Sample records for reliability security licensed

  1. Security & Defense Licenses Available | Tech Transfer | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614...

  2. Licensing Technologies | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12electron 9 5Let us count the ways.ICRUOpportunityLicensing

  3. MULTIAREA SYSTEM RELIABILITY: THE ECONOMIC EVALUATION OF SYSTEM SECURITY CRITERIA

    E-Print Network [OSTI]

    Gross, George

    MULTIAREA SYSTEM RELIABILITY: THE ECONOMIC EVALUATION OF SYSTEM SECURITY CRITERIA BY TEOMAN GULER B assessment studies and the quantification of the economics of secure power system operations security and the economics of secure operations in the competitive market environment. The advent

  4. Cyber Security Companies, governments, and consumers depend on secure and reliable

    E-Print Network [OSTI]

    Hill, Wendell T.

    Cyber Security Companies, governments, and consumers depend on secure and reliable computer-speed computers all introduce new cyber-security challenges. Cyber- security researchers at the University in the software development cycle. e also creates secure authentication protocols for vulnerable distributed

  5. Security-Constrained Adequacy Evaluation of Bulk Power System Reliability

    E-Print Network [OSTI]

    Security-Constrained Adequacy Evaluation of Bulk Power System Reliability Fang Yang, Student Member. Stefopoulos, Student Member, IEEE Abstract -- A framework of security-constrained adequacy evaluation (SCAE electric load while satisfying security constraints. It encompasses three main steps: (a) critical

  6. Reliable Process for Security Policy Deployment

    E-Print Network [OSTI]

    Preda, Stere; Cuppens, Frederic; Garcia-Alfaro, Joaquin; Toutain, Laurent

    2009-01-01T23:59:59.000Z

    We focus in this paper on the problem of configuring and managing network security devices, such as Firewalls, Virtual Private Network (VPN) tunnels, and Intrusion Detection Systems (IDSs). Our proposal is the following. First, we formally specify the security requirements of a given system by using an expressive access control model. As a result, we obtain an abstract security policy, which is free of ambiguities, redundancies or unnecessary details. Second, we deploy such an abstract policy through a set of automatic compilations into the security devices of the system. This proposed deployment process not only simplifies the security administrator's job, but also guarantees a resulting configuration free of anomalies and/or inconsistencies.

  7. Secure and reliable operation of our

    E-Print Network [OSTI]

    Amin, S. Massoud

    the weather. Electric power systems constitute the fundamental infrastructure of modern society. A suc of threats: · Attacks upon the power system. In this case, the electricity infrastructure itself to national and international economy, security, and quality of life. Massoud Amin, Electric Power Research

  8. Microgrids and Heterogeneous Security, Quality, Reliability, and Availability

    E-Print Network [OSTI]

    Marnay, Chris

    2007-01-01T23:59:59.000Z

    and Energy Reliability, Distribution System Integrationand Energy Reliability, Distribution System Integration

  9. North American Electricity Infrastructure: System Security, Quality, Reliability, Availability, and Efficiency

    E-Print Network [OSTI]

    Amin, S. Massoud

    many of the complexities of electric power infrastructure and how technological innovation combined1 North American Electricity Infrastructure: System Security, Quality, Reliability, Availability for reliable and disturbance-free electricity. The massive power outages in the United States, Canada, UK

  10. Microgrids and Heterogeneous Security, Quality, Reliability, and Availability

    E-Print Network [OSTI]

    Marnay, Chris

    2007-01-01T23:59:59.000Z

    quality, reliability, and availability,” IEEE Power & EnergyReliability, and Availability Chris Marnay EnvironmentalQuality, Reliability, and Availability C. Marnay Ernest

  11. Communication Capacity Requirement for Reliable and Secure State Estimation in Smart Grid

    E-Print Network [OSTI]

    Qiu, Robert Caiming

    1 Communication Capacity Requirement for Reliable and Secure State Estimation in Smart Grid Husheng, Cookeville, TN Abstract-- Secure system state estimation is an important issue in smart grid to assure the information the- oretic perspective. The smart grid is modeled as a linear dynamic system. Then, the channel

  12. Towards Full-disclosure: Broadening Access to SCADA Data to Improve Safety, Reliability, and Security

    E-Print Network [OSTI]

    Heidemann, John

    Towards Full-disclosure: Broadening Access to SCADA Data to Improve Safety, Reliability is that openness and support for disclosure of future SCADA data can in improved safety, reliability, and security-network processing are needed to make greater openness and data sharing data viable. Today's SCADA systems are often

  13. Reliable fuel source | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Scienceand Requirements Recently ApprovedReliability Technology earns award Reliability

  14. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    SciTech Connect (OSTI)

    Rogers,E.; deBoer,G.; Crawford, C.; De Castro, K.; Landers, J.

    2009-10-19T23:59:59.000Z

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." Gen. Eugene Habiger, a former "Assistant Secretary for Safeguards and Security" at the U.S. Department of Energy’s (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that "good security is 20% equipment and 80% people." Although eliminating the "human factor" is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  15. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    SciTech Connect (OSTI)

    Crawford, Cary E.; de Boer, Gloria; De Castro, Kara; Landers, John; Rogers, Erin

    2010-10-01T23:59:59.000Z

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the “human factor.” Gen. Eugene Habiger, a former “Assistant Secretary for Safeguards and Security” at the U.S. Department of Energy’s (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that “good security is 20% equipment and 80% people.”1 Although eliminating the “human factor” is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  16. Towards Reliable Cross Sections for National Security Applications

    SciTech Connect (OSTI)

    Escher, J E; Dietrich, F S; Nobre, G A; Thompson, I J

    2011-02-24T23:59:59.000Z

    Stockpile stewardship requires the description of weapons performance without resorting to underground nuclear testing. In the earlier tests, selected isotopes were used as detectors, and recovered after irradiation. Aspects of nuclear device performance were inferred by comparing the measured isotopic ratios to those predicted from simulations. The reaction flows that produce the final isotopic distributions proceed through regions of the nuclear chart that include unstable nuclei. Presently, improved nuclear data input is required to reanalyze prior tests and to certify the stockpile's reliability and safety. Many important cross sections are unknown, as is shown in the example of the Yttrium reaction network (Figure 1). The relevant reactions include (n,2n), (n,n'), (n,gamma), (n,p) and other charged-particle emitting reactions. The cross sections have to be calculated or inferred from indirect measurements. In both cases, reliable optical models that are valid a few nucleons away from stability are needed. The UNEDF Nuclear Reaction activities address this need by combining nuclear-structure input from UNEDF structure calculations with modern reaction theory and large-scale computational capabilities to develop microscopic nucleon-nucleus optical potentials that can be extrapolated to unstable nuclei. In addition, the reaction calculation tools and optical models developed in this context are proving valuable for planning and interpreting indirect (surrogate) measurements of the required cross sections.

  17. o secure a safe, reliable and low-carbon energy future, we must alter

    E-Print Network [OSTI]

    Kammen, Daniel M.

    T o secure a safe, reliable and low- carbon energy future, we must alter both technologies and human behav- iour1 . The US Department of Energy notes2 that supply and demand is "affected as much-makers continue to focus on only one side of the energy dilemma. In the United States

  18. Interplay of Security and Reliability using Non-uniform Checkpoints Kiranmai Bellam

    E-Print Network [OSTI]

    Qin, Xiao

    .auburn.edu Department of Computer Science New Mexico Institute of Mining and Technology, Socorro, NM 87801 Department for reliability. The slack exploitation interacts in subtle ways for security in regards to the placement efficient exploitation of the total slack available in the system. This paper presents the study on the same

  19. Using a Secure Java Micro-kernel on Embedded Devices for the Reliable Execution of

    E-Print Network [OSTI]

    Binder, Walter

    Using a Secure Java Micro-kernel on Embedded Devices for the Reliable Execution of Dynamically Uploaded Applications Walter Binder and Bal´azs Lichtl CoCo Software Engineering GmbH Margaretenstr. 22 applications. Mobile code is used for application upload, as well as for remote configuration and maintenance

  20. LOS ALAMOS NATIONAL LABORATORY - EXPRESS LICENSING PROGRAM

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    LOS ALAMOS NATIONAL LABORATORY - EXPRESS LICENSING PROGRAM NON-EXCLUSIVE PATENT LICENSE AGREEMENT This Agreement between Los Alamos National Security, LLC ("LANS"), under its...

  1. An Embedded System for Safe, Secure and Reliable Execution of High Consequence Software

    SciTech Connect (OSTI)

    MCCOY,JAMES A.

    2000-08-29T23:59:59.000Z

    As more complex and functionally diverse requirements are placed on high consequence embedded applications, ensuring safe and secure operation requires an execution environment that is ultra reliable from a system viewpoint. In many cases the safety and security of the system depends upon the reliable cooperation between the hardware and the software to meet real-time system throughput requirements. The selection of a microprocessor and its associated development environment for an embedded application has the most far-reaching effects on the development and production of the system than any other element in the design. The effects of this choice ripple through the remainder of the hardware design and profoundly affect the entire software development process. While state-of-the-art software engineering principles indicate that an object oriented (OO) methodology provides a superior development environment, traditional programming languages available for microprocessors targeted for deeply embedded applications do not directly support OO techniques. Furthermore, the microprocessors themselves do not typically support nor do they enforce an OO environment. This paper describes a system level approach for the design of a microprocessor intended for use in deeply embedded high consequence applications that both supports and enforces an OO execution environment.

  2. Electric Power Infrastructure Reliability and Security (EPIRS) Reseach and Development Initiative

    SciTech Connect (OSTI)

    Rick Meeker; L. Baldwin; Steinar Dale; Alexander Domijan; Davild Larbalestier; Hui Li; Peter McLaren; Sastry Pamidi; Horatio Rodrigo; Michael Steurer

    2010-03-31T23:59:59.000Z

    Power systems have become increasingly complex and face unprecedented challenges posed by population growth, climate change, national security issues, foreign energy dependence and an aging power infrastructure. Increased demand combined with increased economic and environmental constraints is forcing state, regional and national power grids to expand supply without the large safety and stability margins in generation and transmission capacity that have been the rule in the past. Deregulation, distributed generation, natural and man-made catastrophes and other causes serve to further challenge and complicate management of the electric power grid. To meet the challenges of the 21st century while also maintaining system reliability, the electric power grid must effectively integrate new and advanced technologies both in the actual equipment for energy conversion, transfer and use, and in the command, control, and communication systems by which effective and efficient operation of the system is orchestrated - in essence, the 'smart grid'. This evolution calls for advances in development, integration, analysis, and deployment approaches that ultimately seek to take into account, every step of the way, the dynamic behavior of the system, capturing critical effects due to interdependencies and interaction. This approach is necessary to better mitigate the risk of blackouts and other disruptions and to improve the flexibility and capacity of the grid. Building on prior Navy and Department of Energy investments in infrastructure and resources for electric power systems research, testing, modeling, and simulation at the Florida State University (FSU) Center for Advanced Power Systems (CAPS), this project has continued an initiative aimed at assuring reliable and secure grid operation through a more complete understanding and characterization of some of the key technologies that will be important in a modern electric system, while also fulfilling an education and outreach mission to provide future energy workforce talent and support the electric system stakeholder community. Building upon and extending portions of that research effort, this project has been focused in the following areas: (1) Building high-fidelity integrated power and controls hardware-in-the-loop research and development testbed capabilities (Figure 1). (2) Distributed Energy Resources Integration - (a) Testing Requirements and Methods for Fault Current Limiters, (b) Contributions to the Development of IEEE 1547.7, (c) Analysis of a STATCOM Application for Wind Resource Integration, (d) Development of a Grid-Interactive Inverter with Energy Storage Elements, (e) Simulation-Assisted Advancement of Microgrid Understanding and Applications; (3) Availability of High-Fidelity Dynamic Simulation Tools for Grid Disturbance Investigations; (4) HTS Material Characterization - (a) AC Loss Studies on High Temperature Superconductors, (b) Local Identification of Current-Limiting Mechanisms in Coated Conductors; (5) Cryogenic Dielectric Research; and (6) Workshops, education, and outreach.

  3. Optimal Resource Allocation for Security in Reliability Systems M. N. Azaiez

    E-Print Network [OSTI]

    Wang, Hai

    systems, about protecting nuclear power plants against terrorist attacks or sabotage, or about ensuring, the threat is usually assumed to be static, rather than responding in an adaptive way to the defenses to defense against intentional threats to security have dealt either with components in isolation (Major

  4. Transmission System Expansion Plans in View Point of Deterministic, Probabilistic and Security Reliability Criteria

    E-Print Network [OSTI]

    Transmission System Expansion Plans in View Point of Deterministic, Probabilistic and Security control system as well as reasonable strength of grid originally. Because investment for power system the stability, and dynamic characteristics of the new system. A main reason of the separated work process

  5. Human Reliability Program Overview

    SciTech Connect (OSTI)

    Bodin, Michael

    2012-09-25T23:59:59.000Z

    This presentation covers the high points of the Human Reliability Program, including certification/decertification, critical positions, due process, organizational structure, program components, personnel security, an overview of the US DOE reliability program, retirees and academia, and security program integration.

  6. Sample Licensing Agreements | Partnerships | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    be modified to meet individual circumstances. Licensing Agreements Nonexclusive Patent License Exclusive Patent License Nonexclusive Copyright License Nondisclosure (NDA)...

  7. NNSA orders security enhancements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    badge or valid driver's license) before proceeding, and will be asked to vouch for other vehicle occupants. LOS ALAMOS, N. M., Dec. 21, 2012-The National Nuclear Security...

  8. Y-12 cleaning technology licensed by Knoxville engineering firm...

    National Nuclear Security Administration (NNSA)

    cleaning technology licensed by Knoxville engineering firm | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile...

  9. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY Federal agencies to support waivers and specific response legal authorities #12;INFRASTRUCTURE SECURITY

  10. Assessing Reliability in Energy Supply Systems

    E-Print Network [OSTI]

    McCarthy, Ryan; Ogden, Joan M.; Sperling, Dan

    2008-01-01T23:59:59.000Z

    total of 15 metrics. Pathway reliability General objectives Adequacy Security Functional zones Primary energy supply

  11. Assessing reliability in energy supply systems

    E-Print Network [OSTI]

    McCarthy, Ryan W.; Ogden, Joan M.; Sperling, Daniel

    2007-01-01T23:59:59.000Z

    total of 15 metrics. Pathway reliability General objectives Adequacy Security Functional zones Primary energy supply

  12. License Plate 1 License Plate 2

    E-Print Network [OSTI]

    Wagner, Diane

    License Plate 1 License Plate 2 License Plate 3 License Plate 4 Single Vehicle $254 Multi Vehicle $264 ( up to 4 vehicles) Annual Decal Valid: 09/01/12 - 08/31/13 Fall /Spring Decal (Pick date range , then Single or Multi Vehicle) Multi Vehicles $200 (up to 4 vehicles) Select date range Valid 9/1/12 - 5

  13. Electricity Reliability

    E-Print Network [OSTI]

    electric power equipment with more energy efficiency and higher capacity than today's systems of modernizing the electric grid to meet the nations's need for reliable, electric power, enhancing security continues to increase within the electricity infrastructure. DOE is conducting research, development

  14. Leveraging Formal Methods and Fuzzing to Verify Security and Reliability Properties of Large-Scale High-Consequence Systems.

    SciTech Connect (OSTI)

    Ruthruff, Joseph; Armstrong, Robert C.; Davis, Benjamin Garry; Mayo, Jackson; Punnoose, Ratish J.

    2012-09-01T23:59:59.000Z

    Formal methods describe a class of system analysis techniques that seek to prove specific propertiesabout analyzed designs, or locate flaws compromising those properties. As an analysis capability,these techniques are the subject of increased interest fromboth internal and external customersof Sandia National Laboratories. Given this lab's other areas of expertise, Sandia is uniquelypositioned to advance the state-of-the-art with respect toseveral research and application areaswithin formal methods. This research project was a one-yeareffort funded by Sandia's CyberSecurity S&T Investment Area in its Laboratory Directed Research&Development program toinvestigate the opportunities for formal methods to impactSandia's present mission areas, morefully understand the needs of the research community in the area of formal methods and whereSandia can contribute, and clarify from those potential research paths those that would best advancethe mission-area interests of Sandia. The accomplishmentsfrom this project reinforce the utilityof formal methods in Sandia, particularly in areas relevantto Cyber Security, and set the stagefor continued Sandia investments to ensure this capabilityis utilized and advanced within thislaboratory to serve the national interest.4

  15. 2014 Human Reliability Program Workshop

    Broader source: Energy.gov [DOE]

    Announcing The Human Reliability Program Workshop Sponsored by Office of Security (AU-50), U.S Department of Energy In collaboration with NA, NE, EM and SC

  16. Sandia National Laboratories: Water Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Works Association Water Research Foundation EPA Licensing RAM-WTM Energy-Water Nexus Energy production requires a reliable, abundant, and predictable source of water, a...

  17. Licensing | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (TDC) Division negotiates and manages license agreements on behalf of UChicago Argonne, LLC, which operates Argonne National Laboratory for the U.S. Department of Energy....

  18. Radioactive Materials License Commitments

    E-Print Network [OSTI]

    Radioactive Materials License Commitments for The University of Texas at Austin May 2009 July 2009 in the use of radioactive materials. In July 1963, the State of Texas granted The University of Texas at Austin a broad radioactive materials license for research, development and instruction. While this means

  19. POWER GRID RELIABILITY AND SECURITY

    SciTech Connect (OSTI)

    Bose, Anjan; Venkatasubramanian, Vaithianathan; Hauser, Carl; Bakken, David; Anderson, David; Zhao, Chuanlin; Liu, Dong; Yang, Tao; Meng, Ming; Zhang, Lin; Ning, Jiawei; Tashman, Zaid

    2014-09-30T23:59:59.000Z

    This project has led to the development of a real-time simulation platform for electric power grids called Grid Simulator or GridSim for simulating the dynamic and information network interactions of large- scale power systems. The platform consists of physical models of power system components including synchronous generators, loads and control, which are simulated using a modified commercial power simulator namely Transient Stability Analysis Tool (TSAT) [1] together with data cleanup components, as well as an emulated substation level and wide-area power analysis components. The platform also includes realistic representations of communication network middleware that can emulate the real-time information flow back and forth between substations and control centers in wide-area power systems. The platform has been validated on a realistic 6000-bus model of the western American power system. The simulator GridSim developed in this project is the first of its kind in its ability to simulate real-time response of large-scale power grids, and serves as a cost effective real-time stability and control simulation platform for power industry.

  20. Microsoft PowerPoint - Nuclear Material Import Export License...

    National Nuclear Security Administration (NNSA)

    Commission (NRC) importexport license? - Licenses for imports - Licenses for exports - Export license monitoring Highlights of importsexports in 2014 - Nuclear...

  1. Human Reliability Program Workshop

    SciTech Connect (OSTI)

    Landers, John; Rogers, Erin; Gerke, Gretchen

    2014-05-18T23:59:59.000Z

    A Human Reliability Program (HRP) is designed to protect national security as well as worker and public safety by continuously evaluating the reliability of those who have access to sensitive materials, facilities, and programs. Some elements of a site HRP include systematic (1) supervisory reviews, (2) medical and psychological assessments, (3) management evaluations, (4) personnel security reviews, and (4) training of HRP staff and critical positions. Over the years of implementing an HRP, the Department of Energy (DOE) has faced various challenges and overcome obstacles. During this 4-day activity, participants will examine programs that mitigate threats to nuclear security and the insider threat to include HRP, Nuclear Security Culture (NSC) Enhancement, and Employee Assistance Programs. The focus will be to develop an understanding of the need for a systematic HRP and to discuss challenges and best practices associated with mitigating the insider threat.

  2. Technologies licensed | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our InstagramStructureProposedPAGESafety Tag:8,, 20153 To.T. J.InnovationMatter

  3. Licensing East Asian Resources

    E-Print Network [OSTI]

    Chu, Victoria; Eggleston, Holly

    2008-01-01T23:59:59.000Z

    our licensing of East Asian Resources here at UCSD. y It isthe history of electronic resources and the use of licensesclick through, or even use a resource with posted terms on a

  4. Regulators Experiences in Licensing and Inspection of Dry Cask Storage Facilities

    SciTech Connect (OSTI)

    Baggett, S.; Brach, E.W. [Spent Fuel Project Office, U.S. Nuclear Regulatory Commission, Washington, DC 20555 (United States)

    2006-07-01T23:59:59.000Z

    The United States Nuclear Regulatory Commission (NRC), through the combination of a rigorous licensing and inspection program, ensures the safety and security of dry cask storage. NRC authorizes the storage of spent fuel at an independent spent fuel storage installation (ISFSI) under two licensing options: site-specific licensing and general licensing. In July 1986, the NRC issued the first site-specific license to the Surry Nuclear Power Plant in Virginia authorizing the interim storage of spent fuel in a dry storage cask configuration. Today, there are over 30 ISFSIs currently licensed by the NRC with over 700 loaded dry casks. Current projections identify over 50 ISFSIs by the year 2010. No releases of spent fuel dry storage cask contents or other significant safety problems from the storage systems in use today have been reported. This paper discusses the NRC licensing and inspection experiences. (authors)

  5. Sandia National Laboratories: Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    States. I&C systems monitor the safe, reliable and secure generation and delivery of electricity and could have potential cyber vulnerabilities. At Sandia National Laboratories,...

  6. License Iso. CM35

    Office of Legacy Management (LM)

    License Iso. CM35 hUhUll4MhiM&POlltYll7 llolh-thRqalStract Alolan&le, vlrghla Attoatlonl w. & 0. EutahlDon Pursuant to the Atanic Energy Act of 1954 and Section 40.21 or the Code...

