Powered by Deep Web Technologies
Note: This page contains sample records for the topic "remote access services" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

REMOTE ACCESS SERVICES | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

REMOTE ACCESS SERVICES REMOTE ACCESS SERVICES REMOTE ACCESS SERVICES Access the information you need... Anywhere. Anytime. Different service providers within the Department offer remote access services based on your specific work requirements. If you need assistance, please contact your individual service provider. Energy IT Services (EITS) Remote Access Services Outlook Web Access RSA Token Login RSA Token Instructions HSPD-12 Login HSPD-12 Badge Instructions Virtual Private Network Instructions Citrix Workplace Instructions Energy Information Administration (EIA) Remote Access Services Outlook Web Access EIA VPN Office of Intelligence and Counterintelligence (IN) Remote Access Services Outlook Web Access Office of Science (SC) Remote Access Services Citrix Workplace Help for EITS Customers

2

Remote Access to Brookhaven, Information Services Division (ISD),  

NLE Websites -- All DOE Office Websites (Extended Search)

ISD Homepage ISD Homepage Site Details ISD Staff Remote Access Other Information BNL Site Index Can't View PDFs? Remote Access to Brookhaven External BNL users who need internet access to the internal ISD website which includes the Research Library, Records Management, Publications and Technical Editing must have a Virtual Private Network (VPN) account to connect to the BNL Internal Campus Network. This account can be setup by the Accounts Management Office. Available Options Remote Access Policy Broad-Band Connection: must use VPN with a CryptoCard Token Anti-Virus Procedures All Windows PCs should be running one of Brookhaven's official anti-virus software packages when connecting remotely to the BNL Internal Campus Network. Anti-Virus procedures are an important component of BNL's host-based security architecture. Anti-Virus software is the component of this architecture that provides a protection mechanism against malicious code. Malicious codes are programs, such as Trojan horses or viruses, that run on a host system without the authorization of the system user. These codes typically come from e-mail attachments, or can be downloaded along with programs from the Internet, or through an infected floppy disk. Properly installed anti-virus software can minimize these vulnerabilities.

3

Remote information service access system based on a client-server-service model  

DOE Patents (OSTI)

A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user`s local host, thereby providing ease of use and minimal software maintenance for users of that remote service. 16 figs.

Konrad, A.M.

1996-08-06T23:59:59.000Z

4

Remote information service access system based on a client-server-service model  

DOE Patents (OSTI)

A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user`s local host, thereby providing ease of use and minimal software maintenance for users of that remote service. 16 figs.

Konrad, A.M.

1997-12-09T23:59:59.000Z

5

Remote Access of Computer Controlled Experiments.  

E-Print Network (OSTI)

??In this paper, we present a way for students to access and operate laboratory equipment, controlled by a laboratory computer via a remote access program.… (more)

Nilsson, Kristian; Zackrisson, Johan

2008-01-01T23:59:59.000Z

6

Substation Security and Remote Access Implementation Strategies  

Science Conference Proceedings (OSTI)

This project analyzed control system remote access solutions in a side-by-side comparison. Five systems were lab-tested against common functions used by utilities to access and manage electronic control systems. The five vendors’ products met the basic remote access requirements tested.BackgroundElectronic control systems that actuate protective equipment and physical operations in the ...

2012-12-20T23:59:59.000Z

7

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary...

8

Guidelines for Handling Confidential Information by Remote Access  

E-Print Network (OSTI)

Guidelines for Handling Confidential Information by Remote Access You have signed an OHSU of your access to OHSU electronic information and/or other sanctions. Remember, using remote access of the OHSU facilities. When you are utilizing remote access, you must provide the same level of security used

Chapman, Michael S.

9

T-606: Sun Java System Access Manager Lets Remote Users Partially...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

06: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote...

10

Remote Access to the BNL Network, Cyber Security, Information Technology  

NLE Websites -- All DOE Office Websites (Extended Search)

Virtual Private Network (VPN) Virtual Private Network (VPN) at Brookhaven CryptoCard tokens (hard or soft) will not supported after December 31, 2010. Please switch to RSA SecurID tokens as soon as possible. Contact the ITD Helpdesk at x5522 (631-344-5522) or send an email to itdhelp@bnl.gov if you have questions or concerns. The VPN service allows remote users to securely access the Brookhaven internal network through their own personal Internet Service Provider, so that it appears as if their home computer is right on the BNL internal network. Requirements Some form of internet connectivity. Only BNL employees can access this service. You must have a RSA SecurID token. Desktop VPN Client Clientless VPN Obtain a RSA SecurID Token RSA SecurID User Guide Last Modified: September 23, 2013

11

V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Service Manager Unspecified Flaw Lets Remote Users Gain 8: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access August 15, 2013 - 1:30am Addthis PROBLEM: A potential security vulnerability has been identified with HP Service Manager. The vulnerability could be exploited to allow remote unauthenticated access and elevation of privilege. PLATFORM: HP Service Manager v9.31, v9.30, v9.21, v7.11, v6.2.8 ABSTRACT: The vulnerabilities are reported in versions 9.31 and prior. REFERENCE LINKS: SecurityTracker Alert ID: 1028912 CVE-2013-4808 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in HP Service Manager. A remote user can gain unauthorized access on the target system. IMPACT: User access via network

12

V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Service Manager Unspecified Flaw Lets Remote Users Gain 8: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access August 15, 2013 - 1:30am Addthis PROBLEM: A potential security vulnerability has been identified with HP Service Manager. The vulnerability could be exploited to allow remote unauthenticated access and elevation of privilege. PLATFORM: HP Service Manager v9.31, v9.30, v9.21, v7.11, v6.2.8 ABSTRACT: The vulnerabilities are reported in versions 9.31 and prior. REFERENCE LINKS: SecurityTracker Alert ID: 1028912 CVE-2013-4808 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in HP Service Manager. A remote user can gain unauthorized access on the target system. IMPACT: User access via network

13

Definition: Remote Service Switch | Open Energy Information  

Open Energy Info (EERE)

Service Switch Service Switch Jump to: navigation, search Dictionary.png Remote Service Switch A power switch within a smart meter that allows a utility to turn electrical service to a residential customer premise on or off. The switch is remotely operated from the utility using the AMI communications infrastructure. This feature is limited to residential meters providing 200 amp service or less, and allows a utility to quickly switch service without having to roll a service truck. This can be particularly useful for reducing service time and associated costs for establishing or terminating services for move-ins/move-outs, or for switching off service for safety reasons.[1] Related Terms advanced metering infrastructure References ↑ https://www.smartgrid.gov/category/technology/remote_service_switch

14

U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote 29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access November 8, 2011 - 8:00am Addthis PROBLEM: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access. PLATFORM: HP TCP/IP Services for OpenVMS v5.6 and v5.7 on iTanium and ALPHA Servers. ABSTRACT: A remote user can gain unauthorized access reference LINKS: HP Support document ID: c01908983 SecurityTracker Alert ID: 1026279 CVE-2011-3168 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in TCP/IP Services for OpenVMS. A remote user can gain unauthorized access. On systems running POP or IMAP servers, a remote user can gain unauthorized access.

15

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

16

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

17

The iLab service broker : a software infrastructure providing common services in support of Internet accessible laboratories  

E-Print Network (OSTI)

Remote laboratories that are accessible via the Internet are becoming a common phenomenon in higher education institutions. This thesis describes the iLab Service Broker architecture, a software infrastructure that supports ...

Yehia, Karim Y., 1980-

2004-01-01T23:59:59.000Z

18

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: RSA Access Manager Session Replay Flaw Lets Remote Users 5: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

19

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

205: RSA Access Manager Session Replay Flaw Lets Remote Users 205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

20

A SOAP Web Service for accessing MODIS land product subsets  

Science Conference Proceedings (OSTI)

Remote sensing data from satellites have provided valuable information on the state of the earth for several decades. Since March 2000, the Moderate Resolution Imaging Spectroradiometer (MODIS) sensor on board NASA s Terra and Aqua satellites have been providing estimates of several land parameters useful in understanding earth system processes at global, continental, and regional scales. However, the HDF-EOS file format, specialized software needed to process the HDF-EOS files, data volume, and the high spatial and temporal resolution of MODIS data make it difficult for users wanting to extract small but valuable amounts of information from the MODIS record. To overcome this usability issue, the NASA-funded Distributed Active Archive Center (DAAC) for Biogeochemical Dynamics at Oak Ridge National Laboratory (ORNL) developed a Web service that provides subsets of MODIS land products using Simple Object Access Protocol (SOAP). The ORNL DAAC MODIS subsetting Web service is a unique way of serving satellite data that exploits a fairly established and popular Internet protocol to allow users access to massive amounts of remote sensing data. The Web service provides MODIS land product subsets up to 201 x 201 km in a non-proprietary comma delimited text file format. Users can programmatically query the Web service to extract MODIS land parameters for real time data integration into models, decision support tools or connect to workflow software. Information regarding the MODIS SOAP subsetting Web service is available on the World Wide Web (WWW) at http://daac.ornl.gov/modiswebservice.

SanthanaVannan, Suresh K [ORNL; Cook, Robert B [ORNL; Pan, Jerry Yun [ORNL; Wilson, Bruce E [ORNL

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "remote access services" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Remote I/O : fast access to distant storage.  

SciTech Connect

As high-speed networks make it easier to use distributed resources, it becomes increasingly common that applications and their data are not colocated. Users have traditionally addressed this problem by manually staging data to and from remote computers. We argue instead for a new remote I/O paradigm in which programs use familiar parallel I/O interfaces to access remote file systems. In addition to simplifying remote execution, remote I/O can improve performance relative to staging by overlapping computation and data transfer or by reducing communication requirements. However, remote I/O also introduces new technical challenges in the areas of portability, performance, and integration with distributed computing systems. We propose techniques designed to address these challenges and describe a remote I/O library called RIO that we have developed to evaluate the effectiveness of these techniques. RIO addresses issues of portability by adopting the quasi-standard MPI-IO interface and by defining a RIO device and RIO server within the ADIO abstract I/O device architecture. It addresses performance issues by providing traditional I/O optimizations such as asynchronous operations and through implementation techniques such as buffering and message forwarding to off load communication overheads. RIO uses the Nexus communication library to obtain access to configuration and security mechanisms provided by the Globus wide area computing tool kit. Microbenchmarks and application experiments demonstrate that our techniques achieve acceptable performance in most situations and can improve turnaround time relative to staging.

Foster, I.; Kohr, D., Jr.; Krishnaiyer, R.; Mogill, J.

1997-12-17T23:59:59.000Z

22

Coastal Underwater Field Observer with Remote IP Access  

E-Print Network (OSTI)

Coastal Underwater Field Observer with Remote IP Access Joe Wilinski, Aaron Ganick, Alexander with continuous use of batteries. Costal Underwater Field Observer 9/16/09 #12;Boston University Slideshow Title? Wide angle Zoom Costal Underwater Field Observer #12;Boston University Slideshow Title Goes Here

Goldberg, Bennett

23

Minimizing Remote Accesses in MapReduce Clusters  

Science Conference Proceedings (OSTI)

MapReduce, in particular Hadoop, is a popular framework for the distributed processing of large datasets on clusters of relatively inexpensive servers. Although Hadoop clusters are highly scalable and ensure data availability in the face of server failures, ... Keywords: MapReduce, Hadoop, remote accesses, data placement

Prateek Tandon, Michael J. Cafarella, Thomas F. Wenisch

2013-05-01T23:59:59.000Z

24

Remote access to the workstations: For Microsoft Windows Users  

E-Print Network (OSTI)

Remote access to the workstations: For Microsoft Windows Users: 1. Install the following" for a workstation you want to connect to. It will launch a new browser window that will load a VNC Java applet will be asked first to enter it before the applet loads. The applet opens a Java application window, please

Keinan, Alon

25

T-606: Sun Java System Access Manager Lets Remote Users Partially Modify  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

06: Sun Java System Access Manager Lets Remote Users Partially 06: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data April 20, 2011 - 3:58am Addthis PROBLEM: Two vulnerabilities were reported in Sun Java System Access Manager. A remote authenticated user can partially access data on the target system. A remote user can partially modify data on the target system. PLATFORM: Sun Java versions 7.1, 8.0 ABSTRACT: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data. reference LINKS: SecurityTracker Alert ID: 1025408 CVE-2011-0844 CVE-2011-0847 Oracle Critical Patch Update Advisory

26

U-201: HP System Management Homepage Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP System Management Homepage Bugs Let Remote Users Deny 1: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in HP System Management Homepage. PLATFORM: Version(s): prior to 7.1.1 ABSTRACT: The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code. Reference links: Original Advisory Security Tracker ID 1027209 CVE-2012-2012, CVE-2012-2013, CVE-2012-2014 CVE-2012-2015, CVE-2012-2016 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP System Management Homepage. A remote authenticated user can gain elevated privileges. A remote authenticated

27

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny 3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access June 21, 2013 - 6:00am Addthis PROBLEM: Three vulnerabilities were reported in Cisco TelePresence TC and TE PLATFORM: The following product models are affected by the vulnerabilities: Cisco TelePresence MX Series Cisco TelePresence System EX Series Cisco TelePresence Integrator C Series Cisco TelePresence Profiles Series running Cisco TelePresence Quick Set Series Cisco IP Video Phone E20 ABSTRACT: Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an

28

T-616: PHP Stream Component Remote Denial of Service Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: PHP Stream Component Remote Denial of Service Vulnerability 6: PHP Stream Component Remote Denial of Service Vulnerability T-616: PHP Stream Component Remote Denial of Service Vulnerability May 5, 2011 - 12:59am Addthis PROBLEM: PHP Stream Component Remote Denial of Service Vulnerability PLATFORM: Ubuntu Linux PHP MandrakeSoft Corporate Server MandrakeSoft Enterprise Server MandrakeSoft Linux Mandrake ABSTRACT: PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable. reference LINKS: SecurityFocus IMPACT ASSESSMENT: Medium Discussion: PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this

29

U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Citrix Provisioning Services Unspecified Flaw Lets Remote 1: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code May 3, 2012 - 7:00am Addthis PROBLEM: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: 6.1 and prior ABSTRACT: A vulnerability was reported in Citrix Provisioning Services. A remote user can execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1027004 Secunia Advisory SA48971 Citrix advisory IMPACT ASSESSMENT: Medium Discussion: A remote user can send a specially crafted packet to trigger an unspecified flaw and execute arbitrary code on the target system. The code will run with the privileges of the target service.

30

T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41: Citrix Provisioning Services Unspecified Flaw Let's Remote 41: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code January 24, 2011 - 5:34pm Addthis PROBLEM: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code PLATFORM: * Provisioning Services 5.1 * Provisioning Services 5.6 ABSTRACT: A vulnerability has been identified in Citrix Provisioning Services that could result in arbitrary code execution. This vulnerability can be triggered by an attacker sending a specially crafted packet to the Provisioning Services server. This vulnerability is present in all supported versions of Citrix Provisioning Services up to and including version 5.6. reference LINKS:

31

Establishing a Secure Data Center with Remote Access: Preprint  

DOE Green Energy (OSTI)

Access to existing travel data is critical for many analysis efforts that lack the time or resources to support detailed data collection. High-resolution data sets provide particular value, but also present a challenge for preserving the anonymity of the original survey participants. To address this dilemma of providing data access while preserving privacy, the National Renewable Energy Laboratory and the U.S. Department of Transportation have launched the Transportation Secure Data Center (TSDC). TSDC data sets include those from regional travel surveys and studies that increasingly use global positioning system devices. Data provided by different collecting agencies varies with respect to formatting, elements included and level of processing conducted in support of the original purpose. The TSDC relies on a number of geospatial and other analysis tools to ensure data quality and to generate useful information outputs. TSDC users can access the processed data in two different ways. The first is by downloading summary results and second-by-second vehicle speed profiles (with latitude/longitude information removed) from a publicly-accessible website. The second method involves applying for a remote connection account to a controlled-access environment where spatial analysis can be conducted, but raw data cannot be removed.

Gonder, J.; Burton, E.; Murakami, E.

2012-04-01T23:59:59.000Z

32

U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apache mod_proxy Pattern Matching Bug Lets Remote Users 5: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6, 2011 - 9:30am Addthis PROBLEM: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers. PLATFORM: Apache HTTP Server 1.3.x, 2.2.21 and prior versions ABSTRACT: A remote user can access internal servers. reference LINKS: The Apache HTTP Server Project SecurityTracker Alert ID: 1026144 CVE-2011-3368 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache mod_proxy. A remote user can access internal servers. When this system is configured in reverse proxy mode and uses the RewriteRule or ProxyPassMatch directives with a pattern match, a remote user can send a specially crafted request to access internal

33

ACConv -- An Access Control Model for Conversational Web Services  

Science Conference Proceedings (OSTI)

With organizations increasingly depending on Web services to build complex applications, security and privacy concerns including the protection of access control policies are becoming a serious issue. Ideally, service providers would like to make sure ... Keywords: Web services, access control, conversations

Federica Paci; Massimo Mecella; Mourad Ouzzani; Elisa Bertino

2011-07-01T23:59:59.000Z

34

Definition: Open Access Same Time Information Service | Open Energy  

Open Energy Info (EERE)

Access Same Time Information Service Access Same Time Information Service Jump to: navigation, search Dictionary.png Open Access Same Time Information Service An electronic posting system that the Transmission Service Provider maintains for transmission access data and that allows all transmission customers to view the data simultaneously.[1] View on Wikipedia Wikipedia Definition Also Known As Open Access Same-Time Information System (OASIS) Related Terms transmission lines, transmission Service Provider, system, electricity generation, transmission line References ↑ Glossary of Terms Used in Reliability Standards An inli LikeLike UnlikeLike You like this.Sign Up to see what your friends like. ne Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Open_Access_Same_Time_Information_Service&oldid=480308"

35

Using Microfinance to Expand Access to Energy Services | Open Energy  

Open Energy Info (EERE)

Using Microfinance to Expand Access to Energy Services Using Microfinance to Expand Access to Energy Services Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Using Microfinance to Expand Access to Energy Services Agency/Company /Organization: United States Agency for International Development Sector: Energy Focus Area: Renewable Energy Topics: Co-benefits assessment, - Energy Access, Finance Resource Type: Case studies/examples, Lessons learned/best practices, Publications Website: waterwiki.net/images/6/65/File_Energy_Summary_FINAL.pdf Language: English References: Using Microfinance to Expand Access to Energy Services[1] Logo: Using Microfinance to Expand Access to Energy Services "To carry out this research, SES and the SEEP Network invited MFIs in Africa, Asia, Latin America and the Caribbean (LAC) to participate in an

36

U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: WebCalendar Access Control and File Inclusion Bugs Let 5: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code April 25, 2012 - 7:00am Addthis PROBLEM: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code PLATFORM: 1.2.4 and prior versions ABSTRACT: Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system. reference links: SecurityTracker Alert ID: 1026966 CVE-2012-1495 CVE-2012-1496 IMPACT ASSESSMENT: Medium Discussion: A remote user can access '/install/index.php' to potentially modify '/includes/settings/' with arbitrary values or PHP code. A remote

37

Remote Sensing Open Access Journal: Leading a New Paradigm in Publishing  

E-Print Network (OSTI)

Remote Sensing is a pathfinding open access journal providing great opportunities for the growing community of remote sensing and geoscience scientists and practitioners to publish high quality research and practical papers expeditiously. It is a journal keeping up with the changing times we live in: open access, instant access, free access, and global access from whichever precise latitude and longitude you live in on the planet Earth or for that matter anywhere in space as long as we have internet access! So, open access journals are breaking many paradigms and setting forth new ones that will soon become the norm as we advance into the twenty-first century. The days of inordinate delays in publishing good science research articles are fast disappearing with open access journals. In remote sensing and geoscience, Remote Sensing

Prasad S. Thenkabail

2011-01-01T23:59:59.000Z

38

Optimisation and performance evaluation of mechanisms for latency tolerance in remote memory access communication on clusters  

Science Conference Proceedings (OSTI)

This paper describes the design and performance evaluation of the mechanisms for latency tolerance in the remote memory access communication on clusters equipped with high-performance networks such as Myrinet. It discusses strategies that bridge ... Keywords: aggregation, cluster computing, communication overlap, latency tolerance, non-blocking, remote memory access

J. Nieplocha; V. Tipparaju; M. Krishnan; G. Santhanaraman; D. K. Panda

2004-03-01T23:59:59.000Z

39

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

42: HP Onboard Administrator Bugs Let Remote Users Gain Access, 42: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

40

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Onboard Administrator Bugs Let Remote Users Gain Access, 2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

Note: This page contains sample records for the topic "remote access services" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote 9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code May 6, 2013 - 12:07am Addthis PROBLEM: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. REFERENCE LINKS: SecurityTracker Alert ID: 1028514 Microsoft Security Advisory (2847140) CVE-2013-1347 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will access and object that has been deleted or not properly allocated and execute arbitrary code on the target system. The code will run with the privileges of the target user.

42

V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Adobe ColdFusion Bugs Let Remote Users Gain Access and 3: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information January 7, 2013 - 1:00am Addthis PROBLEM: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information PLATFORM: ColdFusion 10, 9.0.2, 9.0.1 and 9.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe has identified three vulnerabilities affecting ColdFusion for Windows, Macintosh and UNIX REFERENCE LINKS: Adobe Security Bulletin APSA13-01 SecurityTracker Alert ID: 1027938 CVE-2013-0625 CVE-2013-0629 CVE-2013-0631 IMPACT ASSESSMENT: High DISCUSSION: A remote user can bypass authentication and take control of the target system [CVE-2013-0625]. Systems with password protection disabled or with no password set are affected.

43

Towards a task oriented method for accessing network based services  

Science Conference Proceedings (OSTI)

Today's networked users are required to configure a number of different network settings on their computer in order to access specific network based services. For example, these users need to know whether to enable a Virtual Private Network (VPN) tunnel ... Keywords: borderless networks, flyout, identity based networking, network access, network security, networking, user credentials, user interface, virtual private network

Nils Pedersen; Paul Clark; Martine Freiberger

2010-11-01T23:59:59.000Z

44

Reducing rural poverty through increased access to energy services: a  

Open Energy Info (EERE)

Reducing rural poverty through increased access to energy services: a Reducing rural poverty through increased access to energy services: a review of the multifunctional platform project in Mali Jump to: navigation, search Tool Summary Name: Reducing rural poverty through increased access to energy services: a review of the multifunctional platform project in Mali Agency/Company /Organization: Abeeku Brew-Hammond & Anna Crole-Rees Partner: United Nations Development Programme (UNDP) Sector: Energy Focus Area: Renewable Energy, Non-renewable Energy, Energy Efficiency, People and Policy Phase: Create a Vision, Determine Baseline, Develop Goals, Evaluate Effectiveness and Revise as Needed Topics: Co-benefits assessment, - Energy Access Resource Type: Publications User Interface: Website Website: www.beta.undp.org/undp/en/home/librarypage/environment-energy/sustaina

45

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote 11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories July 12, 2012 - 7:00am Addthis PROBLEM: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories PLATFORM: EMC Celerra Network Server versions 6.0.36.4 through 6.0.60.2 EMC VNX versions 7.0.12.0 through 7.0.53.1 EMC VNXe 2.0 (including SP1, SP2, and SP3) EMC VNXe MR1 (including SP1, SP2, SP3, and SP3.1) EMC VNXe MR2 (including SP0.1) ABSTRACT: A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system. reference LINKS: The Vendor's Advisory

46

Nondestructive Evaluation: Remote Field Technology Assessment for Piping Inspection Including Buried and Limited Access Components  

Science Conference Proceedings (OSTI)

This document provides results for the following projects: 1. Remote Field Technology Assessment for Piping Inspection 2. Inspection Techniques and NDE for Buried and Limited-Access Components 3. Guideline Development for Above-Ground, Below-Ground, and Limited-Access Storage Vessel Inspection These projects provided the Electric Power Research Institute (EPRI) the opportunity to engage its membership and several vendors in identifying remote field technology for piping inspection and advanced NDE inspec...

2010-11-19T23:59:59.000Z

47

U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service  

Energy.gov (U.S. Department of Energy (DOE))

Two vulnerabilities were reported in EMC Data Protection Advisor. A remote user can cause denial of service conditions.

48

Remote Denial of Service Attacks and Countermeasures  

E-Print Network (OSTI)

this paper shall be assumed to be 4. The Hlen field specifies the length of the header in 32-bit words. ToS, or type of service, indicates how packets 2 should be treated based on application needs (how they should be queued, etc.). Since the Length field, which specifies the length of the entire datagram in bytes, is 16 bits, the maximum length of an IP packet is 2 --1 bytes [19]. The Identifier field, the Offset field, and one of the flags are used for handling fragmentation and reassembly. Different networks have different MTU's (maximum transmission units), meaning that maximum allowable packet sizes differ from network to network. Thus, a large packet from a network with a large MTU may need to be broken into fragments as it enters a network with a smaller MTU. The end host is responsible for reassembling the fragments. Fragments that will be reassembled into a single packet are given the same identifier. The first fragment has an offset of zero, and for the following fragments, the Offset field contains the offset in bytes from the first fragment. A flag is set in a packet to indicate that more fragments will follow [19]. Time to live (TTL) provides a way to prevent packets from floating around indefinitely in transit to their destinations. At each hop, this field is typically decremented, and the packet is discarded if the TTL field reaches zero. Since several protocols such as TCP and UDP ride on top of IP, the Protocol field is used to specify the higher level protocol to which the IP packet belongs. A checksum is performed to provide a means for determining whether or not the header has been corrupted. The source address and destination address of the packet are specified following the checksum. Options, which are not frequently used, are included at the end...

David Karig And; David Karig; Ruby Lee

2001-01-01T23:59:59.000Z

49

Nephele: Scalable Access Control for Federated File Services  

Science Conference Proceedings (OSTI)

The integration of storage resources across different administrative domains can serve as building block for the development of efficient collaboration environments. In order to improve application portability across such environments, we target data ... Keywords: Access control, Analytical evaluation, Decentralization, Distributed systems, File services, Performance measurements, Security

Giorgos Margaritis; Andromachi Hatzieleftheriou; Stergios V. Anastasiadis

2013-03-01T23:59:59.000Z

50

Improved remote access to Science Accelerator | OSTI, US Dept...  

Office of Scientific and Technical Information (OSTI)

to RSS OSTI Blog Get Widgets Get Alert Services OSTI Facebook OSTI Twitter OSTI Google+ Bookmark and Share (Link will open in a new window) Go to Videos Loading... Stop news...

51

Pitfalls of information access with visualizations in remote collaborative analysis  

Science Conference Proceedings (OSTI)

In a world of widespread information access, information can overwhelm collaborators, even with visualizations to help. We extend prior work to study the effect of shared information on collaboration. We analyzed the success and discussion process of ... Keywords: computer-mediated communication, confirmation bias, empirical studies, experiment, information overload, information sharing, information visualization

Aruna D. Balakrishnan; Susan R. Fussell; Sara Kiesler; Aniket Kittur

2010-02-01T23:59:59.000Z

52

U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

76: OpenSSL Bugs Let Remote Users Deny Service, Obtain 76: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code January 6, 2012 - 8:15am Addthis PROBLEM: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code PLATFORM: OpenSSL prior to 0.9.8s; 1.x prior to 1.0.0f ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1026485 OpenSSL Security Advisory IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in OpenSSL. A remote user can cause denial of service conditions. A remote user can obtain sensitive information. A remote user may be able to execute arbitrary code on the

53

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data August 3, 2013 - 2:37am Addthis PROBLEM: A vulnerability was reported in HP Printers. A remote user can obtain potentially sensitive information. PLATFORM: HP LaserJet Pro products ABSTRACT: A potential security vulnerability has been identified with certain HP LaserJet Pro printers. The vulnerability could be exploited remotely to gain unauthorized access to data. REFERENCE LINKS: SecurityTracker Alert ID 1028869 CVE-2013-4807 Vendor URL IMPACT ASSESSMENT: Medium DISCUSSION: The following models are affected: HP LaserJet Pro P1102w CE657A/CE658A HP LaserJet Pro P1606dn CE749A HP LaserJet Pro M1212nf MFP CE841A HP LaserJet Pro M1213nf MFP CE845A

54

Development of improved methods for remote access of DIII-D data and data analysis  

SciTech Connect

The DIII-D tokamak is a national fusion research facility. There is an increasing need to access data from remote sites in order to facilitate data analysis by collaborative researchers at remote locations, both nationally and internationally. In the past, this has usually been done by remotely logging into computers at the DIII-D site. With the advent of faster networking and powerful computers at remote sites, it is becoming possible to access and analyze data from anywhere in the world as if the remote user were actually at the DIII-D site. The general mechanism for accessing DIII-D data has always been via the PTDATA subroutine. Substantial enhancements are being made to that routine to make it more useful in a non-local environment. In particular, a caching mechanism is being built into PTDATA to make network data access more efficient. Studies are also being made of using Distributed File System (DFS) disk storage in a Distributed Computing Environment (DCE). A data server has been created that will migrate, on request, shot data from the DIII-D environment into the DFS environment.

Greene, K.L.; McHarg, B.B. Jr.

1997-11-01T23:59:59.000Z

55

V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service November 21, 2012 - 3:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10 Update 1 and above for Windows ABSTRACT: Adobe ColdFusion Denial of Service Vulnerability REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-25 SecurityTracker Alert ID: 1027787 Secunia Advisory SA51335 CVE-2012-5674 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in Adobe ColdFusion. A remote user can cause denial of service conditions. A remote user can send specially crafted data to cause unspecified denial of service conditions on the target ColdFusion service on Windows Internet

56

T-581: Novell Access Manager Java Double Literal Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

81: Novell Access Manager Java Double Literal Denial of Service 81: Novell Access Manager Java Double Literal Denial of Service Vulnerability T-581: Novell Access Manager Java Double Literal Denial of Service Vulnerability March 17, 2011 - 3:05pm Addthis PROBLEM: Novell has acknowledged a vulnerability in Novell Access Manager, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Novell Access Manager 3.1 Linux Access Gateway Novell Access Manager 3.1 Access Administration Novell Access Manager 3.1 SSLVPN Server Novell Access Manager 3.1 Windows Novell Identity Server Novell Access Manager 3.1 Linux Novell Identity Server Novell Access Manager 3.1 Java Agents ABSTRACT: Novell Access Manager Java Double Literal Denial of Service Vulnerability. reference LINKS: Secunia Advisory: SA43769 CVE-2010-4476

57

U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service 31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service August 9, 2012 - 7:00am Addthis PROBLEM: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service PLATFORM: Version(s): ASA 5500 Series; 8.2 - 8.4 ABSTRACT: Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions. reference LINKS: Release Notes for the Cisco ASA 5500 Series, 8.4(x) SecurityTracker Alert ID: 1027355 CVE-2012-2472 CVE-2012-2474 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in Cisco ASA. 1. On systems with SIP inspection enabled, a remote user can send specially crafted SIP traffic to cause the target device to create many identical

58

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code September 1, 2011 - 12:00pm Addthis PROBLEM: gtkutils.c in Pidgin before 2.10.0 on Windows allows user-assisted remote attackers to execute arbitrary programs via a file: URL in a message. PLATFORM: Pidgin before 2.10.0 on Windows ABSTRACT: Pidgin bugs let remote users deny service and potentially execute arbitrary code. reference LINKS: CVE-2011-3185 CVE-2011-2943 CVE-2011-3184 SecurityTracker Alert ID: 1025961 Pidgin Security Advisories IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Pidgin. A remote user can cause denial of service conditions. A remote user can cause arbitrary code to be

59

Remote access of electronic resources for thermal plant using mobile devices  

Science Conference Proceedings (OSTI)

This paper proposes a framework that extends a typical intelligent thermal system management that enables field engineers retrieving vital resources from centralised management station using mobile devices with limited memory, such as PDAs and cell phones. ... Keywords: J2ME, PDAs, artificial intelligence, cell phones, fault diagnosis, intelligent thermal management, mobile devices, mobile phones, remote access, thermal management systems, thermal plants, thermodynamic properties

F-L. Tan; S-C. Fok

2007-11-01T23:59:59.000Z

60

Secure Safety: Secure Remote Access to Critical Safety Systems in Offshore Installations  

Science Conference Proceedings (OSTI)

Safety Instrumented Systems (SIS) as defined in IEC 61508 and IEC 61511 are very important for the safety of offshore oil & natural gas installations. SIS typically include the Emergency Shutdown System (ESD) that ensures that process systems return ... Keywords: Offshore, Process Control, Safety Instrumented Systems, Secure remote access

Martin Gilje Jaatun; Tor Olav Grøtan; Maria B. Line

2008-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "remote access services" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1  

E-Print Network (OSTI)

Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation vulnerable to cyber attack. We use graph theory to model electric power control and protection devices

Krings, Axel W.

