Powered by Deep Web Technologies
Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: RSA Authentication Agent Lets Remote Users Bypass 3: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements PLATFORM: RSA Authentication Agent 7.1, 7.1.1 for Microsoft Windows ABSTRACT: A vulnerability was reported in RSA Authentication Agent. REFERENCE LINKS: RSA SecurCare SecurityTracker Alert ID: 1028230 CVE-2013-0931 IMPACT ASSESSMENT: Medium DISCUSSION: On systems configured for Quick PIN Unlock, the system will request a PIN instead of a full Passcode when the session is activated from an active screensaver after the Quick PIN Unlock timeout has expired. RSA Authentication Agent on Windows Vista, Windows 7, Windows 2008, and

2

V-223: RSA Authentication Agent for PAM Allows Remote Users to Make  

NLE Websites -- All DOE Office Websites (Extended Search)

3: RSA Authentication Agent for PAM Allows Remote Users to Make 3: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts V-223: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts August 21, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in RSA Authentication Agent for PAM PLATFORM: RSA Authentication Agent for PAM 7.0.2 and prior ABSTRACT: A remote user can make unlimited login attempts REFERENCE LINKS: Security Tracker Alert ID 1028930 CVE-2013-3271 IMPACT ASSESSMENT: Medium DISCUSSION: The system does not restrict the number of login attempts made via the agent IMPACT: System Access SOLUTION: Vendor has issued a fix Addthis Related Articles U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability

3

T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Adaptive Authentication Has Unspecified Remote 6: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw August 18, 2011 - 3:09pm Addthis PROBLEM: A vulnerability was reported in RSA Adaptive Authentication. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3, 6.0.2.1 SP2 and SP2 Patch 1, 6.0.2.1 SP3 ABSTRACT: An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. reference LINKS: Security Tracker: 1025956

4

V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Agent Discloses Node Secret Encryption Key to Local Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5...

5

V-195: RSA Authentication Manager Lets Local Users View the Administrative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

95: RSA Authentication Manager Lets Local Users View the 95: RSA Authentication Manager Lets Local Users View the Administrative Account Password V-195: RSA Authentication Manager Lets Local Users View the Administrative Account Password July 9, 2013 - 12:51am Addthis PROBLEM: RSA Authentication Manager Lets Local Users View the Administrative Account Password PLATFORM: RSA Authentication Manager 7.1, 8.0 ABSTRACT: A vulnerability was reported in RSA Authentication Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028742 CVE-2013-3273 RSA IMPACT ASSESSMENT: Medium DISCUSSION: When the RSA Authentication Manager Software Development Kit (SDK) is used to develop a custom application that connects with RSA Authentication Manager and the trace logging is set to verbose, the administrative account password used by the custom application is written in clear text to trace

6

V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA Adaptive Authentication (On-Premise) Input Validation 4: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks November 27, 2012 - 2:00am Addthis PROBLEM: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks PLATFORM: RSA Adaptive Authentication (On-Premise) 6.x ABSTRACT: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). REFERENCE LINKS: SecurityTracker Alert ID: 1027811 SecurityFocus Security Alert RSA Customer Support CVE-2012-4611 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). A remote user can conduct cross-site scripting attacks. The software does not

7

U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA®  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: RSA® Authentication Agent 7.1 for Microsoft Windows® and 7: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability September 25, 2012 - 6:00am Addthis PROBLEM: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability PLATFORM: Product: RSA Authentication Agent for Microsoft Windows version 7.1 Platforms: Windows XP and Windows 2003 Product: RSA Authentication Client 3.5 Platforms: Windows XP and Windows 2003 ABSTRACT: RSA Authentication Agent Lets Remote Authenticated Users Bypass an Authentication Step reference LINKS: SecurityTracker Alert ID: 1027559 Bugtraq ID: 55662

8

V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA Authentication Manager Writes Operating System, SNMP, 4: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files June 10, 2013 - 12:47am Addthis PROBLEM: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files PLATFORM: RSA Authentication Manager 8.0 ABSTRACT: A vulnerability was reported in RSA Authentication Manager. REFERENCE LINKS: RSA SecurityTracker Alert ID: 1028638 CVE-2013-0947 IMPACT ASSESSMENT: Medium DISCUSSION: The system may write operating system, SNMP, and HTTP plug-in proxy passwords in clear text to log and configuration files. IMPACT: A local user can obtain operating system, SNMP, and HTTP plug-in proxy

9

U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA Authentication Manager Flaws Permit Cross-Site and 2: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other versions may also be affected. ABSTRACT: RSA Authentication Manager is prone to multiple security vulnerabilities because it fails to properly sanitize user-supplied input. Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be possible.

10

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

704: RSA enVision Lets Remote Users View Files and Remote 704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

11

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA enVision Lets Remote Users View Files and Remote 4: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

12

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: RSA Adaptive Authentication Bugs Let Remote Users Bypass 1: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls December 14, 2011 - 8:17am Addthis PROBLEM: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may be able to bypass certain security controls. reference LINKS: SecurityTracker Alert ID: 1026420 Security Focus: ESA-2011-036 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA Adaptive Authentication (On-Premise). A remote user may be able to bypass certain security controls. A remote user can send specially crafted data elements to affect the Device

13

T-659: Update support for RSA Authentication Manager | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Manager July 1, 2011 - 7:15am Addthis PROBLEM: Authentication Manager SP4 Patch 4 Windows Server 2008 PLATFORM: Windows Server 2008 SP4 Patch 4 32bit & 64bit (architectures)...

14

T-582: RSA systems has resulted in certain information being extracted from  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA systems has resulted in certain information being 2: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID March 17, 2011 - 11:45pm Addthis PROBLEM: Recently EMC's security systems identified an extremely sophisticated cyber attack in progress, targeting their RSA business unit. RSA took a variety of aggressive measures against the threat to protect their business and their customers, including further hardening of their IT infrastructure. PLATFORM: RSA SecurID implementations ABSTRACT: RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

15

T-642: RSA SecurID update to Customers | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA SecurID update to Customers 2: RSA SecurID update to Customers T-642: RSA SecurID update to Customers June 9, 2011 - 12:45am Addthis PROBLEM: Certain characteristics of the attack on RSA indicated that the perpetrator's most likely motive was to obtain an element of security information that could be used to target defense secrets and related IP, rather than financial gain, PII, or public embarrassment. PLATFORM: RSA SecurID implementations ABSTRACT: RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products. reference LINKS: Open Letter to RSA Customers (update) CVE-2011-0322 RSA Fraud Resource Center RSA Security Practice DOE-CIRC T-640: RSA Access Manager Server CVE-2011-0322 Update

16

U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: RSA Key Manager Appliance Session Logout Bug Fails to 7: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions November 4, 2011 - 8:00am Addthis PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated user session may not terminate properly. reference LINKS: SecurityTracker Alert ID: 1026276 SecurityFocus Bug Traq Seclists: ESA-2011-035 CVE-2011-2740 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in RSA Key Manager Appliance. A remote authenticated user session may not terminate properly. When using Firefox 4 and 5, an authenticated user session is not terminated properly when logging out.

17

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: RSA enVision Bugs Permit Cross-Site Scripting, SQL 9: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks March 20, 2012 - 7:00am Addthis PROBLEM: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. Reference LINKS: SecurityTracker Alert ID: 1026819 CVE-2012-0403 IMPACT ASSESSMENT: High Discussion: The system does not properly filter HTML code from user-supplied input

18

Factorization of a 512-bit RSA modulus  

Science Conference Proceedings (OSTI)

This paper reports on the factorization of the 512-bit number RSA-155 by the Number Field Sieve factoring method (NFS) and discusses the implications for RSA.

Stefania Cavallar; Bruce Dodson; Arjen K. Lenstra; Walter Lioen; Peter L. Montgomery; Brian Murphy; Herman Te Riele; Karen Aardal; Jeff Gilchrist; Grard Guillerm; Paul Leyland; Jol Marchand; Franois Morain; Alec Muffett; Chris Putnam; Craig Putnam; Paul Zimmermann

2000-05-01T23:59:59.000Z

19

Using Two-Factor RSA Token  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Two-Factor RSA Token Using Two-Factor RSA Token with VPN User Guide November 2013 Using Your RSA token with WebVPN 1. Establish a connection to the Internet and connect to https://connect.doe.gov 2. Users who are using their RSA Token for the first time should follow the steps below for PIN creation. Others who have already set up their PIN and used their RSA token previously should enter their six digit numeric username and passcode; this is the PIN + the RSA token code. The result of this successful login will be Step 8 below. 3. A login page similar to the picture below will be displayed. Enter your VPN Username (six-digit numeric ID) and your Password by typing your generated RSA Token code and then click the Login button. Example; your generated RSA token code is 032848 (from above). In the Password box, you will enter

20

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: RSA Access Manager Session Replay Flaw Lets Remote Users 5: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

205: RSA Access Manager Session Replay Flaw Lets Remote Users 205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

22

UNIXUNIXUNIXUNIX((((OpenSSHOpenSSHOpenSSHOpenSSH)))) (gw.ps.nifs.ac.jp) RSA  

E-Print Network (OSTI)

pdf SSH SSH SSH UNIXUNIXUNIXUNIX((((OpenSSHOpenSSHOpenSSHOpenSSH)))) ssh (gw.ps.nifsTerm: New connection TCP/IP gw.ps.nifs.ac.jp %ssh (-i ) (-l ) gw.ps.nifs.ac.jp The authenticity of host 'gw.ps.nifs.ps.nifs.ac.jp,133.75.37.11' (RSA) to the list of known hosts. Enter passphrase for key '/home

Ito, Atsushi

23

CRT RSA algorithm protected against fault attacks  

Science Conference Proceedings (OSTI)

Embedded devices performing RSA signatures are subject to Fault Attacks, particularly when the Chinese Remainder Theorem is used. In most cases, the modular exponentiation and the Garner recombination algorithms are targeted. To thwart Fault Attacks, ... Keywords: RSA, chinese remainder theorem, fault attacks, modular exponentiation, simple power analysis, smart card

Arnaud Boscher; Robert Naciri; Emmanuel Prouff

2007-05-01T23:59:59.000Z

24

The RSA Group is Pseudo-Free  

E-Print Network (OSTI)

Rivest, On the notion of pseudo-free groups. In: Theory ofImplicit function theorem over free groups. J. Algebra 290(The RSA Group is Pseudo-Free ? Daniele Micciancio Department

Micciancio, Daniele

2010-01-01T23:59:59.000Z

25

U-090: RSA enVision Discloses Environment Variable Information...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: RSA enVision Discloses Environment Variable Information to Remote Users U-090: RSA enVision Discloses Environment Variable Information to Remote Users January 27, 2012 - 6:00am...

26

Authentication of byte sequences  

SciTech Connect

Algorithms for the authentication of byte sequences are described. The algorithms are designed to authenticate data in the Storage, Retrieval, Analysis, and Display (SRAD) Test Data Archive of the Radiation Effects and Testing Directorate (9100) at Sandia National Laboratories, and may be used in similar situations where authentication of stored data is required. The algorithms use a well-known error detection method called the Cyclic Redundancy Check (CRC). When a byte sequence is authenticated and stored, CRC bytes are generated and attached to the end of the sequence. When the authenticated data is retrieved, the authentication check consists of processing the entire sequence, including the CRC bytes, and checking for a remainder of zero. The error detection properties of the CRC are extensive and result in a reliable authentication of SRAD data.

Stearns, S.D.

1991-06-01T23:59:59.000Z

27

T-640: RSA Access Manager Server CVE-2011-0322 Update | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: RSA Access Manager Server CVE-2011-0322 Update 0: RSA Access Manager Server CVE-2011-0322 Update T-640: RSA Access Manager Server CVE-2011-0322 Update June 7, 2011 - 5:18pm Addthis PROBLEM: ESA-2011-009 (revised): RSA, The Security Division of EMC, announces new fix for potential security vulnerability in RSA Access Manager Server. PLATFORM: RSA Access Manager Server version 5.5.x, 6.0.x, and 6.1.x ABSTRACT: RSA strongly recommends that all customers running RSA Access Manager Server versions 5.5.3, 6.0.4, and 6.1 apply the following updated security hot fixes, which contain the resolution to this issue, at the earliest opportunity. The hot fixes can be downloaded from SecurCare Online or by contacting RSA Security Customer Support. ?Security Hot fix # 5.5.3.174 for RSA Access Manager Server version 5.5.3

28

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site...

29

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

30

U-063: RSA SecurID Software Token for Windows DLL Loading Error...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote...

31

Towards practical anonymous password authentication  

Science Conference Proceedings (OSTI)

The conventional approach for anonymous password authentication incurs O(N) server computation, linear to the total number of users. In ACSAC'09, Yang et al. proposed a new approach for anonymous password authentication, breaking this lower ... Keywords: anonymity, guessing attack, password authentication

Yanjiang Yang; Jianying Zhou; Jun Wen Wong; Feng Bao

2010-12-01T23:59:59.000Z

32

Digital Image Authentication: A Review  

Science Conference Proceedings (OSTI)

Digital image authentication refers to all the techniques performing anti-falsification, digital image copyright protection, or access control. A large number of DIA techniques have been developed to authenticate digital images, including cryptography-based ... Keywords: Data Hiding, Digital Fingerprints, Forensic Science, Image Authentication, Watermarking

Chia-Hung Wei; Yue Li

2011-04-01T23:59:59.000Z

33

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: RSA SecurID Software Token for Windows DLL Loading Error 3: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code December 16, 2011 - 8:00am Addthis PROBLEM: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code. PLATFORM: RSA SecurID Software Token 4.1 for Microsoft Windows ABSTRACT: A remote user can cause the target application to execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026426 ESA-2011-039 Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA SecurID Software Token. A remote user

34

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

63: RSA SecurID Software Token for Windows DLL Loading Error 63: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code December 16, 2011 - 8:00am Addthis PROBLEM: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code. PLATFORM: RSA SecurID Software Token 4.1 for Microsoft Windows ABSTRACT: A remote user can cause the target application to execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026426 ESA-2011-039 Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA SecurID Software Token. A remote user

35

CERTIFICATE OF AUTHENTICITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CERTIFICATE OF AUTHENTICITY CERTIFICATE OF AUTHENTICITY I hereby certify that this transcript constitutes an accurate record of the full Council meeting of the National Coal Council held on November 14,2008 at the Westin Grand Hotel, Washington, D.C. ~ i c h a e l G. Mueller, Chair National Coal Council I NATIONAL COAL COUNCIL 1 FULL COUNCIL MEETING FRIDAY NOVEMBER 14, 2 0 0 8 The Full Council meeting convened at 9 : 0 0 a.m. in the Washington Ballroom of the Westin Grand Hotel, 2 3 5 0 M Street, NW, Washington, DC, Chair Michael G. Mueller presiding. ATTENDEES: MIKE MUELLER, Arneren Energy Fuels & Services Company, Chair RICH EIMER, Dynegy Inc., Vice-Chair ROBERT BECK, National Coal Council, Executive Vice-President SY ALI, Clean Energy Consulting BARB ALTIZER, Eastern Coal Council

36

CHALLENGE MEASUREMENTS FOR AUTHENTICATION  

Science Conference Proceedings (OSTI)

Authentication of systems with an information barrier that protects sensitive information is difficult; in particular, the information barrier can allow a hidden switch to be implemented by the system fabricator and operator. The hidden switch is the operators ability to subvert the measurement system and force it to produce a desired and false result. It is usually discussed in the context of an attribute measurement in which a faked item is presented in place of a real item regulated by an agreement, with the driving motivation being the ability to preserve a stock of valuable items. In simple terms, the hidden switch enables a shell game with assets, and the information barrier protects the switch. This presentation outlines challenge measurements that could be used to detect the implementation of a hidden switch and assist the authentication process.

Pitts, W. Karl

2009-10-07T23:59:59.000Z

37

Byzantine agreement method without authentication  

SciTech Connect

This invention relates to a method for achieving Byzantine agreement without authentication among n 100 communicating processors using event counting and thresholding rather than message exchanges and evaluations.

Reischuk, R.K.

1983-12-01T23:59:59.000Z

38

U-120: RSA SecurID Software Token Converter Unspecified Buffer Overflow  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: RSA SecurID Software Token Converter Unspecified Buffer 0: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability U-120: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability March 8, 2012 - 7:00am Addthis PROBLEM: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability PLATFORM: RSA SecurID Software Token Converter 2.x ABSTRACT: Successful exploitation may allow execution of arbitrary code. reference LINKS: Secunia Advisory SA48297 CVE-2012-0397 IMPACT ASSESSMENT: High Discussion: A vulnerability has been reported in RSA SecurID Software Token Converter, which can be exploited by malicious people to compromise a user's system. Impact: An unspecified error can be exploited to cause a buffer overflow. Solution: Update to version 2.6.1. Addthis Related Articles

39

Requirements for signaling channel authentication  

SciTech Connect

This contribution addresses requirements for ATM signaling channel authentication. Signaling channel authentication is an ATM security service that binds an ATM signaling message to its source. By creating this binding, the message recipient, and even a third party, can confidently verify that the message originated from its claimed source. This provides a useful mechanism to mitigate a number of threats. For example, a denial of service attack which attempts to tear-down an active connection by surreptitiously injecting RELEASE or DROP PARTY messages could be easily thwarted when authenticity assurances are in place for the signaling channel. Signaling channel authentication could also be used to provide the required auditing information for accurate billing which is impervious to repudiation. Finally, depending on the signaling channel authentication mechanism, end-to-end integrity of the message (or at least part of it) can be provided. None of these capabilities exist in the current specifications.

Tarman, T.D.

1995-12-11T23:59:59.000Z

40

V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: EMC RSA Archer GRC Open Redirection Weakness and Security 4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September 4, 2013 - 6:00am Addthis PROBLEM: A weakness and a security issue have been reported in EMC RSA Archer GRC PLATFORM: EMC RSA Archer GRC 5.x ABSTRACT: This fixes multiple vulnerabilities, which can be exploited to bypass certain security restrictions and to conduct spoofing attacks REFERENCE LINKS: Secunia Advisory SA54717 SecurityTracker Alert ID 1028971 EMC Identifier: ESA-2013-057 CVE-2013-3276 CVE-2013-3277 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The application does not properly restrict deactivated users. This can be exploited by deactivated users to login and gain access to otherwise

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

U-090: RSA enVision Discloses Environment Variable Information to Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: RSA enVision Discloses Environment Variable Information to 0: RSA enVision Discloses Environment Variable Information to Remote Users U-090: RSA enVision Discloses Environment Variable Information to Remote Users January 27, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in RSA enVision PLATFORM: Version(s): 4.0 prior to 4.0 SP4 P5, 4.1 prior to 4.1 P3 ABSTRACT: A remote user can view potentially sensitive data on the target system. reference LINKS: CVE-2011-4143 SecurityTracker Alert ID: 1026591 Secunia Advisory IMPACT ASSESSMENT: Medium Discussion: The security issue is caused due to the application disclosing certain environment variables containing web system setup information via the web interface. Further information about this resolution and other fixes can be found in the Release Notes associated with RSA enVision 4.1, Patch 3 and

42

Citrix_2FA_Authentication-September09  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Factor RSA Token with Citrix Workplace Environment (CWE) Revision 1.13 September, 2009 Office of IT Operations (IM-621) United States Department of Energy DOE HQ OCIO Application...

43

V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain 84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks February 5, 2013 - 12:01am Addthis PROBLEM: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks PLATFORM: RSA Archer SmartSuite Framework version 4.x RSA Archer GRC version 5.x ABSTRACT: Several vulnerabilities were reported in RSA Archer eGRC. REFERENCE LINKS: Security Alert: ESA-2013-002 SecurityTracker Alert ID: 1028073 CVE-2012-1064 CVE-2012-2292 CVE-2012-2293 CVE-2012-2294 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can cause arbitrary scripting code to be executed by the target user's browser [CVE-2012-1064]. The code will originate from the

44

U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL  

NLE Websites -- All DOE Office Websites (Extended Search)

259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic 259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: RSA BSAFE SSL-C prior to 2.8.6 ABSTRACT: RSA BSAFE SSL-C Multiple Vulnerabilities reference LINKS: Secunia Advisory SA50601 SecurityTracker Alert ID: 1027514 SecurityTracker Alert ID: 1027513 CVE-2011-3389 CVE-2012-2110 CVE-2012-2131 IMPACT ASSESSMENT: High Discussion: EMC has acknowledged a weakness and a vulnerability in RSA BSAFE, which can

45

Mobile IP Authentication, Authorization, and Accounting Requirements  

Science Conference Proceedings (OSTI)

The Mobile IP and Authentication, Authorization, Accounting (AAA) working groups are currently looking at defining the requirements for Authentication, Authorization, and Accounting. This document contains the requirements which would have to be supported ...

S. Glass; T. Hiller; S. Jacobs; C. Perkins

2000-10-01T23:59:59.000Z

46

Authentication of FPGA bitstreams: why and how  

Science Conference Proceedings (OSTI)

Encryption of volatile FPGA bitstreams provides confidentiality to the design but does not ensure its authenticity. This paper motivates the need for adding authentication to the configuration process by providing application examples where this functionality ...

Saar Drimer

2007-03-01T23:59:59.000Z

47

User Authentication Policy | Argonne Leadership Computing Facility  

NLE Websites -- All DOE Office Websites (Extended Search)

Eureka / Gadzooks Eureka / Gadzooks Policies Pullback Policy ALCF Acknowledgment Policy Account Sponsorship & Retention Policy Accounts Policy Data Policy INCITE Quarterly Report Policy Job Scheduling Policy on BG/P Job Scheduling Policy on BG/Q Refund Policy Software Policy User Authentication Policy Documentation Feedback Please provide feedback to help guide us as we continue to build documentation for our new computing resource. [Feedback Form] User Authentication Policy Users of the Argonne production systems are required to use a CRYPTOCard one time password, multifactor authentication system. This document explains the policies users must follow regarding CRYPTOCard tokens for accessing the Argonne resources. MultiFactor Authentication "Authentication systems are frequently described by the authentication

48

A TESLA-Based Mutual Authentication . . .  

E-Print Network (OSTI)

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against man-in-the-middle attacks. Several solutions have been proposed to establish mutual entity authentication. However, none provide a flaw-free bilateral authentication protocol. In this paper, we show that a recently proposed solution is vulnerable to a "type attack". Then, we propose a novel mutual entity authentication using the TESLA protocol. The proposed solution not only provides secure bilateral authentication, but also decreases the call setup time and the required connection bandwidth. An important feature of the proposed protocol is that it is compatible with the GSM standard.

Ali Fanian; Mehdi Berenjkoub; T. Aaron Gulliver

2009-01-01T23:59:59.000Z

49

Quantum Key Distribution Protocol with User Authentication  

E-Print Network (OSTI)

We propose a quantum key distribution protocol with quantum based user authentication. User authentication is executed by validating the correlation of GHZ states. Alice and Bob can distribute a secure key using the remaining GHZ states after authentication. This secret key does not leak even to the arbitrator by the properties of the entanglement. We will show that our protocol is secure against the cloning attack.

Lee, H; Lee, D; Lim, J; Yang, H J; Lee, Hwayean; Lee, Sangjin; Lee, Donghoon; Lim, Jongin; Yang, HyungJin

2005-01-01T23:59:59.000Z

50

Obfuscated authentication systems, devices, and methods  

SciTech Connect

Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

Armstrong, Robert C; Hutchinson, Robert L

2013-10-22T23:59:59.000Z

51

NIST Special Publication Expands Government Authentication ...  

Science Conference Proceedings (OSTI)

... The Office of Management and Budget's guidance, E-Authentication Guidance for Federal Agencies [OMB 04-04] can be found at www ...

2011-12-20T23:59:59.000Z

52

Secure Symmetric Authentication for RFID Tags  

E-Print Network (OSTI)

cryptographically secure authentication. Starting with a short introduction into common RFID systems with passive tags, we present a motivation why secure authentication with standardized symmetric crypto algorithms for RFID tags is necessary for many applications. We demonstrate vulnerabilities of current RFID systems and explain how application of an authentication mechanism can solve them. Furthermore we explain how authentication protocols work and how they can be included in the RFID protocol standard ISO 18000. By presenting the interim results of ART, we will show that the proposed enhancement is feasible with current RIFD infrastructure and silicon technology used for RFID tags.

Manfred Aigner; Martin Feldhofer

2005-01-01T23:59:59.000Z

53

Modeling and implementing an agent-based system for prediction of protein relative solvent accessibility  

Science Conference Proceedings (OSTI)

In this paper, an agent-based system for prediction of relative solvent accessibility (RSA) of proteins is proposed. Since, it is believed that the 3D-structure of most proteins is defined by their sequences, utilizing data mining methods to extract ... Keywords: Data mining, Feature selection methods, Intelligent agents, Physicochemical properties of amino acids

Alireza Meshkin; Nasser Ghasem Aghaee; Mehdi Sadeghi

2011-05-01T23:59:59.000Z

54

Context-based authentication and transport of cultural assets  

Science Conference Proceedings (OSTI)

We present a ubiquitous system that combines context information, security mechanisms and a transport infrastructure to provide authentication and secure transport of works of art. Authentication is provided for both auctions and exhibitions, where users ... Keywords: Authentication, Ubiquitous systems

Leonardo Mostarda; Changyu Dong; Naranker Dulay

2010-05-01T23:59:59.000Z

55

T-608: HP Virtual Server Environment Lets Remote Authenticated...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated...

56

Instructions for using HSPD-12 Authenticated Outlook Web Access...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook access using...

57

Verifying authentication protocols with CSP Steve Schneider  

E-Print Network (OSTI)

Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

Doran, Simon J.

58

Back-of-device authentication on smartphones  

Science Conference Proceedings (OSTI)

This paper presents BoD Shapes, a novel authentication method for smartphones that uses the back of the device for input. We argue that this increases the resistance to shoulder surfing while remaining reasonably fast and easy-to-use. We performed ... Keywords: authentication, back of device interaction, security

Alexander De Luca; Emanuel von Zezschwitz; Ngo Dieu Huong Nguyen; Max-Emanuel Maurer; Elisa Rubegni; Marcello Paolo Scipioni; Marc Langheinrich

2013-04-01T23:59:59.000Z

59

On selecting Gabor features for biometric authentication  

Science Conference Proceedings (OSTI)

We describe a Gabor feature selection technique that allows us to develop a fast and robust Gabor-feature based biometric system. Existing Gabor based methods use a huge number of Gabor features to represent the patterns. Our experiments on different ... Keywords: Gabor features, automated identification, biometrics, ear authentication, equal error rate, feature selection, finger authentication

Loris Nanni; Alessandra Lumini

2009-04-01T23:59:59.000Z

60

Group-Based Authentication and Key Agreement  

Science Conference Proceedings (OSTI)

This paper presents an authentication and key agreement protocol to streamline communication activities for a group of mobile stations (MSs) roaming from the same home network (HN) to a serving network (SN). In such a roaming scenario, conventional schemes ... Keywords: Authentication and key agreement, Group key, Roaming, Security, Wireless network

Yu-Wen Chen; Jui-Tang Wang; Kuang-Hui Chi; Chien-Chao Tseng

2012-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

A class of authentication codes with secrecy  

Science Conference Proceedings (OSTI)

We study a class of authentication codes with secrecy. We determine the maximum success probabilities of the impersonation and the substitution attacks on these codes and the level of secrecy. Therefore we give an answer to an open problem stated in ... Keywords: 14G50, 94A60, 94A62, Algebraic function fields, Authentication codes with secrecy, Linearized polynomial

Elif Kurtaran zbudak; Ferruh zbudak; Zlfkar Sayg?

2011-04-01T23:59:59.000Z

62

Plugging a Scalable Authentication Framework into Shibboleth  

Science Conference Proceedings (OSTI)

In a VO (virtual organisation) environment where services are provided and shared by dissimilar organisations from different administrative domains and are protected with dissimilar security policies and measures, there is a need for a flexible authentication ... Keywords: Grid authentication, security architecture, smart tokens.

N. Zhang; L. Yao; J. Chin; A. Nenadic; A. McNab; A. Rector; C. Goble; Q. Shi

2005-06-01T23:59:59.000Z

63

Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1  

Science Conference Proceedings (OSTI)

This memo represents a republication of PKCS #1 v2.1 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document is taken directly from the PKCS #1 v2.1 document, ...

J. Jonsson; B. Kaliski

2003-02-01T23:59:59.000Z

64

A secure and efficient strong-password authentication protocol  

Science Conference Proceedings (OSTI)

Password authentication protocols are divided into two types. One employs the easy-to-remember password while the other requires the strong password. In 2001, Lin et al. proposed an optimal strong-password authentication protocol (OSPA) to resist the ... Keywords: denial-of-service attack, mutual authentication, password authentication, smart card, stolen-verifier attack, strong password

Ya-Fen Chang; Chin-Chen Chang

2004-07-01T23:59:59.000Z

65

A simple threshold authenticated key exchange from short secrets  

Science Conference Proceedings (OSTI)

This paper brings the password-based authenticated key exchange (PAKE) problem closer to practice. It takes into account the presence of firewalls when clients communicate with authentication servers. An authentication server can indeed be seen as two ... Keywords: password-based authentication, threshold protocols

Michel Abdalla; Olivier Chevassut; Pierre-Alain Fouque; David Pointcheval

2005-12-01T23:59:59.000Z

66

Password based key exchange with mutual authentication  

Science Conference Proceedings (OSTI)

A reasonably efficient password based key exchange (KE) protocol with provable security without random oracle was recently proposed by Katz, et al. [17] and later by Gennaro and Lindell [13]. However, these protocols do not support mutual authentication ...

Shaoquan Jiang; Guang Gong

2004-08-01T23:59:59.000Z

67

Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes  

DOE Patents (OSTI)

Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

Kent, Alexander Dale (Los Alamos, NM)

2008-09-02T23:59:59.000Z

68

T-646: Debian fex authentication bypass | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Debian fex authentication bypass 6: Debian fex authentication bypass T-646: Debian fex authentication bypass June 14, 2011 - 3:45pm Addthis PROBLEM: The vulnerability is caused due to the application not properly verifying the existence of "auth-ID" when uploading files and can be exploited to bypass the authentication mechanism. PLATFORM: Debian fex ABSTRACT: Debian security discovered that fex, a web service for transferring very large, files, is not properly validating authentication IDs. While the service properly validates existing authentication IDs, an attacker who is not specifying any authentication ID at all, can bypass the authentication procedure. reference LINKS: DSA-2259-1 fex Secunia Advisory SA44940 Debian Security Advisory DSA-2259-1 fex-20110610.tar Vulnerability Report: Debian GNU/Linux 6.0

69

Kerberos authentication: The security answer for unsecured networks  

Science Conference Proceedings (OSTI)

Traditional authentication schemes do not properly address the problems encountered with today`s unsecured networks. Kerbmm developed by MIT, on the other hand is designed to operate in an open unsecured network, yet provide good authentication and security including encrypted session traffic. Basic Kerberos principles as well as experiences of the ESnet Authentication Pilot Project with Cross Realm. Authentication between four National Laboratories will also be described.

Engert, D.E.

1995-06-01T23:59:59.000Z

70

Using Rose and Compass for Authentication  

Science Conference Proceedings (OSTI)

Many recent non-proliferation software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project. ROSE is an LLNL-developed robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. It continues to be extended to support the automated analysis of binaries (x86, ARM, and PowerPC). We continue to extend ROSE to address a number of security specific requirements and apply it to software authentication for non-proliferation projects. We will give an update on the status of our work.

