Powered by Deep Web Technologies
Note: This page contains sample records for the topic "relations board securities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Secure collaborations over message boards  

Science Conference Proceedings (OSTI)

We provide a message board model for collaborative systems, and propose an architecture and protocol for securing collaborative applications over message boards. The proposed architecture employs only efficient symmetric cryptographic principles, and ... Keywords: collaborative systems, cryptography, key predistribution, message boards, networks, secure collaboration, security, service attacks, trust modules

Mahalingam Ramkumar; Nasir Memon

2006-09-01T23:59:59.000Z

2

The Board's Role: Executive and board roles in information security  

Science Conference Proceedings (OSTI)

Corporate information in all its forms is a business asset and needs to be recognised as such. This implies that the ultimate responsibility for security must be accepted by the business and not merely delegated to a chief information security officer ...

Paul Williams

2007-08-01T23:59:59.000Z

3

Information Security and Privacy Advisory Board (ISPAB) ...  

Science Conference Proceedings (OSTI)

... of future of gov Network 2020/MTIPS/TIC Earl Crane, Director for Federal Cybersecurity, National Security Staff, The White House Tim Polk ...

2013-06-17T23:59:59.000Z

4

Information Security and Privacy Advisory Board (ISPAB) ...  

Science Conference Proceedings (OSTI)

... simulated testing set up in fifteen government facilities. ... It is essential to understand the relationship ... to present his paper on Cyber Security Doctrine. ...

2011-07-20T23:59:59.000Z

5

Related Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Los Alamos Field Office > Related Los Alamos Field Office > Related Links Related Links NNSA and Other Related Links DOE/NNSA Phonebook Freedom of Information Act Department of Energy DOE Directives DOE Jobs Online Defense Nuclear Facilities Safety Board DOE Pulse Publication DOE Office of Health, Safety and Security USA.Gov Los Alamos County Los Alamos National Laboratory LANL Phonebook National Nuclear Security Administration NNSA Service Center - Albuquerque NNSA Nevada Field Office New Mexico Environmental Department - LANL Sandia National Laboratories Waste Isolation Pilot Plant U.S. Department of Homeland Security Code of Federal Regulations Printer-friendly version Printer-friendly version Facebook Twitter Youtube Flickr General Information About Los Alamos Field Office Contact Us Employee Concerns Program

6

FAPAC-NM Executive Board | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Executive Board FAPAC-NM Executive Board "Promoting Equal Opportunity and Cultural Diversity for APAs in Government" Ligaya White Chairperson Administrative Support Assistant...

7

Disentangling the relations between safety and security  

Science Conference Proceedings (OSTI)

This article aims at a finer apprehension of the relations between safety and security, which are intrinsically and increasingly intricate. We introduce a new conceptual framework to better capture their moving perimeters. Then, we present our on-going ... Keywords: SIS, computer security, dependability, industrial control systems, safety, safety systems, security

Ludovic Pietre-Cambacedes; Claude Chaudet

2009-08-01T23:59:59.000Z

8

Defense Nuclear Facilities Safety Board Review at the Nevada National Security Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NNSS-2011-001 NNSS-2011-001 Site: Nevada National Security Site Subject: Office of Independent Oversight's Office of Environment, Safety and Health Evaluations Activity Report for the Defense Nuclear Facilities Safety Board Review at the Nevada National Security Site Dates of Activity 02/14/2011 - 02/17/2011 Report Preparer William Macon Activity Description/Purpose: The U.S. Department of Energy Office of Independent Oversight, within the Office of Health, Safety and Security (HSS), visited the Nevada Site Office (NSO) and the Nevada National Security Site (NNSS) from February 14-17, 2011. The purpose of the visit was to observe the Defense Nuclear Facilities Safety Board (DNFSB) review and maintain operational awareness of NNSS activities. Result:

9

Related Sites | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Related Sites Related Sites Related Sites Links to the following sources of information are provided as resources. Listings are obtained from government, industry and trade organizations and from other resources. B&W Corporate B&W Corporate The Babcock & Wilcox Company is a leading international provider of energy products and services. B&W Lawrence Livermore Lawrence Livermore National Laboratory helps reduce and counter threats to national and global security through the advancement and application of science and technology. B&W Pantex Located in Amarillo, Texas, the Pantex Plant supports stockpile stewardship, nonproliferation, and safeguards and security. Government System for Award Management The System for Award Management (SAM) (formerly Central Contractor

10

Related Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

The National Nuclear Security Administration The National Nuclear Security Administration Related Links Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > Related Links Related Links NNSA Lab Directed Research and Development (LDRD) Lab Directed Research and Development Collaborations DOE Adanced Scientific Computing Research DTRA (Defense Threat Reduction Agency) NAS (National Academy of Sciences) NSF (National Science Foundation) DOD (Department of Defense) NASA Exascale Activities NNSA Exascale Environment Planning Workshop ASCR Co-Design Centers Supercomputing Top 500 List ASC at Supercomputing Conference Printer-friendly version Printer-friendly version Facebook

11

Changes related to "Center for Environment and National Security...  

Open Energy Info (EERE)

Share this page on Facebook icon Twitter icon Changes related to "Center for Environment and National Security at Scripps" Center for Environment and National Security...

12

Overview: Office of the Chief Privacy Officer Security-Related ...  

Science Conference Proceedings (OSTI)

... Security Policy in Some Key Health Related Regulations Other than HIPAA DRAFT 4 ... 5 Security in Medicare Medicaid EHR Incentives Program ...

2012-06-05T23:59:59.000Z

13

CHINA-AFRICA RELATIONS GOVERNANCE, PEACE AND SECURITY  

E-Print Network (OSTI)

CHINA-AFRICA RELATIONS GOVERNANCE, PEACE AND SECURITY Editors Mulugeta Gebrehiwot Berhe and Liu Hongwu #12;CHINA-AFRICA RELATIONS GOVERNANCE, PEACE AND SECURITY Editors Mulugeta Gebrehiwot Berhe of China China's Evolving Policy towards Peace and Security in Africa: Constructing a new paradigm

Recanati, Catherine

14

DOE Annual Reports to Congress On Board-Related Activities -...  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Materials D. Department Pilot Program on External Regulation E. Department Directives III. IMPLEMENTATION OF BOARD RECOMMENDATIONS A. Recommendation Closures B. New...

15

DOE Annual Reports to Congress On Board-Related Activities -...  

NLE Websites -- All DOE Office Websites (Extended Search)

. . . . . . . . . . . . . . . . . . IV-1 APPENDICES A Orders and Departmental Safety Directives of Interest to the Board . . . . . . . . . . . . . A-1 B Site Visits Supported by...

16

Office of Security Policy - Related Links  

NLE Websites -- All DOE Office Websites (Extended Search)

Acquisition Regulation (DEAR) 952.204-2 Security Requirements Department of Energy Directives System Guidance for Contracting Officers DoD directive, Access to and Dissemination...

17

Changes related to "Center for Environment and National Security...  

Open Energy Info (EERE)

Share this page on Facebook icon Twitter icon Changes related to "Center for Environment and National Security at Scripps Feed" Center for Environment and National...

18

Homeland Security Presidential Directive 12 - Related Links  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

19

Interconnection arrangement of routers of processor boards in array of cabinets supporting secure physical partition  

DOE Patents (OSTI)

A multiple processor computing apparatus includes a physical interconnect structure that is flexibly configurable to support selective segregation of classified and unclassified users. The physical interconnect structure includes routers in service or compute processor boards distributed in an array of cabinets connected in series on each board and to respective routers in neighboring row cabinet boards with the routers in series connection coupled to routers in series connection in respective neighboring column cabinet boards. The array can include disconnect cabinets or respective routers in all boards in each cabinet connected in a toroid. The computing apparatus can include an emulator which permits applications from the same job to be launched on processors that use different operating systems.

Tomkins, James L. (Albuquerque, NM); Camp, William J. (Albuquerque, NM)

2007-07-17T23:59:59.000Z

20

Related Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Livermore Field Office > Related Links Related Links NNSA FOIA DOENNSA Telephone Directory U.S. Department of Energy Lawrence Livermore National Laboratory Printer-friendly...

Note: This page contains sample records for the topic "relations board securities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Related Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

& Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > Related Links Related Links NNSA Lab Directed Research and Development...

22

Related Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Related Links Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing Institutional Research...

23

Security  

Science Conference Proceedings (OSTI)

... Security. Organizations need standards, guidelines, and ... to support health IT implementations. HIPAA Security Rule Toolkit. ...

2011-12-05T23:59:59.000Z

24

Procurement-Related Forms | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Procurement-Related Forms Procurement-Related Forms Procurement-Related Forms The following procurement-related forms are provided in PDF fillable and/or Word format. Click the link in the "Format" column to open a copy of the form or right-click to download. To sort the table by UCN number or title, click the associated column heading. Number* Title/Description Format** UCN-04452S B&W Y-12 Subcontractor Personnel Exit Checklist PDF-fil UCN-6573 Subcontractor's Invoice for Travel and/or Services PDF-fil UCN-13816B Request for Waiver or Deviation Word UCN-13816C Request for Waiver or Deviation (Continued) Word UCN-20087A Suspect/Counterfeit Part Headmark List PDF UCN-20856 Nonpossessing Security Plan PDF-fil, Word UCN-21329 Subcontract Technical Representative (STR) Change Notice PDF-fil

25

Los Alamos National Laboratory board renews plan for education...  

NLE Websites -- All DOE Office Websites (Extended Search)

LANL board renews giving plan Los Alamos National Laboratory board renews plan for education, economic development, charitable giving The Los Alamos National Security, LLC Board of...

26

Detection of Multiple-Duty-Related Security Leakage in ...  

Science Conference Proceedings (OSTI)

... ARCHON is a digital library that federates physics ... on Software Engineering (ICSE 2005), pages ... formation Security Conference (ISC 2005), pages ...

2009-11-16T23:59:59.000Z

27

December 16, 2003, Board Public Meeting Agenda  

NLE Websites -- All DOE Office Websites (Extended Search)

16, 2003 National Nuclear Security Administration (NNSA) Sites Session 2 December 16 0900 Opening Remarks Chairman Conway 0905 Board Member Remarks Board Members 0915 Los Alamos...

28

Office of Enforcement - Safety and Security Enforcement-Related...  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Enforcement Enforcement Home Worker Safety and Health Enforcement Office of Nuclear Safety Enforcement Security Enforcement Notices of Violation Consent Orders ...

29

Annual report to Congress: Department of Energy activities relating to the Defense Nuclear Facilities Safety Board, calendar year 1998  

Science Conference Proceedings (OSTI)

This is the ninth Annual Report to the Congress describing Department of Energy (Department) activities in response to formal recommendations and other interactions with the Defense Nuclear Facilities Safety Board (Board). The Board, an independent executive-branch agency established in 1988, provides advice and recommendations to the Secretary of energy regarding public health and safety issues at the Department`s defense nuclear facilities. The Board also reviews and evaluates the content and implementation of health and safety standards, as well as other requirements, relating to the design, construction, operation, and decommissioning of the Department`s defense nuclear facilities. The locations of the major Department facilities are provided. During 1998, Departmental activities resulted in the proposed closure of one Board recommendation. In addition, the Department has completed all implementation plan milestones associated with four other Board recommendations. Two new Board recommendations were received and accepted by the Department in 1998, and two new implementation plans are being developed to address these recommendations. The Department has also made significant progress with a number of broad-based initiatives to improve safety. These include expanded implementation of integrated safety management at field sites, a renewed effort to increase the technical capabilities of the federal workforce, and a revised plan for stabilizing excess nuclear materials to achieve significant risk reduction.

NONE

1999-02-01T23:59:59.000Z

30

Annual report to Congress: Department of Energy activities relating to the Defense Nuclear Facilities Safety Board, Calendar Year 1999  

SciTech Connect

This is the tenth Annual Report to the Congress describing Department of Energy activities in response to formal recommendations and other interactions with the Defense Nuclear Facilities Safety Board (Board). The Board, an independent executive-branch agency established in 1988, provides advice and recommendations to the Secretary of Energy regarding public health and safety issues at the Department's defense nuclear facilities. The Board also reviews and evaluates the content and implementation of health and safety standards, as well as other requirements, relating to the design, construction, operation, and decommissioning of the Department's defense nuclear facilities. During 1999, Departmental activities resulted in the closure of nine Board recommendations. In addition, the Department has completed all implementation plan milestones associated with three Board recommendations. One new Board recommendation was received and accepted by the Department in 1999, and a new implementation plan is being developed to address this recommendation. The Department has also made significant progress with a number of broad-based initiatives to improve safety. These include expanded implementation of integrated safety management at field sites, opening of a repository for long-term storage of transuranic wastes, and continued progress on stabilizing excess nuclear materials to achieve significant risk reduction.

None

2000-02-01T23:59:59.000Z

31

Using equivalence relations for corrective enforcement of security policies  

Science Conference Proceedings (OSTI)

In this paper, we present a new framework of runtime security policy enforcement. Building on previous studies, we examine the enforcement power of monitors able to transform their target's execution, rather than simply accepting it if it is valid, or ... Keywords: inlined reference monitors, monitoring, program transformation, security policy enforcement

Raphal Khoury; Nadia Tawbi

2010-09-01T23:59:59.000Z

32

The EU's external energy security policy : A comparative analysis of the EU's external energy relations.  

E-Print Network (OSTI)

??This thesis analyses the EUs external energy security policy through a comparative analysis of the energy relations between the EU and important producers of natural (more)

Cook, Hanne

2011-01-01T23:59:59.000Z

33

Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security  

Science Conference Proceedings (OSTI)

SCADA (Supervisory Control and Data Acquisition), these are systems based on real-time processing, control and design for real time infrastructure such as water pumping stations, oil purification plants and rail control centers etc. In the initial structure ... Keywords: SCADA attacks, cryptography hybrid algorithm, data flow and distribution, distributed network protocole, hybrid algorithms, prevention system, secure simulation model, security issues, security services, simulation base experimentation and results, supervisory control and data acquisition (SCADA)

Shahrulniza Musa; AAmir Shahzad; Abdulaziz Aborujilah

2013-01-01T23:59:59.000Z

34

HIPAA Security Rule  

Science Conference Proceedings (OSTI)

Related ActivitiesHIPAA Security RuleHealth Information Exchange (HIE) Security Architecture. Related ... HIPAA Security Rule. NIST ...

2011-11-21T23:59:59.000Z

35

Annual report to Congress. Department of Energy activities relating to the Defense Nuclear Facilities Safety Board, calendar year 2000  

Science Conference Proceedings (OSTI)

This Annual Report to the Congress describes the Department of Energy's activities in response to formal recommendations and other interactions with the Defense Nuclear Facilities Safety Board. During 2000, the Department completed its implementation and proposed closure of one Board recommendation and completed all implementation plan milestones associated with two additional Board recommendations. Also in 2000, the Department formally accepted two new Board recommendations and developed implementation plans in response to those recommendations. The Department also made significant progress with a number of broad-based safety initiatives. These include initial implementation of integrated safety management at field sites and within headquarters program offices, issuance of a nuclear safety rule, and continued progress on stabilizing excess nuclear materials to achieve significant risk reduction.

None

2001-03-01T23:59:59.000Z

36

Quality Assurance Corporate Board | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Quality Assurance » Quality Quality Assurance » Quality Assurance Corporate Board Quality Assurance Corporate Board The Office of Environmental Management (EM) Quality Assurance Corporate Board is an executive board that includes both senior U.S. Department of Energy (DOE) and contractor representatives who are involved with construction, operating, and decommissioning projects. The Board acts in an advisory capacity to the EM Deputy Assistant Secretary for the Safety and Security Program, who is the Chief Executive Officer and Chair of the Board. Decisions on the Corporate Board's recommendations are acted on by EM senior management. The Corporate Board provides the management structure to integrate the independently managed federal and contractor Quality Assurance Programs into a single corporate entity. The Board serves as a consensus-building

37

December 11, 2002, Board letter forwarding Recommendation 2002...  

NLE Websites -- All DOE Office Websites (Extended Search)

to DOE in a Board letter dated April 23,2002. 2. During a review at the Y-12 National Security Complex, the Board noted that the fire protection program for Building 92 12 B-l...

38

December 16, 2003, Board Public Meeting - Speaker Presentations  

NLE Websites -- All DOE Office Websites (Extended Search)

Facilities Safety Board (DNFSB) and others. Our Laboratory was founded in 1952 as a nuclear weapons design laboratory, and national security continues to be our central...

39

Nuclear Security & Nonproliferation | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safety » Nuclear Security & Safety » Nuclear Security & Nonproliferation Nuclear Security & Nonproliferation Highly trained nuclear emergency response personnel and more than 17,000 pounds of equipment were sent to Japan as part of the Department of Energy and National Nuclear Security Administration’s effort to assist Japanese personnel with nuclear issues related to the Fukushima nuclear power plant. Above, scientists, technicians and engineers from the National Nuclear Security Administration’s Nevada Site Office board an Air Force C-17. | Photo courtesy of NNSA. Highly trained nuclear emergency response personnel and more than 17,000 pounds of equipment were sent to Japan as part of the Department of Energy

40

Security and Other Issues Related to Out-Processing of Employees...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of the Department of Energy's (DOE's) Los AND OBJECTIVES Alamos National Laboratory (LANL) is to enhance global security, develop technical solutions to reduce the weapons of...

Note: This page contains sample records for the topic "relations board securities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Board Public Meeting Agenda - September 10, 2003  

NLE Websites -- All DOE Office Websites (Extended Search)

(Board) Public Meetings on the Department of Energy (DOE) and the National Nuclear Security Administration (NNSA) Oversight Policy is scheduled for September 10,2003, from 9:00...

42

Cullman Power Board | Open Energy Information  

Open Energy Info (EERE)

Board Board Jump to: navigation, search Name Cullman Power Board Place Alabama Utility Id 4617 Utility Location Yes Ownership M NERC Location SERC NERC SERC Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Outdoor Lights 100 W HPS Lighting Outdoor Lights 175 W MV Lighting Outdoor Lights 400 W MV Lighting Residential Residential Security Light Service 1000 W MH Lighting Security Light Service 250 W HPS Flood Lighting Security Light Service 250 W MH Lighting Security Light Service 400 W HPS Lighting Security Light Service 400 W HPS Flood Lighting

43

December 4, 2003, Board Public Meeting - Board Member Opening Remarks  

NLE Websites -- All DOE Office Websites (Extended Search)

Armed Services Committee made reference to the goals Armed Services Committee made reference to the goals that they were setting for the Board. The "basic goals," and I ' m quoting now from its report, "The basic goals in establishing an independent safety oversight board are to assure and enhance the safety of operations of DOE's nuclear facilities, and to restore public confidence that these facilities are operated without undue risk to public health and safety. " Now the report set forth, of course, a number of responsibilities given to the Board, but the report also went on to say, "Above all, the Board should be instrumental in restoring public confidence in DOE's management capabilities, a clear prerequisite for the continued production of the nuclear materials vital to the nation's security."

44

NIST Highlight about workshop on homeland security ...  

Science Conference Proceedings (OSTI)

Workshop on Homeland Security Standards. On ... Related Links: ANSI Homeland Security Standards Panel. Contact. General ...

2011-12-14T23:59:59.000Z

45

Board on Earth Sciences and Resources and Its Activities -- Final Technical Report  

DOE Green Energy (OSTI)

The Board on Earth Sciences and Resources (BESR) provided oversight of the earth sciences and resources activities with the National Research Council (NRC). The Board reviewed research and public activities in the earth sciences; undertook analyses relevant to the discovery, supply, delivery, waste disposal and associated impacts and issues related to hydrocarbon, metallic, and nonmetallic mineral resources; and monitored the status of the earth sciences, assessed the health of the disciplines, identified research opportunities, and responded to specific agency requests for advice. These tasks were conducted by distinguished volunteers and NRC staff members that are representative of the breadth and depth of the earth sciences and resources disciplines (e.g., ecology, geophysics, geochemistry, geobiology, hydrology, geography, geographic information science, materials science, mineral resources and mining, energy resources, paleontology, visualization, remote sensing, geophysical data and information). Each year the Board held two meetings. Most recently at the May 2003 Board meeting, the main topic of discussion was Coordination of Geospatial Data in the Era of the Department of Homeland Security. Speakers were Steven Cooper, DHS; Barry Napier, FEMA; Bill Shinar, VGIN; Barbara Ryan, USGS; and Hank Garie, DOI. Other topics were Circum-Pacific Council for Energy and Mineral Resources and New Opportunities in the Geology Discipline (Pat Leahy, USGS); Challenges to Understanding Biological Change in a Fluid Landscape (Sue Haseltine, USGS); and GIS and Remote Sensing at the USDA (Rodney Brown, USDA). The Board and the AGI also held a Leadership Forum. At the October 2003 Board meeting in Irvine, California, the Board plans to discuss earth resource issues, develop a white paper on the future directions of the Board, and review two of its standing committees--Committee on Seismology and Geodynamics, and the Committee on Geological and Geotechnical Engineering. The Board will also review the status of studies under way (e.g., Research Priorities--Earth Science and Medicine) and the status of studies under development (e.g., Understanding and Confronting Terrorism). As a result of the continuous strategic planning process, the Board and its standing committees have become more active as exemplified by the increasing number of ad hoc study committees and reports published during the last few years. The Board collaborated throughout the reporting period with several NRC units (e.g., National Materials Advisory Board, Ocean Studies Board, Board on Agriculture and Natural Resources, Board on Atmospheric Sciences and Climate, and the Committee on the Human Dimensions of Global Change). The Board provided oversight of the earth sciences and resources activities at the NRC. In particular, it provided oversight of its ad hoc and continuing activities. Under NRC guidelines, the Board holds its committees' study findings confidential until reports are published.

Anthony R. de Souza, Ph.D. Director, Board on Earth Sciences and Resources

2003-09-26T23:59:59.000Z

46

School Land Board (Texas)  

Energy.gov (U.S. Department of Energy (DOE))

The School Land Board oversees the use of land owned by the state or held in trust for use and benefit by the state or one of its departments, boards, or agencies. The Board is responsible for...

47

ARM - ARM Science Board  

NLE Websites -- All DOE Office Websites (Extended Search)

Science Board Board Business About Become a User Recovery Act Mission FAQ History Organization Participants Facility Statistics Forms Contacts Facility Documents ARM Management...

48

Air Resources Board  

E-Print Network (OSTI)

The Air Resources Board (the Board or ARB) will conduct a public hearing at the time and place noted below to consider amendments to the Verifkztion

unknown authors

2003-01-01T23:59:59.000Z

49

Air Resources Board  

E-Print Network (OSTI)

The Air Resources Board (the Board or ARB) will conduct a public hearing at the time and place noted below to consider amendments to the Verification

unknown authors

2003-01-01T23:59:59.000Z

50

Information Security and Privacy Advisory Board (ISPAB) ...  

Science Conference Proceedings (OSTI)

... of Michigan Gregorg Garcia, Garcia Cyber Partners Brian ... explained how the transformation is executed - DoD is transforming IA policies ...

2013-03-08T23:59:59.000Z

51

Information Security and Privacy Advisory Board (ISPAB) ...  

Science Conference Proceedings (OSTI)

... does not become unclassified and does not leave CSP. ... can change and have a big impact, specifically on ... but is there one large weather map or ...

2013-12-24T23:59:59.000Z

52

Information Security and Privacy Advisory Board (ISPAB) ...  

Science Conference Proceedings (OSTI)

... Enhance user interface with REST design, Migrate database and web ... E-Gov Update Lisa Schlosser, Deputy CIO, Federal Government, OMB ...

2013-03-11T23:59:59.000Z

53

Information Security and Privacy Advisory Board (ISPAB)  

Science Conference Proceedings (OSTI)

... Institute of Standards and Technology (NIST), the Secretary of Commerce and the Director of the Office of Management and Budget on information ...

2013-01-15T23:59:59.000Z

54

Information Security and Privacy Advisory Board (ISPAB) ...  

Science Conference Proceedings (OSTI)

... of Intellectual Property's negative impact on jobs Economic losses ... of framework (heavy lift), creation of overlays ... Wisham Lorna First Energy visitor ...

2013-06-19T23:59:59.000Z

55

Security Perimeter  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to...

56

Office of Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

57

Office of Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

58

David Price appointed to IHMM board of directors  

NLE Websites -- All DOE Office Websites (Extended Search)

213price 03222013 David Price appointed to IHMM board of directors Donald B Johnston, LLNL, (925) 423-4902, johnston19@llnl.gov Printer-friendly David Price Global Security's...