62

V-144: HP Printers Let Remote Users Access Files on the Printer |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: HP Printers Let Remote Users Access Files on the Printer 4: HP Printers Let Remote Users Access Files on the Printer V-144: HP Printers Let Remote Users Access Files on the Printer April 29, 2013 - 12:27am Addthis PROBLEM: HP Printers Let Remote Users Access Files on the Printer PLATFORM: HP Color LaserJet 3000 Q7534A HP Color LaserJet 3800 Q5981A HP Color LaserJet 4700 Q7492A HP Color LaserJet 4730 Multifunction Printer CB480A HP Color LaserJet 4730 Multifunction Printer CB480A HP Color LaserJet 5550 Q3714A HP Color LaserJet 9500 Multifunction Printer C8549A HP Color LaserJet CM6030 Multifunction Printer CE664A HP Color LaserJet CM6040 Multifunction Printer Q3939A HP Color LaserJet CP3505 CB442A HP Color LaserJet CP3525 CC469A HP Color LaserJet CP4005 CB503A HP Color LaserJet CP6015 Q3932A HP Color LaserJet Enterprise CP4025 CC490A

63

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco Firewall Services Module Bugs Let Remote Users Execute 9: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall Services Module. reference LINKS: Cisco Advisory ID: cisco-sa-20121010-fwsm SecurityTracker Alert ID: 1027640 CVE-2012-4661 CVE-2012-4662 CVE-2012-4663 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DCERPC data through the target device to trigger a stack overflow in the DCERPC inspection engine and execute arbitrary code on the target device or cause the target device to

64

U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny 07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. PLATFORM: Nexus 1000v, 5000, and 7000 Series Switches ABSTRACT: A remote user can send a specially crafted IP packet to cause the target device to reload. reference LINKS: Cisco Advisory SecurityTracker Alert ID:1026692 CVE-2012-0352 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. A remote user can send a specially crafted IP packet to cause the target device to reload. The vulnerability occurs when the device attepts to obtain Layer 4 (e.g.,

65

U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny 72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service December 30, 2011 - 9:15am Addthis PROBLEM: Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service PLATFORM: apache Tomcat 5.5.34, 6.0.34, 7.0.22; and prior versions aBSTRACT: A remote user can cause performance to degrade on the target server. reference LINKS: Apache Tomcat Security Alert SecurityTracker Alert ID: 1026477 nruns Advisory SA-2011.004 Secunia Advisory SA47411 CVE-2011-4084 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can cause denial of service conditions. A remote user can send specially crafted POST request values to trigger hash collisions and cause significant performance

66

Web Site Offers Easy Access to Life-Saving Fire Service ...  

Science Conference Proceedings (OSTI)

Web Site Offers Easy Access to Life-Saving Fire Service Research. From NIST Tech Beat: March 18, 2008. ...

2011-07-19T23:59:59.000Z

67

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service 3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code July 26, 2013 - 3:31am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. PLATFORM: HP LoadRunner prior to 11.52 ABSTRACT: Multiple vulnerabilities were reported in HP LoadRunner. REFERENCE LINKS: Security Tracker Alert ID: 1028833 CVE-2013-2368 CVE-2013-2369 CVE-2013-2370 CVE-2013-4797 CVE-2013-4798 CVE-2013-4799 CVE-2013-4800 CVE-2013-4801 IMPACT ASSESSMENT: Medium DISCUSSION: Potential security vulnerabilities have been identified with HP LoadRunner. The vulnerabilities could be remotely exploited to allow execution of code

68

Remote Access  

NLE Websites -- All DOE Office Websites (Extended Search)

SSL-portal. Enter your Z number and Cryptocard passcode. From the SSL-portal menu, choose Research Library. Navigate to your desired location OR Use the URLs below: Los Alamos...

69

V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users  

NLE Websites -- All DOE Office Websites (Extended Search)

5: Cisco Mobility Services Engine Configuration Error Lets 5: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously September 5, 2013 - 12:33am Addthis PROBLEM: A vulnerability was reported in Cisco Mobility Services Engine. A remote user can login anonymously. PLATFORM: Cisco Mobility Services Engine ABSTRACT: A vulnerability in Cisco Mobility Services Engine could allow an unauthenticated, remote attacker to connect to a database replication port anonymously via Secure Sockets Layer (SSL). REFERENCE LINKS: SecurityTracker Alert ID: 1028972 CVE-2013-3469 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is due to the misconfiguration of the Oracle SSL service. An attacker could exploit this vulnerability by connecting to an

70

U-203: HP Photosmart Bug Lets Remote Users Deny Service | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

03: HP Photosmart Bug Lets Remote Users Deny Service 03: HP Photosmart Bug Lets Remote Users Deny Service U-203: HP Photosmart Bug Lets Remote Users Deny Service July 2, 2012 - 8:00am Addthis PROBLEM: HP Photosmart Bug Lets Remote Users Deny Service PLATFORM: HP Photosmart Wireless e-All-in-One Printer series - B110 HP Photosmart e-All-in-One Printer series - D110 HP Photosmart Plus e-All-in-One Printer series - B210 HP Photosmart eStation All-in-One Printer series - C510 HP Photosmart Ink Advantage e-All-in-One Printer series - K510 HP Photosmart Premium Fax e-All-in-One Printer series - C410 ABSTRACT: A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions. Reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027213 CVE-2012-2017 IMPACT ASSESSMENT: High Discussion:

71

V-037: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Wireshark Multiple Bugs Let Remote Users Deny Service 7: Wireshark Multiple Bugs Let Remote Users Deny Service V-037: Wireshark Multiple Bugs Let Remote Users Deny Service November 30, 2012 - 3:30am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Version(s): prior to 1.6.12, 1.8.4 ABSTRACT: Several vulnerabilities were reported in Wireshark. REFERENCE LINKS: Wireshark Security Advisories Secunia Advisory SA51422 Seclists SecurityTracker Alert ID: 1027822 CVE-2012-5592 CVE-2012-5593 CVE-2012-5594 CVE-2012-5595 CVE-2012-5596 CVE-2012-5597 CVE-2012-5598 CVE-2012-5599 CVE-2012-5600 CVE-2012-5601 CVE-2012-5602 IMPACT ASSESSMENT: Medium DISCUSSION: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. A user can obtain potentially sensitive information.

72

T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Cisco Content Services Gateway ICMP Processing Flaw Lets 3: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service July 7, 2011 - 12:41pm Addthis PROBLEM: A denial of service (DoS) vulnerability exists in the Cisco Content Services Gateway - Second Generation, that runs on the Cisco Service and Application Module for IP (SAMI). An unauthenticated, remote attacker could exploit this vulnerability by sending a series of crafted ICMP packets to an affected device. Exploitation could cause the device to reload. There are no workarounds available to mitigate exploitation of this vulnerability other than blocking ICMP traffic destined to the affected device. PLATFORM: Second Generation only Cisco IOS 12.4(24)MDA3,Cisco IOS 12.4(24)MDA3,Cisco

73

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

74

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

75

V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny 6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code January 24, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Cisco Wireless LAN Controller. PLATFORM: The vulnerabilities are reported in: Cisco 2000 Series WLC Cisco 2100 Series WLC Cisco 2500 Series WLC Cisco 4100 Series WLC Cisco 4400 Series WLC Cisco 5500 Series WLC Cisco 7500 Series WLC Cisco 8500 Series WLC Cisco 500 Series Wireless Express Mobility Controllers Cisco Wireless Services Module (Cisco WiSM) Cisco Wireless Services Module version 2 (Cisco WiSM version 2)

76

Remote collaboration and data access at the DIII-D National Fusion Facility  

Science Conference Proceedings (OSTI)

As the number of on-site and remote collaborators has increased, the demands on the DIII-D National Program`s computational infrastructure has become more severe. The Director of the DIII-D Program recognized the increased importance of computers in carrying out the DIII-D mission and in late 1997 formed the Data Analysis Programming Group. Utilizing both software and hardware improvements, this new group has been charged with increasing the DIII-D data analysis throughput and data retrieval rate. Understanding the importance of the remote collaborators, this group has developed a long term plan that will allow for fast 24 hour data access (7x24) with complete documentation and a set of data viewing and analysis tools that can be run either on the collaborators` or DIII-D`s computer systems. This paper presents the group`s long term plan and progress to date.

Schissel, D.P.

1998-09-01T23:59:59.000Z

77

V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco ASA Multiple Bugs Let Remote Users Deny Service 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software will vary depending on the specific vulnerability. ABSTRACT: Several vulnerabilities were reported in Cisco ASA. REFERENCE LINKS: Cisco Security Advisory Secunia Advisory SA52989 SecurityTracker Alert ID: 1028415 CVE-2013-1149 CVE-2013-1150 CVE-2013-1151 CVE-2013-1152

78

V-160: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60: Wireshark Multiple Bugs Let Remote Users Deny Service 60: Wireshark Multiple Bugs Let Remote Users Deny Service V-160: Wireshark Multiple Bugs Let Remote Users Deny Service May 21, 2013 - 12:09am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Versions 1.8.0 to 1.8.6 ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark Docid: wnpa-sec-2013-23 Secunia Advisory SA53425 SecurityTracker Alert ID: 1028582 CVE-2013-2486 CVE-2013-2487 IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An error in the RELOAD dissector (dissectors/packet-reload.c) can be exploited to trigger infinite loops and consume CPU resources via specially

79

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service May 24, 2012 - 7:00am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: 1.4.0 to 1.4.12, 1.6.0 to 1.6.7 ABSTRACT: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. Reference Links: SecurityTracker Alert ID: 1027094 CVE-2012-2392 CVE-2012-2393 CVE-2012-2394 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted ANSI MAP, ASF, BACapp, Bluetooth HCI, IEEE 802.11, IEEE 802.3, LTP, and R3 data to cause Wireshark to hang or enter an infinite loop. A remote user can cause the DIAMETER dissector to crash. A remote user can trigger a memory error on SPARC or Itanium processors and

80

U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny 6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service February 6, 2012 - 7:00am Addthis PROBLEM: Vulnerability in AIX TCP stack PLATFORM: Version(s): 5.3, 6.1, 7.1 ABSTRACT: A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system. reference LINKS: SecurityTracker Alert ID: 1026640 IBM Security Advisory CVE-2012-0194 IMPACT ASSESSMENT: Medium Discussion: AIX could allow a remote attacker to cause a denial of service, caused by an error when the TCP large send offload option is enabled on a network interface. By sending a specially-crafted sequence of packets, an attacker could exploit this vulnerability to cause a kernel panic.

Note: This page contains sample records for the topic "remote access services" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

U-111: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service 11: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service U-111: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service February 27, 2012 - 6:27am Addthis PROBLEM: A vulnerability was reported in IBM AIX. A remote user can cause denial of service conditions. PLATFORM: version(s): 5.3, 6.1, and 7.1 ABSTRACT: A remote user can send a specially crafted ICMP packet to cause the target service to crash. reference LINKS: Vendor Advisory Security Tracker ID 1026742 CVE-2011-1385 IMPACT ASSESSMENT: Medium Discussion: There is an error in the handling of a particular ICMP packet in which a remote user can cause a denial of service. Impact: Denial of service on AIX via network. Solution: The vendor has issued a fix. 5.3.12: APAR IV03369 6.1.5: APAR IV13672 6.1.6: APAR IV13554

82

T-664: Apache Santuario Buffer Overflow Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

664: Apache Santuario Buffer Overflow Lets Remote Users Deny 664: Apache Santuario Buffer Overflow Lets Remote Users Deny Service T-664: Apache Santuario Buffer Overflow Lets Remote Users Deny Service July 8, 2011 - 12:32pm Addthis PROBLEM: A vulnerability was reported in Apache Santuario. A remote user can cause denial of service conditions. PLATFORM: Prior to 1.6.1 - Apache Santuario XML Security for C++ library versions prior to V1.6.1 ABSTRACT: A buffer overflow exists when creating or verifying XML signatures with RSA keys of sizes on the order of 8192 or more bits. This typically results in a crash and denial of service in applications that verify signatures using keys that could be supplied by an attacker. reference LINKS: SecurityTracker Alert ID: 1025755 Bugzilla: 719698: CVE-2011-2516 xml-security-c The Apache Software Foundation - CVE-2011-2516

83

T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass  

NLE Websites -- All DOE Office Websites (Extended Search)

36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and 36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls January 18, 2011 - 2:30pm Addthis PROBLEM: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls. PLATFORM: Cisco 5500 Series Adaptive Security Appliances (ASA) ABSTRACT: Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software vary depending on the specific vulnerability. Cisco ASA 5500 Series Adaptive Security Appliances may experience a TCP connection exhaustion condition (no new TCP connections are accepted) that can be triggered through the receipt of specific TCP segments during the

84

U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

12: BlackBerry Enterprise Server Collaboration Service Bug Lets 12: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages October 17, 2011 - 9:45am Addthis PROBLEM: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages. PLATFORM: Exchange and Domino 5.0.3 through 5.0.3 MR4 BlackBerry Client for use with Microsoft Office Communications Server 2007 R2 BlackBerry Client for use with Microsoft Lync Server 2010 ABSTRACT: A vulnerability was reported in BlackBerry Enterprise Server. A remote user can impersonate another messaging user within the same organization. reference LINKS: BlackBerry Security Advisory ID: KB28524

85

T-636: Wireshark Multiple Flaws Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-636: Wireshark Multiple Flaws Let Remote Users Deny Service T-636: Wireshark Multiple Flaws Let Remote Users Deny Service T-636: Wireshark Multiple Flaws Let Remote Users Deny Service June 3, 2011 - 3:35pm Addthis PROBLEM: Wireshark Multiple Flaws Let Remote Users Deny Service PLATFORM: Wireshark Version(s): 1.2.0 to 1.2.16, 1.4.0 to 1.4.6 ABSTRACT: Multiple vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. reference LINKS: wnpa-sec-2011-07 SecurityTracker Alert ID: 1025597 wnpa-sec-2011-08 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DICOM data, Visual Networks file, compressed capture data, snoop file, or Diameter dictionary file to cause the target service to crash or enter an infinite loop. Versions affected: 1.2.0 to 1.2.16 and 1.4.0 to 1.4.6.

86

TRANSPORTATION CONDITIONS AND ACCESS TO SERVICES IN A CONTEXT OF URBAN SPRAWL AND DEREGULATION  

E-Print Network (OSTI)

TRANSPORTATION CONDITIONS AND ACCESS TO SERVICES IN A CONTEXT OF URBAN SPRAWL AND DEREGULATION Transports Ecole Nationale des Travaux Publics de l'Etat Rue Maurice Audin 69518 Vaulx-en-Velin cedex France corresponding author. e-mail: pochet@entpe.fr #12;#12;1 TRANSPORTATION CONDITIONS AND ACCESS TO SERVICES

Paris-Sud XI, Université de

87

U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: OpenSSL DTLS Bug Lets Remote Users Deny Service 5: OpenSSL DTLS Bug Lets Remote Users Deny Service U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service January 20, 2012 - 9:15am Addthis PROBLEM: OpenSSL DTLS Bug Lets Remote Users Deny Service PLATFORM: Only DTLS applications using OpenSSL 1.0.0f and 0.9.8s are affected. ABSTRACT: A flaw in the fix to CVE-2011-4108 can be exploited in a denial of service attack. REFERNCE LINKS: CVE-2012-0050 SecurityTracker Alert ID: 1026548 OpenSSL Security Advisory [18 Jan 2011] OpenSSL News IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in OpenSSL. The fix to correct the Datagram Transport Layer Security (DTLS) vulnerability referenced by CVE-2011-4108 introduced a flaw. A remote user can send specially crafted data to cause denial of service conditions on the target system.

88

Efficient and robust multiple access control for wireless multimedia services  

Science Conference Proceedings (OSTI)

In this paper, we propose a new multiple access control (MAC) protocol for wireless distributed multimedia systems based on ATM, in which user demands are highly heterogeneous and can be classified as CBR, VBR, and ABR. Our protocol is motivated by two ... Keywords: FDD, TDMA, adaptive protocol, multiple access control, wireless ATM, wireless multimedia

Yu-Kwong Kwok; Vincent K. N. Lau

2000-10-01T23:59:59.000Z

89

V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Samba smbd CPU Processing Loop Lets Remote Users Deny 2: Samba smbd CPU Processing Loop Lets Remote Users Deny Service V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny Service August 6, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba PLATFORM: Samba 3.0.x - 4.0.7 ABSTRACT: All current released versions of Samba are vulnerable to a denial of service on an authenticated or guest connection REFERENCE LINKS: Secunia Advisory SA54436 Samba Security Release CVE-2013-4124 IMPACT ASSESSMENT: Medium DISCUSSION: A malformed packet can cause the smbd server to loop the CPU performing memory allocations and preventing any further service. A connection to a file share, or a local account is needed to exploit this problem, either authenticated or unauthenticated if guest connections are allowed. This

90

T-617: BIND RPZ Processing Flaw Lets Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: BIND RPZ Processing Flaw Lets Remote Users Deny Service 7: BIND RPZ Processing Flaw Lets Remote Users Deny Service T-617: BIND RPZ Processing Flaw Lets Remote Users Deny Service May 6, 2011 - 7:00am Addthis PROBLEM: A vulnerability has been reported in BIND, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: ISC BIND version 9.8.0. ABSTRACT: When a name server is configured with a response policy zone (RPZ), queries for type RRSIG can trigger a server crash. REFERENCE LINKS: ISC Advisory: CVE-2011-1907 Secunia Advisory: SA44416 Vulnerability Report: ISC BIND CVE-2011-1907 SecurityTracker Alert ID: 1025503 IMPACT ASSESSMENT: High Discussion: This advisory only affects BIND users who are using the RPZ feature configured for RRset replacement. BIND 9.8.0 introduced Response Policy Zones (RPZ), a mechanism for modifying DNS responses returned by a

91

Broadband access over cable for next-generation services: a distributed switch architecture  

Science Conference Proceedings (OSTI)

The hybrid fiber coax architecture deployed by the cable service providers has been successful in capturing a substantial piece of the residential broadband access market. In the United States over five million homes connect to the Internet using DOCSIS ...

S. Dravida; D. Gupta; S. Nanda; K. Rege; J. Strombosky; M. Tandon

2002-08-01T23:59:59.000Z

92

Information Services Division (ISD), Brookhaven National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Find People ISD Homepage Site Details ISD Staff Remote Access Other Information BNL Site Index Can't View PDFs? Welcome to the... Information Services Division (ISD) Brookhaven's...

93

U-260: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: ISC BIND RDATA Processing Flaw Lets Remote Users Deny 0: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service U-260: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service September 14, 2012 - 6:00am Addthis PROBLEM: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service PLATFORM: Version(s): 9.0.x -> 9.6.x, 9.4-ESV->9.4-ESV-R5-P1, 9.6-ESV->9.6-ESV-R7-P2, 9.7.0->9.7.6-P2, 9.8.0->9.8.3-P2, 9.9.0->9.9.1-P2 ABSTRACT: A vulnerability was reported in ISC BIND. reference LINKS: The vendor's advisory SecurityTracker Alert ID: 1027529 Bugtraq ID: 55522 Red Hat Bugzilla - Bug 856754 CVE-2012-4244 IMPACT ASSESSMENT: High Discussion: A remote user can send a query for a record that has RDATA in excess of 65535 bytes to cause named to exit. This can be exploited against recursive servers by causing the server to query for records provided by an

94

T-662: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: ISC BIND Packet Processing Flaw Lets Remote Users Deny 2: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service T-662: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service July 6, 2011 - 7:47am Addthis PROBLEM: A vulnerability was reported in ISC BIND. A remote user can cause denial of service conditions. PLATFORM: 9.6.3, 9.6-ESV-R4, 9.6-ESV-R4-P1, 9.6-ESV-R5b1 9.7.0, 9.7.0-P1, 9.7.0-P2, 9.7.1, 9.7.1-P1, 9.7.1-P2, 9.7.2, 9.7.2-P1, 9.7.2-P2, 9.7.2-P3, 9.7.3, 9.7.3-P1, 9.7.3-P2, 9.7.4b1 9.8.0, 9.8.0-P1, 9.8.0-P2, 9.8.0-P3, 9.8.1b1 ABSTRACT: A defect in the affected BIND 9 versions allows an attacker to remotely cause the "named" process to exit using a specially crafted packet. This defect affects both recursive and authoritative servers. The code location of the defect makes it impossible to protect BIND using ACLs configured

95

Interfacing remote transaction services using UPnP  

Science Conference Proceedings (OSTI)

Transaction execution in mobile environments needs to be flexible, not only to support typical mobile computing characteristics, like movement, disconnections and limited resources, but also to support the variety of transactional properties that might ... Keywords: Middleware, Mobile computing, Transaction service discovery, Transactions, UPnP

Arne Ketil Eidsvik; Randi Karlsen; Gordon Blair; Paul Grace

2008-03-01T23:59:59.000Z

96

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let...

97

Assistive Devices and Services for the Disabled: Auditory Signage and the Accessible City for Blind or Vision-Impaired Travelers  

E-Print Network (OSTI)

as many severely vision disabled people (approximately 4to improve access for disabled groups has been concentratedDevices and Services for the Disabled: Auditory Signage and

Golledge, Reginald G.; Marston, James R.; Costanzo, C. Michael

1998-01-01T23:59:59.000Z

98

Remote Sens. 2011, 3, 185-202; doi:10.3390/rs3010185 OPEN ACCESS  

E-Print Network (OSTI)

product and TM/Landsat-5 images followed by aerial survey and field inspection. In the 2009/2010 crop year for aerial survey to identify soybean planting and allowed monitoring of all deforested areas greater than 25 expansion in this biome. #12;Remote Sens. 2011, 3 186 Keywords: MODIS; satellite images; aerial survey

Hammerton, James

99

V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Gain Access and Obtain Information PLATFORM: ColdFusion 10, 9.0.2, 9.0.1 and 9.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe has identified three vulnerabilities affecting...

100

High-performance remote access to climate simulation data: a challenge problem for data grid technologies  

Science Conference Proceedings (OSTI)

In numerous scientific disciplines, terabyte and soon petabyte-scale data collections are emerging as critical community resources. A new class of Data Grid infrastructure is required to support management, transport, distributed access to, and analysis ...

Bill Allcock; Ian Foster; Veronika Nefedova; Ann Chervenak; Ewa Deelman; Carl Kesselman; Jason Lee; Alex Sim; Arie Shoshani; Bob Drach; Dean Williams

2001-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "remote access services" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Developing front-end Web 2.0 technologies to access services, content and things in the future Internet  

Science Conference Proceedings (OSTI)

The future Internet is expected to be composed of a mesh of interoperable web services accessible from all over the web. This approach has not yet caught on since global user-service interaction is still an open issue. This paper states one vision with ... Keywords: Context, Future Internet, Internet of services, SOA, Service front-ends, User-service interaction, Web 2.0

Juan Alfonso Lara; David Lizcano; MaríA Aurora MartíNez; Juan Pazos

2013-07-01T23:59:59.000Z

102

Working Remotely | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Working Remotely Working Remotely Remote Access Use VPN to access Argonne resources Wake up your computer if power management policies have been applied Connect to your work computer by using Remote Desktop Communications Log into web-based e-mail Outlook Zimbra Send instant messages with Jabber Use Argonne's voice mail and teleconferencing services Use Adobe Connect for web conferencing E-Mail Client and Mobile Device Configuration Changes for Exchange 2010 Cyber Security Secure your home computers Passwords MyPassword Change your password Choosing a good password Other Tools Upload a file for retrieval by others (login required) Argonne SharePoint Server (login required) Inside Argonne (accessible onsite or through VPN) Focal Point Management Blog (accessible onsite or through VPN)

103

Integrated k-NN query processing based on geospatial data services  

Science Conference Proceedings (OSTI)

Geospatial data service (GDS) is a type of web service that provides access to collections of geospatial data. User can search remote spatial data through the interface provided by service. This paper focuses on integrated k-NN query processing ...

Guifen Tang; Luo Chen; Yunxiang Liu; Shulei Liu; Ning Jing

2005-11-01T23:59:59.000Z

104

Addressing & invocation of IMS-attached services  

Science Conference Proceedings (OSTI)

Services provided by non-IMS enabled platforms (e.g. home electronics, entertainment systems, and various home appliances) are typically not accessible to remote users such as IMS subscribers in spite of the ubiquity of modern mobile communications. ... Keywords: IMS, SIP, presence, service addressing, service discovery, service mapping, service registration

Roman Levenshteyn; Ioannis Fikouras; Salvatore Loreto; Gonzalo Camarillo

2007-07-01T23:59:59.000Z

105

The post-2015 delivery of universal and sustainable access to infrastructure services. Working Paper  

SciTech Connect

In this new working paper, the authors focus specifically on what would be necessary to achieve High Level Panel-style goals and targets for water, energy and transport, if these were to be eventually adopted by world leaders. In all three cases, much of the advocacy - and the proposed High Level Panel goals - have emphasized the need to strive for universal and sustainable access to at least basic levels of services from these sectors. Many of the proposals for post-2015 goals and targets appear ambitious, but what would it take to achieve them? This paper assesses what is needed to achieve goals for universal and sustainable access to infrastructure, specifically water, energy and transport. Using illustrative goals and targets, the paper reviews the development challenges in each sector, and what will be necessary to overcome the barriers to universal and sustainable access to water, energy and transport infrastructure services, in the areas of governance, finance, capacity development and environmental protection. The paper ends with general conclusions about infrastructure in the post-2015 development agenda.

Doczi, Julian, Dorr, Tobias; Mason, Nathaniel; Scott, Andrew

2013-06-15T23:59:59.000Z

106

Study of conditions of use of E-services accessible to visually disabled persons  

E-Print Network (OSTI)

The aim of this paper is to determine the expectations that French-speaking disabled persons have for electronic administrative sites (utility). At the same time, it is a matter of identifying the difficulties of use that the manipulation of these E-services poses concretely for blind people (usability) and of evaluating the psychosocial impacts on the way of life of these people with specific needs. We show that the lack of numerical accessibility is likely to accentuate the social exclusion of which these people are victim by establishing a numerical glass ceiling.

Bobiller-Chaumon, Marc-Eric; Sandoz-Guermond, Françoise

2007-01-01T23:59:59.000Z

107

Abstract--Nondiscriminatory transmission services are an es-sential requirement of open access and constitute a basic premise  

E-Print Network (OSTI)

over those of the conventional TSP. Index Terms--day-ahead electricity markets, transmission service markets in electricity have resulted in the growing prominence of transmission congestion. Congestion1 Abstract-- Nondiscriminatory transmission services are an es- sential requirement of open access

Gross, George

108

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary 4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users January 4, 2012 - 8:00am Addthis PROBLEM: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users . PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2

109

U-243: libvirt virTypedParameterArrayClear() Memory Access Error Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: libvirt virTypedParameterArrayClear() Memory Access Error 3: libvirt virTypedParameterArrayClear() Memory Access Error Lets Remote Users Deny Service U-243: libvirt virTypedParameterArrayClear() Memory Access Error Lets Remote Users Deny Service August 24, 2012 - 7:00am Addthis PROBLEM: libvirt virTypedParameterArrayClear() Memory Access Error Lets Remote Users Deny Service PLATFORM: Version(s): 0.9.13 and prior ABSTRACT: A vulnerability was reported in libvirt. reference LINKS: libvirt SecurityTracker Alert ID: 1027437 Secunia Advisory SA50118 Bugtraq ID: 54748 CVE-2012-3445 IMPACT ASSESSMENT: Medium Discussion A remote user can send a specially crafted RPC call with the number of parameters set to zero to libvirtd to trigger a memory access error in virTypedParameterArrayClear() and cause the target service to crash. Impact:

110

INTOR critical issue D: maintainability. Tritium containment and personnel access vs remote maintenance, Chapter VI of the US INTOR report for Phase Two A, Part 2  

SciTech Connect

The purpose of this study is to compare the benefits and costs associated with personnel access mmaintenance procedures compared to those of all-remote maintenance procedures. The INTOR Phase Two A, Part I configuration was used to make this comparison. For both approaches, capital and operating costs were considered to first order, maintenance equipment requirements were investigated, maintenance requirements common to both approaches and unique to each were identified, tritium handling requirements were outlined, and maintenance scenarios and device downtime were developed for both. In addition, estimates of person-rem exposure were made for the personnel access approach.

Spampinato, P.T.; Finn, P.A.; Gohar, Y.; Yang, S.T.; Stasko, R.R.; Morrison, C.; Russell, S.; Shaw, G.; Bussell, G.T.; Watts, R.

1984-01-01T23:59:59.000Z

111

Application of EPRI's Transmission Services Costing Framework to the Development of Open Access Transmission Tariffs  

Science Conference Proceedings (OSTI)

Public utilities in the United States are expected to provide transmission services and ancillary services to eligible customers. This report documents how Centerior Energy Corporation developed a network integration transmission service tariff, a point-to-point transmission service tariff, and four ancillary services tariffs by applying EPRI's Transmission Services Costing Framework.

1996-03-09T23:59:59.000Z

112

SSL Remote Access Assistance  

Science Conference Proceedings (OSTI)

... (Security tab); Accept inside.nist.gov, inside.boulder.nist.gov, serv.nist.gov in the Pop-up Blocker list (Privacy tab); Enable ...

2013-05-13T23:59:59.000Z

113

Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Services Services Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Services ESnet provides interoperable, effective, reliable, and high performance network communications infrastructure, and certain collaboration services, in support of the Office of Science (SC)'s large-scale, collaborative science programs. ESnet provides users with high bandwidth access to DOE sites and DOE's primary science collaborators including Research and

114

The Charité Grid Portal: User-friendly and Secure Access to Grid-based Resources and Services  

Science Conference Proceedings (OSTI)

The Charité Grid Portal combines portal components from different groups and projects to provide domain researchers a gateway to Grid-based biomedical applications. Trusted users can securely access and employ Grid resources and services. In this ... Keywords: Grid computing, Grid portal, HealthGrids, Security, Usability

Jie Wu; René Siewert; Andreas Hoheisel; Jürgen Falkner; Oliver Strau?; Dinko Berberovic; Dagmar Krefting

2012-12-01T23:59:59.000Z

115

Identifying telemedicine services to improve access to specialty care for the underserved in the San Francisco safety net  

Science Conference Proceedings (OSTI)

Safety-net settings across the country have grappled with providing adequate access to specialty care services. San Francisco General Hospital and Trauma Center, serving as the city's primary safety-net hospital, has also had to struggle with the same ...

Ken Russell Coelho

2011-01-01T23:59:59.000Z

116

NNDC Data Services  

Science Conference Proceedings (OSTI)

The National Nuclear Data Center has provided remote access to some of its resources since 1986. The major databases and other resources available currently through NNDC Web site are summarized. The National Nuclear Data Center (NNDC) has provided remote access to the nuclear physics databases it maintains and to other resources since 1986. With considerable innovation access is now mostly through the Web. The NNDC Web pages have been modernized to provide a consistent state-of-the-art style. The improved database services and other resources available from the NNOC site at www.nndc.bnl.govwill be described.

Tuli, J.K.; Sonzogni,A.

2010-04-30T23:59:59.000Z

117

U-125: Cisco ASA Multiple Bugs Let Remote Users Deny Service...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Deny Service PLATFORM: Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module ABSTRACT: Several vulnerabilities were reported in...

118

V-199: Solaris Bugs Let Local Users Gain Root Privileges, Remote...  

NLE Websites -- All DOE Office Websites (Extended Search)

of service conditions A local user can obtain root privileges on the target system A remote user can partially access and modify data on the target system SOLUTION: Vendor...

119

The feasibility and validity of a remote pulse oximetry system for pulmonary rehabilitation: a pilot study  

Science Conference Proceedings (OSTI)

Pulmonary rehabilitation is an effective treatment for people with chronic obstructive pulmonary disease. However, access to these services is limited especially in rural and remote areas. Telerehabilitation has the potential to deliver pulmonary rehabilitation ...