  7. Water Security Toolkit User Manual Version 1.2.

    SciTech Connect (OSTI)

    Klise, Katherine A.; Siirola, John Daniel; Hart, David; Hart, William E.; Phillips, Cynthia A.; Haxton, Terranna; Murray, Regan; Janke, Robert; Taxon, Thomas; Laird, Carl; Seth, Arpan; Hackebeil, Gabriel; McGee, Shawn; Mann, Angelica

    2014-08-01T23:59:59.000Z

    The Water Security Toolkit (WST) is a suite of open source software tools that can be used by water utilities to create response strategies to reduce the impact of contamination in a water distribution network . WST includes hydraulic and water quality modeling software , optimizati on methodologies , and visualization tools to identify: (1) sensor locations to detect contamination, (2) locations in the network in which the contamination was introduced, (3) hydrants to remove contaminated water from the distribution system, (4) locations in the network to inject decontamination agents to inactivate, remove, or destroy contaminants, (5) locations in the network to take grab sample s to help identify the source of contamination and (6) valves to close in order to isolate contaminate d areas of the network. This user manual describes the different components of WST , along w ith examples and case studies. License Notice The Water Security Toolkit (WST) v.1.2 Copyright c 2012 Sandia Corporation. Under the terms of Contract DE-AC04-94AL85000, there is a non-exclusive license for use of this work by or on behalf of the U.S. government. This software is distributed under the Revised BSD License (see below). In addition, WST leverages a variety of third-party software packages, which have separate licensing policies: Acro Revised BSD License argparse Python Software Foundation License Boost Boost Software License Coopr Revised BSD License Coverage BSD License Distribute Python Software Foundation License / Zope Public License EPANET Public Domain EPANET-ERD Revised BSD License EPANET-MSX GNU Lesser General Public License (LGPL) v.3 gcovr Revised BSD License GRASP AT&T Commercial License for noncommercial use; includes randomsample and sideconstraints executable files LZMA SDK Public Domain nose GNU Lesser General Public License (LGPL) v.2.1 ordereddict MIT License pip MIT License PLY BSD License PyEPANET Revised BSD License Pyro MIT License PyUtilib Revised BSD License PyYAML MIT License runpy2 Python Software Foundation License setuptools Python Software Foundation License / Zope Public License six MIT License TinyXML zlib License unittest2 BSD License Utilib Revised BSD License virtualenv MIT License Vol Common Public License vpykit Revised BSD License Additionally, some precompiled WST binary distributions might bundle other third-party executables files: Coliny Revised BSD License (part of Acro project) Dakota GNU Lesser General Public License (LGPL) v.2.1 PICO Revised BSD License (part of Acro project) i Revised BSD License Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of Sandia National Laboratories nor Sandia Corporation nor the names of its con- tributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS %22AS IS%22 AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IM- PLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL SANDIA CORPORATION BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD- ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ii Acknowledgements This work was supported by the U.S. Environmental Protection Agen

  8. International LicensingInternational Licensing and Intellectualand Intellectual

    E-Print Network [OSTI]

    Lansky, Joshua

    " to license:"incentives" to license: Economic Returns EffectEconomic Returns Effect - reduction in risk("Developed country members shall provide incentives . . . for the purpose of . . .shall provide incentives incentives to marketIncrease incentives to market technologiestechnologies #12;In principle, IPRs can have

  9. Cyber Security Evaluation of II&C Technologies

    SciTech Connect (OSTI)

    Ken Thomas

    2014-11-01T23:59:59.000Z

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a cyber security team with expertise in nuclear utility cyber security programs and experience in conducting these evaluations. The evaluation has determined that, for the most part, cyber security will not be a limiting factor in the application of these technologies to nuclear power plant applications.

  10. Microsoft SQL Server 2012 Licensing Guide

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Microsoft SQL Server 2012 Licensing Guide #12;2 Contents Overview......................................................................................................................................................................................................3 SQL Server 2012 Editions ......................................................................................................................................................................4 How SQL Server 2012 Licenses Are Sold

  11. Technologies Available for Licensing | Partnerships | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ORNL Technologies Licensing Guidelines NDA(s) and MTA(s) Sample Agreements Technology Innovation Program Technology Assistance Program Licensing Staff Technology Search Engine...

  12. Dominica Grants Geothermal Exploration and Development License...

    Office of Environmental Management (EM)

    Dominica Grants Geothermal Exploration and Development License to Caribbean Company Dominica Grants Geothermal Exploration and Development License to Caribbean Company July 23,...

  13. Improving Network Reliability: Analysis, Methodology, and Algorithms

    E-Print Network [OSTI]

    Booker, Graham B.

    2010-07-14T23:59:59.000Z

    The reliability of networking and communication systems is vital for the nation's economy and security. Optical and cellular networks have become a critical infrastructure and are indispensable in emergency situations. This dissertation outlines...

  14. Energy Infrastructure Events and Expansions Infrastructure Security...

    Office of Environmental Management (EM)

    Year-in-Review: 2010 Energy Infrastructure Events and Expansions Infrastructure Security and Energy Restoration Office of Electricity Delivery and Energy Reliability U.S....

  15. Solar Hot Water Contractor Licensing

    Broader source: Energy.gov [DOE]

    In order to be eligible for Maine's solar thermal rebate program, systems must be installed by licensed plumbers who have received additional certification for solar thermal systems from the North...

  16. North American Electric Reliability Corporation (NERC): Reliability...

    Office of Environmental Management (EM)

    (NERC): Reliability Considerations from the Integration of Smart Grid North American Electric Reliability Corporation (NERC): Reliability Considerations from the Integration of...

  17. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  18. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14T23:59:59.000Z

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  19. Short-term and long-term reliability studies in the deregulated power systems

    E-Print Network [OSTI]

    Li, Yishan

    2006-04-12T23:59:59.000Z

    for the new structure to maintain system reliability. Power system reliability is comprised of two basic components, adequacy and security. In terms of the time frame, power system reliability can mean short-term reliability or long-term reliability. Short...

  20. Windows Server 2008 R2 Licensing Guide

    E-Print Network [OSTI]

    Narasayya, Vivek

    Windows Server 2008 R2 Licensing Guide m Your Comprehensive Resource for Licensing and Pricing #12;2 Table of Contents Summary 3 Table of Windows Server 2008 R2 Core Product Offerings 3 License Terms ­ Windows Server 2008 R2 Product Line Updates 4 Edition Comparison by Server Role 5 New and Updated Features

  1. Licensed fuel facility status report

    SciTech Connect (OSTI)

    Joy, D.; Brown, C.

    1993-04-01T23:59:59.000Z

    NRC is committed to the periodic publication of licensed fuel facilities inventory difference data, following agency review of the information and completion of any related NRC investigations. Information in this report includes inventory difference data for active fuel fabrication facilities possessing more than one effective kilogram of high enriched uranium, low enriched uranium, plutonium, or uranium-233.

  2. Bandwidth assignment for reliable fixed broadband wireless Grit Claen

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    linear programming (ILP) counterparts. We further propose cutset-based valid inequalities to enhanceBandwidth assignment for reliable fixed broadband wireless networks Grit Claßen Lehrstuhl II f of data routing and bandwidth assignment that minimizes the total renewal fees of licenses. This problem

  3. Combination of Safety and Security Analysis -Finding Security Problems That Threaten The

    E-Print Network [OSTI]

    Boyer, Edmond

    -physical Systems) of the 32nd International Conference on Computer Safety, Reliability and Security, France (2013Combination of Safety and Security Analysis - Finding Security Problems That Threaten The Safety of a System Max Steiner and Peter Liggesmeyer AG Software Engineering: Dependability, TU Kaiserslautern

  4. Security & Defense Licenses Available | Tech Transfer | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking OverEvaluating ' M M

  5. Cyber Security

    Energy Savers [EERE]

    Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Michael Maraya Incident Management Division (IM-32) Rob Ciochon Director Policy,...

  6. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  7. Lessons Learned from Cyber Security Assessments of SCADA and...

    Broader source: Energy.gov (indexed) [DOE]

    Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER...

  8. Assessing Reliability in Energy Supply Systems

    E-Print Network [OSTI]

    McCarthy, Ryan; Ogden, Joan M.; Sperling, Dan

    2008-01-01T23:59:59.000Z

    Physical security Information security Interdepend- enciesagainst threats. Information security: The degree to whichPhysical security Information security Interdependencies

  9. Assessing reliability in energy supply systems

    E-Print Network [OSTI]

    McCarthy, Ryan W.; Ogden, Joan M.; Sperling, Daniel

    2007-01-01T23:59:59.000Z

    Physical security Information security Interdepend- enciesagainst threats. Information security: The degree to whichPhysical security Information security Interdependencies

  10. Los Alamos National Laboratory Express Licensing Requirements

    E-Print Network [OSTI]

    contact Laura Barber at Licensing@lanl.gov. Your company information will be treated as "business sensitive" or "proprietary" and will be handled accordingly. #12;

  11. Battelle Memorial Institute Technologies Available for Licensing...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Fuels Wind Energy Partners (27) Visual Patent Search Success Stories News Events Battelle Memorial Institute Technologies Available for Licensing Battelle is the world's...

  12. Technology available for licensing: CURLS | Argonne National...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Technology available for licensing: CURLS November 21, 2013 Tweet EmailPrint CURLS - the Containment Unidirectional Resource Loading System developed at Argonne - expands the...

  13. This work is licensed under a CREATIVE COMMONS ATTRIBUTION-SHARE ALIKE 3.0 LICENSE

    E-Print Network [OSTI]

    1 This work is licensed under a CREATIVE COMMONS ATTRIBUTION-SHARE ALIKE 3.0 LICENSE (http://creativecommons.org/licenses/by-sa/3.0/) Mario Biagioli Department of the History of Science Harvard University 7/17/2007 EARLY MODERN

  14. Technology Licensing | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening a solidSynthesis of 2D AlloysTrails How To License ORNL

  15. Grid Reliability- An Electric Utility Company's Perspective

    Broader source: Energy.gov [DOE]

    Presentation—given at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meeting—covers Southern Company's business continuity, North American Electric Reliability Corporation (NERC) cybersecurity, and homeland security as well as physical recovery after a major outage, and five questions to ask your local utility.

  16. Certificating Vehicle Public Key with Vehicle Attributes A (periodical) Licensing Routine, Against Man-in-the-Middle

    E-Print Network [OSTI]

    Certificating Vehicle Public Key with Vehicle Attributes A (periodical) Licensing Routine, Against actions among vehicles in traffic by the use of wireless transceivers. Unfortunately, the wireless communication among vehicles is vulnerable to security threats that may lead to very serious safety hazards

  17. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  18. Security Equipment and Systems Certification Program (SESCP)

    SciTech Connect (OSTI)

    Steele, B.J. [Sandia National Labs., Albuquerque, NM (United States); Papier, I.I. [Underwriters Labs., Inc., Northbrook, IL (United States)

    1996-06-20T23:59:59.000Z

    Sandia National Laboratories (SNL) and Underwriters Laboratories, Inc., (UL) have jointly established the Security Equipment and Systems Certification Program (SESCP). The goal of this program is to enhance industrial and national security by providing a nationally recognized method for making informed selection and use decisions when buying security equipment and systems. The SESCP will provide a coordinated structure for private and governmental security standardization review. Members will participate in meetings to identify security problems, develop ad-hoc subcommittees (as needed) to address these identified problems, and to maintain a communications network that encourages a meaningful exchange of ideas. This program will enhance national security by providing improved security equipment and security systems based on consistent, reliable standards and certification programs.

  19. Reliability-Centered Maintenance

    Broader source: Energy.gov [DOE]

    Reliability-centered maintenance leverages the same practices and technologies of predictive maintenance.

  20. SPIDERS JCTD Smart Cyber-Secure Microgrids

    Broader source: Energy.gov [DOE]

    The Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS) Joint Capability Technology Demonstration (JCTD) is a groundbreaking program to bolster the cyber security and energy efficiency of U.S. military installations and transfer the knowhow to non-military critical infrastructure.

  1. Hanau licenses voided by German state court

    SciTech Connect (OSTI)

    Not Available

    1993-09-01T23:59:59.000Z

    On July 21, the Higher Administrative Court in the German state of Hesse declared illegal three of the first four partial construction licenses for the plutonium section of the Siemens fuel fabrication complex at Hanau. The licenses were issued in the late 1980s by the former Christian Democrat administration of Hesse, but final licensing of the plant - now 90 percent complete - has been held up by the Social Democrat/Green Party coalition government that is now in power. The court ruling came as a result of four cases, and a so-called urgent application, initiated by antinuclear groups in the area.

  2. NASA Partners License Nanotube Technology for Commercial Use...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    prnewswire.comnews-releasesnasa-partners-license-nanotube-technology-for-commercial-use-149724205.html Submitted: Tuesday, May...

  3. Argument licensing and agreement in Zulu

    E-Print Network [OSTI]

    Halpert, Claire

    2012-01-01T23:59:59.000Z

    In this thesis, I examine some core grammatical phenomena - case licensing, agreement, the EPP - through the lens of the Bantu language Zulu. Zulu has a number of remarkable and puzzling properties whose analysis affords ...

  4. City of Dubuque- Solar Thermal Licensing Requirement

    Broader source: Energy.gov [DOE]

    The City of Dubuque requires a Solar Thermal License in order for a person to install a solar thermal project on a home or business. The requirement does not apply to solar photovoltaics. The...

  5. AP1000 Design for Security

    SciTech Connect (OSTI)

    Long, L.B. [Southern Nuclear Operating Company, 40 Inverness Center Parkway, Birmingham, AL 35242 (United States); Cummins, W.E.; Winters, J.W. [Westinghouse Electric Company, 4350 Northern Pike, Monroeville, PA 15146 (United States)

    2006-07-01T23:59:59.000Z

    Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000 is less vulnerable to security threats such as malevolent use of vehicles (land, water or air), than are conventional PWRs. Further, the AP1000 is less vulnerable to external events (e.g., loss of transmission) than conventional PWRs. For some of the threats evaluated the AP1000 is comparable to conventional PWRs, while for other threats the AP1000 is inherently less vulnerable. (authors)

  6. Power electronics reliability analysis.

    SciTech Connect (OSTI)

    Smith, Mark A.; Atcitty, Stanley

    2009-12-01T23:59:59.000Z

    This report provides the DOE and industry with a general process for analyzing power electronics reliability. The analysis can help with understanding the main causes of failures, downtime, and cost and how to reduce them. One approach is to collect field maintenance data and use it directly to calculate reliability metrics related to each cause. Another approach is to model the functional structure of the equipment using a fault tree to derive system reliability from component reliability. Analysis of a fictitious device demonstrates the latter process. Optimization can use the resulting baseline model to decide how to improve reliability and/or lower costs. It is recommended that both electric utilities and equipment manufacturers make provisions to collect and share data in order to lay the groundwork for improving reliability into the future. Reliability analysis helps guide reliability improvements in hardware and software technology including condition monitoring and prognostics and health management.

  7. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31T23:59:59.000Z

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  8. License Structure for Multi-Module Facilities

    SciTech Connect (OSTI)

    Thomas Hicks

    2010-08-01T23:59:59.000Z

    The Next Generation Nuclear Plant (NGNP) Project is intended to be the prototype for multi-module commercial high temperature gas reactors (HTGRs) for process heat and/or electricity generation. Part of the objectives of the project are to establish the conditions that would govern or enhance the design, licensing, construction and operation of numerous, modular nuclear plants, particularly suited for industrial applications or that could reduce the risk of such projects. A determination is desired regarding whether a multi-module reactor plant can be licensed with a single Nuclear Regulatory Commission (NRC) review, hearing, and safety evaluation report. If it is determined that a multi-modular reactor plant can be licensed under a single review/hearing process, the structure and the duration of the license for each module will also need to be determined. The purpose of this paper is to describe for the NRC the NGNP position on these two issues and obtain either NRC general concurrence or comments on the approach to these issues. While the current NGNP planning provides for only a single reactor module, the project is intended to provide the basis and establish a licensing framework that can be used by future commercial HTGRs and other reactor designs, including a variety of small modular reactor technologies, with configurations reflecting design standardization of multi-module plants. Therefore, it is important to identify a path for addressing these modular reactor plant issues so that the resolution can be factored into the NGNP Project planning. The NGNP position is that a single combined license (COL) application can be submitted for a multi-modular reactor facility, the COL application can undergo a single NRC review/hearing process, and each module should be issued a separate license.

  9. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  10. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  11. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24T23:59:59.000Z

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  12. Securing against fraud in mobile communications : system design and development in 3G mobile networks

    E-Print Network [OSTI]

    Mochizuki, Yujiro, 1973-

    2006-01-01T23:59:59.000Z

    Network security ensures the consistency, integrity, and reliability of telecommunications systems. Authorized network access prevents fraudulent communications and maintains the availability of the systems. However, limited ...

  13. Northwest Regional Technology Center, April 2013 Page 1 of 2 Around The Region In Homeland Security

    E-Print Network [OSTI]

    Office of Electricity Delivery & Energy Reliability · Samara Moore, National Security Staff; Director, Snohomish County PUD · Mike Hamilton, CISO, City of Seattle · Philip Jones, WUTC and President, NARUC · Lt

  14. Security Oriented e-Infrastructures Supporting Neurological Research and Clinical Trials

    E-Print Network [OSTI]

    Stell, A.J.

    Stell,A.J. Sinnott,R.O. Ajayi,O. 2nd International Conference on Availability, Reliability and Security, (ARESâ??07), Vienna, Austria, April, 2007.

  15. Software Security Rules, SDLC Perspective

    E-Print Network [OSTI]

    Banerjee, C

    2009-01-01T23:59:59.000Z

    Software has become an integral part of everyday life. Everyday, millions of people perform transaction through internet, ATM, mobile phone, they send email and Egreetings, and use word processing and spreadsheet for various purpose. People use software bearing in mind that it is reliable and can be trust upon and the operation they perform is secured. Now, if these software have exploitable security hole then how can they be safe for use. Security brings value to software in terms of peoples trust. The value provided by secure software is of vital importance because many critical functions are entirely dependent on the software. That is why security is a serious topic which should be given proper attention during the entire SDLC, right from the beginning. For the proper implementation of security in the software, twenty one security rules are proposed in this paper along with validation results. It is found that by applying these rules as per given implementation mechanism, most of the vulnerabilities are el...

  16. Kirkland gets license in hot Philippines area

    SciTech Connect (OSTI)

    Kirkland, A.S.

    1992-08-03T23:59:59.000Z

    This paper reports that Kirkland As, Oslo, has received a geophysical survey and exploration contract (GSEC) in a sizzling exploration and development theater off the Philippines. The license covers about 6,000 sq miles of undisputed waters, with depths mostly less than 300 ft, and lies in the Reed Bank area off Northwest Palawan Island, where several major oil and gas strikes have been made recently. Kirkland has 1 year in which to carry out its seismic work commitment. The terms of the GSEC then give an option to drill one well in a 6 month period. Once the results have been analyzed, the company can either drill another well or enter into a service contract for the license. Kirkland has a 65% share in the license, with the remainder split between Philippine companies Philodrill Corp., Beguet Mining Corp. subsidiary Petrofields, and Seafront Resources Corp. The Philippines is one of Kirkland's main areas of activity, the Kirkland Commercial Manager Ralph Baxter.

  17. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  18. Re-Dispatching Generation to Increase Power System Security Margin and Support Low Voltage Bus

    E-Print Network [OSTI]

    dynamic stability, power system reliability, power system scheduling, power system security, power transmission control, power transmission reliability I . INTRODUCTION Power system stability problems cause many stability problems. Between the power system generation pattern and the load pattern

  19. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    nuclear power plant in 1975 illustrated the need for increased research into safety system reliability during abnormal events such as fire. Months prior to the incident, the US...

  20. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  1. Transportation Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

  2. Open Science: Open source licenses in scientific research 

    E-Print Network [OSTI]

    Guadamuz, Andres

    2006-01-01T23:59:59.000Z

    The article examines the validity of OSS (open source software) licenses for scientific, as opposed to creative works. It draws on examples of OSS licenses to consider their suitability for the scientific community and ...

  3. Medical Aspects of Reliability

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05T23:59:59.000Z

    This presentation covers the medical evaluation as part of a human reliability program, particularly the various medical qualifications and potential disqualifiers.

  4. Lifetime and Reliability

    Broader source: Energy.gov [DOE]

    A DOE Solid-State Lighting Program technology fact sheet on lifetime, reliability, and failure as related to LED-based products.

  5. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08T23:59:59.000Z

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  6. Social License and Environment Protection: Why Businesses Go Beyond Compliance

    E-Print Network [OSTI]

    Gunningham, Neil; Kagan, Robert A.; Thornton, Dorothy

    2002-01-01T23:59:59.000Z

    financial analysts -- the economic license does not encourage a firm to invest in very costly environmental measures or technologies

  7. Security Specialist

    Broader source: Energy.gov [DOE]

    The position is located in the Office of Environmental Management (EM),Office of Safeguards, Security and Emergency Preparedness (EM-44). The mission of EM-44 is to develop and oversee the...

  8. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  9. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  10. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20T23:59:59.000Z

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  11. Hawaii electric system reliability.

    SciTech Connect (OSTI)

    Silva Monroy, Cesar Augusto; Loose, Verne William

    2012-09-01T23:59:59.000Z

    This report addresses Hawaii electric system reliability issues; greater emphasis is placed on short-term reliability but resource adequacy is reviewed in reference to electric consumers' views of reliability %E2%80%9Cworth%E2%80%9D and the reserve capacity required to deliver that value. The report begins with a description of the Hawaii electric system to the extent permitted by publicly available data. Electrical engineering literature in the area of electric reliability is researched and briefly reviewed. North American Electric Reliability Corporation standards and measures for generation and transmission are reviewed and identified as to their appropriateness for various portions of the electric grid and for application in Hawaii. Analysis of frequency data supplied by the State of Hawaii Public Utilities Commission is presented together with comparison and contrast of performance of each of the systems for two years, 2010 and 2011. Literature tracing the development of reliability economics is reviewed and referenced. A method is explained for integrating system cost with outage cost to determine the optimal resource adequacy given customers' views of the value contributed by reliable electric supply. The report concludes with findings and recommendations for reliability in the State of Hawaii.

  12. Medical Device Reliability BIOMATERIALS

    E-Print Network [OSTI]

    NEMI Medical Electronics team to address short- and long-term reliability issues with medical devices. OurMedical Device Reliability BIOMATERIALS Our goal is to provide medical device manufacturers, and consistency of active implantable medical devices. These devices, including pacemakers, cardiac defibrillators

  13. SUMMARY OF AVC/H.264 LICENSE TERMS1 The AVC Patent Portfolio License is divided into two principal parts (see Diagram): (a)

    E-Print Network [OSTI]

    Rodriguez, Carlos

    SUMMARY OF AVC/H.264 LICENSE TERMS1 The AVC Patent Portfolio License is divided into two principal and may not be relied upon for any purpose. The AVC Patent Portfolio License provides the actual terms of license on which users may rely. 2 Sections 2.1 and 2.6 of the AVC Patent Portfolio License 3 Sections 2

  14. Taxation and Social Security

    E-Print Network [OSTI]

    Kaplow, Louis

    2006-01-01T23:59:59.000Z

    Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

  15. Security and Elections

    E-Print Network [OSTI]

    Bishop, Matt; Peisert, Sean

    2012-01-01T23:59:59.000Z

    World Conf. Information Security Education, 2007, pp. 17–24;Security andElections IEEE Security & Privacy, 10(5):64–67, Sept. -

  16. CAMPUS SECURITY REPORT 2009

    E-Print Network [OSTI]

    CAMPUS SECURITY REPORT 2009 San Francisco State University University Police Department 1600 & Procedure Concerning Security, Access & Maintenance of Campus Facilities & Weapons Policies........................................................... 6 g. Safety & Security

  17. Licensing plan for UMTRA project disposal sites. Final [report

    SciTech Connect (OSTI)

    Not Available

    1993-09-01T23:59:59.000Z

    The Uranium Mill Tailings Remedial Action (UMTRA) Project Office developed a plan to define UMTRA Project licensing program objectives and establish a process enabling the DOE to document completion of remedial actions in compliance with 40 CFR 1 92 and the requirements of the NRC general license. This document supersedes the January 1987 Project Licensing Plan (DOE, 1987). The plan summarizes the legislative and regulatory basis for licensing, identifies participating agencies and their roles and responsibilities, defines key activities and milestones in the licensing process, and details the coordination of these activities. This plan provides an overview of the UMTRA Project from the end of remedial actions through the NRC`s acceptance of a disposal site under the general license. The licensing process integrates large phases of the UMTRA Project. Other programmatic UMTRA Project documents listed in Section 6.0 provide supporting information.

