National Library of Energy BETA

Sample records for reliability security licensed

  1. Licensing Technologies | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Licensing Technologies Licensing Technologies New tack cloth leaves no sticky residue. A license is a means of transferring commercial rights for technologies developed at Y-12 to...

  2. Office of Electricity Delivery and Energy Reliability Cyber Security...

    Energy Savers [EERE]

    Office of Electricity Delivery and Energy Reliability Cyber Security Project Selections Office of Electricity Delivery and Energy Reliability Cyber Security Project Selections On...

  3. Cyber Security Companies, governments, and consumers depend on secure and reliable

    E-Print Network [OSTI]

    Hill, Wendell T.

    Cyber Security Companies, governments, and consumers depend on secure and reliable computer-speed computers all introduce new cyber-security challenges. Cyber- security researchers at the University networks and data products. But as technology becomes more complex, security threats also become more

  4. Secure and reliable operation of our

    E-Print Network [OSTI]

    Amin, S. Massoud

    the weather. Electric power systems constitute the fundamental infrastructure of modern society. A suc attack intended to bring down an entire regional grid. Similarly, the attack could target electricity to national and international economy, security, and quality of life. Massoud Amin, Electric Power Research

  5. The Ambient Computational Environments Architecture for Reliable, Secure,

    E-Print Network [OSTI]

    Kansas, University of

    challenge. The ACE - Ambient Computational Environments - architecture aims at high- scale and seamlessThe Ambient Computational Environments Architecture for Reliable, Secure, and Pervasive Computing The University of Kansas #12;Abstract During the past few years, the technology world has become more and more

  6. ULTRA SECURE HIGH RELIABILITY WIRELESS RADIATION MONITOR

    SciTech Connect (OSTI)

    Cordaro, J.; Shull, D.; Farrar, M.; Reeves, G.

    2011-08-03

    Radiation monitoring in nuclear facilities is essential to safe operation of the equipment as well as protecting personnel. In specific, typical air monitoring of radioactive gases or particulate involves complex systems of valves, pumps, piping and electronics. The challenge is to measure a representative sample in areas that are radioactively contaminated. Running cables and piping to these locations is very expensive due to the containment requirements. Penetration into and out of an airborne or containment area is complex and costly. The process rooms are built with thick rebar-enforced concrete walls with glove box containment chambers inside. Figure 1 shows high temperature radiation resistance cabling entering the top of a typical glove box. In some case, the entire processing area must be contained in a 'hot cell' where the only access into the chamber is via manipulators. An example is shown in Figure 2. A short range wireless network provides an ideal communication link for transmitting the data from the radiation sensor to a 'clean area', or area absent of any radiation fields or radioactive contamination. Radiation monitoring systems that protect personnel and equipment must meet stringent codes and standards due to the consequences of failure. At first glance a wired system would seem more desirable. Concerns with wireless communication include latency, jamming, spoofing, man in the middle attacks, and hacking. The Department of Energy's Savannah River National Laboratory (SRNL) has developed a prototype wireless radiation air monitoring system that address many of the concerns with wireless and allows quick deployment in radiation and contamination areas. It is stand alone and only requires a standard 120 VAC, 60 Hz power source. It is designed to be mounted or portable. The wireless link uses a National Security Agency (NSA) Suite B compliant wireless network from Fortress Technologies that is considered robust enough to be used for classified data transmission in place of NSA Type 1 devices.

  7. Transmission System Expansion Plans in View Point of Deterministic, Probabilistic and Security Reliability Criteria

    E-Print Network [OSTI]

    Transmission System Expansion Plans in View Point of Deterministic, Probabilistic and Security reliability criterion, probabilistic reliability criterion and security criterion based on N- contingency control system as well as reasonable strength of grid originally. Because investment for power system

  8. A Reliable and Secure Cloud Storage Schema Using Multiple Service Providers

    E-Print Network [OSTI]

    Xu, Haiping

    A Reliable and Secure Cloud Storage Schema Using Multiple Service Providers Haiping Xu and Deepti stored in the cloud. In this paper, we propose a reliable and secure cloud storage schema using multiple at the server side, we propose a reliable and secure cloud storage schema that can be implemented at the client

  9. Microgrids and Heterogeneous Security, Quality, Reliability, and Availability

    E-Print Network [OSTI]

    Marnay, Chris

    2007-01-01

    quality, reliability, and availability,” IEEE Power & EnergyReliability, and Availability Chris Marnay EnvironmentalQuality, Reliability, and Availability C. Marnay Ernest

  10. Security-Constrained Adequacy Evaluation of Bulk Power System Reliability

    E-Print Network [OSTI]

    contingency selection, (b) effects analysis, and (c) reliability index computation. Effects analysis as an optimization problem with the objective function being the bid cost function and congestion constraints and reliability index computations. The methodology is demonstrated with the IEEE reliability test system. Index

  11. Communication Capacity Requirement for Reliable and Secure State Estimation in Smart Grid

    E-Print Network [OSTI]

    Qiu, Robert Caiming

    1 Communication Capacity Requirement for Reliable and Secure State Estimation in Smart Grid Husheng, Cookeville, TN Abstract-- Secure system state estimation is an important issue in smart grid to assure the information the- oretic perspective. The smart grid is modeled as a linear dynamic system. Then, the channel

  12. Towards Full-disclosure: Broadening Access to SCADA Data to Improve Safety, Reliability, and Security

    E-Print Network [OSTI]

    Heidemann, John

    Towards Full-disclosure: Broadening Access to SCADA Data to Improve Safety, Reliability is that openness and support for disclosure of future SCADA data can in improved safety, reliability, and security-network processing are needed to make greater openness and data sharing data viable. Today's SCADA systems are often

  13. North American Electricity Infrastructure: System Security, Quality, Reliability, Availability, and Efficiency

    E-Print Network [OSTI]

    Amin, S. Massoud

    1 North American Electricity Infrastructure: System Security, Quality, Reliability, Availability for reliable and disturbance-free electricity. The massive power outages in the United States, Canada, UK and Italy in 2003 underscored electricity infrastructure's vulnerabilities [1-11]. This vital yet complex

  14. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    SciTech Connect (OSTI)

    Rogers,E.; deBoer,G.; Crawford, C.; De Castro, K.; Landers, J.

    2009-10-19

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." Gen. Eugene Habiger, a former "Assistant Secretary for Safeguards and Security" at the U.S. Department of Energy’s (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that "good security is 20% equipment and 80% people." Although eliminating the "human factor" is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  15. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    SciTech Connect (OSTI)

    Crawford, Cary E.; de Boer, Gloria; De Castro, Kara; Landers, John; Rogers, Erin

    2010-10-01

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the “human factor.” Gen. Eugene Habiger, a former “Assistant Secretary for Safeguards and Security” at the U.S. Department of Energy’s (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that “good security is 20% equipment and 80% people.”1 Although eliminating the “human factor” is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  16. Reliable fuel source | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-RichProtonAbout UsRegional companiesReliability

  17. o secure a safe, reliable and low-carbon energy future, we must alter

    E-Print Network [OSTI]

    Kammen, Daniel M.

    T o secure a safe, reliable and low- carbon energy future, we must alter both technologies and human behav- iour1 . The US Department of Energy notes2 that supply and demand is "affected as much-makers continue to focus on only one side of the energy dilemma. In the United States

  18. Electric Power Infrastructure Reliability and Security (EPIRS) Reseach and Development Initiative

    SciTech Connect (OSTI)

    Rick Meeker; L. Baldwin; Steinar Dale; Alexander Domijan; Davild Larbalestier; Hui Li; Peter McLaren; Sastry Pamidi; Horatio Rodrigo; Michael Steurer

    2010-03-31

    Power systems have become increasingly complex and face unprecedented challenges posed by population growth, climate change, national security issues, foreign energy dependence and an aging power infrastructure. Increased demand combined with increased economic and environmental constraints is forcing state, regional and national power grids to expand supply without the large safety and stability margins in generation and transmission capacity that have been the rule in the past. Deregulation, distributed generation, natural and man-made catastrophes and other causes serve to further challenge and complicate management of the electric power grid. To meet the challenges of the 21st century while also maintaining system reliability, the electric power grid must effectively integrate new and advanced technologies both in the actual equipment for energy conversion, transfer and use, and in the command, control, and communication systems by which effective and efficient operation of the system is orchestrated - in essence, the 'smart grid'. This evolution calls for advances in development, integration, analysis, and deployment approaches that ultimately seek to take into account, every step of the way, the dynamic behavior of the system, capturing critical effects due to interdependencies and interaction. This approach is necessary to better mitigate the risk of blackouts and other disruptions and to improve the flexibility and capacity of the grid. Building on prior Navy and Department of Energy investments in infrastructure and resources for electric power systems research, testing, modeling, and simulation at the Florida State University (FSU) Center for Advanced Power Systems (CAPS), this project has continued an initiative aimed at assuring reliable and secure grid operation through a more complete understanding and characterization of some of the key technologies that will be important in a modern electric system, while also fulfilling an education and outreach mission to provide future energy workforce talent and support the electric system stakeholder community. Building upon and extending portions of that research effort, this project has been focused in the following areas: (1) Building high-fidelity integrated power and controls hardware-in-the-loop research and development testbed capabilities (Figure 1). (2) Distributed Energy Resources Integration - (a) Testing Requirements and Methods for Fault Current Limiters, (b) Contributions to the Development of IEEE 1547.7, (c) Analysis of a STATCOM Application for Wind Resource Integration, (d) Development of a Grid-Interactive Inverter with Energy Storage Elements, (e) Simulation-Assisted Advancement of Microgrid Understanding and Applications; (3) Availability of High-Fidelity Dynamic Simulation Tools for Grid Disturbance Investigations; (4) HTS Material Characterization - (a) AC Loss Studies on High Temperature Superconductors, (b) Local Identification of Current-Limiting Mechanisms in Coated Conductors; (5) Cryogenic Dielectric Research; and (6) Workshops, education, and outreach.

  19. The 7th IEEE International Conference on Software Security and Reliability

    E-Print Network [OSTI]

    Sandhu, Ravi

    : Attributes, Automation and Adaptation Ravi Sandhu Lutcher Brown Endowed Chair in Cyber Security Department of the center pieces of cyber security. This talk will focus on three necessary characteristics of access this vision a reality. About the speaker Ravi Sandhu is Executive Director of the Institute for Cyber Security

  20. Human Reliability Program Overview

    SciTech Connect (OSTI)

    Bodin, Michael

    2012-09-25

    This presentation covers the high points of the Human Reliability Program, including certification/decertification, critical positions, due process, organizational structure, program components, personnel security, an overview of the US DOE reliability program, retirees and academia, and security program integration.

  1. Infrastructure Security and Energy Restoration Office of Electricity Delivery and Energy Reliability

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy A plug-inPPLforLDRDEnergy Copyrights A copyright is a federal rightSecurity and

  2. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  3. Assessing Reliability in Energy Supply Systems

    E-Print Network [OSTI]

    McCarthy, Ryan; Ogden, Joan M.; Sperling, Dan

    2008-01-01

    total of 15 metrics. Pathway reliability General objectives Adequacy Security Functional zones Primary energy supply

  4. Assessing reliability in energy supply systems

    E-Print Network [OSTI]

    McCarthy, Ryan W.; Ogden, Joan M.; Sperling, Daniel

    2007-01-01

    total of 15 metrics. Pathway reliability General objectives Adequacy Security Functional zones Primary energy supply

  5. Page 1 of 3 Georgia Drivers License and

    E-Print Network [OSTI]

    Hutcheon, James M.

    Page 1 of 3 Georgia Drivers License and U.S. Social Security Card Information for International Students Do I need a Georgia driver's license or Social Security card? What are the benefits? Generally speaking, a U.S. driver's license is the most common form of day-to-day identification in the U.S. because

  6. Sample Licensing Agreements | Partnerships | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    be modified to meet individual circumstances. Licensing Agreements Nonexclusive Patent License Exclusive Patent License Nonexclusive Copyright License Nondisclosure (NDA)...

  7. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY

  8. Leveraging Formal Methods and Fuzzing to Verify Security and Reliability Properties of Large-Scale High-Consequence Systems.

    SciTech Connect (OSTI)

    Ruthruff, Joseph; Armstrong, Robert C.; Davis, Benjamin Garry; Mayo, Jackson; Punnoose, Ratish J.

    2012-09-01

    Formal methods describe a class of system analysis techniques that seek to prove specific propertiesabout analyzed designs, or locate flaws compromising those properties. As an analysis capability,these techniques are the subject of increased interest fromboth internal and external customersof Sandia National Laboratories. Given this lab's other areas of expertise, Sandia is uniquelypositioned to advance the state-of-the-art with respect toseveral research and application areaswithin formal methods. This research project was a one-yeareffort funded by Sandia's CyberSecurity S&T Investment Area in its Laboratory Directed Research&Development program toinvestigate the opportunities for formal methods to impactSandia's present mission areas, morefully understand the needs of the research community in the area of formal methods and whereSandia can contribute, and clarify from those potential research paths those that would best advancethe mission-area interests of Sandia. The accomplishmentsfrom this project reinforce the utilityof formal methods in Sandia, particularly in areas relevantto Cyber Security, and set the stagefor continued Sandia investments to ensure this capabilityis utilized and advanced within thislaboratory to serve the national interest.4

  9. License Plate 1 License Plate 2

    E-Print Network [OSTI]

    Wagner, Diane

    License Plate 1 License Plate 2 License Plate 3 License Plate 4 Single Vehicle $254 Multi Vehicle $264 ( up to 4 vehicles) Annual Decal Valid: 09/01/12 - 08/31/13 Fall /Spring Decal (Pick date range , then Single or Multi Vehicle) Multi Vehicles $200 (up to 4 vehicles) Select date range Valid 9/1/12 - 5

  10. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Infrastructure Demonstration for Energy reliability and Security) (web link) program to demonstrate: · Cyber-securityEnergy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  11. POWER GRID RELIABILITY AND SECURITY

    SciTech Connect (OSTI)

    Bose, Anjan; Venkatasubramanian, Vaithianathan; Hauser, Carl; Bakken, David; Anderson, David; Zhao, Chuanlin; Liu, Dong; Yang, Tao; Meng, Ming; Zhang, Lin; Ning, Jiawei; Tashman, Zaid

    2014-09-30

    This project has led to the development of a real-time simulation platform for electric power grids called Grid Simulator or GridSim for simulating the dynamic and information network interactions of large- scale power systems. The platform consists of physical models of power system components including synchronous generators, loads and control, which are simulated using a modified commercial power simulator namely Transient Stability Analysis Tool (TSAT) [1] together with data cleanup components, as well as an emulated substation level and wide-area power analysis components. The platform also includes realistic representations of communication network middleware that can emulate the real-time information flow back and forth between substations and control centers in wide-area power systems. The platform has been validated on a realistic 6000-bus model of the western American power system. The simulator GridSim developed in this project is the first of its kind in its ability to simulate real-time response of large-scale power grids, and serves as a cost effective real-time stability and control simulation platform for power industry.

  12. Human Reliability Program Workshop

    SciTech Connect (OSTI)

    Landers, John; Rogers, Erin; Gerke, Gretchen

    2014-05-18

    A Human Reliability Program (HRP) is designed to protect national security as well as worker and public safety by continuously evaluating the reliability of those who have access to sensitive materials, facilities, and programs. Some elements of a site HRP include systematic (1) supervisory reviews, (2) medical and psychological assessments, (3) management evaluations, (4) personnel security reviews, and (4) training of HRP staff and critical positions. Over the years of implementing an HRP, the Department of Energy (DOE) has faced various challenges and overcome obstacles. During this 4-day activity, participants will examine programs that mitigate threats to nuclear security and the insider threat to include HRP, Nuclear Security Culture (NSC) Enhancement, and Employee Assistance Programs. The focus will be to develop an understanding of the need for a systematic HRP and to discuss challenges and best practices associated with mitigating the insider threat.

  13. Technology Licensing | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    License ORNL Technologies Licensing Guidelines NDA(s) and MTA(s) Sample Agreements Technology Innovation Program Technology Assistance Program Licensing Staff Technology Search...

  14. Transmission Reliability Program 2015 Reliability & Markets Peer...

    Office of Environmental Management (EM)

    Transmission Reliability Program 2015 Reliability & Markets Peer Review Materials Available Transmission Reliability Program 2015 Reliability & Markets Peer Review Materials...

  15. This form must be accompanied by a copy of a legal document reflecting a name change. Such documents are a marriage license, divorce decree that

    E-Print Network [OSTI]

    . Such documents are a marriage license, divorce decree that reinstates the maiden name, adoption documents, court are social security card, driver's license, or notarized statement. UNIVERSITY OF SOUTH CAROLINA STUDENT NAME

  16. Web Engineering Security: Essential Elements

    E-Print Network [OSTI]

    Glisson, W.B.; Welland, R.; The Second International Conference on Availability, Reliability and Security (ARES).; 2007.; Vienna, Austria pp 707-714 IEEE [More Details

    Glisson,W.B. Welland,R. The Second International Conference on Availability, Reliability and Security (ARES). 2007. Vienna, Austria pp 707-714 IEEE

  17. Electricity Reliability

    E-Print Network [OSTI]

    Post, Wilfred M.

    Electricity Delivery and Energy Reliability High Temperature Superconductivity (HTS) Visualization in the future because they have virtually no resistance to electric current, offering the possibility of new electric power equipment with more energy efficiency and higher capacity than today's systems

  18. Domestic Export Licensing | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

  19. Security & Defense Licenses Available | Tech Transfer | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Imaging 201303150 Quantum-Authenticated Clock Signal 201303163 Extreme Filter for Low-Output Thermocouples in High EMI Environments 201403251 Tritium Stripping from FLiBe...

  20. Technologies licensed | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorking With U.S. CoalMexico IndependentMatter and TechnologiesTechnologies

  1. Licensing Technologies | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand CubicResourcelogo and-E C H N13, 2009 InMcNaryICRULicensing

  2. Strategic Theme 1- Energy Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Strategic Theme 1- Energy Security Strategic Theme 1- Energy Security An article describing the ways in which America can create an economically strong requires reliable, clean,...

  3. Water Security Toolkit User Manual Version 1.2.

    SciTech Connect (OSTI)

    Klise, Katherine A.; Siirola, John Daniel; Hart, David; Hart, William E.; Phillips, Cynthia A.; Haxton, Terranna; Murray, Regan; Janke, Robert; Taxon, Thomas; Laird, Carl; Seth, Arpan; Hackebeil, Gabriel; McGee, Shawn; Mann, Angelica

    2014-08-01

    The Water Security Toolkit (WST) is a suite of open source software tools that can be used by water utilities to create response strategies to reduce the impact of contamination in a water distribution network . WST includes hydraulic and water quality modeling software , optimizati on methodologies , and visualization tools to identify: (1) sensor locations to detect contamination, (2) locations in the network in which the contamination was introduced, (3) hydrants to remove contaminated water from the distribution system, (4) locations in the network to inject decontamination agents to inactivate, remove, or destroy contaminants, (5) locations in the network to take grab sample s to help identify the source of contamination and (6) valves to close in order to isolate contaminate d areas of the network. This user manual describes the different components of WST , along w ith examples and case studies. License Notice The Water Security Toolkit (WST) v.1.2 Copyright c 2012 Sandia Corporation. Under the terms of Contract DE-AC04-94AL85000, there is a non-exclusive license for use of this work by or on behalf of the U.S. government. This software is distributed under the Revised BSD License (see below). In addition, WST leverages a variety of third-party software packages, which have separate licensing policies: Acro Revised BSD License argparse Python Software Foundation License Boost Boost Software License Coopr Revised BSD License Coverage BSD License Distribute Python Software Foundation License / Zope Public License EPANET Public Domain EPANET-ERD Revised BSD License EPANET-MSX GNU Lesser General Public License (LGPL) v.3 gcovr Revised BSD License GRASP AT&T Commercial License for noncommercial use; includes randomsample and sideconstraints executable files LZMA SDK Public Domain nose GNU Lesser General Public License (LGPL) v.2.1 ordereddict MIT License pip MIT License PLY BSD License PyEPANET Revised BSD License Pyro MIT License PyUtilib Revised BSD License PyYAML MIT License runpy2 Python Software Foundation License setuptools Python Software Foundation License / Zope Public License six MIT License TinyXML zlib License unittest2 BSD License Utilib Revised BSD License virtualenv MIT License Vol Common Public License vpykit Revised BSD License Additionally, some precompiled WST binary distributions might bundle other third-party executables files: Coliny Revised BSD License (part of Acro project) Dakota GNU Lesser General Public License (LGPL) v.2.1 PICO Revised BSD License (part of Acro project) i Revised BSD License Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of Sandia National Laboratories nor Sandia Corporation nor the names of its con- tributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS %22AS IS%22 AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IM- PLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL SANDIA CORPORATION BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD- ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ii Acknowledgements This work was supported by the U.S. Environmental Protection Agen

  4. Cyber Security Evaluation of II&C Technologies

    SciTech Connect (OSTI)

    Ken Thomas

    2014-11-01

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a cyber security team with expertise in nuclear utility cyber security programs and experience in conducting these evaluations. The evaluation has determined that, for the most part, cyber security will not be a limiting factor in the application of these technologies to nuclear power plant applications.

