National Library of Energy BETA

Sample records for relations board securities

  1. VERMONT LABOR RELATIONS BOARD Notice of Election

    E-Print Network [OSTI]

    Hayden, Nancy J.

    VERMONT LABOR RELATIONS BOARD Notice of Election Pursuant to an order of the Vermont Labor Relations Board dated November 5, 2014, an election will be conducted by the Vermont Labor Relations Board (Administrative Support or Clerical), T Family (Technical) and Sp Family (Specialized) in the University ofVermont

  2. UNIVERSITY OF NEW MEXICO LABOR MANAGEMENT RELATIONS BOARD

    E-Print Network [OSTI]

    New Mexico, University of

    UNIVERSITY OF NEW MEXICO LABOR MANAGEMENT RELATIONS BOARD RULES AND REGULATIONS I. GENERAL PROVISIONS 1.1 General These Rules and Regulations ("Rules") are established by the University of New Mexico of New Mexico Labor Management Relations Resolution, effective May 31, 2006 (the "UNM Resolution

  3. Secure SQL Server - Enabling Secure Access to Remote Relational Data

    E-Print Network [OSTI]

    Paulin, Alois

    2012-01-01

    The Secure SQL Server - SecSS, is a technology primarily developed to enable self-service governance of states, as described in (Paulin 2012). Self-service governance is a novel model of governance that rejects service-based public administration and instead proposes that governed subjects manage their legal relations in a self-service manner, based on ad-hoc determination of eligibilities. In this article we describe the prototype SecSS and its evaluation in a complex governmental scenario.

  4. Securities Law Issues Relating to Community Solar Projects

    Broader source: Energy.gov [DOE]

    The law firm Stoel Rives has analyzed the issues related to Securities Law and Community Solar both in the context of Washington state law and federal law.

  5. Towards a Relation Extraction Framework for Cyber-Security Concepts

    SciTech Connect (OSTI)

    Jones, Corinne L; Bridges, Robert A; Huffer, Kelly M; Goodall, John R

    2015-01-01

    In order to assist security analysts in obtaining information pertaining to their network, such as novel vulnerabilities, exploits, or patches, information retrieval methods tailored to the security domain are needed. As labeled text data is scarce and expensive, we follow developments in semi-supervised NLP and implement a bootstrapping algorithm for extracting security entities and their relationships from text. The algorithm requires little input data, specifically, a few relations or patterns (heuristics for identifying relations), and incorporates an active learning component which queries the user on the most important decisions to prevent drifting the desired relations. Preliminary testing on a small corpus shows promising results, obtaining precision of .82.

  6. Related Links | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    About Us Our Programs Defense Programs Future Science & Technology Programs Advanced Simulation and Computing and Institutional R&D Programs Related Links Related Links...

  7. Related Sites | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMassR&D100 Winners *Reindustrialization Reindustrialization As EM cleansFieldRelated

  8. Related Links | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-RichProtonAbout UsRegional companies eye growthRelatedAbout Us

  9. Related Links | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-RichProtonAbout UsRegional companies eye growthRelatedAbout

  10. Interconnection arrangement of routers of processor boards in array of cabinets supporting secure physical partition

    DOE Patents [OSTI]

    Tomkins, James L. (Albuquerque, NM); Camp, William J. (Albuquerque, NM)

    2007-07-17

    A multiple processor computing apparatus includes a physical interconnect structure that is flexibly configurable to support selective segregation of classified and unclassified users. The physical interconnect structure includes routers in service or compute processor boards distributed in an array of cabinets connected in series on each board and to respective routers in neighboring row cabinet boards with the routers in series connection coupled to routers in series connection in respective neighboring column cabinet boards. The array can include disconnect cabinets or respective routers in all boards in each cabinet connected in a toroid. The computing apparatus can include an emulator which permits applications from the same job to be launched on processors that use different operating systems.

  11. Security and Trust Convergence: Attributes, Relations and Provenance

    E-Print Network [OSTI]

    Sandhu, Ravi

    Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security University of Texas Security 1 #12;© Ravi Sandhu World-Leading Research with Real-World Impact! State of Cyber Security 2 #12;© Ravi Sandhu World-Leading Research with Real-World Impact! State of Cyber Security About as good

  12. Security and Trust Convergence: Attributes, Relations and Provenance

    E-Print Network [OSTI]

    Sandhu, Ravi

    Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security University of Texas Security #12;2© Ravi Sandhu World-Leading Research with Real-World Impact! State of Cyber Security #12;3© Ravi Sandhu World-Leading Research with Real-World Impact! State of Cyber Security About as good

  13. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  14. Annual report to Congress: Department of Energy activities relating to the Defense Nuclear Facilities Safety Board, calendar year 1998

    SciTech Connect (OSTI)

    1999-02-01

    This is the ninth Annual Report to the Congress describing Department of Energy (Department) activities in response to formal recommendations and other interactions with the Defense Nuclear Facilities Safety Board (Board). The Board, an independent executive-branch agency established in 1988, provides advice and recommendations to the Secretary of energy regarding public health and safety issues at the Department`s defense nuclear facilities. The Board also reviews and evaluates the content and implementation of health and safety standards, as well as other requirements, relating to the design, construction, operation, and decommissioning of the Department`s defense nuclear facilities. The locations of the major Department facilities are provided. During 1998, Departmental activities resulted in the proposed closure of one Board recommendation. In addition, the Department has completed all implementation plan milestones associated with four other Board recommendations. Two new Board recommendations were received and accepted by the Department in 1998, and two new implementation plans are being developed to address these recommendations. The Department has also made significant progress with a number of broad-based initiatives to improve safety. These include expanded implementation of integrated safety management at field sites, a renewed effort to increase the technical capabilities of the federal workforce, and a revised plan for stabilizing excess nuclear materials to achieve significant risk reduction.

  15. Annual report to Congress: Department of Energy activities relating to the Defense Nuclear Facilities Safety Board, Calendar Year 1999

    SciTech Connect (OSTI)

    None

    2000-02-01

    This is the tenth Annual Report to the Congress describing Department of Energy activities in response to formal recommendations and other interactions with the Defense Nuclear Facilities Safety Board (Board). The Board, an independent executive-branch agency established in 1988, provides advice and recommendations to the Secretary of Energy regarding public health and safety issues at the Department's defense nuclear facilities. The Board also reviews and evaluates the content and implementation of health and safety standards, as well as other requirements, relating to the design, construction, operation, and decommissioning of the Department's defense nuclear facilities. During 1999, Departmental activities resulted in the closure of nine Board recommendations. In addition, the Department has completed all implementation plan milestones associated with three Board recommendations. One new Board recommendation was received and accepted by the Department in 1999, and a new implementation plan is being developed to address this recommendation. The Department has also made significant progress with a number of broad-based initiatives to improve safety. These include expanded implementation of integrated safety management at field sites, opening of a repository for long-term storage of transuranic wastes, and continued progress on stabilizing excess nuclear materials to achieve significant risk reduction.

  16. Annual Report To Congress. Department of Energy Activities Relating to the Defense Nuclear Facilities Safety Board, Calendar Year 2003

    SciTech Connect (OSTI)

    None, None

    2004-02-28

    The Department of Energy (Department) submits an Annual Report to Congress each year detailing the Department’s activities relating to the Defense Nuclear Facilities Safety Board (Board), which provides advice and recommendations to the Secretary of Energy (Secretary) regarding public health and safety issues at the Department’s defense nuclear facilities. In 2003, the Department continued ongoing activities to resolve issues identified by the Board in formal recommendations and correspondence, staff issue reports pertaining to Department facilities, and public meetings and briefings. Additionally, the Department is implementing several key safety initiatives to address and prevent safety issues: safety culture and review of the Columbia accident investigation; risk reduction through stabilization of excess nuclear materials; the Facility Representative Program; independent oversight and performance assurance; the Federal Technical Capability Program (FTCP); executive safety initiatives; and quality assurance activities. The following summarizes the key activities addressed in this Annual Report.

  17. Automatic Security Evaluation of Block Ciphers with S-bP Structures against Related-key

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Automatic Security Evaluation of Block Ciphers with S-bP Structures against Related (MILP), Mouha et al proposed a method to accomplish this task automatically for word-oriented symmetric, to automatically evaluate its security against differential attacks. We obtain lower bounds on the numbers

  18. Privacy Act Links to Relates Sites | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPosterNational NuclearSecurityDisclosures |Fees and

  19. From Relations to XML: Cleaning, Integrating and Securing Data 

    E-Print Network [OSTI]

    Jia, Xibei

    2008-01-01

    While relational databases are still the preferred approach for storing data, XML is emerging as the primary standard for representing and exchanging data. Consequently, it has been increasingly important to provide a ...

  20. Community Relations Council | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room News PublicationsAuditsCluster Compatibilitydefault Sign InSeptember 2015CommunityRelations

  1. Annual report to Congress. Department of Energy activities relating to the Defense Nuclear Facilities Safety Board, calendar year 2000

    SciTech Connect (OSTI)

    2001-03-01

    This Annual Report to the Congress describes the Department of Energy's activities in response to formal recommendations and other interactions with the Defense Nuclear Facilities Safety Board. During 2000, the Department completed its implementation and proposed closure of one Board recommendation and completed all implementation plan milestones associated with two additional Board recommendations. Also in 2000, the Department formally accepted two new Board recommendations and developed implementation plans in response to those recommendations. The Department also made significant progress with a number of broad-based safety initiatives. These include initial implementation of integrated safety management at field sites and within headquarters program offices, issuance of a nuclear safety rule, and continued progress on stabilizing excess nuclear materials to achieve significant risk reduction.

  2. Board Title

    Energy Savers [EERE]

    Advisory Board Topics and Accomplishments EM SSAB Chairs Meeting Santa Fe, New Mexico September 2, 2015 Consent Order Entered into discussions with DOE and NMED...

  3. ON THE DESIGN OF AN IMMERSIVE ENVIRONMENT FOR SECURITY-RELATED STUDIES

    E-Print Network [OSTI]

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 3.1.1 Internet Worm History . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 iii #12 The Internet has become an essential part of normal operations of both public and private sectors. Many security issues are not addressed in the original Internet design, and security now has become a large

  4. DEPARTMENT OF ENERGY National Nuclear Security Administration

    Office of Environmental Management (EM)

    National Nuclear Security Administration Los Alamos Site Office Los Alamos, New Mexico 87544 Mr. J.D. Campbell Chairman Northern New Mexico Citizens Advisory Board 1660 Old Pecos...

  5. A Study of the Relative Costs of Network Security Protocols Stefan Miltchev

    E-Print Network [OSTI]

    Keromytis, Angelos D.

    Contract F39502-99- 1-0512-MOD P0001. part of a secure system. In this paper, we aim to quantify the costs, and finally compare against other se- cure transfer mechanisms, such as SSL, scp(1), and sftp(1). We use

  6. Page 1Securing the Microsoft Cloud Securing the

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Page 1Securing the Microsoft Cloud Securing the Microsoft Cloud #12;Page 2Securing the Microsoft to have confidence in Microsoft as their preferred cloud provider. Our security policies and practices their security and compliance related needs. Securing the Microsoft Cloud #12;Page 3Securing the Microsoft Cloud

  7. UNITED STATES NUCLEAR WASTE TECHNICAL REVIEW BOARD

    E-Print Network [OSTI]

    and issues related to the waste- management system, including transportation of spent nuclear fuel and highcon202vf UNITED STATES NUCLEAR WASTE TECHNICAL REVIEW BOARD 2300 Clarendon Boulevard, Suite 1300, the Nuclear Waste Technical Review Board (Board) submits its second report of 2003 in accordance

  8. U. S. Nuclear Waste Technical Review Board

    E-Print Network [OSTI]

    technical and scientific review of DOE activities related to nuclear waste management and disposal Program Management Specialist U.S. Nuclear Waste Technical Review Board Staff #12;viii Board ActivitiesCA U. S. Nuclear Waste Technical Review Board A Report to The U.S. Congress and The Secretary

  9. Board of Graduate Studies 4 Mill Lane

    E-Print Network [OSTI]

    Zernicka-Goetz, Magdalena

    for prospective students. The Board agreed that a co-ordinated strategy was required both in relation to the two MPhil in Energy Technologies (Paper 4024) The Board approved the introduction of the new MPhil Cambridge 152 3550 External Examiners and employment checks (Paper 4025) The Board was concerned by the UK

  10. T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID

    Broader source: Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

  11. SecSens -Security Architecture for Wireless Sensor Networks Faruk Bagci, Theo Ungerer

    E-Print Network [OSTI]

    Ungerer, Theo

    of sensor boards. Keywords: wireless sensor network, security architec- ture, energy efficiency, multi between nodes enhances communication flexibility. Generally, sensor nodes have limited energy and re not be transferred to sensor networks. In recent years, the research was mainly focused on issues related to energy

  12. BOARD OF REGENTS State of Iowa

    E-Print Network [OSTI]

    RELATIONS J Murphy, Officer, Board of Regents UNIVERSITY COUNSEL P Tanaka, Counsel ISU RESEARCH PARK) L Shimkat, Director IOWA STATE UNIVERSITY February 17, 2015 ECONOMIC DEVELOPMENT & INDUSTRY

  13. The role of a security strategy is to align company security and business goals, provide

    E-Print Network [OSTI]

    Fisher, Kathleen

    , and methodologies to assist you in building a complete unified information security program or individual elements's information security program meets its requirements across the board, it is vital to have one enterprise security strategy and one information security framework. Putting in a solid foundational program

  14. Discussion Boards, Blogs, Wikis & Journals Discussion Boards......................................................................................................................... 2

    E-Print Network [OSTI]

    Balasuriya, Sanjeeva

    MyUni - Discussion Boards, Blogs, Wikis & Journals Discussion Boards ............................................................................ 5 Blogs.............................................................................................................................................. 7 Create a Blog

  15. National Nuclear Security Administration Los Alamos Site Office

    Office of Environmental Management (EM)

    National Nuclear Security Administration Los Alamos Site Office Los Alamos, New Mexico 87544 mrsm Mr. Ralph L. Phelps Chairman Northem New Mexico Citizens Advisory Board...

  16. ORSSAB Monthly Board Meeting

    Broader source: Energy.gov [DOE]

    The ORSSAB monthly board meeting is open to the public. The board will receive an update on the Transuranic Waste Processing Center.

  17. 2014 Headquarters Facilities Master Security Plan- Chapter 1, Physical Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

  18. FISCAL YEAR 2010 REPETITIVE OR SIGNIFICANT FINDINGS NIH BOARD OF CONTRACT AWARDS

    E-Print Network [OSTI]

    Ungerleider, Leslie G.

    FISCAL YEAR 2010 REPETITIVE OR SIGNIFICANT FINDINGS OF THE NIH BOARD OF CONTRACT AWARDS #12;FISCAL 301.606-71). 2 #12;FISCAL YEAR 2010 REPETITIVE OR SIGNIFICANT FINDINGS OF THE NIH BOARD OF CONTRACT AWARDS o The Information System Security Officer (ISSO) did not complete the Information Security Pre

  19. Where computer security meets national security1 Helen Nissenbaum

    E-Print Network [OSTI]

    Nissenbaum, Helen

    of International Relations. Key words: cyber-security, computer security, securitization Introduction OverWhere computer security meets national security1 Helen Nissenbaum Department of Culture conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile

  20. UNITED STATES NUCLEAR WASTE TECHNICAL REVIEW BOARD

    E-Print Network [OSTI]

    repository for disposing of spent nuclear fuel and high-level radioactive waste. The Board also reviews the Department of Energy's (DOE) work related to the packaging and transport of such waste. Consistent with itscon144vf UNITED STATES NUCLEAR WASTE TECHNICAL REVIEW BOARD 2300 Clarendon Boulevard, Suite 1300

  1. FIPS 1402 NonProprietary Security Policy: Persistent Systems Wave Relay Single, Dual, and Quad Radio Document Version 5.2 Persistent Systems Page 1 of 21

    E-Print Network [OSTI]

    Proprietary Security Policy Persistent Systems Wave Relay Single, Dual, and Quad Radio Board Level 1Proprietary Security Policy: Persistent Systems Wave Relay Single, Dual, and Quad Radio Board Document Version 5 Policy for the Wave Relay Single, Dual, and Quad Radio Board. #12;FIPS 1402 NonProprietary Security

  2. ORSSAB monthly board meeting

    Broader source: Energy.gov [DOE]

    The ORSSAB monthly board meeting is open to the public. The board will hear a presentation and discuss the development of a comprehensive mercury strategy for the Oak Ridge Reservation.

  3. ORSSAB monthly board meeting

    Broader source: Energy.gov [DOE]

    The ORSSAB monthly board meeting is open to the public. The board will receive an update on the Community Reuse Organization of East Tennessee efforts at the East Tennessee Technology Park.

  4. US DOE Perspectives on Advisory Board Effectiveness - 13539

    SciTech Connect (OSTI)

    Adler, David [US DOE (United States)] [US DOE (United States)

    2013-07-01

    Federal missions on the Oak Ridge Reservation began with the Manhattan Project, and continues today with major facilities supporting the Nation's Science and National Security missions. While most of the land area on the Oak Ridge Reservation is free of environmental impacts from these activities, significant legacy contamination is associated with specific facilities and past waste management areas. In 1989, the Oak Ridge Reservation (ORR) was placed on National Priorities List, and DOE established its Office of Environmental Management that same year. Three years later, in 1992, the Federal Facility Agreement for the reservation was signed. Three years afterward, the Oak Ridge Site Specific Advisory Board was established to augment ongoing public involvement activities related to Oak Ridge Reservation cleanup activities. One of the early and most impactful decisions the board made was to organize the End Use Working Group. This broad-based group of board members, DOE representatives, and members of the public was formed in 1997 to study future uses for contaminated areas of the reservation. The group was instrumental in building consensus in the Oak Ridge community regarding the long-term end state of reservation lands. The group's recommendations were a fundamental input into Record's of Decision subsequently developed to establish cleanup requirements across the ORR, and they continue to influence decisions being made today. In developing its recommendations on end states, the End Use Working Group came to the realization that long-term stewardship of contaminated areas of the reservation would be necessary, in some cases in perpetuity. It was from this concept that the Oak Ridge SSAB's 15-year involvement in stewardship would begin. A stewardship committee formed by the End Use Working Group wrote Volume 1 of the Stakeholder Report on Stewardship. This document-and its companion Volume 2, which was written a year later-form a crucial foundation for stewardship planning in Oak Ridge and have been referenced around the DOE complex as other sites consider stewardship planning. From these two broad-based initiatives, the board's focus has evolved to increasingly hone in on more specific, project-based recommendations and initiatives. The Oak Ridge Reservation Site Specific Advisory Board has been a highly effective forum for soliciting community input on Oak Ridge Reservation cleanup. Experience in Oak Ridge indicates that the utility of Board recommendations is far higher when the Board is asked to focus on broad programmatic issues, and less useful when the Board attempts to provide advice and recommendations on matters related to technical or project management issues. In Oak Ridge the Board has helped shape the program on many levels including definition of end-state cleanup objectives, budget development, program sequencing, waste management, and decisions concerning preservation of history related to missions implemented on the Oak Ridge Reservation. (authors)

  5. Coordinating rooks and bishops: an institutional history of the joint army and navy board, 1903-1919 

    E-Print Network [OSTI]

    Godin, Jason Robert

    2005-11-01

    Board actions on American civil-military relations, and the efficacy of interservice cooperation. This thesis is based largely on unpublished as well as published primary sources, including the records of the Joint Board, Navy General Board records...

