Distribution Companies  

U.S. Energy Information Administration (EIA)

Average Price of Natural Gas Delivered to Residential and Commercial Consumers by Local Distribution and Marketers in Selected States (Dollars per ...

406

FM-based indoor localization  

Science Conference Proceedings (OSTI)

The major challenge for accurate fingerprint-based indoor localization is the design of robust and discriminative wireless signatures. Even though WiFi RSSI signatures are widely available indoors, they vary significantly over time and are susceptible ... Keywords: fingerprinting, fm, localization, mobile systems, wireless

Yin Chen; Dimitrios Lymberopoulos; Jie Liu; Bodhi Priyantha

2012-06-01T23:59:59.000Z

407

Privacy and Preemption  

E-Print Network (OSTI)

legislation. As a Microsoft white paper from 2005 states, “Supp. V 2005). Microsoft White Paper, supra note 1, at 4.in 2007, but 2005. A white paper by Brad Smith, Microsoft’s

Schwartz, Paul M.

2009-01-01T23:59:59.000Z

408

PRIVACY IMPACT ASSESSMENT (PIA)  

Science Conference Proceedings (OSTI)

... No, Yes, Yes. NIST 183 06 – Application Servers and Database System, No, Yes, Yes. ... Chief, Telecommunications and CIO Support Division. ...

2012-09-16T23:59:59.000Z

409

PRIVACY IMPACT ASSESSMENT (PIA)  

Science Conference Proceedings (OSTI)

... NIST 183 06 – Application Servers and Database System ... Bruce K. Rosen Chief, Telecommunications and CIO Support Division 301-975-3299 ...

2012-10-10T23:59:59.000Z

410

PRIVACY IMPACT ASSESSMENT (PIA)  

Science Conference Proceedings (OSTI)

... and maintenance of Continuity of Operations ... of Success Stories, specific business identifiable information is ... do individuals or businesses have to ...

2012-09-13T23:59:59.000Z

411

Privacy | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

completed any pre-determined tasks while on the site. This technology is provided by Google Analytics and the information collected is used to optimize our website; helping us...

412

KnowPrivacy  

E-Print Network (OSTI)

as software glitches or Facebook‘s Beacon initiative. Oncefrom the incident involving Facebook‘s Beacon initiative inmade salient and obvious by the Facebook Beacon system. That

Gomez, Joshua; Pinnick, Travis; Soltani, Ashkan

2009-01-01T23:59:59.000Z

413

Fermion localization on thick branes  

Science Conference Proceedings (OSTI)

We consider chiral fermion confinement in scalar thick branes, which are known to localize gravity, coupled through a Yukawa term. The conditions for the confinement and their behavior in the thin-wall limit are found for various different BPS branes, including double walls and branes interpolating between different AdS{sub 5} spacetimes. We show that only one massless chiral mode is localized in all these walls, whenever the wall thickness is keep finite. We also show that, independently of wall's thickness, chiral fermionic modes cannot be localized in dS{sub 4} walls embedded in a M{sub 5} spacetime. Finally, massive fermions in double wall spacetimes are also investigated. We find that, besides the massless chiral mode localization, these double walls support quasilocalized massive modes of both chiralities.

Melfo, Alejandra; Pantoja, Nelson [Centro de Fisica Fundamental, Universidad de Los Andes, Merida (Venezuela); Tempo, Jose David [Centro de Fisica Fundamental, Universidad de Los Andes, Merida (Venezuela); Centro de Estudios Cientificos CECS, Casilla 1469, Valdivia (Chile)

2006-02-15T23:59:59.000Z

414

LOCAL GOVERNMENT EMERGENCY PLANNING HANDBOOK  

E-Print Network (OSTI)

CALIFORNIA ENERGY COMMISSION LOCAL GOVERNMENT EMERGENCY PLANNING HANDBOOK April 2004 PUBLICATION.....................................................................................................................2 SECTION II: HOW TO PREPARE THE PLAN Step 1: Designate an Energy Emergency Coordinator.......................................................................................................12 SECTION III: EXAMPLES OF OPERATING GUIDELINES Energy Emergency Coordinator

415

Focus group discussions among owners and non-owners of ground source heat pumps  

SciTech Connect

This research was sponsored by the Office of Buildings and Community Systems and conducted by the Pacific Northwest Laboratory as part of an ongoing effort to enhance the commercial use of federally developed technology. Federal dollars have supported research on the development of ground source heat pumps (GSHP) for several years. Though several companies currently sell GSHP's for residential use, their share of the total heating and air conditioning business remains less than one percent. Large manufacturing companies with national distribution have not yet added GSHP equipment to their product line. GSHP's use only about one half (Braud 1987) to one third (Bose 1987) of the energy needed to operate conventional furnaces and air conditioners. Consequently, a high level of market penetration by the GSHP offers direct benefits to both utility companies and individual users of the systems. Widespread use of these highly efficient systems will reduce both total energy consupmtion, and problems associated with high levels of energy use during peak periods. This will allow utility companies to delay capital expenditures for new facilities to meet the growing energy demand during peak periods. The cost effective use of electricity also reduces the likelihood of homeowners switching to a different fuel source for heating. 5 refs.

Roberson, B.F.

1988-07-01T23:59:59.000Z

416

Entanglement quantification by local unitaries  

E-Print Network (OSTI)

Invariance under local unitary operations is a fundamental property that must be obeyed by every proper measure of quantum entanglement. However, this is not the only aspect of entanglement theory where local unitaries play a relevant role. In the present work we show that the application of suitable local unitary operations defines a family of bipartite entanglement monotones, collectively referred to as "mirror entanglement". They are constructed by first considering the (squared) Hilbert-Schmidt distance of the state from the set of states obtained by applying to it a given local unitary. To the action of each different local unitary there corresponds a different distance. We then minimize these distances over the sets of local unitaries with different spectra, obtaining an entire family of different entanglement monotones. We show that these mirror entanglement monotones are organized in a hierarchical structure, and we establish the conditions that need to be imposed on the spectrum of a local unitary for the associated mirror entanglement to be faithful, i.e. to vanish on and only on separable pure states. We analyze in detail the properties of one particularly relevant member of the family, the "stellar mirror entanglement" associated to traceless local unitaries with nondegenerate spectrum and equispaced eigenvalues in the complex plane. This particular measure generalizes the original analysis of [Giampaolo and Illuminati, Phys. Rev. A 76, 042301 (2007)], valid for qubits and qutrits. We prove that the stellar entanglement is a faithful bipartite entanglement monotone in any dimension, and that it is bounded from below by a function proportional to the linear entropy and from above by the linear entropy itself, coinciding with it in two- and three-dimensional spaces.