  5. Solar Hot Water Contractor Licensing

    Broader source: Energy.gov [DOE]

    In order to obtain one of these specialty licenses, installers must meet the following criteria. The applicant for a Restricted Solar Mechanic license must provide the Arkansas Department of...

  6. Energy Infrastructure Events and Expansions Infrastructure Security...

    Broader source: Energy.gov (indexed) [DOE]

    in-Review: 2010 Energy Infrastructure Events and Expansions Infrastructure Security and Energy Restoration Office of Electricity Delivery and Energy Reliability U.S. Department of...

  7. License Iso. CM35

    Office of Legacy Management (LM)

    License Iso. CM35 hUhUll4MhiM&POlltYll7 llolh-thRqalStract Alolan&le, vlrghla Attoatlonl w. & 0. EutahlDon Pursuant to the Atanic Energy Act of 1954 and Section 40.21 or the Code...

  8. This work is licensed under a CREATIVE COMMONS ATTRIBUTION-SHARE ALIKE 3.0 LICENSE

    E-Print Network [OSTI]

    1 This work is licensed under a CREATIVE COMMONS ATTRIBUTION-SHARE ALIKE 3.0 LICENSE (http://creativecommons.org/licenses

  9. Non -commercial License 1. INTENT/PURPOSE

    E-Print Network [OSTI]

    Barthe, Loïc

    Non -commercial License 1. INTENT/PURPOSE: Non-commercial license of the XXXX software (the with a copy of this license. 3. INTELLECTUAL PROPERTY LICENSED: The rights to use, copy, modify, and compile the software, subject to the restrictions described in the present document. 5. SCOPE OF THE LICENSE NON

  10. a license to Did you know?

    E-Print Network [OSTI]

    Delgado, Mauricio

    Make it a license to SAVE LIVES Did you know? Now available: DONATE LIFE LICENSE PLATES 1 for your New Jersey digital driver's license. 3. You can purchase a "Donate Life" specialty license plate they understand your wishes. If there is no designation on your driver's license or other legal means of donor

  11. Technology Licensing Contacts | Partnerships | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Staff SHARE Technology Licensing Contacts Name TitlePosition Email Address Phone Number Biography Mike Paulus Director, Technology Transfer paulusmj@ornl.gov (865) 574-1051...

  12. Allan Friedman & L. Jean Camp, "Making Security Manifest," Second Workshop on the Economics of Information Security (College Park, MA) May 2003.

    E-Print Network [OSTI]

    Camp, L. Jean

    With the increased concern over national security there has been increased debate over reliability and securityAllan Friedman & L. Jean Camp, "Making Security Manifest," Second Workshop on the Economics of Information Security (College Park, MA) May 2003. Making Security Manifest Security and Autonomy for End Users

  13. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  14. Assessment of SPEAR-FCODE-BETA for fuel licensing. Final report. [PWR; BWR

    SciTech Connect (OSTI)

    Bradley, E.R.; Lanning, D.D.; Fiero, I.B.; Freeburn, H.R.; Garde, A.M.; Krammen, M.A.; Rotondo, P.L.

    1983-03-01

    The EPRI FCODE-BETA fuel performance code is the mechanistic model portion for the SPEAR-BETA fuel reliability code, which was developed for EPRI by Entropy Limited. FCODE-BETA was assessed by Battelle, Pacific Northwest Laboratories, and Combustion Engineering, Inc., for adequacy in simulating fuel performance in fuel licensing proceedings. The assessment included a detailed review of those thermal and mechanical performance models of greatest importance to fuel licensing, including fission gas release, fuel temperatures, and cladding uniform strain. It was concluded that the code is inadequate for licensing calculations in its present form. Recommendations for modeling and usability improvements are made.

  15. Microsoft SQL Server 2012 Licensing Guide

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Microsoft SQL Server 2012 Licensing Guide #12;2 Contents Overview......................................................................................................................................................................................................3 SQL Server 2012 Editions ......................................................................................................................................................................4 How SQL Server 2012 Licenses Are Sold

  16. intellectual property license | netl.doe.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    intellectual property license Intellectual Property License Agreements transfer NETL-owned intellectual property (IP) from the government to the private sector both exclusively and...

  17. Assessing Reliability in Energy Supply Systems

    E-Print Network [OSTI]

    McCarthy, Ryan; Ogden, Joan M.; Sperling, Dan

    2008-01-01

    Physical security Information security Interdepend- enciesagainst threats. Information security: The degree to whichPhysical security Information security Interdependencies

  18. Assessing reliability in energy supply systems

    E-Print Network [OSTI]

    McCarthy, Ryan W.; Ogden, Joan M.; Sperling, Daniel

    2007-01-01

    Physical security Information security Interdepend- enciesagainst threats. Information security: The degree to whichPhysical security Information security Interdependencies

  19. 1 Open Source Software licensing software

    E-Print Network [OSTI]

    Verschelde, Jan

    Outline 1 Open Source Software licensing software copyright and copyleft 2 Modules and Packages Science Jan Verschelde, 6 March 2015 Intro to Computer Science (MCS 260) software licensing & packages L-23 6 March 2015 1 / 29 #12;software licensing modules and packages 1 Open Source Software licensing

  20. Solar and Wind Contractor Licensing

    Broader source: Energy.gov [DOE]

    In June of 2014, SB 447 mandated that the Louisiana State Licencsing Board for Contractors develop new rules for solar contractors no later than January 1, 2015. Licensed contractors must be in c...

  1. cybersecurity.pnnl.gov Securing the Nation's Critical Infrastructure

    E-Print Network [OSTI]

    : » Global Threat Intelligence » Electric Grid Security » Cyber Physical Systems » Bio-inspired Security and evaluating safeguards, we can provide a better defense against threats or adversaries. Electric Grid Security PNNL is leading the charge to secure a safer and more reliable grid. We are currently developing cyber

  2. Office of Test and Evaluation | National Nuclear Security Administrati...

    National Nuclear Security Administration (NNSA)

    weapons stockpile are safe, secure, and reliable by: Providing for development of engineering tools and manufacturing capabilities to support the life cycle of a nuclear weapon...

  3. Decisions regarding how to secure and invest in our

    Office of Environmental Management (EM)

    to ensure that the Nation's energy delivery system is secure, resilient and reliable. Pictures go here. Creating a Risk Assessment Culture for State Energy Infrastructure Decision...

  4. Postal Security Device Security Policy

    E-Print Network [OSTI]

    Postal Security Device Security Policy FRAMA AG PSD - I Version: R01.06 Date: 25.05.2007 Doc.-ID: DE_FNKPSD_510_SPE File name: DE_FNKPSD_510_SPE_R0106_EN.Security Policy PSD Author: Bernd Zinke, Timo » Non-Confidential « #12;Security Policy FRAMA AG CH-3438 LAUPERSWIL / BERN TITLE: POSTAL SECURITY

  5. Reliability Assessment The Reliability of the

    E-Print Network [OSTI]

    ...................................................................................................................4 SUMMER 2006 HEAT WAVE .......................6 CONSTRUCTION OF NEW TRANSMISSION IS STILL SLOW -- CONTINUES TO FACE OBSTACLES..............................................11 RELIABILITY WILL DEPEND ON CLOSE COORDINATION OF GENERATION AND TRANSMISSION PLANNING

  6. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  7. Sandia Energy - Human Reliability Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Human Reliability Assessment Home Stationary Power Nuclear Fuel Cycle Nuclear Energy Safety Technologies Risk and Safety Assessment Human Reliability Assessment Human Reliability...

  8. T-564: Vulnerabilities in Citrix Licensing administration components

    Broader source: Energy.gov [DOE]

    The vulnerabilities impact all current versions of the Citrix Licensing Administration Console, formerly known as the License Management Console.

  9. Technology Licensing Opportunity Non-Confidential Summary

    E-Print Network [OSTI]

    Peak, Derek

    Technology Licensing Opportunity Non-Confidential Summary Industry Liaison Office 121 Research synthesis. #12;Technology Licensing Opportunity Non-Confidential Summary Industry Liaison Office 121 Agriculture Chair of Lipid Quality and Utilization Research interests: Oil seed processing, vegetable oil

  10. License Update and Migration Processes in Open Source Software Projects 1 License Update and Migration

    E-Print Network [OSTI]

    Scacchi, Walt

    License Update and Migration Processes in Open Source Software Projects 1 License Update, and distribution. At present, we have little understanding of, what happens when these licenses change, what motivates such changes, and how new licenses are created, updated, and deployed. Similarly, little attention

  11. Medical Aspects of Reliability

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05

    This presentation covers the medical evaluation as part of a human reliability program, particularly the various medical qualifications and potential disqualifiers.

  12. TECHNOLOGY LICENSE APPLICATION Office of Technology Transfer

    E-Print Network [OSTI]

    Page 1 TECHNOLOGY LICENSE APPLICATION Office of Technology Transfer UT-Battelle, LLC (UT. One of the functions of UT-BATTELLE's Office of Technology Transfer is to negotiate license agreements for such intellectual property with companies for commercial applications of ORNL-developed technologies. Such licenses

  13. Presenting Software License Conflicts through Argumentation

    E-Print Network [OSTI]

    Scacchi, Walt

    Presenting Software License Conflicts through Argumentation Thomas A. Alspaugh Computer Science@ics.uci.edu Abstract--Heterogeneously-licensed systems pose new chal- lenges to architects and designers seeking, license conflicts may prevent a system's legal use. Our previous work showed that rights, obligations

  14. Harvard Law School Recording License Agreement

    E-Print Network [OSTI]

    Schrag, Daniel

    Harvard Law School Recording License Agreement This is the paper version of the Harvard Law School Recording License Agreement. With it, individuals who give presentations or are recorded on campus (at: Harvard Law School Recording License Agreement The Author named above authorizes

  15. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO...

  16. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  17. ACADEMIC PUBLIC LICENSE for LIBRA The following license governs the use of the MATLAB LIBrary for Robust Analysis,

    E-Print Network [OSTI]

    ACADEMIC PUBLIC LICENSE for LIBRA The following license governs the use of the MATLAB LIBrary license from the Author. ACADEMIC PUBLIC LICENSE1 Copyright© 2005, Mia Hubert PREAMBLE This license, in a noncommercial settings: at academic institutions for teaching and research use. This license provides the rights

  18. Reliable Energy Integration of

    E-Print Network [OSTI]

    Zeng, Ning

    Engineering SustainabilityWorkshop #12;Cost of EnergyTrends Engineering SustainabilityWorkshop #12;Why GoReliable Energy Integration of Offshore Wind Aris Christou University of Maryland College Park MD Access is Difficult, and Costly: Require Minimum Maintenance and High Reliability Engineering

  19. Hawaii electric system reliability.

    SciTech Connect (OSTI)

    Silva Monroy, Cesar Augusto; Loose, Verne William

    2012-09-01

    This report addresses Hawaii electric system reliability issues; greater emphasis is placed on short-term reliability but resource adequacy is reviewed in reference to electric consumers' views of reliability %E2%80%9Cworth%E2%80%9D and the reserve capacity required to deliver that value. The report begins with a description of the Hawaii electric system to the extent permitted by publicly available data. Electrical engineering literature in the area of electric reliability is researched and briefly reviewed. North American Electric Reliability Corporation standards and measures for generation and transmission are reviewed and identified as to their appropriateness for various portions of the electric grid and for application in Hawaii. Analysis of frequency data supplied by the State of Hawaii Public Utilities Commission is presented together with comparison and contrast of performance of each of the systems for two years, 2010 and 2011. Literature tracing the development of reliability economics is reviewed and referenced. A method is explained for integrating system cost with outage cost to determine the optimal resource adequacy given customers' views of the value contributed by reliable electric supply. The report concludes with findings and recommendations for reliability in the State of Hawaii.

  20. SPIDERS JCTD Smart Cyber-Secure Microgrids

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS) Joint Capability Technology Demonstration (JCTD) is a groundbreaking program to bolster the cyber security and energy efficiency of U.S. military installations and transfer the knowhow to non-military critical infrastructure.

  1. Policy-based Secure Deletion Christian Cachin

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Sorniotti February 28, 2013 Abstract Securely deleting data from storage systems has become difficult today in storage systems, whose security relies on the proper erasure of cryptographic keys. Deletion operations storage systems do not include operations to reliably destroy stored information. Common deletion

  2. Reliability and Safety

    Broader source: Energy.gov [DOE]

    DOE solar reliability and safety research and development (R&D) focuses on testing photovoltaic (PV) modules, inverters, and systems for long-term performance, and helping investors, consumers,...

  3. Solid State Lighting Reliability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Solid State Lighting Reliability 2015Building Technologies Office Peer Review Lynn Davis, PhD RTI International ldavis@rti.org --- 919-316-3325 Project Summary Timeline: Start...

  4. License-aware Service Selection G.R. Gangadharan

    E-Print Network [OSTI]

    Dustdar, Schahram

    License-aware Service Selection G.R. Gangadharan , Marco Comerio , Hong-Linh Truong§ , Vincenzo D consumers and service providers, licenses are critical to be considered in services. A service license de to be enhanced together with consid- eration of licenses. In this paper, we analyze current service licensing

  5. D4M Commercial License Version: 1/22/2013

    E-Print Network [OSTI]

    Kepner, Jeremy

    D4M Commercial License TLO: DD Version: 1/22/2013 MASSACHUSETTS INSTITUTE OF TECHNOLOGY PATENT AND COPYRIGHT LICENSE AGREEMENT FOR D4M DATABASE AND COMPUTATION SOFTWARE COMMERCIAL LICENSE (sub license to end users only) #12;D4M Commercial License TABLE OF CONTENTS R E C I T A L

  6. Gearbox Reliability Collaborative Update (Presentation)

    SciTech Connect (OSTI)

    Sheng, S.

    2013-10-01

    This presentation was given at the Sandia Reliability Workshop in August 2013 and provides information on current statistics, a status update, next steps, and other reliability research and development activities related to the Gearbox Reliability Collaborative.

  7. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  8. The Y-12 National Security Complex 4-1 4. The Y-12 National Security Complex

    E-Print Network [OSTI]

    Pennycook, Steve

    a safe and reliable US nuclear weapons deterrent. The complex also retrieves and stores nuclear materials/enhanced surveillance of the nation's nuclear weapon stockpile; · safe and secure storage of nuclear materials" is NNSA's vision for a smaller, safer, more secure, and less expensive nuclear weapons complex

  9. The Y-12 National Security Complex 4-1 4. The Y-12 National Security Complex

    E-Print Network [OSTI]

    Pennycook, Steve

    a safe and reliable US nuclear weapons deterrent. The complex also retrieves and stores nuclear materials/enhanced surveillance of the nation's nuclear weapons stockpile; · safe and secure storage of nuclear materials secure, and less expensive nuclear weapons complex that leverages the scientific and technical

  10. The Y-12 National Security Complex 4-1 4. The Y-12 National Security Complex

    E-Print Network [OSTI]

    Pennycook, Steve

    a safe and reliable U.S. nuclear weapons deterrent. The Complex also retrieves and stores nuclear of the nation's nuclear weapon stockpile; · safe and secure storage of nuclear materials; · dismantlement secure, and less expensive nuclear weapons complex that leverages the scientific and technical

  11. Photovoltaic module reliability workshop

    SciTech Connect (OSTI)

    Mrig, L. (ed.)

    1990-01-01

    The paper and presentations compiled in this volume form the Proceedings of the fourth in a series of Workshops sponsored by Solar Energy Research Institute (SERI/DOE) under the general theme of photovoltaic module reliability during the period 1986--1990. The reliability Photo Voltaic (PV) modules/systems is exceedingly important along with the initial cost and efficiency of modules if the PV technology has to make a major impact in the power generation market, and for it to compete with the conventional electricity producing technologies. The reliability of photovoltaic modules has progressed significantly in the last few years as evidenced by warranties available on commercial modules of as long as 12 years. However, there is still need for substantial research and testing required to improve module field reliability to levels of 30 years or more. Several small groups of researchers are involved in this research, development, and monitoring activity around the world. In the US, PV manufacturers, DOE laboratories, electric utilities and others are engaged in the photovoltaic reliability research and testing. This group of researchers and others interested in this field were brought together under SERI/DOE sponsorship to exchange the technical knowledge and field experience as related to current information in this important field. The papers presented here reflect this effort.

  12. Global Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    weapons from the James Martin center for Nonproliferation Studies Homeland Security Digital Library HSDL is the nation's premier research collection of open-source resources...

  13. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  14. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  15. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  16. ISSAT 2012 KCoverage Reliability Evaluation K-COVERAGE RELIABILITY EVALUATION

    E-Print Network [OSTI]

    Xing, Liudong

    #12;7/20/2012 ISSAT 2012 KCoverage Reliability Evaluation forWSNs 2 Introduction Wireless sensor;7/20/2012 ISSAT 2012 KCoverage Reliability Evaluation forWSNs 7 Model 13 Consider a set of sensor nodes (SN7/20/2012 ISSAT 2012 KCoverage Reliability Evaluation forWSNs 1 K-COVERAGE RELIABILITY EVALUATION

  17. Reliable solar: powering communities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) by Carbon-RichProtonAbout UsRegional companiesReliabilityReliable solar:

  18. Cyber security best practices for the nuclear industry

    SciTech Connect (OSTI)

    Badr, I.

    2012-07-01

    When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)

  19. Safeguards and Security and Cyber Security RM

    Office of Environmental Management (EM)

    using security measures such as badging, pre-employment investigation and fitness for duty, training, and security awareness? Cyber Security CS-1 Has the project...

  20. A Petri Net Model for Secure and Fault-Tolerant Cloud-Based Information Storage

    E-Print Network [OSTI]

    Xu, Haiping

    333 A Petri Net Model for Secure and Fault-Tolerant Cloud-Based Information Storage Daniel F. Fitch, however, with data security, reliability, and availability in the cloud. In this paper, we address these concerns by proposing a novel security mechanism for secure and fault-tolerant cloud-based information

  1. Assessing reliability in energy supply systems

    E-Print Network [OSTI]

    McCarthy, Ryan W.; Ogden, Joan M.; Sperling, Daniel

    2007-01-01

    today’s emphasis on cyber security and localized attacks (routine security, cyber security, diversity, storage,for example). Similarly, cyber security hardens cyber and

  2. Assessing Reliability in Energy Supply Systems

    E-Print Network [OSTI]

    McCarthy, Ryan; Ogden, Joan M.; Sperling, Dan

    2008-01-01

    today’s emphasis on cyber security and localized attacks (routine security, cyber security, diversity, storage,for example). Similarly, cyber security hardens cyber and

  3. Securing against fraud in mobile communications : system design and development in 3G mobile networks

    E-Print Network [OSTI]

    Mochizuki, Yujiro, 1973-

    2006-01-01

    Network security ensures the consistency, integrity, and reliability of telecommunications systems. Authorized network access prevents fraudulent communications and maintains the availability of the systems. However, limited ...

  4. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    System-of-systems analysis Visualization tools for complex information Next-generation smart grid technologies Quantum computing, security, and data fusion For more information,...

  5. Review of Quantitative Software Reliability Methods

    SciTech Connect (OSTI)

    Chu, T.L.; Yue, M.; Martinez-Guridi, M.; Lehner, J.

    2010-09-17

    The current U.S. Nuclear Regulatory Commission (NRC) licensing process for digital systems rests on deterministic engineering criteria. In its 1995 probabilistic risk assessment (PRA) policy statement, the Commission encouraged the use of PRA technology in all regulatory matters to the extent supported by the state-of-the-art in PRA methods and data. Although many activities have been completed in the area of risk-informed regulation, the risk-informed analysis process for digital systems has not yet been satisfactorily developed. Since digital instrumentation and control (I&C) systems are expected to play an increasingly important role in nuclear power plant (NPP) safety, the NRC established a digital system research plan that defines a coherent set of research programs to support its regulatory needs. One of the research programs included in the NRC's digital system research plan addresses risk assessment methods and data for digital systems. Digital I&C systems have some unique characteristics, such as using software, and may have different failure causes and/or modes than analog I&C systems; hence, their incorporation into NPP PRAs entails special challenges. The objective of the NRC's digital system risk research is to identify and develop methods, analytical tools, and regulatory guidance for (1) including models of digital systems into NPP PRAs, and (2) using information on the risks of digital systems to support the NRC's risk-informed licensing and oversight activities. For several years, Brookhaven National Laboratory (BNL) has worked on NRC projects to investigate methods and tools for the probabilistic modeling of digital systems, as documented mainly in NUREG/CR-6962 and NUREG/CR-6997. However, the scope of this research principally focused on hardware failures, with limited reviews of software failure experience and software reliability methods. NRC also sponsored research at the Ohio State University investigating the modeling of digital systems using dynamic PRA methods. These efforts, documented in NUREG/CR-6901, NUREG/CR-6942, and NUREG/CR-6985, included a functional representation of the system's software but did not explicitly address failure modes caused by software defects or by inadequate design requirements. An important identified research need is to establish a commonly accepted basis for incorporating the behavior of software into digital I&C system reliability models for use in PRAs. To address this need, BNL is exploring the inclusion of software failures into the reliability models of digital I&C systems, such that their contribution to the risk of the associated NPP can be assessed.