White, G

2009-07-09T23:59:59.000Z

71

System and method for authentication of goods  

SciTech Connect

An authentication system comprising a medium having a plurality of elements, the elements being distinctive, detectable and disposed in an irregular pattern or having an intrinsic irregularity. Each element is characterized by a determinable attribute distinct from a two-dimensional coordinate representation of simple optical absorption or simple optical reflection intensity. An attribute and position of the plurality of elements, with respect to a positional reference is detected. A processor generates an encrypted message including at least a portion of the attribute and position of the plurality of elements. The encrypted message is recorded in physical association with the medium. The elements are preferably dichroic fibers, and the attribute is preferably a polarization or dichroic axis, which may vary over the length of a fiber. An authentication of the medium based on the encrypted message may be authenticated with a statistical tolerance, based on a vector mapping of the elements of the medium, without requiring a complete image of the medium and elements to be recorded.

Kaish, Norman (West Hampstead, NY); Fraser, Jay (Freeport, NY); Durst, David I. (Syosset, NY)

1999-01-01T23:59:59.000Z

72

System and method for authentication of goods  

SciTech Connect

An authentication system comprising a medium having a plurality of elements, the elements being distinctive, detectable and disposed in an irregular pattern or having an intrinsic irregularity is disclosed. Each element is characterized by a determinable attribute distinct from a two-dimensional coordinate representation of simple optical absorption or simple optical reflection intensity. An attribute and position of the plurality of elements, with respect to a positional reference is detected. A processor generates an encrypted message including at least a portion of the attribute and position of the plurality of elements. The encrypted message is recorded in physical association with the medium. The elements are preferably dichroic fibers, and the attribute is preferably a polarization or dichroic axis, which may vary over the length of a fiber. An authentication of the medium based on the encrypted message may be authenticated with a statistical tolerance, based on a vector mapping of the elements of the medium, without requiring a complete image of the medium and elements to be recorded.

Kaish, N.; Fraser, J.; Durst, D.I.

1999-10-26T23:59:59.000Z

73

V-231: Cisco Identity Services Engine Discloses Authentication Credentials  

NLE Websites -- All DOE Office Websites (Extended Search)

1: Cisco Identity Services Engine Discloses Authentication 1: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users August 30, 2013 - 3:01am Addthis PROBLEM: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials. PLATFORM: Cisco Identity Services Engine (ISE) 1.x ABSTRACT: A vulnerability was reported in Cisco Identity Services Engine REFERENCE LINKS: SecurityTracker Alert ID: 1028965 CVE-2013-3471 IMPACT ASSESSMENT: Meduim DISCUSSION: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials.The system stores the username and password of an authenticated user within hidden HTML form fields. A

74

Amateur Anthropologists: DIY Tourism as Learning Culture and Accessing Authenticity  

E-Print Network (OSTI)

Paula. A. Tourists as Pilgrims: Commercial Fashioning of1983:20). Considering tourists as pilgrims of sacralization,is a kind of contemporary pilgrim, seeking authenticity in

Nishijima, Ryoko

2012-01-01T23:59:59.000Z

75

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges. IMPACT: A remote authenticated user can...

76

U-268: Oracle Database Authentication Protocol Discloses Session...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Bug Lets Remote Authenticated Users Gain Elevated Privileges V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code T-535: Oracle Critical Patch Update -...

77

Multi-Level TESLA: Broadcast Authentication for Distributed Sensor Networks  

E-Print Network (OSTI)

Multi-Level µTESLA: Broadcast Authentication for Distributed Sensor Networks DONGGANG LIU and PENG named multi-level µTESLA based on µTESLA, a broadcast authentication protocol whose scalability is limited by its unicast-based initial parameter distribution. Multi-level µTESLA satisfies several nice

Ning, Peng

78

A framework for password-based authenticated key exchange1  

Science Conference Proceedings (OSTI)

In this paper, we present a general framework for password-based authenticated key exchange protocols, in the common reference string model. Our protocol is actually an abstraction of the key exchange protocol of Katz et al. and is based on the recently ... Keywords: Passwords, authentication, dictionary attack, projective hash functions

Rosario Gennaro; Yehuda Lindell

2006-05-01T23:59:59.000Z

79

Mutual Authentication for Low-Power Mobile Devices  

Science Conference Proceedings (OSTI)

We propose methods for mutual authentication and key exchange. Our methods are well suited for applications with strict power consumption restrictions, such as wireless medical implants and contactless smart cards. We prove the security of our schemes ... Keywords: gap problem, low power, medical informatics, mutual authentication

Markus Jakobsson; David Pointcheval

2002-02-01T23:59:59.000Z

80

Robust secret key based authentication scheme using smart cards  

Science Conference Proceedings (OSTI)

User authentication is an important part of security, along with confidentiality and integrity, for systems that allow remote access over untrustworthy networks, like the Internet. Recently, Chen et al. proposed an improvement on the SAS-like password ... Keywords: authentication, cryptography, secret key, smart card

Eun-Jun Yoon; Kee-Young Yoo

2005-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

An improved anonymous authentication and key exchange scheme  

Science Conference Proceedings (OSTI)

Nowadays, anonymity property of user authentication scheme becomes important. In 2003, Park et al. proposed an authentication and key exchange scheme using smart card. However, Juang et al. pointed out that Park et al.'s scheme did not provide the user ...

Kyung-kug Kim; Myung-Hwan Kim

2012-09-01T23:59:59.000Z

82

Challenges and architectural approaches for authenticating mobile users  

Science Conference Proceedings (OSTI)

This paper casts an architectural eye at existing work on security and privacy in mobile computing. Specifically, it focuses on authentication as it leads up to access control from two points of view: servicer providers granting access to users, and ... Keywords: access control, anonymity, authentication, mobile computing, trust, ubiquitous computing, user mobility

Joo Pedro Sousa

2008-05-01T23:59:59.000Z

83

On Automatic Authenticity Verification of Printed Security Documents  

Science Conference Proceedings (OSTI)

This paper presents a pioneering effort to involve machine in checking document authenticity. A particular class of security documents has been considered for the present experiment. Bank cheques, several kinds of tickets like lottery tickets, air tickets, ... Keywords: authenticity verification, security document, forensic document examination, bank cheques

Utpal Garain; Biswajit Halder

2008-12-01T23:59:59.000Z

84

RFID authentication protocol for low-cost tags  

Science Conference Proceedings (OSTI)

In this paper, we investigate the possible privacy and security threats to RFID systems, and consider whether previously proposed RFID protocols address these threats. We then propose a new authentication protocol which provides the identified privacy ... Keywords: privacy, rfid authentication protocol, security

Boyeon Song; Chris J. Mitchell

2008-03-01T23:59:59.000Z

85

Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Factor Factor RSA Tokens with Citrix Workplace Environment (CWE) Revision 1.13 December, 2009 Associate CIO for Operations (IM) United States Department of Energy DOE HQ OCIO Application Hosting Environment Instructions for Using RSA Token with Citrix Workplace Environment Using Your RSA Token with Citrix Note: If you access Citrix Workplace from within the DOE network (DOEnet or VPN) then you do not need an RSA Two-Factor token. The Citrix Workplace logon screen will prompt you only for your Windows User name and Password. Step 1 - Establish a connection to the Internet and connect to https://workplace.doe.gov. Step 2 - Click "OK" to bypass the Government warning banner. DOE HQ OCIO Application Hosting Environment Instructions for Using RSA Token with Citrix Workplace Environment

86

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

87

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

88

Hardware authentication using transmission spectra modified optical fiber.  

SciTech Connect

The ability to authenticate the source and integrity of data is critical to the monitoring and inspection of special nuclear materials, including hardware related to weapons production. Current methods rely on electronic encryption/authentication codes housed in monitoring devices. This always invites the question of implementation and protection of authentication information in an electronic component necessitating EMI shielding, possibly an on board power source to maintain the information in memory. By using atomic layer deposition techniques (ALD) on photonic band gap (PBG) optical fibers we will explore the potential to randomly manipulate the output spectrum and intensity of an input light source. This randomization could produce unique signatures authenticating devices with the potential to authenticate data. An external light source projected through the fiber with a spectrometer at the exit would 'read' the unique signature. No internal power or computational resources would be required.

Grubbs, Robert K.; Romero, Juan A.

2010-09-01T23:59:59.000Z

89

Agent Tcl  

E-Print Network (OSTI)

Agent Tcl is a simple itinerant-agent system that runs on Unix workstations and allows the rapid development of complex agents [Gra95, Gra96]. Although Agent Tcl currently lacks the features of commercial systems such asTelescript [Whi94], it is an e ective platform for experimentation with itinerant agents and for the development of small to medium-sized applications. Agent Tcl agents

Robert Gray; George Cybenko; David Kotz; Daniela Rus

1996-01-01T23:59:59.000Z

90

A location based security framework for authenticating mobile phones  

Science Conference Proceedings (OSTI)

Although the utilisation of location information in mobile network access systems has given rise to a variety of applications and services, it is thought that the underlying service authentication model and the related security can be further enhanced. ...

Lishoy Francis; Keith Mayes; Gerhard Hancke; Konstantinos Markantonakis

2010-11-01T23:59:59.000Z

91

Bootstrapping Timed Efficient Stream Loss-Tolerant Authentication (TESLA)  

E-Print Network (OSTI)

This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards " (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2006). TESLA, the Timed Efficient Stream Loss-tolerant Authentication protocol, provides source authentication in multicast scenarios. TESLA is an efficient protocol with low communication and computation overhead that scales to large numbers of receivers and also tolerates packet loss. TESLA is based on loose time synchronization between the sender and the receivers. Source authentication is realized in TESLA by using Message Authentication Code (MAC) chaining. The use

Request Comments; H. Tschofenig; Status Of This Memo

2006-01-01T23:59:59.000Z

92

V-220: Juniper Security Threat Response Manager Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Juniper Security Threat Response Manager Lets Remote 0: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands August 17, 2013 - 4:01am Addthis PROBLEM: A remote authenticated user can execute arbitrary commands on the target system. PLATFORM: 2010.0, 2012.0, 2012.1, 2013.1 ABSTRACT: A vulnerability was reported in Juniper Security Threat Response Manager (STRM) REFERENCE LINKS: SecurityTracker Alert ID: 1028921 CVE-2013-2970 IMPACT ASSESSMENT: High DISCUSSION: A remote authenticated user can inject commands to execute arbitrary operating system commands with the privileges of the target web service. This can be exploited to gain shell access on the target device.

93

V-036: EMC Smarts Network Configuration Manager Database Authentication  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: EMC Smarts Network Configuration Manager Database 6: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability November 29, 2012 - 3:30am Addthis PROBLEM: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability PLATFORM: EMC Smarts Network Configuration Manager (NCM) all versions prior 9.1 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: EMC Identifier: ESA-2012-057 Secunia Advisory SA51408 SecurityTracker Alert ID: 1027812 CVE-2012-4614 CVE-2012-4615 IMPACT ASSESSMENT: Medium DISCUSSION: The systems uses a hard-coded key to encrypt authentication credentials on the target system [CVE-2012-4615]. A local user with knowledge of the key

94

Efficient password-based authenticated key exchange without public information  

Science Conference Proceedings (OSTI)

Since the first password-based authenticated key exchange (PAKE) was proposed, it has enjoyed a considerable amount of interest from the cryptographic research community. To our best knowledge, most of proposed PAKEs based on Diffie-Hellman key exchange ...

Jun Shao; Zhenfu Cao; Licheng Wang; Rongxing Lu

2007-09-01T23:59:59.000Z

95

U-130: JBoss Operations Network LDAP Authentication Bug Lets...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based...

96

T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

not checked realm values were not checked the server secret was hard-coded to a known string The result of these weaknesses is that DIGEST authentication was only as secure as...

97

@Yuan Xue (yuan.xue@vanderbilt.edu) Authentication Protocol  

E-Print Network (OSTI)

. If A trusts B and B is hacked, then the attacker could gain access to A. Network address impersonation (address spoofing) Ingress filtering #12;@Yuan Xue (yuan.xue@vanderbilt.edu) Cryptographic Authentication

Cui, Yi

98

Analog Video Authentication and Seal Verification Equipment Development  

SciTech Connect

Under contract to the US Department of Energy in support of arms control treaty verification activities, the Savannah River National Laboratory in conjunction with the Pacific Northwest National Laboratory, the Idaho National Laboratory and Milagro Consulting, LLC developed equipment for use within a chain of custody regime. This paper discussed two specific devices, the Authentication Through the Lens (ATL) analog video authentication system and a photographic multi-seal reader. Both of these devices have been demonstrated in a field trial, and the experience gained throughout will also be discussed. Typically, cryptographic methods are used to prove the authenticity of digital images and video used in arms control chain of custody applications. However, in some applications analog cameras are used. Since cryptographic authentication methods will not work on analog video streams, a simple method of authenticating analog video was developed and tested. A photographic multi-seal reader was developed to image different types of visual unique identifiers for use in chain of custody and authentication activities. This seal reader is unique in its ability to image various types of seals including the Cobra Seal, Reflective Particle Tags, and adhesive seals. Flicker comparison is used to compare before and after images collected with the seal reader in order to detect tampering and verify the integrity of the seal.

Gregory Lancaster

2012-09-01T23:59:59.000Z

99

VOLTTRON: An Agent Execution Platform for the Electric Power System  

Science Conference Proceedings (OSTI)

Volttron is an agent execution platform that is engineered for use in the electric power system. Volttron provides resource guarantees for agents and the platform including memory and processor utilization; authentication and authorization services; directory services for agent and resource location; and agent mobility. Unlike most other agent platforms, Volttron does not depend on a single agent authoring language. Instead, we chose to design and implement Volttron as a platform service and framework that is decoupled from the agent execution environment. A prototype implementation of Volttron has been written in Python (using Python v2.7.2) and we have executed agents written in Python and Java and as shell scripts. The intended use of Volttron is in the power distribution system for managing distributed generation, demand-response, and plug-in electric vehicles.

Akyol, Bora A.; Haack, Jereme N.; Ciraci, Selim; Carpenter, Brandon J.; Vlachopoulou, Maria; Tews, Cody W.

2012-06-05T23:59:59.000Z

100

Ultra-wideband Location Authentication for Item Tracking  

SciTech Connect

International safeguards is increasingly utilizing unattended and remote monitoring methods to improve inspector efficiency and the timeliness of diversion detection. Item identification and tracking has been proposed as one unattended remote monitoring method, and a number of radio-frequency (RF) technologies have been proposed. When utilizing location information for verification purposes, strong assurance of the authenticity of the reported location is required, but most commercial RF systems are vulnerable to a variety of spoofing and relay attacks. ORNL has developed a distance bounding method that uses ultra-wideband technology to provide strong assurance of item location. This distance bounding approach can be coupled with strong symmetric key authentication methods to provide a fully authenticable tracking system that is resistant to both spoofing and relay attacks. This paper will discuss the overall problems associated with RF tracking including the common spoofing and relay attack scenarios, the ORNL distance bounding approach for authenticating location, and the potential applications for this technology.

Rowe, Nathan C [ORNL; Kuhn, Michael J [ORNL; Stinson, Brad J [ORNL; Holland, Stephen A [ORNL

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding author)  

E-Print Network (OSTI)

1 Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding in the process algebra Communicating Sequential Processes (CSP) to specify authentication. The purpose, security protocols, CSP, formal specification, Kerberos 1. Introduction Schneider [1] uses Communicating

Doran, Simon J.

102

U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: JBoss Operations Network LDAP Authentication Bug Lets Remote 0: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication March 21, 2012 - 7:00am Addthis PROBLEM: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication PLATFORM: JBoss Operations Network 2.x ABSTRACT: A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases. reference LINKS: SecurityTracker Alert ID: 1026826 Secunia Advisory SA48471 CVE-2012-1100 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based

103

Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card  

Science Conference Proceedings (OSTI)

Zero-knowledge authentication protocols are an alternative to authentication protocols based on public key cryptography. Low processing and memory consumption make them especially suitable for implementation in smart card microprocessors, which are severely ...

Kenan Kalajdzic; Ahmed Patel; Laleh Golafshan; Mona Taghavi

2011-07-01T23:59:59.000Z

104

Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis  

E-Print Network (OSTI)

Authentication schemes relying on per-packet signature and per-signature verification introduce heavy cost for computation and communication. Due to its constraint resources, smart grid's authentication requirement cannot ...

Li, Depeng

105

Current Projects: Product Authenticity Tags - Vulnerability Assessment Team  

NLE Websites -- All DOE Office Websites (Extended Search)

Product Authenticity Tags Product Authenticity Tags VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast µProcessor Shop Insanely Fast µProcessor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms Argonne's VAT (brochure)

106

Secure Access Control Through Challenge and Response Authentication  

E-Print Network (OSTI)

compares various types of key technology (mechanical, magnetic, contact, RFID), and evaluates these keys for their strengths and weaknesses. Keys with challenge and response authentication overcome the limitations of the traditional static data keys. The challenge and response concept is discussed; suitable keys are presented and compared. The document concludes with an explanation of why challenge and response authentication is more secure than concepts that rely on static data. A version of this app note was published by Embedded.com on March 15, 2011.

unknown authors

2011-01-01T23:59:59.000Z

107

Authentication and protection for e-finance consumers: the dichotomy of cost versus ease of use  

Science Conference Proceedings (OSTI)

Multifactor authentication is a tool to combat identity theft and is mandated by the Federal Financial Institutions Examination Council. However, there are only a few US financial institutions that have implemented two-factor authentication. A goal for ... Keywords: biometrics, e-banking, e-finance, electronic banking, electronic finance, identity theft, internet, multifactor authentication, online ID theft, online banking, phishing, security token, web authentication

Seungjae Shin; Jerry Cunningham; Jungwoo Ryoo; Jack E. Tucci

2009-03-01T23:59:59.000Z

108

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network (OSTI)

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol of receivers, and tolerates packet loss. TESLA is based on loose time synchronization between the sender

Tygar, Doug

109

Improvement on Pretty-Simple Password Authenticated Key-Exchange Protocol for Wireless Networks  

Science Conference Proceedings (OSTI)

This paper presents an improved method inspired by the recently proposed Pretty-Simple PAKE (Password Authenticated Key-Exchange) protocol, which is already a well-known, robust and simple password authenticated key exchange scheme. In our even more ... Keywords: elliptic curve discrete logarithm, key exchange, password authentication, wireless network

Ting-Yi Chang; Chou-Chen Yang; Chia-Meng Chen

2004-04-01T23:59:59.000Z

110

Mobile one-time passwords: two-factor authentication using mobile phones  

Science Conference Proceedings (OSTI)

Static password authentication has security drawbacks. In two-factor authentication (2FA,) each user carries a device, called token, to generate passwords that are valid only one time. 2FA based on one-time passwords (OTPs) provides improved protection ... Keywords: nested hashing chain, one-time password, two-factor authentication

Mohamed Hamdy Eldefrawy; Muhammad Khurram Khan; Khaled Alghathbar; Tai-Hoon Kim; Hassan Elkamchouchi

2012-05-01T23:59:59.000Z

111

Comparative study of multicast authentication schemes with application to wide-area measurement system  

Science Conference Proceedings (OSTI)

Multicasting refers to the transmission of a message to multiple receivers at the same time. To enable authentication of sporadic multicast messages, a conventional digital signature scheme is appropriate. To enable authentication of a multicast data ... Keywords: multicast authentication, multiple-time signature scheme, smart grid, wide-area measurement system

Yee Wei Law, Zheng Gong, Tie Luo, Slaven Marusic, Marimuthu Palaniswami

2013-05-01T23:59:59.000Z

112

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

RSA SecurID User Guide VPN Home What is RSA SecurID? RSA SecurID two-factor authentication is based on something you know (a password or PIN) and something you have (an...

113

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network (OSTI)

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Doran, Simon J.

114

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network (OSTI)

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

Dutertre, Bruno

115

Secure RFID authentication scheme for EPC class Gen2  

Science Conference Proceedings (OSTI)

Recently, much research has been actively conducted for a new kind of network environment ubiquitous computing. This paper will define the essential technology called "ad hoc network" and the "RFID technology" required by a ubiquitous environment. Therefore, ... Keywords: RFID, authentication, security

Dae-Hee Seo; Jang-Mi Baek; Dong-sub Cho

2009-02-01T23:59:59.000Z

116

Undercover: authentication usable in front of prying eyes  

Science Conference Proceedings (OSTI)

A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the design, implementation, and evaluation of a novel class of user authentication ... Keywords: multisensory processes, security, usability

Hirokazu Sasamoto; Nicolas Christin; Eiji Hayashi

2008-04-01T23:59:59.000Z

117

Mobile token-based authentication on a budget  

Science Conference Proceedings (OSTI)

We propose a light-weight, cheap authentication device for unlocking a user's smartphone. The device can be carried on a key chain and automatically unlocks the smartphone whenever its owner wants to use it. Our goal is to build a device that works with ...

Hristo Bojinov; Dan Boneh

2011-03-01T23:59:59.000Z

118

Security problems with a chaos-based deniable authentication scheme  

E-Print Network (OSTI)

Recently, a new scheme was proposed for deniable authentication. Its main originality lied on applying a chaos-based encryption-hash parallel algorithm and the semi-group property of the Chebyshev chaotic map. Although original and practicable, its insecurity and inefficiency are shown in this paper, thus rendering it inadequate for adoption in e-commerce.

G. Alvarez

2004-12-09T23:59:59.000Z

119

Hardware device to physical structure binding and authentication  

Science Conference Proceedings (OSTI)

Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

2013-08-20T23:59:59.000Z

120

Defining the questions: a research agenda for nontraditional authentication in arms control  

Science Conference Proceedings (OSTI)

Many traditional authentication techniques have been based on hardware solutions. Thus authentication of measurement system hardware has been considered in terms of physical inspection and destructive analysis. Software authentication has implied hash function analysis or authentication tools such as Rose. Continuity of knowledge is maintained through TIDs and cameras. Although there is ongoing progress improving all of these authentication methods, there has been little discussion of the human factors involved in authentication. Issues of non-traditional authentication include sleight-of-hand substitutions, monitor perception vs. reality, and visual diversions. Since monitor confidence in a measurement system depends on the product of their confidences in each authentication element, it is important to investigate all authentication techniques, including the human factors. This paper will present an initial effort to identify the most important problems that traditional authentication approaches in safeguards have not addressed and are especially relevant to arms control verification. This will include a survey of the literature and direct engagement with nontraditional experts in areas like psychology and human factors. Based on the identification of problem areas, potential research areas will be identified and a possible research agenda will be developed.

Hauck, Danielle K [Los Alamos National Laboratory; Mac Arthur, Duncan W [Los Alamos National Laboratory; Smith, Morag K [Los Alamos National Laboratory; Thron, Jonathan L [Los Alamos National Laboratory; Budlong - Sylvester, Kory [Los Alamos National Laboratory

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Authenticated group Diffie-Hellman key exchange: theory and practice  

SciTech Connect

Authenticated two-party Diffie-Hellman key exchange allows two principals A and B, communicating over a public network, and each holding a pair of matching public/private keys to agree on a session key. Protocols designed to deal with this problem ensure A (B resp.)that no other principals aside from B (A resp.) can learn any information about this value. These protocols additionally often ensure A and B that their respective partner has actually computed the shared secret value. A natural extension to the above cryptographic protocol problem is to consider a pool of principals agreeing on a session key. Over the years several papers have extended the two-party Diffie-Hellman key exchange to the multi-party setting but no formal treatments were carried out till recently. In light of recent developments in the formalization of the authenticated two-party Diffie-Hellman key exchange we have in this thesis laid out the authenticated group Diffie-Hellman key exchange on firmer foundations.

Chevassut, Olivier

2002-10-03T23:59:59.000Z

122

V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-057: eXtplorer "ext_find_user()" Authentication Bypass V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis December 28 2012 - 6:00am PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA51636 eXtplorer 2.1.3 Security Release IMPACT ASSESSMENT: Medium DISCUSSION: eXtplorer was notified of a problem within the authentication system of eXtplorer Versions 2.1.2, 2.1.1, 2.1.0 and 2.1.0RC5 that have been found to be vulnerable to an authentication bypass bug.

123

U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apache CXF Lets Remote Authenticated Users Execute 6: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions September 24, 2012 - 6:00am Addthis PROBLEM: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions PLATFORM: This vulnerability affects all released versions of Apache CXF. ABSTRACT: A vulnerability was reported in Apache CXF reference LINKS: SecurityTracker Alert ID: 1027554 Apache CXF Security Advisories Apache CXF Advisory - CVE-2012-3451 CVE-2012-3451 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache CXF. A remote authenticated user can execute unauthorized commands on the target web service. Impact: A remote authenticated user can execute potentially unauthorized actions on

124

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated 2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates February 28, 2012 - 8:45am Addthis PROBLEM: A vulnerability was reported in PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY DEFINER, a remote authenticated user can execute a trigger function and gain elevated privileges CVE-2012-0866.

125

U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apache CXF Lets Remote Authenticated Users Execute 6: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions September 24, 2012 - 6:00am Addthis PROBLEM: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions PLATFORM: This vulnerability affects all released versions of Apache CXF. ABSTRACT: A vulnerability was reported in Apache CXF reference LINKS: SecurityTracker Alert ID: 1027554 Apache CXF Security Advisories Apache CXF Advisory - CVE-2012-3451 CVE-2012-3451 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache CXF. A remote authenticated user can execute unauthorized commands on the target web service. Impact: A remote authenticated user can execute potentially unauthorized actions on

126

V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct 5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks May 14, 2013 - 12:08am Addthis PROBLEM: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks PLATFORM: Tomcat 6.0.21 to 6.0.36, 7.0.0 to 7.0.32 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat SecurityTracker Alert ID: 1028534 CVE-2013-2067 IMPACT ASSESSMENT: High DISCUSSION: A remote user can repeatedly send a specially crafted request for a resource requiring authentication while the target user is completing the login form to cause the FORM authentication process to execute the remote user's request with the privileges of the target user.

127

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the target system. A remote authenticated user can execute SQL commands on the underlying database. A remote user can spoof connections in certain cases. Solution: The vendor has...

128

Counterfeit-resistant materials and a method and apparatus for authenticating materials  

DOE Patents (OSTI)

Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters, the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided&

Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

2001-01-01T23:59:59.000Z

129

Counterfeit-resistant materials and a method and apparatus for authenticating materials  

DOE Patents (OSTI)

Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

2000-01-01T23:59:59.000Z

130

Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party Key Agreement Protocols  

E-Print Network (OSTI)

Recently, Al-Riyami and Paterson [1] proposed four authenticated tripartite key agreement protocols which make use of Weil pairing. In this paper, we show...

Kyungah Shim

2003-01-01T23:59:59.000Z

131

V-236: MediaWiki CentralAuth Extension Authentication Bypass...  

NLE Websites -- All DOE Office Websites (Extended Search)

IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an error when handling auto-logins and can be exploited to bypass the authentication mechanism by...

132

Leveraging Personal Devices for Stronger Password Authentication from Untrusted Computers  

E-Print Network (OSTI)

Internet authentication for popular end-user transactions, such as online banking and e-commerce, continues to be dominated by passwords entered through end-user personal computers (PCs). Most users continue to prefer (typically untrusted) PCs over smaller personal devices for actual transactions, due to usability features related to keyboard and screen size. However most such transactions and their existing underlying protocols are vulnerable to attacks including keylogging, phishing, and pharming, which can extract user identity and sensitive account information allowing account access. We propose a simple approach to counter such attacks, which cryptographically separates a users long-term secret input (typically low-entropy password) from the client PC. The latter continues to be used for most of the interaction and computations but has access only to temporary secrets, while the users long-term secret is input through an independent personal trusted device such as a cellphone which makes it available to the PC only after encryption under the intended far-end recipients public key. Our proposal is intended to safeguard passwords from the attacks mentioned above, as well as to provide transaction security to foil session hijacking. To facilitate a comparison to our proposal, we also provide a comprehensive survey of web authentication techniques that use an additional factor of authentication such as a cellphone, PDA (personal digital assistant) or hardware token; this survey may be of independent interest. A proof sketch of MP-Auth using the Protocol Composition Logic (PCL) is also provided.

Mohammad Mannan; P. C. van Oorschot

2008-01-01T23:59:59.000Z

133

Final report and recommendations of the ESnet Authentication Pilot Project  

Science Conference Proceedings (OSTI)

To conduct their work, U.S. Department of Energy (DOE) researchers require access to a wide range of computing systems and information resources outside of their respective laboratories. Electronically communicating with peers using the global Internet has become a necessity to effective collaboration with university, industrial, and other government partners. DOE`s Energy Sciences Network (ESnet) needs to be engineered to facilitate this {open_quotes}collaboratory{close_quotes} while ensuring the protection of government computing resources from unauthorized use. Sensitive information and intellectual properties must be protected from unauthorized disclosure, modification, or destruction. In August 1993, DOE funded four ESnet sites (Argonne National Laboratory, Lawrence Livermore National Laboratory, the National Energy Research Supercomputer Center, and Pacific Northwest Laboratory) to begin implementing and evaluating authenticated ESnet services using the advanced Kerberos Version 5. The purpose of this project was to identify, understand, and resolve the technical, procedural, cultural, and policy issues surrounding peer-to-peer authentication in an inter-organization internet. The investigators have concluded that, with certain conditions, Kerberos Version 5 is a suitable technology to enable ESnet users to freely share resources and information without compromising the integrity of their systems and data. The pilot project has demonstrated that Kerberos Version 5 is capable of supporting trusted third-party authentication across an inter-organization internet and that Kerberos Version 5 would be practical to implement across the ESnet community within the U.S. The investigators made several modifications to the Kerberos Version 5 system that are necessary for operation in the current Internet environment and have documented other technical shortcomings that must be addressed before large-scale deployment is attempted.

Johnson, G.R.; Moore, J.P. [Pacific Northwest Lab., Richland, WA (United States); Athey, C.L. [Lawrence Livermore National Lab., CA (United States); Engert, D.E. [Argonne National Lab., IL (United States); Ramus, J.E. [National Energy Research Supercomputer Center, Livermore, CA (United States)

1995-01-01T23:59:59.000Z

134

BABAR Web job submission with Globus Authentication and AFS Access  

Science Conference Proceedings (OSTI)

We present two versions of a grid job submission system produced for the BaBar experiment. Both use globus job submission to process data spread across various sites, producing output which can be combined for analysis. The problems encountered with authorization and authentication, data location, job submission, and the input and output sandboxes are described, as are the solutions. The total system is still some way short of the aims of enterprises such as the EDG, but represent a significant step along the way.

Forti, Alessandra

2003-06-17T23:59:59.000Z

135

A framework for federated two-factor authentication enabling cost-effective secure access to distributed cyberinfrastructure  

Science Conference Proceedings (OSTI)

As cyber attacks become increasingly sophisticated, the security measures used to mitigate the risks must also increase in sophistication. One time password (OTP) systems provide strong authentication because security credentials are not reusable, thus ... Keywords: OTP, XSEDE, authentication, radius

Matthew A. Ezell; Gary L. Rogers; Gregory D. Peterson

2012-07-01T23:59:59.000Z

136

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider  

E-Print Network (OSTI)

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider Department In this paper we consider the nature of machine proofs used in the CSP approach to the veri cation of authentication protocols using the process algebra CSP Hoa85]. The CSP syntax provides a natural and precise way

Doran, Simon J.