A. Monras; G. Adesso; S. M. Giampaolo; G. Gualdi; G. B. Davies; F. Illuminati

2011-04-05T23:59:59.000Z

417

Hierarchy of local chemical reactivity indices originated from a local energy  

E-Print Network (OSTI)

The traditional way of defining a local measure of chemical hardness has several drawbacks, which undermine the applicability of that local hardness concept. We propose a new approach to this problem, by originating a local chemical potential, a corresponding local hardness, and local hyperhardnesses, from a local energy concept. A chemical potential kernel is also defined, by which a recently proposed alternative local chemical potential and local hardness concept can also be incorporated into this scheme of local reactivity indices.

Gal, Tamas

2011-01-01T23:59:59.000Z

418

The local deflection of light  

E-Print Network (OSTI)

We have derived the relationship between the radial proper distance, h, and the polar angle, phi, for a light ray that is emitted and travels in the neighborhood of the Earth's surface. General relativity predicts that, even locally, the equation which relates these two physical magnitudes differs from the one stated by the principle of equivalence. More precisely, we have proved that, in the weak field limit, the local physical trajectory, h=h(phi), is the one that would correspond to a massive Newtonian particle in a field two times greater. Therefore, and contrary to the generally accepted fact, the principle of equivalence gives only 1/2 part of the general relativity local deflection of light.

Eduardo Díaz-Miguel

2008-09-24T23:59:59.000Z

419

The Local Dimension of Energy  

E-Print Network (OSTI)

 expensive for one entity to consider it alone. In  Sweden during the early  1970s,  DH  networks  were  heavily  dependent  on  fossil  fuels  but  now  over  seventy  percent of fuel for DH comes from renewable feedstocks such as biomass and municipal  waste. In Finland, aside from a small... made by successful local governments can be narrowed to three key factors. First, they have all recognised the co-benefits of a local energy strategy: a reduction in fuel poverty, increased employment, improved quality of life and mitigation...

Kelly, Scott

2011-01-31T23:59:59.000Z

420

State and Local Solution Center: Webinars  

NLE Websites -- All DOE Office Websites (Extended Search)

Webinars to someone by E-mail Share State and Local Solution Center: Webinars on Facebook Tweet about State and Local Solution Center: Webinars on Twitter Bookmark State and Local...

Note: This page contains sample records for the topic "owner local privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

State and Local Energy Efficiency Action Network  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

The State and Local Energy Efficiency Action Network (SEE Action) is a state- and local-led effort facilitated by the U.S. Department of Energy and the U.S. Environmental...

422

Local Option - Industrial Facilities and Development Bonds |...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Water Water Heating Wind Maximum Rebate Locally Determined Program Information Utah Program Type State Bond Program Rebate Amount Locally Determined Under the Utah...

423

Local Option - Energy Improvement Financing Programs (Minnesota...  

Open Energy Info (EERE)

payments Interest rates locally determined, but must be sufficient to cover program costs. Program Administrator Programs administered locally Website http:mn.govcommerce...

424

The Localized Quantum Vacuum Field  

E-Print Network (OSTI)

A model for the localized quantum vacuum is proposed in which the zero-point energy of the quantum electromagnetic field originates in energy- and momentum-conserving transitions of material systems from their ground state to an unstable state with negative energy. These transitions are accompanied by emissions and re-absorptions of real photons, which generate a localized quantum vacuum in the neighborhood of material systems. The model could help resolve the cosmological paradox associated to the zero-point energy of electromagnetic fields, while reclaiming quantum effects associated with quantum vacuum such as the Casimir effect and the Lamb shift; it also offers a new insight into the Zitterbewegung of material particles.

Daniela Dragoman

2006-03-01T23:59:59.000Z

425

Women in Contemporary Philippine Local Politics  

E-Print Network (OSTI)

fund” from their internal revenue allotments (IRA), and ato local governments from internal revenue tax collections,

Tapales, Proserpina D. Ph.D.

2005-01-01T23:59:59.000Z

426

Isotropic non-locality cannot be distilled  

E-Print Network (OSTI)

We investigate non-locality distillation protocols for isotropic correlations. These correlations are the hardest instances which respect to distillability and only partial results are known about their behaviour under non-locality distillation protocols. We completely resolve this issue by proving that non-locality distillation is impossible for all non-local isotropic correlations.

Dejan D. Dukaric

2011-08-02T23:59:59.000Z

427

State and Local Solution Center: Financing Solutions  

NLE Websites -- All DOE Office Websites (Extended Search)

Technical Assistance Technical Assistance Resources Printable Version Share this resource Send a link to State and Local Solution Center: Financing Solutions to someone by E-mail Share State and Local Solution Center: Financing Solutions on Facebook Tweet about State and Local Solution Center: Financing Solutions on Twitter Bookmark State and Local Solution Center: Financing Solutions on Google Bookmark State and Local Solution Center: Financing Solutions on Delicious Rank State and Local Solution Center: Financing Solutions on Digg Find More places to share State and Local Solution Center: Financing Solutions on AddThis.com... Strategic Energy Planning Energy Policies & Programs Financing Financing Overview Financing Program Market Segments Energy Data Management Energy Technologies

428

Local Emergency Plans, Physics Department Safety & Training Office  

NLE Websites -- All DOE Office Websites (Extended Search)

Local Emergency Plans Building 510 Local Emergency Plan (pdf) Building 510 Abbreviated Local Emergency Plan (pdf) Building 355 Local Emergency Plan (pdf) Building 355 Abbreviated...