59

Advisory Board Meets to Discuss EM Cleanup's Future | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Advisory Board Meets to Discuss EM Cleanup's Future Advisory Board Meets to Discuss EM Cleanup's Future Advisory Board Meets to Discuss EM Cleanup's Future December 6, 2012 - 12:00pm Addthis EM Principal Deputy Assistant Secretary Tracy Mustin, second from right, speaks with members of the Environmental Management Advisory Board this week as EM Deputy Assistant Secretary, Safety, Security and Quality Programs, Matthew Moury, second from left, listens. EM Principal Deputy Assistant Secretary Tracy Mustin, second from right, speaks with members of the Environmental Management Advisory Board this week as EM Deputy Assistant Secretary, Safety, Security and Quality Programs, Matthew Moury, second from left, listens. WASHINGTON, D.C. - EM Principal Deputy Assistant Secretary Tracy Mustin this week sought guidance from the Environmental Management Advisory Board

60

October 21, 2003, Board Public Meeting - Board Opening Remarks  

NLE Websites -- All DOE Office Websites (Extended Search)

MEETING MEETING + + + + + TUESDAY CCL / OCTOBER 21, 2003 L A 3 ' i . * G The Board met in the DNFSB Hearing Room at 625 Indiana Avenue, N.W., Suite 300, Washington, D.C., at 9:00 a.m., John T. Conway, Chairman, presiding. PRESENT: JOHN T. CONWAY Chairman A. J . EGGENBERGER Vice Chairman R. BRUCE MATTHEWS Board member STAFF PRESENT: RICHARD A. AZZARO General Counsel J. KENT FORTENBERRY Technical Director JAMES J. McCONNELL Deputy Technical Director KENNETH M. PUSATERI General Manager ALSO PRESENT: LINTON F. BROOKS Administrator, National Nuclear Security Administration BOB CARD Under Secretary for Energy Science & Environment Energy KYLE MCSLARROW Deputy Secretary of GLENN PODONSKY Director, Office of Independent Oversight & Performance Assurance NEAL R. GROSS

Note: This page contains sample records for the topic "relations board securities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Improved Formulations for Air-Surface Exchanges Related to National Security Needs: Dry Deposition Models  

Science Conference Proceedings (OSTI)

The Department of Homeland Security and others rely on results from atmospheric dispersion models for threat evaluation, event management, and post-event analyses. The ability to simulate dry deposition rates is a crucial part of our emergency preparedness capabilities. Deposited materials pose potential hazards from radioactive shine, inhalation, and ingestion pathways. A reliable characterization of these potential exposures is critical for management and mitigation of these hazards. A review of the current status of dry deposition formulations used in these atmospheric dispersion models was conducted. The formulations for dry deposition of particulate materials from am event such as a radiological attack involving a Radiological Detonation Device (RDD) is considered. The results of this effort are applicable to current emergency preparedness capabilities such as are deployed in the Interagency Modeling and Atmospheric Assessment Center (IMAAC), other similar national/regional emergency response systems, and standalone emergency response models. The review concludes that dry deposition formulations need to consider the full range of particle sizes including: 1) the accumulation mode range (0.1 to 1 micron diameter) and its minimum in deposition velocity, 2) smaller particles (less than .01 micron diameter) deposited mainly by molecular diffusion, 3) 10 to 50 micron diameter particles deposited mainly by impaction and gravitational settling, and 4) larger particles (greater than 100 micron diameter) deposited mainly by gravitational settling. The effects of the local turbulence intensity, particle characteristics, and surface element properties must also be addressed in the formulations. Specific areas for improvements in the dry deposition formulations are 1) capability of simulating near-field dry deposition patterns, 2) capability of addressing the full range of potential particle properties, 3) incorporation of particle surface retention/rebound processes, and. 4) development of dry deposition formulations applicable to urban areas. Also to improve dry deposition modeling capabilities, atmospheric dispersion models in which the dry deposition formulations are imbedded need better source-term plume initialization and improved in-plume treatment of particle growth processes. Dry deposition formulations used in current models are largely inapplicable to the complex urban environment. An improved capability is urgently needed to provide surface-specific information to assess local exposure hazard levels in both urban and non-urban areas on roads, buildings, crops, rivers, etc. A model improvement plan is developed with a near-term and far-term component. Despite some conceptual limitations, the current formulations for particle deposition based on a resistance approach have proven to provide reasonable dry deposition simulations. For many models with inadequate dry deposition formulations, adding or improving a resistance approach will be the desirable near-term update. Resistance models however are inapplicable aerodynamically very rough surfaces such as urban areas. In the longer term an improved parameterization of dry deposition needs to be developed that will be applicable to all surfaces, and in particular urban surfaces.

Droppo, James G.

2006-07-01T23:59:59.000Z

62

Office of Security Assistance  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

63

Texas Water Development Board | Open Energy Information  

Open Energy Info (EERE)

Development Board Development Board Jump to: navigation, search Logo: Texas Water Development Board Name Texas Water Development Board Short Name TWDB Address 1700 North Congress Avenue Place Austin, Texas Zip 78701 Phone number 512-463-7847 Website http://www.twdb.state.tx.us/ References TWDB[1] This article is a stub. You can help OpenEI by expanding it. Texas Water Development Board is an organization based in Austin, Texas. The Texas Water Development Board's (TWDB) mission is to provide leadership, planning, financial assistance, information, and education for the conservation and responsible development of water for Texas. Our mission is a vital part of Texas' overall vision and its mission and goals which relate to maintaining the viability of the state's natural resources,

64

Environmental Management Advisory Board Charter | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services » Communication & Engagement » EMAB » Environmental Services » Communication & Engagement » EMAB » Environmental Management Advisory Board Charter Environmental Management Advisory Board Charter The Environmental Management Advisory Board's (EMAB)'s most recent charter outlines the objective, structure, and scope of the Board. EMAB Charter More Documents & Publications SEAB Charter 2012 Methane Hydrate Advisory Committee Charter EM SSAB Charter Waste Management Nuclear Materials & Waste Tank Waste and Waste Processing Waste Disposition Packaging and Transportation Site & Facility Restoration Deactivation & Decommissioning (D&D) Facility Engineering Soil & Groundwater Sustainability Program Management Safety Security Quality Assurance Budget & Performance Acquisition Compliance Project Management

65

Cyberspace security: How to develop a security strategy  

E-Print Network (OSTI)

Despite all visible dividers, the Internet is getting us closer and closer, but with a great price. Our security is the price. The internatl. community is fully aware of the urgent need to secure the cyberspace as you see the multiplication of security standards and national schemes interpreting them beyond borders: ISO 15408, ISO 17799, and ISO 27001. Even though some countries, incl. the Security Big Six (SB6), are equipped with their security books and may feel relatively safe; this remains a wrong sense of security as long as they share their networks with entities of less security. The standards impose security best practices and system specifications for the development of information security management systems. Partners beyond borders have to be secure as this is only possible if all entities connected to the partnership remain secure. Unfortunately, there is no way to verify the continuous security of partners without periodic security auditing and certification, and members who do not comply should ...

Raggad, Bel G

2007-01-01T23:59:59.000Z

66

AOCS Governing Board  

Science Conference Proceedings (OSTI)

Listing of Governing Board members. AOCS Governing Board Volunteer Opportunities aocs Author authors. speakers awards call for papers committees fats global governance inform job listings member membership network oils Present Publish Serve on a c

67

Governing Board Committees  

Science Conference Proceedings (OSTI)

The Governing Board establishes and implements the the strategic goals of the Society. AOCS Executive Committee, Members-at-Large and Strategic Working Groups. Governing Board Committees AOCS History and Governance about us aocs committees contact

68

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent;...

69

TIP Advisory Board Members  

Science Conference Proceedings (OSTI)

... Visiting Scientist at Jet Propulsion Lab. ... Board of US Secretary of Energy, National Biotech Policy ... experience in technology development, feasibility ...

2011-02-02T23:59:59.000Z

70

MEP Advisory Board Webcast  

Science Conference Proceedings (OSTI)

... Circuit Board Assemblies Plastics Glass Printed Art Metal Die Casting Sand Casting CNC Machining Extrusions ECP: Services Overview ...

2012-02-17T23:59:59.000Z

71

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

72

Security Plans  

Science Conference Proceedings (OSTI)

... Appendix A Glossary - A glossary of security terms used within the security planning document. ... F, Glossary. None applicable.

2013-09-30T23:59:59.000Z

73

Security and Other Issues Related to Out-Processing of Employees at Los Alamos National Laboratory, IG-0677  

Energy.gov (U.S. Department of Energy (DOE))

The core mission of the Department of Energys (DOEs) Los AND OBJECTIVES Alamos National Laboratory (LANL) is to enhance global security, develop technical solutions to reduce the weapons of mass...

74

News: IBM launches security offensive  

Science Conference Proceedings (OSTI)

IBM has announced a major security push, representing a US$1.5 billion investment in security-related projects next year. It will partner with other security vendors to offer a set of security services targeting information assets. The services will ...

2007-11-01T23:59:59.000Z

75

OpenEI - board  

Open Energy Info (EERE)

http:en.openei.orgdatasetstaxonomyterm4340 en Alabama State Oil and Gas Board: Oil Well Records (2911 - 31811) http:en.openei.orgdatasetsnode469

The Alabama...

76

TIP Advisory Board  

Science Conference Proceedings (OSTI)

... The TIP Advisory Board reports on the general health of the Program and offers guidance on investment areas that are appropriate for TIP funding. ...

2012-07-17T23:59:59.000Z

77

Board of Directors  

Science Conference Proceedings (OSTI)

Head of Research & Development Center & 2012 TMS President, Hydro Aluminium Rolled Products GmbH. TERM:2/1/2013 4/1/2014. TMS Board Member

78

Office of Security Operations: Headquarters Security Officers (HSO) Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Officers (HSO) Program Headquarters Security Officers (HSO) Program Responsible Individual/Contact: Wayne Berkebile - (301) 903-1163 - D-320 Scope: The Headquarters Security Officer (HSO) Program was established in 1990 by the Under Secretary of Energy in order to improve communications between the Office of Headquarters Security Operations and component organizations within DOE Headquarters. It is governed by DOE Headquarters Order 472.1, Headquarters Security Officer Program, dated 3-19-2010. Each Headquarters element is required to appoint at least one HSO and an Alternate HSO. HSOs perform a wide variety of security-related functions within their element such as obtaining security badges and clearances, maintaining Security Areas, acquiring security equipment, implementing procedures for protecting classified and sensitive information, conducting security inquiries, and arranging for required security services.

79

Active security  

Science Conference Proceedings (OSTI)

In this paper we introduce active security, a new methodology which introduces programmatic control within a novel feedback loop into the defense infrastructure. Active security implements a unified programming environment which provides interfaces ... Keywords: central management, digital forensics, network security

Ryan Hand, Michael Ton, Eric Keller

2013-11-01T23:59:59.000Z

80

Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

Note: This page contains sample records for the topic "relations board securities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Science at its Best, Security at its Worst | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 18, 1999, President William J. Clinton requested that the President's Foreign Intelligence Advisory Board (PFIAB) undertake an inquiry and issue a report on "the security...

82

Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness  

Science Conference Proceedings (OSTI)

Many organizations recognize that their employees, who are often considered the weakest link in information security, can also be great assets in the effort to reduce risk related to information security. Since employees who comply with the information ... Keywords: behavioral issues of information security, compliance, information security awareness, information security management, information security policy, theory of planned behavior

Burcu Bulgurcu; Hasan Cavusoglu; Izak Benbasat

2010-09-01T23:59:59.000Z

83

International Oil and Gas Board International Oil and Gas Board...  

Open Energy Info (EERE)

Board International Oil and Gas Board Address Place Zip Website Abu Dhabi Supreme Petroleum Council Abu Dhabi Supreme Petroleum Council Abu Dhabi http www abudhabi ae...

84

Environmental Management Advisory Board Subcommittees | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EMAB » Environmental EMAB » Environmental Management Advisory Board Subcommittees Environmental Management Advisory Board Subcommittees ACQUISITION AND PROJECT MANAGEMENT SUBCOMMITTEE SUBCOMMITTEE PURPOSE: The Subcommittee will provide advice, information, and recommendations to the Assistant Secretary for Environmental Management (EM) relating to project management. Although, EM has a solid performance record for cleanup projects, EM must improve its ability to deliver all projects within cost and on schedule, thereby reducing EM's operations and maintenance costs. The Subcommittee produces reports and recommendations to the Environmental Management Advisory Board (EMAB) as necessary. Mr. David W. Swindle, Jr. (Co-Chair) Federal Services/URS Corporation Mr. G. Brian Estes (Co-Chair)

85

Framework for SCADA Security Policy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Framework for SCADA Security Policy Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc- ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi- tions, responsibilities, references, revision history, enforce- ment, and exceptions for various subjects relevant for system

86

A Game Theoretical Approach to Communication Security  

E-Print Network (OSTI)

Security solutions . . . . . . . . . . . . . . . .Practical security solutions . . . . . . . . . . . . .Communication security

Gueye, Assane

2011-01-01T23:59:59.000Z

87

Security metrics for source code structures  

Science Conference Proceedings (OSTI)

Software security metrics are measurements to assess security related imperfections (or perfections) introduced during software development. A number of security metrics have been proposed. However, all the perspectives of a software system have not ... Keywords: code quality and security., metrics, security metrics

Istehad Chowdhury; Brian Chan; Mohammad Zulkernine

2008-05-01T23:59:59.000Z

88

board | OpenEI  

Open Energy Info (EERE)

board board Dataset Summary Description The Alabama State Oil and Gas Board publishes well record permits to the public as they are approved. This dataset is comprised of 50 recent well record permits from 2/9/11 - 3/18/11. The dataset lists the well name, county, operator, field, and date approved, among other fields. State's make oil and gas data publicly available for a range of topics. Source Geological Survey of Alabama Date Released February 09th, 2011 (3 years ago) Date Updated March 18th, 2011 (3 years ago) Keywords Alabama board gas oil state well records Data application/vnd.ms-excel icon Well records 2/9/11 - 3/18/11 (xls, 28.7 KiB) Quality Metrics Level of Review Some Review Comment Temporal and Spatial Coverage Frequency Time Period License License Open Data Commons Attribution License

89

Bird-Feeding Boards  

NLE Websites -- All DOE Office Websites (Extended Search)

live here all winter. Now is the time. The simplest device is a board or a piece of plywood nailed on a window sill. It should be at least 12 inches wide and 24 inches long, set...

90

AIR RESOURCES BOARD Acknowledgements  

E-Print Network (OSTI)

This report was prepared with the assistance and support from other agencies, divisions and offices of the Air Resources Board, and private firms. Staff would especially like to thank the following individuals for their assistance in developing this proposed pathway:

Green Wastes; Green Wastes; Richard Corey; Deputy Executive Officer; Cynthia Marvin Chief; Michael Waugh Chief; Kamal Ahuja; Brian Helmowski; Wes Ingram; Ray Asregadoo (arb; Juliet Bohn (hwma; Richard Boyd (arb; Alicia Chakrabarthy (ebmud; Steven Cliff (arb; Kevin Dickison (ebmud; Jacques Franco (calrecycle

2012-01-01T23:59:59.000Z

91

Air Resources Board  

E-Print Network (OSTI)

The Air Resources Board (ARB or Board) will conduct a public hearing at the time and place noted below to consider adoption of the Proposed Airborne Toxic Control Measure (ATCM) to Reduce Formaldehyde Emissions from Composite Wood Products. The proposed ATCM would reduce the publics current exposure to formaldehyde by reducing emissions from hardwood plywood (HWPW), particleboard (PB) and medium density fiberboard (MDF) panels. The ATCM would also apply to finished goods made with these materials.

unknown authors

2007-01-01T23:59:59.000Z

92

RS-232 Led Board  

E-Print Network (OSTI)

This article demonstrates how to develop a Microchip PIC16F84 based device that supports RS-232 interface with PC. Circuit (LED Board) design and software development will be discussed. PicBasic Pro Compiler from microEngineering Labs, Inc. is used for PIC programming. Development of LED Board Control Console using C/C++ is also briefly discussed. The project requires basic work experience with Microchip PICs, serial communication and programming.

Tskhvaradze, Vladimir

2007-01-01T23:59:59.000Z

93

Security Topic Group  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Group Group Security and TEC * Tension exists between open forum concept of TEC and the ability of STG members to discuss security topics. - DOE will maintain the open forum - it will not form a subgroup of cleared members NAS Study * Some members want STG to formally recommend a fully independent review of security issues - DOE is reviewing the NAS study and has not formulated a position Security Topic Group (Continued) Classification Guide & Information Sharing Protocol * Guide is finished and undergoing internal concurrence - Slated for late September release * Protocol will be completed once the guide is issued Security-Related Lessons Learned * Lessons learned document was distributed and comments requested by the end of March Security Topic Group (Continued) SRG/CVSA Survey

94

Environment/Health/Safety/Security (EHSS): Security and Emergency Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Emergency Services Security and Emergency Services SEO Home page collage Documents Organization Chart Related Sites Fire Department Security Services EMERGENCY SERVICES The purpose of Berkeley Lab's Emergency Services is to ensure emergency resources are in maximum readiness, before, during, and after any emergency. ISSM: Integrated Safeguards and Security Management Security Updates MISSION STATEMENT: Provide integrated and efficient life safety, emergency and security services to all employees, guests, and users at the main Berkeley site and off-site facilities. Also, promote continuous improvement of the Lab's scientific and supportive activities. The core competencies of the group are: Emergency response to include fire suppression, emergency medical and hazmat response services

95

Secure Facilities & Capabilities | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Facilities SHARE Secure Facilities and Capabilities...

96

Security Enforcement Reporting Criteria | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Enforcement Reporting Criteria Security Enforcement Reporting Criteria Security Enforcement Reporting Criteria Classified information security noncompliances are categorized according to the disclosure or potential disclosure of DOE classified information placed at risk. There are two categories of noncompliances that are based on the relative severity of a classified information security incident. The categories are identified by an event category and type. Each of the two categories is further subdivided into three types based on the type of interest (security interest, management interest, and procedural interest). Security Enforcement Reporting Criteria More Documents & Publications Safety and Security Enforcement Coordinator Handbook DOE-STD-1210-2012 HQFMSP Chapter 11, Incidents of Security Concern

97

Independent Activity Report, Defense Nuclear Facilities Safety Board Public  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Defense Nuclear Facilities Safety Defense Nuclear Facilities Safety Board Public Meeting - October 2012 Independent Activity Report, Defense Nuclear Facilities Safety Board Public Meeting - October 2012 October 2012 Defense Nuclear Facilities Safety Board Public Meeting on the Status of Integration of Safety Into the Design of the Uranium Processing Facility [HIAR-Y-12-2012-10-02] The Office of Health, Safety and Security (HSS) observed the public hearing of the DNFSB review of the UPF project status for integrating safety into design. The meeting was broken into three parts: a panel discussion and questioning of National Nuclear Security Administration (NNSA) oversight and execution; a panel discussion and questioning of the B&W Y-12 Technical Services, LLC (B&W Y-12) design project team leadership; and an open public

98

Independent Activity Report, Defense Nuclear Facilities Safety Board Public  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Defense Nuclear Facilities Safety Defense Nuclear Facilities Safety Board Public Meeting - October 2012 Independent Activity Report, Defense Nuclear Facilities Safety Board Public Meeting - October 2012 October 2012 Defense Nuclear Facilities Safety Board Public Meeting on the Status of Integration of Safety Into the Design of the Uranium Processing Facility [HIAR-Y-12-2012-10-02] The Office of Health, Safety and Security (HSS) observed the public hearing of the DNFSB review of the UPF project status for integrating safety into design. The meeting was broken into three parts: a panel discussion and questioning of National Nuclear Security Administration (NNSA) oversight and execution; a panel discussion and questioning of the B&W Y-12 Technical Services, LLC (B&W Y-12) design project team leadership; and an open public

99

October 21, 2003, Board Public Meeting Testimony - Attachment 3  

NLE Websites -- All DOE Office Websites (Extended Search)

Linton Brooks, Administrator Linton Brooks, Administrator National Nuclear Security Administration W .S. Department of Energy Before the Defense Nuclear Facilities Safety Board October 2 1,2003 Mr. Chairman and Members of the Defense Nuclear Facilities Safety Board, Thank you for this opportunity to provide testimony on the National Nuclear Security Administration's (NNSA) current practices for oversight and management of the contracts and contractors that accomplish the mission assigned to NNSA under the Atomic Energy Act of 1954. We understand that the Board particularly wants to focus on the impact NNSA's reengineering may have on assuring adequate protection of the health and safety of the public and workers at NNSA's defense nuclear facilities. I fully understand my personal responsibility for assuring the safety of NNSA's

100

Independent Activity Report, Defense Nuclear Facilities Safety Board Public  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Defense Nuclear Facilities Safety Defense Nuclear Facilities Safety Board Public Meeting - October 2012 Independent Activity Report, Defense Nuclear Facilities Safety Board Public Meeting - October 2012 October 2012 Defense Nuclear Facilities Safety Board Public Meeting on the Status of Integration of Safety Into the Design of the Uranium Processing Facility [HIAR-Y-12-2012-10-02] The Office of Health, Safety and Security (HSS) observed the public hearing of the DNFSB review of the UPF project status for integrating safety into design. The meeting was broken into three parts: a panel discussion and questioning of National Nuclear Security Administration (NNSA) oversight and execution; a panel discussion and questioning of the B&W Y-12 Technical Services, LLC (B&W Y-12) design project team leadership; and an open public

Note: This page contains sample records for the topic "relations board securities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Security Cases  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

102

Security Policy  

Science Conference Proceedings (OSTI)

... M/S ACES Pvt. Ltd. Pakistan Page Security Policy ... 2013 M/S ACES Pvt. Ltd. Pakistan 5/27/2013 Page 2. [SECURITY POLICY] May 27, 2013 ...

2013-05-29T23:59:59.000Z

103

Supporting requirements engineers in recognising security issues  

Science Conference Proceedings (OSTI)

Context & motivation: More and more software projects today are security-related in one way or the other. Many environments are initially not considered security-related and no security experts are assigned. Requirements engineers often fail to recognise ... Keywords: empirical study, natural language processing, requirements analysis, secure software engineering

Eric Knauss; Siv Houmb; Kurt Schneider; Shareeful Islam; Jan Jrjens

2011-03-01T23:59:59.000Z

104

The Office of Health, Safety and Security  

NLE Websites -- All DOE Office Websites (Extended Search)

4 4 2004 BY MONTH: JAN FEB MAR APR MAY JUN JUL AUG SEP OCT NOV DEC This list last updated Friday, August 09, 2013 DECEMBER December 29, 2004, Department letter reporting completion of the Office of Environmental Management's (EM) portion of Commitment 4.2.3.3 in the 2002-1 implementation plan, Quality Assurance for Safety-Related Software at Department of Energy Defense Nuclear Facilities, which requires the assessment of EM's safety software. [HTML] [PDF] [DOC] December 23, 2004, Department letter forwarding the Department’s implementation plan in response to Board Recommendation 2004-1, Oversight of Complex, High-Hazard Nuclear Operations. [HTML] [PDF] [DOC] December 22, 2004, Department letter regarding Facility Representatives staffing and training recruitment for the National Nuclear Security Administration sites. [HTML] [PDF] [DOC]

105

Los Alamos National Laboratory board renews plan for education, economic  

NLE Websites -- All DOE Office Websites (Extended Search)

LANL board renews giving plan LANL board renews giving plan Los Alamos National Laboratory board renews plan for education, economic development, charitable giving The Los Alamos National Security, LLC Board of Governors last week approved a $3.1 million extension to the company's giving plan in Northern New Mexico. September 18, 2013 Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma physics and new materials. Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy

106

Corporate Board Meeting Minutes  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

th th Environmental Management Quality Assurance Corporate Board Meeting Minutes February 16, 2011 - Oak Ridge, TN Page 1 of 17 Voting Board Members in Attendance (general attendance sheet for the meeting is attached): *Greg Hayward - Idaho Robert Brown - Oak Ridge Ray Corey - Richland *Bill Rowland - Savannah River Bud Danielson -Chief of Nuclear Safety T.J. Jackson - EMCBC Ken Picha (chair) - Headquarters Acting EM-20 Russell McCallister - Portsmouth/Paducah Bob Murray (vice-chair) - Headquarters EM-23 No Voting Member Present - Carlsbad Jonathan (JD) Dowell - River Protection *Note: The by-laws require the voting member to be the Site Manager or assistant/deputy manager. The noted

107

The Office of Health, Safety and Security  

NLE Websites -- All DOE Office Websites (Extended Search)

to the Defense Nuclear Facilities Safety Board (DNFSB) provides effective cross-organizational leadership in resolving DNFSB-related technical and management issues...

108

Oversight Reports - Y-12 National Security Complex | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Y-12 National Security Complex Y-12 National Security Complex Oversight Reports - Y-12 National Security Complex Independent Oversight Appraisal, Y-12 National Security Complex - May 2013 Appraisal of the Uranium Processing Facility Safety Basis Preliminary Safety Design Report Process at the Y-12 National Security Complex Independent Activity Report, Defense Nuclear Facilities Safety Board Public Meeting - October 2012 Defense Nuclear Facilities Safety Board Public Meeting on the Status of Integration of Safety Into the Design of the Uranium Processing Facility [HIAR-Y-12-2012-10-02] Independent Oversight Assessment, Y-12 National Security Complex - June 2012 Assessment of Nuclear Safety Culture at the Y-12 National Security Complex Uranium Processing Facility Project Independent Oversight Review, Babcock & Wilcox Technical Services Y-12, LLC

109

Independent Activity Report, Nevada National Security Site - February 2011  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

February 2011 Independent Activity Report, Nevada National Security Site - February 2011 February 2011 Nevada National Security Site Defense Nuclear Facility Safety Board Review [ARPT-NNSS-2011-001] The U.S. Department of Energy Office of Independent Oversight, within the Office of Health, Safety and Security (HSS), visited the Nevada Site Office (NSO) and the Nevada National Security Site (NNSS) from February 14-17, 2011. The purpose of the visit was to observe the Defense Nuclear Facilities Safety Board (DNFSB) review and maintain operational awareness of NNSS activities. Independent Activity Report, Nevada National Security Site - February 2011 More Documents & Publications Independent Activity Report, Nevada National Security Site - July 2011 Independent Activity Report, Nevada National Security Site - August 2010

110

California Air Resources Board | Open Energy Information  

Open Energy Info (EERE)

Air Resources Board Jump to: navigation, search Logo: California Air Resources Board Name California Air Resources Board Place Sacramento, California Website http:www.arb.ca.gov...