  6. Reliability of Electrical Interconnects (Presentation)

    SciTech Connect (OSTI)

    Devoto, D.

    2014-06-01

    This presentation discusses the status of NREL's research on the reliability of electrical interconnects.

  7. Sandia Energy - NuMAD License and Disclaimer

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    License and Disclaimer Home Stationary Power Energy Conversion Efficiency Wind Energy Rotor Innovation Numerical Manufacturing And Design Tool (NuMAD) NuMAD License and Disclaimer...

  8. FERC Handbook for Hydroelectric Project Licensing and 5 MW Exemptions...

    Open Energy Info (EERE)

    FERC Handbook for Hydroelectric Project Licensing and 5 MW Exemptions from Licensing Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory...

  9. LicenseAcquisitionIPI.pdf | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    LicenseAcquisitionIPI.pdf More Documents & Publications Photovoltaics at DOE's National Renewable Energy Laboratory License Microsoft Word - Matrixpart2.doc AcqGuide70.52Matrixpart...

  10. Technology Licensing Opportunity Non-Confidential Summary

    E-Print Network [OSTI]

    Peak, Derek

    into the targeted oil crop to assemble VLPUFA synthesis pathway #12;Technology Licensing Opportunity NonTechnology Licensing Opportunity Non-Confidential Summary Industry Liaison Office 121 Research in demand of 21%. Fish oil is the traditional source of omega-3 and is unable to meet future demand due

  11. Technology Licensing Opportunity Non-Confidential Summary

    E-Print Network [OSTI]

    Peak, Derek

    Technology Licensing Opportunity Non-Confidential Summary Industry Liaison Office 121 Research;Technology Licensing Opportunity Non-Confidential Summary Industry Liaison Office 121 Research Drive, Suite,642,697) 2. Recovery of Hydrophobic Peptides from Oils (PCT/CA2008/002272) 3. Process for the Production

  12. Technology Licensing Opportunity Non-Confidential Summary

    E-Print Network [OSTI]

    Peak, Derek

    Technology Licensing Opportunity Non-Confidential Summary Industry Liaison Office 121 Research-oxidants with utility in maintaining shelf life of oils and are the precursors of vitamin A. Lutein and zeaxanthin Licensing Opportunity Non-Confidential Summary Industry Liaison Office 121 Research Drive, Suite 501

  13. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  14. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  15. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  16. Secure PVM

    SciTech Connect (OSTI)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  17. Solid State Lighting Reliability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergy BillsNo.Hydrogen4EnergySolid State Lighting Reliability 2014 Building

  18. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  19. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  20. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  1. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity Security

  2. Microgrids and Heterogeneous Security, Quality, Reliability, andAvailability

    SciTech Connect (OSTI)

    Marnay, Chris

    2007-01-31

    This paper describes two stylized alternative visions inpopular currencyof how the power system might evolve to meet futurerequirements for the high quality electricity service that modern digitaleconomies demand, a supergrids paradigm and a dispersed paradigm. Some ofthe economics of the dispersed vision are explored. Economic perspectivesare presented on both the choice of homogeneous universal power qualityupstream in the electricity supply, and also on the extremelyheterogeneous require-ments of end-use loads. Finally, the potential roleof microgrids in delivering heterogeneous power quality is demonstratedby reference to two ongoing microgrid tests in the U.S. andJapan.

  3. Microgrids and Heterogeneous Security, Quality, Reliability, and Availability

    E-Print Network [OSTI]

    Marnay, Chris

    2007-01-01

    G. Venkataramanan, “Microgrids in the evolving electricitymore background on microgrids, please see the presentationsthe two Symposiums on Microgrids held at Berkeley, USA in

  4. Guest Editorial Safety, reliability and security of industrial computer systems

    E-Print Network [OSTI]

    Felici, Massimo

    different stakeholders who drive the system life cycle as well as the dependability system requirements to certification, deployment, evaluation, evolution, and decommission in the system life cycle. There are two be tempted to looking for a universal model that may be used throughout the entire life cycle. A universal

  5. Office of Electricity Delivery and Energy Reliability Cyber Security

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties -DepartmentAvailableHigh SpatialElectricity Delivery and EnergyProject

  6. Cyber Security Summer School: Lessons for the Modern Grid

    Broader source: Energy.gov [DOE]

    The Energy Department has partnered with a university-based project performing cutting-edge research to improve the way electric infrastructure is built, increasing the security and reliability of the grid.

  7. PSH-14-0015- In the Matter of Personnel Security

    Broader source: Energy.gov [DOE]

    The individual is employed by a DOE contractor in a position that requires him to hold a DOE security clearance and participate in the Human Reliability Program (HRP).  He has been employed by the...

  8. Research and Medical Isotope Reactor Supply | Y-12 National Security...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Y-12 tops the short list of the world's most secure, reliable uranium feedstock suppliers for dozens of research and test reactors on six continents. These reactors can be...

  9. Radiation Protection and Licensing FNAL Radiation Physics Team

    E-Print Network [OSTI]

    McDonald, Kirk

    (ALARA). January 13, 2012 Radiation Protection and Licensing #12;4 Shielding for Prompt Radiation Protect

  10. LASS License Aware Service Selection: Methodology and Framework

    E-Print Network [OSTI]

    Dustdar, Schahram

    LASS ­ License Aware Service Selection: Methodology and Framework G.R. Gangadharan1 , Marco Comerio services with corre- sponding service licenses which consumers should follow. Often, service consumers are interested in selecting a service based on certain licensing clauses. For a set of requested licensing

  11. Sandia Energy - PV Systems Reliability

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Home Stationary Power Energy Conversion Efficiency Solar Energy Photovoltaics PV Systems Reliability PV Systems ReliabilityCoryne Tasca2015-05-08T03:40:54+00:00 Sandia...

  12. Remember! All Users must renew their license every 6 months. This is done by completing a "License Renewal" form and

    E-Print Network [OSTI]

    Alpay, S. Pamir

    Remember! All Users must renew their license every 6 months. This is done by completing a "License "inactive" (not used a microscope) for one year may require retraining, or may have their license restricted licensed User may use a microscope during an unbooked time block, on a "first-to-arrive" basis. 6. At times

  13. Copyright (c) 1994-2000 Cem Kaner. Licensed under the GNU Free Doc License. 1 Win Friends,

    E-Print Network [OSTI]

    Copyright (c) 1994-2000 Cem Kaner. Licensed under the GNU Free Doc License. 1 How to Win FriendsBug Advocacy influence programmers #12;Copyright (c) 1994-2000 Cem Kaner. Licensed under the GNU Free Doc License. 2 NoticeNotice These slides are modified from my seminar on software testing. That seminar

  14. One License to Compose Them All A Deontic Logic Approach to Data Licensing on the Web of Data

    E-Print Network [OSTI]

    Governatori, Guido

    One License to Compose Them All A Deontic Logic Approach to Data Licensing on the Web of Data Guido for developing automated frameworks able to generate the licensing terms associated to data coming from to define the deontic components of the licenses, i.e., permissions, obligations, and prohibitions

  15. Testing for PV Reliability (Presentation)

    SciTech Connect (OSTI)

    Kurtz, S.; Bansal, S.

    2014-09-01

    The DOE SUNSHOT workshop is seeking input from the community about PV reliability and how the DOE might address gaps in understanding. This presentation describes the types of testing that are needed for PV reliability and introduces a discussion to identify gaps in our understanding of PV reliability testing.

  16. HapFACS License Agreement Read the following terms and conditions carefully before downloading, installing or

    E-Print Network [OSTI]

    Lisetti, Christine

    HapFACS License Agreement Read the following terms and conditions carefully before downloading acceptance of these terms and conditions. LICENSE This End User License Agreement ("License" or "License licensing all or any portion of such Software. 1. Grant of License. So long as you are in compliance

  17. A systems-theoretic security model for large scale, complex systems applied to the US air transportation system

    E-Print Network [OSTI]

    Laracy, Joseph R. (Joseph Raymond)

    2007-01-01

    Classical risk-based or game-theoretic security models rely on assumptions from reliability theory and rational expectations economics that are not applicable to security threats. Additionally, these models suffer from ...

  18. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio August 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Security

  19. INSTITUTE FOR CYBER SECURITY Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio August-world impact #12;INSTITUTE FOR CYBER SECURITY Institute for Cyber Security Founded June 2007: still in start

  20. NSM Secure UI Crypto Module Security Policy

    E-Print Network [OSTI]

    NSM Secure UI Crypto Module Security Policy Version: 1.4 Revision Date: April 1, 2010 This document. #12;McAfee, Inc NSM Secure UI Crypto Module Security Policy Page 2 of 15 CHANGE RECORD Revision Date Module Security Policy Page 3 of 15 Contents 1 Module Overview

  1. Security for grids

    E-Print Network [OSTI]

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-01-01

    differences between Grid security and host or site securityof requirements for Grid security in order to achieve thecompletely. Index Terms — Grid security, authentication,

  2. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  3. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  4. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  5. Assessing reliability in energy supply systems

    E-Print Network [OSTI]

    McCarthy, Ryan W.; Ogden, Joan M.; Sperling, Daniel

    2007-01-01

    infrastructure disruption, and energy security – valued by aHistory Consequences Energy security Economic Import levelsthose associated with energy security apply only to primary

  6. Assessing Reliability in Energy Supply Systems

    E-Print Network [OSTI]

    McCarthy, Ryan; Ogden, Joan M.; Sperling, Dan

    2008-01-01

    infrastructure disruption, and energy security – valued by aHistory Consequences Energy security Economic Import levelsthose associated with energy security apply only to primary

  7. Real Time Grid Reliability Management 2005

    E-Print Network [OSTI]

    Eto, Joe

    2008-01-01

    case, confidence in grid security will increase. Confidencecase, confidence in grid security will increase. Confidencecase, confidence in grid security will increase. Confidence

  8. Assessing Reliability in Energy Supply Systems

    E-Print Network [OSTI]

    McCarthy, Ryan; Ogden, Joan M.; Sperling, Dan

    2008-01-01

    H. , 2004. Energy infrastructure and security. Annual Reviewdisruption, and energy security – valued by a total of 15History Consequences Energy security Economic Import levels

  9. Assessing reliability in energy supply systems

    E-Print Network [OSTI]

    McCarthy, Ryan W.; Ogden, Joan M.; Sperling, Daniel

    2007-01-01

    H. , 2004. Energy infrastructure and security. Annual Reviewdisruption, and energy security – valued by a total of 15History Consequences Energy security Economic Import levels

  10. Liberty but not License: Publicity, Academic Freedom, and the Professionalization of the Professoriate, 1890-1929

    E-Print Network [OSTI]

    Haberler, Zachary

    2013-01-01

    RIVERSIDE Liberty but not License: Publicity, AcademicDISSERTATION Liberty but not License: Publicity, Academicbetween freedom of speech and license of speech, between the

  11. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  12. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  13. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  14. Faculty Information Security Guide

    E-Print Network [OSTI]

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  15. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  16. Analysis and design of reliable nanometer circuits

    E-Print Network [OSTI]

    Zhao, Chong

    2007-01-01

    OF CALIFORNIA, SAN DIEGO Analysis and Design of ReliableTHE DISSERTATION Analysis and Design of Reliable Nanometerthe difficulty in analysis and design of reliable digital

  17. Secure Communication in the Low-SNR Regime: A Characterization of the Energy-Secrecy Tradeoff

    E-Print Network [OSTI]

    Gursoy, Mustafa Cenk

    Secure Communication in the Low-SNR Regime: A Characterization of the Energy-Secrecy Tradeoff required for secure and reliable communications, and the wideband slope. Increased bit energy requirements to security issues, another pivotal concern in most wireless systems is energy-efficient operation especially

  18. Sandia Energy - Inverter Reliability Program

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    lifetime cost must decrease for photovoltaics to be financially viable. Currently the cost and reliability of PV modules is improving faster than the rest of the system. One...

  19. Nuclear security

    SciTech Connect (OSTI)

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  20. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  1. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  2. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  3. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  4. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  5. Kirkland gets license in hot Philippines area

    SciTech Connect (OSTI)

    Kirkland, A.S.

    1992-08-03

    This paper reports that Kirkland As, Oslo, has received a geophysical survey and exploration contract (GSEC) in a sizzling exploration and development theater off the Philippines. The license covers about 6,000 sq miles of undisputed waters, with depths mostly less than 300 ft, and lies in the Reed Bank area off Northwest Palawan Island, where several major oil and gas strikes have been made recently. Kirkland has 1 year in which to carry out its seismic work commitment. The terms of the GSEC then give an option to drill one well in a 6 month period. Once the results have been analyzed, the company can either drill another well or enter into a service contract for the license. Kirkland has a 65% share in the license, with the remainder split between Philippine companies Philodrill Corp., Beguet Mining Corp. subsidiary Petrofields, and Seafront Resources Corp. The Philippines is one of Kirkland's main areas of activity, the Kirkland Commercial Manager Ralph Baxter.

  6. 2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

  7. Real Time Grid Reliability Management 2005

    SciTech Connect (OSTI)

    Eto, Joe; Eto, Joe; Lesieutre, Bernard; Lewis, Nancy Jo; Parashar, Manu

    2008-07-07

    The increased need to manage California?s electricity grid in real time is a result of the ongoing transition from a system operated by vertically-integrated utilities serving native loads to one operated by an independent system operator supporting competitive energy markets. During this transition period, the traditional approach to reliability management -- construction of new transmission lines -- has not been pursued due to unresolved issues related to the financing and recovery of transmission project costs. In the absence of investments in new transmission infrastructure, the best strategy for managing reliability is to equip system operators with better real-time information about actual operating margins so that they can better understand and manage the risk of operating closer to the edge. A companion strategy is to address known deficiencies in offline modeling tools that are needed to ground the use of improved real-time tools. This project: (1) developed and conducted first-ever demonstrations of two prototype real-time software tools for voltage security assessment and phasor monitoring; and (2) prepared a scoping study on improving load and generator response models. Additional funding through two separate subsequent work authorizations has already been provided to build upon the work initiated in this project.

  8. Regression analysis of oncology drug licensing deal values

    E-Print Network [OSTI]

    Hawkins, Paul Allen

    2006-01-01

    This work is an attempt to explain wide variations in drug licensing deal value by using regression modeling to describe and predict the relationship between oncology drug deal characteristics and their licensing deal ...

  9. DOE, NRC Issue Licensing Roadmap For Next-Generation Nuclear...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    DOE, NRC Issue Licensing Roadmap For Next-Generation Nuclear Plant DOE, NRC Issue Licensing Roadmap For Next-Generation Nuclear Plant August 15, 2008 - 3:15pm Addthis WASHINGTON,...

  10. Fact #574: June 8, 2009 Vehicles per Licensed Driver Rising

    Broader source: Energy.gov [DOE]

    The number of vehicles in operation per licensed driver has risen steadily since 1950. In 1985, for the first time, there was one vehicle for every licensed driver. Since 1985, the number of...

  11. Open Science: Open source licenses in scientific research 

    E-Print Network [OSTI]

    Guadamuz, Andres

    2006-01-01

    The article examines the validity of OSS (open source software) licenses for scientific, as opposed to creative works. It draws on examples of OSS licenses to consider their suitability for the scientific community and ...

  12. LMS Reliability FMECA and SPFS

    E-Print Network [OSTI]

    Rathbun, Julie A.

    LMS Reliability FMECA and SPFS Contract No. NAS 9-5829 NO. ATM 97C PAGE 1 REV. MO. B OF~- DATE 21 will use the fixed mode ionization voltage. Prepared by: Approved by: .... ~~~lfo*R. Hiebert LMS III v VI LMS Reliability FMECA and SPFS Contract No. NAS9-5829 TABLE CJF CONTENTS DISCUSSION

  13. 2014 Headquarters Facilities Master Security Plan- Chapter 3, Personnel Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Describes DOE Headquarters Personnel Security procedures for acquiring, maintaining, and passing security clearances.

  14. Using Operational Security (OPSEC) to Support a Cyber Security...

    Energy Savers [EERE]

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  15. NASA Partners License Nanotube Technology for Commercial Use...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    prnewswire.comnews-releasesnasa-partners-license-nanotube-technology-for-commercial-use-149724205.html Submitted: Monday, April 3...

  16. FACT SHEET for Licensed Practical Nurses Entering NEPS

    E-Print Network [OSTI]

    Saskatchewan, University of

    1 of 2 FACT SHEET for Licensed Practical Nurses Entering NEPS Frequently Asked Questions: 1. I am a Licensed Practical Nurse (LPN) interested in entering the Nursing Education Program of Saskatchewan (NEPS). What are the NEPS entrance requirements for LPNs? Licensed Practical Nurses currently registered

  17. RESIDENCE HALL AND FURNISHED APARTMENT HOUSING AND DINING LICENSE AGREEMENT

    E-Print Network [OSTI]

    Finley Jr., Russell L.

    RESIDENCE HALL AND FURNISHED APARTMENT HOUSING AND DINING LICENSE AGREEMENT HOUSING DATES OF OCCUPANCY: A. I understand that my Housing License Agreement provides occupancy for an assigned space that the full terms of this license agreement will be enforced should I move in prior to August 23, 2014

  18. Producer Individual License Application Java Desktop App Entered demographic data

    E-Print Network [OSTI]

    Demurjian, Steven A.

    TESTING Producer ­ Individual License Application ­ Java Desktop App 7/21/2004 Entered demographic... On `Next', license attachment screen, added a cert letter: Still need to accommodate multiple authorities;On "Submit/Next" ­ Pulled up license with Inquiry tool. Some fields need widening. Didn't pick up

  19. Updated 6/9/2015 Louisiana Driver's License

    E-Print Network [OSTI]

    Updated 6/9/2015 Louisiana Driver's License http://omv.dps.state.la.us/ or www on your status to be issued a driver's license, as indicated by the end date on your I-20, DS-2019 will NOT be issued a license with validity that includes the 60 or 30 grace period permitted at the end

  20. Patent License for OpenSSL 1. Definitions

    E-Print Network [OSTI]

    Rogaway, Phillip

    Patent License for OpenSSL 1. Definitions 1.1 "Licensor" means Phillip Rogaway. orOne Shields Avenue, Davis, CA 95616-8562. 1.2 "Licensed Patents" means any patent that claims priority to United of the Licensed Patents that is unrelated to the OpcnSSL toolkit. 1.4 "Licensee" means the OpenSSL Software

  1. NIST STANDARD REFERENCE DATA (SRD) INTERNET SERVICE SUBSCRIPTION LICENSE

    E-Print Network [OSTI]

    NIST STANDARD REFERENCE DATA (SRD) INTERNET SERVICE SUBSCRIPTION LICENSE This document is a non-exclusive, non-transferrable, non-assignable and limited License Agreement (AGREEMENT) between the National ­ a person designated in the License to use the Internet Edition of a NIST Standard Reference Database under

  2. Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System

    E-Print Network [OSTI]

    Ling, Amy Poh Ai; 10.5121/ijgca.2011.2201

    2011-01-01

    This paper describes the background of smart information infrastructure and the needs for smart grid information security. It introduces the conceptual analysis to the methodology with the application of hermeneutic circle and information security functional requirement identification. Information security for the grid market cover matters includes automation and communications industry that affects the operation of electric power systems and the functioning of the utilities that manage them and its awareness of this information infrastructure has become critical to the reliability of the power system. Community benefits from of cost savings, flexibility and deployment along with the establishment of wireless communications. However, concern revolves around the security protections for easily accessible devices such as the smart meter and the related communications hardware. On the other hand, the changing points between traditional versus smart grid networking trend and the information security importance on...