  6. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  7. ORSSAB monthly board meeting

    Broader source: Energy.gov [DOE]

    The ORSSAB monthly board meeting is open to the public. This month, participants will receive an update on the U-233 Project.

  8. ORSSAB monthly board meeting

    Broader source: Energy.gov [DOE]

    Board members and participants will hear a presentation and updates about "Sufficient Waste Disposal Capacity on the Oak Ridge Reservation." The meeting is open to the public.

  9. ORSSAB monthly board meeting

    Broader source: Energy.gov [DOE]

    Board members and participants will hear a presentation and updates about the "Oak Ridge Reservation Groundwater Strategic Plan." The meeting is open to the public. 

  10. ORSSAB Monthly Board Meeting

    Broader source: Energy.gov [DOE]

    The ORSSAB Monthly Board meeting is open to the public. This month, participants will be briefed on the East Tennessee Technology Park Zone 1 Soils Proposed Plan.

  11. Enforcement Letter, National Security Technologies, LLC - November...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    November 13, 2007 Enforcement Letter, National Security Technologies, LLC - November 13, 2007 November 13, 2007 Issued to National Security Technologies, LLC related to an...

  12. International Oil and Gas Board International Oil and Gas Board...

    Open Energy Info (EERE)

    Board International Oil and Gas Board Address Place Zip Website Abu Dhabi Supreme Petroleum Council Abu Dhabi Supreme Petroleum Council Abu Dhabi United Arab Emirates http www...

  13. POLICYProfessional Perspectives on Energy Security, Economics,

    E-Print Network [OSTI]

    TheGoalsof ENERGY POLICYProfessional Perspectives on Energy Security, Economics Security, Economics, and the Environment The Goals of Energy Policy: Professional Perspectives on Energy Security, Economics, and the Environment EXECUTIVE SUMMARY Energy-related incidents and issues ­ the BP

  14. Postal Security Device Security Policy

    E-Print Network [OSTI]

    Postal Security Device Security Policy FRAMA AG PSD - I Version: R01.06 Date: 25.05.2007 Doc.-ID: DE_FNKPSD_510_SPE File name: DE_FNKPSD_510_SPE_R0106_EN.Security Policy PSD Author: Bernd Zinke, Timo » Non-Confidential « #12;Security Policy FRAMA AG CH-3438 LAUPERSWIL / BERN TITLE: POSTAL SECURITY

  15. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  16. ORSSAB monthly board meeting

    Broader source: Energy.gov [DOE]

    Board members and participants will hear a presentation and updates about the "Selection of a Remediation Strategy for Trench 13 in Melton Valley." The meeting is open to the public.

  17. ORSSAB monthly board meeting

    Broader source: Energy.gov [DOE]

    Board members and participants will hear a presentation and updates about the "Y-12 Mercury Cleanup Strategy and Plan for a Y-12 Water Treatment Plant." The meeting is open to the public.

  18. ORSSAB monthly board meeting

    Broader source: Energy.gov [DOE]

    Board members and participants will hear a presentation and updates about the "State of the Oak Ridge EM Program/FY 2016 Budget and Prioritization Planning." The meeting is open to the public.

  19. ORSSAB monthly board meeting

    Broader source: Energy.gov [DOE]

    The ORSSAB monthly meeting is open to the public. This month the board will hear a presentation and discuss the FY 2016 Oak Ridge Office of Environmental Management's budget and prioritization.

  20. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  1. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO...

  2. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  3. UNITED STATES NUCLEAR WASTE TECHNICAL REVIEW BOARD

    E-Print Network [OSTI]

    . As described in the legislative history, the purpose of the Board is to provide independent expert advice to Congress and the Secretary of Energy on technical issues and to review U.S. Department of Energy (DOE an ongoing and integrated technical peer review of all DOE activities related to managing spent nuclear fuel

  4. UNITED STATES NUCLEAR WASTE TECHNICAL REVIEW BOARD

    E-Print Network [OSTI]

    ) characterization of a potential repository site at Yucca Mountain in Nevada. In a December 11, 2001, letter to the Secretary and Congress on the DOE's technical and scientific work related to a decision on a Yucca Mountain's Yucca Mountain technical and scientific investigations since the Board's inception; (2) an evaluation

  5. UNITED STATES NUCLEAR WASTE TECHNICAL REVIEW BOARD

    E-Print Network [OSTI]

    of Energy's (DOE) activities related to disposing of, packaging, and transporting high-level radioactive-complex sites; handling, transporting, processing, and storing the waste; and emplacing the waste undergroundUNITED STATES NUCLEAR WASTE TECHNICAL REVIEW BOARD 2300 Clarendon Boulevard, Suite 1300 Arlington

  6. Arduino Board Design Nicholas Skadberg

    E-Print Network [OSTI]

    Kachroo, Pushkin

    Arduino Board Design Nicholas Skadberg 4/30/09 EE290 Dr. Pushkin Kachroo #12;Abstract In an effort an Arduino Atmega 168 controller chip and an Arduino Duemilanove circuit board. The device is controlled

  7. Environmental Management Advisory Board Members | Department...

    Office of Environmental Management (EM)

    EMAB Board Member Read Bio Lessie B. Price EMAB Board Member Read Bio Beverly Ramsey EMAB Board Member Read Bio Timothy Runyon EMAB Board Member Read Bio David W....

  8. EDITORIAL BOARD CHIEF EDITOR

    E-Print Network [OSTI]

    Jammalamadaka, S. Rao

    SREENIVASA RAO K.Srinivasa Rao Department of Statistics, Andhra University, Visakhapatnam, India PROFESSOR#12;EDITORIAL BOARD CHIEF EDITOR K.Srinivasa Rao Andhra University Visakhapatanam, India ASSOCIATE EDITORS P.C.Jha University of Delhi , Delhi, India Debasis Bhattacharya Viswabharati, Santiniketan, India

  9. Environmental Management Advisory Board Subcommittees | Department...

    Energy Savers [EERE]

    Communication & Engagement EMAB Environmental Management Advisory Board Subcommittees Environmental Management Advisory Board Subcommittees ACQUISITION AND PROJECT MANAGEMENT...

  10. Analysis and Enforcement of Web Application Security Policies

    E-Print Network [OSTI]

    Weinberger, Joel Howard Willis

    2012-01-01

    4.2 HTML Security Policies . . . . . . . . . . . .4.5 Towards HTML Security Policies . . . . . . . . . 4.6present in the browser for HTML and its related sub-

  11. Information Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Health, Safety and Security Status: Archive Approved Date: Jun 20, 2011 CRD: Yes DNFSB: No Related History Exemptions Standards Related to: Request to Make Administrative...

  12. Information Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Health, Safety and Security Status: Archive Approved Date: Jun 20, 2011 CRD: Yes DNFSB: No Related History Exemptions Standards Related to: Delegation of Authority - Acting...

  13. Coping with justice, democracy and sustainability. The case of the Dutch food sovereignty movement and its relation to government policy directed at food security in Africa 

    E-Print Network [OSTI]

    Brouwer, Sara

    2015-01-01

    out in which respects (if any) the Dutch food sovereignty movement influences, and can influence, Dutch government policy directed at food security in Africa. By means of a critical discourse analysis of policy documents I have first investigated...

  14. Global Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    weapons from the James Martin center for Nonproliferation Studies Homeland Security Digital Library HSDL is the nation's premier research collection of open-source resources...

  15. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  16. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  17. Safeguards and Security and Cyber Security RM

    Office of Environmental Management (EM)

    using security measures such as badging, pre-employment investigation and fitness for duty, training, and security awareness? Cyber Security CS-1 Has the project...

  18. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    System-of-systems analysis Visualization tools for complex information Next-generation smart grid technologies Quantum computing, security, and data fusion For more information,...

  19. A Docking Casette For Printed Circuit Boards

    DOE Patents [OSTI]

    Barringer, Dennis R. (Wallkill, NY); Seminaro, Edward J. (Milton, NY); Toffler, Harold M. (Newburgh, NY)

    2003-08-19

    A docking apparatus for printed circuit boards including a cassette housing, having a housing base, a housing cover and a housing wall, wherein the housing base and the housing wall are disposed relative to each other so as to define a housing cavity for containing a printed circuit board and wherein the housing wall includes a cable opening disposed so as to be communicated with the housing cavity, a linkage mechanism, wherein the linkage mechanism includes an engagement configuration and a disengagement configuration and wherein the linkage mechanism is disposed so as to be associated with the cassette housing and a housing bezel, wherein the housing bezel is disposed relative to the cassette housing so as to be associated with the cable opening.

  20. Web Security Standards and Practices Page 1 of 13 Web Security Standard Operating Environment (SOE) V1.doc

    E-Print Network [OSTI]

    Qian, Ning

    Web Security Standards and Practices Page 1 of 13 Web Security Standard Operating Environment (SOE) V1.doc Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related

  1. State Oil and Gas Board State Oil and Gas Board Address Place...

    Open Energy Info (EERE)

    Board State Oil and Gas Board Address Place Zip Website Alabama Oil and Gas Board Alabama Oil and Gas Board Hackberry Lane Tuscaloosa Alabama http www gsa state al us ogb ogb html...

  2. NPS Research Board Charter [Approved by Research Board, 25 August 2011

    E-Print Network [OSTI]

    NPS Research Board Charter [Approved by Research Board, 25 August 2011] 1. Purpose. The purpose of the Research Board is to support NPS faculty and researchers, advising the Dean of Research. An active Research Board can help

  3. ESnet Policy Board

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HAB PacketDieselAbsorptionPowering6106Meeting Organizes PanelBoard

  4. Board of Directors - SRSCRO

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory of raregovAboutRecovery ActTools toBadging,BioscienceOutreach 12forBoard of

  5. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  6. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  7. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  8. Secure PVM

    SciTech Connect (OSTI)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  9. Advisory Board Makes Valuable Contributions to EM

    Broader source: Energy.gov [DOE]

    WASHINGTON, D.C. – The eight local boards of the EM Site-Specific Advisory Board (EM SSAB) provided 56 recommendations collectively in 2011, according to a recent assessment of board input into the EM program.

  10. Technology Innovation Program Advisory Board

    E-Print Network [OSTI]

    Technology Innovation Program Advisory Board 2011 Annual Report of the #12;#12;i 2011 Annual Report of the Technology Innovation Program Advisory Board U.S. Department of Commerce National Institute of Standards and Technology Technology Innovation Program March 2012 #12;ii For Information regarding the Technology

  11. Industrial Engineering Industrial Advisory Board

    E-Print Network [OSTI]

    Gelfond, Michael

    Industrial Engineering Industrial Advisory Board (IAB) #12;PURPOSE: The Texas Tech University - Industrial Engineering Industrial Ad- visory Board (IAB) is an association of professionals with a com- mon goal - promoting and developing the Texas Tech Department of Industrial Engineering and its students

  12. General purpose programmable accelerator board

    DOE Patents [OSTI]

    Robertson, Perry J. (Albuquerque, NM); Witzke, Edward L. (Edgewood, NM)

    2001-01-01

    A general purpose accelerator board and acceleration method comprising use of: one or more programmable logic devices; a plurality of memory blocks; bus interface for communicating data between the memory blocks and devices external to the board; and dynamic programming capabilities for providing logic to the programmable logic device to be executed on data in the memory blocks.

  13. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  14. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  15. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  16. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity Security

  17. FAPAC-NM Executive Board | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansasCommunitiesofExtrans - Permeation Measurement2 0 th CMto

  18. IBM Internet Security Systems Threat Insight Monthly

    E-Print Network [OSTI]

    of cryptography as it relates to the computer security industry. We will look at some of the underlying technologyIBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net September . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Contents www.iss.netwww.iss.net IBM Internet Security Systems X-Force ® Threat Insight Monthly

  19. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  20. Project Charter CALS External Relations Advancement Planning: Alumni

    E-Print Network [OSTI]

    Herrman WALSAA Board Tara Talbot CALS BOV Kara Luedtke External Relations Megan O'Rourke UP&S, Career

  1. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio August 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Security

  2. INSTITUTE FOR CYBER SECURITY Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio August-world impact #12;INSTITUTE FOR CYBER SECURITY Institute for Cyber Security Founded June 2007: still in start

  3. NSM Secure UI Crypto Module Security Policy

    E-Print Network [OSTI]

    NSM Secure UI Crypto Module Security Policy Version: 1.4 Revision Date: April 1, 2010 This document. #12;McAfee, Inc NSM Secure UI Crypto Module Security Policy Page 2 of 15 CHANGE RECORD Revision Date Module Security Policy Page 3 of 15 Contents 1 Module Overview

  4. Security for grids

    E-Print Network [OSTI]

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-01-01

    differences between Grid security and host or site securityof requirements for Grid security in order to achieve thecompletely. Index Terms — Grid security, authentication,

  5. Sandia National Laboratories: National Security Missions: Internationa...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Defense Advanced Research Projects Agency, Unified Combatant Commands, National Nuclear Security Administration, and U.S. industry. Related Links Robotics Weapons-Force Center...

  6. Preliminary Notice of Violation, National Security Technologies...

    Broader source: Energy.gov (indexed) [DOE]

    August 11, 2011 Issued to National Security Technologies, LLC related to Deficiencies in Inspection and Installation of Penetration Fire Seals and Other Components at the Nevada...

  7. Board of Graduate Studies 4 Mill Lane

    E-Print Network [OSTI]

    Jackson, Sophie

    ) The Board approved the proposal for a new CPGS in Materials Science & Metallurgy: DTC Higher Performance

  8. Communications Between the Board and the OCRWM

    E-Print Network [OSTI]

    ; April 29, 1999. Subject: The DOE's response to the Board's Report to the U.S. Congress and the Secretary; September 20, 1999. Subject: The DOE's response to the Board's Report to The U.S. Congress and The Secretary to the Board's Report to the U.S. Congress and the Secretary of Energy, April 1999, summarizing the Board

  9. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  10. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  11. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  12. Homeland security: safeguarding America's future with energy efficiency and renewable energy technologies

    SciTech Connect (OSTI)

    None, None

    2002-08-01

    The State Energy Advisory Board (STEAB) presents this 10th annual report following the one-year anniversary of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. This event has had profound impacts on all segments of American society, not the least of which is this country’s energy sector. Long before September 11, a number of energy issues grabbed the nation’s attention, including opening the Arctic National Wildlife Refuge to oil and natural gas exploration, the power crisis in California, nationwide natural gas and gasoline price increases, and the administration’s May 2001 National Energy Policy. However, the events of September 11 refocused attention on the prominent role energy plays in the country’s homeland security. For the most part, the energy aspects of homeland security have focused on the physical security of critical energy emergency planning and energy infrastructure, such as power plants, refineries, and power and fuel transmission systems. While STEAB recognizes the importance of protecting our existing energy infrastructure, this should not be the sole focus of homeland security as it relates to energy.

  13. Secure Storage Architectures

    SciTech Connect (OSTI)

    Aderholdt, Ferrol; Caldwell, Blake A; Hicks, Susan Elaine; Koch, Scott M; Naughton, III, Thomas J; Pogge, James R; Scott, Stephen L; Shipman, Galen M; Sorrillo, Lawrence

    2015-01-01

    The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention on elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to help with this issue, which are a particular instances of the more general challenge of efficient host/guest IO that is the focus of interfaces like virtio. A collection of bridging technologies have been identified in Chapter 4, which can be helpful to overcome the limitations and challenges of supporting efficient storage for secure enclaves. The synthesis of native filesystem security mechanisms and bridging technologies led to an isolation-centric storage architecture that is proposed in Chapter 5, which leverages isolation mechanisms from different layers to facilitate secure storage for an enclave. Recommendations: The following highlights recommendations from the investigations done thus far. - The Lustre filesystem offers excellent performance but does not support some security related features, e.g., encryption, that are included in GPFS. If encryption is of paramount importance, then GPFS may be a more suitable choice. - There are several possible Lustre related enhancements that may provide functionality of use for secure-enclaves. However, since these features are not currently integrated, the use of Lustre as a secure storage system may require more direct involvement (support). (*The network that connects the storage subsystem and users, e.g., Lustre s LNET.) - The use of OpenStack with GPFS will be more streamlined than with Lustre, as there are available drivers for GPFS. - The Manilla project offers Filesystem as a Service for OpenStack and is worth further investigation. Manilla has some support for GPFS. - The proposed Lustre enhancement of Dynamic-LNET should be further investigated to provide more dynamic changes to the storage network which could be used to isolate hosts and their tenants. - The Linux namespaces offer a good solution for creating efficient restrictions to shared HPC filesystems. However, we still need to conduct a thorough round of storage/filesystem benchmarks. - Vendor products should be more closely reviewed, possibly to include evaluation of performance/protection of select products. (Note, we are investigation the opti

  14. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  15. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  16. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  17. Faculty Information Security Guide

    E-Print Network [OSTI]

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  18. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  19. Guide to Bluetooth Security Recommendationsof the National Institute of

    E-Print Network [OSTI]

    Guide to Bluetooth Security Recommendationsof the National Institute of Standardsand Technology 800-121 Revision 1 Guide to Bluetooth Security Recommendations of the National Institute of Standards and guidelines for the cost-effective security and privacy of other than national security-related information

  20. Guidelines on Hardware-Rooted Security in Mobile

    E-Print Network [OSTI]

    Guidelines on Hardware- Rooted Security in Mobile Devices (Draft) Recommendationsof the National Franklin Andrew Regenscheid Computer Security Division Information Technology Laboratory National Institute for the cost-effective security and privacy of other than national security-related information in Federal

  1. Apparatus And Method Of Using Flexible Printed Circuit Board In Optical Transceiver Device

    DOE Patents [OSTI]

    Anderson, Gene R. (Albuquerque, NM); Armendariz, Marcelino G. (Albuquerque, NM); Bryan, Robert P. (Albuquerque, NM); Carson, Richard F. (Albuquerque, NM); Duckett, III, Edwin B. (Albuquerque, NM); McCormick, Frederick B. (Albuquerque, NM); Peterson, David W. (Sandia Park, NM); Peterson, Gary D. (Albuquerque, NM); Reysen, Bill H. (Lafayette, CO)

    2005-03-15

    This invention relates to a flexible printed circuit board that is used in connection with an optical transmitter, receiver or transceiver module. In one embodiment, the flexible printed circuit board has flexible metal layers in between flexible insulating layers, and the circuit board comprises: (1) a main body region orientated in a first direction having at least one electrical or optoelectronic device; (2) a plurality of electrical contact pads integrated into the main body region, where the electrical contact pads function to connect the flexible printed circuit board to an external environment; (3) a buckle region extending from one end of the main body region; and (4) a head region extending from one end of the buckle region, and where the head region is orientated so that it is at an angle relative to the direction of the main body region. The electrical contact pads may be ball grid arrays, solder balls or land-grid arrays, and they function to connect the circuit board to an external environment. A driver or amplifier chip may be adapted to the head region of the flexible printed circuit board. In another embodiment, a heat spreader passes along a surface of the head region of the flexible printed circuit board, and a window is formed in the head region of the flexible printed circuit board. Optoelectronic devices are adapted to the head spreader in such a manner that they are accessible through the window in the flexible printed circuit board.