111

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

112

Security Ontology for Annotating Resources  

E-Print Network (OSTI)

Abstract. Annotation with security-related metadata enables discovery of resources that meet security requirements. This paper presents the NRL Security Ontology, which complements existing ontologies in other domains that focus on annotation of functional aspects of resources. Types of security information that could be described include mechanisms, protocols, objectives, algorithms, and credentials in various levels of detail and specificity. The NRL Security Ontology is more comprehensive and better organized than existing security ontologies. It is capable of representing more types of security statements and can be applied to any electronic resource. The class hierarchy of the ontology makes it both easy to use and intuitive to extend. We applied this ontology to a Service Oriented Architecture to annotate security aspects of Web service descriptions and queries. A refined matching algorithm was developed to perform requirement-capability matchmaking that takes into account not only the ontology concepts, but also the properties of the concepts. 1

Anya Kim; Jim Luo; Myong Kang

2005-01-01T23:59:59.000Z

113

Board Staff Perspectives Quality Council  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Facilities Safety Nuclear Facilities Safety Board Th B d & T h i l S ff Q li A The Board & Technical Staff Quality Assurance Perspectives for 2011 2010 Dr. W. San Horton, PMP, CSQE Member of the Technical Staff Defense Nuclear Facilities Safety Board DISCLAIMER The ie s and opinions presented are solel the a thor's No information contained in the presentation nor an associated The views and opinions presented are solely the author's. No information contained in the presentation nor any associated discussion should be construed as official or unofficial views or positions of the Defense Nuclear Facilities Safety Board Defense Nuclear Facilities Safety Board T i Topics B i I f ti B d * Basic Information on Board * Who, what, mission, size, location * Organization of the Board and the Board's staff

114

SecureBox: National Security Through Secure Cargo Team Members  

SecureBox: National Security Through Secure Cargo Team Members: Front Row (left to right): Howard Lowdermilk, Greg Dallum, Faranak Nekoogar, Vickie ...

115

Safety, Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

116

Home Network Security  

E-Print Network (OSTI)

Home computers that are connected to the Internet are under attack and need to be secured. That process is relatively well understood, even though we do not have perfect solutions today and probably never will. Meanwhile, however, the home computing environment is evolving into a home network of multiple devices, which will also need to be secured. We have little experience with these new home networks and much research needs to be done in this area. This paper gives a view of the requirements and some of the techniques available for securing home networks.

Technology Journal Interoperable; Carl M. Ellison; Corporate Technology Group; Intel Corporation

2002-01-01T23:59:59.000Z

117

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8206,...

118

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

transparency, and security that are preconditions to the ultimate fulfillment of the Non-Proliferation Treaty's goals and ambitions. Open Source Center The Open Source Center...

119

Feb 4, 2005 --Lecture 8 Computer Security  

E-Print Network (OSTI)

Feb 4, 2005 -- Lecture 8 22C:169 Computer Security Douglas W. Jones Department of Computer Science Program Security #12;Is this program secure? A simple question only if program has no input or output in program Failure Manifestation of fault in behavior Relative to spec assumed correct! #12;Security

Jones, Douglas W.

120

Environmental Management Advisory Board Members | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

comprise the current Board: Current Members James A. Ajello EMAB Board Chair Read Bio Dennis P. Ferrigno EMAB Board Vice-Chair Read Bio Franklin E. Coffman EMAB Board...

Note: This page contains sample records for the topic "relations board securities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

UNITED STATES NUCLEAR WASTE TECHNICAL REVIEW BOARD  

E-Print Network (OSTI)

falsified documents related to work at the Yucca Mountain site. The second purpose identified the significance for the technical work at Yucca Mountain of the group of redacted e-mails that were posted summarizing areas of progress in the Yucca Mountain program; issues that, in the Board's view, require

122

The Security Content Automation Protocol (SCAP)  

Science Conference Proceedings (OSTI)

... Standard nomenclature and dictionary of security related software flaws ... Product dictionary containing over 18,000 unique ...

2012-10-26T23:59:59.000Z

123

On-board Diagnostics  

NLE Websites -- All DOE Office Websites (Extended Search)

On-board On-board Diagnostics for Big Data J. Zurawski ⇤ , S. Balasubramanian ⇤ , A. Brown ‡ , E. Kissel † , A. Lake ⇤ , M. Swany † , B. Tierney ⇤ and M. Zekauskas ‡ ⇤ Energy Sciences Network (ESnet) Lawrence Berkeley National Laboratory, Berkeley, CA, USA Email: {zurawski, sowmya, andy, bltierney}@es.net † Indiana University School of Informatics and Computing, Bloomington, IN, USA Email: {ezkissel, swany}@indiana.edu ‡ Internet2 Ann Arbor, MI, USA Email: {aaron, matt}@internet2.edu Abstract-Big science data necessitates the requirement to incorporate state-of-the-art technologies and processes into science workflows. When transferring "big data", the network infrastructure connects sites for storage, analysis and data transfer. A component that is often overlooked within the network is a robust measurement and testing infrastructure that

124

Board of Governors Awards  

NLE Websites -- All DOE Office Websites (Extended Search)

Tim Fister Earns Henderson Prize from University of Washington Tim Fister Earns Henderson Prize from University of Washington Challenge Met as APS Sends Final Chambers to LCLS A Marriage of Hardware and Hard Work Shaken but Not Stirred 2008 Rosalind Franklin Young Investigator Award APS News Archives: 2012 | 2011 | 2010 | 2009 2008 | 2007 | 2006 | 2005 2004 | 2003 | 2002 | 2001 2000 Subscribe to APS News rss feed Board of Governors Awards JUNE 3, 2008 Bookmark and Share The UChicago Argonne, LLC Board of Governors for Argonne will honor 10 employees and one child of an employee with awards at its 2008 Awards Program on Tuesday, June 24, 2008. Included in that number are two Advanced Photon Source (APS) staff members, a member of the Scientific User Facilities Directorate, and the son of another APS staffer. Outstanding Service Awards (OSAs), the highest honor the university gives

125

Security Enforcement Reporting Criteria  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Classified Information Security Noncompliance Reporting Criteria January 2012 MANDATORY SECURITY INCIDENT REPORTING Classified information security noncompliances are categorized...

126

Security Automation Conference & Workshop  

Science Conference Proceedings (OSTI)

... Security Automation Conference & Workshop. ... Richard Hale, DISA - Information Security & Security Automation in DoD (coming soon); ...

127

December 4, 2003, Board Public Meeting Transcript  

NLE Websites -- All DOE Office Websites (Extended Search)

1 1 MR. KLEIN: No, sir. CHAIRMAN CONWAY: Okay. Thank you. Anyone else have anything? We turn to Mr. Gallagher, Mr. Ronald Gallagher. We welcome you here. This is your first meeting, I think, with the Board - - MR. GALLAGHER: That's correct. CHAIRMAN CONWAY: interface with the _ _ Board in any way. We welcome you. MR. GALLAGHER : I appreciate it, Mr . Chairman, members of the Board, I appreciate the opportunity to present. I am President and Chief Executive Officer of Fluor Hanford. I assumed those duties the first week of December of this year, so I ' m relatively new at the job. I did bring along with me my Chief Operating Officer, someone I appointed only this last week into that position, George Jackson. CHAIRMAN CONWAY: Please, you ' re welcome

128

Lab announces security changes  

NLE Websites -- All DOE Office Websites (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

129

Personnel Security Program | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Personnel Security Program Home > About Us > Our Programs > Nuclear Security > Personnel Security...

130

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...

131

Energy Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

132

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

RESPONSIBILITIES RESPONSIBILITIES FSO Overview FSO Reporting Responsibilities Questions an FSOs at a Non-Possesssing Site Could Be Asked During an Audit Non-Possessing Contractor Security Requirements Plan Training for Facility Security Officers (FSOs) PHY-210DE Facility Security Officer Overview PHY-210DB, Introduction to Facility Security Officer (Self-Study Course ) Duration: 3 days Description: This correspondence course provides an overview of the roles and responsibilities of the DOE or DOE-contractor FSO. The course emphasizes facility clearance requirements, personnel security, information security, incident reporting, and other related programs. The course references the National Industrial Security Program Operating Manual (NISPOM) (DoD 5220.22-M) and a comprehensive listing of DOE orders, manuals, guides, forms, and notices.

133

BRC-Systems and Emerging Technologies Security Research ...  

Science Conference Proceedings (OSTI)

... Systems and Emerging Technologies Security Research Group Biometric Standards and Related Technical Developments. ...

2013-08-01T23:59:59.000Z

134

Switchboard: Secure, Monitored Connections for Client-Server Communication Eric Freudenthal, Lawrence Port, Tracy Pesin, Edward Keenan,  

E-Print Network (OSTI)

switchboard functionality. Section 3 presents the switch- board API, architecture, and implementations for establishing and maintaining secure and liveness-monitored connections between switch- boards on a pair- ber, the service name and credentials authorizing its switch- board to connect to S. If the request

Karamcheti, Vijay

135

V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: ModSecurity Multipart Message Parsing Security Bypass 5: ModSecurity Multipart Message Parsing Security Bypass Vulnerability V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability October 18, 2012 - 6:00am Addthis PROBLEM: ModSecurity Multipart Message Parsing Security Bypass Vulnerability PLATFORM: Modsecurity Versions prior to 2.70 ABSTRACT: SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions REFERENCE LINKS: SEC Consult Secunia Advisory SA49853 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an error when parsing multipart requests and can be exploited to bypass certain filtering rules. IMPACT: Remote Security Bypass SOLUTION: Update to version 2.70. Addthis Related Articles V-017: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities

136

December 16, 2003, Board Public Meeting - Board Opening Remarks  

NLE Websites -- All DOE Office Websites (Extended Search)

SAFETY BOARD + + + + + PUBLIC MEETING ON OVERSIGHT + + + + + TUESDAY, DECEMBER 16, 2003 + + + + + The meeting was held at 9:00 a.m., in the DNFSB Hearing Room, 625...

137

ENERGY SECURITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I · Diversify Energy Supplies for the Transportation Sector

138

December 16, 2003, Board Public Meeting - Speaker Presentations  

NLE Websites -- All DOE Office Websites (Extended Search)

Ralph E. Erickson, Manager Los Alamos Site Office National Nuclear Security Administration U.S. Department of Energy Before the Defense Nuclear Facilities Safety Board December 16, 2003 Mr. Chairman and Members of the Defense Nuclear Facilities Safety Board, Thank you for this opportunity to provide testimony on the Los Alamos Site office's current practices for oversight and management of the Los Alamos National Laboratory (LANL). There are four priorities at LANL in my mind in the following order - safety, security, environmental compliance and program. My responsibility as Manager is to ensure that my staff and the staff of the management and operating contractor carry out these four in accordance with the laws and the orders governing the DOE. To effectively accomplish

139

December 3, 2003, Board Public Meeting Speaker Presentations  

NLE Websites -- All DOE Office Websites (Extended Search)

William Brumley, Manager NNSA Y-12 Site Office U.S. Department of Energy Before the Defense Nuclear Facilities Safety Board December 3, 2003 Mr. Chairman and Members of the Defense Nuclear Facilities Safety Board, Thank you for this opportunity to provide testimony on the National Nuclear Security Administration (NNSA) Y-12 Site Office's processes for contractor oversight and our role in ensuring the missions assigned to the NNSA are accomplished. I understand that the Board has particular questions on the status of our oversight, our personnel, and our plans for future changes to our oversight model. I am prepared to address these questions for you today. I have a BS in Nuclear Engineering from North Carolina State University, am registered

140

Security Rulemaking  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

Note: This page contains sample records for the topic "relations board securities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

ENVIRONMENTAL MANAGEMENT ADVISORY BOARD U.S. Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Department of Energy Department of Energy Advisory Board Charter 1. Committee's Official Designation. Environmental Management Advisory Board (EMAB) 2. Authority. The Board is established under the authority of the U.S. Department of Energy (DOE). The Board is being renewed in accordance with the provisions of the Federal Advisory Committee Act (FACA), as amended, 5 U.S.C., App. 2. 3. Objectives and Scope of Activities. The Board provides advice and recommendations to the Assistant Secretary for Environmental Management (EM) concerning_issues affecting the EM program, including the following duties: * advice on corporate issues relating to site cleanup and risk reduction of the EM program including, but not limited to, project management and oversight, cost/benefit analyses,

142

Summary of On-Board Storage Models and Analyses  

NLE Websites -- All DOE Office Websites (Extended Search)

On-Board Storage On-Board Storage Models and Analyses R.K. Ahluwalia, T. Q. Hua and J-K Peng Hydrogen Delivery Analysis Meeting FreedomCAR and Fuels Partnership Delivery, Storage and Hydrogen Pathways Tech Teams May 8-9, 2007 Columbia, MD 2 Objective: To determine the performance of the on-board system relative to the storage targets (capacity, efficiency, etc) 1. On-Board System Configuration 2. Dehydrogenation Reactor Dehydrogenation kinetics Trickle bed hydrodynamics Dehydrogenation reactor model Reactor performance with pelletized and supported catalysts 3. System Performance Storage efficiency Storage capacity On-Board Hydrogen Storage System with a Liquid Carrier 3 Fuel Cell System with H 2 Stored in a Liquid Carrier Enthalpy Wheel Spent H 2 Fuel cell Stack Stack Coolant

143

Commonwealth of Virginia, State Air Pollution Control Board, Order by  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Commonwealth of Virginia, State Air Pollution Control Board, Order Commonwealth of Virginia, State Air Pollution Control Board, Order by Concent Issued to Mirant Potomac River, LLC, Registration No. 70228 Commonwealth of Virginia, State Air Pollution Control Board, Order by Concent Issued to Mirant Potomac River, LLC, Registration No. 70228 Docket No. EO-05-01: This is a Consent Order issued under the authority of Va. Code § § 10.1-1307D and 10.1-1307.1, between the Board and Mirant Potomac River, LLC for the purpose of ensuring compliance with ambient air quality standards incorporated at 9 VAC Chapter 30 and Va, Code § 10.1-1307.3(3) requiring certain emissions modeling and analysis related to the Potomac River Power Station located in Alexandria, Virginia, Commonwealth of Virginia, State Air Pollution Control Board, Order by

144

Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

145

Y-12 National Security Complex - Enforcement Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Y-12 National Security Complex Preliminary Notice of Violation issued to Babcock & Wilcox Technical Services Y-12, LLC related to a Uranium Chip Fire at the Y-12 National Security...

146

Security User Studies: Methodologies and Best Practices  

E-Print Network (OSTI)

Interest in usable security-- the research, development, and study of systems that are both usable and secure-- has been growing both in the CHI and information security communities in the past several years. Despite this interest, however, the process of designing and conducting security-related user studies remains extremely difficult. Users deal with security infrequently and irregularly, and most do not notice or care about security until it is missing or broken. Security is rarely a primary goal or task of users, making many traditional HCI evaluation techniques difficult or even impossible to use. This workshop will bring together researchers and practitioners from the HCI and information security communities to explore methodological challenges and best practices for conducting security-related user studies.

Serge Egelman; Jen King; Robert C. Miller; Nick Ragouzis; Erika Shehan

2006-01-01T23:59:59.000Z

147

The Office of Health, Safety and Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Legislation Safety Oversight Principles Board Policy Statements Board Strategic Plan Performance Report Board Web Site Road Map to the Board Board Web...

148

The Office of Health, Safety and Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Legislation Safety Oversight Principles Board Policy Statements Board Strategic Plan Performance Report Board Web Site Road Map to the Board Board...

149

Transportation Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

150

Web Security Standards and Practices Page 1 of 13 Web Security Standard Operating Environment (SOE) V1.doc  

E-Print Network (OSTI)

Web Security Standards and Practices Page 1 of 13 Web Security Standard Operating Environment (SOE) V1.doc Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related

Qian, Ning

151

State Oil and Gas Board State Oil and Gas Board Address Place...  

Open Energy Info (EERE)

Board State Oil and Gas Board Address Place Zip Website Alabama Oil and Gas Board Alabama Oil and Gas Board Hackberry Lane Tuscaloosa Alabama http www gsa state al us ogb ogb html...

152

December 3, 2003, Board Public Meeting - Transcript  

NLE Websites -- All DOE Office Websites (Extended Search)

2 13 14 15 16 17 18 19 2 0 21 2 2 2 3 2 4 2 5 7 Thank you. CHAIRMANCONWAY: Okay. Our first witness this morning is Dan Glenn, Manager of the Pantex Site Office, who is an employee of DOE/NNSA [National Nuclear Security Administration]. And, Dan, I will put in the record your background, which will go into the record prior to your speaking. Welcome, Dan. MR. GLENN: Thank you, sir. Well, good morning, Mr. Chairman and members of the Defense Nuclear Facilities Safety Board, and members of the audience. Thank you for this opportunity to provide testimony on the Pantex Site Office's current practices for oversight and management of our management and operating contractor activities at the Pantex Plant. Transition from the long-standing roles and responsibilities to the re-engineered NNSA

153

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

October 10, 2013 October 10, 2013 PSH-13-0071 - In the Matter of Personnel Security Hearing On October 10, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In March 2013, as part of a background investigation, the local security office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about his alcohol use and alcohol-related incidents. October 10, 2013 PSH-13-0070 - In the Matter of Personnel Security Hearing On October 10, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. Following the individual's employer receiving garnishment notices from both federal and state tax authorities in January 2013, the

154

Corporate Board By-Laws  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 2011 May 2011 By-Laws Office of Environmental Management Quality Assurance Corporate Board Article 1 Name The name shall be the Environmental Management (EM) Quality Assurance (QA) Corporate Board (hereafter referred to as the Board). Article 2 Mission The Board will serve a leadership role within EM for facilitating, championing, and overseeing the effectiveness of a consistent and graded approach to implementing the corporate QA program, policies and requirements, and disseminating lessons learned and best practices such that a consistent and effective approach to quality is obtained through independently managed federal and contractor QA Programs. The Board will serve as a consensus-building body to facilitate institutionalization of a streamlined and efficient QA

155

Message Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

156

Tag: security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

157

Montana State Land Board | Open Energy Information  

Open Energy Info (EERE)

Land Board Jump to: navigation, search Name Montana State Land Board Place Helena, Montana Website http:dnrc.mt.govLandBoardS References Webpage1 This article is a stub. You...

158

TRANSPORTATION RESEARCH BOARD Guidelines for Warranty,  

E-Print Network (OSTI)

TRANSPORTATION RESEARCH BOARD Guidelines for Warranty, Multi-Parameter, and Best Value Contracting TRANSPORTATION RESEARCH BOARD EXECUTIVE COMMITTEE 2001 OFFICERS Chair: John M. Samuels, Senior Vice President Director, Utah DOT Executive Director: Robert E. Skinner, Jr., Transportation Research Board MEMBERS

Sheridan, Jennifer

159

National Security Technology Center | Y-12 National Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Security and Training National Security ... National Security Technology Center What kinds of security technologies are we talking about? See our capabilities...

160

Lemnos Interoperable Security Program  

Science Conference Proceedings (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

Note: This page contains sample records for the topic "relations board securities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013  

E-Print Network (OSTI)

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013 BACKGROUND The Allied Security Scholarship was established by Allied Security to assist students to undertake full-time study at the University of Waikato. REGULATIONS 1. The Scholarship shall be known as the Allied Security Scholarship. 2

Waikato, University of

162

Physical Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Report - Independent Oversight Inspection of Safeguards and Security and Cyber Security at the Y-12 Site Office and the Y-12 National Security Complex (U), January...

163

Security for grids  

E-Print Network (OSTI)

S. Kent, R. Atkinson. Security Architecture for the InternetTsudik, S. Tuecke. A Security Architecture for ComputationalComputer and Communications Security Conference, pp. 83-92,

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-01-01T23:59:59.000Z

164

Taxation and Social Security  

E-Print Network (OSTI)

Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

Kaplow, Louis

2006-01-01T23:59:59.000Z

165

Security and Elections  

E-Print Network (OSTI)

World Conf. Information Security Education, 2007, pp. 1724;Security andElections IEEE Security & Privacy, 10(5):6467, Sept. -

Bishop, Matt; Peisert, Sean

2012-01-01T23:59:59.000Z

166

The Office of Health, Safety and Security  

NLE Websites -- All DOE Office Websites (Extended Search)

A General Description A General Description The Defense Nuclear Facilities Safety Board (Board) is an independent organization within the executive branch chartered with the responsibility of providing recommendations and advice to the President and the Secretary of Energy regarding public health and safety issues at Department of Energy (Department) defense nuclear facilities. In operation since in October 1989, the Board reviews and evaluates the content and implementation of health and safety standards, as well as other requirements, relating to the design, construction, operation, and decommissioning of the Department's defense nuclear facilities. The Board consists of five Board members appointed by the President for staggered five year terms. The Board is supported by almost 100 technical and administrative staff personnel and an annual budget of $22 million. The Board's enabling legislation authorizes a staff of up to 150 personnel. The Board headquarters is located in Washington D.C., at 625 Indiana Avenue NW. Ten Board staff personnel are currently on two-three year rotational assignment at the following DOE sites: Los Alamos, Livermore, Pantex, Hanford, Oak Ridge, and Savannah River.

167

Alternative Energy Development Board | Open Energy Information  

Open Energy Info (EERE)

Development Board Jump to: navigation, search Name Alternative Energy Development Board Place Islamabad, Pakistan Product Islamabad-based autonomous body under the Ministry of...

168

Surface Transportation Board Website Citations | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Surface Transportation Board Website Citations Surface Transportation Board Website Citations Presentation made by Ray English for the NTSF annual meeting held from May 14-16, 2013...

169

Coldwater Board of Public Utilities - Commercial & Industrial...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

here Home Savings Coldwater Board of Public Utilities - Commercial & Industrial Lighting Rebate Program Coldwater Board of Public Utilities - Commercial & Industrial Lighting...

170

APS Engineering Support Division | Service Coordination Board  

NLE Websites -- All DOE Office Websites (Extended Search)

Coordination Board (SCB) Service Coordination Board Meeting Reports Septemeber, 2013 August, 2013 July, 2013 June, 2013 May, 2013 April, 2013 March, 2013 February, 2013...

171

December 3, 2003, Board Public Meeting - Agenda  

NLE Websites -- All DOE Office Websites (Extended Search)

3 0900 Opening Remarks Chairman Conway 0905 Board Member Remarks Board Members 0915 Pantex Plant Daniel E.Glenn Manager, Pantex Site Office Michael B. Mallory General...

172

December 4, 2003, Board Public Meeting Agenda  

NLE Websites -- All DOE Office Websites (Extended Search)

Remarks Chairman Conway 0905 Board Member Remarks Board Members 0915 Savannah River Site Jeffrey M. Allison Manager, Savannah River Operations Office Robert A. Pedde President,...

173

Java Security  

Science Conference Proceedings (OSTI)

From the Publisher:With a market share of almost 70%, Java can be rightly called the programming language of the Web. Java security allows transmission of sensitive information, stores sensitive data, ensures that code is from a trusted source, and ensures ...

Madhushree Ganguli

2002-11-01T23:59:59.000Z

174

December 3, 2003, Board Public Meeting - Board Opening Remarks  

NLE Websites -- All DOE Office Websites (Extended Search)

PUBLIC MEETING ON OVERSIGHT PUBLIC MEETING ON OVERSIGHT + + + + + WEDNESDAY DECEMBER 3 , 2003 + + + + + The Board met in the Defense Nuclear Facilities Safety Board Hearing Room at 625 Indiana Avenue, N.W. , Suite 300, Washington, D.C., at 9 : 0 0 a.m., John T. Conway, Chairman, presiding. PRESENT JOHN T. CONWAY A.J. EGGENBERGER JOHN E. MANSFIELD R. BRUCE MATTHEWS STAFF PRESENT RICHARD A. AZZARO JAMES J. McCONNELL KENNETH M. PUSATERI ALSO PRESENT DANIEL E. GLENN MICHAEL B. MALLORY WILLIAM J. BRUMLY DENNIS R. RUDDY Chairman Vice Chairman Board Member Board Member General Counsel Deputy Technical Director General Manager Manager, Pantex Site Office General Manager, BWXT Pantex, LLC Manager, Y-12 Site Office General Manager, BWXT Y-12, LLC NEAL R. GROSS COURT REPORTERS AND TRANSCRIBERS

175

U.S. Nuclear Command and Control System Support Staff, "Assessment Report: Department of Energy Nuclear Weapons-Related Security Oversight Process," March 1998  

E-Print Network (OSTI)

August 5, 1977 DOE, "Plutonium: The First 50 Years. United States Plutonium Production, Acquisition, and Utilization from 1944 Through 1994 GAO/RCED-92-39, "Nuclear Security: Safeguards and Security Weaknesses at DOE's Weapons Facilities," December 13, 1991 GAO/RCED/AIMD-95-5, "Nuclear Nonproliferation: U.S. International Nuclear Materials Tracking Capabilities are Limited," December 27, 1994 GAO/AIMD-95-165, "Department of Energy: Poor Management of Nuclear Materials Tracking Capabilities Are Limited," August 3, 1995 Classified DOE report.