  18. SUBMITTED TO IEEE TRANSACTIONS ON POWER SYSTEMS, FEBRUARY 2002 1 Quantifying Transmission Reliability Margin

    E-Print Network [OSTI]

    SUBMITTED TO IEEE TRANSACTIONS ON POWER SYSTEMS, FEBRUARY 2002 1 Quantifying Transmission, power transmission reliability, power system security, power system availability I. Introduction Bulk power transfer capability computations have many uses in electric power system operation and planning

  19. Photovoltaic system reliability

    SciTech Connect (OSTI)

    Maish, A.B.; Atcitty, C. [Sandia National Labs., NM (United States); Greenberg, D. [Ascension Technology, Inc., Lincoln Center, MA (United States)] [and others

    1997-10-01T23:59:59.000Z

    This paper discusses the reliability of several photovoltaic projects including SMUD`s PV Pioneer project, various projects monitored by Ascension Technology, and the Colorado Parks project. System times-to-failure range from 1 to 16 years, and maintenance costs range from 1 to 16 cents per kilowatt-hour. Factors contributing to the reliability of these systems are discussed, and practices are recommended that can be applied to future projects. This paper also discusses the methodology used to collect and analyze PV system reliability data.

  20. Reliable solar: powering communities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Scienceand Requirements Recently ApprovedReliability Technology earns award ReliabilityReliable

  1. Inspection report: the Department of Energy's export licensing process for dual-use and munitions commodities

    SciTech Connect (OSTI)

    Friedman, Gregory H.

    1999-05-01T23:59:59.000Z

    Export of commodities, encouraged by both the private sector and the Federal Government, helps to improve our position in the global economy and is in the national interest of the US. However, exports of commodities or technologies, without regard to whether they may significantly contribute to the military potential of individual countries or combination of countries or enhance the proliferation of weapons of mass destruction, may adversely affect the national security of the US. The Federal Government, therefore, implements several laws, Executive Orders, and regulations to control the export of certain commodities and technologies. These commodities and technologies require a license for export. Some of the controlled items are designated as ''dual-use,'' that is, commodities and technologies that have both civilian and military application. Some dual-use commodities are designated as ''nuclear dual-use''--items controlled for nuclear nonproliferation purposes. Another group of controlled commodities is designated as munitions, which are goods and technologies that have solely military uses. The Department of Energy (Energy) conducts reviews of export license applications for nuclear dual-use items and certain munitions. On August 26, 1998, the Chairman of the Senate Committee on Governmental Affairs requested that the Inspectors General from the Departments of Commerce, Defense, Energy, State, and Treasury, and the Central Intelligence Agency (CIA), update and expand on a 1993 interagency review conducted by the Inspectors General of the Departments of Commerce, Defense, Energy, and State of the export licensing processes for dual-use and munitions commodities.

  2. A systems-theoretic security model for large scale, complex systems applied to the US air transportation system

    E-Print Network [OSTI]

    Laracy, Joseph R. (Joseph Raymond)

    2007-01-01T23:59:59.000Z

    Classical risk-based or game-theoretic security models rely on assumptions from reliability theory and rational expectations economics that are not applicable to security threats. Additionally, these models suffer from ...

  3. Reliability and Safety

    Broader source: Energy.gov [DOE]

    DOE solar reliability and safety research and development (R&D) focuses on testing photovoltaic (PV) modules, inverters, and systems for long-term performance, and helping investors, consumers,...

  4. Reliability Standards Owner

    Broader source: Energy.gov [DOE]

    This position is located in the Internal Operations and Asset Management group of Planning and Asset Management (TP). A successful candidate in this position will serve as the Reliability Standards...

  5. Tag: Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Tag: Security Displaying 1 - 6 of 6... Category: Security Sheltering in Place If you are advised to shelter-in-place by local news or our website, please follow these...

  6. NRC antitrust licensing actions, 1978--1996

    SciTech Connect (OSTI)

    Mayer, S.J.; Simpson, J.J.

    1997-09-01T23:59:59.000Z

    NUREG-0447, Antitrust Review of Nuclear Power Plants, was published in May 1978 and includes a compilation and discussion of U.S. Nuclear Regulatory Commission (NRC) proceedings and activity involving the NRC`s competitive review program through February 1978, NUREG-0447 is an update of an earlier discussion of the NRC`s antitrust review of nuclear power plants, NR-AIG-001, The US Nuclear Regulatory Commission`s Antitrust Review of Nuclear Power Plants: The Conditioning of Licenses, which reviewed the Commission`s antitrust review function from its inception in December 1970 through April 1976. This report summarizes the support provided to NRC staff in updating the compilation of the NRC`s antitrust licensing review activities for commercial nuclear power plants that have occurred since February 1978. 4 refs., 4 tabs.

  7. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29T23:59:59.000Z

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  8. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  9. Security Rulemaking

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergy SmallImplementingSecurity SymposiumSecuring the Nation's509Department2

  10. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  11. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  12. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FROM: SUBJECT: USIUK Memorandum of Understanding between National Nuclear Security Administration's (NNSA) Associate Administrator for Defense Nuclear Security (AADNS)...

  13. Gearbox Reliability Collaborative Update (Presentation)

    SciTech Connect (OSTI)

    Sheng, S.

    2013-10-01T23:59:59.000Z

    This presentation was given at the Sandia Reliability Workshop in August 2013 and provides information on current statistics, a status update, next steps, and other reliability research and development activities related to the Gearbox Reliability Collaborative.

  14. Sandia Energy - PV Systems Reliability

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Systems Reliability Home Stationary Power Energy Conversion Efficiency Solar Energy Photovoltaics PV Systems Reliability PV Systems ReliabilityCoryne Tasca2015-05-08T03:40:54+00:00...

  15. Review of Quantitative Software Reliability Methods

    SciTech Connect (OSTI)

    Chu, T.L.; Yue, M.; Martinez-Guridi, M.; Lehner, J.

    2010-09-17T23:59:59.000Z

    The current U.S. Nuclear Regulatory Commission (NRC) licensing process for digital systems rests on deterministic engineering criteria. In its 1995 probabilistic risk assessment (PRA) policy statement, the Commission encouraged the use of PRA technology in all regulatory matters to the extent supported by the state-of-the-art in PRA methods and data. Although many activities have been completed in the area of risk-informed regulation, the risk-informed analysis process for digital systems has not yet been satisfactorily developed. Since digital instrumentation and control (I&C) systems are expected to play an increasingly important role in nuclear power plant (NPP) safety, the NRC established a digital system research plan that defines a coherent set of research programs to support its regulatory needs. One of the research programs included in the NRC's digital system research plan addresses risk assessment methods and data for digital systems. Digital I&C systems have some unique characteristics, such as using software, and may have different failure causes and/or modes than analog I&C systems; hence, their incorporation into NPP PRAs entails special challenges. The objective of the NRC's digital system risk research is to identify and develop methods, analytical tools, and regulatory guidance for (1) including models of digital systems into NPP PRAs, and (2) using information on the risks of digital systems to support the NRC's risk-informed licensing and oversight activities. For several years, Brookhaven National Laboratory (BNL) has worked on NRC projects to investigate methods and tools for the probabilistic modeling of digital systems, as documented mainly in NUREG/CR-6962 and NUREG/CR-6997. However, the scope of this research principally focused on hardware failures, with limited reviews of software failure experience and software reliability methods. NRC also sponsored research at the Ohio State University investigating the modeling of digital systems using dynamic PRA methods. These efforts, documented in NUREG/CR-6901, NUREG/CR-6942, and NUREG/CR-6985, included a functional representation of the system's software but did not explicitly address failure modes caused by software defects or by inadequate design requirements. An important identified research need is to establish a commonly accepted basis for incorporating the behavior of software into digital I&C system reliability models for use in PRAs. To address this need, BNL is exploring the inclusion of software failures into the reliability models of digital I&C systems, such that their contribution to the risk of the associated NPP can be assessed.

  16. Quantifying transmission reliability margin J. Zhang, I. Dobson*, F.L. Alvarado

    E-Print Network [OSTI]

    Dobson, Ian

    , it is likely that the power system will remain secure despite the uncertainty. The transmission reliability uses in electric power system operation and planning. In the operation of bilateral markets, available capability can be used to assess power system security when local power sources are replaced by imported

  17. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  18. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29T23:59:59.000Z

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Admin Chg 2, dated 5-15-15, cancels Admin Chg 1.

  19. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18T23:59:59.000Z

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  20. Photovoltaic module reliability workshop

    SciTech Connect (OSTI)

    Mrig, L. (ed.)

    1990-01-01T23:59:59.000Z

    The paper and presentations compiled in this volume form the Proceedings of the fourth in a series of Workshops sponsored by Solar Energy Research Institute (SERI/DOE) under the general theme of photovoltaic module reliability during the period 1986--1990. The reliability Photo Voltaic (PV) modules/systems is exceedingly important along with the initial cost and efficiency of modules if the PV technology has to make a major impact in the power generation market, and for it to compete with the conventional electricity producing technologies. The reliability of photovoltaic modules has progressed significantly in the last few years as evidenced by warranties available on commercial modules of as long as 12 years. However, there is still need for substantial research and testing required to improve module field reliability to levels of 30 years or more. Several small groups of researchers are involved in this research, development, and monitoring activity around the world. In the US, PV manufacturers, DOE laboratories, electric utilities and others are engaged in the photovoltaic reliability research and testing. This group of researchers and others interested in this field were brought together under SERI/DOE sponsorship to exchange the technical knowledge and field experience as related to current information in this important field. The papers presented here reflect this effort.

  1. NEXT GENERATION NUCLEAR PLANT LICENSING BASIS EVENT SELECTION WHITE PAPER

    SciTech Connect (OSTI)

    Mark Holbrook

    2010-09-01T23:59:59.000Z

    The Next Generation Nuclear Plant (NGNP) will be a licensed commercial high temperature gas-cooled reactor (HTGR) plant capable of producing the electricity and high temperature process heat for industrial markets supporting a range of end-user applications. The NGNP Project has adopted the 10 CFR 52 Combined License (COL) application process, as recommended in the Report to Congress, dated August 2008, as the foundation for the NGNP licensing strategy. NRC licensing of the NGNP plant utilizing this process will demonstrate the efficacy of licensing future HTGRs for commercial industrial applications. This white paper is one in a series of submittals that will address key generic issues of the COL priority licensing topics as part of the process for establishing HTGR regulatory requirements.

  2. Secure Communication in the Low-SNR Regime: A Characterization of the Energy-Secrecy Tradeoff

    E-Print Network [OSTI]

    Gursoy, Mustafa Cenk

    Secure Communication in the Low-SNR Regime: A Characterization of the Energy-Secrecy Tradeoff required for secure and reliable communications, and the wideband slope. Increased bit energy requirements to security issues, another pivotal concern in most wireless systems is energy-efficient operation especially

  3. SEIF: Secure and Efficient Intrusion-Fault tolerant routing protocol for wireless sensor networks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 SEIF: Secure and Efficient Intrusion-Fault tolerant routing protocol for wireless sensor networks Informatique Algiers, Algeria Email: lnoureddine4@gmail.com Abstract--In wireless sensor networks, reliability network, Security, Intrusion tolerance, Fault tolerance, Secure routing. I. INTRODUCTION Wireless Sensor

  4. September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage

    E-Print Network [OSTI]

    September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage and True Random Number Storage via PUFs - Main Idea - Reliability - Randomness -- InstantiationsInstantiations 3. True Random, including side channel resistance ° Trusted security policy routines ° Secure and authentic key storage

  5. Security Games for Vehicular Networks Tansu Alpcan, Member, IEEE, and Sonja Buchegger, Member, IEEE

    E-Print Network [OSTI]

    Chen, Ing-Ray

    . The effectiveness of the security game solutions is evaluated numerically using realistic simulation data obtainedSecurity Games for Vehicular Networks Tansu Alpcan, Member, IEEE, and Sonja Buchegger, Member, IEEE Abstract--Vehicular networks (VANETs) can be used to improve transportation security, reliability

  6. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  7. ISSAT 2012 KCoverage Reliability Evaluation K-COVERAGE RELIABILITY EVALUATION

    E-Print Network [OSTI]

    Xing, Liudong

    #12;7/20/2012 ISSAT 2012 KCoverage Reliability Evaluation forWSNs 2 Introduction Wireless sensor;7/20/2012 ISSAT 2012 KCoverage Reliability Evaluation forWSNs 7 Model 13 Consider a set of sensor nodes (SN7/20/2012 ISSAT 2012 KCoverage Reliability Evaluation forWSNs 1 K-COVERAGE RELIABILITY EVALUATION

  8. Adaptive Infrastructures Toward a Secure and

    E-Print Network [OSTI]

    Amin, S. Massoud

    concept important to the Electric Power Grid and Energy Infrastructure? ­ A secure "architected" sensing of computer, communication, sensing and control technology which operates in parallel with an electric power grid for the purpose of enhancing the reliability of electric power delivery, minimizing the cost

  9. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  10. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  11. Security Procedures Caltech Campus Security Dispatch

    E-Print Network [OSTI]

    Goddard III, William A.

    Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: · Remain calm · Notify Campus Security Dispatch · Do NOT move victim EARTHQUAKE When

  12. Security rules versus Security properties Mathieu Jaume

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Security rules versus Security properties Mathieu Jaume SPI ­ LIP6 ­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

  13. Title 18 CFR 4 Licenses, Permits, Exemptions, and Determination...

    Open Energy Info (EERE)

    Title 18 CFR 4 Licenses, Permits, Exemptions, and Determination of Project Costs Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document-...

  14. FERC Handbook for Hydroelectric Project Licensing and 5 MW Exemptions...

    Open Energy Info (EERE)

    GuidanceGuideHandbook Abstract This handbook outlines the requirements for hydropower licenses issued by the Federal Energy Regulatory Commission. Author Federal Energy...

  15. Vermont Permit and License Information: NPDES Stormwater General...

    Open Energy Info (EERE)

    SitesLegal Abstract Permit and licensing information for Clean Water Act 304 National Pollution Discharge Elimination System (NPDES) Permits for general construction. Published NA...

  16. FERC Hydropower Licensing and Endangered Species - A Guide for...

    Open Energy Info (EERE)

    Energy Regulatory Commission. 2001. FERC Hydropower Licensing and Endangered Species - A Guide for Applicants, Contractors, and Staff. Federal Energy Regulatory Commission....

  17. Guidelines to Consider for Participating in the Alternative Licensing...

    Open Energy Info (EERE)

    Guidelines to Consider for Participating in the Alternative Licensing Process Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance -...

  18. Argonne announces new licensing agreement with AKHAN Semiconductor...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Argonne announces new licensing agreement with AKHAN Semiconductor By Jared Sagoff * November 19, 2014 Tweet EmailPrint ARGONNE, Ill. - The U.S. Department of Energy's (DOE)...

  19. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Energy Savers [EERE]

    92: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

  20. Using Operational Security (OPSEC) to Support a Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  1. V-186: Drupal Login Security Module Security Bypass and Denial...

    Office of Environmental Management (EM)

    186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability June...

  2. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  3. Microgrids and Heterogeneous Security, Quality, Reliability, andAvailability

    SciTech Connect (OSTI)

    Marnay, Chris

    2007-01-31T23:59:59.000Z

    This paper describes two stylized alternative visions inpopular currencyof how the power system might evolve to meet futurerequirements for the high quality electricity service that modern digitaleconomies demand, a supergrids paradigm and a dispersed paradigm. Some ofthe economics of the dispersed vision are explored. Economic perspectivesare presented on both the choice of homogeneous universal power qualityupstream in the electricity supply, and also on the extremelyheterogeneous require-ments of end-use loads. Finally, the potential roleof microgrids in delivering heterogeneous power quality is demonstratedby reference to two ongoing microgrid tests in the U.S. andJapan.

  4. Office of Electricity Delivery and Energy Reliability Cyber Security...

    Energy Savers [EERE]

    the Nation's Energy Infrastructure from Cyber Attacks Working to Achieve Cybersecurity in the Energy Sector Roadmap to Achieve Energy Delivery Systems Cybersecurity - 2011...

  5. Secure, Reliable and Dynamic Access to Distributed Clinical Data

    E-Print Network [OSTI]

    Glasgow, University of

    or settles, as to compose differing opinions, or reconciles, as reconciles contending factions. 15. COMPUTES

  6. Office of Electricity Delivery and Energy Reliability Cyber Security

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction toManagementOPAM PolicyOf Environmental Management MajorElectricity

  7. Reliability, Safety, and Security in Everyday Embedded Systems

    E-Print Network [OSTI]

    Koopman, Philip

    lives. From automobiles to elevators, kitchen appliances to televisions, and water heaters to cell. A domestic hot water heater that overheats water, causing scalding burns on a child. A thermostat that doesn't turn on heat when needed, causing household water pipes to freeze and burst. A microwave oven

  8. Reliability of Electrical Interconnects (Presentation)

    SciTech Connect (OSTI)

    Devoto, D.

    2014-06-01T23:59:59.000Z

    This presentation discusses the status of NREL's research on the reliability of electrical interconnects.

  9. Empirical Bayes Estimation of Reliability

    E-Print Network [OSTI]

    Pensky, Marianna

    types of equipment relies on statistical inference about char- acteristics of reliabilityEmpirical Bayes Estimation of Reliability Introduction Assessment of the reliability of various such as reliability function, mean lifetime of the devices, or failure rate. Gen- eral techniques of statistical

  10. Sandia Energy - Installation Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Installation Energy Security Home Stationary Power Grid Modernization Resilient Electric Infrastructures Military Installation Energy Security Installation Energy SecurityTara...

  11. Land Use License | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal Pwer Plant Jump to: navigation,working-groupsIllinois:LakeIowa:LambdaNew York:Texas:LicenseLegal

  12. NRC Licensing Strategy Development for the NGNP

    SciTech Connect (OSTI)

    Mark R. Holbrook; Trevor Cook

    2008-09-01T23:59:59.000Z

    The Next Generation Nuclear Plant (NGNP) project will provide the basis for commercialization of a new generation of advanced nuclear plants that utilize hightemperature gas-cooled reactor (HTGR) technology. The inherently safe HTGR design characteristics can be utilized to supply high-temperature process heat, co-generated electricity, and/or hydrogen for a number of industrial applications (e.g., petrochemical processes). Completion of the NGNP will result in a facility that demonstrates the safety and economics of the design, the commercial industrial potential of the technology, and the viability of the licensing strategy.

  13. FERC Licensing Processes Matrix | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand JumpConceptual Model,DOEHazelPennsylvania: EnergyExolis Energy JumpFAC 04-08 JumpLicensing Processes

  14. Property:FERC License | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:Ezfeedflag Jump to: navigation, search Property Name Ezfeedflag Property Type BooleanLicense

  15. TTWG Licensing Guide | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCOSystems Analysis Success Stories Systems AnalysisTESTIMONYTTWG Licensing

  16. Technologies Available for Licensing | Partnerships | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening a solidSynthesis of 2D AlloysTrails NewsTechnology Licensing How

  17. Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System

    E-Print Network [OSTI]

    Ling, Amy Poh Ai; 10.5121/ijgca.2011.2201

    2011-01-01T23:59:59.000Z

    This paper describes the background of smart information infrastructure and the needs for smart grid information security. It introduces the conceptual analysis to the methodology with the application of hermeneutic circle and information security functional requirement identification. Information security for the grid market cover matters includes automation and communications industry that affects the operation of electric power systems and the functioning of the utilities that manage them and its awareness of this information infrastructure has become critical to the reliability of the power system. Community benefits from of cost savings, flexibility and deployment along with the establishment of wireless communications. However, concern revolves around the security protections for easily accessible devices such as the smart meter and the related communications hardware. On the other hand, the changing points between traditional versus smart grid networking trend and the information security importance on...

  18. Licensing Support Network: An Electronic Discovery System

    SciTech Connect (OSTI)

    Gil, A. V.; Jensen, D.; McKinnon, B.

    2002-02-26T23:59:59.000Z

    The necessary authorization for the U. S. Department of Energy's (DOE) Office of Civilian Radioactive Waste Management (OCRWM) to submit a License Application (LA) is contingent upon the policy process defined in the Nuclear Waste Policy Act, as amended (NWPA), with some steps yet to occur. In spite of this uncertainty, the DOE must take prudent and appropriate action now, and over the next several years, to prepare for submittal of an application and to facilitate the U. S. Nuclear Regulatory Commission (NRC) review of this application, if the Yucca Mountain site is recommended and approved for repository development. One of these steps the DOE has taken involves working with the NRC's Advisory Review Panel to develop Licensing Support Network (LSN) requirements and guidelines. The NRC has made a prototype of the LSN web page available at www.LSNNET.gov. The OCRWM part of the LSN currently has an indefinite life cycle and may need to remain in existence until the repository is closed, which could be as long as 325 years.