  2. Secretary of Energy Advisory Board

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    (such as the NPT and the Convention on the Physical Protection of Nuclear Materials); United Nations resolutions (such as UN Security Council Resolution 1540, which requires...

  3. Nuclear security

    SciTech Connect (OSTI)

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  4. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  5. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  6. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  7. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  8. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  9. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  10. 2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

  11. Dynamic Simulation of DFIG Wind Turbines on FPGA Boards

    E-Print Network [OSTI]

    Zambreno, Joseph A.

    Dynamic Simulation of DFIG Wind Turbines on FPGA Boards Hao Chen, Student Member, IEEE, Song Sun is a friction coefficient. The wind turbine model is based on the relation between the upstream wind speed V w + 1 where p is the air density; Rw is the wind turbine radius; cp (A, (3) is the performance

  12. U.S. Nuclear Waste Technical Review Board Correspondence with

    E-Print Network [OSTI]

    -management system. The Board is concerned that assumptions related to receipt of spent fuel from utilities and the DOE's thermal-management strategy could result in excessive handling of spent-fuel assemblies as fuel the costs and benefits of using dual-purpose (transportation and storage) or multipurpose (transportation

  13. 2014 Headquarters Facilities Master Security Plan- Chapter 3, Personnel Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Describes DOE Headquarters Personnel Security procedures for acquiring, maintaining, and passing security clearances.

  14. Using Operational Security (OPSEC) to Support a Cyber Security...

    Energy Savers [EERE]

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  15. Preliminary Notice of Violation, Los Alamos National Security...

    Office of Environmental Management (EM)

    October 17, 2012 Issued to Los Alamos National Security, LLC, related to Four Electrical Safety-Related Events that occurred at the Los Alamos National Laboratory (LANL) On...

  16. Nevada National Security Site contractor receives safety recertificati...

    National Nuclear Security Administration (NNSA)

    1 of 2 Related Topics nnss DOE safety nevada national security site department of energy Voluntary Protection Program VPP Related News NNSA Sites Host Head of Comprehensive...

  17. Board of Health Recommendations for Hiring

    E-Print Network [OSTI]

    seek to assess their community's environmental health needs, develop policies and programs to meetBoard of Health Recommendations for Hiring Qualified Environmental Health Practitioners environmental health #12;Board of Health Recommendations for Hiring Qualified Environmental Health

  18. BOARD OF DIRECTORS UCHCFC CIRCLE ROAD CORP.

    E-Print Network [OSTI]

    was also notified that the IRS issued a determination that the Circle Road Corp was tax exempt underBOARD OF DIRECTORS OF THE UCHCFC CIRCLE ROAD CORP. MINUTES OF THE SEPTEMBER 29, 2014 MEETING BOARD

  19. LEWIS SPACECRAFT MISSION FAILURE INVESTIGATION BOARD

    E-Print Network [OSTI]

    Rhoads, James

    LEWIS SPACECRAFT MISSION FAILURE INVESTIGATION BOARD FINAL REPORT 12 February 1998 #12;II #12;III LEWIS SPACECRAFT MISSION FAILURE INVESTIGATION BOARD REPORT TABLE OF CONTENTS TOPIC PAGE EXECUTIVE Spacecraft Flight Operations and Failure Anomaly Timeline FACTORS DIRECTLY CONTRIBUTING TO FAILURE

  20. JOHNS HOPKINS UNIVERSITY COST ACCOUNTING STANDARDS BOARD

    E-Print Network [OSTI]

    JOHNS HOPKINS UNIVERSITY COST ACCOUNTING STANDARDS BOARD DISCLOSURE STATEMENT FOR EDUCATIONAL INSTITUTIONS CASB DS-2 March 23, 2010 #12;COST ACCOUNTING STANDARDS BOARD DISCLOSURE STATEMENT REQUIRED BY PUBLIC LAW 100-679 EDUCATIONAL INSTITUTIONS INDEX JOHNS HOPKINS UNIVERISTY GENERAL INSTRUCTIONS

  1. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  2. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

  3. NNMCAB Board Minutes: July 2014 Santa Fe

    Broader source: Energy.gov [DOE]

    Minutes of the July 30, 2014 Board meeting at La Fonda Presentation DOE, LANL Technical Area 21, David Rhodes

  4. ENVIRONMENTAL MANAGEMENT SITE SPECIFIC ADVISORY BOARD

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ENERGY ENVIRONMENTAL MANAGEMENT SITE-SPECIFIC ADVISORY BOARD (EM SSAB) HANFORD Application No. (Please leave blank) MEMBERSHIP APPLICATION (December 2015)...

  5. NNMCAB Board Minutes: November 2008 Santa Fe

    Broader source: Energy.gov [DOE]

    Minutes of the November 19, 2008 Board meeting at Santa Fe Community College Presentation LANL, Environmental Surveillance Report

  6. STRATEGIC PLAN Board of Trustees

    E-Print Network [OSTI]

    Kunkle, Tom

    STRATEGIC PLAN Board of Trustees October 16, 2009 #12;1 | strategic plan INTRODUCTION F ollowing and identification of our peer institutions (all available on the College's Strategic Planning website), the College of Charleston is poised to launch this Strategic Plan aimed at growth and development over the next decade

  7. IEAB Independent Economic Analysis Board

    E-Print Network [OSTI]

    . Huppert Noelwah R. Netusil JunJie Wu Cost-Effectiveness of Fish Tagging Technologies and Programs in the Columbia River Basin1 Independent Economic Analysis Board Fish and Wildlife Program Northwest Power and Conservation Council June 2, 2013 1 This report benefitted from the meetings of the Fish Tagging Forum

  8. Technology Strategy Board Driving Innovation

    E-Print Network [OSTI]

    Anderson, Jim

    Transfer Partnerships is a UK-wide programme, funded by the Technology Strategy Board along with 12 other and innovation that will provide the inspiration and energy for UK businesses to emerge from these uncertain and profits from innovative ideas and in the longer term provides UK business with leadership and energy

  9. IEAB Independent Economic Analysis Board

    E-Print Network [OSTI]

    would be most cost effective when electricity prices are high. Further, reduced pumping in dry years be tailored to respond to contingencies such as electricity price surges and unusually dry weather. Inclusion of Instream Water Supply Components of the Salmon Creek Project Independent Economic Analysis Board Northwest

  10. Abbreviations and Acronyms Board U. S. Nuclear Waste Technical Review Board

    E-Print Network [OSTI]

    of the Civilian Radioactive Waste Management Program." Presentation to Nuclear Waste Technical Review Board. MayAbbreviations and Acronyms Board U. S. Nuclear Waste Technical Review Board CFR Code of Federal Commission NWTRB U.S. Nuclear Waste Technical Review Board PCI pellet-cladding interaction PTn Paintbrush

  11. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Infrastructure Demonstration for Energy reliability and Security) (web link) program to demonstrate: · Cyber-securityEnergy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  12. Light Board Operation 208 Jordan Hall

    E-Print Network [OSTI]

    Buechler, Steven

    Light Board Operation 208 Jordan Hall Using the Light Board 1. Turn on the lights next to the entry door. 2. Turn on the Light Board lights (illustration 1). The light switch is on the west wall, slightly behind the computer cart's display. 3. Locate the lapel microphone (usually on top of the Light

  13. UNITED STATES NUCLEAR WASTE TECHNICAL REVIEW BOARD

    E-Print Network [OSTI]

    , and transporting high-level radioactive waste and spent nuclear fuel. The Board is required to report its findings of the Office of Civilian Radioactive Waste Management (OCRWM) following Board meetings held in February, MayUNITED STATES NUCLEAR WASTE TECHNICAL REVIEW BOARD 2300 Clarendon Boulevard, Suite 1300 Arlington

  14. UNITED STATES NUCLEAR WASTE TECHNICAL REVIEW BOARD

    E-Print Network [OSTI]

    UNITED STATES NUCLEAR WASTE TECHNICAL REVIEW BOARD 2300 Clarendon Boulevard, Suite 1300 Arlington are pleased to transmit a technical report prepared by the Nuclear Waste Technical Review Board (Board. Based on its review of data gathered by the DOE and the Center for Nuclear Waste Regulatory Analyses

  15. environmental health The Local Board of Health

    E-Print Network [OSTI]

    environmental health The Local Board of Health Environmental Health Primer Second Edition #12;The Local Board of Health Environmental Health Primer Second Edition Author Carrie Hribar, MA Project Director ­ Public Health Policy National Association of Local Boards of Health Editor Mark Schultz, MEd

  16. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia, and reactorsystemoverviews. Training in Action: Gulf Nuclear Energy InfrastructureInstitute In2011,SandiateamedwiththeNuclearSecurity energy safety, security,safeguards,andnonproliferation. Training Sandia National Laboratories experts

  17. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  18. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  19. Security | Department of Energy

    Office of Environmental Management (EM)

    Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top...

  20. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  1. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr.

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  2. SEC: Accounting Board Is Dragging Feet -WSJ http://www.wsj.com/articles/sec-accounting-board-is-dragging-feet-1418605107?KEYWORDS=sec+accounting+board+is

    E-Print Network [OSTI]

    Grissino-Mayer, Henri D.

    #12;SEC: Accounting Board Is Dragging Feet - WSJ http://www.wsj.com/articles/sec-accounting-board-is-dragging-feet-1418605107?KEYWORDS=sec+accounting+board+is SEC: Accounting Board Is Dragging Feet Commission Officials officials publicly took issue with the Public Company Accounting Oversight Board at a conference last week

  3. Extension Program Council's Executive Board

    E-Print Network [OSTI]

    Marshall, Mary G.; Richardson, Burl B.

    1986-01-01

    ing committee or task force to plan an action program. The Executive Board, assisted by Ex tension agents and resource people, decides whether this need can be directed to an ex isting program area committee, a new-program area committee, or to a... at the national level are those designed to improve conditions of low-income people. Through con gressional legislation, Extension at state and county levels develops appropriate educational programs to assist low-income families and in dividuals. Programs...

  4. Secretary of Energy Advisory Board

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Financing Tool FitsProjectDataSecretary Moniz's Open InvitationSecretary of Energy Advisory Board

  5. State Energy Advisory Board Charter

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report15 Meeting State Energy Advisory Board April 2015 Meeting United

  6. WeaselBoard : zero-day exploit detection for programmable logic controllers.

    SciTech Connect (OSTI)

    Mulder, John C.; Schwartz, Moses Daniel; Berg, Michael J.; Van Houten, Jonathan Roger; Urrea, Jorge Mario; King, Michael Aaron; Clements, Abraham Anthony; Jacob, Joshua A.

    2013-10-01

    Critical infrastructures, such as electrical power plants and oil refineries, rely on programmable logic controllers (PLCs) to control essential processes. State of the art security cannot detect attacks on PLCs at the hardware or firmware level. This renders critical infrastructure control systems vulnerable to costly and dangerous attacks. WeaselBoard is a PLC backplane analysis system that connects directly to the PLC backplane to capture backplane communications between modules. WeaselBoard forwards inter-module traffic to an external analysis system that detects changes to process control settings, sensor values, module configuration information, firmware updates, and process control program (logic) updates. WeaselBoard provides zero-day exploit detection for PLCs by detecting changes in the PLC and the process. This approach to PLC monitoring is protected under U.S. Patent Application 13/947,887.

  7. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    society. www.ists.dartmouth.edu THE DARTMOUTH CYBER SECURITY INITIATIVE The Dartmouth Cyber Security, TECHNOLOGY, AND SOCIETY THE DARTMOUTH CYBER SECURITY INITIATIVE #12;The number of laptop thefts at Dartmouth, and Society; and the Dartmouth Cyber Security Initiative offer the following solutions: · Whole

  8. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  9. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  10. SUCCESS FACTORS IN INFORMATION SECURITY IMPLEMENTATION IN ORGANIZATIONS

    E-Print Network [OSTI]

    Williamson, John

    SUCCESS FACTORS IN INFORMATION SECURITY IMPLEMENTATION IN ORGANIZATIONS Maryam Al-Awadi University This paper will explore and identify success factors related to the implementation of information security was to identify those factors required to ensure successful implementation of information security, particularly

  11. A Survey of Interdependent Information Security Games ARON LASZKA1

    E-Print Network [OSTI]

    Bencsáth, Boldizsár

    A A Survey of Interdependent Information Security Games ARON LASZKA1 , MARK FELEGYHAZI1 , LEVENTE by the security-related decisions of others. This interdependence between information system operators and users Information security has traditionally been considered a strategic cat-and-mouse game between the defending

  12. Ontology of Secure Service Level Agreement Chen-Yu Lee

    E-Print Network [OSTI]

    Kavi, Krishna

    : Mahadevan.Gomathisankaran@unt.edu Abstract--Maintaining security and privacy in the Cloud is a complex task these concerns relative to the assessment of security and privacy risks of the Cloud, we have developed agreement; SLA; security; SSLA; cloud computing; I. INTRODUCTION The use of Cloud computing services

  13. SIGS Departments and Centers Department of National Security Affairs

    E-Print Network [OSTI]

    SIGS Departments and Centers Department of National Security Affairs Defense Resources Management on inter- national relations and regional security, and to meet the needs of the nation and our interna faculty and students develop programs in anticipation of national security needs. It's clear that SIGS

  14. Guide for Security-Focused Configuration Management of

    E-Print Network [OSTI]

    U R I T Y Computer Security Division Information Technology Laboratory National Institute and privacy of other than national security-related information in federal information systems. The Special information systems, but such standards and guidelines shall not apply to national security systems without

  15. Balancing Water Projects and Wildlife: New Authority for the California Water Resources Control Board

    E-Print Network [OSTI]

    Gawthrop, Janet

    1986-01-01

    both environmental control and water use, the Board stillattorneys for the Water Resources Control Board describedWater Resources Control Board (Water Board) the authority to

  16. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    SciTech Connect (OSTI)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  17. NNMCAB Board Minutes: May 2006 Taos

    Office of Energy Efficiency and Renewable Energy (EERE)

    Minutes of the May 20, 2006 Board meeting at Sagebrush Inn Conference Center Consideration and Action on EM SSAB Chairs Letters

  18. Report to the Environmental Management Advisory Board

    Broader source: Energy.gov (indexed) [DOE]

    Board Evaluation of the United States Department of Energy Environmental Management Strategic Planning Communication Tool Submitted by the Risk Communications Subcommittee...

  19. High Level Waste Corporate Board Charter

    Office of Environmental Management (EM)

    actionable recommendations to senior EM management. Membership The following are standing Members of the Board: * Deputy Assistant Secretary (DAS) for Engineering and...

  20. Northern New Mexico Citizens' Advisory Board

    Office of Environmental Management (EM)

    Federal Advisory Committee Act (FACA). Be Informed Get Involved Because you love New Mexico T he Environmental Management Site Specific Advisory Board was developed to involve...

  1. NNMCAB Board Minutes: July 2010 Los Alamos

    Broader source: Energy.gov [DOE]

    Minutes of the July 28, 2010 Board meeting at Holiday Inn Presentation LANL, Material Disposal Area T Background and Status Update

  2. ENVIRONMENTAL MANAGEMENT SITE-SPECIFIC ADVISORY BOARD

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Paducah Citizens Advisory Board: Ben Peterson, Chair, Renie Barger, Chair-Elect; Robert Smith, Federal Coordinator; Eric Roberts, Contractor Support Staff Portsmouth Site-Specific...

  3. Springfield Utility Board- Energy Savings Plan Program

    Broader source: Energy.gov [DOE]

    The Springfield Utility Board provides industrial customers with a comprehensive report to identify cost effective efficiency improvements. Eligible measures include high efficiency motors,...

  4. Springfield Utility Board- Commercial Lighting Incentive

    Broader source: Energy.gov [DOE]

    The Springfield Utility Board (SUB) offers rebates for a wide range of commercial and industrial lighting retrofits and new construction.

  5. NNMCAB Board Minutes: March 2014 Albuquerque

    Office of Energy Efficiency and Renewable Energy (EERE)

    Minutes of the March 26, 2014 Board meeting at Sandia Presentation LANL, Chromium in Mortandad Canyon, Dave McInroy, Danny Katzman

  6. NNMCAB Board Minutes: November 2013 Ohkay Owingeh

    Broader source: Energy.gov [DOE]

    Minutes of the November 20, 2013 Board meeting at Ohkay Conference Center Presentation DOE, Overview of Natural Resource Damage Assessment, Mike Gardipe

  7. Hanford Advisory Board - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFESOpportunitiesNERSCGrid-based29Hai Ah Nam Hai AhNERSCRecoveryBoard

  8. Security approaches for Radio Frequency Identification systems

    E-Print Network [OSTI]

    Foley, Joseph Timothy, 1976-

    2007-01-01

    In this thesis, I explore the challenges related to the security of the Electronic Product Code (EPC) class of Radio Frequency Identification (RFID) tags and associated data. RFID systems can be used to improve supply chain ...