137

The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network (OSTI)

The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss­tolerant Authentication) broadcast au­ thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro­ nization between

Perrig, Adrian

138

Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME  

E-Print Network (OSTI)

Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME Presented, Washington, DC 20375 E-mail: archer@itd.nrl.navy.mil The TESLA multicast stream authentication protocol just been revealed. While an informal argument for the correctness of TESLA has been published

139

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network (OSTI)

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast au- thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro- nization between

Perrig, Adrian

140

Attacks and improvements to an RIFD mutual authentication protocol and its extensions  

Science Conference Proceedings (OSTI)

In WiSec'08, Song and Mitchell proposed an RFID mutual authentication protocol. Song also extended this protocol for RFID tag ownership transfer. These two protocols are designed to have the most security properties in the literature. We discover that, ... Keywords: authentication, privacy, rfid, security

Shaoying Cai; Yingjiu Li; Tieyan Li; Robert H. Deng

2009-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Transaction-based authentication and key agreement protocol for inter-domain VoIP  

Science Conference Proceedings (OSTI)

We present an authentication and key agreement protocol to secure Voice over IP call establishment between interconnection proxies of different domains. The protocol operates on a transaction basis. Each transaction is defined as the set of operations ... Keywords: Authentication, DDoS Protection, Inter-domain VoIP, Synchronisation, VoIP security

Patrick Battistello; Joaquin Garcia-Alfaro; Cyril DelTr

2012-09-01T23:59:59.000Z

142

Security Analysis of Lightweight Authentication Protocol from WISTP 2013 Wang Shao-HuiP  

E-Print Network (OSTI)

Security Analysis of Lightweight Authentication Protocol from WISTP 2013 Wang Shao-HuiP 1,2,3) P Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China) P 3) P( Network and Data Security Frequency Identification (RFID) is security and privacy. Many RFID authentication protocols have been

International Association for Cryptologic Research (IACR)

143

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems  

E-Print Network (OSTI)

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

Wang, Yongge

144

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

84: Cisco Digital Media Manager Lets Remote Authenticated Users 84: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges January 19, 2012 - 9:00am Addthis PROBLEM: A remote authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not properly validate unreferenced URLs. REFERENCE LINKS: Vendor Advisory SecurityTracker Alert ID: 1026541 CVE-2012-0329 IMPACT ASSESSMENT: medium Discussion: Cisco Show and Share is not directly affected by this vulnerability, but a user can exploit the Cisco Digital Media Manager to gain full access to Cisco Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port

145

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Cisco Digital Media Manager Lets Remote Authenticated Users 4: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges January 19, 2012 - 9:00am Addthis PROBLEM: A remote authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not properly validate unreferenced URLs. REFERENCE LINKS: Vendor Advisory SecurityTracker Alert ID: 1026541 CVE-2012-0329 IMPACT ASSESSMENT: medium Discussion: Cisco Show and Share is not directly affected by this vulnerability, but a user can exploit the Cisco Digital Media Manager to gain full access to Cisco Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port

146

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

147

T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

94: IBM solidDB Password Hash Authentication Bypass 94: IBM solidDB Password Hash Authentication Bypass Vulnerability T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability April 4, 2011 - 6:08am Addthis PROBLEM: A vulnerability has been reported in IBM solidDB, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: IBM solidDB 4.x - IBM solidDB 6.x ABSTRACT: This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability. REFERENCE LINKS: IBM Security Alert Secunia Advisory: SA44030 ZDI Advisory: ZDI-11-115 IBM solidDB Support IMPACT ASSESSMENT: Medium Discussion: The specific flaw exists within the solid.exe process which listens by default on TCP ports 1315, 1964 and 2315. The authentication protocol

148

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

149

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache VCL Input Validation Flaw Lets Remote Authenticated 0: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges May 7, 2013 - 12:01am Addthis PROBLEM: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Apache VCL Versions: 2.1, 2.2, 2.2.1, 2.3, 2.3.1 ABSTRACT: A vulnerability was reported in Apache VCL. REFERENCE LINKS: Apache Securelist SecurityTracker Alert ID: 1028515 CVE-2013-0267 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated administrative user with minimal administrative privileges (i.e., nodeAdmin, manageGroup, resourceGrant, or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges.

150

U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP StorageWorks File Migration Agent Buffer Overflows Let 6: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code July 19, 2012 - 7:14am Addthis PROBLEM: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code PLATFORM: HP StorageWorks File Migration Agent ABSTRACT: Two vulnerabilities were reported in HP StorageWorks File Migration Agent. reference LINKS: SecurityTracker Alert ID: 1027281 ZDI-12-127 ZDI-12-126 IMPACT ASSESSMENT: High Discussion: The vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP StorageWorks File Migration Agent. Authentication is not required to exploit this vulnerability. 1. (ZDI-12-127) The specific flaw exists within the HsmCfgSvc.exe service

151

U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-216: HP StorageWorks File Migration Agent Buffer Overflows Let U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code July 19, 2012 - 7:14am Addthis PROBLEM: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code PLATFORM: HP StorageWorks File Migration Agent ABSTRACT: Two vulnerabilities were reported in HP StorageWorks File Migration Agent. reference LINKS: SecurityTracker Alert ID: 1027281 ZDI-12-127 ZDI-12-126 IMPACT ASSESSMENT: High Discussion: The vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP StorageWorks File Migration Agent. Authentication is not required to exploit this vulnerability.

152

INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7/2013 Page 1 7/2013 Page 1 INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA) Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. HSPD-12 OWA REQUIREMENTS:  An EITS provided Exchange email account  A DOE issued HSPD-12 badge  DOEnet or Internet access and a supported web browser  A smart card reader installed* on your computer (*Windows Vista, Windows XP, MAC OS X 10.7 & 10.8, will also require smart card software to be installed in order to read the HSPD-12 badge) HSPD-12 OWA LOGIN PROCEDURE: 1. Insert HSPD-12 badge into card reader

153

Holographic Labeling And Reading Machine For Authentication And Security Appications  

DOE Patents (OSTI)

A holographic security label and automated reading machine for marking and subsequently authenticating any object such as an identification badge, a pass, a ticket, a manufactured part, or a package is described. The security label is extremely difficult to copy or even to read by unauthorized persons. The system comprises a holographic security label that has been created with a coded reference wave, whose specification can be kept secret. The label contains information that can be extracted only with the coded reference wave, which is derived from a holographic key, which restricts access of the information to only the possessor of the key. A reading machine accesses the information contained in the label and compares it with data stored in the machine through the application of a joint transform correlator, which is also equipped with a reference hologram that adds additional security to the procedure.

Weber, David C. (Rancho Santa Margarita, CA); Trolinger, James D. (Costa Mesa, CA)

1999-07-06T23:59:59.000Z

154

U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

54: Webmin Flaws Let Remote Authenticated Users Execute 54: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files September 10, 2012 - 6:00am Addthis PROBLEM: Webmin Multiple Input Validation Vulnerabilities PLATFORM: The vulnerabilities are reported in version 1.580. Other versions may also be affected. ABSTRACT: An authenticated attacker may be able to execute arbitrary commands. reference LINKS: Webmin Security Alerts Bugtraq ID: 55446 Secunia Advisory SA50512 SecurityTracker Alert ID: 1027507 US CERT Vulnerability Note VU#788478 CVE-2012-2981 CVE-2012-2982 CVE-2012-2983 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities have been reported in Webmin, which can be exploited by malicious users to compromise a vulnerable system and by

155

T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Virtual Server Environment Lets Remote Authenticated 8: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges April 22, 2011 - 7:47am Addthis PROBLEM: A vulnerability was reported in HP Virtual Server Environment. A remote authenticated user can obtain elevated privileges on the target system. PLATFORM: HP Virtual Server Environment prior to v6.3 ABSTRACT: A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges. reference LINKS: HP Document ID: c02749050 SecurityTracker Alert ID: 1025429 CVE-2011-1724 HP Insight Software media set 6.3 HP Technical Knowledge Base Discussion: System management and security procedures must be reviewed frequently to

156

V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: MediaWiki CentralAuth Extension Authentication Bypass 6: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability September 6, 2013 - 4:36am Addthis PROBLEM: A vulnerability has been reported in the CentralAuth extension for MediaWiki, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: MediaWiki CentralAuth Extension ABSTRACT: A vulnerability has been reported in the CentralAuth extension for MediaWik REFERENCE LINKS: Secunia Advisory SA54723 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an error when handling auto-logins and can be exploited to bypass the authentication mechanism by providing a valid username within the "centralauth_User" cookie. IMPACT:

157

V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP-UX Directory Server Discloses Passwords to Remote 6: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users May 29, 2013 - 12:32am Addthis PROBLEM: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users PLATFORM: Directory Server B.08.10.04 ABSTRACT: Two vulnerabilities were reported in HP-UX Directory Server. REFERENCE LINKS: HP Document ID: c03772083 SecurityTracker Alert ID: 1028593 CVE-2012-2678 CVE-2012-2746 IMPACT ASSESSMENT: High DISCUSSION: A local user can access the plaintext password in certain cases [CVE-2012-2678]. A remote authenticated user can can view the password for a target LDAP user when audit logging is enabled by reading the audit log [CVE-2012-2678].

158

Provably-Secure two-round password-authenticated group key exchange in the standard model  

Science Conference Proceedings (OSTI)

Password-authenticated group key exchange (PAGKE) allows group users to share a session key using a human-memorable password only. The fundamental security goal of PAGKE is security against dictionary attacks. Several solutions have been proposed ...

Jeong Ok Kwon; Ik Rae Jeong; Dong Hoon Lee

2006-10-01T23:59:59.000Z

159

Olive Oil: Chemistry and Technology, 2nd EditionChapter 7 Analysis and Authentication  

Science Conference Proceedings (OSTI)

Olive Oil: Chemistry and Technology, 2nd Edition Chapter 7 Analysis and Authentication Food Science Health Nutrition Biochemistry Processing eChapters Food Science & Technology Health - Nutrition - Biochemistry Processing Press

160

The Use of Timed Efficient Stream Loss-Tolerant Authentication (TESLA  

E-Print Network (OSTI)

This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards " (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2006). This memo describes the use of the Timed Efficient Stream Losstolerant Authentication (RFC 4082) transform within the Secure Realtime Transport Protocol (SRTP), to provide data origin authentication

M. Baugher; E. Carrara

2006-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a 5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in OpenLDAP. A remote user can authenticate without a valid password. PLATFORM: Open LDAP version(s) 2.4.12 - 2.2.24 ABSTRACT: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password. reference LINKS: SecurityTracker Alert ID:1025190 Secunia Advisory:SA43331 OpenLDAP Issue OpenLDAP Download CVE-2011-1025 IMPACT ASSESSMENT: Medium Discussion: A remote user with knowledge of the target distinguished name can provide an arbitrary password to successfully authenticate on systems using the NDB back-end. Impact: Some vulnerabilities have been reported in OpenLDAP, which can be exploited

162

V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: eXtplorer "ext_find_user()" Authentication Bypass 7: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA51636 eXtplorer 2.1.3 Security Release IMPACT ASSESSMENT: Medium DISCUSSION: eXtplorer was notified of a problem within the authentication system of eXtplorer Versions 2.1.2, 2.1.1, 2.1.0 and 2.1.0RC5 that have been found to be vulnerable to an authentication bypass bug. IMPACT: An error within the "ext_find_user()" function in users.php can be

163

AUTHENTICATED SENSOR INTERFACE DEVICE FOR JOINT USE SAFEGUARDS APPLICATIONS - CONCEPTS AND CHALLENGES  

SciTech Connect

This paper will discuss the key features of the Authenticated Sensor Interface Device that collectively provide the ability to share data among a number of parties while ensuring the authentication of data and protecting both the operators and the IAEAs interests. The paper will also discuss the development of the prototype, the initial testing with an accountancy scale, and future plans and challenges to implementation into the joint use and remote monitoring applications. As nuclear fuel cycle technology becomes more prevalent throughout the world and the capacity of plants increases, limited resources of the IAEA are being stretched near a breaking point. A strategy is to increase efficiency in safeguards monitoring using joint use equipment that will provide the facility operator process data while also providing the IAEA key safeguards data. The data, however, must be authenticated and validated to ensure the data have not been tampered with. The Authenticated Sensor Interface Device provides the capability to share data and can be a valuable component in the IAEAs ability to collect accountancy data from scales in Uranium conversion and enrichment plants, as well as nuclear fuel fabrication plants. Likewise, the Authenticated Sensor Interface Device can be configured to accept a diverse array of input signals, ranging from analog voltage, to current, to digital interfaces and more. These modular capabilities provide the ability to collect authenticated, joint-use, data streams from various process monitoring sensors.

Poland, R.; Drayer, R.; Wilson, J.

2013-08-12T23:59:59.000Z

164

Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population  

E-Print Network (OSTI)

In this paper, we propose an HB-like protocol for privacy-preserving authentication of RFID tags, whereby a tag can remain anonymous and untraceable to an adversary during the authentication process. Previous proposals of such protocols were based on PRF computations. Our protocol can instead be used on low-cost tags that may be incapable of computing standard PRFs. Moreover, since the underlying computations in HB protocols are very efficient, our protocol also reduces reader load compared to PRF-based protocols. We suggest a tree-based approach that replaces the PRF-based authentication from prior work with a procedure such as HB+ or HB#. We optimize the tree- traversal stage through usage of a "light version" of the underlying protocol and shared random challenges across all levels of the tree. This provides significant reduction of the communication resources, resulting in a privacy-preserving protocol almost as efficient as the underlying HB+ or HB#

Halevi, Tzipora; Halevi, Shai

2009-01-01T23:59:59.000Z

165

Probabilistic Non-Repudiation for Source Authentication with TESLA Certificates in Hybrid Satellite/Wireless Networks and  

E-Print Network (OSTI)

Probabilistic Non-Repudiation for Source Authentication with TESLA Certificates in Hybrid Satellite describe a novel non-repudiation mechanism for an authentication protocol based on the extended TESLA to this problem, we have proposed a new class of lightweight, symmetric key certificates called extended TESLA

Baras, John S.

166

A Tree-Based TESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu Sushil Jajodia  

E-Print Network (OSTI)

A Tree-Based µTESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu to multiple nodes in an authenticated way. µTESLA and multi-level µTESLA have been proposed to provide of senders. Though multi-level µTESLA schemes can scale up to large sensor networks (in terms of receivers

Zhu, Sencun

167

An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings  

Science Conference Proceedings (OSTI)

With the continue evaluation of mobile devices in terms of the capabilities and services, security concerns increase dramatically. To provide secured communication in mobile client-server environment, many user authentication protocols from pairings ... Keywords: Bilinear pairing, ID-based, Key agreement, Mobile device, Mutual authentication, Provable security

Debiao He

2012-08-01T23:59:59.000Z

168

Design and development of a mobile EPC-RFID-based self-validation system (MESS) for product authentication  

Science Conference Proceedings (OSTI)

The increase in the number of counterfeits penetrating into the open market has created the need for a product authentication approach in tracing and tracking the product anytime, anywhere. Owing to the vague concepts frequently represented in flow of ... Keywords: Anti-counterfeit system, Counterfeiting, Electronic product code (EPC), Product authentication, Radio frequency identification (RFID)

S. K. Kwok; Jacky S. L. Ting; Albert H. C. Tsang; W. B. Lee; Benny C. F. Cheung

2010-09-01T23:59:59.000Z

169

U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: McAfee Email Gateway Lets Remote Users Bypass Authentication 4: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks August 27, 2012 - 7:00am Addthis PROBLEM: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks PLATFORM: McAfee Email Gateway (MEG) 7.0.0 and 7.0.1 (MEG 6.7.x is NOT affected.) McAfee Email and Web Security (EWS) 5.6 Patch 3 and earlier McAfee Email and Web Security (EWS) 5.5 Patch 6 and earlier ABSTRACT: Several vulnerabilities were reported in McAfee Email Gateway. reference LINKS: McAfee Security Bulletin ID: SB10026 SecurityTracker Alert ID: 1027444

170

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote 11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories July 12, 2012 - 7:00am Addthis PROBLEM: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories PLATFORM: EMC Celerra Network Server versions 6.0.36.4 through 6.0.60.2 EMC VNX versions 7.0.12.0 through 7.0.53.1 EMC VNXe 2.0 (including SP1, SP2, and SP3) EMC VNXe MR1 (including SP1, SP2, SP3, and SP3.1) EMC VNXe MR2 (including SP0.1) ABSTRACT: A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system. reference LINKS: The Vendor's Advisory

171

U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

44: McAfee Email Gateway Lets Remote Users Bypass Authentication 44: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks August 27, 2012 - 7:00am Addthis PROBLEM: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks PLATFORM: McAfee Email Gateway (MEG) 7.0.0 and 7.0.1 (MEG 6.7.x is NOT affected.) McAfee Email and Web Security (EWS) 5.6 Patch 3 and earlier McAfee Email and Web Security (EWS) 5.5 Patch 6 and earlier ABSTRACT: Several vulnerabilities were reported in McAfee Email Gateway. reference LINKS: McAfee Security Bulletin ID: SB10026 SecurityTracker Alert ID: 1027444

172

Can we fix the security economics of federated authentication? (transcript of discussion)  

Science Conference Proceedings (OSTI)

OK, so the talk that I've got today is entitled "Can We Fix the Security Economics of Federated Authentication?" and some of this is stuff that I did while I was at Google in January and February. I'm on sabbatical this year and so I'm visiting various ...

Ross Anderson

2011-03-01T23:59:59.000Z

173

Strong password-based authentication in TLS using the three-party group Diffie Hellman protocol  

Science Conference Proceedings (OSTI)

The internet has evolved into a very hostile ecosystem where 'phishing' attacks are common practice. This paper shows that the three-party group Diffie-Hellman key exchange can help protect against these attacks. We have developed password-based ... Keywords: TLS, cryptography, group Diffie Hellman key exchange, networks, password authentication, phishing attacks, transport layer security

Michel Abdalla; Emmanuel Bresson; Olivier Chevassut; Bodo Moller; David Pointcheval

2007-04-01T23:59:59.000Z

174

Security Analysis and Implementation of JUITImage Based Authentication System Using Kerberos Protocol  

Science Conference Proceedings (OSTI)

Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. The need for something more secure along ... Keywords: Image Based Authentication System, AJAX, MySQL, Diffie-Hellman key Exchange, Kerberos Protocol, Keystroke Logging, Tempest Attack, Shoulder Attack, Brute-force Attack

Nitin; Durg Singh Chauhan; Vivek Kumar Sehgal; Ankit Mahanot; Pallavi Singh; Sohit Ahuja; Utkarsh Shrivastava; Manisha Rana; Vineet Punjabi; Shivam Vinay; Nakul Sharma

2008-05-01T23:59:59.000Z

175

Authentication of images for 3D cameras: Reversibly embedding information using intelligent approaches  

Science Conference Proceedings (OSTI)

In this work, a reversible watermarking approach for authentication of 3D cameras based on computational intelligence is presented. Two intelligent techniques based on differential evolution (DE) and hybrid DE are employed to optimize the tradeoff between ... Keywords: 3D camera, Depth maps, Differential evolution algorithm, Integer wavelet transform, Particle swarm optimization, Reversible watermarking

Sana Ambreen Malik; Asifullah Khan; Mutawarra Hussain; Khurram Jawad; Rafiullah Chamlawi; Abdul Jalil

2012-11-01T23:59:59.000Z

176

Hydroxypyridonate chelating agents  

DOE Patents (OSTI)

Chelating agents having 1-hydroxy-2-pyridinone (HOPO) and related moieties incorporated within their structures, including polydentate HOPO-substituted polyamines such as spermidine and spermine, and HOPO-substituted desferrioxamine. The chelating agents are useful in selectively removing certain cations from solution, and are particularly useful as ferric ion and actinide chelators. Novel syntheses of the chelating agents are provided.

Raymond, Kenneth N. (Berkeley, CA); Scarrow, Robert C. (Minneapolis, MN); White, David L. (Oakland, CA)

1987-01-01T23:59:59.000Z

177

Privilege Management of Mobile Agents  

Science Conference Proceedings (OSTI)

... A number of models exist for describing ... Figure 1: Agent System Model Mobile agent ... encountered in deploying agent-based applications [Jan99]. ...

2000-11-03T23:59:59.000Z

178

Agent Tcl: A transportable agent system Robert S. Gray  

E-Print Network (OSTI)

Agent Tcl: A transportable agent system Robert S. Gray Department of Computer Science Dartmouth of Agent Tcl is to address the weaknesses of existing transportable-agent systems. Agent Tcl willrun describes the architecture of Agent Tcl and its current im- plementation and presents four information

179

IM Free Agent Sign Up 1 Wanted! Intramurals Free Agents!  

E-Print Network (OSTI)

IM Free Agent Sign Up 1 Wanted! Intramurals Free Agents! Individuals who do not have a full team a "Free Agent". Within the UNLV Intramural Sports program there are multiple ways to improve a Free Agent will not force any team to accept a Free Agent participant. History and research has shown that Free Agents

Hemmers, Oliver

180

Project: Intelligent Building Agents  

Science Conference Proceedings (OSTI)

... agents to achieve a common goal, such as minimizing energy consumption and ... it possible to solve the problem of building system optimization in a ...

2012-12-17T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Agents for the Masses?  

Science Conference Proceedings (OSTI)

... CDT are satisfied that the models they have ... MR Genesereth, An Agent-Based Framework for Interoperabil- ity ... one another, such a model is insuf ...

2007-09-19T23:59:59.000Z

182

The human agent virtual environment  

Science Conference Proceedings (OSTI)

In this paper we describe a multi-agent simulation called the Human Agent Virtual Environment (or HAVE). HAVE is a test bed to explore agent-environment interaction in multi-agent simulation for defence applications. The primary research driver in the ... Keywords: agents and cognitive models, defence, multi-agent simulation and modeling

Michael Papasimeon; Adrian R. Pearce; Simon Goss

2007-05-01T23:59:59.000Z

183

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Barracuda SSL VPN Bug Lets Remote Users Bypass 7: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication January 25, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN. PLATFORM: The vulnerability has been verified to exist in Barracuda SSL VPN version 2.2.2.203 ABSTRACT: A remote user can gain administrative access to the target system. REFERENCE LINKS: SecurityTracker Alert ID: 1028039 Barracuda Networks Advisory IMPACT ASSESSMENT: High DISCUSSION: A remote user can set a specially crafted Java system property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database dumps, shutdown the system, and set new administrative

184

WIPP Transparency Project - container tracking and monitoring demonstration using the Authenticated Tracking and Monitoring System (ATMS)  

SciTech Connect

The Authenticated Tracking and Monitoring System (ATMS) is designed to answer the need for global monitoring of the status and location of proliferation-sensitive items on a worldwide basis, 24 hours a day. ATMS uses wireless sensor packs to monitor the status of the items within the shipment and surrounding environmental conditions. Receiver and processing units collect a variety of sensor event data that is integrated with GPS tracking data. The collected data are transmitted to the International Maritime Satellite (INMARSAT) communication system, which then sends the data to mobile ground stations. Authentication and encryption algorithms secure the data during communication activities. A typical ATMS application would be to track and monitor the stiety and security of a number of items in transit along a scheduled shipping route. The resulting tracking, timing, and status information could then be processed to ensure compliance with various agreements.

SCHOENEMAN, J. LEE; SMARTT, HEIDI ANNE; HOFER, DENNIS

2000-01-27T23:59:59.000Z

185

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

September 28, 2012 September 28, 2012 U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands Trend Micro has been notified of a potential product vulnerability in Control Manager. September 27, 2012 U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service A vulnerability was reported in Cisco IOS. September 26, 2012 U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users A vulnerability was reported in Oracle Database. September 25, 2012 U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability Multiple RSA Products Authentication Bypass Vulnerability September 21, 2012 U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain

186

V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote 1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service November 22, 2012 - 3:00am Addthis PROBLEM: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service PLATFORM: Version(s): XC10 2.0.0.0 - 2.0.0.3, 2.1.0.0 - 2.1.0.2 ABSTRACT: Several vulnerabilities were reported in IBM WebSphere DataPower. REFERENCE LINKS: IBM Security Bulletin SecurityTracker Alert ID: 1027798 CVE-2012-5758 CVE-2012-5759 CVE-2012-5756 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in IBM WebSphere DataPower. A remote

187

SSH: secure login connections over the internet  

Science Conference Proceedings (OSTI)

SSH provides secure login, file transfer, X11, and TCP/IP connections over an untrusted network. It uses cryptographic authentication, automatic session encryption, and integrity protection for transferred data. RSA is used for key exchange and authentication, ...

Tatu Ylnen

1996-07-01T23:59:59.000Z

188

From social agents to multi-agent systems: preliminary report  

Science Conference Proceedings (OSTI)

This paper presents a formal analysis of social interaction within a multi-agent system. The concept of a social agent is introduced as the elemental building block of multi-agent systems. Social agents can be individual (BDI) agents or aggregations ...

Maria Fasli

2003-06-01T23:59:59.000Z

189

Coordinating Intelligent Agents  

Science Conference Proceedings (OSTI)

This chapter will focus on how to get organizations - multiple software agents and perhaps humans - to coordinate thier activities when they are working on shared, loosely coupled problems, such as engineering design or information gathering. It will ...

Keith Decker

2002-01-01T23:59:59.000Z

190

Computing with strategic agents  

E-Print Network (OSTI)

This dissertation studies mechanism design for various combinatorial problems in the presence of strategic agents. A mechanism is an algorithm for allocating a resource among a group of participants, each of which has a ...

Immorlica, Nicole, 1978-

2005-01-01T23:59:59.000Z

191

Client Software Agents in FCVW  

Science Conference Proceedings (OSTI)

Software agents are a rapidly developing field of Computer Science. The need for software agents is felt in various applications and environments. It has therefore become essential to study agents with respect to the various environments in which operate. ...

Elhadi Shakshuki; Ivan Tomek; Omkarnath Prabhu

2005-04-01T23:59:59.000Z

192

On a Hierarchically Decomposed Agent  

E-Print Network (OSTI)

I believe that an agent-based model constructed with thean appropriate agent-based simulation. The model intends tomodel represents a decomposition of intent, based on the idea that an agent

Suarez, E. Dante

2005-01-01T23:59:59.000Z

193

Evaluating mobile agent platform security  

Science Conference Proceedings (OSTI)

Agent mobility requires additional security standards. While the theoretical aspects of mobile agent security have been widely studied, there are few studies about the security standards of current agent platforms. In this paper, test cases are proposed ...

Axel Brkle; Alice Hertel; Wilmuth Mller; Martin Wieser

2006-09-01T23:59:59.000Z

194

Countermeasures for Mobile Agent Security  

Science Conference Proceedings (OSTI)

... A number of models exist for describing agent ... into an effective security model is clearly ... There are a number of agent-based application domains for ...

2007-09-19T23:59:59.000Z

195

Serious leisure, participation and experience in tourism: authenticity and ritual in a renaissance festival  

E-Print Network (OSTI)

This study examined the Texas Renaissance Festival as perceived and experienced by (serious) visitors for whom this was a form of regular, repeated and highly meaningful participation. Specifically, the focus was to gain understanding of the notion of serious leisure as defined by Stebbins, in the context of festivals, and to understand the meanings associated with festival participation. Following a qualitative (constructivism paradigm) research frame, the data were collected through participant observation and 37 in-depth interviews for highly committed tourists to the Texas Renaissance Festival. The collected data were analyzed through Grounded Theory techniques specified by Glaser (1978). In regard to the characteristics of participation, the results indicated that their continuous participation in the Texas Renaissance Festival displays qualities of serious leisure: 1) identification; 2) long-term career; 3) unique ethos; 4) significant personal effort; 5) perseverance; and 6) durable personal benefits. As they become more seriously involved in the festival participation, they tend to be a part of a well-integrated subculture of which prominent values include personal freedom, hedonism, and anti-materialism. The experiences constructed through the serious festival participation were reminiscent of tourism existential authenticity specified by Wang (1999) as two levels: intrapersonal authenticity (gaining one?s true self) and interpersonal authenticity (gaining true human relationship). A search of such authentic experiences at the festival seems to be partly driven by the perceived alienation in everyday life. When these aspects were examined from an interpretive and meaning-based approach, attending the festival in a serious manner is not just a simple matter of escaping from the reality (e.g., alienation) of everyday life, but is an active quest for an ?alternative? to their lives at home as many indicated. Thus, the serious participation in a tourism activity such as the Texas Renaissance Festival could be best understood as a dynamic process of attaining existential state of Being in response to diverse sociocultural conditions. Several significant theoretical propositions were made based on the results derived from this study. Additionally, marketing and management implications associated with staging tourism events and festivals were discussed.

Kim, Hyounggon

2004-12-01T23:59:59.000Z

196

Agent Tcl: A transportable agent system Robert S. Gray \\Lambda  

E-Print Network (OSTI)

Agent Tcl: A transportable agent system Robert S. Gray \\Lambda Department of Computer Science Tcl is a transportable­agent system that is under development at Dartmouth College. A transportable and efficient alter­ native. The goal of Agent Tcl is to address the weaknesses of existing transportable

197

A multi-agent simulation for social agents  

Science Conference Proceedings (OSTI)

Agent-based modeling of human social behavior is an increasingly important research area. Many fully functional multi-agent systems have been developed and have been put to use over the years. But efficient scalable and robust social systems are difficult ... Keywords: agent simulation, cognitive modeling, social agents

Yu Zhang; Phillip Coleman; Michael Pellon; Jason Leezer

2008-04-01T23:59:59.000Z

198

Using a personal device to strengthen password authentication from an untrusted computer  

E-Print Network (OSTI)

Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users financial accounts. Most existing or proposed solutions are vulnerable to session hijacking attacks. We propose a simple approach to counter these attacks, which cryptographically separates a users long-term secret input from (typically untrusted) client PCs; a client PC performs most computations but has access only to temporary secrets. The users long-term secret (typically short and low-entropy) is input through an independent personal trusted device such as a cellphone. The personal device provides a users long-term secrets to a client PC only after encrypting the secrets using a pre-installed, correct public key of a remote service (the intended recipient of the secrets). The proposed protocol (MP-Auth) realizes such an approach, and is intended to safeguard passwords from keyloggers, other malware (including rootkits), phishing attacks and pharming, as well as to provide transaction security to foil session hijacking. We report on a prototype implementation of MP-Auth, and provide a comparison of web authentication techniques that use an additional factor of authentication (e.g. a cellphone, PDA or hardware token).

Mohammad Mannan; P. C. van Oorschot

2007-01-01T23:59:59.000Z

199

Sensible Authentication  

Science Conference Proceedings (OSTI)

The problem with securing assets and their functionality is that, by definition, you don't want to protect them from everybody. It makes no sense to protect assets from their owners, or from other authorized individuals (including the trusted personnel ...

Bruce Schneier

2004-02-01T23:59:59.000Z

200

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

71 - 22680 of 26,764 results. 71 - 22680 of 26,764 results. Article Small Wind Electric Systems Small wind electric systems are one of the most cost-effective home-based renewable energy systems -- with zero emissions and pollution. http://energy.gov/energysaver/articles/small-wind-electric-systems Article T-642: RSA SecurID update to Customers RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products http://energy.gov/cio/articles/t-642-rsa-securid-update-customers Article T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID RSA investigation has revealed that the attack resulted in certain

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for  

E-Print Network (OSTI)

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for Smart Grid Communications Mostafa M. Fouda, Member, IEEE, Zubair Md. Fadlullah, Member Abstract--Smart grid (SG) communication has recently received significant attentions to facilitate

Shen, Xuemin "Sherman"

202

The Emotional and Spiritual Dimensions of Being a Pastor: Authenticity and Identity  

E-Print Network (OSTI)

Emotional labor and its influence on authenticity and identity amongst human service workers has been the focus of numerous studies. Often these studies viewed identity as a stable sense of self. This study set out to examine emotional labor amongst clergy and how it may differ from the emotional labor experienced in other occupations, with the premise that individuals have multiple identities that shift and change depending on the situational context. A thematic analysis of interviews conducted with twenty-seven clergy and a textual analysis of denominational/church texts was conducted to examine the following ideas: 1) how clergy negotiated tensions of authenticity and identity in their work; 2) how clergy described the spiritual and emotional dimensions of their work; 3) how denominational texts address issues of spiritual and emotional labor; and, 4) if clergy felt enabled and/or constrained by denominational standards and beliefs. The results of this study indicated that emotional and spiritual labor amongst clergy is unique for several reasons. One, the emotional labor clergy engaged in served a positive function because they see it as means of helping others. Second, clergy were aware that emotional labor was intrinsic to the job and they engaged in activities to preempt or manage the tension they felt when the job required them to mask their true feelings and display organizationally preferred feelings. Finally, clergy enjoyed the spiritual dimension of their jobs; thus they were engaged in spiritual work (authentic spirituality), not spiritual labor (inauthentic spirituality). Results also indicated that denominational texts did convey a preferred identity or ideal for how pastors should behave. Pastors indicated that the denominational expectations and guidelines for pastors both enabled and constrained them. The majority of the pastors felt the freedom to disagree civilly and the denomination/church provided venues in which pastors could communicate their dissenting views. However, in some cases, pastors felt the denominational guidelines for the "ideal pastor" were in conflict with how they saw their own role as pastor and they left the denomination. Results also revealed how pastors identities shifted and changed as the context in which they were ministering changed.

