Sample records for relations board securities

  1. FAPAC-NM Executive Board | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTubahq.na.gov Office ofDepartment ofr EEONuclear SecurityEstablished

  2. CHINA-AFRICA RELATIONS GOVERNANCE, PEACE AND SECURITY

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    CHINA-AFRICA RELATIONS GOVERNANCE, PEACE AND SECURITY Editors Mulugeta Gebrehiwot Berhe and Liu Hongwu #12;CHINA-AFRICA RELATIONS GOVERNANCE, PEACE AND SECURITY Editors Mulugeta Gebrehiwot Berhe of China China's Evolving Policy towards Peace and Security in Africa: Constructing a new paradigm

  3. Securities Law Issues Relating to Community Solar Projects

    Broader source: Energy.gov [DOE]

    The law firm Stoel Rives has analyzed the issues related to Securities Law and Community Solar both in the context of Washington state law and federal law.

  4. The relation between Brazilian and Chicago Board of Trade soybean prices: a time series test

    E-Print Network [OSTI]

    Melcher, Bruno

    1991-01-01T23:59:59.000Z

    THE RELATION BETWEEN BRAZILIAN AND CHICAGO BOARD OF TRADE SOYBEAN PRICES ? A TIME SERIES TEST A Thesis BRUNO MELCHER Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements... for the degree of MASTER OF SCIENCE May 1991 Major Subject: Agricultural Economics THE RELATION BETWEEN BRAZILIAN AND CHICAGO BOARD OF TRADE SOYBEAN PRICES ? A TIME SERIES TEST A Thesis by BRUNO MELCHER Approved as to style and content by: ' f J David...

  5. Related Links | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City,Enriched UraniumPhysical Security Systems(PA)About| |About Us /

  6. Related Links | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City,Enriched UraniumPhysical Security Systems(PA)About| |About Us /Los

  7. Related Links | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    About Us Our Programs Defense Programs Future Science & Technology Programs Advanced Simulation and Computing and Institutional R&D Programs Related Links Related Links...

  8. Security of supply secured by market forces: Different stages and welfare prospects in relation to Danish and

    E-Print Network [OSTI]

    Security of supply secured by market forces: Different stages and welfare prospects in relation Security of supply in electricity markets has been seen as a critical test for the functioning describes the possible steps and some necessary conditions for establishing markets for security of supply

  9. Interconnection arrangement of routers of processor boards in array of cabinets supporting secure physical partition

    DOE Patents [OSTI]

    Tomkins, James L. (Albuquerque, NM); Camp, William J. (Albuquerque, NM)

    2007-07-17T23:59:59.000Z

    A multiple processor computing apparatus includes a physical interconnect structure that is flexibly configurable to support selective segregation of classified and unclassified users. The physical interconnect structure includes routers in service or compute processor boards distributed in an array of cabinets connected in series on each board and to respective routers in neighboring row cabinet boards with the routers in series connection coupled to routers in series connection in respective neighboring column cabinet boards. The array can include disconnect cabinets or respective routers in all boards in each cabinet connected in a toroid. The computing apparatus can include an emulator which permits applications from the same job to be launched on processors that use different operating systems.

  10. Related Sites | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection Technical s o Freiberg andReindustrializationLivermore FieldRelated

  11. Annual report to Congress: Department of Energy activities relating to the Defense Nuclear Facilities Safety Board, Calendar Year 1999

    SciTech Connect (OSTI)

    None

    2000-02-01T23:59:59.000Z

    This is the tenth Annual Report to the Congress describing Department of Energy activities in response to formal recommendations and other interactions with the Defense Nuclear Facilities Safety Board (Board). The Board, an independent executive-branch agency established in 1988, provides advice and recommendations to the Secretary of Energy regarding public health and safety issues at the Department's defense nuclear facilities. The Board also reviews and evaluates the content and implementation of health and safety standards, as well as other requirements, relating to the design, construction, operation, and decommissioning of the Department's defense nuclear facilities. During 1999, Departmental activities resulted in the closure of nine Board recommendations. In addition, the Department has completed all implementation plan milestones associated with three Board recommendations. One new Board recommendation was received and accepted by the Department in 1999, and a new implementation plan is being developed to address this recommendation. The Department has also made significant progress with a number of broad-based initiatives to improve safety. These include expanded implementation of integrated safety management at field sites, opening of a repository for long-term storage of transuranic wastes, and continued progress on stabilizing excess nuclear materials to achieve significant risk reduction.

  12. Annual report to Congress: Department of Energy activities relating to the Defense Nuclear Facilities Safety Board, calendar year 1998

    SciTech Connect (OSTI)

    NONE

    1999-02-01T23:59:59.000Z

    This is the ninth Annual Report to the Congress describing Department of Energy (Department) activities in response to formal recommendations and other interactions with the Defense Nuclear Facilities Safety Board (Board). The Board, an independent executive-branch agency established in 1988, provides advice and recommendations to the Secretary of energy regarding public health and safety issues at the Department`s defense nuclear facilities. The Board also reviews and evaluates the content and implementation of health and safety standards, as well as other requirements, relating to the design, construction, operation, and decommissioning of the Department`s defense nuclear facilities. The locations of the major Department facilities are provided. During 1998, Departmental activities resulted in the proposed closure of one Board recommendation. In addition, the Department has completed all implementation plan milestones associated with four other Board recommendations. Two new Board recommendations were received and accepted by the Department in 1998, and two new implementation plans are being developed to address these recommendations. The Department has also made significant progress with a number of broad-based initiatives to improve safety. These include expanded implementation of integrated safety management at field sites, a renewed effort to increase the technical capabilities of the federal workforce, and a revised plan for stabilizing excess nuclear materials to achieve significant risk reduction.

  13. Confidential and Privileged: The President's Foreign Intelligence Advisory Board - Learning Lessons from Its Past to Shape Its Future 

    E-Print Network [OSTI]

    2006-01-01T23:59:59.000Z

    central role in advising the president and the intelligence community on crucial issues of substance or procedure and has made a significant contribution to the country’s national security. In other instances, the Board has been ignored and treated... Library Archives (Thomas J. Killian Papers), National Security Archives (George Washington University), and Boston University (Leo Cherne Papers) and found much additional material relating to the Board’s activities. Finally, former PFIAB members have...

  14. Secretary of Energy Advisory Board

    Broader source: Energy.gov [DOE]

    The Board will provide advice and recommendations to the Secretary of Energy on the Department's basic and applied research and development activities, economic and national security policy,...

  15. Annual Report To Congress. Department of Energy Activities Relating to the Defense Nuclear Facilities Safety Board, Calendar Year 2003

    SciTech Connect (OSTI)

    none,

    2004-02-28T23:59:59.000Z

    The Department of Energy (Department) submits an Annual Report to Congress each year detailing the Department’s activities relating to the Defense Nuclear Facilities Safety Board (Board), which provides advice and recommendations to the Secretary of Energy (Secretary) regarding public health and safety issues at the Department’s defense nuclear facilities. In 2003, the Department continued ongoing activities to resolve issues identified by the Board in formal recommendations and correspondence, staff issue reports pertaining to Department facilities, and public meetings and briefings. Additionally, the Department is implementing several key safety initiatives to address and prevent safety issues: safety culture and review of the Columbia accident investigation; risk reduction through stabilization of excess nuclear materials; the Facility Representative Program; independent oversight and performance assurance; the Federal Technical Capability Program (FTCP); executive safety initiatives; and quality assurance activities. The following summarizes the key activities addressed in this Annual Report.

  16. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  17. New Employee On-Boarding & Existing Employee Orientation for IT Why is IT Security important at CUNY?

    E-Print Network [OSTI]

    Brinkmann, Peter

    devices (e.g., portable hard drives, memory) or send or request to be sent such personal information be reputable custodians and are required by law to protect the privacy of personal data belonging to our are prompted for personal information such as passwords, social security number, bank account number or credit

  18. Freedom of Information Act Related Sites | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City, Arizona,Site OperationsAboutEnergyAdministration Related

  19. Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for

    E-Print Network [OSTI]

    Hazas, Mike

    to connect their personal devices with devices encountered in their environment in order to take advantage the interaction of their personal device with the intended target device. They must be able to ascertainSecurity by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous

  20. Type A Accident Investigation Board Report on the April 3, 1995...

    Broader source: Energy.gov (indexed) [DOE]

    top of the Savannah River Site (SRS) Advanced Tactical Training Academy Security Rappel Tower. Type A Accident Investigation Board Report on the April 3, 1995, Security Rappel...

  1. Annual report to Congress. Department of Energy activities relating to the Defense Nuclear Facilities Safety Board, calendar year 2000

    SciTech Connect (OSTI)

    None

    2001-03-01T23:59:59.000Z

    This Annual Report to the Congress describes the Department of Energy's activities in response to formal recommendations and other interactions with the Defense Nuclear Facilities Safety Board. During 2000, the Department completed its implementation and proposed closure of one Board recommendation and completed all implementation plan milestones associated with two additional Board recommendations. Also in 2000, the Department formally accepted two new Board recommendations and developed implementation plans in response to those recommendations. The Department also made significant progress with a number of broad-based safety initiatives. These include initial implementation of integrated safety management at field sites and within headquarters program offices, issuance of a nuclear safety rule, and continued progress on stabilizing excess nuclear materials to achieve significant risk reduction.

  2. Sandia National Laboratories: New Jersey Board of Public Utilities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Jersey Board of Public Utilities New Jersey Transit FutureGrid MOU Signing On October 4, 2013, in Analysis, Energy Surety, Infrastructure Security, Microgrid, Modeling, Modeling &...

  3. Independent Oversight Activity Report, Nevada National Security...

    Broader source: Energy.gov (indexed) [DOE]

    to observe the Nevada National Security Site Field Office presentations for the Defense Nuclear Facilities Safety Board annual visit. The presentations included briefings on...

  4. Board of Graduate Studies 4 Mill Lane

    E-Print Network [OSTI]

    Zernicka-Goetz, Magdalena

    for prospective students. The Board agreed that a co-ordinated strategy was required both in relation to the two MPhil in Energy Technologies (Paper 4024) The Board approved the introduction of the new MPhil Cambridge 152 3550 External Examiners and employment checks (Paper 4025) The Board was concerned by the UK

  5. SecSens -Security Architecture for Wireless Sensor Networks Faruk Bagci, Theo Ungerer

    E-Print Network [OSTI]

    Ungerer, Theo

    of sensor boards. Keywords: wireless sensor network, security architec- ture, energy efficiency, multi between nodes enhances communication flexibility. Generally, sensor nodes have limited energy and re not be transferred to sensor networks. In recent years, the research was mainly focused on issues related to energy

  6. T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID

    Broader source: Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

  7. The role of a security strategy is to align company security and business goals, provide

    E-Print Network [OSTI]

    Fisher, Kathleen

    , and methodologies to assist you in building a complete unified information security program or individual elements's information security program meets its requirements across the board, it is vital to have one enterprise security strategy and one information security framework. Putting in a solid foundational program

  8. School Land Board (Texas)

    Broader source: Energy.gov [DOE]

    The School Land Board oversees the use of land owned by the state or held in trust for use and benefit by the state or one of its departments, boards, or agencies. The Board is responsible for...

  9. Ocean Studies Board annual report 1990

    SciTech Connect (OSTI)

    Not Available

    1991-12-31T23:59:59.000Z

    Activities of the Ocean Studies Board fall into three broad categories: promoting the health of ocean sciences in the United States, encouraging the protection and wise use of the ocean and its resources, and applying ocean science to improve national security.

  10. Ocean Studies Board annual report 1990

    SciTech Connect (OSTI)

    Not Available

    1991-01-01T23:59:59.000Z

    Activities of the Ocean Studies Board fall into three broad categories: promoting the health of ocean sciences in the United States, encouraging the protection and wise use of the ocean and its resources, and applying ocean science to improve national security.

  11. Improved Formulations for Air-Surface Exchanges Related to National Security Needs: Dry Deposition Models

    SciTech Connect (OSTI)

    Droppo, James G.

    2006-07-01T23:59:59.000Z

    The Department of Homeland Security and others rely on results from atmospheric dispersion models for threat evaluation, event management, and post-event analyses. The ability to simulate dry deposition rates is a crucial part of our emergency preparedness capabilities. Deposited materials pose potential hazards from radioactive shine, inhalation, and ingestion pathways. A reliable characterization of these potential exposures is critical for management and mitigation of these hazards. A review of the current status of dry deposition formulations used in these atmospheric dispersion models was conducted. The formulations for dry deposition of particulate materials from am event such as a radiological attack involving a Radiological Detonation Device (RDD) is considered. The results of this effort are applicable to current emergency preparedness capabilities such as are deployed in the Interagency Modeling and Atmospheric Assessment Center (IMAAC), other similar national/regional emergency response systems, and standalone emergency response models. The review concludes that dry deposition formulations need to consider the full range of particle sizes including: 1) the accumulation mode range (0.1 to 1 micron diameter) and its minimum in deposition velocity, 2) smaller particles (less than .01 micron diameter) deposited mainly by molecular diffusion, 3) 10 to 50 micron diameter particles deposited mainly by impaction and gravitational settling, and 4) larger particles (greater than 100 micron diameter) deposited mainly by gravitational settling. The effects of the local turbulence intensity, particle characteristics, and surface element properties must also be addressed in the formulations. Specific areas for improvements in the dry deposition formulations are 1) capability of simulating near-field dry deposition patterns, 2) capability of addressing the full range of potential particle properties, 3) incorporation of particle surface retention/rebound processes, and. 4) development of dry deposition formulations applicable to urban areas. Also to improve dry deposition modeling capabilities, atmospheric dispersion models in which the dry deposition formulations are imbedded need better source-term plume initialization and improved in-plume treatment of particle growth processes. Dry deposition formulations used in current models are largely inapplicable to the complex urban environment. An improved capability is urgently needed to provide surface-specific information to assess local exposure hazard levels in both urban and non-urban areas on roads, buildings, crops, rivers, etc. A model improvement plan is developed with a near-term and far-term component. Despite some conceptual limitations, the current formulations for particle deposition based on a resistance approach have proven to provide reasonable dry deposition simulations. For many models with inadequate dry deposition formulations, adding or improving a resistance approach will be the desirable near-term update. Resistance models however are inapplicable aerodynamically very rough surfaces such as urban areas. In the longer term an improved parameterization of dry deposition needs to be developed that will be applicable to all surfaces, and in particular urban surfaces.

  12. Fraudulent or Scam Job Postings Familiarizing yourself with the following security-related tips and resources will help you evaluate job postings.

    E-Print Network [OSTI]

    Kaminsky, Werner

    Fraudulent or Scam Job Postings Familiarizing yourself with the following security-related tips and resources will help you evaluate job postings. Look for warning signs: - You must provide your credit card, Home-based Assembly Jobs, Online Surveys. - The posting neglects to mention what the responsibilities

  13. IEAB Independent Economic Analysis Board

    E-Print Network [OSTI]

    IEAB Independent Economic Analysis Board Kenneth L. Casavant, Chair Roger Mann, Vice-Chair Joel R Application of the IEAB's Recommendations and Guidance for Economic Analysis in Subbasin Planning improvements related to economic content of the draft Clearwater Subbasin Management Plan (the draft Clearwater

  14. Senior Leadership Board of Regents

    E-Print Network [OSTI]

    Amin, S. Massoud

    Senior Leadership Board of Regents Associate VP Internal Audits Gail Klatt ADMINISTRATION General to the President, Government & Community Relations Jason Rohloff University of Minnesota Leadership VP Office Athletics Norwood Teague was appointed director of Intercollegiate Athletics in 2012 and oversees leadership

  15. ORSSAB monthly board meeting

    Broader source: Energy.gov [DOE]

    The ORSSAB monthly board meeting is open to the public. The board will receive an update on the Community Reuse Organization of East Tennessee efforts at the East Tennessee Technology Park.

  16. US DOE Perspectives on Advisory Board Effectiveness - 13539

    SciTech Connect (OSTI)

    Adler, David [US DOE (United States)] [US DOE (United States)

    2013-07-01T23:59:59.000Z

    Federal missions on the Oak Ridge Reservation began with the Manhattan Project, and continues today with major facilities supporting the Nation's Science and National Security missions. While most of the land area on the Oak Ridge Reservation is free of environmental impacts from these activities, significant legacy contamination is associated with specific facilities and past waste management areas. In 1989, the Oak Ridge Reservation (ORR) was placed on National Priorities List, and DOE established its Office of Environmental Management that same year. Three years later, in 1992, the Federal Facility Agreement for the reservation was signed. Three years afterward, the Oak Ridge Site Specific Advisory Board was established to augment ongoing public involvement activities related to Oak Ridge Reservation cleanup activities. One of the early and most impactful decisions the board made was to organize the End Use Working Group. This broad-based group of board members, DOE representatives, and members of the public was formed in 1997 to study future uses for contaminated areas of the reservation. The group was instrumental in building consensus in the Oak Ridge community regarding the long-term end state of reservation lands. The group's recommendations were a fundamental input into Record's of Decision subsequently developed to establish cleanup requirements across the ORR, and they continue to influence decisions being made today. In developing its recommendations on end states, the End Use Working Group came to the realization that long-term stewardship of contaminated areas of the reservation would be necessary, in some cases in perpetuity. It was from this concept that the Oak Ridge SSAB's 15-year involvement in stewardship would begin. A stewardship committee formed by the End Use Working Group wrote Volume 1 of the Stakeholder Report on Stewardship. This document-and its companion Volume 2, which was written a year later-form a crucial foundation for stewardship planning in Oak Ridge and have been referenced around the DOE complex as other sites consider stewardship planning. From these two broad-based initiatives, the board's focus has evolved to increasingly hone in on more specific, project-based recommendations and initiatives. The Oak Ridge Reservation Site Specific Advisory Board has been a highly effective forum for soliciting community input on Oak Ridge Reservation cleanup. Experience in Oak Ridge indicates that the utility of Board recommendations is far higher when the Board is asked to focus on broad programmatic issues, and less useful when the Board attempts to provide advice and recommendations on matters related to technical or project management issues. In Oak Ridge the Board has helped shape the program on many levels including definition of end-state cleanup objectives, budget development, program sequencing, waste management, and decisions concerning preservation of history related to missions implemented on the Oak Ridge Reservation. (authors)

  17. Advisory Board

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting the TWP TWP RelatedCellulase C. bescii CelA, a highly active and200 -

  18. National Nuclear Security Administration

    Broader source: Energy.gov (indexed) [DOE]

    and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area...

  19. March 24, 2008 Databases: Security 1 Database Security and Authorization

    E-Print Network [OSTI]

    Adam, Salah

    to control login process by the DBMS Inference control The countermeasures to statistical database security database #12;March 24, 2008 Databases: Security 3 Chapter Outline Introduction Access Control Methods Policy System-related Security levels and categories Security Threats Loss of integrity Loss

  20. Security, Safety and Health

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring

  1. ORSSAB Monthly Board Meeting

    Broader source: Energy.gov [DOE]

    The ORSSAB Monthly Board meeting is open to the public. This month, participants will be briefed on the East Tennessee Technology Park Zone 1 Soils Proposed Plan.