Gao Rced- Major

1999-01-01T23:59:59.000Z

176

Environmental Management Advisory Board (EMAB) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Environmental Management Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) MISSION The mission of the Environmental Management Advisory Board is to provide independent and external advice, information, and recommendations to the

177

The Editorial Board  

E-Print Network (OSTI)

About the Journal The International C2 Journal was created in 2006 at the urging of an international group of command and control professionals including individuals from academia, industry, government, and the military. The Command and Control Research Program (CCRP, of the U.S. Office of the Assistant Secretary of Defense for Networks and Information Integration, or OASD-NII) responded to this need by bringing together interested professionals to shape the purpose and guide the execution of such a journal. Today, the Journal is overseen by an Editorial Board comprising representatives from many nations. Opinions, conclusions, and recommendations expressed or implied within are solely those of the authors. They do not necessarily represent the views of the Department of Defense, or any other U.S. Government agency. Rights and Permissions: All articles published in the International C2 Journal remain the intellectual property of the authors and may not be distributed or sold without the express written consent of the authors. For more information Visit us online at: www.dodccrp.org

Paul W. Phister, Jr.; The; International C Journal; David S. Alberts; Chairman Of The Editorial Board; Reiner Huber (deu; Universitaet Der Bundeswehr Muenchen

2010-01-01T23:59:59.000Z

178

IT issues on homeland security and defense  

Science Conference Proceedings (OSTI)

This paper surveys remarkable incidents that were related to the Homeland Security and Defense such as terrors, disasters and cyber-attacks and overviews the existing projects given by the department of Homeland Security and Defense of the US government. ... Keywords: and cyber threats, emergency readiness, homeland defense, homeland security, terror and disaster control

Kangbin Yim; Ilsun You

2011-08-01T23:59:59.000Z

179

Homeland Security Presidential Directive 12  

NLE Websites -- All DOE Office Websites (Extended Search)

HSPD-12 Home HSPD-12 FAQs About the DOE HSPD-12 Badge HSPD-12 Reporting Metrics for OMB HSPD-12 Implementation Progress Guidance Related Links HSS Logo Homeland Security...

180

Physical Security Systems | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

Note: This page contains sample records for the topic "relations board securities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

182

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements...

183

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Security Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials...

184

Information Security: Coordination of Federal Cyber Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research...

185

Formalizing information security knowledge  

Science Conference Proceedings (OSTI)

Unified and formal knowledge models of the information security domain are fundamental requirements for supporting and enhancing existing risk management approaches. This paper describes a security ontology which provides an ontological structure for ... Keywords: information security, risk management, security ontology

Stefan Fenz; Andreas Ekelhart

2009-03-01T23:59:59.000Z

186

Cyber Security Evaluations Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Home Sub Offices Security Evaluations Cyber Security Evaluations Emergency Management Oversight Environment, Safety and Health Evaluations Mission &...

187

Safety and Security  

Science Conference Proceedings (OSTI)

*. Bookmark and Share. Safety and Security. ... National and International Standards for X-ray Security Screening Applications. ...

2013-07-29T23:59:59.000Z

188

Cryptographic and Security Testing  

Science Conference Proceedings (OSTI)

Directory of Accredited Laboratories. Cryptographic and Security Testing. ... TX. atsec information security corporation, Austin, TX [200658- 0] VA. ...

2013-12-27T23:59:59.000Z

189

Computer Security Division Homepage  

Science Conference Proceedings (OSTI)

Computer Security Division. ... The 2012 Computer Security Division Annual Report (Special Publication 800-165) is now available. ...

2013-09-12T23:59:59.000Z

190

Mobile Security and Forensics  

Science Conference Proceedings (OSTI)

Mobile Security and Forensics. Summary: The goal of the project is to improve the security of mobile devices and software. ...

2013-01-15T23:59:59.000Z

191

National Security Initiatives | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Bioinformatics Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Initiatives SHARE National...

192

Global Security 2009  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security *Intelligence *Hyper Innovation Global Security Weapons & Complex Integration NIF Office of Strategic Outcomes Operations & Business Lawrence Livermore National...

193

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration Finding of No Significant Impact for the Construction and Operation of a New Office Building and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area Office 528 35th Street Los Alamos, N M 8 7 5 4 4 DEPARTMENT OF ENERGY. NATIONAL NUCLEAR SECUIRTY ADMINISTRATION FINDING OF NO SIGNIFICANT INIPACT Construction and Operation of a New Office Building and Related Structures withinTA-3 at Los Alarnos National Laboratory, Los Alamos. New Mexico FINAL ENVIRONMENTAL ASSESSMENT: The Environmental Assessment (EA) for Construction and Operation of a New Office Building and Related Structures within TA-3 at L os Alamos National Laboratory, Los Alamos, New Mexico (DOE/EA- 7 375)

194

Cyber Security Incidents, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Reporting Computing Security Incidents Reporting Computing Security Incidents Incident Reporting Hotline: 631-344-8484 Security Incidents A computer security incident can range from a simple virus to the disclosure of sensitive information. Incidents can be minor, important, or significant. Incidents that must be reported include computer or network related activity, internal or external to the Laboratory, that may impact the Laboratory's mission. Examples of such activities include: the possibility of: loss of data; denial of services; compromise of computer security; unauthorized access to data that the Laboratory is required to control by law, regulation, or DOE orders; investigative activity by legal, law enforcement, bureaucratic, or political authorities; or a public relations embarrassment.

195

The Office of Health, Safety and Security  

NLE Websites -- All DOE Office Websites (Extended Search)

I I OVERVIEW 1. INTRODUCTION. This Manual presents the process the Department of Energy (Department) will use to interface with the Defense Nuclear Facilities Safety Board (Board) and its staff. The requirements and guidance in this Manual apply to Departmental personnel, including employees of the National Nuclear Security Administration (NNSA), who are to use this Manual to facilitate the quality and responsiveness of the Departmental interactions with the Board and its staff. Attachment 1, Contractor Requirements Document (CRD), provides requirements that can be applied to contractors and subcontractors responsible for managing and operating Departmental facilities, as adapted to meet site-specific needs. Contractor compliance with the CRD will be required consistent with the conditions set forth in the controlling contract.

196

February 3, 2004, Board Public Meetings on Oversight - Board...  

NLE Websites -- All DOE Office Websites (Extended Search)

PRESENT RICHARD A. AZZARO General Counsel BRIG. GEN. RONALD J. HAECKLE USAF National Nuclear Security Administration J. KENT FORTENBERRY Technical Director KENNETH M. PUSATERI...

197

HAN System Security Requirements  

Science Conference Proceedings (OSTI)

This report, "Home Area Network (HAN) Security Requirements," identifies and discusses the key cyber security requirements for different interfaces of HAN-based systems. These cyber security requirements for HAN interfaces are derived from the Department of Homeland Security (DHS) "Catalog of Control Systems Security," which provides an excellent checklist of general security requirements.

2009-12-22T23:59:59.000Z

198

Security seal  

DOE Patents (OSTI)

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

199

The U.S. Nuclear Waste Technical Review Board Status Update  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NWTRB NWTRB www.nwtrb.gov U.S. Nuclear Waste Technical Review Board The U S Nuclear Waste Technical Review Board The U.S. Nuclear Waste Technical Review Board Status Update Presented to: National Transportation Stakeholders Forum Presented By: National Transportation Stakeholders Forum Mark Abkowitz May 11, 2011 The Board's Statutory Mandate * The 1987 amendments to the Nuclear Waste Policy Act (NWPA) established the U S Nuclear Waste Technical Review Board established the U.S. Nuclear Waste Technical Review Board. * The Board evaluates the technical and scientific validity of DOE activities related to: - transportation, packaging and storage of spent nuclear fuel (SNF) and high-level radioactive waste (HLW) - site characterization, design, development, and operations of facilities for

200

Enforcement Documents - Nevada National Security Site | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nevada National Security Site Nevada National Security Site Enforcement Documents - Nevada National Security Site November 13, 2007 Enforcement Letter, National Security Technologies LLC,- November 13, 2007 Enforcement Letter issued to National Security Technologies, LLC related to an Unplanned Radiological Exposure during a Borehole Activity at the Nevada Test Site May 21, 2007 Enforcement Letter, National Security Technologies, LLC - May 21, 2007 Enforcement Letter issued to National Security Technologies, LLC related to Nuclear Safety Quality Assurance Requirements Deficiencies at the Nevada Test Site April 1, 2004 Enforcement Letter, Bechtel Nevada - April 1, 2002 Enforcement Letter issued to Bechtel Nevada related to Noncompliances with Occupational Radiation Protection and Quality Assurance Requirements at the

Note: This page contains sample records for the topic "relations board securities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

State Oil and Gas Boards | Open Energy Information  

Open Energy Info (EERE)

Boards Boards Jump to: navigation, search State Oil and Gas Board and Commission sites are related to oil and gas production, well sites, and any other relevant data and information. The Interstate Oil and Gas Compact Commission is a multi-state government agency that promotes the quality of life for all Americans. This list is where information for OpenEI pages is held, and also, in most cases, where oil and gas data can be derived, open to the public. In many cases, EIA may hold the data related to Oil and Gas. Also, some datasets may only contain a state report pdf, in which case the data would need to be pulled out of the pdf and put into an excel or xml. Here are the states: State link Information Contact info Alabama Alabama Oil and Gas Board The State Oil and Gas Board of Alabama is a regulatory agency of the State of Alabama with the statutory charge of preventing waste and promoting the conservation of oil and gas while ensuring the protection of both the environment and the correlative rights of owners. The Board is granted broad authority in Alabama oil and gas conservation statutes to promulgate and enforce rules and regulations to ensure the conservation and proper development of Alabama's petroleum resources. 420 Hackberry Lane Tuscaloosa, AL 35401 205.349.2852

202

Usable Security in Smart Homes  

E-Print Network (OSTI)

AbstractA number of technologies are emerging that enable the creation of Smart Homes, which are households containing numerous networked devices all interacting with each other over the home network. As these Smart Homes become increasingly prevalent and users become more reliant on mobile devices to handle sensitive information, research related to the development of a usable security framework for Smart Homes is increasing in importance. In this paper, we first give some of the motivating use cases for such a security framework. We then describe some of the design challenges presented by the creation of usable Smart Home security frameworks. With an emphasis on usability, we proceed to highlight the hardships users face when interacting with currently available security frameworks and substantiate the need for a significant improvement in this field. Finally, we summarize and conclude. Key words: Smart Home, home networking, security, usability.

Saad Shakhshir; Dimitris Kalofonos

2005-01-01T23:59:59.000Z

203

Tank Waste Corporate Board | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Tank Waste Corporate Board Tank Waste Corporate Board Tank Waste Corporate Board The Tank Waste Corporate Board is a chartered group of senior DOE, contractor, and laboratory managers and staff that meets approximately semi-annually to formulate and coordinate implementation of an effective and efficient national Tank Waste program. August 1, 2012 Tank Waste Corporate Board Meeting 08/01/12 The following documents are associated with the Tank Waste Corporate Board Meeting held on August 1st, 2012. November 18, 2010 Tank Waste Corporate Board Meeting 11/18/10 The following documents are associated with the Tank Waste Corporate Board Meeting held on November 18th, 2010. July 29, 2009 Tank Waste Corporate Board Meeting 07/29/09 The following documents are associated with the Tank Waste Corporate Board

204

Public Safety/Security Programs and Projects  

Science Conference Proceedings (OSTI)

... Sciences Division related to public safety and security ... extreme conditions for areas critical to US ... for the Detection of Special Nuclear Materials Last ...

2010-09-22T23:59:59.000Z

205

Employee Concerns Reporting Form | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

subcontractor fulfilling the DOENNSA's mission have the right and responsibility to report concerns relating to the environment, safety, health, security, fraud, waste, abuse or...

206

Enforcement Letter, National Security Technologies, LLC - May...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 21, 2007 Enforcement Letter issued to National Security Technologies, LLC related to Nuclear Safety Quality Assurance Requirements Deficiencies at the Nevada Test Site The...

207

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

208

Security rules versus Security properties Mathieu Jaume  

E-Print Network (OSTI)

Security rules versus Security properties Mathieu Jaume SPI ­ LIP6 ­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

Paris-Sud XI, Université de

209

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

210

Security Procedures Caltech Campus Security Dispatch  

E-Print Network (OSTI)

Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: · Remain calm · Notify Campus Security Dispatch · Do NOT move victim EARTHQUAKE When

Goddard III, William A.

211

Obfuscation (IND-CPA Security Circular Security)  

E-Print Network (OSTI)

Obfuscation (IND-CPA Security Circular Security) (Draft Version, 24 October 2013) Antonio@cs.au.dk 2 Aarhus University, Denmark, orlandi@cs.au.dk Abstract Circular security is an important notion for public-key encryption schemes and is needed by several cryptographic protocols. In circular security

International Association for Cryptologic Research (IACR)

212

Nonproliferation & International Security | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

213

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

214

December 3, 2003, Board Public Meeting Speaker Presentations  

NLE Websites -- All DOE Office Websites (Extended Search)

7 7 TESTIMONY Daniel E. Glenn, Manager Pantex Site Office National Nuclear Security Administration U. S. Department of Energy Before the Defense Nuclear Facilities Safety Board December 3 and 4, 2003 Mr. Chairman and Members of the Defense Nuclear Facilities Safety Board, Thank you for this opportunity to provide testimony on the Pantex Site Office's (PXSO) current practices for oversight and management of the Management and Operating contractor activities at the Pantex Plant. Transition from the long-standing roles and responsibilities to the re-engineered NNSA presents some challenges, but these changes are needed as we strive to improve the effectiveness, efficiency, and most importantly the safety of our site operations. I fully support the NNSA Reengineering effort and believe that appropriate level of Contractor

215

December 4, 2003, Board Public Meeting - Board Opening Remarks  

NLE Websites -- All DOE Office Websites (Extended Search)

r r ' PUBLIC MEETING + + + + + THURSDAY DECEMBER 4, 2003 + + + + + The Board met in the DNFSB Hearing Room at 625 Indiana Avenue, N.W., Suite 300, Washington, D.C., at 9:00 a.m., John T. Conway, Chairman, presiding. PRESENT JOHN T. CONWAY A.J. EGGENBERGER JOHN E. MANSFIELD R. BRUCE MATTHEWS STAFF PRESENT RICHARD A. AZZARO J. KENT FORTENBERRY JAMES J . McCONNELL KENNETH M. PUSATERI ALSO PRESENT JESSIE ROBERSON JEFFERY M. ALLISON KEITH A. KLEIN FRAZER R. LOCKHART Chairman Vice Chairman Board Member Board Member General Counsel Technical Director Deputy Technical Director General Manager Asst. Secretary, Environmental Management, DOE Manager, DOE, Savannah River Operations Office Manager, DOE, Richland Operations Office Manager, DOE, Rocky Flats Field Off ice

216

Metaphors for cyber security.  

SciTech Connect

This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

2008-08-01T23:59:59.000Z

217

Independent Activity Report, Y-12 National Security Complex - June 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Y-12 National Security Complex - June Y-12 National Security Complex - June 2011 Independent Activity Report, Y-12 National Security Complex - June 2011 June 2011 Site Lead Orientation Visit to the Y-12 Site Office and Y-12 National Security Complex [HIAR-Y-12-2011-06-23] The purposes of the visit were to discuss the nuclear safety oversight strategy, initiate the site lead program, increase operational awareness of the site's activities, and discuss methods the Office of Health, Safety and Security (HSS) uses to carry out its independent oversight responsibilities. Independent Activity Report, Y-12 National Security Complex - June 2011 More Documents & Publications Independent Activity Report, Oak Ridge Office - June 2011 Independent Activity Report, Defense Nuclear Facilities Safety Board Public

218

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... approach to protect critical federal missions and business functions ... security areas such physical security, personnel security, continuity of operations ...

219

Definition: Cyber Security Incident | Open Energy Information  

Open Energy Info (EERE)

Security Incident Security Incident Jump to: navigation, search Dictionary.png Cyber Security Incident Any malicious act or suspicious event that: Compromises, or was an attempt to compromise, the Electronic Security Perimeter or Physical Security Perimeter of a Critical Cyber Asset, or, Disrupts, or was an attempt to disrupt, the operation of a Critical Cyber Asset.[1] Related Terms Electronic Security Perimeter References ↑ Glossary of Terms Used in Reliability Standards An LikeLike UnlikeLike You like this.Sign Up to see what your friends like. inline Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Cyber_Security_Incident&oldid=480296" Categories: Definitions ISGAN Definitions What links here Related changes Special pages Printable version

220

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

Note: This page contains sample records for the topic "relations board securities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

222

Summary Minutes of the Secretary of Energy Advisory Board Public Meeting on  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Summary Minutes of the Secretary of Energy Advisory Board Public Summary Minutes of the Secretary of Energy Advisory Board Public Meeting on October 12, 2011 Summary Minutes of the Secretary of Energy Advisory Board Public Meeting on October 12, 2011 SEAB members heard opening remarks from Chairman Perry and Secretary Chu. Secretary Chu gave a presentation on DOE in the innovation chain. Following Secretary Chu's opening session was a "Director's Perspective" from George Miller, LLNL Director. Dr. Miller's presentation was followed by presentations from LLNL on the National Ignition Facility (NIF), cyber security, and computational advances in applied energy. Following the lab presentations, the Board heard updates from the Natural Gas Subcommittee and the Building Efficiency Subcommittee. The last session of the meeting

223

Secretary of Energy Advisory Board U.S. Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U.S. Department of Energy Advisory Committee Charter 1. Committee's Official Designation. Secretary of Energy Advisory Board (SEAB). 2. Authority. This charter establishes the Secretary of Energy Advisory Board (SEAB or the Board) under the authority of the U.S. Department of Energy (DOE). SEAB is being renewed in accordance with the provisions of the Federal Advisory Committee Act (FACA), as amended, 5 U.S.C. App. 2. 3. Objectives and Scope of Activities. The Board will provide advice and recommendations to the Secretary of Energy on the Department's basic and applied research and development activities, economic and national security policy, educational issues, operational issues, and on any other activities and operations of the Department of Energy as the Secretary may direct.

224

Summary Minutes of the Secretary of Energy Advisory Board Public Meeting on  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Minutes of the Secretary of Energy Advisory Board Public Minutes of the Secretary of Energy Advisory Board Public Meeting on October 12, 2011 Summary Minutes of the Secretary of Energy Advisory Board Public Meeting on October 12, 2011 SEAB members heard opening remarks from Chairman Perry and Secretary Chu. Secretary Chu gave a presentation on DOE in the innovation chain. Following Secretary Chu's opening session was a "Director's Perspective" from George Miller, LLNL Director. Dr. Miller's presentation was followed by presentations from LLNL on the National Ignition Facility (NIF), cyber security, and computational advances in applied energy. Following the lab presentations, the Board heard updates from the Natural Gas Subcommittee and the Building Efficiency Subcommittee. The last session of the meeting

225

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

226

District Superintendent and School Board President Perceptions Regarding Leadership Characteristics for Superintendents of Texas Schools  

E-Print Network (OSTI)

ABSTRACT District Superintendent and School Board President Perceptions regarding Leadership Characteristics for Superintendents of Texas Schools. (December 2009) Kenneth Lee Groholski, B.S., Sam Houston State University M.Ed., Tarleton State University Chair of Advisory Committee: Dr. John R. Hoyle The purpose of this study was to compare the perceptions of Texas Public School superintendents and school board presidents on the importance of leadership characteristics of the superintendency. The questionnaire used in this study was developed by Dr. Douglas D. Wilson and modified by the researcher. Responses to a Likert Scale instrument and a nominal ranking of ten leadership characteristics were solicited from superintendents and school board presidents of Texas public schools. The population was superintendents and school board presidents from Texas Public Schools. The population was divided into large school districts (>10,000 students) and small school districts (school board relations significantly higher than school board presidents. 2. Superintendents of small schools may view the importance of instructional leadership, prior work experience in education, and effective school board relations significantly higher than school board presidents of small schools. Conversely, school board presidents of small schools may view the focus on professional development significantly higher than superintendents of small schools. 3. Superintendents of large schools may view the importance of instructional leadership, comfort with media relations and politics, and effective school board relations significantly higher than school board presidents of large schools. 4. Regardless of school size, superintendents and school board presidents appeared to be in agreement concerning the three least important superintendent leadership characteristics.

Groholski, Kenneth L.

2009-12-01T23:59:59.000Z

227

Cyber and Network Security Homepage  

Science Conference Proceedings (OSTI)

Cyber and Network Security. Cyber and network security is focused on ensuring three security objectives of information ...

2010-10-05T23:59:59.000Z

228

Security Components and Mechanisms Group  

Science Conference Proceedings (OSTI)

Security Components and Mechanisms Group. Welcome. ... A security checklist is a document that contains instructions for securely configuring ...

2013-01-17T23:59:59.000Z

229

Bioinformatics Systems | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Cyber Security Nuclear Forensics Bioinformatics Videos Workshops National Security Home | Science & Discovery | National Security | Initiatives | Bioinformatics SHARE...

230

GAO Information Security Issues Update  

Science Conference Proceedings (OSTI)

... Critical IT Systems & Infrastructure - NNSA Supercomputers CP & Security - State Security System - Wireless Security - IRS e*File ...

2010-10-08T23:59:59.000Z

231

September 10, 2010 HSS Briefing to the Defense Nuclear Facilities Safety Board (DNFSB) on Union Activities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Labor Union and Stakeholder Labor Union and Stakeholder Outreach and Collaboration Office of Health, Safety and Security Briefing to the Defense Nuclear Facilities Safety Board Briefing to the Defense Nuclear Facilities Safety Board Leadership Commitment Leadership Commitment " h "It is imperative that we communicate and establish relationships with those elements that train manage and elements that train, manage and represent our workforce to improve the safety culture at DOE sites." safety culture at DOE sites. Glenn S. Podonsky Chief Health, Safety and Security Officer 2 History History History History October 2006: Formation of HSS to provide an integrated DOE HQ-level function for health, safety, environment, and security into one unified office. February 2007: Established HSS Focus Group -

232

Border Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

233

October 21, 2003, Board Public Meeting Testimony - Attachment 6  

NLE Websites -- All DOE Office Websites (Extended Search)

Glenn Podonsky Glenn Podonsky Director, Office of Independent Oversight and Performance Assurance U.S. Department of Energy Before the DFfense Nuclear Facilities Safety Board October 21,2003 Introductory Remarks Thank you, Mr. Chairman, for inviting me to testify today. My office - the Office of Independent Oversight and Performance Assurance - was established by the Secretary of Energy as the independent evaluation element of the Department's integrated oversight system. We are responsible for evaluating environment, safety, and health; emergency management; cyber security; and safeguards and security programs at Department of Energy sites. Consistent with the scope of this hearing, I will focus my testimony today on our safety oversight role. Role of Independent Oversight

234

Framework for SCADA Security Policy (October 2005) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Framework for SCADA Security Policy (October 2005) Framework for SCADA Security Policy (October 2005) Framework for SCADA Security Policy (October 2005) Modern automation systems used in infrastruc-ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc-ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi-tions, responsibilities, references, revision history, enforce-ment, and exceptions for various subjects relevant for system security. It covers topics including the overall security risk management program, data security, platforms,

235

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Thermal thermal environments different from regulatory standards. Packaging, Transport, Storage & Security

236

Designing security into software  

E-Print Network (OSTI)

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

237

CAMPUS SECURITY CARD REQUISITION  

E-Print Network (OSTI)

CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

238

2013 Secretary of Energy Advisory Board Members | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 Secretary of Energy Advisory Board Members 2013 Secretary of Energy Advisory Board Members 2013 Advisory Board Members John Deutch MIT Chemist, Former Under Secretary of Energy...

239

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

240

Security guide for subcontractors  

Science Conference Proceedings (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "relations board securities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Security Strategies for the Smart Grid: Protecting the ... Overview: The Government Smart Card Interoperability ... Mar 2001, An Introduction to IPsec ...

242

Personnel Security Program | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

243

Radiological Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

244

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Standards. ITL January 1999, Jan 1999, Secure Web-Based Access to High Performance Computing Resources. ITL November ...

245

Lawrence Berkeley National Laboratory Advisory Board  

NLE Websites -- All DOE Office Websites (Extended Search)

Article Former Intel CEO Craig Barrett to Chair Berkeley Lab Advisory Board October 2011 At its semi-annual meeting earlier this month, the Berkeley Lab Advisory Board said...

246

TRANSPORTATION RESEARCH BOARD Testing and Inspection Levels  

E-Print Network (OSTI)

TRANSPORTATION RESEARCH BOARD Testing and Inspection Levels for Hot-Mix Asphaltic Concrete Overlays, Editorial AssistantCHRISTOPHER HEDGES, Senior Program Officer TRANSPORTATION RESEARCH BOARD EXECUTIVE COMMITTEE 2000 OFFICERS Chair: Martin Wachs, Director, Institute of Transportation Studies, University

Sheridan, Jennifer

247

Empowering Advisory Board Members: Building Partnerships AAAbbbssstttrrraaacccttt  

E-Print Network (OSTI)

Empowering Advisory Board Members: Building Partnerships AAAbbbssstttrrraaacccttt BBuuiillddiinngg council members are often asked to assist in building partnerships and communicating with policymakers for communication at each political level. #12;Empowering Advisory Board Members: Building Partnerships 1

Hayes, Jane E.