Jonathan Tang; Allison Mandrusiak; Trevor Russell

2012-01-01T23:59:59.000Z

120

Using remote installation services for windows to streamline installations in the UTPB computer science research lab  

Science Conference Proceedings (OSTI)

The Computer Science Research Lab at The University of Texas of the Permian Basin (UTPB) is operated by three part-time student assistants with minimal faculty supervision. This lab supports seven Windows and Sun Solaris servers and approximately thirty ... Keywords: RIS, remote installation, windows

Cherry Owen; Dustin Piper

2006-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "remote access services" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service...  

NLE Websites -- All DOE Office Websites (Extended Search)

Service and Bypass Security Controls. PLATFORM: Cisco 5500 Series Adaptive Security Appliances (ASA) ABSTRACT: Cisco ASA 5500 Series Adaptive Security Appliances are affected by...

122

A Grid Service-Based Infrastructure for Accessing Scientific Collections: The Case of the ARION System  

Science Conference Proceedings (OSTI)

The ARION system provides basic e-services of search and retrieval of objects in scientific collections, such as datasets, simulation models and tools necessary for statistical and/or visualization processing. These collections may represent application ... Keywords: Grid, RDF/S, Semantic Web, e-Science, mobile agents, ontologybased system, workflow

Catherine Houstis; Spyros Lalis; Marios Pitikakis; George V. Vasilakis; Kyriakos Kritikos; Antonis Smardas

2003-08-01T23:59:59.000Z

123

U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control...

124

Seamless access of home theater personal computers for mobile devices  

Science Conference Proceedings (OSTI)

This paper presents the MoMPt project, an open source project developed to allow access to multimedia content and to control multiple HTPCs remotely using mobile devices. The main contribution in the context of this project is its reference design, which ... Keywords: web services, HTPC, UPnP, mobile devices, mobile multimedia system design, multimedia

Lorena F. Maia; Danilo F. S. Santos; Ricardo S. Souza; Angelo Perkusich; Hyggo Almeida

2009-03-01T23:59:59.000Z

125

ATLAS Tags Web Service calls Athena via Athenaeum Framework  

E-Print Network (OSTI)

High Energy Physics experiments start using a Web Service style application to access functionality of their main frameworks. Those frameworks, however, are not ready to be executed in a standard Web Service environment as frameworks are too complex, monolithic and use non-standard and non-portable technologies. ATLAS Tag Browser is one of those Web Service. To provide the possibility to extract full ATLAS events from the standard Web Service, we need to access to full ATLAS offline framework - Athena. As Athena cannot run directly within any Web Service, the client server approach has been chosen. Web Service calls Athena remotely over XML-RPC connection using Athenaeum framework.

Hrivnac, J; The ATLAS collaboration

2011-01-01T23:59:59.000Z

126

Instructions for using HSPD-12 Authenticated Outlook Web Access...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook access using...

127

V-220: Juniper Security Threat Response Manager Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Juniper Security Threat Response Manager Lets Remote 0: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands August 17, 2013 - 4:01am Addthis PROBLEM: A remote authenticated user can execute arbitrary commands on the target system. PLATFORM: 2010.0, 2012.0, 2012.1, 2013.1 ABSTRACT: A vulnerability was reported in Juniper Security Threat Response Manager (STRM) REFERENCE LINKS: SecurityTracker Alert ID: 1028921 CVE-2013-2970 IMPACT ASSESSMENT: High DISCUSSION: A remote authenticated user can inject commands to execute arbitrary operating system commands with the privileges of the target web service. This can be exploited to gain shell access on the target device.

128

Abstract--Telerehabilitation is the provision of rehabilitation services at a distance, by a therapist at a remote location.  

E-Print Network (OSTI)

by therapists at a remote location. Telerehabilitation can be clinic- based or home-based (see Rosen [1) clinic is being coached by a therapist expert at a tertiary care (or university) setting. For home-based

New Jersey, University of Medicine and Dentistry of

129

Accessing Banner Self Service The myWings portal provides a secure connection for you to access your personal information while  

E-Print Network (OSTI)

search, or by Department. 4. Select the term to search in the dropdown menu and click on the Submit button. The Class Schedule Search form will appear. #12;Or 5. Enter your search criteria in the fields Banner Self Service. 2. Click on Look up Classes to Add. 3. Select the term to search in the drop down

Asaithambi, Asai

130

Remote Desktop | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Remote Desktop Remote Desktop Using Remote Desktop to Connect to Your Work Computer With Remote Desktop, you can have access to a computer at the Laboratory through another computer. For example, you can connect to your work computer from home and have access to all of your programs, files, and network resources as though you were sitting at your computer at work. You can leave programs running at work and see your work desktop displayed on your home computer, with the same programs running. Remote Desktop can be used in many situations, including: Working at home. Access work in progress on your office computer from home and have full access to all local and remote devices. Collaborating. Access your desktop from a colleague's office to work together on projects, such as updating a slide presentation or proofreading

131

Sustainable energy for all. Technical report of task force 1 in support of the objective to achieve universal access to modern energy services by 2030  

SciTech Connect

The UN Secretary General established the Sustainable Energy for All initiative in order to guide and support efforts to achieve universal access to modern energy, rapidly increase energy efficiency, and expand the use of renewable energies. Task forces were formed involving prominent energy leaders and experts from business, government, academia and civil society worldwide. The goal of the Task Forces is to inform the implementation of the initiative by identifying challenges and opportunities for achieving its objectives. This report contains the findings of Task Force One which is dedicated to the objective of achieving universal access to modern energy services by 2030. The report shows that universal energy access can be realized by 2030 with strong, focused actions set within a coordinated framework.

Birol, Fatih [International Energy Agency, Paris (France); Brew-Hammond, Abeeku (University of Science and Technology (Ghana

2012-04-15T23:59:59.000Z

132

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14: Oracle Java Runtime Environment (JRE) Multiple Flaws Let 14: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2011 - 6:00pm Addthis PROBLEM: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service. PLATFORM: Oracle JDK and JRE 7; JDK and JRE 6 Update 27 and prior; JDK and JRE 5.0 Update 31 and prior; SDK and JRE 1.4.2_33 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system. reference LINKS: Oracle Critical Patch Updates and Security Alerts

133

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let 4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2011 - 6:00pm Addthis PROBLEM: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service. PLATFORM: Oracle JDK and JRE 7; JDK and JRE 6 Update 27 and prior; JDK and JRE 5.0 Update 31 and prior; SDK and JRE 1.4.2_33 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system. reference LINKS: Oracle Critical Patch Updates and Security Alerts

134

Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud  

Science Conference Proceedings (OSTI)

Cloud computing is a new computing paradigm wherein the resources of the computing infrastructure are provided as services over the internet. The benefits offered by the public cloud encourage the data owners/organisations to store their data ...

B. R. Purushothama; B. Shrinath; B. B. Amberker

2013-04-01T23:59:59.000Z

135

Evaluating airline-transit cooperation in airport rail and remote check-in services : a strategic approach for increased ridership  

E-Print Network (OSTI)

This thesis applies Lean Principles and Practices to the public transportation services sector. It is an innovative approach since the area of knowledge is most actively used in the production and manufacturing field. Other ...

Molina Cecchetti, Miguel Angel, 1979-

2004-01-01T23:59:59.000Z

136

Services  

Energy.gov (U.S. Department of Energy (DOE))

The Human Capital Office offers benefit, new employee orientation and some learning & development related services to all DOE employees. Additionally the Office supplies employee and labor...

137

V-120: EMC Smarts Network Configuration Manager Java RMI Access...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control...

138

ATLAS Tags Web Service calls Athena via Athenaeum Framework  

E-Print Network (OSTI)

High Energy Physics experiments start using a Web Service style application to access functionality of their main frameworks. Those frameworks, however, are not ready to be executed in a standard Web Service environment as frameworks are too complex, monolithic and use non-standard and non-portable technologies. ATLAS Tag Browser is one of those Web Service. To provide the possibility to extract full ATLAS events from the standard Web Service, we need to access to full ATLAS offline framework - Athena. As Athena cannot run directly within any Web Service, the client server approach has been chosen. Web Service calls Athena remotely over XML-RPC connection using Athenaeum framework. The paper will discuss integration of Athenaeum framework with ATLAS Tag database service, its distributed deployment, monitoring and performance.

Hrivnac, J; The ATLAS collaboration

2010-01-01T23:59:59.000Z

139

Expanding Researcher Access to EIA Microdata  

U.S. Energy Information Administration (EIA)

personal computers at remote locations. EIA’s research access program is much more limited than those offered by other statistical agencies.

140

Apparatus and method for servicing an elongated suspended pump motor in an electric power plant with limited access  

DOE Patents (OSTI)

Elongated coolant pumps suspended under steam generators within containment in a power plant with limited access space, are removed and replaced by an elongated maintenance cart with an elongated opening along one side in which the motor is received. Rollers support the cart for conveying the elongated motor in an upright position out from under the steam generator and onto an elevator. The elevator is lowered to transfer support of the cart and motor through trunnions to saddles straddling the elevator for rotation of the cart to a generally horizontal position. The elevator then raises the horizontally disposed cart carrying the motor to a higher floor where it is rolled off the elevator and out through the auxiliary equipment hatch. 14 figures.

Chavez, R.V.; Ekeroth, D.E.; Johnson, F.T.; Matusz, J.M.

1994-04-26T23:59:59.000Z

Note: This page contains sample records for the topic "remote access services" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Apparatus and method for servicing an elongated suspended pump motor in an electric power plant with limited access  

DOE Patents (OSTI)

Elongated coolant pumps suspended under steam generators within containment in a power plant with limited access space, are removed and replaced by an elongated maintenance cart with an elongated opening along one side in which the motor is received. Rollers support the cart for conveying the elongated motor in an upright position out from under the steam generator and onto an elevator. The elevator is lowered to transfer support of the cart and motor through trunnions to saddles straddling the elevator for rotation of the cart to a generally horizontal position. The elevator then raises the horizontally disposed cart carrying the motor to a higher floor where it is rolled off the elevator and out through the auxiliary equipment hatch.

Chavez, Rossemary V. (Monroeville, PA); Ekeroth, Douglas E. (Delmont, PA); Johnson, F. Thomas (Baldwin Boro, PA); Matusz, John M. (Plum Boro both of Allegheny County, PA)

1994-01-01T23:59:59.000Z

142

Grid Software and Services at NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

Services Services Grid Software and Services Overview Grid computing can include a broad range of technologies. At NERSC we are interested in new computational and data-centric services which enhance the productivity of science teams. The grid infrastructure we support (described below) can be used to manage jobs and data in ways that are otherwise difficult from the comamnd line. Grid services enable remote job management, file transfer and distributed computing workflows through the Globus Toolkit. Web based Science Gateways can be built on the foundation provided by those services. Users can access several NERSC resources via Globus grid interfaces using X509 grid certificates. NERSC is part of the Open Science Grid (OSG) and is available to select OSG Virtual Organizations for compute and storage

143

ACCESS CONTROL  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TERMSDEFINITIONS FROM DOE M 470.4-7 ACCESS CONTROL. The process of permitting access or denying access to information, facilities, nuclear materials, resources, or designated...

144

U-220: Google Android DNS Resolver Randomization Flaw Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Off-by-one Bug Lets Remote Users Deny Service U-271: Google Android Dialer TEL URL Handling Flaw Lets Remote Users Deny Service V-065: Adobe Flash Player Buffer Overflow...

145

U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Directory CRL Validation Flaw Lets Remote Users Bypass Authentication. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server...

146

Accessing HPSS at NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

Accessing HPSS Accessing HPSS Accessing HPSS Once you have successfully generated an HPSS token you can access NERSC's HPSS in the different ways listed below. HSI and HTAR are usually the best ways to transfer data in and out of HPSS but other methods are also included. Access Method When to use this method Features Limitations HSI When a full-featured unix-like interface is desired high performance (parallel); unix-like user interface; firewall mode client is specific to HPSS version and might not work at other sites; HTAR When you have large collections of smaller (~10MB or less) files high performance (parallel); creates a tar file directly in HPSS along with an index file; more efficient for large collections of file same client limitations as HSI; also does not have firewall mode so using on a remote site with a firewall will require modification of firewall rules

147

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

704: RSA enVision Lets Remote Users View Files and Remote 704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

148

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA enVision Lets Remote Users View Files and Remote 4: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

149

3-1 Computing and Networking Services  

NLE Websites -- All DOE Office Websites (Extended Search)

CaNS Overview CaNS Overview Section 3-1-1 Computing and Networking Services The primary mission of Computing and Networking Services (CaNS) is to provide the infrastructure and computing services within the W.R. Wiley Environmental Molecular Sciences Laboratory (EMSL) for an advanced computing environment that enables staff, visitors, and collaborators to effectively use computer and network resources for their scientific and business requirements. In supporting growing business and research needs of EMSL in the area of information sciences, CaNS secures global information access to our facilities by providing online remote access to both computing resources and scientific equipment. A large portion of the efforts undertaken by CaNS staff members involves

150

Remotely serviced filter and housing  

DOE Patents (OSTI)

A filter system for a hot cell comprises a housing adapted for input of air or other gas to be filtered, flow of the air through a filter element, and exit of filtered air. The housing is tapered at the top to make it easy to insert a filter cartridge holds the filter element while the air or other gas is passed through the filter element. Captive bolts in trunnion nuts are readily operated by electromechanical manipulators operating power wrenches to secure and release the filter cartridge. The filter cartridge is adapted to make it easy to change a filter element by using a master-slave manipulator at a shielded window station. 6 figs.

Ross, M.J.; Zaladonis, L.A.

1987-07-22T23:59:59.000Z

151

Scientific Access  

NLE Websites -- All DOE Office Websites (Extended Search)

Scientific Access The APS is a open user facility that makes beam time available to the international scientific community through a peer-reviewed proposal process. Two access...

152

Open Access  

NLE Websites -- All DOE Office Websites (Extended Search)

Communication » Communication » Open Access Open Access Open access (OA) is the practice of providing unrestricted access via the Internet to peer-reviewed scholarly journal articles. Learn more below... Questions? Open Access Email Open access publishing and publications have experienced substantial growth, expansion and uptake in recent years. What exactly is an open access publication? There are many definitions, but in a nutshell an open access publication is a publication that provides immediately free online access to all users worldwide. This may sound like a tall order, and yet there are to date over 4000 journal publications that fit this definition. The need for this type of access has been driven by the out-of-control costs for scholarly publications. Statistics kept by the Association for Research Libraries

153

Publicly Verifiable Remote Data Integrity  

Science Conference Proceedings (OSTI)

More and more customers are outsourcing data storage to remote archive service providers that are responsible for properly preserving the data. As such, it has become crucial for an archive service to be capable of providing evidence to demonstrate the ... Keywords: data outsourcing, integrity, pairing, public verifiability

Ke Zeng

2008-10-01T23:59:59.000Z

154

Remote medicine  

Science Conference Proceedings (OSTI)

The international oil industry, catalyzed by a surge in exploration and production projects in remote regions, is giving health care for its travelers and expatriates a high priority. L.R. Aalund, the Journal`s Managing Editor--Technology, reports on why and how this is happening now. He covers this in articles on: health care in Russia, air ambulance evacuations, and the deployment of remote paramedics. Aalund gathered the information during trips to Finland and Russia and interviews with oil industry personnel, physicians, and other medical professionals in North America, Europe, and Siberia. Titles of the four topics presented in this special section on remote medicine are as follows: Oil companies focus on emergency care for expats in Russia; Air ambulance plan can be critical; Remote paramedics have high level of training; and Other facets of remote medicine.

NONE

1996-04-29T23:59:59.000Z

155

U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

92: VMware Workstation/Player VM Remote Device Bug Lets Local or 92: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x aBSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash.

156

U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

VMware Workstation/Player VM Remote Device Bug Lets Local or VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x ABSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash. Impact:

157

Remote Sensing  

E-Print Network (OSTI)

Evaluating ecological patterns and processes is crucial for the conservation of ecosystems [1]. In this view, remote sensing is a powerful tool for monitoring their status and change. This involves several tasks like biodiversity estimate, landscape ecology, and species distribution modeling, to name a few [2]. Due to the difficulties associated with field-based data collection [3], the use of remote sensing for estimating ecological status and change is promising since it provides a synoptic view of an area with a high temporal resolution [4]. Of course in some cases remote sensing should be viewed as a help to plan a field survey rather than a replacement of it. Further, its improper use may lead to pitfalls and misleading results. This special issue “Ecological Status and Change by Remote Sensing ” is devoted to provide an almost complete overview of robust methods applied to ecological status and change estimate by remote sensing. The contributions published in this special issue cover most of the ecological fields of research involving remote sensing, in particular: (i) mapping vegetation, species distribution modeling and land use status and change; (ii) estimating environmental processes; (iii) developing landscape ecology metrics; (iv) assessing community biodiversity; and (v) estimating climatic parameters. The authors submitting their manuscript to this special issue of Remote Sensing are amongst the

Duccio Rocchini

2010-01-01T23:59:59.000Z

158

MODIS Land Products Subsets Web Service  

NLE Websites -- All DOE Office Websites (Extended Search)

Web Service The MODIS Web service provides users with subsets of MODIS Land Products through standards based SOAP (Simple Object Access Protocol) Web service. Through the Web...

159

Generalized Role-Based Access Control for Securing Future Applications  

E-Print Network (OSTI)

As computing technology becomes more pervasive and broadband services are deployed into residential communities, new applications will emerge for the home and community environment. These applications will assist people in a variety of daily activities by enabling them to create, access, and manipulate information about the residents and resources in their homes. In a connected community, resources in the home and information about the residents of the home will be remotely accessible to both residents and guests, as well as to potentially malicious users. These new applications, as well as their users and environment, pose new security challenges. The challenges stem from two factors: the nature of the home itself---a private space with a wealth of personal and sensitive information---and the limited technical knowledge and capabilities of the home's residents.

Michael Covington Matthew; Ý Matthew; J. Moyer; Mustaque Ahamad

2000-01-01T23:59:59.000Z

160

U-271: Google Android Dialer TEL URL Handling Flaw Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Google Android Dialer TEL URL Handling Flaw Lets Remote Users Deny Service U-271: Google Android Dialer TEL URL Handling Flaw Lets Remote Users Deny Service October 1, 2012 -...

Note: This page contains sample records for the topic "remote access services" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Open Access  

E-Print Network (OSTI)

© 2007 Brewer; licensee BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License

Earl J Brewer; Earl J Brewer

2007-01-01T23:59:59.000Z

162

Presenting Accessibility to Mobility-Impaired Travelers  

E-Print Network (OSTI)

Behaviors of the Mobility-Disabled Consumer." Journal ofCampus Access Guide at the Disabled Student Program at UCto dental services for disabled people. A questionnaire

Nuernberger, Andrea

2008-01-01T23:59:59.000Z

163

ACCESS CONTROL  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TERMS/DEFINITIONS FROM DOE M 470.4-7 TERMS/DEFINITIONS FROM DOE M 470.4-7 ACCESS CONTROL. The process of permitting access or denying access to information, facilities, nuclear materials, resources, or designated security areas. ACCESS CONTROL MEASURES. Hardware and software features, physical controls, operating procedures, administrative procedures, and various combinations of these designed to detect or prevent unauthorized access to classified information; special nuclear materials; Government property; automated information systems, facilities, or materials; or areas containing the above and to enforce use of these measures to protect Departmental security and property interests. CRITICAL PATH SCENARIO. An adversary-based scenario that is generated during the conduct of a vulnerability assessment and accounts for adversary tactics that

164

U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0:HP Onboard Administrator Unspecified Flaw Lets Remote Users 0:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access October 13, 2011 - 8:15am Addthis PROBLEM: HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access PLATFORM: Onboard Administrator (OA) 3.21 through 3.31 ABSTRACT: A remote user can gain access to the target system reference LINKS: HP Support document ID: c03048779 SecurityTracker Alert ID: 1026158 CVE-2011-3155 IMPACT ASSESSMENT: Medium Discussion: A potential security vulnerability has been identified with HP Onboard Administrator (OA). The vulnerability could be exploited remotely to gain unauthorized access. Impact: A remote user can gain access to the target system. Solution: Onboard Administrator (OA) v3.32 is available.

165

Novell Services  

NLE Websites -- All DOE Office Websites (Extended Search)

CIS Department CIS Department Novell Services If you don't see the answer to your question here, contact the help desk at 486-HELP or submit a Help Request. Novell Netware is the labs main method of providing file and print services for the PC and Macintosh platforms. Novell end user services are free and include a backed up home directory and access to all distributed printers at LBL. Request a Novell account Request a new Novell printer Request a Novell file restore (choose PC for platform and Backups/Restores for problem) Novell iPrint Accessing Novell File Services Download the LBL Netware client Novell Server Information Novell Departmental Administrative Contacts Novell FAQ: How do I login to the Novell network? 9x | NT4/2000/XP Do I have the Netware client installed? 9x | NT4/2000/XP

166

Remote Inspection, Measurement and Handling for LHC  

E-Print Network (OSTI)

Personnel access to the LHC tunnel will be restricted to varying extents during the life of the machine due to radiation, cryogenic and pressure hazards. The ability to carry out visual inspection, measurement and handling activities remotely during periods when the LHC tunnel is potentially hazardous offers advantages in terms of safety, accelerator down time, and costs. The first applications identified were remote measurement of radiation levels at the start of shut-down, remote geometrical survey measurements in the collimation regions, and remote visual inspection during pressure testing and initial machine cool-down. In addition, for remote handling operations, it will be necessary to be able to transmit several real-time video images from the tunnel to the control room. The paper describes the design, development and use of a remotely controlled vehicle to demonstrate the feasibility of meeting the above requirements in the LHC tunnel. Design choices are explained along with operating experience to-dat...

Kershaw, K; Coin, A; Delsaux, F; Feniet, T; Grenard, J L; Valbuena, R

2007-01-01T23:59:59.000Z

167

REMOTE SENSING GEOLOGICAL SURVEY  

E-Print Network (OSTI)

REMOTE SENSING IN GEOLOGICAL SURVEY OF BRAZIL August/2010 Mônica Mazzini Perrotta Remote Sensing Division Head #12;SUMMARY The Geological Survey of Brazil mission The Remote Sensing Division Main remote, Paleontology, Remote Sensing Director of Hydrology and Land Management But Remote Sensing Division gives

168

Book Remote Browsing System using a Mobile Manipulator Task Accomplishment by Integrated Behaviors  

E-Print Network (OSTI)

/ , 21 Book Remote Browsing System using a Mobile Manipulator ­ Task Accomplishment by Integrated remote objects. A human uses the system to browse a book of a library from a remote location via. And we evaluated its performance through experimental results. Key Words: Access Media, Book Remote

Ohya, Akihisa

169

3-1 Computer and Network Services (CaNS)  

NLE Websites -- All DOE Office Websites (Extended Search)

CaNS User Resources CaNS User Resources Computer and Network Services (CaNS) The primary mission of the CaNS Group is to provide the infrastructure and computing services within the W.R. Wiley Environmental Sciences Laboratory (EMSL) for an advanced computing environment that enables staff, visitors, and collaborators to effectively use computer and network resources for their scientific research and business requirements. In supporting EMSL's growing business and research needs regarding information sciences, CaNS secures global information access to our facilities by providing online remote access to both computing resources and scientific equipment. A large portion of the CaNS Group's efforts involves providing customer support to EMSL researchers and offsite users. For

170

University Services Facilities Management  

E-Print Network (OSTI)

Loughlin is the practice area leader for Network Automation and Analytics with the IBM Global Business Services, Energy by leveraging all of the benefits of automation and digitization. Mark Welch and Kieran McLoughlin, IBM Global Business Services www.UtilitiesProject.com/10744 CHAPTER are being made by utilities in automation, remote

Weiblen, George D

171

Remote Sensing Technology Center of Japan (RESTEC) Collaborative Research and Training  

E-Print Network (OSTI)

Remote Sensing Technology Center of Japan (RESTEC) Collaborative Research and Training of Remote Sensing Technology August 2010 Kyoichi Ito Deputy General Manager Applications and Services Dept. Remote Sensing Technology Center of Japan (RESTEC) #12;Remote Sensing Technology Center of Japan (RESTEC

172

Smart Grid Applications Using Sensor Web Services .  

E-Print Network (OSTI)

??Sensor network web services have recently emerged as promising tools to provide remote management, data collection and querying capabilities for sensor networks. They can be… (more)

Asad, Omar

2011-01-01T23:59:59.000Z

173

Skeleton composition using remote data  

E-Print Network (OSTI)

Abstract. Skeletons simplify parallel programming by providing general patterns of parallel computations. When several skeletons are used inside the same program, skeleton composition usually leads to aggregation and redistribution of the intermediate data on a single process. Though the programmer can overcome the performance loss at a lower level of abstraction by altering the existing skeletons or not using them at all. A high-level concept like skeleton-based programming, however, calls for a more general solution. Remote data provides runtime mechanisms that allow declaratively specified processes to access other processes ’ data via remote handles. This enables the programmer to easily build complex skeletons by combining simpler ones. Skeletons can be composed without the drawback of collecting and then redistributing the data in between two skeleton instances. Another advantage is that skeletons which inherently depend on their inner communication patterns are easily implemented using remote data. We present the implementation of remote data in the parallel functional language Eden and show the definition of some example skeletons with a remote data interface.

Mischa Dieterle; Thomas Horstmeyer; Rita Loogen

2010-01-01T23:59:59.000Z

174

V-010: 3Com, HP, and H3C Switches SNMP Configuration Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ASSESSMENT: High DISCUSSION: A remote user with knowledge of the SNMP public community string can access potentially sensitive data (e.g., user names, passwords) in the...

175

U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Configuration Manager Database Authentication Bypass Vulnerability V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control...

176

Open Access Transmission Tariff  

NLE Websites -- All DOE Office Websites (Extended Search)

Transmission | OATT Transmission | OATT Skip Navigation Links Transmission Functions Infrastructure projects Interconnection OASIS OATT Western Open Access Transmission Service Tariff Revision Western Area Power Administration submitted its revised Open Access Transmission Service Tariff with the Federal Energy Regulatory Commission on Sept. 30, 2009. The tariff became effective on Dec. 1, 2009, as modified by Western's March 2, 2011 compliance filing. The revised tariff was developed to comply with FERC Order No. 890 and to be consistent with Western's statutory and regulatory requirements. It addresses changes in transmission services and planning. FERC issued an order on Dec. 2, 2010, granting Western's petition for a Declaratory Order approving the tariff as an acceptable reciprocity tariff, subject to Western making a compliance filing within 30 days to address items in Attachment C, Attachment P and Attachment Q. Western made its compliance filing on March 2, 2010, addressing FERC's Dec. 2, 2010, order. FERC accepted Western's March 2, 2011 compliance filing on April 25, 2011. Western has made several ministerial filings to its OATT as part of FERC's eTariff viewer system, the last of these was approved on March 29, 2013. Further detail can be found in the links below.Current OATT

177

Broadband and universal service  

Science Conference Proceedings (OSTI)

Section 254(b)(3) of the 1996 Telecommunications Act established the objective that residents of rural areas should have access to advanced telecommunications and information services comparable to services in urban areas. Pursuant to the passage of ... Keywords: Broadband policy, Empirical analysis, Rural, Telecommunications policy, Universal service

David Gabel

2007-07-01T23:59:59.000Z

178

H. R. 4604: a bill to promote competition in the natural gas market, to ensure open access to transportation service, to encourage production of natural gas, to provide natural gas consumers with adequate supplies at reasonable prices, to eliminate demand restraints, and for other purposes. Introduced in the House of Representatives, Ninety-Ninth Congress, Second Session, April 16, 1986  

Science Conference Proceedings (OSTI)

The Natural Gas Policy Act Amendments of 1986 promotes competition in the natural gas market. Title I ensures open access to transportation service by requiring that interstate pipelines not discriminate in providing transportation services. Title II encourages production of natural gas by removing wellhead price controls and repealing jurisdiction over first sales. Title III provides natural gas consumers with adequate supplies at reasonable prices and eliminates demand restraints. The bill was referred to the House Committee on Energy and Commerce.

Not Available

1986-01-01T23:59:59.000Z

179

U-201: HP System Management Homepage Bugs Let Remote Users Deny...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-051: Oracle Solaris Java Multiple Vulnerabilities...

180

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

an authentication flaw and gain access to the target user's account CVE-2011-3416. A remote user can exploit a flaw in the handling of cached content when Forms Authentication...

Note: This page contains sample records for the topic "remote access services" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

U-047: Siemens Automation License Manager Bugs Let Remote Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Siemens Automation License Manager Bugs Let Remote Users 7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code November 29, 2011 - 9:00am Addthis PROBLEM: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code. PLATFORM: Siemens Automation License Manager 500.0.122.1 ABSTRACT: Several vulnerabilities were reported in Siemens Automation License Manager. reference LINKS: SecurityTracker Alert ID: 1026354 Bugtraq Siemens Advisory Services IMPACT ASSESSMENT: Medium Discussion: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. A remote user can send specially crafted *_licensekey commands to trigger a

182

U-016: Cisco IOS Software HTTP Service Loading Denial of Service...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cisco IOS Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted device. The...

183

RICE: a reliable and efficient remote instrumentation collaboration environment  

Science Conference Proceedings (OSTI)

Remote access of scientific instruments over the Internet (i.e., remote instrumentation) demand high-resolution (2D and 3D) video image transfers with simultaneous real-time mouse and keyboard controls. Consequently, user quality of experience (QoE) ...

Prasad Calyam; Abdul Kalash; Ramya Gopalan; Sowmya Gopalan; Ashok Krishnamurthy

2008-01-01T23:59:59.000Z

184

24X7X365: mobile cloud access  

Science Conference Proceedings (OSTI)

In the present era computing technology have been evolved and integrated with other service-centric technologies to achieve better performance. Computing architecture and nature of access changed drastically the format of service-delivery model. Technologies ... Keywords: cloud, mobile access, mobile cloud, mobile services

Khalid Mohiuddin; Asharul Islam; Aftab Alam; Awais Ali

2012-09-01T23:59:59.000Z

185

Automated Computer Time Service (ACTS)  

Science Conference Proceedings (OSTI)

... provided since 1988 for users who need to synchronize computer clocks to ... For computers with Internet access, the Internet Time Service should be ...

2013-02-22T23:59:59.000Z

186

U-221: ISC BIND 9 DNSSEC Validation CVE-2012-3817 Denial of Service...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Off-by-one Bug Lets Remote Users Deny Service U-260: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service U-183: ISC BIND DNS Resource Records Handling Vulnerability...

187

Remote PC Security: Securing the home worker  

Science Conference Proceedings (OSTI)

A recent study of 1000 teleworkers in 10 countries, commissioned by Cisco, showed that one in five allows friends, family and others to use their work PC to access the Internet. Now is the time to pull stray remote workers back into the security fold. ...

Steven Furnell

2006-11-01T23:59:59.000Z

188

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack

189

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack

190

U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apache Traffic Server Host Header Processing Flaw Lets 4: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service March 27, 2012 - 7:00am Addthis PROBLEM: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service PLATFORM: Versions prior to 3.0.4 and 3.1.3 ABSTRACT: A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions. reference LINKS: SecurityTracker Alert ID: 1026847 CVE-2012-0256 Secunia Advisory SA48509 IMPACT ASSESSMENT: High Discussion: A remote user can send a request with a specially crafted 'Host' header value to trigger a heap allocation error and cause the target service to crash. Impact: A remote user can cause the target service to crash.

191

U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

34: Apache Traffic Server Host Header Processing Flaw Lets 34: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service March 27, 2012 - 7:00am Addthis PROBLEM: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service PLATFORM: Versions prior to 3.0.4 and 3.1.3 ABSTRACT: A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions. reference LINKS: SecurityTracker Alert ID: 1026847 CVE-2012-0256 Secunia Advisory SA48509 IMPACT ASSESSMENT: High Discussion: A remote user can send a request with a specially crafted 'Host' header value to trigger a heap allocation error and cause the target service to crash. Impact: A remote user can cause the target service to crash.