  3. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  4. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

  5. Tangible Materials Available for Licensing Monoclonal Antibodies for Non-exclusive Licensing

    E-Print Network [OSTI]

    Hybridoma Clones Inventor Reference 1 Clone 6-11B1, secreting antibodies specific for anti for Non-exclusive Licensing Hybridoma Clones Inventor Reference 11 Clone 9E9A8 secreting antibodies

  6. Technology Licensing Opportunity Non-Confidential Summary

    E-Print Network [OSTI]

    Peak, Derek

    Technology Licensing Opportunity Non-Confidential Summary Industry Liaison Office 15 Innovation thermolysin mixed with an adjuvant. The product was tested in 24 horses challenged by oligofructose overload 15 Innovation Boulevard, Suite 250 Saskatoon, SK, S7N 2X8 T. (306) 966-1465 E. ilo.ovpr@usask.ca NEW

  7. Patent Licensing to Bertrand Competitors Benny Moldovanuy

    E-Print Network [OSTI]

    Franz, Sven Oliver

    Patent Licensing to Bertrand Competitors¤ Benny Moldovanuy and Aner Selaz April 18, 2001 Abstract A cost-reducing process innovation protected by a patent is sold to one of several ...rms engaged to patent races frameworks. An auction where the lowest bidder gets the patent is shown to be e¢cient. ¤ We

  8. Technology Licensing Opportunity Non-Confidential Summary

    E-Print Network [OSTI]

    Peak, Derek

    Technology Licensing Opportunity Non-Confidential Summary Industry Liaison Office 15 Innovation contamination, air pollution, soil contamination, and agricultural product and food contamination. Vegetable oil market demand of 343.7 kilo ton by 2020. Knowing that palm oil and castor oil are the major sources

  9. Technology Licensing Opportunity Non-Confidential Summary

    E-Print Network [OSTI]

    Peak, Derek

    by pollination. This is labour intensive and does not guarantee 100% hybridity. Tomato male sterility can to various abiotic stresses. #12;Technology Licensing Opportunity Non-Confidential Summary Industry Liaison and low-temperature stresses. Theoretical and Applied Genetics 102 (2-3), 215-221, 2001. 2. Fellner, M

  10. Princeton University OTL Office of Technology Licensing

    E-Print Network [OSTI]

    Torquato, Salvatore

    Princeton University OTL Office of Technology Licensing Inventor's Guide to Technology Transfer #12 for Research (DFR) Phone: 609-258-5500 Email: dfr@princeton.edu www.princeton.edu/research #12;Inventor's Guide 550141 Note: This booklet is based on the University of Michigan's "Inventor's Guide to Technology

  11. Inspection report: the Department of Energy's export licensing process for dual-use and munitions commodities

    SciTech Connect (OSTI)

    Friedman, Gregory H.

    1999-05-01

    Export of commodities, encouraged by both the private sector and the Federal Government, helps to improve our position in the global economy and is in the national interest of the US. However, exports of commodities or technologies, without regard to whether they may significantly contribute to the military potential of individual countries or combination of countries or enhance the proliferation of weapons of mass destruction, may adversely affect the national security of the US. The Federal Government, therefore, implements several laws, Executive Orders, and regulations to control the export of certain commodities and technologies. These commodities and technologies require a license for export. Some of the controlled items are designated as ''dual-use,'' that is, commodities and technologies that have both civilian and military application. Some dual-use commodities are designated as ''nuclear dual-use''--items controlled for nuclear nonproliferation purposes. Another group of controlled commodities is designated as munitions, which are goods and technologies that have solely military uses. The Department of Energy (Energy) conducts reviews of export license applications for nuclear dual-use items and certain munitions. On August 26, 1998, the Chairman of the Senate Committee on Governmental Affairs requested that the Inspectors General from the Departments of Commerce, Defense, Energy, State, and Treasury, and the Central Intelligence Agency (CIA), update and expand on a 1993 interagency review conducted by the Inspectors General of the Departments of Commerce, Defense, Energy, and State of the export licensing processes for dual-use and munitions commodities.

  12. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia, and reactorsystemoverviews. Training in Action: Gulf Nuclear Energy InfrastructureInstitute In2011,SandiateamedwiththeNuclearSecurity energy safety, security,safeguards,andnonproliferation. Training Sandia National Laboratories experts

  13. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  14. Sandia Energy - PV Systems Reliability

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    studies such as Accelerated Life Testing (ALT) and Failure Modes and Effects Analysis (FMEA). SNL has also partnered with a utility to create a data-driven Reliability Block...

  15. Reliability and Competitive Electricity Markets

    E-Print Network [OSTI]

    Joskow, Paul; Tirole, Jean

    2006-03-14

    Deregulation of the electricity sector has resulted in conflict between the economic aims of creating competitive wholesale and retail markets, and an engineering focus on reliability of supply. The paper starts by deriving the optimal prices...

  16. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  17. Security | Department of Energy

    Office of Environmental Management (EM)

    Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top...

  18. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  19. Testing, licensing, and code requirements for seismic isolation systems (for nuclear power plants)

    SciTech Connect (OSTI)

    Seidensticker, R.W.

    1987-01-01

    The use of seismic isolation as an earthquake hazard mitigation strategy for nuclear reactor power plants is rapidly receiving interest throughout the world. Seismic isolation has already been used on at least two French PWR plants, was to have been used for plants to be built in Iran, and is under serious consideration for advanced LMR plants (in the US, UK, France, and Japan). In addition, there is a growing use of seismic isolation throughout the world for other critical facilities such as hospitals, emergency facilities, buildings with very high-cost equipment (e.g., computers) and as a strategy to reduce loss of life and expensive equipment in earthquakes. Such a design approach is in complete contrast to the conventional seismic design strategy in which the structure and components are provided with sufficient strength and ductility to resist the earthquake forces and to prevent structural collapses or failure. The use of seismic isolation for nuclear plants can, therefore, be expected to be a significant licensing issue. For isolation, the licensing process must shift away in large measure from the superstructure and concentrate on the behavior of the seismic isolation system. This paper is not intended to promote the advantages of seismic isolation system, but to explore in some detail those technical issues which must be satisfactorily addressed to achieve full licensability of the use of seismic isolation as a viable, attractive and economical alternative to current traditional design approaches. Special problems and topics associated with testing and codes and standards development are addressed. A positive program for approach or strategy to secure licensing is presented.

  20. NRC antitrust licensing actions, 1978--1996

    SciTech Connect (OSTI)

    Mayer, S.J.; Simpson, J.J.

    1997-09-01

    NUREG-0447, Antitrust Review of Nuclear Power Plants, was published in May 1978 and includes a compilation and discussion of U.S. Nuclear Regulatory Commission (NRC) proceedings and activity involving the NRC`s competitive review program through February 1978, NUREG-0447 is an update of an earlier discussion of the NRC`s antitrust review of nuclear power plants, NR-AIG-001, The US Nuclear Regulatory Commission`s Antitrust Review of Nuclear Power Plants: The Conditioning of Licenses, which reviewed the Commission`s antitrust review function from its inception in December 1970 through April 1976. This report summarizes the support provided to NRC staff in updating the compilation of the NRC`s antitrust licensing review activities for commercial nuclear power plants that have occurred since February 1978. 4 refs., 4 tabs.

  1. NORTH AMERICAN ELECTRIC RELIABILITY COUNCIL: Preliminary Disturbance...

    Energy Savers [EERE]

    Report More Documents & Publications North American Electric Reliability Council Power Outage Update North American Electric Reliability Council Outage Announcement Electric System...

  2. Distributed Generation Operational Reliability, Executive Summary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Reliability, Executive Summary Report, January 2004 Distributed Generation Operational Reliability, Executive Summary Report, January 2004 This report summarizes the results of the...

  3. Distributed Generation Operational Reliability and Availability...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Reliability and Availability Database, Final Report, January 2004 Distributed Generation Operational Reliability and Availability Database, Final Report, January 2004 This final...

  4. Recommendations to Address Power Reliability Concerns Raised...

    Office of Environmental Management (EM)

    to Address Power Reliability Concerns Raised as a Result of Pending Environmental Regulations for Electric Generation Stations Recommendations to Address Power Reliability Concerns...

  5. Sandia Energy - Continuous Reliability Enhancement for Wind ...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Continuous Reliability Enhancement for Wind (CREW): Project Update Home Renewable Energy Energy News Wind Energy News & Events Systems Analysis Continuous Reliability Enhancement...

  6. NREL Publishes Gearbox Reliability Collaborative Findings Report...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Publishes Gearbox Reliability Collaborative Findings Report NREL Publishes Gearbox Reliability Collaborative Findings Report October 3, 2011 - 12:56pm Addthis This is an excerpt...

  7. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    society. www.ists.dartmouth.edu THE DARTMOUTH CYBER SECURITY INITIATIVE The Dartmouth Cyber Security, TECHNOLOGY, AND SOCIETY THE DARTMOUTH CYBER SECURITY INITIATIVE #12;The number of laptop thefts at Dartmouth, and Society; and the Dartmouth Cyber Security Initiative offer the following solutions: · Whole

  8. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  9. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  10. The Persistence of Economic Factors in Shaping Regulation and Environmental Performance: The Limits of Regulation and Social License Pressures

    E-Print Network [OSTI]

    Thornton, Dorothy; Kagan, Robert; Gunningham, Neil

    2007-01-01

    Dorothy Thornton. 2004. “Social License and EnvironmentalRegulation and Social License Pressures. Dorothy Thornton,the limits of such “social license” pressures. Whereas our

  11. LMS RELIABILITY PART APPLICATION ANALYSIS

    E-Print Network [OSTI]

    Rathbun, Julie A.

    ( LMS RELIABILITY PART APPLICATION ANALYSIS Contract No. NAS 9-5829 MO. ATM-966 PAGE 1 RIV. NO, B 3. 0 3. I 3. 2 3.3 3. 3. I 3. 3. 2 3.3.3 3. 3. 4 4. 0 PARA. NO. 1. 0 1.1 LMS RELIABILITY PART 1. 5 1. 6 1. 7 2. 0 2. 1 2. 2 2. 2. 1 2. 2. 2 2. 2. 3 2. 2. 4 -:-?· 2. ,5 2. 3 2. 3. 1 LMS

  12. Reliability in the design phase

    SciTech Connect (OSTI)

    Siahpush, A.S.; Hills, S.W.; Pham, H. (EG and G Idaho, Inc., Idaho Falls, ID (United States)); Majumdar, D. (USDOE Idaho Field Office, Idaho Falls, ID (United States))

    1991-12-01

    A study was performed to determine the common methods and tools that are available to calculated or predict a system's reliability. A literature review and software survey are included. The desired product of this developmental work is a tool for the system designer to use in the early design phase so that the final design will achieve the desired system reliability without lengthy testing and rework. Three computer programs were written which provide the first attempt at fulfilling this need. The programs are described and a case study is presented for each one. This is a continuing effort which will be furthered in FY-1992. 10 refs.

  13. Reliability in the design phase

    SciTech Connect (OSTI)

    Siahpush, A.S.; Hills, S.W.; Pham, H. [EG and G Idaho, Inc., Idaho Falls, ID (United States); Majumdar, D. [USDOE Idaho Field Office, Idaho Falls, ID (United States)

    1991-12-01

    A study was performed to determine the common methods and tools that are available to calculated or predict a system`s reliability. A literature review and software survey are included. The desired product of this developmental work is a tool for the system designer to use in the early design phase so that the final design will achieve the desired system reliability without lengthy testing and rework. Three computer programs were written which provide the first attempt at fulfilling this need. The programs are described and a case study is presented for each one. This is a continuing effort which will be furthered in FY-1992. 10 refs.

  14. NEXT GENERATION NUCLEAR PLANT LICENSING BASIS EVENT SELECTION WHITE PAPER

    SciTech Connect (OSTI)

    Mark Holbrook

    2010-09-01

    The Next Generation Nuclear Plant (NGNP) will be a licensed commercial high temperature gas-cooled reactor (HTGR) plant capable of producing the electricity and high temperature process heat for industrial markets supporting a range of end-user applications. The NGNP Project has adopted the 10 CFR 52 Combined License (COL) application process, as recommended in the Report to Congress, dated August 2008, as the foundation for the NGNP licensing strategy. NRC licensing of the NGNP plant utilizing this process will demonstrate the efficacy of licensing future HTGRs for commercial industrial applications. This white paper is one in a series of submittals that will address key generic issues of the COL priority licensing topics as part of the process for establishing HTGR regulatory requirements.

  15. Page 1Securing the Microsoft Cloud Securing the

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Page 1Securing the Microsoft Cloud Securing the Microsoft Cloud #12;Page 2Securing the Microsoft to have confidence in Microsoft as their preferred cloud provider. Our security policies and practices their security and compliance related needs. Securing the Microsoft Cloud #12;Page 3Securing the Microsoft Cloud

  16. Copyright 2011 by the author(s). Published here under license by the Resilience Alliance. German, L., G. C. Schoneveld, and P. Pacheco. 2011. Local social and environmental impacts of biofuels

    E-Print Network [OSTI]

    Copyright © 2011 by the author(s). Published here under license by the Resilience Alliance. German, Brazil, and other countries favoring the use of biofuels in the transport sector to enhance energy energy security and reduce carbon emissions, as well as by the desire of governments in developing

  17. Wind turbine reliability database update.

    SciTech Connect (OSTI)

    Peters, Valerie A.; Hill, Roger Ray; Stinebaugh, Jennifer A.; Veers, Paul S.

    2009-03-01

    This report documents the status of the Sandia National Laboratories' Wind Plant Reliability Database. Included in this report are updates on the form and contents of the Database, which stems from a fivestep process of data partnerships, data definition and transfer, data formatting and normalization, analysis, and reporting. Selected observations are also reported.

  18. Photovoltaic performance and reliability workshop

    SciTech Connect (OSTI)

    Kroposki, B.

    1996-10-01

    This proceedings is the compilation of papers presented at the ninth PV Performance and Reliability Workshop held at the Sheraton Denver West Hotel on September 4--6, 1996. This years workshop included presentations from 25 speakers and had over 100 attendees. All of the presentations that were given are included in this proceedings. Topics of the papers included: defining service lifetime and developing models for PV module lifetime; examining and determining failure and degradation mechanisms in PV modules; combining IEEE/IEC/UL testing procedures; AC module performance and reliability testing; inverter reliability/qualification testing; standardization of utility interconnect requirements for PV systems; need activities to separate variables by testing individual components of PV systems (e.g. cells, modules, batteries, inverters,charge controllers) for individual reliability and then test them in actual system configurations; more results reported from field experience on modules, inverters, batteries, and charge controllers from field deployed PV systems; and system certification and standardized testing for stand-alone and grid-tied systems.

  19. Electric Grid - Forecasting system licensed | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Electric Grid - Forecasting system licensed Location Based Technologies has signed an agreement to integrate and market an Oak Ridge National Laboratory technology that provides...

  20. Vermont Permit and License Information: NPDES Stormwater General...

    Open Energy Info (EERE)

    SitesLegal Abstract Permit and licensing information for Clean Water Act 304 National Pollution Discharge Elimination System (NPDES) Permits for general construction. Published NA...

  1. FERC Hydropower Licensing and Endangered Species - A Guide for...

    Open Energy Info (EERE)

    FERC Hydropower Licensing and Endangered Species - A Guide for Applicants, Contractors, and Staff Jump to: navigation, search OpenEI Reference LibraryAdd to library Permitting...

  2. Hydropower Licensing and Endangered Species A Guide for Applicants...

    Open Energy Info (EERE)

    Hydropower Licensing and Endangered Species A Guide for Applicants, Contractors, and Staff Jump to: navigation, search OpenEI Reference LibraryAdd to library General: Hydropower...

  3. Title 18 CFR 4 Licenses, Permits, Exemptions, and Determination...

    Open Energy Info (EERE)

    Title 18 CFR 4 Licenses, Permits, Exemptions, and Determination of Project Costs Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document-...

  4. DOE Grant Recipients Technologies Available for Licensing - Energy...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Patent Search Success Stories News Events DOE Grant Recipients Technologies Available for Licensing In addition to National Laboratory research, the Department of Energy (DOE)...

  5. Microsoft PowerPoint - Nuclear Material Import Export License...

    National Nuclear Security Administration (NNSA)

    Material ImportExport License - Uses & Reporting processes Gary Langlie - Nuclear Regulatory Commission Karen Antizzo - Link Technologies Overview What is a Nuclear Regulatory...

  6. License Amendment Request for Storing Exelon Sister Nuclear Stations...

    Office of Scientific and Technical Information (OSTI)

    License Amendment Request for Storing Exelon Sister Nuclear Stations Class BC LLRW in the LaSalle Station Interim Radwaste Storage Facility - 13620 Citation Details In-Document...

  7. Guidelines to Consider for Participating in the Alternative Licensing...

    Open Energy Info (EERE)

    Guidelines to Consider for Participating in the Alternative Licensing Process Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance -...

  8. FERC Hydroelectric Project Handbook for Filings other than Licenses...

    Open Energy Info (EERE)

    FERC Hydroelectric Project Handbook for Filings other than Licenses and Exemptions Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance...

  9. 2012 Reliability & Markets Peer Review | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Reliability & Markets Peer Review 2012 Reliability & Markets Peer Review The Transmission Reliability R&D Reliability & Markets Peer Review included 11 presentations over 2 days on...

  10. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Summit | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  11. University of Maryland School of Medicine License Plate Information Thank you for requesting a set of University of Maryland School of Medicine license plates. By

    E-Print Network [OSTI]

    Weber, David J.

    University of Maryland School of Medicine License Plate Information Thank you for requesting a set of University of Maryland School of Medicine license plates. By displaying these special bicentennial license of School of Medicine license plates will cost $25.00. Please enclose a check, made payable to the Motor

  12. Building Extensible and Secure Networks

    E-Print Network [OSTI]

    Popa, Lucian

    2011-01-01

    adoption of cloud computing is security, as customers oftenpreserving security when migrating to the cloud computingto the security principals used in the cloud access control

  13. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    for Environment and National Security Scripps Institution ofMultiplying Threats to National Security Higher temperaturesefforts to protect national security. Page 2 The U.S. Armed

  14. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  15. NREL: Technology Transfer - Technologies Available for Licensing

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJessework usesof EnergyY-12WorkingSolarTechnologies Available for Licensing

  16. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  17. FORMAL SEMANTICS AND VERIFICATION OF DYNAMIC RELIABILITY BLOCK DIAGRAMS FOR SYSTEM RELIABILITY MODELING

    E-Print Network [OSTI]

    Xu, Haiping

    that DRBD provides a powerful tool for system reliability modeling, and our proposed verification approachFORMAL SEMANTICS AND VERIFICATION OF DYNAMIC RELIABILITY BLOCK DIAGRAMS FOR SYSTEM RELIABILITY-scale computer-based systems. KEY WORDS Reliability modeling, dynamic reliability block diagrams (DRBD), Object

  18. Secure Processing On-Chip Hsien-Hsin S. Lee Santosh Pande

    E-Print Network [OSTI]

    Lee, Hsien-Hsin "Sean"

    Secure Processing On-Chip Hsien-Hsin S. Lee Santosh Pande School of Electrical and Computer Engineering College of Computing Georgia Institute of Technology Georgia Institute of Technology Atlanta, GA and damage pipes or kill pets during winter times. To provide reliable security for these devices to combat

  19. TOWARD HIGHLY SECURE AND AUTONOMIC COMPUTING SYSTEMS: A HIERARCHICAL APPROACH

    SciTech Connect (OSTI)

    Lee, Hsien-Hsin S

    2010-05-11

    The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniques and system software for achieving a robust, secure, and reliable computing system toward our goal.

  20. CUNY EXPORT CONTROL PROCEDURES 12. Licensed Software Programs

    E-Print Network [OSTI]

    Rosen, Jay

    CUNY EXPORT CONTROL PROCEDURES 12. Licensed Software Programs This section addresses the export control implications of licensing a software product that has been identified as "export controlled as "export controlled." In such cases and for purposes of understanding access implications for CUNY

  1. Technology Available for Licensing Office of Technology Management

    E-Print Network [OSTI]

    Maroncelli, Mark

    Technology Available for Licensing Office of Technology Management The Pennsylvania State University 113 Technology Center, University Park, PA 16802 814.865.6277 phone; 814.865.3591 fax Contact: Matthew D. Smith Sr. Technology Licensing Officer The Pennsylvania State University Phone: (814) 863

  2. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  3. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  4. nevada national security site

    National Nuclear Security Administration (NNSA)

    7%2A en Nevada National Security Site operator recognized for green fleet http:www.nnsa.energy.govblognevada-national-security-site-operator-recognized-green-fleet

    The...

  5. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  6. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  7. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    Pew Project on National Security, Energy and Climate http://of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.

  8. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  9. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  10. cyber security guru

    E-Print Network [OSTI]

    Sandhu, Ravi

    cyber security guru By: Virginia Scott Posted: 4/17/07 UTSA has received a grant from the Texas Emerging Fund to create an institute for cyber security research. According to UTSA industry and educational initiatives in Texas. The creation of UTSA's Institute for Cyber Security Research

  11. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  12. Cyber security analysis testbed : combining real, emulation, and simulation.

    SciTech Connect (OSTI)

    Villamarin, Charles H.; Eldridge, John M.; Van Leeuwen, Brian P.; Urias, Vincent E.

    2010-07-01

    Cyber security analysis tools are necessary to evaluate the security, reliability, and resilience of networked information systems against cyber attack. It is common practice in modern cyber security analysis to separately utilize real systems of computers, routers, switches, firewalls, computer emulations (e.g., virtual machines) and simulation models to analyze the interplay between cyber threats and safeguards. In contrast, Sandia National Laboratories has developed novel methods to combine these evaluation platforms into a hybrid testbed that combines real, emulated, and simulated components. The combination of real, emulated, and simulated components enables the analysis of security features and components of a networked information system. When performing cyber security analysis on a system of interest, it is critical to realistically represent the subject security components in high fidelity. In some experiments, the security component may be the actual hardware and software with all the surrounding components represented in simulation or with surrogate devices. Sandia National Laboratories has developed a cyber testbed that combines modeling and simulation capabilities with virtual machines and real devices to represent, in varying fidelity, secure networked information system architectures and devices. Using this capability, secure networked information system architectures can be represented in our testbed on a single, unified computing platform. This provides an 'experiment-in-a-box' capability. The result is rapidly-produced, large-scale, relatively low-cost, multi-fidelity representations of networked information systems. These representations enable analysts to quickly investigate cyber threats and test protection approaches and configurations.