248

Insulation board and process of making  

DOE Patents (OSTI)

Insulation board capable of bearing a load without significant loss of insulating capacity due to compression, produced by a method wherein the board is made in compliance with specified conditions of time, temperature and pressure.

Nowobilski, Jeffert J. (Orchard Park, NY); Owens, William J. (Kenmore, NY)

1985-01-01T23:59:59.000Z

249

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Program Home Office of Security and Cyber Evaluations Office of Safety and Emergency Management Evaluations Guidance Documents Security and Cyber Evaluations ...

250

Cyber Security Module  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Module Cyber security training is required for all facility users and must be submitted before or upon arrival at the GUV Center. System Requirements and Information...

251

Security - Problem Solved?  

Science Conference Proceedings (OSTI)

There are plenty of security problems that have solutions. Yet, our security problems don't seem to be going away. What's wrong here?

John Viega

2005-06-01T23:59:59.000Z

252

NIST Cyber Security Framework  

Science Conference Proceedings (OSTI)

Page 1. NIST Cyber Security Framework ISA-62443-2-1 :2009 ISA-62443-2-1 (Ed. 2, D2E8 ... Page 2. Security NIST Cyber ...

2013-12-13T23:59:59.000Z

253

NNSA orders security enhancements  

NLE Websites -- All DOE Office Websites (Extended Search)

orders security enhancements NNSA orders security enhancements Because of this government order, until further notice all vehicles entering government property will be required to...

254

Security: A Coordinated Approach  

Science Conference Proceedings (OSTI)

... SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security ... Location-Awareness ICS/SCADA Smart Grid Mobile Devices ...

2012-10-26T23:59:59.000Z

255

JLab Security Banner  

NLE Websites -- All DOE Office Websites (Extended Search)

Computer Center | Jefferson Lab Home | Experiments | The Lab | News Privacy and Security Notice Security Notice This is a Federal computer system and is the property of the United...

256

Apparatus And Method Of Using Flexible Printed Circuit Board In Optical Transceiver Device  

DOE Patents (OSTI)

This invention relates to a flexible printed circuit board that is used in connection with an optical transmitter, receiver or transceiver module. In one embodiment, the flexible printed circuit board has flexible metal layers in between flexible insulating layers, and the circuit board comprises: (1) a main body region orientated in a first direction having at least one electrical or optoelectronic device; (2) a plurality of electrical contact pads integrated into the main body region, where the electrical contact pads function to connect the flexible printed circuit board to an external environment; (3) a buckle region extending from one end of the main body region; and (4) a head region extending from one end of the buckle region, and where the head region is orientated so that it is at an angle relative to the direction of the main body region. The electrical contact pads may be ball grid arrays, solder balls or land-grid arrays, and they function to connect the circuit board to an external environment. A driver or amplifier chip may be adapted to the head region of the flexible printed circuit board. In another embodiment, a heat spreader passes along a surface of the head region of the flexible printed circuit board, and a window is formed in the head region of the flexible printed circuit board. Optoelectronic devices are adapted to the head spreader in such a manner that they are accessible through the window in the flexible printed circuit board.

Anderson, Gene R. (Albuquerque, NM); Armendariz, Marcelino G. (Albuquerque, NM); Bryan, Robert P. (Albuquerque, NM); Carson, Richard F. (Albuquerque, NM); Duckett, III, Edwin B. (Albuquerque, NM); McCormick, Frederick B. (Albuquerque, NM); Peterson, David W. (Sandia Park, NM); Peterson, Gary D. (Albuquerque, NM); Reysen, Bill H. (Lafayette, CO)

2005-03-15T23:59:59.000Z

257

Coldwater Board of Public Utilities - Commercial & Industrial...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Commercial & Industrial Lighting Rebate Program Coldwater Board of Public Utilities - Commercial & Industrial Lighting Rebate Program Eligibility Commercial Industrial Local...

258

FOILFEST :community enabled security.  

SciTech Connect

The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

2005-09-01T23:59:59.000Z

259

Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Home > Field Offices > Welcome to the NNSA Production Office > Links Home > Field Offices > Welcome to the NNSA Production Office > Links Links NNSA HQ National Nuclear Security Administration Advanced Simulation & Computing NNSA Graduate Program NNSA Small Business Program Office of Defense Nuclear Nonproliferation Field Offices NNSA Albuquerque Complex Kansas City Field Office Livermore Field Office Los Alamos Field Office Naval Reactors Idaho Branch Office Nevada Field Office Sandia Field Office DOE Oak Ridge Sites Oak Ridge Office Oak Ridge National Laboratory UCOR Oak Ridge Institute for Science and Education Oak Ridge Site Specific Advisory Board American Museum of Science and Energy City of Oak Ridge Plants Laboratories Bechtel Nevada Bettis Laboratory Kansas City Plant Knolls Atomic Power Laboratory Lawrence Livermore National Laboratory

260

Secure Manufacturing | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

Note: This page contains sample records for the topic "relations board securities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

CYBER SECURITY METRICS AND MEASURES  

Science Conference Proceedings (OSTI)

... CYBER SECURITY METRICS AND MEASURES ... Keywords: cyber security; metrics; measures; software; computer systems; IT ...

2013-05-07T23:59:59.000Z

262

Nuclear Security | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

263

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

264

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

265

California Air Resources Board's "California Green Building Strategy"  

E-Print Network (OSTI)

California Air Resources Board's "California Green Building Strategy" Collectively, energy use and related activities by buildings is the second largest source of California's greenhouse gas (GHG) emissions. Almost one-quarter of California's greenhouse gas emissions can be attributed to buildings

266

Dynamic Simulation of DFIG Wind Turbines on FPGA Boards  

E-Print Network (OSTI)

Dynamic Simulation of DFIG Wind Turbines on FPGA Boards Hao Chen, Student Member, IEEE, Song Sun is a friction coefficient. The wind turbine model is based on the relation between the upstream wind speed V w + 1 where p is the air density; Rw is the wind turbine radius; cp (A, (3) is the performance

Zambreno, Joseph A.

267

APS Experiment Safety Review Board  

NLE Websites -- All DOE Office Websites (Extended Search)

Charter for the APS Experiment Safety Review Board May 12, 2011 1. Purpose The APS Experiment Safety Review Board (ESRB) advises the AES Division Director on the safe implementation of experiments performed by APS users on the experiment hall floor. The ESRB reviews each experiment that is submitted to the APS via the APS Experiment Safety Assessment System (ESAF). These experiments are conducted in beamline endstations in the APS Experiment Hall. 2. Membership The ESRB members are appointed by the AES Division Director. The current members of the ESRB are: Bruce Glagola AES - Chair Edmund Chang AES Paul Rossi XSD Nena Moonier AES Tom Barkalow PSC Patricia Pedergnana AES Wendy VanWingeren AES 3. Method After an experiment is submitted to the APS Experiment Safety Review system

268

Security tasks are highly interdependent.  

E-Print Network (OSTI)

Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

269

Security Policies Dr. Ahmad Almulhem  

E-Print Network (OSTI)

Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

Almulhem, Ahmad

270

Secretary Chu to Host Secretary of Energy Advisory Board Meeting |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 19, 2011 - 12:00am January 19, 2011 - 12:00am Addthis Washington, DC - On Thursday, January 20, 2011, U.S. Energy Secretary Steven Chu will host the second meeting of the Secretary of Energy Advisory Board (SEAB). The first meeting of the New Year will focus on the importance of innovation in maintaining global competitiveness. Secretary Chu will begin his remarks at 9:30 AM. Media wishing to attend should contact Niketa Kumar at Niketa.kumar@hq.doe.gov by Wednesday, January 19th by 5 p.m. WHAT: Secretary of Energy Advisory Board Meeting WHEN: Thursday, January 20, 2011 9:00 AM - 12:00 PM 1:45 PM - 5:00 PM WHERE: US Department of Energy 1000 Independence Ave Washington, DC 20585 Room: 1E-245 Media contact(s): (202) 586-4940 Addthis Related Articles Secretary Chu to Host Secretary of Energy Advisory Board Meeting

271

Security Technologies Group  

Science Conference Proceedings (OSTI)

Security Technologies Group. Welcome. Our group develops measurement science in support of performance-based standards ...

2012-10-24T23:59:59.000Z

272

Nuclear Security & Safety  

Energy.gov (U.S. Department of Energy (DOE))

The Energy Department is working to enhance nuclear security through defense, nonproliferation, and environmental efforts.

273

Industrial Control Systems Security  

Science Conference Proceedings (OSTI)

... Risk Management Architecture security focus Physical interaction ... Cybersecurity Cybersecurity Framework Smart Grid Program ...

2013-06-05T23:59:59.000Z

274

NERSC Computer Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

275

Programme Board Terms of Reference Membership  

E-Print Network (OSTI)

The constitution and membership of the DART-Europe governing Board is determined and will from time to time be reviewed by the Board. The Board comprises Partner members and Attending members. Partner members Each partner organisation may nominate one representative to serve on the DART-Europe Board. Partner organisations are required to sign the DART-Europe Partnership Agreement. Attending members Representatives of certain key organisations may be invited to serve on the DART-Europe Board, at the discretion of the Board. Such organisations will not be required to sign the DART-Europe Partnership Agreement. An up-to-date list of Partner and Attending members of the DART-Europe Board will be

Remit Of Board

2008-01-01T23:59:59.000Z

276

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 23, 2013 May 23, 2013 PSH-13-0018 - In the Matter of Personnel Security Hearing On May 23, 2013, an OHA Hearing Officer issued a decision in which he determined that an individual's DOE access authorization should not be granted. The Individual had a history of six arrests, five of which were alcohol-related and two of which were marijuana-related. In addition, A DOE Psychologist diagnosed the individual with Alcohol Dependence. The Hearing Officer found that the Individual had not mitigated any the security concerns raised by his alcohol abuse and history of criminal conduct at the hearing, because he was only in the early stages of his recovery from his alcohol d May 22, 2013 PSH-13-0022 - In the Matter of Personnel Security On May 22, 2013, an OHA Hearing Officer issued a decision in which he

277

MasteringWeb Services Security MasteringWeb Services Security  

E-Print Network (OSTI)

Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

278

Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

279

Security Notice | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

280

Office of Headquarters Security Operations: Security Awareness...  

NLE Websites -- All DOE Office Websites (Extended Search)

Paul Ruehs Contact Information: Paul Ruehs - (301) 903-7189; Room F-324 Scope: The Security Awareness Program is established by DOE Order to inform individuals of their...

Note: This page contains sample records for the topic "relations board securities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... The NIST Handbook SP 800-12. SP 800-12 (HTML). NIST IR 7621, Oct 2009, Small Business Information Security: The Fundamentals NISTIR 7621. ...

282

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

283

Homeland Security Programs | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

284

WeaselBoard : zero-day exploit detection for programmable logic controllers.  

SciTech Connect

Critical infrastructures, such as electrical power plants and oil refineries, rely on programmable logic controllers (PLCs) to control essential processes. State of the art security cannot detect attacks on PLCs at the hardware or firmware level. This renders critical infrastructure control systems vulnerable to costly and dangerous attacks. WeaselBoard is a PLC backplane analysis system that connects directly to the PLC backplane to capture backplane communications between modules. WeaselBoard forwards inter-module traffic to an external analysis system that detects changes to process control settings, sensor values, module configuration information, firmware updates, and process control program (logic) updates. WeaselBoard provides zero-day exploit detection for PLCs by detecting changes in the PLC and the process. This approach to PLC monitoring is protected under U.S. Patent Application 13/947,887.

Mulder, John C.; Schwartz, Moses Daniel; Berg, Michael J.; Van Houten, Jonathan Roger; Urrea, Jorge Mario; King, Michael Aaron; Clements, Abraham Anthony; Jacob, Joshua A.

2013-10-01T23:59:59.000Z

285

High Level Waste Corporate Board Charter  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

on 24 July 2008 1 on 24 July 2008 1 Office of Environmental Management High-Level Waste Corporate Board Charter Purpose This Charter establishes the High- Level Waste (HLW) Corporate Board, (hereinafter referred to as the 'Board') within the Office of Environmental Management (EM). The Board will serve as a consensus building body to integrate the Department of Energy (DOE) HLW management and disposition activities across the EM program and, with the coordination and cooperation of other program offices, across the DOE complex. The Board will identify the need for and develop policies, planning, standards and guidance and provide the integration necessary to implement an effective and efficient national HLW program. The Board will also evaluate the implications of HLW issues and their

286

The Office of Health, Safety and Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Public Meetings and Hearings Public Meetings and Hearings JUMP TO: 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 2003 2002 2001 2000 1999 1998 1997 1996 1995 2013 December 10, 2013, Safety in Design, Operations, and Emergency Preparedness at the Y-12 National Security Complex. Agenda [PDF] Federal Register Notice of Public Meeting Changes (new time and date) [PDF] Notice of Public Meeting (for October 22, 2013) [PDF] March 14, 2013, Board Public Meeting and Hearing on Safety Culture, Emergency Preparedness, and Nuclear Explosive Operations at Pantex. Federal Register Notice [PDF] Notice of Public Meeting Changes [PDF] Agenda [PDF] Written Statement of Mr. Daniel Ogg, Group Lead for Nuclear Weapon Programs, DNFSB [PDF] Written Statement of Mr. Glenn Podonsky, Chief Health, Safety and Security Officer [PDF]

287

Learning mobile security with android security labware  

Science Conference Proceedings (OSTI)

As smart mobile devices grow increasingly in popularity, so do the incentives for attackers. Recent surveys on mobile security describe the rapidly increasing number and sophistication of mobile attacks. Newer sources of risks are being introduced or ... Keywords: android, labware, mobile security

Minzhe Guo; Prabir Bhattacharya; Ming Yang; Kai Qian; Li Yang

2013-03-01T23:59:59.000Z

288

Quantifying Security in Secure Software Development Phases  

Science Conference Proceedings (OSTI)

Secure software is crucial in todays software dependent world. However, most of the time, security is not addressed from the very beginning of a software development life cycle (SDLC), and it is only incorporated after the software has been developed. ...

Muhammad Umair Ahmed Khan; Mohammad Zulkernine

2008-07-01T23:59:59.000Z

289

Security Enforcement Documents | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Enforcement Documents Security Enforcement Documents Security Enforcement Documents Documents Available for Download May 4, 2012 Enforcement Letter, CH2M Oak Ridge, LLC - SEL-2012-01 Issued to URS CH2M Oak Ridge, LLC, related to a Security Incident involving the Protection and Control of Classified Information at the East Tennessee Technology Park April 18, 2011 Preliminary Notice, Battelle Energy Alliance, LLC, SEA-2011-01 Issued to Battelle Energy Alliance, LLC related to Classified Information Introduced into Unapproved Information Systems at the Idaho National Laboratory March 24, 2011 Settlement Agreement, Sandia Corporation - SSA-2011-01 Settlement Agreement between DOE/NNSA and Sandia Corporation for Adverse Classified Information Security Trend at Sandia National Laboratories

290

Nuclear Security 101 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

291

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

292

ENVIRONMENTAL MANAGEMENT SITE-SPECIFIC ADVISORY BOARD  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Washington, D.C. 20585 Washington, D.C. 20585 April 25, 2013 2 Environmental Management Site-Specific Advisory Board - April 25, 2013 Meeting Minutes LIST OF ACRONYMS AB - Advisory Board ANL - Argonne National Laboratory ARP - Accelerator Retrieval Project BNL - Brookhaven National Laboratory BRC - Blue Ribbon Commission CAB - Citizens Advisory Board D&D - Decontamination & Decommissioning DDFO - Deputy Designated Federal Officer DOE - Department of Energy DUF6 - Depleted Uranium Hexafluoride DWPF - Defense Waste Processing Facility EIS - Environmental Impact Statement EM - DOE Office of Environmental Management EM SSAB - DOE Office of Environmental Management Site-Specific Advisory Board EPA - U.S. Environmental Protection Agency FY - Fiscal Year

293

Perspectives from the Board's Technical Staff  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

from the Board's from the Board's Technical Staff AP Poloski, S Sircar, MW Dunlevy, F Bamdad, SA Stokes June 5, 2012 This presentation contains information collected by the Board's technical staff and no official support or endorsement of these remarks by the Defense Nuclear Facilities Safety Board is intended or should be inferred. Outline * Purpose: Review the values used by DOE contractors for dispersion analysis against DOE directives * Summary of Staff Complex-wide Review * Areas of Discussion - methods for determining atmospheric stability class; - use of extremely stable (G) atmospheric stability class; - selection of atmospheric dispersion coefficients; - correction for wind speed height; - selection of surface roughness; - adjusting dispersion coefficients due to surface roughness;

294

TMS Board of Directors: Srinivas Chada  

Science Conference Proceedings (OSTI)

He currently serves on the board of directors for The Minerals, Metals, and Materials Society (TMS) as the Chair of the Electronic, Magnetic, and Photonic...

295

ANNUAL REPORT of the Board of Trustees  

E-Print Network (OSTI)

ANNUAL REPORT of the Board of Trustees Southern Illinois University 2010-2011 #12;ii #12;iii #12;iv........................................................................................................................... 9 Executive Officer Reports ............................................................................................ 14 Trustee Reports

Spector, Scott J.

296

Journal of Research Board of Editors  

Science Conference Proceedings (OSTI)

Journal of Research of NIST. Board of Editors. Robert A. Dragoset, Chief Editor. Jeffrey W. Bullard, Materials and Construction Research Division, EL ...

2013-07-31T23:59:59.000Z

297

Springfield Utility Board- Energy Savings Plan Program  

Energy.gov (U.S. Department of Energy (DOE))

The Springfield Utility Board provides industrial customers with a comprehensive report to identify cost effective efficiency improvements. Eligible measures include high efficiency motors,...

298

Cyber Security Standards.PDF  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 1 I N S P E C T I O N R E P O R T U.S. DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL OFFICE OF INSPECTIONS INSPECTION OF CYBER SECURITY STANDARDS FOR SENSITIVE PERSONAL INFORMATION NOVEMBER 2001 . DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL U.S. DEPARTMENT OF ENERGY Washington, DC 20585 November 13, 2001 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman /s/ Inspector General SUBJECT: INFORMATION: Report on "Inspection of Cyber Security Standards for Sensitive Personal Information" BACKGROUND The Office of Inspector General (OIG), U.S. Department of Energy (DOE), identified a concern relating to the cyber security of unclassified sensitive personal information maintained by the Department under the Privacy Act of 1974, and other personal information exempt from

299

Social Web mining and exploitation for serious applications: Technosocial Predictive Analytics and related technologies for public health, environmental and national security surveillance  

Science Conference Proceedings (OSTI)

This paper explores techno-social predictive analytics (TPA) and related methods for Web data mining where users posts and queries are garnered from Social Web (Web 2.0) tools such as blogs, microblogging and social networking sites to form coherent representations of real-time health events. The paper includes a brief introduction to commonly used Social Web tools such as mashups and aggregators, and maps their exponential growth as an open architecture of participation for the masses and an emerging way to gain insight about peoples collective health status of whole populations. Several health related tool examples are described and demonstrated as practical means through which health professionals might create clear location specific pictures of epidemiological data such as flu outbreaks.

Kamel Boulos, Maged; Sanfilippo, Antonio P.; Corley, Courtney D.; Wheeler, Steve

2010-03-17T23:59:59.000Z

300

Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)  

Science Conference Proceedings (OSTI)

Battelles National Security & Defense objective is, applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratorys (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

Hadley, Mark D.; Clements, Samuel L.

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "relations board securities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS  

E-Print Network (OSTI)

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

302

Campus Security Report 1 Campus seCurity  

E-Print Network (OSTI)

Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

Wilmers, Chris

303

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

305

Checking Security Policy Compliance  

E-Print Network (OSTI)

Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. Our work uses the results of refinement calculus to express valid refinement patterns and their properties. Intuitively, a low-level security policy is compliant to a high-level security policy if there is a valid refinement path from the high-level security policy to the low-level security policy. Our model is capable of detecting violations of security policies, failures to meet obligations, and capability and modal conflicts.

Gowadia, Vaibhav; Kudo, Michiharu

2008-01-01T23:59:59.000Z

306

Performance and security tradeoff  

Science Conference Proceedings (OSTI)

A tradeoff is a situation that involves losing one quality or aspect of something in return for gaining another quality or aspect. Speaking about the tradeoff between performance and security indicates that both, performance and security, can be measured, ...

Katinka Wolter; Philipp Reinecke

2010-06-01T23:59:59.000Z

307

Secure Shell (SSH)  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Shell (SSH) Name: Rutaiwan Status: Educator Age: 20s Location: NA Country: NA Date: June 2003 Question: What is the Secure Shell (SSH)? What is a strong and weak points of...

308

Foundation for system security  

Science Conference Proceedings (OSTI)

We provide a coherent framework for the design and analysis of secure systems. Our framework is inspired by Lawrence Lessig's modalities of control, by Niklas Luhmann's theory of trust, by existing models of information security, and by existing models ...

Clark Thomborson

2009-01-01T23:59:59.000Z

309

The Office of Health, Safety and Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Board's power to issue recommendations to the Secretary is one of its most important powers. The Board's enabling legislation establishes that "the Board shall make such...

310

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

311

Security system signal supervision  

SciTech Connect

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

312

ADVANCED DATA SECURITY  

Science Conference Proceedings (OSTI)

ADVANCED DATA SECURITY. NVLAP Lab Code: 200968-0. Address and Contact Information: 1933 O'Toole Avenue San ...

2013-11-08T23:59:59.000Z

313

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Digital Age - Information Security Transformation for the ... to Information Systems (Transforming the Certification ... for Smart Grid Cyber Security (NIST ...

314

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Automated Information Flows for Situational Awareness; Transformation of Dynamic Security ... Cyber security leadership in the Executive Branch. ...

315

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Nuclear Regulatory Commission; National Security Agency (File ... Richard S. Carson & Associates; RSA Securities; RU Consulting (File 1 of 2 ...

316

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... per the Security Content Automation Protocol (SCAP ... securely install and configure a device; and; ... applicable scenarios and distribution formats, the ...

317

A survey of security in multi-agent systems  

Science Conference Proceedings (OSTI)

Multi-agent systems (MAS) are a relatively new software paradigm that is being widely accepted in several application domains to address large and complex tasks. However, with the use of MAS in open, distributed and heterogeneous applications, the security ... Keywords: Agents, Multi-agent systems, Multi-agents, Security, Security in MAS

Rodolfo Carneiro Cavalcante; Ig Ibert Bittencourt; Alan Pedro da Silva; Marlos Silva; Evandro Costa; Robrio Santos

2012-04-01T23:59:59.000Z

318

Electronic security device  

DOE Patents (OSTI)

The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

Eschbach, Eugene A. (Richland, WA); LeBlanc, Edward J. (Kennewick, WA); Griffin, Jeffrey W. (Kennewick, WA)

1992-01-01T23:59:59.000Z

319

Electronic security device  

DOE Patents (OSTI)

The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

1992-03-17T23:59:59.000Z

320

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

Note: This page contains sample records for the topic "relations board securities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Human Rights and Security  

E-Print Network (OSTI)

Migration, Human Rights and Security in Europe MRU Student Conference Proceedings 2012 Edited by Siril Berglund, Helen McCarthy and Agata Patyna #12;2 "Migration, Human Rights and Security...............................................................................................58 #12;3 "Migration, Human Rights and Security in Europe", MRU Student Conference Proceedings

Saunders, Mark

322

UNIVERSITY POLICE ANNUAL SECURITY  

E-Print Network (OSTI)

UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

Kulp, Mark

323

Functional Programming and Security  

E-Print Network (OSTI)

This paper analyses the security contribution of typical functional-language features by examining them in the light of accepted information security principles. Imperative and functional code are compared to illustrate various cases. In conclusion, there may be an excellent case for the use of functional languages on the grounds of better security; however, empirical research should be done to validate this possibility.

Motara, Yusuf Moosa

2012-01-01T23:59:59.000Z

324

Information Security Guide  

E-Print Network (OSTI)

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

325

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-0987P Transportation of the safe and secure transport of radioactive and hazardous materials. AWaytoEnsureSafeTransport Sandia

326

Verifiably secure devices  

Science Conference Proceedings (OSTI)

We put forward the notion of a verifiably secure device, in essence a stronger notion of secure computation, and achieve it in the ballot-box model. Verifiably secure devices 1. Provide a perfect solution to the problem of achieving correlated equilibrium, ...

Sergei Izmalkov; Matt Lepinski; Silvio Micali

2008-03-01T23:59:59.000Z

327

Understanding Android Security  

Science Conference Proceedings (OSTI)

Google's Android platform is a widely anticipated open source operating system for mobile phones. This article describes Android's security model and attempts to unmask the complexity of secure application development. The authors conclude by identifying ... Keywords: Android, mobile phones, Smartphones, security

William Enck; Machigar Ongtang; Patrick McDaniel

2009-01-01T23:59:59.000Z

328

Lemnos interoperable security project.  

Science Conference Proceedings (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

329

Security auditing course development  

Science Conference Proceedings (OSTI)

As people increasingly depend on computers and network systems, security auditing has become one of the most effective security practices to achieve defense-in-depth in organizations. It follows an effective process to measure policies, procedures ... Keywords: IT audit, IT education, curriculum development, security

Yin Pan

2007-10-01T23:59:59.000Z

330

Security approaches for Radio Frequency Identification systems  

E-Print Network (OSTI)

In this thesis, I explore the challenges related to the security of the Electronic Product Code (EPC) class of Radio Frequency Identification (RFID) tags and associated data. RFID systems can be used to improve supply chain ...