  19. CUNY EXPORT CONTROL PROCEDURES 12. Licensed Software Programs

    E-Print Network [OSTI]

    Rosen, Jay

    CUNY EXPORT CONTROL PROCEDURES 12. Licensed Software Programs This section addresses the export control implications of licensing a software product that has been identified as "export controlled as "export controlled." In such cases and for purposes of understanding access implications for CUNY

  20. Technology Available for Licensing Office of Technology Management

    E-Print Network [OSTI]

    Lee, Dongwon

    Technology Available for Licensing Office of Technology Management The Pennsylvania State University 113 Technology Center, University Park, PA 16802 814.865.6277 phone; 814.865.3591 fax Contact: Matthew D. Smith Sr. Technology Licensing Officer The Pennsylvania State University Phone: (814) 863

  1. Patent License for OpenSSL 1. Definitions

    E-Print Network [OSTI]

    Rogaway, Phillip

    Patent License for OpenSSL 1. Definitions 1.1 "Licensor" means Phillip Rogaway. orOne Shields Avenue, Davis, CA 95616-8562. 1.2 "Licensed Patents" means any patent that claims priority to United States Patent Application No. 09/918,615 entitled "Method and Apparatus for Facilitating Efficient

  2. Power electronics reliability.

    SciTech Connect (OSTI)

    Kaplar, Robert James; Brock, Reinhard C.; Marinella, Matthew; King, Michael Patrick; Stanley, James K.; Smith, Mark A.; Atcitty, Stanley

    2010-10-01T23:59:59.000Z

    The project's goals are: (1) use experiments and modeling to investigate and characterize stress-related failure modes of post-silicon power electronic (PE) devices such as silicon carbide (SiC) and gallium nitride (GaN) switches; and (2) seek opportunities for condition monitoring (CM) and prognostics and health management (PHM) to further enhance the reliability of power electronics devices and equipment. CM - detect anomalies and diagnose problems that require maintenance. PHM - track damage growth, predict time to failure, and manage subsequent maintenance and operations in such a way to optimize overall system utility against cost. The benefits of CM/PHM are: (1) operate power conversion systems in ways that will preclude predicted failures; (2) reduce unscheduled downtime and thereby reduce costs; and (3) pioneering reliability in SiC and GaN.

  3. Security Perimeter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook TwitterSearch-Comments Sign InNuclear SecurityUnder Budget

  4. Safety, Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Scienceand Requirements RecentlyElectronicResourcesjobsJuly throughR EMaterialsSafety, Security

  5. Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms AboutRESEARCHHydrosilylationComputer Security All JLF

  6. Assessing reliability in energy supply systems

    E-Print Network [OSTI]

    McCarthy, Ryan W.; Ogden, Joan M.; Sperling, Daniel

    2007-01-01T23:59:59.000Z

    H. , 2004. Energy infrastructure and security. Annual Reviewdisruption, and energy security – valued by a total of 15History Consequences Energy security Economic Import levels

  7. Assessing Reliability in Energy Supply Systems

    E-Print Network [OSTI]

    McCarthy, Ryan; Ogden, Joan M.; Sperling, Dan

    2008-01-01T23:59:59.000Z

    H. , 2004. Energy infrastructure and security. Annual Reviewdisruption, and energy security – valued by a total of 15History Consequences Energy security Economic Import levels

  8. Reliable computation Peter Gacs

    E-Print Network [OSTI]

    Gacs, Peter

    of compressors 28 4.6. Exercises 30 5. The reliable storage problem 32 5.1. Clocked circuits 32 5.2. Storage 34 5.1. Cables 21 4.2. Compressors 23 4.3. Propagating safety 25 4.4. Endgame 26 4.5. The construction.3. Error-correcting codes 35 5.4. Refreshers 39 5.5. Exercises 48 6. Problems 49 7. Historical remarks 51

  9. Non-exclusive License: AGMT-XXXX U.S. DEPARTMENT OF ENERGY NATIONAL...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for the computation of any royalty fees payable under this License, and shall render to LICENSOR annually, within thirty days of the anniversary date of this License, an...

  10. Exclusive License: AGMT-XXXX U.S. DEPARTMENT OF ENERGY NATIONAL...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for the computation of any royalty fees payable under this License, and shall render to LICENSOR annually, within thirty days of the anniversary date of this License, an...

  11. CAMPUS SECURITY CARD REQUISITION

    E-Print Network [OSTI]

    CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

  12. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01T23:59:59.000Z

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  13. My RESEARCH INTERESTS concentrate on: Design and implementation of novel cyber-physical systems with an enhanced functionality, security and

    E-Print Network [OSTI]

    Reznik, Leon

    . Melton and L. Reznik GPU-Based Simulation of Spiking Neural Networks with Real-Time Performance and High with an enhanced functionality, security and reliability and built upon sensor and control network platforms and reliability to security and safety Example : Integral quality evaluation procedures in cyber-physical systems

  14. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power Administration would likeConstitution4Customer-Comments Sign In About |Cyber SecurityCyber

  15. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25T23:59:59.000Z

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  16. Security & Privacy | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...

  17. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  18. Testing for PV Reliability (Presentation)

    SciTech Connect (OSTI)

    Kurtz, S.; Bansal, S.

    2014-09-01T23:59:59.000Z

    The DOE SUNSHOT workshop is seeking input from the community about PV reliability and how the DOE might address gaps in understanding. This presentation describes the types of testing that are needed for PV reliability and introduces a discussion to identify gaps in our understanding of PV reliability testing.

  19. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

  20. Security Policies Dr. Ahmad Almulhem

    E-Print Network [OSTI]

    Almulhem, Ahmad

    Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

  1. Managing power system security and optimization

    SciTech Connect (OSTI)

    O'Grady, M.J. (Potomac Electric Power Co., Washington, DC (United States)); Briggs, W.T.; Stadlin, W.O.

    1994-10-01T23:59:59.000Z

    Power system control objectives of energy management systems (EMSs) are well defined and understood: reliability, security, and optimization. However, the approaches to achieving these objectives have often resulted in disjointed solutions and poor acceptance by system operators. This article describes how the new PEPCO EMS provides unique system-wide (generation, transmission, distribution) security and optimization strategies via a coordinated suite of real-time closed-loop control functions. System operators played a key role in defining the application features and user interfaces, ensuring correct operating practices.

  2. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  3. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16T23:59:59.000Z

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  4. Office of Security Assistance

    Broader source: Energy.gov [DOE]

    The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

  5. The Data and Application Security and Privacy (DASPY) Challenge

    E-Print Network [OSTI]

    Sandhu, Ravi

    Computer security Information security = Computer security + Communications security Information Computer security Information security = Computer security + Communications security Information Cyber security (defensive) goals have evolved Computer security Information security = Computer

  6. MasteringWeb Services Security MasteringWeb Services Security

    E-Print Network [OSTI]

    Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

  7. Technology available for license: Charging of liquid energy storage...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Technology available for license: Charging of liquid energy storage media through radiolysis (ANL-IN-14-036) January 23, 2015 Tweet EmailPrint This technology utilizes radiolysis...

  8. George Mason University Licensed as of 03/2013

    E-Print Network [OSTI]

    /27/2013 2:07:58PM Standard License 4imprint Inc. (49210) PO Box 320 Oshkosh, WI 54903-0320 Mr. John Lord Non-Wool Headwear) Product Categories Advanced Graphic Products dba Advanced-Online (58410) 750

  9. Vertimass licenses ORNL biofuel-to-hydrocarbon conversion technology...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    McCorkle Communications and Media Relations 865.574.7308 Vertimass licenses ORNL biofuel-to-hydrocarbon conversion technology Vertimass LLC, a California-based start-up...

  10. LICENSE HISTORY MO.8 Petrolite Corporation, St. Louis

    Office of Legacy Management (LM)

    et al Multiple. . 70-621, 12-15-61, SNM license for 0.5 kg. of U-235, 93% enriched as a fuel loading and star-up curce for Webster Groves, Missouri reactor. l Discussion:...

  11. Abstract--This paper reports a method to evaluate composite power system reliability indices incorporating the voltage

    E-Print Network [OSTI]

    3 Abstract--This paper reports a method to evaluate composite power system reliability indices power flow (OPF) computation algorithm, considering the steady state voltage stability margin constraint In the deregulated power systems, reliability evaluation encompassing the system security features has come

  12. INTERNAL HAZARDS ANALYSIS FOR LICENSE APPLICATION

    SciTech Connect (OSTI)

    R.J. Garrett

    2005-02-17T23:59:59.000Z

    The purpose of this internal hazards analysis is to identify and document the internal hazards and potential initiating events associated with preclosure operations of the repository at Yucca Mountain. Internal hazards are those hazards presented by the operation of the facility and by its associated processes that can potentially lead to a radioactive release or cause a radiological hazard. In contrast to external hazards, internal hazards do not involve natural phenomena and external man-made hazards. This internal hazards analysis was performed in support of the preclosure safety analysis and the License Application for the Yucca Mountain Project. The methodology for this analysis provides a systematic means to identify internal hazards and potential initiating events that may result in a radiological hazard or radiological release during the repository preclosure period. These hazards are documented in tables of potential internal hazards and potential initiating events (Section 6.6) for input to the repository event sequence categorization process. The results of this analysis will undergo further screening and analysis based on the criteria that apply to the performance of event sequence analyses for the repository preclosure period. The evolving design of the repository will be re-evaluated periodically to ensure that internal hazards that have not been previously evaluated are identified.

  13. Notwithstanding our concerns for reliability, the Energy Commission supports efforts to reduce the impacts of once-through cooling on marine and estuarine

    E-Print Network [OSTI]

    cooling towers and half of the projects under licensing review at the Energy Commission are using recycled#12;2 Notwithstanding our concerns for reliability, the Energy Commission supports efforts for improving environmental quality in the aquatic ecosystems along our coastline. In our 2005 Integrated Energy

  14. Document: P1312 Category: Nanotechnology, Physical Science Applications License Status: Available for licensing Texas Industry Cluster: Energy

    E-Print Network [OSTI]

    Lightsey, Glenn

    : Available for licensing Texas Industry Cluster: Energy Scalable methods of producing three-dimensional nanocomposites for energy, semiconductor, and advanced manufacturing applications Problem Currently, the production of nanoparticles and nanostructured films is difficult, because nanoparticles are hard to produce

  15. Real Time Grid Reliability Management 2005

    SciTech Connect (OSTI)

    Eto, Joe; Eto, Joe; Lesieutre, Bernard; Lewis, Nancy Jo; Parashar, Manu

    2008-07-07T23:59:59.000Z

    The increased need to manage California?s electricity grid in real time is a result of the ongoing transition from a system operated by vertically-integrated utilities serving native loads to one operated by an independent system operator supporting competitive energy markets. During this transition period, the traditional approach to reliability management -- construction of new transmission lines -- has not been pursued due to unresolved issues related to the financing and recovery of transmission project costs. In the absence of investments in new transmission infrastructure, the best strategy for managing reliability is to equip system operators with better real-time information about actual operating margins so that they can better understand and manage the risk of operating closer to the edge. A companion strategy is to address known deficiencies in offline modeling tools that are needed to ground the use of improved real-time tools. This project: (1) developed and conducted first-ever demonstrations of two prototype real-time software tools for voltage security assessment and phasor monitoring; and (2) prepared a scoping study on improving load and generator response models. Additional funding through two separate subsequent work authorizations has already been provided to build upon the work initiated in this project.

  16. Managing Secure Survivable Critical Infrastructures To Avoid Vulnerabilities Frederick Sheldon, Tom Potok, Andy Loebl

    E-Print Network [OSTI]

    Krings, Axel W.

    Managing Secure Survivable Critical Infrastructures To Avoid Vulnerabilities Frederick Sheldon, Tom technologically complex society makes knowing the vulnerability of such systems essential to improving their intrinsic reliability/survivability. Our discussion employs the power transmission grid. 1 Introduction

  17. Grid Infrastructures for Secure Access to and Use of Bioinformatics Data: Experiences from the BRIDGES Project

    E-Print Network [OSTI]

    Sinnott, R.O.

    Sinnott,R.O. Stell,A.J. Bayer,M.M. Koetsier,J. The First International Conference on Availability, Reliability and Security (ARES-2006), Vienna, Austria, April, 2006.

  18. Evaluation of power system security and development of transmission pricing method

    E-Print Network [OSTI]

    Kim, Hyungchul

    2004-11-15T23:59:59.000Z

    classifier is also proposed. This method can be useful for system operators to make security decisions during on-line power system operation. This dissertation also suggests an approach for allocating transmission transaction costs based on reliability...

  19. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  20. Sandia National Laboratories: Climate Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MonitoringClimate Security Climate Security Climate Security Global reductions in greenhouse gases will eventually be motivated by an international climate treaty and will entail...

  1. Sandia National Laboratories: Inverter Reliability

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in Hosted by Sandia National Laboratories and the Electric Power Research Institute (EPRI) Inverter reliability drives project life cycle costs and plant performance. This...

  2. Sandia National Laboratories: Component Reliability

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in Hosted by Sandia National Laboratories and the Electric Power Research Institute (EPRI) Inverter reliability drives project life cycle costs and plant performance. This...

  3. Sandia National Laboratories: PV Reliability

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Reliability Sandia Research on PV Arc-Fault Detection Submitted for US Patent On March 4, 2015, in Computational Modeling & Simulation, Energy, Facilities, News, News & Events,...

  4. Connecting to Purdue's License Server for ENVI and IDL The license server for IDL and ENVI is: wppapplm01.itap.purdue.edu. The port number is 1700.

    E-Print Network [OSTI]

    Connecting to Purdue's License Server for ENVI and IDL The license server for IDL and ENVI is this information in the environment variables for your computer so that ENVI or IDL can find the license server for the older server with a Variable Value named 1700@wpvappkey01.purdue.edu, change this value to 1700@wppapplm

  5. SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS

    E-Print Network [OSTI]

    SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

  6. Campus Security Report 1 Campus seCurity

    E-Print Network [OSTI]

    Wilmers, Chris

    Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

  7. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  8. Applying New Network Security Technologies to SCADA Systems.

    SciTech Connect (OSTI)

    Hurd, Steven A.; Stamp, Jason E. [Sandia National Laboratories, Albuquerque, NM] [Sandia National Laboratories, Albuquerque, NM; Duggan, David P. [Sandia National Laboratories, Albuquerque, NM] [Sandia National Laboratories, Albuquerque, NM; Chavez, Adrian R. [Sandia National Laboratories, Albuquerque, NM] [Sandia National Laboratories, Albuquerque, NM

    2006-11-01T23:59:59.000Z

    Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure %22traditional%22 IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators. 4This page intentionally left blank.

  9. RELIABILITY OF CAPACITOR CHARGING UNITS

    E-Print Network [OSTI]

    Sprott, Julien Clinton

    experience little change while those using the electronic cutoff would drift due to ageing components and changing parameters. The first few shots using the electronic cutoff were less reliable than subsequentRELIABILITY OF CAPACITOR CHARGING UNITS Clint Sprott July 30, 1965 University of Wisconsin

  10. ANNUAL SECURITY FIRE SAFETY REPORT

    E-Print Network [OSTI]

    ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http://www.dartmouth.edu/~security/ #12;1 Table of Contents MESSAGE FROM THE DIRECTOR OF SAFETY AND SECURITY................................................................................................................................................................... 7 ANNUAL SECURITY REPORT

  11. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01T23:59:59.000Z

    of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.www.greenpacks.org • Energy Security & Climate Change:

  12. Photovoltaic performance and reliability workshop

    SciTech Connect (OSTI)

    Mrig, L. [ed.

    1993-12-01T23:59:59.000Z

    This workshop was the sixth in a series of workshops sponsored by NREL/DOE under the general subject of photovoltaic testing and reliability during the period 1986--1993. PV performance and PV reliability are at least as important as PV cost, if not more. In the US, PV manufacturers, DOE laboratories, electric utilities, and others are engaged in the photovoltaic reliability research and testing. This group of researchers and others interested in the field were brought together to exchange the technical knowledge and field experience as related to current information in this evolving field of PV reliability. The papers presented here reflect this effort since the last workshop held in September, 1992. The topics covered include: cell and module characterization, module and system testing, durability and reliability, system field experience, and standards and codes.

  13. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  14. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  15. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    for process that controls interactions between users and resources. · Access control system implements Information Security Group Agenda · Access control basics · ACLs and capabilities · Information flow policies· Information flow policies · Bell-LaPadula Model · Role-Based Access Control · Resources 3 Information Security

  16. TOWARD HIGHLY SECURE AND AUTONOMIC COMPUTING SYSTEMS: A HIERARCHICAL APPROACH

    SciTech Connect (OSTI)

    Lee, Hsien-Hsin S

    2010-05-11T23:59:59.000Z

    The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniques and system software for achieving a robust, secure, and reliable computing system toward our goal.

  17. Supervisory Control Strategies for Enhancing System Security and Privacy Christoforos N. Hadjicostis

    E-Print Network [OSTI]

    Hadjicostis, Christoforos

    cyber-infrastructures (ranging from defense and banking to health care and power distribution sys- temsSupervisory Control Strategies for Enhancing System Security and Privacy Christoforos N. Hadjicostis Abstract-- Enhancing the security and reliability of auto- mated systems that control vital

  18. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01T23:59:59.000Z

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  19. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  20. STRICTLY CONFIDENTIAL AND PROPRIETARY. DO NOT CIRCULATE WITHOUT WRITEN PERMISSION. THIS IS NOT AN INVESTMENT OR SECURITIES OFFERING.

    E-Print Network [OSTI]

    OTEC Symposium September 9, 2013 #12;Company Sponsor - The Abell Foundation · Endowed charitable.OTECI.com #12;3 OTEC International LLC · Legacy of 40 years, dedicated OTEC R&D ­ License of Anderson technology OTEC reliability · Over 15 issued and pending patents filed on proprietary innovations · Independent

  1. Use of a hybrid technology in a critical security system.

    SciTech Connect (OSTI)

    Trujillo, David J.

    2010-10-01T23:59:59.000Z

    Assigning an acceptable level of power reliability in a security system environment requires a methodical approach to design when considering the alternatives tied to the reliability and life of the system. The downtime for a piece of equipment, be it for failure, routine maintenance, replacement, or refurbishment or connection of new equipment is a major factor in determining the reliability of the overall system. In addition to these factors is the condition where the system is static or dynamic in its growth. Most highly reliable security power source systems are supplied by utility power with uninterruptable power source (UPS) and generator backup. The combination of UPS and generator backup with a reliable utility typically provides full compliance to security requirements. In the energy market and from government agencies, there is growing pressure to utilize alternative sources of energy other than fossil fuel to increase the number of local generating systems to reduce dependence on remote generating stations and cut down on carbon effects to the environment. There are also conditions where a security system may be limited on functionality due to lack of utility power in remote locations. One alternative energy source is a renewable energy hybrid system including a photovoltaic or solar system with battery bank and backup generator set. This is a viable source of energy in the residential and commercial markets where energy management schemes can be incorporated and systems are monitored and maintained regularly. But, the reliability of this source could be considered diminished when considering the security system environment where stringent uptime requirements are required.

  2. Use of a hybrid technology in a critical security system.

    SciTech Connect (OSTI)

    Scharmer, Carol; Trujillo, David J.

    2010-08-01T23:59:59.000Z

    Assigning an acceptable level of power reliability in a security system environment requires a methodical approach to design when considering the alternatives tied to the reliability and life of the system. The downtime for a piece of equipment, be it for failure, routine maintenance, replacement, or refurbishment or connection of new equipment is a major factor in determining the reliability of the overall system. In addition to these factors is the condition where the system is static or dynamic in its growth. Most highly reliable security power source systems are supplied by utility power with uninterruptable power source (UPS) and generator backup. The combination of UPS and generator backup with a reliable utility typically provides full compliance to security requirements. In the energy market and from government agencies, there is growing pressure to utilize alternative sources of energy other than fossil fuel to increase the number of local generating systems to reduce dependence on remote generating stations and cut down on carbon effects to the environment. There are also conditions where a security system may be limited on functionality due to lack of utility power in remote locations. One alternative energy source is a renewable energy hybrid system including a photovoltaic or solar system with battery bank and backup generator set. This is a viable source of energy in the residential and commercial markets where energy management schemes can be incorporated and systems are monitored and maintained regularly. But, the reliability of this source could be considered diminished when considering the security system environment where stringent uptime requirements are required.