  13. WAIVER OF INVENTOR'S SHARE OF LICENSING INCOME Cornell University's policy on the distribution of technology transfer licensing revenues

    E-Print Network [OSTI]

    Chen, Tsuhan

    WAIVER OF INVENTOR'S SHARE OF LICENSING INCOME Cornell University's policy on the distribution faculty who are inventors or developers ("inventors") of the licensed intellectual property. Occasionally, a Cornell inventor will desire to waive the inventor's personal share of revenues. The Internal Revenue

  14. Assessing Reliability in Energy Supply Systems

    E-Print Network [OSTI]

    McCarthy, Ryan; Ogden, Joan M.; Sperling, Dan

    2008-01-01

    appropriate security indices for the natural gas sector. Insecurity in the electricity sector, a primary emphasis in natural gas

  15. Assessing reliability in energy supply systems

    E-Print Network [OSTI]

    McCarthy, Ryan W.; Ogden, Joan M.; Sperling, Daniel

    2007-01-01

    appropriate security indices for the natural gas sector. Insecurity in the electricity sector, a primary emphasis in natural gas

  16. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

  17. Arnold Schwarzenegger REAL-TIME GRID RELIABILITY

    E-Print Network [OSTI]

    Energy Research (PIER) California Energy Commission Beth Chambers Contract Manager Jamie Patterson (VSA) prototype to monitor system voltage conditions and provide real time dispatchers with reliabilityArnold Schwarzenegger Governor REAL-TIME GRID RELIABILITY MANAGEMENT California ISO Real

  18. Electric Power Reliability in Chemical Plants 

    E-Print Network [OSTI]

    Cross, M. B.

    1989-01-01

    at plants across the country? Has the quality and reliability of utility-generated power deteriorated over the past five or ten years? Or, has the perception of what constitutes reliable power changed with the advent, installation, and increasing usage...

  19. Sandia Energy - PV Reliability & Performance Model

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Model PV Reliability & Performance ModelTara Camacho-Lopez2015-06-01T20:13:00+00:00 This Web Demo model is a simplified "player" version of the Photovoltaic Reliability Performance...

  20. SELECTING TRAVEL RELIABILITY MEASURES David Schrank

    E-Print Network [OSTI]

    SELECTING TRAVEL RELIABILITY MEASURES by Tim Lomax David Schrank Shawn Turner Texas Transportation Administration provided technical resource staff persons who identified the need for a reliability measure, California Department of Transportation Tim Baker, Colorado Department of Transportation Gordon Morgan

  1. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  2. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  3. Reliability-based casing design

    SciTech Connect (OSTI)

    Maes, M.A. [Univ. of Calgary, Alberta (Canada). Civil Engineering Dept.; Gulati, K.C.; Johnson, R.C. [Mobil Research and Development Corp., Dallas, TX (United States); McKenna, D.L. [Mobil Producing Nigeria, Lagos (Nigeria); Brand, P.R.; Lewis, D.B. [Mobil E and P Technical Center, Dallas, TX (United States)

    1995-06-01

    The present paper describes the development of reliability-based design criteria for oil and/or gas well casing/tubing. The approach is based on the fundamental principles of limit state design. Limit states for tubulars are discussed and specific techniques for the stochastic modeling of loading and resistance variables are described. Zonation methods and calibration techniques are developed which are geared specifically to the characteristic tubular design for both hydrocarbon drilling and production applications. The application of quantitative risk analysis to the development of risk-consistent design criteria is shown to be a major and necessary step forward in achieving more economic tubular design.

  4. Sandia Energy - PV Systems Reliability

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)Geothermal Energy &WaterNew CREWOnline AbstractsSystems Reliability

  5. DEPSKY: Dependable and Secure Storage in a Cloud-of-Clouds Alysson Bessani Miguel Correia Bruno Quaresma Fernando Andre Paulo Sousa

    E-Print Network [OSTI]

    Correia, Miguel

    DEPSKY: Dependable and Secure Storage in a Cloud-of-Clouds Alysson Bessani Miguel Correia Bruno of critical data that could be moved to the cloud. However, the reliability and security of data stored, Security Keywords Cloud computing, Cloud storage, Byzantine quorum systems 1. Introduction The increasing

  6. THE SECURITY-CONSTRAINED COMMITMENT AND DISPATCH FOR MIDWEST ISO DAY-AHEAD CO-OPTIMIZED ENERGY AND ANCILLARY SERVICE MARKET

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    improve grid reliability. Key words ­ Electricity market, LMP, Security Constrained Unit Commitment (SCUCTHE SECURITY-CONSTRAINED COMMITMENT AND DISPATCH FOR MIDWEST ISO DAY-AHEAD CO-OPTIMIZED ENERGY ­ This paper reports upon the security-constrained commitment and dispatch algorithms and their implementation

  7. LUNAR MASS SPECTROMETER RELIABILITY LOGIC DIAGRAM

    E-Print Network [OSTI]

    Rathbun, Julie A.

    point (A) to (F). The block diagram also defines the reliability functions for the purpose of FMEA 1

  8. Reliability Challenges for Solar Energy (Presentation)

    SciTech Connect (OSTI)

    Kurtz, S.

    2009-12-08

    Presentation that reviews reliability issues related to various types of photovoltaic tecnnologies, including crystalline silicon, thin films, and concentrating PV.

  9. Dispatcher Reliability Analysis : SPICA-RAIL Experiments

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    consider that humans are fully reliable. But experience shows that many accidents involve human failuresDispatcher Reliability Analysis : SPICA-RAIL Experiments Fabien Belmonte, Jean-Louis Boulanger of scenarios and evaluate the behaviour of human operators. A state of the art in human reliability is pre

  10. BSD license: SISIP software Copyright (c) 2010, The Regents of the University of

    E-Print Network [OSTI]

    Chen, Jinsong

    BSD license: SISIP software Copyright (c) 2010, The Regents of the University of California to Lawrence Berkeley National Laboratory, without imposing a separate written license agreement for such Enhancements, then you hereby grant the following license: a non-exclusive, royalty-free perpetual license

  11. Mitigating Interference between IEEE 802.16 Systems Operating in License-exempt Mode

    E-Print Network [OSTI]

    Murphy, Liam

    Mitigating Interference between IEEE 802.16 Systems Operating in License-exempt Mode Omar Ashagi approach to mitigate interference issues in license-exempt 802.16 systems is presented. This approach can be divided into two mode of operation: licensed mode of operation, and license-exempt mode

  12. June 1, 2014 Subject: License opportunity for Triticale lines 110WCF57 and 111WCF57

    E-Print Network [OSTI]

    Lawrence, Rick L.

    June 1, 2014 Subject: License opportunity for Triticale lines 110WCF57 and 111WCF57 Submission for licensing, two triticale varieties, 110WCF57 and 111WCF57. Information on these varieties is contained in the following: 1. Overview: Winter Triticale Varieties Available for License http://tto.montana.edu/tech/docs/TriticaleVarietiesAvailableForLicense

  13. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  14. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  15. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  16. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important is critical October 7, 2009 GAANN ­ Computer Systems Security 1 #12;GAANN - Computer Systems Security

  17. Federated Cloud Security Architecture for Secure and Agile Clouds

    E-Print Network [OSTI]

    Xu, Shouhuai

    Federated Cloud Security Architecture for Secure and Agile Clouds Weiliang Luo, Li Xu, Zhenxin Zhan. This chapter introduces the novel federated cloud security architecture that includes proactive cloud defense technologies for secure and agile cloud development. The federated security architecture consists of a set

  18. Where computer security meets national security1 Helen Nissenbaum

    E-Print Network [OSTI]

    Nissenbaum, Helen

    of International Relations. Key words: cyber-security, computer security, securitization Introduction OverWhere computer security meets national security1 Helen Nissenbaum Department of Culture conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile

  19. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu, Ram Krishnan and Gregory B. White Institute for Cyber Security University of Texas at San Antonio #12;Secure Information ­ Security mechanisms such as authentication, cryptography, trusted hardware, etc. #12;Community Cyber

  20. Implementing Advances in Transport Security Technologies | Department...

    Office of Environmental Management (EM)

    Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies More...

  1. Cyber Security & Smart Grid 

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01

    and interoperability ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Vulnerabilities In The Legacy Power Grid ? SCADA Security ? Supervisory Control and Data Acquisition (SCADA) systems are used extensively to control and monitor the national... & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart Grid Networks...

  2. The Licensing of Negative Sensitive Items in Jordanian Arabic

    E-Print Network [OSTI]

    Alsarayreh, Atef Atallah

    2012-05-31

    This study investigates the licensing conditions on Negative Sensitive Items (NSIs) in Jordanian Arabic (JA). JA exhibits both types of NSIs that are discussed in the literature: Negative Polarity Items (NPIs) and Negative ...

  3. Technology available for license: Charging of liquid energy storage...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Technology available for license: Charging of liquid energy storage media through radiolysis (ANL-IN-14-036) January 23, 2015 Tweet EmailPrint This technology utilizes radiolysis...

  4. Photovoltaics at DOE's National Renewable Energy Laboratory License...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SOLAR ROOF-TOP LICENSE AGREEMENT KEY TERMS (Non-Recordable) FOR INSTALLATION AND OPERATION OF A SOLAR ROOF-TOP ELECTRIC GENERATING SYSTEM AT THE NATIONAL RENEWABLE ENERGY...

  5. NREL: News Feature - NREL's Newest PE-Licensed Engineers Commit...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    NREL's Newest PE-Licensed Engineers Commit to Sustainability March 9, 2015 Photo of a woman sitting at a desk with a keyboard, computer screen, and telephone, using her hands to...

  6. Determining SQL Server 2012 Core Licensing Requirements at SA Renewal

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Determining SQL Server 2012 Core Licensing Requirements at SA Renewal June 2012 #12;2 Table......................................................................................................................................................................................................4 How to Create a SQL Server 2012 Transition Report .............................................................................................11 Discover SQL Server installations

  7. 16 USC 799 License duration, conditions, revocation, alteration...

    Open Energy Info (EERE)

    16 USC 799 License duration, conditions, revocation, alteration, or surrender Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- StatuteStatute: 16...

  8. Vermont Permit and License Information, Work in a State Highway...

    Open Energy Info (EERE)

    Vermont Permit and License Information, Work in a State Highway Right of Way Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance -...

  9. Vertimass licenses ORNL biofuel-to-hydrocarbon conversion technology...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    McCorkle Communications and Media Relations 865.574.7308 Vertimass licenses ORNL biofuel-to-hydrocarbon conversion technology Vertimass LLC, a California-based start-up...

  10. College of Electricity Delivery and Energy Reliability | Department...

    Energy Savers [EERE]

    Electricity Delivery and Energy Reliability College of Electricity Delivery and Energy Reliability College of Electricity Delivery and Energy Reliability Vision OE recognizes that...

  11. Supervisory Industrial Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  12. Oil Security Metrics Model

    SciTech Connect (OSTI)

    Greene, David L.; Leiby, Paul N.

    2005-03-06

    A presentation to the IWG GPRA USDOE, March 6, 2005, Washington, DC. OSMM estimates oil security benefits of changes in the U.S. oil market.

  13. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  14. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  15. Natlonal Nuclear Security Admlnlstratlon

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Natlonal Nuclear Security Admlnlstratlon Washington, DC 20585 January 18, 2007 OFFICE OF THE ADMINISTRATOR MEMORANDUM FOR The Deputy Secretary FROM: SUBJECT: Linton F. Brooks...

  16. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Washington, DC 20585 MEMORANDUM FOR THE ADMINISTRATOR FROM: THEODORE D. SHERRY II 4 flA. * -. SUBJECT: REFERENCE: NATIONAL SECURITY ENTI's'E FIELD COUNCIL CHAIR ACTION:...

  17. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    30 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 25, 2012 Recognizing employee and retiree volunteer efforts LOS ALAMOS, NEW...

  18. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  19. National Center for Nuclear Security - NCNS

    ScienceCinema (OSTI)

    None

    2015-01-09

    As the United States embarks on a new era of nuclear arms control, the tools for treaty verification must be accurate and reliable, and must work at stand-off distances. The National Center for Nuclear Security, or NCNS, at the Nevada National Security Site, is poised to become the proving ground for these technologies. The center is a unique test bed for non-proliferation and arms control treaty verification technologies. The NNSS is an ideal location for these kinds of activities because of its multiple environments; its cadre of experienced nuclear personnel, and the artifacts of atmospheric and underground nuclear weapons explosions. The NCNS will provide future treaty negotiators with solid data on verification and inspection regimes and a realistic environment in which future treaty verification specialists can be trained. Work on warhead monitoring at the NCNS will also support future arms reduction treaties.

  20. National Center for Nuclear Security - NCNS

    SciTech Connect (OSTI)

    2014-11-12

    As the United States embarks on a new era of nuclear arms control, the tools for treaty verification must be accurate and reliable, and must work at stand-off distances. The National Center for Nuclear Security, or NCNS, at the Nevada National Security Site, is poised to become the proving ground for these technologies. The center is a unique test bed for non-proliferation and arms control treaty verification technologies. The NNSS is an ideal location for these kinds of activities because of its multiple environments; its cadre of experienced nuclear personnel, and the artifacts of atmospheric and underground nuclear weapons explosions. The NCNS will provide future treaty negotiators with solid data on verification and inspection regimes and a realistic environment in which future treaty verification specialists can be trained. Work on warhead monitoring at the NCNS will also support future arms reduction treaties.

  1. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  2. Cloud Security by Max Garvey

    E-Print Network [OSTI]

    Tolmach, Andrew

    Cloud Security Survey by Max Garvey #12;Cloudy Cloud is Cloudy What is the cloud? On Demand Service, performance SECaaS - Cloud hosted security measures Certifications - measurements for cloud security. #12;Cloud Questions If you have $0 security budget, could cloud be a security improvement? Who owns the data

  3. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    research programs. These programs, which include Cyber Security, Pervasive Information TechnologiesComputer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security

  4. 2014 Headquarters Facilities Master Security Plan- Chapter 1, Physical Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

  5. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Environmental Management (EM)

    be completed each year by all those who hold a security clearance; and the Security Termination Briefing, which is conducted when a person no longer requires a security clearance....

  6. The Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure Computing Corporation

    E-Print Network [OSTI]

    Andersen, Dave

    Computing Corporation Stephen Smalley, Peter Loscocco National Security Agency Mike Hibler, David AndersenThe Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure be flexible in their support for security policies, providing sufficient mechanisms for supporting the wide

  7. MEMS reliability in shock environments

    SciTech Connect (OSTI)

    TANNER,DANELLE M.; WALRAVEN,JEREMY A.; HELGESEN,KAREN SUE; IRWIN,LLOYD W.; BROWN,FREDERICK A.; SMITH,NORMAN F.; MASTERS,NATHAN

    2000-02-09

    In order to determine the susceptibility of the MEMS (MicroElectroMechanical Systems) devices to shock, tests were performed using haversine shock pulses with widths of 1 to 0.2 ms in the range from 500g to 40,000g. The authors chose a surface-micromachined microengine because it has all the components needed for evaluation: springs that flex, gears that are anchored, and clamps and spring stops to maintain alignment. The microengines, which were unpowered for the tests, performed quite well at most shock levels with a majority functioning after the impact. Debris from the die edges moved at levels greater than 4,000g causing shorts in the actuators and posing reliability concerns. The coupling agent used to prevent stiction in the MEMS release weakened the die-attach bond, which produced failures at 10,000g and above. At 20,000g the authors began to observe structural damage in some of the thin flexures and 2.5-micron diameter pin joints. The authors observed electrical failures caused by the movement of debris. Additionally, they observed a new failure mode where stationary comb fingers contact the ground plane resulting in electrical shorts. These new failure were observed in the control group indicating that they were not shock related.

  8. Evaluation of MHTGR fuel reliability

    SciTech Connect (OSTI)

    Wichner, R.P. [Oak Ridge National Lab., TN (United States); Barthold, W.P. [Barthold Associates, Inc., Knoxville, TN (United States)

    1992-07-01

    Modular High-Temperature Gas-Cooled Reactor (MHTGR) concepts that house the reactor vessel in a tight but unsealed reactor building place heightened importance on the reliability of the fuel particle coatings as fission product barriers. Though accident consequence analyses continue to show favorable results, the increased dependence on one type of barrier, in addition to a number of other factors, has caused the Nuclear Regulatory Commission (NRC) to consider conservative assumptions regarding fuel behavior. For this purpose, the concept termed ``weak fuel`` has been proposed on an interim basis. ``Weak fuel`` is a penalty imposed on consequence analyses whereby the fuel is assumed to respond less favorably to environmental conditions than predicted by behavioral models. The rationale for adopting this penalty, as well as conditions that would permit its reduction or elimination, are examined in this report. The evaluation includes an examination of possible fuel-manufacturing defects, quality-control procedures for defect detection, and the mechanisms by which fuel defects may lead to failure.

  9. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not findGeoscience/EnvironmentGlobal Security Global Security We

  10. Y-12 licenses Omni Jaw 5(tm) | National Nuclear Security Administratio...

    National Nuclear Security Administration (NNSA)

    environmental and safety hazards. It was designed during demolition of the East Tennessee Technology Park where asbestos cyanide-dipped bolts posed a problem. Read more. About the...

  11. Omni Jaw 5(tm) licensed, headed to market | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesseworkSURVEY UNIVERSEHowScientificOmbuds Office Location &OmbudsmanOmni

  12. Real Time Grid Reliability Management 2005

    E-Print Network [OSTI]

    Eto, Joe

    2008-01-01

    W.R. Schmus, D.C. Dawson, “Transmission Voltage RecoveryEnhancing AC-DC Power System Transmission Reliability and

  13. Assessing reliability in energy supply systems

    E-Print Network [OSTI]

    McCarthy, Ryan W.; Ogden, Joan M.; Sperling, Daniel

    2007-01-01

    various fuels and energy supply systems. Acknowledgements WeAssessing Reliability in Energy Supply Systems Ryan W.stability of many energy supply regions becomes more

  14. Assessing Reliability in Energy Supply Systems

    E-Print Network [OSTI]

    McCarthy, Ryan; Ogden, Joan M.; Sperling, Dan

    2008-01-01

    various fuels and energy supply systems. Acknowledgements WeAssessing Reliability in Energy Supply Systems Ryan W.stability of many energy supply regions becomes more

  15. Smart Grid Investments Improve Grid Reliability, Resilience,...

    Energy Savers [EERE]

    customers, and improve overall service reliability to reduce customer losses from power disruptions. This report presents findings on smart grid improvements in outage...

  16. Information Concerning Reliability Impacts under Various System...

    Broader source: Energy.gov (indexed) [DOE]

    of sentence redacted) In addition, there is a discussion concerning the impacts of demand side response in addressing this situation. Information Concerning Reliability...

  17. Comments of North American Electric Reliability Corporation ...

    Office of Environmental Management (EM)

    RFI. North American Electric Reliability Corporation (NERC) More Documents & Publications City Utilities of Springfield Missouri Comments on Smart Grid RFI: Addressing Policy and...

  18. Revised: 01/21/2015 OMB Control No. 0648-0334 Expiration Date: 01/31/2018 License Limitation

    E-Print Network [OSTI]

    Revised: 01/21/2015 OMB Control No. 0648-0334 Expiration Date: 01/31/2018 LLP License Limitation Program APPLICATION FOR TRANSFER LICENSE LIMITATION PROGRAM GROUNDFISH / CRAB LICENSE U.S. Dept:The transfer of a License Limitation Program (LLP) license that was issued based on the documented harvests

  19. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Exchange of Information Develop security tools that: · Integrate information from different communication channels · Provide flexible reporting (reports adapted to the recipient) · Communicate security information Security practitioners perform many activities: · Information exchanged in different formats across

  20. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Cases Security Cases RSS June 19, 2015 PSH-15-0011 - In the Matter of Personnel Security Hearing On June 19, 2015, an OHA Administrative Judge (AJ) issued a decision in...

  1. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    Computer Security Incident Handling Guide Recommendationsof the National Institute of Standards Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD Tom Millar United States Computer Emergency Readiness Team National Cyber Security Division

  2. Security Policy: Radio Network Controller

    E-Print Network [OSTI]

    Security Policy: Radio Network Controller Encryption Module Controller (RNC EMC) Cryptographic, 2007 Security Policy: RNC EMC Page 1 of 22 #12;Security Policy: RNC EMC Page 2 of 22 #12;Table...........................................................14 7. IDENTIFICATION AND AUTHENTICATION POLICY

  3. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  4. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  5. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Ensuring the Safe Containment

  6. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear

  7. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  8. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1.