192

Femtocell access control strategy in UMTS and LTE  

Science Conference Proceedings (OSTI)

Femtocells have become an attractive device for operators to offer extended services on their licensed UMTS/LTE spectrum. In this article we focus on the access control strategy -- a crucial aspect for operators to give preferential access to femtocells ...

Assen Golaup; Mona Mustapha; Leo Boonchin Patanapongpibul

2009-09-01T23:59:59.000Z

193

Remote Shopping Robot System for Fresh Foods Method of handling foods  

E-Print Network (OSTI)

Remote Shopping Robot System for Fresh Foods ­ Method of handling foods ­ Tetsuo TOMIZAWA, Akihisa a mobile manipulator as a teleoperated tool for accessing and manipulating remote objects. A human uses the system to select and buy fresh foods of a super market from a remote location via the Internet. We

Ohya, Akihisa

194

Real-time remote control of a robot manipulator using Java and client-server architecture  

Science Conference Proceedings (OSTI)

The control of complex systems through PC networks is becoming increasingly important nowadays, both in the industries and in R&D centers. In this paper, a novel architecture is described which provides 24-h-a-day access to a remote system for remote ... Keywords: RS232, client, communication protocol, internet, java, planar manipulator, real-time, remote control, server

F. M. Raimondi; L. S. Ciancimino; M. Melluso

2005-03-01T23:59:59.000Z

195

Access to the ALS  

NLE Websites -- All DOE Office Websites (Extended Search)

Access to the ALS Access to the ALS Print User Access The ALS experiment floor (Building 6) is a Controlled Access Area for radiation protection. All ALS users are required to...

196

Access to the ALS  

NLE Websites -- All DOE Office Websites (Extended Search)

Gate Access Access to the ALS Print User Access The ALS experiment floor (Building 6) is a Controlled Access Area for radiation protection. All ALS users are required to register...

197

V-014: Cisco Prime Data Center Network Manager JBoss RMI Services...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let...

198

Distributed user access control in sensor networks  

Science Conference Proceedings (OSTI)

User access control in sensor networks defines a process of granting user the access right to the information and resources. It is essential for the future real sensor network deployment in which sensors may provide users with different services in terms ...

Haodong Wang; Qun Li

2006-06-01T23:59:59.000Z

199

City of San Jose- Solar Access Design Guidelines  

Energy.gov (U.S. Department of Energy (DOE))

The San Jose Environmental Services Department has developed voluntary guidelines to encourage solar orientation in new construction. These Solar Access Design Guidelines specify that the long...

200

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary 6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2012 - 6:00am Addthis PROBLEM: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: CA ARCserve Backup for Windows r12.5, r15, r16 ABSTRACT: Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. REFERENCE LINKS: SecurityTracker Alert ID: 1027683 CA Technologies Support CVE-2012-2971 CVE-2012-2972 IMPACT ASSESSMENT: High DISCUSSION: A remote user can send specially crafted RPC requests to execute arbitrary code on the target system [CVE-2012-2971]. The code will run with the

Note: This page contains sample records for the topic "remote access services" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary 6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2012 - 6:00am Addthis PROBLEM: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: CA ARCserve Backup for Windows r12.5, r15, r16 ABSTRACT: Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. REFERENCE LINKS: SecurityTracker Alert ID: 1027683 CA Technologies Support CVE-2012-2971 CVE-2012-2972 IMPACT ASSESSMENT: High DISCUSSION: A remote user can send specially crafted RPC requests to execute arbitrary code on the target system [CVE-2012-2971]. The code will run with the

202

V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users 5: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service August 23, 2013 - 1:26am Addthis PROBLEM: A vulnerability was reported in McAfee Email Gateway. A remote user can cause denial of service conditions. PLATFORM: McAfee Email Gateway (MEG) 7.5 ABSTRACT: A remote user can cause the SMTP proxy to stop responding. REFERENCE LINKS: SecurityTracker Alert ID: 1028941 GENERIC-MAP-NOMATCH IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in McAfee Email Gateway. A remote user can cause denial of service conditions.A remote user can send a specially crafted e-mail to cause the ws_inv-smtp process to enter an infinite loop and cause the target SMTP proxy to stop responding.

203

V-120: EMC Smarts Network Configuration Manager Java RMI Access Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: EMC Smarts Network Configuration Manager Java RMI Access 0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control March 27, 2013 - 12:51am Addthis PROBLEM: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control PLATFORM: Version(s): prior to 9.2 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028342 www.emc.com CVE-2013-0935 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can access some Java Remote Method Invocation methods without authenticating to gain control of the target system. A user can exploit unspecified flaws in the NCM System Management

204

V-120: EMC Smarts Network Configuration Manager Java RMI Access Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: EMC Smarts Network Configuration Manager Java RMI Access 0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control March 27, 2013 - 12:51am Addthis PROBLEM: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control PLATFORM: Version(s): prior to 9.2 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028342 www.emc.com CVE-2013-0935 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can access some Java Remote Method Invocation methods without authenticating to gain control of the target system. A user can exploit unspecified flaws in the NCM System Management

205

U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Microsoft Active Directory CRL Validation Flaw Lets Remote 1: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication November 9, 2011 - 8:30am Addthis PROBLEM: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Active Directory Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows 7 for 32-bit Systems Windows 7 for 32-bit Systems Service Pack 1

206

Remote Patient Monitoring Within a Future 5G Infrastructure  

Science Conference Proceedings (OSTI)

Systems of wearable or implantable medical devices (IMD), sensor systems for monitoring and transmitting physiological recorded signals, will in future health care services be used for purposes of remote monitoring. Today, there exist several constraints, ... Keywords: Implantable medical devices, Mobile communication, Remote monitoring, Security, Telemedicine, Wearable sensors

Vladimir Oleshchuk; Rune Fensli

2011-04-01T23:59:59.000Z

207

CMS FNAL Remote Operations Center  

NLE Websites -- All DOE Office Websites (Extended Search)

LHC@FNAL Remote Operations Center (ROC) at Fermilab is located on the first floor of Wilson Hall. From the ROC, shifters perform real-time monitoring of the data recorded by the CMS Experiment. LHC@FNAL Remote Operations Center (ROC) at Fermilab is located on the first floor of Wilson Hall. From the ROC, shifters perform real-time monitoring of the data recorded by the CMS Experiment. ROC WBM / WBM Twiki FNAL ELog Mailing List Agendas / ROC Presentations & Notes WBM Publications Runs CVS SiTracker / MTCC AEM / AEM help Screen Snapshot Service FAQ Accounts & Nodes New User Instructions WebCams CMS Workbook Directories / Glossaries Photos Vidyo / EVO Google / Wikipedia LHC@FNAL Computing Console Map Documents Mailing List One East Mtg Schedule rocshare Telephones To Do List Video Conferencing CMS Shifter CSC DAQ DataOps DQM / FNAL ROC ECAL Event Display HCAL Pixel Trigger Global Run Calendar CMS Live Contact List DAQ Status DAS

208

T-624: Novell eDirectory LDAP-SSL Memory Allocation Error Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Novell eDirectory LDAP-SSL Memory Allocation Error Lets 4: Novell eDirectory LDAP-SSL Memory Allocation Error Lets Remote Users Deny Service T-624: Novell eDirectory LDAP-SSL Memory Allocation Error Lets Remote Users Deny Service May 17, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in Novell eDirectory. A remote user can cause denial of service conditions. A remote user can send specially crafted data to cause the target service to crash. On Netware-based systems, the system may crash. PLATFORM: Red Hat Enterprise, SuSE,AIX, HP/UX, Solaris, Windows 2000, 2003 ABSTRACT: A remote user can cause denial of service conditions. reference LINKS: Novell eDirectory - LDAP-SSL SECURELIST.ORG SecurityFocus BugTrackID: 47858 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Novell eDirectory. A remote user can cause

209

V-055: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Firefly Media Server Null Pointer Dereference Lets Remote 5: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service V-055: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service December 26, 2012 - 9:00am Addthis PROBLEM: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service PLATFORM: Version(s): 1.0.0.1359 and prior ABSTRACT: A vulnerability was reported in Firefly Media Server REFERENCE LINKS: SecurityTracker Alert ID: 1027917 HTB Advisory ID: HTB23129 CVE-2012-5875 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can send specially crafted data to trigger a null pointer dereference and cause the target service to crash. IMPACT: A remote user can cause denial of service conditions. SOLUTION: No solution was available at the time of this entry. Addthis

210

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

168: EMC Documentum Information Rights Management Server Bugs Let 168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service May 14, 2012 - 7:00am Addthis PROBLEM: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service PLATFORM: Information Rights Management Server 4.x, 5.x ABSTRACT: Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions. Reference links: SecurityTracker Alert ID: 1027058 CVE-2012-2276 CVE-2012-2277 IMPACT ASSESSMENT: High Discussion: A remote authenticated user can send specially crafted data to trigger a NULL pointer dereference and cause the target service to crash. A remote

211

V-055: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Firefly Media Server Null Pointer Dereference Lets Remote 5: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service V-055: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service December 26, 2012 - 9:00am Addthis PROBLEM: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service PLATFORM: Version(s): 1.0.0.1359 and prior ABSTRACT: A vulnerability was reported in Firefly Media Server REFERENCE LINKS: SecurityTracker Alert ID: 1027917 HTB Advisory ID: HTB23129 CVE-2012-5875 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can send specially crafted data to trigger a null pointer dereference and cause the target service to crash. IMPACT: A remote user can cause denial of service conditions. SOLUTION: No solution was available at the time of this entry. Addthis

212

Universal service: A new definition?  

Science Conference Proceedings (OSTI)

The concept of ''universal service obligation'' (USO) has been around for decades; however, its definition continues to change. The notion that the last mile of fixed-line access should be subsidized has spread around the world, despite well reasoned ... Keywords: Auctions, Pricing policy, Subsidy, Universal service/access/connectivity

James Alleman; Paul Rappoport; Aniruddha Banerjee

2010-02-01T23:59:59.000Z

213

ENGO 435 Remote Sensing LAB 1: INTRODUCTION TO REMOTE SENSING  

E-Print Network (OSTI)

ENGO 435 ­ Remote Sensing Fall 2003 LAB 1: INTRODUCTION TO REMOTE SENSING Due: By 4:30 pm on September 30th Objectives: To familiarize you with: Remote sensing resources on the Internet. Some remote (Metadata). Part A: Remote Sensing Resources There is a wealth of remote sensing information and data

Habib, Ayman

214

Vacuum Vessel Remote Handling  

E-Print Network (OSTI)

FIRE Vacuum Vessel and Remote Handling Overview B. Nelson, T. Burgess, T. Brown, H-M Fan, G. Jones #12;13 July 2002 Snowmass Review: FIRE Vacuum Vessel and Remote Handling 2 Presentation Outline · Remote Handling - Maintenance Approach & Component Classification - In-Vessel Transporter - Component

215

Event exposure for web services: a grey-box approach to compose and evolve web services  

Science Conference Proceedings (OSTI)

The service-oriented architecture (SOA) is an emerging software engineering paradigm for developing distributed enterprise applications. In this paradigm, Web services are encapsulated and published as black-box components accessible to service consumers ...

Chunyang Ye; Hans-Arno Jacobsen

2010-01-01T23:59:59.000Z

216

NSLS Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Services NSLS Services Computing Services Lab Space Libraries Postal Services Procurement Repair & Equipment Services Shipping Procedures Storage User Accounts Workshop Procedures...

217

Access to the ALS  

NLE Websites -- All DOE Office Websites (Extended Search)

Access to the ALS Print User Access The ALS experiment floor (Building 6) is a Controlled Access Area for radiation protection. All ALS users are required to register with the ALS...

218

Capital Access Program (Vermont)  

Energy.gov (U.S. Department of Energy (DOE))

The Capital Access Program provides loan guarantees to small businesses seeking access to commercial credit. Premiums paid by the borrower and matched by Vermont Economic Development Authority fund...

219

Remote Handling and Maintenance in the Facility for Rare Isotope Beams  

SciTech Connect

Michigan State University (MSU) in East Lansing, MI was selected by the U.S. Department of Energy (DOE) to design and establish a Facility for Rare Isotope Beams (FRIB), a cutting-edge research facility to advance the understanding of rare nuclear isotopes and the evolution of the cosmos. The research conducted at the FRIB will involve experimentation with intense beams of rare isotopes within a well-shielded target cell that will result in activation and contamination of components. The target cell is initially hands-on accessible after shutdown and a brief cool-down period. Personnel are expected to have hands-on access to the tops of shielded component modules with the activated in-beam sections suspended underneath. The modules are carefully designed to include steel shielding for protecting personnel during these hand-on operations. However, as the facility has greater levels of activation and contamination, a bridge mounted servomaniputor may be added to the cell, to perform the disconnecting of services to the component assemblies. Dexterous remote handling and exchange of the modularized activated components is completed at a shielded window workstation with a pair of master-slave manipulators. The primary components requiring exchange or maintenance are the production target, the beam wedge filter, the beam dump, and the beam focusing and bending magnets. This paper provides an overview of the FRIB Target Facility remote handling and maintenance design requirements, concepts, and techniques.

Burgess, Thomas W [ORNL; Aaron, Adam M [ORNL; Carroll, Adam J [ORNL; DeVore, Joe R [ORNL; Giuliano, Dominic R [ORNL; Graves, Van B [ORNL; Bennett, Richard P [Facility for Rare Isotope Beams (FRIB); Bollen, Georg [Facility for Rare Isotope Beams (FRIB); Cole, Daniel F. [Facility for Rare Isotope Beams (FRIB); Ronningen, Reginald M. [Facility for Rare Isotope Beams (FRIB); Schein, Mike E [Facility for Rare Isotope Beams (FRIB); Zeller, Albert F [Facility for Rare Isotope Beams (FRIB)

2011-01-01T23:59:59.000Z

220

Achieving distributed user access control in sensor networks  

Science Conference Proceedings (OSTI)

User access control in sensor networks defines a process of granting user an access right to the stored information. It is essential for future real sensor network deployment in which sensors may provide users with different services in terms of data ... Keywords: Elliptic Curve Cryptography, Public key cryptography, Sensor networks, User access control

Haodong Wang; Qun Li

2012-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "remote access services" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Anti-pattern free code-first web services for state-of-the-art Java WSDL generation tools  

Science Conference Proceedings (OSTI)

Service-Oriented Computing SOC promotes structuring applications via coarse-grained, remote components called services. To materialise SOC, web services is the most common choice. A web service comprises an implementation and a description using the ...

José Luis Ordiales Coscia; Cristian Mateos; Marco Crasso; Alejandro Zunino

2013-05-01T23:59:59.000Z

222

Universal service and disabled people  

Science Conference Proceedings (OSTI)

The EU regulatory framework enacted 25 May 2011 has the objective to provide functionally equal access to telecommunication services for disabled persons. What are the rules, who are the target groups, and what obstacles do they face when using various ... Keywords: Disabled people, European regulation, Relay services, Universal service

Nico van Eijk; Joost Poort

2012-03-01T23:59:59.000Z

223

Remote Access to the BNL Network, Cyber Security, Information...  

NLE Websites -- All DOE Office Websites (Extended Search)

Virtual Private Network (VPN) at Brookhaven CryptoCard tokens (hard or soft) will not supported after December 31, 2010. Please switch to RSA SecureID tokens as soon as possible....

224

Remote data access and analysis using SciDB  

E-Print Network (OSTI)

SciDB is an innovative data analysis system that provides fast querying and manipulation of large amounts of time-series, scientific data. This thesis describes the design of a framework that provides a user interface to ...

Anderson, Alan M., M. Eng. Massachusetts Institute of Technology

2012-01-01T23:59:59.000Z

225

Distributed anemone: transparent low-latency access to remote memory  

Science Conference Proceedings (OSTI)

Performance of large memory applications degrades rapidly once the system hits the physical memory limit and starts paging to local disk. We present the design, implementation and evaluation of Distributed Anemone (Adaptive Network Memory Engine) ...

Michael R. Hines; Jian Wang; Kartik Gopalan

2006-12-01T23:59:59.000Z

226

An Authentication Framework for Web Access to Remote ...  

Science Conference Proceedings (OSTI)

... The proliferation of computing platforms in the world often presents a ... (collision resistance) ... address, user status within the system (active or inactive ...

227

Remote Sensing ENGO 435 Introduction to Remote Sensing  

E-Print Network (OSTI)

1 Remote Sensing ENGO 435 Introduction to Remote Sensing Fall 2003 #12;2 Remote Sensing ENGO 435://www.geomatics.ucalgar.ca/~habib/courses.html #12;3 Remote Sensing ENGO 435 Grading Scheme · Lab Assignments (5 labs): (25% of Total Grade will be reduced by 10% per day for each day overdue. #12;4 Remote Sensing ENGO 435 Programming & Software

Habib, Ayman

228

Remote foods shopping robot system in a supermarket Tetsuo TOMIZAWA, National Inst. of Advanced Industrial Science and Technology  

E-Print Network (OSTI)

with the integrated system. Key Words: Remote shopping, Foods handling, Human interface 1. [1] 2 Remote foods shopping robot system in a supermarket Tetsuo TOMIZAWA, National Inst as a teleoperated tool for accessing and manipulating remote objects. This system attempts to answer the challenge

Ohya, Akihisa

229

U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets 08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service October 11, 2011 - 8:00am Addthis PROBLEM: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service PLATFORM: Symantec Data Loss Prevention Enforce/Detection Servers for Windows 10.x, 11.x ABSTRACT: A remote user can create a file that, when processed by the target filter, will cause partial denial of service conditions. reference LINKS: Symantec Security Advisory SYM11-013 SecurityTracker Alert ID: 1026157 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities were reported in Symantec Data Loss Prevention. A remote user can cause denial of service conditions on the target system.A

230

Remote reset circuit  

SciTech Connect

A remote reset circuit acts as a stand-alone monitor and controller by clocking in each character sent by a terminal to a computer and comparing it to a given reference character. When a match occurs, the remote reset circuit activates the system's hardware reset line. The remote reset circuit is hardware based centered around monostable multivibrators and is unaffected by system crashes, partial serial transmissions, or power supply transients.

Gritzo, Russell E. (West Melbourne, FL)

1987-01-01T23:59:59.000Z

231

Remote reset circuit  

DOE Patents (OSTI)

A remote reset circuit acts as a stand-along monitor and controller by clocking in each character sent by a terminal to a computer and comparing it to a given reference character. When a match occurs, the remote reset circuit activates the system's hardware reset line. The remote reset circuit is hardware based centered around monostable multivibrators and is unaffected by system crashes, partial serial transmissions, or power supply transients. 4 figs.

Gritzo, R.E.

1985-09-12T23:59:59.000Z

232

Remote Sensing News  

Science Conference Proceedings (OSTI)

... Remote Sensing News. (showing 1 - 6 of 6). Photonic Thermometers Release Date: 11/28/2012 Click here for animation more. ...

2010-10-21T23:59:59.000Z

233

Remote Systems Design & Deployment  

Science Conference Proceedings (OSTI)

The Pacific Northwest National Laboratory (PNNL) was tasked by Washington River Protection Solutions, LLC (WRPS) to provide information and lessons learned relating to the design, development and deployment of remote systems, particularly remote arm/manipulator systems. This report reflects PNNL’s experience with remote systems and lays out the most important activities that need to be completed to successfully design, build, deploy and operate remote systems in radioactive and chemically contaminated environments. It also contains lessons learned from PNNL’s work experiences, and the work of others in the national laboratory complex.

Bailey, Sharon A.; Baker, Carl P.; Valdez, Patrick LJ

2009-08-28T23:59:59.000Z

234

Technologies for Remote Monitoring of Substation Assets: Physical Security  

Science Conference Proceedings (OSTI)

This report assesses the benefits of including remote monitoring with the various security technologies used for providing physical security to substation facilities and equipment. This remote monitoring provides near-real-time security information on the access points to substation facilities as well as the status and health of equipment to determine if the equipment has been tampered with or is otherwise not functioning correctly. The types of security technologies include locks at gates and doors, vid...

2006-03-13T23:59:59.000Z

235

NBP RFI: Data Access | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NBP RFI: Data Access NBP RFI: Data Access NBP RFI: Data Access The National Rural Electric Cooperative Association (NRECA) is the national service organization representing more than 900 not-for-profit, member-owned rural electric cooperatives ("Cooperatives"). Most of NRECA's members are distribution cooperatives, providing retail electric service to more than 42 million consumers in 47 states. NRECA members also include approximately 66 generation and transmission ("G&T") cooperatives that supply wholesale power to their distribution cooperative member-owners. Cooperatives provide service to approximately 75 percent of the nation's land mass, resulting in a consumer density of just seven consumers per mile of line, significantly less density than that of

236

REMOTE SENSING ACTIVITIES Caiti Steele  

E-Print Network (OSTI)

REMOTE SENSING ACTIVITIES Caiti Steele #12;REMOTE SENSING ACTIVITIES Remote sensing of biomass al., 2010) Remote sensing for mapping Ecological States: Spatially-Explicit Representation of State and Steele, in preparation) #12;REMOTE SENSING OF BIOMASS Can reflectance indices derived from Landsat

237

Toward Secure Services from Untrusted Developers  

E-Print Network (OSTI)

We present a secure service prototype built from untrusted,contributed code.The service manages private data for a variety of different users, anduser programs frequently require access to other users' private data.However, ...

Brodsky, Micah

2007-08-06T23:59:59.000Z

238

U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Red Hat Certificate System Bugs Let Remote Users Conduct 7: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks July 20, 2012 - 7:00am Addthis PROBLEM: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks PLATFORM: Red Hat Certificate System v8 ABSTRACT: Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate. reference LINKS: Advisory: RHSA-2012:1103-1 SecurityTracker Alert ID: 1027284 CVE-2012-2662 CVE-2012-3367 IMPACT ASSESSMENT: Medium Discussion: The Agent and End Entity pages do not properly filter HTML code from

239

NSLS Services | Postal Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Postal Services Postal Services U.S. Postal Service BNL has a full-service U.S. Postal Service Office (Upton branch) located in Staff Services, Building 179, x2539. BNL Mail Service Mail is delivered and picked up twice a day from each building on site. Users should leave internal lab mail (brown envelopes, no stamps needed) and U.S. Mail (regular envelopes, stamps required) in the outgoing mail boxes at NSLS mail stop 725A, located in the lobby by the elevator. Receiving Mail During regular working hours, packages and other special deliveries are brought to the Stockroom while regular mail is taken to the mailstops around the building. Each beam port is assigned a mail slot at NSLS mail stop 725A near the elevator in the lobby. The beamline number should be on all mail addressed to users. Mail to users should be addressed as follows

240

Hybrid power technology for remote military facilities  

DOE Green Energy (OSTI)

The Department of Defense (DoD) operates hundreds of test, evaluation, and training facilities across the US and abroad. Due to the nature of their missions, these facilities are often remote and isolated from the utility grid. The preferred choice for power at these facilities has historically been manned diesel generators. The DoD Photovoltaic Review Committee, estimates that on the order of 350 million gallons of diesel fuel is burned each year to generate the 2000 GWh of electricity required to operate these remote military facilities. Other federal agencies, including the National Park Service and the USDA Forest Service use diesel generators for remote power needs as well. The generation of power diesel generators is both expensive and detrimental to the environment. The augmentation of power from diesel generators with power processing and battery energy storage enhances the efficiency and utilization of the generator resulting in lower fuel consumption and lower generator run- time in proportion to the amount of renewables added. The hybrid technology can both reduce the cost of power and reduce environmental degradation at remote DoD facilities. This paper describes the expected performance and economics of photovoltaic/diesel hybrid systems. Capabilities and status of systems now being installed at DoD facilities are presented along with financing mechanisms available within DoD.

Chapman, R.N.

1996-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "remote access services" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Ethiopia Energy Access Project | Open Energy Information  

Open Energy Info (EERE)

Ethiopia Energy Access Project Ethiopia Energy Access Project Jump to: navigation, search Name of project Ethiopia Energy Access Project Location of project Ethiopia Energy Services Lighting, Cooking and water heating, Information and communications Year initiated 2005 Organization World Bank Website http://documents.worldbank.org Coordinates 9.145°, 40.489673° References The World Bank[1] The Energy Access Project for Ethiopia will establish a sustainable program for expanding the population's access to electricity and improving the quality and adequacy of electricity supply, reduce environmental degradation and improve energy end-use efficiency; reduce the barriers to the wide spread adoption of renewable energy technologies, and provide technical support for institutional and capacity building of key sector

242

Web accessible image similarity measurements  

Science Conference Proceedings (OSTI)

Web accessible image similarity measurements. Background: There ... messages). Web Access to Image Similarity Measurements. ...

2013-04-16T23:59:59.000Z

243

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Barracuda SSL VPN Bug Lets Remote Users Bypass 7: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication January 25, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN. PLATFORM: The vulnerability has been verified to exist in Barracuda SSL VPN version 2.2.2.203 ABSTRACT: A remote user can gain administrative access to the target system. REFERENCE LINKS: SecurityTracker Alert ID: 1028039 Barracuda Networks Advisory IMPACT ASSESSMENT: High DISCUSSION: A remote user can set a specially crafted Java system property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database dumps, shutdown the system, and set new administrative

244

V-231: Cisco Identity Services Engine Discloses Authentication Credentials  

NLE Websites -- All DOE Office Websites (Extended Search)

1: Cisco Identity Services Engine Discloses Authentication 1: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users August 30, 2013 - 3:01am Addthis PROBLEM: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials. PLATFORM: Cisco Identity Services Engine (ISE) 1.x ABSTRACT: A vulnerability was reported in Cisco Identity Services Engine REFERENCE LINKS: SecurityTracker Alert ID: 1028965 CVE-2013-3471 IMPACT ASSESSMENT: Meduim DISCUSSION: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials.The system stores the username and password of an authenticated user within hidden HTML form fields. A

245

T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: HP Security Bulletin - HP-UX Running OpenSSL, Remote 0: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass March 4, 2011 - 3:05pm Addthis PROBLEM: Potential Security Impact: Remote execution of arbitrary code, Denial of Service (DoS), authentication bypass. PLATFORM: HP-UX B.11.11, B.11.23, B.11.31 running OpenSSL before vA.00.09.08q. ABSTRACT: A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass. reference LINKS: Net-Security Advisory: HPSBUX02638

246

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

247

T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

70: HP Security Bulletin - HP-UX Running OpenSSL, Remote 70: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass March 4, 2011 - 3:05pm Addthis PROBLEM: Potential Security Impact: Remote execution of arbitrary code, Denial of Service (DoS), authentication bypass. PLATFORM: HP-UX B.11.11, B.11.23, B.11.31 running OpenSSL before vA.00.09.08q. ABSTRACT: A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass. reference LINKS: Net-Security Advisory: HPSBUX02638

248

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

249

A versatile internet-accessible electronics workbench with DC domain experimentation and troubleshooting capabilities  

E-Print Network (OSTI)

iLabs are online laboratories that give students access to various experimental setups enabling them to conduct experiments based on real equipment via the Internet, remotely from any part of the world. The MIT iLab Project ...

Shroff, Rahul

2009-01-01T23:59:59.000Z

250

Design and implementation of a direct access file system (DAFS) kernel server for FreeBSD  

Science Conference Proceedings (OSTI)

The Direct Access File System (DAFS) is an emerging commercial standard for network-attached storage on server cluster interconnects. The DAFS architecture and protocol leverage network interface controller (NIC) support for user-level networking, remote ...

Kostas Magoutis

2002-02-01T23:59:59.000Z

251

Robust services in dynamic systems  

E-Print Network (OSTI)

Our growing reliance on online services accessible on the Internet demands highly- available systems that work correctly without interruption. This thesis extends previous work on Byzantine-fault-tolerant replication to ...

Rodrigues, Rodrigo Seromenho Miragaia, 1975-

2005-01-01T23:59:59.000Z

252

U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

is configured in reverse proxy mode and uses the RewriteRule or ProxyPassMatch directives with a pattern match, a remote user can send a specially crafted request to access...

253

Remote Sensing May Provide Unprecedented Hydrological Data http://www.agu.org/eos_elec, 1999 American Geophysical Union.  

E-Print Network (OSTI)

Remote Sensing May Provide Unprecedented Hydrological Data http://www.agu.org/eos_elec, © 1999 American Geophysical Union. Remote Sensing May Provide Unprecedented Hydrological Data -- Randal D. Koster, Agricultural Research Service, U.S. Department of Agriculture, Beltsville, Md., USA Use of remote sensing

Houser, Paul R.

254

T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

613: Microsoft Excel Axis Properties Remote Code Execution 613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability May 2, 2011 - 7:42am Addthis PROBLEM: Microsoft Excel is prone to a remote code-execution vulnerability because the applications fail to sufficiently validate user-supplied input. PLATFORM: Microsoft Excel (2002-2010) ABSTRACT: Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service

255

T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code 526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability January 3, 2011 - 2:38pm Addthis PROBLEM: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability PLATFORM: Microsoft Internet Explorer 8.0.7600.16385 ABSTRACT: Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected. reference LINKS: SecurityFocus - Microsoft Internet Explorer

256

U-016: Cisco IOS Software HTTP Service Loading Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

16: Cisco IOS Software HTTP Service Loading Denial of Service 16: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability October 21, 2011 - 9:00am Addthis PROBLEM: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability . PLATFORM: Cisco IOS Software ABSTRACT: An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition. reference LINKS: CISCO Security Intelligence Operations IntelliShield ID: 24436 CVE-2011-2586 IMPACT ASSESSMENT: Medium Discussion: Cisco IOS Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted device. The vulnerability is due to improper

257

Environments for Remote Teaching in Embedded Systems Courses Christian Trodhandl Thomas Handl Markus Proske Bettina Weiss  

E-Print Network (OSTI)

Environments for Remote Teaching in Embedded Systems Courses Christian Tr¨odhandl Thomas Handl points for discussion at the workshop: How to handle remote access? In a distance lab with a limited/2, 1040 Vienna, Austria {troedhandl,handl,proske,bw}@ecs.tuwien.ac.at 1 Introduction Embedded systems lab

258

How Evolving Network Access and Network Management Technologies are Redefining the Competitive Wireless Markets  

Science Conference Proceedings (OSTI)

This paper examines some of the key problems users encounter when accessing current generation wireless networks. Using a case study of a hypothetical user, the authors explore the emerging services and the new broadband wireless network technologies ... Keywords: Autonomic Communications, Broadband Wireless Access Technologies, Cognitive Wireless Networks, Short and Long-Term Service Contracts, Two-Sided Markets, User-Centric Services

Fernando Beltrán; Jairo A. Gutiérrez; José Luis Melús

2011-07-01T23:59:59.000Z

259

Consumer Devices for eCommerce Access  

Science Conference Proceedings (OSTI)

It is widely predicted that electronic commerce will have a far-reaching impact on businesses in the next few years. For this to occur it will be essential that users are able to access and use eCommerce services when and where they wish, at times and ...

M. C. Revett; G. J. South

1999-07-01T23:59:59.000Z

260

Remote electrochemical sensor  

DOE Patents (OSTI)

An electrochemical sensor for remote detection, particularly useful for metal contaminants and organic or other compounds. The sensor circumvents technical difficulties that previously prevented in-situ remote operations. The microelectrode, connected to a long communications cable, allows convenient measurements of the element or compound at timed and frequent intervals and instrument/sample distances of ten feet to more than 100 feet. The sensor is useful for both downhole groundwater monitoring and in-situ water (e.g., shipboard seawater) analysis.

Wang, Joseph (Las Cruces, NM); Olsen, Khris (Richland, WA); Larson, David (Las Cruces, NM)

1997-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "remote access services" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

73: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute...

262

Towards web accessibility certification: the findings of the Support-EAM project  

Science Conference Proceedings (OSTI)

This paper presents the results of a European Specific Support Action whose objective was to explore the possibility to certify the accessibility of Internet services and the possible implications for a eAccessibility Quality Mark. The project initiated ... Keywords: certification, conformity, eAccessibility, quality mark, supplier's declaration, web accessibility

Dominique Burger; Pierre Guillou

2006-07-01T23:59:59.000Z

263

Securing information gateways with derivation-constrained access control  

Science Conference Proceedings (OSTI)

In pervasive computing environments, information gateways derive specific information, such as a person's location, from raw data provided by a service, such as a videostream offered by a camera. Here, access control to confidential raw data provided ...