  2. ORSSAB monthly board meeting

    Broader source: Energy.gov [DOE]

    The ORSSAB monthly board meeting is open to the public. This month, participants will receive an update on the U-233 Project.

  3. ORSSAB monthly board meeting

    Broader source: Energy.gov [DOE]

    Board members and participants will hear a presentation and updates about "Sufficient Waste Disposal Capacity on the Oak Ridge Reservation." The meeting is open to the public.

  4. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2014-10-15T23:59:59.000Z

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  5. Quality Assurance Corporate Board | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Assurance Corporate Board Quality Assurance Corporate Board The Office of Environmental Management (EM) Quality Assurance Corporate Board is an executive board that includes both...

  6. Appendix 4. Board Member Compensation PA State Board

    E-Print Network [OSTI]

    Sibille, Etienne

    Agricultural Advisory Board 1 Agricultural Land Preservation Board, State 1 Agricultural Lands Condemnation for Water and Wastewater Systems and Operators, State Board for 1 Certified Real Estate Appraisers, State

  7. Civil Defence: The Civil Defence (North of Scotland Hydro-Electric Board) Regulations, 1954 

    E-Print Network [OSTI]

    Stuart, James

    1954-04-02T23:59:59.000Z

    These regulations, made under section six of the Civil Defence Act, 1948, empower the Secretary of State to make grants to the North of Scotland Board towards approved expenses incurred in securing the due functioning of ...

  8. CHRPR Neutron Board Replacement Manual

    SciTech Connect (OSTI)

    Erikson, Rebecca L.; Myjak, Mitchell J.

    2013-03-31T23:59:59.000Z

    This document will walk through the steps to exchange the neutron channel boards with gamma channel boards in the CHRPR box.

  9. Cyber Security

    Energy Savers [EERE]

    Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Michael Maraya Incident Management Division (IM-32) Rob Ciochon Director Policy,...

  10. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  11. ORSSAB monthly board meeting

    Broader source: Energy.gov [DOE]

    Board members and participants will hear a presentation and updates about the "Y-12 Mercury Cleanup Strategy and Plan for a Y-12 Water Treatment Plant." The meeting is open to the public.

  12. ORSSAB monthly board meeting

    Broader source: Energy.gov [DOE]

    Board members and participants will hear a presentation and updates about the "Selection of a Remediation Strategy for Trench 13 in Melton Valley." The meeting is open to the public.

  13. Alister John Miskimmon, University of Birmingham. RECASTING THE SECURITY BARGAINS: GERMANY, EUROPEAN SECURITY

    E-Print Network [OSTI]

    Sheldon, Nathan D.

    Alister John Miskimmon, University of Birmingham. RECASTING THE SECURITY BARGAINS: GERMANY recent developments in European Union (EU) security policy and their implications for Germany's bilateral of a greater EU security capability has significantly affected Germany's bilateral relations with the USA

  14. Simulated Interdiction: Proliferation Security Initiative

    E-Print Network [OSTI]

    2009-01-01T23:59:59.000Z

    ………………………………... Technical Capabilities to Support PSI ………………………………… Foreign Policy and External Relations ………………………............... Republic of Bevostan ………………………………………………………….. Geography ……………………………………………………………... iii 1 3 4 5 6 7 8 8 8 8 8 9 9 10... Security, Science and Policy Institute (NSSPI) Texas A&M University May 6, 2009 Simulated Interdiction: The Proliferation Security Initiative (PSI) Acknowledgements The National Nuclear Security Administration (NNSA) of the U.S. Department...

  15. Securing Control Systems Modems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory Board FollowSectionSecuring

  16. Security Clearances; Limitations

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring WLANsMay 22, 2014SEC.

  17. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  18. U.S. Nuclear Waste Technical Review Board Correspondence with

    E-Print Network [OSTI]

    and the DOE's thermal-management strategy could result in excessive handling of spent-fuel assemblies as fuel system. The Board is concerned that assumptions related to receipt of spent fuel from utilitiesAppendix E Appendix E U.S. Nuclear Waste Technical Review Board Correspondence with U

  19. Local Trip Out Logic Board Out

    E-Print Network [OSTI]

    Evans, Hal

    Board to Logic Board Cables ethernet style cables 1 per comparator board run these USA15toUX15 (~100m

  20. Environmental Management Advisory Board Members | Department...

    Energy Savers [EERE]

    Member Read Bio David W. Swindle, Jr. EMAB Board Member Read Bio Robert J. Thompson EMAB Board Member Read Bio Lenn Vincent EMAB Board Member Read Bio Waste...

  1. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  2. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring WLANs usingSecuring

  3. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring WLANs usingSecuringMarch

  4. DOE's Environmental Management Site-Specific Advisory Board: The Roles, Work, and Assessment of the Constituent Local Boards - 13587

    SciTech Connect (OSTI)

    Alexander, Catherine [U.S. Dept. of Energy, Office of Environmental Management, Office of Intergovernmental and Community Activities, 1000 Independence Avenue, S.W.,Washington, D.C. 20585 (United States)] [U.S. Dept. of Energy, Office of Environmental Management, Office of Intergovernmental and Community Activities, 1000 Independence Avenue, S.W.,Washington, D.C. 20585 (United States); Freeman, Jenny [Strata-G, LLC, 2027 Castaic Lane, Knoxville, TN 37932 (United States)] [Strata-G, LLC, 2027 Castaic Lane, Knoxville, TN 37932 (United States); Cantrell, Yvette [Restoration Services, Inc., 136 Mitchell Road, Oak Ridge, TN 37830 (United States)] [Restoration Services, Inc., 136 Mitchell Road, Oak Ridge, TN 37830 (United States)

    2013-07-01T23:59:59.000Z

    The charter for the Department of Energy's Environmental Management (EM) Site-Specific Advisory Board (SSAB) was approved under the Federal Advisory Committee Act (FACA) in 1994. With a unique mandate to provide public input on issues associated with the cleanup of nuclear legacy sites in the U.S., the EM SSAB comprises eight local boards, which are based at major EM sites. While each board is unique to the community in which it is located and reflects the diversity of the local population, the boards are governed by FACA, related regulations, and DOE policies that are intended to standardize agency advisory board operations. The EM SSAB local boards are made up of a diverse group of citizens who want to understand the mission and goals of the EM program and to help EM achieve those goals for the benefit of their communities. Some are quite passionate about their mission; others need to be coaxed into active participation. Maintaining productive relationships and a supportive environment for effective board operations is the challenge of board management for DOE EM and the board members themselves. DOE draws on research findings and best practices literature from academics and practitioners in the field of public involvement in its board management practices. The EM SSAB is also evaluated annually under the law to ensure that the investment of taxpayer dollars in the board is warranted in light of the contributions of the board. Further evaluation takes place at the agency and site levels in order to identify what aspects of board functioning the agency and board members find important to its success and to address areas where improvement is needed. Board contributions, compliance factors, and measurable outcomes related to board products and process areas are key to agency commitment to ongoing support of the boards and to participant satisfaction and thus continued member involvement. In addition to evaluation of these factors in improving board effectiveness, the agency draws on the experience of members to create best practices for the EM SSAB, as a unique form of public involvement. Four areas that have been identified by local board Chairpersons as important to their local board operations are - Enhancing communication between technical and non-technical board members; - Building on common ground toward recommendations; - Public involvement in EM SSAB local board activities; - The EM SSAB annual work plan process. The first three areas are addressed below by current or former chairpersons of the EM SSAB: Ralph Phelps, former Chairperson of the Northern New Mexico Citizens' Advisory Board; Susan Leckband, former Chairperson and current Vice Chairperson of the Hanford Advisory Board; and Val Francis, Vice Chairperson of the Portsmouth (PORTS) SSAB. In addition, Eric Roberts, facilitator of the PORTS SSAB, has contributed to the section on public involvement. In a separate paper for this session, Ralph Young, Chairperson of the Paducah Citizens' Advisory Board addresses the EM SSAB annual work plan process. (authors)

  5. BOARD OF TRUSTEES MINUTES February 9, 2010

    E-Print Network [OSTI]

    Tipple, Brett

    Advancement Ann Floor Public Relations Specialist, Marketing & Communications James E. Graves Dean, College Taylor Randall Dean, David Eccles School of Business Rebecca M. Riley Executive Assistant, Board, University of Utah OTHERS Mark Bouchard Chair of the Education Committee, Salt Lake Chamber of Commerce Corey

  6. Secretary of Energy Advisory Board

    Office of Environmental Management (EM)

    Secretary of Energy Advisory Board Follow Up Response from the Task Force on High Performance Computing November 30, 2014 On August 18, 2014, the Secretary of Energy Advisory Board...

  7. Confidential and Privileged: The President's Foreign Intelligence Advisory Board - Learning Lessons from Its Past to Shape Its Future

    E-Print Network [OSTI]

    2006-01-01T23:59:59.000Z

    ’s Foreign Intelligence Advisory Board: A Special Investigative Panel, Science at its Best, Security at its Worst: A Report on Security Problems at the U.S. Department of Energy (Washington, D.C.: GPO, 1999). The report is also available, as of October 17...confidential and privileged THE PRESIDENT’S FOREIGN INTELLIGENCE ADVISORY BOARD Learning Lessons from Its Past to Shape Its Future Kenneth Michael Absher Michael Desch Roman Popadiuk A Report Presented to the Richard Lounsbery Foundation Washington...

  8. Feb 4, 2005 --Lecture 8 Computer Security

    E-Print Network [OSTI]

    Jones, Douglas W.

    Feb 4, 2005 -- Lecture 8 22C:169 Computer Security Douglas W. Jones Department of Computer Science Program Security #12;Is this program secure? A simple question only if program has no input or output in program Failure Manifestation of fault in behavior Relative to spec assumed correct! #12;Security

  9. ACADEMIC BOARD Information for members

    E-Print Network [OSTI]

    University of Technology, Sydney

    Principles and Quality Management Framework........................... 7 Self......................................................... 31 Attachment 2 -- Academic Board Quality Management Framework............. 32 http

  10. Technology Innovation Program Advisory Board

    E-Print Network [OSTI]

    Technology Innovation Program Advisory Board 2009 Annual Report of the Technology Innovation Program Advisory Board 2010 Annual Report of the #12;2010 Annual Report of the Technology Innovation Program Advisory Board U.S. Department of Commerce National Institute of Standards and Technology

  11. ENVIRONMENTAL MANAGEMENT ADVISORY BOARD

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny:RevisedAdvisory Board Contributions EMEM STAR Certified Homes,|ASSESSMENT

  12. IBM recently unveiled MobileFirst, a major initiative to develop mobile-related technologies and products that include security, analytics, mobile app development, and cloud-based backend services. MobileFirst

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    IBM recently unveiled MobileFirst, a major initiative to develop mobile-related technologies and products that include security, analytics, mobile app development, and cloud-based backend services. Mobile lab has been asked to lead key portions of IBM's mobile research agenda. IBM Research-Austin has

  13. Attending to opportunity: an attention-based model of how boards of directors impact strategic entrepreneurship in established enterprise 

    E-Print Network [OSTI]

    Tuggle, Christopher Scott

    2005-02-17T23:59:59.000Z

    Using the attention-based view, this study is concerned with two levels of board of directors? interaction relating to strategic entrepreneurship: (1) how individual board members may affect the attention of the entire ...

  14. Web Security Standards and Practices Page 1 of 13 Web Security Standard Operating Environment (SOE) V1.doc

    E-Print Network [OSTI]

    Qian, Ning

    Web Security Standards and Practices Page 1 of 13 Web Security Standard Operating Environment (SOE) V1.doc Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related

  15. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  16. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  17. Hanford Advisory Board HAB

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) EnvironmentalGyroSolé(tm) Harmonic EngineHIV andApril 8-9, Advisory Board HAB Annual

  18. Hanford Advisory Board Orientation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) EnvironmentalGyroSolé(tm) Harmonic EngineHIV andApril 8-9, Advisory Board HABMember

  19. Hanford Advisory Board Values

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) EnvironmentalGyroSolé(tm) Harmonic EngineHIV andApril 8-9, Advisory BoardPageValues

  20. Board of Directors - SRSCRO

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms About Batteries Batteries An errorABisfuel RetreatsforBoard of

  1. A Docking Casette For Printed Circuit Boards

    DOE Patents [OSTI]

    Barringer, Dennis R. (Wallkill, NY); Seminaro, Edward J. (Milton, NY); Toffler, Harold M. (Newburgh, NY)

    2003-08-19T23:59:59.000Z

    A docking apparatus for printed circuit boards including a cassette housing, having a housing base, a housing cover and a housing wall, wherein the housing base and the housing wall are disposed relative to each other so as to define a housing cavity for containing a printed circuit board and wherein the housing wall includes a cable opening disposed so as to be communicated with the housing cavity, a linkage mechanism, wherein the linkage mechanism includes an engagement configuration and a disengagement configuration and wherein the linkage mechanism is disposed so as to be associated with the cassette housing and a housing bezel, wherein the housing bezel is disposed relative to the cassette housing so as to be associated with the cable opening.

  2. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  3. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  4. IEAB Independent Economic Analysis Board

    E-Print Network [OSTI]

    IEAB Independent Economic Analysis Board Kenneth L. Casavant, Chair Roger Mann, Vice-Chair Joel R of Independent Economic Analysis Board's Activities and Contributions to NPPC Fish and Wildlife Planning document of achieving the same sound biological objective exist, the alternative with the minimum economic cost

  5. IEAB Independent Economic Analysis Board

    E-Print Network [OSTI]

    IEAB Independent Economic Analysis Board Daniel D. Huppert, Chair Lon L. Peters, Vice-Chair Joel R. Hamilton Kenneth L. Casavant Jack A. Richards Roger Mann Paul C. Sorensen Hans Radtke Economic Review of Instream Water Supply Components of the Salmon Creek Project Independent Economic Analysis Board Northwest

  6. IEAB Independent Economic Analysis Board

    E-Print Network [OSTI]

    IEAB Independent Economic Analysis Board Roger Mann, Chair Noelwah R. Netusil, Vice-Chair Kenneth L. Casavant Daniel D. Huppert Joel R. Hamilton Lon L. Peters Susan S. Hanna Hans Radtke A I - 1 Economic Effects From Columbia River Basin Anadromous Salmonid Fish Production Independent Economic Analysis Board

  7. IEAB Independent Economic Analysis Board

    E-Print Network [OSTI]

    IEAB Independent Economic Analysis Board Hans Radtke, Chair Roger Mann, Vice-Chair Daniel D. Huppert Joel R. Hamilton Susan S. Hanna John Duffield Noelwah R. Netusil Independent Economic Analysis Board Task Number 139 Integrated Hatchery Operations: Fish and Wildlife Program Costs and Other Economic

  8. IEAB Independent Economic Analysis Board

    E-Print Network [OSTI]

    IEAB Independent Economic Analysis Board Daniel D. Huppert, Chair Lon L. Peters, Vice-Chair Joel R and Guidance for Economic Analysis in Subbasin Planning Independent Economic Analysis Board January 2003, document IEAB 2003-2 Summary Subbasin planning may need to consider two types of economic issues; 1

  9. Nutrient Management Advisory Board ~Approved ~

    E-Print Network [OSTI]

    Kaye, Jason P.

    ) to order at 10:06 AM in room 309 of the PDA Building in Harrisburg. The following Board members meeting of the Board is scheduled for April 22, 2010, from 1:00 ­ 4:00 PM, in Room 309 of the Harrisburg

  10. Technology Innovation Program Advisory Board

    E-Print Network [OSTI]

    Magee, Joseph W.

    Technology Innovation Program Advisory Board 2009 Annual Report of the #12;2009 Annual Report of the Technology Innovation Program Advisory Board U.S. Department of Commerce National Institute of Standards and Technology Technology Innovation Program February 2010 #12;For Information regarding the Technology

  11. Technology Innovation Program Advisory Board

    E-Print Network [OSTI]

    Technology Innovation Program Advisory Board 2011 Annual Report of the #12;#12;i 2011 Annual Report of the Technology Innovation Program Advisory Board U.S. Department of Commerce National Institute of Standards and Technology Technology Innovation Program March 2012 #12;ii For Information regarding the Technology

  12. Industrial Engineering Industrial Advisory Board

    E-Print Network [OSTI]

    Gelfond, Michael

    Industrial Engineering Industrial Advisory Board (IAB) #12;PURPOSE: The Texas Tech University - Industrial Engineering Industrial Ad- visory Board (IAB) is an association of professionals with a com- mon goal - promoting and developing the Texas Tech Department of Industrial Engineering and its students

  13. Transportation Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

  14. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08T23:59:59.000Z

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  15. THE AITHON BOARD: A CASE STUDY IN COMMERCIALIZATION OF A STUDENT PROJECT Connor Citron, Brian Gomberg, and John Seng

    E-Print Network [OSTI]

    Seng, John

    designs, and relatively low cost. The Aithon board aims to continue in this trend. In terms of software not practical, the project turned toward the development of a completely new robot controller board. The initial of fabrication. In Fall 2013, another senior project student began working on the Aithon board implementation

  16. IBM Internet Security Systems Threat Insight Monthly

    E-Print Network [OSTI]

    of cryptography as it relates to the computer security industry. We will look at some of the underlying technologyIBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net September . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Contents www.iss.netwww.iss.net IBM Internet Security Systems X-Force ® Threat Insight Monthly

  17. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring WLANs

  18. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring WLANsMay 22, 2014

  19. Security Council Approval of Kofi

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring WLANsMay 22,509 Week

  20. Security Specialist

    Broader source: Energy.gov [DOE]

    The position is located in the Office of Environmental Management (EM),Office of Safeguards, Security and Emergency Preparedness (EM-44). The mission of EM-44 is to develop and oversee the...

  1. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  2. Relationalism

    E-Print Network [OSTI]

    Edward Anderson

    2014-07-15T23:59:59.000Z

    This article contributes to the debate of the meaning of relationalism and background independence, which has remained of interest in theoretical physics from Newton versus Leibniz through to foundational issues for today's leading candidate theories of quantum gravity. I contrast and compose the substantially different Leibniz--Mach--Barbour (LMB) and Rovelli--Crane (RC) uses of the word `relational'. Leibniz advocated primary timelessness and Mach that `time is to be abstracted from change'. I consider 3 distinct viewpoints on Machian time: Barbour's, Rovelli's and my own. I provide four expansions on Barbour's taking configuration space to be primary: to (perhaps a weakened notion of) phase space, categorizing, perspecting and propositioning. Categorizing means considering not only object spaces but also the corresponding morphisms and then functors between such pairs. Perspecting means considering the set of subsystem perspectives; this is an arena in which the LMB and Rovelli approaches make contact. By propositioning, I mean considering the set of propositions about a physical (sub)system. I argue against categorization being more than a formal pre-requisite for quantization in general; however, perspecting is a categorical operation, and propositioning leads one to considering topoi, with Isham and Doering's work represents one possibility for a mathematically sharp implementation of propositioning. Further applications of this article are arguing for Ashtekar variables as being relational in LMB as well as just the usually-ascribed RC sense, relationalism versus supersymmetry, string theory and M-theory. The question of whether scale is relational is also considered, with quantum cosmology in mind.