429

Chapter 52.1, Local Contract Clauses  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2.1, Local Contract Clauses 2.1, Local Contract Clauses [Reference: FAR 52, DEAR 952] Overview This section addresses the use of local clauses in DOE solicitations and contracts, and provides model local clauses that Contracting Officers may use when drafting their contracts. Background A local clause is a solicitation provision or contract clause that is not prescribed by either the FAR or the DEAR and is developed by a local DOE office for use in solicitations issued and contracts awarded by that office. Local clauses can be used for the following kinds of subject matter: Administrative contract issues. Local DOE site practices and procedures that affect the contract. Local DOE office solicitation procedures. Practices and procedures that implement FAR and DEAR policies.

430

Equivalence of Local Potential Approximations  

E-Print Network (OSTI)

In recent papers it has been noted that the local potential approximation of the Legendre and Wilson-Polchinski flow equations give, within numerical error, identical results for a range of exponents and Wilson-Fisher fixed points in three dimensions, providing a certain ``optimised'' cutoff is used for the Legendre flow equation. Here we point out that this is a consequence of an exact map between the two equations, which is nothing other than the exact reduction of the functional map that exists between the two exact renormalization groups. We note also that the optimised cutoff does not allow a derivative expansion beyond second order.

Tim R. Morris

2005-03-21T23:59:59.000Z

431

Comprehensive Local Water Management Act (Minnesota)  

Energy.gov (U.S. Department of Energy (DOE))

Each county is encouraged to develop and implement a local water management plan. This section sets the specifications that must be met by local plans. The status of county water plans is shown...

432

Local Energy Generation in Barotropic Flows  

Science Conference Proceedings (OSTI)

The local growth of disturbances to a steady, nondivergent shear flow is investigated in the context of the barotropic vorticity equation (BVE). A new expression for the instantaneous energy generation rate is derived by using a local coordinate ...

R. Iacono

2002-07-01T23:59:59.000Z

433

Department of Energy Idaho - State & Local  

NLE Websites -- All DOE Office Websites (Extended Search)

links > State & Local State & Local City of Idaho Falls State of Idaho Home Page Idaho State Police Links to Idaho Sites Idaho Media Idaho Newspapers Television KIDK Idaho Falls -...

434

Method for localizing heating in tumor tissue  

SciTech Connect

A method for a localized tissue heating of tumors is disclosed. Localized radio frequency current fields are produced with specific electrode configurations. Several electrode configurations are disclosed, enabling variations in electrical and thermal properties of tissues to be exploited.

Doss, James D. (Los Alamos, NM); McCabe, Charles W. (Los Alamos, NM)

1977-04-12T23:59:59.000Z

435

Mobile sensor network localization in harsh environments  

Science Conference Proceedings (OSTI)

The node localization problem in mobile sensor networks has recently received significant attention. Particle filters, adapted from robotics, have produced good localization accuracies in conventional settings, but suffer significantly when used in challenging ...

Harsha Chenji; Radu Stoleru

2010-06-01T23:59:59.000Z

436

Local Option - Industrial Facilities and Development Bonds |...  

Open Energy Info (EERE)

Sector Commercial, Industrial, Institutional, Local Government Eligible Technologies Boilers, Building Insulation, CaulkingWeather-stripping, Central Air conditioners, Chillers,...

437

Localized light absorption by nanoscale semiconducting tips ...  

Science Conference Proceedings (OSTI)

Page 1. Localized light absorption ... constructive interference between transmitted light and internal reflections at resonant radii Page 14. ...

2013-04-03T23:59:59.000Z

438

Localized Characterization of Carbon Nanotubes and Carbon ...  

Science Conference Proceedings (OSTI)

About this Abstract. Meeting, 2010 TMS Annual Meeting & Exhibition. Symposium , Polymer Nanocomposites. Presentation Title, Localized Characterization of ...

439

Radioimmune localization of occult carcinoma  

SciTech Connect

Patients with a rising serum carcinoembryonic antigen level and no clinical or roentgenographic evidence of recurrent or metastatic cancer present a treatment dilemma. Eleven such patients, 10 with a previously treated colorectal carcinoma and 1 with a previously treated breast carcinoma, received an injection of the anticarcinoembryonic antigen monoclonal antibody ZCE-025 labeled with the radioisotope indium 111. Nuclear scintigraphy was performed on days 3 and 5 through 7 to detect potential sites of tumor recurrence. The monoclonal antibody scan accurately predicted the presence or absence of occult malignancy in 7 (64%) patients. Second-look laparotomy confirmed the monoclonal antibody scan results in the patients with colorectal cancer, and magnetic resonance imaging confirmed metastatic breast cancer. This study demonstrates that In-ZCE-025 can localize occult carcinoma and may assist the surgeon in facilitating the operative exploration. In-ZCE-025 assisted in the initiation of adjuvant therapy for the patient with breast cancer.

Duda, R.B.; Zimmer, A.M.; Rosen, S.T.; Gilyon, K.A.; Webber, D.; Spies, S.; Spies, W.; Merchant, B. (Northwestern Univ. Medical School, Chicago, IL (USA))

1990-07-01T23:59:59.000Z

440

Entangling capacity with local ancilla  

E-Print Network (OSTI)

We investigate the entangling capacity of a dynamical operation with access to local ancilla. A comparison is made between the entangling capacity with and without the assistance of prior entanglement. An analytic solution is found for the log-negativity entangling capacity of two-qubit gates, which equals the entanglement of the Choi matrix isomorphic to the unitary operator. Surprisingly, the availability of prior entanglement does not affect this result; a property we call resource independence of the entangling capacity. We prove several useful upper-bounds on the entangling capacity that hold for general qudit dynamical operations, and for a whole family of entanglement measures including log-negativity and log-robustness. The log-robustness entangling capacity is shown to be resource independent for general dynamics. We provide numerical results supporting a conjecture that the log-negativity entangling capacity is resource independence for all two-qudit unitaries.

Campbell, Earl T

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "owner local privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

California's Transition To Local Renewable Energy  

E-Print Network (OSTI)

California's Transition To Local Renewable Energy: 12,000 Megawatts By 2020 A Report on the Governor's Conference on Local Renewable Energy June 7, 2012 #12;This report was made possible. #12;California's Transition To Local Renewable Energy: 12,000 Megawatts By 2020 A Report

Kammen, Daniel M.