Urs Hengartner; Peter Steenkiste

2006-04-01T23:59:59.000Z

264

Accelerating Access | OSTI, US Dept of Energy, Office of Scientific...  

Office of Scientific and Technical Information (OSTI)

and services, OSTI is a leader in increasing access to the government's vast stores of R&D results. As OSTI has increased precision and power of information search tools,...

265

REMEM: REmote MEMory as Checkpointing Storage  

SciTech Connect

Checkpointing is a widely used mechanism for supporting fault tolerance, but notorious in its high-cost disk access. The idea of memory-based checkpointing has been extensively studied in research but made little success in practice due to its complexity and potential reliability concerns. In this study we present the design and implementation of REMEM, a REmote MEMory checkpointing system to extend the checkpointing storage from disk to remote memory. A unique feature of REMEM is that it can be integrated into existing disk-based checkpointing systems seamlessly. A user can flexibly switch between REMEM and disk as checkpointing storage to balance the efficiency and reliability. The implementation of REMEM on Open MPI is also introduced. The experimental results confirm that REMEM and the proposed adaptive checkpointing storage selection are promising in both performance, reliability and scalability.

Jin, Hui [Illinois Institute of Technology; Sun, Xian-He [Illinois Institute of Technology; Chen, Yong [ORNL; Ke, Tao [Illinois Institute of Technology

2010-01-01T23:59:59.000Z

266

Role Based Access Control  

Science Conference Proceedings (OSTI)

... Nash and Poland [10] discuss the application of role based access control to cryptographic authentication devices commonly used in the banking ...

267

Access Grid - CECM  

E-Print Network (OSTI)

"The Access Grid (AG) is the ensemble of resources that can be used to support ... We shall also illustrate the basic capture capacities that Smart Technology's ...

268

Science Open Access Journals  

Office of Scientific and Technical Information (OSTI)

SOAJ allows the user to search multiple open access publications with a single query. Results are consolidated and returned in relevance-ranked order, and users are...

269

Making VRML Accessible  

Science Conference Proceedings (OSTI)

... Paper - Making VRML Accessible for People with Disabilities by Sandy Ressler and Qiming Wang to Appear in Proceeding of ASSETS 98. ...

270

U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code April 4, 2012 - 7:15am Addthis PROBLEM: A vulnerability was reported in HP-UX PLATFORM: Version(s): 11.11, 11.23; running DCE ABSTRACT: A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to execute arbitrary code on the target system. The code will run with the privileges of the target service. Reference LINKS: Vendor Advisory Security Tracker ID 1026885 CVE-2012-0131 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified in HP-UX running DCE. The vulnerability could be exploited remotely to create a Denial of Service (DoS).

271

U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Samba Bug Lets Remote Users Execute Arbitrary Code 0: Samba Bug Lets Remote Users Execute Arbitrary Code U-110: Samba Bug Lets Remote Users Execute Arbitrary Code February 24, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: Version(s): prior to 3.4.0 ABSTRACT: A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba. A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. The code will run with the

272

Burkina Faso Energy Access Project | Open Energy Information  

Open Energy Info (EERE)

Faso Energy Access Project Faso Energy Access Project Jump to: navigation, search Name of project Burkina Faso Energy Access Project Location of project Burkina Faso Year initiated 2007 Organization World Bank Website http://documents.worldbank.org Coordinates 12.238333°, -1.561593° References Document[1] Energy Access Project aims to support Burkina Faso's efforts to increase access to, and use of energy services to improve living conditions in selected rural, peri-urban, and urban areas. The project includes the following components : increasing access to electricity services in the urban, peri-urban and rural areas; woodfuels supply management and inter-fuel substitution initiatives; and institutional strengthening, capacity development, and harmonization. References ↑ "Document"

273

Remote radiation dosimetry  

DOE Patents (OSTI)

Disclosed are methods and apparatus for remotely measuring radiation levels. Such are particularly useful for measuring relatively high levels or dosages of radiation being administered in radiation therapy. They are also useful for more general radiation level measurements where remote sensing from the remaining portions of the apparatus is desirable. The apparatus uses a beam generator, such as a laser beam, to provide a stimulating beam. The stimulating beam is preferably of wavelengths shorter than 6 microns, or more advantageously less than 2 microns. The stimulating beam is used to stimulate a remote luminescent sensor mounted in a probe which emits stored luminescent energy resulting from exposure of the sensor to ionizing radiation. The stimulating beam is communicated to the remote luminescent sensor via transmissive fiber which also preferably serves to return the emission from the luminescent sensor. The stimulating beam is advantageously split by a beam splitter to create a detector beam which is measured for power during a reading period during which the luminescent phosphor is read. The detected power is preferably used to control the beam generator to thus produce desired beam power during the reading period. The luminescent emission from the remote sensor is communicated to a suitable emission detector, preferably after filtering or other selective treatment to better isolate the luminescent emission.

Braunlich, Peter F. (Pullman, WA); Tetzlaff, Wolfgang (Pullman, WA); Hegland, Joel E. (Pullman, WA); Jones, Scott C. (Pullman, WA)

1991-01-01T23:59:59.000Z

274

Remote radiation dosimetry  

DOE Patents (OSTI)

Disclosed are methods and apparatus for remotely measuring radiation levels. Such are particularly useful for measuring relatively high levels or dosages of radiation being administered in radiation therapy. They are also useful for more general radiation level measurements where remote sensing from the remaining portions of the apparatus is desirable. The apparatus uses a beam generator, such as a laser beam, to provide a stimulating beam. The stimulating beam is preferably of wavelengths shorter than 6 microns, or more advantageously less than 2 microns. The stimulating beam is used to stimulate a remote luminescent sensor mounted in a probe which emits stored luminescent energy resulting from exposure of the sensor to ionizing radiation. The stimulating beam is communicated to the remote luminescent sensor via a transmissive fiber which also preferably serves to return the emission from the luminescent sensor. The stimulating beam is advantageously split by a beam splitter to create a detector beam which is measured for power during a reading period during which the luminescent phosphor is read. The detected power is preferably used to control the beam generator to thus produce desired beam power during the reading period. The luminescent emission from the remote sensor is communicated to a suitable emission detector, preferably after filtering or other selective treatment to better isolate the luminescent emission. 8 figures.

Braunlich, P.F.; Tetzlaff, W.; Hegland, J.E.; Jones, S.C.

1991-03-12T23:59:59.000Z

275

Giggle: a framework for constructing scalable replica location services  

Science Conference Proceedings (OSTI)

In wide area computing systems, it is often desirable to create remote read-only copies (replicas) of files. Replication can be used to reduce access latency, improve data locality, and/or increase robustness, scalability and performance for distributed ...

Ann Chervenak; Ewa Deelman; Ian Foster; Leanne Guy; Wolfgang Hoschek; Adriana Iamnitchi; Carl Kesselman; Peter Kunszt; Matei Ripeanu; Bob Schwartzkopf; Heinz Stockinger; Kurt Stockinger; Brian Tierney

2002-11-01T23:59:59.000Z

276

A survey on emerging broadband wireless access technologies  

Science Conference Proceedings (OSTI)

Wireless broadband technologies provide ubiquitous broadband access to wireless users, enabling services that were available only to wireline users. In this paper, we summarize emerging wireless broadband access technologies, ranging from WLANs to satellite ... Keywords: HAPs, HiperACCESS, HiperLAN, HiperMAN, IEEE 802.11, IEEE 802.16, IEEE 802.20, IEEE 802.22, Satellite, WLAN, WMAN, WWAN, WiBro, WiFi, WiMAX

Mehmet S. Kuran; Tuna Tugcu

2007-08-01T23:59:59.000Z

277

Accessibility validation with RAVEN  

Science Conference Proceedings (OSTI)

Testing is, for most, a necessary evil in the software life cycle. One very important form of testing is the evaluation of software products according to mandated criteria or guidelines such as those that specify level of accessibility. Such evaluations ... Keywords: AOP, GUI, Java, accessibility, reflection, rich-client

Barry Feigenbaum; Michael Squillace

2006-05-01T23:59:59.000Z

278

Remote connector development study  

SciTech Connect

Plutonium-uranium extraction (PUREX) connectors, the most common connectors used at the Hanford site, offer a certain level of flexibility in pipe routing, process system configuration, and remote equipment/instrument replacement. However, these desirable features have inherent shortcomings like leakage, high pressure drop through the right angle bends, and a limited range of available pipe diameters that can be connect by them. Costs for construction, maintenance, and operation of PUREX connectors seem to be very high. The PUREX connector designs include a 90{degree} bend in each connector. This increases the pressure drop and erosion effects. Thus, each jumper requires at least two 90{degree} bends. PUREX connectors have not been practically used beyond 100 (4 in.) inner diameter. This study represents the results of a survey on the use of remote pipe-connection systems in US and foreign plants. This study also describes the interdependence between connectors, remote handling equipment, and the necessary skills of the operators.

Parazin, R.J.

1995-05-01T23:59:59.000Z

279

U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass 7: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access August 29, 2012 - 6:00am Addthis PROBLEM: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access PLATFORM: EMC Cloud Tiering Appliance (CTA) 7.4 and prior EMC Cloud Tiering Appliance Virtual Edition (CTA/VE) 7.4 and prior EMC Cloud Tiering Appliance (CTA) 9.0 and prior EMC Cloud Tiering Appliance Virtual Edition (CTA/VE) 9.0 and prior ABSTRACT: A vulnerability was reported in EMC Cloud Tiering Appliance. reference LINKS: SecurityTracker Alert ID: 1027448 Bugtraq ID: 55250 EMC.com CVE-2012-2285 IMPACT ASSESSMENT:

280

Remote electrochemical sensor  

DOE Patents (OSTI)

An electrochemical sensor is described for remote detection, particularly useful for metal contaminants and organic or other compounds. The sensor circumvents technical difficulties that previously prevented in-situ remote operations. The microelectrode, connected to a long communications cable, allows convenient measurements of the element or compound at timed and frequent intervals and instrument/sample distances of ten feet to more than 100 feet. The sensor is useful for both downhole groundwater monitoring and in-situ water (e.g., shipboard seawater) analysis. 21 figs.

Wang, J.; Olsen, K.; Larson, D.

1997-10-14T23:59:59.000Z

Note: This page contains sample records for the topic "remote access services" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

V-016: HP Performance Insight Bugs with Sybase Database Let Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System V-016: HP Performance Insight Bugs with Sybase Database Let...

282

Transportation Services | Staff Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Transportation Services Transportation Services The BNL Transportation Office, located at 20 Brookhaven Avenue, Building 400A, is available to assist BNL employees, guests and visitors with transportation needs in support of Laboratory programs. The hours of operation are 8:30 AM - 5:00 PM Monday through Friday. To contact the Transportation Office call (631) 344-2535. Stony Brook Parking Passes The Transportation Office has a limited number of parking passes for the three (3) parking garages at Stony Brook University. The passes are available to and are intended for use by BNL employees/scientific staff on official business only. Passes may be used at the Administration, University Hospital and Health Services Center garages on the Stony Brook campus when visiting SBU on official business.

283

Remote Sensing of Polar Regions  

Science Conference Proceedings (OSTI)

Polar researchers have historically been innovative and adaptive users of satellite remote sensing data, and their experiences can suggest ways to enhance the use of remote sensing throughout the climate sciences. We performed a semistructured ...

Dan Lubin; Gabrielle Ayres; Steven Hart

2009-06-01T23:59:59.000Z

284

Resource Allocation for Remote Desktop Sessions in Utility Grids  

E-Print Network (OSTI)

Emerging large scale utility computing systems such as Grids promise computing and storage to be provided to end users as a utility. System management services deployed in the middleware are a key to enabling this vision. Utility Grids provide a challenge in terms of scale, dynamism, and heterogeneity of resources and workloads. In this paper, we present a model based architecture for resource allocation services for Utility Grids. The proposed service is built in the context of interactive remote desktop session workloads and takes application performance QoS models into consideration. The key design guidelines are hierarchical request structure, application performance models, remote desktop session performance models, site admission control, multi-variable resource assignment system, and runtime session admission control. We have also built a simulation framework that can handle mixed batch and remote desktop session requests, and have implemented our proposed resource allocation service into the framework. We present some results from experiments done using the framework. Our proposed architecture for resource allocation services addresses the needs of emerging utility computing systems and captures the key concepts and guidelines for building such services in these environments.

Vanish Talwar; Bikash Agarwalla; Sujoy Basu; Raj Kumar; Klara Nahrstedt

2005-01-01T23:59:59.000Z

285

ACCESS Magazine Fall 2005  

E-Print Network (OSTI)

an important part of a future transportation system withdesign and operation of future transportation systems and onalternative designs for future transportation services and

Cervero, Robert; Koppelman, Frank S.; Lipman, Timothy; Ogden, Joan; Varaiya, Pravin

2005-01-01T23:59:59.000Z

286

CodeBender: Remote Software Protection Using Orthogonal Replacement  

Science Conference Proceedings (OSTI)

In a typical client-server scenario, a server provides valuable services to client applications that run remotely on untrusted client computers. Typical examples are video on demand, online games, voice-over-IP communications, and many others. However, ... Keywords: hardware/software protection, development tools, software/software engineering, program transformation, security and protection

Mariano Ceccato; Paolo Tonella

2011-03-01T23:59:59.000Z

287

Interpreting Remote Sensing NOx Measurements  

E-Print Network (OSTI)

Interpreting Remote Sensing NOx Measurements Robert Slott, Consultant, Donald Stedman and Saj tailpipe emissions (HC, CO, NOx) are changing with time hUse remote sensing hMeasurements in at least 4 of the year at each location hUniform QC/QA and data reporting Paper # 2001-01-3640 #12;Remote Sensing

Denver, University of

288

4, 133, 2007 Remote sensing  

E-Print Network (OSTI)

HESSD 4, 1­33, 2007 Remote sensing approach to parsimonious streamflow modeling B. P. Weissling et System Sciences A multitemporal remote sensing approach to parsimonious streamflow modeling. P. Weissling (bweissling@swca.com) 1 #12;HESSD 4, 1­33, 2007 Remote sensing approach to parsimonious

Paris-Sud XI, Université de

289

The Broadband Access Facility  

Science Conference Proceedings (OSTI)

The deployment of broadband access networks will revolutionise many aspects of society in the early years of the next millennium. Manufacturers, telecommunications providers and cable television operators world-wide are investing heavily on research ...

J. Kelly; R. Adnams; M. Enrico; M. Whittle

2000-01-01T23:59:59.000Z

290

Recruitment Services  

NLE Websites -- All DOE Office Websites (Extended Search)

IAEA Recruitment Services Personal History Form (PHF) and Job Opportunities IAEA Employment Benefits Relevant Publications and Brochures Interview Process This service is provided...

291

Tanzania Energy Development and Access Expansion Project | Open Energy  

Open Energy Info (EERE)

Energy Development and Access Expansion Project Energy Development and Access Expansion Project Jump to: navigation, search Name of project Tanzania Energy Development and Access Expansion Project Location of project Tanzania Energy Services Lighting, Cooking and water heating, Space heating, Cooling Year initiated 2007 Organization World Bank Website http://documents.worldbank.org Coordinates -6.369028°, 34.888822° References The World Bank[1] The objective of the Energy Development and Access Expansion Project of Tanzania is to improve the quality and efficiency of the electricity service provision in the three main growth centers of Dar es Salaam, Arusha, and Kilimanjaro and to establish a sustainable basis for energy access expansion. The project is consistent with the latest Joint Assistance Strategy (2007-2010) by specifically supporting the goals of the

292

Benin: Increased Access to Modern Energy Project | Open Energy Information  

Open Energy Info (EERE)

Benin: Increased Access to Modern Energy Project Benin: Increased Access to Modern Energy Project Jump to: navigation, search Name of project Benin: Increased Access to Modern Energy Project Location of project Benin Energy Services Lighting, Cooking and water heating, Space heating, Information and communications Year initiated 2009 Organization World Bank Website http://documents.worldbank.org Coordinates 9.30769°, 2.315834° References The World Bank[1] The objective of the Increased Access to Modern Energy Project is to improve reliability, efficiency, and access to modern energy services in Benin. There are three components to the project, the first component being electrical network upgrading. This component will provide for necessary investments to allow for continued operation of the existing transmission

293

Mongolia Renewable Energy and Rural Electricity Access Project | Open  

Open Energy Info (EERE)

Mongolia Renewable Energy and Rural Electricity Access Project Mongolia Renewable Energy and Rural Electricity Access Project Jump to: navigation, search Name of project Mongolia Renewable Energy and Rural Electricity Access Project Location of project Mongolia Energy Services Lighting, Cooking and water heating, Space heating, Cooling, Earning a living Year initiated 2006 Organization World Bank Website http://documents.worldbank.org Coordinates 46.862496°, 103.846656° References The World Bank[1] The objective of the Renewable Energy and Rural Electricity Access Project is to increase access to electricity and improve reliability of electricity service among the herder population and in off-grid soum centers by: (i) assisting the development of institutions and delivery mechanisms; (ii) facilitating herders' investments in Solar Home Systems (SHSs) and small

294

Assimilation of Remote-sensing Soil Moisture in Short-term River Forecasting M. Pan1, E. F. Wood1, W. Crow2, J. Schaake3  

E-Print Network (OSTI)

Assimilation of Remote-sensing Soil Moisture in Short-term River Forecasting M. Pan1, E. F. Wood1 Hydrology and Remote Sensing Lab, US Department of Agriculture 3 National Weather Service, National Oceanic and Atmospheric Administration 1. Introduction This study focuses on evaluation of hydrologic remote sensing

Pan, Ming

295

Remote Sensing Ayman F. Habib Introduction  

E-Print Network (OSTI)

Remote Sensing Ayman F. Habib 1 Chapter 1 Introduction #12;Remote Sensing Ayman F. Habib 2 Overview · Remote sensing: definition. · Remote sensing versus photogrammetry. · Elements of remote sensing. · Key;Remote Sensing Ayman F. Habib 3 Overview · Acquisition platforms: ­ Historical overview. ­ Terrestrial

Habib, Ayman

296

Service Buildings  

U.S. Energy Information Administration (EIA) Indexed Site

Service Service Characteristics by Activity... Service Service buildings are those in which some type of service is provided, other than food service or retail sales of goods. Basic Characteristics [ See also: Equipment | Activity Subcategories | Energy Use ] Service Buildings... Most service buildings were small, with almost ninety percent between 1,001 and 10,000 square feet. Tables: Buildings and Size Data by Basic Characteristics Establishment, Employment, and Age Data by Characteristics Number of Service Buildings by Predominant Building Size Category Figure showing number of service buildings by size. If you need assistance viewing this page, please contact 202-586-8800. Equipment Table: Buildings, Size, and Age Data by Equipment Types Predominant Heating Equipment Types in Service Buildings

297

Copy Service, Production Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Copy Service Copy Service Copying in color or black-and-white from hard copy or electronic files. Paper size up to 13" x 19" in a variety of stocks and colors. Larger Documents (up to 36" wide and 100" long) can be reproduced in Black & White from prints or files and can be saved in a variety of electronic format Variable Data Printing - personalized document production Tab Printing Forms CD/DVD Duplication CD/DVD direct printing Binding Collate documents, insert tab dividers, punch holes for binding Stapling documents up to 1 inch thick Spiral, adhesive and perfect binding. Hard covers also available upon request Folding & Mailing Print and apply mailing addresses and labels Machine fold documents and insert into envelopes for mailing Laminate printed items up to 35" wide.

298

V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote 1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service November 22, 2012 - 3:00am Addthis PROBLEM: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service PLATFORM: Version(s): XC10 2.0.0.0 - 2.0.0.3, 2.1.0.0 - 2.1.0.2 ABSTRACT: Several vulnerabilities were reported in IBM WebSphere DataPower. REFERENCE LINKS: IBM Security Bulletin SecurityTracker Alert ID: 1027798 CVE-2012-5758 CVE-2012-5759 CVE-2012-5756 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in IBM WebSphere DataPower. A remote

299

ORAU: Scientific and Technical Peer Review Services fact sheet  

NLE Websites -- All DOE Office Websites (Extended Search)

to ensure timely and fair assessments for informed funding decisions. Scientific and Technical Peer Review Services Unmatched Access to Scientific and Technical Reviewers ORAU is...

300

T-719:Apache mod_proxy_ajp HTTP Processing Error Lets Remote Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9:Apache mod_proxy_ajp HTTP Processing Error Lets Remote Users 9:Apache mod_proxy_ajp HTTP Processing Error Lets Remote Users Deny Service T-719:Apache mod_proxy_ajp HTTP Processing Error Lets Remote Users Deny Service September 16, 2011 - 11:30am Addthis PROBLEM: Apache mod_proxy_ajp HTTP Processing Error Lets Remote Users Deny Service PLATFORM: Apache version(s) prior to 2.2.21 ABSTRACT: A remote user can cause the backend server to remain in an error state until the retry timeout expires. reference LINKS: SecurityTracker Alert ID: 1026054 Apache Releases CVE-2011-3348 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache mod_proxy_ajp. A remote user can cause denial of service conditions. When mod_proxy_ajp is used together with mod_proxy_balancer, a remote user can send specially crafted HTTP requests to place the backend server in an error state until the retry

Note: This page contains sample records for the topic "remote access services" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Bear Valley Electric Service | Open Energy Information  

Open Energy Info (EERE)

Service Service Jump to: navigation, search Name Bear Valley Electric Service Place California Utility Id 17612 Utility Location Yes Ownership I NERC Location WECC NERC WECC Yes Operates Generating Plant Yes Activity Generation Yes Activity Buying Transmission Yes Activity Distribution Yes Activity Wholesale Marketing Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png A-1 General Service, less than 20 kW A-1 General Service, less than 20 kW - Direct Access Commercial A-2 General Service, 20 to 50 kW A-2 General Service, 20 to 50 kW - Direct Access A-3 General Service, more than 50 kW Commercial

302

Remote repair appliance  

DOE Patents (OSTI)

A remote appliance for supporting a tool for performing work at a worksite on a substantially circular bore of a workpiece and for providing video signals of the worksite to a remote monitor comprising: a baseplate having an inner face and an outer face; a plurality of rollers, wherein each roller is rotatably and adjustably attached to the inner face of the baseplate and positioned to roll against the bore of the workpiece when the baseplate is positioned against the mouth of the bore such that the appliance may be rotated about the bore in a plane substantially parallel to the baseplate; a tool holding means for supporting the tool, the tool holding means being adjustably attached to the outer face of the baseplate such that the working end of the tool is positioned on the inner face side of the baseplate; a camera for providing video signals of the worksite to the remote monitor; and a camera holding means for supporting the camera on the inner face side of the baseplate, the camera holding means being adjustably attached to the outer face of the baseplate. In a preferred embodiment, roller guards are provided to protect the rollers from debris and a bore guard is provided to protect the bore from wear by the rollers and damage from debris.

Heumann, Frederick K. (Ballston Spa, NY); Wilkinson, Jay C. (Ballston Spa, NY); Wooding, David R. (Saratoga Springs, NY)

1997-01-01T23:59:59.000Z

303

Remote repair appliance  

DOE Patents (OSTI)

A remote appliance for supporting a tool for performing work at a work site on a substantially circular bore of a work piece and for providing video signals of the work site to a remote monitor comprises: a base plate having an inner face and an outer face; a plurality of rollers, wherein each roller is rotatably and adjustably attached to the inner face of the base plate and positioned to roll against the bore of the work piece when the base plate is positioned against the mouth of the bore such that the appliance may be rotated about the bore in a plane substantially parallel to the base plate; a tool holding means for supporting the tool, the tool holding means being adjustably attached to the outer face of the base plate such that the working end of the tool is positioned on the inner face side of the base plate; a camera for providing video signals of the work site to the remote monitor; and a camera holding means for supporting the camera on the inner face side of the base plate, the camera holding means being adjustably attached to the outer face of the base plate. In a preferred embodiment, roller guards are provided to protect the rollers from debris and a bore guard is provided to protect the bore from wear by the rollers and damage from debris. 5 figs.

Heumann, F.K.; Wilkinson, J.C.; Wooding, D.R.

1997-12-16T23:59:59.000Z

304

Remote repair appliance  

DOE Patents (OSTI)

A remote appliance is described for supporting a tool for performing work at a worksite on a substantially circular bore of a workpiece and for providing video signals of the worksite to a remote monitor comprising: a baseplate having an inner face and an outer face; a plurality of rollers, wherein each roller is rotatably and adjustably attached to the inner face of the baseplate and positioned to roll against the bore of the workpiece when the baseplate is positioned against the mouth of the bore such that the appliance may be rotated about the bore in a plane substantially parallel to the baseplate; a tool holding means for supporting the tool, the tool holding means being adjustably attached to the outer face of the baseplate such that the working end of the tool is positioned on the inner face side of the baseplate; a camera for providing video signals of the worksite to the remote monitor; and a camera holding means for supporting the camera on the inner face side of the baseplate, the camera holding means being adjustably attached to the outer face of the baseplate. In a preferred embodiment, roller guards are provided to protect the rollers from debris and a bore guard is provided to protect the bore from wear by the rollers and damage from debris.

Heumann, F.K.; Wilkinson, J.C.; Wooding, D.R.

1996-12-31T23:59:59.000Z

305

Communication services for advanced network applications.  

SciTech Connect

Advanced network applications such as remote instrument control, collaborative environments, and remote I/O are distinguished by traditional applications such as videoconferencing by their need to create multiple, heterogeneous flows with different characteristics. For example, a single application may require remote I/O for raw datasets, shared controls for a collaborative analysis system, streaming video for image rendering data, and audio for collaboration. Furthermore, each flow can have different requirements in terms of reliability, network quality of service, security, etc. They argue that new approaches to communication services, protocols, and network architecture are required both to provide high-level abstractions for common flow types and to support user-level management of flow creation and quality. They describe experiences with the development of such applications and communication services.

Bresnahan, J.; Foster, I.; Insley, J.; Toonen, B.; Tuecke, S.

1999-06-10T23:59:59.000Z

306

Transpiring purging access probe for particulate laden or hazardous environments  

SciTech Connect

An access probe for remote-sensing access through a viewing port, viewing volume, and access port into a vessel. The physical boundary around the viewing volume is partially formed by a porous sleeve lying between the viewing volume and a fluid conduit. In a first mode of operation, a fluid supplied to the fluid conduit encounters the porous sleeve and flows through the porous material to maintain the viewing volume free of ash or other matter. When additional fluid force is needed to clear the viewing volume, the pressure of the fluid flow is increased sufficiently to slidably translate the porous sleeve, greatly increasing the flow into the viewing volume. The porous sleeve is returned to position by an actuating spring. The access probe thereby provides for alternate modes of operation based on the pressure of an actuating fluid.

VanOsdol, John G

2013-12-03T23:59:59.000Z

307

A Metadata Model Supporting Scalable Interactive TV Services  

Science Conference Proceedings (OSTI)

In this paper, we introduce a novel metadata model for describing scalable and interactive TV services that can be enriched with supplemental multimedia information. The model allows users to access such TV services not only via their traditional TV ...

Gwenael Durand; Gabriella Kazai; Mounia Lalmas; Uwe Rauschenbach; Patrick Wolf

2005-01-01T23:59:59.000Z

308

Proximity-based service discovery in mobile ad hoc networks  

Science Conference Proceedings (OSTI)

Existing approaches to service discovery have been developed primarily for environments with a fixed network backbone and typically rely on centralized components being accessible to potential service clients at any given time. The characteristic lack ...

René Meier; Vinny Cahill; Andronikos Nedos; Siobhán Clarke

2005-06-01T23:59:59.000Z

309

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

310

V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP Performance Insight Bugs with Sybase Database Let Remote 6: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System November 5, 2012 - 6:00am Addthis PROBLEM: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System PLATFORM: HP Performance Insight v5.31, v5.40 and v5.41 running on HP-UX, Solaris, Linux, and Windows and using Sybase as the database ABSTRACT: Two vulnerabilities were reported in HP Performance Insight. REFERENCE LINKS: HP Support Document ID: c03555488 SecurityTracker Alert ID: 1027719 CVE-2012-3269 CVE-2012-3270 IMPACT ASSESSMENT: High DISCUSSION:

311

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

312

U-167: OpenSSL Invalid TLS/DTLS Record Processing Lets Remote Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: OpenSSL Invalid TLS/DTLS Record Processing Lets Remote Users 7: OpenSSL Invalid TLS/DTLS Record Processing Lets Remote Users Deny Service U-167: OpenSSL Invalid TLS/DTLS Record Processing Lets Remote Users Deny Service May 11, 2012 - 7:00am Addthis PROBLEM: OpenSSL Invalid TLS/DTLS Record Processing Lets Remote Users Deny Service PLATFORM: Prior to versions 0.9.8x, 1.0.0j, 1.0.1c ABSTRACT: A vulnerability was reported in OpenSSL. A remote user can cause denial of service conditions. reference LINKS: SecurityTracker Alert ID: 1027057 CVE-2012-2333 OpenSSL Advisory IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted TLS/DTLS records to cause denial of service conditions. The CBC mode ciphersuites in TLS 1.1, 1.2 and DTLS are affected, both clients and servers are affected. DTLS is affected in all versions of OpenSSL. TLS is affected in OpenSSL

313

U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: HP Performance Manager Unspecified Bug Lets Remote Users 7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March 30, 2012 - 9:15am Addthis PROBLEM: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes PLATFORM: HP-UX B.11.31 HP-UX B.11.23 ABSTRACT: A remote user can execute arbitrary code on the target system. REFERENCE LINKS: HP Support Document ID: c03255321 SecurityTracker Alert ID: 1026869 CVE-2012-0127 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute arbitrary code and to create a Denial of Service (DoS).

314

U-037: Linux Kernel NFSv4 ACL Attribute Processing Error Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Linux Kernel NFSv4 ACL Attribute Processing Error Lets 7: Linux Kernel NFSv4 ACL Attribute Processing Error Lets Remote Users Execute Arbitrary Code U-037: Linux Kernel NFSv4 ACL Attribute Processing Error Lets Remote Users Execute Arbitrary Code November 16, 2011 - 7:43am Addthis PROBLEM: Linux Kernel NFSv4 ACL Attribute Processing Error Lets Remote Users Execute Arbitrary Code. PLATFORM: Kernel version 2.6.x ABSTRACT: A remote server can cause the target connected client to crash. reference LINKS: The Linux Kernel Archives CVE-2011-4131 SecurityTracker Alert ID: 1026324 Linux Kernel [PATCH 1/1] NFSv4 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in the Linux Kernel. A remote user can cause denial of service conditions. Impact: A remote server can return specially crafted data to the connected target

315

U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apache CXF Lets Remote Authenticated Users Execute 6: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions September 24, 2012 - 6:00am Addthis PROBLEM: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions PLATFORM: This vulnerability affects all released versions of Apache CXF. ABSTRACT: A vulnerability was reported in Apache CXF reference LINKS: SecurityTracker Alert ID: 1027554 Apache CXF Security Advisories Apache CXF Advisory - CVE-2012-3451 CVE-2012-3451 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache CXF. A remote authenticated user can execute unauthorized commands on the target web service. Impact: A remote authenticated user can execute potentially unauthorized actions on

316

U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apache CXF Lets Remote Authenticated Users Execute 6: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions September 24, 2012 - 6:00am Addthis PROBLEM: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions PLATFORM: This vulnerability affects all released versions of Apache CXF. ABSTRACT: A vulnerability was reported in Apache CXF reference LINKS: SecurityTracker Alert ID: 1027554 Apache CXF Security Advisories Apache CXF Advisory - CVE-2012-3451 CVE-2012-3451 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache CXF. A remote authenticated user can execute unauthorized commands on the target web service. Impact: A remote authenticated user can execute potentially unauthorized actions on

317

v9fb: a remote framebuffer infrastructure of linux  

SciTech Connect

v9fb is a software infrastructure that allows extending framebufFer devices in Linux over the network by providing an abstraction to them in the form of a filesystem hierarchy. Framebuffer based graphic devices export a synthetic filesystem which offers a simple and easy-to-use interface for performing common framebuffer operations. Remote framebuffer devices could be accessed over the network using the 9P protocol support in Linux. We describe the infrastructure in detail and review some of the benefits it offers similar to Plan 9 distributed systems. We discuss the applications of this infrastructure to remotely display and run interactive applications on a terminal while ofFloading the computation to remote servers, and more importantly the flexibility it offers in driving tiled-display walls by aggregating graphic devices in the network.