  3. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  4. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20T23:59:59.000Z

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  5. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31T23:59:59.000Z

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  6. Securing the Nation's Grid | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring WLANs usingSecuring the

  7. Taxation and Social Security

    E-Print Network [OSTI]

    Kaplow, Louis

    2006-01-01T23:59:59.000Z

    Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

  8. Security and Elections

    E-Print Network [OSTI]

    Bishop, Matt; Peisert, Sean

    2012-01-01T23:59:59.000Z

    World Conf. Information Security Education, 2007, pp. 17–24;Security andElections IEEE Security & Privacy, 10(5):64–67, Sept. -

  9. CAMPUS SECURITY REPORT 2009

    E-Print Network [OSTI]

    CAMPUS SECURITY REPORT 2009 San Francisco State University University Police Department 1600 & Procedure Concerning Security, Access & Maintenance of Campus Facilities & Weapons Policies........................................................... 6 g. Safety & Security

  10. Extension Program Council's Executive Board.

    E-Print Network [OSTI]

    Marshall, Mary G.; Richardson, Burl B.

    1986-01-01T23:59:59.000Z

    ~IB-134'-! II"I~ I~? Extension Program Council's Executive Board Mary G. Marshall and Burl B. Richardson Extension Program Development Specialists The Extension Program Council works with Extension agents to plan, implement, evaluate...

  11. Board of Trustees Dorothy Russell

    E-Print Network [OSTI]

    Marques, Oge

    Board of Trustees Dorothy Russell VP Financial Affairs (Chief Financial Officer) Corey King Interim & Psychological Services Housing and Residential Life Office of the Associate VP for Student Affairs and Dean

  12. Homeland security: Safeguarding America's future with energy efficiency and renewable energy technologies

    SciTech Connect (OSTI)

    none,

    2002-08-01T23:59:59.000Z

    The State Energy Advisory Board (STEAB) presents this 10th annual report following the one-year anniversary of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. This event has had profound impacts on all segments of American society, not the least of which is this country’s energy sector. Long before September 11, a number of energy issues grabbed the nation’s attention, including opening the Arctic National Wildlife Refuge to oil and natural gas exploration, the power crisis in California, nationwide natural gas and gasoline price increases, and the administration’s May 2001 National Energy Policy. However, the events of September 11 refocused attention on the prominent role energy plays in the country’s homeland security. For the most part, the energy aspects of homeland security have focused on the physical security of critical energy emergency planning and energy infrastructure, such as power plants, refineries, and power and fuel transmission systems. While STEAB recognizes the importance of protecting our existing energy infrastructure, this should not be the sole focus of homeland security as it relates to energy.

  13. Model-driven Security Policy Deployment: Property Oriented Approach

    E-Print Network [OSTI]

    Garcia-Alfaro, Joaquin

    and managing the access control rules of an information system are some of the major concerns of security systems. We formally prove the process of de- ploying a security policy related to an information system the deployment of access control security policies. We show how the use of a formal ex- pression of the security

  14. Tag: Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Tag: Security Displaying 1 - 6 of 6... Category: Security Sheltering in Place If you are advised to shelter-in-place by local news or our website, please follow these...

  15. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29T23:59:59.000Z

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  16. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  17. Security Rulemaking

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergy SmallImplementingSecurity SymposiumSecuring the Nation's509Department2

  18. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  19. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  20. Secretary of Energy Advisory Board

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    (such as the NPT and the Convention on the Physical Protection of Nuclear Materials); United Nations resolutions (such as UN Security Council Resolution 1540, which requires...

  1. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FROM: SUBJECT: USIUK Memorandum of Understanding between National Nuclear Security Administration's (NNSA) Associate Administrator for Defense Nuclear Security (AADNS)...

  2. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  3. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29T23:59:59.000Z

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Admin Chg 2, dated 5-15-15, cancels Admin Chg 1.

  4. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18T23:59:59.000Z

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  5. Apparatus And Method Of Using Flexible Printed Circuit Board In Optical Transceiver Device

    DOE Patents [OSTI]

    Anderson, Gene R. (Albuquerque, NM); Armendariz, Marcelino G. (Albuquerque, NM); Bryan, Robert P. (Albuquerque, NM); Carson, Richard F. (Albuquerque, NM); Duckett, III, Edwin B. (Albuquerque, NM); McCormick, Frederick B. (Albuquerque, NM); Peterson, David W. (Sandia Park, NM); Peterson, Gary D. (Albuquerque, NM); Reysen, Bill H. (Lafayette, CO)

    2005-03-15T23:59:59.000Z

    This invention relates to a flexible printed circuit board that is used in connection with an optical transmitter, receiver or transceiver module. In one embodiment, the flexible printed circuit board has flexible metal layers in between flexible insulating layers, and the circuit board comprises: (1) a main body region orientated in a first direction having at least one electrical or optoelectronic device; (2) a plurality of electrical contact pads integrated into the main body region, where the electrical contact pads function to connect the flexible printed circuit board to an external environment; (3) a buckle region extending from one end of the main body region; and (4) a head region extending from one end of the buckle region, and where the head region is orientated so that it is at an angle relative to the direction of the main body region. The electrical contact pads may be ball grid arrays, solder balls or land-grid arrays, and they function to connect the circuit board to an external environment. A driver or amplifier chip may be adapted to the head region of the flexible printed circuit board. In another embodiment, a heat spreader passes along a surface of the head region of the flexible printed circuit board, and a window is formed in the head region of the flexible printed circuit board. Optoelectronic devices are adapted to the head spreader in such a manner that they are accessible through the window in the flexible printed circuit board.

  6. University Policy No.: SS9300 Classification: Safety and Security

    E-Print Network [OSTI]

    Victoria, University of

    University Policy No.: SS9300 Classification: Safety and Security Approving Authority: Board of Governors COMMUNICABLE DISEASES POLICY Effective Date: April/04 Supersedes: November/94 Last Editorial Change: Mandated Review: 1. POLICY PURPOSE The purpose of the policy is to provide direction

  7. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  8. Security, Emergency Planning & Safety Records | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring WLANsMaySecuritySecurity,

  9. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  10. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  11. Security Procedures Caltech Campus Security Dispatch

    E-Print Network [OSTI]

    Goddard III, William A.

    Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: · Remain calm · Notify Campus Security Dispatch · Do NOT move victim EARTHQUAKE When

  12. Security rules versus Security properties Mathieu Jaume

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Security rules versus Security properties Mathieu Jaume SPI ­ LIP6 ­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

  13. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01T23:59:59.000Z

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  14. A network security monitor

    SciTech Connect (OSTI)

    Heberlein, L.T.; Dias, G.V.; Levitt, K.N.; Mukherjee, B.; Wood, J.; Wolber, D. (California Univ., Davis, CA (USA). Dept. of Electrical Engineering and Computer Science)

    1989-11-01T23:59:59.000Z

    The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, our work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.

  15. Your Supplies: 1 Plinko Board board tacked with nails

    E-Print Network [OSTI]

    Smith-Konter, Bridget

    numbers of runs with hits to the number of runs with misses. A Run = Bombarding Marble falls down it is not considered a run. A Hit = Bombarding Marble falls down the board and hits at least one target marble. It can hit more than one, but the run is only counted as a single "hit". A Miss = Bombarding Marble falls

  16. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Energy Savers [EERE]

    92: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

  17. Using Operational Security (OPSEC) to Support a Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  18. V-186: Drupal Login Security Module Security Bypass and Denial...

    Office of Environmental Management (EM)

    186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability June...

  19. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  20. Sandia Energy - Installation Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Installation Energy Security Home Stationary Power Grid Modernization Resilient Electric Infrastructures Military Installation Energy Security Installation Energy SecurityTara...

  1. Dynamic Simulation of DFIG Wind Turbines on FPGA Boards

    E-Print Network [OSTI]

    Zambreno, Joseph A.

    Dynamic Simulation of DFIG Wind Turbines on FPGA Boards Hao Chen, Student Member, IEEE, Song Sun is a friction coefficient. The wind turbine model is based on the relation between the upstream wind speed V w + 1 where p is the air density; Rw is the wind turbine radius; cp (A, (3) is the performance

  2. Insulation board and process of making

    DOE Patents [OSTI]

    Nowobilski, Jeffert J. (Orchard Park, NY); Owens, William J. (Kenmore, NY)

    1985-01-01T23:59:59.000Z

    Insulation board capable of bearing a load without significant loss of insulating capacity due to compression, produced by a method wherein the board is made in compliance with specified conditions of time, temperature and pressure.

  3. Board Advising Jeffrey L. Colesa

    E-Print Network [OSTI]

    Lin, Xiaodong

    for advising, as measured by firm complexity, increases: (i) both advising quality and total advising increase; and (ii) the sensitivity of firm value to both advising quality and total advising increase by a director individually and by the board overall. We introduce measures of quality of advising and total

  4. IEAB Independent Economic Analysis Board

    E-Print Network [OSTI]

    . Huppert Noelwah R. Netusil JunJie Wu Cost-Effectiveness of Fish Tagging Technologies and Programs in the Columbia River Basin1 Independent Economic Analysis Board Fish and Wildlife Program Northwest Power and Conservation Council June 2, 2013 1 This report benefitted from the meetings of the Fish Tagging Forum

  5. AGREEMENT BETWEEN BOARD OF TRUSTEES

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    AGREEMENT BETWEEN THE BOARD OF TRUSTEES OF THE UNIVERSITY OF MASSACHUSETTS AND THE MASSACHUSETTS of Massachusetts ("Employer") and the Massachusetts Society of Professors/Faculty Staff Union/MTA/NEA ("Union l50E and rules and regulations promulgated thereunder, the parties clearly recognize their statutory

  6. UNITED STATES NUCLEAR WASTE TECHNICAL REVIEW BOARD

    E-Print Network [OSTI]

    UNITED STATES NUCLEAR WASTE TECHNICAL REVIEW BOARD 2300 Clarendon Boulevard, Suite 1300 Arlington are pleased to transmit a technical report prepared by the Nuclear Waste Technical Review Board (Board. Based on its review of data gathered by the DOE and the Center for Nuclear Waste Regulatory Analyses

  7. UNITED STATES NUCLEAR WASTE TECHNICAL REVIEW BOARD

    E-Print Network [OSTI]

    UNITED STATES NUCLEAR WASTE TECHNICAL REVIEW BOARD 2300 Clarendon Boulevard, Suite 1300 Arlington Dear Speaker Pelosi, Senator Byrd, and Secretary Bodman: The Nuclear Waste Technical Review Board, and transporting high-level radioactive waste and spent nuclear fuel. The Board is required to report its findings

  8. Page 1 of 2 ACADEMIC BOARD

    E-Print Network [OSTI]

    Jones, Graeme A.

    Page 1 of 2 ACADEMIC BOARD Type: STATUTORY Nature: Senior academic committee of University Report Line: Authority to act via Articles of Government. Also reports to Board of Governors and Vice-Chancellor Timing: Four per annum Life Cycle: Three years TERMS OF REFERENCE/FUNCTIONS The Academic Board shall

  9. Hanford Advisory Board Draft Advice Topic: Tank Farm Vapors...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Health Safety and Environmental Protection (HSEP) Version 1 : Color: pinkyellowgreensalmonpurpleXblue Background The Hanford Advisory Board (Board) has always...

  10. Security of counterfactual quantum cryptography

    SciTech Connect (OSTI)

    Yin Zhenqiang; Li Hongwei; Chen Wei; Han Zhengfu; Guo Guangcan [Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei 230026 (China)

    2010-10-15T23:59:59.000Z

    Recently, a 'counterfactual' quantum-key-distribution scheme was proposed by T.-G. Noh [Phys. Rev. Lett. 103, 230501 (2009)]. In this scheme, two legitimate distant peers may share secret keys even when the information carriers are not traveled in the quantum channel. We find that this protocol is equivalent to an entanglement distillation protocol. According to this equivalence, a strict security proof and the asymptotic key bit rate are both obtained when a perfect single-photon source is applied and a Trojan horse attack can be detected. We also find that the security of this scheme is strongly related to not only the bit error rate but also the yields of photons. And our security proof may shed light on the security of other two-way protocols.

  11. Security Perimeter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook TwitterSearch-Comments Sign InNuclear SecurityUnder Budget

  12. Safety, Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Scienceand Requirements RecentlyElectronicResourcesjobsJuly throughR EMaterialsSafety, Security

  13. Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms AboutRESEARCHHydrosilylationComputer Security All JLF

  14. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY Federal agencies to support waivers and specific response legal authorities #12;INFRASTRUCTURE SECURITY

  15. CAMPUS SECURITY CARD REQUISITION

    E-Print Network [OSTI]

    CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

  16. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01T23:59:59.000Z

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  17. Transportation Research Board AFN 10: Basic Research and Emerging Technologies in Concrete

    E-Print Network [OSTI]

    Transportation Research Board AFN 10: Basic Research and Emerging Technologies in Concrete I will identify potential problems related to concrete materials, and develop research needs statement within STATEMENT AND BACKGROUND The chloride induced corrosion of steel reinforcement embedded in concrete

  18. AP1000 Design for Security

    SciTech Connect (OSTI)

    Long, L.B. [Southern Nuclear Operating Company, 40 Inverness Center Parkway, Birmingham, AL 35242 (United States); Cummins, W.E.; Winters, J.W. [Westinghouse Electric Company, 4350 Northern Pike, Monroeville, PA 15146 (United States)

    2006-07-01T23:59:59.000Z

    Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000 is less vulnerable to security threats such as malevolent use of vehicles (land, water or air), than are conventional PWRs. Further, the AP1000 is less vulnerable to external events (e.g., loss of transmission) than conventional PWRs. For some of the threats evaluated the AP1000 is comparable to conventional PWRs, while for other threats the AP1000 is inherently less vulnerable. (authors)

  19. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power Administration would likeConstitution4Customer-Comments Sign In About |Cyber SecurityCyber

  20. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25T23:59:59.000Z

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  1. Security & Privacy | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...

  2. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  3. WeaselBoard : zero-day exploit detection for programmable logic controllers.

    SciTech Connect (OSTI)

    Mulder, John C.; Schwartz, Moses Daniel; Berg, Michael J.; Van Houten, Jonathan Roger; Urrea, Jorge Mario; King, Michael Aaron; Clements, Abraham Anthony; Jacob, Joshua A.

    2013-10-01T23:59:59.000Z

    Critical infrastructures, such as electrical power plants and oil refineries, rely on programmable logic controllers (PLCs) to control essential processes. State of the art security cannot detect attacks on PLCs at the hardware or firmware level. This renders critical infrastructure control systems vulnerable to costly and dangerous attacks. WeaselBoard is a PLC backplane analysis system that connects directly to the PLC backplane to capture backplane communications between modules. WeaselBoard forwards inter-module traffic to an external analysis system that detects changes to process control settings, sensor values, module configuration information, firmware updates, and process control program (logic) updates. WeaselBoard provides zero-day exploit detection for PLCs by detecting changes in the PLC and the process. This approach to PLC monitoring is protected under U.S. Patent Application 13/947,887.

  4. Oversight Board | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's Possible for RenewableSpeedingBiomass and BiofuelsOversight Board The Ames Laboratory Oversight

  5. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

    2005-09-01T23:59:59.000Z

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  6. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

  7. Security Policies Dr. Ahmad Almulhem

    E-Print Network [OSTI]

    Almulhem, Ahmad

    Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

  8. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  9. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16T23:59:59.000Z

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  10. Office of Security Assistance

    Broader source: Energy.gov [DOE]

    The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

  11. Interactive Montages of Sprites for Indexing and Summarizing Security Video

    E-Print Network [OSTI]

    Pal, Chris

    for indexing and visualizing video in the context of security applications. We wish to index security video that contains relatively rare but important events, such as security video taken from large public or industrial slowly occurring lighting changes and alterations of camera position. To achieve this, we compute a MAP

  12. A Survey of Interdependent Information Security Games ARON LASZKA1

    E-Print Network [OSTI]

    Bencsáth, Boldizsár

    A A Survey of Interdependent Information Security Games ARON LASZKA1 , MARK FELEGYHAZI1 , LEVENTE by the security-related decisions of others. This interdependence between information system operators and users Information security has traditionally been considered a strategic cat-and-mouse game between the defending

  13. SUCCESS FACTORS IN INFORMATION SECURITY IMPLEMENTATION IN ORGANIZATIONS

    E-Print Network [OSTI]

    Williamson, John

    SUCCESS FACTORS IN INFORMATION SECURITY IMPLEMENTATION IN ORGANIZATIONS Maryam Al-Awadi University This paper will explore and identify success factors related to the implementation of information security was to identify those factors required to ensure successful implementation of information security, particularly

  14. Security Control Assessor | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring WLANsMay 22,

  15. Security Enforcement Reporting Criteria | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring WLANsMay 22,509

  16. The Data and Application Security and Privacy (DASPY) Challenge

    E-Print Network [OSTI]

    Sandhu, Ravi

    Computer security Information security = Computer security + Communications security Information Computer security Information security = Computer security + Communications security Information Cyber security (defensive) goals have evolved Computer security Information security = Computer

  17. MasteringWeb Services Security MasteringWeb Services Security

    E-Print Network [OSTI]

    Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

  18. The Texas Agricultural Cooperative Board Chairman.

    E-Print Network [OSTI]

    Black, William E.; Knutson, Ronald D.

    1985-01-01T23:59:59.000Z

    19 10 7 100 5 Board chairmen usually purchase most of their supplies from cooperatives. Of the supplies that were handled, board chairmen, on the average, purchased 87 percent from their cooperative. Older board chairmen were better supply... patrons than younger ones. However, all age groups purchased a majority of their supplies from their cooperative. Table 6. Relationship of Age of Chairman to the Percent of Inputs Purcha~ from the Cooperative, Texas, 1985. Percent of Inputs Purchased...

  19. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    SciTech Connect (OSTI)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01T23:59:59.000Z

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  20. Hanford Advisory Board Page 1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) EnvironmentalGyroSolé(tm) Harmonic EngineHIV andApril 8-9, Advisory Board

  1. Hanford Advisory Board Page 1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) EnvironmentalGyroSolé(tm) Harmonic EngineHIV andApril 8-9, Advisory BoardPage 1

  2. Hanford Advisory Board Page 1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) EnvironmentalGyroSolé(tm) Harmonic EngineHIV andApril 8-9, Advisory BoardPage

  3. Board Advising Jeff Coles, Arizona St. U

    E-Print Network [OSTI]

    Lin, Xiaodong

    .6 6 3 4 5 6 7 2 1 Board of ATW Irwin, John R. Helmerich, Hans S. Burgess, Robert W. Morrissey, William

  4. Gerig to Chair Particle Accelerator School Board

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2004 | 2003 | 2002 | 2001 2000 Subscribe to APS News rss feed Gerig to Chair Particle Accelerator School Board FEBRUARY 23, 2012 Bookmark and Share Rod Gerig (PSC), Deputy...