Otey, Penny Addison

2010-08-01T23:59:59.000Z

203

Emulsified blasting agents  

SciTech Connect

This article describes an improved blasting agent which is being tailor-blended with bulk ANFO to provide more explosive energy and better water resistance when the blasting conditions call for it. The proportions of the emulsion/ANFO mix are easily changed at the blasthole site because both materials can be selectively mixed in modified bulk-explosive trucks before loading the blasting agents into the holes. Such blends are helping speed stripping at a number of surface mines and are leading to cost savings in production, ranging from 10% to 30%, depending upon application, even though the actual cost of a blend will be higher than if bulk ANFO is used alone.

Chironis, N.P.

1985-01-01T23:59:59.000Z

204

Agent based process management: applying intelligent agents to workflow  

Science Conference Proceedings (OSTI)

This paper presents an Agent-based Process Management System (APMS) architecture that combines recent developments in autonomous agent technology and distributed computing platforms. It argues that a service-oriented view is required in order ...

P. D. O'Brien; M. E. Wiegand

1998-07-01T23:59:59.000Z

205

Rigid bifunctional chelating agents  

DOE Patents (OSTI)

Bicyclo[2.2.2] octane-2,3 diamine-N,N,N`,N`-tetraacetic acids (BODTA) and bicyclo[2.2.1] heptane-2,3 diamine-N,N,N`,N`-tetraacetic acid (BHDTA) are chelating agents useful in forming detectably labeled bioconjugate compounds for diagnostic and therapeutic purposes. New compounds and processes of forming BODTA and BHDTA are disclosed. Radioimmunoconjugates of the present invention show high and prolonged tumor uptake with low normal tissue uptakes.

Sweet, M.P.; Mease, R.C.; Srivastava, S.C.

1998-07-21T23:59:59.000Z

206

Rigid bifunctional chelating agents  

DOE Patents (OSTI)

Bicyclo[2.2.2]octane-2,3 diamine-N,N,N',N'-tetraacetic acids (BODTA) and bicyclo[2.2.1]heptane-2,3 diamine-N,N,N',N'-tetraacetic acid (BHDTA) are chelating agents useful in forming detectably labeled bioconjugate compounds for diagnostic and therapeutic purposes. New compounds and processes of forming BODTA and BHDTA are disclosed. Radioimmunoconjugates of the present invention show high and prolonged tumor uptake with low normal tissue uptakes.

Sweet, Mark P. (Coram, NY); Mease, Ronnie C. (Fairfax, VA); Srivastava, Suresh C. (Setauket, NY)

2000-02-08T23:59:59.000Z

207

Rigid bifunctional chelating agents  

DOE Patents (OSTI)

Bicyclo2.2.2! octane-2,3 diamine-N,N,N',N'-tetraacetic acids (BODTA) and bicyclo2.2.1! heptane-2,3 diamine-N,N,N',N'-tetraacetic acid (BHDTA) are chelating agents useful in forming detectably labeled bioconjugate compounds for diagnostic and therapeutic purposes. New compounds and processes of forming BODTA and BHDTA are disclosed. Radioimmunoconjugates of the present invention show high and prolonged tumor uptake with low normal tissue uptakes.

Sweet, Mark P. (Coram, NY); Mease, Ronnie C. (Fairfax, VA); Srivastava, Suresh C. (Setauket, NY)

1998-07-21T23:59:59.000Z

208

EER of fixed and trainable fusion classifiers: A theoretical study with application to biometric authentication tasks  

E-Print Network (OSTI)

Biometric authentication is a process of verifying an identity claim using a persons behavioural and physiological characteristics. Due to the vulnerability of the system to environmental noise and variation caused by the user, fusion of several biometric-enabled systems is identified as a promising solution. In the literature, various fixed rules (e.g. min, max, median, mean) and trainable classifiers (e.g. linear combination of scores or weighted sum) are used to combine the scores of several base-systems. How exactly do correlation and imbalance nature of base-system performance affect the fixed rules and trainable classifiers? We study these joint aspects using the commonly used error measurement in biometric authentication, namely Equal Error Rate (EER). Similar to several previous studies in the literature, the central assumption used here is that the class-dependent scores of a biometric system are approximately normally distributed. However, different from them, the novelty of this study is to make a direct link between the EER measure and the fusion schemes mentioned. Both synthetic and real experiments (with as many as 256 fusion experiments carried out on the XM2VTS benchmark score-level fusion data sets) verify our proposed theoretical modeling of EER of the two families of combination scheme. In particular, it is found that weighted sum can provide the best generalisation performance when its weights are estimated correctly. It also has the additional advantage that score normalisation prior to fusion is not needed, contrary to the rest of fixed fusion rules.

Norman Poh; Samy Bengio

2005-01-01T23:59:59.000Z

209

Multiple agents moving target search  

Science Conference Proceedings (OSTI)

Traditional single-agent search algorithms usually make simplifying assumptions (single search agent, stationary target, complete knowledge of the state, and sufficient time). There are algorithms for relaxing one or two of these constraints; in this ...

Mark Goldenberg; Alexander Kovarsky; Xiaomeng Wu; Jonathan Schaeffer

2003-08-01T23:59:59.000Z

210

Towards Manageable Mobile Agent Infrastructures  

Science Conference Proceedings (OSTI)

This paper addresses the problem of managing distributed mobile agent infrastructures. First, the weaknesses of current mobile agent implementations will be discussed and identified from the manageability viewpoint. The solutions devised and experimented ...

Paulo Simes; Paulo Marques; Lus Moura Silva; Joo Gabriel Silva; Fernando Boavida

2001-07-01T23:59:59.000Z

211

Research directions in agent communication  

Science Conference Proceedings (OSTI)

Increasingly, software engineering involves open systems consisting of autonomous and heterogeneous participants or agents who carry out loosely coupled interactions. Accordingly, understanding and specifying communications among agents ... Keywords: Communication

Amit K. Chopra, Alexander Artikis, Jamal Bentahar, Marco Colombetti, Frank Dignum, Nicoletta Fornara, Andrew J. I. Jones, Munindar P. Singh, Pinar Yolum

2013-03-01T23:59:59.000Z

212

Automated gesturing for embodied agents  

Science Conference Proceedings (OSTI)

In this paper we present our recent results in automatic facial gesturing of graphically embodied animated agents. In one case, conversational agent is driven by speech in automatic Lip Sync process. By analyzing speech input, lip movements are determined ...

Goranka Zoric; Karlo Smid; Igor S. Pandzic

2006-03-01T23:59:59.000Z

213

Improved Antifoam Agents for SRS  

Demonstrate antifoam effectiveness in actual waste testing ... Final Report: Illinois Institute ... The antifoam agent was not impacted by the ...

214

Designing Self-Modifying Agents  

E-Print Network (OSTI)

Agents need to be able to adapt to changes in their environment. One way to achieve this, is to provide agents with the ability of self-modification. Self-modification requires reflection and strategies with which new knowledge can be acquired, a necessary condition for creativity. This paper describes a knowledge-level model for the design of self-modifying agents and explores the feasibility of automatically designing self-modifying agents.

Frances M.T. Brazier; Frances M. T; Brazier; Niek J. E. Wijngaards

2001-01-01T23:59:59.000Z

215

Agents, Crawlers, and Web Retrieval  

Science Conference Proceedings (OSTI)

In this paper we survey crawlers, a specific type of agents used by search engines. We also explore the relation with generic agents and how agent technology or variants of it could help to develop search engines that are more effective, efficient, and ...

Ricardo A. Baeza-Yates; Jos M. Piquer

2002-09-01T23:59:59.000Z

216

Flexible, secure agent development framework  

DOE Patents (OSTI)

While an agent generator is generating an intelligent agent, it can also evaluate the data processing platform on which it is executing, in order to assess a risk factor associated with operation of the agent generator on the data processing platform. The agent generator can retrieve from a location external to the data processing platform an open site that is configurable by the user, and load the open site into an agent substrate, thereby creating a development agent with code development capabilities. While an intelligent agent is executing a functional program on a data processing platform, it can also evaluate the data processing platform to assess a risk factor associated with performing the data processing function on the data processing platform.

Goldsmith; Steven Y. (Rochester, MN)

2009-04-07T23:59:59.000Z

217

A Model for Informed Negotiating Agents  

Science Conference Proceedings (OSTI)

We propose that the key to building intelligent negotiating agents is to take an agent's historic observations as primitive, to model that agent's changing uncertainty in that information, and to use that model as the foundation for the agent's reasoning. ...

John Debenham; Simeon Simoff

2007-05-01T23:59:59.000Z

218

Handbook of Chemical and Biological Warfare Agent ...  

U.S. Energy Information Administration (EIA)

Free ebook Handbook of Chemical and Biological Warfare Agent Decontamination pdf download.Handbook of Chemical and Biological Warfare Agent ...

219

Enhanced Detection of Toxic Agents  

in the development of their AquaSentinel water quality monitoring system by ... chemical, biological, or radiological agents in the fluid. Integration of biased AC

220

Enhancing the Authentication of Bank Cheque Signatures by Implementing Automated System Using Recurrent Neural Network  

E-Print Network (OSTI)

The associatie memory feature of the Hopfield type recurrent neural network is used for the pattern storage and pattern authentication.This paper outlines an optimization relaxation approach for signature verification based on the Hopfield neural network (HNN)which is a recurrent network.The standard sample signature of the customer is cross matched with the one supplied on the Cheque.The difference percentage is obtained by calculating the different pixels in both the images.The network topology is built so that each pixel in the difference image is a neuron in the network.Each neuron is categorized by its states,which in turn signifies that if the particular pixel is changed.The network converges to unwavering condition based on the energy function which is derived in experiments.The Hopfield's model allows each node to take on two binary state values (changed/unchanged)for each pixel.The performance of the proposed technique is evaluated by applying it in various binary and gray scale images.This paper con...

Rao, Mukta; Dhaka, Vijaypal Singh

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Agent Tcl: A flexible and secure mobile-agent system  

E-Print Network (OSTI)

An information agent manages all or a portion of a user's information space. The electronic resources in this space are often distributed across a network and can contain tremendous quantities of data. Mobile agents provide efficient access to such resources and are a powerful tool for implementing information agents. A mobile agent is an autonomous program that can migrate from machine to machine in a heterogeneous network. By migrating to the location of a resource, the agent can access the resource efficiently even if network conditions are poor or the resource has a low-level interface. Telescript is the best-known mobile-agent system. Telescript, however, requires the programmer to learn and work with a complex object-oriented language and a complex security model. Agent Tcl, on the other hand, is a simple, flexible, and secure system that is based on the Tcl scripting language and the Safe Tcl extension. In this paper we describe the architecture of Agent Tcl and its current implementation.

Robert S. Gray

1996-01-01T23:59:59.000Z

222

A Progressive Network Management Architecture Enabled By Java Technology  

E-Print Network (OSTI)

This paper proposes a framework based completely on Java technology. The advantages brought about by the use of Java in network management answer some critical problems existing in current systems. With this work we address several factors concerning interoperability and security in heterogeneous network environments. Specifically, we present a manager application and a multithreaded agent engine that make use of a lightweight communication mechanism for message exchange. A MIB parser is introduced to accelerate handling of incoming management requests, and the RSA public-key cryptosystem is implemented to provide both encryption and authentication features. Results, measured in terms of response time, compare favourably with other published work and standard management frameworks.

Gavalas, Damianos; Ghanbari, Mohammed; O'Mahony, Mike

2010-01-01T23:59:59.000Z

223

Implementing Lego Agents Using Jason  

E-Print Network (OSTI)

Since many of the currently available multi-agent frameworks are generally mostly intended for research, it can be difficult to built multi-agent systems using physical robots. In this report I describe a way to combine the multi-agent framework Jason, an extended version of the agent-oriented programming language AgentSpeak, with Lego robots to address this problem. By extending parts of the Jason reasoning cycle I show how Lego robots are able to complete tasks such as following lines on a floor and communicating to be able to avoid obstacles with minimal amount of coding. The final implementation is a functional extension that is able to built multi-agent systems using Lego agents, however there are some issues that have not been addressed. If the agents are highly dependent on percepts from their sensors, they are required to move quite slowly, because there currently is a high delay in the reasoning cycle, when it is combined with a robot. Overall the system is quite robust and can be used to make simple...

Jensen, Andreas Schmidt

2010-01-01T23:59:59.000Z

224

Emotions to control agent deliberation  

Science Conference Proceedings (OSTI)

The execution of an artificial agent is usually implemented with a sense--reason--act cycle. This cycle includes tasks such as event processing, generating and revising plans, and selecting actions to execute. However, there are typically many choices ... Keywords: agent programming languages, emotions

Bas R. Steunebrink; Mehdi Dastani; John-Jules Ch. Meyer

2010-05-01T23:59:59.000Z

225

Agent Communications using Distributed Metaobjects  

SciTech Connect

There are currently two proposed standards for agent communication languages, namely, KQML (Finin, Lobrou, and Mayfield 1994) and the FIPA ACL. Neither standard has yet achieved primacy, and neither has been evaluated extensively in an open environment such as the Internet. It seems prudent therefore to design a general-purpose agent communications facility for new agent architectures that is flexible yet provides an architecture that accepts many different specializations. In this paper we exhibit the salient features of an agent communications architecture based on distributed metaobjects. This architecture captures design commitments at a metaobject level, leaving the base-level design and implementation up to the agent developer. The scope of the metamodel is broad enough to accommodate many different communication protocols, interaction protocols, and knowledge sharing regimes through extensions to the metaobject framework. We conclude that with a powerful distributed object substrate that supports metaobject communications, a general framework can be developed that will effectively enable different approaches to agent communications in the same agent system. We have implemented a KQML-based communications protocol and have several special-purpose interaction protocols under development.

Goldsmith, Steven Y.; Spires, Shannon V.

1999-06-10T23:59:59.000Z

226

Context-Dependent Network Agents  

Science Conference Proceedings (OSTI)

The design of dynamic networks and their embedded agents is one of the most challenging tasks in modern technology. This is particularly true of the U.S. power grid, the target application for the technology being developed by the Context-Dependent Network Agents (CDNA) Consortium in the EPRI/DOD Initiative on Complex Interactive Networks/Systems. This report develops the thesis that the agility and robustness of networks can be improved significantly by making some of the agents in the network more cont...

2000-05-23T23:59:59.000Z

227

Nuclear magnetic resonance contrast agents  

DOE Patents (OSTI)

A family of contrast agents for use in magnetic resonance imaging and a method of enhancing the contrast of magnetic resonance images of an object by incorporating a contrast agent of this invention into the object prior to forming the images or during formation of the images. A contrast agent of this invention is a paramagnetic lanthanide hexaazamacrocyclic molecule, where a basic example has the formula LnC.sub.16 H.sub.14 N.sub.6. Important applications of the invention are in medical diagnosis, treatment, and research, where images of portions of a human body are formed by means of magnetic resonance techniques.

Smith, Paul H. (Los Alamos, NM); Brainard, James R. (Los Alamos, NM); Jarvinen, Gordon D. (Los Alamos, NM); Ryan, Robert R. (Los Alamos, NM)

1997-01-01T23:59:59.000Z

228

Nuclear magnetic resonance contrast agents  

DOE Patents (OSTI)

A family of contrast agents for use in magnetic resonance imaging and a method of enhancing the contrast of magnetic resonance images of an object by incorporating a contrast agent of this invention into the object prior to forming the images or during formation of the images. A contrast agent of this invention is a paramagnetic lanthanide hexaazamacrocyclic molecule, where a basic example has the formula LnC{sub 16}H{sub 14}N{sub 6}. Important applications of the invention are in medical diagnosis, treatment, and research, where images of portions of a human body are formed by means of magnetic resonance techniques. 10 figs.

Smith, P.H.; Brainard, J.R.; Jarvinen, G.D.; Ryan, R.R.

1997-12-30T23:59:59.000Z

229

Participatory, embodied, multi-agent simulation  

Science Conference Proceedings (OSTI)

We will demonstrate the integration of a software-based multi-agent modeling platform with a participatory simulation environment and real-time control over a physical agent (robot). Both real and virtual participants will be able to act as agents in ... Keywords: embedded agents, multi-agent simulation, participatory simulation, robotics, sensors

Paulo Blikstein; William Rand; Uri Wilensky

2006-05-01T23:59:59.000Z

230

Evaluating the security of mobile agent platforms  

Science Conference Proceedings (OSTI)

Mobility of software agents requires additional security measures. While the theoretical aspects of mobile agent security have been widely studied, there are few studies about the security levels of current agent platforms. In this paper, test cases ... Keywords: Agent platforms, Mobile agents, Security

Axel Brkle; Alice Hertel; Wilmuth Mller; Martin Wieser

2009-04-01T23:59:59.000Z

231

Applications of agent based simulation  

Science Conference Proceedings (OSTI)

This paper provides a survey and analysis of applications of Agent Based Simulation (ABS). A framework for describing and assessing the applications is presented and systematically applied. A general conclusion from the study is that even if ABS seems ...

Paul Davidsson; Johan Holmgren; Hans Kyhlbck; Dawit Mengistu; Marie Persson

2006-05-01T23:59:59.000Z

232

ACTILOG: An Agent Activation Language  

Science Conference Proceedings (OSTI)

ACTILOG is a language to write generalized condition action activation rules. We propose it as an alternative and a complement to OPENLOG [6], another agent logic programming language for an abductive reasoner. We want to show how implications (conditional ...

Jacinto A. Dvila

2003-01-01T23:59:59.000Z

233

Triggered pore-forming agents  

DOE Patents (OSTI)

An inactive pore-forming agent which is activated to lytic function by a condition such as pH, light, heat, reducing potential, or metal ion concentration, or substance such as a protease, at the surface of a cell.

Bayley, Hagan (Grafton, MA); Walker, Barbara J. (Auburn, MA); Chang, Chung-yu (Worcester, MA); Niblack, Brett (Nashville, TN); Panchal, Rekha (Shrewsbury, MA)

1998-01-01T23:59:59.000Z

234

Information needs in agent teamwork  

Science Conference Proceedings (OSTI)

Members of effective human teams can often anticipate information needs of teammates and offer relevant information to them proactively. Such capabilities are highly desirable for agent teams to achieve better teamwork processes for supporting information ...

John Yen; Xiaocong Fan; Richard A. Volz

2004-12-01T23:59:59.000Z

235

Behavior-based remote executing agents  

E-Print Network (OSTI)

remote execution semantics, and intermediary commu- nication handling)remote, more advantageous, location. ReAgents simplify the use of mobile agent technology by transparently handling

Hung, Eugene

2006-01-01T23:59:59.000Z

236

Toxic Chemical Agent Decontamination Emulsions, Their ...  

U.S. Energy Information Administration (EIA)

This invention is related to decontaminating agents and amethod for the decontamination of ... which have been contaminated with toxic chemical agents ...

237

Nuclear magnetic resonance contrast agents  

DOE Patents (OSTI)

This invention relates to the field of nuclear magnetic resonance imaging and nuclear magnetic resonance spectroscopy, also known simply as magnetic resonance imaging (MRI) and magnetic resonance spectroscopy (MRS). MRI and MRS are particularly useful in medical research and diagnosis. MRI may be used in addition to x-ray imaging. This invention concerns a family of contrast agents for use in magnetic resonance imaging and a method of enhancing the contrast of magnetic resonance images of an object by incorporating a contrast agent of this invention into the object prior to forming the images or during formation of the images. A contrast agent of this invention is a paramagnetic lanthanide hexaazamacrocyclic molecule, where a basic example has the formula LnC{sub 16}H{sub 14}N{sub 6}. Important applications of the invention are in medical diagnosis, treatment, and research, where images of portions of a human body are formed by means of magnetic resonance techniques. 2 figs.

Smith, P.H.; Brainard, J.R.; Jarvinen, G.D.; Ryan, R.R.

1989-01-24T23:59:59.000Z

238

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 8, 2013 March 8, 2013 V-107: Wireshark Multiple Denial of Service Vulnerabilities Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). March 7, 2013 V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions. March 6, 2013 V-105: Google Chrome Multiple Vulnerabilities Multiple vulnerabilities have been reported in Google Chrome March 5, 2013 V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Oracle Java March 4, 2013 V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication

239

Specifying and reasoning about uncertain agents  

Science Conference Proceedings (OSTI)

Logical formalisation of agent behaviour is desirable, not only in order to provide a clear semantics of agent-based systems, but also to provide the foundation for sophisticated reasoning techniques to be used on, and by, the agents themselves. The ... Keywords: Agents, Decision procedure, Knowledge and belief, Probabilistic modal logic

Nivea de Carvalho Ferreira; Michael Fisher; Wiebe van der Hoek

2008-09-01T23:59:59.000Z

240

Agent communication pragmatics: the cognitive coherence approach  

Science Conference Proceedings (OSTI)

Different approaches have investigated the syntax and semantics of agent communication languages. However, these approaches have not indicated how agents should dynamically use communications. Instead of filling this pragmatics gap, most approaches have ... Keywords: Agent communication language, Cognitive coherence, Dialogue games, Multi-agents systems, Pragmatics, Social commitments

Philippe Pasquier; Brahim Chaib-Draa

2005-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Universal Parsing Agent - Available Technologies - PNNL  

Search PNNL. PNNL Home; About; Research; Publications; Jobs; News; Contacts; Universal Parsing Agent ...

242

Chemical agent decontamination composition comprising a ...  

U.S. Energy Information Administration (EIA)

Title: Chemical agent decontamination composition comprising a perfluorinated alkyl bromide Date: 05/13/2008

243

A Roadmap of Agent Research and Development  

Science Conference Proceedings (OSTI)

This paper provides an overview of research and development activities in the field of autonomous agents and multi-agent systems. It aims to identify key concepts and applications, and to indicate how they relate to one-another. Some historical context ... Keywords: autonomous agents, history, multi-agent systems

Nicholas R. Jennings; Katia Sycara; Michael Wooldridge

1998-01-01T23:59:59.000Z

244

Introductory Notes on AgentIntroductory Notes on Agent--Based Modeling,Based Modeling, AgentAgent--Oriented Programming, & AMESOriented Programming, & AMES  

E-Print Network (OSTI)

with methods that act on this data -Global regularities arise from the interactions of distributed agents #12,...) - Physical entities (weather, landscape, electric grids,...) #12;5 Partial depiction of agents a system as a collection of interacting "agents" -Each agent is an entity encapsulating data together

Tesfatsion, Leigh

245

Agent Tcl: Alpha Release 1.1  

E-Print Network (OSTI)

Agent Tcl is a transportable agent system. The agents are written in an extended version of the Tool Command Lanuage (Tcl). Each agent can suspend its execution at an arbitrary point, transport to another machine and resume execution on the new machine. This migration is accomplished with the agent jump command. agent jump captures the current state of the Tcl script and transfers this state to the destination machine. The state is restored on the new machine and the Tcl script continues its execution from the command immediately after the agent jump. In addition to migration, agents can send messages to each other and can establish direct connections. A direct connection is more efficient than message passing for bulk data transfer. Finally, agents can use the Tk toolkit to create graphical user interfaces on their current machine. Agent Tcl is implemented as two components. The first component is an extended Tcl interpreter. The second component is a server which runs on each machine...

Robert Gray

1995-01-01T23:59:59.000Z

246

A security solution for IEEE 802.11's ad hoc mode: password-authentication and group Diffie Hellman key exchange  

Science Conference Proceedings (OSTI)

IEEE 802 standards ease the deployment of networking infrastructures and enable employers to access corporate networks while travelling. These standards provide two modes of communication called infrastructure and ad hoc modes. A security solution for ... Keywords: Diffie Hellman, IEEE 80211, ad hoc networks, cryptography, dictionary attacks, group key exchange, mobile networks, network security, password authentication, provable security, random oracles, wireless networks

Emmanuel Bresson; Olivier Chevassut; David Pointcheval

2007-05-01T23:59:59.000Z

247

Limonene and tetrahydrofurfuryl alcohol cleaning agent  

DOE Patents (OSTI)

The present invention is a tetrahydrofurfuryl alcohol and limonene or terpineol cleaning agent and method for formulating and/or using the cleaning agent. This cleaning agent effectively removes both polar and nonpolar contaminants from various electrical and mechanical parts and is readily used without surfactants, thereby reducing the need for additional cleaning operations. The cleaning agent is warm water rinsable without the use of surfactants. The cleaning agent can be azeotropic, enhancing ease of use in cleaning operations and ease of recycling.

Bohnert, George W. (Harrisonville, MO); Carter, Richard D. (Lee' s Summit, MO); Hand, Thomas E. (Lee' s Summit, MO); Powers, Michael T. (Santa Rosa, CA)

1996-05-07T23:59:59.000Z

248

Limonene and tetrahydrofurfurly alcohol cleaning agent  

DOE Patents (OSTI)

The present invention is a tetrahydrofurfuryl alcohol and limonene cleaning agent and method for formulating and/or using the cleaning agent. This cleaning agent effectively removes both polar and nonpolar contaminants from various electrical and mechanical parts and is readily used without surfactants, thereby reducing the need for additional cleaning operations. The cleaning agent is warm water rinsable without the use of surfactants. The cleaning agent can be azeotropic, enhancing ease of use in cleaning operations and ease of recycling.

Bohnert, George W. (Harrisonville, MO); Carter, Richard D. (Lee' s Summit, MO); Hand, Thomas E. (Lee' s Summit, MO); Powers, Michael T. (Santa Rosa, CA)

1997-10-21T23:59:59.000Z

249

Limonene and tetrahydrofurfuryl alcohol cleaning agent  

DOE Patents (OSTI)

The present invention is a tetrahydrofurfuryl alcohol and limonene cleaning agent and method for formulating and/or using the cleaning agent. This cleaning agent effectively removes both polar and nonpolar contaminants from various electrical and mechanical parts and is readily used without surfactants, thereby reducing the need for additional cleaning operations. The cleaning agent is warm water rinsable without the use of surfactants. The cleaning agent can be azeotropic, enhancing ease of use in cleaning operations and ease of recycling.

Bohnert, G.W.; Carter, R.D.; Hand, T.E.; Powers, M.T.

1997-10-21T23:59:59.000Z

250

Nucleotide cleaving agents and method  

DOE Patents (OSTI)

The present invention provides a unique series of nucleotide cleaving agents and a method for cleaving a nucleotide sequence, whether single-stranded or double-stranded DNA or RNA, using and a cationic metal complex having at least one polydentate ligand to cleave the nucleotide sequence phosphate backbone to yield a hydroxyl end and a phosphate end.

Que, Jr., Lawrence (Roseville, MN); Hanson, Richard S. (Falcon Heights, MN); Schnaith, Leah M. T. (Redwing, MN)

2000-01-01T23:59:59.000Z

251

Intelligent agents for pandemic modeling  

Science Conference Proceedings (OSTI)

Pandemic scenarios are very complex due to the wide number of variables and critical aspects which have to be considered. In fact these phenomena evolve quickly with strong inertia and influence of stochastic components (i.e. mutation, human decisions, ... Keywords: health care modeling, human behavior, intelligent agents, pandemic

Agostino G. Bruzzone; Marina Massei; Francesca Madeo; Federico Tarone; Julija Petuhova

2011-04-01T23:59:59.000Z

252

Artificial Agent Action in Markets  

Science Conference Proceedings (OSTI)

We summarise our experiences of a number of demonstrators and simulation experiments designed to test the feasibility of using artificial decision making agents in real-time domains, and comment on the significance of our results to autonomous artificial ... Keywords: norm, pronouncer, real-time decision making, simulation, trust

2001-02-01T23:59:59.000Z

253

Optimal reorganization of agent formations  

Science Conference Proceedings (OSTI)

In this article we address the problem of determining how a structured formation of autonomous undistinguishable agents can be reorganized into another, eventually non-rigid, formation based on changes in the environment, perhaps unforeseeable. The methodology ... Keywords: combinatorial optimization, dynamic programming, formation reorganization

Dalila B. M. M. Fontes; Fernando A. C. C. Fontes

2008-09-01T23:59:59.000Z

254

Agent Tcl: A exible and secure mobile-agent Submitted to the Faculty  

E-Print Network (OSTI)

Agent Tcl: A exible and secure mobile-agent system A Thesis Submitted to the Faculty in partial ful malicious machines), and insulating the agent against network and machine failures. Agent Tcl is a mobile-agent system under development at Dartmouth College that has evolved from a Tcl-only system into a multiple

255

Multi-agent Infrastructure, Agent Discovery, Middle Agents for Web Services and Interoperation  

Science Conference Proceedings (OSTI)

This chapter has two parts. In Part I, we present an overview of issues in modeling Multi Agent Systems (MAS), discuss what features and components are required for a MAS infrastructure, and present a model of a generic infrastructure. In addition, we ...

Katia P. Sycara

2001-07-01T23:59:59.000Z

256

Agent Tcl: Alpha Release 1.1  

E-Print Network (OSTI)

Agent Tcl is a transportable agent system. The agents are written in an extended version of the Tool Command Lanuage (Tcl). Each agent can suspend its execution at an arbitrary point, transport to another machine and resume execution on the new machine. This migration is accomplished with the agent jump command. agent jump captures the current state of the Tcl script and transfers this state to the destination machine. The state is restored on the new machine and the Tcl script continues its execution from the command immediately after the agent jump. In addition to migration, agents can send messages to each other and can establish direct connections. A direct connection is more efficient than message passing for bulk data transfer. Finally, agents can use the Tk toolkit to create graphical user interfaces on their current machine. Agent Tcl is implemented as two components. The first component is an extended Tcl interpreter. The second component is a server which runs on each machine. The server accepts incoming agents, messages and connection requests and keeps track of the agents that are running on its machine. An alpha release of Agent Tcl is available for public use. This documentation describes how to obtain and compile the source code, how to run the server and how to write transportable agents.

Robert Gray Department; Robert S. Gray

1995-01-01T23:59:59.000Z

257

U-044: HP Operations Agent and Performance Agent Lets Local Users Access a  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

44: HP Operations Agent and Performance Agent Lets Local Users 44: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory U-044: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory November 23, 2011 - 8:00am Addthis PROBLEM: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory. PLATFORM: HP Operations Agent v11.00 and Performance Agent v4.73, v5.0 for AIX, HP-UX, Linux, and Solaris ABSTRACT: A local user can access a directory on the target system. reference LINKS: HP Security Bulletin Document ID: c03091656 CVE-2011-4160 SecurityTracker Alert ID: 1026345 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP Operations Agent and Performance Agent. A local user can access data on the target system. A local user can gain

258

An Agent Based Classification Model  

E-Print Network (OSTI)

The major function of this model is to access the UCI Wisconsin Breast Can- cer data-set[1] and classify the data items into two categories, which are normal and anomalous. This kind of classifi cation can be referred as anomaly detection, which discriminates anomalous behaviour from normal behaviour in computer systems. One popular solution for anomaly detection is Artifi cial Immune Sys- tems (AIS). AIS are adaptive systems inspired by theoretical immunology and observed immune functions, principles and models which are applied to prob- lem solving. The Dendritic Cell Algorithm (DCA)[2] is an AIS algorithm that is developed specifi cally for anomaly detection. It has been successfully applied to intrusion detection in computer security. It is believed that agent-based mod- elling is an ideal approach for implementing AIS, as intelligent agents could be the perfect representations of immune entities in AIS. This model evaluates the feasibility of re-implementing the DCA in an agent-based simulation environ- ...