Kulkarni, Abhishek [Los Alamos National Laboratory; Ionkov, Latchesar [Los Alamos National Laboratory

2008-01-01T23:59:59.000Z

318

Wired World-Wide Web Interactive Remote Event Display  

Science Conference Proceedings (OSTI)

WIRED (World-Wide Web Interactive Remote Event Display) is a framework, written in the Java{trademark} language, for building High Energy Physics event displays. An event display based on the WIRED framework enables users of a HEP collaboration to visualize and analyze events remotely using ordinary WWW browsers, on any type of machine. In addition, event displays using WIRED may provide the general public with access to the research of high energy physics. The recent introduction of the object-oriented Java{trademark} language enables the transfer of machine independent code across the Internet, to be safely executed by a Java enhanced WWW browser. We have employed this technology to create a remote event display in WWW. The combined Java-WWW technology hence assures a world wide availability of such an event display, an always up-to-date program and a platform independent implementation, which is easy to use and to install.

De Groot, Nicolo

2003-05-07T23:59:59.000Z

319

Measuring Energy Access: Supporting a Global Target | Open Energy  

Open Energy Info (EERE)

Measuring Energy Access: Supporting a Global Target Measuring Energy Access: Supporting a Global Target Jump to: navigation, search Tool Summary Name: Measuring Energy Access: Supporting a Global Target Agency/Company /Organization: Columbia University Sector: Energy Focus Area: Renewable Energy, Non-renewable Energy Topics: Co-benefits assessment, - Energy Access Resource Type: Publications Website: www.unido.org/fileadmin/user_media/Services/Energy_and_Climate_Change/ Cost: Free Language: English References: Measuring Energy Access: Supporting a Global Target[1] "This paper first describes the relevant context, definitions, data, and links to national policies and energy planning. Section 2 reviews relevant development and energy metrics. Several options for measuring energy access are then presented in section 3. Finally, Section 4 offers thoughts on

320

Building Integrated Remote Control Systems for Electronic Boards  

E-Print Network (OSTI)

This paper addresses several aspects of implementing a remote control system for a large number of electronics boards in order to perform remote Field Programmable Gate Array (FPGA) programming, hardware configuration, data register access, and monitoring, as well as interfacing it to a configuration database and an expert system. The paper presents a common strategy for the representation of the boards in the abstraction layer of the control system, and generic communication protocols for the access to the board resources. In addition, an implementation is proposed in which the mapping between the functional parameters and the physical registers of the different boards is represented by descriptors in the board representation such that the translation can be handled automatically by a generic translation manager. Using the Distributed Information Management (DIM) package for the control communication with the boards, and the industry SCADA system PVSS II from ETM, a complete control system has been built for...

Jacobsson, Richard

2007-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "remote access services" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Building Integrated Remote Control Systems for Electronics Boards  

E-Print Network (OSTI)

This paper addresses several aspects of implementing a remote control system for a large number of electronics boards in order to perform remote Field Programmable Gate Array (FPGA) programming, hardware configuration, data register access, and monitoring, as well as interfacing it to an expert system. The paper presents a common strategy for the representation of the boards in the abstraction layer of the control system, and generic communication protocols for the access to the board resources. In addition, an implementation is proposed in which the mapping between the functional parameters and the physical registers of the different boards is represented by descriptors in the board representation such that the translation can be handled automatically by a generic translation manager. Using the Distributed Information Management (DIM) package for the control communication with the boards, and the industry SCADA system PVSS II from ETM, a complete control system has been built for the Timing and Fast Control ...

Jacobsson, R

2008-01-01T23:59:59.000Z

322

V-223: RSA Authentication Agent for PAM Allows Remote Users to Make  

NLE Websites -- All DOE Office Websites (Extended Search)

3: RSA Authentication Agent for PAM Allows Remote Users to Make 3: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts V-223: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts August 21, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in RSA Authentication Agent for PAM PLATFORM: RSA Authentication Agent for PAM 7.0.2 and prior ABSTRACT: A remote user can make unlimited login attempts REFERENCE LINKS: Security Tracker Alert ID 1028930 CVE-2013-3271 IMPACT ASSESSMENT: Medium DISCUSSION: The system does not restrict the number of login attempts made via the agent IMPACT: System Access SOLUTION: Vendor has issued a fix Addthis Related Articles U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability

323

FTP Upload Service  

NLE Websites -- All DOE Office Websites (Extended Search)

NERSC FTP NERSC FTP Upload Service NERSC FTP Upload Service L The NERSC FTP Upload service is designed for external collaborators to be able to send data to NERSC staff and users. It allows you to create a temporary FTP account to upload files that will be delivered to a NERSC user. You must specify a valid NERSC user as the receiver for your uploads. Once you successfully fill out this form you will receive a username and password that can be used to access an FTP server. You can use any FTP client to upload files. The target NERSC user will receive an email letting him/her know that they have an upload waiting for them. Uploads will automatically expire after a week. After the email has been sent, the NERSC user can retrieve the file with "take -u ftpup ".

324

Manufacturing Services | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Services Services Manufacturing Data/Tools Research/Tech Services Apps Challenges Blogs Let's Talk Manufacturing You are here Data.gov » Communities » Manufacturing Services Do you have a new idea? You may need to file a patent to both develop it and protect it. Find out more below. Search for existing patents Apply for a patent Business Owners Getting a business started, established, and growing is difficult. We want to make that easier. Check out the government services below that are available to businesses, and find out more about what's coming with StartUp America. Start a business Access financing Find opportunities to sell products and services to the government Grow your business Help with exporting for beginners and for experts. Shared Facilities Facilities can be a huge factor in whether you create a new product or

325

REMOTE CONTROLLED SWITCHING DEVICE  

DOE Patents (OSTI)

An electrical switching device which can be remotely controlled and in which one or more switches may be accurately operated at predetermined times or with predetermined intervening time intervals is described. The switching device consists essentially of a deck, a post projecting from the deck at right angles thereto, cam means mounted for rotation around said posts and a switch connected to said deck and actuated by said cam means. Means is provided for rotating the cam means at a constant speed and the switching apparatus is enclosed in a sealed container with external adjusting means and electrical connection elements.

Hobbs, J.C.

1959-02-01T23:59:59.000Z

326

Remote Sensing R. E. Mcintosh  

NLE Websites -- All DOE Office Websites (Extended Search)

participate in an intensive operation period (lOP) planned for June 1993. The Microwave Remote Sensing Laboratory (MIRSL) is developing a mobile, scanning millimeter-wave radar...

327

Mailing Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Mailing Services Mailing Services Use the form below to add your name to the Depleted UF6 Mailing List. First Name: Last Name: Organization: Address: City: State: Postal Code:...

328

V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote  

NLE Websites -- All DOE Office Websites (Extended Search)

71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets 71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service January 17, 2013 - 12:00am Addthis PROBLEM: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service PLATFORM: The vulnerability is reported in versions 8.7.1 and 8.7.1.1. ABSTRACT: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall REFERENCE LINKS: Cisco Advisory ID: cisco-sa-20130116-asa1000v SecurityTracker Alert ID: 1028005 Secunia Advisory SA51897 CVE-2012-5419 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall, which can be exploited by malicious people to cause a DoS (Denial of Service).

329

Calibration Services  

Science Conference Proceedings (OSTI)

... of these applications, the Optoelectronics Division provides measurement services at laser power levels from nanowatts to kilowatts and pulse ...

2012-11-28T23:59:59.000Z

330

Remote sensing for wind power potential: a prospector's handbook  

DOE Green Energy (OSTI)

Remote sensing can aid in identifying and locating indicators of wind power potential from the terrestrial, marine, and atmospheric environments (i.e.: wind-deformed trees, white caps, and areas of thermal flux). It is not considered as a tool for determining wind power potential. A wide variety of remotely sensed evidence is described in terms of the scale at which evidence of wind power can be identified, and the appropriate remote sensors for finding such evidence. Remote sensing can be used for regional area prospecting using small-scale imagery. The information from such small-scale imagery is most often qualitative, and if it is transitory, examination of a number of images to verify presistence of the feature may be required. However, this evidence will allow rapid screening of a large area. Medium-scale imagery provides a better picture of the evidence obtained from small-scale imagery. At this level it is best to use existing imagery. Criteria relating to land use, accessibility, and proximity of candidate sites to nearby transmission lines can also be effectively evaluated from medium-scale imagery. Large-scale imagery provides the most quantitative evidence of the strength of wind. Wind-deformed trees can be identified at a large number of sites using only a few hours in locally chartered aircraft. A handheld 35mm camera can adequately document any evidence of wind. Three case studies that employ remote sensing prospecting techniques are described. Based on remotely sensed evidence, the wind power potential in three geographically and climatically diverse areas of the United States is estimated, and the estimates are compared to actual wind data in those regions. In addition, the cost of each survey is discussed. The results indicate that remote sensing for wind power potential is a quick, cost effective, and fairly reliable method for screening large areas for wind power potential.

Wade, J.E.; Maule, P.A.; Bodvarsson, G.; Rosenfeld, C.L.; Woolley, S.G.; McClenahan, M.R.

1983-02-01T23:59:59.000Z

331

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Video Surveillance Manager Bugs Let Remote Users 2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information July 25, 2013 - 2:52am Addthis PROBLEM: A remote user can obtain potentially sensitive information and modify some configuration settings. A remote user can exploit this to create, modify, and remove camera feeds, archives, logs, and users. PLATFORM: Cisco Video Surveillance Manager 7.1, 7.5 ABSTRACT: Two vulnerabilities were reported in Cisco Video Surveillance Manager REFERENCE LINKS: Security Tracker Alert ID: 1028827 CVE-2013-3429 CVE-2013-3430 CVE-2013-3431 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is due to an access control error that occurred. The

332

V-010: 3Com, HP, and H3C Switches SNMP Configuration Lets Remote Users Take  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: 3Com, HP, and H3C Switches SNMP Configuration Lets Remote 10: 3Com, HP, and H3C Switches SNMP Configuration Lets Remote Users Take Administrative Actions V-010: 3Com, HP, and H3C Switches SNMP Configuration Lets Remote Users Take Administrative Actions October 25, 2012 - 6:00am Addthis PROBLEM: 3Com, HP, and H3C Switches SNMP Configuration Lets Remote Users Take Administrative Actions PLATFORM: 3COM, and H3C Routers & Switches Specific products and model numbers is provided in the vendor's advisory. ABSTRACT: A vulnerability was reported in 3Com, HP, and H3C Switches. REFERENCE LINKS: HP Support document ID: c03515685 SecurityTracker Alert ID: 1027694 CVE-2012-3268 IMPACT ASSESSMENT: High DISCUSSION: A remote user with knowledge of the SNMP public community string can access potentially sensitive data (e.g., user names, passwords) in the

333

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

84: Cisco Digital Media Manager Lets Remote Authenticated Users 84: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges January 19, 2012 - 9:00am Addthis PROBLEM: A remote authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not properly validate unreferenced URLs. REFERENCE LINKS: Vendor Advisory SecurityTracker Alert ID: 1026541 CVE-2012-0329 IMPACT ASSESSMENT: medium Discussion: Cisco Show and Share is not directly affected by this vulnerability, but a user can exploit the Cisco Digital Media Manager to gain full access to Cisco Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port

334

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Cisco Digital Media Manager Lets Remote Authenticated Users 4: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges January 19, 2012 - 9:00am Addthis PROBLEM: A remote authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not properly validate unreferenced URLs. REFERENCE LINKS: Vendor Advisory SecurityTracker Alert ID: 1026541 CVE-2012-0329 IMPACT ASSESSMENT: medium Discussion: Cisco Show and Share is not directly affected by this vulnerability, but a user can exploit the Cisco Digital Media Manager to gain full access to Cisco Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port

335

V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP-UX Directory Server Discloses Passwords to Remote 6: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users May 29, 2013 - 12:32am Addthis PROBLEM: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users PLATFORM: Directory Server B.08.10.04 ABSTRACT: Two vulnerabilities were reported in HP-UX Directory Server. REFERENCE LINKS: HP Document ID: c03772083 SecurityTracker Alert ID: 1028593 CVE-2012-2678 CVE-2012-2746 IMPACT ASSESSMENT: High DISCUSSION: A local user can access the plaintext password in certain cases [CVE-2012-2678]. A remote authenticated user can can view the password for a target LDAP user when audit logging is enabled by reading the audit log [CVE-2012-2678].

336

U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: JBoss Operations Network LDAP Authentication Bug Lets Remote 0: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication March 21, 2012 - 7:00am Addthis PROBLEM: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication PLATFORM: JBoss Operations Network 2.x ABSTRACT: A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases. reference LINKS: SecurityTracker Alert ID: 1026826 Secunia Advisory SA48471 CVE-2012-1100 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based

337

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain 9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication May 1, 2012 - 7:00am Addthis PROBLEM: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 6) ABSTRACT: A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration. reference LINKS: SecurityTracker Alert ID: 1026990 CVE-2011-3620 Red Hat advisory IMPACT ASSESSMENT: High Discussion: Qpid may accept arbitrary passwords and SASL mechanims. A remote user on the local private interconnect network with knowledge of a valid cluster

338

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

339

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

340

FACT SHEET: SOLAR AND LED ENERGY ACCESS PROGRAM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 FACT SHEET: SOLAR AND LED ENERGY ACCESS PROGRAM At the Clean Energy Ministerial in Washington, D.C. on July 19 th and 20 th , leaders from the International Finance Corporation (IFC), Italy, and the United States launched a new program to bring clean, high-quality energy services to the 1.6 billion people current lacking access to modern energy - simultaneously alleviating poverty, improving human health, and reducing emissions of greenhouse gases.

Note: This page contains sample records for the topic "remote access services" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Citrix Access Gateway Enterprise Edition Input Validation 1: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks August 25, 2011 - 3:33pm Addthis PROBLEM: A vulnerability was reported in Citrix Access Gateway Enterprise Edition. A remote user can conduct cross-site scripting attacks. PLATFORM: Citrix Access Gateway Enterprise Edition 9.2-49.8 and prior. Citrix Access Gateway Enterprise Edition version 9.3 is not affected by this vulnerability. ABSTRACT: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks. reference LINKS: SecurityTracker Alert ID: 1025973 Citrix Document ID: CTX129971

342

Biometric Web Services  

Science Conference Proceedings (OSTI)

Biometric Web Services. The biometric web services project combines biometrics and web services to. ... What are Web services? ...

2012-08-15T23:59:59.000Z

343

Access Grid | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Access Grid Access Grid Access Grid The Access Grid is the ensemble of resources that can be used to support human interaction across the grid. It consists of multimedia display, presentation and interactive environments, interfaces to grid middleware, and interfaces to visualization environments. The Access Grid will support large-scale distributed meetings, collaborative work sessions, seminars, lectures, tutorials and training. The Access Grid design point is group-to-group communication (thus differentiating it from desktop to desktop based tools that focus on individual communication). The Access Grid environment must enable both formal and informal group interactions. Large-format displays integrated with intelligent or active meeting rooms are a central feature of the Access Grid nodes. Access Grid nodes are

344

Remote Sensing: A New Tool For Automobile  

E-Print Network (OSTI)

Remote Sensing. Recent breakthroughs in manufacturing low- emitting vehicles and in remote sensing of a moving car-style testing centers. Remote sensing technology now allows a piece of equipment small enough to fit in a van

Denver, University of

345

REMOTE RETRIEVING TOOL  

DOE Patents (OSTI)

A retrieving tool is described to securely grasp an object for emplacement in, or withdrawal from, an elongated tube. The object is grasped by hooks actuated by a wedge and cann mechanism. The mechanism on the end of a long rodlike structure is controlled by levers or bars at the access end of the tube. This device is particularly useful for positioning fuel elements within a reactor core.

Fromm, L.W. Jr.

1958-08-19T23:59:59.000Z

346

Production Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Welcome Welcome The Production Services site contains links to each of the division's groups with descriptions of their services. Our goal is to update this website frequently to reflect ongoing service upgrades which, by planning and design, are added so that we can continue to meet your needs in a constantly changing work environment. Note: The Graphic Design Studio has been relocated to the second floor in the north wing of the Research Support Building 400. The telephone number remains the same, X7288. If you have any questions, please call supervisor, Rick Backofen, X6183. Photography Photography services are available at no charge to BNL and Guest users. See a list of the complete range of photography services available. Video Video services are available at no charge to BNL and Guest users. See a list of the complete range of video services available.

347

Resource allocation in OFDMA wireless communications systems supporting multimedia services  

Science Conference Proceedings (OSTI)

We design a resource allocation algorithm for down-link of orthogonal frequency division multiple access (OFDMA) systems supporting real-time (RT) and best-effort (BE) services simultaneously over a time-varying wireless channel. The proposed algorithm ... Keywords: multimedia communications, orthogonal frequency division multiple access (OFDMA), quality of service (QoS), radio resource allocation, wireless network

Kae Won Choi; Wha Sook Jeon; Dong Geun Jeong

2009-06-01T23:59:59.000Z

348

Remote Facilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Remote Facilities Remote Facilities Remote Facilities October 16, 2013 - 4:55pm Addthis Renewable Energy Options for Renovations in Remote Areas Photovoltaics (PV) Small Wind Daylighting Solar Water Heating Passive Solar Design Biomass Heating When a Federal building or facility is located away from existing power lines, many renewable energy technologies including photovoltaics and wind become cost-effective options when compared to extending utilities or transporting fuel for onsite generators. Photovoltaics Photovoltaics (PV) are often cost-effective in remote power applications. In these circumstances, the system is coupled with batteries and can provide complete facility power. Proper system design is critical and must account for the building electrical loads and be sized to meet that load

349

Waste Calcining Facility remote inspection report  

SciTech Connect

The purpose of the Waste Calcining Facility (WCF) remote inspections was to evaluate areas in the facility which are difficult to access due to high radiation fields. The areas inspected were the ventilation exhaust duct, waste hold cell, adsorber manifold cell, off-gas cell, calciner cell and calciner vessel. The WCF solidified acidic, high-level mixed waste generated during nuclear fuel reprocessing. Solidification was accomplished through high temperature oxidation and evaporation. Since its shutdown in 1981, the WCFs vessels, piping systems, pumps, off-gas blowers and process cells have remained contaminated. Access to the below-grade areas is limited due to contamination and high radiation fields. Each inspection technique was tested with a mock-up in a radiologically clean area before the equipment was taken to the WCF for the actual inspection. During the inspections, essential information was obtained regarding the cleanliness, structural integrity, in-leakage of ground water, indications of process leaks, indications of corrosion, radiation levels and the general condition of the cells and equipment. In general, the cells contain a great deal of dust and debris, as well as hand tools, piping and miscellaneous equipment. Although the building appears to be structurally sound, the paint is peeling to some degree in all of the cells. Cracking and spalling of the concrete walls is evident in every cell, although the east wall of the off-gas cell is the worst. The results of the completed inspections and lessons learned will be used to plan future activities for stabilization and deactivation of the facility. Remote clean-up of loose piping, hand tools, and miscellaneous debris can start immediately while information from the inspections is factored into the conceptual design for deactivating the facility.

Patterson, M.W.; Ison, W.M.

1994-08-01T23:59:59.000Z

350

Sensing remote nuclear spins  

E-Print Network (OSTI)

Sensing single nuclear spins is a central challenge in magnetic resonance based imaging techniques. Although different methods and especially diamond defect based sensing and imaging techniques in principle have shown sufficient sensitivity, signals from single nuclear spins are usually too weak to be distinguished from background noise. Here, we present the detection and identification of remote single C-13 nuclear spins embedded in nuclear spin baths surrounding a single electron spins of a nitrogen-vacancy centre in diamond. With dynamical decoupling control of the centre electron spin, the weak magnetic field ~10 nT from a single nuclear spin located ~3 nm from the centre with hyperfine coupling as weak as ~500 Hz is amplified and detected. The quantum nature of the coupling is confirmed and precise position and the vector components of the nuclear field are determined. Given the distance over which nuclear magnetic fields can be detected the technique marks a firm step towards imaging, detecting and cont...

Zhao, Nan; Schmid, Berhard; Isoya, Junichi; Markham, Mathew; Twitchen, Daniel; Jelezko, Fedor; Liu, Ren-Bao; Fedder, Helmut; Wrachtrup, Jörg

2012-01-01T23:59:59.000Z

351

REMOTE CONTROL MANIPULATOR  

DOE Patents (OSTI)

The patent covers a remote-control manipulator in which a tool is carried on a tube at an end thereof angularly related to the main portion of the tube and joined thereto by a curved section. The main portion of the tube is mounted for rotation and axial shifting in a wall separating safe and dangerous areas. The tool is actuated to grasp and release an object in the dangerous area by means of a compound shaft extending through the tube, the shaft having a flexible section extending through the curved section of the tube. The tool is moved about in the dangerous area by rotation and axial movement of the main portion of the tube. Additional movement of the tool is obtained through axial shifting of the shaft with respect to the tube through which it extends. (AEC)

Coffman, R.T.

1962-11-27T23:59:59.000Z

352

Open Access Transmission and Renewable Energy Technologies  

Science Conference Proceedings (OSTI)

In April 1996, the Federal Regulatory Commission (PERC) approved Orders 888 and 889 and released a draft rule for public comment on capacity reservation tariffs (CRTs). Order No. 888 requires electric utilities to file transmission tariffs that would allow transmission access to third parties who want to conduct wholesale transactions, and Order No. 889 requires transmission-owning utilities to set up open access, same-time information systems (OASIS), using commercial software and Internet protocols. This paper discusses these Orders in detail, as well as some of the issues before FERC with implications for renewables, which include: transmission pricing; transmission terms and conditions; reassignment of transmission capacity; defining state and FERC jurisdiction over transmission and distribution; the pricing of ancillary services; and the adoption and implementation of independent system operators.

Porter, K.

1996-09-01T23:59:59.000Z

353

Ghana Energy Development and Access Project (GEDAP) | Open Energy  

Open Energy Info (EERE)

Energy Development and Access Project (GEDAP) Energy Development and Access Project (GEDAP) Jump to: navigation, search Name of project Ghana Energy Development and Access Project (GEDAP) Location of project Ghana Energy Services Lighting, Cooking and water heating, Information and communications Year initiated 2007 Organization World Bank Website http://web.worldbank.org/exter Coordinates 7.946527°, -1.023194° References World Bank[1] The objective of the Energy Development and Access Project in Ghana is to improve the operational efficiency of the electricity distribution system and increase the population's access to electricity. This will also cause Ghana to support its transition to a low-carbon economy through the reduction of greenhouse gas emissions (GHG). The project has three main

354

Proposed Open Access Requirement for International Electric Transmission  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Proposed Open Access Requirement for International Electric Proposed Open Access Requirement for International Electric Transmission Facilities and Delegation to the Federal Energy Regulatory Commission: Federal Register Notice Volume 64, No. 143 - Jul. 27, 1999 Proposed Open Access Requirement for International Electric Transmission Facilities and Delegation to the Federal Energy Regulatory Commission: Federal Register Notice Volume 64, No. 143 - Jul. 27, 1999 Notice is given of the Department of Energy's (DOE or Department) intention to amend existing Presidential permits issued for the construction, operation, maintenance, or connection of facilities at the international border for the transmission of electric energy between the United States and foreign countries to require permit holders to provide ondiscriminatory open access transmission services. The open access

355

Re: NBP RFI: Data Access | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Re: NBP RFI: Data Access Re: NBP RFI: Data Access Re: NBP RFI: Data Access The Consumer Electronics Association ("CEA") respectfully submits this response to the Department of Energy's ("DOE") Request for Information on Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy ("RFI").1 CEA is the principal U.S. trade association of the consumer electronics and information technology industries. CEA's approximately 2,000 member companies include leading manufacturers and providers of consumer- and utility-facing smart grid products and services. Re: NBP RFI: Data Access More Documents & Publications Addressing Policy and Logistical Challenges to smart grid Implementation: eMeter Response to Department of Energy RFI

356

Proposed Open Access Requirement for International Electric Transmission  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Proposed Open Access Requirement for International Electric Proposed Open Access Requirement for International Electric Transmission Facilities and Delegation to the Federal Energy Regulatory Commission: Federal Register Notice Volume 64, No. 143 - Jul. 27, 1999 Proposed Open Access Requirement for International Electric Transmission Facilities and Delegation to the Federal Energy Regulatory Commission: Federal Register Notice Volume 64, No. 143 - Jul. 27, 1999 Notice is given of the Department of Energy's (DOE or Department) intention to amend existing Presidential permits issued for the construction, operation, maintenance, or connection of facilities at the international border for the transmission of electric energy between the United States and foreign countries to require permit holders to provide ondiscriminatory open access transmission services. The open access

357

Behavior-based remote executing agents  

E-Print Network (OSTI)

remote execution semantics, and intermediary commu- nication handling)remote, more advantageous, location. ReAgents simplify the use of mobile agent technology by transparently handling

Hung, Eugene

2006-01-01T23:59:59.000Z

358

U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4:Juniper Secure Access Input Validation Flaw Permits 4:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks April 10, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Juniper Secure Access/Instant Virtual Extranet (IVE). A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): prior to 7.0R9 and 7.1R ABSTRACT: The VPN management interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. reference LINKS: Vendor URL SecurityTracker Alert ID: 1026893 IMPACT ASSESSMENT: High Discussion: The code will originate from the interface and will run in the security

359

Service-oriented architecture for mobile applications  

Science Conference Proceedings (OSTI)

Mobile phones are becoming a new popular platform for business applications. The number of mobile users increases daily and so does the need for efficient mobile data access and management. However, a traditional approach to business application and ... Keywords: framework, lightweight architecture, mobile, pro-active loading, service composition, web service

Yuri Natchetoi; Viktor Kaufman; Albina Shapiro

2008-05-01T23:59:59.000Z

360

VEHICLE ACCESS PORTALS  

NLE Websites -- All DOE Office Websites (Extended Search)

East Jemez Road (Map 1) East Jemez Road (Map 1) VEHICLE ACCESS PORTALS Traffic Lane 1: Closed except for emergencies and maintenance operations. Traffic Lanes 2-7: Drivers required to stop and present LANL badges or other form of valid identification to Protective Force officers. Drivers may proceed upon direction of the officers. Note: Commercial delivery vehicle drivers must also pres- ent their inspection passes from Post 10. More Information: spp-questions@lanl.gov Non-work Hours Vehicles entering LANL at the East Jemez VAPs during non-work hours (between 7

Note: This page contains sample records for the topic "remote access services" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Online service improves public access to petroleum and natural gas ...  

U.S. Energy Information Administration (EIA)

Petroleum & Other Liquids. Crude oil, gasoline, heating oil, diesel, propane, and other liquids including biofuels and natural gas liquids. Natural Gas

362

Reducing rural poverty through increased access to energy services...  

Open Energy Info (EERE)

Tagalog, Tahitian, Tai languages, Tajik, Tamashek, Tamil, Tatar, Telugu, Tereno, Tetum, Thai, Tibetan, Tigre, Tigrinya, Timne, Tiv, Tlingit, Tok Pisin, Tokelau, Tonga (Nyasa),...

363

Online service improves public access to petroleum and natural gas ...  

U.S. Energy Information Administration (EIA)

EIA expands its API to include petroleum and natural gas data The U.S. Energy Information Administration (EIA) has added petroleum and natural gas time-series data to ...

364

ARCS – Access Rate Control System  

protected steel housing. ... Access Rate Control System This rugged, maintenance- ... Y-12 is seeking an industry partner to fully com-

365

Topic: Emergency Egress and Access  

Science Conference Proceedings (OSTI)

Topic: Emergency Egress and Access. Fire Research Seminar Series. NIST WTC Recommendations Are Basis for New Set of Revised Codes. ...

2012-08-20T23:59:59.000Z

366

Role Based Access Control System in the ATLAS Experiment  

E-Print Network (OSTI)

The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Avolio, G; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F

2010-01-01T23:59:59.000Z

367

Role Based Access Control system in the ATLAS experiment  

E-Print Network (OSTI)

The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F

2011-01-01T23:59:59.000Z

368

T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Windows Remote Desktop Client DLL Loading Error Lets Remote 3: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code March 9, 2011 - 3:05pm Addthis PROBLEM: Vulnerability in Remote Desktop Client Could Allow Remote Code Execution. PLATFORM: Remote Desktop Connection Client Version(s): 5.2, 6.0, 6.1, 7.0 ABSTRACT: A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: Microsoft Security Bulletin MS11-017 SecurityTracker Alert ID:1025172 CVE-2011-0029 IMPACT ASSESSMENT: Moderate Discussion: A remote user can create a specially crafted DLL file on a remote share (e.g., WebDAV, SMB share). When the target user opens a valid Remote

369

U-238: HP Service Manager Input Validation Flaw Permits Cross...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9.21, 9.30 ABSTRACT: Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers...

370

Translation Services  

Science Conference Proceedings (OSTI)

... As a courtesy, the National Center for Standards ... companies may be located by entering the term ... translation services" in any Internet search engine. ...

371

Method for assessing in-service motor efficiency and in-service motor/load efficiency  

DOE Patents (OSTI)

A method and apparatus for assessing the efficiency of an in-service motor. The operating characteristics of the in-service motor are remotely measured. The operating characteristics are then applied to an equivalent circuit for electrical motors. Finally the equivalent circuit is evaluated to determine the performance characteristics of said in-service motor. Based upon the evaluation an individual is able to determine the rotor speed, power output, efficiency, and toque of the in-service motor. Additionally, an individual is able to confirm the calculations by comparing measured values with values obtained as a result of the motor equivalent circuit evaluation.

Kueck, John D. (Oak Ridge, TN); Otaduy, Pedro J. (Oak Ridge, TN)

1997-01-01T23:59:59.000Z

372

Template Discontinuation Access  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FOR SUBJECT FOR SUBJECT FROM: Personnel Security Program Manager SUBJECT: Discontinuation of Access Eligibility Determination Reference is made to your Questionnaire for National Security Positions signed on [insert date], which was forwarded to this office in connection with a Department of Energy security clearance request. A review of that form disclosed recent use of illegal drugs. [Insert a brief description of the circumstances such as: Specifically, you listed marijuana use 1 time in 5/02; 1 time in 2/03; and 1 time in 3/07.] This office has discontinued the personnel security processing of your security clearance due to your illegal drug usage within twelve months of the signing of your security clearance application.

373

NSLS User Access | Training  

NLE Websites -- All DOE Office Websites (Extended Search)

Training Training Training for New Users and Users with Expired Training and/or Badges: All new users and users with expired badges must complete or update the training modules shown below prior to access to the experimental floor. The training can be completed online prior to arrival at the NSLS and is strongly recommended to save considerable time during check-in at the Guest, User, Visitor (GUV) Center in Building 400. Please note each training module is followed by an exam which asks for your name and guest number. If you do not already have a guest number, leave this entry blank. All new users and users with expired badges MUST arrive on a weekday (no weekends or holidays) and check in at the GUV Center so that your training can be verified and to receive a photo ID badge (new or updated). The GUV

374

REMOTE HANDLING ARRANGEMENTS  

DOE Patents (OSTI)

A means for handling remotely a sample pellet to be irradiated in a nuclear reactor is proposed. It is comprised essentially of an inlet tube extending through the outer shield of the reactor and being inclined so that its outer end is at a higher elevation than its inner end, an outlet tube extending through the outer shield being inclined so that its inner end is at a higher elevation than its outer end, the inner ends of these two tubes being interconnected, and a straight tube extending through the outer shield and into the reactor core between the inlet and outlet tubes and passing through the juncture of said inner ends. A rod-like member is rotatably and slidely operated within the central straight tube and has a receptacle on its inner end for receiving a sample pellet from the inlet tube. The rod member is operated to pick up a sample pellet from the inlet tube, carry the sample pellet into the irradiating position within the core, and return to the receiving position where it is rotated to dump the irradiated pellet into the outlet tube by which it is conveyed by gravity to the outside of the reactor. Stop members are provided in the inlet tube, and electrical operating devices are provided to control the sequence of the operation automatically.

Ginns, D.W.