  5. Appendix 8. Gender, Race, and Ethnicity of Board Members PA State Board

    E-Print Network [OSTI]

    Sibille, Etienne

    Council on 21 18 3 2 1 0 0 11 10 Agricultural Advisory Board 23 23 0 0 0 0 0 17 6 Agricultural Land Preservation Board, State 18 18 0 0 0 0 0 15 3 Agricultural Lands Condemnation Approval Board 6 6 0 0 0 0 4 2 0 0 0 0 0 2 2 Certification of Water and Wastewater Systems Operators, State Board for 7 7 0 0 0 0 0

  6. Processing a printed wiring board by single bath electrodeposition

    DOE Patents [OSTI]

    Meltzer, Michael P. (Oakland, CA); Steffani, Christopher P. (Livermore, CA); Gonfiotti, Ray A. (Livermore, CA)

    2010-12-07T23:59:59.000Z

    A method of processing a printed wiring board. Initial processing steps are implemented on the printed wiring board. Copper is plated on the printed wiring board from a bath containing nickel and copper. Nickel is plated on the printed wiring board from a bath containing nickel and copper and final processing steps are implemented on the printed wiring board.

  7. Processing A Printed Wiring Board By Single Bath Electrodeposition

    DOE Patents [OSTI]

    Meltzer, Michael P. (Oakland, CA); Steffani, Christopher P. (Livermore, CA); Gonfiotti, Ray A. (Livermore, CA)

    2003-04-15T23:59:59.000Z

    A method of processing a printed wiring board by single bath electrodeposition. Initial processing steps are implemented on the printed wiring board. Copper is plated on the printed wiring board from a bath containing nickel and copper. Nickel is plated on the printed wiring board from the bath containing nickel and copper and final processing steps are implemented on the printed wiring board.

  8. Security approaches for Radio Frequency Identification systems

    E-Print Network [OSTI]

    Foley, Joseph Timothy, 1976-

    2007-01-01T23:59:59.000Z

    In this thesis, I explore the challenges related to the security of the Electronic Product Code (EPC) class of Radio Frequency Identification (RFID) tags and associated data. RFID systems can be used to improve supply chain ...

  9. Essays on trades and security prices

    E-Print Network [OSTI]

    Obizhaeva, Anna

    2007-01-01T23:59:59.000Z

    This thesis consists of three chapters that investigate the complex relation between security prices and trades of market participants. In the first chapter, I study the evolution of stock prices after trades with different ...

  10. Abbreviations and Acronyms Board U. S. Nuclear Waste Technical Review Board

    E-Print Network [OSTI]

    Tuff nonwelded unit SNF spent nuclear fuel SZ saturated zone SZEE saturated zone expert elicitation TCw of the Civilian Radioactive Waste Management Program." Presentation to Nuclear Waste Technical Review Board. MayAbbreviations and Acronyms Board U. S. Nuclear Waste Technical Review Board CFR Code of Federal

  11. Security Metricsfor Process Control Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring WLANsMaySecurity

  12. Security Plan for the Energy Employees Occupational Illness Compensation Program

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring WLANsMaySecurity OFFICE OF

  13. Security Policy, CMPC Marking Resource | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring WLANsMaySecurity OFFICE

  14. Security is Not an Option | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring WLANsMaySecurity

  15. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  16. Sandia National Laboratories: Climate Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MonitoringClimate Security Climate Security Climate Security Global reductions in greenhouse gases will eventually be motivated by an international climate treaty and will entail...

  17. Tighter security for electronic information

    SciTech Connect (OSTI)

    Moore, T.

    1996-11-01T23:59:59.000Z

    Responding to interest expressed by many member utilities, EPRI is launching strategic core research in information security to help companies better protect power system operations, business-sensitive and private customer data, and networks from unauthorized access or use. Although the threat of computer security breaches has been relatively low and isolated in the past and break-ins have been few, the increasing use of networks for various business activities suggests that such risks will rise. EPRI expects to work through an existing strategic alliance with the Department of Energy to tap the expertise of the national laboratories in beefing up utilities` information security systems and practices. This paper describes these potential threats and strategies to combat them.

  18. Gregory H. Friedman: Before the Subcommittee on National Security...

    Energy Savers [EERE]

    Security, Veterans Affairs, and International Relations of the Committee on Government Reform U.S. House of Representatives Gregory H. Friedman: Before the Subcommittee on National...

  19. UNITED STATES NUCLEAR WASTE TECHNICAL REVIEW BOARD

    E-Print Network [OSTI]

    con144vf UNITED STATES NUCLEAR WASTE TECHNICAL REVIEW BOARD 2300 Clarendon Boulevard, Suite 1300 Dear Speaker Hastert, Senator Thurmond, and Secretary Richardson: The Nuclear Waste Technical Review with provisions of the Nuclear Waste Policy Amendments Act of 1987, Public Law 100-203. The Act requires the Board

  20. Appendix A Nuclear Waste Technical Review Board

    E-Print Network [OSTI]

    39 Appendices Appendices #12;Appendix A Nuclear Waste Technical Review Board Members: Curricula to the Nuclear Waste Technical Review Board. President Clinton appointed Dr. Cohon chairman on January 17, 1997, and Asia and on energy facility siting, including nuclear waste ship- ping and storage. In addition to his

  1. Appendix A Nuclear Waste Technical Review Board

    E-Print Network [OSTI]

    59 Appendices Appendices #12;Appendix A Nuclear Waste Technical Review Board Members: Curricula Cohon to serve on the Nuclear Waste Technical Review Board. President Clinton appointed Dr. Cohon, and Asia and on energy-facility siting, including nuclear waste shipping and storage. In addition to his

  2. UNITED STATES NUCLEAR WASTE TECHNICAL REVIEW BOARD

    E-Print Network [OSTI]

    UNITED STATES NUCLEAR WASTE TECHNICAL REVIEW BOARD 2300 Clarendon Boulevard, Suite 1300 Arlington.C. 20585 Dear Speaker Hastert, Senator Stevens, and Secretary Bodman: The Nuclear Waste Technical Review Board was created by Congress in the Nuclear Waste Policy Amendments Act (NWPAA) of 1987 and charged

  3. UNITED STATES NUCLEAR WASTE TECHNICAL REVIEW BOARD

    E-Print Network [OSTI]

    JEC187V3 UNITED STATES NUCLEAR WASTE TECHNICAL REVIEW BOARD 2300 Clarendon Boulevard, Suite 1300 of Energy 1000 Independence Avenue, SW Washington, DC 20585 Dear Secretary O'Leary: At the Nuclear Waste UNITED STATES NUCLEAR WASTE TECHNICAL REVIEW BOARD 2300 Clarendon Boulevard, Suite 1300 Arlington, VA

  4. UNITED STATES NUCLEAR WASTE TECHNICAL REVIEW BOARD

    E-Print Network [OSTI]

    of the overall system for managing spent fuel and defense high-level waste. The Board includes its findingsjlc029va UNITED STATES NUCLEAR WASTE TECHNICAL REVIEW BOARD 2300 Clarendon Boulevard, Suite 1300, D.C. 20585 Dear Speaker Gingrich, Senator Thurmond, and Secretary Peńa: The Nuclear Waste Technical

  5. BOARD OF TRUSTEES UNIVERSITY OF PUERTO RICO

    E-Print Network [OSTI]

    Quirk, Gregory J.

    BOARD OF TRUSTEES UNIVERSITY OF PUERTO RICO CERTIFICATION NUMBER 45 2006-2007 I, Salvador Antonetti Zequeira, Secretary of the Board of Trustees of the University of Puerto Rico, DO HEREBY CERTIFY THAT of the President of University of Puerto Rico, approved: The System-Wide Policy and Procedures for Responding

  6. DOE appoints four new members to advisory board

    Broader source: Energy.gov [DOE]

    DOE has appointed four new members to its Environmental Management advisory board in Oak Ridge. Leon Baker, Richard Burroughs, Terri Likens and Ed Trujillo were introduced during the Oak Ridge Site Specific Advisory Board’s February meeting.

  7. SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS

    E-Print Network [OSTI]

    SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

  8. Campus Security Report 1 Campus seCurity

    E-Print Network [OSTI]

    Wilmers, Chris

    Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

  9. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  10. University of London International Academy MSc/PG Dip in Information Security

    E-Print Network [OSTI]

    Royal Holloway, University of London

    a computing system secure. This process starts with defining the proper security requirements, which system level. In order to understand these security controls we need to describe some background material systems will be examined as well as security related issues of computer architecture. Specific well

  11. ANNUAL SECURITY FIRE SAFETY REPORT

    E-Print Network [OSTI]

    ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http://www.dartmouth.edu/~security/ #12;1 Table of Contents MESSAGE FROM THE DIRECTOR OF SAFETY AND SECURITY................................................................................................................................................................... 7 ANNUAL SECURITY REPORT

  12. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01T23:59:59.000Z

    of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.www.greenpacks.org • Energy Security & Climate Change:

  13. Secretary of Energy Advisory Board Hosts Conference Call on Shale...

    Energy Savers [EERE]

    of Energy Advisory Board Hosts Conference Call on Shale Gas Draft Report Secretary of Energy Advisory Board Hosts Conference Call on Shale Gas Draft Report November 10, 2011 -...

  14. Defense Nuclear Facilities Safety Board (DNFSB) Update - Dale...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Defense Nuclear Facilities Safety Board (DNFSB) Update - Dale Govan, Departmental Representative to the DNFSB Defense Nuclear Facilities Safety Board (DNFSB) Update - Dale Govan,...

  15. Microsoft Word - EM QA Corporate Board Meeting Minutes - Oct...

    Office of Environmental Management (EM)

    th Environmental Management Quality Assurance Corporate Board Meeting Minutes October 27, 2014 - Nevada Site Office Page 1 of 10 Voting Board Members in Attendance: Randy Kay -...

  16. Microsoft Word - EM QA Corporate Board Meeting Minutes - February...

    Office of Environmental Management (EM)

    th Environmental Management Quality Assurance Corporate Board Meeting Minutes February 11, 2014 - Teleconference Page 1 of 8 Voting Board Members in Attendance: Randy Kay - Idaho...

  17. Feasibility of OnBoard Thermoelectric Generation for Improved...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    OnBoard Thermoelectric Generation for Improved Vehicle Fuel Economy Feasibility of OnBoard Thermoelectric Generation for Improved Vehicle Fuel Economy Poster presentation at the...

  18. Type B Accident Investigation Board Report on the September 7...

    Broader source: Energy.gov (indexed) [DOE]

    Accident Investigation Board Report on the September 7, 2001, Burn Accident at Oak Ridge National Laboratory, Building 9210 Type B Accident Investigation Board Report on the...

  19. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  20. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  1. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    for process that controls interactions between users and resources. · Access control system implements Information Security Group Agenda · Access control basics · ACLs and capabilities · Information flow policies· Information flow policies · Bell-LaPadula Model · Role-Based Access Control · Resources 3 Information Security

  2. Electronic security device

    DOE Patents [OSTI]

    Eschbach, Eugene A. (Richland, WA); LeBlanc, Edward J. (Kennewick, WA); Griffin, Jeffrey W. (Kennewick, WA)

    1992-01-01T23:59:59.000Z

    The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

  3. Electronic security device

    DOE Patents [OSTI]

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-03-17T23:59:59.000Z

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

  4. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01T23:59:59.000Z

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  5. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  6. SECURITY AND FIRE SAFETY

    E-Print Network [OSTI]

    Barrash, Warren

    ANNUAL SECURITY AND FIRE SAFETY REPORT 2014 #12;2 Boise State University 2014 Annual Security and Fire Safety Report From the Vice President for Campus Operations and General Counsel At Boise State University, we are committed to providing a safe and secure environment for students, staff

  7. UNIVERSITY POLICE ANNUAL SECURITY

    E-Print Network [OSTI]

    Kulp, Mark

    UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

  8. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

  9. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  10. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  11. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05T23:59:59.000Z

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  12. A new secure process for steganography: CI2 Stego-security and topological-security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A new secure process for steganography: CI2 Stego-security and topological-security Nicolas Friot1- formation hiding security fields. We show that the proposed scheme is stego-secure, which is the highest level of security in a well defined and studied category of attack called "watermark-only attack

  13. Security for Extensible Systems Robert Grimm Brian N. Bershad

    E-Print Network [OSTI]

    Grimm, Robert

    as it relates to system security and postulate an initial model for access control. This model extends the dis control model does not address all aspects of system security, we believe that it can serve as a solid identify the structure of ex­ tensible systems as it relates to access control and describe the current

  14. Security for Extensible Systems Robert Grimm Brian N. Bershad

    E-Print Network [OSTI]

    Grimm, Robert

    as it relates to system security and postulate an initial model for access control. This model extends the dis control model does not address all aspects of system security, we believe that it can serve as a solid identify the structure of ex- tensible systems as it relates to access control and describe the current

  15. Secure sequential transmission of quantum information

    E-Print Network [OSTI]

    Kabgyun Jeong; Jaewan Kim

    2015-01-19T23:59:59.000Z

    We propose a quantum communication protocol that can be used to transmit any quantum state, one party to another via several intermediate nodes, securely on quantum communication network. The scheme makes use of the sequentially chained and approximate version of private quantum channels satisfying certain commutation relation of $n$-qubit Pauli operations. In this paper, we study the sequential structure, security analysis, and efficiency of the quantum sequential transmission (QST) protocol in depth.

  16. BOARD OF GOVERNORS Tuesday, November 29, 2005

    E-Print Network [OSTI]

    Pedersen, Tom

    :Prof. Jamie Cassels, Mr. Jack Falk, Dr. Valerie Kuehne, Dr. Martin Taylor, Ms. Morag MacNeil 1. Approval. Lynda Farmer for Dr. Valerie Kuehne and Ms. Shannon von Kaldenberg, #12;Board of Governors 2 Minutes

  17. BOARD OF GOVERNORS Tuesday, November 28, 2006

    E-Print Network [OSTI]

    Pedersen, Tom

    : Prof. Jamie Cassels, Ms. Tracy Corbett, Dr. Valerie Kuehne, Ms. Kristi Simpson, Dr. Martin. Mr. Donald and Dr. Kuehne thanked Board members for their participation and support for the event

  18. UNIVERSITY OF MINNESOTA BOARD OF REGENTS POLICY

    E-Print Network [OSTI]

    Amin, S. Massoud

    OF MINNESOTA BOARD OF REGENTS POLICY to advise on matters of policy, procedure or employment decisions. The term; Certain Conduct Not Protected. To be eligible under this policy an employee must

  19. Electric Power Board- Energy Efficiency Rebate Program

    Broader source: Energy.gov [DOE]

    Electric Power Board provides a financial incentive for residential customers to replace old water heaters with new ones which meet the [http://www.eere.energy.gov/buildings/appliance_standards...

  20. ORSSAB monthly board meeting | Department of Energy

    Energy Savers [EERE]

    to 8:30PM EDT Board members and participants will hear a presentation and updates about the "State of the Oak Ridge EM ProgramFY 2016 Budget and Prioritization Planning." The...

  1. Dynamic Digital Menu Boards & the Vividness Construct"

    E-Print Network [OSTI]

    Wurtele, Eve Syrkin

    become pervasive in public spaces due to its low cost, centralized control, ease of deployment in fast food restaurants." · These boards are capable of displaying text/graphics, audio, animation, video

  2. Energy Systems Acquisitions Advisory Board Procedures

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-10-28T23:59:59.000Z

    The Notice streamlines the Energy Systems Acquisition Advisory Board (ESAAB) process to ensure informed, objective, and documented Strategic and Major System Critical Decision, Baseline Change Proposal, and site selection final decisions. Does not cancel other directives.

  3. Paducah CAB Board - April | Department of Energy

    Energy Savers [EERE]

    - April Paducah CAB Board - April April 16, 2015 6:00PM to 8:00PM CDT Paducah CAB Office, 111 Memorial Drive, Paducah, KY 42001 Contact Buz Smith, DOE Site Office 270-441-6821...

  4. Transportation Research Board 94th Annual Meeting

    Broader source: Energy.gov [DOE]

    The Transportation Research Board 94th Annual Meeting will be held January 11–15, 2015, in Washington, D.C. at the Walter E. Washington Convention Center. The event covers the entire transportation...

  5. Information SecurityInformation Security--Applications andApplications and

    E-Print Network [OSTI]

    Ahmed, Farid

    Information SecurityInformation Security-- Applications andApplications and Techniques about? InformationInformation SecuritySecurity Information SecurityInformation Security What?What? Why of Information SecuritySecurity Network SecurityNetwork Security PGP, SSL,PGP, SSL, IPsecIPsec Data Security

  6. Controlling dust when cutting fibre-cement board

    E-Print Network [OSTI]

    Knowles, David William

    Controlling dust when cutting fibre-cement board Page 1 of 2 Cutting fibre-cement board (e are not typically used when cutting and shaping fibre-cement board. To protect yourself you should: Use one of the methods described above for cutting fibre-· cement board Inspect the dust control equipment before you

  7. Experimental test of airplane boarding methods

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Steffen, Jason H.; Hotchkiss, Jon

    2012-01-01T23:59:59.000Z

    We report the results of an experimental comparison of different airplane boarding methods. This test was conducted in a mock 757 fuselage, located on a Southern California soundstage, with 12 rows of six seats and a single aisle. Five methods were tested using 72 passengers of various ages. We found a significant reduction in the boarding times of optimized methods over traditional methods. These improved methods, if properly implemented, could result in a significant savings to airline companies. The process of boarding an airplane is of interest to a variety of groups. The public is interested both as a curiosity,more »as it is something that they may regularly experience, and as a consumer, as their experiences good or bad can affect their loyalties. Airline companies and their employees also have a stake in an efficient boarding procedure as time saved in the boarding process may result is monetary savings, in the quality of interactions with passengers, and in the application of human resources to the general process of preparing an airplane for departure. A recent study (Nyquist and McFadden, 2008) indicates that the average cost to an airline company for each minute of time spent at the terminal is roughly $30. Thus, each minute saved in the turn-around time of a flight has the potential to generate over $16,000,000 in annual savings (assuming an average of 1500 flights per day). While the boarding process may not be the primary source of delay in returning an airplane to the skies, reducing the boarding time may effectively eliminate passenger boarding as a contributor in any meaningful measure. Consequently, subsequent efforts to streamline the other necessary tasks, such as refueling and maintenance, would be rewarded with a material reduction in time at the gate for each flight.« less

  8. Experimental test of airplane boarding methods

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Steffen, Jason H. [Fermilab; Hotchkiss, Jon [Hotchkiss Industries, Sherman Oaks

    2012-01-01T23:59:59.000Z

    We report the results of an experimental comparison of different airplane boarding methods. This test was conducted in a mock 757 fuselage, located on a Southern California soundstage, with 12 rows of six seats and a single aisle. Five methods were tested using 72 passengers of various ages. We found a significant reduction in the boarding times of optimized methods over traditional methods. These improved methods, if properly implemented, could result in a significant savings to airline companies. The process of boarding an airplane is of interest to a variety of groups. The public is interested both as a curiosity, as it is something that they may regularly experience, and as a consumer, as their experiences good or bad can affect their loyalties. Airline companies and their employees also have a stake in an efficient boarding procedure as time saved in the boarding process may result is monetary savings, in the quality of interactions with passengers, and in the application of human resources to the general process of preparing an airplane for departure. A recent study (Nyquist and McFadden, 2008) indicates that the average cost to an airline company for each minute of time spent at the terminal is roughly $30. Thus, each minute saved in the turn-around time of a flight has the potential to generate over $16,000,000 in annual savings (assuming an average of 1500 flights per day). While the boarding process may not be the primary source of delay in returning an airplane to the skies, reducing the boarding time may effectively eliminate passenger boarding as a contributor in any meaningful measure. Consequently, subsequent efforts to streamline the other necessary tasks, such as refueling and maintenance, would be rewarded with a material reduction in time at the gate for each flight.