Foley, Joseph Timothy, 1976-

2007-01-01T23:59:59.000Z

331

Essays on trades and security prices  

E-Print Network (OSTI)

This thesis consists of three chapters that investigate the complex relation between security prices and trades of market participants. In the first chapter, I study the evolution of stock prices after trades with different ...

Obizhaeva, Anna

2007-01-01T23:59:59.000Z

332

Environmental Management Advisory Board Members | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Communication & Engagement » EMAB » Environmental Communication & Engagement » EMAB » Environmental Management Advisory Board Members Environmental Management Advisory Board Members EMAB membership reflects a diversity of views, demographics, expertise, and professional and academic experience. The following members comprise the current Board: Current Members James A. Ajello EMAB Board Chair Read Bio ‣ Dennis P. Ferrigno EMAB Board Vice-Chair Read Bio ‣ Franklin E. Coffman EMAB Board Member Read Bio ‣ Paul M. Dabbar EMAB Board Member Read Bio ‣ G. Brian Estes EMAB Board Member Read Bio ‣ Jane A. Hedges EMAB Board Member Read Bio ‣ Carolyn L. Huntoon EMAB Board Member Read Bio ‣ Kimberlee Kearfott EMAB Board Member Read Bio ‣ John A. Owsley EMAB Board Member Read Bio ‣ Willie Preacher EMAB Board Member

333

Program Areas | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Programs Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program...

334

Supporting Organizations | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Supporting Organizations SHARE Supporting...

335

December 3, 2003, Board Public Meeting Speaker Presentations  

NLE Websites -- All DOE Office Websites (Extended Search)

from Mike Mallory Before the DNFSB December 3, 2003 from Mike Mallory Before the DNFSB December 3, 2003 Page 0 Testimony of Mike Mallory, BWXT Pantex President and General Manager Before the Defense Nuclear Facilities Safety Board Regarding Contractor Assurance System at Pantex Plant December 3, 2003 Testimony from Mike Mallory Before the DNFSB December 3, 2003 Page 1 The Contractor Assurance System at BWXT Pantex Introduction Thank you for the opportunity to speak today regarding the Contractor Assurance System at BWXT Pantex. I am Mike Mallory, the President and General Manager of BWXT Pantex, the M&O contractor of the Pantex Plant for the Department of Energy's National Nuclear Security Administration. BWXT Pantex is responsible for five core missions at Pantex. 1) We evaluate, retrofit and repair

336

UNFCCC/CCNUCC CDM Executive Board AM0025 / Version 03  

E-Print Network (OSTI)

Revision to the approved baseline methodology AM0025 Avoided emissions from organic waste through alternative waste treatment processes This baseline methodology is based on the proposed methodologies submitted for the project Organic waste composting at the Matuail landfill site Dhaka, Bangladesh, whose baseline study, monitoring and verification plan and project design document were prepared by prepared by World Wide Recycling B.V. and Waste Concern. It has been revised to include elements from the methodology for the PT Navigat Organic Energy Indonesia Integrated Solid Waste Management (GALFAD) project in Bali, Indonesia, which was prepared by Mitsubishi Securities Co. For more information regarding these proposals and their consideration by the Executive Board, please refer to case NM0090: Organic waste composting at the Matuail landfill site Dhaka, Bangladesh, and case NM0127 Integrated solid waste management with methane destruction and energy generation, at

Sectoral Scope

2006-01-01T23:59:59.000Z

337

Lemnos Interoperable Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lemnos Interoperable Security Program Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as firewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products from different vendors because the industry lacks a widely accepted mechanism for evaluating functionality, performance,

338

Security | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Nonproliferation and Nuclear Forensics Decision Science Sensors and Materials Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass disruption or destruction, thereby protecting our citizens and our national interests. Our goal is to make America a safer place through innovations in threat decision science, sensors and materials, infrastructure assurance,

339

On-Board Fuel Processing Committee Report  

NLE Websites -- All DOE Office Websites (Extended Search)

ON-BOARD FUEL PROCESSING ON-BOARD FUEL PROCESSING GO/NO-GO DECISION DOE DECISION TEAM COMMITTEE REPORT August 2004 (Revised) Table of Contents 1. Executive Summary............................................................................................. 1 2. Introduction.......................................................................................................... 2 3. Background.......................................................................................................... 2 4. Process................................................................................................................. 2 5. Recommendation............................................................................................... 3 6. Rationale ........................................................................................................ 4

340

ANNUAL REPORT of the Board of Trustees  

E-Print Network (OSTI)

ANNUAL REPORT of the Board of Trustees Southern Illinois University 2005-2006 #12;June 30, 2006, the fifty-fifth annual report of the Board of Trustees of Southern Illinois University for Fiscal Year July by the Chair ..............................................................11 Committee Reports

Spector, Scott J.

Note: This page contains sample records for the topic "relations board securities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Insulation board and process of making  

DOE Patents (OSTI)

Insulation board is described which is capable of bearing a load without significant loss of insulating capacity due to compression, produced by a method wherein the board is made in compliance with specified conditions of time, temperature and pressure. 2 figs.

Nowobilski, J.J.; Owens, W.J.

1985-08-27T23:59:59.000Z

342

Building security requirements with CLASP  

Science Conference Proceedings (OSTI)

Traditionally, security requirements have been derived in an ad hoc manner. Recently, commercial software development organizations have been looking for ways to produce effective security requirements.In this paper, we show how to build security ... Keywords: application security, security process, security requirements

John Viega

2005-07-01T23:59:59.000Z

343

Engineering secure software  

E-Print Network (OSTI)

In recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems have been after-the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar to classical software engineering, to those that may be used in analyses of security requirements, as well as tools that can help engineer secure software. The survey classifies the approaches as process-oriented and as tools-oriented. The current approaches are incomplete in nature. They seem to address the security problem in parts and not in the whole. A comprehensive methodology, integrated with evolutionary software engineering practices is presented. The methodology combines both process and tools oriented approaches to construct secure software.

Jetly, Prateek

2001-01-01T23:59:59.000Z

344

Academic Advisory Board Activities and Perspectives  

NLE Websites -- All DOE Office Websites (Extended Search)

Advisory Board Advisory Board Activities and Perspectives Karen A. Thole, Chair Academic Advisory Board Virginia Tech, Mechanical Engineering Department Peer Review Workshop October 20, 2005 * Review of the Academic Advisory Board * Activities since 2004 Peer Review Workshop * Open discussion Discussion Topics Chair: Karen Thole, Virginia Tech Co-Chair: Tim Lieuwen, Georgia Tech Secretary: Vince McDonell, U of California-Irvine Education: Yongho Sohn, U of Central Florida Combustion: Dom Santavicca, Penn State Materials: Eric Jordan, U of Connecticut Aero / Ht Transfer: Jeffrey Bons, Brigham Young Diagnostics: Scott Sanders, U. of Wisconsin Academic Advisory Board (AAB) Contact any of us with your concerns/issues!!! Goals for the AAB * Provide guidance to the UTSR Program

345

Safeguards and Security and Cyber Security RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

346

Office of Headquarters Security Operations: Operations Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

347

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

348

Nonproliferation and National Security Multimedia - Argonne National  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation and National Security Nonproliferation and National Security > Multimedia Multimedia Nuclear Systems Analysis Engineering Analysis Nonproliferation and National Security Detection & Diagnostic Systems Engineering Development & Applications Argonne's Nuclear Science & Technology Legacy Other Multimedia Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE on Flickr Bookmark and Share Nonproliferation and National Security: Multimedia Related Resources Nonproliferation and National Security Vulnerability Assessment Team (VAT) Click on the "Date" header to sort the videos/podcasts in chronological order (ascending or descending). You may also search for a specific keyword; click on the reset button refresh to remove the keyword filter and show again all the Videos/Podcasts.

349

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

350

Alternative Fuels Data Center: NextGen Energy Board  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

NextGen Energy Board NextGen Energy Board to someone by E-mail Share Alternative Fuels Data Center: NextGen Energy Board on Facebook Tweet about Alternative Fuels Data Center: NextGen Energy Board on Twitter Bookmark Alternative Fuels Data Center: NextGen Energy Board on Google Bookmark Alternative Fuels Data Center: NextGen Energy Board on Delicious Rank Alternative Fuels Data Center: NextGen Energy Board on Digg Find More places to share Alternative Fuels Data Center: NextGen Energy Board on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type NextGen Energy Board The NextGen Energy Board (Board) was created to conduct research on how Minnesota can better invest its resources to achieve energy independence and agricultural and resource sustainability. The Board must:

351

Form:State Oil and Gas Board | Open Energy Information  

Open Energy Info (EERE)

Board Jump to: navigation, search State Oil and Gas Board This is the "State Oil and Gas Board" form. To create a page with this form, enter the page name below; if a page with...

352

Form:International Oil and Gas Board | Open Energy Information  

Open Energy Info (EERE)

International Oil and Gas Board Jump to: navigation, search International Oil and Gas Board This is the "International Oil and Gas Board" form. To create a page with this form,...

353

The Office of Health, Safety and Security  

NLE Websites -- All DOE Office Websites (Extended Search)

SIMS Logon Letter Commitments Recommendation Commitments Board Review of Directives About Our Office Mission and Functions Policy on Board Interaction ...

354

SSTARS Safeguards and Security Tracking, Analysis and Reporting  

Protecting Americas Future SSTARS is a feature-rich system for issues management and enhanced tracking and trending related to security and safety.

355

Cyber Security in Smart Grid Substations  

E-Print Network (OSTI)

Abstract. This report describes the state of smart grid security in Europe, specifically the Netherlands, and the cyber security of substations in particular. The focus of this study is the perception of risks and threats in smart grid cyber security and the international standards implemented in smart grids. The created overview is based on semi-structured interviews with 13 experts originating from eight different European countries. These participants are employed at electricity producers, grid operators, technology consultants and technology providers in the utilities sector. Their expertise ranges from information security to electricity grids, specifically smart grid security. Some of them are members of smart grid security related standard committees. The key results of the state of practice are the following: 1. The interconnectivity of the smart grid with multiple stakeholders and European colleagues is indicated as the biggest threat to the security of the smart grid. 2. Another often mentioned threat is awareness. The experts generally indicate that awareness within top management is high. However, personnel on lower levels are reluctant to incorporate security in their processes. 3. All organizations are in a certain stage of implementing standards, the ISO27000 series

Thijs Baars; Lucas Van Den Bemd; Michail Theuns; Robin Van Den Akker; Machiel Schnbeck; Sjaak Brinkkemper; Thijs Baars; Lucas Van Den Bemd; Michail Theuns; Robin Van Den Akker; Machiel Schnbeck; Sjaak Brinkkemper

2012-01-01T23:59:59.000Z

356

Electric Power Board of Chattanooga - Energy Efficient New Homes...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Electric Power Board of Chattanooga - Energy Efficient New Homes Program for Builders and Developers Electric Power Board of Chattanooga - Energy Efficient New Homes Program for...

357

Clean Development Mechanism Executive Board CDM EB | Open Energy...  

Open Energy Info (EERE)

Mechanism Executive Board CDM EB Jump to: navigation, search Name Clean Development Mechanism Executive Board (CDM EB) Place Bonn, Germany Zip D-53175 Product The CDM EB supervises...

358

Disposition Record Request: Oil Import Appeals Board | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Record Request: Oil Import Appeals Board Disposition Record Request: Oil Import Appeals Board OIAB Case Files. Records consist of company requests for relief from hardship imposed...

359

PP-226 Brownsville public Utilities Board | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Board to construct, operate, and maintain electric transmission facilities at the U.S-Mexican border. PP-226 Brownsville public Utilities Board More Documents & Publications...

360

Electric Power Board of Chattanooga | Open Energy Information  

Open Energy Info (EERE)

Board of Chattanooga Jump to: navigation, search Name Electric Power Board of Chattanooga Place Chattanooga, TN References SGIC1 No information has been entered for this...

Note: This page contains sample records for the topic "relations board securities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Summary Minutes of the Secretary of Energy Advisory Board Public...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Summary Minutes of the Secretary of Energy Advisory Board Public Meeting on November 14, 2011 Summary Minutes of the Secretary of Energy Advisory Board Public Meeting on November...

362

Secretary of Energy Advisory Board Hosts Conference Call on Shale...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

You are here Home Secretary of Energy Advisory Board Hosts Conference Call on Shale Gas Draft Report Secretary of Energy Advisory Board Hosts Conference Call on Shale Gas...

363

Secretary of Energy Advisory Board Subcommittee Releases Shale...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Agencies You are here Home Secretary of Energy Advisory Board Subcommittee Releases Shale Gas Recommendations Secretary of Energy Advisory Board Subcommittee Releases Shale Gas...

364

National Energy Board Export and Import Reporting Regulations...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Energy Board Export and Import Reporting Regulations (Canada) National Energy Board Export and Import Reporting Regulations (Canada) Eligibility Commercial Fuel...

365

Homeland Security Issues for Facilities  

E-Print Network (OSTI)

The events of September 11, 2001, along with the Oklahoma City bombing and Washington, DC area sniper attacks have forever changed America's sense of security. Federal, state, and local governments, businesses, and individual homeowners have become more aware of safety, security, and protecting property and people should similar incidents occur in the future. The initial steps in facility protection are identifying potential threats and evaluating the condition of existing building infrastructure and systems. After assessments are complete, the results should be compared with guidelines and recommendations produced by government agencies or professional organizations. Areas to address to enhance security and safety include ventilation, control systems, air filtration, alarm systems, building access, and surveillance. This paper will look at the objectives of task forces, sources of information, and measures owners can take in schools and other facilities. Although actions involving increased awareness, structural reinforcement, and emergency water supplies are important, this discussion will focus on mechanical and security systems and related items. The authors' experiences in assisting Texas school districts will also be shared.

McClure, J. D.; Fisher, D.; Fenter, T.

2004-01-01T23:59:59.000Z

366

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Physical Protection Office of Physical Protection Bill Dwyer Director, 202-586-7887 Mission The mission of the Office of Physical Protection is to implement and oversee dedicated human resources, processes, and equipment designed to protect personnel and assets entrusted to our care at Department of Energy (DOE) Headquarters facilities. The Office is comprised of dedicated DOE Federal security professionals, Headquarters Protective Force personnel, and Alarms and Access Control Technicians. These security subject matter experts work together to ensure compliance with DOE Safeguards and Security regulations, Interagency Security Committee guidance, and federal laws. The result of this collaboration is a security program designed to ensure a safe and secure working environment for all Headquarters employees.

367

National Security Science Archive  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Science » National Security Science » NSS Archive National Security Science magazine Latest Issue:April 2013 All Issues » submit National Security Science Archive Using its broad and unique scientific and engineering capabilities, the Laboratory solves a diverse set of challenges to national and global security and the weapons programs. National Security Science magazine showcases the breadth and depth of the Laboratory's scientific and technical work to policy makers, the general public, academia, and scientific and technical experts. past issues cover Issue 2 2012 interactive | web | pdf past issues cover Issue 1 2012 interactive | web | pdf past issues cover Issue 3 2011 web | pdf past issues cover Issue 2 2011 web | pdf past issues cover Issue 1 2011 web | pdf past issues cover

368

Security and Privacy Notice  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

369

PNNL: Security & Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

370

Support for the Core Research Activities and Studies of the Computer Science and Telecommunications Board (CSTB)  

SciTech Connect

The Computer Science and Telecommunications Board of the National Research Council considers technical and policy issues pertaining to computer science (CS), telecommunications, and information technology (IT). The functions of the board include: (1) monitoring and promoting the health of the CS, IT, and telecommunications fields, including attention as appropriate to issues of human resources and funding levels and program structures for research; (2) initiating studies involving CS, IT, and telecommunications as critical resources and sources of national economic strength; (3) responding to requests from the government, non-profit organizations, and private industry for expert advice on CS, IT, and telecommunications issues; and to requests from the government for expert advice on computer and telecommunications systems planning, utilization, and modernization; (4) fostering interaction among CS, IT, and telecommunications researchers and practitioners, and with other disciplines; and providing a base of expertise in the National Research Council in the areas of CS, IT, and telecommunications. This award has supported the overall operation of CSTB. Reports resulting from the Board's efforts have been widely disseminated in both electronic and print form, and all CSTB reports are available at its World Wide Web home page at cstb.org. The following reports, resulting from projects that were separately funded by a wide array of sponsors, were completed and released during the award period: 2007: * Summary of a Workshop on Software-Intensive Systems and Uncertainty at Scale * Social Security Administration Electronic Service Provision: A Strategic Assessment * Toward a Safer and More Secure Cyberspace * Software for Dependable Systems: Sufficient Evidence? * Engaging Privacy and Information Technology in a Digital Age * Improving Disaster Management: The Role of IT in Mitigation, Preparedness, Response, and Recovery 2006: * Renewing U.S. Telecommunications Research * Letter Report on Electronic Voting * Summary of a Workshop on the Technology, Policy, and Cultural Dimensions of Biometric System 2005: * Catalyzing Inquiry at the Interface of Computing and Biology * Summary of a Workshop on Using IT to Enhance Disaster Management * Asking the Right Questions About Electronic Voting * Building an Electronic Records Archive at NARA: Recommendations for a Long-Term Strategy * Signposts in Cyberspace: The Domain Name System and Internet Navigation 2004: * ITCP: Information Technology and Creative Practices (brochure) * Radio Frequency Identification (RFID) Technologies: A Workshop Summary * Getting up to Speed: The Future of Supercomputing * Summary of a Workshop on Software Certification and Dependability * Computer Science: Reflections on the Field, Reflections from the Field CSTB conducted numerous briefings of these reports and transmitted copies of these reports to researchers and key decision makers in the public and private sectors. It developed articles for journals based on several of these reports. As requested, and in fulfillment of its congressional charter to act as an independent advisor to the federal government, it arranged for congressional testimony on several of these reports. CSTB also convenes a number of workshops and other events, either as part of studies or in conjunctions with meetings of the CSTB members. These events have included the following: two 2007 workshops explored issues and challenges related to state voter registration databases, record matching, and database interoperability. A Sept. 2007 workshop, Trends in Computing Performance, explored fundamental trends in areas such as power, storage, programming, and applications. An Oct. 2007, workshop presented highlights of CSTB's May 2007 report, Software for Dependable Systems: Sufficient Evidence?, along with several panels discussing the report's conclusions and their implications. A Jan. 2007 workshop, Uncertainty at Scale, explored engineering uncertainty, system complexity, and scale issues in developing large software systems. A Feb. 2007

Jon Eisenberg, Director, CSTB

2008-05-13T23:59:59.000Z

371

Y-12 National Security Complex | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Y-12 National Security Complex Y-12 National Security Complex Y-12 National Security Complex Y-12 National Security Complex Aerial View Y-12 National Security Complex Aerial View Y-12 National Security Complex's primary mission is to support of the DOE nuclear weapons stockpile maintenance program. Activities include assembly and disassembly of nuclear weapons components, secure storage of special nuclear material (SNM), and various other nuclear weapons-related activities. Other activities include various aspects of testing and development, nonproliferation, and technology transfer. Enforcement June 13, 2008 Preliminary Notice of Violation, Babcock & Wilcox Teclmical Services Y -12, LLC - NEA-2008-01 Preliminary Notice of Violation issued to Babcock & Wilcox Technical Services Y-12, LLC, related to a Uranium Chip Fire at the Y-12 National

372

Preliminary Notice of Violation, National Security Technologies, LLC -  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Security Technologies, National Security Technologies, LLC - NEA-2011-03 Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 August 11, 2011 Preliminary Notice of Violation issued to National Security Technologies, LLC related to Deficiencies in Inspection and Installation of Penetration Fire Seals and Other Components at the Nevada National Security Site The Office of Health, Safety and Security's Office of Enforcement and Oversight has completed its investigation into the facts and circumstances associated with quality assurance (QA) related deficiencies in the inspection and installation of penetration fire seals and other components at the Criticality Experiments Facility (CEF) and the Device Assembly Facility (OAF) at the Nevada National Security Site. The results of

373

Public Affairs | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

The National Nuclear Security Administration The National Nuclear Security Administration Public Affairs Home > Field Offices > Welcome to the Sandia Field Office > Public Affairs Public Affairs The SFO Public Affairs Director is responsible for all public affairs matters connected with the functions of SFO. In this capacity the Public Affairs Director is responsible for the development and management of the SFO public affairs programs including media relations, community relations, tribal relations, public participation, government/congressional relations, protocol, emergency public information, and internal employee communications and contractor oversight of these same programs. For public affairs assistance, please call (505) 845-5264. Printer-friendly version Printer-friendly version

374

Security (Un-)Usability 17 Security Usability Fundamentals  

E-Print Network (OSTI)

Security (Un-)Usability 17 Security Usability Fundamentals An important consideration when you're building an application is the usability of the security features that you'll be employing. Security experts frequently lament that security has been bolted onto applications as an afterthought, however

Cortes, Corinna

375

Secretary of Energy Advisory Board  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Department of Energy 1000 Independence Avenue, SW Washington, DC 20585 September 16, 2010 Agenda Open Plenary Meeting Session 8:30 AM-9:30 AM Welcome and Overview: The Clean Energy Challenge Remarks by Secretary Steven Chu and Discussion 9:30 AM-10:30 AM Supporting Science: Clean Energy R&D -Senior Advisor and Director of ARPA-E Arun Majumdar and Under Secretary Steve Koonin -Discussion 10:30 AM-11:30 AM Clean Energy Deployment -Assistant Secretary Cathy Zoi and Senior Advisor Matt Rogers -Discussion 11:30 AM-1:00 PM Lunch Break 1:00 PM-2:15 PM Energy and Security -Deputy Secretary Daniel Poneman and Administrator Tom D'Agostino -Assistant Secretary David Sandalow -Discussion 2:15 PM-2:45 PM Break

376

Enterprise Cyber Security Posture  

Science Conference Proceedings (OSTI)

... to enable organizations to transform uncertainties into ... org/issues- research/telecom/security-breach-notification ... systems C. Cyber-physical systems ...

2013-04-10T23:59:59.000Z

377

Security - Identification Badges  

Science Conference Proceedings (OSTI)

Security - Identification Badges. All doors to the Child Care Center are locked at all times and access is via the card reader system only. ...

2013-08-15T23:59:59.000Z

378

Seamless and Secure Mobility  

Science Conference Proceedings (OSTI)

... layer techniques and the use of advanced measurement in order to accurately assess and manage the performance and security characteristics of ...

2013-11-27T23:59:59.000Z

379

security blunders (INMM 2010)  

NLE Websites -- All DOE Office Websites (Extended Search)

OF SECURITY BLUNDERS Roger G. Johnston and Jon S. Warner Vulnerability Assessment Team Nuclear Engineering Division Argonne National Laboratory 9700 S. Cass Ave, Building 206,...

380

Hazardous Material Security (Maryland)  

Energy.gov (U.S. Department of Energy (DOE))

All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

Note: This page contains sample records for the topic "relations board securities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Nevada National Security Site  

NLE Websites -- All DOE Office Websites (Extended Search)

of nuclear weapons and storing special nuclear materials. Other activities include environmental management, national security response, and defense and civil technologies....

382

Geoscience research for energy security  

Science Conference Proceedings (OSTI)

This report focuses on the nation's geoscience needs and recommends DOE activities to mitigate major problems that effect energy security. The report recommends new or redirected DOE geoscience research initiatives for oil and gas, coal, nuclear resources, structures and processes in the earth's crust, geothermal resources, oil shale, and waste disposal. In light of the current and near-term national energy requirements, federal budget constraints, and the diminished R and D efforts from the domestic energy industry, the Board recommends that DOE: assign highest geoscience research emphasis to shorter-term, energy priorities of the nation; particularly advanced oil and gas exploration and production technologies; establish in DOE an Office of Geoscience Research to develop and administer a strategic plan for geoscience research activities; establish oil and gas research centers within each of the six major oil and gas provinces of the United States to conduct and coordinate interdisciplinary problem-oriented research; increase oil and gas research funding by an initial annual increment of $50 million, primarily to support the regional research centers.