  9. National Nuclear Security Administration Babcock & Wilcox Technical

    National Nuclear Security Administration (NNSA)

    a solution. One of the areas of concern was related to proposed changes in the fitness for duty standards after an issue was identified by NPO. The B&W Y-12 Cyber Security...

  10. Essays on trades and security prices

    E-Print Network [OSTI]

    Obizhaeva, Anna

    2007-01-01

    This thesis consists of three chapters that investigate the complex relation between security prices and trades of market participants. In the first chapter, I study the evolution of stock prices after trades with different ...

  11. Processing a printed wiring board by single bath electrodeposition

    DOE Patents [OSTI]

    Meltzer, Michael P. (Oakland, CA); Steffani, Christopher P. (Livermore, CA); Gonfiotti, Ray A. (Livermore, CA)

    2010-12-07

    A method of processing a printed wiring board. Initial processing steps are implemented on the printed wiring board. Copper is plated on the printed wiring board from a bath containing nickel and copper. Nickel is plated on the printed wiring board from a bath containing nickel and copper and final processing steps are implemented on the printed wiring board.

  12. Processing A Printed Wiring Board By Single Bath Electrodeposition

    DOE Patents [OSTI]

    Meltzer, Michael P. (Oakland, CA); Steffani, Christopher P. (Livermore, CA); Gonfiotti, Ray A. (Livermore, CA)

    2003-04-15

    A method of processing a printed wiring board by single bath electrodeposition. Initial processing steps are implemented on the printed wiring board. Copper is plated on the printed wiring board from a bath containing nickel and copper. Nickel is plated on the printed wiring board from the bath containing nickel and copper and final processing steps are implemented on the printed wiring board.

  13. Information Security Policy http://www.bu.edu/policies/pdf/Info_Security_Policy_02-17-10.pdf

    E-Print Network [OSTI]

    Xia, Yu "Brandon"

    1 Information Security Policy http://www.bu.edu/policies/pdf/Info_Security_Policy_02-17-10.pdf it must collect, store and use Sensitive Information relating to its students, employees and individuals Information properly and securely. Reason for Policy / Implication Statement Boston University is committed

  14. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Summit | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  15. Building Extensible and Secure Networks

    E-Print Network [OSTI]

    Popa, Lucian

    2011-01-01

    adoption of cloud computing is security, as customers oftenpreserving security when migrating to the cloud computingto the security principals used in the cloud access control

  16. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    for Environment and National Security Scripps Institution ofMultiplying Threats to National Security Higher temperaturesefforts to protect national security. Page 2 The U.S. Armed

  17. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  18. The Inverse Problem for Derivative Securities of Interest Rate

    E-Print Network [OSTI]

    2008-02-02

    May 26, 2000 ... Market price for risk of interest rate reflects the close relation between risk and yield of securities dependent on interest rate. An inverse problem.

  19. Gregory H. Friedman: Before the Subcommittee on National Security...

    Broader source: Energy.gov (indexed) [DOE]

    Security, Veterans Affairs, and International Relations of the Committee on Government Reform U.S. House of Representatives Statement of Gregory H. Friedman Inspector General...

  20. NNMCAB Meeting Minutes 01-28-2015 Board Meeting

    Office of Environmental Management (EM)

    Board Meeting Approved at the NNMCAB March 25, 2015 Board Meeting 1 1 Northern New Mexico Citizens' Advisory Board Meeting 2 January 28, 2015 3 1:00 p.m. to 5:15 p.m. 4 Cities...

  1. NNMCAB Meeting Minutes 07-29-2015 Board Meeting

    Office of Environmental Management (EM)

    Board Meeting Approved at the September 30, 2015 Board Meeting 1 1 Northern New Mexico Citizens' Advisory Board Meeting 2 July 29, 2015 3 1:00 p.m. to 5:15 p.m. 4 Sagebrush...

  2. DOE appoints four new members to advisory board

    Broader source: Energy.gov [DOE]

    DOE has appointed four new members to its Environmental Management advisory board in Oak Ridge. Leon Baker, Richard Burroughs, Terri Likens and Ed Trujillo were introduced during the Oak Ridge Site Specific Advisory Board’s February meeting.

  3. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  4. UNITED STATES NUCLEAR WASTE TECHNICAL REVIEW BOARD

    E-Print Network [OSTI]

    JEC187V3 UNITED STATES NUCLEAR WASTE TECHNICAL REVIEW BOARD 2300 Clarendon Boulevard, Suite 1300 of Energy 1000 Independence Avenue, SW Washington, DC 20585 Dear Secretary O'Leary: At the Nuclear Waste Technical Review Board's October 1995 meeting, the DOE's Office of Civilian Radioactive Waste Management

  5. External Examiner Reports AcademicBoard/

    E-Print Network [OSTI]

    Daley, Monica A.

    External Examiner Reports AcademicBoard/ CMCSecretary AcademicQuality Officer TQCSub-Group External Examiner Reports ExamBoard Chair/Deputy& CourseDirector Academic QualityOfficer External Examiner Submit external examiner report(s) via online system If multiple reports, create one external examiner report

  6. Insulation board and process of making

    DOE Patents [OSTI]

    Nowobilski, J.J.; Owens, W.J.

    1985-08-27

    Insulation board is described which is capable of bearing a load without significant loss of insulating capacity due to compression, produced by a method wherein the board is made in compliance with specified conditions of time, temperature and pressure. 2 figs.

  7. United States Nuclear Waste Technical Review Board

    E-Print Network [OSTI]

    United States Nuclear Waste Technical Review Board Experience Gained From Programs to Manage High-Level Radioactive Waste and Spent Nuclear Fuel in the United States and Other Countries A Report to Congress and the Secretary of Energy April 2011 #12;#12;U.S. Nuclear Waste Technical Review Board Experience Gained From

  8. Western Interstate Energy Board PRESS RELEASE

    E-Print Network [OSTI]

    Knowles, David William

    Western Interstate Energy Board PRESS RELEASE For Immediate Release March 4, 2008 Media Contact with low-carbon resources, largely relying on energy efficiency and renewables. The study was commissioned by the Western Interstate Energy Board (WIEB), the energy arm of the Western Governors' Association

  9. Electronic security device

    DOE Patents [OSTI]

    Eschbach, Eugene A. (Richland, WA); LeBlanc, Edward J. (Kennewick, WA); Griffin, Jeffrey W. (Kennewick, WA)

    1992-01-01

    The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

  10. Electronic security device

    DOE Patents [OSTI]

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-03-17

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

  11. Related Links | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia4) August 20123/%2A en NNSAReference Documents |Livermore

  12. Related Links | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPosterNationalPrograms | NationalREPORTNUCLEAR

  13. Support for the Core Research Activities and Studies of the Computer Science and Telecommunications Board (CSTB)

    SciTech Connect (OSTI)

    Jon Eisenberg, Director, CSTB

    2008-05-13

    The Computer Science and Telecommunications Board of the National Research Council considers technical and policy issues pertaining to computer science (CS), telecommunications, and information technology (IT). The functions of the board include: (1) monitoring and promoting the health of the CS, IT, and telecommunications fields, including attention as appropriate to issues of human resources and funding levels and program structures for research; (2) initiating studies involving CS, IT, and telecommunications as critical resources and sources of national economic strength; (3) responding to requests from the government, non-profit organizations, and private industry for expert advice on CS, IT, and telecommunications issues; and to requests from the government for expert advice on computer and telecommunications systems planning, utilization, and modernization; (4) fostering interaction among CS, IT, and telecommunications researchers and practitioners, and with other disciplines; and providing a base of expertise in the National Research Council in the areas of CS, IT, and telecommunications. This award has supported the overall operation of CSTB. Reports resulting from the Board's efforts have been widely disseminated in both electronic and print form, and all CSTB reports are available at its World Wide Web home page at cstb.org. The following reports, resulting from projects that were separately funded by a wide array of sponsors, were completed and released during the award period: 2007: * Summary of a Workshop on Software-Intensive Systems and Uncertainty at Scale * Social Security Administration Electronic Service Provision: A Strategic Assessment * Toward a Safer and More Secure Cyberspace * Software for Dependable Systems: Sufficient Evidence? * Engaging Privacy and Information Technology in a Digital Age * Improving Disaster Management: The Role of IT in Mitigation, Preparedness, Response, and Recovery 2006: * Renewing U.S. Telecommunications Research * Letter Report on Electronic Voting * Summary of a Workshop on the Technology, Policy, and Cultural Dimensions of Biometric System 2005: * Catalyzing Inquiry at the Interface of Computing and Biology * Summary of a Workshop on Using IT to Enhance Disaster Management * Asking the Right Questions About Electronic Voting * Building an Electronic Records Archive at NARA: Recommendations for a Long-Term Strategy * Signposts in Cyberspace: The Domain Name System and Internet Navigation 2004: * ITCP: Information Technology and Creative Practices (brochure) * Radio Frequency Identification (RFID) Technologies: A Workshop Summary * Getting up to Speed: The Future of Supercomputing * Summary of a Workshop on Software Certification and Dependability * Computer Science: Reflections on the Field, Reflections from the Field CSTB conducted numerous briefings of these reports and transmitted copies of these reports to researchers and key decision makers in the public and private sectors. It developed articles for journals based on several of these reports. As requested, and in fulfillment of its congressional charter to act as an independent advisor to the federal government, it arranged for congressional testimony on several of these reports. CSTB also convenes a number of workshops and other events, either as part of studies or in conjunctions with meetings of the CSTB members. These events have included the following: two 2007 workshops explored issues and challenges related to state voter registration databases, record matching, and database interoperability. A Sept. 2007 workshop, Trends in Computing Performance, explored fundamental trends in areas such as power, storage, programming, and applications. An Oct. 2007, workshop presented highlights of CSTB's May 2007 report, Software for Dependable Systems: Sufficient Evidence?, along with several panels discussing the report's conclusions and their implications. A Jan. 2007 workshop, Uncertainty at Scale, explored engineering uncertainty, system complexity, and scale issues in developing large software systems. A Feb. 2007

  14. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  15. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  16. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY

  17. nevada national security site

    National Nuclear Security Administration (NNSA)

    7%2A en Nevada National Security Site operator recognized for green fleet http:www.nnsa.energy.govblognevada-national-security-site-operator-recognized-green-fleet

    The...

  18. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  19. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  20. Diesel Reformers for On-board Hydrogen Applications | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Reformers for On-board Hydrogen Applications Diesel Reformers for On-board Hydrogen Applications 2003 DEER Conference Presentation: Hydrogen Source 2003deermauss.pdf More...

  1. Northern New Mexico Citizens' Advisory Board Launches Revitalized...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Northern New Mexico Citizens' Advisory Board Launches Revitalized Website Northern New Mexico Citizens' Advisory Board Launches Revitalized Website November 10, 2015 - 2:30pm...

  2. Type B Accident Investigation Board Report for the January 11...

    Broader source: Energy.gov (indexed) [DOE]

    a serious injury to his right hand while operating a table saw. In conducting its investigation, the Accident Investigation Board (the Board) used various analytical techniques,...

  3. The Local Board of Health Environmental Health Primer

    E-Print Network [OSTI]

    The Local Board of Health Environmental Health Primer Risk Assessment Factsheet environmental health Background · Localpublichealthprotectionrequiresidentifyingandprioritizingneedsthroughrisk.Environmentalandhealthdepartmentofficialsshould developcommunity-specificcriteriaforconductingtheriskmanagementphaseof hazardandriskreduction. Board of Health

  4. SECRETARY OF ENERGY ADVISORY BOARD MEMORANDUM FOR: Secretary...

    Energy Savers [EERE]

    BOARD MEMORANDUM FOR: Secretary Ernest J. Moniz FROM: John Deutch Chair, Secretary of Energy Advisory Board DATE: December 9, 2014 SUBJECT: SEAB Endorsement of Office of...

  5. Interconnection arrangement of routers of processor boards in...

    Office of Scientific and Technical Information (OSTI)

    physical interconnect structure includes routers in service or compute processor boards distributed in an array of cabinets connected in series on each board and to respective...

  6. Hydrogen Storage Materials Requirements to Meet the 2017 On Board...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Requirements to Meet the 2017 On Board Hydrogen Storage Technical Targets Hydrogen Storage Materials Requirements to Meet the 2017 On Board Hydrogen Storage Technical Targets...

  7. Secretary of Energy Advisory Board Hosts Conference Call on Shale...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy Advisory Board Hosts Conference Call on Shale Gas Draft Report Secretary of Energy Advisory Board Hosts Conference Call on Shale Gas Draft Report November 10, 2011 -...

  8. Department of Energy to Host Secretary of Energy Advisory Board...

    Energy Savers [EERE]

    Meeting DOE to Host Secretary of Energy Advisory Board Natural Gas Subcommittee Meeting Secretary of Energy Advisory Board Hosts Conference Call on Shale Gas Draft Report...

  9. Defense Nuclear Facilities Safety Board (DNFSB) Update - Dale...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Defense Nuclear Facilities Safety Board (DNFSB) Update - Dale Govan, Departmental Representative to the DNFSB Defense Nuclear Facilities Safety Board (DNFSB) Update - Dale Govan,...

  10. "Paper" Energy Systems Acquisition Advisory Board Process | Department...

    Energy Savers [EERE]

    "Paper" Energy Systems Acquisition Advisory Board Process "Paper" Energy Systems Acquisition Advisory Board Process ESAAB-paperprocess---2009-01-14.pdf More Documents &...

  11. Feasibility of OnBoard Thermoelectric Generation for Improved...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    OnBoard Thermoelectric Generation for Improved Vehicle Fuel Economy Feasibility of OnBoard Thermoelectric Generation for Improved Vehicle Fuel Economy Poster presentation at the...

  12. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    Pew Project on National Security, Energy and Climate http://of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.

  13. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  14. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  15. cyber security guru

    E-Print Network [OSTI]

    Sandhu, Ravi

    cyber security guru By: Virginia Scott Posted: 4/17/07 UTSA has received a grant from the Texas Emerging Fund to create an institute for cyber security research. According to UTSA industry and educational initiatives in Texas. The creation of UTSA's Institute for Cyber Security Research

  16. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  17. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  18. U.S. Nuclear Waste Technical Review Board Fiscal Year 2002-2007 Strategic Plan

    E-Print Network [OSTI]

    -level radioactive waste. The Board also reviews activities related to packaging and transporting such waste-characterization activities; and activities related to the packaging or transportation of high-level radioactive waste of the credibility of site evalua tion and other high-level radioactive waste manage ment activities would be crucial

  19. Nuclear Waste Technical Review Board Strategic Plan for FY 2001-2006

    E-Print Network [OSTI]

    -level radioactive waste. The Board also reviews activities related to packag- ing and transporting such waste-characterization activities; and activities related to the packaging or transportation of high-level radioactive waste of the credibility of site evaluation and other high-level radioactive waste management activities would be crucial

  20. Secure sequential transmission of quantum information

    E-Print Network [OSTI]

    Kabgyun Jeong; Jaewan Kim

    2015-01-19

    We propose a quantum communication protocol that can be used to transmit any quantum state, one party to another via several intermediate nodes, securely on quantum communication network. The scheme makes use of the sequentially chained and approximate version of private quantum channels satisfying certain commutation relation of $n$-qubit Pauli operations. In this paper, we study the sequential structure, security analysis, and efficiency of the quantum sequential transmission (QST) protocol in depth.

  1. Security Analysis of PRINCE Jeremy Jean1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Security Analysis of PRINCE J´er´emy Jean1 , Ivica Nikoli´c2 , Thomas Peyrin2 , Lei Wang2,thomas.peyrin,wang.lei,wushuang}@ntu.edu.sg Abstract. In this article, we provide the first third-party security analysis of the PRINCE lightweight the structural linear relations that exist for PRINCE in order to obtain a key recovery attack that slightly

  2. Energy Systems Acquisitions Advisory Board Procedures

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-10-28

    The Notice streamlines the Energy Systems Acquisition Advisory Board (ESAAB) process to ensure informed, objective, and documented Strategic and Major System Critical Decision, Baseline Change Proposal, and site selection final decisions. Does not cancel other directives.

  3. Transportation Research Board 94th Annual Meeting

    Broader source: Energy.gov [DOE]

    The Transportation Research Board 94th Annual Meeting will be held January 11–15, 2015, in Washington, D.C. at the Walter E. Washington Convention Center. The event covers the entire transportation...

  4. Northern New Mexico Citizens' Advisory Board Meeting

    Office of Environmental Management (EM)

    New Mexico Citizens' Advisory Board Meeting Special Meeting Thursday, November 12, 2015 1:00 p.m. to 4:30 p.m. Cities of Gold Conference Center 10-A Cities of Gold Road Pojoaque,...

  5. Northern New Mexico Citizens' Advisory Board

    Office of Environmental Management (EM)

    Recommendation 2011-02 Approved July 25, 2012 Northern New Mexico Citizens' Advisory Board Recommendation to the Department of Energy No. 2012-02 "Expand the Mission of the NNMCAB...

  6. NORTHERN NEW MEXICO CITIZENS' ADVISORY BOARD (NNMCAB)

    Office of Environmental Management (EM)

    0 Approved on November 19, 2008 NORTHERN NEW MEXICO CITIZENS' ADVISORY BOARD (NNMCAB) Recommendation to the Department of Energy No. 2008-10 Regarding Independent Review of the MDA...

  7. Northern New Mexico Citi- zens' Advisory Board...

    Office of Environmental Management (EM)

    Fall 2014 Volume II, Issue IV National Chairs Meeting-Idaho Falls, Idaho Northern New Mexico Citizens' Advisory Board Newsletter M r. Valerio re- tired from the New Mexico Envi-...

  8. NORTHERN NEW MEXICO CITIZENS ADVISORY BOARD

    Office of Environmental Management (EM)

    3 Approved 3-31-10 NORTHERN NEW MEXICO CITIZENS' ADVISORY BOARD Recommendation to the Department of Energy No. 2010-03 Regarding sufficient Funding for Los Alamos National...