  3. License Stewardship Approach to Commercial Nuclear Power Plant Decommissioning

    SciTech Connect (OSTI)

    Daly, P.T.; Hlopak, W.J. [Commercial Services Group, EnergySolutions 1009 Commerce Park, Oak Ridge, TN (United States)

    2008-07-01T23:59:59.000Z

    The paper explores both the conceptual approach to decommissioning commercial nuclear facilities using a license stewardship approach as well as the first commercial application of this approach. The license stewardship approach involves a decommissioning company taking control of a site and the 10 CFR 50 License in order to complete the work utilizing the established trust fund. In conclusion: The license stewardship approach is a novel way to approach the decommissioning of a retired nuclear power plant that offers several key advantages to all parties. For the owner and regulators, it provides assurance that the station will be decommissioned in a safe, timely manner. Ratepayers are assured that the work will be completed for the price they already have paid, with the decommissioning contractor assuming the financial risk of decommissioning. The contractor gains control of the assets and liabilities, the license, and the decommissioning fund. This enables the decommissioning contractor to control their work and eliminates redundant layers of management, while bringing more focus on achieving the desired end state - a restored site. (authors)

  4. SECURITY AND FIRE SAFETY

    E-Print Network [OSTI]

    Barrash, Warren

    ANNUAL SECURITY AND FIRE SAFETY REPORT 2014 #12;2 Boise State University 2014 Annual Security and Fire Safety Report From the Vice President for Campus Operations and General Counsel At Boise State University, we are committed to providing a safe and secure environment for students, staff

  5. UNIVERSITY POLICE ANNUAL SECURITY

    E-Print Network [OSTI]

    Kulp, Mark

    UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

  6. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

  7. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  8. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  9. EPC RFID Tag Security Weaknesses and Defenses: Passport Cards, Enhanced Drivers Licenses, and Beyond

    E-Print Network [OSTI]

    Matsuoka, Yoky

    , Washington, USA balkan@cs.washington.edu Tadayoshi Kohno University of Washington Seattle, Washington, USA of 2008, incorporates an EPC tag. This identity document was is- sued in response to the Western

  10. Y-12 licenses Omni Jaw 5(tm) | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City,EnrichedSupplemental DirectivesWork Scheduleslicenses Omni Jaw

  11. Omni Jaw 5(tm) licensed, headed to market | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)IntegratedSpeeding access toTest and Evaluation | NationalNovember 11,OilSelfTechOmni

  12. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05T23:59:59.000Z

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  13. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2014-10-15T23:59:59.000Z

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  14. A new secure process for steganography: CI2 Stego-security and topological-security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A new secure process for steganography: CI2 Stego-security and topological-security Nicolas Friot1- formation hiding security fields. We show that the proposed scheme is stego-secure, which is the highest level of security in a well defined and studied category of attack called "watermark-only attack

  15. Radioisotope thermoelectric generator licensed hardware package and certification tests

    SciTech Connect (OSTI)

    Goldmann, L.H.; Averette, H.S. [Westinghouse Hanford Company, P.O. Box 1970, M/S R3-86 or N1-32, Richland, Washington 99352 (United States)

    1995-01-20T23:59:59.000Z

    This paper presents the Licensed Hardware package and the Certification Test portions of the Radioisitope Themoelectric Generator Transportation System. This package has been designed to meet those portions of the {ital Code} {ital of} {ital Federal} {ital Regulations} (10 CFR 71) relating to ``Type B`` shipments of radioactive materials. The licensed hardware is now in the U. S. Department of Energy licensing process that certifies the packaging`s integrity under accident conditions. The detailed information for the anticipated license is presented in the safety analysis report for packaging, which is now in process and undergoing necessary reviews. As part of the licensing process, a full-size Certification Test Article unit, which has modifications slightly different than the Licensed Hardware or production shipping units, is used for testing. Dimensional checks of the Certification Test Article were made at the manufacturing facility. Leak testing and drop testing were done at the 300 Area of the U.S. Department of Energy`s Hanford Site near Richland, Washington. The hardware includes independent double containments to prevent the environmental spread of {sup 238}Pu, impact limiting devices to protect portions of the package from impacts, and thermal insulation to protect the seal areas from excess heat during accident conditions. The package also features electronic feed-throughs to monitor the Radioisotope Thermoelectric Generator`s temperature inside the containment during the shipment cycle. This package is designed to safely dissipate the typical 4,500 thermal watts produced in the largest Radioisotope Thermoelectric Generators. The package also contains provisions to ensure leak tightness when radioactive materials, such as a Radioisotope Thermoelectric Generator for the Cassini Mission, planned for 1997 by the National Aeronautics and Space Administration, are being prepared for shipment. (Abstract Truncated)

  16. Secure Code Distribution in Dynamically Programmable Wireless Sensor Networks

    E-Print Network [OSTI]

    Han, Richard Y.

    amount of overhead to a conventional non-secure reprogramming scheme, namely Deluge, and are therefore. For example, the Deluge code propagation protocol [12] implements a three phase Advertise-Request- Data polite is necessary is transmitted. Deluge benefits from a soft state design in that, as data is reliably flooded hop

  17. A Reliable Fault-Tolerant Scheduling Algorithm for Real Time Embedded Systems

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    /EWICS Workshop on Dependable Embedded and Cyber-physical Systems) of the 32nd International Conference on Computer Safety, Reliability and Security, Toulouse : France (2013)" #12;2 Chafik Arar, Hamoudi Kalla, Salim Kalla, and Hocine Riadh Scheduling algorithm architecture specification distribution constraints

  18. NNSA PRISM Center for Prediction of Reliability, Integrity and Survivability of Microsystems

    E-Print Network [OSTI]

    Ginzel, Matthew

    NNSA PRISM Center for Prediction of Reliability, Integrity and Survivability of Microsystems NEED Mexico will collaborate in PRISM. Purdue is one of five centers funded under NNSA's Predictive Science Nuclear Security Administration (NNSA) $4.2 million in matching funds from Purdue and its partners

  19. A Scalable Approach for Reliable Downstream Data Delivery in Wireless Sensor Networks

    E-Print Network [OSTI]

    Sivakumar, Raghupathy

    based simulations, we evaluate the proposed framework. Categories and Subject Descriptors C.2 the spe- cific application the sensor network is used for. Consider a security application where imageA Scalable Approach for Reliable Downstream Data Delivery in Wireless Sensor Networks Seung

  20. Photovoltaics performance and reliability workshop

    SciTech Connect (OSTI)

    Mrig, L. (ed.) [ed.

    1992-01-01T23:59:59.000Z

    This document consists of papers and viewgraphs compiled from the proceedings of a workshop held in September 1992. This workshop was the fifth in a series sponsored by NREL/DOE under the general subject areas of photovoltaic module testing and reliability. PV manufacturers, DOE laboratories, electric utilities and others exchanged technical knowledge and field experience. The topics of cell and module characterization, module and system performance, materials and module durability/reliability research, solar radiation, and applications are discussed.

  1. Photovoltaics performance and reliability workshop

    SciTech Connect (OSTI)

    Mrig, L. [ed.] [ed.

    1992-11-01T23:59:59.000Z

    This document consists of papers and viewgraphs compiled from the proceedings of a workshop held in September 1992. This workshop was the fifth in a series sponsored by NREL/DOE under the general subject areas of photovoltaic module testing and reliability. PV manufacturers, DOE laboratories, electric utilities and others exchanged technical knowledge and field experience. The topics of cell and module characterization, module and system performance, materials and module durability/reliability research, solar radiation, and applications are discussed.

  2. Information SecurityInformation Security--Applications andApplications and

    E-Print Network [OSTI]

    Ahmed, Farid

    Information SecurityInformation Security-- Applications andApplications and Techniques about? InformationInformation SecuritySecurity Information SecurityInformation Security What?What? Why of Information SecuritySecurity Network SecurityNetwork Security PGP, SSL,PGP, SSL, IPsecIPsec Data Security

  3. New York: EERE-Supported Catalyst Licensed for Use in Fuel Cell...

    Office of Environmental Management (EM)

    Supported Catalyst Licensed for Use in Fuel Cell Hybrid Advanced Vehicles New York: EERE-Supported Catalyst Licensed for Use in Fuel Cell Hybrid Advanced Vehicles January 24, 2014...

  4. The use for frequency-consequence curves in future reactor licensing

    E-Print Network [OSTI]

    Debesse, Laurčne

    2007-01-01T23:59:59.000Z

    The licensing of nuclear power plants has focused until now on Light Water Reactors and has not incorporated systematically insights and benefits from Probabilistic Risk Assessment (PRA). With the goal of making the licensing ...

  5. Securing Internet Routing Securing Internet Routing

    E-Print Network [OSTI]

    Goldberg, Sharon

    Plane (Routing protocols): S h b d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths between nodes [Kent Lynn Seo 00] Listen-Whisper, etc., Data Plane: · Given d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths

  6. Constructing Reliable Distributed Communication Systems with CORBA

    E-Print Network [OSTI]

    Schmidt, Douglas C.

    Constructing Reliable Distributed Communication Systems with CORBA Silvano Maffeis Douglas C model to support reliable data- and process- oriented distributed systems that communicate through syn distributed object computing systems with CORBA. First, we examine the question of whether reliable applica

  7. SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013)

    E-Print Network [OSTI]

    2013-01-01T23:59:59.000Z

    SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013) Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.819 SPECIAL ISSUE PAPER Integrating security mechanisms, must be protected against security threats. Due to the security and also resource constraint concerns

  8. Using Security and Domain ontologies for Security Requirements Analysis

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Using Security and Domain ontologies for Security Requirements Analysis Amina Souag, Camille.Mouratidis@uel.ac.uk Abstract-- Recent research has argued about the importance of considering security during Requirements that security being a multi-faceted problem, a single security ontology is not enough to guide SR Engineering

  9. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  10. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  11. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  12. Decision Tree for Export Control License Is the article subject to export control regulations?

    E-Print Network [OSTI]

    Hutcheon, James M.

    Decision Tree for Export Control License Is the article subject to export control regulations if further export review is required. Yes Yes Yes Yes No No No No No export requirements Obtain export license No export requirements Obtain export license #12;

  13. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01T23:59:59.000Z

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  14. CUNY EXPORT CONTROL PROCEDURES 5. Licenses and export authorizations

    E-Print Network [OSTI]

    Rosen, Jay

    CUNY EXPORT CONTROL PROCEDURES 5. Licenses and export authorizations This Section addresses how, ITAR items of any kind must not be exported, nor accessed by a non-U.S. person, without proper required depends on the type of export transaction subject to control; for example, temporary versus

  15. Wave Energy Development in Oregon Licensing & Permitting Requirements

    E-Print Network [OSTI]

    July 09 Wave Energy Development in Oregon Licensing & Permitting Requirements Prepared by Pacific Energy Ventures on behalf of the Oregon Wave Energy Trust w w w . o r e g o n w a v e . o r g #12;This study was commissioned by Oregon Wave Energy Trust. Oregon Wave Energy Trust is funded by the Oregon

  16. Choosing intellectual protection: imitation, patent strength and licensing

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Choosing intellectual protection: imitation, patent strength and licensing David Encaoua and Yassine Lefouili March 22, 2006 (revised version) Abstract Patents are probabilistic rights. We set up a multi-stage model in which choosing between patent and trade secrecy is a¤ected by three parameters

  17. License renewal demonstration program: NRC observations and lessons learned

    SciTech Connect (OSTI)

    Prato, R.J.; Kuo, P.T.; Newberry, S.F.

    1996-12-01T23:59:59.000Z

    This report summarizes the Nuclear Regulatory Commission staff`s observations and lessons learned from the five License Renewal Demonstration Program (LRDP) site visits performed by the staff from March 25, 1996, through August 16, 1996. The LRDP was a Nuclear Energy Institute (NEI) program intended to assess the effectiveness of the guidance provided by NEI 95-10, Revision 0, {open_quotes}Industry Guideline for Implementing the Requirements of 10 CFR Part 54 - The License Renewal Rule,{close_quotes} to implement the requirements of Title 10 of the Code of Federal Regulations, Part 54 (10 CFR Part 54), {open_quotes}Requirements for Renewal of Operating Licenses for Nuclear Power Plants.{close_quotes} In general, NEI 95-10 appeared to contain the basic guidance needed for scoping, screening, identifying aging effects, developing aging management programs, and performing time-limited aging analyses. However, inconsistent implementation of this guidance in some areas was an indication that clarification of existing guidance and/or the inclusion-of some new guidance may be needed for applicants to develop a license renewal program that is consistent with the intent of the rule.

  18. Distributed Reliable Object-Oriented Programming (DROOP)

    E-Print Network [OSTI]

    Guerraoui, Rachid

    Distributed Reliable Object-Oriented Programming (DROOP) P. Eugster November 3, 2003 Abstract with such failures, coining the term Distributed Reliable Object-Oriented Programming (DROOP). 1 SCOOP

  19. Thermoelectric Materials By Design: Mechanical Reliability (Agreement...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    By Design: Mechanical Reliability (Agreement 14957) Thermoelectric Materials By Design: Mechanical Reliability (Agreement 14957) Presentation from the U.S. DOE Office of Vehicle...

  20. PEEM Thermal Stress and Reliability (Presentation)

    SciTech Connect (OSTI)

    O'Keefe, M. P.

    2007-11-08T23:59:59.000Z

    Advancing power electronics thermal stress and reliability is a critical factor in power electronics equipment. NREL aims to improve thermal stress and reliability of power electronics technologies.

  1. Distributed Generation Operational Reliability and Availability...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Reliability and Availability Database, Final Report, January 2004 Distributed Generation Operational Reliability and Availability Database, Final Report, January 2004 This final...

  2. Recommendations to Address Power Reliability Concerns Raised...

    Energy Savers [EERE]

    Reliability Concerns Raised as a Result of Pending Environmental Regulations for Electric Generation Stations Recommendations to Address Power Reliability Concerns Raised as a...

  3. Sandia National Laboratories: photovoltaic plant reliability

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    photovoltaic plant reliability Sandia-Electric Power Research Institute Partnership Publishes Photovoltaic Reliability Report On January 21, 2014, in Energy, Facilities, Grid...

  4. Sandia National Laboratories: national reliability database

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    national reliability database Third Annual Continuous Reliability Enhancement for Wind (CREW) Database Report Now Available On October 17, 2013, in Energy, News, News & Events,...

  5. Smart Grid Investments Improve Grid Reliability, Resilience,...

    Office of Environmental Management (EM)

    Investments Improve Grid Reliability, Resilience, and Storm Responses (November 2014) Smart Grid Investments Improve Grid Reliability, Resilience, and Storm Responses (November...

  6. Enhance your Cyber Security Knowledge

    E-Print Network [OSTI]

    Enhance your Cyber Security Knowledge About NPS CS FUNDAMENTALS: Create a strong foundational by increasing the effectiveness of the armed forces of the United States and its allies. Cyber Security-4015 About CISR #12;Cyber Security Adversarial Techniques Cyber Security Defense Cyber Security Fundamentals

  7. Annual Security Report October 2013

    E-Print Network [OSTI]

    Goddard III, William A.

    1 Annual Security Report October 2013 Mission Statement The Campus Security and Parking Services Department ("Security") exists to provide a secure and welcoming research, educational, and work environment in which security concerns are balanced with freedom of movement in an open campus atmosphere while

  8. Dumb Ideas in Computer Security

    E-Print Network [OSTI]

    Dumb Ideas in Computer Security Dr Charles P Pfleeger Pfleeger Consulting Group 19 July 2011 chuck Security" (2005) http://www.ranum.com/security/computer_security/editorials/dumb/ Default permit Ideas in Computer Security 219 Jul 2011 #12;Struck a Nerve Results 1-10 of about 2,030,000 for dumb

  9. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    Computer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security Information Technology 15 Security Testing and Metrics 17 Validation Programs and Laboratory Accreditation 17

  10. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  11. Energy Security Initiatives Update

    Broader source: Energy.gov [DOE]

    Presentation—given at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meeting—lists Federal government energy security initiatives.

  12. TEC Information Security

    Broader source: Energy.gov (indexed) [DOE]

    External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

  13. Personnel Security Specialist

    Broader source: Energy.gov [DOE]

    The Office of the Associate Under Secretary for Environment, Health, Safety, and Security (AU) which provides corporate leadership and strategic approaches for protecting DOEs workers, the public,...

  14. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08T23:59:59.000Z

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  15. Hazardous Material Security (Maryland)

    Broader source: Energy.gov [DOE]

    All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

  16. National Nuclear Security Administration

    Broader source: Energy.gov (indexed) [DOE]

    and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area...

  17. Document: L1334 | Category: Physical Science, Materials License Status: Available for licensing || Texas Industry Cluster: Biotechnology and Life Sciences

    E-Print Network [OSTI]

    Lightsey, Glenn

    for licensing || Texas Industry Cluster: Biotechnology and Life Sciences Nanocomposite membranes for energy. These markets include hydrogen production, medical devices, advanced materials, and drug delivery. Development Engineering, The University of Texas at Austin OTC Contact Brian Cummings, Associate Director, Life Sciences

  18. Some Physics And System Issues In The Security Analysis Of Quantum Key Distribution Protocols

    E-Print Network [OSTI]

    Horace P. Yuen

    2014-05-07T23:59:59.000Z

    In this paper we review a number of issues on the security of quantum key distribution (QKD) protocols that bear directly on the relevant physics or mathematical representation of the QKD cryptosystem. It is shown that the cryptosystem representation itself may miss out many possible attacks which are not accounted for in the security analysis and proofs. Hence the final security claims drawn from such analysis are not reliable, apart from foundational issues about the security criteria that are discussed elsewhere. The cases of continuous-variable QKD and multi-photon sources are elaborated upon.

  19. National Center for Nuclear Security - NCNS

    SciTech Connect (OSTI)

    None

    2014-11-12T23:59:59.000Z

    As the United States embarks on a new era of nuclear arms control, the tools for treaty verification must be accurate and reliable, and must work at stand-off distances. The National Center for Nuclear Security, or NCNS, at the Nevada National Security Site, is poised to become the proving ground for these technologies. The center is a unique test bed for non-proliferation and arms control treaty verification technologies. The NNSS is an ideal location for these kinds of activities because of its multiple environments; its cadre of experienced nuclear personnel, and the artifacts of atmospheric and underground nuclear weapons explosions. The NCNS will provide future treaty negotiators with solid data on verification and inspection regimes and a realistic environment in which future treaty verification specialists can be trained. Work on warhead monitoring at the NCNS will also support future arms reduction treaties.

  20. National Center for Nuclear Security - NCNS

    ScienceCinema (OSTI)

    None

    2015-01-09T23:59:59.000Z

    As the United States embarks on a new era of nuclear arms control, the tools for treaty verification must be accurate and reliable, and must work at stand-off distances. The National Center for Nuclear Security, or NCNS, at the Nevada National Security Site, is poised to become the proving ground for these technologies. The center is a unique test bed for non-proliferation and arms control treaty verification technologies. The NNSS is an ideal location for these kinds of activities because of its multiple environments; its cadre of experienced nuclear personnel, and the artifacts of atmospheric and underground nuclear weapons explosions. The NCNS will provide future treaty negotiators with solid data on verification and inspection regimes and a realistic environment in which future treaty verification specialists can be trained. Work on warhead monitoring at the NCNS will also support future arms reduction treaties.

  1. Office of Departmental Personnel Security

    Broader source: Energy.gov [DOE]

    The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

  2. UC SECURITY FRAMEWORK 2011 -2012

    E-Print Network [OSTI]

    Hickman, Mark

    1 UC SECURITY FRAMEWORK 2011 - 2012 #12;2 Contents Background..................................................................................................................................4 About UC Security & Campus Community Support .................................................................5 Security Service Authority and Relationship with NZ Police and Emergency Services ...........5

  3. The security of machine learning

    E-Print Network [OSTI]

    Barreno, Marco; Nelson, Blaine; Joseph, Anthony D.; Tygar, J. D.

    2010-01-01T23:59:59.000Z

    of the IEEE symposium on security and privacy (pp. 188–201).and communications security (CCS) (pp. 59–68). Globerson,detection. In USENIX security symposium. Klimt, B. , & Yang,

  4. January 2005 INTEGRATING IT SECURITY

    E-Print Network [OSTI]

    January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS By Joan S. Hash, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Introduction To assist federal agencies with effec tively integrating security

  5. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08T23:59:59.000Z

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  6. Ris-R-1235(EN) Reliability Databases

    E-Print Network [OSTI]

    .1 ISO standard: Gas and Oil - Collection of Reliability and Maintenance Data for Equipment 17 5.2 EDF standard for collection of reliability and maintenance data for equipment (also called MCD ­ Mode et Cause judgements on new equipment reliability parameters or using standard values or standard reliability models (e

  7. The design of a reliable reputation system

    E-Print Network [OSTI]

    Swamynathan, Gayatri; Almeroth, Kevin C.; Zhao, Ben Y.

    2010-01-01T23:59:59.000Z

    reliability by spreading its transactions evenly across all 20 peers in the system (shown by Distribution

  8. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  9. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01T23:59:59.000Z

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  10. Social Networking? Secure Networking?

    E-Print Network [OSTI]

    Chapman, Michael S.

    Social Networking? Secure Networking? Teaching & Learning Technology Roundtable February 2010 #12 ­ The intent behind the current security measures in place at OHSU ­ The OHSU Social Networking Guidelines 2. To begin a campus wide dialogue exploring the changing world of online social networking and it

  11. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19T23:59:59.000Z

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  12. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29T23:59:59.000Z

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

  13. December 2007 SECURING EXTERNAL

    E-Print Network [OSTI]

    devices such as desktop and laptop computers, personal digital assistants (PDAs), and cell phones. These teleworkers use devices such as desktop and laptop computers, personal digital assistants (PDAs), and cellDecember 2007 SECURING EXTERNAL COMPUTERS AND OTHER DEVICES USED BY TELEWORKERS SECURING EXTERNAL

  14. Global Material Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City, Arizona,SiteNational Nuclear SecuritySecurity

  15. Investing in the Energy Future: An Industry Guide to Licensing Technologies at the National Renewable Energy Laboratory (NREL) (Brochure)

    SciTech Connect (OSTI)

    Not Available

    2010-09-01T23:59:59.000Z

    Provides an overview of NREL's licensing opportunities and processes, and commercialization programs.

  16. Photovoltaic performance and reliability workshop

    SciTech Connect (OSTI)

    Kroposki, B.

    1996-10-01T23:59:59.000Z

    This proceedings is the compilation of papers presented at the ninth PV Performance and Reliability Workshop held at the Sheraton Denver West Hotel on September 4--6, 1996. This years workshop included presentations from 25 speakers and had over 100 attendees. All of the presentations that were given are included in this proceedings. Topics of the papers included: defining service lifetime and developing models for PV module lifetime; examining and determining failure and degradation mechanisms in PV modules; combining IEEE/IEC/UL testing procedures; AC module performance and reliability testing; inverter reliability/qualification testing; standardization of utility interconnect requirements for PV systems; need activities to separate variables by testing individual components of PV systems (e.g. cells, modules, batteries, inverters,charge controllers) for individual reliability and then test them in actual system configurations; more results reported from field experience on modules, inverters, batteries, and charge controllers from field deployed PV systems; and system certification and standardized testing for stand-alone and grid-tied systems.

  17. Wind turbine reliability database update.

    SciTech Connect (OSTI)

    Peters, Valerie A.; Hill, Roger Ray; Stinebaugh, Jennifer A.; Veers, Paul S.

    2009-03-01T23:59:59.000Z

    This report documents the status of the Sandia National Laboratories' Wind Plant Reliability Database. Included in this report are updates on the form and contents of the Database, which stems from a fivestep process of data partnerships, data definition and transfer, data formatting and normalization, analysis, and reporting. Selected observations are also reported.

  18. FIELD RELIABILITY OF ELECTRONIC SYSTEMS

    E-Print Network [OSTI]

    study of in-the-field experience of electronics reliability. Tage Elm. Abstract. This report and internally) induced failures. The report is not meant to be merely an indication of the state of the art for the re- liability prediction methods we know, but also as a contribution to the investigation of man-machine

  19. Army Energy Security and Independence

    Broader source: Energy.gov (indexed) [DOE]

    ARMY ENERGY SECURITY AND INDEPENDENCE Leadership Ownership Partnership 19 NOV 2008 Don Juhasz, PE, CEM CHIEF ARMY ENERGY POLICY Army Energy Security - "The Way Ahead" 2 ARMY ENERGY...

  20. Headquarters Facilities Master Security Plan

    Office of Environmental Management (EM)

    It implements the requirements of: Title 32, CFR, Part 2001, Classified National Security Information Executive Order 13526, Classified National Security Information...

  1. Sandia Energy - Water Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Infrastructure Security Home Climate & Earth Systems WaterEnergy Nexus Decision Models for Integrating EnergyWater Water Infrastructure Security Water Infrastructure...

  2. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29T23:59:59.000Z

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  3. Race to license new MTBE and TAME routes heats up

    SciTech Connect (OSTI)

    Rotman, D.

    1993-01-06T23:59:59.000Z

    With refineries and petrochemical manufacturers continuing to gear up production of oxygenates for use in reformulated fuels, new routes to methyl tert-butyl ether (MTBE) and tert-amyl methyl ether (TAME) are clearly hot items in the licensing market. And probably nowhere has the competition become as intense as in offerings for skeletal isomerization technologies to boost ethers production from fluid catalytic cracking and steam cracking.