442

Simultaneous Localization, Mapping and Moving Object Tracking  

Science Conference Proceedings (OSTI)

Simultaneous localization, mapping and moving object tracking (SLAMMOT) involves both simultaneous localization and mapping (SLAM) in dynamic environments and detecting and tracking these dynamic objects. In this paper, a mathematical framework is ... Keywords: detection, localization, mapping, mobile robotics, robotic perception, tracking

Chieh-Chih Wang; Charles Thorpe; Sebastian Thrun; Martial Hebert; Hugh Durrant-Whyte

2007-09-01T23:59:59.000Z

443

Secure localization with phantom node detection  

Science Conference Proceedings (OSTI)

In an adversarial environment, various kinds of attacks become possible if malicious nodes could claim fake locations that are different from their physical locations. In this paper, we propose a secure localization mechanism that detects existence of ... Keywords: Decentralized algorithm, Localization, Location verification, Secure localization, Sensor networks, Speculative algorithm

Joengmin Hwang; Tian He; Yongdae Kim

2008-09-01T23:59:59.000Z

444

Think Spring, Think Local... | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Think Spring, Think Local... Think Spring, Think Local... Think Spring, Think Local... April 25, 2013 - 11:15am Addthis Eating locally grown produce is healthy and reduces greenhouse gas emissions. | Photo courtesy of ©iStockphoto.com/CDH_Design Eating locally grown produce is healthy and reduces greenhouse gas emissions. | Photo courtesy of ©iStockphoto.com/CDH_Design Kristin Swineford Communication Specialist, Weatherization and Intergovernmental Programs How can I participate? Visit your local farmers' market or join a CSA to get your fruits and vegetables this summer. Are you getting excited thinking about how you plan to support your local economy, your larger environment and also your health this spring? I know I am! The nicer weather the eastern regions have been experiencing lately has got

445

Fingerprints of a Local Supernova  

E-Print Network (OSTI)

The results of precise analysis of elements and isotopes in meteorites, comets, the Earth, the Moon, Mars, Jupiter, the solar wind, solar flares, and the solar photosphere since 1960 reveal fingerprints of a local supernova (SN), undiluted by interstellar material. Heterogeneous SN debris formed the planets. The Sun formed on the neutron (n) rich SN core. The ground-state masses of nuclei reveal repulsive n-n interactions that trigger n-emission and a series of nuclear reactions that generate solar luminosity, the solar wind, and the measured flux of solar neutrinos. The location of the Sun's high-density core shifts relative to the solar surface as gravitational forces exerted by the major planets cause the Sun to experience abrupt acceleration and deceleration, like a yoyo on a string, in its orbit about the ever-changing centre-of-mass of the solar system. Solar cycles (surface magnetic activity, solar eruptions, and sunspots) and major climate changes arise from changes in the depth of the energetic SN co...

Manuel, Oliver

2009-01-01T23:59:59.000Z

446

Fingerprints of a Local Supernova  

E-Print Network (OSTI)

The results of precise analysis of elements and isotopes in meteorites, comets, the Earth, the Moon, Mars, Jupiter, the solar wind, solar flares, and the solar photosphere since 1960 reveal fingerprints of a local supernova (SN), undiluted by interstellar material. Heterogeneous SN debris formed the planets. The Sun formed on the neutron (n) rich SN core. The ground-state masses of nuclei reveal repulsive n-n interactions that trigger n-emission and a series of nuclear reactions that generate solar luminosity, the solar wind, and the measured flux of solar neutrinos. The location of the Sun's high-density core shifts relative to the solar surface as gravitational forces exerted by the major planets cause the Sun to experience abrupt acceleration and deceleration, like a yoyo on a string, in its orbit about the ever-changing centre-of-mass of the solar system. Solar cycles (surface magnetic activity, solar eruptions, and sunspots) and major climate changes arise from changes in the depth of the energetic SN core remnant in the interior of the Sun.

Oliver Manuel; Hilton Ratcliffe

2009-05-05T23:59:59.000Z

447

R-local Delaunay inhibition Model  

E-Print Network (OSTI)

Let us consider the local specification system of Gibbs point process with inhibition pairwise interaction acting on some Delaunay subgraph specifically not containing the edges of Delaunay triangles with circumscribed circle of radius greater than some fixed positive real value R. Even if we think that there exists at least a stationary Gibbs state associated to such system, we do not know yet how to prove it mainly due to some uncontrolled “negative ” contribution in the expression of the local energy needed to insert any number of points in some large enough empty region of the space. This is solved by introducing some subgraph, called the R-local Delaunay graph, which is a slight but tailored modification of the previous one. This kind of model does not inherit the local stability property but satisfies some new extension called R-local stability. This weakened property combined with the local property provides the existence of Gibbs state.

Etienne Bertin; Jean-michel Billiot; Rémy Drouilhet; In Memory Of Etienne Bertin

2006-01-01T23:59:59.000Z

448

Fully localized two-dimensional embedded solitons  

Science Conference Proceedings (OSTI)

We report the prediction of fully localized two-dimensional embedded solitons. These solitons are obtained in a quasi-one-dimensional waveguide array which is periodic along one spatial direction and localized along the orthogonal direction. Under appropriate nonlinearity, these solitons are found to exist inside the Bloch bands (continuous spectrum) of the waveguide and thus are embedded solitons. These embedded solitons are fully localized along both spatial directions. In addition, they are fully stable under perturbations.

Yang Jianke [Department of Mathematics and Statistics, University of Vermont, Burlington, Vermont 05401 (United States)

2010-11-15T23:59:59.000Z

449

Experiments with Underwater Robot Localization and Tracking  

E-Print Network (OSTI)

pipeline-, and ?sh tracking,” Journal of Marine Design andRobot Localization and Tracking Peter Corke † , Carrickinvestigation into feature tracking for visual odometry for

Corke, Peter; Detwiler, Carrick; Dunbabin, Matthew; Hamilton, Michael; Rus, Daniela; Vasilescu, Iuliu

2007-01-01T23:59:59.000Z

450

Local Option - Special Districts | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Local Option - Special Districts Local Option - Special Districts Local Option - Special Districts < Back Eligibility Commercial Residential Savings Category Heating & Cooling Commercial Heating & Cooling Heating Home Weatherization Commercial Weatherization Cooling Sealing Your Home Ventilation Construction Heat Pumps Appliances & Electronics Commercial Lighting Lighting Windows, Doors, & Skylights Bioenergy Solar Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Heating Wind Program Info State Florida Program Type PACE Financing '''''Note: The Federal Housing Financing Agency (FHFA) issued a [http://www.fhfa.gov/webfiles/15884/PACESTMT7610.pdf statement] in July 2010 concerning the senior lien status associated with most PACE programs. In response to the FHFA statement, most local PACE programs have been

451

Carbon Nanofiber Arrays Introduced as Artificial Local ...  