Gu, Feng; Greensmith, Julie

2009-01-01T23:59:59.000Z

259

Introducing the tileworld: experimentally evaluating agent architectures  

Science Conference Proceedings (OSTI)

We describe a system called Tileworld, which consists of a simulated robot agent and a simulated environment which is both dynamic and unpredictable. Both the agent and the environment are highly parameterized, enabling one to control certain characteristics ...

Martha E. Pollack; Marc Ringuette

1990-07-01T23:59:59.000Z

260

Chelating agents for technetium-99M  

DOE Patents (OSTI)

The present invention relates to a novel family of Technetium chelating agents (ligands) based upon amide and mercaptide donor groups.

Fritzberg, A.R.; Kasina, S.

1987-06-02T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Chelating agents for technetium-99M  

DOE Patents (OSTI)

The present invention relates to a novel family of Technetium chelating agents (ligands) based upon amide and mercaptide donor groups.

Fritzberg, Alan R. (Salt Lake City, UT); Kasina, Sudhakar (Salt Lake City, UT)

1987-01-01T23:59:59.000Z

262

Chemical Warfare Agent Decontamination Foaming Composition And ...  

U.S. Energy Information Administration (EIA)

Field of the InventionThe present invention relates to foaming chemical warfare agent decontamination compositions. More particularly, ...

263

Handbook of Chemical and Biological Warfare Agent ...  

U.S. Energy Information Administration (EIA)

Description. Chemical and biological warfare agents are threats to the military and civilians alike in both terrorist and conventional warfare ...

264

Handbook of Chemical and Biological Warfare Agent ...  

U.S. Energy Information Administration (EIA)

Handbook of Chemical and Biological Warfare Agent Decontamination: George O. Bizzigolli, Richard P. Rhoads, Stephen J. Lee: 9781906799069: Books - ...

265

Extinguishing agent for combustible metal fires  

DOE Patents (OSTI)

A low chloride extinguishing agent for combustible metal fires comprising from substantially 75 to substantially 94 weight percent of sodium carbonate as the basic fire extinguishing material, from substantially 1 to substantially 5 weight percent of a water-repellent agent such as a metal stearate, from substantially 2 to substantially 10 weight percent of a flow promoting agent such as attapulgus clay, and from substantially 3 to substantially 15 weight percent of a polyamide resin as a crusting agent.

Riley, John F. (Menominee, MI); Stauffer, Edgar Eugene (Wallace, MI)

1976-10-12T23:59:59.000Z

266

Intelligent agents for QoS management  

Science Conference Proceedings (OSTI)

This paper addresses the structural and behavioral characteristics of multi-agent system (MAS) for Quality of Service (QoS) management using MESSAGE (Methodology for Engineering Systems of Software Agents) modeling language that extends UML (Unified ... Keywords: MESSAGE/UML, QoS management, intelligent agents

Krunoslav Trzec; Darko Huljenic

2002-07-01T23:59:59.000Z

267

Rational Coordination in Multi-Agent Environments  

Science Conference Proceedings (OSTI)

We adopt the decision-theoretic principle of expected utility maximization as a paradigm for designing autonomous rational agents, and present a framework that uses this paradigm to determine the choice of coordinated action. We endow an agent with a ... Keywords: agent modeling, coordination, decision theory, game theory, rationality

Piotr J. Gmytrasiewicz; Edmund H. Durfee

2000-12-01T23:59:59.000Z

268

Managing trust in distributed agent systems  

Science Conference Proceedings (OSTI)

Software agent technology has attracted much attention for developing various distributed systems, composed of autonomous agents interacting with one another using particular mechanisms and protocols. Such systems provide high-level reconfigurability, ... Keywords: distributed agent systems, security, situation-awareness, trust, trust management

Stephen S. Yau

2006-09-01T23:59:59.000Z

269

An Agent Model for Personal Development Support  

Science Conference Proceedings (OSTI)

This paper introduces an agent-based support model for leadership, which can be used by an ambient system to support a leader in the development of his team member(s). Using model-based reasoning, an intelligent agent analyses the development level of ... Keywords: leadership, agent-based support model

Tibor Bosse; Rob Duell; Zulfiqar A. Memon; Jan Treur; C. Natalie van der Wal

2009-09-01T23:59:59.000Z

270

Hydroxypyridonate chelating agents and synthesis thereof  

DOE Patents (OSTI)

Chelating agents having 1-hydroxy-2-pyridinone (HOPO) and related moieties incorporated within their structures, including polydentate HOPO-substituted polyamines such as spermidine and spermine, and HOPO-substituted desferrioxamine. The chelating agents are useful in selectively removing certain cations from solution, and are particularly useful as ferric ion and actinide chelators. Novel syntheses of the chelating agents are provided. 4 tabs.

Raymond, K.N.; Scarrow, R.C.; White, D.L.

1985-11-12T23:59:59.000Z

271

Multiple Bypass: Interposition Agents for Distributed Computing  

Science Conference Proceedings (OSTI)

Interposition agents are a well-known device for attaching legacy applications to distributed systems. However, agents are difficult to build and are often large, monolithic pieces of software which are suited only to limited applications or systems. ... Keywords: distributed system, interposition agent, remote execution

Douglas Thain; Miron Livny

2001-03-01T23:59:59.000Z

272

On Mobile Agents Resistance to Traffic Analysis  

Science Conference Proceedings (OSTI)

This paper will concern itself with a formulation of a traffic analysis problem for mobile agents. It is an interesting theoretical problem as well as a critical feature when using agents on a massive scale in decision making systems. The decision making ... Keywords: Mobile agents security, security protocols, side channel attacks, traffic analysis

Kamil Kulesza; Zbigniew Kotulski; Konrad Kulesza

2006-01-01T23:59:59.000Z

273

Effectiveness of Intrinsically Motivated Adaptive Agent for Sustainable Human-Agent Interaction  

Science Conference Proceedings (OSTI)

To achieve sustainable human-agent interaction (HAI), we proposed a new model of intrinsically motivated adaptive agent, which learns about the human partner and behaves to satisfy its intrinsic motivation. To investigate the model's effectiveness, ... Keywords: Human-agent interaction (HAI), adaptive agent, intrinsic motivation, near-infrared spectroscopy (NIRS), reinforcement learning

Takayuki Nozawa; Toshiyuki Kondo

2009-12-01T23:59:59.000Z

274

D'Agents: applications and performance of a mobile-agent system  

Science Conference Proceedings (OSTI)

D'Agents is a general-purpose mobile-agent system that has been used in several information-retrieval applications. In this paper, we first examine one such application, operational support for military field personnel, where D'Agents greatly simplifies ... Keywords: mobile agents, mobile code, performance, scalability

Robert S. Gray; George Cybenko; David Kotz; Ronald A. Peterson; Daniela Rus

2002-05-01T23:59:59.000Z

275

Integrating the Havana agent platform into the existing web infrastructure  

Science Conference Proceedings (OSTI)

Mobile software agents represent an ideal mechanism for dealing with information overload and disconnected computing. Currently, however, they are not integrated into the existing web infrastructure and therefore no websites are agent-enabled. Two ... Keywords: MAS, agent gateway, agent integration, agent-based systems, business incentives, disconnected computing, information overload, internet, mobile agents, multi-agent systems, security, software agents, web agents, web infrastructure

Qusay H. Mahmoud; Leslie Yu

2010-10-01T23:59:59.000Z

276

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 21, 2011 March 21, 2011 T-584: Microsoft March 2011 Security Bulletin Release Microsoft released 3 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. March 17, 2011 T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products. March 14, 2011 T-577: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat

277

Distributed Resources and Intelligent Agents - CECM  

E-Print Network (OSTI)

Distributed Resources and Intelligent Agents. Scientific collaboration ... This can also be expected of all of the third-generation web languages. The rest of this...

278

Intelligent Software Agents for Enhancing Sensor Networks ...  

Technology Marketing Summary Intelligent software agents developed by ORNL researchers can be used with sensor networks in distributed and centralized computing ...

279

Chemical Warfare Agent Decontamination Solution - Patent 5859064  

U.S. Energy Information Administration (EIA)

... and softens and removes paint.A need exists for a chemical warfare agent decontamination solution which is noncorrosive, nontoxic, nonflammable, ...

280

Handbook of Chemical and Biological Warfare Agent ...  

U.S. Energy Information Administration (EIA)

Chemical and biological warfare agents are continuing threats to the military on the battlefield as well as to civilians in the form of terrorist ...

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Chemical Agent Decontamination Composition Comprising A ...  

U.S. Energy Information Administration (EIA)

Chemical warfare agents are stockpiled ... but also in today's climate of terrorist threats of WMD chemical attacks.Methods for decontamination of che ...

282

Handbook of chemical and biological warfare agent ...  

U.S. Energy Information Administration (EIA)

Get this from a library! Handbook of chemical and biological warfare agent decontamination. [George O Bizzigotti; et al] -- "A one-stop reference ...

283

EVALUATION OF SELECTED NFPA 2001 AGENTS FOR ...  

Science Conference Proceedings (OSTI)

... This is a typical energy level ... "V I 2001 Agents,;' 1993 CFC & Halon Alternatives CGnference, Hilton Hotel, Washington, DC, 20-22 Oct. 1993. ...

2011-10-13T23:59:59.000Z

284

Crossing the agent technology chasm: Lessons, experiences and challenges in commercial applications of agents  

Science Conference Proceedings (OSTI)

Agent software technologies are currently still in an early stage of market development, where, arguably, the majority of users adopting the technology are visionaries who have recognized the long-term potential of agent systems. Some current adopters ...

Steve Munroe; Tim Miller; Roxana A. Belecheanu; Michal P?chou?ek; Peter McBurney; Michael Luck

2006-12-01T23:59:59.000Z

285

Multi-agent neural business control system  

Science Conference Proceedings (OSTI)

Small to medium sized companies require a business control mechanism in order to monitor their modus operandi and analyse whether they are achieving their goals. A tool for the decision support process was developed based on a multi-agent system that ... Keywords: Agents technology, Business control system, Case-based reasoning, Experience management, Maximum Likelihood Hebbian Learning, Reasoning

M. Lourdes Borrajo; Juan M. Corchado; Emilio S. Corchado; Mara A. Pellicer; Javier Bajo

2010-03-01T23:59:59.000Z

286

Evolutionary virtual agent at an exhibition  

Science Conference Proceedings (OSTI)

This paper describes the Evolutionary Virtual Agent (EVA) prototype designed as an interactive entertainment system for a multimedia exhibition. This implementation uses a behavioral engine based on a dynamical subsumption architecture and a 3D animated ... Keywords: conversational character, intelligent agent, physical model, virtual creature

Jean-Claude Heudin

2007-09-01T23:59:59.000Z

287

Fault reconnaissance agent for sensor networks  

Science Conference Proceedings (OSTI)

One of the key prerequisite for a scalable, effective and efficient sensor network is the utilization of low-cost, low-overhead and high-resilient fault-inference techniques. To this end, we propose an intelligent agent system with a problem solving ... Keywords: Management, expectation maximization algorithm, intelligent agents, wireless sensor networks

Elhadi M. Shakshuki; Xinyu Xing; Tarek R. Sheltami

2010-08-01T23:59:59.000Z

288

Improving Multi-Agent Architectural Design  

Science Conference Proceedings (OSTI)

Agents provide developers with a flexible way to structure systems around autonomous, communicating elements. To support the efficient development of such systems, design techniques need to be introduced. In this context, we propose an extension of the ... Keywords: Architectural Design, Multi-Agent Systems

Carla Silva; Jaelson Castro; Patrcia Tedesco; Joo Arajo; Ana Moreira; John Mylopoulos

2007-02-01T23:59:59.000Z

289

Animated Agents in K-12 Outreach: Preferred Agent Characteristics Across Developmental Levels  

E-Print Network (OSTI)

M. Johnson, Matthew DiDonato, and Martin Reisslein School of Electrical, Computer, and Energy Eng methodology: agent gender, age, realism, clothing, personality, speech pace, and tutoring approach. A total potential to influence the effectiveness of the agent. External properties include agent age, gender

Reisslein, Martin

290

Inter-agent cooperation and communication for agent-based robust dynamic scheduling in steel production  

Science Conference Proceedings (OSTI)

This paper describes a negotiation protocol proposed for inter-agent cooperation in a multi-agent system that we developed for optimisation and dynamic integrated scheduling within steel production. The negotiation protocol is a two-level bidding mechanism ... Keywords: Contract net protocol, Cooperation and coordination, Dynamic scheduling, Multi-agent systems, Robust scheduling, Steel production

D. Ouelhadj; S. Petrovic; P. I. Cowling; A. Meisels

2004-07-01T23:59:59.000Z

291

Blasting agent for blasting in hot boreholes  

SciTech Connect

A blasting agent is described which is resistant to decomposition when exposed to elevated temperatures (e.g., 325 to 350 F) for 24 hr. It is composed of an inorganic oxidizing salt such as ammonium nitrate; a high-boiling liquid oxygen-containing organic fuel, e.g., dibutyl phthalate; a densifying agent such as ferrophosphorus and a coating agent such as calcium stearate. A primer assembly contains the thermally stable blasting agent in a cartridge can. The assembly has a well at one end containing a high-explosive booster attached to high-energy detonating cord, which is in initiating relationship with a blasting cap. The metal-cartridged blasting agent and primer assembly are useful for blasting in hot boreholes, which can be either wet or dry. 9 claims.

Schaefer, W.E.

1974-06-25T23:59:59.000Z

292

FRAMEWORK FOR AGENT-BASED ROLE DELEGATION  

E-Print Network (OSTI)

This paper describes a framework for addressing the administration of role delegation introduced in the wellknown role-based access control model (RBAC). More specifically, this paper describes how a third party, called an agent, can administer the delegation of roles on behalf of a user who is a member of a certain role and wishes to delegate his role to another user who belongs to another role. Furthermore, this paper describes a framework of reference to systematically address the diverse manifestations of the agent-based delegation, such as Role participant agent, Non-role participant agent, Static, and Dynamic types of delegation and introduces an agent-based delegation model that illustrates delegation based on non-role participant delegation.

Ezedin Barka; Ravi Sandhu

2007-01-01T23:59:59.000Z

293

Multi-Agent Simulation Using SWARM  

E-Print Network (OSTI)

The field of social simulation and agent base simulation modelling techniques is growing. With it grows the need for simulation tools. A way to reduce the effort of software development is to utilize generlized agent developmet tools. Today there exists tools that are based on the object oriented paradigm that provide libraries and graphical wizards. In this paper we introduce the Swarm tool. It was developed at the Santa Fe Institute. It is an agent simulation tool designed to help researchers in building multi-agent simulation models. It also offers a useful graphical representation of the simulation results. A brief overview of the steps to build agent based models is also represented. 1.

Course Name Agent-based; Ibrahim Jadalowen

2003-01-01T23:59:59.000Z

294

Mutual Valuations Between Agents And Their Coalitions  

E-Print Network (OSTI)

Introduction The notions of norms, coalitions and agents raise a lot of interesting questions. What makes agents form coalitions? When are new agents in a MAS considered to be members in a coalition? And when does a coalition think it might be time for certain agents to leave? Can we design agents in such a way that they will continuously improve and strengthen the coalitions that they are part of? Does the size of the coalition matter? Not all of these questions will be treated here, but we will try to provide some thoughts on things such as the value of a coalition having a certain agent as a member, continuous degrees of membership, and whether cheating is possible in such models. The question of whether to cooperate or not is not new. People in the area of game theory, e.g. Lloyd Shapley discussed the matter of values and alternative costs in n-person games already in the fifties. 1 He argued that the value of a cooperating agent is directly associated with the alternative cost

Stefan J. Johansson

1999-01-01T23:59:59.000Z

295

Natural chelating agents for radionuclide decorporation  

DOE Patents (OSTI)

This invention relates to the production of metal-binding compounds useful for the therapy of heavy metal poisoning, for biological mining and for decorporation of radionuclides. The present invention deals with an orderly and effective method of producing new therapeutically effective chelating agents. This method uses challenge biosynthesis for the production of chelating agents that are specific for a particular metal. In this approach, the desired chelating agents are prepared from microorganisms challenged by the metal that the chelating agent is designed to detoxify. This challenge induces the formation of specific or highly selective chelating agents. The present invention involves the use of the challenge biosynthetic method to produce new complexing/chelating agents that are therapeutically useful to detoxify uranium, plutonium, thorium and other toxic metals. The Pseudomonas aeruginosa family of organisms is the referred family of microorganisms to be used in the present invention to produce the new chelating agent because this family is known to elaborate strains resistant to toxic metals.

Premuzic, E.T.

1985-06-11T23:59:59.000Z

296

Towards a Reference Model for Surveying Mobile Agent Systems  

Science Conference Proceedings (OSTI)

There are increasing numbers of systems and research projects involving software agents and mobile agents. However, there is no reference model or conceptual framework to compare the resulting systems. In this paper, we propose a reference model to identify, ... Keywords: agent-based applications, mobile agent systems, mobile agents

Alberto Rodrigues Silva; Artur Romo; Dwight Deugo; Miguel Mira Da Silva

2001-09-01T23:59:59.000Z

297

Provision of agent-based health care services  

Science Conference Proceedings (OSTI)

In the last years there has been a growing interest worldwide in the application of agent technology for providing dynamic, flexible, and compound services. In this paper we report the design and implementation of a multi-agent system that provides health ... Keywords: Agents, co-ordination in multi-agent systems, data confidentiality, health care, medical ontologies, multi-agent systems, scheduling, security

Antonio Moreno; David Isern; David Snchez

2003-08-01T23:59:59.000Z

298

Embedded Agents for District Heating Management  

Science Conference Proceedings (OSTI)

We investigate the applicability of multi-agent systems as a control approach for district heating systems. The consumers, i.e., the heat exchange systems, in current district heating systems are purely reactive devices without communication capabilities. ...

Paul Davidsson; Fredrik Wernstedt

2004-07-01T23:59:59.000Z

299

MINERVA - A Dynamic Logic Programming Agent Architecture  

Science Conference Proceedings (OSTI)

The agent paradigm, commonly implemented by means of imperative languages mainly for reasons of efficiency, has recently increased its influence in the research and development of computational logic based systems. Since efficiency is not always the ...

Joo Alexandre Leite; Jos Jlio Alferes; Lus Moniz Pereira

2001-08-01T23:59:59.000Z

300

SPECIFIC SEQUESTERING AGENTS FOR THE ACTINIDES  

E-Print Network (OSTI)

for the actinides. Two tetra-catechol chelating agents wereprotons. The acidity of the catechol groups can be increased43 and 46. Figure 4. catechol aqueous solution, on a hanging

Raymond, Kenneth N.

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Semantically federating multi-agent organizations  

Science Conference Proceedings (OSTI)

We believe that successful co-operation between multi-agent systems providing services in a specific domain can be realized by constructing an infrastructure that supports the semantic interoperability between them. In this paper , we introduce a conceptual ...

Riza Cenk Erdur; Oguz Dikenelli; Inan Seylan; nder Grcan

2004-10-01T23:59:59.000Z

302

Agent-Based Modeling of Intracellular Transport  

E-Print Network (OSTI)

We develop an agent-based model of the motion and pattern formation of vesicles. These intracellular particles can be found in four different modes of (undirected and directed) motion and can fuse with other vesicles. While the size of vesicles follows a log-normal distribution that changes over time due to fusion processes, their spatial distribution gives rise to distinct patterns. Their occurrence depends on the concentration of proteins which are synthesized based on the transcriptional activities of some genes. Hence, differences in these spatio-temporal vesicle patterns allow indirect conclusions about the (unknown) impact of these genes. By means of agent-based computer simulations we are able to reproduce such patterns on real temporal and spatial scales. Our modeling approach is based on Brownian agents with an internal degree of freedom, $\\theta$, that represents the different modes of motion. Conditions inside the cell are modeled by an effective potential that differs for agents dependent on their...

Birbaumer, Mirko; 10.1140/epjb/e2011-20283-x

2011-01-01T23:59:59.000Z

303

The EO-1 Autonomous Science Agent  

Science Conference Proceedings (OSTI)

An Autonomous Science Agent is currently flying onboard the Earth Observing One Spacecraft. This software enables the spacecraft to autonomously detect and respond to science events occurring on the Earth. The package includes software systems that perform ...

Steve Chien; Rob Sherwood; Daniel Tran; Benjamin Cichy; Gregg Rabideau; Rebecca Castano; Ashley Davies; Rachel Lee; Dan Mandl; Stuart Frye; Bruce Trout; Jerry Hengemihle; Jeff D'Agostino; Seth Shulman; Stephen Ungar; Thomas Brakke; Darrell Boyer; Jim Van Gaasbeck; Ronald Greeley; Thomas Doggett; Victor Baker; James Dohm; Felipe Ip

2004-07-01T23:59:59.000Z

304

Fuzzy coalition formation among rational cooperative agents  

Science Conference Proceedings (OSTI)

Formation of coalitions in multi-agent systems (MAS) enables the development of efficient organizations. In the article, a model of fuzzy cooperative game with coalitions is described. It extends the model of the fuzzy coalition game with associated ...

Leonid B. Sheremetov; Jos C. Romero Corts

2003-06-01T23:59:59.000Z

305

Precursors to radiopharmaceutical agents for tissue imaging  

DOE Patents (OSTI)

A class of radiolabeled compounds to be used in tissue imaging that exhibits rapid brain uptake, good brain:blood radioactivity ratios, and long retention times. The imaging agents are more specifically radioiodinated aromatic amines attached to dihydropyridine carriers, that exhibit heart as well as brain specificity. In addition to the radiolabeled compounds, classes of compounds are also described that are used as precursors and intermediates in the preparation of the imaging agents.

Srivastava, Prem C. (Oak Ridge, TN); Knapp, Jr., Furn F. (Oak Ridge, TN)

1988-01-01T23:59:59.000Z

306

Achieving the promise of reuse with agent components  

Science Conference Proceedings (OSTI)

Using software agents as next generation flexible components and applying reuse technologies to rapidly construct agents and agent systems have great promise to improve application and system construction. Whether built on conventional distributed computing ...

Martin L. Griss; Robert R. Kessler

2003-01-01T23:59:59.000Z

307

Timed mobile agent planning for distributed information retrieval  

Science Conference Proceedings (OSTI)

The most significant performance factors in Mobile Agent Planning (MAP) ARE; (a) the number of mobile agents, (b) the total routing time consumed by the participated agents, and (c) the time constraints, (such as information ready time and deadline triggered ...

Jin-Wook Baek; Gyu-Tae Kim; Heon-Young Yeom

2001-05-01T23:59:59.000Z

308

ARM - Central Authentication Service  

NLE Websites -- All DOE Office Websites (Extended Search)

History History Organization Participants Facility Statistics Forms Contacts Research Themes Research Highlights Journal Articles Collaborations Atmospheric System Research (ASR) Propose a Campaign Submitting Proposals: Guidelines Featured Campaigns Campaign Data List of Campaigns Aerial Facility Mobile Facilities North Slope of Alaska Southern Great Plains Tropical Western Pacific Eastern North Atlantic Location Table Contacts Instrument Datastreams Value-Added Products PI Data Products Field Campaign Data Related Data Data Plots Data Policy Data Documentation Data Gathering and Delivery Data Quality Data Tools Data Archive Data Management Facility External Data Center Features and Releases Facility News Blogs: Air Time & Field Notes Meetings and Events Employment Research Highlights Data Announcements

309

Pretty good packet authentication  

Science Conference Proceedings (OSTI)

Internet addresses are routinely being used to infer the identity of persons who send offending traffic - a capability they were not designed to provide. As a result, problems abound: innocent users are being accused, while the culprits can easily avoid ...

Andreas Haeberlen; Rodrigo Rodrigues; Krishna Gummadi; Peter Druschel

2008-12-01T23:59:59.000Z

310

From Authentication to Authorization  

E-Print Network (OSTI)

PKIs focus on establishing a link between an entity and a key. Hence, PKIs provide a mechanism for entity identification by providing a link between an entity and a key. However, the real requirement in many systems is authorization, i.e., is a certain entity authorized to perform a specific action. For example, imagine a program for course registration at a university. Suppose a student, John Doe, wants to register for a graduate course in Computer Science. In order for a student to register for this course, he/she should be a graduate student in Computer Science or a undergraduate student with the requisite standing, e.g. a senior with GPA above 3.5. Therefore, the registration program needs to know that John Doe has the required credentials. In the PKI setting, John Doe will present a certificate (signed by a trusted certificate authority) which binds his identity to a key. This establishes that John Doe is interacting with the registration program. The program then consults a database to verify that John Doe has the required credentials. In this scenario, the PKI approach has the following disadvantages: Authorization decisions are adhoc

Somesh Jha

2001-01-01T23:59:59.000Z

311

CERTIFICATE OF AUTHENTICITY  

Energy.gov (U.S. Department of Energy (DOE))

I hereby certify that this transcript constitutes an accurate record of the full Council meeting of the National Coal Council held on November 14,2008 at the Westin Grand Hotel, Washington, D.C....

312

E-Authentication  

Science Conference Proceedings (OSTI)

... a more detailed discussion of these technologies. ... to constrict or constrain the development or use ... Identity Ecosystem will be developed through a ...

2013-08-01T23:59:59.000Z

313

NSLS II: Authentication Required  

NLE Websites -- All DOE Office Websites (Extended Search)

Project Pages Login Access to this area of the NSLS-II website requires a valid username and password. Username: Password: Next > Last Modified: April 2, 2013 Please forward all...

314

Dynamic mobile agent migration in Wireless Sensor Networks  

Science Conference Proceedings (OSTI)

Computing paradigm plays an important and fundamental role in collaborative processing in Wireless Sensor Networks (WSN). The client/server based paradigm and the mobile agent based paradigm are two popular computing models used to facilitate ... Keywords: WSN, ad hoc computing, ad hoc networks, agent-based systems, client-server computing, collaborative processing, computing paradigms, mobile agent computing, mobile agent itinerary, mobile agents, multi-agent systems, pervasive computing, sensor networks, simulation, ubiquitous computing, wireless networks

Yingyue Xu; Hairong Qi

2006-12-01T23:59:59.000Z

315

A deployed multi-agent framework for distributed energy applications  

Science Conference Proceedings (OSTI)

In this paper, we describe the adaptation of an open-source multi-agent platform for distributed energy applications and the trial deployment of resource-controller agents. The platform provides real-time, two-way communication and decision making between ... Keywords: applications of autonomous agents and multi-agent systems, collective and emergent agent behavior, frameworks, infrastructures and environments for agent systems

Geoff James; Dave Cohen; Robert Dodier; Glenn Platt; Doug Palmer

2006-05-01T23:59:59.000Z

316

Internal Evolution for Agent Cognition - Agent-Based Modelling of an Artificial Stock Market.  

E-Print Network (OSTI)

??Agent-Based Modeling (ABM) is a powerful simulation technique with applications in several fields, in particular social sciences. Artificial Stock Market (ASM), introduced by a group (more)

Hassanzadeh, Morteza

2011-01-01T23:59:59.000Z

317

Agent-based and multi-agent simulations: coming of age or in search of an identity?  

E-Print Network (OSTI)

An example of an agent-based model that implements decisionand environmental settings, agent-based models may have anwhat extent normative agent-based models are able to capture

Read, Dwight W

2010-01-01T23:59:59.000Z

318

Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems  

Science Conference Proceedings (OSTI)

The Autonomous Agents and MultiAgent Systems (AAMAS) conference series brings together researchers from around the world to share the latest advances in the field. It provides a highprofile and high-quality forum for research in the theory and practice ...

Maria Gini, Onn Shehory, Takayuki Ito, Catholijn Jonker

2013-05-01T23:59:59.000Z

319

Intelligent Software Agents: Sensor Integration and Response  

Science Conference Proceedings (OSTI)

Abstract In a post Macondo world the buzzwords are Integrity Management and Incident Response Management. The twin processes are not new but the opportunity to link the two is novel. Intelligent software agents can be used with sensor networks in distributed and centralized computing systems to enhance real-time monitoring of system integrity as well as manage the follow-on incident response to changing, and potentially hazardous, environmental conditions. The software components are embedded at the sensor network nodes in surveillance systems used for monitoring unusual events. When an event occurs, the software agents establish a new concept of operation at the sensing node, post the event status to a blackboard for software agents at other nodes to see , and then react quickly and efficiently to monitor the scale of the event. The technology addresses a current challenge in sensor networks that prevents a rapid and efficient response when a sensor measurement indicates that an event has occurred. By using intelligent software agents - which can be stationary or mobile, interact socially, and adapt to changing situations - the technology offers features that are particularly important when systems need to adapt to active circumstances. For example, when a release is detected, the local software agent collaborates with other agents at the node to exercise the appropriate operation, such as: targeted detection, increased detection frequency, decreased detection frequency for other non-alarming sensors, and determination of environmental conditions so that adjacent nodes can be informed that an event is occurring and when it will arrive. The software agents at the nodes can also post the data in a targeted manner, so that agents at other nodes and the command center can exercise appropriate operations to recalibrate the overall sensor network and associated intelligence systems. The paper describes the concepts and provides examples of real-world implementations including the Threat Detection and Analysis System (TDAS) at the International Port of Memphis and the Biological Warning and Incident Characterization System (BWIC) Environmental Monitoring (EM) Component. Technologies developed for these 24/7 operational systems have applications for improved real-time system integrity awareness as well as provide incident response (as needed) for production and field applications.

Kulesz, James J [ORNL; Lee, Ronald W [ORNL

2013-01-01T23:59:59.000Z

320

Microsoft Word - SMail_Secure_Web-Based_Email_v3 _2_.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

HQ OCIO Instructions for Using Secure Email (SMail) via HQ OCIO Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Version 4 April 2010 Office of the Associate CIO for IT Support Services United States Department of Energy DOE HQ OCIO Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Requirements SMail: 1. An Energy IT Services (EITS) provided Exchange email account. 1 2. An EITS provided RSA SecureID Token with an active account in the EITS-managed RSA Authentication Server. 2 3. Appropriate access granted Active Directory group membership. 3 4. DOEnet or Internet access and a supported web browser. Login Procedure for SMail:

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

A survey of security in multi-agent systems  

Science Conference Proceedings (OSTI)

Multi-agent systems (MAS) are a relatively new software paradigm that is being widely accepted in several application domains to address large and complex tasks. However, with the use of MAS in open, distributed and heterogeneous applications, the security ... Keywords: Agents, Multi-agent systems, Multi-agents, Security, Security in MAS

Rodolfo Carneiro Cavalcante; Ig Ibert Bittencourt; Alan Pedro da Silva; Marlos Silva; Evandro Costa; Robrio Santos

2012-04-01T23:59:59.000Z

322

Agent-based social networking for mobile user  

Science Conference Proceedings (OSTI)

Nowadays, social network services play an important role in users' everyday lives. This is especially emphasised in lives of users that belong to Generation Y. Young people often communicate and share various personal information with their family, ... Keywords: MAS, agent-based systems, agents, m-users, mobile networks, mobile users, multi-agent systems, social networking, social networks, software agents

Rebeka Belavic; Marko Basuga; Vedran Podobnik; Ana Petric; Ignac Lovrek

2010-11-01T23:59:59.000Z

323

Resilient synchronization in robust networked multi-agent systems  

Science Conference Proceedings (OSTI)

In this paper, we study local interaction rules that enable a network of dynamic agents to synchronize to a common zero-input state trajectory despite the malicious influence of a subset of adversary agents. The agents in the networked system influence ... Keywords: adversary, networked multi-agent system, resilience, synchronization

Heath J. LeBlanc; Xenofon D. Koutsoukos

2013-04-01T23:59:59.000Z

324

Decontamination of chemical and biological warfare agents with ...  