  4. Assessing Reliability in Energy Supply Systems

    E-Print Network [OSTI]

    McCarthy, Ryan; Ogden, Joan M.; Sperling, Dan

    2008-01-01T23:59:59.000Z

    appropriate security indices for the natural gas sector. Insecurity in the electricity sector, a primary emphasis in natural gas

  5. Assessing reliability in energy supply systems

    E-Print Network [OSTI]

    McCarthy, Ryan W.; Ogden, Joan M.; Sperling, Daniel

    2007-01-01T23:59:59.000Z

    appropriate security indices for the natural gas sector. Insecurity in the electricity sector, a primary emphasis in natural gas

  6. Extracting Security Control Requirements University of Tulsa

    E-Print Network [OSTI]

    Gamble, R. F.

    , Requirements, Security Policy Modeling. 1. INTRODUCTION Networks and information systems have grown. Security has become a larger issue with the democratization of technology and information. Security accepted security controls for "Federal Information Systems and Organizations" [8]. NIST defines security

  7. Real Time Grid Reliability Management 2005

    E-Print Network [OSTI]

    Eto, Joe

    2008-01-01T23:59:59.000Z

    implementation of on-line power flow and security analysis,Line Contingency Filtering Scheme for Dynamic Security Assessment," IEEE Transactions on PowerPower Systems PSCE’2004, Iowa State University, Ames, Iowa, September [116] “Voltage Stability/Security Assessment and On-Line

  8. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  9. March 24, 2008 Databases: Security 1 Database Security and Authorization

    E-Print Network [OSTI]

    Adam, Salah

    to control login process by the DBMS Inference control The countermeasures to statistical database security database #12;March 24, 2008 Databases: Security 3 Chapter Outline Introduction Access Control Methods Policy System-related Security levels and categories Security Threats Loss of integrity Loss

  10. Safety and Security What do Safety/Security work with?

    E-Print Network [OSTI]

    Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with; · Security revolving work environment · Handle locks, keys, alarms, surveillance · Responsible

  11. Urban Commerce and Security Study Urban Commerce and Security Study

    E-Print Network [OSTI]

    Urban Commerce and Security Study Urban Commerce and Security Study Contact Information Fred S. Roberts Research Sponsor: Department of Homeland Security Rutgers University/CCICADA Center Professor.S. Department of Homeland Security, under Agreement 2009-ST-061-CCI002-02. Any opinions, findings

  12. SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card

    E-Print Network [OSTI]

    Li, Mo

    SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your and evidence to any Social Security office. Follow instructions below. HOW TO COMPLETE THE APPLICATION Most

  13. Wireless Security: Secure and Public Networks Villanova University

    E-Print Network [OSTI]

    36 Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer wireless access points. Security protocols exist for wireless networks; however, all widely implemented at implementing a protocol which allows public access to a secure wireless network have been made. In this report

  14. The Planning, Licensing, Modifications, and Use of a Russian Vessel for Shipping Spent Nuclear Fuel by Sea in Support of the DOE RRRFR Program

    SciTech Connect (OSTI)

    Michael Tyacke; Dr. Igor Bolshinsky; Wlodzimierz Tomczak; Sergey Naletov; Oleg Pichugin

    2001-10-01T23:59:59.000Z

    The Russian Research Reactor Fuel Return (RRRFR) Program, under the U.S. Department of Energy’s Global Threat Reduction Initiative, began returning Russian-supplied high-enriched uranium (HEU) spent nuclear fuel (SNF), stored at Russian-designed research reactors throughout the world, to Russia in January 2006. During the first years of making HEU SNF shipments, it became clear that the modes of transportation needed to be expanded from highway and railroad to include sea and air to meet the extremely aggressive commitment of completing the first series of shipments by the end of 2010. The first shipment using sea transport was made in October 2008 and used a non-Russian flagged vessel. The Russian government reluctantly allowed a one-time use of the foreign-owned vessel into their highly secured seaport, with the understanding that any future shipments would be made using a vessel owned and operated by a Russian company. ASPOL-Baltic of St. Petersburg, Russia, owns and operates a small fleet of vessels and has a history of shipping nuclear materials. ASPOL-Baltic’s vessels were licensed for shipping nuclear materials; however, they were not licensed to transport SNF materials. After a thorough review of ASPOL Baltic’s capabilities and detailed negotiations, it was agreed that a contract would be let with ASPOL-Baltic to license and refit their MCL Trader vessel for hauling SNF in support of the RRRFR Program. This effort was funded through a contract between the RRRFR Program, Idaho National Laboratory, and Radioactive Waste Management Plant of Swierk, Poland. This paper discusses planning, Russian and international maritime regulations and requirements, Russian authorities’ reviews and approvals, licensing, design, and modifications made to the vessel in preparation for SNF shipments. A brief summary of actual shipments using this vessel, experiences, and lessons learned also are described.

  15. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  16. Gearbox Reliability Collaborative Bearing Calibration

    SciTech Connect (OSTI)

    van Dam, J.

    2011-10-01T23:59:59.000Z

    NREL has initiated the Gearbox Reliability Collaborative (GRC) to investigate the root cause of the low wind turbine gearbox reliability. The GRC follows a multi-pronged approach based on a collaborative of manufacturers, owners, researchers and consultants. The project combines analysis, field testing, dynamometer testing, condition monitoring, and the development and population of a gearbox failure database. At the core of the project are two 750kW gearboxes that have been redesigned and rebuilt so that they are representative of the multi-megawatt gearbox topology currently used in the industry. These gearboxes are heavily instrumented and are tested in the field and on the dynamometer. This report discusses the bearing calibrations of the gearboxes.

  17. Power Reliability at BASF Corporation

    E-Print Network [OSTI]

    Theising, T. R.

    2011-01-01T23:59:59.000Z

    Power Reliability at BASF Corporation Thomas R. Theising Energy Systems Manager BASF Corporation ABSTRACT: Quality is defined not as what the supplier puts into the product but what the customer gets out and is willing to pay for. Power.... INTRODUCTION: BASF often identifies its? power quality by the effects it has on its ability to manufacture products. Improvements are made to remedy the power quality problems either through the elimination of the problems or through some means...

  18. Power Reliability at BASF Corporation

    E-Print Network [OSTI]

    Theising, T. R.

    2012-01-01T23:59:59.000Z

    Power Reliability at BASF Corporation Thomas R. Theising Energy Systems Manager BASF Corporation ABSTRACT: Quality is defined not as what the supplier puts into the product but what the customer gets out and is willing to pay for. Power.... INTRODUCTION: BASF often identifies its? power quality by the effects it has on its ability to manufacture products. Improvements are made to remedy the power quality problems either through the elimination of the problems or through some means...

  19. Consolidated guidance about materials licenses: Program-specific guidance about portable gauge licenses. Final report; Volume 1

    SciTech Connect (OSTI)

    Vacca, P.C.; Whitten, J.E.; Pelchat, J.M.; Arredondo, S.A.; Matson, E.R.; Lewis, S.H.; Collins, D.J.; Santiago, P.A. [Nuclear Regulatory Commission, Washington, DC (United States). Div. of Industrial and Medical Nuclear Safety; Tingle, W. [Dept. of Environment, Health, and Natural Resources, Raleigh, NC (United States). Div. of Radiation Protection

    1997-05-01T23:59:59.000Z

    As part of its redesign of the materials licensing process, NRC is consolidating and updating numerous guidance documents into a single comprehensive repository as described in NUREG-1539 and draft NUREG-1541. NUREG-1556, Vol. 1, is the first program-specific guidance developed for the new process and will serve as a template for subsequent program-specific guidance. This document is intended for use by applicants, licensees, and NRC staff and will also be available to Agreement States. This document supersedes the guidance previously found in draft Regulatory Guide DG-0008, ``Applications for the Use of Sealed Sources in Portable Gauging Devices,`` and in NMSs Policy and guidance Directive 2-07, ``Standard Review Plan for Applications for Use of Sealed Sources in Portable Gauging Devices.`` This final report takes a more risk-informed, performance-based approach to licensing portable gauges, and reduces the information(amount and level of detail) needed to support an application to use these devices. It incorporates many suggests submitted during the comment period on draft NUREG-1556, Volume 1. When published, this final report should be used in preparing portable gauge license applications. NRC staff will use this final report in reviewing these applications.

  20. SECURING RADIO FREQUENCY IDENTIFICATION (RFID)

    E-Print Network [OSTI]

    business process for an organization; as a result, the security risks for RFID systems and the controls for an organization; as a result, the security risks for RFID systems and the controls available to address themMay 2007 SECURING RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEMS SECURING RADIO FREQUENCY

  1. UNCG Security Awareness Training & Instructions

    E-Print Network [OSTI]

    Saidak, Filip

    UNCG Security Awareness Training & Instructions 02.09.2010 Page 1 of 4 Educating UNCG faculty and staff with respect to security best practices is essential in securing the University's information University employee that works with restricted or financial data. UNCG engaged Fishnet Security, a nationally

  2. ANNUAL SECURITY & FIRE SAFETY REPORT

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

  3. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30T23:59:59.000Z

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  4. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25T23:59:59.000Z

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  5. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31T23:59:59.000Z

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  6. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22T23:59:59.000Z

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  7. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Administration FY 2011 - FY 2015 Budget Outlook Managing the NNSA 4.0% Science, Technology & Engineering 14.5% Stockpile Support 17.9% Preventing the Spread of...

  8. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24T23:59:59.000Z

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  9. Engineering secure software 

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01T23:59:59.000Z

    breaches in the operating environment. Security breaches resulting from misuse or tnisconfiguration of the program should not be blamed on the software. T'his is a debatable position. A security breach that results from an unintentional enor... units with public key algorithms, private keys, and certificates. Any attempt to access or modify the data in these devices will render them unusable. The device contains software tools. These devices use the computer they reside on as a general...

  10. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17T23:59:59.000Z

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  11. Atomic Safety and Licensing Board Panel annual report, Fiscal year 1992

    SciTech Connect (OSTI)

    Not Available

    1993-09-01T23:59:59.000Z

    In Fiscal Year 1992, the Atomic Safety and Licensing Board Panel (``the Panel``) handled 38 proceedings. The cases addressed issues in the construction, operation, and maintenance of commercial nuclear power reactors and other activities requiring a license from the Nuclear Regulatory Commission. This reports sets out the Panel`s caseload during the year and summarizes, highlights, and analyzes how the wide-ranging issues raised in those proceedings were addressed by the Panel`s judges and licensing boards.

  12. Reliability Assessment Incorporating Operational Considerations and Economic

    E-Print Network [OSTI]

    PSERC Reliability Assessment Incorporating Operational Considerations and Economic Aspects Engineering Research Center Reliability Assessment Incorporating Operational Considerations and Economic and Economic Aspects for Large Interconnected Grids." We express our appreciation for the support provided

  13. Electric Power Reliability in Chemical Plants

    E-Print Network [OSTI]

    Cross, M. B.

    The quality and reliability of utility-generated electric power is presently receiving a great deal of attention from the chemical and refining industry. What changes have taken place to make electric power reliability a major topic of discussion...

  14. Arnold Schwarzenegger REAL-TIME GRID RELIABILITY

    E-Print Network [OSTI]

    Energy Research (PIER) California Energy Commission Beth Chambers Contract Manager Jamie Patterson (VSA) prototype to monitor system voltage conditions and provide real time dispatchers with reliabilityArnold Schwarzenegger Governor REAL-TIME GRID RELIABILITY MANAGEMENT California ISO Real

  15. Data Communication Principles Reliable Data Transfer

    E-Print Network [OSTI]

    Ramkumar, Mahalingam

    Data Communication Principles Switching Reliable Data Transfer Data Communication Basics Mahalingam Ramkumar Mississippi State University, MS September 8, 2014 Ramkumar CSE 4153 / 6153 #12;Data Communication Principles Switching Reliable Data Transfer 1 Data Communication Principles Data Rate of a Communication

  16. Reliability Analysis of Microelectronic Components and Materials

    E-Print Network [OSTI]

    Berlin,Technische Universität

    1 Reliability Analysis of Microelectronic Components and Materials Increasing numbers on the structural integrity of embedded micro- electronic components and assemblies. Improved knowledge and modeling methods are critical for the reliable use of electronic packages. In particular, since the advent

  17. Electric Power Reliability in Chemical Plants 

    E-Print Network [OSTI]

    Cross, M. B.

    1989-01-01T23:59:59.000Z

    at plants across the country? Has the quality and reliability of utility-generated power deteriorated over the past five or ten years? Or, has the perception of what constitutes reliable power changed with the advent, installation, and increasing usage...

  18. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  19. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    tech transfer officers are now seeking U.S. companies to license and commercialize the device for electronics chip cooling. Companies interested in licensing the Sandia Cooler...

  20. Profit Neutrality in Licensing: The Boundary Between Antitrust Law and Patent Law

    E-Print Network [OSTI]

    Maurer, Stephen M.; Scotchmer, Suzanne

    2004-01-01T23:59:59.000Z

    Strategy 1-32. [22] Royal Industries v. St. Regis Paperal. , 2004, at 31:20; Royal Industries 1969), to licenses

  1. Distributed Generation Operational Reliability, Executive Summary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2004 This report summarizes the results of the project, "Distributed Generation Market Transformation Tools: Distributed Generation Reliability and Availability Database,"...

  2. Reliability Challenges for Solar Energy (Presentation)

    SciTech Connect (OSTI)

    Kurtz, S.

    2009-12-08T23:59:59.000Z

    Presentation that reviews reliability issues related to various types of photovoltaic tecnnologies, including crystalline silicon, thin films, and concentrating PV.

  3. LUNAR MASS SPECTROMETER RELIABILITY LOGIC DIAGRAM

    E-Print Network [OSTI]

    Rathbun, Julie A.

    point (A) to (F). The block diagram also defines the reliability functions for the purpose of FMEA 1

  4. Arnold Schwarzenegger REAL-TIME GRID RELIABILITY

    E-Print Network [OSTI]

    monitoring and tracking of phase angles between sources and sink buses within the Western Interconnection System Prototype Source: CERTS License Agreements and Copyrights / Non-Disclosure Agreements The Real subject to non-disclosure agreement between data providers and California ISO. #12;iii Table of Contents

  5. ata security feature: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

  6. Reliability-based casing design

    SciTech Connect (OSTI)

    Maes, M.A. [Univ. of Calgary, Alberta (Canada). Civil Engineering Dept.; Gulati, K.C.; Johnson, R.C. [Mobil Research and Development Corp., Dallas, TX (United States); McKenna, D.L. [Mobil Producing Nigeria, Lagos (Nigeria); Brand, P.R.; Lewis, D.B. [Mobil E and P Technical Center, Dallas, TX (United States)

    1995-06-01T23:59:59.000Z

    The present paper describes the development of reliability-based design criteria for oil and/or gas well casing/tubing. The approach is based on the fundamental principles of limit state design. Limit states for tubulars are discussed and specific techniques for the stochastic modeling of loading and resistance variables are described. Zonation methods and calibration techniques are developed which are geared specifically to the characteristic tubular design for both hydrocarbon drilling and production applications. The application of quantitative risk analysis to the development of risk-consistent design criteria is shown to be a major and necessary step forward in achieving more economic tubular design.

  7. Dispatcher Reliability Analysis : SPICA-RAIL Experiments

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    consider that humans are fully reliable. But experience shows that many accidents involve human failuresDispatcher Reliability Analysis : SPICA-RAIL Experiments Fabien Belmonte, Jean-Louis Boulanger of scenarios and evaluate the behaviour of human operators. A state of the art in human reliability is pre

  8. RELIABILITY-BASED CASTING PROCESS DESIGN OPTIMIZATION

    E-Print Network [OSTI]

    Beckermann, Christoph

    RELIABILITY-BASED CASTING PROCESS DESIGN OPTIMIZATION Richard Hardin1 , K.K. Choi1 , and Christoph 52242-1527 Keywords: Casting Process Design, Optimization, Reliability-Based Design Optimization purpose reliability-based design optimization (RBDO) software tool previously developed at the University

  9. Procurement of a fully licensed radioisotope thermoelectric generator transportation system

    SciTech Connect (OSTI)

    Adkins, H.E.; Bearden, T.E. (Westinghouse Hanford Company, P.O. Box 1970, N1-42, Richland, Washington 99352 (US))

    1991-01-01T23:59:59.000Z

    A fully licensed transportation system for Radioisotope Thermoelectric Generators and Light-Weight Radioisotope Heater Units is currently being designed and built. The system will comply with all applicable U.S. Department of Transportation regulations without the use of a DOE Alternative.'' The U.S. Department of Transportation has special double containment'' requirements for plutonium. The system packaging uses a doubly contained bell jar'' concept. A refrigerated trailer is used for cooling the high-heat payloads. The same packaging is used for both high- and low-heat payloads. The system is scheduled to be available for use by mid-1992.

  10. Procurement of a fully licensed radioisotope thermoelectric generator transportation system

    SciTech Connect (OSTI)

    Adkins, H.E.; Bearden, T.E.

    1990-10-01T23:59:59.000Z

    A fully licensed transportation system for Radioisotope Thermoelectric Generators and Light-Weight Radioisotope Heater Units is currently being designed and built. The system will comply with all applicable US Department of Transportation regulations without the use of a DOE Alternative.'' The US Department of Transportation has special double containment'' requirements for plutonium. The system packaging uses a doubly contained bell jar'' concept. A refrigerated trailer is used for cooling the high-heat payloads. The same packaging is used for both high- and low-heat payloads. The system is scheduled to be available for use by mid-1992. 4 refs., 4 figs., 2 tabs.

  11. Sandia Energy - NuMAD License and Disclaimer

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol Home Distribution Grid Integration PermalinkClimate ChangeLicense and

  12. Property:Permit/License Buildout (MW) | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal PwerPerkinsInformationInformationMarine/Riverline Conditions Jump to:Permit/License

  13. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  14. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    her students on security of process control systems. I amcyber-security tools for process control systems. In theon the security mechanisms of process control systems, few

  15. Global Environmental Change and Human Security

    E-Print Network [OSTI]

    Kunnas, Jan

    2011-01-01T23:59:59.000Z

    with human rights, human security or environmental change ifEnvironmental Change and Human Security By Matthew, RichardChange and Human Security. Cambridge, Massachusetts &

  16. Security and United States Immigration Policy

    E-Print Network [OSTI]

    Totten, Robbie James

    2012-01-01T23:59:59.000Z

    Change and European Security. London: Brassey's. Furer,1981]. American National Security, 6th ed. Baltimore, MD:J. Wheeler. 2008. The Security Dilemma: Fear, Cooperation

  17. Energy and Security in Northeast Asia

    E-Print Network [OSTI]

    May, Michael; Johnson, Celeste; Fei, Edward; Suzuki, Tatsujiro

    1996-01-01T23:59:59.000Z

    regional cooperation on energy and security issues in Asia.Energy and Security in Northeast Asia An IGCC studycan be drawn. The energy security situation and outlook are

  18. Sandia Energy - Cyber Security for Electric Infrastructure

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Security for Electric Infrastructure Home Stationary Power Grid Modernization Cyber Security for Electric Infrastructure Cyber Security for Electric Infrastructureashoter2015...

  19. Preliminary Notice of Violation, National Security Technologies...

    Office of Environmental Management (EM)

    National Security Technologies, LLC - September 26, 2014 Preliminary Notice of Violation, National Security Technologies, LLC - September 26, 2014 September 26, 2014 Security...

  20. Personnel Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    72.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

  1. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01T23:59:59.000Z

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  2. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  3. Human Reliability Program 10 CFR, part 712 Subpart B Medical Standards

    Broader source: Energy.gov [DOE]

    HRP Policy is the responsibility of the Office of Departmental Personnel Security Policy (HS-1.4). The Office of Worker Safety and Health Assistance (HS-12), has responsibility within the DOE Human Reliability Programs (HRP) to ensure appropriate policies and procedures are in place and used at HQ and the DOE sites to monitor HRP-designated worker's health and fitness-for-duty.

  4. OPTIMAL RELIABILITY ALLOCATION IN SERIES-PARALLEL SYSTEMS FROM COMPONENTS' DISCRETE COST -RELIABILITY DATA SETS

    E-Print Network [OSTI]

    Smith, Alice E.

    is not known. Instead, we consider the more realistic assumption of discrete cost-reliability data sets expressions for cost-reliability curves, we consider discrete cost-reliability data sets for each componentOPTIMAL RELIABILITY ALLOCATION IN SERIES-PARALLEL SYSTEMS FROM COMPONENTS' DISCRETE COST

  5. Software reliability models for critical applications

    SciTech Connect (OSTI)

    Pham, H.; Pham, M.

    1991-12-01T23:59:59.000Z

    This report presents the results of the first phase of the ongoing EG G Idaho, Inc. Software Reliability Research Program. The program is studying the existing software reliability models and proposes a state-of-the-art software reliability model that is relevant to the nuclear reactor control environment. This report consists of three parts: (1) summaries of the literature review of existing software reliability and fault tolerant software reliability models and their related issues, (2) proposed technique for software reliability enhancement, and (3) general discussion and future research. The development of this proposed state-of-the-art software reliability model will be performed in the second place. 407 refs., 4 figs., 2 tabs.

  6. Software reliability models for critical applications

    SciTech Connect (OSTI)

    Pham, H.; Pham, M.

    1991-12-01T23:59:59.000Z

    This report presents the results of the first phase of the ongoing EG&G Idaho, Inc. Software Reliability Research Program. The program is studying the existing software reliability models and proposes a state-of-the-art software reliability model that is relevant to the nuclear reactor control environment. This report consists of three parts: (1) summaries of the literature review of existing software reliability and fault tolerant software reliability models and their related issues, (2) proposed technique for software reliability enhancement, and (3) general discussion and future research. The development of this proposed state-of-the-art software reliability model will be performed in the second place. 407 refs., 4 figs., 2 tabs.