  9. Related Links | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved: 5-13-14 FEDERALAmerica

  10. Related Links | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection Technical s o Freiberg andReindustrializationLivermore Field Office

  11. Securing Internet Routing Securing Internet Routing

    E-Print Network [OSTI]

    Goldberg, Sharon

    Plane (Routing protocols): S h b d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths between nodes [Kent Lynn Seo 00] Listen-Whisper, etc., Data Plane: · Given d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths

  12. SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013)

    E-Print Network [OSTI]

    2013-01-01T23:59:59.000Z

    SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013) Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.819 SPECIAL ISSUE PAPER Integrating security mechanisms, must be protected against security threats. Due to the security and also resource constraint concerns

  13. Using Security and Domain ontologies for Security Requirements Analysis

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Using Security and Domain ontologies for Security Requirements Analysis Amina Souag, Camille.Mouratidis@uel.ac.uk Abstract-- Recent research has argued about the importance of considering security during Requirements that security being a multi-faceted problem, a single security ontology is not enough to guide SR Engineering

  14. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  15. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  16. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  17. Geoscience research for energy security

    SciTech Connect (OSTI)

    Not Available

    1987-02-01T23:59:59.000Z

    This report focuses on the nation's geoscience needs and recommends DOE activities to mitigate major problems that effect energy security. The report recommends new or redirected DOE geoscience research initiatives for oil and gas, coal, nuclear resources, structures and processes in the earth's crust, geothermal resources, oil shale, and waste disposal. In light of the current and near-term national energy requirements, federal budget constraints, and the diminished R and D efforts from the domestic energy industry, the Board recommends that DOE: assign highest geoscience research emphasis to shorter-term, energy priorities of the nation; particularly advanced oil and gas exploration and production technologies; establish in DOE an Office of Geoscience Research to develop and administer a strategic plan for geoscience research activities; establish oil and gas research centers within each of the six major oil and gas provinces of the United States to conduct and coordinate interdisciplinary problem-oriented research; increase oil and gas research funding by an initial annual increment of $50 million, primarily to support the regional research centers.

  18. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01T23:59:59.000Z

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  19. Homeland Security Challenges Facing Small Water Systems in Texas

    E-Print Network [OSTI]

    Dozier, Monty; Theodori, Gene L.; Jensen, Ricard

    2007-05-31T23:59:59.000Z

    across Texas A&M are now developing graduate classes on such areas as government programs related to homeland security, haz- ard mitigation, cybersecurity, public health and critical infrastructure protection related to water and wastewater systems...

  20. Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System

    E-Print Network [OSTI]

    Ling, Amy Poh Ai; 10.5121/ijgca.2011.2201

    2011-01-01T23:59:59.000Z

    This paper describes the background of smart information infrastructure and the needs for smart grid information security. It introduces the conceptual analysis to the methodology with the application of hermeneutic circle and information security functional requirement identification. Information security for the grid market cover matters includes automation and communications industry that affects the operation of electric power systems and the functioning of the utilities that manage them and its awareness of this information infrastructure has become critical to the reliability of the power system. Community benefits from of cost savings, flexibility and deployment along with the establishment of wireless communications. However, concern revolves around the security protections for easily accessible devices such as the smart meter and the related communications hardware. On the other hand, the changing points between traditional versus smart grid networking trend and the information security importance on...

  1. Enhance your Cyber Security Knowledge

    E-Print Network [OSTI]

    Enhance your Cyber Security Knowledge About NPS CS FUNDAMENTALS: Create a strong foundational by increasing the effectiveness of the armed forces of the United States and its allies. Cyber Security-4015 About CISR #12;Cyber Security Adversarial Techniques Cyber Security Defense Cyber Security Fundamentals

  2. Annual Security Report October 2013

    E-Print Network [OSTI]

    Goddard III, William A.

    1 Annual Security Report October 2013 Mission Statement The Campus Security and Parking Services Department ("Security") exists to provide a secure and welcoming research, educational, and work environment in which security concerns are balanced with freedom of movement in an open campus atmosphere while

  3. Dumb Ideas in Computer Security

    E-Print Network [OSTI]

    Dumb Ideas in Computer Security Dr Charles P Pfleeger Pfleeger Consulting Group 19 July 2011 chuck Security" (2005) http://www.ranum.com/security/computer_security/editorials/dumb/ Default permit Ideas in Computer Security 219 Jul 2011 #12;Struck a Nerve Results 1-10 of about 2,030,000 for dumb

  4. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    Computer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security Information Technology 15 Security Testing and Metrics 17 Validation Programs and Laboratory Accreditation 17

  5. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  6. Energy Security Initiatives Update

    Broader source: Energy.gov [DOE]

    Presentation—given at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meeting—lists Federal government energy security initiatives.

  7. TEC Information Security

    Broader source: Energy.gov (indexed) [DOE]

    External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

  8. Personnel Security Specialist

    Broader source: Energy.gov [DOE]

    The Office of the Associate Under Secretary for Environment, Health, Safety, and Security (AU) which provides corporate leadership and strategic approaches for protecting DOEs workers, the public,...

  9. NNSA orders security enhancements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    badge or valid driver's license) before proceeding, and will be asked to vouch for other vehicle occupants. LOS ALAMOS, N. M., Dec. 21, 2012-The National Nuclear Security...

  10. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08T23:59:59.000Z

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  11. Hazardous Material Security (Maryland)

    Broader source: Energy.gov [DOE]

    All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

  12. Formulation of Molding Materials From Recycled Printed Wiring Boards

    SciTech Connect (OSTI)

    Lula, J.W.; Bohnert, G.W.

    1998-04-20T23:59:59.000Z

    The objective of this project was to formulate the pulverized electronic waste (PEW) stream derived from grinding obsolete electronic assemblies and combine this material with thermoplastic or thermosetting polymers into useful, high-value commercial products materials. PEW consists primarily of various thermoset plastic materials and glass fibers from the printed wiring boards, along with ceramic pieces from chip carriers and other electronic components. Typically, the thermosetting materials have the same desirable properties as in the original electronic assembly, including relatively high temperature resistance, excellent chemical resistance, and flame retardancy. These properties combine to make PEW an inherently good inert filler material for plastic composites.

  13. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    SciTech Connect (OSTI)

    Sheldon, Frederick T [ORNL; Krings, Axel [ORNL; Yoo, Seong-Moo [ORNL; Mili, Ali [ORNL; Trien, Joseph P [ORNL

    2006-01-01T23:59:59.000Z

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

  14. Board of Trustees (Idaho State Board of Education)

    E-Print Network [OSTI]

    Barrash, Warren

    -Construction Mgmt. -Electrical and Computer Engineering -Instructional & Performance Tech. -Materials Science Compliance Planning & Facilities Jared Everett, Interim Assoc. VP -Facilities O & M -Architectural & Safety Government* Relations Bruce Newcomb Athletics*¨ Mark Coyle Internal Audit Larry Harmon Boise State

  15. Board of Trustees (Idaho State Board of Education)

    E-Print Network [OSTI]

    Barrash, Warren

    -Construction Mgmt. -Electrical and Computer Engineering -Instructional & Performance Tech. -Materials Science & Facilities David Smith, Assoc. VP -Facilities O & M -Architectural & Engineering Services -Capital Planning & Space Management -Transportation, Parking & Environmental Health & Safety Government* Relations Bruce

  16. Los Alamos CCS (Center for Computer Security) formal computer security model

    SciTech Connect (OSTI)

    Dreicer, J.S.; Hunteman, W.J. (Los Alamos National Lab., NM (USA))

    1989-01-01T23:59:59.000Z

    This paper provides a brief presentation of the formal computer security model currently being developed at the Los Alamos Department of Energy (DOE) Center for Computer Security (CCS). The initial motivation for this effort was the need to provide a method by which DOE computer security policy implementation could be tested and verified. The actual analytical model was a result of the integration of current research in computer security and previous modeling and research experiences. The model is being developed to define a generic view of the computer and network security domains, to provide a theoretical basis for the design of a security model, and to address the limitations of present models. Formal mathematical models for computer security have been designed and developed in conjunction with attempts to build secure computer systems since the early 70's. The foundation of the Los Alamos DOE CCS model is a series of functionally dependent probability equations, relations, and expressions. The mathematical basis appears to be justified and is undergoing continued discrimination and evolution. We expect to apply the model to the discipline of the Bell-Lapadula abstract sets of objects and subjects. 5 refs.

  17. Office of Departmental Personnel Security

    Broader source: Energy.gov [DOE]

    The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

  18. UC SECURITY FRAMEWORK 2011 -2012

    E-Print Network [OSTI]

    Hickman, Mark

    1 UC SECURITY FRAMEWORK 2011 - 2012 #12;2 Contents Background..................................................................................................................................4 About UC Security & Campus Community Support .................................................................5 Security Service Authority and Relationship with NZ Police and Emergency Services ...........5

  19. The security of machine learning

    E-Print Network [OSTI]

    Barreno, Marco; Nelson, Blaine; Joseph, Anthony D.; Tygar, J. D.

    2010-01-01T23:59:59.000Z

    of the IEEE symposium on security and privacy (pp. 188–201).and communications security (CCS) (pp. 59–68). Globerson,detection. In USENIX security symposium. Klimt, B. , & Yang,

  20. January 2005 INTEGRATING IT SECURITY

    E-Print Network [OSTI]

    January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS By Joan S. Hash, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Introduction To assist federal agencies with effec tively integrating security

  1. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08T23:59:59.000Z

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  2. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  3. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01T23:59:59.000Z

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  4. Social Networking? Secure Networking?

    E-Print Network [OSTI]

    Chapman, Michael S.

    Social Networking? Secure Networking? Teaching & Learning Technology Roundtable February 2010 #12 ­ The intent behind the current security measures in place at OHSU ­ The OHSU Social Networking Guidelines 2. To begin a campus wide dialogue exploring the changing world of online social networking and it

  5. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19T23:59:59.000Z

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  6. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29T23:59:59.000Z

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

  7. December 2007 SECURING EXTERNAL

    E-Print Network [OSTI]

    devices such as desktop and laptop computers, personal digital assistants (PDAs), and cell phones. These teleworkers use devices such as desktop and laptop computers, personal digital assistants (PDAs), and cellDecember 2007 SECURING EXTERNAL COMPUTERS AND OTHER DEVICES USED BY TELEWORKERS SECURING EXTERNAL

  8. Global Material Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City, Arizona,SiteNational Nuclear SecuritySecurity

  9. Army Energy Security and Independence

    Broader source: Energy.gov (indexed) [DOE]

    ARMY ENERGY SECURITY AND INDEPENDENCE Leadership Ownership Partnership 19 NOV 2008 Don Juhasz, PE, CEM CHIEF ARMY ENERGY POLICY Army Energy Security - "The Way Ahead" 2 ARMY ENERGY...

  10. Headquarters Facilities Master Security Plan

    Office of Environmental Management (EM)

    It implements the requirements of: Title 32, CFR, Part 2001, Classified National Security Information Executive Order 13526, Classified National Security Information...

  11. Sandia Energy - Water Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Infrastructure Security Home Climate & Earth Systems WaterEnergy Nexus Decision Models for Integrating EnergyWater Water Infrastructure Security Water Infrastructure...

  12. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29T23:59:59.000Z

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  13. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14T23:59:59.000Z

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  14. Extender for securing a closure

    DOE Patents [OSTI]

    Thomas, II, Patrick A.

    2012-10-02T23:59:59.000Z

    An apparatus for securing a closure such as door or a window that opens and closes by movement relative to a fixed structure such as a wall or a floor. Many embodiments provide a device for relocating a padlock from its normal location where it secures a fastener (such as a hasp) to a location for the padlock that is more accessible for locking and unlocking the padlock. Typically an extender is provided, where the extender has a hook at a first end that is disposed through the eye of the staple of the hasp, and at an opposing second end the extender has an annulus, such as a hole in the extender or a loop or ring affixed to the extender. The shackle of the padlock may be disposed through the annulus and may be disposed through the eye of a second staple to secure the door or window in a closed or open position. Some embodiments employ a rigid sheath to enclose at least a portion of the extender. Typically the rigid sheath has an open state where the hook is exposed outside the sheath and a closed state where the hook is disposed within the sheath.

  15. Extracting Security Control Requirements University of Tulsa

    E-Print Network [OSTI]

    Gamble, R. F.

    , Requirements, Security Policy Modeling. 1. INTRODUCTION Networks and information systems have grown. Security has become a larger issue with the democratization of technology and information. Security accepted security controls for "Federal Information Systems and Organizations" [8]. NIST defines security

  16. Distributed Temporal Logic for the Analysis of Security Protocol Models

    E-Print Network [OSTI]

    Basin, David

    , showing that it is sufficient to consider models in which the intruder completely controls the networkDistributed Temporal Logic for the Analysis of Security Protocol Models David Basin Department to reason about and relate different security-protocol models. This includes reasoning about model

  17. Defining and Enforcing Referential Security Jed Liu Andrew C. Myers

    E-Print Network [OSTI]

    Myers, Andrew C.

    integrity can itself lead to security vulnerabilities that are not currently well understood. This paper. Referential integrity, which guarantees that named resources can be accessed when referenced, is an important identifies three kinds of referential security vulnerabilities related to the ref- erential integrity

  18. Dynamic access policies for unconditionally secure secret sharing schemes

    E-Print Network [OSTI]

    Martin, Keith

    Dynamic access policies for unconditionally secure secret sharing schemes Keith M. Martin.martin@rhul.ac.uk Abstract--- Secret sharing schemes are cryptographic primitives that can be employed in any situation where it is desirable to distribute information relating to secret data amongst a number of entities. Following a secure

  19. Communication Between the U.S. Nuclear Waste Technical Review Board

    E-Print Network [OSTI]

    Appendix F Appendix F Communication Between the U.S. Nuclear Waste Technical Review Board on Energy and Air Quality on March 25, 2004 143 #12;#12;Appendix F UNITED STATES NUCLEAR WASTE TECHNICAL much for your written questions related to my testimony on behalf of the Nuclear Waste Technical Review

  20. Magnetospheric line radiation event observed simultaneously on board Cluster 1, Cluster 2 and DEMETER spacecraft

    E-Print Network [OSTI]

    Santolik, Ondrej

    be related to power line harmonic radiation (PLHR, an electromagnetic radiation from electric power systemsMagnetospheric line radiation event observed simultaneously on board Cluster 1, Cluster 2., O. Santolík, M. Parrot, and J. S. Pickett (2012), Magnetospheric line radiation event observed

  1. Public key infrastructure for DOE security research

    SciTech Connect (OSTI)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01T23:59:59.000Z

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  2. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  3. Safety and Security What do Safety/Security work with?

    E-Print Network [OSTI]

    Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with; · Security revolving work environment · Handle locks, keys, alarms, surveillance · Responsible

  4. Urban Commerce and Security Study Urban Commerce and Security Study

    E-Print Network [OSTI]

    Urban Commerce and Security Study Urban Commerce and Security Study Contact Information Fred S. Roberts Research Sponsor: Department of Homeland Security Rutgers University/CCICADA Center Professor.S. Department of Homeland Security, under Agreement 2009-ST-061-CCI002-02. Any opinions, findings

  5. SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card

    E-Print Network [OSTI]

    Li, Mo

    SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your and evidence to any Social Security office. Follow instructions below. HOW TO COMPLETE THE APPLICATION Most

  6. Wireless Security: Secure and Public Networks Villanova University

    E-Print Network [OSTI]

    36 Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer wireless access points. Security protocols exist for wireless networks; however, all widely implemented at implementing a protocol which allows public access to a secure wireless network have been made. In this report

  7. Oak Ridge Site Specific Advisory Board Contacts | Department...

    Office of Environmental Management (EM)

    Advisory Board Contacts Mailing Address Oak Ridge Site Specific Advisory Board P.O. Box 2001, EM-91 Oak Ridge, TN 37831 Phone Numbers (865) 241-4583, (865) 241-4584 (800) 382-6938,...

  8. Colorado Forestry Advisory Board Members: Don Ament Tom Stone

    E-Print Network [OSTI]

    #12;Colorado Forestry Advisory Board Members: Don Ament Tom Stone Commissioner of Agriculture As Chairperson of Colorado's newly created Forestry Advisory Board, I would like to thank you for taking the time

  9. Third Radiation Effects Research Foundation Board of Councilors...

    Broader source: Energy.gov (indexed) [DOE]

    Third Radiation Effects Research Foundation Board of Councilors Meeting Held in Hiroshima The third Board of Councilors (BOC) meeting was held on June 18-19 at the Hiroshima...

  10. Management Board Briefing Note 16 October 2009 BRIEFING NOTE

    E-Print Network [OSTI]

    -Rector (Commercial Development), and the College Secretary. The Board also received a Health and Safety update. The Board also received the Minutes of the PRB Meeting held on 21 September 2009; the Annual Report on Value

  11. Board independence and corporate governance: evidence from director resignations

    E-Print Network [OSTI]

    Gupta, Manu

    2005-08-29T23:59:59.000Z

    As evident from recent changes in NYSE and Nasdaq listing requirements, board independence is considered an important constituent of firms?? corporate governance structures. However, the empirical evidence regarding the impact of board structure...

  12. BioDiesel Content On-board monitoring

    Broader source: Energy.gov (indexed) [DOE]

    2008 - all rights reserved 1 (tm) BioDiesel Content On-board monitoring BioDiesel Content On-board monitoring August 6th, 2008 Copyright SP3H 2007 -- all rights reserved 2 Biofuel...