Not Available

1987-02-01T23:59:59.000Z

383

Enforcement of DOE Classified Information Security Requirements Under Title  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of DOE Classified Information Security Requirements of DOE Classified Information Security Requirements Under Title 10, Code of Federal Regulations, Part 824 Enforcement of DOE Classified Information Security Requirements Under Title 10, Code of Federal Regulations, Part 824 In publishing 10 CFR Part 824, DOE has determined that civil penalties under Part 824 will only be assessed for violations of requirements for the protection of classified information (Restricted Data, Formerly Restricted Data and National Security Information). The rule does not include civil penalties relating to failure to protect sensitive but unclassified information. IMPLEMENTATION GUIDANCE More Documents & Publications Safety and Security Enforcement Process Overview Preliminary Notice, Battelle Energy Alliance, LLC, SEA-2011-01

384

Security & Defense Licenses Available | Tech Transfer | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Available Technologies Available Technologies Analytical Instrumentation Chemicals Detectors and Sensors Energy and Utilities Healthcare and Biology Information Technology and Communications Manufacturing Materials Security and Defense Transportation Partnerships Home | Connect with ORNL | For Industry | Partnerships | Technology Licensing | Available Technologies | Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614 Robust Low-Frequency Spread-Spectrum Navigation System (Related ID # 200601627) 200501640 Secure Identification of Textiles and Other Consumer Products 200701980 Cyberspace Security Econometrics System 200701995 An Intrusion Detection System Using Quantum-mechanical

385

Knoxville Utilities Board | Open Energy Information  

Open Energy Info (EERE)

Knoxville Utilities Board Knoxville Utilities Board (Redirected from KUB) Jump to: navigation, search Name Knoxville Utilities Board Place Knoxville, Tennessee Utility Id 10421 Utility Location Yes Ownership M NERC Location SERC NERC SERC Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] SGIC[2] Energy Information Administration Form 826[3] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Knoxville Utilities Board Smart Grid Project was awarded $3,585,022 Recovery Act Funding with a total project value of $9,356,989. Utility Rate Schedules Grid-background.png FIVE-MINUTE RESPONSE (5 MR) INTERRUPTIBLE POWER Commercial GSA (1) 0KW-50KW Commercial OUTDOOR LIGHTING Part B- Mercury Vapor 1000W Lighting

386

On-Boarding Program | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

On-Boarding Program On-Boarding Program On-Boarding Program On-Boarding Program Onboarding, also known as organizational socialization, refers to the mechanism through which new employees acquire the necessary knowledge, skills, and behaviors to become effective organizational members and insiders.[1] Tactics used in this process include formal meetings, lectures, videos, printed materials, or computer-based orientations to introduce newcomers to their new jobs and organizations. Research has demonstrated that these socialization techniques lead to positive outcomes for new employees such as higher job satisfaction, better job performance, greater organizational commitment, and reduction in stress and intent to quit.[2][3] These outcomes are particularly important to an organization

387

On-board scheduling for multimedia applications  

Science Conference Proceedings (OSTI)

This paper discusses on-board dynamic bandwidth allocation for satellite OBP-based broadband multimedia interactive applications. The paper presents a bandwidth allocation scheme which is oriented towards guaranteeing the Quality of Service (QoS) associated ...

Martin Cot; Colin Black; Augustin Iuoras

2001-04-01T23:59:59.000Z

388

Lawrence Berkeley National Laboratory Advisory Board  

NLE Websites -- All DOE Office Websites (Extended Search)

LBNL Masthead Berkeley Lab U.S. Department of Energy A-Z Index Phone Book Careers Search eee Board Members Barrett Craig Barrett, Co-Chair Chairman and CEO Emeritus, Intel...

389

CES-21 board meets at Lawrence Livermore  

NLE Websites -- All DOE Office Websites (Extended Search)

1613ces 04162013 CES-21 board meets at Lawrence Livermore James A Bono, LLNL, (925) 422-9919, bono4@llnl.gov Printer-friendly LLNL's Computation Associate Director Dona Crawford...

390

DOC Information System Security Conference on Innovating ...  

Science Conference Proceedings (OSTI)

... B. Walsh, Acting Director, Cyber Security Program, Department of Homeland Security. ... R. Clark, Senior Advisor National and Cyber Security, DOC. ...

2013-06-28T23:59:59.000Z

391

SECURITY TERMINATION STATEMENT | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

SECURITY TERMINATION STATEMENT SECURITY TERMINATION STATEMENT Form provides an individual's statement in connection with the termination of access authorization (security...

392

National Nuclear Security Administration Overview | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nuclear Security Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National...

393

Annual Security Report October 2012  

E-Print Network (OSTI)

1 Annual Security Report October 2012 Mission Statement The Campus Security and Parking Services Department ("Security") exists to provide a secure and welcoming research, educational, and work environment in which security concerns are balanced with freedom of movement in an open campus atmosphere while

Goddard III, William A.

394

Dumb Ideas in Computer Security  

E-Print Network (OSTI)

Dumb Ideas in Computer Security Dr Charles P Pfleeger Pfleeger Consulting Group 19 July 2011 chuck Security" (2005) http://www.ranum.com/security/computer_security/editorials/dumb/ Default permit Ideas in Computer Security 219 Jul 2011 #12;Struck a Nerve Results 1-10 of about 2,030,000 for dumb

395

Biased Games On Random Boards  

E-Print Network (OSTI)

In this paper we analyze biased Maker-Breaker games and Avoider-Enforcer games, both played on the edge set of a random board G ? G(n, p). In Maker-Breaker games there are two players, denoted by Maker and Breaker. In each round, Maker claims one previously unclaimed edge of G and Breaker responds by claiming b previously unclaimed edges. We consider the Hamiltonicity game, the perfect matching game and the k-vertexconnectivity game, where Makers goal is to build a graph which possesses the relevant property. Avoider-Enforcer games are the reverse analogue of Maker-Breaker games with a slight modification, where the two players claim at least 1 and at least b previously unclaimed edges per move, respectively, and Avoider aims to avoid building a graph which possesses the relevant property. Maker-Breaker games are known to be bias-monotone, that is, if Maker wins the (1, b) game, he also wins the (1, b ? 1) game. Therefore, it makes sense to define the critical bias of a game, b ? , to be the breaking point of the game. That is, Maker wins the (1, b) game whenever b ? b ? and loses otherwise. An analogous definition of the critical bias exists for Avoider-Enforcer games: here, the critical bias of a game b ? is such that Avoider wins the (1, b) game for every b> b ? , and loses otherwise. ln n We prove that, for every p = ?( n), G ? G(n, p) is typically such that the critical bias for all the aforementioned Maker-Breaker games is asymptotically b ? = np ln n. We also ln n prove that in the case p = ?( n), the critical bias is b ? = ? ( np ln n). These results settle a conjecture of Stojakovi? and Szab. For Avoider-Enforcer games, we prove that for p = ?( ln n n), the critical bias for all the aforementioned games is b ? = ? ( np ln n). 1

Asaf Ferber; Roman Glebov; Michael Krivelevich; Alon Naor

2012-01-01T23:59:59.000Z

396

Tag: Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security Tag: Global Security Displaying 1 - 10 of 61... Category: Global Security Ultrasonic cleaner cuts costs, enhances safety The process of upgrading an old cleaning unit revealed how things were once done and the advances that have followed. More... Category: Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide. More... Category: Global Security Y-12 Receives Two R&D 100 Awards Engineers at the National Nuclear Security Administration's Y-12 National Security Complex have won two R&D 100 Awards. More... Category: Global Security Y-12 researchers garner R&D 100 awards A research chemist and his revolutionary cloth invented to clean surfaces

397

Security and Cyber Evaluations - Guidance Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Guidance Documents Security and Cyber Evaluations Security Evaluations Appraisal Process Guide, April 2008 Cyber Security Evaluations Appraisal Process Guide, April 2008 Security...

398

Nevada National Security Site | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nevada National Security Site Nevada National Security Site Nevada National Security Site | October 2011 Control Point Nevada National Security Site | October 2011 Control Point...

399

Headquarters Facilities Master Security Plan | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Headquarters Facilities Master Security Plan Headquarters Facilities Master Security Plan Welcome to the 2013 version of the Headquarters Facilities Master Security...

400

Physical Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Oversight Security & Cyber Evaluations Security and Cyber Guidance Physical Security Reports Physical Security Reports 2012 (U) Pantex Plant Protective Force Response...

Note: This page contains sample records for the topic "relations board securities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Integrated Security System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Integrated Security System Integrated Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems...

402

Secure video communications system  

DOE Patents (OSTI)

A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

Smith, Robert L. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

403

Secretary of Energy Advisory Board Hosts Conference Call on Shale Gas Draft  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Hosts Conference Call on Shale Hosts Conference Call on Shale Gas Draft Report Secretary of Energy Advisory Board Hosts Conference Call on Shale Gas Draft Report November 10, 2011 - 4:30pm Addthis Washington, DC - On Monday, November 14, 2011, the Secretary of Energy Advisory Board (SEAB) will convene a public meeting via conference call to discuss the SEAB Subcommittee on Shale Gas Production draft report . The meeting will allow SEAB members to provide advice and recommendations as well receive public comments on the report. Media wishing to attend should contact Niketa Kumar at niketa.kumar@hq.doe.gov by 5pm on Friday, November 11. WHAT: Secretary of Energy Advisory Board Meeting WHEN: Monday, November 14, 2011 2:00pm News Media Contact: (202) 586-4940 Addthis Related Articles Secretary Chu to Host Secretary of Energy Advisory Board Meeting

404

Partnering with Utilities for Energy Efficiency & Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SPIDERS SPIDERS Energy Security JCTD Proposal Dr. George Ka'iliwai Mr. Wade Jost USPACOM J8, Director of OSD Power Surety y Task Force Resources and Assessment The RedGate Group This brief is: This brief is: UNCLASSIFIED 1 UNCLASS As of Nov 09 The Situation * "Critical national security y and homeland defense missions are at an unacceptably high risk of extended outage from failure of the electric grid." The Defense Science Board Task Force on DoD Energy Security, July 2008 UNCLASS 2 UNCLASS As of Nov 09 The Situation * "There have been numerous attacks on the operating systems of major critical infrastructure facilities, including power grids, around the world in recent years: Chinese and Russian spies have "penetrated the U S penetrated the U.S.

405

PRIVACY/SECURITY NOTICE  

NLE Websites -- All DOE Office Websites (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

406

Securing Control Systems Modems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Recommended Practice for Securing Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. iv ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland

407

International Nuclear Security  

SciTech Connect

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

408

Secure Contexts (Extended Abstract)  

E-Print Network (OSTI)

Information flow security in a multilevel system aims at guaranteeing that no high level information is revealed to low levels. A usual requirement to ensure information flow security for a process is that no generic attacker can induce a high-to-low information flow. This requirement is too demanding when we have some knowledge about the contexts where the process is going to run. To deal with these situations we introduce the notion of secure contexts for a process. The notion is parametric with respect to both the observational equivalence and the operation used to characterize the low level behavior. In the paper we mainly analyze the cases of bisimulation and trace equivalence. We describe how to build secure contexts in these cases and we show that two well-known security properties, BNDC and NDC, are just special instances of our general notion.

Annalisa Bossi; Damiano Macedonio; Carla Piazza; Sabina Rossi

2003-01-01T23:59:59.000Z

409

Indirection and computer security.  

SciTech Connect

The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

Berg, Michael J.

2011-09-01T23:59:59.000Z

410

Fairness in the Air: California's Air Pollution Hearing Boards  

E-Print Network (OSTI)

oral depositions, requests for admission of facts, and document production requests. Be- cause hearing board

Manaster, Kenneth A.

2005-01-01T23:59:59.000Z

411

Preliminary Notice of Violation, Los Alamos National Security, LLC -  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security, LLC Security, LLC - WEA-2012-03 Preliminary Notice of Violation, Los Alamos National Security, LLC - WEA-2012-03 October 17, 2012 Issued to Los Alamos National Security, LLC, related to Four Electrical Safety-Related Events that occurred at the Los Alamos National Laboratory (LANL) This letter refers to the Office of Health, Safety and Security's Office of Enforcement and Oversight investigation into the facts and circumstances surrounding four electrical safety-related events that occurred at the Los Alamos National Laboratory (LANL) from October 2010 through January 2011. Preliminary Notice of Violation, Los Alamos National Security, LLC - WEA-2012-03 More Documents & Publications Sandia Sled Track PNOV Press Release Enforcement Letter, Computer Services, LLC - WEL-2012-03

412

Enforcement Documents - Y-12 National Security Complex | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Y-12 National Security Complex Y-12 National Security Complex Enforcement Documents - Y-12 National Security Complex June 13, 2008 Preliminary Notice of Violation, Babcock & Wilcox Teclmical Services Y-12, LLC - NEA-2008-01 Preliminary Notice of Violation issued to Babcock & Wilcox Technical Services Y-12, LLC, related to a Uranium Chip Fire at the Y-12 National Security Complex September 18, 2007 Preliminary Notice of Violation, BWXT Y-12 LLC - EA-2007-04 Preliminary Notice of Violation issued to BWXT Y-12, LLC, related to Criticality Safety Controls at the Y-12 National Security Complex June 15, 2006 Enforcement Letter, BWXT Y-12 - June 15, 2006 Enforcement Letter issued to BWXT Y-12 related to Quality Assurance Deficiencies in construction activities at the Y-12 National Security

413

The Office of Nuclear Safeguards and Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Safeguards and Security | National Nuclear Security Safeguards and Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The Office of Nuclear Safeguards and Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security > The Office of Nuclear Safeguards and Security The Office of Nuclear Safeguards and Security

414

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... To receive email notification(s) when new security publications are released, subscribe to the CSRC Publications Mailing List. ... NIST Security Events. ...

415

Berkeley Lab Cyber Security - Cyber Security Website - Berkeley...  

NLE Websites -- All DOE Office Websites (Extended Search)

Department of Energy logo Phone Book Jobs Search Contact Us About CPIC Intranet Cyber Home Resources Training Requirements Search Cyber Security Cyber Security Website FAQs...

416

Well Logging Security Initiatives | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Well Logging Security ... Well Logging Security Initiatives The mp4 video format is not supported by this browser. Download video Captions: On Watch as GTRI demonstrates the threat...

417

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... and Space Administration, the National Security Agency, the Department of Energy, the US Office of Management and Budget, the Social Security ...

418

Security and Training | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Training Security and Training Instability in parts of the world and increased terrorist activities worldwide intensify security concerns in protecting personnel, materials and...

419

From National Security to Environmental Security: A Historical Overview .  

E-Print Network (OSTI)

??The study attempts to provide a historical approach to the role of the environment in security studies. Contemporary security challenges have shown that the narrow (more)

Vella, Andre`

2012-01-01T23:59:59.000Z

420

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... NIST Computer Security Division is Proud to Announce the Release of DRAFT NISTIR 7298, Revision 2: NIST Glossary of Key Information Security ...

Note: This page contains sample records for the topic "relations board securities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Wnchington, DC 20585 Wnchington, DC 20585 July 13, 2010 OFFICE O F THE ADMINISTRATOR 'l'he Honorable Peter S. Winokur Chairman Defense Nuclear Facilities Safety Board 625 Indiana Avenue, NW, Suite 700 Washington, D.C. 20004 [>ear Mr. Chairman: By the direction of the Secretary of Energy, the enclosed is the Department's Implementation Plan (Plan) for Defense Nuclear Facilities Safety Board (Board) Recommendation 2009-2, Los Alamos Nutional Luhorutory Plutoniu?lt Fucilitj. Sr i s m ic Sufety. The Plan provides the Department's approach for implementing near-term actions to reduce the consequences of seismically-induced events at the Los Alamos National Laboratory Plutonium Facility, and longer-tcrm actions to ensure continued safe operation of the facility. Mr. James .I. McConnell. Assistant Deputy Administrator for Nuclear Safety and

422

Submission to Human Relations Job board toolkits: Internet matchmaking  

E-Print Network (OSTI)

advertisement: job searchers enter the keywords in a special field and the search engine scans the database to extract only the ads including the search terms. Keywords do not require a general classification and can a blind search, without knowing which terms are privileged by the advertisers. #12;14 Input fields

Paris-Sud XI, Université de

423

DOE Annual Reports to Congress On Board-Related Activities -...  

NLE Websites -- All DOE Office Websites (Extended Search)

. . . . . . . . . . . . . . . . . . . . III-21 3.D Lead Organization: Environmental Management . . . . . . . . . . . . . . . . . . . . . . . . . . III-21 3.E Lead Organization:...

424

DOE Annual Reports to Congress On Board-Related Activities -...  

NLE Websites -- All DOE Office Websites (Extended Search)

Laboratory (ORNL)) C Bechtel Jacobs Company, LLC (for management and integration of Environmental ManagementUranium Enrichment work) C BNFL Inc (for metal recycle and...

425

SCADA system security, complexity, and security proof  

Science Conference Proceedings (OSTI)

Modern Critical infrastructures have command and control systems. These command and control systems are commonly called supervisory control and data acquisition (SCADA). In the past, SCADA system has a closed operational environment, so these systems ... Keywords: 11770-2 mechanism 9, Formal security poof, SCADA, key management

Reda Shbib; Shikun Zhou; Khalil Alkadhimi

2012-11-01T23:59:59.000Z

426

Remote PC Security: Securing the home worker  

Science Conference Proceedings (OSTI)

A recent study of 1000 teleworkers in 10 countries, commissioned by Cisco, showed that one in five allows friends, family and others to use their work PC to access the Internet. Now is the time to pull stray remote workers back into the security fold. ...

Steven Furnell

2006-11-01T23:59:59.000Z

427

Security Assistance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Assistance Security Assistance Security Assistance Welcome to Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal

428

UC SECURITY FRAMEWORK 2011 -2012  

E-Print Network (OSTI)

1 UC SECURITY FRAMEWORK 2011 - 2012 #12;2 Contents Background..................................................................................................................................4 About UC Security & Campus Community Support .................................................................5 Security Service Authority and Relationship with NZ Police and Emergency Services ...........5

Hickman, Mark

429

The security of machine learning  

E-Print Network (OSTI)

of the IEEE symposium on security and privacy (pp. 188201).and communications security (CCS) (pp. 5968). Globerson,detection. In USENIX security symposium. Klimt, B. , & Yang,

Barreno, Marco; Nelson, Blaine; Joseph, Anthony D.; Tygar, J. D.

2010-01-01T23:59:59.000Z

430

January 2005 INTEGRATING IT SECURITY  

E-Print Network (OSTI)

January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS By Joan S. Hash, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Introduction To assist federal agencies with effec tively integrating security

431

Evaluating mobile agent platform security  

Science Conference Proceedings (OSTI)

Agent mobility requires additional security standards. While the theoretical aspects of mobile agent security have been widely studied, there are few studies about the security standards of current agent platforms. In this paper, test cases are proposed ...

Axel Brkle; Alice Hertel; Wilmuth Mller; Martin Wieser

2006-09-01T23:59:59.000Z

432

Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System  

E-Print Network (OSTI)

This paper describes the background of smart information infrastructure and the needs for smart grid information security. It introduces the conceptual analysis to the methodology with the application of hermeneutic circle and information security functional requirement identification. Information security for the grid market cover matters includes automation and communications industry that affects the operation of electric power systems and the functioning of the utilities that manage them and its awareness of this information infrastructure has become critical to the reliability of the power system. Community benefits from of cost savings, flexibility and deployment along with the establishment of wireless communications. However, concern revolves around the security protections for easily accessible devices such as the smart meter and the related communications hardware. On the other hand, the changing points between traditional versus smart grid networking trend and the information security importance on...

Ling, Amy Poh Ai; 10.5121/ijgca.2011.2201

2011-01-01T23:59:59.000Z

433

Enforcement Letter, Lawrence Livermore National Security LLC, - May 15,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security LLC, - May Security LLC, - May 15, 2008 Enforcement Letter, Lawrence Livermore National Security LLC, - May 15, 2008 May 15, 2008 Enforcement Letter issued to Lawrence Livermore National Security, LLC related to the Protection of Classified Information at the Lawrence Livermore National Laboratory In our recent dialogue via televideo with your Deputy, safeguards and security director, and other key managers of your staff, we discussed our reasons for sending this enforcement letter to Lawrence Livermore National Security, LLC; the purpose of this letter; and our concerns about the protection of classified information at the Lawrence Livermore National Laboratory (LLNL). Accordingly, this is not a formal enforcement action and imposes no requirements. Enforcement Letter, Lawrence Livermore National Security LLC- May 15, 2008

434

Security and Suitability Process Reform  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security and Suitability Process Reform December 2008 Provided by the Joint Security and Suitability Reform Team EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET...

435

Security Suites | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Suites Available by Internet Service Providers Comcast Comcast offers the Norton Security Suite with antivirus and firewall software for your protection, for no additional...

436

Smart-Grid Security Issues  

Science Conference Proceedings (OSTI)

TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

2010-01-29T23:59:59.000Z

437

Technologies licensed | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Technologies licensed Technologies licensed Technologies licensed Posted: July 16, 2012 - 3:49pm | Y-12 Report | Volume 9, Issue 1 | 2012 Rendering of Y-12's Access Rate Control System Wherever threatening situations arise, in-place security measures make the most of every second. On Feb. 8, a startup firm in Knoxville, Tenn., licensed two security-related technologies from the Y-12 National Security Complex that do just that. The technologies, which delay entrance to controlled-access areas, provide a security solution for various potential markets: commercial nuclear facilities, pharmaceutical manufacturers, correctional facilities and large sporting venues, as well as for other Department of Energy sites. Sustainable Environment Technologies, LLC (SET), licensed the Access Rate

438

Privacy/Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

439

Los Alamos CCS (Center for Computer Security) formal computer security model  

SciTech Connect

This paper provides a brief presentation of the formal computer security model currently being developed at the Los Alamos Department of Energy (DOE) Center for Computer Security (CCS). The initial motivation for this effort was the need to provide a method by which DOE computer security policy implementation could be tested and verified. The actual analytical model was a result of the integration of current research in computer security and previous modeling and research experiences. The model is being developed to define a generic view of the computer and network security domains, to provide a theoretical basis for the design of a security model, and to address the limitations of present models. Formal mathematical models for computer security have been designed and developed in conjunction with attempts to build secure computer systems since the early 70's. The foundation of the Los Alamos DOE CCS model is a series of functionally dependent probability equations, relations, and expressions. The mathematical basis appears to be justified and is undergoing continued discrimination and evolution. We expect to apply the model to the discipline of the Bell-Lapadula abstract sets of objects and subjects. 5 refs.

Dreicer, J.S.; Hunteman, W.J. (Los Alamos National Lab., NM (USA))

1989-01-01T23:59:59.000Z

440

Worker Safety and Health Enforcement Letter issued to Los Alamos National Security, LLC, related to Worker Beryllium Exposure during Machining at the Los Alamos National Laboratorys Beryllium Technology Facility, May 29, 2013 (WEL-2013-01)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29, 2013 29, 2013 Dr. Charles F. McMillan, President Los Alamos National Security, LLC Los Alamos National Laboratory Mailstop A 100, Drop Point 03140071S Bikini Atoll Road, TA-3 Los Alamos, New Mexico 87454 WEL-2013-01 Dear Dr. McMillan: The Office of Health, Safety and Security's Office of Enforcement and Oversight evaluated the circumstances surrounding a work evolution performed at Los Alamos National Laboratory (LANL) Technical Area 3, Building 141, Beryllium Technology Facility (BTF), on July 11, 2012. The work evolution resulted in a worker exposure to beryllium in excess of the Department of Energy (DOE) action level of 0.2 micrograms per cubic meter for an 8-hour, time-weighted average. Los Alamos National Security, LLC (LANS), which manages and

Note: This page contains sample records for the topic "relations board securities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

August 1, 2003, Board announcement of a Public Meeting on the Department of Energy oversight - September 10, 2003  

NLE Websites -- All DOE Office Websites (Extended Search)

§ 552b), § 552b), notice is hereby given of the Defense Nuclear Facilities Safety Board's (Board) meeting described below. The Board will also conduct a series of public hearings pursuant to 42 U.S.C. §2286b and invites any interested persons or groups to present any comments, technical information, or data concerning safety issues related to the matters to be considered. TIME AND DATE OF MEETING: 9:00 - 12:00 a.m., September 10, 2003. PLACE: Defense Nuclear Facilities Safety Board, Public Hearing Room, 625 Indiana Avenue, NW, Suite 300, Washington, DC 20004-2001. Additionally, as a part of the Board's E-Government initiative, the meeting will be presented live through Internet video streaming. A link to this presentation will be available on the home page of the

442

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card  

E-Print Network (OSTI)

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your and evidence to any Social Security office. Follow instructions below. HOW TO COMPLETE THE APPLICATION Most

Li, Mo

443

Safety and Security What do Safety/Security work with?  

E-Print Network (OSTI)

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with; · Security revolving work environment · Handle locks, keys, alarms, surveillance · Responsible

444

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY  

E-Print Network (OSTI)

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION Services #12;28 00 00 ELECTRONIC SAFETY AND SECURITY August 8, 2011 2 THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE PART 1 - GENERAL 1.1 NOTICE

Texas at Austin, University of

445

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY  

E-Print Network (OSTI)

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION Services #12;28 00 00 ELECTRONIC SAFETY AND SECURITY May 1, 2013 2 THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE PART 1 - GENERAL 1.1 NOTICE

Texas at Austin, University of

446

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Risks posters; National Security Agency Counterintelligence Awareness (301-688-6535); Native Intelligence, Inc. Rainbow ...

447

Science at its best, security at its worst. A report on security problems at the U.S. Department of Energy  

SciTech Connect

On March 18, 1999, President Clinton tasked the Foreign Intelligence Advisory Board to review the history of the security and counterintelligence threats to the nations weapons labs and the effectiveness of the responses by the US government. He also asked the Board to propose further improvements. This report, based on reviews of hundreds of source documents and studies, analysis of intelligence reports, and scores of interviews with senior level officials from several administrations, was prepared over the past 90 days in fulfillment of the Presidents request.