  7. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMFormsGasReleaseSpeechesHallNot Logged In You must createSecurity Global

  8. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4 Self-Scrubbing:,, ,Development of NovelHigh( ( ( ( (physical security |

  9. Radiological Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City,Enriched UraniumPhysical Security Systems(PA)About| National

  10. Security Commodity Team | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook TwitterSearch-Comments Sign InNuclear Security

  11. Security Notice | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclearHomeland ScienceInnovationScience andbarrierSecurity

  12. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our InstagramStructureProposedPAGESafety Tag: Safety Displaying 1security Tag:

  13. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking OverEvaluating ' M M t345 UnlimitedSecure

  14. Secure Storage | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking OverEvaluating ' M M t345Secure Storage

  15. Real Time Grid Reliability Management 2005

    E-Print Network [OSTI]

    Eto, Joe

    2008-01-01T23:59:59.000Z

    in AC/DC power systems, Electrical Energy & Power Systems,Security Regions of Electrical Power Systems”, ProceedingsRegions of Electrical Power Systems by Power Perturbation

  16. Real Time Grid Reliability Management 2005

    E-Print Network [OSTI]

    Eto, Joe

    2008-01-01T23:59:59.000Z

    Reactive Power Reserve Work Group, Western ElectricityReactive Voltage Security Assessment Wide Area Network Western Area Power Administration Western Electricity

  17. Sodium fast reactor safety and licensing research plan. Volume I.

    SciTech Connect (OSTI)

    Sofu, Tanju (Argonne National Laboratory, Argonne, IL); LaChance, Jeffrey L.; Bari, R. (Brokhaven National Laboratory Upton, NY); Wigeland, Roald (Idaho National Laboratory, Idaho Falls, ID); Denman, Matthew R.; Flanagan, George F. (Oak Ridge National Laboratory, Oak Ridge, TN)

    2012-05-01T23:59:59.000Z

    This report proposes potential research priorities for the Department of Energy (DOE) with the intent of improving the licensability of the Sodium Fast Reactor (SFR). In support of this project, five panels were tasked with identifying potential safety-related gaps in available information, data, and models needed to support the licensing of a SFR. The areas examined were sodium technology, accident sequences and initiators, source term characterization, codes and methods, and fuels and materials. It is the intent of this report to utilize a structured and transparent process that incorporates feedback from all interested stakeholders to suggest future funding priorities for the SFR research and development. While numerous gaps were identified, two cross-cutting gaps related to knowledge preservation were agreed upon by all panels and should be addressed in the near future. The first gap is a need to re-evaluate the current procedures for removing the Applied Technology designation from old documents. The second cross-cutting gap is the need for a robust Knowledge Management and Preservation system in all SFR research areas. Closure of these and the other identified gaps will require both a reprioritization of funding within DOE as well as a re-evaluation of existing bureaucratic procedures within the DOE associated with Applied Technology and Knowledge Management.

  18. Aging management of nuclear power plant containments for license renewal

    SciTech Connect (OSTI)

    Liu, W.C.; Kuo, P.T.; Lee, S.S.

    1997-09-01T23:59:59.000Z

    In 1990, the Nuclear Management and Resources Council (NUMARC), now the Nuclear Energy Institute (NEI), submitted for NRC review, the industry reports (IRs), NUMARC Report 90-01 and NUMARC Report 90-10, addressing aging management issues associated with PWR containments and BWR containments for license renewal, respectively. In 1996, the Commission amended 10 CFR 50.55a to promulgate requirements for inservice inspection of containment structures. This rule amendment incorporates by reference the 1992 Edition with the 1992 Addenda of Subsections IWE and IWL of the ASME Code addressing the inservice inspection of metal containments/liners and concrete containments, respectively. The purpose of this report is to reconcile the technical information and agreements resulting from the NUMARC IR reviews which are generally described in NUREG-1557 and the inservice inspection requirements of subsections IWE and IWL as promulgated in {section}50.55a for license renewal consideration. This report concludes that Subsections IWE and IWL as endorsed in {section}50.55a are generally consistent with the technical agreements reached during the IR reviews. Specific exceptions are identified and additional evaluations and augmented inspections for renewal are recommended.

  19. Electricity Delivery and Energy Reliability | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Electricity Delivery and Energy Reliability Electricity Delivery and Energy Reliability information about the delivery of electricity and energy reliability Electricity Delivery...

  20. Reliable computation of homogeneous azeotropes

    SciTech Connect (OSTI)

    Maier, R.W.; Brennecke, J.F.; Stadtherr, M.A. [Univ. of Notre Dame, IN (United States). Dept. of Chemical Engineering] [Univ. of Notre Dame, IN (United States). Dept. of Chemical Engineering

    1998-08-01T23:59:59.000Z

    It is important to determine the existence and composition of homogeneous azeotropes in the analysis of phase behavior and in the synthesis and design of separation systems, from both theoretical and practical standpoints. A new method for reliably locating any and all homogeneous azeotropes for multicomponent mixtures is presented. The method also verifies the nonexistence of homogeneous azeotropes if none are present. The method is based on interval analysis, in particular an interval-Newton/generalized-bisection-algorithm providing a mathematical and computational guarantee that all azeotropes are located. This general-purpose technique can be applied in connection with any thermodynamic models. The technique is illustrated in several example problems using the Wilson, NRTL, and UNIQUAC activity-coefficient models.

  1. Engineering secure software

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01T23:59:59.000Z

    the vulnerabilities based on their coverage and cost. The above modeling approach is also known as thc onion peel model due to its nature of dividing the problem space into zones of similar security. These zones represent the peels of the onion. Each zone is also... into peels based on the security considerations of the entities of the system. The model describes minimum interaction among components across peels and maximum within peels. The onion diagram includes the physical entities of the systems and not just...

  2. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

  3. Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability

    E-Print Network [OSTI]

    Ragsdale, G.

    -25, 2010 Implementing TCG Standards Within Systems ? Trusted Platform Module (TPM) ? Provides root of trust ? Secure storage ? Signing & hashing functions ? Tamper detection ? Accelerates cryptography ? TPM software stack ? Implements TCG stack... Update Session Security (symmetric key) Code and Data Integrity (memory hash) ?Secure secret storage ?TPM chip root trust secret ?Owner root trust secret ?Memory hash signature ?Standard encryption algorithm ?Standard hashing algorithm ?Tamper detection...

  4. SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011

    E-Print Network [OSTI]

    SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011 Choose brands and models of mobile devices that have the options referenced below. Use all available security options that your or sensitive university information in un-approved off-campus services, such as public cloud based services

  5. University of Rochester Model Non-Exclusive Patent License revised 11-08-2013

    E-Print Network [OSTI]

    University of Rochester Model Non-Exclusive Patent License revised 11-08-2013 DRAFT DATED__________ FOR DISCUSSION PURPOSES ONLY NON EXCLUSIVE PATENT LICENSE AGREEMENT This agreement (hereinafter "Agreement, University is the owner by assignment of the Patent Rights as defined below. 1.2 University desires

  6. Profit Neutrality in Licensing: The Boundary Between Antitrust Law and Patent Law

    E-Print Network [OSTI]

    Sadoulet, Elisabeth

    Profit Neutrality in Licensing: The Boundary Between Antitrust Law and Patent Law Stephen M. Maurer a century, courts and commentators have struggled to find principles that reconcile patent and antitrust law, especially as to patent licensing. We interpret case law and commentary to arrive at three unifying

  7. Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI

    E-Print Network [OSTI]

    Jurjens, Jan

    Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI ** , Arosha BANDARA the challenges of developing secure software systems remains an active research area in software engineering. Current research efforts have resulted in the documentation of recurring security problems as security

  8. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Herwig, Falk

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  9. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  10. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01T23:59:59.000Z

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  11. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    States Computer Emergency Readiness Team National Cyber Security Division Department of Homeland Security of Standards and Technology Gaithersburg, MD Karen Scarfone Scarfone Cybersecurity C O M P U T E R S E C U R I

  12. System security Dr Len Hamey

    E-Print Network [OSTI]

    Hamey, Len

    , firewalls, detecting intrusions) Security process cycle policy implementation administration audit risk access with firewall Use generic service banners Use intrusion detection system that can detect;2 Security Services Confidentiality service. Authentication service. Integrity service. Access Control

  13. Secure Interoperable Open Smart Grid Demonstration Project

    SciTech Connect (OSTI)

    Magee, Thoman

    2014-12-31T23:59:59.000Z

    The Consolidated Edison, Inc., of New York (Con Edison) Secure Interoperable Open Smart Grid Demonstration Project (SGDP), sponsored by the United States (US) Department of Energy (DOE), demonstrated that the reliability, efficiency, and flexibility of the grid can be improved through a combination of enhanced monitoring and control capabilities using systems and resources that interoperate within a secure services framework. The project demonstrated the capability to shift, balance, and reduce load where and when needed in response to system contingencies or emergencies by leveraging controllable field assets. The range of field assets includes curtailable customer loads, distributed generation (DG), battery storage, electric vehicle (EV) charging stations, building management systems (BMS), home area networks (HANs), high-voltage monitoring, and advanced metering infrastructure (AMI). The SGDP enables the seamless integration and control of these field assets through a common, cyber-secure, interoperable control platform, which integrates a number of existing legacy control and data systems, as well as new smart grid (SG) systems and applications. By integrating advanced technologies for monitoring and control, the SGDP helps target and reduce peak load growth, improves the reliability and efficiency of Con Edison’s grid, and increases the ability to accommodate the growing use of distributed resources. Con Edison is dedicated to lowering costs, improving reliability and customer service, and reducing its impact on the environment for its customers. These objectives also align with the policy objectives of New York State as a whole. To help meet these objectives, Con Edison’s long-term vision for the distribution grid relies on the successful integration and control of a growing penetration of distributed resources, including demand response (DR) resources, battery storage units, and DG. For example, Con Edison is expecting significant long-term growth of DG. The SGDP enables the efficient, flexible integration of these disparate resources and lays the architectural foundations for future scalability. Con Edison assembled an SGDP team of more than 16 different project partners, including technology vendors, and participating organizations, and the Con Edison team provided overall guidance and project management. Project team members are listed in Table 1-1.

  14. Security and Fault-tolerance in Distributed Systems ETHZ, Spring 2013 Christian Cachin, IBM Research -Zurich www.zurich.ibm.com/~cca/

    E-Print Network [OSTI]

    Cachin, Christian

    Security and Fault-tolerance in Distributed Systems ETHZ, Spring 2013 Christian Cachin, IBM and secure distributed systems. · Exploit replication as the primary means to tolerate faults. · Describe. Dependability 2. Reliable broadcast 3. Distributed storage 4. Consensus 5. System examples 6. Distributed

  15. Security and Fault-tolerance in Distributed Systems ETHZ, Spring 2012 Christian Cachin, IBM Research -Zurich www.zurich.ibm.com/~cca/

    E-Print Network [OSTI]

    Cachin, Christian

    Security and Fault-tolerance in Distributed Systems ETHZ, Spring 2012 Christian Cachin, IBM and secure distributed systems. · Exploit replication as the primary means to tolerate faults. · Describe. Dependability 2. Communication primitives 3. Reliable broadcast 4. Distributed storage 5. Consensus 6

  16. Idaho National Laboratory/Nuclear Power Industry Strategic Plan for Light Water Reactor Research and Development An Industry-Government Partnership to Address Climate Change and Energy Security

    SciTech Connect (OSTI)

    Electric Power Research

    2007-11-01T23:59:59.000Z

    The dual issues of energy security and climate change mitigation are driving a renewed debate over how to best provide safe, secure, reliable and environmentally responsible electricity to our nation. The combination of growing energy demand and aging electricity generation infrastructure suggests major new capacity additions will be required in the years ahead.

  17. Enhancing Transportation Energy Security through Advanced Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transportation Energy Security through Advanced Combustion and Fuels Technologies Enhancing Transportation Energy Security through Advanced Combustion and Fuels Technologies 2005...

  18. Line Management Perspective: National Nuclear Security Administration...

    Broader source: Energy.gov (indexed) [DOE]

    National Nuclear Security Administration (NNSA) Line Management Perspective: National Nuclear Security Administration (NNSA) Addthis Description Slide Presentation by Jim...

  19. Office of Security Assessments | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    information, personnel security, and foreign visits and assignments. Assesses the information security practices at facilities managing special access programs and...

  20. Secretary Richardson Accepts Recommendations for Improving Security...

    National Nuclear Security Administration (NNSA)

    Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

  1. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  2. Corporate Security and Conflict Outcomes 

    E-Print Network [OSTI]

    Tkach, Benjamin K

    2013-10-21T23:59:59.000Z

    militaries (Avant 2000). Existing research has shown a steady increase in the number and employment of private security firms (PSFs) over the last five decades due to expansion of global market demand for private security (Avant 2005; Dunigan 2011; Singer... prominent role in international aviation security (Abrahamsen and Williams 2011). Because PSFs are based largely on corporate profit motivations, contract fulfillment and reputation are critical for firms to secure market share. The international market...

  3. East Asian Security in 2025

    E-Print Network [OSTI]

    Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

    2008-01-01T23:59:59.000Z

    East Asian Security in 2025 Who We Are • Reagan Heavin – Energy • Adam Hudson – State Capacity • Brandon Krueger – Military • Sean O’Neil – Demographics • Griffin Rozell – Balance of Power • Matt Suma – Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean O’Neil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda • Conclusions • Projections • Drivers • Four Outcomes • Questions East Asian Security in 2025...

  4. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  5. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  6. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02T23:59:59.000Z

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  7. Simulated Interdiction: Proliferation Security Initiative

    E-Print Network [OSTI]

    2009-01-01T23:59:59.000Z

    ………………………………... Technical Capabilities to Support PSI ………………………………… Foreign Policy and External Relations ………………………............... Republic of Bevostan ………………………………………………………….. Geography ……………………………………………………………... iii 1 3 4 5 6 7 8 8 8 8 8 9 9 10... Security, Science and Policy Institute (NSSPI) Texas A&M University May 6, 2009 Simulated Interdiction: The Proliferation Security Initiative (PSI) Acknowledgements The National Nuclear Security Administration (NNSA) of the U.S. Department...

  8. Security and Verification Provable cryptography

    E-Print Network [OSTI]

    Gregoire, Benjamin - Institut National de Recherche en Informatique et en Automatique, Centre de recherche Sophia Antipolis

    Security and Verification Provable cryptography Benjamin Grégoire1 Tamara Rezk1 1INRIA Sophia Antipolis - Méditerranée, France Cours de Master 2 Univerisité de Nice Sophia-Antipolis Security and Verification 1/ 33 #12;Cryptanalysis-driven Security Propose a cryptographic scheme Wait for someone to come

  9. MINIMUM SECURITY REQUIREMENTS FOR FEDERAL

    E-Print Network [OSTI]

    March 2006 MINIMUM SECURITY REQUIREMENTS FOR FEDERAL INFORMATION AND INFORMATION SYSTEMS: FEDERAL INFORMATION PROCESSING STANDARD (FIPS) 200 APPROVED BY THE SECRETARY OF COMMERCE MINIMUM SECURITY REQUIREMENTS BY THE SECRETARY OF COMMERCE Shirley Radack, EditorShirley Radack, Editor Computer Security Division

  10. RECOMMENDED SECURITY CONTROLS FOR FEDERAL

    E-Print Network [OSTI]

    May 2005 RECOMMENDED SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS: GUIDANCE FOR SELECTING COST-EFFECTIVE CONTROLS USING A RISK-BASED PROCESS Shirley Radack, Editor, Computer Security Division, Information Technology Laboratory National Institute of Standards and Technology Security controls are the management

  11. Positioning Security from electronic warfare

    E-Print Network [OSTI]

    Kuhn, Markus

    Positioning Security from electronic warfare to cheating RFID and road-tax systems Markus Kuhn;Military positioning-security concerns Electronic warfare is primarily about denying or falsifying location of the importance of global positioning security has led to the military discipline of "navigation warfare". 5 #12

  12. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  13. Foundations for Designing Secure Architectures

    E-Print Network [OSTI]

    Jurjens, Jan

    Architectures This talk: foundations for designing software architectures for secure systems, based their architectures. Will apply specialized tool-support to automatically evaluate the designs for potential security weaknesses. (Based on tutorial at WICSA 2004.) #12;Jan Jürjens, TU Munich: Foundations for Designing Secure

  14. GEORG-AUGUST-UNIVERSITT Computer Security

    E-Print Network [OSTI]

    Grabowski, Jens

    GEORG-AUGUST-UNIVERSITÄT GÖTTINGEN Computer Security Overview and Introduction Computer Security Security @ Göttingen » Research group for comuter security » Prof. Dr. Konrad Rieck » 4 PhD students (+ 2 security » Research on analysis, detection and prevention of threats » Development of intelligent security

  15. SECURITY TECHNIQUES Chris J Mitchell1

    E-Print Network [OSTI]

    Mitchell, Chris

    SECURITY TECHNIQUES Chris J Mitchell1 Introduction In this paper we consider the range of security security has been exerted. However, the techniques described are of general applicability by a security technique; in doing so we will distinguish between security features and security techniques (or

  16. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12T23:59:59.000Z

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  17. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  18. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  19. The decommodified security ratio

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    are currently experiencing: changing patterns of work, the phenom- enon she calls the "breakdown in the wage furthered by the work of the International Labour Office. In particular, the programme of researchThe decommodified security ratio: A tool for assessing European social protection systems Georges

  20. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28T23:59:59.000Z

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  1. Conceptualizing Energy Security

    E-Print Network [OSTI]

    Winzer, Christian

    Energy security is one of the main targets of energy policy. However, the term has not been clearly defined, which makes it hard to measure and difficult to balance against other policy objectives. We review the multitude of definitions of energy...

  2. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21T23:59:59.000Z

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  3. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  4. December 2003 SECURITY CONSIDERATIONS

    E-Print Network [OSTI]

    Perkins, Richard A.

    security early in the information system development life cycle (SDLC), you may be able to avoid higher, with tailoring, to any SDLC model or acquisition method the organization is using. The appendices to the guide.nist.gov/publications/nistpubs/ index.html. The System Development Life Cycle (SDLC) The system development life cycle starts

  5. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08T23:59:59.000Z

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  6. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01T23:59:59.000Z

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  7. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    None

    2011-01-01T23:59:59.000Z

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  8. A network security monitor

    SciTech Connect (OSTI)

    Heberlein, L.T.; Dias, G.V.; Levitt, K.N.; Mukherjee, B.; Wood, J.; Wolber, D. (California Univ., Davis, CA (USA). Dept. of Electrical Engineering and Computer Science)

    1989-11-01T23:59:59.000Z

    The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, our work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.

  9. License Application Design Selection Report, REV 01. August 1999

    SciTech Connect (OSTI)

    Hastings, C.R.

    1999-08-30T23:59:59.000Z

    In December 1998, the U.S. Department of Energy (DOE) published the ''Viability Assessment of a Repository at Yucca Mountain'' (DOE 1998b). The Viability Assessment described a preliminary design of a potential repository at Yucca Mountain, Nevada, for disposal of spent nuclear fuel and high-level radioactive waste, and assessed the probable behavior of that repository design in the Yucca Mountain geologic setting. The report concluded that 'Yucca Mountain remains a promising site for a geologic repository and that work should proceed to support a decision in 2001 on whether to recommend the site to the President for development as a repository'. It also concluded that 'uncertainties remain about key natural processes, the preliminary design, and how the site and design would interact'. Recognizing that the design that was evaluated will be refined before a license application could be submitted, the Viability Aassesment notes that 'DOE is evaluating several design options and alternatives that could reduce existing uncertainty and improve the performance of the repository system'. During the preparation of the Viability Assessment, DOE asked the contractor for the Civilian Radioactive Waste Management Program to study alternative design concepts for a potential geologic repository for high-level radioactive waste at Yucca Mountain. The License Application Design Selection (LADS) project was initiated to conduct that study. The goal of the project was to develop and evaluate a diverse range of conceptual repository designs that work well in concert with the Yucca Mountain site and to recommend an initial design concept for the possible Site Recommendation and License Apllication. This report presents the results of the LADS project. The design process consisted of two phases. In Phase I, a series of basic design concepts (design alternatives) and components (design features) were analyzed for their potential value as elements of a repository design. In Phase II, these enhanced design alternatives were refined, screened for accepatable postclosure performance, and evaluated against a set of criteria addressing four broad aspects of the repository: performance demonstrability; flexibility; construction, operations and maintenance; and cost. Based on this evaluation, a conceptual design was recommended to DOE and could be characterized as a low thermal impact design. Included in the report is more in depth information regarding the basis of the recommendation, performance issues, benefits related to reduced uncertainties, construction/operational benefits, technical and programmatic flexibilty and cost impacts.

  10. An integrated security framework for GOSS power grid analytics platform

    SciTech Connect (OSTI)

    Gibson, Tara D.; Ciraci, Selim; Sharma, Poorva; Allwardt, Craig H.; Rice, Mark J.; Akyol, Bora A.

    2014-06-23T23:59:59.000Z

    In power grid operations, security is an essential component for any middleware platform. Security protects data against unwanted access as well as cyber attacks. GridOpticsTM Software System (GOSS) is an open source power grid analytics platform that facilitates ease of access between applications and data sources and promotes development of advanced analytical applications. GOSS contains an API that abstracts many of the difficulties in connecting to various heterogeneous data sources. A number of applications and data sources have already been implemented to demonstrate functionality and ease of use. A security framework has been implemented which leverages widely accepted, robust JavaTM security tools in a way such that they can be interchanged as needed. This framework supports the complex fine-grained, access control rules identified for the diverse data sources already in GOSS. Performance and reliability are also important considerations in any power grid architecture. An evaluation is done to determine the overhead cost caused by security within GOSS and ensure minimal impact to performance.

  11. Power as a function of reliability

    SciTech Connect (OSTI)

    Abate, M.L. [Sandia National Labs., Albuquerque, NM (United States); McCabe, G.P.; Lynch, M.P. [Purdue Univ., Lafayette, IN (United States)

    1995-10-01T23:59:59.000Z

    Many studies employ multiple measurement instruments such as human raters, observers, judges, or mechanical gauges to record subject data. It is well known that the consistency of these instruments, commonly called rater reliability, limits the extent to which conclusions should be drawn from the observed data. However, the degree to which rater reliability limits conclusions has traditionally been assessed in only subjective manners. In this paper, a method is developed for objectively quantifying the impact of rate reliability on the statistical analysis of data from a commonly used collection scheme. This method allows the inclusion of a reliability index in statistical power calculations and is an invaluable tool in the planning of experiments.

  12. General Order Ensuring Reliable Electric Service (Louisiana)

    Broader source: Energy.gov [DOE]

    The standards set forth herein have been developed to provide consumers, the Louisiana Public Service Commission, and jurisdictional electric utilities with a uniform method of ensuring reliable...

  13. Thermoelectric Materials By Design: Mechanical Reliability (Agreement...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    enable improvements in TE device design, optimization, and maximum reliability. * Next year will involve: - Continued TE material database generation. - TE modeling and...

  14. Improving Wind Turbine Gearbox Reliability: Preprint

    SciTech Connect (OSTI)

    Musial, W.; Butterfield, S.; McNiff, B.

    2007-06-01T23:59:59.000Z

    This paper describes a new research and development initiative to improve gearbox reliability in wind turbines begun at the National Renewable Energy Laboratory (NREL) in Golden, Colorado, USA.

  15. RTI International Develops SSL Luminaire Reliability Model |...

    Broader source: Energy.gov (indexed) [DOE]

    is developing and validating accelerated life testing (ALT) methodologies and a reliability model for predicting the lifetime of integrated solid-state lighting...