  13. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  14. NOTICE OF PUBLIC HEARINGS BOARD OF REGENTS

    E-Print Network [OSTI]

    the section to include the online parking permit application process, and Section 20-12-6, HAR, "Chancellor for permits, passes, daily and hourly parking, and reserved parking within the Board approved rate structure permit rates at UH Mnoa each year over a five-year period. Employee parking permit rates for upper campus

  15. *****I* ****f?* Fusion Programme Evaluation Board

    E-Print Network [OSTI]

    of the Community's programme in the field of Controlled Thermonuclear Fusion; to appraise the environmental, safety*****I* ****f?* Report of the Fusion Programme Evaluation Board prepared for the Commission . . . . . . . . . . . . 11 CHAPTER ONE: NUCLEAR FUSION AND ITS POTENTIAL CONTRIBUTION TO THE WORLD'S ENERGY NEEDS 1

  16. United States Nuclear Waste Technical Review Board

    E-Print Network [OSTI]

    Programs to Manage High-Level Radioactive Waste and Spent Nuclear Fuel in the United States and Other-Level Radioactive Waste and Spent Nuclear Fuel in the United States and Other Countries A Report to CongressUnited States Nuclear Waste Technical Review Board Experience Gained From Programs to Manage High

  17. Student Disability Services Student Advisory Board

    E-Print Network [OSTI]

    Gallo, Linda C.

    reported that the Storm Hall construction crew sometimes opens the staging area gate to wide and it blocks access to the wheelchair ramp by AL 204. Facilities Services needs to talk to the construction company:30 to 5pm. Patty went to the meeting as the Board's representative, but no one was there. Teresa called

  18. Advisory Board College of Health Sciences

    E-Print Network [OSTI]

    Care Hospital Dr. A. Ray Pentecost, III President Design & Health Mrs. Linda Rohrer President/Owner DPSAdvisory Board College of Health Sciences Old Dominion University 2013-2014 Chair, Ms. Jo-Ann Burke Vice President of Patient Care Services Children's Hospital of the King's Daughters Mr. Larry L. Boyles

  19. QER- Comment of State Energy Advisory Board

    Broader source: Energy.gov [DOE]

    Dear Melanie: As you are aware, QER is an area of focus for STEAB and we are working directly with EPSA on it. Attached, please find a copy of the State Energy Advisory Board's response to the Office of Energy Policy and Systems Analysis. Please feel free to contact me with any questions or comments.

  20. Approved by Ris's Board of Governors

    E-Print Network [OSTI]

    's competitive advantage as a high- technology society. Risø has particular scope for creating impact on society international standard and results in the development of comparative advantage as a high-technology societyApproved by Risø's Board of Governors 25 November 2004 Risø's strategy ­ impact on society Risø

  1. Tritium at Fermilab Fermilab Community Advisory Board

    E-Print Network [OSTI]

    Quigg, Chris

    Tritium at Fermilab Fermilab Community Advisory Board September 23, 2010 Rob Plunkett, Fermilab #12 and other equipment. #12;4 Fermilab, before Nov. 2005 Tritium is produced as part of accelerator operations: Tritium detected Our routine testing of surface water at Fermilab revealed low levels of tritium: 3

  2. The University of British Columbia BOARD PLANNING &

    E-Print Network [OSTI]

    Handy, Todd C.

    TO THE BOARD Reny Kahlon INTERNAL AUDIT Michael Hartwick OMBUDSPERSON FOR STUDENTS Shirley Nakata SECRETARY Strategic Partnership Office UBC Press Innovation Catalyst 6 Faculties and Schools UBC IT 7 Enrolment Management Services Campus and Community Planning Water and Energy Services Treasury Comptroller Office

  3. BOARD OF TRUSTEES MINUTES MARCH 12, 2013

    E-Print Network [OSTI]

    Tipple, Brett

    BOARD OF TRUSTEES MINUTES MEETING OF MARCH 12, 2013 TRUSTEES PRESENT Timothy B. Anderson Phillip W Keven Rowe Geneva Thompson Joyce P. Valdez UNIVERSITY REPRESENTATIVES PRESENT Cathy Anderson Associate Dean of Students Allyson Mower President-elect, Academic Senate Mary Parker Associate Vice President

  4. BOARD OF TRUSTEES MINUTES September 11, 2012

    E-Print Network [OSTI]

    Tipple, Brett

    BOARD OF TRUSTEES MINUTES MEETING OF September 11, 2012 TRUSTEES PRESENT Timothy B. Anderson Anderson Associate Vice President, Budget and Planning Martha S. Bradley Associate Vice President and Dean Morris Vice President, General Counsel Mary Parker Associate Vice President, Enrollment Management Thomas

  5. BOARD OF TRUSTEES MINUTES DECEMBER 13, 2011

    E-Print Network [OSTI]

    Tipple, Brett

    BOARD OF TRUSTEES MINUTES MEETING OF DECEMBER 13, 2011 TRUSTEES PRESENT Timothy B. Anderson Phillip Pack Keven Rowe Taft Price Joyce P. Valdez UNIVERSITY REPRESENTATIVES PRESENT Cathy Anderson Associate and Planning Mary Anne Berzins Assistant Vice President, Human Resources A. Lorris Betz Interim President

  6. accounting oversight board: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Accounting valuation issues Mathematics Websites Summary: investments Renewable energy Boards of directors Executive remuneration Boardroom diversity Accounting by market...

  7. NEJC Board Member Receives 2015 National Planning Excellence Award

    Broader source: Energy.gov [DOE]

    National Environmental Justice Conference, Inc. Board of Directors Member Receives American Planning Association 2015 National Planning Excellence Award

  8. [Board on Radioactive Waste Managements action on progress toward objectives

    SciTech Connect (OSTI)

    Not Available

    1994-11-28T23:59:59.000Z

    This report is a progress report to the US DOE from the Board on Radioactive Waste Management (BRWM), which summarizes the activities of the board during the period December 1, 1993 to May 2, 1994. The report summarizes the meetings of the board as a whole, of various of its subcommittees, and of activities it has undertaken to further its original mission. This board is associated with the National Research Council to give advice to US DOE.

  9. SECURING RADIO FREQUENCY IDENTIFICATION (RFID)

    E-Print Network [OSTI]

    business process for an organization; as a result, the security risks for RFID systems and the controls for an organization; as a result, the security risks for RFID systems and the controls available to address themMay 2007 SECURING RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEMS SECURING RADIO FREQUENCY

  10. UNCG Security Awareness Training & Instructions

    E-Print Network [OSTI]

    Saidak, Filip

    UNCG Security Awareness Training & Instructions 02.09.2010 Page 1 of 4 Educating UNCG faculty and staff with respect to security best practices is essential in securing the University's information University employee that works with restricted or financial data. UNCG engaged Fishnet Security, a nationally

  11. ANNUAL SECURITY & FIRE SAFETY REPORT

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

  12. Colorado Forestry Advisory Board Members: Don Ament Tom Stone

    E-Print Network [OSTI]

    #12;Colorado Forestry Advisory Board Members: Don Ament Tom Stone Commissioner of Agriculture desired benefits? The members of Colorado's Forestry Advisory Board have presented this question, Colorado Forestry Advisory Board #12;2003 Report on the Health of Colorado's Forests 1 2003 Report

  13. U.S. NUCLEAR WASTE TECHNICAL REVIEW BOARD

    E-Print Network [OSTI]

    U.S. NUCLEAR WASTE TECHNICAL REVIEW BOARD Report to January to December 2000 The U.S. Congress are available at www.nwtrb.gov, the NWTRB Web site. #12;#12;#12;NUCLEAR WASTE TECHNICAL REVIEW BOARD Dr. Jared L . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 vii Table of Contents Appendices Appendix A Nuclear Waste Technical Review Board Members

  14. Nuclear Waste Technical Review Board Strategic Plan FY 20082013

    E-Print Network [OSTI]

    169 Appendix F Nuclear Waste Technical Review Board Strategic Plan FY 2008­2013 #12;#12;Appendix F 171 Nuclear Waste Technical Review Board Strategic Plan FY 2008­2013 suMMary sTaTeMenT of The Board T he Nuclear Waste Policy Amendments Act (NWPAA) of 1987 directed the U.S. Department of Energy (DOE

  15. U.S. NUCLEAR WASTE TECHNICAL REVIEW BOARD

    E-Print Network [OSTI]

    U.S. NUCLEAR WASTE TECHNICAL REVIEW BOARD Report to The U.S. Congress And The Secretary of Energy January 1, 2003, to December 31, 2003 #12;U.S. NUCLEAR WASTE TECHNICAL REVIEW BOARD Report to The U.nwtrb.gov, the NWTRB Web site. #12;#12;#12;NUCLEAR WASTE TECHNICAL REVIEW BOARD 2003 Dr. Michael L. Corradini

  16. A T IT S A T IT S S C I E N C E SECURITY WO R ST B E S T A Special...

    Broader source: Energy.gov (indexed) [DOE]

    Better Controls Needed over Weapons-Related Information and Technology." 1990 January: Secretary of Energy Advisory Board (SEAB) is chartered as the highest level...

  17. Securing Financial Incentives for Energy Efficiency Projects: How to Create

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory Board FollowSectionSecuringCorporate

  18. Securing WLANs using 802.11i | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring WLANs using 802.11i

  19. Securing Wide Area Measurement Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring WLANs using

  20. Security Evaluations Appraisal Process Guide - April 2008 | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring WLANsMay 22,509Energy

  1. Security Framework for Control System Data Classification and Protection |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring WLANsMay

  2. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30T23:59:59.000Z

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  3. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25T23:59:59.000Z

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  4. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31T23:59:59.000Z

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  5. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22T23:59:59.000Z

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  6. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Administration FY 2011 - FY 2015 Budget Outlook Managing the NNSA 4.0% Science, Technology & Engineering 14.5% Stockpile Support 17.9% Preventing the Spread of...

  7. Evolving Secure Computer Infrastructures Computer Science Department

    E-Print Network [OSTI]

    Fulp, Errin W.

    , . . . Security research has been network oriented High-speed firewall company, GreatWall Systems Research is more, quarrying, and oil and gas extraction Petroleum and coal products manufacturing Mining Furniture related to bio-inspiration published in 2012. Of the top 10 universities, 5 were Chinese and 2 were

  8. Dynamic access policies for unconditionally secure secret

    E-Print Network [OSTI]

    Martin, Keith

    generation of cryptographic secrets · Key management in distributed environments · Multiparty computation #12 Awaji Island, Japan 2 Ueli's orders · Choose a topic related to information theoretic security · Provide an overview · Identify some open problems · Give a "nice talk" #12;ITW 2005 Awaji Island, Japan 3 A little bit

  9. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24T23:59:59.000Z

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  10. Engineering secure software 

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01T23:59:59.000Z

    breaches in the operating environment. Security breaches resulting from misuse or tnisconfiguration of the program should not be blamed on the software. T'his is a debatable position. A security breach that results from an unintentional enor... units with public key algorithms, private keys, and certificates. Any attempt to access or modify the data in these devices will render them unusable. The device contains software tools. These devices use the computer they reside on as a general...

  11. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17T23:59:59.000Z

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  12. The HMS Promotion and Review Board The HMS Promotion and Review Board (PRB) is a Standing Committee of the

    E-Print Network [OSTI]

    Paulsson, Johan

    The HMS Promotion and Review Board The HMS Promotion and Review Board (PRB) is a Standing Committee. PRB members are appointed by the Dean for Medical Education and include preclinical and clinical Resources faculty may also consult to the Board. The PRB considers all difficulties that arise with student

  13. Transportation Research Record: Journal of the Transportation Research Board, No. 2307, Transportation Research Board of the National Academies, Washington,

    E-Print Network [OSTI]

    Levinson, David M.

    141 Transportation Research Record: Journal of the Transportation Research Board, No. 2307, Transportation Research Board of the National Academies, Washington, D.C., 2012, pp. 141­149. DOI: 10. In this research, from 2008 to 2011, the authors adopted transportation board games as an instructional tool

  14. High density printed electrical circuit board card connection system

    DOE Patents [OSTI]

    Baumbaugh, Alan E. (Aurora, IL)

    1997-01-01T23:59:59.000Z

    A zero insertion/extraction force printed circuit board card connection system comprises a cam-operated locking mechanism disposed along an edge portion of the printed circuit board. The extrusions along the circuit board mate with an extrusion fixed to the card cage having a plurality of electrical connectors. The card connection system allows the connectors to be held away from the circuit board during insertion/extraction and provides a constant mating force once the circuit board is positioned. The card connection system provides a simple solution to the need for a greater number of electrical signal connections.

  15. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  16. Maximum Entry and Mandatory Separation Ages for Certain Security Employees

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-10-11T23:59:59.000Z

    The Policy in response to government-wide Office of Personnel Management regulations regarding establishment of mandatory retirement ages for employees in certain security related positions. Superseded by DOE P 310.1 Admin Chg 1, 12-1-11.

  17. Appendix 2. Board Functions PA State Board Advise Policy Contract Appointments Hiring Liaison Research Public Education Advocacy Licensing Finance Others Notes No Data

    E-Print Network [OSTI]

    Sibille, Etienne

    ,Pennsylvania Council on 1 1 Agricultural Advisory Board 1 1 Agricultural Land Preservation Board,State 1 Review, accept or reject recommendation for purchase of land Agricultural Lands Condemnation Approval Board 1 Allegheny of Water and Wastewater Systems Operators, State Board 1 1 1 Certified Real Estate Appraisers, State Board

  18. ata security feature: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

  19. National Security Technology Incubation Strategic Plan

    SciTech Connect (OSTI)

    None

    2007-01-01T23:59:59.000Z

    This strategic plan contains information on the vision, mission, business and technology environment, goals, objectives, and incubation process of the National Security Technology Incubation Program (NSTI) at Arrowhead Center. The development of the NSTI is a key goal of the National Security Preparedness Project (NSPP). Objectives to achieve this goal include developing incubator plans (strategic, business, action, and operations), creating an incubator environment, creating a support and mentor network for companies in the incubator program, attracting security technology businesses to the region, encouraging existing business to expand, initiating business start-ups, evaluating products and processes of the incubator program, and achieving sustainability of the incubator program. With the events of 9/11, the global community faces ever increasing and emerging threats from hostile groups determined to rule by terror. According to the National Nuclear Security Administration (NNSA) Strategic Plan, the United States must be able to quickly respond and adapt to unanticipated situations as they relate to protection of our homeland and national security. Technology plays a key role in a strong national security position, and the private business community, along with the national laboratories, academia, defense and homeland security organizations, provide this technology. Fostering innovative ideas, translated into relevant technologies answering the needs of NNSA, is the purpose of the NSTI. Arrowhead Center of New Mexico State University is the operator and manager of the NSTI. To develop the NSTI, Arrowhead Center must meet the planning, development, execution, evaluation, and sustainability activities for the program and identify and incubate new technologies to assist the NNSA in meeting its mission and goals. Technology alone does not give a competitive advantage to the country, but the creativity and speed with which it is employed does. For a company to succeed, it must have sustainable competitive advantages in seven key areas: geography, products and businesses, distribution, sales and service culture, efficiency, brand, and most important, people. The four strategic goals of the plan are to: 1. Identify and recruit small businesses with technology applications for national security. 2. Design and implement a national security incubator program that provides incubator services and physical space for the targeted businesses. 3. Provide business assistance and technical leadership to NSTI clients to assist in bringing their products to market. 4. Construct a new multi-tenant facility with dedicated physical space for businesses with technology applications for national security.

  20. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  1. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    her students on security of process control systems. I amcyber-security tools for process control systems. In theon the security mechanisms of process control systems, few

  2. Global Environmental Change and Human Security

    E-Print Network [OSTI]

    Kunnas, Jan

    2011-01-01T23:59:59.000Z

    with human rights, human security or environmental change ifEnvironmental Change and Human Security By Matthew, RichardChange and Human Security. Cambridge, Massachusetts &

  3. Security and United States Immigration Policy

    E-Print Network [OSTI]

    Totten, Robbie James

    2012-01-01T23:59:59.000Z

    Change and European Security. London: Brassey's. Furer,1981]. American National Security, 6th ed. Baltimore, MD:J. Wheeler. 2008. The Security Dilemma: Fear, Cooperation

  4. Energy and Security in Northeast Asia

    E-Print Network [OSTI]

    May, Michael; Johnson, Celeste; Fei, Edward; Suzuki, Tatsujiro

    1996-01-01T23:59:59.000Z

    regional cooperation on energy and security issues in Asia.Energy and Security in Northeast Asia An IGCC studycan be drawn. The energy security situation and outlook are

  5. Sandia Energy - Cyber Security for Electric Infrastructure

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Security for Electric Infrastructure Home Stationary Power Grid Modernization Cyber Security for Electric Infrastructure Cyber Security for Electric Infrastructureashoter2015...

  6. Preliminary Notice of Violation, National Security Technologies...

    Office of Environmental Management (EM)

    National Security Technologies, LLC - September 26, 2014 Preliminary Notice of Violation, National Security Technologies, LLC - September 26, 2014 September 26, 2014 Security...

  7. Personnel Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    72.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

  8. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01T23:59:59.000Z

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  9. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  10. ENVIRONMENTAL MANAGEMENT SITE-SPECIFIC ADVISORY BOARD

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny:RevisedAdvisory Board Contributions EMEM STAR Certified

  11. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMFormsGasReleaseSpeechesHallNot Logged In You must createSecurity Global

  12. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4 Self-Scrubbing:,, ,Development of NovelHigh( ( ( ( (physical security |

  13. Radiological Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City,Enriched UraniumPhysical Security Systems(PA)About| National

  14. Security Commodity Team | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook TwitterSearch-Comments Sign InNuclear Security

  15. Security Notice | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclearHomeland ScienceInnovationScience andbarrierSecurity

  16. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our InstagramStructureProposedPAGESafety Tag: Safety Displaying 1security Tag:

  17. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking OverEvaluating ' M M t345 UnlimitedSecure

  18. Secure Storage | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking OverEvaluating ' M M t345Secure Storage

  19. Next Generation National Security Leaders

    SciTech Connect (OSTI)

    Mahy, Heidi A.; Fankhauser, Jana G.; Stein, Steven L.; Toomey, Christopher

    2012-07-19T23:59:59.000Z

    It is generally accepted that the international security community faces an impending challenge in its changing leadership demographics. The workforce that currently addresses nonproliferation, arms control, and verification is moving toward retirement and there is a perceived need for programs to train a new set of experts for both technical- and policy-related functions to replace the retiring generation. Despite the perceived need, there are also indicators that there are not sufficient jobs for individuals we are currently training. If we had “right-sized” the training programs, there would not be a shortage of jobs. The extent and scope of the human resource crisis is unclear, and information about training programs and how they meet existing needs is minimal. This paper seeks to achieve two objectives: 1) Clarify the major human resource problem and potential consequences; and 2) Propose how to characterize the requirement with sufficient granularity to enable key stakeholders to link programs aimed at developing the next generations of experts with employment needs. In order to accomplish both these goals, this paper recommends establishing a forum comprised of key stakeholders of this issue (including universities, public and private sectors), and conducting a study of the human resources and resource needs of the global security community. If there is indeed a human resource crisis in the global security field, we cannot address the problem if we are uninformed. The solution may lie in training more (or fewer) young professions to work in this community – or it may lie in more effectively using our existing resources and training programs.

  20. Engineering secure software

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01T23:59:59.000Z

    the vulnerabilities based on their coverage and cost. The above modeling approach is also known as thc onion peel model due to its nature of dividing the problem space into zones of similar security. These zones represent the peels of the onion. Each zone is also... into peels based on the security considerations of the entities of the system. The model describes minimum interaction among components across peels and maximum within peels. The onion diagram includes the physical entities of the systems and not just...