  9. CIOs Uncensored: Security Smarts.

    SciTech Connect (OSTI)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNL’s “defense in depth” approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability – and your last line of defense.

  10. Engineering secure software 

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01

    -the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar...

  11. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  12. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W the computational, physics

  13. Fundamental mechanisms of micromachine reliability

    SciTech Connect (OSTI)

    DE BOER,MAARTEN P.; SNIEGOWSKI,JEFFRY J.; KNAPP,JAMES A.; REDMOND,JAMES M.; MICHALSKE,TERRY A.; MAYER,THOMAS K.

    2000-01-01

    Due to extreme surface to volume ratios, adhesion and friction are critical properties for reliability of Microelectromechanical Systems (MEMS), but are not well understood. In this LDRD the authors established test structures, metrology and numerical modeling to conduct studies on adhesion and friction in MEMS. They then concentrated on measuring the effect of environment on MEMS adhesion. Polycrystalline silicon (polysilicon) is the primary material of interest in MEMS because of its integrated circuit process compatibility, low stress, high strength and conformal deposition nature. A plethora of useful micromachined device concepts have been demonstrated using Sandia National Laboratories' sophisticated in-house capabilities. One drawback to polysilicon is that in air the surface oxidizes, is high energy and is hydrophilic (i.e., it wets easily). This can lead to catastrophic failure because surface forces can cause MEMS parts that are brought into contact to adhere rather than perform their intended function. A fundamental concern is how environmental constituents such as water will affect adhesion energies in MEMS. The authors first demonstrated an accurate method to measure adhesion as reported in Chapter 1. In Chapter 2 through 5, they then studied the effect of water on adhesion depending on the surface condition (hydrophilic or hydrophobic). As described in Chapter 2, they find that adhesion energy of hydrophilic MEMS surfaces is high and increases exponentially with relative humidity (RH). Surface roughness is the controlling mechanism for this relationship. Adhesion can be reduced by several orders of magnitude by silane coupling agents applied via solution processing. They decrease the surface energy and render the surface hydrophobic (i.e. does not wet easily). However, only a molecular monolayer coats the surface. In Chapters 3-5 the authors map out the extent to which the monolayer reduces adhesion versus RH. They find that adhesion is independent of RH up to a threshold value, depending on the coating chemistry. The mechanism for the adhesion increase beyond this threshold value is that the coupling agent reconfigures from a surface to a bulk phase (Chapter 3). To investigate the details of how the adhesion increase occurs, the authors developed the mechanics for adhesion hysteresis measurements. These revealed that near-crack tip compression is the underlying cause of the adhesion increase (Chapter 4). A vacuum deposition chamber for silane coupling agent deposition was constructed. Results indicate that vapor deposited coatings are less susceptible to degradation at high RH (Chapter 5). To address issues relating to surfaces in relative motion, a new test structure to measure friction was developed. In contrast to other surface micromachined friction test structures, uniform apparent pressure is applied in the frictional contact zone (Chapter 6). The test structure will enable friction studies over a large pressure and dynamic range. In this LDRD project, the authors established an infrastructure for MEMS adhesion and friction metrology. They then characterized in detail the performance of hydrophilic and hydrophobic films under humid conditions, and determined mechanisms which limit this performance. These studies contribute to a fundamental understanding for MEMS reliability design rules. They also provide valuable data for MEMS packaging requirements.

  14. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  15. Secure Virtualization with Formal Methods

    E-Print Network [OSTI]

    Sturton, Cynthia

    2013-01-01

    cloud computing, virtualization software has a variety of security-cloud computing, researchers have proposed using system virtualization software as a platform to increase the security

  16. Program Areas | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program Areas image Oak Ridge National Laboratory (ORNL) has a robust...

  17. Office of Secure Transportation Activities

    Office of Environmental Management (EM)

    6th, 2012 WIPP Knoxville, TN OFFICE OF SECURE TRANSPORTATION Agency Integration Briefing Our Mission To provide safe and secure ground and air transportation of nuclear weapons,...

  18. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Activities Transportation Security Rulemaking Activities at the U.S. Nuclear Regulatory Commission NRC Transportation Security (Part 73 SNF Update and Part 37 Category 1...

  19. National Nuclear Security Administration Overview

    Office of Environmental Management (EM)

    May 11, 2011 Ahmad Al-Daouk Manager, National Security Department (NSD) National Nuclear Security Administration (NNSA) Service Center - Albuquerque, NM May 11, 2011 - Page 2...

  20. Software Reliability Cases: The Bridge Between Hardware, Software and System Safety and Reliability

    SciTech Connect (OSTI)

    Herrmann, D.S.; Peercy, D.E.

    1999-01-08

    High integrity/high consequence systems must be safe and reliable; hence it is only logical that both software safety and software reliability cases should be developed. Risk assessments in safety cases evaluate the severity of the consequences of a hazard and the likelihood of it occurring. The likelihood is directly related to system and software reliability predictions. Software reliability cases, as promoted by SAE JA 1002 and 1003, provide a practical approach to bridge the gap between hardware reliability, software reliability, and system safety and reliability by using a common methodology and information structure. They also facilitate early insight into whether or not a project is on track for meeting stated safety and reliability goals, while facilitating an informed assessment by regulatory and/or contractual authorities.

  1. R&D program benefits estimation: DOE Office of Electricity Delivery and Energy Reliability

    SciTech Connect (OSTI)

    None, None

    2006-12-04

    The overall mission of the U.S. Department of Energy’s Office of Electricity Delivery and Energy Reliability (OE) is to lead national efforts to modernize the electric grid, enhance the security and reliability of the energy infrastructure, and facilitate recovery from disruptions to the energy supply. In support of this mission, OE conducts a portfolio of research and development (R&D) activities to advance technologies to enhance electric power delivery. Multiple benefits are anticipated to result from the deployment of these technologies, including higher quality and more reliable power, energy savings, and lower cost electricity. In addition, OE engages State and local government decision-makers and the private sector to address issues related to the reliability and security of the grid, including responding to national emergencies that affect energy delivery. The OE R&D activities are comprised of four R&D lines: High Temperature Superconductivity (HTS), Visualization and Controls (V&C), Energy Storage and Power Electronics (ES&PE), and Distributed Systems Integration (DSI).

  2. Advances in Safety, Reliability and Risk Management -Proceedings of the European Safety and Reliability Conference, ESREL 2011 -European Safety and Reliability Conference: Advances in Safety, Reliability and

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Advances in Safety, Reliability and Risk Management - Proceedings of the European Safety, Reliability and Risk Management, ESREL 2011, Troyes : France (2011) In France, more than 99% of failed is global risk management. This allows analysis of the major risks faced by the busi- ness (loss

  3. Reliability Meets Big Data: Opportunities and Challenges

    E-Print Network [OSTI]

    McCalley, James D.

    Reliability Meets Big Data: Opportunities and Challenges William Q. Meeker Department of Statistics maintenance operations. 1.2 Examples of systems providing big data Some examples of particular systems 1, 2013 Abstract Reliability field data such as that obtained from warranty claims and maintenance

  4. RELIABILITY-BASED CASTING PROCESS DESIGN OPTIMIZATION

    E-Print Network [OSTI]

    Beckermann, Christoph

    , shrinkage porosity in the casting. Despite the power and promise of these developments in casting processRELIABILITY-BASED CASTING PROCESS DESIGN OPTIMIZATION Richard Hardin1 , K.K. Choi1 , and Christoph 52242-1527 Keywords: Casting Process Design, Optimization, Reliability-Based Design Optimization

  5. License Buyback Programs in Commercial Fisheries: An Application to the Shrimp Fishery in the Gulf of Mexico 

    E-Print Network [OSTI]

    Mamula, Aaron T.

    2010-01-16

    This dissertation provides a thorough analysis of the costs associated with, and efficacy of, sequential license buyback auctions. I use data from the Texas Shrimp License Buyback Program - a sequential license buyback auction - to estimate...

  6. More than a License to Kill: Immune Regulation of Crohn's Disease by Natural Killer Cell and Its Clinical Implication

    E-Print Network [OSTI]

    Lin, Lin

    2013-01-01

    Los Angeles More than a License to Kill: Immune RegulationDISSERTATION More than a License to Kill: Immune Regulationlack the capacity to license NK cells). n = 2 to 3, Student’

  7. On Building Secure SCADA Systems using Security Eduardo B. Fernandez

    E-Print Network [OSTI]

    Wu, Jie

    On Building Secure SCADA Systems using Security Patterns Eduardo B. Fernandez Dept. of Comp. Sci, also known as the supervisory, control, and data acquisition (SCADA) system. On the other hand systems. This paper aims to propose methods to build a secure SCADA system using security patterns

  8. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  9. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  10. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu Dept. of Computer Science Institute for Cyber Security University of Texas at San Antonio Email: ravi.sandhu@utsa.edu Ram Krishnan Dept. of Electrical and Computer Engineering Institute for Cyber Security University

  11. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio June 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  12. 1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE

    E-Print Network [OSTI]

    Upadhyaya, Shambhu

    , there are 100+ centers ­ Based on curriculum mapping to CNSS (committee of National Security Standards) 4011 at Google (2010) · Threats to national security ­ Insider attacks ­ Examples: Bradley Manning leaked1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE Professor S. Upadhyaya Department

  13. A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY

    E-Print Network [OSTI]

    Sussex, University of

    EN A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY Brussels, 12 December 2003 #12;1 EN's complex problems on its own Introduction Europe has never been so prosperous, so secure nor so free problems on its own. Europe still faces security threats and challenges. The outbreak of conflict

  14. SecuritySmart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity SecuritySecuritySmart

  15. License Stewardship Approach to Commercial Nuclear Power Plant Decommissioning

    SciTech Connect (OSTI)

    Daly, P.T.; Hlopak, W.J. [Commercial Services Group, EnergySolutions 1009 Commerce Park, Oak Ridge, TN (United States)

    2008-07-01

    The paper explores both the conceptual approach to decommissioning commercial nuclear facilities using a license stewardship approach as well as the first commercial application of this approach. The license stewardship approach involves a decommissioning company taking control of a site and the 10 CFR 50 License in order to complete the work utilizing the established trust fund. In conclusion: The license stewardship approach is a novel way to approach the decommissioning of a retired nuclear power plant that offers several key advantages to all parties. For the owner and regulators, it provides assurance that the station will be decommissioned in a safe, timely manner. Ratepayers are assured that the work will be completed for the price they already have paid, with the decommissioning contractor assuming the financial risk of decommissioning. The contractor gains control of the assets and liabilities, the license, and the decommissioning fund. This enables the decommissioning contractor to control their work and eliminates redundant layers of management, while bringing more focus on achieving the desired end state - a restored site. (authors)

  16. 2014 Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

  17. 2014 Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

  18. Two Approaches to Reactor Decommissioning: 10 CFR Part 50 License Termination and License Amendment, Lessons Learned from the Regulatory Perspective

    SciTech Connect (OSTI)

    Watson, B.A.; Buckley, J.T.; Craig, C.M.

    2006-07-01

    Trojan Nuclear Plant (Trojan) and Maine Yankee Nuclear Plant (Maine Yankee) were the first two power reactors to complete decommissioning under the U. S. Nuclear Regulatory Commission's (NRC's) License Termination Rule (LTR), 10 CFR Part 20, Subpart E. The respective owners' decisions to decommission the sites resulted in different approaches to both the physical aspects of the decommissioning, and the approach for obtaining approval for completing the decommissioning in accordance with regulations. Being in different States, the two single-unit pressurized water reactor sites had different State requirements and levels of public interest that impacted the decommissioning approaches. This resulted in significant differences in decommissioning planning, conduct of decommissioning operations, volumes of low- level radioactive waste disposed, and the final status survey (FSS) program. While both licensees have Independent Spent Fuel Storage Installations (ISFSIs), Trojan obtained a separate license for the ISFSI in accordance with the requirements of 10 CFR Part 72 and terminated their 10 CFR Part 50 license. Maine Yankee elected to obtain a general license under 10 CFR Part 50 for the ISFSI and reduce the physical site footprint to the ISFSI through a series of license amendments. While the NRC regulations are flexible and allow different approaches to ISFSI licensing there are separate licensing requirements that must be addressed. In 10 CFR 50.82, the NRC mandates public participation in the decommissioning process. For Maine Yankee, public input resulted in the licensee entering into an agreement with a concerned citizen group and resulted in State legislation that significantly lowered the dose limit below the NRC radiological criteria of 25 mrem (0.25 mSv) per year (yr) in 10 CFR 20.1402 for unrestricted use. The lowering of the radiological criteria resulted in a significant dose modeling effort using site-specific Derived Concentrations Guideline Levels (DCGLs) that were well below the NRC DCGL screening values. This contributed to a longer than anticipated period to obtain NRC approval of the Maine Yankee License Termination Plan (LTP). By employing the lessons learned from its first LTP submittal, which was not accepted by the NRC staff, Trojan was able to obtain approval of its revised LTP promptly. While both licensees provided final status survey reports (FSSRs) for NRC approval, the Trojan approach to decommissioning and data management allowed NRC to efficiently review FSS records and supporting documentation. Therefore, NRC was able to review Trojan's FSSR more efficiently than Maine Yankee's FSSR. This paper describes the regulatory impacts of the two different approaches to the decommissioning, the development of licensee required plans, decommissioning operations and records, the differences in licensing processes, and the lessons learned for improving the processes. (authors)

  19. BROADER National Security Missions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Metal Chips (U) Uranium Trioxide (UO 3 ) UO 2 (NO 3 ) 2 Ur anyl Nitrate Ammonium Uranyl Carbonate (NH 4 ) 2 UO 2 (CO 3 ) 4 DEVELOP NEW NATIONAL SECURITY MISSIONS Y-12 has...

  20. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  1. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  2. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  3. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  4. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  5. Policy Paper 35: Energy and Security in Northeast Asia: Fueling Security

    E-Print Network [OSTI]

    Calder, Kent; Fesharaki, Fereidun; Shirk, Susan L.; Stankiewicz, Michael

    1998-01-01

    Deese (editors). Energy and Security. 3. Fereidun Fesharaki,Energy and Security in Northeast Asia: Fueling Security Anrising energy demand. Energy and Security in Northeast Asia

  6. Secure Quantum Key Distribution

    E-Print Network [OSTI]

    Hoi-Kwong Lo; Marcos Curty; Kiyoshi Tamaki

    2015-05-20

    Secure communication plays a crucial role in the Internet Age. Quantum mechanics may revolutionise cryptography as we know it today. In this Review Article, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After a brief introduction to recent experimental progress and challenges, we survey the latest developments in quantum hacking and counter-measures against it.

  7. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  8. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  9. Applications (Classification, Advisory, and License) and Documentation Part 748page 1 Export Administration Regulations

    E-Print Network [OSTI]

    Bernstein, Daniel

    Applications (Classification, Advisory, and License) and Documentation Part 748­page 1 Export in writing or electronically, for classifications, advisory opinions or licenses subject to the Export Consistent with section 12(c) of the Export Administration Act, as amended, information obtained

  10. The use for frequency-consequence curves in future reactor licensing

    E-Print Network [OSTI]

    Debesse, Laurène

    2007-01-01

    The licensing of nuclear power plants has focused until now on Light Water Reactors and has not incorporated systematically insights and benefits from Probabilistic Risk Assessment (PRA). With the goal of making the licensing ...

  11. Security systems engineering overview

    SciTech Connect (OSTI)

    Steele, B.J.

    1996-12-31

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

  12. Reliability of Coupled Oscillators II: Larger Networks

    E-Print Network [OSTI]

    Kevin K. Lin; Eric Shea-Brown; Lai-Sang Young

    2007-08-23

    We study the reliability of phase oscillator networks in response to fluctuating inputs. Reliability means that an input elicits essentially identical responses upon repeated presentations, regardless of the network's initial condition. In this paper, we extend previous results on two-cell networks to larger systems. The first issue that arises is chaos in the absence of inputs, which we demonstrate and interpret in terms of reliability. We give a mathematical analysis of networks that can be decomposed into modules connected by an acyclic graph. For this class of networks, we show how to localize the source of unreliability, and address questions concerning downstream propagation of unreliability once it is produced.

  13. MEMS reliability: The challenge and the promise

    SciTech Connect (OSTI)

    Miller, W.M.; Tanner, D.M.; Miller, S.L.; Peterson, K.A.

    1998-05-01

    MicroElectroMechanical Systems (MEMS) that think, sense, act and communicate will open up a broad new array of cost effective solutions only if they prove to be sufficiently reliable. A valid reliability assessment of MEMS has three prerequisites: (1) statistical significance; (2) a technique for accelerating fundamental failure mechanisms, and (3) valid physical models to allow prediction of failures during actual use. These already exist for the microelectronics portion of such integrated systems. The challenge lies in the less well understood micromachine portions and its synergistic effects with microelectronics. This paper presents a methodology addressing these prerequisites and a description of the underlying physics of reliability for micromachines.

  14. Protecting a University's Wireless Data Network with the WPA and VPN Security Solutions

    E-Print Network [OSTI]

    Saksupakul, Rattanachai

    2007-05-18

    integrity and confidentiality to users and clients. A VPN gateway is the primary network element that provides a virtual, secure connection between the users or clients and servers. VPN tunneling protocols and cryptographic algorithms are fundamentally... increases security and reliability of the network with its sophisticated tunneling protocols and encryption software. Increasingly, the VPN technology has been widely implemented wireless data networks in order to maximize confidentiality, data integrity...

  15. Review of nuclear power plant offsite power source reliability and related recommended changes to the NRC rules and regulations

    SciTech Connect (OSTI)

    Battle, R.E.; Clark, F.H.; Reddoch, T.W.

    1980-05-01

    The NRC has stated its concern about the reliability of the offsite power system as the preferred emergency source and about the possible damage to a pressurized water reactor (PWR) that could result from a rapid decay of power grid frequency. ORNL contracted with NRC to provide technical assistance to establish criteria that can be used to evaluate the offsite power system for the licensing of a nuclear power plant. The results of many of the studies for this contract are recommendations to assess and control the power grid during operation. This is because most of the NRC regulations pertaining to the offsite power system are related to the design of the power grid, and we believe that additional emphasis on monitoring the power grid operation will improve the reliability of the nuclear plant offsite power supply. 46 refs., 10 figs.

  16. PV Module Reliability Research (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2013-06-01

    This National Center for Photovoltaics sheet describes the capabilities of its PV module reliability research. The scope and core competencies and capabilities are discussed and recent publications are listed.

  17. RELIABILITY PLANNING IN DISTRIBUTED ELECTRIC ENERGY SYSTEMS

    E-Print Network [OSTI]

    Kahn, E.

    2011-01-01

    Edward, Reliability of Wind Power from Dispersed Sites:The same is true for wind power. This Even over hundreds ofof (11) also shows how wind power output distributi.on

  18. Reliability of copper interconnects in integrated circuits

    E-Print Network [OSTI]

    Choi, Zung-Sun

    2007-01-01

    As dimensions shrink and current densities increase, the reliability of metal interconnects becomes a serious concern. In copper interconnects, the dominant diffusion path is along the interface between the copper and the ...

  19. Reliable Distributed Computing for Decision Support Systems

    E-Print Network [OSTI]

    Bargiela, Andrzej

    of pipes and network nodes spread over a large geographical area, calls for a control of computational system it is serv- icing. Addressing the reliability issues of dis- tributed systems involves tackling

  20. Reliability Issues for Photovoltaic Modules (Presentation)

    SciTech Connect (OSTI)

    Kurtz, S.

    2009-10-01

    Si modules good in field; new designs need reliability testing. CdTe & CIGS modules sensitive to moisture; carefully seal. CPV in product development stage; benefits from expertise in other industries.

  1. Reliability Challenges for Solar Energy (Presentation)

    SciTech Connect (OSTI)

    Kurtz, S.

    2009-04-27

    PV industry can benefit from reliability testing experience of microelectronics industry . Si modules perform well in field; CdTe/CIGS must be sealed to moisture; CPV in product development stage.

  2. Demand Response For Power System Reliability: FAQ

    SciTech Connect (OSTI)

    Kirby, Brendan J [ORNL

    2006-12-01

    Demand response is the most underutilized power system reliability resource in North America. Technological advances now make it possible to tap this resource to both reduce costs and improve. Misconceptions concerning response capabilities tend to force loads to provide responses that they are less able to provide and often prohibit them from providing the most valuable reliability services. Fortunately this is beginning to change with some ISOs making more extensive use of load response. This report is structured as a series of short questions and answers that address load response capabilities and power system reliability needs. Its objective is to further the use of responsive load as a bulk power system reliability resource in providing the fastest and most valuable ancillary services.

  3. Decision Tree for Export Control License Is the article subject to export control regulations?

    E-Print Network [OSTI]

    Hutcheon, James M.