  16. Electricity Delivery and Energy Reliability PROGRAM DESCRIPTION

    Broader source: Energy.gov (indexed) [DOE]

    (PSA) program provides expert technical assistance to states, tribes and regions on electricity policies, programs and market mechanisms that increase access to reliable,...

  17. Sandia National Laboratories: Inverter Reliablity Program

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    simulations to look for corresponding changes in behavioral parameters of ... Inverter Reliability Program On December 18, 2012, in As scientists and engineers improve the...

  18. Sandia National Laboratories: PV Reliability Operations Maintenance...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Maintenance database Sandia-Electric Power Research Institute Partnership Publishes Photovoltaic Reliability Report On January 21, 2014, in Energy, Facilities, Grid...

  19. Sandia National Laboratories: PV Systems Reliability

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    fluid phenomena of internal inverter components, and their impact on ... Inverter Reliability Program On December 18, 2012, in As scientists and engineers improve the...

  20. NORTH AMERICAN ELECTRIC RELIABILITY COUNCIL: Preliminary Disturbance...

    Office of Environmental Management (EM)

    Preliminary Disturbance Report The following information represents a partial sequence of events based upon Reliability Coordinator information available to NERC. It is not...

  1. Sandia Energy - Continuous Reliability Enhancement for Wind ...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Enhancement for Wind (CREW): Project Update Home Renewable Energy Energy News Wind Energy News & Events Systems Analysis Continuous Reliability Enhancement for Wind (CREW):...

  2. Comments of North American Electric Reliability Corporation ...

    Broader source: Energy.gov (indexed) [DOE]

    currently developing a report, entitled "Reliability Consideration from Integration of Smart Grid" that will address many of the issues raised in the DOE RFI. North American...

  3. Sandia National Laboratories: Materials & Manufacturing Reliability...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Materials & Manufacturing Reliability Program Biofouling Studies on Sandia's Marine Hydrokinetic Coatings Initiated at PNNL's Sequim Bay On June 26, 2014, in Energy, Materials...

  4. AP1000{sup R} licensing and deployment in the United States

    SciTech Connect (OSTI)

    Jordan, R. P.; Russ, P. A.; Filiak, P. P.; Castiglione, L. L. [Westinghouse Electric Company LLC, 1000 Westinghouse Drive, Cranberry Township, PA 16066 (United States)

    2012-07-01T23:59:59.000Z

    In recent years, both domestic and foreign utilities have turned to the standardized Westinghouse AP1000 plant design in satisfying their near - and long-term - sustainable energy needs. As direct support to these actions, licensing the AP1000 design has played a significant role by providing one of the fundamental bases in clearing regulatory hurdles leading to the start of new plant construction. Within the U.S. alone, Westinghouse AP1000 licensing activities have reached unprecedented milestones with the approvals of both AP1000 Design Certification and Southern Company's combined construction permit and operating license (COL) application directly supporting the construction of two new nuclear plants in Georgia. Further COL application approvals are immediately pending for an additional two AP1000 plants in South Carolina. And, across the U.S. nuclear industry spectrum, there are 10 other COL applications under regulatory review representing some 16 new plants at 10 sites. In total, these actions represent the first wave of new plant licensing under the regulatory approval process since 1978. Fundamental to the Nuclear Regulatory Commission's AP1000 Design Certification is the formal recognition of the AP1000 passive safety design through regulatory acceptance rulemaking. Through recognition and deployment of the AP1000 Design Certification, the utility licensee / operator of this reactor design are now offered an opportunity to use a simplified 'one-step' combined license process, thereby managing substantial back-end construction schedule risk from regulatory and intervention delays. Application of this regulatory philosophy represents both acceptance and encouragement of standardized reactor designs like the AP1000. With the recent AP1000 Design Certification and utility COL acceptances, the fundamental licensing processes of this philosophy have successfully proven the attainment of significant milestones with the next stage licensing actions directed towards deployment. AP1000 Design Certification and COL deployment, and management of the plant construction in accordance with the conditions within these approvals, remain as significant site and corporate responsibilities. These licensing-construction integrated activities must now focus on identifying and resolving 'as-built' departures from the standardized design as assessed against the certified AP1000 technical and licensing basis. Within this paper, significant aspects of the AP1000 U.S. licensing will be discussed, including identifying systems and processes used in ensuring compliance while deploying the standardized design. Critical licensing steps, licensing deployment actions as plant construction progresses and defining the road forward to a successful completion of licensing actions will be addressed. (authors)

  5. Assessment of microelectronics packaging for high temperature, high reliability applications

    SciTech Connect (OSTI)

    Uribe, F.

    1997-04-01T23:59:59.000Z

    This report details characterization and development activities in electronic packaging for high temperature applications. This project was conducted through a Department of Energy sponsored Cooperative Research and Development Agreement between Sandia National Laboratories and General Motors. Even though the target application of this collaborative effort is an automotive electronic throttle control system which would be located in the engine compartment, results of this work are directly applicable to Sandia`s national security mission. The component count associated with the throttle control dictates the use of high density packaging not offered by conventional surface mount. An enabling packaging technology was selected and thermal models defined which characterized the thermal and mechanical response of the throttle control module. These models were used to optimize thick film multichip module design, characterize the thermal signatures of the electronic components inside the module, and to determine the temperature field and resulting thermal stresses under conditions that may be encountered during the operational life of the throttle control module. Because the need to use unpackaged devices limits the level of testing that can be performed either at the wafer level or as individual dice, an approach to assure a high level of reliability of the unpackaged components was formulated. Component assembly and interconnect technologies were also evaluated and characterized for high temperature applications. Electrical, mechanical and chemical characterizations of enabling die and component attach technologies were performed. Additionally, studies were conducted to assess the performance and reliability of gold and aluminum wire bonding to thick film conductor inks. Kinetic models were developed and validated to estimate wire bond reliability.

  6. Competition and Reliability in North American Electricity Markets...

    Energy Savers [EERE]

    Electricity Markets Technical Workshop Competition and Reliability in North American Electricity Markets Technical Workshop Competition and Reliability in North American...

  7. PV Performance and Reliability Validation Capabilities at Sandia...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Performance and Reliability Validation Capabilities at Sandia National Laboratories PV Performance and Reliability Validation Capabilities at Sandia National Laboratories This...

  8. Sensor network based vehicle classification and license plate identification system

    SciTech Connect (OSTI)

    Frigo, Janette Rose [Los Alamos National Laboratory; Brennan, Sean M [Los Alamos National Laboratory; Rosten, Edward J [Los Alamos National Laboratory; Raby, Eric Y [Los Alamos National Laboratory; Kulathumani, Vinod K [WEST VIRGINIA UNIV.

    2009-01-01T23:59:59.000Z

    Typically, for energy efficiency and scalability purposes, sensor networks have been used in the context of environmental and traffic monitoring applications in which operations at the sensor level are not computationally intensive. But increasingly, sensor network applications require data and compute intensive sensors such video cameras and microphones. In this paper, we describe the design and implementation of two such systems: a vehicle classifier based on acoustic signals and a license plate identification system using a camera. The systems are implemented in an energy-efficient manner to the extent possible using commercially available hardware, the Mica motes and the Stargate platform. Our experience in designing these systems leads us to consider an alternate more flexible, modular, low-power mote architecture that uses a combination of FPGAs, specialized embedded processing units and sensor data acquisition systems.

  9. Evaluation of MHTGR fuel reliability

    SciTech Connect (OSTI)

    Wichner, R.P. [Oak Ridge National Lab., TN (United States); Barthold, W.P. [Barthold Associates, Inc., Knoxville, TN (United States)

    1992-07-01T23:59:59.000Z

    Modular High-Temperature Gas-Cooled Reactor (MHTGR) concepts that house the reactor vessel in a tight but unsealed reactor building place heightened importance on the reliability of the fuel particle coatings as fission product barriers. Though accident consequence analyses continue to show favorable results, the increased dependence on one type of barrier, in addition to a number of other factors, has caused the Nuclear Regulatory Commission (NRC) to consider conservative assumptions regarding fuel behavior. For this purpose, the concept termed ``weak fuel`` has been proposed on an interim basis. ``Weak fuel`` is a penalty imposed on consequence analyses whereby the fuel is assumed to respond less favorably to environmental conditions than predicted by behavioral models. The rationale for adopting this penalty, as well as conditions that would permit its reduction or elimination, are examined in this report. The evaluation includes an examination of possible fuel-manufacturing defects, quality-control procedures for defect detection, and the mechanisms by which fuel defects may lead to failure.

  10. Review of nuclear power plant offsite power source reliability and related recommended changes to the NRC rules and regulations

    SciTech Connect (OSTI)

    Battle, R.E.; Clark, F.H.; Reddoch, T.W.

    1980-05-01T23:59:59.000Z

    The NRC has stated its concern about the reliability of the offsite power system as the preferred emergency source and about the possible damage to a pressurized water reactor (PWR) that could result from a rapid decay of power grid frequency. ORNL contracted with NRC to provide technical assistance to establish criteria that can be used to evaluate the offsite power system for the licensing of a nuclear power plant. The results of many of the studies for this contract are recommendations to assess and control the power grid during operation. This is because most of the NRC regulations pertaining to the offsite power system are related to the design of the power grid, and we believe that additional emphasis on monitoring the power grid operation will improve the reliability of the nuclear plant offsite power supply. 46 refs., 10 figs.

  11. Java Parallel Secure Stream for Grid Computing

    SciTech Connect (OSTI)

    Chen, Jie; Akers, Walter; Chen, Ying; Watson, William

    2001-09-01T23:59:59.000Z

    The emergence of high speed wide area networks makes grid computing a reality. However grid applications that need reliable data transfer still have difficulties to achieve optimal TCP performance due to network tuning of TCP window size to improve the bandwidth and to reduce latency on a high speed wide area network. This paper presents a pure Java package called JPARSS (Java Par-allel Secure Stream) that divides data into partitions that are sent over several parallel Java streams simultaneously and allows Java or Web applications to achieve optimal TCP performance in a gird environment without the necessity of tuning the TCP window size. Several experimental results are provided to show that using parallel stream is more effective than tuning TCP window size. In addi-tion X.509 certificate based single sign-on mechanism and SSL based connection establishment are integrated into this package. Finally a few applications using this package will be discussed.

  12. Nevada National Security Site Groundwater Program

    ScienceCinema (OSTI)

    None

    2014-10-28T23:59:59.000Z

    From 1951 to 1992, the Unites States government conducted 828 underground nuclear tests at the Nevada National Security Site. About one-third of these tests occurred near, below or within the water table - the very top portion of the groundwater layer where rock and soil are completely saturated with water. As a result, some groundwater was contaminated. The U.S. Department of Energy (DOE) began exploring the effects of groundwater contamination in the 1970s. Though contamination from underground testing has never been detected on public land, the DOE was committed to developing an advanced, reliable monitoring network that ensures the long-term protection of the public. An intensive groundwater investigation program was launched in 1989.

  13. Using a Secure Mobile Object Kernel as Operating System on Embedded Devices to

    E-Print Network [OSTI]

    Binder, Walter

    Upload of Applications Walter Binder and Bal´azs Lichtl CoCo Software Engineering GmbH Margaretenstr. 22 and maintenance. The autonomous station relies on resource accounting and control in order to prevent an overuse of the design and architecture of an autonomous station, which is able to securely and reliably execute

  14. ME 379M-Nuclear Safety and Security ABET EC2000 syllabus

    E-Print Network [OSTI]

    Ben-Yakar, Adela

    ME 379M- Nuclear Safety and Security Page 1 ABET EC2000 syllabus ME 379M Nuclear Safety assessment models and nuclear non-proliferation. Failure classifications, failure modes, effects, and criticality analysis (FMECA), fault and event trees, reliability block diagrams. Specific areas from the code

  15. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

    2005-09-01T23:59:59.000Z

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  16. Software Reliability Cases: The Bridge Between Hardware, Software and System Safety and Reliability

    SciTech Connect (OSTI)

    Herrmann, D.S.; Peercy, D.E.

    1999-01-08T23:59:59.000Z

    High integrity/high consequence systems must be safe and reliable; hence it is only logical that both software safety and software reliability cases should be developed. Risk assessments in safety cases evaluate the severity of the consequences of a hazard and the likelihood of it occurring. The likelihood is directly related to system and software reliability predictions. Software reliability cases, as promoted by SAE JA 1002 and 1003, provide a practical approach to bridge the gap between hardware reliability, software reliability, and system safety and reliability by using a common methodology and information structure. They also facilitate early insight into whether or not a project is on track for meeting stated safety and reliability goals, while facilitating an informed assessment by regulatory and/or contractual authorities.

  17. Fundamental mechanisms of micromachine reliability

    SciTech Connect (OSTI)

    DE BOER,MAARTEN P.; SNIEGOWSKI,JEFFRY J.; KNAPP,JAMES A.; REDMOND,JAMES M.; MICHALSKE,TERRY A.; MAYER,THOMAS K.

    2000-01-01T23:59:59.000Z

    Due to extreme surface to volume ratios, adhesion and friction are critical properties for reliability of Microelectromechanical Systems (MEMS), but are not well understood. In this LDRD the authors established test structures, metrology and numerical modeling to conduct studies on adhesion and friction in MEMS. They then concentrated on measuring the effect of environment on MEMS adhesion. Polycrystalline silicon (polysilicon) is the primary material of interest in MEMS because of its integrated circuit process compatibility, low stress, high strength and conformal deposition nature. A plethora of useful micromachined device concepts have been demonstrated using Sandia National Laboratories' sophisticated in-house capabilities. One drawback to polysilicon is that in air the surface oxidizes, is high energy and is hydrophilic (i.e., it wets easily). This can lead to catastrophic failure because surface forces can cause MEMS parts that are brought into contact to adhere rather than perform their intended function. A fundamental concern is how environmental constituents such as water will affect adhesion energies in MEMS. The authors first demonstrated an accurate method to measure adhesion as reported in Chapter 1. In Chapter 2 through 5, they then studied the effect of water on adhesion depending on the surface condition (hydrophilic or hydrophobic). As described in Chapter 2, they find that adhesion energy of hydrophilic MEMS surfaces is high and increases exponentially with relative humidity (RH). Surface roughness is the controlling mechanism for this relationship. Adhesion can be reduced by several orders of magnitude by silane coupling agents applied via solution processing. They decrease the surface energy and render the surface hydrophobic (i.e. does not wet easily). However, only a molecular monolayer coats the surface. In Chapters 3-5 the authors map out the extent to which the monolayer reduces adhesion versus RH. They find that adhesion is independent of RH up to a threshold value, depending on the coating chemistry. The mechanism for the adhesion increase beyond this threshold value is that the coupling agent reconfigures from a surface to a bulk phase (Chapter 3). To investigate the details of how the adhesion increase occurs, the authors developed the mechanics for adhesion hysteresis measurements. These revealed that near-crack tip compression is the underlying cause of the adhesion increase (Chapter 4). A vacuum deposition chamber for silane coupling agent deposition was constructed. Results indicate that vapor deposited coatings are less susceptible to degradation at high RH (Chapter 5). To address issues relating to surfaces in relative motion, a new test structure to measure friction was developed. In contrast to other surface micromachined friction test structures, uniform apparent pressure is applied in the frictional contact zone (Chapter 6). The test structure will enable friction studies over a large pressure and dynamic range. In this LDRD project, the authors established an infrastructure for MEMS adhesion and friction metrology. They then characterized in detail the performance of hydrophilic and hydrophobic films under humid conditions, and determined mechanisms which limit this performance. These studies contribute to a fundamental understanding for MEMS reliability design rules. They also provide valuable data for MEMS packaging requirements.

  18. Senior Advisor for Cyber Security

    Broader source: Energy.gov [DOE]

    The mission of the Office of Electricity and Delivery and Energy Reliability (OE) is to lead national efforts to modernize the electric grid; increase grid capacity and reliability; improve energy...

  19. Demand Response and Electric Grid Reliability

    E-Print Network [OSTI]

    Wattles, P.

    2012-01-01T23:59:59.000Z

    Demand Response and Electric Grid Reliability Paul Wattles Senior Analyst, Market Design & Development, ERCOT CATEE Conference, Galveston October 10, 2012 2 North American Bulk Power Grids CATEE Conference October 10, 2012 ? The ERCOT... adequacy ? ?Achieving more DR participation would . . . displace some generation investments, but would achieve the same level of reliability... ? ?Achieving this ideal requires widespread demand response and market structures that enable loads...

  20. Wind Energy Facility Reliability and Maintenance

    E-Print Network [OSTI]

    Ding, Yu

    Wind Energy Facility Reliability and Maintenance Eunshin Byon, Lewis Ntaimo, Chanan Singh and Yu related to wind energy facility reliability and mainte- nance focused more on qualitative aspects. In this chapter, we provide a comprehensive account of the existing research regarding wind energy facility

  1. Probabilistic Reliable Message Transmission Subodh Kumar

    E-Print Network [OSTI]

    North Carolina at Chapel Hill, University of

    Probabilistic Reliable Message Transmission Subodh Kumar January 17, 1996 Abstract Most communication systems require reliable transmission of a sequence of messages over a physical network which can with messages by the sender and they are acknowledged by the receiver. It is known that protocols that use

  2. Advances in Safety, Reliability and Risk Management -Proceedings of the European Safety and Reliability Conference, ESREL 2011 -European Safety and Reliability Conference: Advances in Safety, Reliability and

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Advances in Safety, Reliability and Risk Management - Proceedings of the European Safety, Reliability and Risk Management, ESREL 2011, Troyes : France (2011) In France, more than 99% of failed is global risk management. This allows analysis of the major risks faced by the busi- ness (loss

  3. Engineering Reliability into Web Sites: Google SRE

    E-Print Network [OSTI]

    Tomkins, Andrew

    Engineering Reliability into Web Sites: Google SRE Alex Perry alex.perry@google.com Santa Monica SRE, Google #12;Abstract This talk introduces Site Reliability Engineering (SRE) at Google, explaining team responsibilities by site Failures and instability consuming manpower Engineering being applied

  4. : : ". RSST I Lunar Day Counter Reliability Analysis

    E-Print Network [OSTI]

    Rathbun, Julie A.

    : : ". RSST I Lunar Day Counter Reliability Analysis NO. ATM 846 PAGE 1 REV. MO. OF 10 DATE 12/3/69 This ATM presents a Reliability analysis of the Lunar Day Counter, the Resettable Solid State Timer (RSST equipment. The analysis is based on a parts count, average failure rates and two (2) years operation

  5. NISTIR 7817 A Credential Reliability and

    E-Print Network [OSTI]

    NISTIR 7817 A Credential Reliability and Revocation Model for Federated Identities Hildegard Ferraiolo http://dx.doi.org/10.6028/NIST.IR.7817 #12;NISTIR 7817 A Credential Reliability and Revocation Interagency Report 7817 22 pages (Nov. 2012) Certain commercial entities, equipment, or materials may

  6. Reliable Distributed Computing for Decision Support Systems

    E-Print Network [OSTI]

    Bargiela, Andrzej

    Reliable Distributed Computing for Decision Support Systems Taha Osman, Andrzej Bargiela Department of application tasks on the currently avail- able computing nodes. Distributed Systems Reliability Due decision-support systems such as water distribution net- works, involving hundreds or even thousands

  7. Reliability of underwater hearing thresholds in pinnipeds

    E-Print Network [OSTI]

    Reichmuth, Colleen

    Reliability of underwater hearing thresholds in pinnipeds Brandon L. Southall Long Marine and certain testing parameters (e.g., equipment and research personnel), measured underwater hearing (0.2­6.4 kHz). These data address the reliability of acoustic signal detection measurements over time

  8. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  9. Cyber Security & Smart Grid 

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01T23:59:59.000Z

    to complexity, proprietary nature and different management teams ? Ripe for exploitation ? Intel, Microsoft, Security vendors are not focused on this technology ? Many are NOT PC?s ? Many can be infected and the devices cannot be cleaned ESL-KT-11...-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Inherent Vulnerabilities ? Two-way communications ? Distributed connectivity ? Customer usage data ? Metering devices ? Weak authentication and access control ? Lack of adequate training ? Lack...

  10. Perceptions of Security

    E-Print Network [OSTI]

    Ura, Karma

    2001-01-01T23:59:59.000Z

    followed by guerrillas, waged by the Bhutanese militia in rugged terrain. Though not written in accounts of any battles, the form of war oral sources describe suggest unconventional warfare. The natural defence position of the terrain combined with its... nor poverty in the areas adjacent to Bhutan, which are the ultimate causes of the current security problems Bhutan faces, are unfortunately on decline. Journal of Bhutan Studies 136 On the other hand, Bhutan, like several small states, has been...

  11. Security, Safety and Health

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring

  12. NREL's Gearbox Reliability Collaborative leads to wind turbine gearbox reliability, lowering the cost of energy.

    E-Print Network [OSTI]

    the cost of energy. Unintended gearbox failures have a significant impact on the cost of wind farm will result in increased gearbox reliability and an overall reduction in the cost of wind energy. ProjectNREL's Gearbox Reliability Collaborative leads to wind turbine gearbox reliability, lowering

  13. Information Security Management System for Microsoft's Cloud Infrastructure

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Information Security Management System for Microsoft's Cloud Infrastructure Online Services ......................................................................................................................................................................................1 Information Security Management System.......................................................................................................................7 Information Security Management Forum

  14. Reliability and the Federal Energy Regulatory Commission

    Broader source: Energy.gov [DOE]

    Presentation—given at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meeting—covers the Federal Energy Regulatory Commission (FERC) strategic plan, the Federal Power Act (FPA), current energy security posture, and more.

  15. ORNL's Alumina-forming Austenitic Alloys Licensed to Carpenter Technology

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's Possible for Renewable Energy:Nanowire3627Homeland SecurityJonathanmaterial |andin theFred

  16. Implementing Information Security and Its Technology: A Line Management Perspective

    E-Print Network [OSTI]

    Barletta, William A.

    2005-01-01T23:59:59.000Z

    of an integrated information security and privacy program.An institution's information security program forms thefrom the chief information security officer, chief security

  17. 2014 Headquarters Facilities Master Security Plan - Chapter 8...

    Office of Environmental Management (EM)

    8, Operations Security Program 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program June 2014 2014 Headquarters Facilities Master Security...

  18. 2014 Headquarters Facilities Master Security Plan - Chapter 14...

    Office of Environmental Management (EM)

    4, Cyber Security 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

  19. 2014 Headquarters Facilities Master Security Plan - Chapter 1...

    Office of Environmental Management (EM)

    , Physical Security 2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 1,...

  20. 2014 Headquarters Facilities Master Security Plan - Chapter 10...

    Office of Environmental Management (EM)

    0, Security Awareness Program 2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program June 2014 2014 Headquarters Facilities Master Security Plan...