ORNL 2010-G00642/jcn UT-B IDs PFTT-200100978, PFTT-200201199, PFTT-200401482, PFTT-200401483 Carbon Nanofiber Arrays Introduced as Artificial Local ...

452

Local Generation Limited | Open Energy Information  

Open Energy Info (EERE)

Limited Place United Kingdom Sector Biomass Product UK-based biomass firm developing anaerobic digestion plants. References Local Generation Limited1 LinkedIn Connections...

453

Local Option - Energy Improvement Financing Programs | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

authority, port authority, or another entity permitted by law to exercise the powers of an authority. The authorizing laws sets a series of rules governing these local...

454

On reconciling quantum mechanics and local realism  

E-Print Network (OSTI)

A necessary and natural change in our application of quantum mechanics to separated systems is shown to reconcile quantum mechanics and local realism. An analysis of separation and localization justifies the proposed change in application of quantum mechanics. An important EPRB experiment is reconsidered and it is seen that when it is correctly interpreted it supports local realism. This reconciliation of quantum mechanics with local realism allows the axiom sets of quantum mechanics, probability, and special relativity to be joined in a consistent global axiom set for physics.

Donald A. Graft

2013-09-04T23:59:59.000Z

455

Underwater localization based on multicarrier waveforms  

E-Print Network (OSTI)

Abstract—In this paper, we investigate the problem of localizing an underwater sensor node based on message broadcasting from multiple surface nodes. With the time-of-arrival measurements from a DSP-based multicarrier modem, each sensor node localizes itself based on the travel time differences among multiple senders to the receiver. Using one-way message passing, such a solution can scalably accommodate a large number of nodes in a network. We present simulation results as well as preliminary testing results in a swimming pool and in a local lake. Surface buoys with GPS sensors self-localization via acoustic links I.

Patrick Carroll; Shengli Zhou; Hao Zhou; Jun-hong Cui; Peter Willett

2010-01-01T23:59:59.000Z

456

FCT Education: For State and Local Governments  

NLE Websites -- All DOE Office Websites (Extended Search)

& Local Governments For Early Adopters For Students & Educators Careers in Hydrogen & Fuel Cells Quick Links Hydrogen Production Hydrogen Delivery Hydrogen Storage Fuel Cells...

457

State and Local Energy Assurance Planning | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

State and Local Energy Assurance Planning State and Local Energy Assurance Planning OE works closely with State and local governments on energy assurance issues. The office...

458

Local Awards for Energy Emergency Preparation | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Local Awards for Energy Emergency Preparation Local Awards for Energy Emergency Preparation List of local awards for energy emergency preparation, including city, state,...

459

Solar Easements and Local Option Solar Rights Laws | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Solar Easements and Local Option Solar Rights Laws Solar Easements and Local Option Solar Rights Laws < Back Eligibility Commercial Fed. Government Industrial Local Government...

460

Locally exact modifications of discrete gradient schemes  

E-Print Network (OSTI)

Locally exact integrators preserve linearization of the original system at every point. We construct energy-preserving locally exact discrete gradient schemes for arbitrary multidimensional canonical Hamiltonian systems by modifying classical discrete gradient schemes. Modifications of this kind are found for any discrete gradient.

Cie?li?ski, Jan L

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "owner local privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Predicting locality phases for dynamic memory optimization  

Science Conference Proceedings (OSTI)

Dynamic data, cache, and memory adaptation can significantly improve program performance when they are applied on long continuous phases of execution that have dynamic but predictable locality. To support phase-based adaptation, this paper defines the ... Keywords: Dynamic optimization, Locality analysis and optimization, Phase hierarchy, Program phase prediction, Reconfigurable architecture

Xipeng Shen; Yutao Zhong; Chen Ding

2007-07-01T23:59:59.000Z

462

Commercial % Sold by Local Distribution Companies  

U.S. Energy Information Administration (EIA) Indexed Site

Residential Price - Local Distribution Companies Residential Price - Marketers Residential % Sold by Local Distribution Companies Average Commercial Price Commercial Price - Local Distribution Companies Commerical Price - Marketers Commercial % Sold by Local Distribution Companies Period: Residential Price - Local Distribution Companies Residential Price - Marketers Residential % Sold by Local Distribution Companies Average Commercial Price Commercial Price - Local Distribution Companies Commerical Price - Marketers Commercial % Sold by Local Distribution Companies Period: Annual Download Series History Download Series History Definitions, Sources & Notes Definitions, Sources & Notes Show Data By: Data Series Area 2006 2010 2011 2012 View History District of Columbia 19.95 16.4 2006-2010 Florida 43.91 40.2 2006-2010 Georgia 20.63 18.3 17.8 17.4 2006-2012 Maryland 30.42 28.9 2006-2010 Michigan 63.99 55.8 2006-2010 New York 49.39 37.2 36.7 33.6 2006-2012 Ohio 35.13 20.6 17.9 13.2 2006-2012

463

Commercial % Sold by Local Distribution Companies  

Gasoline and Diesel Fuel Update (EIA)

Residential Price - Local Distribution Companies Residential Price - Marketers Residential % Sold by Local Distribution Companies Average Commercial Price Commercial Price - Local Distribution Companies Commerical Price - Marketers Commercial % Sold by Local Distribution Companies Period: Residential Price - Local Distribution Companies Residential Price - Marketers Residential % Sold by Local Distribution Companies Average Commercial Price Commercial Price - Local Distribution Companies Commerical Price - Marketers Commercial % Sold by Local Distribution Companies Period: Annual Download Series History Download Series History Definitions, Sources & Notes Definitions, Sources & Notes Show Data By: Data Series Area 2006 2010 2011 2012 View History District of Columbia 19.95 16.4 2006-2010 Florida 43.91 40.2 2006-2010 Georgia 20.63 18.3 17.8 17.4 2006-2012 Maryland 30.42 28.9 2006-2010 Michigan 63.99 55.8 2006-2010 New York 49.39 37.2 36.7 33.6 2006-2012 Ohio 35.13 20.6 17.9 13.2 2006-2012