NONE

1999-06-01T23:59:59.000Z

448

Extender for securing a closure  

DOE Patents (OSTI)

An apparatus for securing a closure such as door or a window that opens and closes by movement relative to a fixed structure such as a wall or a floor. Many embodiments provide a device for relocating a padlock from its normal location where it secures a fastener (such as a hasp) to a location for the padlock that is more accessible for locking and unlocking the padlock. Typically an extender is provided, where the extender has a hook at a first end that is disposed through the eye of the staple of the hasp, and at an opposing second end the extender has an annulus, such as a hole in the extender or a loop or ring affixed to the extender. The shackle of the padlock may be disposed through the annulus and may be disposed through the eye of a second staple to secure the door or window in a closed or open position. Some embodiments employ a rigid sheath to enclose at least a portion of the extender. Typically the rigid sheath has an open state where the hook is exposed outside the sheath and a closed state where the hook is disposed within the sheath.

Thomas, II, Patrick A.

2012-10-02T23:59:59.000Z

449

Federal Information Systems Security Educators' Association ...  

Science Conference Proceedings (OSTI)

Federal Information Systems Security Educators' Association (FISSEA). Summary: The Federal Information Systems Security ...

2013-01-15T23:59:59.000Z

450

Border Gateway Protocol - Robustness and Security  

Science Conference Proceedings (OSTI)

Border Gateway Protocol - Robustness and Security. Summary: This project focuses on Robustness, Security, and Scalability ...

2012-05-03T23:59:59.000Z

451

Federal Computer Security Program Managers' Forum (Forum ...  

Science Conference Proceedings (OSTI)

Federal Computer Security Program Managers' Forum. Summary: The Federal Computer Security Program Managers' Forum ...

2013-01-15T23:59:59.000Z

452

Global Nuclear Security Technology Division (GNSTD)  

NLE Websites -- All DOE Office Websites (Extended Search)

Systems Nonproliferation Technology Nuclear Material Detection & Characterization Nuclear Security Advanced Technologies Safeguards & Security Technology Threat Reduction...

453

National Security Information Systems (NSIS) -National Security Systems &  

NLE Websites -- All DOE Office Websites (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

454

National Security, Weapons Science  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security, Weapons Science National Security, Weapons Science /science-innovation/_assets/images/icon-science.jpg National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at LANL is part of the DOE's stockpile stewardship program. It uses two large X-ray machines to record three-dimensional interior images of materials. In most experiments, materials (including plutonium) undergo hydrodynamic shock to simulate the implosion process in nuclear bombs and/or the effects of severe hydrodynamic stress. The tests are described as "full-scale mockups

455

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AI~W~~l AI~W~~l 11Vl'~~4 National Nuclear Security Administration Department of Energy National Nuclear Security Administration Nevada Site Office P.O. Box 98518 Las Vegas, NV 89193-8518 JAN! 8 2013 Gregory H. Woods, General Counsel, DOE/HQ (GC-1) FORS NATIONAL NUCLEAR SECURITY ADMINISTRATION NEVADA SITE OFFICE (NNSA/NSO) NATIONAL ENVIRONMENTAL POLICY ACT (NEPA) ANNUAL SUMMARY In accordance with DOE Order 451.1B, National Environmental Policy Act Compliance Program, NNSA/NSO is submitting the enclosed Annual NEP A Planning Summary. The document provides a brief description of ongoing and planned NEP A actions for calendar year 2013. This summary provides information for completion of the Site- Wide Environmental Impact Statement for the Nevada National Security Site and Off-Site Locations in the State of Nevada.

456

Security/Disclaimer  

Office of Scientific and Technical Information (OSTI)

U.S. Department of Energy DOE Green Energy Home & Search About Contact Us Javascript Not Enabled OSTI Security Website Policies and Important Links Some links on this page may take...

457

Internet Security Glossary  

Science Conference Proceedings (OSTI)

This Glossary (191 pages of definitions and 13 pages of references) provides abbreviations, explanations, and recommendations for use of information system security terminology. The intent is to improve the comprehensibility of writing that deals with ...

R. Shirey

2000-05-01T23:59:59.000Z

458

Office of Security Enforcement  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

459

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

460

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Security Administration FY 2011 - FY 2015 Budget Outlook Managing the NNSA 4.0% Science, Technology & Engineering 14.5% Stockpile Support 17.9% Preventing the Spread of...

Note: This page contains sample records for the topic "relations board securities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Wi-Fi security  

Science Conference Proceedings (OSTI)

"ALL [wireless security] mechanisms are completely in-effective" was the conclusion of a study by the Department of Computer Science at the University of Maryland. This discussion will systematically shed light on the inherent insecurities involved with ...

Paul Williams

2006-04-01T23:59:59.000Z

462

Information Security: Coordination of Federal Cyber Security Research and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

463

AVIATION BOARD OF DIRECTORS BYLAWS AND PROTOCOLS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AVIATION BOARD OF DIRECTORS AVIATION BOARD OF DIRECTORS BYLAWS AND PROTOCOLS The Department of Energy strives to manage its Aviation Program toward the highest standards of safety, efficiency, fairness in contracting, preservation of competition in the private sector, open communication, prudent property management, and the best examples of resource management. Toward these ends, the Department has established a management structure led by a Board of Directors comprising active Federal employee aviation managers from the Department. AUTHORITY: The following authorities serve as basis for this structure and system: Office of Management and Budget Circular A-126, FMR 102.33, DEAR 109, DOE Order 440.2B, Aviation Management Review Team Report, March 1999, and Secretary of Energy Appointment and Delegation of Authority, April 15, 1999.

464

Foley Board of Utilities | Open Energy Information  

Open Energy Info (EERE)

Foley Board of Utilities Foley Board of Utilities Jump to: navigation, search Name Foley Board of Utilities Place Alabama Utility Id 6491 Utility Location Yes Ownership M NERC Location SERC NERC SERC Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Athletic Field Electric- Option A Commercial Athletic Field Electric- Option B Commercial General Service -Three-Phase Commercial General Service- Single-Phase Commercial Public Highway Lighting- Special Lighting Public Street and Highway Lighting- Customer Owned Fixtures Lighting Public Street and Highway Lighting- Utility-Owned Fixtures- 20,000 Lumen

465

Guntersville Electric Board | Open Energy Information  

Open Energy Info (EERE)

Guntersville Electric Board Guntersville Electric Board Jump to: navigation, search Name Guntersville Electric Board Place Alabama Utility Id 7827 Utility Location Yes Ownership M NERC Location SERC NERC SERC Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png GSA 1 Commercial GSA 2 Commercial GSA 3 Commercial Outdoor Lighting Commercial Residential Rate Residential SDE SGSC Industrial SDE SGSD Industrial SDE SMSB Industrial SDE SMSC Industrial SDE SMSD Commercial TDGSA Industrial TDMSA Industrial TOU GSB Industrial TOU GSD Industrial TOU MSB Industrial TOU MSC Industrial

466

Kerrville Public Utility Board | Open Energy Information  

Open Energy Info (EERE)

Kerrville Public Utility Board Kerrville Public Utility Board Jump to: navigation, search Name Kerrville Public Utility Board Place Texas Utility Id 28604 Utility Location Yes Ownership M NERC Location TRE NERC ERCOT Yes Activity Buying Transmission Yes Activity Distribution Yes Alt Fuel Vehicle Yes Alt Fuel Vehicle2 Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Commercial-for Energy greater than 2500 kWh Commercial Commercial-for Energy greater than 2500 kWh-Distributed generation Rider Commercial Commercial-for Energy less or equal to 2500 kWh Commercial Commercial-for Energy less orequal to 2500 kWh-Distributed generation rider

467

Brownsville Public Utilities Board | Open Energy Information  

Open Energy Info (EERE)

Brownsville Public Utilities Board Brownsville Public Utilities Board Jump to: navigation, search Name Brownsville Public Utilities Board Place Texas Utility Id 2409 Utility Location Yes Ownership M NERC Location TRE NERC ERCOT Yes ISO Ercot Yes Operates Generating Plant Yes Activity Generation Yes Activity Transmission Yes Activity Buying Transmission Yes Activity Distribution Yes Activity Wholesale Marketing Yes Activity Bundled Services Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png General Service GSA-1 Commercial General Service- GSA-2 Commercial General Service- GSA-3 Commercial

468

Sylacauga Utilities Board | Open Energy Information  

Open Energy Info (EERE)

Sylacauga Utilities Board Sylacauga Utilities Board Jump to: navigation, search Name Sylacauga Utilities Board Place Alabama Utility Id 18395 Utility Location Yes Ownership M NERC Location SERC NERC SERC Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Large General Service Commercial Commercial Large General Service Industrial Industrial Large General Service Primary Service Credit with Standby Generator Capacity Industrial Large General Service Primary Service Credit Commercial Commercial Large General Service Primary Service Credit Industrial Industrial

469

Gerig to Chair Particle Accelerator School Board  

NLE Websites -- All DOE Office Websites (Extended Search)

A Record Run for the APS X-ray Source A Record Run for the APS X-ray Source Alp of XSD Elected to FIP Executive Committee George Srajer Appointed APS Upgrade Project Director Toby of XSD to Chair U.S. National Committee for Crystallography Controlling the Inner Electron Dance APS News Archives: 2012 | 2011 | 2010 | 2009 2008 | 2007 | 2006 | 2005 2004 | 2003 | 2002 | 2001 2000 Subscribe to APS News rss feed Gerig to Chair Particle Accelerator School Board FEBRUARY 23, 2012 Bookmark and Share Rod Gerig (PSC), Deputy Associate Laboratory Director for Photon Sciences Rod Gerig was selected chair of the Board of Governors of the U.S. Particle Accelerator School (USPAS) at the board's annual meeting. Gerig is Deputy Associate Laboratory Director for Photon Sciences at Argonne National Laboratory, and is also the director of the Argonne Accelerator

470

Loudon Utilities Board | Open Energy Information  

Open Energy Info (EERE)

Board Board Jump to: navigation, search Name Loudon Utilities Board Place Tennessee Utility Id 11222 Utility Location Yes Ownership M NERC Location SERC NERC SERC Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Outdoor Lighting Lighting Part A: 1,001 - 5,000 kW Industrial Part A: 51 - 1,000 kW Industrial Part A: less than 50kW Commercial Part B: Seasonal D & E Manufacturing: 5,001 - 15,000 kW Industrial Part B: Seasonal D & E Standard: 5,001 - 15,000 kW Industrial Part C: Seasonal D & E Manufacturing: 15,001 - 25,000 kW Industrial

471

On-Board Storage Systems Analysis  

NLE Websites -- All DOE Office Websites (Extended Search)

On-Board Storage Systems Analysis On-Board Storage Systems Analysis R. K. Ahluwalia, J-K Peng and T. Q. Hua DOE and FreedomCAR & Fuel Partnership Hydrogen Delivery and On-Board Storage Analysis Workshop Washington, DC 25 January 2006 Work sponsored by U.S. Department of Energy, Energy Efficiency, Renewable Energy: Hydrogen, Fuel Cells & Infrastructure Technologies 2 ANL ANL ' ' s Role in H s Role in H 2 2 Storage Systems Development Storage Systems Development Working with DOE contractors and Centers of Excellence researchers: Model and analyze various developmental hydrogen storage systems Analyze hybrid systems that combine features of more than one concept Develop models that can be used to "reverse-engineer" particular technologies Identify interface issues and opportunities, and data

472

Incidents of Security Concern  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NOT MEASUREMENT NOT MEASUREMENT SENSITIVE DOE-STD-1210-2012 September 2012 DOE STANDARD Incidents of Security Concern U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1210-2012 INTENTIONALLY BLANK DOE-STD-1210-2012 TABLE OF CONTENTS PARAGRAPH PAGE FOREWORD ................................................................................................................................ IV INCIDENTS OF SECURITY CONCERN......................................................................................1 1. SCOPE ....................................................................................................................................1 2. PURPOSE...............................................................................................................................1

473

Security Resiliency Testing  

Science Conference Proceedings (OSTI)

An accepted practice within the electric sector is to pre-stage and test equipment before deployment. Verification of functionality, operating parameters, and interoperability of equipment to be deployed can often be incorporated into predeployment testing. This testing may also support the selection of features responsible for the security of the host equipment. However, some security features and many aspects of resiliency testing may require activation, interaction, and interoperability with an ...

2013-12-02T23:59:59.000Z

474

Transportation Security Update  

Science Conference Proceedings (OSTI)

The U.S. Department of Transportation (DOT) final rules issued in 2003 required persons who offer for transportation or transport certain hazardous materials to develop and implement security plans. The Electric Power Research Institute (EPRI) formed a Transportation Security Implementation Working Group, which included representation from the Nuclear Energy Institute (NEI), to identify key projects, which were documented in the original report in 2005. This report updates information in the original rep...

2011-07-27T23:59:59.000Z

475

Data port security lock  

DOE Patents (OSTI)

In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

2008-06-24T23:59:59.000Z

476

EM Highlights Advisory Board Contributions | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Highlights Advisory Board Contributions Highlights Advisory Board Contributions EM Highlights Advisory Board Contributions March 5, 2013 - 12:00pm Addthis Participants in the session on Advisory Board contributions to the EM program included, left to right, Karen Guevara, Savannah River Site; Ralph Phelps, Northern New Mexico Citizens’ Advisory Board; Cate Alexander, EM; Eric Roberts, EHI Consultants; Dave Adler, Oak Ridge site; and Ralph Young, Paducah Citizens Advisory Board. Participants in the session on Advisory Board contributions to the EM program included, left to right, Karen Guevara, Savannah River Site; Ralph Phelps, Northern New Mexico Citizens' Advisory Board; Cate Alexander, EM; Eric Roberts, EHI Consultants; Dave Adler, Oak Ridge site; and Ralph Young, Paducah Citizens Advisory Board.

477

Alternative Fuels Data Center: Knoxville Utilities Board Reduces Petroleum  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Knoxville Utilities Knoxville Utilities Board Reduces Petroleum Use to someone by E-mail Share Alternative Fuels Data Center: Knoxville Utilities Board Reduces Petroleum Use on Facebook Tweet about Alternative Fuels Data Center: Knoxville Utilities Board Reduces Petroleum Use on Twitter Bookmark Alternative Fuels Data Center: Knoxville Utilities Board Reduces Petroleum Use on Google Bookmark Alternative Fuels Data Center: Knoxville Utilities Board Reduces Petroleum Use on Delicious Rank Alternative Fuels Data Center: Knoxville Utilities Board Reduces Petroleum Use on Digg Find More places to share Alternative Fuels Data Center: Knoxville Utilities Board Reduces Petroleum Use on AddThis.com... Jan. 22, 2011 Knoxville Utilities Board Reduces Petroleum Use F ind out how the Knoxville Utilities Board is displacing more than 46,000

478

EM Highlights Advisory Board Contributions | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EM Highlights Advisory Board Contributions EM Highlights Advisory Board Contributions EM Highlights Advisory Board Contributions March 5, 2013 - 12:00pm Addthis Participants in the session on Advisory Board contributions to the EM program included, left to right, Karen Guevara, Savannah River Site; Ralph Phelps, Northern New Mexico Citizens’ Advisory Board; Cate Alexander, EM; Eric Roberts, EHI Consultants; Dave Adler, Oak Ridge site; and Ralph Young, Paducah Citizens Advisory Board. Participants in the session on Advisory Board contributions to the EM program included, left to right, Karen Guevara, Savannah River Site; Ralph Phelps, Northern New Mexico Citizens' Advisory Board; Cate Alexander, EM; Eric Roberts, EHI Consultants; Dave Adler, Oak Ridge site; and Ralph Young, Paducah Citizens Advisory Board.

479

Alternative Fuels Data Center: Propane Board and Dealer Requirements  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Propane Board and Propane Board and Dealer Requirements to someone by E-mail Share Alternative Fuels Data Center: Propane Board and Dealer Requirements on Facebook Tweet about Alternative Fuels Data Center: Propane Board and Dealer Requirements on Twitter Bookmark Alternative Fuels Data Center: Propane Board and Dealer Requirements on Google Bookmark Alternative Fuels Data Center: Propane Board and Dealer Requirements on Delicious Rank Alternative Fuels Data Center: Propane Board and Dealer Requirements on Digg Find More places to share Alternative Fuels Data Center: Propane Board and Dealer Requirements on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Propane Board and Dealer Requirements The Idaho Liquefied Petroleum Gas (LPG) Public Safety Act established the

480

Erera, Spring School 2004 Transportation Security  

E-Print Network (OSTI)

! Transportation security research: future #12;Erera, Spring School 2004 Outline ! Understanding transportationErera, Spring School 2004 Transportation Security Alan Erera and Chelsea C. White III Industrial transportation security ! Security regulations and programs ! Transportation security research: present

Erera, Alan

Note: This page contains sample records for the topic "relations board securities" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

ENVIRONMENTAL MANAGEMENT SITE SPECIFIC ADVISORY BOARD  

NLE Websites -- All DOE Office Websites (Extended Search)

DEPARTMENT OF ENERGY DEPARTMENT OF ENERGY ENVIRONMENTAL MANAGEMENT SITE-SPECIFIC ADVISORY BOARD (EM SSAB) Savannah River Site Application No. (Please leave blank) ______________ MEMBERSHIP APPLICATION ________________________________________________________________________________________________ The EM SSAB provides meaningful opportunity for collaborative dialogue among the diverse communities at the Department of Energy (DOE) Environmental Management (EM) clean-up sites. At the request of the Assistant Secretary or the Site Manager/Assistant Manager for Environmental Management, the Board provides advice and recommendations concerning the following EM site-specific issues: clean-up standards and environmental restoration; waste management and disposition; stabilization and disposition of non-stockpile nuclear materials;

482

CMS System Security Plan Template  

Science Conference Proceedings (OSTI)

System Security Plan (SSP) Template Instructions. This template contains boiler plate language. Each template must be ...

2009-06-30T23:59:59.000Z

483

Roadmapping Workshop: Measurement of Security ...  

Science Conference Proceedings (OSTI)

Roadmapping Workshop: Measurement of Security Technology Performance Impacts for Industrial Control System. Purpose: ...

2013-10-31T23:59:59.000Z

484

Security Outreach and Integration Group  

Science Conference Proceedings (OSTI)

Security Outreach and Integration Group. Welcome. The US economy, citizens, and government rely on information technology. ...

2013-01-17T23:59:59.000Z

485

UH Mnoa Contacts: Campus Security  

E-Print Network (OSTI)

UH Mnoa Contacts: Campus Security 956-6911 Security Escort Service 956-SAFE Women's Center 956 pauvaw@hawaii.edu University Health Services 956-8965 www.hawaii.edu/shs/ Mlama Pono | www.hawaii.edu/security if you think you have been drugged. Police and Campus Security are trained in assisting with these types

486

Brief No. 9 WATER SECURITY,  

E-Print Network (OSTI)

Brief No. 9 WATER SECURITY, RISK & SOCIETY 1 of 4 Water Security and Federal Rivers March 2012 Australian National University Key messages · Water security in a hydroclimatic risk society. Climate risks interact with rapidly changing social, demographic and economic forces to position water security

New, Mark

487

Developing security protocols by refinement  

Science Conference Proceedings (OSTI)

We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides the transformation of abstract security goals into protocols that are secure when operating over an insecure channel controlled by a Dolev-Yao-style ... Keywords: entity authentication, formal development, key establishment, security protocols, stepwise refinement

Christoph Sprenger; David Basin

2010-10-01T23:59:59.000Z

488

Security challenges in embedded systems  

Science Conference Proceedings (OSTI)

Embedded systems security is a significant requirement in emerging environments, considering the increasing deployment of embedded systems in several application domains. The large number of deployed embedded systems, their limited resources and their ... Keywords: Communication system security, computer security, embedded systems, security

Dimitrios N. Serpanos; Artemios G. Voyiatzis

2013-03-01T23:59:59.000Z

489

News in ITL - Computer Security  

Science Conference Proceedings (OSTI)

... Cybersecurity Center Seeks Comments on Energy Industry Security ... Commerce Department Proposes New Policy Framework to Strengthen ...

2010-10-22T23:59:59.000Z

490

CMS System Security Plan Procedure  

Science Conference Proceedings (OSTI)

... TASK 5: SYSTEM DECOMMISSION. ... BPSSM Business Partners Systems Security Manual. ... of Information Technology, Policy, Procedures, & Audits. ...

2009-06-30T23:59:59.000Z

491

Publicly Submitted White Papers - Security  

Science Conference Proceedings (OSTI)

... Security Threats, Exploits, Vulnerabilites, Incidents, and Responses; ... CAHV); Critical Incident Response and Disaster Recovery Assistance; ...

2011-08-02T23:59:59.000Z

492

Towards web security using PLASMA  

Science Conference Proceedings (OSTI)

The World Wide Web is one of the most significant multi-media applications ever developed-and therefore securing the web is one of the most pressing problems. There exist a number of approaches for securing the World Wide Web which, however, usually ... Keywords: high level security, multimedia, secure communications platform, world wide web

Annette Krannig

1998-01-01T23:59:59.000Z

493

Secure Windows Dr. Bernd Borchert  

E-Print Network (OSTI)

Secure Windows Dr. Bernd Borchert WSI für Informatik Univ. Tübingen #12;Problem: Trojans Server Windows" Server (encoding) Internet #12;Server (encoding) Internet Solution: ,,Secure Windows" #12;Server (encoding) Internet Solution: ,,Secure Windows" #12;Server (encoding) Internet Solution: ,,Secure Windows

Borchert, Bernd

494

Security-oriented program transformations  

Science Conference Proceedings (OSTI)

Security experts generally believe that, "security cannot be added on, it must be designed from the beginning" [1]. This is because the typical way of improving system security by patches is ad hoc and has not produced good results. My work shows that ... Keywords: program transformation, security

Munawar Hafiz; Ralph E. Johnson

2009-04-01T23:59:59.000Z

495

Principal Associate Director - Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Principal Associate Director - Global Security Principal Associate Director - Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with special focus on developing and applying the scientific and engineering capabilities to address complex national and global security threats. Contact Operator Los Alamos National Laboratory (505 667-5061 Wallace's expertise is forensic seismology, a highly specialized discipline focusing on detection and quantification of nuclear tests. Terry C. Wallace, Jr. Principal Associate Director for Global Security Terry C. Wallace, Jr., Principal Associate Director for Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with a focus on applying scientific and engineering capabilities

496

National Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Areas Program Areas Initiatives Facilities Events and Conferences Supporting Organizations A scientific approach to global security Initiatives | Programs Home | Science & Discovery | National Security National Security | National Security SHARE ORNL plays an important role in national and global security by virtue of its expertise in advanced materials, nuclear science, supercomputing and other scientific specialties. Discovery and innovation in these areas are essential for protecting US citizens and advancing national and global security priorities. ORNL supports these missions by using its signature strengths to meet complex national security challenges in a number of areas. Nuclear Nonproliferation - The laboratory's expertise and experience covers the spectrum of nuclear nonproliferation work, from basic R&D to

497

User-Centered Security Engineering  

E-Print Network (OSTI)

Current approaches to security engineering mainly focus on attacker models, secure mechanisms, and code testing to ensure a high level security standard. However, these approaches do not sufficiently emphasize the usability of the system and the risk arises that the implemented mechanisms create overheads for users or require unworkable user behaviour. In addition, end users will not use security products they cannot understand or which are difficult to apply. Therefore, we propose the new concept of integrated user-centered security engineering to bridge the gap between security and usability. This method has been pursued for the development and implementation of the security tool "Identity Manager".

Daniela Gerd tom Markotten

2002-01-01T23:59:59.000Z

498

Nevada National Security Site - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Reports Reports Nevada National Security Site Review Reports 2013 Independent Oversight Targeted Review of the Safety Significant Blast Door and Special Door Interlock Systems and Review of Federal Assurance Capability at the Nevada National Security Site, December 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure, May 2013 Review Reports 2012 Review of the Nevada National Security Site Implementation Verification Review Processes, March 2012 Activity Reports 2012 Nevada National Security Site Operational Awareness Visit, December 2012 Operational Awareness Oversight of the Nevada National Security Site, August 2012 Review Reports 2011 Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems

499

Status and Effectiveness of DOE Efforts to Learn from Internal and External Operating Experience in Accordance with Commitment #20 of the DOE Implementation Plan for Defense Nuclear Facilities Safety Board Recommendation 2004-1  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety and Security Safety and Security Report to the Secretary on the Status and Effectiveness of DOE Efforts to Learn from Internal and External Operating Experience in Accordance with Commitment #20 of the DOE Implementation Plan for Defense Nuclear Facilities Safety Board Recommendation 2004-1 February 2011 Office of Health, Safety and Security U.S. Department of Energy Office of Health, Safety and Security HSS Table of Contents 1.0 Introduction ......................................................................................................................... 1 2.0 Department-wide Action Plan for the Columbia Accident and Davis-Besse Event ........... 3 3.0 Comprehensive Operating Experience Program ................................................................. 5

500

Status and Effectiveness of DOE Efforts to Learn from Internal and External Operating Experience in Accordance with Commitment #20 of the DOE Implementation Plan for Defense Nuclear Facilities Safety Board Recommendation 2004-1  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safety and Security Safety and Security Report to the Secretary on the Status and Effectiveness of DOE Efforts to Learn from Internal and External Operating Experience in Accordance with Commitment #20 of the DOE Implementation Plan for Defense Nuclear Facilities Safety Board Recommendation 2004-1 February 2011 Office of Health, Safety and Security U.S. Department of Energy Office of Health, Safety and Security HSS Table of Contents 1.0 Introduction ......................................................................................................................... 1 2.0 Department-wide Action Plan for the Columbia Accident and Davis-Besse Event ........... 3 3.0 Comprehensive Operating Experience Program ................................................................. 5