1958-04-01T23:59:59.000Z

375

Energy efficient wireless Internet access with cooperative cellular networks  

Science Conference Proceedings (OSTI)

In this paper we study the energy-aware cooperative management of the cellular access networks of the operators that offer service over the same area. In particular, we evaluate the amount of energy that can be saved by using all networks in high traffic ... Keywords: Cellular systems, Energy efficiency, Green networking

Marco Ajmone Marsan; Michela Meo

2011-02-01T23:59:59.000Z

376

Enhancing access to research data: the challenge of crystallography  

Science Conference Proceedings (OSTI)

This paper describes an ongoing collaborative effort across digital library and scientific communities in the UK to improve access to research data. A prototype demonstrator service supporting the discovery and retrieval of detailed results of crystallography ... Keywords: Eprints.org, OAI-PMH, crystallography, dublin core, institutional repositories, metadata, scholarly communication

Monica Duke; Michael Day; Rachel Heery; Leslie A. Carr; Simon J. Coles

2005-06-01T23:59:59.000Z

377

Opening the legal literature portal to multilingual access  

Science Conference Proceedings (OSTI)

The issues of multilingual access to legal information are examined, and strategies of cross-language retrieval to legal information resources are illustrated as additional services of the Portal to legal literature created by ITTIG. Consideration is ... Keywords: cross-language retrieval, legal literature, multilingual metadata, word sense disambiguation

E. Francesconi; G. Peruginelli

2004-10-01T23:59:59.000Z

378

Disabled Parking & Access Plan Campus Disabled Persons (DP)  

E-Print Network (OSTI)

ongoing survey service contract · Accurate Parking Space Counts ­ Yearly aerial photos for review Plan Ongoing Objectives · Keep Campus Survey and Campus-wide Access Plan Current · Follow Up Feedback ­ Computer-based survey of surface features, buildings, parking lot striping, pedestrian walkways ­ Campus

de Lijser, Peter

379

Mercury: Enabling Remote Procedure Call  

NLE Websites -- All DOE Office Websites (Extended Search)

High-Performance Computing (HPC), allows the execution of routines to be dele- gated to remote nodes, which can be set aside and dedicated to specific tasks. However, existing...

380

Service Contracts  

NLE Websites -- All DOE Office Websites (Extended Search)

Guidelines for Obtaining Guidelines for Obtaining Best-Practice Contracts for Commercial Buildings Operation and Maintenance Service Contracts Prepared with funding from the U.S. EPA December 1997 PECI Acknowledgements Special thanks to the following people for their ongoing contributions and careful review of the document: Byron Courts, Director of Engineering Services, and Dave Rabon, Chief Engineer, Melvin Mark Pete Degan, Director of Customer Marketing, Landis/Staefa David Fanning, HVAC Coordinator, EXPRESS Bil Pletz, Facility Manager, Intel Mike Sanislow, Service Channel Development Leader, Honeywell Home and Building Karl Stum, Director of Technical Services, PECI Tom Walton, President, United Service Alliance For additional copies of this guidebook, contact: Portland Energy Conservation Inc. (PECI)

Note: This page contains sample records for the topic "remote access services" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

ENGO 435 Ayman F. Habib Remote Sensing  

E-Print Network (OSTI)

ENGO 435 Ayman F. Habib 1 Remote Sensing Fall 2003 ENGO 435 Ayman F. Habib 2 Contact Information of remotes sensing. ­ Definitions and concepts. ­ Applications in Geomatics Engineering. · Emphasis: ­ Elements of remote sensing. ­ Systems for the acquisition of remote sensing data. ­ Radiometric

Habib, Ayman

382

REMOTE SENSING OF ENVIRONMENT I COURSE SYLLABUS  

E-Print Network (OSTI)

-1- REMOTE SENSING OF ENVIRONMENT I COURSE SYLLABUS GEOG 526, Fall 2012 T Th 9:30 ­ 10:45 228 relating to remote sensing of the earth's environment. We will begin by examining remote sensing as a field will shift to digital image processing and to areas in which remote sensing is applied as a tool for mapping

Peterson, Blake R.

383

Remote Sensing Ayman F. Habib Image Classification  

E-Print Network (OSTI)

1 Remote Sensing Ayman F. Habib 1 Chapter 6 Image Classification Remote Sensing Ayman F. Habib 2. ­ Unsupervised classification. · Accuracy assessment. #12;2 Remote Sensing Ayman F. Habib 3 Image Classification of image pixels is based on their digital numbers/grey values in one or more spectral bands. Remote Sensing

Habib, Ayman

384

Remote Sensing Techniques | Open Energy Information  

Open Energy Info (EERE)

Remote Sensing Techniques Remote Sensing Techniques Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Technique: Remote Sensing Techniques Details Activities (0) Areas (0) Regions (0) NEPA(0) Exploration Technique Information Exploration Group: Remote Sensing Techniques Exploration Sub Group: None Parent Exploration Technique: Exploration Techniques Information Provided by Technique Lithology: Stratigraphic/Structural: Hydrological: Thermal: Dictionary.png Remote Sensing Techniques: Remote sensing utilizes satellite and/or airborne based sensors to collect information about a given object or area. Remote sensing data collection methods can be passive or active. Passive sensors (e.g., spectral imagers) detect natural radiation that is emitted or reflected by the object or area

385

U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

15: CiscoWorks Common Services Home Page Input Validation Flaw 15: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands October 20, 2011 - 7:30am Addthis PROBLEM: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands. PLATFORM: CiscoWorks Common Services-based products prior to version 4.1 running on Microsoft Windows ABSTRACT: Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator. reference LINKS: Cisco Security Advisory ID: cisco-sa-20111019-cs Cisco Security Advisories and Responses

386

T-725: Cisco Unified Service Monitor and Cisco Unified Operations Manager  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-725: Cisco Unified Service Monitor and Cisco Unified Operations T-725: Cisco Unified Service Monitor and Cisco Unified Operations Manager Remote Code Execution Vulnerabilitiry Code T-725: Cisco Unified Service Monitor and Cisco Unified Operations Manager Remote Code Execution Vulnerabilitiry Code September 23, 2011 - 9:00am Addthis PROBLEM: Cisco Unified Service Monitor and Cisco Unified Operations Manager Remote Code Execution Vulnerabilitiry Code. PLATFORM: Cisco Unified Service Monitor prior to version 8.6 Cisco Unified Operations Manager prior to version 8.6 CiscoWorks LAN Management Solution software releases 3.1, 3.2, and 4.0. ABSTRACT: Successful exploitation of these vulnerabilities could allow an unauthenticated, remote attacker to execute arbitrary code on affected servers. reference LINKS: Cisco Security Advisory 113173

387

U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: CiscoWorks Common Services Home Page Input Validation Flaw 5: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands October 20, 2011 - 7:30am Addthis PROBLEM: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands. PLATFORM: CiscoWorks Common Services-based products prior to version 4.1 running on Microsoft Windows ABSTRACT: Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator. reference LINKS: Cisco Security Advisory ID: cisco-sa-20111019-cs Cisco Security Advisories and Responses

388

U-135: HP WBEM Discloses Diagnostic Data to Remote and Local Users |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

35: HP WBEM Discloses Diagnostic Data to Remote and Local Users 35: HP WBEM Discloses Diagnostic Data to Remote and Local Users U-135: HP WBEM Discloses Diagnostic Data to Remote and Local Users March 28, 2012 - 7:00am Addthis PROBLEM: HP WBEM Discloses Diagnostic Data to Remote and Local Users PLATFORM: HP-UX 11.11, 11.23, and 11.31 ABSTRACT: Two vulnerabilities were reported in HP WBEM. A remote or local user can gain access to diagnostic data. REFERENCE LINKS: SecurityTracker Alert ID: 1026849 CVE-2012-0125 CVE-2012-0126 iIMPACT ASSESSMENT Medium Discussion: A potential security vulnerability has been identified with certain HP-UX WBEM components. The vulnerability could be exploited remotely in HP-UX 11.11 and HP-UX 11.23 to gain unauthorized access to diagnostic data. The vulnerability could be exploited locally in HP-UX 11.31 to gain

389

U-135: HP WBEM Discloses Diagnostic Data to Remote and Local Users |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP WBEM Discloses Diagnostic Data to Remote and Local Users 5: HP WBEM Discloses Diagnostic Data to Remote and Local Users U-135: HP WBEM Discloses Diagnostic Data to Remote and Local Users March 28, 2012 - 7:00am Addthis PROBLEM: HP WBEM Discloses Diagnostic Data to Remote and Local Users PLATFORM: HP-UX 11.11, 11.23, and 11.31 ABSTRACT: Two vulnerabilities were reported in HP WBEM. A remote or local user can gain access to diagnostic data. REFERENCE LINKS: SecurityTracker Alert ID: 1026849 CVE-2012-0125 CVE-2012-0126 iIMPACT ASSESSMENT Medium Discussion: A potential security vulnerability has been identified with certain HP-UX WBEM components. The vulnerability could be exploited remotely in HP-UX 11.11 and HP-UX 11.23 to gain unauthorized access to diagnostic data. The vulnerability could be exploited locally in HP-UX 11.31 to gain

390

CHAPTER 12:CHAPTER 12: Remote Sensing ofRemote Sensing of  

E-Print Network (OSTI)

1 CHAPTER 12:CHAPTER 12: Remote Sensing ofRemote Sensing of WaterWaterWaterWater REFERENCE: Remote SensingREFERENCE: Remote Sensing of the Environmentof the Environment John R. Jensen (2007)John R. Jensen yy y the waterthe water with remotewith remote sensing?sensing? #12;2 THE BLUE PLANETTHE BLUE PLANET

Gilbes, Fernando

391

Remote Sensing Ayman F. Habib Radiometric Processing of Remote Sensing Data  

E-Print Network (OSTI)

Remote Sensing Ayman F. Habib 1 Chapter 4 Radiometric Processing of Remote Sensing Data #12;Remote. · Noise removal. · Point and edge detection. ­ Frequency domain. #12;Remote Sensing Ayman F. Habib 3 Radiometric Calibration #12;Remote Sensing Ayman F. Habib 4 Recorded Digital Numbers (DN) · Recorded grey

Habib, Ayman

392

Remote Invocation in Java G52CON Concepts of Concurrency Remote Invocation in Java  

E-Print Network (OSTI)

.out.println(account.balance()); } catch (Exception e) { // Error handling } } } Remote Invocation in Java G52CON ­ Concepts of Concurrency1 Remote Invocation in Java G52CON ­ Concepts of Concurrency Remote Invocation in Java · Provided by the java.rmi package · Based on a model of remote method invocation (RMI), equivalent to remote procedure

Mills, Steven

393

T-572: VMware ESX/ESXi SLPD denial of service vulnerability | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

72: VMware ESX/ESXi SLPD denial of service vulnerability 72: VMware ESX/ESXi SLPD denial of service vulnerability T-572: VMware ESX/ESXi SLPD denial of service vulnerability March 8, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in VMware ESX. A remote user can cause denial of service conditions. PLATFORM: ESX/ESXi 4.0, 4.1 ABSTRACT: VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm. reference LINKS: VMware Security Advisory: VMSA-2011-0004 VMware vSphere 4 VMware ESXi 4.1 Update CVE-2010-3609 IMPACT ASSESSMENT: Moderate Discussion: A remote user can send specially crafted data to cause the target Service Location Protocol daemon (SLPD) to enter an infinite loop and consume excessive CPU resources.A remote user can consume excessive CPU resources.

394

T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apple iOS Certificate Chain Validation Flaw Lets Certain 6: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions July 26, 2011 - 1:06am Addthis PROBLEM: A vulnerability was reported in Apple iOS. A remote user with the ability to conduct a man-in-the-middle attack can access or modify SSL/TLS sessions. PLATFORM: iOS 4.2.5 through 4.2.9 for iPhone 4 (CDMA) iOS 3.0 through 4.3.4 for iPhone 3GS and iPhone 4 (GSM) iOS 3.1 through 4.3.4 for iPod touch (3rd generation) and later iOS 3.2 through 4.3.4 for iPad ABSTRACT: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions. reference LINKS: SecurityTracker Alert ID: 1025837

395

T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

76: Apple iOS Certificate Chain Validation Flaw Lets Certain 76: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions July 26, 2011 - 1:06am Addthis PROBLEM: A vulnerability was reported in Apple iOS. A remote user with the ability to conduct a man-in-the-middle attack can access or modify SSL/TLS sessions. PLATFORM: iOS 4.2.5 through 4.2.9 for iPhone 4 (CDMA) iOS 3.0 through 4.3.4 for iPhone 3GS and iPhone 4 (GSM) iOS 3.1 through 4.3.4 for iPod touch (3rd generation) and later iOS 3.2 through 4.3.4 for iPad ABSTRACT: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions. reference LINKS: SecurityTracker Alert ID: 1025837

396

Remote drill bit loader  

DOE Patents (OSTI)

A drill bit loader is described for loading a tapered shank of a drill bit into a similarly tapered recess in the end of a drill spindle. The spindle has a transverse slot at the inner end of the recess. The end of the tapered shank of the drill bit has a transverse tang adapted to engage in the slot so that the drill bit will be rotated by the spindle. The loader is in the form of a cylinder adapted to receive the drill bit with the shank projecting out of the outer end of the cylinder. Retainer pins prevent rotation of the drill bit in the cylinder. The spindle is lowered to extend the shank of the drill bit into the recess in the spindle and the spindle is rotated to align the slot in the spindle with the tang on the shank. A spring unit in the cylinder is compressed by the drill bit during its entry into the recess of the spindle and resiliently drives the tang into the slot in the spindle when the tang and slot are aligned. In typical remote drilling operations, whether in hot cells or water pits, drill bits have been held using a collet or end mill type holder with set screws. In either case, to load or change a drill bit required the use master-slave manipulators to position the bits and tighten the collet or set screws. This requirement eliminated many otherwise useful work areas because they were not equipped with slaves, particularly in water pits.

Dokos, J.A.

1996-12-31T23:59:59.000Z

397

Furman University OPEN ACCESS PLUS MEDICAL  

E-Print Network (OSTI)

Furman University OPEN ACCESS PLUS MEDICAL BENEFITS ­ Core Plan OPEN ACCESS PLUS MEDICAL BENEFITS ............................................................................................................................................11 Open Access Plus Medical Benefits

398

Remote System Technologies for Deactivating Hanford Hot Cells  

Science Conference Proceedings (OSTI)

Remote system technologies are being deployed by Fluor Hanford to help accelerate the deactivation of highly-radioactive hot cell facilities. These technologies offer improved methods for accessing difficult-to-reach spaces and performing tasks such as visual inspection, radiological characterization, decontamination, waste handling, and size reduction. This paper is focused on the application of remote systems in support of deactivation work being performed in several legacy facilities at Hanford (i.e., the 324 and 327 Buildings). These facilities were previously used for fuel fabrication, materials examination, and the development of waste treatment processes. The technologies described in this paper represent significant improvements to Hanford's baseline methods, and may offer benefits to other U.S. Department of Energy (DOE) sites and commercial operations.

Berlin, G.; Walton, T.

2003-02-25T23:59:59.000Z

399

Optical access port  

DOE Patents (OSTI)

A 0.025 m diameter optical access port system is provided for a high-pressure (20.4 bars) and high-temperature (538{degrees}C) fixed-bed coal gasification process stream. A pair of proximal channels lead into the pipe containing the process stream with the proximal channels disposed on opposite sides of the pipe and coaxial. A pair of ball valves are attached to respective ends of proximal channels for fluidly closing the respective channels in a closed position and for providing a fluid and optical aperture in an open position. A pair of distal channels are connected to respective ball valves. These distal channels are also coaxial with each other and with the proximal channels. Each distal channel includes an optical window disposed therein and associated sealing gaskets. A purge gas is introduced into each distal channel adjacent a respective optical window. The purge gas is heated by a heater before entry into the distal channels. Preferably the optical windows are made of fused silica and the seals are Grafoil gaskets which are pressed against the optical window. 3 figs.

Lutz, S.A.; Anderson, R.J.

1988-09-14T23:59:59.000Z

400

Laboratory Access | Sample Preparation Laboratories  

NLE Websites -- All DOE Office Websites (Extended Search)

Access Access Planning Ahead Planning Ahead Please complete the Beam Time Request (BTR) and Support Request forms thourgh the User Portal. Thorough chemical and sample information must be included in your BTR. Support Request forms include a list of collaborators that require laboratory access and your group's laboratory equipment requests. Researcher safety is taken seriously at SLAC. Please remember that radioactive materials, nanomaterials, and biohazardous materials have additional safety requirements. Refer to the SSRL or LCLS Safety Offices for further guidance. Upon Arrival Upon Arrival Once you arrive you must complete training and access forms before accessing the Sample Preparation Laboratories (SPL). All Sample Prep Lab doors are locked with access key codes. Once your SPL

Note: This page contains sample records for the topic "remote access services" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Deployment of Infrastructure and Services in the Open Grid Services Architecture (OGSA)*  

E-Print Network (OSTI)

for automated remote deployment of Grid infrastructure and services across organizations in the Globus middleware stack we trialled Smart- Frog (a 3rd party component deployment technology [14]) for Grid the collection of components developed in the laboratory (a version of Smart- Frog, Grid specific deployment

Emmerich, Wolfgang

402

RECORD OF CATEGORICAL EXCLUSION DETERMINATION Hygiene Substation Access Road Repairs  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Hygiene Substation Access Road Repairs Hygiene Substation Access Road Repairs A. Brief Description of Proposal: Western Area Power Administration proposes to repair the access road/driveway into the Hygiene Substation. There is a low spot in the middle of the driveway that impedes maneuvering oflarge maintenance equipment in and out of the yard. Western plans to fill the low spot with road base and crumbled concrete fill. The Hygiene Substation is located in Boulder County, approximately 2 miles northwest of Longmont, CO (T3N, R69W, Sec 18). All proposed construction will occur within the existing, disturbed substation access road/driveway. B. Number and Title of tile Categorical Exclusion Being Applied: (See text in 10 CFR 1021, Subpart D.) BI.3 Routine maintenance activities and custodial services for buildings, structures,

403

The Ohio Capital Access Program (OCAP) (Ohio) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

The Ohio Capital Access Program (OCAP) (Ohio) The Ohio Capital Access Program (OCAP) (Ohio) The Ohio Capital Access Program (OCAP) (Ohio) < Back Eligibility Agricultural Commercial Construction Fuel Distributor Industrial Installer/Contractor Retail Supplier Transportation Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Ohio Program Type Loan Program Provider Ohio Development Services Agency The Ohio Capital Access Program (OCAP) encourages state depository financial institutions to make loans to for-profit or nonprofit small businesses that are having difficulty obtaining business loans through conventional underwriting standards. The business' principal place of business must be in Ohio with revenues less than $10 million and with fewer

404

Access Control Policy Tool (ACPT)  

Science Conference Proceedings (OSTI)

... In regard to cyber security, privacy, and information sharing, access control is one of the crucial elements in protecting the nation's critical IT ...

2013-01-15T23:59:59.000Z

405

Foreign National Access Request Form  

NLE Websites -- All DOE Office Websites (Extended Search)

will be allowed access to the ANL facility prior to approval by the Security and Counterintelligence Division. The visitor must have a valid passport and visa (or supplemental...

406

Science Open Access Journals - About  

Office of Scientific and Technical Information (OSTI)

SOAJ allows the user to search multiple open access publications with a single query. The query is sent simultaneously to each individual database searched by SOAJ,...

407

U-240: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apple Remote Desktop Encryption Failure Lets Remote Users 0: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain Potentially Sensitive Information U-240: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain Potentially Sensitive Information August 21, 2012 - 7:00am Addthis PROBLEM: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain Potentially Sensitive Information PLATFORM: Apple Remote Desktop after 3.5.1 and prior to 3.6.1 ABSTRACT: A remote user can monitor potentially sensitive information. reference LINKS: Apple.com Apple Article: HT5433 SecurityTracker Alert ID: 1027420 CVE-2012-0681 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apple Remote Desktop. When a user connects to a third-party VNC server with the 'Encrypt all network data' setting enabled, network data is not encrypted. A remote user monitoring the

408

Property:EnergyServicesType | Open Energy Information  

Open Energy Info (EERE)

EnergyServicesType EnergyServicesType Jump to: navigation, search Property Name EnergyServicesType Property Type String Description Type of energy services provided. Allows Values Lighting;Cooking and water heating;Space heating;Cooling;Information and communications;Earning a living Pages using the property "EnergyServicesType" Showing 8 pages using this property. B Benin: Increased Access to Modern Energy Project + Lighting +, Cooking and water heating +, Space heating +, ... E Ethiopia Energy Access Project + Lighting +, Cooking and water heating +, Information and communications + G Ghana Energy Development and Access Project (GEDAP) + Lighting +, Cooking and water heating +, Information and communications + M Mongolia Renewable Energy and Rural Electricity Access Project + Lighting +, Cooking and water heating +, Space heating +, ...

409

An Information Services Algorithm to Heuristically Summarize IP Addresses for a Distributed, Hierarchical Directory Service  

NLE Websites -- All DOE Office Websites (Extended Search)

information services algorithm to heuristically summarize IP addresses for a information services algorithm to heuristically summarize IP addresses for a distributed, hierarchical directory service Marcos Portnoi, Martin Swany Department of Computer and Information Sciences University of Delaware Newark, DE 19716, U.S.A. {portnoi, swany}@cis.udel.edu Jason Zurawski Internet2 Washington, DC 20036, U.S.A. zurawski@internet2.edu Abstract- A distributed, hierarchical information service for computer networks might use several service instances, located in different layers. A distributed directory service, for example, might be comprised of upper level listings, and local directories. The upper level listings contain a compact version of the local directories. Clients desiring to access the information contained in local directories might first access the

410

Furman University OPEN ACCESS PLUS MEDICAL  

E-Print Network (OSTI)

8:54 AM Furman University OPEN ACCESS PLUS MEDICAL BENEFITS ­ Basic Plan OPEN ACCESS PLUS MEDICAL ...................................................................................................................................................10 Open Access Plus Medical Benefits Basic Plan ...............................................................................................................................................................12 Open Access Plus Medical Benefits Core Plan

411

Storage Viability and Optimization Web Service  

DOE Green Energy (OSTI)

Non-residential sectors offer many promising applications for electrical storage (batteries) and photovoltaics (PVs). However, choosing and operating storage under complex tariff structures poses a daunting technical and economic problem that may discourage potential customers and result in lost carbon and economic savings. Equipment vendors are unlikely to provide adequate environmental analysis or unbiased economic results to potential clients, and are even less likely to completely describe the robustness of choices in the face of changing fuel prices and tariffs. Given these considerations, researchers at Lawrence Berkeley National Laboratory (LBNL) have designed the Storage Viability and Optimization Web Service (SVOW): a tool that helps building owners, operators and managers to decide if storage technologies and PVs merit deeper analysis. SVOW is an open access, web-based energy storage and PV analysis calculator, accessible by secure remote login. Upon first login, the user sees an overview of the parameters: load profile, tariff, technologies, and solar radiation location. Each parameter has a pull-down list of possible predefined inputs and users may upload their own as necessary. Since the non-residential sectors encompass a broad range of facilities with fundamentally different characteristics, the tool starts by asking the users to select a load profile from a limited cohort group of example facilities. The example facilities are categorized according to their North American Industry Classification System (NAICS) code. After the load profile selection, users select a predefined tariff or use the widget to create their own. The technologies and solar radiation menus operate in a similar fashion. After these four parameters have been inputted, the users have to select an optimization setting as well as an optimization objective. The analytic engine of SVOW is LBNL?s Distributed Energy Resources Customer Adoption Model (DER-CAM), which is a mixed-integer linear program (MILP) written and executed in the General Algebraic Modeling System (GAMS) optimization software. LBNL has released version 1.2.0.11 of SVOW. Information can be found at http://der.lbl.gov/microgrids-lbnl/current-project-storage-viability-website.

Stadler, Michael; Marnay, Christ; Lai, Judy; Siddiqui, Afzal; Limpaitoon, Tanachai; Phan, Trucy; Megel, Olivier; Chang, Jessica; DeForest, Nicholas

2010-10-11T23:59:59.000Z

412

Internal Controls Over Sensitive Compartmented Information Access...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Controls Over Sensitive Compartmented Information Access for Selected Field Intelligence Elements, IG-0796 Internal Controls Over Sensitive Compartmented Information Access...

413

Access, use and impact of rural telecentres: findings from a village-level exploration  

Science Conference Proceedings (OSTI)

The paper presents the findings of a village level exploration seeking to investigate the pattern of access and use of a telecentre and its services by different socio-economic groups. It also examines how the pattern of access and use is shaped by the ... Keywords: Drishtee, ICT and development, India, telecentres

Maitrayee Mukerji

2010-12-01T23:59:59.000Z

414

On the formalization and analysis of a spatio-temporal role-based access control model  

Science Conference Proceedings (OSTI)

With the growing use of wireless networks and mobile devices, we are moving towards an era of pervasive computing. Such environments will spawn new applications that use contextual information to provide enhanced services. Traditional access control ... Keywords: Access control model, model analysis and verification, requirements specification, security

Manachai Toahchoodee; Indrakshi Ray

2011-08-01T23:59:59.000Z

415

The REMOTE SENSlNf  

Office of Legacy Management (LM)

REMOTE REMOTE SENSlNf ' . 1 ARllRllRRv OF THE UNITED STATES DEPARTMENT OF ENERGY . . . . .a. * ~~&hrEAWWMms Gap ~~&hrEAwwMms Gap ECT FOLLdW-UP REPORT ECT FOLLdW-UP REPORT NOVEMBER 1979 NOVEMBER 1979 AN AERIAL RADIOLOGICAL SURVEY OF THE CURTIS BAY FACILITY OF THE W. FL GRACE COMPANY Baltimore, Maryland t. Kent Hilton Project Scientist APPROVED FORPUBLlCATlON ' : T. P. Stuart, Manager Remote Sensing Sciences Department ATTACHMENT 4- ECT Follow-Up Report AN AERIAL RADIOLOGICAL SURVEY OF THE CURTIS BAY FACILITY This is the second of two reports discussing the gamma ray radiation levels measured at the Curtis Bay facility of the W. R. Grace Company. The first report presented gross count contours and gamma ray spectra over the most active areas. Refined gross count isopleth maps will be

416

‘R-What?’ Development of a role-based access control policy-writing tool for e-Scientists: Research Articles  

Science Conference Proceedings (OSTI)

A lightweight role-based access control policy authoring tool was developed for e-Scientists, a community for which access policies have to be implemented for an increasingly heterogeneous group of local and remote users. Two fundamental problems were ... Keywords: RBAC user interface, policy generation, usability

Sacha Brostoff; M. Angela Sasse; David Chadwick; James Cunningham; Uche Mbanaso; Sassa Otenko

2005-07-01T23:59:59.000Z

417

Lighting for remote viewing systems  

SciTech Connect

Scenes viewed by television do not provide the same channels of information for judgment of distances as scenes viewed directly, since television eliminates or degrades several depth perception cues. However, it may be possible to improve depth perception of televised scenes by enhancing the information available through depth cues that are available from lighting. A literature survey and expert opinions were integrated to design a remote lighting arrangement which could enhance depth perception of operators performing remote handling operations. This paper describes the lighting arrangement and discusses some of its advantages and disadvantages. 10 references, 2 figures.

Draper, J.V.

1984-01-01T23:59:59.000Z

418

Lighting for remote viewing systems  

SciTech Connect

Scenes viewed by television do not provide the same channels of information for judgement of distances as scenes viewed directly, since television eliminates or degrades several depth perception cues. However, it may be possible to improve depth perception of televised scenes by enhancing the information available through depth cues that are available from lighting. A literature survey and expert opinions were integrated to design a remote lighting arrangement which could enhance depth perception of operators performing remote handling operations. This paper describes the lighting arrangement and discusses some of its advantages and disadvantages. 10 references, 2 figures.

Draper, J.V.

1984-01-01T23:59:59.000Z

419

V-062: Asterisk Two Denial of Service Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Asterisk Two Denial of Service Vulnerabilities 2: Asterisk Two Denial of Service Vulnerabilities V-062: Asterisk Two Denial of Service Vulnerabilities January 4, 2013 - 6:00am Addthis PROBLEM: Asterisk Two Denial of Service Vulnerabilities PLATFORM: The vulnerabilities are reported in versions 1.8.x, 10.x, and 11.x. ABSTRACT: Two vulnerabilities have been reported in Asterisk, which can be exploited by malicious users and malicious people to cause a DoS (Denial of Service). REFERENCE LINKS: Secunia Advisory SA51689 Asterisk Project Security Advisories CVE-2012-5976 CVE-2012-5977 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can send specially crafted data to consume excessive resources on the target system. Systems configured to allow anonymous calls are affected. A remote authenticated user can also exploit this via

420

T-710: Apache HTTP Server Overlapping Ranges Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Apache HTTP Server Overlapping Ranges Denial of Service 10: Apache HTTP Server Overlapping Ranges Denial of Service Vulnerability T-710: Apache HTTP Server Overlapping Ranges Denial of Service Vulnerability September 6, 2011 - 3:09am Addthis PROBLEM: Apache HTTP Server contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. PLATFORM: Apache HTTP Server versions 2.2.19 and prior ABSTRACT: Apache HTTP Server Overlapping Ranges Denial of Service Vulnerability. reference LINKS: FreeBSD VuXML Document Advisory ID: cisco-sa-20110830-apache IBM Alert: swg21512087 Red Hat Advisory: RHSA-2011:1245-1 CVE-2011-3192 CVE-2011-3192 (Update2) IMPACT ASSESSMENT: High Discussion: The vulnerability is due to improper processing of certain user-supplied requests by the affected software. An unauthenticated, remote attacker

Note: This page contains sample records for the topic "remote access services" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets 3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service May 31, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in BIND. A remote user can cause denial of service conditions. PLATFORM: BIND Version(s): 9.4-ESV-R3 and later, 9.6-ESV-R2 and later, 9.6.3, 9.7.1 and later, 9.8.0 and later; prior to 9.4-ESV-R4-P1, 9.6-ESV-R4-P1, 9.7.3-P1, 9.8.0-P2 ABSTRACT: A remote DNS server can supply very large RRSIG RRsets in a negative response to trigger an off-by-one error in a buffer size check and cause the target requesting named process to crash. A remote user can cause named to crash. reference LINKS: SecurityTracker Alert ID: 1025575 SecurityTracker Alert ID: 1025572

422

User Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Contacts for Users Contacts for Users User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m.

423

User Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Home Contact Home Contact User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m.

424

V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14: Cisco Prime Data Center Network Manager JBoss RMI Services 14: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands November 1, 2012 - 6:00am Addthis PROBLEM: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands PLATFORM: All Cisco Prime Data Center Network Manager releases prior to release 6.1(1), for both the Microsoft Windows and Linux platforms, are affected by this vulnerability. ABSTRACT: A vulnerability was reported in Cisco Prime Data Center Network Manager. REFERENCE LINKS: Cisco Advisory ID: cisco-sa-20121031-dcnm SecurityTracker Alert ID: 1027712 CVE-2012-5417 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability exists because JBoss Application Server Remote Method

425

U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP StorageWorks File Migration Agent Buffer Overflows Let 6: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code July 19, 2012 - 7:14am Addthis PROBLEM: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code PLATFORM: HP StorageWorks File Migration Agent ABSTRACT: Two vulnerabilities were reported in HP StorageWorks File Migration Agent. reference LINKS: SecurityTracker Alert ID: 1027281 ZDI-12-127 ZDI-12-126 IMPACT ASSESSMENT: High Discussion: The vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP StorageWorks File Migration Agent. Authentication is not required to exploit this vulnerability. 1. (ZDI-12-127) The specific flaw exists within the HsmCfgSvc.exe service

426

Barrier Slicing for Remote Software Trusting  

Science Conference Proceedings (OSTI)

Remote trusting aims at verifying the "healthy" execution of a program running on an untrusted client that communicates with a trusted server via network connection. After giving a formal definition of the remote trusting problem and a test to determine ...

Mariano Ceccato; Mila Dalla Preda; Jasvir Nagra; Christian Collberg; Paolo Tonella

2007-09-01T23:59:59.000Z

427

NUCLEAR INFORMATION SERVICES AT THE NATIONAL NUCLEAR DATA CENTER.  

SciTech Connect

The National Nuclear Data Center has provided remote access to its databases and other resources since 1986. This year we have completed the modernization of our databases and Web site. Resources available from our Web site will be summarized and some of the major improvements described in more detail.