464

From irreducible representations to locally decodable codes  

Science Conference Proceedings (OSTI)

A q-query Locally Decodable Code (LDC) is an error-correcting code that allows to read any particular symbol of the message by reading only q symbols of the codeword even if the codeword is adversary corrupted. In this paper we present a new approach ... Keywords: locally decodable codes, representation theory

Klim Efremenko

2012-05-01T23:59:59.000Z

465

LOCAL DECOUPLING IN THE LHC INTERACTION REGIONS  

SciTech Connect

Local decoupling is a technique to correct coupling locally and operationally, that is, without a priori knowledge of the underlying skew quadrupole errors. The method is explained and applied to the correction of coupling in the interaction regions of the LHC at collision.

PILAT,F.

1999-09-07T23:59:59.000Z

466

Local discriminative distance metrics ensemble learning  

Science Conference Proceedings (OSTI)

The ultimate goal of distance metric learning is to incorporate abundant discriminative information to keep all data samples in the same class close and those from different classes separated. Local distance metric methods can preserve discriminative ... Keywords: Distance metrics learning, Local learning

Yang Mu; Wei Ding; Dacheng Tao

2013-08-01T23:59:59.000Z

467

Rigid Body Simulation with Local Fracturing Effects  

Science Conference Proceedings (OSTI)

Focusing on the real-time and interactive ability features in the Virtual Reality application, we propose a fracture pattern based on local fracture mechanism. Taking advantage of the experience analysis or the offline computation verified fracture characteristic, ... Keywords: Rigid Body, pre-fracture, fracture pattern, local fracture, dynamics

Wu Bo; Zeng Liang; Wu Yagang

2011-05-01T23:59:59.000Z

468

Fusion of Loops for Parallelism and Locality  

Science Conference Proceedings (OSTI)

Abstract¿Loop fusion improves data locality and reduces synchronization in data-parallel applications. However, loop fusion is not always legal. Even when legal, fusion may introduce loop-carried dependences which prevent parallelism. In addition, performance ... Keywords: Locality enhancement, loop fusion, cache conflicts, loop transformations, data-parallel applications, scalable shared-memory multiprocessors.

Naraig Manjikian; Tarek S. Abdelrahman

1997-02-01T23:59:59.000Z

469

An automaton Constraint for Local Search  

Science Conference Proceedings (OSTI)

We explore the idea of using automata to implement new constraints for local search. This is already a successful approach in constraint-based global search. We show how to maintain the violations of a constraint and its variables via a deterministic ... Keywords: Automaton constraint, Counter automaton, Local search

Jun He; Pierre Flener; Justin Pearson

2011-04-01T23:59:59.000Z

470

Local Thermodynamic Equilibrium at Three Levels  

E-Print Network (OSTI)

We present coordinated formulations of local thermodynamical equilibrium conditions at three levels, namely the macroscopic one of classical thermodynamics, the mesoscopic one of hydrodynamical fluctuations and the microscopic one of quantum statistical mechanics. These conditions are all expressed in terms of the hydrodynamical variables of the macroscopic picture, and the quantum statistical ones are shown to imply a local version of the zeroth law.

Geoffrey L. Sewell

2013-09-04T23:59:59.000Z

471

Biomass for energy and materials Local technologies -  

E-Print Network (OSTI)

Biomass for energy and materials Local technologies - in a global perspective Erik Steen Jensen Bioenergy and biomass Biosystems Department Risø National Laboratory Denmark #12;Biomass - a local resource, slaughterhouse waste. #12;Biomass characteristics · Biomass is a storable energy carrier, unlike electricity

472

Weighted locally linear embedding for dimension reduction  

Science Conference Proceedings (OSTI)

The low-dimensional representation of high-dimensional data and the concise description of its intrinsic structures are central problems in data analysis. In this paper, an unsupervised learning algorithm called weighted locally linear embedding (WLLE) ... Keywords: Feature extraction, Locally linear embedding, Manifold learning, Nonlinear dimensionality reduction

Yaozhang Pan; Shuzhi Sam Ge; Abdullah Al Mamun

2009-05-01T23:59:59.000Z

473

Locally Accessible Information and Distillation of Entanglement  

E-Print Network (OSTI)

A new type of complementary relation is found between locally accessible information and final average entanglement for given ensemble. It is also shown that in some well known distillation protocol, this complementary relation is optimally satisfied. We discuss the interesting trade-off between locally accessible information and distillable entanglement for some states.

Sibasish Ghosh; Pramod Joag; Guruprasad Kar; Samir Kunkri; Anirban Roy

2004-03-18T23:59:59.000Z

474

Entanglement manipulation by a local magnetic pulse  

E-Print Network (OSTI)

A scheme for controlling the entanglement of a two-qubit system by a local magnetic pulse is proposed. We show that the entanglement of the two-qubit system can be increased by sacrificing the coherence in ancillary degree of freedom, which is induced by a local manipulation.

