Powered by Deep Web Technologies
Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass...

2

V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication  

Broader source: Energy.gov (indexed) [DOE]

3: RSA Authentication Agent Lets Remote Users Bypass 3: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements PLATFORM: RSA Authentication Agent 7.1, 7.1.1 for Microsoft Windows ABSTRACT: A vulnerability was reported in RSA Authentication Agent. REFERENCE LINKS: RSA SecurCare SecurityTracker Alert ID: 1028230 CVE-2013-0931 IMPACT ASSESSMENT: Medium DISCUSSION: On systems configured for Quick PIN Unlock, the system will request a PIN instead of a full Passcode when the session is activated from an active screensaver after the Quick PIN Unlock timeout has expired. RSA Authentication Agent on Windows Vista, Windows 7, Windows 2008, and

3

V-223: RSA Authentication Agent for PAM Allows Remote Users to Make  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

3: RSA Authentication Agent for PAM Allows Remote Users to Make 3: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts V-223: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts August 21, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in RSA Authentication Agent for PAM PLATFORM: RSA Authentication Agent for PAM 7.0.2 and prior ABSTRACT: A remote user can make unlimited login attempts REFERENCE LINKS: Security Tracker Alert ID 1028930 CVE-2013-3271 IMPACT ASSESSMENT: Medium DISCUSSION: The system does not restrict the number of login attempts made via the agent IMPACT: System Access SOLUTION: Vendor has issued a fix Addthis Related Articles U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability

4

T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

6: RSA Adaptive Authentication Has Unspecified Remote 6: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw August 18, 2011 - 3:09pm Addthis PROBLEM: A vulnerability was reported in RSA Adaptive Authentication. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3, 6.0.2.1 SP2 and SP2 Patch 1, 6.0.2.1 SP3 ABSTRACT: An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. reference LINKS: Security Tracker: 1025956

5

V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...  

Broader source: Energy.gov (indexed) [DOE]

Agent Discloses Node Secret Encryption Key to Local Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5...

6

T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticate...  

Broader source: Energy.gov (indexed) [DOE]

A vulnerability was reported in RSA Adaptive Authentication. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3, 6.0.2.1 SP2 and SP2 Patch 1, 6.0.2.1 SP3 ABSTRACT: An issue with...

7

V-174: RSA Authentication Manager Writes Operating System, SNMP...  

Broader source: Energy.gov (indexed) [DOE]

SNMP, and HTTP plug-in proxy passwords. SOLUTION: The vendor has issued a fix (8.0 Patch 1 (P1)). Addthis Related Articles V-195: RSA Authentication Manager Lets Local Users...

8

V-195: RSA Authentication Manager Lets Local Users View the Administrative  

Broader source: Energy.gov (indexed) [DOE]

95: RSA Authentication Manager Lets Local Users View the 95: RSA Authentication Manager Lets Local Users View the Administrative Account Password V-195: RSA Authentication Manager Lets Local Users View the Administrative Account Password July 9, 2013 - 12:51am Addthis PROBLEM: RSA Authentication Manager Lets Local Users View the Administrative Account Password PLATFORM: RSA Authentication Manager 7.1, 8.0 ABSTRACT: A vulnerability was reported in RSA Authentication Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028742 CVE-2013-3273 RSA IMPACT ASSESSMENT: Medium DISCUSSION: When the RSA Authentication Manager Software Development Kit (SDK) is used to develop a custom application that connects with RSA Authentication Manager and the trace logging is set to verbose, the administrative account password used by the custom application is written in clear text to trace

9

V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws  

Broader source: Energy.gov (indexed) [DOE]

4: RSA Adaptive Authentication (On-Premise) Input Validation 4: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks November 27, 2012 - 2:00am Addthis PROBLEM: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks PLATFORM: RSA Adaptive Authentication (On-Premise) 6.x ABSTRACT: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). REFERENCE LINKS: SecurityTracker Alert ID: 1027811 SecurityFocus Security Alert RSA Customer Support CVE-2012-4611 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). A remote user can conduct cross-site scripting attacks. The software does not

10

U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA®  

Broader source: Energy.gov (indexed) [DOE]

7: RSA® Authentication Agent 7.1 for Microsoft Windows® and 7: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability September 25, 2012 - 6:00am Addthis PROBLEM: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability PLATFORM: Product: RSA Authentication Agent for Microsoft Windows version 7.1 Platforms: Windows XP and Windows 2003 Product: RSA Authentication Client 3.5 Platforms: Windows XP and Windows 2003 ABSTRACT: RSA Authentication Agent Lets Remote Authenticated Users Bypass an Authentication Step reference LINKS: SecurityTracker Alert ID: 1027559 Bugtraq ID: 55662