    Decision Tree for Export Control License Is the article subject to export control regulations if further export review is required. Yes Yes Yes Yes No No No No No export requirements Obtain export license No export requirements Obtain export license #12;

  4. University of Wisconsin-Milwaukee Employment & Training Institute 1 Drivers License

    E-Print Network [OSTI]

    Saldin, Dilano

    University of Wisconsin-Milwaukee Employment & Training Institute 1 Drivers License Status Report for the Center on Driver's License Recovery & Employability June 13, 2012 by Lois Quinn and John Pawasarat residents in the state DOT files, including: · drivers with a current license as of January 2012 · plus

  5. License Usage and Changes: A Large-Scale Study of Java Projects on GitHub

    E-Print Network [OSTI]

    Poshyvanyk, Denys

    License Usage and Changes: A Large-Scale Study of Java Projects on GitHub Christopher Vendome1 -- 4 University of Victoria, BC, Canada Abstract--Software licenses determine, from a legal point of view, under which conditions software can be integrated, used, and above all, redistributed. Licenses

  6. THESES NON-EXCLUSIVE LICENSE Family Name: Given Name, Middle Name (if applicable)

    E-Print Network [OSTI]

    Wang, Hao "Howard"

    THESES NON-EXCLUSIVE LICENSE Family Name: Given Name, Middle Name (if applicable): Full Name, ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯ hereby grant a non-exclusive license, for the full term of copyright protection, to Library and Archives conferred by this non-exclusive license. If third party copyrighted material was included in my thesis

  7. End User License Agreement for IceSL Software By downloading, installing or using the software,

    E-Print Network [OSTI]

    Lévy, Bruno

    1/4 End User License Agreement for IceSL Software By downloading, installing" of the one part, accept the terms of this license agreement and agree mean the present End User License agreement for IceSL Software. Article 2

  8. License Exceptions Part 740-page 1 Export Administration Regulations August 2001

    E-Print Network [OSTI]

    Bernstein, Daniel

    License Exceptions Part 740-page 1 Export Administration Regulations August 2001 §740 !A "License Exception" is an authorization contained in this part that allows you to export otherwise require a license under General Prohibition One, Two, Three, orEight as indicated under one

  9. Management-based License Discovery for the Cloud Minkyong Kim, Han Chen, Jonathan Munson, Hui Lei

    E-Print Network [OSTI]

    Kim, Minkyong

    Management-based License Discovery for the Cloud Minkyong Kim, Han Chen, Jonathan Munson, Hui Lei, hlei}@us.ibm.com Abstract. Enterprise software is typically licensed through contracts that require organizations to monitor their own usage of the software and purchase the number or amount of licenses required

  10. University of Wisconsin-Milwaukee Employment & Training Institute Driver's License Issues

    E-Print Network [OSTI]

    Saldin, Dilano

    University of Wisconsin-Milwaukee Employment & Training Institute Driver's License Issues-Milwaukee Employment & Training Institute Driver's license obstacles 1. Lack of driver's education in the high schools of unlicensed driving 4. Court-ordered 2-year driver's license suspensions as a tool to collect municipal fines

  11. License for Non-Military Software Implementations of OCB January 10, 2013

    E-Print Network [OSTI]

    Rogaway, Phillip

    License for Non-Military Software Implementations of OCB January 10, 2013 1 Definitions 1.1 "Licensor" means Phillip Rogaway. 1.2 "Licensed Patents" means any patent that claims priority to United invention claimed in the Licensed Patents. 1.4 "Military Use" means any Use by, in cooperation with

  12. Agent Design of SmArt License Management System Using Gaia Methodology

    E-Print Network [OSTI]

    Perry, Mark

    Agent Design of SmArt License Management System Using Gaia Methodology Qian Zhao, Yu Zhou, Mark@csd|yuzhou@alumni|markp@csd}.uwo.ca Abstract-- Modern software services and data centers require a license management system to regulate the agreements that have been reached between subscriber and provider. License management helps to track usage

  13. Gearbox Reliability Collaborative (GRC) Description and Loading

    SciTech Connect (OSTI)

    Oyague, F.

    2011-11-01

    This document describes simulated turbine load cases in accordance to the IEC 61400-1 Ed.3 standard, which is representative of the typical wind turbine design process. The information presented herein is intended to provide a broad understanding of the gearbox reliability collaborative 750kW drivetrain and turbine configuration. In addition, fatigue and ultimate strength drivetrain loads resulting from simulations are presented. This information provides the bases for the analytical work of the gearbox reliability collaborative effort.

  14. System Reliability for LED-Based Products

    SciTech Connect (OSTI)

    Davis, J Lynn; Mills, Karmann; Lamvik, Michael; Yaga, Robert; Shepherd, Sarah D; Bittle, James; Baldasaro, Nick; Solano, Eric; Bobashev, Georgiy; Johnson, Cortina; Evans, Amy

    2014-04-07

    Results from accelerated life tests (ALT) on mass-produced commercially available 6” downlights are reported along with results from commercial LEDs. The luminaires capture many of the design features found in modern luminaires. In general, a systems perspective is required to understand the reliability of these devices since LED failure is rare. In contrast, components such as drivers, lenses, and reflector are more likely to impact luminaire reliability than LEDs.

  15. Dormant storage reliability assessments-data based

    SciTech Connect (OSTI)

    Merren, G.T.

    1981-01-01

    A relatively large amount of data pertaining to the performance of certain electronic parts after long periods of dormant storage has been collected and analyzed by the Reliability Department of Sandia National Laboratories. The failure models used by Sandia are presented and reliability assessments for selected electronic parts derived from these models and the measured performance data are provided. These data based assessments are compared to similar assessments derived from handbook calculations using the general data and models provided in the handbooks.

  16. WEBCASRE: A WEBBASED TOOL FOR SOFTWARE RELIABILITY MODELING

    E-Print Network [OSTI]

    Lyu, Michael R.

    of overall system reliability. This trend makes the estimation of software reliability more and more critical to most large­scale projects in their reliability engineering aspects. Traditionally, software reliabilityWEB­CASRE: A WEB­BASED TOOL FOR SOFTWARE RELIABILITY MODELING Michael R. Lyu \\Lambda JË?urgen Sch

  17. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  18. Effective Ways of Secure, Private and Trusted Cloud Computing

    E-Print Network [OSTI]

    Kumar, Pardeep; Chauhan, Durg Singh; Gupta, P K; Diwakar, Manoj

    2011-01-01

    Cloud computing is an Internet-based computing, where shared resources, software and information, are provided to computers and devices on-demand. It provides people the way to share distributed resources and services that belong to different organization. Since cloud computing uses distributed resources in open environment, thus it is important to provide the security and trust to share the data for developing cloud computing applications. In this paper we assess how can cloud providers earn their customers' trust and provide the security, privacy and reliability, when a third party is processing sensitive data in a remote machine located in various countries? A concept of utility cloud has been represented to provide the various services to the users. Emerging technologies can help address the challenges of Security, Privacy and Trust in cloud computing.

  19. Measurement Practices for Reliability and Power Quality

    SciTech Connect (OSTI)

    Kueck, JD

    2005-05-06

    This report provides a distribution reliability measurement ''toolkit'' that is intended to be an asset to regulators, utilities and power users. The metrics and standards discussed range from simple reliability, to power quality, to the new blend of reliability and power quality analysis that is now developing. This report was sponsored by the Office of Electric Transmission and Distribution, U.S. Department of Energy (DOE). Inconsistencies presently exist in commonly agreed-upon practices for measuring the reliability of the distribution systems. However, efforts are being made by a number of organizations to develop solutions. In addition, there is growing interest in methods or standards for measuring power quality, and in defining power quality levels that are acceptable to various industries or user groups. The problems and solutions vary widely among geographic areas and among large investor-owned utilities, rural cooperatives, and municipal utilities; but there is still a great degree of commonality. Industry organizations such as the National Rural Electric Cooperative Association (NRECA), the Electric Power Research Institute (EPRI), the American Public Power Association (APPA), and the Institute of Electrical and Electronics Engineers (IEEE) have made tremendous strides in preparing self-assessment templates, optimization guides, diagnostic techniques, and better definitions of reliability and power quality measures. In addition, public utility commissions have developed codes and methods for assessing performance that consider local needs. There is considerable overlap among these various organizations, and we see real opportunity and value in sharing these methods, guides, and standards in this report. This report provides a ''toolkit'' containing synopses of noteworthy reliability measurement practices. The toolkit has been developed to address the interests of three groups: electric power users, utilities, and regulators. The report will also serve to support activities to develop and share information among industry and regulatory participants about critical resources and practices. The toolkit has been developed by investigating the status of indices and definitions, surveying utility organizations on information sharing, and preparing summaries of reliability standards and monitoring requirements--the issues, needs, work under way, existing standards, practices and guidelines--for the following three classifications: (1) terms and definitions of reliability; (2) power quality standards, guidelines, and measurements; and (3) activities and organizations developing and sharing information on distribution reliability. As these synopses of reliability measurement practices are provided, it must be noted that an economic penalty may be associated with requiring too high a reliability level from the distribution system for all customers. It may be appropriate for the distribution system to supply only some base, generally accepted level of reliability. This base level would be adequate for the majority of customers. Users who need a higher level may find it economical to supply using distributed energy resources (DER) and other local solutions to reliability and power quality needs. Local solutions implemented by the customer may be the most cost-effective method for addressing the more stringent needs of a digital economy. These local solutions include energy storage, small distributed generators, and microgrids. This report also considers the market's role in addressing reliability issues and requirements. The customer's needs are discussed in view of issues such as power quality requirements of digital electronic equipment, the cost of outages, the cost of storage and new infrastructure, and natural gas prices. The market role in addressing these issues and requirements is explored. The economic considerations associated with the reliability issues are discussed, as well as the levels at which these economic decisions could be made. Finally, a discussion is provided of the role DER could play in addressing

  20. Security Proof for Password Authentication in TLS-Verifier-based Three-Party Group Diffie-Hellman

    SciTech Connect (OSTI)

    Chevassut, Olivier; Milner, Joseph; Pointcheval, David

    2008-04-21

    The internet has grown greatly in the past decade, by some numbers exceeding 47 million active web sites and a total aggregate exceeding100 million web sites. What is common practice today on the Internet is that servers have public keys, but clients are largely authenticated via short passwords. Protecting these passwords by not storing them in the clear on institutions's servers has become a priority. This paper develops password-based ciphersuites for the Transport Layer Security (TLS) protocol that are: (1) resistant to server compromise; (2) provably secure; (3) believed to be free from patent and licensing restrictions based on an analysis of relevant patents in the area.

  1. Cleanup of Nuclear Licensed Facility 57

    SciTech Connect (OSTI)

    Jeanjacques, Michel; Bremond, Marie Pierre; Marchand, Carole; Poyau, Cecile; Viallefont, Cecile; Gautier, Laurent; Masure, Frederic

    2008-01-15

    This summary describes the operations to clean up the equipment of the Nuclear Licensed Facility 57 (NLF 57). Due to the diversity of the research and development work carried out on the reprocessing of spent fuel in it, this installation is emblematic of many of the technical and organizational issues liable to be encountered in the final closure of nuclear facilities. The French atomic energy commission's center at Fontenay aux Roses (CEA-FAR) was created in 1946 to house pile ZOE. Laboratories for fuel cycle research were installed in existing buildings at the site. Work was later concentrated on spent fuel reprocessing, in a pilot workshop referred to as the 'Usine Pu'. In the early sixties, after the dismantling of these first generation facilities, a radiochemistry laboratory dedicated to research and development work on reprocessing was constructed, designated Building 18. During the same decade, more buildings were added: Building 54, storehouses and offices, Building 91, a hall and laboratories for chemical engineering research on natural and depleted uranium. Together, these three building constitute NLF 57. Building 18 architecture featured four similar modules. Each module had three levels: a sub-level consisting of technical galleries and rooms for the liquid effluent tanks, a ground floor and roof space in which the ventilation was installed. Offices, change rooms, four laboratories and a hall were situated on the ground floor. The shielded lines were installed in the laboratories and the halls. Construction of the building took place between 1959 and 1962, and its commissioning began in 1961. The research and development programs performed in NLF 57 related to studies of the reprocessing of spent fuel, including dry methods and the Purex process, techniques for the treatment of waste (vitrification, alpha waste decontamination, etc.) as well as studies and production of transuranic elements for industry and research. In addition to this work, the necessary methods of analysis for monitoring it were also developed. The research and development program finally ended on 30 June 1995. The NLF 57 cleanup program was intended to reduce the nuclear and conventional hazards and minimize the quantities of HLW and MLW during the subsequent dismantling work. To facilitate the organization of the cleanup work, it was divided into categories by type: - treatment and removal of nuclear material, - removal of radioactive sources, - treatment and removal of aqueous liquid waste, - treatment and removal of organic effluents, - treatment and removal of solid waste, - pumping out of the PETRUS tank, - flushing and decontamination of the tanks, - cleanup of Buildings 18 and 91/54. To estimate the cost of the operations and to monitor the progress of the work, an indicator system was put in place based on work units representative of the operation. The values of the work units were periodically updated on the basis of experience feedback. The cleanup progress is now 92% complete (06/12/31): - treatment and removal of nuclear material: 100%, - removal of radioactive sources: 100%, - treatment and removal of aqueous liquid waste: 64%, - treatment and removal of organic effluents: 87%, - treatment and removal of solid waste: 99%, - pumping out of the PETRUS tank: 69%, - flushing and decontamination of tank: 75%, - section cleaning of Buildings 18 and 91/: 90%. The DRSN/SAFAR is the delegated Project Owner for cleanup and dismantling operations. It is also the prime contractor for the cleanup and dismantling operations. SAFAR itself is responsible for operations relating to the CEA activity and those with technical risks (Removal of nuclear materials, Removal of radioactive sources, Pumping out plutonium and transuranic contaminated solvent and Flushing and decontamination of tanks and pipes). All other operations are sub-contracted to specialist companies. The NLF57 cleanup program as executed is capable of attaining activity levels compatible with a future dismantling operation using known and mastered techniques and producing a

  2. Unconditionally Secure Quantum Signatures

    E-Print Network [OSTI]

    Ryan Amiri; Erika Andersson

    2015-08-08

    Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols - signatures based on the Rivest-Adleman-Shamir (RSA) algorithm, the digital signature algorithm (DSA), and the elliptic curve digital signature algorithm (ECDSA) - are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally secure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  3. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopment Top Scientific Impact Since its SearchSecurity

  4. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345 UnlimitedSecure

  5. national security campus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReporteeo | National Nuclear Securityhr | Nationalnational security

  6. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorking With U.S. Coal StocksSuppliers Tag: Supplierssecurity Tag: security

  7. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLosThe 26thI D- 6 0 4 2 r m m m m port m fm f mphysical security |

  8. PRIMA: Academic Transfer Agreement -Page Computer Software License Agreement

    E-Print Network [OSTI]

    Shamir, Ron

    that all right title and interest in and to the Software and any translations, adaptations, alterations, modifications or similar derivative of any of the foregoing and in and to any physical embodiment it is hereby clarified that the license to use the Software as aforesaid does not include any obligation

  9. CUNY EXPORT CONTROL PROCEDURES 5. Licenses and export authorizations

    E-Print Network [OSTI]

    Rosen, Jay

    CUNY EXPORT CONTROL PROCEDURES 5. Licenses and export authorizations This Section addresses how, ITAR items of any kind must not be exported, nor accessed by a non-U.S. person, without proper required depends on the type of export transaction subject to control; for example, temporary versus

  10. SOFTWARE LICENSE AGREEMENT Center for Supercomputing Research and Development

    E-Print Network [OSTI]

    Padua, David

    SOFTWARE LICENSE AGREEMENT Center for Supercomputing Research and Development Operated as a Group of the University of Illinois (''University'') provides software (''Software'') described in Attachment A, attached, install, copy, and distribute the Software for its internal use. Licensee may, at its own expense, modify

  11. Wave Energy Development in Oregon Licensing & Permitting Requirements

    E-Print Network [OSTI]

    July 09 Wave Energy Development in Oregon Licensing & Permitting Requirements Prepared by Pacific Energy Ventures on behalf of the Oregon Wave Energy Trust w w w . o r e g o n w a v e . o r g #12;This study was commissioned by Oregon Wave Energy Trust. Oregon Wave Energy Trust is funded by the Oregon

  12. Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

    Office of Environmental Management (EM)

    4, Cyber Security Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2015 2015 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security...

  13. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  14. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  15. Securities Class Actions and Bankrupt Companies

    E-Print Network [OSTI]

    Park, James J.

    2014-01-01

    the utility of securities class actions. Certainly, contextthe merit of securities class actions. UCLA | SCHOOL OF LAWof James J. Park, Securities Class Actions and Bankrupt

  16. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  17. Review of digital image security in Dermatology

    E-Print Network [OSTI]

    Nielson, Colton; West, Cameron; Shimizu, Ikue

    2015-01-01

    encrypted communications, cloud security breaches, and phonebreaches in security demonstrate, such cloud storage ofand security rules 22 Audits of CSP data center operations and cloud

  18. Integrated Security System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems architecture Integrated...

  19. Data security on the national fusion grid

    E-Print Network [OSTI]

    Burruss, Justine R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  20. Security on the US Fusion Grid

    E-Print Network [OSTI]

    Burruss, Justin R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  1. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    CERT. (2010, Dec) Technical Cyber Security Alerts. [Online].a broad overview of cyber security incidents in the laststrategic war and viable cyber security solutions should be

  2. Mathematical and Statistical Opportunities in Cyber Security

    E-Print Network [OSTI]

    Meza, Juan

    2009-01-01

    development approach to cyber security. Report submitted to2007. Committee on Improving Cyber- security Research in theOpportunities in Cyber Security ? Juan Meza † Scott

  3. Security and United States Immigration Policy

    E-Print Network [OSTI]

    Totten, Robbie James

    2012-01-01

    2009 [1981]. American National Security, 6th ed. Baltimore,1977. Economic Issues and National Security. Lawrence, KS:Immigration and National Security. Westport, CT: Praeger

  4. Office of Security Assessments | Department of Energy

    Energy Savers [EERE]

    Security Assessments Office of Security Assessments MISSION The Office of Security Assessments is responsible for the independent evaluation of the effectiveness of safeguards and...

  5. Measuring eating disorder attitudes and behaviors: a reliability generalization study 

    E-Print Network [OSTI]

    Pearson, Crystal Anne

    2009-05-15

    I used reliability generalization procedures to determine the mean score reliability of the Eating Disorder Inventory (EDI), the Eating Attitudes Test (EAT), and the Bulimia Test (BULIT). Reliability generalization is a ...

  6. Empirical Measurements of Travelers' Value of Travel Time Reliability 

    E-Print Network [OSTI]

    Danda, Santosh Rao

    2014-08-12

    empirical data to take an initial step toward understanding the importance of travel time reliability. Katy Freeway travelers face a daily choice between reliable tolled lanes and less reliable but untolled lanes. An extensive dataset of Katy Freeway travel...

  7. Owner/Operator Perspective on Reliability Customer Needs and...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SERVICES AS RELIABLE AS THE SUN OwnerOperator Perspective on Reliability Customer Needs and Field Data Sandia National Laboratories Utility-Scale Grid-Tied PV Inverter Reliability...

  8. Secure Interoperable Open Smart Grid Demonstration Project

    SciTech Connect (OSTI)

    Magee, Thoman

    2014-12-31

    The Consolidated Edison, Inc., of New York (Con Edison) Secure Interoperable Open Smart Grid Demonstration Project (SGDP), sponsored by the United States (US) Department of Energy (DOE), demonstrated that the reliability, efficiency, and flexibility of the grid can be improved through a combination of enhanced monitoring and control capabilities using systems and resources that interoperate within a secure services framework. The project demonstrated the capability to shift, balance, and reduce load where and when needed in response to system contingencies or emergencies by leveraging controllable field assets. The range of field assets includes curtailable customer loads, distributed generation (DG), battery storage, electric vehicle (EV) charging stations, building management systems (BMS), home area networks (HANs), high-voltage monitoring, and advanced metering infrastructure (AMI). The SGDP enables the seamless integration and control of these field assets through a common, cyber-secure, interoperable control platform, which integrates a number of existing legacy control and data systems, as well as new smart grid (SG) systems and applications. By integrating advanced technologies for monitoring and control, the SGDP helps target and reduce peak load growth, improves the reliability and efficiency of Con Edison’s grid, and increases the ability to accommodate the growing use of distributed resources. Con Edison is dedicated to lowering costs, improving reliability and customer service, and reducing its impact on the environment for its customers. These objectives also align with the policy objectives of New York State as a whole. To help meet these objectives, Con Edison’s long-term vision for the distribution grid relies on the successful integration and control of a growing penetration of distributed resources, including demand response (DR) resources, battery storage units, and DG. For example, Con Edison is expecting significant long-term growth of DG. The SGDP enables the efficient, flexible integration of these disparate resources and lays the architectural foundations for future scalability. Con Edison assembled an SGDP team of more than 16 different project partners, including technology vendors, and participating organizations, and the Con Edison team provided overall guidance and project management. Project team members are listed in Table 1-1.