U.S. Energy Information Administration (EIA)

Publication Decontamination of chemical and biological warfare agents with a single multi-functional material..

325

A scalable group communication mechanism for mobile agents  

Science Conference Proceedings (OSTI)

Many multi-agent applications based on mobile agents require message propagation among group of agents. A fast and scalable group communication mechanism can considerably improve performance of these applications. Unfortunately, most of the existing ... Keywords: group communication, mobile agents, multicast

Hojjat Jafarpour; Nasser Yazdani; Navid Bazzaz-zadeh

2007-01-01T23:59:59.000Z

326

Statistical behaviors of mobile agents in network routing  

Science Conference Proceedings (OSTI)

Mobile agent-based network routing is a new technique for routing in large-scale networks. An analysis of the searching activity and population growth of mobile agents is important for improving performance in agent-driven networks. In this paper, we ... Keywords: Mobile agents, Population distribution, Probability of success, Routing

Wenyu Qu; Keqiu Li; Masaru Kitsuregawa; Weilian Xue

2012-06-01T23:59:59.000Z

327

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26, 2013 26, 2013 V-227: VMware Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root Privileges VMware Workstation and Player contain a vulnerability in the handling of the vmware-mount command August 24, 2013 V-226: HP StoreOnce D2D Backup Systems Denial of Service Vulnerability A vulnerability has been reported in HP StoreOnce D2D Backup Systems. August 23, 2013 V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service A vulnerability was reported in McAfee Email Gateway. August 22, 2013 V-224: Google Chrome Multiple Vulnerabilities Multiple vulnerabilities have been reported in Google Chrome. August 21, 2013 V-223: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts A remote user can make unlimited login attempts

328

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

71 - 1880 of 28,905 results. 71 - 1880 of 28,905 results. Download EA-1388: Final Environmental Assessment Ground Water Compliance at the Shiprock Uranium Mill Tailings Site http://energy.gov/nepa/downloads/ea-1388-final-environmental-assessment Download Document Management & Control System (DMCS) http://energy.gov/cio/downloads/document-management-control-system-dmcs Article U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. http://energy.gov/cio/articles/u-129-rsa-envision-bugs-permit-cross-site-scripting-sql-injection-and-directory

329

Decentralized agent-based underfrequency load shedding  

Science Conference Proceedings (OSTI)

As part of the transition to a smart grid efforts are being made to decentralize control of electric power systems and modernize protection schemes that are currently in use. One specific application of distributed control is underfrequency load shedding ... Keywords: UFLS, Underfrequency load shedding, intelligent agents

Sara Mullen; Getiria Onsongo

2010-12-01T23:59:59.000Z

330

Imaging agent and method of use  

DOE Patents (OSTI)

A new radiopharmaceutical composition for use in nuclear medicine comprises a radioiodinated meta-iodobenzylguanidine. The composition is used as an imaging agent for the heart, adrenal medulla, and tumors of the adrenal medulla and can be used for treatment of tumors of the adrenal medulla.

Wieland, Donald M. (1204 Linwood, Ann Arbor, MI 48103); Brown, Lawrence E. (523 Thomas St., Ypsilanti, MI 48197); Beierwaltes, William H. (1025 Forest Rd., Ann Arbor, MI 48105); Wu, Jiann-long (2672 Velvet Way, Walnut Creek, CA 94596)

1986-04-22T23:59:59.000Z

331

Imaging agent and method of use  

DOE Patents (OSTI)

A new radiopharmaceutical composition for use in nuclear medicine comprises a radioiodinated meta-iodobenzylguanidine. The composition is used as an imaging agent for the heart, adrenal medulla, and tumors of the adrenal medulla and can be used for treatment of tumors of the adrenal medulla. No Drawings

Wieland, D.M.; Brown, L.E.; Beierwaltes, W.H.; Wu, J.L.

1986-04-22T23:59:59.000Z

332

Emotional body language displayed by artificial agents  

Science Conference Proceedings (OSTI)

Complex and natural social interaction between artificial agents (computer-generated or robotic) and humans necessitates the display of rich emotions in order to be believable, socially relevant, and accepted, and to generate the natural emotional responses ... Keywords: Human computer interactions, emotional body language, human robot interactions

Aryel Beck; Brett Stevens; Kim A. Bard; Lola Caamero

2012-03-01T23:59:59.000Z

333

Asymmetric pricing: an agent based model  

Science Conference Proceedings (OSTI)

Asymmetric pricing is the tendency of prices to rise readily and fall slowly. Explanations of asymmetric pricing mention monopoly power, costs of changing prices or spreading information, and elasticity differences. In this paper we describe a general ... Keywords: agent based simulation, asymmetric pricing, competitive equilibria, microeconomy

Federico Cecconi; Domenico Parisi

2007-05-01T23:59:59.000Z

334

Modelling societal transitions with agent transformation  

Science Conference Proceedings (OSTI)

Transition models explain long-term and large-scale processes fundamentally changing the structure of a societal system. Our concern is that most transition models are too static. Although they capture a move of focus from static equilibria to transitions ... Keywords: Agent-based modelling, Integrated sustainability assessment, Societal transitions

Michel Schilperoord; Jan Rotmans; Noam Bergman

2008-12-01T23:59:59.000Z

335

DISSOLUTION METHOD OF REMOVING BONDING AGENTS  

DOE Patents (OSTI)

A method is given for removing residual aluminumsilicon bonding agents from uranium slugs after the removal of aluminum coatings. To accomplish this the slug is immersed in an aqueous solution about 0.75 N in hydrofluoric acid and about 7 N in nitric acid.

Hyman, H.H.

1960-04-19T23:59:59.000Z

336

Agent Based Architecture for Internet Marketing  

Science Conference Proceedings (OSTI)

In the current highly competitive era of e-commerce, many firms are focusing their attention on forging and nurturing customer relationships. Businesses not only need to discover and capitalize actionable marketing intelligence but they also need to ... Keywords: BDI agent, customer relationship management, personalized web sessions, server logs, web mining

Sukunesan Sinnappan; Mary-Anne Williams; Siva Muthaly

2000-08-01T23:59:59.000Z

337

Intelligent agent for aircraft collision avoidance  

E-Print Network (OSTI)

The trend of the air traffic system is toward a free flight environment. Free flight offers greater flexibility in planning for flights than the current air traffic control and management system. In free flight, operators are allowed to fly under instrument flight rules and choose their own flight path and speed in real time. One of the requirements to make the free flight environment feasible is an aircraft collision avoidance agent, also known as a traffic agent. One widely accepted concept of aircraft to aircraft communication for free flight environment is Automatic Dependent Surveillance Broadcast. In this research, the focus is on constructing a traffic agent, utilizing aircraft to aircraft information for flight management system. The agent includes a traffic conflict detection module and collision avoidance module. The method used by the modules is a combination of knowledge based expert system and optimal control. The expert system is the primary decision-maker and determines the appropriate actions required for conflict detection and avoidance. Optimal control is used to generate the optimum avoidance trajectory that adheres to the criteria assigned by the expert system. Results of various test cases presented in the research demonstrate that the combination of the two methods provides an efficient and effective way to obtain optimal traffic avoidance trajectories.

Shandy, Surya Utama

2002-01-01T23:59:59.000Z

338

Chemical Warfare Agent Degradation and Decontamination  

SciTech Connect

The decontamination of chemical warfare agents (CWA) from structures, environmental media, and even personnel has become an area of particular interest in recent years due to increased homeland security concerns. In addition to terrorist attacks, scenarios such as accidental releases of CWA from U.S. stockpile sites or from historic, buried munitions are also subjects for response planning. To facilitate rapid identification of practical and effective decontamination approaches, this paper reviews pathways of CWA degradation by natural means as well as those resulting from deliberately applied solutions and technologies; these pathways and technologies are compared and contrasted. We then review various technologies, both traditional and recent, with some emphasis on decontamination materials used for surfaces that are difficult to clean. Discussion is limited to the major threat CWA, namely sulfur mustard (HD, bis(2-chloroethyl)sulfide), VX (O-ethyl S-(2-diisopropylaminoethyl) methylphosphonothioate), and the G-series nerve agents. The principal G-agents are GA (tabun, ethyl N,N-dimethylphosphoramidocyanidate), GB (sarin, isopropyl methylphosphonofluoridate), and GD (soman, pinacolyl methylphosphonofluoridate). The chemical decontamination pathways of each agent are outlined, with some discussion of intermediate and final degradation product toxicity. In all cases, and regardless of the CWA degradation pathway chosen for decontamination, it will be necessary to collect and analyze pertinent environmental samples during the treatment phase to confirm attainment of clearance levels.

Talmage, Sylvia Smith [ORNL; Watson, Annetta Paule [ORNL; Hauschild, Veronique [U.S. Environmental Protection Agency; Munro, Nancy B [ORNL; King, J. [U.S. Army Environmental Center

2007-02-01T23:59:59.000Z

339

Agent-based accountable grid computing systems  

Science Conference Proceedings (OSTI)

Accountability is an important aspect of any computer system. It assures that every action executed in the system can be traced back to some entity. Accountability is even more crucial for assuring the safety and security of grid systems, given the very ... Keywords: Accountability, Agents, Distributed denial of service attack, Grid computing

Wonjun Lee; Anna Squicciarini; Elisa Bertino

2013-08-01T23:59:59.000Z

340

Modelling Office Energy Consumption: An Agent Based  

E-Print Network (OSTI)

Modelling Office Energy Consumption: An Agent Based Approach Tao Zhang, Peer-Olaf Siebers, Uwe · Overall Project Background · Office Energy Consumption · Case Study · Simulation Experiments · Conclusions #12;Overall Project Background · EPSRC funded City Energy Future Project ­ Under Energy & Complexity

Aickelin, Uwe

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Smart meter aware domestic energy trading agents  

Science Conference Proceedings (OSTI)

The domestic energy market is changing with the increasing availability of energy micro-generating facilities. On the long run, households will have the possibility to trade energy for purchasing to and for selling from a number of different actors. ... Keywords: agents, energy trade, smart meter

Nicola Capodieci; Giuliano Andrea Pagani; Giacomo Cabri; Marco Aiello

2011-06-01T23:59:59.000Z

342

A Practitioners' Review of Industrial Agent Applications  

Science Conference Proceedings (OSTI)

ERIM's1 Center for Electronic Commerce (CEC) hosted a two-day Workshop on Industrial Agents (WINA) in Ann Arbor, MI on Nov. 1213, 1998. Participation in the workshop was by invitation only, and was restricted to companies with whom ... Keywords: industrial applications, methods, software tools, workshop report

H. Van Dyke Parunak

2000-12-01T23:59:59.000Z

343

The pragmatics of software agents: analysis and design of agent communication languages  

Science Conference Proceedings (OSTI)

Modern ACLs, such as FIPA ACL, provide standardised catalogues of performatives and protocols, designed as general purpose languages to ensure interoperability among agent systems. However, recent work reports a need for new ad-hoc sets of performatives ...

Juan Manuel Serrano; Sascha Ossowski; Alberto Fernndez

2003-01-01T23:59:59.000Z

344

Why agents? On the varied motivations for agent computing in the social sciences  

E-Print Network (OSTI)

The many motivations for employing agent-based computation in the social sciences are reviewed. It is argued that there exist three distinct uses of agent modeling techniques. One such use the simplest is conceptually quite close to traditional simulation in operations research. This use arises when equations can be formulated that completely describe a social process, and these equations are explicitly soluble, either analytically or numerically. In the former case, the agent model is merely a tool for presenting results, while in the latter it is a novel kind of Monte Carlo analysis. A second, more commonplace usage of computational agent models arises when mathematical models can be written down but not completely solved. In this case the agent-based model can shed significant light on the solution structure, illustrate dynamical properties of the model, serve to test the dependence of results on parameters and assumptions, and be a source of counter-examples. Finally, there are important classes of problems for which writing down equations is not a useful activity. In such circumstances, resort to agent-based computational models may be the only way available to explore such processes systematically, and constitute a third distinct usage of such models.

Robert Axtell; Robert L. Axtell

2000-01-01T23:59:59.000Z

345

Classified Ads Harvesting Agent and Notification System  

E-Print Network (OSTI)

The shift from an information society to a knowledge society require rapid information harvesting, reliable search and instantaneous on demand delivery. Information extraction agents are used to explore and collect data available from Web, in order to effectively exploit such data for business purposes, such as automatic news filtering, advertisement or product searching and price comparing. In this paper, we develop a real-time automatic harvesting agent for adverts posted on Servihoo web portal and an SMS-based notification system. It uses the URL of the web portal and the object model, i.e., the fields of interests and a set of rules written using the HTML parsing functions to extract latest adverts information. The extraction engine executes the extraction rules and stores the information in a database to be processed for automatic notification. This intelligent system helps to tremendously save time. It also enables users or potential product buyers to react more quickly to changes and newly posted sales...

Doomun, Razvi; Nadeem, Auleear; Aukin, Mozafar

2010-01-01T23:59:59.000Z

346

Natural chelating agents for radionuclide decorporation  

DOE Patents (OSTI)

This invention relates to the preparation of new, naturally produced chelating agents as well as to the method and resulting chelates of desorbing cultures in a bioavailable form involving Pseudomonas species or other microorganisms. A preferred microorganism is Pseudomonas aeruginosa which forms multiple chelates with thorium in the range of molecular weight 100-1,000 and also forms chelates with uranium of molecular weight in the area of 100-1,000 and 1,000-2,000.

Premuzic, Eugene T. (East Moriches, NY)

1988-01-01T23:59:59.000Z

347

Mobility Header Home Agent Switch Message  

E-Print Network (OSTI)

This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards " (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. This document specifies a new Mobility Header message type that can be used between a home agent and mobile node to signal to a mobile

B. Haley; V. Devarapalli; H. Deng; J. Kempf

2008-01-01T23:59:59.000Z

348

A Visual Agent for Performance Graphics  

E-Print Network (OSTI)

Visual Agents are software entities which assist people in performing graphical tasks. One useful and interesting graphical task is to make a textand -graphic record of a group meeting. When the recording is done live in view of the group on a large display, such as on a whiteboard, it is a performing art which can be called "Group Graphics. " During group graphics, collaboration is enhanced because the group members can see the record as it is being made, offering suggestions and corrections. And if graphic recording of this kind takes place on a large computer display, then visual agents can be brought into play. Presented in this paper is a visual agent which acts as a whiteboard assistant for group graphics, helping a person to graphically record the conversation and concepts of a working group on a large display. 1 Context: Performance Text-Graphics on the Big Screen The long term goal of this work has been to construct a visual medium which will support the improvisational crea...

Fred Lakin

1994-01-01T23:59:59.000Z

349

Agents of seed dispersal : animal--zoochary / Wind--anemonochory  

E-Print Network (OSTI)

Agents of seed dispersal is a project designed to address the increase of environmental degradation, which occurs as a result of the perpetual spread of the asphalt and concrete of the contemporary urban situation. Agents ...

Lysakowski, Lukasz Kamil, 1974-

2004-01-01T23:59:59.000Z

350

RAMASD: a semi-automatic method for designing agent organisations  

Science Conference Proceedings (OSTI)

Designing realistic multi-agent systems is a complex process, which involves specifying not only the functionality of individual agents, but also the authority relationships and lines of communication existing among them. In other words, designing a ...

Anthony Karageorgos; Nikolay Mehandjiev; Simon Thompson

2002-12-01T23:59:59.000Z

351

Tax compliance in a simulated heterogeneous multi-agent society  

Science Conference Proceedings (OSTI)

We consider an individualised approach to agent behaviour in an application to the classical economic problem of tax compliance. Most economic theories consider homogeneous representative agent utilitarian approaches to explain the decision of complying ...

Luis Antunes; Joo Balsa; Paulo Urbano; Luis Moniz; Catarina Roseta-Palma

2005-07-01T23:59:59.000Z

352

Approaches to mechanism design with boundedly rational agents  

E-Print Network (OSTI)

This dissertation ties together three papers on mechanism design with boundedly rational agents. These papers explore theoretically whether, and to what extent, limitations on agents' ability to strategically misrepresent ...

Carroll, Gabriel D. (Gabriel Drew)

2012-01-01T23:59:59.000Z

353

Towards Natural Head Movement of Autonomous Speaker Agent  

Science Conference Proceedings (OSTI)

Autonomous Speaker Agent (ASA) is a graphically embodied animated agent capable of reading plain English text and rendering it in a form of speech, accompanied by appropriate, natural-looking facial gestures [1]. This paper is focused on improving ASA's ...

Marko Brkic; Karlo Smid; Tomislav Pejsa; Igor S. Pandzic

2008-09-01T23:59:59.000Z

354

The behavior-oriented design of modular agent intelligence  

Science Conference Proceedings (OSTI)

Agent UML is a graphical modeling language based on UML. Like UML, Agent UML provides several types of representation covering the description of the system, the components, the dynamics of the system and the deployment. Multiagent system designers already ...

Joanna J. Bryson

2002-10-01T23:59:59.000Z

355

Who's Your Agent? Quantifying Energy Affected by the Principal...  

NLE Websites -- All DOE Office Websites (Extended Search)

Who's Your Agent? Quantifying Energy Affected by the Principal-Agent Barrier in U.S. Households Speaker(s): Jayant Sathaye Date: May 9, 2006 - 12:00pm Location: Bldg. 90 This...

356

Complexity in simplicity: flexible agent-based state space exploration  

Science Conference Proceedings (OSTI)

In this paper, we describe a new flexible framework for state space exploration based on cooperating agents. The idea is to let various agents with different search patterns explore the state space individually and communicate information about fruitful ...

Jacob I. Rasmussen; Gerd Behrmann; Kim G. Larsen

2007-03-01T23:59:59.000Z

357

Agent-based intelligent information dissemination in dynamically changing environments  

Science Conference Proceedings (OSTI)

This chapter presents an agent-based approach to intelligent information dissemination in dynamic environments. We will describe a prototype agent-based system, called the Anticipator, which enables an information dissemination system to adapt to changing ...

H. Sevay; C. Tsatsoulis

2002-01-01T23:59:59.000Z

358

Self-synchronization of cooperative agents in a distributed environment  

Science Conference Proceedings (OSTI)

Multiagent systems have been widely used in applications that are inherently distributed such as information retrieval, network diagnosis, and distributed vehicle monitoring. The use of multiple cooperative agents offers some important advantages(such ... Keywords: coordinated behaviour, distributed cooperative agents

Sergio Ilarri; Eduardo Mena; Arantza Illarramendi

2003-06-01T23:59:59.000Z

359

Event-triggered control for multi-agent systems  

E-Print Network (OSTI)

Event-driven strategies for multi-agent systems are motivated by the future use of embedded microprocessors with limited resources that will gather information and actuate the individual agent controller updates. The control ...

Johansson, Karl H.

360

Hyperglue: Designing High-Level Agent Communication for Distributed Applications  

E-Print Network (OSTI)

We are building a new communication model and discoverysystem which will allow agent-based intelligent spacesto interact with one another. This new infrastructure layer,called Hyperglue, coordinates agent actions at a ...

Peters, Stephen

2006-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Tutorial on agent-based modeling and simulation  

E-Print Network (OSTI)

Agent-based modelling and simulation (ABMS) is a relatively new approach to modelling systems composed of autonomous, interacting agents. Agent-based modelling is a way to model the dynamics of complex systems and complex adaptive systems. Such systems often self-organize themselves and create emergent order. Agent-based models also include models of behaviour (human or otherwise) and are used to observe the collective effects of agent behaviours and interactions. The development of agent modelling tools, the availability of micro-data, and advances in computation have made possible a growing number of agent-based applications across a variety of domains and disciplines. This article provides a brief introduction to ABMS, illustrates the main concepts and foundations, discusses some recent applications across a variety of disciplines, and identifies methods and toolkits for developing agent models.

Cm Macal; Mj North

2005-01-01T23:59:59.000Z

362

A Model of Adaptation in Collaborative Multi-Agent Systems  

Science Conference Proceedings (OSTI)

Adaptation is an essential requirement for autonomous agent systems functioning in uncertain dynamic environments. Adaptation allows agents to change their behavior in order to improve the overall sys tem performance. We describe a general mechanism ... Keywords: adaptation, mathematical models, robotics

Kristina Lerman

2004-09-01T23:59:59.000Z

363

Evaluation of KQML as an Agent Communication Language ?  

E-Print Network (OSTI)

protocols Agent languages KQML Tcl/Tk Java Telescript CORBA ILU OpenDoc OLE Fig. 1. A taxonomyofagent

Finin, Tim

364

Lithium based electrochemical cell systems having a degassing agent  

SciTech Connect

A lithium based electrochemical cell system includes a positive electrode; a negative electrode; an electrolyte; and a degassing agent.

Hyung, Yoo-Eup (Naperville, IL); Vissers, Donald R. (Naperville, IL); Amine, Khalil (Downers Grove, IL)

2012-05-01T23:59:59.000Z

365

Multi Agent Collaborative Search based on Tchebycheff decomposition  

Science Conference Proceedings (OSTI)

This paper presents a novel formulation of Multi Agent Collaborative Search, for multi-objective optimization, based on Tchebycheff decomposition. A population of agents combines heuristics that aim at exploring the search space both globally (social ... Keywords: Agent-based optimization, Memetic strategies, Multi-objective optimization

Federico Zuiani, Massimiliano Vasile

2013-09-01T23:59:59.000Z

366

Single-agent search in the presence of deadlocks  

Science Conference Proceedings (OSTI)

Single-agent search is a powerful tool for solving a variety of applications. Most of the application domains used to explore single-agent search techniques have the property that if you start with a solvable state, at no time in the search can you reach ... Keywords: IDA, Sokoban, deadlocks, heuristic search, single agent search

Andreas Junghanns; Jonathan Schaeffer

1998-07-01T23:59:59.000Z

367

AgentSwitch: towards smart energy tariff selection  

Science Conference Proceedings (OSTI)

In this paper, we present AgentSwitch, a prototype agent-based platform to solve the electricity tariff selection problem. Agent-Switch incorporates novel algorithms to make predictions of hourly energy usage as well as detect (and suggest to the user) ... Keywords: electricity, group buying, optimisation, provenance, recommender systems, smart grid

Sarvapali D. Ramchurn, Michael Osborne, Oliver Parson, Talal Rahwan, Sasan Maleki, Steve Reece, Trung D. Huynh, Muddasser Alam, Joel E. Fischer, Tom Rodden, Luc Moreau, Steve Roberts

2013-05-01T23:59:59.000Z

368

Fast compression of transportable Tcl agents Robert S. Gray  

E-Print Network (OSTI)

Fast compression of transportable Tcl agents Robert S. Gray Department of Computer Science implemented a transportable agent system that uses the Tool Command Language (Tcl) as the agent language. Each Tcl script can suspend its execution at an arbitrary point, transport itself to another machine

369

Multi-agent team cooperation: A game theory approach  

Science Conference Proceedings (OSTI)

The main goal of this work is to design a team of agents that can accomplish consensus over a common value for the agents' output using cooperative game theory approach. A semi-decentralized optimal control strategy that was recently introduced by the ... Keywords: Consensus algorithms, Cooperative control, Game theory, Multi-agent networks, Optimal control

E. Semsar-Kazerooni; K. Khorasani

2009-10-01T23:59:59.000Z

370

AgentSwitch: towards smart energy tariff selection  

Science Conference Proceedings (OSTI)

We present AgentSwitch, a prototype agent-based platform to solve the tariff selection problem for homeowners. AgentSwitch incorporates novel algorithms that work on the coarse data provided by smart meters to make predictions of hourly energy usage ... Keywords: energy, group buying, provenance, smart grids

Sarvapali D. Ramchurn, Michael A. Osborne, Oliver Parson, Talal Rahwan, Sasan Maleki, Steve Reece, Trung Dong Huynh, Muddasser Alam, Joel E. Fischer, Tom Rodden, Luc Moreau, Steve Roberts

2013-05-01T23:59:59.000Z

371

Challenges and Research Directions in Agent-Oriented Software Engineering  

Science Conference Proceedings (OSTI)

Agent-based computing is a promising approach for developing applications in complex domains. However, despite the great deal of research in the area, a number of challenges still need to be faced (i) to make agent-based computing a widely accepted paradigm ... Keywords: agent-oriented software engineering, intelligence engineering, multiagent systems, self-organisation

Franco Zambonelli; Andrea Omicini

2004-11-01T23:59:59.000Z

372

Designing computational steering facilities for distributed agent based simulations  

Science Conference Proceedings (OSTI)

Agent-Based Models (ABMs) are a class of models which, by simulating the behavior of multiple agents (i.e., ndependent actions, interactions and adaptation), aim to emulate and/or predict complex phenomena. One of the general features of ABM simulations ... Keywords: agent-based simulation, computational steering, distributed systems, visualization of distributed models

Gennaro Cordasco, Rosario De Chiara, Francesco Raia, Vittorio Scarano, Carmine Spagnuolo, Luca Vicidomini

2013-05-01T23:59:59.000Z

373

A modal logic framework for multi-agent belief fusion  

Science Conference Proceedings (OSTI)

This article provides a modal logic framework for reasoning about multi-agent belief and its fusion. We propose logics for reasoning about cautiously merged agent beliefs that have different degrees of reliability. These logics are obtained by combining ... Keywords: Epistemic logic, belief fusion, belief revision, database merging, multi-agent systems, multi-sources reasoning

Churn-Jung Liau

2005-01-01T23:59:59.000Z

374

Designing nonverbal communication for pedagogical agents: When less is more  

Science Conference Proceedings (OSTI)

This experimental study employed a 2x2x2 factorial design to investigate the effects of type of instruction (procedural module, attitudinal module), deictic gesture (presence, absence), and facial expression (presence, absence) on student perception ... Keywords: Agent nonverbal communication, Attitude change, Cognitive load theory, Gestures, Interface agents, Pedagogical agents, Persuasive technology, Procedural learning

Amy L. Baylor; Soyoung Kim

2009-03-01T23:59:59.000Z

375

Data assimilation in agent based simulation of smart environment  

Science Conference Proceedings (OSTI)

Agent-based simulation is useful for studying people's movement in smart environment. Existing agent-based simulations are typically used as offline tools that help system design. They are not dynamically data-driven because they do not utilize any real ... Keywords: agent-based model, data assimilation, particle filter, smart environment

Minghao Wang, Xiaolin Hu

2013-05-01T23:59:59.000Z

376

A Reusable Multi-Agent Architecture for Active Intelligent Websites  

Science Conference Proceedings (OSTI)

In this paper a reusable multi-agent architecture for intelligent Websites is presented and illustrated for an electronic department store. The architecture has been designed and implemented using the compositional design method for multi-agent systems ... Keywords: information agent, intelligent website

Catholijn M. Jonker; Remco A. Lam; Jan Treur

2001-06-01T23:59:59.000Z

377

A knowledge level software engineering methodology for agent oriented programming  

Science Conference Proceedings (OSTI)

Our goal in this paper is to introduce and motivate a methodology, called \\emph{Tropos}, for building agent oriented software systems. Tropos is based on two key ideas. First, the notion of agent and all the related mentalistic notions (for instance: ... Keywords: agent-based software engineering, design methodologies

Paolo Bresciani; Anna Perini; Paolo Giorgini; Fausto Giunchiglia; John Mylopoulos

2001-05-01T23:59:59.000Z

378

A multi-agent model of several economic regions  

Science Conference Proceedings (OSTI)

This paper presents Lagom regiO: a multi-agent model of several growing economic areas in interaction. The model is part of the Lagom model family: economic multi-agent models developed to make steps toward understanding equilibrium selection and identifying ... Keywords: Economic regions, Emissions, Growing economy, Multi-agent model

Sarah Wolf, Steffen FRst, Antoine Mandel, Wiebke Lass, Daniel Lincke, Federico Pablo-Mart, Carlo Jaeger

2013-06-01T23:59:59.000Z

379

Experiences creating three implementations of the repast agent modeling toolkit  

Science Conference Proceedings (OSTI)

Many agent-based modeling and simulation researchers and practitioners have called for varying levels of simulation interoperability ranging from shared software architectures to common agent communications languages. These calls have been at least partially ... Keywords: Agent-based Modeling and Simulation, Java, Microsoft .NET, Python

Michael J. North; Nicholson T. Collier; Jerry R. Vos

2006-01-01T23:59:59.000Z

380

Visualisation on demand for agent-based simulation  

Science Conference Proceedings (OSTI)

Agent-based simulation can be a useful tool when analysing complex systems such as real world scenarios. In multi-agent models when no quantitative data are available we have to search for new solutions in order to verify that the simulated model is ... Keywords: agent-based simulation, validation, visualisation tools

Athanasia Louloudi; Franziska Klgl

2012-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Negotiation among autonomous computational agents: principles, analysis and challenges  

Science Conference Proceedings (OSTI)

Automated negotiation systems with software agents representing individuals or organizations and capable of reaching agreements through negotiation are becoming increasingly important and pervasive. Examples, to mention a few, include the industrial ... Keywords: Automated negotiation, Autonomous agents, Bargaining, Impasse, Multi-agent systems, Negotiation framework, Negotiation systems, Pre-negotiation, Renegotiation

Fernando Lopes; Michael Wooldridge; A. Q. Novais

2008-03-01T23:59:59.000Z

382

Agent-based evolutionary optimisation of trading strategies  

Science Conference Proceedings (OSTI)

The backtesting and optimisation of trading strategies has emerged as an interesting research and experimental problem in both finance and Information Technology (IT) fields. However, it is a non-trivial task to effectively and efficiently ... Keywords: GAs, MAS, agent-based systems, agents, data mining, genetic algorithms, multi-agent systems, optimisation, stock data, trading strategies

Jiarui Ni; Dan Luo; Yuming Ou; Chao Luo

2008-02-01T23:59:59.000Z

383

Distributed monitoring and control of office buildings by embedded agents  

Science Conference Proceedings (OSTI)

We describe a decentralized system consisting of a collection of software agents that monitor and control an office building. It uses the existing power lines for communication between the agents and the electrical devices of the building, such as sensors ... Keywords: Distributed control, Intelligent buildings, Software agents

Paul Davidsson; Magnus Boman

2005-05-01T23:59:59.000Z

384

Enhancing Multi-Agent Based Simulation with Human-Agents Interactive Spatial Behaviour  

E-Print Network (OSTI)

We are exploring the enhancement of models of agent behaviour with more "human-like" decision making strategies than are presently available. Our motivation is to developed with a view to as the decision analysis and support for electric taxi company under the mission of energy saving and reduction of CO2, in particular car-pool and car-sharing management policies. In order to achieve the object of decision analysis for user, we provide a human-agents interactive spatial behaviour to support user making decision real time. We adopt passenger average waiting time and electric taxi average idle time as the performance measures and decision support fro electric taxi company. Finally, according to the analysis result, we demonstrate that our multi-agent simulation and GUI can help users or companies quickly make a quality and accurate decision to reduce the decision-making cost and time.