Shi-Jian Gu; Hai-Qing Lin

2005-03-15T23:59:59.000Z

475

Request for Information (RFI) from the Department of Energy for Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NBP RFI: Data Access NBP RFI: Data Access Honeywell Responses To Request for Information (RFI) from the Department of Energy on Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy 1. Who owns energy consumption data? The utility needs access to "raw" billing data, i.e., meter readings that take place every time the price changes and allow the utility to calculate the consumption during a particular time period and rate the consumption according to the price in effect during that period. Based on the FIPP principle of data minimization, it is expected that these meter readings would occur just a few times per day (e.g., every time a new price period begins

476

NREL: State and Local Activities - Related Links  

NLE Websites -- All DOE Office Websites (Extended Search)

Related Links Related Links Find information about U.S. Department of Energy (DOE) and other state and local clean energy technical assistance and deployment programs and activities. State and Local Technical Assistance Programs NREL provides technical assistance to state and local energy projects through the following initiatives and programs. DOE Green Power Network DOE Weatherization & Intergovernmental Program U.S. Department of Agriculture Rural Energy for America Program For more information about NREL's role, contact Dave Peterson. State and Local Deployment Programs NREL strives to increase the scale of clean energy technology deployment in U.S. states and localities by supporting these technology deployment projects and initiatives. DOE Biomass Program DOE Builders Challenge

477

State & Local | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

State & Local State & Local State & Local Links to Intergovernmental Organizations Council of State Governments Established in 1933, the Council of State Governments is the only multi-branch state association in the nation. It offers leadership training, provides research and information products, and focuses on regional problem-solving in an effort to increase states' efficiency and productivity. It keeps offices across the United States that staff regional associations of legislative and executive officials. Energy Communities Alliance Energy Communities Alliance is an organization of local governments that are impacted by Department of Energy (DOE) activities. Its mission is to have local government officials in Department of Energy-impacted communities share information, establish policy positions, and advocate

478

State & Local Government | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

State & Local Government State & Local Government State & Local Government The roof of the 12-story Chicago City Hall building has been retrofitted with a 22,000 square-foot rooftop garden to reduce urban air temperature. | Credit: Katrin Scholz-Barth The roof of the 12-story Chicago City Hall building has been retrofitted with a 22,000 square-foot rooftop garden to reduce urban air temperature. | Credit: Katrin Scholz-Barth State and local governments play an important role in the everyday lives of people around the country. Developing and installing the next generation of clean energy technologies often happens at the local level, so it's important that there is communication across all levels of government. Every day the Department of Energy works closely with these governments to

479

Local energy conservation programs: past and future  

SciTech Connect

A review of local government energy programs examines specific programs adopted since 1975 which have been successful and identifies lessons from these experiences that will be helpful in the future. Successful programs have a positive effect on economic development and job creation, income equity, environmental and consumer goals, and political goals. The report focuses on three major areas of local programs: building codes, joint programs, and energy management. Other programs in the review are financing arrangements, retrofitting, transportation, etc. While direct benefits lack data for verification, the indirect benefits of aggressive local government programs have had significant value in establishing local programs at the laboratories for trying new ideas. Future local efforts need cooperation and support from the federal government. 56 references, 1 figure.

Lee, H.

1984-01-01T23:59:59.000Z

480

Distillation of local purity from quantum states  

E-Print Network (OSTI)

Recently Horodecki et al. [Phys. Rev. Lett. 90, 100402 (2003)] introduced an important quantum information processing paradigm, in which two parties sharing many copies of the same bipartite quantum state distill local pure states, by means of local unitary operations assisted by a one-way (two-way) completely dephasing channel. Local pure states are a valuable resource from a thermodynamical point of view, since they allow thermal energy to be converted into work by local quantum heat engines. We give a simple information-theoretical characterization of the one-way distillable local purity, which turns out to be closely related to a previously known operational measure of classical correlations, the one-way distillable common randomness.

I. Devetak

2004-06-30T23:59:59.000Z

Note: This page contains sample records for the topic "owner local privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Localities and their natural gas : stories of problem diffusion, state preemption, and local government capacity  

E-Print Network (OSTI)

The rapid rise of oil and gas production in the United States poses a new set of policy challenges for local governments. Striving to balance the goals of encouraging economic growth and mitigating its side effects, local ...

Agatstein, Jessica C

2013-01-01T23:59:59.000Z

482

Energy Efficiency: Helping Home Owners and Businesses Understand...  

NLE Websites -- All DOE Office Websites (Extended Search)

Understand Energy Usage November 7, 2013 - 3:55pm Addthis Building 90, an 89,000-square foot office building at Berkeley Lab, served as the commercial setting for the miscellaneous...

483

CENSUS","FIPST","OWNER","PMOVER","FUELTYP","COCODE","PLTCODE...  

U.S. Energy Information Administration (EIA) Indexed Site

52,9000,48,1305,0026,7,50022,"FO2","GT" 93,06,1,7,"D",149,170,"SOUTHERN CALIF EDISON CO","WIND",0,"NA",17609,5,0,984,"A",480,84,-249,0,0,25797,0,0,38832,0,0,6546,0,0,55668,0,0,961...

484

CENSUS","FIPST","OWNER","PMOVER","FUELTYP","COCODE","PLTCODE...  

U.S. Energy Information Administration (EIA) Indexed Site

,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,3564,0,99999,"WAT","GT" 74,48,,2,,579,229,"SOUTHLAND PAPER MILLS INC","HOUSTON",55000,,0,0,0,1282,,"I",83,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0...

485

CENSUS","FIPST","OWNER","PMOVER","FUELTYP","COCODE","PLTCODE...  

U.S. Energy Information Administration (EIA) Indexed Site

43,957,0,0,1219,0026,7,00195,"FO2","GT" 93,06,1,7,"D",149,170,"SOUTHERN CALIF EDISON CO","WIND",650,"NA",52721,0,0,486,,480,86,1140,0,0,4860,0,0,7440,0,0,7740,0,0,41480,0,0,9960,0...

486

CENSUS","FIPST","OWNER","PMOVER","FUELTYP","COCODE","PLTCODE...  

U.S. Energy Information Administration (EIA) Indexed Site

7,11000,43,1217,0026,7,00195,"FO2","GT" 93,06,1,7,"D",149,170,"SOUTHERN CALIF EDISON CO","WIND",0,"NA",52721,0,0,1286,,480,87,1800,0,0,3540,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,6630,...

487

CENSUS","FIPST","OWNER","PMOVER","FUELTYP","COCODE","PLTCODE...  

U.S. Energy Information Administration (EIA) Indexed Site

8,14000,57,1092,0026,7,00195,"FO2","GT" 93,06,1,7,"D",149,170,"SOUTHERN CALIF EDISON CO","WIND",330,"NA",52721,0,0,985,,480,85,13806,0,0,4542,0,0,6840,0,0,-30,0,0,7380,0,0,10140,0...

488

Table 17. Purchases of enrichment services by owners and operators ...  