  1. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

  2. Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability

    E-Print Network [OSTI]

    Ragsdale, G.

    -25, 2010 Implementing TCG Standards Within Systems ? Trusted Platform Module (TPM) ? Provides root of trust ? Secure storage ? Signing & hashing functions ? Tamper detection ? Accelerates cryptography ? TPM software stack ? Implements TCG stack... Update Session Security (symmetric key) Code and Data Integrity (memory hash) ?Secure secret storage ?TPM chip root trust secret ?Owner root trust secret ?Memory hash signature ?Standard encryption algorithm ?Standard hashing algorithm ?Tamper detection...

  3. SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011

    E-Print Network [OSTI]

    SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011 Choose brands and models of mobile devices that have the options referenced below. Use all available security options that your or sensitive university information in un-approved off-campus services, such as public cloud based services

  4. A deeper look at climate change and national security.

    SciTech Connect (OSTI)

    Baker, Arnold Barry; Backus, George A.; Romig, Alton Dale, Jr.

    2010-03-01T23:59:59.000Z

    Climate change is a long-term process that will trigger a range of multi-dimensional demographic, economic, geopolitical, and national security issues with many unknowns and significant uncertainties. At first glance, climate-change-related national security dimensions seem far removed from today's major national security threats. Yet climate change has already set in motion forces that will require U.S. attention and preparedness. The extent and uncertainty associated with these situations necessitate a move away from conventional security practices, toward a small but flexible portfolio of assets to maintain U.S. interests. Thoughtful action is required now if we are to acquire the capabilities, tools, systems, and institutions needed to meet U.S. national security requirements as they evolve with the emerging stresses and shifts of climate change.

  5. Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI

    E-Print Network [OSTI]

    Jurjens, Jan

    Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI ** , Arosha BANDARA the challenges of developing secure software systems remains an active research area in software engineering. Current research efforts have resulted in the documentation of recurring security problems as security

  6. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Herwig, Falk

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  7. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  8. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01T23:59:59.000Z

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  9. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    States Computer Emergency Readiness Team National Cyber Security Division Department of Homeland Security of Standards and Technology Gaithersburg, MD Karen Scarfone Scarfone Cybersecurity C O M P U T E R S E C U R I

  10. System security Dr Len Hamey

    E-Print Network [OSTI]

    Hamey, Len

    , firewalls, detecting intrusions) Security process cycle policy implementation administration audit risk access with firewall Use generic service banners Use intrusion detection system that can detect;2 Security Services Confidentiality service. Authentication service. Integrity service. Access Control

  11. Mass and Elite Views on Nuclear Security: US National Security Surveys 1993-1999

    SciTech Connect (OSTI)

    HERRON,KERRY G.; JENKINS-SMITH,HANK C.; HUGHES,SCOTT D.

    2000-06-01T23:59:59.000Z

    This is the fourth report in an ongoing series of studies examining how US perspectives about nuclear security are evolving in the post-Cold War era. In Volume 1 the authors present findings from a nationwide telephone survey of randomly selected members of the US general public conducted from 13 September to 14 October 1999. Results are compared to findings from previous surveys in this series conducted in 1993, 1995, and 1997, and trends are analyzed. Key areas of investigation reported in Volume 1 include evolving perceptions of nuclear weapons risks and benefits, preferences for related policy and spending issues, and views about three emerging issue areas: deterrent utility of precision guided munitions; response options to attacks in which mass casualty weapons are used; and expectations about national missile defenses. In this volume they relate respondent beliefs about nuclear security to perceptions of nuclear risks and benefits and to policy preferences. They develop causal models to partially explain key preferences, and they employ cluster analysis to group respondents into four policy relevant clusters characterized by similar views and preferences about nuclear security within each cluster. Systematic links are found among respondent demographic characteristics, perceptions of nuclear risks and benefits, policy beliefs, and security policy and spending preferences. In Volume 2 they provide analysis of in-depth interviews with fifty members of the US security policy community.

  12. Enhancing Transportation Energy Security through Advanced Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transportation Energy Security through Advanced Combustion and Fuels Technologies Enhancing Transportation Energy Security through Advanced Combustion and Fuels Technologies 2005...

  13. Line Management Perspective: National Nuclear Security Administration...

    Broader source: Energy.gov (indexed) [DOE]

    National Nuclear Security Administration (NNSA) Line Management Perspective: National Nuclear Security Administration (NNSA) Addthis Description Slide Presentation by Jim...

  14. Office of Security Assessments | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    information, personnel security, and foreign visits and assignments. Assesses the information security practices at facilities managing special access programs and...

  15. Secretary Richardson Accepts Recommendations for Improving Security...

    National Nuclear Security Administration (NNSA)

    Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

  16. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  17. Corporate Security and Conflict Outcomes 

    E-Print Network [OSTI]

    Tkach, Benjamin K

    2013-10-21T23:59:59.000Z

    militaries (Avant 2000). Existing research has shown a steady increase in the number and employment of private security firms (PSFs) over the last five decades due to expansion of global market demand for private security (Avant 2005; Dunigan 2011; Singer... prominent role in international aviation security (Abrahamsen and Williams 2011). Because PSFs are based largely on corporate profit motivations, contract fulfillment and reputation are critical for firms to secure market share. The international market...

  18. East Asian Security in 2025

    E-Print Network [OSTI]

    Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

    2008-01-01T23:59:59.000Z

    East Asian Security in 2025 Who We Are • Reagan Heavin – Energy • Adam Hudson – State Capacity • Brandon Krueger – Military • Sean O’Neil – Demographics • Griffin Rozell – Balance of Power • Matt Suma – Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean O’Neil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda • Conclusions • Projections • Drivers • Four Outcomes • Questions East Asian Security in 2025...

  19. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  20. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02T23:59:59.000Z

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  1. Security and Verification Provable cryptography

    E-Print Network [OSTI]

    Gregoire, Benjamin - Institut National de Recherche en Informatique et en Automatique, Centre de recherche Sophia Antipolis

    Security and Verification Provable cryptography Benjamin Grégoire1 Tamara Rezk1 1INRIA Sophia Antipolis - Méditerranée, France Cours de Master 2 Univerisité de Nice Sophia-Antipolis Security and Verification 1/ 33 #12;Cryptanalysis-driven Security Propose a cryptographic scheme Wait for someone to come

  2. MINIMUM SECURITY REQUIREMENTS FOR FEDERAL

    E-Print Network [OSTI]

    March 2006 MINIMUM SECURITY REQUIREMENTS FOR FEDERAL INFORMATION AND INFORMATION SYSTEMS: FEDERAL INFORMATION PROCESSING STANDARD (FIPS) 200 APPROVED BY THE SECRETARY OF COMMERCE MINIMUM SECURITY REQUIREMENTS BY THE SECRETARY OF COMMERCE Shirley Radack, EditorShirley Radack, Editor Computer Security Division

  3. RECOMMENDED SECURITY CONTROLS FOR FEDERAL

    E-Print Network [OSTI]

    May 2005 RECOMMENDED SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS: GUIDANCE FOR SELECTING COST-EFFECTIVE CONTROLS USING A RISK-BASED PROCESS Shirley Radack, Editor, Computer Security Division, Information Technology Laboratory National Institute of Standards and Technology Security controls are the management

  4. Positioning Security from electronic warfare

    E-Print Network [OSTI]

    Kuhn, Markus

    Positioning Security from electronic warfare to cheating RFID and road-tax systems Markus Kuhn;Military positioning-security concerns Electronic warfare is primarily about denying or falsifying location of the importance of global positioning security has led to the military discipline of "navigation warfare". 5 #12

  5. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  6. Foundations for Designing Secure Architectures

    E-Print Network [OSTI]

    Jurjens, Jan

    Architectures This talk: foundations for designing software architectures for secure systems, based their architectures. Will apply specialized tool-support to automatically evaluate the designs for potential security weaknesses. (Based on tutorial at WICSA 2004.) #12;Jan Jürjens, TU Munich: Foundations for Designing Secure

  7. GEORG-AUGUST-UNIVERSITT Computer Security

    E-Print Network [OSTI]

    Grabowski, Jens

    GEORG-AUGUST-UNIVERSITÄT GÖTTINGEN Computer Security Overview and Introduction Computer Security Security @ Göttingen » Research group for comuter security » Prof. Dr. Konrad Rieck » 4 PhD students (+ 2 security » Research on analysis, detection and prevention of threats » Development of intelligent security

  8. SECURITY TECHNIQUES Chris J Mitchell1

    E-Print Network [OSTI]

    Mitchell, Chris

    SECURITY TECHNIQUES Chris J Mitchell1 Introduction In this paper we consider the range of security security has been exerted. However, the techniques described are of general applicability by a security technique; in doing so we will distinguish between security features and security techniques (or

  9. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12T23:59:59.000Z

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  10. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  11. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  12. The decommodified security ratio

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    are currently experiencing: changing patterns of work, the phenom- enon she calls the "breakdown in the wage furthered by the work of the International Labour Office. In particular, the programme of researchThe decommodified security ratio: A tool for assessing European social protection systems Georges

  13. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28T23:59:59.000Z

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  14. Conceptualizing Energy Security

    E-Print Network [OSTI]

    Winzer, Christian

    Energy security is one of the main targets of energy policy. However, the term has not been clearly defined, which makes it hard to measure and difficult to balance against other policy objectives. We review the multitude of definitions of energy...

  15. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21T23:59:59.000Z

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  16. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  17. December 2003 SECURITY CONSIDERATIONS

    E-Print Network [OSTI]

    Perkins, Richard A.

    security early in the information system development life cycle (SDLC), you may be able to avoid higher, with tailoring, to any SDLC model or acquisition method the organization is using. The appendices to the guide.nist.gov/publications/nistpubs/ index.html. The System Development Life Cycle (SDLC) The system development life cycle starts

  18. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08T23:59:59.000Z

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  19. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    None

    2011-01-01T23:59:59.000Z

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  20. U.S. Nuclear Waste Technical Review Board

    E-Print Network [OSTI]

    U.S. Nuclear Waste Technical Review Board Report to The U.S. Congressand The Secretary of Energy March 1, 2006­December 31, 2007 #12;#12;U.S. Nuclear Waste Technical Review Board Report to The U in this report. #12;#12;#12;U.S. Nuclear Waste Technical Review Board B. John Garrick, Ph.D., P.E., Chairman

  1. OnTimeSecure: Secure Middleware for Federated Network Performance Monitoring

    E-Print Network [OSTI]

    Calyam, Prasad

    - driven access to related federated Network Performance Mon- itoring (NPM) services are important federated authorization entitlement policies for timely orches- tration of NPM services. On measurement resources. We validate OnTimeSecure in a federated multi-domain NPM infrastructure by performing

  2. Country Specific Subject Preference Politics / International Relations

    E-Print Network [OSTI]

    Mumby, Peter J.

    Administration Sustainable Development Climate Change / Energy Policy Politics / International Relations Cape Administration Economics Applied Security Strategy Colombia Climate Change / Energy Policy Public Administration and Finance Public Administration Climate Change and Energy Policy Politics / International Relations Jordan

  3. Relativistic graphene ratchet on semidisk Galton board

    E-Print Network [OSTI]

    Leonardo Ermann; Dima L. Shepelyansky

    2010-11-17T23:59:59.000Z

    Using extensive Monte Carlo simulations we study numerically and analytically a photogalvanic effect, or ratchet, of directed electron transport induced by a microwave radiation on a semidisk Galton board of antidots in graphene. A comparison between usual two-dimensional electron gas (2DEG) and electrons in graphene shows that ratchet currents are comparable at very low temperatures. However, a large mean free path in graphene should allow to have a strong ratchet transport at room temperatures. Also in graphene the ratchet transport emerges even for unpolarized radiation. These properties open promising possibilities for room temperature graphene based sensitive photogalvanic detectors of microwave and terahertz radiation.

  4. ENVIRONMENTAL MANAGEMENT SITE-SPECIFIC ADVISORY BOARD

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny:RevisedAdvisory Board Contributions EMEM STAR Certified Homes,|ASSESSMENTAGENDAU.S.

  5. ENVIRONMENTAL MANAGEMENT SITE-SPECIFIC ADVISORY BOARD

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny:RevisedAdvisory Board Contributions EMEM STAR CertifiedRed Lion Hotel Pasco 2525

  6. ENVIRONMENTAL MANAGEMENT SITE-SPECIFIC ADVISORY BOARD

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny:RevisedAdvisory Board Contributions EMEM STAR CertifiedRed Lion Hotel Pasco

  7. Portsmouth SSAB Board - July | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSAR - T enAmount forDecontamination andBoard - July Portsmouth

  8. Secretary of Energy Advisory Board Public Meeting

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory Board Follow Up Response from thethe US

  9. Secretary of Energy Advisory Board Public Meeting

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory Board Follow Up Response from thethe

  10. Guntersville Electric Board | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetec AG| Open EnergyGuntersville Electric Board Jump to: navigation, search

  11. Athens Utility Board | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty EditCalifornia: Energy ResourcesInformationGuide | OpenAthens Utility Board Jump

  12. Implementing Effective Enterprise Security Governance Outline for Energy Sector Executives and Boards

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy ChinaofSchaefer To:DepartmentDepartment of Energy Implementing Agreement -

  13. Type A Accident Investigation Board Report on the April 3, 1995, Security

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecember 28, 2004EnergyUranium

  14. Air Pollution Control Board (Virginia) | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Air Division in the Department of Environmental Quality and the State Air Pollution Control Board work together to control present and future sources of air pollution. The...

  15. Commonwealth of Virginia, State Air Pollution Control Board,...

    Energy Savers [EERE]

    Commonwealth of Virginia, State Air Pollution Control Board, Order by Concent Issued to Mirant Potomac River, LLC, Registration No. 70228 Commonwealth of Virginia, State Air...

  16. Oak Ridge Site Specific Advisory Board Committees | Department...

    Office of Environmental Management (EM)

    year's structure includes the Executive Committee and three subcommittees-the Board Finance and Process, Environmental Management and Stewardship, and Public Outreach. We would...

  17. Secretary of Energy Advisory Board Subcommittee Releases Shale...

    Office of Environmental Management (EM)

    Releases Shale Gas Recommendations Secretary of Energy Advisory Board Subcommittee Releases Shale Gas Recommendations August 11, 2011 - 8:54am Addthis WASHINGTON, D.C. - A diverse...

  18. Type B Accident Investigation Board Report on the November 1...

    Office of Environmental Management (EM)

    B Accident Investigation Board Report on the November 1, 1999, Construction Injury at the Monticello Mill Tailings Remedial Action Site, Monticello, Utah Type B Accident...

  19. Coldwater Board of Public Utilities- Residential Energy Efficiency Rebate Program

    Broader source: Energy.gov [DOE]

    The Coldwater Board of Public Utilities (CBPU), in conjunction with American Municipal Power's "Efficiency Smart" program, offers incentives that encourage residential customers to install energy...

  20. Type B Accident Investigation Board Report BNFL, Inc. Employee...

    Energy Savers [EERE]

    Investigation Board Report on the March 26, 1999, Worker Injury at the East Tennessee Technology Park Three-Building Decontamination and Decommissioning and Recycle Project Site...

  1. Hydrogen Storage Materials Requirements to Meet the 2017 On Board...

    Broader source: Energy.gov (indexed) [DOE]

    Download presentation slides from the "Hydrogen Storage Materials Requirements to Meet the 2017 On Board Hydrogen Storage Technical Targets" webinar presented by the U.S....

  2. Brownsville Public Utilities Board- Green Living Residential Rebate Program

    Broader source: Energy.gov [DOE]

    Brownsville Public Utilities Board offers residential customers rebates for installation of energy efficient measures. Through the Green Living Rebate program, customers can apply for rebates for...

  3. Lansing Board of Water & Light- Hometown Energy Savers Commercial Rebates

    Broader source: Energy.gov [DOE]

    Franklin Energy Services and the Lansing Board of Water & Light (LBWL) partner together to offer the Hometown Energy Savers® Commercial and Industrial Energy Efficiency Rebate Program. Eligible...

  4. On-Board Ammonia Generation Using Delphi Diesel Fuel Reformer

    Broader source: Energy.gov (indexed) [DOE]

    On-Board Ammonia Generation Using Delphi Diesel Fuel Reformer Mark Hemingway, Dr. Joachim Kupe, Joseph Bonadies, Mike Seino, Dr. John Kirwan, - Delphi Powertrain DEER, August...

  5. Hydrogen Storage Materials Requirements to Meet the 2017 On Board...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to Meet the 2017 On Board Hydrogen Storage Technical Targets Donald Anton Savannah River National Laboratory Troy Semelsberger Don Siegel Los Alamos National Laboratory...

  6. Type B Accident Investigation Board Report on the October 15...

    Energy Savers [EERE]

    on the October 15, 2001, Grout Injection Operator Injury at the Cold Test Pit South, Idaho National Engineering and Environmental Laboratory Type B Accident Investigation Board...

  7. Type B Accident Investigation Board Report of the September 29...

    Energy Savers [EERE]

    at the Separations Process Research Unit (SPRU), Building H2 Demolition, in Niskayuna, New, York Type B Accident Investigation Board Report of the September 29, 2010,...

  8. accident investigation board: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Report Physics Websites Summary: Volume 1 WIRE Mishap Investigation Board Report June 8, 1999 12;2 Table of Contents WIRE MISHAP......

  9. atca carrier board: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    architecture. For that reason PCIExpress was used as communication interface for data transmission between ATCA carrier boards and AMC modules for the new control system for...

  10. advisory board commission: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    public buildings. Joseph Penzien Chairman; Governor George Deukmejian 1990-01-01 42 Report on the TTU Ethics Advisory Board meeting on 9112014 Senator Tim Dallas reporting....

  11. National Energy Board Export and Import Reporting Regulations (Canada)

    Broader source: Energy.gov [DOE]

    These regulations of the Canadian National Energy Board are for the administration of importing and exporting energy, including natural gas and electricity.

  12. advisory board gustav: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in manure management systems. NRCS has developed a brochure and new signs1 Nutrient Management Advisory Board Approved Minutes of the April 18, 2013 Meeting Chris Hoffman...

  13. advisory board northern: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in manure management systems. NRCS has developed a brochure and new signs1 Nutrient Management Advisory Board Approved Minutes of the April 18, 2013 Meeting Chris Hoffman...

  14. advisory board savannah: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in manure management systems. NRCS has developed a brochure and new signs1 Nutrient Management Advisory Board Approved Minutes of the April 18, 2013 Meeting Chris Hoffman...

  15. advisory board public: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    use of gypsum products in manure management systems. NRCS has developed a brochure and new signs1 Nutrient Management Advisory Board Approved Minutes of the April 18, 2013...

  16. advisory board hanford: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in manure management systems. NRCS has developed a brochure and new signs1 Nutrient Management Advisory Board Approved Minutes of the April 18, 2013 Meeting Chris Hoffman...

  17. advisory board nevada: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in manure management systems. NRCS has developed a brochure and new signs1 Nutrient Management Advisory Board Approved Minutes of the April 18, 2013 Meeting Chris Hoffman...