  9. NORTHERN NEW MEXICO CITIZENS' ADVISORY BOARD (NNMCAB)

    Office of Environmental Management (EM)

    1 Approved by the NNMCAB on November 19, 2008 NORTHERN NEW MEXICO CITIZENS' ADVISORY BOARD (NNMCAB) Recommendation to the Department of Energy 2008-11 Reducing the Outfall into...

  10. NORTHERN NEW MEXICO CITIZENS ADVISORY BOARD

    Office of Environmental Management (EM)

    6 Approved 3-31-10 NORTHERN NEW MEXICO CITIZENS' ADVISORY BOARD Recommendation to the Department of Energy No. 2010-06 Recommendation of Budget Priorities for FY 12 and Baseline...

  11. Electric Power Board- Energy Efficiency Rebate Program

    Broader source: Energy.gov [DOE]

    Electric Power Board provides a financial incentive for residential customers to replace old water heaters with new ones which meet the minimum standards set forth by the DOE. The rebate is worth ...

  12. NNMCAB Board Minutes: December 2014 Santa Fe

    Office of Energy Efficiency and Renewable Energy (EERE)

    Minutes of the December 10, 2014 Special Board meeting at Lodge at Santa Fe Presentation DOE HQ, Transition of Environmental Management Clean-up at LANL, Jack Craig Presentation RCLC, Perspectives from the Regional Coalition of LANL Communities, Darien Cabral

  13. Paducah CAB Board - September | Department of Energy

    Energy Savers [EERE]

    Paducah CAB Board - September September 17, 2015 6:00PM to 8:00PM CDT Paducah CAB Office, 111 Memorial Drive, Paducah, KY 42001 Contact Buz Smith, DOE Site Office 270-441-6821...

  14. The Board's Role for Credit Union Mergers 

    E-Print Network [OSTI]

    2007-01-01

    School of Government & Public Service at Texas A&M University. He teaches graduate courses about nonprofi t organizations and program evalu- ation. He has worked with numerous organizations in the direct provision of services, consulting, and board...

  15. Geoscience research for energy security

    SciTech Connect (OSTI)

    Not Available

    1987-02-01

    This report focuses on the nation's geoscience needs and recommends DOE activities to mitigate major problems that effect energy security. The report recommends new or redirected DOE geoscience research initiatives for oil and gas, coal, nuclear resources, structures and processes in the earth's crust, geothermal resources, oil shale, and waste disposal. In light of the current and near-term national energy requirements, federal budget constraints, and the diminished R and D efforts from the domestic energy industry, the Board recommends that DOE: assign highest geoscience research emphasis to shorter-term, energy priorities of the nation; particularly advanced oil and gas exploration and production technologies; establish in DOE an Office of Geoscience Research to develop and administer a strategic plan for geoscience research activities; establish oil and gas research centers within each of the six major oil and gas provinces of the United States to conduct and coordinate interdisciplinary problem-oriented research; increase oil and gas research funding by an initial annual increment of $50 million, primarily to support the regional research centers.

  16. Experimental test of airplane boarding methods

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Steffen, Jason H.; Hotchkiss, Jon

    2011-10-26

    We report the results of an experimental comparison of different airplane boarding methods. This test was conducted in a mock 757 fuselage, located on a Southern California soundstage, with 12 rows of six seats and a single aisle. Five methods were tested using 72 passengers of various ages. We found a significant reduction in the boarding times of optimized methods over traditional methods. These improved methods, if properly implemented, could result in a significant savings to airline companies. The process of boarding an airplane is of interest to a variety of groups. The public is interested both as a curiosity,more »as it is something that they may regularly experience, and as a consumer, as their experiences good or bad can affect their loyalties. Airline companies and their employees also have a stake in an efficient boarding procedure as time saved in the boarding process may result is monetary savings, in the quality of interactions with passengers, and in the application of human resources to the general process of preparing an airplane for departure. A recent study (Nyquist and McFadden, 2008) indicates that the average cost to an airline company for each minute of time spent at the terminal is roughly $30. Thus, each minute saved in the turn-around time of a flight has the potential to generate over $16,000,000 in annual savings (assuming an average of 1500 flights per day). While the boarding process may not be the primary source of delay in returning an airplane to the skies, reducing the boarding time may effectively eliminate passenger boarding as a contributor in any meaningful measure. Consequently, subsequent efforts to streamline the other necessary tasks, such as refueling and maintenance, would be rewarded with a material reduction in time at the gate for each flight.« less

  17. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  18. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  19. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  20. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important is critical October 7, 2009 GAANN ­ Computer Systems Security 1 #12;GAANN - Computer Systems Security

  1. Federated Cloud Security Architecture for Secure and Agile Clouds

    E-Print Network [OSTI]

    Xu, Shouhuai

    Federated Cloud Security Architecture for Secure and Agile Clouds Weiliang Luo, Li Xu, Zhenxin Zhan. This chapter introduces the novel federated cloud security architecture that includes proactive cloud defense technologies for secure and agile cloud development. The federated security architecture consists of a set

  2. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu, Ram Krishnan and Gregory B. White Institute for Cyber Security University of Texas at San Antonio #12;Secure Information ­ Security mechanisms such as authentication, cryptography, trusted hardware, etc. #12;Community Cyber

  3. Implementing Advances in Transport Security Technologies | Department...

    Office of Environmental Management (EM)

    Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies More...

  4. Cyber Security & Smart Grid 

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01

    and interoperability ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Vulnerabilities In The Legacy Power Grid ? SCADA Security ? Supervisory Control and Data Acquisition (SCADA) systems are used extensively to control and monitor the national... & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart Grid Networks...

  5. Supervisory Industrial Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  6. Oil Security Metrics Model

    SciTech Connect (OSTI)

    Greene, David L.; Leiby, Paul N.

    2005-03-06

    A presentation to the IWG GPRA USDOE, March 6, 2005, Washington, DC. OSMM estimates oil security benefits of changes in the U.S. oil market.

  7. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  8. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  9. Natlonal Nuclear Security Admlnlstratlon

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Natlonal Nuclear Security Admlnlstratlon Washington, DC 20585 January 18, 2007 OFFICE OF THE ADMINISTRATOR MEMORANDUM FOR The Deputy Secretary FROM: SUBJECT: Linton F. Brooks...

  10. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Washington, DC 20585 MEMORANDUM FOR THE ADMINISTRATOR FROM: THEODORE D. SHERRY II 4 flA. * -. SUBJECT: REFERENCE: NATIONAL SECURITY ENTI's'E FIELD COUNCIL CHAIR ACTION:...

  11. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    30 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 25, 2012 Recognizing employee and retiree volunteer efforts LOS ALAMOS, NEW...

  12. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  13. Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System

    E-Print Network [OSTI]

    Ling, Amy Poh Ai; 10.5121/ijgca.2011.2201

    2011-01-01

    This paper describes the background of smart information infrastructure and the needs for smart grid information security. It introduces the conceptual analysis to the methodology with the application of hermeneutic circle and information security functional requirement identification. Information security for the grid market cover matters includes automation and communications industry that affects the operation of electric power systems and the functioning of the utilities that manage them and its awareness of this information infrastructure has become critical to the reliability of the power system. Community benefits from of cost savings, flexibility and deployment along with the establishment of wireless communications. However, concern revolves around the security protections for easily accessible devices such as the smart meter and the related communications hardware. On the other hand, the changing points between traditional versus smart grid networking trend and the information security importance on...

  14. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  15. Cloud Security by Max Garvey

    E-Print Network [OSTI]

    Tolmach, Andrew

    Cloud Security Survey by Max Garvey #12;Cloudy Cloud is Cloudy What is the cloud? On Demand Service, performance SECaaS - Cloud hosted security measures Certifications - measurements for cloud security. #12;Cloud Questions If you have $0 security budget, could cloud be a security improvement? Who owns the data

  16. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    research programs. These programs, which include Cyber Security, Pervasive Information TechnologiesComputer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security

  17. U.S. Nuclear Waste Technical Review Board

    E-Print Network [OSTI]

    related to the nuclear weapons complex was "required" and defined six factors to be considered in makingU.S. Nuclear Waste Technical Review Board A RepoRt to the U.S. CongReSS And the SeCRetARy of eneEpartmEnt of EnErgy-managEd high-lEvEl radioactivE wastE and spEnt nuclEar fuEl JunE 2015 #12;#12;U.S. nUCleAR

  18. Formulation of Molding Materials From Recycled Printed Wiring Boards

    SciTech Connect (OSTI)

    Lula, J.W.; Bohnert, G.W.

    1998-04-20

    The objective of this project was to formulate the pulverized electronic waste (PEW) stream derived from grinding obsolete electronic assemblies and combine this material with thermoplastic or thermosetting polymers into useful, high-value commercial products materials. PEW consists primarily of various thermoset plastic materials and glass fibers from the printed wiring boards, along with ceramic pieces from chip carriers and other electronic components. Typically, the thermosetting materials have the same desirable properties as in the original electronic assembly, including relatively high temperature resistance, excellent chemical resistance, and flame retardancy. These properties combine to make PEW an inherently good inert filler material for plastic composites.

  19. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Environmental Management (EM)

    be completed each year by all those who hold a security clearance; and the Security Termination Briefing, which is conducted when a person no longer requires a security clearance....

  20. A History of the Environmental Management Advisory Board: 20 Years of Service and Partnership - 13219

    SciTech Connect (OSTI)

    Ellis, Kristen; Schmitt, Elizabeth

    2013-07-01

    The Environmental Management Advisory Board (EMAB or Board) was chartered under the Federal Advisory Committee Act (FACA) in 1992 to provide the Assistant Secretary for Environmental Management (EM) with independent and external advice, information, and recommendations on corporate issues relating to accelerated site clean-up and risk reduction throughout the EM complex. Over the course of the past 20 years, the composition and focus of the Board have varied widely to address the changing needs of the program. EMAB began as the Environmental Restoration and Waste Management Advisory Committee, formed to provide advice on an EM Programmatic Environmental Impact Statement. In 1994, the Board was restructured to function more as an executive-level, limited member advisory board whose membership provides insight of leading industry experts and the viewpoints of representatives from critical stakeholder constituencies. Throughout the 20 years of its existence, EMAB has covered a wide variety of topics and produced nearly 200 recommendations. These recommendations have resulted in several policy changes and improvements within EM. Most recently, EMAB has been credited for its contribution to the EM Energy Park Initiative, forerunner of the DOE Asset Revitalization Initiative; creation of the EM Offices of Communications and External Affairs; improvement of acquisition and project management strategies and culture; and several recommendations related to the Waste Treatment Plant and the tank waste programs at Hanford and the Savannah River Site. The wealth of experience and knowledge the Assistant Secretary can leverage through utilization of the Board continues to support fulfillment of EM's mission. In commemoration of EMAB's 20. anniversary, this paper will provide further context for the evolution of the Board, the role FACA plays in its administration, and a look at the members' current objectives and EM's expectations for the future. (authors)

  1. BOARD OF TRUSTEES Aendic Board of Trustees at 1 July 2005

    E-Print Network [OSTI]

    Accounting office Jean Fohrer DSFDRV DSS DEV SAS #12;58 RESEARCH UNITS AND SERVICE UNITSat 1 July 2005 DME55 #12;56 BOARD OF TRUSTEES Aendic Board of Trustees at 1 July 2005 Chairman Jean-François Girard, Montpellier #12;IRD CENTRAL SERVICESAT 1 JULY 2005 REGIONAL CENTRES IN FRANCE SITES OUTSIDE FRANCE RESEARCH

  2. National Security Technology Incubation Project Continuation Plan

    SciTech Connect (OSTI)

    2008-09-30

    This document contains a project continuation plan for the National Security Technology Incubator (NSTI). The plan was developed as part of the National Security Preparedness Project (NSPP) funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This continuation plan describes the current status of NSTI (staffing and clients), long-term goals, strategies, and long-term financial solvency goals.The Arrowhead Center of New Mexico State University (NMSU) is the operator and manager of the NSTI. To realize the NSTI, Arrowhead Center must meet several performance objectives related to planning, development, execution, evaluation, and sustainability. This continuation plan is critical to the success of NSTI in its mission of incubating businesses with security technology products and services.

  3. PAPA--Univ. Calif. IPM Program--SF Bay Water Quality Control Board Integrated Pest Management for Landscapes and Public Agencies Seminar

    E-Print Network [OSTI]

    Ishida, Yuko

    PAPA--Univ. Calif. IPM Program--SF Bay Water Quality Control Board Integrated Pest Management Quality Janet O'Hara, Water Resource Control Engineer, SFB Water Quality Control Board 9:05 IPM Update - Ag Commissioner's Office Representative 8:30 New Regulations Related to Pesticides and Water

  4. Los Alamos CCS (Center for Computer Security) formal computer security model

    SciTech Connect (OSTI)

    Dreicer, J.S.; Hunteman, W.J. (Los Alamos National Lab., NM (USA))

    1989-01-01

    This paper provides a brief presentation of the formal computer security model currently being developed at the Los Alamos Department of Energy (DOE) Center for Computer Security (CCS). The initial motivation for this effort was the need to provide a method by which DOE computer security policy implementation could be tested and verified. The actual analytical model was a result of the integration of current research in computer security and previous modeling and research experiences. The model is being developed to define a generic view of the computer and network security domains, to provide a theoretical basis for the design of a security model, and to address the limitations of present models. Formal mathematical models for computer security have been designed and developed in conjunction with attempts to build secure computer systems since the early 70's. The foundation of the Los Alamos DOE CCS model is a series of functionally dependent probability equations, relations, and expressions. The mathematical basis appears to be justified and is undergoing continued discrimination and evolution. We expect to apply the model to the discipline of the Bell-Lapadula abstract sets of objects and subjects. 5 refs.

  5. The Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure Computing Corporation

    E-Print Network [OSTI]

    Andersen, Dave

    Computing Corporation Stephen Smalley, Peter Loscocco National Security Agency Mike Hibler, David AndersenThe Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure be flexible in their support for security policies, providing sufficient mechanisms for supporting the wide

  6. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    SciTech Connect (OSTI)

    Sheldon, Frederick T; Krings, Axel; Yoo, Seong-Moo; Mili, Ali; Trien, Joseph P

    2006-01-01

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

  7. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not findGeoscience/EnvironmentGlobal Security Global Security We

  8. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Exchange of Information Develop security tools that: · Integrate information from different communication channels · Provide flexible reporting (reports adapted to the recipient) · Communicate security information Security practitioners perform many activities: · Information exchanged in different formats across

  9. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Cases Security Cases RSS June 19, 2015 PSH-15-0011 - In the Matter of Personnel Security Hearing On June 19, 2015, an OHA Administrative Judge (AJ) issued a decision in...

  10. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    Computer Security Incident Handling Guide Recommendationsof the National Institute of Standards Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD Tom Millar United States Computer Emergency Readiness Team National Cyber Security Division

  11. Security Policy: Radio Network Controller

    E-Print Network [OSTI]

    Security Policy: Radio Network Controller Encryption Module Controller (RNC EMC) Cryptographic, 2007 Security Policy: RNC EMC Page 1 of 22 #12;Security Policy: RNC EMC Page 2 of 22 #12;Table...........................................................14 7. IDENTIFICATION AND AUTHENTICATION POLICY

  12. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  13. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  14. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Ensuring the Safe Containment

  15. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear

  16. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  17. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1.

  18. CIOs Uncensored: Security Smarts.

    SciTech Connect (OSTI)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNL’s “defense in depth” approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability – and your last line of defense.

  19. Engineering secure software 

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01

    -the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar...

  20. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  1. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W the computational, physics

  2. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  3. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  4. Secure Virtualization with Formal Methods

    E-Print Network [OSTI]

    Sturton, Cynthia

    2013-01-01

    cloud computing, virtualization software has a variety of security-cloud computing, researchers have proposed using system virtualization software as a platform to increase the security

  5. Program Areas | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program Areas image Oak Ridge National Laboratory (ORNL) has a robust...

  6. Office of Secure Transportation Activities

    Office of Environmental Management (EM)

    6th, 2012 WIPP Knoxville, TN OFFICE OF SECURE TRANSPORTATION Agency Integration Briefing Our Mission To provide safe and secure ground and air transportation of nuclear weapons,...

  7. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Activities Transportation Security Rulemaking Activities at the U.S. Nuclear Regulatory Commission NRC Transportation Security (Part 73 SNF Update and Part 37 Category 1...

  8. National Nuclear Security Administration Overview

    Office of Environmental Management (EM)

    May 11, 2011 Ahmad Al-Daouk Manager, National Security Department (NSD) National Nuclear Security Administration (NNSA) Service Center - Albuquerque, NM May 11, 2011 - Page 2...

  9. Extender for securing a closure

    DOE Patents [OSTI]

    Thomas, II, Patrick A.

    2012-10-02

    An apparatus for securing a closure such as door or a window that opens and closes by movement relative to a fixed structure such as a wall or a floor. Many embodiments provide a device for relocating a padlock from its normal location where it secures a fastener (such as a hasp) to a location for the padlock that is more accessible for locking and unlocking the padlock. Typically an extender is provided, where the extender has a hook at a first end that is disposed through the eye of the staple of the hasp, and at an opposing second end the extender has an annulus, such as a hole in the extender or a loop or ring affixed to the extender. The shackle of the padlock may be disposed through the annulus and may be disposed through the eye of a second staple to secure the door or window in a closed or open position. Some embodiments employ a rigid sheath to enclose at least a portion of the extender. Typically the rigid sheath has an open state where the hook is exposed outside the sheath and a closed state where the hook is disposed within the sheath.