Chen, Yee Ming; Shiu, Hung-Ming

2009-01-01T23:59:59.000Z

385

Agent-based modelling of social organisations  

E-Print Network (OSTI)

In the paper, the model of the society represented by a social network and the model of a multi-agent system built on the basis of this, is presented. The particular aim of the system is to predict the evolution of a society and an analysis of the communities that appear, their characteristic features and reasons for coming into being. As an example of application, an analysis was made of a social portal which makes it possible to o?er and reserve places in rooms for travelling tourists

Ko?lak, Jaros?aw

2013-01-01T23:59:59.000Z

386

When sex, drugs, and violence enter the classroom: Conversations between adolescents and a female pedagogical agent  

Science Conference Proceedings (OSTI)

In this article, we investigate the discourse between a female conversational pedagogical agent and 59 adolescents in the context of a social studies lesson. We note that previous pedagogical agent research has focused on the positive effects of agents, ... Keywords: Agent abuse, Agent misuse, Computer-mediated discourse analysis, Conversational agents, Pedagogical agents, Social studies

George Veletsianos; Cassandra Scharber; Aaron Doering

2008-05-01T23:59:59.000Z

387

Toward guidelines for modeling learning agents in multiagent-based simulation: implications from Q-learning and sarsa agents  

Science Conference Proceedings (OSTI)

This paper focuses on how simulation results are sensitive to agent modeling in multiagent-based simulation (MABS) and investigates such sensitivity by comparing results where agents have different learning mechanisms, i.e., Q-learning ... Keywords: agent modeling, bargaining game, learning mechanism, multiagent-based simulation, sensitivity

Keiki Takadama; Hironori Fujita

2004-07-01T23:59:59.000Z

388

Trust and multi-agent systems: applying the "diffuse, default model" of trust to experiments involving artificial agents  

Science Conference Proceedings (OSTI)

We argue that the notion of trust, as it figures in an ethical context, can be illuminated by examining research in artificial intelligence on multi-agent systems in which commitment and trust are modeled. We begin with an analysis of a philosophical ... Keywords: Artificial agents, Default trust, Diffuse trust, Multi-agent systems, Trust

Jeff Buechner; Herman T. Tavani

2011-03-01T23:59:59.000Z

389

UML 2.0 and agents: how to build agent-based systems with the new UML standard  

Science Conference Proceedings (OSTI)

Unified Modeling Language (UML 2.0) is the upcoming standard of the Object Management Group for specifying object-oriented software systems. In this paper, we will show how UML 2.0 can be applied for the specification of agent-based systems. Moreover, ... Keywords: Agent-based systems, Agent-oriented software engineering, UML 2.0

Bernhard Bauer; James Odell

2005-03-01T23:59:59.000Z

390

Evaluating The Performance Of Mobile Agents In Network Management  

E-Print Network (OSTI)

Currently, most network management systems are centralized and therefore, they can not scale when the size or the complexity of the network increases. This paper aims to investigate mobile agent scalability in network management, in order to nd when mobile agents improve the management efficiency. We compare mobile agent performance with SNMP one in several simulations. Results show that the mobile agent performs better when the number of managed network elements ranges between two bounds and that the mobile agent is less sensitive to changes on a general topology.

Marcelo Gonalves Rubinstein; Otto Carlos Muniz Bandeira Duarte; Marcelo Gon#alves Rubinstein; Otto Carlos Muniz B; Eira Duarte

1999-01-01T23:59:59.000Z

391

A Security Solution for IEEE 802.11's Ad-hoc Mode:Password-Authentication and Group Diffie-Hellman Key Exchange  

Science Conference Proceedings (OSTI)

The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.

Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

2005-10-01T23:59:59.000Z

392

Agent-based Models of Financial Markets  

E-Print Network (OSTI)

This review deals with several microscopic (``agent-based'') models of financial markets which have been studied by economists and physicists over the last decade: Kim-Markowitz, Levy-Levy-Solomon, Cont-Bouchaud, Solomon-Weisbuch, Lux-Marchesi, Donangelo-Sneppen and Solomon-Levy-Huang. After an overview of simulation approaches in financial economics, we first give a summary of the Donangelo-Sneppen model of monetary exchange and compare it with related models in economics literature. Our selective review then outlines the main ingredients of some influential early models of multi-agent dynamics in financial markets (Kim-Markowitz, Levy-Levy-Solomon). As will be seen, these contributions draw their inspiration from the complex appearance of investors' interactions in real-life markets. Their main aim is to reproduce (and, thereby, provide possible explanations) for the spectacular bubbles and crashes seen in certain historical episodes, but they lack (like almost all the work before 1998 or so) a perspective ...

Samanidou, E; Stauffer, D; Lux, T

2008-01-01T23:59:59.000Z

393

Fluid extraction using carbon dioxide and organophosphorus chelating agents  

DOE Patents (OSTI)

Methods for extracting metalloid and metal species from a solid or liquid material by exposing the material to a fluid solvent, particularly supercritical CO.sub.2, and a chelating agent are described. The chelating agent forms a chelate with the species, the chelate being soluble in the fluid to allow removal of the species from the material. In preferred embodiments the extraction solvent is supercritical CO.sub.2 and the chelating agent comprises an organophosphorous chelating agent, particularly sulfur-containing organophosphorous chelating agents, including mixtures of chelating agents. Examples of chelating agents include monothiophosphinic acid, di-thiophosphinic acid, phosphine sulfite, phosphorothioic acid, and mixtures thereof. The method provides an environmentally benign process for removing metal and metalloids from industrial waste solutions, particularly acidic solutions. Both the chelate and the supercritical fluid can be regenerated and the contaminant species recovered to provide an economic, efficient process.

Smart, Neil G. (Moscow, ID); Wai, Chien M. (Moscow, ID); Lin, Yuehe (Moscow, ID); Kwang, Yak Hwa (Moscow, ID)

1998-01-01T23:59:59.000Z

394

Fluid extraction using carbon dioxide and organophosphorus chelating agents  

DOE Patents (OSTI)

Methods for extracting metalloid and metal species from a solid or liquid material by exposing the material to a fluid solvent, particularly supercritical CO{sub 2}, and a chelating agent are described. The chelating agent forms a chelate with the species, the chelate being soluble in the fluid to allow removal of the species from the material. In preferred embodiments the extraction solvent is supercritical CO{sub 2} and the chelating agent comprises an organophosphorous chelating agent, particularly sulfur-containing organophosphorous chelating agents, including mixtures of chelating agents. Examples of chelating agents include monothiophosphinic acid, di-thiophosphinic acid, phosphine sulfite, phosphorothioic acid, and mixtures thereof. The method provides an environmentally benign process for removing metal and metalloids from industrial waste solutions, particularly acidic solutions. Both the chelate and the supercritical fluid can be regenerated and the contaminant species recovered to provide an economic, efficient process. 1 fig.

Smart, N.G.; Wai, C.M.; Lin, Y.; Kwang, Y.H.

1998-11-24T23:59:59.000Z

395

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31, 2011 31, 2011 T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. August 30, 2011 T-706: Microsoft Fraudulent Digital Certificate Issued by DigiNotar Fraudulent Digital Certificate Issued by DigiNotar, a Certification Authority Present in the Trusted Root Certification Authorities August 30, 2011 T-705: Linux Kernel Weakness in Sequence Number Generation Facilitates Packet Injection Attacks Linux Kernel Weakness in Sequence Number Generation Facilitates Packet Injection Attacks. August 29, 2011 T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password RSA enVision lets remote users view files and remote authenticated users

396

AgentSpeak(XL): efficient intention selection in BDI agents via decision-theoretic task scheduling  

Science Conference Proceedings (OSTI)

This paper shows how to use a decision-theoretic task scheduler in order to automatically generate efficient intention selection functions for BDI agent-oriented programming languages. We concentrate here on the particular extensions to a known BDI language ... Keywords: BDI programming languages, decision-theoretic scheduling, intention selection

Rafael H. Bordini; Ana L. C. Bazzan; Rafael de O. Jannone; Daniel M. Basso; Rosa M. Vicari; Victor R. Lesser

2002-07-01T23:59:59.000Z

397

Rules, agents and norms: guidelines for rule-based normative multi-agent systems  

Science Conference Proceedings (OSTI)

In this survey paper we focus on some requirements for developing normative multi-agent systems (NMAS). In particular, we discuss Boella et al.'s guidelines proposed for NMAS. Finally, we deal with two more specific questions concerning the role of norms ...

Antonino Rotolo; Leendert van der Torre

2011-07-01T23:59:59.000Z

398

A Discrete-Event Simulation Framework for the Validation of Agent-based and Multi-Agent Systems  

E-Print Network (OSTI)

Simulation of agent-based systems is an inherent requirement of the development process which provides developers with a powerful means to validate both agents' dynamic behavior and the agent system as a whole and investigate the implications of alternative architectures and coordination strategies. In this paper, we present a discrete-event simulation framework which supports the validation activity of agent-based and multiagent systems which are modeled and programmed as a set of event-driven agents by means of the Distilled StateCharts formalism and related programming tools. The simulation framework is equipped with a discreteevent simulation engine which provides support for the execution of agents by interleaving their events processing, the exchange of events among agents, the migration of agents, and the clustering of agents into agent servers interconnected by a logical network. Using this framework, an agent-based complex system can be easily validated and evaluated by defining a simulator program along with suitable test cases and performance measurements.

Giancarlo Fortino; Alfredo Garro; Wilma Russo

2005-01-01T23:59:59.000Z

399

Dissolution of Barite Scale using Chelating Agents  

E-Print Network (OSTI)

Barium sulfate scaling can cause many oilfield problems leading to loss of well productivity and well abandonment. Currently, diethylene triamine pentaacetic acid (DTPA) is used, along with synergist oxalic acid and potassium hydroxide, to remove the scale by dissolution. However, the chemical factors affecting this reaction are not known fully, leading to mixed results in terms of treatment effectiveness. This thesis investigates the effect of these factors, by analyzing the change in barite dissolution due to intrinsic factors like variations in formulation composition and extrinsic factors like presence of competing ions. The dissolution reaction is carried out, by taking the barite powder and chelant solution in a teflon round bottom flask and measuring the barite dissolved periodically, with an ICP-OES. The effect of different factors is studied by varying each factor individually and plotting the changes in solubilities. These lab tests show that solubility of barite (0.01mM in water), ideally, increases with increasing concentrations of chelating agents, even going as high as 239 mM. However experimental or field constraints lead to significant decrease in dissolution, especially at higher chelant concentrations. Thus, field tests to determine most effective chelant concentrations must precede treatment design. Lab tests also show that combination of DTPA with weaker chelating agents like ethylene diamine tetraacetic acid (EDTA), L-glutamic acid, N,N-diacetic acid (GLDA) or methyl glycine diacetic acid (MGDA) reduces barite dissolution and should be avoided during treatment design. Addition of synergists to the formulations, initially improves dissolution performance, especially for moderate chelant concentrations, but proves detrimental and hence must be avoided, over longer treatments. Finally, presence of competing ions in seawater, calcium sulfate and calcium carbonate, can significantly reduce barite dissolution and must be carefully studied for each formation-fluid system before design of treatments. Thus, this project sets a framework to identify the best chelant formulation and estimate its dissolution profile to ensure, a more informed treatment design for barite scale removal.

Shende, Aniket Vishwanath

2012-05-01T23:59:59.000Z

400

Efficient side-channel testing for public key algorithms: RSA ...  

Science Conference Proceedings (OSTI)

... it may also b nts. ... us far, can qu ations in a sem nt to consider when testing might be eas ... ervals, slight d er to isolate, h is performed re a t-test (or et ...

2011-09-21T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Commercial Buildings Sector Agent-Based Model | Open Energy Information  

Open Energy Info (EERE)

Commercial Buildings Sector Agent-Based Model Commercial Buildings Sector Agent-Based Model Jump to: navigation, search Tool Summary Name: Commercial Buildings Sector Agent-Based Model Agency/Company /Organization: Argonne National Laboratory Sector: Energy Focus Area: Buildings - Commercial Phase: Evaluate Options Topics: Implementation Resource Type: Technical report User Interface: Website Website: web.anl.gov/renewables/research/building_agent_based_model.html OpenEI Keyword(s): EERE tool, Commercial Buildings Sector Agent-Based Model Language: English References: Building Efficiency: Development of an Agent-based Model of the US Commercial Buildings Sector[1] Model the market-participants, dynamics, and constraints-help decide whether to adopt energy-efficient technologies to meet commercial building

402

AGENT-BASED MODELING AND SIMULATION: ABMS EXAMPLES  

E-Print Network (OSTI)

Agent-based modeling and simulation (ABMS) is a new approach to modeling systems comprised of autonomous, interacting agents. ABMS promises to have far-reaching effects on the way that businesses use computers to support decision-making and researchers use electronic laboratories to support their research. Some have gone so far as to contend that ABMS is a third way of doing science, in addition to traditional deductive and inductive reasoning (Axelrod 1997). Computational advances have made possible a growing number of agent-based models across a variety of application domains. Applications range from modeling agent behavior in the stock market, supply chains, and consumer markets, to predicting the spread of epidemics, the threat of bio-warfare, and the factors responsible for the fall of ancient civilizations. This tutorial describes the theoretical and practical foundations of ABMS, identifies toolkits and methods for developing agent models, and illustrates the development of a simple agent-based model.

Charles M. Macal; Michael J. North

2008-01-01T23:59:59.000Z

403

Understanding Ancient Societies: A New Approach Using Agent-Based Holistic Modeling  

E-Print Network (OSTI)

Working definitions of agent-based models (ABMs) divergeconstructing agent-based, object-oriented models of simple

Christiansen, John H.; Altaweel, Mark R

2005-01-01T23:59:59.000Z

404

An Agent-Based Activity Microsimulation Kernel Using a Negotiation Metaphor  

E-Print Network (OSTI)

longitudinal, agent-based microsimulation models of humanmodel of human activity systems using the agent-based

Rindt, Craig R.; Marca, James E.; McNally, Michael G.

2002-01-01T23:59:59.000Z

405

Small-world effects in wireless agent sensor networks  

Science Conference Proceedings (OSTI)

We describe a model for analysing the coverage graph from physical placement of mobile agents or sensor devices to improve coverage, fault tolerance and network lifetime. The planar graph for the devices is augmented by small-world network 'short-cuts'; ... Keywords: WSNs, clustering algorithms, connectivity graphs, fault tolerance, mobile agents, mobile sensors, modelling, network coverage, network lifetime, optimal coverage, percolation, scaling, small-world networks, wireless agents, wireless sensor networks

K. A. Hawick; H. A. James

2010-07-01T23:59:59.000Z

406

EVALUATION OF SOME HALON SUBSTITUTE AGENTS IN A ...  

Science Conference Proceedings (OSTI)

... engine simulator is essentially a wind tunnel and ... Simmons.' The purpose of this design is to ... fire pan section, scrubbing tower, agent dispensing ...

2011-09-27T23:59:59.000Z

407

Minimum cost subset selection with two competing agents  

E-Print Network (OSTI)

Nov 11, 2010 ... Minimum cost subset selection with two competing agents. Claudia Marini( nicosia ***at*** dia.uniroma3.it) Gaia Nicosia(nicosia ***at***...

408

Cell-targeted lytic pore-forming agents  

DOE Patents (OSTI)

A chimeric compound that contains a cell-specific ligand linked to a pore-forming agent capable of lysing a cell.

Bayley, Hagen (Grafton, MA); Walker, Barbara J. (Auburn, MA)

1998-01-01T23:59:59.000Z

409

Agent-Based Software for Gathering and Summarizing Textual and ...  

or complex information retrieval from multiple sources such as the Internet. With Piranha, researchers have pioneered an agent approach to text analysis that uses a

410

Agent-Based Software for Gathering and Summarizing Textual and ...  

ORNL 2010-G00618/jcn UT-B IDs 200101031, 200401368, 200601759, 200902235, 200902377 Agent-Based Software for Gathering and Summarizing Textual and Internet Information

411

Surface Modification Agents for Lithium-Ion Batteries | Argonne...  

NLE Websites -- All DOE Office Websites (Extended Search)

Surface Modification Agents for Lithium-Ion Batteries Technology available for licensing: A process to modify the surface of the active material used in an electrochemical device...

412

Critical Overview of Agent-Based Models for Economics  

E-Print Network (OSTI)

We present an overview of some representative Agent-Based Models in Economics. We discuss why and how agent-based models represent an important step in order to explain the dynamics and the statistical properties of financial markets beyond the Classical Theory of Economics. We perform a schematic analysis of several models with respect to some specific key categories such as agents' strategies, price evolution, number of agents, etc. In the conclusive part of this review we address some open questions and future perspectives and highlight the conceptual importance of some usually neglected topics, such as non-stationarity and the self-organization of financial markets.

Cristelli, M; Zaccaria, A

2011-01-01T23:59:59.000Z

413

Modeling Agents that Exhibit Variable Performance in a Collaborative Setting  

E-Print Network (OSTI)

Abstract. In a collaborative environment, knowledge about collaborators skills is an important factor when determining which team members should perform a task. However, this knowledge may be incomplete or uncertain. In this paper, we extend our ETAPP (Environment-Task-Agents-Policy-Protocol) collaboration framework by modeling team members that exhibit non-deterministic performance, and comparing two alternative ways of using these models to assign agents to tasks. Our simulation-based evaluation shows that performance variability has a large impact on task performance, and that task performance is improved by consulting agent models built from a small number of observations of agents recent performance. 1

Ingrid Zukerman; Christian Guttmann

2005-01-01T23:59:59.000Z

414

Getting to the Core of Sustainability (EStar Award - Change Agents...  

NLE Websites -- All DOE Office Websites (Extended Search)

Getting to the Core of Sustainability (EStar Award - Change Agents) SUSTAINABILITY ASSISTANCE NETWORK (SAN) 1 Mike Moran & Jennifer Su-Coker March 15, 2012 Outline 2 2 PNNL...

415

A Key Enzyme to the Potency of an Anticancer Agent  

NLE Websites -- All DOE Office Websites (Extended Search)

A Key Enzyme to the Potency of an Anticancer Agent Print Incorporation of halogen atoms into drug molecules often increases biological activity. This is the case with...

416

Buy Handbook of Chemical and Biological Warfare Agent ...  

U.S. Energy Information Administration (EIA)

Buy Handbook of Chemical and Biological Warfare Agent Decontamination from our Physical Chemistry General range at Tesco direct. We stock a great ...

417

Enhanced Detection of Toxic Agents - Oak Ridge National Laboratory  

agent that caused the change in fluorescence. Unlike conventional water quality ... Climate change monitoring Tool for companies/utilities to demonstrate

418

A Methodology to Evaluate Agent Oriented Software Engineering Techniques  

SciTech Connect

Systems using software agents (or multi-agent systems, MAS) are becoming more popular within the development mainstream because, as the name suggests, an agent aims to handle tasks autonomously with intelligence. To benefit from autonomous control and reduced running costs, system functions are performed automatically. Agent-oriented considerations are being steadily accepted into the various software design paradigms. Agents may work alone, but most commonly, they cooperate toward achieving some application goal(s). MAS's are components in systems that are viewed as many individuals living in a society working together. From a SE perspective, solving a problem should encompass problem realization, requirements analysis, architecture design and implementation. These steps should be implemented within a life-cycle process including testing, verification, and reengineering to proving the built system is sound. In this paper, we explore the various applications of agent-based systems categorized into different application domains. A baseline is developed herein to help us focus on the core of agent concepts throughout the comparative study and to investigate both the object-oriented and agent-oriented techniques that are available for constructing agent-based systems. In each respect, we address the conceptual background associated with these methodologies and how available tools can be applied within specific domains.

Lin, Chia-En [University of North Texas; Kavi, Krishna M. [University of North Texas; Sheldon, Frederick T [ORNL; Daley, Kristopher M [ORNL; Abercrombie, Robert K [ORNL

2007-01-01T23:59:59.000Z

419

Cell-targeted lytic pore-forming agents  

DOE Patents (OSTI)

A chimeric compound that contains a cell-specific ligand linked to a pore-forming agent capable of lysing a cell. 21 figs.

Bayley, H.; Walker, B.J.

1998-10-06T23:59:59.000Z

420

Cell-targeted lytic pore-forming agents  

DOE Patents (OSTI)

A chimeric compound that contains a cell-specific ligand linked to a pore-forming agent capable of lysing a cell. 18 figs.

Bayley, H.; Walker, B.J.

1998-10-20T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Agent-based method for distributed clustering of textual information  

DOE Patents (OSTI)

A computer method and system for storing, retrieving and displaying information has a multiplexing agent (20) that calculates a new document vector (25) for a new document (21) to be added to the system and transmits the new document vector (25) to master cluster agents (22) and cluster agents (23) for evaluation. These agents (22, 23) perform the evaluation and return values upstream to the multiplexing agent (20) based on the similarity of the document to documents stored under their control. The multiplexing agent (20) then sends the document (21) and the document vector (25) to the master cluster agent (22), which then forwards it to a cluster agent (23) or creates a new cluster agent (23) to manage the document (21). The system also searches for stored documents according to a search query having at least one term and identifying the documents found in the search, and displays the documents in a clustering display (80) of similarity so as to indicate similarity of the documents to each other.

Potok, Thomas E. (Oak Ridge, TN); Reed, Joel W. (Knoxville, TN); Elmore, Mark T. (Oak Ridge, TN); Treadwell, Jim N. (Louisville, TN)

2010-09-28T23:59:59.000Z

422

Systematic verification of multi-agent systems based on rigorous executable specifications  

Science Conference Proceedings (OSTI)

The multi-agent paradigm provides abstractions that facilitate the design of complex systems consisting of heterogeneous, autonomous components. Most methodologies focus on the specification of complex agent interactions using the social system metaphor, ... Keywords: MAS, agent-based systems, agent-oriented software engineering, agents, executable specifications, formal verification, model checking, multi-agent systems, simulation

Holger Giese; Florian Klein

2007-04-01T23:59:59.000Z

423

Real world market representation with agents.  

SciTech Connect

As power markets are relatively new and still continue to evolve, there is a growing need for advanced modeling approaches that simulate the behavior of electricity markets over time and how market participants may act and react to the changing economic, financial and regulatory environments in which they operate. A new and rather promising approach is to model the electricity market as a complex adaptive system using an agent-based modeling and simulation (ABMS) approach. The purpose of an ABMS model is not necessarily to predict the outcome of a system but to reveal and understand the complex and aggregate system behaviors that emerge from the interactions of the heterogeneous individual entities. Emergent behavior is a key feature of ABMS and is not easily inferred from the simple sum of the behavior of its components. By relying on both established engineering modeling techniques as well as advanced quantitative economic market principles, the ABMS approach is uniquely suited to addressing the strategic issues of interest to different market participants as well as those of market monitors and regulators.

Koritarov, V.; Decision and Information Sciences

2004-07-01T23:59:59.000Z

424

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10, 2011 10, 2011 T-644: Prenotification Security Advisory - Adobe Acrobat & Adobe Readers Updates A prenotification Security Advisory has been posted in regards to the upcoming quarterly Adobe Reader and Acrobat updates scheduled for Tuesday, June 14, 2011. The updates will address critical security issues in the products. June 9, 2011 T-643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability A vulnerability has been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system. June 9, 2011 T-642: RSA SecurID update to Customers RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products

425

Instructions for Using Secure Email via Outlook Web Access | Department of  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Email via Outlook Web Access Secure Email via Outlook Web Access Instructions for Using Secure Email via Outlook Web Access Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. Secure Email Requirements: An EITS provided Exchange email account An EITS provided RSA SecureID Token with an active account in the EITS-managed RSA Authentication Server Appropriate access granted Active Directory group membership DOEnet or Internet access and a supported web browser Secure Email Login Procedure: Enter https://smail.doe.gov/ in the address field of your Internet browser. The Outlook Web Access window appears. When using an RSA SecurID hardware token: Enter your user name in the User name field. Enter your password, which is your RSA token PIN plus the number

426

Evolutionary Role Model for Multi-Agent Systems  

Science Conference Proceedings (OSTI)

In sociology, the role concept is deeply researched to predict activities of human organizations and theorized with many sub-theories. In the same direction, multi-agent system researchers use the role concept to model and program the agents behaviours, ...

Erdem Eser Ekinci; O?uz Dikenelli

2009-11-01T23:59:59.000Z

427

Virtual Economy Simulation and Gaming - An Agent Based Approach  

Science Conference Proceedings (OSTI)

In this paper we analyze an economic systems as agent based bottom up models. For the purpose we introduce a small national economy called a virtual economy and an exchange algebra for state space description. We construct dynamical agent based simulation ...

Hiroshi Deguchi; Takao Terano; Koichi Kurumatani; Taro Yuzawa; Shigeji Hashimoto; Hiroyuki Matsui; Akio Sashima; Toshiyuki Kaneda

2001-01-01T23:59:59.000Z

428

Dialectical theory for multi-agent assumption-based planning  

Science Conference Proceedings (OSTI)

The purpose of this paper is to introduce a dialectical theory for plan synthesis based on a multi-agent approach. This approach is a promising way to devise systems based on agent planners in which the production of a global shared plan is obtained ...

Damien Pellier; Humbert Fiorino

2005-09-01T23:59:59.000Z

429

Decisions Based upon Multiple Values: The BVG Agent Architecture  

Science Conference Proceedings (OSTI)

Even a simple artificial agent will have to make decisions and consider their consequences. An agent can achieve this by evaluating situations along several dimensions. The BVG (Beliefs, Values and Goals) architecture is a means to build up such an evaluation ...

Luis Antunes; Helder Coelho

1999-09-01T23:59:59.000Z

430

Representing Possibilities in Relation to Constraints and Agents  

Science Conference Proceedings (OSTI)

In this paper we describe a framework for overcoming agent ignorance within a setting for collaborative problem solving. As a result of privacy concerns, agents may not reveal information that could be of use in problem solving. In this case, under certain ...

Richard J. Wallace

2002-09-01T23:59:59.000Z

431

Agent-Based Coalition Formation in Disaster Response Applications  

E-Print Network (OSTI)

Agent-Based Coalition Formation in Disaster Response Applications Ladislau B¨ol¨oni, Senior Member-based coalition formation ap- proach for disaster response applications. We assume that agents are operating 1. INTRODUCTION Efficient disaster response requires participants to form teams and coordinate

Bölöni, Ladislau L

432

Distributed Scheduling Agents for Disaster Response Laura Barbulescu1  

E-Print Network (OSTI)

Distributed Scheduling Agents for Disaster Response Laura Barbulescu1 , Zachary B. Rubinstein1 response coordination problem. The target problem is a field exer- cise mockup of a natural disaster, where In this paper, we describe the application of a multi-agent framework for collaborative scheduling to a disaster

Wilkins, David E.

433

Agent fitness functions for evolving coordinated sensor networks  

Science Conference Proceedings (OSTI)

Distributed sensor networks are an attractive area for research in agent systems. This is due primarily to the level of information available in applications where sensing technology has improved dramatically. These include energy systems and area coverage ... Keywords: agent fitness, distributed sensor network, neuro-evolution

Christian Roth; Matt Knudson; Kagan Tumer

2011-07-01T23:59:59.000Z

434

PADMA: PArallel Data Mining Agents for scalable text classification  

Science Conference Proceedings (OSTI)

This paper introduces PADMA (PArallel Data Mining Agents), a parallel agent based system for scalable text classification. PADMA contains modules for (1) parallel data accessing operations, (2) parallel hierarchical clustering, and (3) web-based data visualization. This paper introduces the general architecture of PADMA and presents a detailed description of its different modules.

Kargupta, H.; Hamzaoglu, I.; Stafford, B. [and others

1997-03-01T23:59:59.000Z

435

Texas Tech University Knowledge Representation Group Reasoning about agents intentions  

E-Print Network (OSTI)

1 Texas Tech University Knowledge Representation Group Reasoning about agents intentions Justin Blount and Michael Gelfond October 17, 2011 #12;2 Texas Tech University Knowledge Representation Group) and a rational agents response to the failure of a plan to achieve its goal. #12;3 Texas Tech University

Zhang, Yuanlin

436

A multi-agent system for coordinating international shipping  

Science Conference Proceedings (OSTI)

Moving commercial cargo across the US-Mexico border is currently a complex, paper-based, error-prone process that incurs expensive inspections and delays at several ports of entry in the Southwestern US. Improved information handling will dramatically reduce border dwell time, variation in delivery time, and inventories, and will give better control of the shipment process. The Border Trade Facilitation System (BTFS) is an agent-based collaborative work environment that assists geographically distributed commercial and government users with transshipment of goods across the US-Mexico border. Software agents mediate the creation, validation and secure sharing of shipment information and regulatory documentation over the Internet, using the World Wide Web to interface with human actors. Agents are organized into Agencies. Each agency represents a commercial or government agency. Agents perform four specific functions on behalf of their user organizations: (1) agents with domain knowledge elicit commercial and regulatory information from human specialists through forms presented via web browsers; (2) agents mediate information from forms with diverse otologies, copying invariant data from one form to another thereby eliminating the need for duplicate data entry; (3) cohorts of distributed agents coordinate the work flow among the various information providers and they monitor overall progress of the documentation and the location of the shipment to ensure that all regulatory requirements are met prior to arrival at the border; (4) agents provide status information to human actors and attempt to influence them when problems are predicted.

Goldsmith, S.Y.; Phillips, L.R.; Spires, S.V.

1998-05-01T23:59:59.000Z

437

A neural network-based multi-agent classifier system  

Science Conference Proceedings (OSTI)

In this paper, we propose a neural network (NN)-based multi-agent classifier system (MACS) using the trust, negotiation, and communication (TNC) reasoning model. The main contribution of this work is that a novel trust measurement method, based on the ... Keywords: Multi-agent systems, Neural networks, Pattern classification

Anas Quteishat; Chee Peng Lim; Jeffrey Tweedale; Lakhmi C. Jain

2009-03-01T23:59:59.000Z

438

Improving the agent-oriented modeling process by roles  

Science Conference Proceedings (OSTI)

The agent-oriented modeling process is divided in a typical sequence of activities, i.e., \\emph{requirements specification}, \\emph{analysis}, and \\emph{design}. The \\emph{requirements} are specified by descriptions of the system's functionality and by ... Keywords: agents, modeling process, roles, software engineering

Ralph Depke; Reiko Heckel; Jochen M. Kuster

2001-05-01T23:59:59.000Z

439

Self-organization in multi-agent systems  

Science Conference Proceedings (OSTI)

This paper is the synthesis of joint work realised in a technical forum group within the AgentLink III NoE framework, which elaborated on issues concerning self-organization and emergence in multi-agent systems (MAS). The work concluded on a common definition ...

Giovanna Di Marzo Serugendo; Marie-Pierre Gleizes; Anthony Karageorgos

2005-06-01T23:59:59.000Z

440

Distribution of goals addressed to a group of agents  

Science Conference Proceedings (OSTI)

The problem investigated in this paper is the distribution of goals addressed to a group of rational agents. Those agents are characterized by their ability (i.e. what they can do), their knowledge about the world and their commitments.The goals of the ... Keywords: goal selection, modal logic, multiagent systems, qualitative decision theory, theories of rational agency

Laurence Cholvy; Christophe Garion

2003-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Agent-Based Petroleum Offshore Monitoring Using Sensor Networks  

Science Conference Proceedings (OSTI)

This paper investigates the architecture and design of agent-based sensor networks for petroleum offshore monitoring. A few challenges to monitor the reservoir, wellbore and wellhead are identified. Moreover, the necessary components for a reliable, ... Keywords: Petroleum offshore, sensors, agent, query optimization

Sajid Hussain; M Rafiqul Islam; Elhadi Shakshuki; M. S. Zaman

2006-09-01T23:59:59.000Z

442

Parallel agent-based simulator for influenza pandemic  

Science Conference Proceedings (OSTI)

We have developed a parallel agent-based influenza pandemic simulator, in order to study the influenza spread in a city. In the simulator, the city consists of several towns connected tightly by trains. Residents of the towns walk around places such ... Keywords: agent-based simulation, influenza pandemic, parallel computing

Masaya M. Saito; Seiya Imoto; Rui Yamaguchi; Satoru Miyano; Tomoyuki Higuchi

2011-05-01T23:59:59.000Z

443

A semiotic multi-agent system for intelligent building control  

Science Conference Proceedings (OSTI)

Intelligent agents have often been used within intelligent buildings for autonomous actuation of heating, ventilation and air conditioning systems (HVAC) within intelligent buildings. Ubiquitous wireless sensors send environmental data such as temperature, ... Keywords: actuators, affordance, ambient intelligence, collaborative negotiation, intelligent buildings, multi-agent systems, personalisation, pervasive space, semiotics, wireless sensor network

Darren Booy; Kecheng Liu; Bing Qiao; Chris Guy

2008-02-01T23:59:59.000Z

444

in the Construction of KM Systems Based on Agents  

E-Print Network (OSTI)

This paper is concerned with organizing Knowledge Management in R&D projects where time is the prime factor. We argue that agents should augment groupware functionalities in order to increase the overall system pro-activity and information sharing among project members. These agents are organized, as far as possible, accordingly to the model of Ba proposed by Nonaka and Konno.