U.S. Energy Information Administration (EIA)

Next Release Date: May 2014 Enrichment Service Contract Type: U.S. Enrichment Foreign Enrichment: Total Spot : 0 521 : 521 Long-Term : 3,261 11,808 : 15,069

489

Nuclear plant owners move closer to life extension  

Science Conference Proceedings (OSTI)

A major debate is now underway about the safety of 40-year-old nuclear power plants. Under the Atomic Energy Act of 1954 a nuclear power plant's license is limited to a maximum of 40 years. Although the act permits the renewal of an operating license, it does not outline any standards or procedures for determining when or under what conditions a plant's operating license should be renewed. This paper reports that the Electric Power Research Institute (EPRI) and the U.S. Department of Energy (DOE) are co-sponsors of a program to demonstrate the license renewal process for two nuclear power plants - Yankee Atomic Electric's 175-MW Yankee PWR plant and Northern States Power's 536-MW Monticello BWR plant. The demonstration is known as the lead plant project. Yankee Atomic has already analyzed the plant's condition and evaluated aging using computer-based expert systems and the plant's operating experience. During these tests Yankee Atomic found embrittlement of the reactor vessel.

Smith, D.J.

1991-10-01T23:59:59.000Z

490

FINAL CONTRACT WITH OWNER 1 TOWN OF BABYLON  

E-Print Network (OSTI)

of the number and gender in which used, shall be deemed to include any other number and any other gender,330.00 DEDUCTIONS: LESS: Applied Energy Audit Expense $250.00 LESS: LIPA Rebate (@10% of qualified costs) TBD1 TOTAL DEDUCTIONS from CONTRACT AMOUNT $250.00 NET AMOUNT of BENEFIT ASSESSMENT $11,080.00 ESTIMATED ANNUAL ENERGY

Kammen, Daniel M.

491

DOE/NNSA Facility Management Contracts Facility Owner Contractor  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Option Period have been exercised) 7312018 M&O 2008 Northrop Grumman Flour Honeywell Craig Armstrong 803-952-9345 James Lovett 803-952-9829 National Renewable Energy Laboratory...

492

Facility Name Facility Name Facility FacilityType Owner Developer...  

Open Energy Info (EERE)

In Service Mountain Air Mountain Air Mountain Air Definition Commercial Scale Wind Terna Energy Terna Energy Idaho Power Hammett ID MW Vestas In Service Mountain Home Wind Farm...

493

CENSUS","FIPST","OWNER","PMOVER","FUELTYP","COCODE","PLTCODE...  

U.S. Energy Information Administration (EIA) Indexed Site

0,0,0,0,0,0,0,8000,65,0,2904,1,50356,"OIL","GT" 31,39,5,4,9,552,15,"BRYAN (CITY OF)","NEW TURBINE",0,"NAT GAS",0,0,0,379,"A",,79,0,0,0,0,0,0,485500,8622,0,0,0,0,827900,14582,0,9153...

494

CENSUS","FIPST","OWNER","PMOVER","FUELTYP","COCODE","PLTCODE...  

U.S. Energy Information Administration (EIA) Indexed Site

0,27818,0,4080000,42888,0,2910,1,50635,"NG","ST" 31,39,5,4,8,568,10,"COLUMBUS (CITY OF)","GAS TURBINE",14480,"FUEL OIL",0,0,0,1271,,,72,211000,705,898,377290,1001,897,155800,567,97...

495

CENSUS","FIPST","OWNER","PMOVER","FUELTYP","COCODE","PLTCODE...  

U.S. Energy Information Administration (EIA) Indexed Site

,85899,0,5139500,130779,0,2910,1,50635,"NG","ST" 31,39,5,4,8,568,10,"COLUMBUS (CITY OF)","GAS TURBINE",14480,"FUEL OIL",0,0,0,1269,,,70,630226,2190,1206,753632,2634,1048,402210,136...

496

CENSUS","FIPST","OWNER","PMOVER","FUELTYP","COCODE","PLTCODE...  

U.S. Energy Information Administration (EIA) Indexed Site

0,0,0,0,120850,1525,0,0,0,0,1299,8,51596,"NG","IC" 47,20,5,4,9,659,10,"LARNED (CITY OF)","GAS TURBINE",1250,"NAT GAS",0,0,0,1277,,,78,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,...

497

CENSUS","FIPST","OWNER","PMOVER","FUELTYP","COCODE","PLTCODE...  

U.S. Energy Information Administration (EIA) Indexed Site

108263,0,5860000,114923,0,2910,1,50635,"NG","ST" 31,39,5,4,8,568,10,"COLUMBUS (CITY OF)","GAS TURBINE",14480,"FUEL OIL",0,0,0,1272,,,73,1549300,5207,1000,685700,2238,1000,447000,12...

498

CENSUS","FIPST","OWNER","PMOVER","FUELTYP","COCODE","PLTCODE...  

U.S. Energy Information Administration (EIA) Indexed Site

0,56601,0,4685000,54343,0,2910,1,50635,"NG","ST" 31,39,5,4,8,568,10,"COLUMBUS (CITY OF)","GAS TURBINE",14480,"FUEL OIL",0,0,0,1270,,,71,0,0,1240,102000,276,965,114000,260,1133,2480...

499

CENSUS","FIPST","OWNER","PMOVER","FUELTYP","COCODE","PLTCODE...  

U.S. Energy Information Administration (EIA) Indexed Site

5400,1618,0,168000,4865,0,2910,1,50635,"NG","ST" 31,39,5,4,8,568,10,"COLUMBUS (CITY OF)","GAS TURBINE",14480,"FUEL OIL",0,0,0,1275,,,76,753500,3666,1197,583900,2207,1190,802700,315...

500

CENSUS","FIPST","OWNER","PMOVER","FUELTYP","COCODE","PLTCODE...  

U.S. Energy Information Administration (EIA) Indexed Site

0,0,0,0,0,0,0,0,0,0,0,0,2904,1,50356,"FO2","GT" 31,39,5,4,9,552,15,"BRYAN (CITY OF)","NEW TURBINE",0,"NAT GAS",0,0,0,1280,,,81,0,116,0,0,165,0,0,222,0,74700,2393,0,0,64,0,7200,507,...