  10. Communication Between the U.S. Nuclear Waste Technical Review Board

    E-Print Network [OSTI]

    Appendix F Appendix F Communication Between the U.S. Nuclear Waste Technical Review Board on Energy and Air Quality on March 25, 2004 143 #12;#12;Appendix F UNITED STATES NUCLEAR WASTE TECHNICAL much for your written questions related to my testimony on behalf of the Nuclear Waste Technical Review

  11. Wireless Security in the Home and Office Environment

    E-Print Network [OSTI]

    Kranakis, Evangelos

    Wireless Security in the Home and Office Environment Michel Barbeau School of Computer Science, 2010 Abstract The ubiquity of wireless communications, in the home and office environment, introduces, to the security of wireless communications, that are real and the ones that are inoffensive. Examples related

  12. On Building Secure SCADA Systems using Security Eduardo B. Fernandez

    E-Print Network [OSTI]

    Wu, Jie

    On Building Secure SCADA Systems using Security Patterns Eduardo B. Fernandez Dept. of Comp. Sci, also known as the supervisory, control, and data acquisition (SCADA) system. On the other hand systems. This paper aims to propose methods to build a secure SCADA system using security patterns

  13. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  14. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  15. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu Dept. of Computer Science Institute for Cyber Security University of Texas at San Antonio Email: ravi.sandhu@utsa.edu Ram Krishnan Dept. of Electrical and Computer Engineering Institute for Cyber Security University

  16. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio June 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  17. 1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE

    E-Print Network [OSTI]

    Upadhyaya, Shambhu

    , there are 100+ centers ­ Based on curriculum mapping to CNSS (committee of National Security Standards) 4011 at Google (2010) · Threats to national security ­ Insider attacks ­ Examples: Bradley Manning leaked1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE Professor S. Upadhyaya Department

  18. A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY

    E-Print Network [OSTI]

    Sussex, University of

    EN A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY Brussels, 12 December 2003 #12;1 EN's complex problems on its own Introduction Europe has never been so prosperous, so secure nor so free problems on its own. Europe still faces security threats and challenges. The outbreak of conflict

  19. SecuritySmart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity SecuritySecuritySmart

  20. Defining and Computing a Valued Based Cyber-Security Measure

    SciTech Connect (OSTI)

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2012-01-01

    In earlier work, we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper, we discuss the specification and design of a system that collects, updates, and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

  1. The Local Board of Health Environmental Health Primer

    E-Print Network [OSTI]

    Tools: EnvironmentalPolicy,Law,andAdministration.InThe Local Board of Health Environmental H Working to strengthen.). Management Tools: Environmental Policy, Law, and Administration Factsheet #12;The Local Board of Health Environmental Health Primer environmental health Background

  2. New Mexico Federal Executive Board awards NNSA Supervisory Contract...

    National Nuclear Security Administration (NNSA)

    Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home NNSA Blog New Mexico Federal Executive Board awards NNSA ... New Mexico Federal Executive Board awards NNSA...

  3. The Local Board of Health Environmental Health Primer

    E-Print Network [OSTI]

    The Local Board of Health Environmental Health Primer Vector Control Factsheet environmental health,bioterroristactivitiessupportedby hostilegovernmentsandindividuals,andadecreaseinvectorcontrolprograms becauseofbudgetshortages. Board of Health ActionsIntegratedPestManagementisbeingusedforvectorcontrol. · Communicateriskstothecommunityintheeventofavector-relatedemergency. Resources for Continuing Education · AssociationofStateandTerritorialHealth

  4. The Local Board of Health Environmental Health Primer

    E-Print Network [OSTI]

    The Local Board of Health Environmental Health Primer Injury Prevention Factsheet environmental health Background · Unintentionalinjuryandviolenceaccountsforapproximately30%ofallyearsof-relatedinjuries. · Recreationalwaterillnessesareillnessesthatarespreadbycontactwithcontaminated waterfromswimmingpools,spas,lakes,rivers,oroceans. Board of Health Actions

  5. COST ACCOUNTING STANDARDS BOARD DISCLOSURE STATEMENT FOR EDUCATIONAL INSTITUTIONS

    E-Print Network [OSTI]

    COST ACCOUNTING STANDARDS BOARD DISCLOSURE STATEMENT FOR EDUCATIONAL INSTITUTIONS CASB DS-2 #12;COST ACCOUNTING STANDARDS BOARD DISCLOSURE STATEMENT REQUIRED BY PUBLIC LAW 100-679 EDUCATIONAL INSTITUTIONS INDEX GENERAL INSTRUCTIONS -- Continuation Sheet

  6. High Level Waste Corporate Board Newsletter - 06/03/09

    Office of Environmental Management (EM)

    UPCOMING EVENTS: Tank Waste Corporate Board Oak Ridge National Laboratory Oak Ridge, Tennessee 28 - 29 July 2009 The Board meeting will be preceded by a tour of the Radiochemical...

  7. IEAB Independent Economic Analysis Board

    E-Print Network [OSTI]

    in power supply and its cost will have demand and supply effects that will influence the amount, mix and costs of power. First, under the 2008 BiOp, increased FWP costs relative to the 2004 BiOp will increase five years, new temporary spillway weirs (TSWs) may change the required amount and cost of fish spill

  8. Multilayer printed wiring board lamination

    SciTech Connect (OSTI)

    Lula, J.W.

    1980-06-01

    The relationship of delamination resistance of multilayer PWBs made from GF material to manufacturing process variables was investigated. A unique quantitative test method developed during this project shows that delamination resistance is highly sensitive to material conditioning, to innerlayer surface treatment, and to post-lamination storage conditions, but is relatively insensitive to cure cycle variations.

  9. 2014 Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

  10. 2014 Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

  11. NEJC Board Member Receives 2015 National Planning Excellence Award

    Broader source: Energy.gov [DOE]

    National Environmental Justice Conference, Inc. Board of Directors Member Receives American Planning Association 2015 National Planning Excellence Award

  12. COLLEGE OF CHARLESTON BOARD OF TRUSTEES

    E-Print Network [OSTI]

    Kunkle, Tom

    , South Carolina October 19, 2007 8:30 a.m. Presiding: Robert W. Marlowe, Chairman Members of the Board. Cherry Daniel, Mr. Frank M. Gadsden, Mr. James F. Hightower, Mrs. Marie Land, Mr. G. Lee Mikell, Mr: Dean Norine Noonan, School of Sciences and Mathematics; Dean Frances Welch, Dr. Paula Egelson, and Dr

  13. Northern New Mexico Citizens Advisory Board Meeting

    Office of Environmental Management (EM)

    CERTIFIED-- NNMCAB Meeting Minutes 1-28-09 1 2 3 4 5 6 7 8 9 10 Northern New Mexico Citizens' Advisory Board Meeting January 28, 2009 2:00 p.m. to 8:00 p.m. Holiday Inn Santa Fe...

  14. Northern New Mexico Citizens Advisory Board Meeting

    Office of Environmental Management (EM)

    9-30-09 Chair Certified 1 2 3 4 5 6 7 8 Northern New Mexico Citizens' Advisory Board Meeting September 30, 2009 2:00 p.m. to 8:00 p.m. Holiday Inn, 4048 Cerrillos Road Santa Fe,...

  15. Northern New Mexico Citizens Advisory Board Meeting

    Office of Environmental Management (EM)

    24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 Northern New Mexico Citizens' Advisory Board Meeting May 22, 2008 9:00 a.m. to 4:00 p.m. Holiday Inn 4048...

  16. QER- Comment of State Energy Advisory Board

    Broader source: Energy.gov [DOE]

    Dear Melanie: As you are aware, QER is an area of focus for STEAB and we are working directly with EPSA on it. Attached, please find a copy of the State Energy Advisory Board's response to the Office of Energy Policy and Systems Analysis. Please feel free to contact me with any questions or comments.

  17. OCRWM INFOLINK: an electronic bulletin board

    SciTech Connect (OSTI)

    Not Available

    1985-12-01

    This Users' Manual provides instructions for access to OCRWM INFOLINK (an electronic bulletin board). Ready access is provided to texts of: press releases; fact sheets/backgrounders; congressional questions and answers; congressional testimony; speeches; schedules (milestones, meetings, and activities); and miscellaneous announcements.

  18. Electronic bulletin board. OCRWM INFOLINK. Revision

    SciTech Connect (OSTI)

    Not Available

    1986-04-01

    This user's manual provides instructions for access to OCRWM INFOLINK (an electronic bulletin board). INFOLINK provides current program information and access to texts of: press releases; fact sheets/backgrounders; comgressional questions and answers; congressional testimony; speeches; schedules (milestones, meetings, and activities); and miscellaneous announcements.

  19. Nuclear Waste Technical Review Board Performance Plan

    E-Print Network [OSTI]

    , Yucca Mountain in Nevada. The NWPAA also established the Board and charged it with evaluating the NWPA. The activities include characterizing the Yucca Mountain site and packaging and transporting of the repository block (ECRB) at Yucca Mountain. 1.3.2. Evaluate data from the drift-scale heater test. 1

  20. Board of Graduate Studies 4 Mill Lane

    E-Print Network [OSTI]

    Jackson, Sophie

    Application for a new MPhil: Nuclear Energy (Papers 4251, 4252) Professor Cardwell spoke to this item. He explained that the Department (CUED) and the School of Technology had identified nuclear energy as a key Proposed amendment to the special regulations: MPhil in Politics (Paper 4254) The Board approved

  1. *****I* ****f?* Fusion Programme Evaluation Board

    E-Print Network [OSTI]

    of the Community's programme in the field of Controlled Thermonuclear Fusion; to appraise the environmental, safety*****I* ****f?* Report of the Fusion Programme Evaluation Board prepared for the Commission . . . . . . . . . . . . 11 CHAPTER ONE: NUCLEAR FUSION AND ITS POTENTIAL CONTRIBUTION TO THE WORLD'S ENERGY NEEDS 1

  2. BROADER National Security Missions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Metal Chips (U) Uranium Trioxide (UO 3 ) UO 2 (NO 3 ) 2 Ur anyl Nitrate Ammonium Uranyl Carbonate (NH 4 ) 2 UO 2 (CO 3 ) 4 DEVELOP NEW NATIONAL SECURITY MISSIONS Y-12 has...

  3. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  4. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  5. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  6. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  7. Board scheduling for circuit board assembly : computational testing of an integer programming approach 

    E-Print Network [OSTI]

    Zetangue, Natalie F

    2013-02-22

    that will create a tool of this sort by choosing and configuring the placement machines, allocating parts to appropriate machines, assigning parts to machine feeders, arranging part placement in sequential order, and sequentially scheduling boards on particular...

  8. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  9. Policy Paper 35: Energy and Security in Northeast Asia: Fueling Security

    E-Print Network [OSTI]

    Calder, Kent; Fesharaki, Fereidun; Shirk, Susan L.; Stankiewicz, Michael

    1998-01-01

    Deese (editors). Energy and Security. 3. Fereidun Fesharaki,Energy and Security in Northeast Asia: Fueling Security Anrising energy demand. Energy and Security in Northeast Asia

  10. Secure Quantum Key Distribution

    E-Print Network [OSTI]

    Hoi-Kwong Lo; Marcos Curty; Kiyoshi Tamaki

    2015-05-20

    Secure communication plays a crucial role in the Internet Age. Quantum mechanics may revolutionise cryptography as we know it today. In this Review Article, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After a brief introduction to recent experimental progress and challenges, we survey the latest developments in quantum hacking and counter-measures against it.

  11. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  12. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  13. The Local Board of Health Environmental Health Primer

    E-Print Network [OSTI]

    The Local Board of Health Environmental Health Primer Air Quality Factsheet environmental health. · Indoorairqualityatspecializedplaces,suchasschoolsorindoorpools,shouldbe monitoredaswell. Board of Health ActionsProtectionAgency.IndoorAirQuality.Availableatwww.epa.gov/iaq/ · NationalAssociationofLocalBoardsofHealth.(2011).AirQuality.InThe Local Board of Health Environmental Health

  14. U.S. NUCLEAR WASTE TECHNICAL REVIEW BOARD

    E-Print Network [OSTI]

    U.S. NUCLEAR WASTE TECHNICAL REVIEW BOARD Report to The U.S. Congress And The Secretary of Energy January 1, 2003, to December 31, 2003 #12;U.S. NUCLEAR WASTE TECHNICAL REVIEW BOARD Report to The U.nwtrb.gov, the NWTRB Web site. #12;#12;#12;NUCLEAR WASTE TECHNICAL REVIEW BOARD 2003 Dr. Michael L. Corradini

  15. U.S. NUCLEAR WASTE TECHNICAL REVIEW BOARD

    E-Print Network [OSTI]

    U.S. NUCLEAR WASTE TECHNICAL REVIEW BOARD Report to January to December 2000 The U.S. Congress are available at www.nwtrb.gov, the NWTRB Web site. #12;#12;#12;NUCLEAR WASTE TECHNICAL REVIEW BOARD Dr. Jared L . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 vii Table of Contents Appendices Appendix A Nuclear Waste Technical Review Board Members

  16. October 30, 2013 Status of Opto-Board Production

    E-Print Network [OSTI]

    Gan, K. K.

    Pixel Week 1 October 30, 2013 K.K. Gan Status of Opto-Board Production K.K. Gan, R + 16 data links #12;Pixel Week 3 Production Status K.K. Gan nSQP B opto-boards production completed passed reception test at CERN IBL opto-boards production completed passed

  17. Evolving Secure Computer Infrastructures Computer Science Department

    E-Print Network [OSTI]

    Fulp, Errin W.

    , . . . Security research has been network oriented High-speed firewall company, GreatWall Systems Research is more, quarrying, and oil and gas extraction Petroleum and coal products manufacturing Mining Furniture related to bio-inspiration published in 2012. Of the top 10 universities, 5 were Chinese and 2 were

  18. Security systems engineering overview

    SciTech Connect (OSTI)

    Steele, B.J.

    1996-12-31

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

  19. Capturing and Documentation of Decisions in Security Requirements Engineering through Heuristics

    E-Print Network [OSTI]

    Paech, Barbara

    Introduction Security of software systems is critical to business be- cause detected security flaws tool for project and system knowledge in soft- ware development. Knowledge is modeled through EMF HeRA to detect security-related requirements through heuristics successfully. To doc- ument decisions

  20. Maximum Entry and Mandatory Separation Ages for Certain Security Employees

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-10-11

    The Policy in response to government-wide Office of Personnel Management regulations regarding establishment of mandatory retirement ages for employees in certain security related positions. Superseded by DOE P 310.1 Admin Chg 1, 12-1-11.

  1. National Security Consequences of U.S. Oil Dependency

    E-Print Network [OSTI]

    Deutch, John

    cfr National Security Consequences of U.S. Oil Dependency Report of an Independent Task Force Uncorrected Proofs #12;Founded in 1921, the Council on Foreign Relations is an independent, national

  2. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  3. NPS Institutional Review Board (IRB) Interim Guidance on Human Subjects Research Involving Surveys, Questionnaires, Interviews, and Focus Groups

    E-Print Network [OSTI]

    NPS Institutional Review Board (IRB) Interim Guidance on Human Subjects Research Involving Surveys only those data collection activities related to human subjects research. To ensure NPS by the IRB must balance the needs, responsibilities, and risks related to the research subjects, the student

  4. Unconditionally Secure Quantum Signatures

    E-Print Network [OSTI]

    Ryan Amiri; Erika Andersson

    2015-08-08

    Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols - signatures based on the Rivest-Adleman-Shamir (RSA) algorithm, the digital signature algorithm (DSA), and the elliptic curve digital signature algorithm (ECDSA) - are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally secure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  5. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopment Top Scientific Impact Since its SearchSecurity

  6. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345 UnlimitedSecure

  7. national security campus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReporteeo | National Nuclear Securityhr | Nationalnational security

  8. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorking With U.S. Coal StocksSuppliers Tag: Supplierssecurity Tag: security

  9. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLosThe 26thI D- 6 0 4 2 r m m m m port m fm f mphysical security |

  10. Cyber security analysis testbed : combining real, emulation, and simulation.

    SciTech Connect (OSTI)

    Villamarin, Charles H.; Eldridge, John M.; Van Leeuwen, Brian P.; Urias, Vincent E.

    2010-07-01

    Cyber security analysis tools are necessary to evaluate the security, reliability, and resilience of networked information systems against cyber attack. It is common practice in modern cyber security analysis to separately utilize real systems of computers, routers, switches, firewalls, computer emulations (e.g., virtual machines) and simulation models to analyze the interplay between cyber threats and safeguards. In contrast, Sandia National Laboratories has developed novel methods to combine these evaluation platforms into a hybrid testbed that combines real, emulated, and simulated components. The combination of real, emulated, and simulated components enables the analysis of security features and components of a networked information system. When performing cyber security analysis on a system of interest, it is critical to realistically represent the subject security components in high fidelity. In some experiments, the security component may be the actual hardware and software with all the surrounding components represented in simulation or with surrogate devices. Sandia National Laboratories has developed a cyber testbed that combines modeling and simulation capabilities with virtual machines and real devices to represent, in varying fidelity, secure networked information system architectures and devices. Using this capability, secure networked information system architectures can be represented in our testbed on a single, unified computing platform. This provides an 'experiment-in-a-box' capability. The result is rapidly-produced, large-scale, relatively low-cost, multi-fidelity representations of networked information systems. These representations enable analysts to quickly investigate cyber threats and test protection approaches and configurations.

  11. Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

    Office of Environmental Management (EM)

    4, Cyber Security Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2015 2015 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security...

  12. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  13. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  14. Securities Class Actions and Bankrupt Companies

    E-Print Network [OSTI]

    Park, James J.

    2014-01-01

    the utility of securities class actions. Certainly, contextthe merit of securities class actions. UCLA | SCHOOL OF LAWof James J. Park, Securities Class Actions and Bankrupt

  15. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  16. Review of digital image security in Dermatology

    E-Print Network [OSTI]

    Nielson, Colton; West, Cameron; Shimizu, Ikue

    2015-01-01

    encrypted communications, cloud security breaches, and phonebreaches in security demonstrate, such cloud storage ofand security rules 22 Audits of CSP data center operations and cloud

  17. Integrated Security System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems architecture Integrated...

  18. Data security on the national fusion grid

    E-Print Network [OSTI]

    Burruss, Justine R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  19. Security on the US Fusion Grid

    E-Print Network [OSTI]

    Burruss, Justin R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  20. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    CERT. (2010, Dec) Technical Cyber Security Alerts. [Online].a broad overview of cyber security incidents in the laststrategic war and viable cyber security solutions should be

  1. Mathematical and Statistical Opportunities in Cyber Security

    E-Print Network [OSTI]

    Meza, Juan

    2009-01-01

    development approach to cyber security. Report submitted to2007. Committee on Improving Cyber- security Research in theOpportunities in Cyber Security ? Juan Meza † Scott

  2. Security and United States Immigration Policy

    E-Print Network [OSTI]

    Totten, Robbie James

    2012-01-01

    2009 [1981]. American National Security, 6th ed. Baltimore,1977. Economic Issues and National Security. Lawrence, KS:Immigration and National Security. Westport, CT: Praeger

  3. Office of Security Assessments | Department of Energy

    Energy Savers [EERE]

    Security Assessments Office of Security Assessments MISSION The Office of Security Assessments is responsible for the independent evaluation of the effectiveness of safeguards and...