Cesar Tacla Cnrs; Cesar Tacla

1999-01-01T23:59:59.000Z

445

Ba in the construction of KM systems based on agents  

E-Print Network (OSTI)

This paper is concerned with organizing Knowledge Management in R&D projects where time is the prime factor. We argue that agents should augment groupware functionalities in order to increase the overall system pro-activity and information sharing among project members. These agents are organized, as far as possible, accordingly to the model of Ba proposed by Nonaka and Konno.

Cesar Tacla; Jean-Paul Barths

2001-01-01T23:59:59.000Z

446

Online planning for multi-agent systems with bounded communication  

Science Conference Proceedings (OSTI)

We propose an online algorithm for planning under uncertainty in multi-agent settings modeled as DEC-POMDPs. The algorithm helps overcome the high computational complexity of solving such problems offline. The key challenges in decentralized operation ... Keywords: Communication in multi-agent systems, Cooperation and collaboration, Decentralized POMDPs, Planning under uncertainty

Feng Wu; Shlomo Zilberstein; Xiaoping Chen

2011-02-01T23:59:59.000Z

447

Multi Agent Transactional Negotiation: Application to E-marketing  

Science Conference Proceedings (OSTI)

We propose a multi-agent transactional paradigm based on object-based rule systems for realising distributed agent negotiation protocols in E-marketing. The construction of the protocol is carried out in two stages: first expressing a program into an ...

Venu K. Murthy; R. Abeydeera

2002-04-01T23:59:59.000Z

448

An Agent-Based Simulation of Smart Metering Technology Adoption  

Science Conference Proceedings (OSTI)

Based on the classic behavioural theory the "Theory of Planned Behaviour," the authors have developed an agent-based model to simulate the diffusion of smart metering technology in the electricity market. The authors simulate the emergent adoption of ... Keywords: Agent-Based Simulation, Behavioural Theory, Smart Metering Technology, Technology Diffusion, Theory of Planned Behaviour

Tao Zhang; William J. Nuttall

2012-01-01T23:59:59.000Z

449

Agent-Based Spatial Query Optimization in a Grid Environment  

Science Conference Proceedings (OSTI)

Resource management and optimization among autonomous spatial databases in a grid environment is always a challenge task. In this paper, we introduce a BDI Agent model for cooperating complex spatial query optimization task in a grid environment. Spatial ... Keywords: BDI Agent, grid, spatial query optimization

Yufei Bai; Xiujun Ma; Kunqing Xie; Cuo Cai; Ke Li

2008-12-01T23:59:59.000Z

450

Empirical characterisation of agent behaviours in socio-ecological systems  

Science Conference Proceedings (OSTI)

Agent-based modelling has become an important tool to investigate socio-ecological processes. Its use is partially driven by increasing demand from decision makers to provide support for understanding the potential implications of decisions in complex ... Keywords: Agent-based modelling

Alex Smajgl; Daniel G. Brown; Diego Valbuena; Marco G. A. Huigen

2011-07-01T23:59:59.000Z

451

A mobile agent approach for global database constraint checking  

Science Conference Proceedings (OSTI)

Integrity constraints are valuable tools for enforcing consistency of data in a database. Global integrity constraints ensure integrity and consistency of data spanning multiple databases. In this paper, we propose a general framework of a mobile agent ... Keywords: global constraints, mobile agents, multi-database systems

Praveen Madiraju; Rajshekhar Sunderraman

2004-03-01T23:59:59.000Z

452

Autonomous mobile agent routing for efficient server resource allocation  

Science Conference Proceedings (OSTI)

Mobile agents are becoming increasingly important in the highly distributed applications frameworks seen today. Their routing/dispatching from node to node is a very important issue as we need to safeguard application efficiency, achieve better load ... Keywords: Bounded rationality-Santa Fe Bar Problem, Efficient resource utilization, Mobile agents

Vasileios Baousis; Stathes Hadjiefthymiades; George Alyfantis; Lazaros Merakos

2009-05-01T23:59:59.000Z

453

Threshold Route Optimization Algorithm for Information Retrieving Mobile Agents  

Science Conference Proceedings (OSTI)

Mobile agents often have the task to collect data from several predefined sites. This should be done in an efficient way by minimizing the elapsed time. Usually the agents only know the list of sites but not the distances between them. In contrast to ...

Roman Morawek

2002-09-01T23:59:59.000Z

454

A multi-agent system for information retrieval  

Science Conference Proceedings (OSTI)

This paper is focused on description of a partial project of a multiagent system for information retrieval. It is an integral part of a large ongoing project: the design of a multi-agent system for supporting medical diagnostics and monitoring in the ... Keywords: information retrieval, medical information, multi-agent system, ontology

Lenka Lhotska; Laura Prieto

2007-02-01T23:59:59.000Z

455

A theoretical framework on proactive information exchange in agent teamwork  

Science Conference Proceedings (OSTI)

Proactive information delivery is critical to achieving effective teamwork. However, existing theories do not adequately address proactive information delivery. This paper presents a formal framework for proactive information delivery in agent teamwork. ... Keywords: Agent teamwork, Communicative acts, Information needs, Proactive information delivery, Shared mental model

Xiaocong Fan; John Yen; Richard A. Volz

2005-11-01T23:59:59.000Z

456

A theoretical framework on proactive information exchange in agent teamwork  

Science Conference Proceedings (OSTI)

Proactive information delivery is critical to achieving effective teamwork. However, existing theories do not adequately address proactive information delivery. This paper presents a formal framework for proactive information delivery in agent teamwork. ... Keywords: agent teamwork, communicative acts, information needs, proactive information delivery, shared mental model

Xiaocong Fan; John Yen; Richard A. Volz

2005-11-01T23:59:59.000Z

457

FUTURE POWER GRID INITIATIVE An Intelligent Agent Platform  

E-Print Network (OSTI)

. APPROACH » Change the way the electric power system is controlled and data is collected » Develop an agent software framework that adds intelligence to networked sensors in the electric power system n Real and efficient household energy usage. VOLTTRON is being demonstrated at the Autonomous Agents and Multiagent

458

Water pollution diagnosis with a multi-agent approach  

Science Conference Proceedings (OSTI)

Providing high quality drinking water with no disruption is the main objective of every municipal water system. The paper presents the application of a multi-agent approach to water pollution diagnosis in a municipal water system. The main benefit of ... Keywords: artificial intelligence, environmental protection, multi-agent system, water pollution diagnosis

Constantin Nichita; Mihaela Oprea

2007-08-01T23:59:59.000Z

459

Primary and secondary diagnosis of multi-agent plan execution  

Science Conference Proceedings (OSTI)

Diagnosis of plan failures is an important subject in both single- and multi-agent planning. Plan diagnosis can be used to deal with plan failures in three ways: (i) to provide information necessary for the adjustment of the current plan or for the development ... Keywords: Diagnosis, Multi-agent systems, Planning

Femke Jonge; Nico Roos; Cees Witteveen

2009-04-01T23:59:59.000Z

460

Itinerary determination of imprecise mobile agents with firm deadline  

Science Conference Proceedings (OSTI)

In some applications, as part of a mobile agent mission, there may be the necessity of meeting a firm end-to-end deadline, although with some itinerary flexibility due to optional resources. This paper proposes an execution model based on the concept ... Keywords: Distributed systems, Mobile agents, Real-time

Luciana Rech; Carlos Montez; Rmulo Silva de Oliveira

2008-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

AFECS. Multi-Agent Framework for Experiment Control Systems  

Science Conference Proceedings (OSTI)

AFECS is a pure Java based software framework for designing and implementing distributed control systems. AFECS creates a control system environment as a collection of software agents behaving as finite state machines. These agents can represent real entities, such as hardware devices, software tasks, or control subsystems. A special control oriented ontology language (COOL), based on RDFS (Resource Definition Framework Schema) is provided for control system description as well as for agent communication. AFECS agents can be distributed over a variety of platforms. Agents communicate with their associated physical components using range of communication protocols, including tcl-DP, cMsg (publish-subscribe communication system developed at Jefferson Lab), SNMP (simple network management protocol), EPICS channel access protocol and JDBC.

Vardan Gyurjyan; David Abbott; William Heyes; Edward Jastrzembski; Carl Timmer; Elliott Wolin

2008-01-23T23:59:59.000Z

462

Social Behaviour of Agents: Capital Markets and Their Small Perturbations  

E-Print Network (OSTI)

We study social behaviour of agents on capital markets when these are perturbed by small perturbations. We use the mean field method. Social behaviour of agents on capital markets is described: volatility of the market, aversion constant and equilibrium states are discussed. Relaxation behaviour of agents on the capital market is studied. Equation of motion for the agent average number is of the relaxation type. Development of the group of agents in the states corresponding to minimum of the aim function is either linear either exponentially damped. There exist characteristic volatility constants $ V_{c3} $ and $ V_{c3} $. The constant b of verification of information contribution to the aversion constant A and the $ A_{0} $ constant of aversion are distinguishing three types of dependencies of the minimum of the aim function on the expected volatility EV and on the expected returns E. Arbitrage trades and group forces lead the group into the equilibrium state. Verification of information intensity influences...

Hudak, O

2005-01-01T23:59:59.000Z

463

Agentc: Agent-based system for securing maritime transit  

E-Print Network (OSTI)

Recent rise in maritime piracy prompts the search for novel techniques for addressing the problem. We therefore developed AgentC, a prototype system that demonstrates how agent-based traffic management techniques can be used to improve the security of transit through piracy-affected areas. Combining agent-based modeling and simulation of maritime traffic and novel route planning and vessel scheduling techniques, the system shows the promising potential of agent-based methods for increasing maritime security. Real-world data sources Control and presentation interface (Google Earth) Route planning and scheduling Optimum group transit formation Maritime traffic simulation Maritime environment model Randomized transit routing FSM-based vessel behavior models Optimum transit patrolling Inter-agent communication channels

Michal Jakob; Branislav Boansk; Michal P?chou?ek

2011-01-01T23:59:59.000Z

464

Rational Design of Metal Ion Sequestering Agents  

DOE Green Energy (OSTI)

The discriminate bonding of metal ions is a challenge to the synthetic chemist and a phenomenon of considerable practical importance.1 An important feature of many technical applications is the specific or preferential binding of a single metal ion in the presence of many metals. Examples range from large-volume uses (e.g. ferric EDTA as a plant food, calcium complexing agents as water softeners or anticaking formulations) to very high technology applications (technetium complexation in radiopharmaceuticals, synthetic metalloenzymes). We are interested in efficient and discriminate binding of actinides for waste stream remediation. Actinides represent a major and long-lived contaminant in nuclear waste. While the separation of actinides from other radioactive components of waste, such as Sr and Cs, is relatively well established, the separation of actinides from each other and in complex solutions (e.g. those found in tank wastes) is not as well resolved. The challenge of designing metal-specific (actinide) ligands is facilitated by examples from nature. Bacteria synthesize Fe(III)-specific ligands, called siderophores, to sequester Fe(III) from the environment and return it to the cell. The similarities between Fe(III) and Pu(IV) (their charge-to-size ratios and acidity), make the siderophores prototypical for designing actinide-specific ligands. The chelating groups present in siderophores are usually hydroxamic acids and catecholamides. We have developed derivatives of these natural products which have improved properties. The catechol derivatives are the 2,3-dihydroxyterephthalamides (TAMs), and 3,4-dihydroxysulfonamides (SFAMs), and the hydroxamic acid derivatives are three isomers of hydroxypyridinones, 1,2- HOPO, 3,2-HOPO, and 3,4-HOPO. All of these ligands are attached to molecular backbones by amides and a very important feature of HOPO and CAM ligands is a strong hydrogen bonds formed between the amide proton and the adjacent phenolic oxygen in the metal complex, thereby enhancing the stability (Figure 1).

Raymond, Kenneth N.

2000-09-30T23:59:59.000Z

465

Analysis of decontamination solutions of G agents to detect reformation of agent. Final report, December 1991-March 1992  

SciTech Connect

Agents from a full scale binary munition test were decontaminated with caustic in a 300 gal holding tank. Analysis of the contents by standard methods revealed a trace amount of G agent present despite the highly caustic solution. A technical review of the analytical methods was carried out to determine if the G agent was actually present or an artifact of the analysis. A literature search revealed similar concerns when brine solutions from nerve agent decontamination were analyzed using similar analytical methods. This study concluded that nerve agents reformed at reduced PH or in chloroform extracts of the neutralized or slightly acidic brines. Experiments using nuclear magnetic resonance (NMR), gas chromatography (GC), and GC/mass spectrometry (GC/MS) were used to see where, if any, G agent was present during the analysis. Results obtained confirmed G agent reforming in either the neutral aqueous solution or in the chloroform extract but not in chloroform extracts of the caustic solution. No agent was detected using methylene chloride as the extraction solvent as recommended by the earlier study.

Beaudry, W.T.; Buchanan, J.H.; Rohrbaugh, D.K.; Samuel, J.B.; Szafraniec, L.L.

1993-01-01T23:59:59.000Z

466

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 19, 2011 August 19, 2011 T-697: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible. August 18, 2011 T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. August 16, 2011 T-694: IBM Tivoli Federated Identity Manager Products Multiple

467

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19, 2011 19, 2011 T-697: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible. August 18, 2011 T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. August 17, 2011 T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets

468

Integrating Patterns and Agent-Oriented Methodologies to Provide Better Solutions for the Development of Secure Agent-Based Systems  

E-Print Network (OSTI)

Although pattern languages have already been proposed for security modelling, such languages mostly employ concepts and notations related to object-oriented systems, and have mainly neglected the agent-oriented paradigm. In this position paper we argue about the need to define a security pattern language applicable to agent-based systems that employs concepts based in the agent-oriented paradigm. In addition, we motivate the need to integrate such a language within the development stages of an agent-oriented methodology, and we briefly discuss what such a language should contain, Keywords: documenting pattern languages, linking requirements to patterns, patterns for secure agent-based systems, integrating patterns with a development methodology, agentoriented software engineering methodologies 1.

Haralambos Mouratidis; Paolo Giorgini; Michael Weiss

2003-01-01T23:59:59.000Z

469

Volttron: An Agent Platform for the Smart Grid  

SciTech Connect

VOLLTRON platform enables the deployment of intelligent sensors and controllers in the smart grid and provides a stable, secure and flexible framework that expands the sensing and control capabilities. VOLTTRON platform provides services fulfilling the essential requirements of resource management and security for agent operation in the power grid. The facilities provided by the platform allow agent developers to focus on the implementation of their agent system and not on the necessary "plumbing' code. For example, a simple collaborative demand response application was written in less than 200 lines of Python.

Haack, Jereme N.; Akyol, Bora A.; Carpenter, Brandon J.; Tews, Cody W.; Foglesong, Lance W.

2013-05-06T23:59:59.000Z

470

Biosecurity reference : CFR-listed agent and toxin summaries.  

SciTech Connect

This reference document provides summary information on the animal, plant, zoonotic, and human pathogens and toxins regulated and categorized by 9 CFR 331 and 7 CFR 121, 'Agricultural Bioterrorism Protection Act of 2002; Possession, Use and Transfer of Biological Agents and Toxins,' and 42 CFR 73, 'Possession, Use, and Transfer of Select Agents and Toxins.' Summary information includes, at a minimum, a description of the agent and its associated symptoms; often additional information is provided on the diagnosis, treatment, geographic distribution, transmission, control and eradication, and impacts on public health.

Barnett, Natalie Beth

2003-09-01T23:59:59.000Z

471

TESLA: Multicast Source Authentication Transform  

E-Print Network (OSTI)

This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet-Drafts are working documents of the Internet Engineering

Internet Draft Perrig

2000-01-01T23:59:59.000Z

472

Agent Tcl: A flexible and secure mobileagent Submitted to the Faculty  

E-Print Network (OSTI)

Agent Tcl: A flexible and secure mobile­agent system A Thesis Submitted to the Faculty in partial malicious machines), and insulating the agent against network and machine failures. Agent Tcl is a mobile­agent system under development at Dartmouth College that has evolved from a Tcl­only system into a multiple

473

Agent-Based Modeling and Simulation for Hydrogen Transition Analysis  

NLE Websites -- All DOE Office Websites (Extended Search)

Agent Agent Agent - - Based Modeling Based Modeling and Simulation (ABMS) and Simulation (ABMS) for Hydrogen Transition for Hydrogen Transition Analysis Analysis Marianne Mintz Hydrogen Transition Analysis Workshop US Department of Energy January 26, 2006 Objectives and Scope for Phase 1 2 Analyze the hydrogen infrastructure development as a complex adaptive system using an agent-based modeling and simulation (ABMS) approach Develop an ABMS model to simulate the evolution of that system, spanning the entire H2 supply chain from production to consumption Identify key factors that either promote or inhibit the growth of H2 infrastructure Apply ABMS to get new insights into transition, particularly early transition phase - Dynamic interplay between supply and demand

474

Factors in selecting and applying commercial explosives and blasting agents  

SciTech Connect

In this report, commercial blasting compounds are classified according to their nitroglycerin (or equivalent explosive oil) and ammonium nitrate content as dynamites, gelatins, blasting agents, military explosives, and blasting accessories. The ingredients and more significant properties of each explosive are tabulated and briefly discussed. Properties discussed are weight strength, cartridge strength, detonation velocity, density, detonation pressure, water resistance, and fume class. The weakness of the strength rating system and the importance of detonation pressure, density, and detonation velocity in rating explosives are discussed. The terms blasting agent and slurry, which are often misused, are defined. Trends indicate that blasting agents (that is, blasting mixtures with none of the ingredients singly classified as an explosive), particularly high-density slurry blasting agents, will dominate the explosives field in the future. (22 refs.)

Dick, R.A.

1968-01-01T23:59:59.000Z

475

Process for foaming aqueous protein-containing blasting agents  

SciTech Connect

A process is provided for foaming blasting agents which cosists of (1) passing a thickened protein-containing water-bearing blasting agent through a number of orifices at a pressure of about 40 to 160, preferably 125 to 140 psi into a suction chamber in order to form a number of streams of thickened explosive and create a vacuum in the area where the blasting agent exists; (2) simultaneously incorporating gas into the thickened explosive in the suction chamber so as to cause an intimate admixture of the gas with the thickened explosive; and (3) thereafter reducing the velocity of the thickened explosive by subsequently passing it through an enlarged opening, and recovering the resulting foamed, thickened blasting agent. (6 claims)

Adams, P.E.; Fearnow, P.W.

1972-07-18T23:59:59.000Z

476

Distributed Intelligent Agents for Decision Making at Local Distributed  

NLE Websites -- All DOE Office Websites (Extended Search)

Distributed Intelligent Agents for Decision Making at Local Distributed Distributed Intelligent Agents for Decision Making at Local Distributed Energy Resource (DER) Levels Speaker(s): David Cohen Date: June 3, 2005 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Peng Xu Our goals are to develop and commercialize a system of adaptive, intelligent software components which run at distributed locations (DER-level) on the energy network to improve the reliability, efficiency, and security of the U.S. electrical distribution network. We are developing GridAgents, an enabling software technology framework and platform using a distributed multi-agent systems approach for advanced communications and control capabilities (large- scale automated demand response, distribution automation control, and Microgrid control applications). For more

477

Kit for providing a technetium medical radioimaging agent  

DOE Patents (OSTI)

The present invention is directed toward a kit for microbial reduction of a technetium compound to form other compounds of value in medical imaging. The technetium compound is combined in a mixture with non-growing microbial cells which contain a technetium-reducing enzyme system, a stabilizing agent and an electron donor in a saline solution under anaerobic conditions. The mixture is substantially free of an inorganic technetium reducing agent and its reduction products. The resulting product is Tc of lower oxidation states, the form of which can be partially controlled by the stabilizing agent. It has been discovered that the microorganisms Shewanella alga, strain Bry and Shewanella putrifacians, strain CN-32 contain the necessary enzyme systems for technetium reduction and can form both mono nuclear and polynuclear reduced Tc species depending on the stabilizing agent.

Wildung, Raymond E. (Richland, WA); Garland, Thomas R. (Greybull, WY); Li, Shu-Mei W. (Richland, WA)

2000-01-01T23:59:59.000Z

478

A Proposal of PVCs Configuration Methodology Employing Mobile Agents  

Science Conference Proceedings (OSTI)

This paper presents a research about the technology of mobile agents which has Concordia system as its platform. Concordia was developed by Mitsubishi Eletric Information Technology Center America. In the latest years, the Internet became the main media ...

Andr Ribeiro Cardoso; Joaquim Celestino, Jr.

2001-08-01T23:59:59.000Z

479

Strategy learning for autonomous agents in smart grid markets  

Science Conference Proceedings (OSTI)

Distributed electricity producers, such as small wind farms and solar installations, pose several technical and economic challenges in Smart Grid design. One approach to addressing these challenges is through Broker Agents who buy electricity from distributed ...

Prashant P. Reddy; Manuela M. Veloso

2011-07-01T23:59:59.000Z

480

An Agent-Based Modeling for Pandemic Influenza in Egypt  

E-Print Network (OSTI)

Pandemic influenza has great potential to cause large and rapid increases in deaths and serious illness. The objective of this paper is to develop an agent-based model to simulate the spread of pandemic influenza (novel H1N1) in Egypt. The proposed multi-agent model is based on the modeling of individuals' interactions in a space time context. The proposed model involves different types of parameters such as: social agent attributes, distribution of Egypt population, and patterns of agents' interactions. Analysis of modeling results leads to understanding the characteristics of the modeled pandemic, transmission patterns, and the conditions under which an outbreak might occur. In addition, the proposed model is used to measure the effectiveness of different control strategies to intervene the pandemic spread.

Khalil, Khaled M; Nazmy, Taymour T; Salem, Abdel-Badeeh M

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Decontamination of Hypercubes by Mobile Agents Paola Flocchini  

E-Print Network (OSTI)

is initially located on a single node, the homebase, and the agents can move freely from the node. Initially all nodes are contaminated except for the homebase, which is obviously guarded. The solution

Flocchini, Paola

482

Optical techniques for detecting and identifying biological-warfare agents  

E-Print Network (OSTI)

Rapid and accurate detection and identification of biological agents is an objective of various national security programs. Detection in general is difficult owing to natural clutter and anticipated low concentrations of ...

Greenwood, Darryl P.

483

Safe agents in space: lessons from the autonomous sciencecraft experiment  

Science Conference Proceedings (OSTI)

An Autonomous Science Agent is currently flying onboard the Earth Observing One Spacecraft This software enables the spacecraft to autonomously detect and respond to science events occurring on the Earth The package includes software systems that perform ...

Rob Sherwood; Steve Chien; Daniel Tran; Benjamin Cichy; Rebecca Castano; Ashley Davies; Gregg Rabideau

2004-12-01T23:59:59.000Z

484

Volttron: an agent platform for the smart grid  

Science Conference Proceedings (OSTI)

VOLLTRON" platform enables the deployment of intelligent sensors and controllers in the smart grid and provides a stable, secure and flexible framework that expands the sensing and control capabilities. VOLTTRON" platform provides services fulfilling ... Keywords: agent platform, smartgrid

Jereme Haack, Bora Akyol, Brandon Carpenter, Cody Tews, Lance Foglesong

2013-05-01T23:59:59.000Z

485

ACTINIDE-SPECIFIC SEQUESTERING AGENTS AND DECONTAMINATION APPLICATIONS  

E-Print Network (OSTI)

Sequestering Agents Specific for Pu(IV) Summary , References9). absorbed body similar Pu(IV) is similar to strychnine,of blood very low doses of 239 Pu significantly shorten the

Smith, William L.

2013-01-01T23:59:59.000Z

486

Woodstein : a Web interface agent for debugging e-commerce  

E-Print Network (OSTI)

Woodstein is a software agent that works with a user's web browser to explain and help diagnose problems in web processes, such as purchases. It enables the user to inspect data items in ordinary web pages, revealing the ...

Wagner, Earl Joseph, 1977-

2003-01-01T23:59:59.000Z

487

Input handling in agent-based micro-level simulators.  

E-Print Network (OSTI)

??In this thesis we presented a new direction for handling missing values in multi agent-based simulation (MABS) at micro-level by using truth tables and logical (more)

Fayyaz, Muhammad

2010-01-01T23:59:59.000Z

488

Risk Allocation for Multi-agent Systems using Tatonnement  

E-Print Network (OSTI)

This paper proposes a new market-based distributed planning algorithm for multi-agent systems under uncertainty, called MIRA (Market-based Iterative Risk Allocation). In large coordination problems, from power grid management ...

Williams, Brian C.

2009-04-22T23:59:59.000Z

489

ECASL: A Model of Rational Agency for Communicating Agents  

E-Print Network (OSTI)

Abstract. The Cognitive Agent Specification Language (CASL) is a framework for specifying and verifying complex communicating multiagent systems. In this paper, we extend CASL to incorporate a formal model of means-end reasoning suitable for a multiagent context. In particular, we define a simple model of cooperative ability, give a definition of rational plans, and show how an agents intentions play a role in determining her next actions. This bridges the gap between intentions to achieve a goal and intentions to act. We also define a notion of subjective plan execution and show that in the absence of interference, an agent that is able to achieve a goal, intends to do so, and is acting rationally and subjectively executing plans, will eventually achieve it. 1

Shakil M. Khan; Yves Lesprance

2005-01-01T23:59:59.000Z

490

Agent-Based Wave Computation: Towards Controlling the Resource Demand  

Science Conference Proceedings (OSTI)

In recent years, the mobile agent paradigm has received significant consideration in the context of large complex decentralized systems. Tasks such as system monitoring, load balancing and resource management have been successfully mapped onto this paradigm. ...

Armin R. Mikler; Vivek S. Chokhani

2001-06-01T23:59:59.000Z

491

Probabilistic search optimization and mission assignment for heterogeneous autonomous agents  

Science Conference Proceedings (OSTI)

This paper presents an algorithmic framework for conducting search and identification missions using multiple heterogeneous agents. Dynamic objects of type "neutral" or "target" move through a discretized environment. Probabilistic representation of ...

Timothy H. Chung; Moshe Kress; Johannes O. Royset

2009-05-01T23:59:59.000Z

492

Communicating effectively in resource-constrained multi-agent systems  

Science Conference Proceedings (OSTI)

Agents with partial observability need to share information to achieve decentralised coordination. However, in resource-constrained systems, indiscriminate communication can create performance bottlenecks by consuming valuable bandwidth. Therefore, there ...

Partha S. Dutta; Claudia V. Goldman; Nicholas R. Jennings

2007-01-01T23:59:59.000Z

493

Robust distributed planning strategies for autonomous multi-agent teams  

E-Print Network (OSTI)

The increased use of autonomous robotic agents, such as unmanned aerial vehicles (UAVs) and ground rovers, for complex missions has motivated the development of autonomous task allocation and planning methods that ensure ...

Ponda, Sameera S

2012-01-01T23:59:59.000Z

494

Approximate dynamic programming with applications in multi-agent systems  

E-Print Network (OSTI)

This thesis presents the development and implementation of approximate dynamic programming methods used to manage multi-agent systems. The purpose of this thesis is to develop an architectural framework and theoretical ...

Valenti, Mario J. (Mario James), 1976-

2007-01-01T23:59:59.000Z

495

The Impact of Blowing Agents on Residential Water Heater Performance  

NLE Websites -- All DOE Office Websites (Extended Search)

The Impact of Blowing Agents on Residential Water Heater Performance The Impact of Blowing Agents on Residential Water Heater Performance Title The Impact of Blowing Agents on Residential Water Heater Performance Publication Type Report LBNL Report Number LBNL-47352 Year of Publication 2001 Authors Lekov, Alexander B., James D. Lutz, Camilla Dunham Whitehead, and James E. McMahon Document Number LBNL-47352 Date Published January 12 Abstract The National Appliance Energy Conservation Act of 1987 (NAECA) requires the U.S. Department of Energy (DOE) to consider amendments to the energy conservation standards to increase energy efficiency in residential water heaters. A driving force affecting efficiency is the ozone-depletion regulation regarding blowing agents for insulation in all water heater fuel types. This paper presents results of cost and efficiency impacts of three potential blowing agents. Residential water heaters are typically insulated with polyurethane foam in the space between the tank and the jacket. Currently, water heater manufacturers use HCFC-141b, an ozone-depleting substance, as a blowing agent. After 2003, as a result of the Montreal Protocol (1993), manufacturers must use blowing agents that do not deplete the ozone layer. The analysis presented in this paper considers three replacement candidates, HFC-245fa, HFC-134a, and cyclopentane by comparing their efficiency and cost effectiveness when applied to water heater insulation. This analysis used computer simulation models and other analytical methods to investigate the efficiency improvements due to different design options, when alternative blowing agents are applied. The calculations were based on the DOE test procedure for residential water heaters. The analysis used average manufacturer, retailer, and installer costs to calculate the total consumer costs. Consumer operating expenses were calculated based on modeled energy consumption under test procedure conditions and U.S. average energy prices. With this information, a cost-efficiency relationship was developed to show the average manufacturer and consumer cost to achieve increased efficiency.

496

Scalable, distributed data mining using an agent based architecture  

Science Conference Proceedings (OSTI)

Algorithm scalability and the distributed nature of both data and computation deserve serious attention in the context of data mining. This paper presents PADMA (PArallel Data Mining Agents), a parallel agent based system, that makes an effort to address these issues. PADMA contains modules for (1) parallel data accessing operations, (2) parallel hierarchical clustering, and (3) web-based data visualization. This paper describes the general architecture of PADMA and experimental results.

Kargupta, H.; Hamzaoglu, I.; Stafford, B.

1997-05-01T23:59:59.000Z

497

The fractional volatility model: An agent-based interpretation  

E-Print Network (OSTI)

Based on criteria of mathematical simplicity and consistency with empirical market data, a model with volatility driven by fractional noise has been constructed which provides a fairly accurate mathematical parametrization of the data. Here, some features of the model are discussed and, using agent-based models, one tries to find which agent strategies and (or) properties of the financial institutions might be responsible for the features of the fractional volatility model.

Mendes, R Vilela

2007-01-01T23:59:59.000Z

498

Fuel Panics - insights from spatial agent-based simulation  

E-Print Network (OSTI)

UNIVERSITY OF CAMBRIDGE Cambridge Working Papers in Economics Fuel Panics insights from spatial agent-based simulation Eben Upton and William J. Nuttall CWPE 1309 Fuel Panics insights from spatial agent-based simulation EPRG... Working Paper 1305 Cambridge Working Paper in Economics 1309 Eben Upton and William J. Nuttall Abstract The United Kingdom has twice suffered major disruption as a result of fuel panics first in September 2000 coincident with a wave...

Upton, Eben; Nuttall, William J.

2013-04-01T23:59:59.000Z

499

Developing a Generic Agent-based Intelligent Tutoring System  

E-Print Network (OSTI)

We developed a generic teaching environment that uses agents to support learning. An agent platform developed in our research group is used. The system is generic in the sense that the cognition core (domain model, student model and instruction model) is separated from the exercise modules and user interfaces. The architecture allows different user interfaces. An application of the environment for nurse training has been implemented.

Hospers Kroezen Nijholt; M. Hospers; E. Kroezen; A. Nijholt; R. Op Den Akker; D. Heylen

2003-01-01T23:59:59.000Z

500

Field-based coordination of mobile intelligent agents: an evolutionary game theoretic analysis  

Science Conference Proceedings (OSTI)

The paper deals with field-based coordination of agent team in which the continental divide game is applied as a coordination mechanism. The agent team consists of self-interested mobile intelligent agents whose behaviour is modelled using coordination ...

Krunoslav Trzec; Ignac Lovrek

2007-09-01T23:59:59.000Z