BURROWS,T.W.; DUNFORD,C.L.

2004-09-26T23:59:59.000Z

428

User Services  

NLE Websites -- All DOE Office Websites (Extended Search)

User Services Print User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

429

User Services  

NLE Websites -- All DOE Office Websites (Extended Search)

User Services Print User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

430

User Services  

NLE Websites -- All DOE Office Websites (Extended Search)

User Services Print User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

431

User Services  

NLE Websites -- All DOE Office Websites (Extended Search)

User Services Print User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

432

User Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Services Print Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

433

User Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Services Print Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

434

DIRECTED ENERGY BIOMETRICS AND REMOTE SENSING  

Science Conference Proceedings (OSTI)

... New and Reorganized Appendices ?Sample Audit Forms ?And more ANSI Z 136.8 Page 6. DIRECTED ENERGY REMOTE SENSING: ...

2013-02-21T23:59:59.000Z

435

Optical dynamic circuit services  

Science Conference Proceedings (OSTI)

IP service, leased-line service and POTS service have been the three long-standing communication service offerings of providers. Recently, both commercial and research-andeducation network providers have started offering optical dynamic circuit services. ...

Malathi Veeraraghavan; Mark Karol; George Clapp

2010-11-01T23:59:59.000Z

436

Remote Sens. 2011, 3, x-x manuscripts; doi:xx1 Remote Sensing3  

E-Print Network (OSTI)

Remote Sens. 2011, 3, x-x manuscripts; doi:xx1 2 Remote Sensing3 ISSN 2072-42924 www16 7 Lebanese National Council For Scientific Research, Remote Sensing Centre, Beirut, Lebanon17 in Remote Sensing, 2011, 3(6), 1266-1283. The original publication is available at http://www.mdpi.com/ Doi

Paris-Sud XI, Université de

437

Remote Sens. 2011, 3, 2529-2551; doi:10.3390/rs3112529 Remote Sensing  

E-Print Network (OSTI)

Remote Sens. 2011, 3, 2529-2551; doi:10.3390/rs3112529 Remote Sensing ISSN 2072-4292 www.mdpi.com/journal/remotesensing Article Multispectral Remote Sensing from Unmanned Aircraft: Image Processing Workflows and Applications Abstract: Using unmanned aircraft systems (UAS) as remote sensing platforms offers the unique ability

438

Remote Sensing 2010, 2, 2274-2304; doi:10.3390/rs2092274 Remote Sensing  

E-Print Network (OSTI)

Remote Sensing 2010, 2, 2274-2304; doi:10.3390/rs2092274 Remote Sensing ISSN 2072-4292 www.mdpi.com/journal/remotesensing Review Remote Sensing of Irrigated Agriculture: Opportunities and Challenges Mutlu Ozdogan *, Yang Yang / Published: 27 September 2010 Abstract: Over the last several decades, remote sensing has emerged

Wisconsin at Madison, University of

439

Polarimetric remote sensing system analysis: Digital Imaging and Remote Sensing Image Generation (DIRSIG) model  

E-Print Network (OSTI)

i Polarimetric remote sensing system analysis: Digital Imaging and Remote Sensing Image Generation CENTER FOR IMAGING SCIENCE Title of Dissertation: Polarimetric remote sensing system analysis: DIRSIG____________________________________________________________ Date #12;vi #12;vii Polarimetric remote sensing system analysis: DIRSIG model validation and impact

Salvaggio, Carl

440

Remote Sens. 2013, 5, 5926-5943; doi:10.3390/rs5115926 Remote Sensing  

E-Print Network (OSTI)

Remote Sens. 2013, 5, 5926-5943; doi:10.3390/rs5115926 Remote Sensing ISSN 2072-4292 www: 6 November 2013 / Accepted: 7 November 2013 / Published: 14 November 2013 Abstract: Remote sensing challenging to model crop yields based on remotely sensed data due to the variation in radiation use

Myneni, Ranga B.

Note: This page contains sample records for the topic "remote access services" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

REMOTE LABORATORIES IN AUTOMATION: AIP-PRIMECA RAO ARI PLATFORM Remote Laboratories in Automation  

E-Print Network (OSTI)

Terms -- Education, Laboratories, Manufacturing automation, Remote handling I.INTRODUCTION For a fewREMOTE LABORATORIES IN AUTOMATION: AIP-PRIMECA RAO ARI PLATFORM Remote Laboratories in Automation learners to train themselves on remote real or virtual systems. They represent essential components in e

Paris-Sud XI, Université de

442

Remote Food Shopping Robot System in a Supermarket Realization of the shopping task from remote places  

E-Print Network (OSTI)

the experimental result performed with the integrated system. Index Terms-- Remote shopping, Foods handling, Human dailylifeRemote shopping, Foods handling, Human dailylife I. INTRODUCTION In this research we focusedRemote Food Shopping Robot System in a Supermarket ­Realization of the shopping task from remote

Ohya, Akihisa

443

10 January 2009 PHOTOGRAMMETRIC ENGINEERING & REMOTE SENSING High Performance Computing in Remote Sensing  

E-Print Network (OSTI)

10 January 2009 PHOTOGRAMMETRIC ENGINEERING & REMOTE SENSING High Performance Computing in Remote Book ReviewBook Review High Performance Computing in Remote Sensing introduces the most recent advances in the incorporation of the high-performance computing (HPC) paradigm in remote sensing missions. Eighteen well

Plaza, Antonio J.

444

Remote Sensing for Water Quality Applications  

E-Print Network (OSTI)

Remote Sensing for Water Quality Applications #12;Objective Give a brief update on GEO Inland and Nearshore Coastal Water Quality Remote Sensing Workshop (GEO Work Task WA-06-01)) Held in Geneva and Nearshore Coastal Water Quality Remote Sensing Workshop (GEO Work Task WA-06-01)) Organizing committee

445

Airborne remote sensing in the frozen north  

E-Print Network (OSTI)

20 Airborne remote sensing in the frozen north High level shot from 10,000 feet shows, Chief Pilot and Operations Manager for NERC's Airborne Remote Sensing Facility reports on a recent trip expert ­ the Airborne Remote Sensing Facility flew to the Norwegian archipelago of Svalbard on August 3

Brierley, Andrew

446

Bylaws of the Center for Remote Sensing  

E-Print Network (OSTI)

DRAFT Bylaws of the Center for Remote Sensing Agricultural and Biological Engineering University for the conduct and operation of the Center for Remote Sensing (CRS) at the University of Florida (UF). The CRS and international recognition in research, teaching, and outreach for cutting-edge technologies in remote sensing

Watson, Craig A.

447

Geography 477 Introduction to Remote Sensing  

E-Print Network (OSTI)

Geography 477 Introduction to Remote Sensing www.sdal.uiuc.edu Dr. Tom Frank 321 Davenport Hall tdfrank@uiuc.edu 333-7248 #12;Remotely-sensed images of light reflected or emitted from the earth of the earth's environments #12;Remote sensing is the science or art of deriving information about an object

Frank, Thomas D.

448

Challenges and Opportunities of Remote Sensing in  

E-Print Network (OSTI)

Challenges and Opportunities of Remote Sensing in Caribbean Coastal Waters Fernando Gilbes-Santaella, Ph.D. Associate Professor Geological and Environmental Remote Sensing Laboratory Department of this presentation Discuss the potential and limitations for remote sensing of ocean color and coral reefs monitoring

Gilbes, Fernando

449

Remote Sensing of the Rob Holman1  

E-Print Network (OSTI)

Remote Sensing of the Nearshore Rob Holman1 and Merrick C. Haller2 1 College of Earth, Ocean- ate temporal or spatial density or at reasonable logistical or financial costs. Remote sensing algo- rithms by which the most important geophysical variables can be estimated from remote sensing

Haller, Merrick

450

Empirically assessing the impact of dependency injection on the development of web service applications  

Science Conference Proceedings (OSTI)

Service-Oriented Computing (SOC) has been broadly conceived as the next big thing in distributed software development. The software industry has embraced SOC through Web Services -functionality that is accessible via ubiquitous protocols such as HTTP-. ... Keywords: code-first outsourcing, dependency injection, service-oriented computing, text mining, web Services

Marco Crasso; Cristian Mateo; Alejandro Zunino; Marcelo Campo

2010-03-01T23:59:59.000Z

451

Notices Accessible Format: Individuals with  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

472 Federal Register 472 Federal Register / Vol. 77, No. 83 / Monday, April 30, 2012 / Notices Accessible Format: Individuals with disabilities can obtain this document in an accessible format (e.g., braille, large print, audiotape, or computer diskette) on request to the program contact person listed under FOR FURTHER INFORMATION CONTACT. Electronic Access to This Document: The official version of this document is the document published in the Federal Register. Free Internet access to the official edition of the Federal Register and the Code of Federal Regulations is available via the Federal Digital System at: www.gpo.gov/fdsys. At this site you can view this document, as well as all other documents of this Department published in the Federal Register, in text or Adobe Portable Document

452

Network Access to Multimedia Information  

Science Conference Proceedings (OSTI)

This report summarises the requirements of research and academic network users for network access to multimedia information. It does this by investigating some of the projects planned or currently underway in the community. Existing information systems ...

C. Adie

1994-05-01T23:59:59.000Z

453

Categorical Exclusion for Access Road  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Access Road Access Road Improvements along the Pinnacle Peak- Prescott 230-kV Transmission Line between Structures 16813 and 170/1 Yavapai County. Arizona * RECORD OF CATEGORICAL EXCLUSION DETERMINATION A. Proposed Action: Western proposes to improve access roads along a portion of the Pinnacle Peak to Prescott 230-kV Transmission Line (Structures 168/3 and 170/1). which are currently impassable. to maintain worker safety and the reliability of the bulk electric system. Western plans to blade and grade the existing access road where it enters and leaves three washes so that Western's maintenance vehicles can drive across the washes. We will remove dirt from the road prism by starting at wash edges and pulling dirt up slope in order to create ramps with grades suitable for our equipment.

454

The development of new algorithms for remote sensing of snow ...  

Science Conference Proceedings (OSTI)

Mar 14, 2010 ... remote sensing algorithm development, calibration and validation in ... Keywords Remote sensing Á Retrieval algorithms Á. Fractional snow ...

455

Remote Sensing Methods for Imaging Dose to Water  

Science Conference Proceedings (OSTI)

Remote Sensing Methods for Imaging Dose to Water. Summary: Calorimetry based upon remote sensing of the temperature ...

2013-02-26T23:59:59.000Z

456

Public Services | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services Services Public Services Find out more about our work with our National Labs Saving Energy Saves You Money Find out more about how technologies move from the lab to the market For Consumers Homes We're launching a new series, #AskEnergySaver, to give you access to the Energy Department's home energy efficiency experts. This month, we're answering your questions about home energy audits. | Graphic by Sarah Gerrity, Energy Department. Homes #AskEnergySaver: Answering Your Home Energy-Saving Questions Energy Efficiency Wide Bandgap Semiconductors: Essential to Our Technology Future Looking for ways to save energy? Check out these tips that every homeowner should try. | Infographic by Sarah Gerrity, Energy Department. Updated January 2, 2014.

457

Remote Sensing Ayman F. Habib Electro-Magnetic Radiation  

E-Print Network (OSTI)

Remote Sensing Ayman F. Habib 1 Chapter 2 Electro-Magnetic Radiation #12;Remote Sensing Ayman F. Habib 2 Elements of Remote Sensing #12;Remote Sensing Ayman F. Habib 3 Chapter 2 Radiation: nature & source #12;Remote Sensing Ayman F. Habib 4 Chapter 2 Interaction with the atmosphere #12;Remote Sensing

Habib, Ayman

458

Remote Sensing Ayman F. Habib Electro-Magnetic Radiation  

E-Print Network (OSTI)

Remote Sensing Ayman F. Habib 1 Chapter 2 Electro-Magnetic Radiation Remote Sensing Ayman F. Habib 2 Elements of Remote Sensing #12;Remote Sensing Ayman F. Habib 3 Chapter 2 Radiation: nature & source Remote Sensing Ayman F. Habib 4 Chapter 2 Interaction with the atmosphere #12;Remote Sensing Ayman

Habib, Ayman

459

Java^TM RemoteMethod Invocation Specification  

E-Print Network (OSTI)

2.7 Exception Handling in Remote Method Invocation. . . . . 11 2.8 Object Methods Overridden Handling in Remote Method Invocation . Object Methods Overridden by the RemoteObject Class . The Semantics.7 Exception Handling in Remote Method Invocation Since remote methods include java.rmi.Remote

Demurjian, Steven A.

460

Scalable Access within the Context of Digital Libraries  

E-Print Network (OSTI)

This paper presents a summary of some of the work-in-progress within the Alexandria Digital Library Project. In particular, we present scalable methods of locating information at different levels within a distributed digital library environment. Starting at the high level, we show how queries can be routed to appropriate information sources. At a given source, efficient query processing is supported by using materialized views and multidimensional index structures. Finally, we propose solutions to the problem of storage and retrieval of large objects on secondary and tertiary storage. 1 Introduction Library services provide efficient access to information implicit in collections of information-bearing objects such as text documents and maps. Traditional libraries, based on information in non-digital form, are characterized by a limited set of services that provide relatively coarse-grained access to the information in controlled collections of items. Digital libraries, based on infor...

X. Cheng; R. Dolin; M. Neary; S. Prabhakar; K. V. Ravi; Kanth D. Wu; D. Agrawal; A. El; Abbadi M. Freeston; A. Singh; T. Smith; J. Su

1997-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "remote access services" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

XML access control using static analysis  

Science Conference Proceedings (OSTI)

Access control policies for XML typically use regular path expressions such as XPath for specifying the objects for access-control policies. However such access-control policies are burdens to the query engines for XML documents. To relieve this burden, ... Keywords: Access control, XML, XPath, XQuery, automaton, query optimization, schema, static analysis, value-based access control, view schema

Makoto Murata; Akihiko Tozawa; Michiharu Kudo; Satoshi Hada

2006-08-01T23:59:59.000Z

462

SERVICES Purpose  

E-Print Network (OSTI)

This Management Memo calls on all state agencies operating state motor vehicles to make every effort to “Flex Your Power at the Pump, ” and lower fuel costs for the State of California through vigorous compliance with the preventative maintenance standards identified in this management memo and in the Automobile Record, Standard (STD.) 271. Background Public Resources Code 25722 mandates the state reduce petroleum consumption of its vehicle fleet to the maximum extent practicable including improved preventative maintenance. State Administrative Manual Section (SAM) 4101 establishes the need to comply with minimum preventative maintenance standards listed in the Automobile Maintenance Record, STD. 271. This includes prescribed services and mechanical inspections that promote state vehicle efficiency and achieve optimum fuel mileage. SAM Section 3687.1 prohibits the purchase of premium grade gasoline for state vehicles. And, directs state drivers to make fuel purchases at lower priced self-service pumps whenever possible.

Manual Sections

2005-01-01T23:59:59.000Z

463

What's in a Service?  

Science Conference Proceedings (OSTI)

A proper understanding of the general nature, potential and obligations of electronic services may be achieved by examining existing commercial services in detail. The everyday services that surround us, and the ways in which we engage with them, are ... Keywords: electronic services, service description, service properties, service substitution

Justin O'Sullivan; David Edmond; Arthur Ter Hofstede

2002-09-01T23:59:59.000Z

464

Definition: Remote Sensing Techniques | Open Energy Information  

Open Energy Info (EERE)

Remote Sensing Techniques Remote Sensing Techniques Jump to: navigation, search Dictionary.png Remote Sensing Techniques Remote sensing utilizes satellite and/or airborne based sensors to collect information about a given object or area. Remote sensing data collection methods can be passive or active. Passive sensors (e.g., spectral imagers) detect natural radiation that is emitted or reflected by the object or area being observed. In active remote sensing (e.g., radar) energy is emitted and the resultant signal that is reflected back is measured.[1] View on Wikipedia Wikipedia Definition Remote sensing is the acquisition of information about an object or phenomenon without making physical contact with the object. In modern usage, the term generally refers to the use of aerial sensor technologies

465

CoercionCoercion--Resistant RemoteResistant Remote Voting Using Decryption MixesVoting Using Decryption Mixes  

E-Print Network (OSTI)

-Resistant Remote Voting 12 Ballot HandlingBallot Handling · Problem: LHS+onion of ballot reveals too much ­ MustCoercionCoercion--Resistant RemoteResistant Remote Voting Using Decryption MixesVoting Using September 16, 2005 Clarkson and Myers: Coercion-Resistant Remote Voting 2 Remote VotingRemote Voting · Clear

Schoenmakers, Berry

466

DEVELOPMENT OF REMOTE HANFORD CONNECTOR GASKET REPLACEMENT TOOLING FOR DWPF  

SciTech Connect

The Defense Waste Processing Facility (DWPF) requested the Savannah River National Laboratory (SRNL) to develop tooling and equipment to remotely replace gaskets in mechanical Hanford connectors to reduce personnel radiation exposure as compared to the current hands-on method. It is also expected that radiation levels will continually increase with future waste streams. The equipment is operated in the Remote Equipment Decontamination Cell (REDC), which is equipped with compressed air, two master-slave manipulators (MSM's) and an electro-mechanical manipulator (EMM) arm for operation of the remote tools. The REDC does not provide access to electrical power, so the equipment must be manually or pneumatically operated. The MSM's have a load limit at full extension of ten pounds, which limited the weight of the installation tool. In order to remotely replace Hanford connector gaskets several operations must be performed remotely, these include: removal of the spent gasket and retaining ring (retaining ring is also called snap ring), loading the new snap ring and gasket into the installation tool and installation of the new gasket into the Hanford connector. SRNL developed and tested tools that successfully perform all of the necessary tasks. Removal of snap rings from horizontal and vertical connectors is performed by separate air actuated retaining ring removal tools and is manipulated in the cell by the MSM. In order install a new gasket, the snap ring loader is used to load a new snap ring into a groove in the gasket installation tool. A new gasket is placed on the installation tool and retained by custom springs. An MSM lifts the installation tool and presses the mounted gasket against the connector block. Once the installation tool is in position, the gasket and snap ring are installed onto the connector by pneumatic actuation. All of the tools are located on a custom work table with a pneumatic valve station that directs compressed air to the desired tool and vents the tools as needed. Extensive testing of tooling operation was performed in the DWPF manipulator repair shop. This testing allowed the operators to gain confidence before the equipment was exposed to radioactive contamination. The testing also led to multiple design improvements. On July 17 and 29, 2008 the Remote Gasket Replacement Tooling was successfully demonstrated in the REDC at the DWPF of The Savannah River Site.

Krementz, D.; Coughlin, Jeffrey

2009-05-05T23:59:59.000Z

467

HM-ACCESS Project | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

HM-ACCESS Project HM-ACCESS Project Framework for the Use of Electronic Shipping Papers for the Transport of Hazardous Materials HM-ACCESS Project (Framework for the Use of...

468

2e Carbon Access | Open Energy Information  

Open Energy Info (EERE)

Access Jump to: navigation, search Name 2e Carbon Access Place New York, New York Zip 10280 Sector Carbon Product 2E Carbon Access is an enterprise focused solely on bringing...

469

Remote sensor improves methane leakage surveys  

SciTech Connect

The remote sensing methane detector (RSMD) described in this paper is the result of a twelve year cooperative research program sponsored by the Columbia Gas System Service Corp., Environmental Research and Technology, Inc. and the Gas Research Institute. It is a hand-held, rechargeable battery-powered sensor that operates eight hours on one charge with a sensitivity very specific to methane. It can be scanned along the right of way to detect any methane in its path, up to at least 50 feet away. The RSMD is methane specific in that it only sense methane with minor sensitivity to ethane. This makes it particularly useful in industrial areas where present instruments are confused by solvents. It cannot be poisoned by silicones or leaded gasoline, since it is an optical system. When a cloud of methane has been detected by the RSMD, a sample cell attachment can be used to determine methane concentration in parts per million. A low power microcomputer is used in the RSMD to control its operation.

Eberle, A.C.; Kebabian, P.L.; Kruse, J.R.

1984-12-01T23:59:59.000Z

470

Survey of remote data monitoring systems  

DOE Green Energy (OSTI)

A self-contained data-logger device called an SDAS (Site Data Acquisition Subsystem) was built for the National Solar Data Network (NSDN) which could collect analog data from 96 channels, store the data for up to three days, and then transmit the stored data on request to a central facility by voice-grade telephone lines. This system has worked fairly well for the eight years that it has been in service. However, the design and components are getting old and newer dataloggers may be more reliable and accurate and less expensive. This report discusses the results of an extensive search for an SDAS replacement. The survey covered 62 models from 36 manufacturers. These numbers are not indicative of all the dataloggers or manufacturers available, but only those which appeared to have some qualifications for the NSDN datalogger replacement. This report views the datalogger as a system which is made up of sensors, a data acquisition and storage unit, a telecommunications subsystem, and a data processing subsystem. Therefore, there is a section on sensors used in the NSDN, telecommunications technology, and data processing requirements. These four components or subsystems are all necessary in order to have an integrated, successful remote data monitoring network.

Logee, T.L.; Kendall, P.W.; Pollock, E.O.; Raymond, M.G.; Knapp, R.C. Jr.

1984-09-01T23:59:59.000Z

471

Services | Open Energy Information  

Open Energy Info (EERE)

Services Jump to: navigation, search TODO: Add description Related Links List of Companies in Services Sector Retrieved from "http:en.openei.orgwindex.php?titleServices&oldid...

472

T-730: Vulnerability in Citrix Provisioning Services could result in  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

730: Vulnerability in Citrix Provisioning Services could result 730: Vulnerability in Citrix Provisioning Services could result in Arbitrary Code Execution T-730: Vulnerability in Citrix Provisioning Services could result in Arbitrary Code Execution September 29, 2011 - 8:30am Addthis PROBLEM: Vulnerability in Citrix Provisioning Services could result in Arbitrary Code Execution. PLATFORM: This vulnerability is present in all supported versions of Citrix Provisioning Services up to and including version 5.6 Service Pack 1. ABSTRACT: Citrix Provisioning Services is prone to a remote code-execution vulnerability. Successfully exploiting this issue will allow attackers to execute arbitrary code within the context of the application. reference LINKS: Citrix Document ID: CTX130846 Security Focus: Bugtraq ID 49803 IMPACT ASSESSMENT:

473

A Security Architecture for Data Aggregation and Access Control in Smart Grids  

E-Print Network (OSTI)

We propose an integrated architecture for smart grids, that supports data aggregation and access control. Data can be aggregated by home area network, building area network and neighboring area network in such a way that the privacy of customers is protected. We use homomorphic encryption technique to achieve this. The consumer data that is collected is sent to the substations where it is monitored by remote terminal units (RTU). The proposed access control mechanism gives selective access to consumer data stored in data repositories and used by different smart grid users. Users can be maintenance units, utility centers, pricing estimator units or analyzing and prediction groups. We solve this problem of access control using cryptographic technique of attribute-based encryption. RTUs and users have attributes and cryptographic keys distributed by several key distribution centers (KDC). RTUs send data encrypted under a set of attributes. Users can decrypt information provided they have valid attributes. The ac...

Ruj, Sushmita; Stojmenovic, Ivan

2011-01-01T23:59:59.000Z

474

NBP RFI: Data Access | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Access NBP RFI: Data Access Neustar, Inc. ("Neustar") hereby submits comments in response to the captioned Request for Information ("RFI") of the Department of Energy ("DOE"). The...

475

International Electricity Trade - Open Access | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

International Electricity Trade - Open Access International Electricity Trade - Open Access DOE has consistently expressed its policy that international electricity trade should be...

476

A conceptual model for service availability  

E-Print Network (OSTI)

Traditionally, availability has been seen as an atomic property asserting the average time a system is “up ” or “down”. In order to model and analyse the availability of computerised systems in a world where the dependency on and complexity of such systems are increasing, this notion of availability is no longer sufficient. This report presents a conceptual model for service availability designed to handle these challenges. The core of this model is a characterisation of service availability by means of accessibility properties and exclusivity properties, which is further specialised into measurable aspects of service availability. We outline how this conceptual model may be refined to a framework for specifying and analysing availability requirements.

Judith E. Y. Rossebø; Mass Soldal Lund; Knut-eilif Husa; Atle Refsdal

2006-01-01T23:59:59.000Z

477

Adaptive subcarrier and bit allocation in OFDMA systems supporting heterogeneous services  

Science Conference Proceedings (OSTI)

Orthogonal Frequency Division Multiple Access (OFDMA) is an efficient multiple access method for the future wireless systems. This paper studies the adaptive subcarrier and bit allocation problem in OFDMA systems to support heterogeneous services. The ... Keywords: Adaptive subcarrier and bit allocation, Fairness, Heterogeneous services, OFDMA, QoS

Guanding Yu; Zhaoyang Zhang; Peiliang Qiu

2007-12-01T23:59:59.000Z

478

Service Center  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ASSIGNMENTS ASSIGNMENTS Pamela Arias-Ortega - Administrative and judicial litigation; and personnel law and workforce discipline mailto:parias-ortega@doeal.gov Celina Baca - Research and special projects for litigation and general law group mailto:cbaca@doeal.gov Dick Blakely - Designated Agency Ethics Advisor - Administrative litigation and mediation services; and ethics mailto:rblakely@doeal.gov Jonathan Buckner - Administrative review hearings; and administrative hearings before EEOC and MSPB mailto:jbuckner@doeal.gov Sean Counce - Administrative review hearings; and administrative hearings before EEOC and MSPB mailto:scounce@doeal.gov Diana Cruz - Copyright program; intellectual property databases; support for IP issues; and time and attendance mailto:dcruz@doeal.gov

479

Remote operation of the TFTR BES experiment from an off-site location  

SciTech Connect

The capability of controlling a diagnostic subsystem and interactively participating in the experimental program on Tokamak Fusion Test Reactor (TFTR) from a remote site has been developed and demonstrated on the TFTR BES experiment. Interactive communications are established from multiscreen remote workstations at the University of Wisconsin to the Princeton Plasma Physics Laboratory VAX cluster via multiple terminal sessions across the InterNet national network. Full control of the diagnostic, access to all relevant machine parameters and wave forms, and operations run logs are all available with automatic updates between plasma shots. A real-time count-down shot clock with timer, machine event status, and shot number provides a real-time interface to the TFTR shot sequence. This means of remote participation in a central fusion experiment provides vital experience for extrapolation to implementation on an ignition device to test engineering concepts.

Fonck, R.J.; Cosby, G.; Durst, R. (Department of Nuclear Engineering and Engineering Physics, University of Wisconsin-Madison, Madison, Wisconsin 53706 (United States)); Gibney, T.; Thompson, M.; Paul, S.F. (Princeton Plasma Physics Laboratory, Princeton, New Jersey 08543 (United States))

1992-10-01T23:59:59.000Z

480

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP Service Manager Bugs Permit Cross-Site Scripting and 6: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks May 1, 2013 - 12:43am Addthis PROBLEM: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks PLATFORM: Service Manager v9.31 Web Tier ABSTRACT: Two vulnerabilities were reported in HP Service Manager REFERENCE LINKS: HP Document ID: c03748875 SecurityTracker Alert ID: 1028496 CVE-2012-5222 CVE-2013-2321 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can obtain potentially sensitive information [CVE-2012-5222]. Service Manager Web Tier does not properly filter HTML code from user-supplied input before displaying the input [CVE-2013-2321]. A remote

Note: This page contains sample records for the topic "remote access services" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

U-238: HP Service Manager Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Service Manager Input Validation Flaw Permits Cross-Site 8: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks August 17, 2012 - 7:00am Addthis PROBLEM: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 7.11, 9.21, 9.30 ABSTRACT: Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. REFERENCE LINKS: www2.hp.com http://www.securitytracker.com/id/1027399 CVE-2012-3251 IMPACT ASSESSMENT: Moderate Discussion: A vulnerability was reported in HP Service Manager. A remote user can conduct cross-site scripting attacks. The software does not properly filter

482

U-238: HP Service Manager Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

38: HP Service Manager Input Validation Flaw Permits Cross-Site 38: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks August 17, 2012 - 7:00am Addthis PROBLEM: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 7.11, 9.21, 9.30 ABSTRACT: Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. REFERENCE LINKS: www2.hp.com http://www.securitytracker.com/id/1027399 CVE-2012-3251 IMPACT ASSESSMENT: Moderate Discussion: A vulnerability was reported in HP Service Manager. A remote user can conduct cross-site scripting attacks. The software does not properly filter

483

ASCI Grid Services summary report.  

SciTech Connect

The ASCI Grid Services (initially called Distributed Resource Management) project was started under DisCom{sup 2} when distant and distributed computing was identified as a technology critical to the success of the ASCI Program. The goals of the Grid Services project has and continues to be to provide easy, consistent access to all the ASCI hardware and software resources across the nuclear weapons complex using computational grid technologies, increase the usability of ASCI hardware and software resources by providing interfaces for resource monitoring, job submission, job monitoring, and job control, and enable the effective use of high-end computing capability through complex-wide resource scheduling and brokering. In order to increase acceptance of the new technology, the goal included providing these services in both the unclassified as well as the classified user's environment. This paper summarizes the many accomplishments and lessons learned over approximately five years of the ASCI Grid Services Project. It also provides suggestions on how to renew/restart the effort for grid services capability when the situation is right for that need.

Hiebert-Dodd, Kathie L.

2004-03-01T23:59:59.000Z

484

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple OS X Lets Remote Users Execute Arbitrary Code and 4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am Addthis U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am PROBLEM: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: Apple OS X ABSTRACT: Several vulnerabilities were reported in Apple OS X. reference LINKS: Apple Security Article: HT5501 SecurityTracker Alert ID: 1027551 CVE-2012-0650 CVE-2012-3716 CVE-2012-3718 CVE-2012-3719 CVE-2012-3720 CVE-2012-3721 CVE-2012-3722 CVE-2012-3723 IMPACT ASSESSMENT: Medium Discussion: If the DirectoryService Proxy is used, a remote user can trigger a buffer

485

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple OS X Lets Remote Users Execute Arbitrary Code and 4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am Addthis U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am PROBLEM: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: Apple OS X ABSTRACT: Several vulnerabilities were reported in Apple OS X. reference LINKS: Apple Security Article: HT5501 SecurityTracker Alert ID: 1027551 CVE-2012-0650 CVE-2012-3716 CVE-2012-3718 CVE-2012-3719 CVE-2012-3720 CVE-2012-3721 CVE-2012-3722 CVE-2012-3723 IMPACT ASSESSMENT: Medium Discussion: If the DirectoryService Proxy is used, a remote user can trigger a buffer

486

Accelerating Access | OSTI, US Dept of Energy, Office of Scientific and  

Office of Scientific and Technical Information (OSTI)

Accelerating Access Accelerating Access Shared Knowledge Is the Enabler of Scientific Progress OSTI is dedicated to the principle that, to advance science, research must be shared. With its proven track record in electronic delivery of groundbreaking information tools and services, OSTI is a leader in increasing access to the government's vast stores of R&D results. As OSTI has increased precision and power of information search tools, information access to DOE R&D results has become quicker, more convenient, and more complete than ever before. OSTI Web Traffic The number of transactions to access DOE R&D research results from OSTI resources has increased substantially due to public accessibility online. Chart showing OSTI Web Traffic per year, FY99 to FY11 In FY 2012, there were over 280 million transactions via OSTI resources.

487

Spectral Analysis via the Virtual Observatory: The Service Theossa  

E-Print Network (OSTI)

In the framework of the Virtual Observatory, the newly developed service TheoSSA provides access to theoretical stellar spectral-energy distributions. In a pilot phase, this service is based on the well established Tuebingen NLTE Model-Atmosphere Package for hot, compact stars. We demonstrate its present capabilities and future extensions.

Ringat, Ellen; Werner, Klaus

2011-01-01T23:59:59.000Z

488

A speech mashup framework for multimodal mobile services  

Science Conference Proceedings (OSTI)

Amid today's proliferation of Web content and mobile phones with broadband data access, interacting with small-form factor devices is still cumbersome. Spoken interaction could overcome the input limitations of mobile devices, but running an automatic ... Keywords: mashups, multimodal, speech mashup, speech services, speech system architecture, web services

Giuseppe Di Fabbrizio; Thomas Okken; Jay G. Wilpon

2009-11-01T23:59:59.000Z