  4. April, 2007 TRT Interlock Compare Board

    E-Print Network [OSTI]

    Evans, Hal

    is a green LED which shows the board is receiving power. Just above the power connector is an 8 contact RJ45 exceeds the trip point threshold. On the right edge, about 1/3 of the way up is the power input. This should be con- nected to 8 volts coming from the PP2 bulk power supply. Just below the power con- nector

  5. NNMCAB Board Meeting Agendas | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURING OFFICESpecialAPPENDIX FOrigin ofAllen Lichvar FEof EnergyBoard Meeting Agendas

  6. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Broader source: Energy.gov (indexed) [DOE]

    A vulnerability was reported in Cisco Secure Access Control System. A remote user can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4,...

  7. AUDIT REPORT Security at the Nevada National Security Site

    Broader source: Energy.gov (indexed) [DOE]

    Security at the Nevada National Security Site OAS-L-15-06 May 2015 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections . Department of Energy...

  8. Security Requirements Engineering Support for Security-Annotated Business Processes

    E-Print Network [OSTI]

    Security Requirements Engineering Support for Security-Annotated Business Processes Elda Paja1 that business analysts are not secu- rity experts and assume that this will be bolted on later. Fortunately

  9. Technical Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-09-02

    This order implements the Department of Energy (DOE) Technical Security Program (TSP). This program represents the convergence of two distinct disciplines: Counterintelligence (CI) and Security Countermeasures. The elements of the TSP are driven by national level, interagency programs that are codified in various laws, Executive Orders, national polices and directives. Supersedes DOE M 470.4-4A Chg 1, dated 10-12-2010, Section D – Technical Surveillance Countermeasures (Official Use Only) and classified annex (Secret); and DOE M 205.1-3 (Official Use Only) and Part II (Secret), dated 4-17-2006.

  10. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD |UpdatedSecurity|National

  11. Global Material Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia NationalSecurityNuclear SecurityOfficesPrograms

  12. SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011

    E-Print Network [OSTI]

    SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011 Choose brands and models of mobile devices that have the options referenced below. Use all available security options that your or sensitive university information in un-approved off-campus services, such as public cloud based services

  13. Wireless Security: Secure and Public Networks Villanova University

    E-Print Network [OSTI]

    36 Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science kory.kirk@villanova.edu www.korykirk.com/ Abstract Due to the increasing amount of wireless, train stations and cafes, there is a need for a wireless protocol that allows public access to secure

  14. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  15. NISTIR 7497 Security Architecture Design

    E-Print Network [OSTI]

    NISTIR 7497 Security Architecture Design Process for Health Information Exchanges (HIEs) Matthew Scholl Kevin Stine Kenneth Lin Daniel Steinberg #12;NISTIR 7497 Security Architecture Design Process Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899 Kenneth Lin

  16. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  17. Safety in urban environment and emergency notice boards

    SciTech Connect (OSTI)

    Confortini, Claudia; Tira, Maurizio

    2008-07-08

    Reliable and safe urban system conditions have to be a crucial goal of ordinary planning activities. Among planning goals, priority must be given to indications relating to the safety levels to be achieved and to the amount of resources to be directed towards reducing the vulnerability of urban systems and therefore of the measures to be taken. Uban vulnerability cannot in fact be reduced to the sum of the vulnerability of single buildings or to the physical vulnerability of its various components. This research work consists of identifying those urban sub-areas that are important for safety in relation to natural risks, ambits that should be highlighted by means of permanent emergency notice boards/billboards. What are the hazard notices relating to all natural hazards and related risks? Where are they located? Are they clear and straightforward so that all residents and visitors are able to understand them, as it is already the case for road signs (or at least it should be)? What urban sub-areas are worth highlighting in relation to natural risks, acting for example as escape routes or meeting points? How is information for the public managed in order that people are immediately, easily and regularly notified? What is the relation of such signals to ordinary traffic signals? Research into the state of the art of permanent notice boards/billboards of this type, currently distinguished only by sporadic and local initiatives, aims at carrying out a census of and recognizing urban elements already considered as important for reducing the vulnerability of the urban system to different natural calamities and at providing new highlights as regards the identification of new ones. The next step is to work out a decision and common-language strategy for planning these elements and for their adequate signposting, so as to be able to live in the urban environment with awareness, safety and confidence, including with respect to more remote and therefore often neglected natural risks. The paper deals with literature in the field and shows the results of the few relevant case studies at work.

  18. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  19. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  20. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  1. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  2. Research Data Data Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    Research Data Data Security Survey Collection FAQs Q: I am not a UConn Health Center employee; can multiple projects that share common data? Yes. As long as the projects have common fields as you would in SurveyMonkey; data forms, e.g. Case Report Forms (CRF); or a combination of both. For any

  3. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  4. ARMY Energy Security Considerations

    E-Print Network [OSTI]

    energy waste in existing facilities; Increase energy efficiency in renovation and new constructionARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy · · · · FOREIGN OIL 2

  5. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  6. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  7. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    2011-01-01

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  8. Supporting Organizations | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the following three organizations: Measurement Science and Systems Engineering Division Nuclear Security and Isotope Technology Division Computational Sciences and Engineering...

  9. Protocol, Security Assistance- January 2007

    Broader source: Energy.gov [DOE]

    Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security.

  10. Critical Infrastructure and Cyber Security 

    E-Print Network [OSTI]

    Doll, Abby; Pirrong, Renee; Jennings, Matthew; Stasny, George; Giblin, Andy; Shaffer, Steph; Anderson, Aimee

    2011-01-01

    cyber security. They designated responsibility for cyber-security to the newly formed Department of Homeland Security, a duty that has continued to today 3. The group was tasked with creating a method of protecting the critical components.... 2010. 15 Mar. 2011. http://www.d tic.mil/doctrine/new_pubs/jp1_02.pdf 10 Comments on the Economic and Security Implications Of Recent Developments in the World Oil Market , 107th Cong. (2000) (testimony of Robert E. Ebel). http...

  11. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  12. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  13. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Victoria, University of

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  14. A deeper look at climate change and national security.

    SciTech Connect (OSTI)

    Baker, Arnold Barry; Backus, George A.; Romig, Alton Dale, Jr.

    2010-03-01

    Climate change is a long-term process that will trigger a range of multi-dimensional demographic, economic, geopolitical, and national security issues with many unknowns and significant uncertainties. At first glance, climate-change-related national security dimensions seem far removed from today's major national security threats. Yet climate change has already set in motion forces that will require U.S. attention and preparedness. The extent and uncertainty associated with these situations necessitate a move away from conventional security practices, toward a small but flexible portfolio of assets to maintain U.S. interests. Thoughtful action is required now if we are to acquire the capabilities, tools, systems, and institutions needed to meet U.S. national security requirements as they evolve with the emerging stresses and shifts of climate change.

  15. Mass and Elite Views on Nuclear Security: US National Security Surveys 1993-1999

    SciTech Connect (OSTI)

    HERRON,KERRY G.; JENKINS-SMITH,HANK C.; HUGHES,SCOTT D.

    2000-06-01

    This is the fourth report in an ongoing series of studies examining how US perspectives about nuclear security are evolving in the post-Cold War era. In Volume 1 the authors present findings from a nationwide telephone survey of randomly selected members of the US general public conducted from 13 September to 14 October 1999. Results are compared to findings from previous surveys in this series conducted in 1993, 1995, and 1997, and trends are analyzed. Key areas of investigation reported in Volume 1 include evolving perceptions of nuclear weapons risks and benefits, preferences for related policy and spending issues, and views about three emerging issue areas: deterrent utility of precision guided munitions; response options to attacks in which mass casualty weapons are used; and expectations about national missile defenses. In this volume they relate respondent beliefs about nuclear security to perceptions of nuclear risks and benefits and to policy preferences. They develop causal models to partially explain key preferences, and they employ cluster analysis to group respondents into four policy relevant clusters characterized by similar views and preferences about nuclear security within each cluster. Systematic links are found among respondent demographic characteristics, perceptions of nuclear risks and benefits, policy beliefs, and security policy and spending preferences. In Volume 2 they provide analysis of in-depth interviews with fifty members of the US security policy community.

  16. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  17. January 2005 INTEGRATING IT SECURITY

    E-Print Network [OSTI]

    in a cost- effective manner. The implementation of IT security and capital planning practices withinJanuary 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS released Special Publication (SP) 800-65, Inte grating IT Security into the Capital Planning and Investment

  18. Guidelines on Security and Privacy

    E-Print Network [OSTI]

    Guidelines on Security and Privacy in Public Cloud Computing WayneJansen TimothyGrance Special Publication 800-144 #12;ii NIST Special Publication 800-144 Guidelines on Security and Privacy in Public Cloud and Ramaswamy Chandramouli, also from NIST, provided input on cloud security in early drafts. Thanks also go

  19. Secretary Richardson Accepts Recommendations for Improving Security...

    National Nuclear Security Administration (NNSA)

    Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

  20. Waste Isolation Pilot Plant Transportation Security

    Office of Environmental Management (EM)

    Senior Management Operational Management Implementation OOB NTP Transportation Logistics OSO Operations Management Organization Security WIPP Security Conditions * TRU Waste...

  1. National Nuclear Security Administration Overview | Department...

    Office of Environmental Management (EM)

    Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National Transportation...

  2. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  3. Independent Oversight Review, National Nuclear Security Administration...

    Office of Environmental Management (EM)

    Nuclear Security Administration Production Office - February 2014 Independent Oversight Review, National Nuclear Security Administration Production Office - February 2014 February...

  4. Enhancing Transportation Energy Security through Advanced Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transportation Energy Security through Advanced Combustion and Fuels Technologies Enhancing Transportation Energy Security through Advanced Combustion and Fuels Technologies 2005...

  5. Implementing Effective Enterprise Security Governance Outline for Energy Sector Executives and Boards

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergy HeadquartersFuelBConservation Standards andEnergy IllinoisPostingDepartment

  6. Type A Accident Investigation Board Report on the April 3, 1995, Security

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeed forUnruhDepartment ofM I C H A ETwoIdentifyRappel

  7. SECURITY TECHNIQUES Chris J Mitchell1

    E-Print Network [OSTI]

    Mitchell, Chris

    SECURITY TECHNIQUES Chris J Mitchell1 Introduction In this paper we consider the range of security security has been exerted. However, the techniques described are of general applicability by a security technique; in doing so we will distinguish between security features and security techniques (or

  8. Security and Privacy in the Networked World

    E-Print Network [OSTI]

    Sandhu, Ravi

    -World Impact! Perennial State of Cyber Security Micro-security Macro-security #12; What is the value of being Cyber Security Conundrum #12;Cyber security as reconciliation of tradeoffs Finding Goldilocks Holistic1 Security and Privacy in the Networked World Prof. Ravi Sandhu Executive Director and Endowed

  9. The unreasonable ineffectiveness of security engineering

    E-Print Network [OSTI]

    Pavlovic, Dusko

    of security does not apply only to software, as we also speak of bank security, national security, secureThe unreasonable ineffectiveness of security engineering: An overview Dusko Pavlovic Kestrel" [32]. After several decades of security research, we are tempted to ask the opposite question: Are we

  10. IY5512: Part 2 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    ; ­ introduction to security evaluation criteria. Information Security Group Agenda · Design principles · DesignIY5512: Part 2 1 Information Security Group IY5512 Computer Security Part 2: Design & evaluation · This part of the course covers: ­ fundamental security design principles; ­ a security design methodology

  11. The UNIVERSITY of WESTERN ONTARIO BOARD OF GOVERNORS

    E-Print Network [OSTI]

    Lennard, William N.

    The UNIVERSITY of WESTERN ONTARIO BOARD OF GOVERNORS BY-LAW NO. 1 Ref: By-Law No. 1 Amended: 30JAN of Governors (hereinafter referred to as the Board) as set forth in The University of Western Ontario Act 1982 AND IT IS HEREBY ENACTED as a by-law of The Board of Governors of The University of Western Ontario as follows: A

  12. U.S. Nuclear Waste Technical Review Board

    E-Print Network [OSTI]

    U.S. Nuclear Waste Technical Review Board Report to The U.S. Congressand The Secretary of Energy March 1, 2006­December 31, 2007 #12;#12;U.S. Nuclear Waste Technical Review Board Report to The U in this report. #12;#12;#12;U.S. Nuclear Waste Technical Review Board B. John Garrick, Ph.D., P.E., Chairman

  13. Lansing Board of Water & Light- Hometown Energy Savers Commercial Rebates

    Broader source: Energy.gov [DOE]

    Franklin Energy Services and the Lansing Board of Water & Light (LBWL) partner together to offer the Hometown Energy Savers® Commercial and Industrial Energy Efficiency Rebate Program. Eligible...

  14. Air Pollution Control Board (Virginia) | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Quality The Air Division in the Department of Environmental Quality and the State Air Pollution Control Board work together to control present and future sources of air...

  15. California State Water Resources Control Board 401 Water Quality...

    Open Energy Info (EERE)

    California State Water Resources Control Board 401 Water Quality Certification Website Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: California State...

  16. Type B Accident Investigation Board Report on the October 8,...

    Energy Savers [EERE]

    Bettis Atomic Power Laboratory Type B Accident Investigation of the Arc Flash at Brookhaven National Laboratory, April 14, 2006 Type B Accident Investigation Board Report on...

  17. Type B Accident Investigation Board Report of the Brookhaven...

    Energy Savers [EERE]

    of the Brookhaven National Laboratory Employee Injury at Building 1005H on October 9, 2009 Type B Accident Investigation Board Report of the Brookhaven National Laboratory Employee...

  18. Type B Accident Investigation Board Report on the November 1...

    Energy Savers [EERE]

    Type B Accident Investigation Board Report on the November 1, 1999, Construction Injury at the Monticello Mill Tailings Remedial Action Site, Monticello, Utah Type B Accident...

  19. High-Level Waste Corporate Board Presentation Archive | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Triay High-Level Waste Corporate Board, Mark Gilbertson EM Engineering & Technology Roadmap and Major Technology Demonstrations Office of River Protection Idaho National...

  20. Type B Accident Investigation Board Report on the October 15...

    Energy Savers [EERE]

    15, 2001, Grout Injection Operator Injury at the Cold Test Pit South, Idaho National Engineering and Environmental Laboratory Type B Accident Investigation Board Report on the...

  1. Oak Ridge Site Specific Advisory Board Committees | Department...

    Office of Environmental Management (EM)

    year's structure includes the Executive Committee and three subcommittees-the Board Finance and Process, Environmental Management and Stewardship, and Public Outreach. We would...

  2. Brownsville Public Utilities Board- Green Living Residential Rebate Program

    Broader source: Energy.gov [DOE]

     Brownsville Public Utilities Board offers residential customers rebates for installation of energy efficient measures. Through the Green Living Rebate program, customers can apply for rebates for...

  3. Type B Accident Investigation Board Report on the October 15...

    Office of Environmental Management (EM)

    Type B Accident Investigation Board Report on the October 15, 2001, Grout Injection Operator Injury at the Cold Test Pit South, Idaho National Engineering and Environmental...

  4. U.S. NUCLEAR WASTE TECHNICAL REVIEW BOARD

    E-Print Network [OSTI]

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 I. Recommendation and Approval of the Yucca Mountain Site . . . . . . . . . . . . . . . . . . . 3 II. The Board's Input Into the Process for Recommending and Approving the Yucca Mountain Site

  5. Commonwealth of Virginia, State Air Pollution Control Board,...

    Energy Savers [EERE]

    Commonwealth of Virginia, State Air Pollution Control Board, Order by Concent Issued to Mirant Potomac River, LLC, Registration No. 70228 Commonwealth of Virginia, State Air...

  6. Oak Ridge Site Specific Advisory Board Meetings | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Meeting - January 2015 Discussion about the East Tennessee Technology Park Zone 1 Soils Proposed Plan December 1, 2014 ORSSAB Meeting - November 2014 Discussion of board...

  7. BOARD OF DIRECTORS UNIVERSITY OF CONNECTICUT HEALTH CENTER

    E-Print Network [OSTI]

    BOARD OF DIRECTORS OF THE UNIVERSITY OF CONNECTICUT HEALTH CENTER FINANCE CORPORATION June 30, 2014. REVIEW AND APPROVAL OF LEASES: CONNECTICUT CHILDREN'S MEDICAL CENTER* HARVEY AND LEWIS OPTICIANS

  8. Secretary of Energy Advisory Board Subcommittee Releases Shale...

    Energy Savers [EERE]

    Releases Shale Gas Recommendations Secretary of Energy Advisory Board Subcommittee Releases Shale Gas Recommendations August 11, 2011 - 8:54am Addthis WASHINGTON, D.C. - A diverse...

  9. Type B Accident Investigation Board Report of the Bechtel Jacobs...

    Office of Environmental Management (EM)

    Jacobs Company, LLC Employee Fall Injury on January 3, 2006, at the K-25 Building, East Tennessee Technology Park, Oak Ridge, Tennessee Type B Accident Investigation Board...

  10. Relativistic graphene ratchet on semidisk Galton board

    E-Print Network [OSTI]

    Leonardo Ermann; Dima L. Shepelyansky

    2010-11-17

    Using extensive Monte Carlo simulations we study numerically and analytically a photogalvanic effect, or ratchet, of directed electron transport induced by a microwave radiation on a semidisk Galton board of antidots in graphene. A comparison between usual two-dimensional electron gas (2DEG) and electrons in graphene shows that ratchet currents are comparable at very low temperatures. However, a large mean free path in graphene should allow to have a strong ratchet transport at room temperatures. Also in graphene the ratchet transport emerges even for unpolarized radiation. These properties open promising possibilities for room temperature graphene based sensitive photogalvanic detectors of microwave and terahertz radiation.