  18. advisory board idaho: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in manure management systems. NRCS has developed a brochure and new signs1 Nutrient Management Advisory Board Approved Minutes of the April 18, 2013 Meeting Chris Hoffman...

  19. advisory board osteoporosis: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in manure management systems. NRCS has developed a brochure and new signs1 Nutrient Management Advisory Board Approved Minutes of the April 18, 2013 Meeting Chris Hoffman...

  20. advisory board paducah: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in manure management systems. NRCS has developed a brochure and new signs1 Nutrient Management Advisory Board Approved Minutes of the April 18, 2013 Meeting Chris Hoffman...

  1. advisory board portsmouth: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in manure management systems. NRCS has developed a brochure and new signs1 Nutrient Management Advisory Board Approved Minutes of the April 18, 2013 Meeting Chris Hoffman...

  2. advisory board cab: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in manure management systems. NRCS has developed a brochure and new signs1 Nutrient Management Advisory Board Approved Minutes of the April 18, 2013 Meeting Chris Hoffman...

  3. Department of Energy to Host Secretary of Energy Advisory Board...

    Energy Savers [EERE]

    of Energy will host a public meeting of the Secretary of Energy Advisory Board (SEAB) Natural Gas Subcommittee. The meeting will allow subcommittee members to hear...

  4. Type B Accident Investigation Board Report, May 8, 2004, Exothermic...

    Energy Savers [EERE]

    Report, May 8, 2004, Exothermic Metal Reactor Event During Sodium Transfer Activities, East Tennessee Technology Park, Oak Ridge, Tennessee Type B Accident Investigation Board...

  5. California State Water Resources Control Board 401 Water Quality...

    Open Energy Info (EERE)

    navigation, search OpenEI Reference LibraryAdd to library Web Site: California State Water Resources Control Board 401 Water Quality Certification Website Abstract This website...

  6. Type B Accident Investigation Board Report of the Brookhaven...

    Broader source: Energy.gov (indexed) [DOE]

    National Laboratory Employee Injury at Building 1005H on October 9, 2009 Type B Accident Investigation Board Report of the Brookhaven National Laboratory Employee Injury at...

  7. Type B Accident Investigation Board Report of the Bechtel Jacobs...

    Broader source: Energy.gov (indexed) [DOE]

    at the K-25 Building, East Tennessee Technology Park, Oak Ridge, Tennessee Type B Accident Investigation Board Report of the Bechtel Jacobs Company, LLC Employee Fall Injury on...

  8. Applying New Network Security Technologies to SCADA Systems.

    SciTech Connect (OSTI)

    Hurd, Steven A.; Stamp, Jason E. [Sandia National Laboratories, Albuquerque, NM] [Sandia National Laboratories, Albuquerque, NM; Duggan, David P. [Sandia National Laboratories, Albuquerque, NM] [Sandia National Laboratories, Albuquerque, NM; Chavez, Adrian R. [Sandia National Laboratories, Albuquerque, NM] [Sandia National Laboratories, Albuquerque, NM

    2006-11-01T23:59:59.000Z

    Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure %22traditional%22 IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators. 4This page intentionally left blank.

  9. Indirect Comprehensive Review Board (ICRB). Final Report

    SciTech Connect (OSTI)

    NONE

    1996-12-01T23:59:59.000Z

    Lockheed Martin Idaho Technologies Company (LMITCO) used a systems engineering approach to take the first step toward defining a requirements baseline for all indirect work at the Idaho National Engineering Laboratory. The intent of this effort was to define the requirements for indirect work, identify the activities necessary to meet the requirements, and to produce defensible cost estimates for the work. The result of this effort is a scrubbed-down, defensible budget for all indirect work in FY 1997. Buying power for each dollar of direct work was increased by $.02. Recommendations are identified for improvements to this process in FY 1998. The purpose of this report is twofold. First is to report the final results of the 1996 ICRB process, and second is to document the process used such that incremental improvements may be made in future years. Objectives, processes, and approaches are described to provide a trail for future boards. Appendices contain copies of board composition, documentation of the process, as well as the actual training materials.

  10. Security officer tactical training issues involving ESS equipment

    SciTech Connect (OSTI)

    Rountree, S.L.K.

    1984-01-01T23:59:59.000Z

    Security officer tactical training issues are discussed in relation to the possible implementation of the Tactical Improvement Package (TIP), utilizing the Engagement Simulation System (ESS) equipment, by nuclear power plant licensees for security officer tactical training. The ESS equipment provides the capability to simulate engagement conditions between adversaries armed with weapons which have harmless laser transmitters. A brief discussion of the TIP is presented, along with some concerns and considerations in the use of the TIP.

  11. Cooperative monitoring of regional security agreements

    SciTech Connect (OSTI)

    Pregenzer, A.L.; Vannoni, M.; Biringer, K.L. [Sandia National Labs., Albuquerque, NM (United States). Nonproliferation and Arms Control Analysis Dept.

    1996-11-01T23:59:59.000Z

    This paper argues that cooperative monitoring plays a critical role in the implementation of regional security agreements and confidence building measures. A framework for developing cooperative monitoring options is proposed and several possibilities for relating bilateral and regional monitoring systems to international monitoring systems are discussed. Three bilateral or regional agreements are analyzed briefly to illustrate different possibilities. These examples illustrate that the relationship of regional or bilateral arms control or security agreements to international agreements depends on a number of factors: the overlap of provisions between regional and international agreements; the degree of interest in a regional agreement among the international community; efficiency in implementing the agreement; and numerous political considerations. Given the importance of regional security to the international community, regions should be encouraged to develop their own infrastructure for implementing regional arms control and other security agreements. A regional infrastructure need not preclude participation in an international regime. On the contrary, establishing regional institutions for arms control and nonproliferation could result in more proactive participation of regional parties in developing solutions for regional and international problems, thereby strengthening existing and future international regimes. Possible first steps for strengthening regional infrastructures are identified and potential technical requirements are discussed.

  12. Connecting to the Internet Securely; Protecting Home Networks CIAC-2324

    SciTech Connect (OSTI)

    Orvis, W J; Krystosek, P; Smith, J

    2002-11-27T23:59:59.000Z

    With more and more people working at home and connecting to company networks via the Internet, the risk to company networks to intrusion and theft of sensitive information is growing. Working from home has many positive advantages for both the home worker and the company they work for. However, as companies encourage people to work from home, they need to start considering the interaction of the employee's home network and the company network he connects to. This paper discusses problems and solutions related to protection of home computers from attacks on those computers via the network connection. It does not consider protection of those systems from people who have physical access to the computers nor does it consider company laptops taken on-the-road. Home networks are often targeted by intruders because they are plentiful and they are usually not well secured. While companies have departments of professionals to maintain and secure their networks, home networks are maintained by the employee who may be less knowledgeable about network security matters. The biggest problems with home networks are that: Home networks are not designed to be secure and may use technologies (wireless) that are not secure; The operating systems are not secured when they are installed; The operating systems and applications are not maintained (for security considerations) after they are installed; and The networks are often used for other activities that put them at risk for being compromised. Home networks that are going to be connected to company networks need to be cooperatively secured by the employee and the company so they do not open up the company network to intruders. Securing home networks involves many of the same operations as securing a company network: Patch and maintain systems; Securely configure systems; Eliminate unneeded services; Protect remote logins; Use good passwords; Use current antivirus software; and Moderate your Internet usage habits. Most of these items do not take a lot of work, but require an awareness of the risks involved in not doing them or doing them incorrectly. The security of home networks and communications with company networks can be significantly improved by adding an appropriate software or hardware firewall to the home network and using a protected protocol such as Secure Sockets Layer (SSL), a Virtual Private Network (VPN), or Secure Shell (SSH) for connecting to the company network.

  13. Measurable Control System Security through Ideal Driven Technical Metrics

    SciTech Connect (OSTI)

    Miles McQueen; Wayne Boyer; Sean McBride; Marie Farrar; Zachary Tudor

    2008-01-01T23:59:59.000Z

    The Department of Homeland Security National Cyber Security Division supported development of a small set of security ideals as a framework to establish measurable control systems security. Based on these ideals, a draft set of proposed technical metrics was developed to allow control systems owner-operators to track improvements or degradations in their individual control systems security posture. The technical metrics development effort included review and evaluation of over thirty metrics-related documents. On the bases of complexity, ambiguity, or misleading and distorting effects the metrics identified during the reviews were determined to be weaker than necessary to aid defense against the myriad threats posed by cyber-terrorism to human safety, as well as to economic prosperity. Using the results of our metrics review and the set of security ideals as a starting point for metrics development, we identified thirteen potential technical metrics - with at least one metric supporting each ideal. Two case study applications of the ideals and thirteen metrics to control systems were then performed to establish potential difficulties in applying both the ideals and the metrics. The case studies resulted in no changes to the ideals, and only a few deletions and refinements to the thirteen potential metrics. This led to a final proposed set of ten core technical metrics. To further validate the security ideals, the modifications made to the original thirteen potential metrics, and the final proposed set of ten core metrics, seven separate control systems security assessments performed over the past three years were reviewed for findings and recommended mitigations. These findings and mitigations were then mapped to the security ideals and metrics to assess gaps in their coverage. The mappings indicated that there are no gaps in the security ideals and that the ten core technical metrics provide significant coverage of standard security issues with 87% coverage. Based on the two case studies and evaluation of the seven assessments, the security ideals demonstrated their value in guiding security thinking. Further, the final set of core technical metrics has been demonstrated to be both usable in the control system environment and provide significant coverage of standard security issues.

  14. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  15. Cyber Security & Smart Grid 

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01T23:59:59.000Z

    to complexity, proprietary nature and different management teams ? Ripe for exploitation ? Intel, Microsoft, Security vendors are not focused on this technology ? Many are NOT PC?s ? Many can be infected and the devices cannot be cleaned ESL-KT-11...-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Inherent Vulnerabilities ? Two-way communications ? Distributed connectivity ? Customer usage data ? Metering devices ? Weak authentication and access control ? Lack of adequate training ? Lack...

  16. Perceptions of Security

    E-Print Network [OSTI]

    Ura, Karma

    2001-01-01T23:59:59.000Z

    followed by guerrillas, waged by the Bhutanese militia in rugged terrain. Though not written in accounts of any battles, the form of war oral sources describe suggest unconventional warfare. The natural defence position of the terrain combined with its... nor poverty in the areas adjacent to Bhutan, which are the ultimate causes of the current security problems Bhutan faces, are unfortunately on decline. Journal of Bhutan Studies 136 On the other hand, Bhutan, like several small states, has been...

  17. Appendix A U.S. Nuclear Waste Technical Review Board

    E-Print Network [OSTI]

    7 Appendices Appendices #12;Appendix A U.S. Nuclear Waste Technical Review Board Members: Curricula to the Nuclear Waste Technical Review Board. President Clinton appointed Dr. Cohon chairman on January 17, 1997, and Asia and on energy facility siting, including nuclear waste shipping and storage. In addition to his

  18. U.S. NUCLEAR WASTE TECHNICAL REVIEW BOARD

    E-Print Network [OSTI]

    U.S. NUCLEAR WASTE TECHNICAL REVIEW BOARD Report to January 1, 2001, to January 31, 2002 The U All NWTRB reports are available at www.nwtrb.gov, the NWTRB Web site. #12;#12;#12;NUCLEAR WASTE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Appendices Appendix A U.S. Nuclear Waste Technical Review Board Members

  19. U.S. Nuclear Waste Technical Review Board Performance Evaluation

    E-Print Network [OSTI]

    Addendum A Addendum A U.S. Nuclear Waste Technical Review Board Performance Evaluation Fiscal Year 2005 The U.S. Nuclear Waste Technical Review Board The Nuclear Waste Policy Amendments Act nuclear fuel and defense high-level radioactive waste. The Act also estab lished the U.S. Nuclear Waste

  20. Other U.S. Nuclear Waste Technical Review Board Correspondence

    E-Print Network [OSTI]

    Appendix F Appendix F Other U.S. Nuclear Waste Technical Review Board Correspondence · Letter UNITED STATES NUCLEAR WASTE TECHNICAL REVIEW BOARD 2300 Clarendon Boulevard, Suite 1300 Arlington, VA: Acknowledgement of letter · Letter from Robert R. Loux, Executive Director, Nevada Agency for Nuclear Projects

  1. BRIEFING NOTE SUMMARY OF MATTERS CONSIDERED BY THE MANAGEMENT BOARD

    E-Print Network [OSTI]

    a presentation on utility costs from Mr Roalfe and noted that, because of the increases in global energy costs REPORTS 1. Monthly Reports were received from the Faculty Principals, the Principal of the Business School had been received they would be presented to the Management Board. UTILITY COSTS 9. The Board received

  2. ROWAN UNIVERSITY/RUTGERS-CAMDEN BOARD OF GOVERNORS

    E-Print Network [OSTI]

    Chen, Kuang-Yu

    for its consideration; and WHEREAS, on August 12, 2014, the Board approved the FY 2015 Operating Budget Calendar for 2014-2015 COMMENTS BY BOARD MEMBERS PUBLIC COMMENT ON NON-AGENDA ITEMS CLOSING COMMENTS is authorizing the engagement of legal services to an amount not to exceed $125,000 for fiscal year 2015

  3. Formal Session of the Board of Control Michigan Technological University

    E-Print Network [OSTI]

    2014-2015 General Fund Operating Budget N. Revision of EMC-DeLage Lease into Lease-Purchase Agreement. Board of Control Policy 6.7. Sabbatical Leave L. Board of Control Policy 8.9. Experience Tech Fee M. FY the University's overall budget reflect and support the academic priorities? 4.Are faculty personnel policies

  4. BRIEFING NOTE SUMMARY OF MATTERS CONSIDERED BY THE MANAGEMENT BOARD

    E-Print Network [OSTI]

    business plans for 2008-11. 4. The Board's attention was drawn to the increase in planned capital projects and noted that the planning and budgeting processes would be reviewed by the Planning and Finance Divisions YEAR BUSINESS PLAN 3. The Board considered an analysis of the submitted Faculty and Support Services

  5. Independent Scientific Advisory Board: Member Resume David P. Philipp

    E-Print Network [OSTI]

    Independent Scientific Advisory Board: Member Resume David P. Philipp Appointed to Board: 1999. Claussen, and D. P. Philipp. Effect of population size structure on reproductive investment of male bluegill. North American Journal of Fisheries Management 17: 516-524. 1997 Philipp, D. P., C. A. Toline, D

  6. NOTICE OF INTENT Board of Supervisors of Louisiana State University

    E-Print Network [OSTI]

    Stephens, Jacqueline

    and business practices to the procurement of goods and services and to structure other business arrangementsNOTICE OF INTENT Board of Supervisors of Louisiana State University and Agricultural and Mechanical:3139.5(5)(c)(i), notice is given that the Board of Supervisors of Louisiana State University and Agricultural

  7. BOARD TEST SHEET HDI LINK CARD NO. DATE

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    BOARD TEST SHEET HDI LINK CARD NO. DATE: Changes on card as delivered from loading company at the rear edge of the board. Verify that all mounting screws are loaded. Crowbar Overvoltage Trip Test Test high limit. Use bench top power supply with test clips on ends of leads. Clip supply leads directly

  8. ON-BOARD FUEL PROCESSING GO/NO-GO DECISION

    E-Print Network [OSTI]

    and natural gas as possible fueling options for fuel cell vehicles. Since it was uncertain whether on commercialization decision for fuel cell vehicles, DOE set an On-Board Fuel Processing Go/No-Go decision milestone-board fuel processing. The R&D focused on fuel-flexible fuel processing of gasoline, ethanol, methanol

  9. 2007 Michigan State University Board of Trustees 1 Curricular Advancements

    E-Print Network [OSTI]

    © 2007 Michigan State University Board of Trustees 1 Curricular Advancements: Tools of Engagement Valley State College Visit to Michigan State University East Lansing, Michigan September 13, 2007 MSU Tools of Engagement #12;© 2007 Michigan State University Board of Trustees 2 UOE has developed a series

  10. Proton Computed Tomography and Constructing Tracker Boards Gatlin Bredeson

    E-Print Network [OSTI]

    Belanger, David P.

    1 ABSTRACT Proton Computed Tomography and Constructing Tracker Boards By Gatlin Bredeson Scientists tomography (xCT) with proton computed tomography (pCT). During a CT scan, protons pass through a phantom University to build tracker boards to assist in creating a system that seeks to replace X-ray computed

  11. COPLANAR DIGITAL MICROFLUIDICS USING STANDARD PRINTED CIRCUIT BOARD PROCESSES

    E-Print Network [OSTI]

    Chakrabarty, Krishnendu

    COPLANAR DIGITAL MICROFLUIDICS USING STANDARD PRINTED CIRCUIT BOARD PROCESSES P.Y. Paik1 , V circuit board (PCB) and 3. Transport and mixing in an "open" microfluidic substrate. Similar to "soft-flow microfluidics, this work allows researchers to easily experiment with discrete-flow microfluidics (digital

  12. MINUTES OF THE BOARD OF REGENTS September 17, 2007

    E-Print Network [OSTI]

    Mathis, Wayne N.

    of Regents appoints Wesley G. Bush, Edsel B. Ford II, Rodney R. Lewis, Jack J. Pelton, and Matthew C. Weisman. [2007.09.10] #12;VOTED that the Board of Regents appoints Terence F. Smith to the Advisory Board Science F

  13. Information Security Management System for Microsoft's Cloud Infrastructure

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Information Security Management System for Microsoft's Cloud Infrastructure Online Services ......................................................................................................................................................................................1 Information Security Management System.......................................................................................................................7 Information Security Management Forum

  14. Implementing Information Security and Its Technology: A Line Management Perspective

    E-Print Network [OSTI]

    Barletta, William A.

    2005-01-01T23:59:59.000Z

    of an integrated information security and privacy program.An institution's information security program forms thefrom the chief information security officer, chief security

  15. 2014 Headquarters Facilities Master Security Plan - Chapter 8...

    Office of Environmental Management (EM)

    8, Operations Security Program 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program June 2014 2014 Headquarters Facilities Master Security...

  16. 2014 Headquarters Facilities Master Security Plan - Chapter 14...

    Office of Environmental Management (EM)

    4, Cyber Security 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

  17. 2014 Headquarters Facilities Master Security Plan - Chapter 1...

    Office of Environmental Management (EM)

    , Physical Security 2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 1,...

  18. 2014 Headquarters Facilities Master Security Plan - Chapter 10...

    Office of Environmental Management (EM)

    0, Security Awareness Program 2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program June 2014 2014 Headquarters Facilities Master Security Plan...

  19. 2014 Headquarters Facilities Master Security Plan - Chapter 3...

    Office of Environmental Management (EM)

    3, Personnel Security 2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 3,...

  20. Secure Learning and Learning for Security: Research in the Intersection

    E-Print Network [OSTI]

    Rubinstein, Benjamin

    2010-01-01T23:59:59.000Z

    and Alissa Dill. 2008 CISO priorities: The right objectivesbased reactive defense. The CISO risk management problem isSecurity Officer (CISO) to manage the enterprise’s