  9. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Broader source: Energy.gov (indexed) [DOE]

    A vulnerability was reported in Cisco Secure Access Control System. A remote user can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4,...

  10. AUDIT REPORT Security at the Nevada National Security Site

    Broader source: Energy.gov (indexed) [DOE]

    Security at the Nevada National Security Site OAS-L-15-06 May 2015 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections . Department of Energy...

  11. Security Requirements Engineering Support for Security-Annotated Business Processes

    E-Print Network [OSTI]

    Security Requirements Engineering Support for Security-Annotated Business Processes Elda Paja1 that business analysts are not secu- rity experts and assume that this will be bolted on later. Fortunately

  12. Towards improving software security by using simulation to inform requirements and conceptual design

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Nutaro, James J.; Allgood, Glenn O.; Kuruganti, Teja

    2015-06-17

    We illustrate the use of modeling and simulation early in the system life-cycle to improve security and reduce costs. The models that we develop for this illustration are inspired by problems in reliability analysis and supervisory control, for which similar models are used to quantify failure probabilities and rates. In the context of security, we propose that models of this general type can be used to understand trades between risk and cost while writing system requirements and during conceptual design, and thereby significantly reduce the need for expensive security corrections after a system enters operation

  13. Technical Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-09-02

    This order implements the Department of Energy (DOE) Technical Security Program (TSP). This program represents the convergence of two distinct disciplines: Counterintelligence (CI) and Security Countermeasures. The elements of the TSP are driven by national level, interagency programs that are codified in various laws, Executive Orders, national polices and directives. Supersedes DOE M 470.4-4A Chg 1, dated 10-12-2010, Section D – Technical Surveillance Countermeasures (Official Use Only) and classified annex (Secret); and DOE M 205.1-3 (Official Use Only) and Part II (Secret), dated 4-17-2006.

  14. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD |UpdatedSecurity|National

  15. Global Material Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia NationalSecurityNuclear SecurityOfficesPrograms

  16. PATENT AND TECHNOLOGY EXCLUSIVE LICENSE AGREEMENT SHORT FORM This AGREEMENT ("AGREEMENT") is made on this _______ day of _______________, 20____, (the

    E-Print Network [OSTI]

    Barrash, Warren

    PATENT AND TECHNOLOGY EXCLUSIVE LICENSE AGREEMENT SHORT FORM This AGREEMENT ("AGREEMENT") is made RIGHTS and TECHNOLOGY RIGHTS related to LICENSED SUBJECT MATTER developed at BSU. BSU desires to have the LICENSED SUBJECT MATTER developed in the LICENSED FIELD and used for the benefit of LICENSEE, BSU

  17. License Agreement UNBC Housing & Residence Life Rev 1-201502.05, May Semester Page 1 of 4

    E-Print Network [OSTI]

    Northern British Columbia, University of

    License Agreement UNBC Housing & Residence Life Rev 1-201502.05, May Semester Page 1 of 4 UNIVERSITY OF NORTHERN BRITISH COLUMBIA HOUSING and RESIDENCE LIFE RESIDENT'S LICENSE AGREEMENT This License Campus subject to the Student entering into this License Agreement and the availability of rooms

  18. License Agreement UNBC Housing & Residence Life Rev 1-201503.19, Academic Year 2015/16 Page 1 of 4

    E-Print Network [OSTI]

    Northern British Columbia, University of

    License Agreement UNBC Housing & Residence Life Rev 1-201503.19, Academic Year 2015/16 Page 1 of 4 UNIVERSITY OF NORTHERN BRITISH COLUMBIA HOUSING and RESIDENCE LIFE RESIDENT'S LICENSE AGREEMENT This License George Campus subject to the Student entering into this License Agreement and the availability of rooms

  19. Investing in the Energy Future: An Industry Guide to Licensing Technologies at the National Renewable Energy Laboratory (NREL) (Brochure)

    SciTech Connect (OSTI)

    Not Available

    2010-09-01

    Provides an overview of NREL's licensing opportunities and processes, and commercialization programs.

  20. 770 IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 A Resilient Real-Time System Design for a Secure

    E-Print Network [OSTI]

    Tolbert, Leon M.

    Design for a Secure and Reconfigurable Power Grid Hairong Qi, Senior Member, IEEE, Xiaorui Wang, Member architecture design that can help assure the security and reliability of the power grid. In this paper, we770 IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 A Resilient Real-Time System

  1. Idaho National Laboratory/Nuclear Power Industry Strategic Plan for Light Water Reactor Research and Development An Industry-Government Partnership to Address Climate Change and Energy Security

    SciTech Connect (OSTI)

    Electric Power Research

    2007-11-01

    The dual issues of energy security and climate change mitigation are driving a renewed debate over how to best provide safe, secure, reliable and environmentally responsible electricity to our nation. The combination of growing energy demand and aging electricity generation infrastructure suggests major new capacity additions will be required in the years ahead.

  2. Secure Storage Architectures

    SciTech Connect (OSTI)

    Aderholdt, Ferrol; Caldwell, Blake A; Hicks, Susan Elaine; Koch, Scott M; Naughton, III, Thomas J; Pogge, James R; Scott, Stephen L; Shipman, Galen M; Sorrillo, Lawrence

    2015-01-01

    The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention on elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to help with this issue, which are a particular instances of the more general challenge of efficient host/guest IO that is the focus of interfaces like virtio. A collection of bridging technologies have been identified in Chapter 4, which can be helpful to overcome the limitations and challenges of supporting efficient storage for secure enclaves. The synthesis of native filesystem security mechanisms and bridging technologies led to an isolation-centric storage architecture that is proposed in Chapter 5, which leverages isolation mechanisms from different layers to facilitate secure storage for an enclave. Recommendations: The following highlights recommendations from the investigations done thus far. - The Lustre filesystem offers excellent performance but does not support some security related features, e.g., encryption, that are included in GPFS. If encryption is of paramount importance, then GPFS may be a more suitable choice. - There are several possible Lustre related enhancements that may provide functionality of use for secure-enclaves. However, since these features are not currently integrated, the use of Lustre as a secure storage system may require more direct involvement (support). (*The network that connects the storage subsystem and users, e.g., Lustre s LNET.) - The use of OpenStack with GPFS will be more streamlined than with Lustre, as there are available drivers for GPFS. - The Manilla project offers Filesystem as a Service for OpenStack and is worth further investigation. Manilla has some support for GPFS. - The proposed Lustre enhancement of Dynamic-LNET should be further investigated to provide more dynamic changes to the storage network which could be used to isolate hosts and their tenants. - The Linux namespaces offer a good solution for creating efficient restrictions to shared HPC filesystems. However, we still need to conduct a thorough round of storage/filesystem benchmarks. - Vendor products should be more closely reviewed, possibly to include evaluation of performance/protection of select products. (Note, we are investigation the opti

  3. The Business Case for Fuel Cells 2013: Reliability, Resiliency...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The Business Case for Fuel Cells 2013: Reliability, Resiliency & Savings The Business Case for Fuel Cells 2013: Reliability, Resiliency & Savings This report, compiled by Fuel...

  4. The Business Case for Fuel Cells 2013: Reliability, Resiliency...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Reliability, Resiliency & Savings The Business Case for Fuel Cells 2013: Reliability, Resiliency & Savings This report, compiled by Fuel Cells 2000 with support from the Fuel...

  5. System Reliability Model for Solid-State Lighting Luminaires...

    Energy Savers [EERE]

    System Reliability Model for Solid-State Lighting Luminaires System Reliability Model for Solid-State Lighting Luminaires Lead Performer: RTI International - Research Triangle...

  6. Reliability of islanded microgrids with stochastic generation and prioritized load

    E-Print Network [OSTI]

    Marden, Mirjana Milosevic

    The potential to improve distribution system reliability is a primary motivation behind the development and deployment of microgrids. Previous studies have illustrated substantial reliability benefits of dispatchable ...

  7. Reliable estimation of biochemical parameters from C3 leafphotosynthe...

    Office of Scientific and Technical Information (OSTI)

    Reliable estimation of biochemical parameters from C3 leaf photosynthesis-intercellular carbon dioxide response curves Citation Details In-Document Search Title: Reliable...

  8. Characterizing wind power resource reliability in southern Africa...

    Office of Scientific and Technical Information (OSTI)

    DOE PAGES Search Results Published Article: Characterizing wind power resource reliability in southern Africa Title: Characterizing wind power resource reliability in southern...

  9. Washington DC Reliability Requirements and the Need to Operate...

    Energy Savers [EERE]

    DC Reliability Requirements and the Need to Operate Mirant's Potomac River Generation Station to Support Local Area Reliability (Oak Ridge National Laboratory 2005)...

  10. Effect of Jatropha based Biodiesel, on Engine Hardware Reliability...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Jatropha based Biodiesel, on Engine Hardware Reliability, Emission and Performance Effect of Jatropha based Biodiesel, on Engine Hardware Reliability, Emission and Performance...

  11. CHP SYSTEM AT FOOD PROCESSING PLANT INCREASES RELIABILITY AND...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CHP SYSTEM AT FOOD PROCESSING PLANT INCREASES RELIABILITY AND REDUCES EMISSIONS - CASE STUDY, 2015 CHP SYSTEM AT FOOD PROCESSING PLANT INCREASES RELIABILITY AND REDUCES EMISSIONS -...

  12. Data Center Efficiency and IT Equipment Reliability at Wider...

    Energy Savers [EERE]

    Data Center Efficiency and IT Equipment Reliability at Wider Operating Temperature and Humidity Ranges Data Center Efficiency and IT Equipment Reliability at Wider Operating...

  13. 2013 Reliability & Markets Peer Review | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    the links. The agenda and list of presentations are included below. The Reliability and Markets activity of the Transmission Reliability program researches, develops, and...

  14. Thermal Stress and Reliability for Advanced Power Electronics...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Performance and Reliability of Bonded Interfaces Physics of Failure of Electrical Interconnects Thermal Stress and Reliability for Advanced Power Electronics and Electric Machines...

  15. Addressing mechanical reliability issues in Sandia MEMS devices...

    Office of Scientific and Technical Information (OSTI)

    Addressing mechanical reliability issues in Sandia MEMS devices. Citation Details In-Document Search Title: Addressing mechanical reliability issues in Sandia MEMS devices. No...

  16. Office of Electricity Delivery & Energy Reliability FY 2012 Budget...

    Energy Savers [EERE]

    Office of Electricity Delivery & Energy Reliability FY 2012 Budget Request Presentation Office of Electricity Delivery & Energy Reliability FY 2012 Budget Request Presentation...

  17. PV Performance and Reliability Validation Capabilities at Sandia...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    PV Performance and Reliability Validation Capabilities at Sandia National Laboratories PV Performance and Reliability Validation Capabilities at Sandia National Laboratories This...

  18. SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011

    E-Print Network [OSTI]

    SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011 Choose brands and models of mobile devices that have the options referenced below. Use all available security options that your or sensitive university information in un-approved off-campus services, such as public cloud based services

  19. Wireless Security: Secure and Public Networks Villanova University

    E-Print Network [OSTI]

    36 Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science kory.kirk@villanova.edu www.korykirk.com/ Abstract Due to the increasing amount of wireless, train stations and cafes, there is a need for a wireless protocol that allows public access to secure

  20. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  1. NISTIR 7497 Security Architecture Design

    E-Print Network [OSTI]

    NISTIR 7497 Security Architecture Design Process for Health Information Exchanges (HIEs) Matthew Scholl Kevin Stine Kenneth Lin Daniel Steinberg #12;NISTIR 7497 Security Architecture Design Process Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899 Kenneth Lin

  2. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  3. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  4. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  5. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  6. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  7. Research Data Data Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    Research Data Data Security Survey Collection FAQs Q: I am not a UConn Health Center employee; can multiple projects that share common data? Yes. As long as the projects have common fields as you would in SurveyMonkey; data forms, e.g. Case Report Forms (CRF); or a combination of both. For any

  8. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  9. ARMY Energy Security Considerations

    E-Print Network [OSTI]

    energy waste in existing facilities; Increase energy efficiency in renovation and new constructionARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy · · · · FOREIGN OIL 2

  10. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  11. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  12. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    2011-01-01

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  13. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  14. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  15. Supporting Organizations | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the following three organizations: Measurement Science and Systems Engineering Division Nuclear Security and Isotope Technology Division Computational Sciences and Engineering...

  16. Protocol, Security Assistance- January 2007

    Broader source: Energy.gov [DOE]

    Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security.

  17. Critical Infrastructure and Cyber Security 

    E-Print Network [OSTI]

    Doll, Abby; Pirrong, Renee; Jennings, Matthew; Stasny, George; Giblin, Andy; Shaffer, Steph; Anderson, Aimee

    2011-01-01

    cyber security. They designated responsibility for cyber-security to the newly formed Department of Homeland Security, a duty that has continued to today 3. The group was tasked with creating a method of protecting the critical components.... 2010. 15 Mar. 2011. http://www.d tic.mil/doctrine/new_pubs/jp1_02.pdf 10 Comments on the Economic and Security Implications Of Recent Developments in the World Oil Market , 107th Cong. (2000) (testimony of Robert E. Ebel). http...

  18. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  19. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  20. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Victoria, University of

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  1. ASCE Specialty Conference on Probabilistic Mechanics and Structural Reliability ESTIMATING STRUCTURAL RELIABILITY UNDER HURRICANE WIND HAZARD

    E-Print Network [OSTI]

    Balaji, Rajagopalan

    STRUCTURAL RELIABILITY UNDER HURRICANE WIND HAZARD: APPLICATIONS TO WOOD STRUCTURES Balaji Rajagopalan.frangopol@colorado.edu Abstract A stochastic nonparametric framework to estimate structural reliability under hurricane wind Natural hazards in general and hurricanes in particular, lead to loss of life and tremendous property

  2. Technique for Measuring Hybrid Electronic Component Reliability

    SciTech Connect (OSTI)

    Green, C.C.; Hernandez, C.L.; Hosking, F.M.; Robinson, D.; Rutherford, B.; Uribe, F.

    1999-01-01

    Materials compatibility studies of aged, engineered materials and hardware are critical to understanding and predicting component reliability, particularly for systems with extended stockpile life requirements. Nondestructive testing capabilities for component reliability would significantly enhance lifetime predictions. For example, if the detection of crack propagation through a solder joint can be demonstrated, this technique could be used to develop baseline information to statistically determine solder joint lifelengths. This report will investigate high frequency signal response techniques for nondestructively evaluating the electrical behavior of thick film hybrid transmission lines.

  3. Gearbox Reliability Collaborative Update: A Brief (Presentation)

    SciTech Connect (OSTI)

    Sheng, S.; Keller, J.; McDade, M.

    2012-01-01

    This presentation is an update on the Gearbox Reliability Collaborative (GRC) for the AWEA Wind Project Operations, Maintenance & Reliability Seminar. GRC accomplishments are: (1) Failure database software deployed - partners see business value for themselves and customers; (2) Designed, built, instrumented, and tested two gearboxes - (a) Generated unprecedented public domain test data from both field testing and dynamometer testing, (b) Different responses from 'identical' gearboxes, (c) Demonstrated importance of non-torque loading and modeling approach; and (3) Active collaborative, with wide industry support, leveraging DOE funding - Modeling round robin and Condition Monitoring round robin.

  4. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  5. January 2005 INTEGRATING IT SECURITY

    E-Print Network [OSTI]

    in a cost- effective manner. The implementation of IT security and capital planning practices withinJanuary 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS released Special Publication (SP) 800-65, Inte grating IT Security into the Capital Planning and Investment

  6. Guidelines on Security and Privacy

    E-Print Network [OSTI]

    Guidelines on Security and Privacy in Public Cloud Computing WayneJansen TimothyGrance Special Publication 800-144 #12;ii NIST Special Publication 800-144 Guidelines on Security and Privacy in Public Cloud and Ramaswamy Chandramouli, also from NIST, provided input on cloud security in early drafts. Thanks also go

  7. Nevada National Security Site Groundwater Program

    ScienceCinema (OSTI)

    None

    2014-10-28

    From 1951 to 1992, the Unites States government conducted 828 underground nuclear tests at the Nevada National Security Site. About one-third of these tests occurred near, below or within the water table - the very top portion of the groundwater layer where rock and soil are completely saturated with water. As a result, some groundwater was contaminated. The U.S. Department of Energy (DOE) began exploring the effects of groundwater contamination in the 1970s. Though contamination from underground testing has never been detected on public land, the DOE was committed to developing an advanced, reliable monitoring network that ensures the long-term protection of the public. An intensive groundwater investigation program was launched in 1989.

  8. Secretary Richardson Accepts Recommendations for Improving Security...

    National Nuclear Security Administration (NNSA)

    Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

  9. Waste Isolation Pilot Plant Transportation Security

    Office of Environmental Management (EM)

    Senior Management Operational Management Implementation OOB NTP Transportation Logistics OSO Operations Management Organization Security WIPP Security Conditions * TRU Waste...

  10. National Nuclear Security Administration Overview | Department...

    Office of Environmental Management (EM)

    Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National Transportation...

  11. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  12. Independent Oversight Review, National Nuclear Security Administration...

    Office of Environmental Management (EM)

    Nuclear Security Administration Production Office - February 2014 Independent Oversight Review, National Nuclear Security Administration Production Office - February 2014 February...

  13. Enhancing Transportation Energy Security through Advanced Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transportation Energy Security through Advanced Combustion and Fuels Technologies Enhancing Transportation Energy Security through Advanced Combustion and Fuels Technologies 2005...

  14. An integrated security framework for GOSS power grid analytics platform

    SciTech Connect (OSTI)

    Gibson, Tara D.; Ciraci, Selim; Sharma, Poorva; Allwardt, Craig H.; Rice, Mark J.; Akyol, Bora A.

    2014-06-23

    In power grid operations, security is an essential component for any middleware platform. Security protects data against unwanted access as well as cyber attacks. GridOpticsTM Software System (GOSS) is an open source power grid analytics platform that facilitates ease of access between applications and data sources and promotes development of advanced analytical applications. GOSS contains an API that abstracts many of the difficulties in connecting to various heterogeneous data sources. A number of applications and data sources have already been implemented to demonstrate functionality and ease of use. A security framework has been implemented which leverages widely accepted, robust JavaTM security tools in a way such that they can be interchanged as needed. This framework supports the complex fine-grained, access control rules identified for the diverse data sources already in GOSS. Performance and reliability are also important considerations in any power grid architecture. An evaluation is done to determine the overhead cost caused by security within GOSS and ensure minimal impact to performance.

  15. Improving Security in the ATLAS PanDA System

    E-Print Network [OSTI]

    Caballero, J; The ATLAS collaboration; Nilsson, P; Stewart, G; Potekhin, M; Wenaus, T

    2011-01-01

    The security challenges faced by users of the grid are considerably different to those faced in previous environments. The adoption of pilot jobs systems by LHC experiments has mitigated many of the problems associated with the inhomogeneities found on the grid and has greatly improved job reliability; however, pilot jobs systems themselves must then address many security issues, including the execution of multiple users' code under a common `grid' identity. In this paper we describe the improvements and evolution of the security model in the ATLAS PanDA (Production and Distributed Analysis) system. We describe the security in the PanDA server which is in place to ensure that only authorized members of the VO are allowed to submit work into the system and that jobs are properly audited and monitored. We discuss the security in place between the pilot code itself and the PanDA server, ensuring that only properly authenticated workload is delivered to the pilot for execution. When the code to be executed is fro...

  16. Denial of Service or Denial of Security? How Attacks on Reliability can Compromise Anonymity

    E-Print Network [OSTI]

    Danezis, George

    of traditional high- and low-latency anonymous communication systems, as well as on the Hydra-Onion and Cashmere networks, showing that they cannot tolerate a majority of nodes be- ing malicious. Cashmere, Hydra-Onion and high-latency anonymous systems. The low- latency systems are exemplified by Tor, a popular anony- mou

  17. Reliability and Security Analysis of Open Source Software Prasanth Anbalagan1

    E-Print Network [OSTI]

    Young, R. Michael

    these factors in analyzing open source projects. We study the characteristics of FEDORA (a popular open source the trustworthiness of open source projects. The objectives of this study is to 1. Study the characteristics of FEDORA

  18. Reliability and Security of D2D Backup Storage Systems using SATA Drives

    E-Print Network [OSTI]

    Gordon F. Hughes

    2004-01-01

    of the enterprise storage systems being backed up (which getare proposed for SATA storage system designers to achievestored removed from storage systems and unpowered, perhaps

  19. Assuring the Safety, Security, and Reliability of Medical-Device Cyber-

    E-Print Network [OSTI]

    Hu, Fei

    · Difibtech external defibrillators (2007) ­ Self-test resets low-battery status · Baxter's Colleague Infusion of adverse events associated with the use of infusion pumps - 1% deaths, 34% serious injuries - 87 infusion and Radiological Health. White Paper: Infusion Pump Improvement Initiative, April 2010 Infusion Pump Safety #12

  20. Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS)Cyber Experimentation Overview Brief

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergy BillsNo.Hydrogen4 »DigitalanDepartmentSecondarySmartCyber Experimentation