  11. Texas Water Development Board | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EA EISTJ Automation JumpSetIdaho: EnergyNatural ResourcesDevelopment Board

  12. Alternative Energy Development Board | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EAand DaltonSolarOpen5All HomeAlphakat GmbHNepal:Development Board Jump to:

  13. Montana State Land Board | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIXsourceII Jump to: navigation, searchsource History ViewMoe WindJump to:VistaLand Board

  14. Other Board Activities During 1998, the Board evaluated elements of the

    E-Print Network [OSTI]

    waste management program in addition to the site-characterization efforts at Yucca Mountain Upwelling at Yucca Mountain The Board completed its review of material (11 re- ports) first submitted that there is evidence of ongoing, intermittent hydrothermal upwelling at Yucca Mountain and that large earth- quake

  15. Standard for IT Security Roles and Responsibilities Version 1.0 Office of Information Technology University of Maryland College Park Page 1

    E-Print Network [OSTI]

    Yorke, James

    Standard for IT Security Roles and Responsibilities ­ Version 1.0 Office of Information Technology University of Maryland ­ College Park Page 1 Information Technology Standard Document Title: Standard The Board of Regents' Information Technology policy and Section 12-112 of the Education article

  16. COSC 472 Network Security Annie Lu 1 COSC 472 Network Security

    E-Print Network [OSTI]

    Lu, Enyue "Annie"

    Network Security Annie Lu Background · Information Security requirements have changed in recent times to protect data during transmission #12;COSC 472 Network Security Annie Lu 6 Security · Information Security Security Annie Lu Computer Security · the protection afforded to an automated information system in order

  17. The Cyber Security Crisis

    ScienceCinema (OSTI)

    Spafford, Eugene [Purdue University, West Lafayette, Indiana, United States

    2009-09-01

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  18. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  19. Security Administration Production Office,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345Secure

  20. Indirect Comprehensive Review Board (ICRB). Final Report

    SciTech Connect (OSTI)

    1996-12-01

    Lockheed Martin Idaho Technologies Company (LMITCO) used a systems engineering approach to take the first step toward defining a requirements baseline for all indirect work at the Idaho National Engineering Laboratory. The intent of this effort was to define the requirements for indirect work, identify the activities necessary to meet the requirements, and to produce defensible cost estimates for the work. The result of this effort is a scrubbed-down, defensible budget for all indirect work in FY 1997. Buying power for each dollar of direct work was increased by $.02. Recommendations are identified for improvements to this process in FY 1998. The purpose of this report is twofold. First is to report the final results of the 1996 ICRB process, and second is to document the process used such that incremental improvements may be made in future years. Objectives, processes, and approaches are described to provide a trail for future boards. Appendices contain copies of board composition, documentation of the process, as well as the actual training materials.

  1. Cooperative monitoring of regional security agreements

    SciTech Connect (OSTI)

    Pregenzer, A.L.; Vannoni, M.; Biringer, K.L. [Sandia National Labs., Albuquerque, NM (United States). Nonproliferation and Arms Control Analysis Dept.

    1996-11-01

    This paper argues that cooperative monitoring plays a critical role in the implementation of regional security agreements and confidence building measures. A framework for developing cooperative monitoring options is proposed and several possibilities for relating bilateral and regional monitoring systems to international monitoring systems are discussed. Three bilateral or regional agreements are analyzed briefly to illustrate different possibilities. These examples illustrate that the relationship of regional or bilateral arms control or security agreements to international agreements depends on a number of factors: the overlap of provisions between regional and international agreements; the degree of interest in a regional agreement among the international community; efficiency in implementing the agreement; and numerous political considerations. Given the importance of regional security to the international community, regions should be encouraged to develop their own infrastructure for implementing regional arms control and other security agreements. A regional infrastructure need not preclude participation in an international regime. On the contrary, establishing regional institutions for arms control and nonproliferation could result in more proactive participation of regional parties in developing solutions for regional and international problems, thereby strengthening existing and future international regimes. Possible first steps for strengthening regional infrastructures are identified and potential technical requirements are discussed.

  2. 2014 Headquarters Facilities Master Security Plan- Chapter 11, Incidents of Security Concern

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern Describes DOE Headquarters procedures for reporting, investigating, and correcting Incidents of Security Concern.

  3. NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security...

    National Nuclear Security Administration (NNSA)

    Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  4. Other Board Communications Letter from B. John Garrick to Robert R. Loux, Executive Director, Agency for Nuclear Projects,

    E-Print Network [OSTI]

    -time basis. In my case, I am a private consultant specializing in the appli- cation of the risk sciences of Energy's (DOE) efforts in implementing the Nuclear Waste Policy Act. The Board began its work in 1989 falsified documents related to work at the Yucca Mountain site. The second purpose identified

  5. Measurable Control System Security through Ideal Driven Technical Metrics

    SciTech Connect (OSTI)

    Miles McQueen; Wayne Boyer; Sean McBride; Marie Farrar; Zachary Tudor

    2008-01-01

    The Department of Homeland Security National Cyber Security Division supported development of a small set of security ideals as a framework to establish measurable control systems security. Based on these ideals, a draft set of proposed technical metrics was developed to allow control systems owner-operators to track improvements or degradations in their individual control systems security posture. The technical metrics development effort included review and evaluation of over thirty metrics-related documents. On the bases of complexity, ambiguity, or misleading and distorting effects the metrics identified during the reviews were determined to be weaker than necessary to aid defense against the myriad threats posed by cyber-terrorism to human safety, as well as to economic prosperity. Using the results of our metrics review and the set of security ideals as a starting point for metrics development, we identified thirteen potential technical metrics - with at least one metric supporting each ideal. Two case study applications of the ideals and thirteen metrics to control systems were then performed to establish potential difficulties in applying both the ideals and the metrics. The case studies resulted in no changes to the ideals, and only a few deletions and refinements to the thirteen potential metrics. This led to a final proposed set of ten core technical metrics. To further validate the security ideals, the modifications made to the original thirteen potential metrics, and the final proposed set of ten core metrics, seven separate control systems security assessments performed over the past three years were reviewed for findings and recommended mitigations. These findings and mitigations were then mapped to the security ideals and metrics to assess gaps in their coverage. The mappings indicated that there are no gaps in the security ideals and that the ten core technical metrics provide significant coverage of standard security issues with 87% coverage. Based on the two case studies and evaluation of the seven assessments, the security ideals demonstrated their value in guiding security thinking. Further, the final set of core technical metrics has been demonstrated to be both usable in the control system environment and provide significant coverage of standard security issues.

  6. The U.S. Nuclear Waste Technical Review Board Status Update ...

    Office of Environmental Management (EM)

    The U.S. Nuclear Waste Technical Review Board Status Update The U.S. Nuclear Waste Technical Review Board Status Update The U.S. Nuclear Waste Technical Review Board Status Update...

  7. The U.S. Nuclear Waste Technical Review Board Status Update

    Office of Environmental Management (EM)

    NWTRB www.nwtrb.gov U.S. Nuclear Waste Technical Review Board The U S Nuclear Waste Technical Review Board The U.S. Nuclear Waste Technical Review Board Status Update Presented to:...

  8. Study of On-Board Ammonia (NH3) Generation for SCR Operation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Study of On-Board Ammonia (NH3) Generation for SCR Operation Study of On-Board Ammonia (NH3) Generation for SCR Operation The feasibility of on-board ammonia generation was...

  9. Communication Between U.S. Nuclear Waste Technical Review Board

    E-Print Network [OSTI]

    Appendix E Appendix E Communication Between U.S. Nuclear Waste Technical Review Board and U of the U.S. Department of Energy's (DOE) Office of Civilian Radioactive Waste Management (OCRWM UNITED STATES NUCLEAR WASTE TECHNICAL REVIEW BOARD 2300 Clarendon Boulevard, Suite 1300 Arlington, VA

  10. Communication Between U.S. Nuclear Waste Technical Review Board

    E-Print Network [OSTI]

    Appendix E Appendix E Communication Between U.S. Nuclear Waste Technical Review Board and U of the U.S. Department of Energy's (DOE) Office of Civilian Radioactive Waste Management (OCRWM Document Manager, Yucca Mountain Site Characterization Office; July 2, 2001. Subject: Board comments on DOE

  11. U.S. NUCLEAR WASTE TECHNICAL REVIEW BOARD

    E-Print Network [OSTI]

    U.S. NUCLEAR WASTE TECHNICAL REVIEW BOARD The U.S. Congress And The Secretary of Energy Report.nwtrb.gov, the NWTRB Web site. #12;#12;#12;NUCLEAR WASTE TECHNICAL REVIEW BOARD Dr. Jared L. Cohon, Chairman Carnegie Management Assistant Linda L. Hiatt Management Assistant Victoria F. Reich Librarian vi NWTRB 1999 Report

  12. U.S. NUCLEAR WASTE TECHNICAL REVIEW BOARD

    E-Print Network [OSTI]

    U.S. NUCLEAR WASTE TECHNICAL REVIEW BOARD The U.S. Congress And The Secretary of Energy Report.nwtrb.gov, the NWTRB Web site. #12;#12;#12;NUCLEAR WASTE TECHNICAL REVIEW BOARD Dr. Jared L. Cohon, Chairman Carnegie Linda Coultry Staff Assistant Debra K. Hairston Management Assistant Linda L. Hiatt Management Assistant

  13. MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY

    E-Print Network [OSTI]

    Johnson, Eric E.

    MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY July 20, 2010 1. CALL TO ORDER The Board of Regents of New Mexico State University met in the Regents Room of the Educational Services Building, on the campus of New Mexico State University in Las Cruces, New Mexico, on Tuesday, July 20, 2010

  14. MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY

    E-Print Network [OSTI]

    Johnson, Eric E.

    MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY September 17, 2010 1. CALL TO ORDER The Board of Regents of New Mexico State University met in the Regents Room of the Educational Services Building, on the campus of New Mexico State University in Las Cruces, New Mexico, on Friday, September 17

  15. MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY

    E-Print Network [OSTI]

    Johnson, Eric E.

    MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY April 8, 2009 1. CALL TO ORDER The Board of Regents of New Mexico State University met in the Regents Room of the Educational Services Center on the main campus in Las Cruces, New Mexico, on Wednesday, April 8, 2009. Chair Curtis called

  16. MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY

    E-Print Network [OSTI]

    Johnson, Eric E.

    MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY July 15, 2008 1. CALL TO ORDER The Board of Regents of New Mexico State University met in the Mescalero Ballrooms E and F at the Inn of the Mountain Gods Resort and Casino in Mescalero, New Mexico, on Tuesday, July 15, 2008. Chair Gallagher

  17. MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY

    E-Print Network [OSTI]

    Johnson, Eric E.

    MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY October 30, 2008 1. CALL TO ORDER The Board of Regents of New Mexico State University met in the Regents Room of the Educational Services Center on the main campus in Las Cruces, New Mexico, on Thursday, October 30, 2008. Chair Gallagher

  18. MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY

    E-Print Network [OSTI]

    Johnson, Eric E.

    MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY May 7, 2010 1. CALL TO ORDER The Board of Regents of New Mexico State University met in the Regents Room of the Educational Services Building, on the main campus of New Mexico State University in Las Cruces, New Mexico, on Friday, May 7, 2010. Chair

  19. MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY

    E-Print Network [OSTI]

    Johnson, Eric E.

    MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY March 9, 2009 1. CALL TO ORDER The Board of Regents of New Mexico State University met in the Regents Room of the Educational Services Center on the main campus in Las Cruces, New Mexico, on Monday, March 9, 2009. Chair Curtis called

  20. MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY

    E-Print Network [OSTI]

    Johnson, Eric E.

    MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY July 29, 2009 1. CALL TO ORDER The Board of Regents of New Mexico State University met in the Regents Room of the Educational Services Center on the main campus in Las Cruces, New Mexico, on Wednesday, July 29, 2009. Chair Curtis called

  1. MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY

    E-Print Network [OSTI]

    Johnson, Eric E.

    MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY September 26, 2008 1. CALL TO ORDER The Board of Regents of New Mexico State University met in the Regents Room of the Educational Services Center on the main campus in Las Cruces, New Mexico, on Friday, September 26, 2008. Chair Gallagher

  2. MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY

    E-Print Network [OSTI]

    Johnson, Eric E.

    MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY June 26, 2008 Special Meeting 1. CALL TO ORDER The Board of Regents of New Mexico State University met in the Regents Room of the Educational Services Building, on the New Mexico State University main campus, Las Cruces, New Mexico. Chair

  3. MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY

    E-Print Network [OSTI]

    Johnson, Eric E.

    MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY December 10, 2010 1. CALL TO ORDER The Board of Regents of New Mexico State University met in the Regents Room of the Educational Services Building, on the campus of New Mexico State University in Las Cruces, New Mexico, on Friday, December 10

  4. MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY

    E-Print Network [OSTI]

    Johnson, Eric E.

    MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY October 22, 2009 1. CALL TO ORDER The Board of Regents of New Mexico State University met in the Regents Room of the Educational Services Building, on the main campus, in Las Cruces, New Mexico, on Thursday, October 22, 2009. Chair Curtis called

  5. MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY

    E-Print Network [OSTI]

    Johnson, Eric E.

    MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY March 14, 2011 1. CALL TO ORDER The Board of Regents of New Mexico State University met in the Regents Room the Educational Services Building on the main campus in Las Cruces, New Mexico, on Monday, March 14, 2011. Chair Pino called

  6. MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY

    E-Print Network [OSTI]

    Johnson, Eric E.

    MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY October 29, 2010 1. CALL TO ORDER The Board of Regents of New Mexico State University met in the Regents Room of the Educational Services Building, on the campus of New Mexico State University in Las Cruces, New Mexico, on Friday, October 29

  7. MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY

    E-Print Network [OSTI]

    Johnson, Eric E.

    MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY April 8, 2011 1. CALL TO ORDER The Board of Regents of New Mexico State University met in the Regents Room at the Educational Services Building on the main campus in Las Cruces, New Mexico, on Monday, April 8, 2011. Chair Conniff called

  8. MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY

    E-Print Network [OSTI]

    Johnson, Eric E.

    MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY May 6, 2011 1. CALL TO ORDER The Board of Regents of New Mexico State University met in the Regents Room at the Educational Services Building on the main campus in Las Cruces, New Mexico, on Friday, May 6, 2011. Chair Conniff called the meeting

  9. MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY

    E-Print Network [OSTI]

    Johnson, Eric E.

    MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY December 11, 2009 1. CALL TO ORDER The Board of Regents of New Mexico State University met in the Regents Room of the Educational Services Building, on the main campus, in Las Cruces, New Mexico, on Friday, December 11, 2009. Chair

  10. MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY

    E-Print Network [OSTI]

    Johnson, Eric E.

    MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY May 8, 2009 1. CALL TO ORDER The Board of Regents of New Mexico State University met in the Regents Room of the Educational Services Center on the main campus in Las Cruces, New Mexico, on Friday, May 8, 2009. Chair Curtis called the meeting to order

  11. MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY

    E-Print Network [OSTI]

    Johnson, Eric E.

    MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY May 20, 2008 1. CALL TO ORDER The Board of Regents of New Mexico State University met in the Hiram Hadley Conference Room (130) in Hadley Hall, on the New Mexico State University main campus, Las Cruces, New Mexico, on Tuesday, May 20, 2008. Chair

  12. MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY

    E-Print Network [OSTI]

    Johnson, Eric E.

    MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY March 8, 2010 1. CALL TO ORDER The Board of Regents of New Mexico State University met in the Regents Room of the Educational Services Building, on the main campus of New Mexico State University in Las Cruces, New Mexico, on Monday, March 8

  13. MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY

    E-Print Network [OSTI]

    Johnson, Eric E.

    MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY May 9, 2008 1. CALL TO ORDER The Board of Regents of New Mexico State University met in the Regents Room of the Educational Services Building, on the New Mexico State University main campus, Las Cruces, New Mexico, on Friday, May 9, 2008. Chair

  14. MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY

    E-Print Network [OSTI]

    Johnson, Eric E.

    MINUTES OF THE BOARD OF REGENTS NEW MEXICO STATE UNIVERSITY January 31, 2011 1. CALL TO ORDER The Board of Regents of New Mexico State University met in the Kiva C Room at the Hotel Santa Fe, in Santa Fe, New Mexico, on Monday, January 31, 2011. Chair Pino called the meeting to order at 10:10 a

  15. Design Advisory Board (2012-13 Charge/Membership)

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    Design Advisory Board (2012-13 Charge/Membership) The Design Advisory Board has responsibility for assisting the campus in the achievement of planning coherence and high design standards for the campus as a whole--building siting, building arrangement, building design, landscape (both natural and modified

  16. BOARD TEST SHEET HDI LINK CARD NO. DATE

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    BOARD TEST SHEET HDI LINK CARD NO. DATE: Changes on card as delivered from loading company at the rear edge of the board. Verify that all mounting screws are loaded. Crowbar Overvoltage Trip Test Test high limit. Use bench top power supply with test clips on ends of leads. Clip supply leads directly

  17. The Local Board of Health Environmental Health Primer

    E-Print Network [OSTI]

    The Local Board of Health Environmental Health Primer Epidemiology Factsheet environmental health,case-control,andcohortstudiesandare designedtotesthypothesesregardingthefactorsthatcauseadisease. Board of Health Actions · EncourageenvironmentalhealthpersonneltobecomefamiliarwiththesystemsDefenseScorecards.Availableatwww.scorecard.org · Friis,R.(2007).EnvironmentalEpidemiology.InEssentials of Environmental Health. · NationalAssociationofLocalBoardsofHealth

  18. Independent Scientific Advisory Board: Member Resume David P. Philipp

    E-Print Network [OSTI]

    Independent Scientific Advisory Board: Member Resume David P. Philipp Appointed to Board: 1999. Claussen, and D. P. Philipp. Effect of population size structure on reproductive investment of male bluegill. North American Journal of Fisheries Management 17: 516-524. 1997 Philipp, D. P., C. A. Toline, D

  19. The UNIVERSITY of WESTERN ONTARIO BOARD OF GOVERNORS

    E-Print Network [OSTI]

    Lennard, William N.

    The UNIVERSITY of WESTERN ONTARIO BOARD OF GOVERNORS BY-LAW NO. 2 Ref: By-Law No. 1 Enacted: 28JAN to as the "Board") of The University of Western Ontario (hereinafter referred to as the "University") in the exercise of their powers as set forth in The University of Western Ontario Act, 1982, as amended

  20. U.S. NUCLEAR WASTE TECHNICAL REVIEW BOARD

    E-Print Network [OSTI]

    U.S. NUCLEAR WASTE TECHNICAL REVIEW BOARD Report to January 1, 2001, to January 31, 2002 The U All NWTRB reports are available at www.nwtrb.gov, the NWTRB Web site. #12;#12;#12;NUCLEAR WASTE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Appendices Appendix A U.S. Nuclear Waste Technical Review Board Members