11

V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP  

Broader source: Energy.gov (indexed) [DOE]

4: RSA Authentication Manager Writes Operating System, SNMP, 4: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files June 10, 2013 - 12:47am Addthis PROBLEM: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files PLATFORM: RSA Authentication Manager 8.0 ABSTRACT: A vulnerability was reported in RSA Authentication Manager. REFERENCE LINKS: RSA SecurityTracker Alert ID: 1028638 CVE-2013-0947 IMPACT ASSESSMENT: Medium DISCUSSION: The system may write operating system, SNMP, and HTTP plug-in proxy passwords in clear text to log and configuration files. IMPACT: A local user can obtain operating system, SNMP, and HTTP plug-in proxy

12

U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame  

Broader source: Energy.gov (indexed) [DOE]

2: RSA Authentication Manager Flaws Permit Cross-Site and 2: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other versions may also be affected. ABSTRACT: RSA Authentication Manager is prone to multiple security vulnerabilities because it fails to properly sanitize user-supplied input. Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be possible.

13

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

704: RSA enVision Lets Remote Users View Files and Remote 704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

14

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

4: RSA enVision Lets Remote Users View Files and Remote 4: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

15

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain  

Broader source: Energy.gov (indexed) [DOE]

1: RSA Adaptive Authentication Bugs Let Remote Users Bypass 1: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls December 14, 2011 - 8:17am Addthis PROBLEM: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may be able to bypass certain security controls. reference LINKS: SecurityTracker Alert ID: 1026420 Security Focus: ESA-2011-036 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA Adaptive Authentication (On-Premise). A remote user may be able to bypass certain security controls. A remote user can send specially crafted data elements to affect the Device

16

V-195: RSA Authentication Manager Lets Local Users View the Administra...  

Broader source: Energy.gov (indexed) [DOE]

can view the administrative account password SOLUTION: The vendor has issued a fix (Patch 26 (P26) for RSA Authentication Manager 7.1 Service Pack 4 (SP4) and Appliance 3.0...

17

U-212: RSA Authentication Manager Flaws Permit Cross-Site and...  

Broader source: Energy.gov (indexed) [DOE]

actions on the site acting as the target user. Solution: The vendor has issued a fix (Patch 14 (P14) for RSA Authentication Manager 7.1 SP4 and Appliance 3.0 SP4). Addthis...

18

Deniable Authentication with RSA and Multicasting Daniel R. L. Brown  

E-Print Network [OSTI]

. Related concepts to deniable authentication are plausible deniability and prevention of surreptitious

19

Deniable Authentication with RSA and Multicasting Daniel R. L. Brown  

E-Print Network [OSTI]

of surreptitious forwarding. The IETF S/MIME protocol, which can be used to secure email, includes an Authenticated

20

T-659: Update support for RSA Authentication Manager | Department...  

Broader source: Energy.gov (indexed) [DOE]

Manager July 1, 2011 - 7:15am Addthis PROBLEM: Authentication Manager SP4 Patch 4 Windows Server 2008 PLATFORM: Windows Server 2008 SP4 Patch 4 32bit & 64bit...

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

T-582: RSA systems has resulted in certain information being extracted from  

Broader source: Energy.gov (indexed) [DOE]

2: RSA systems has resulted in certain information being 2: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID March 17, 2011 - 11:45pm Addthis PROBLEM: Recently EMC's security systems identified an extremely sophisticated cyber attack in progress, targeting their RSA business unit. RSA took a variety of aggressive measures against the threat to protect their business and their customers, including further hardening of their IT infrastructure. PLATFORM: RSA SecurID implementations ABSTRACT: RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

22

T-642: RSA SecurID update to Customers | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2: RSA SecurID update to Customers 2: RSA SecurID update to Customers T-642: RSA SecurID update to Customers June 9, 2011 - 12:45am Addthis PROBLEM: Certain characteristics of the attack on RSA indicated that the perpetrator's most likely motive was to obtain an element of security information that could be used to target defense secrets and related IP, rather than financial gain, PII, or public embarrassment. PLATFORM: RSA SecurID implementations ABSTRACT: RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products. reference LINKS: Open Letter to RSA Customers (update) CVE-2011-0322 RSA Fraud Resource Center RSA Security Practice DOE-CIRC T-640: RSA Access Manager Server CVE-2011-0322 Update

23

U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate  

Broader source: Energy.gov (indexed) [DOE]

7: RSA Key Manager Appliance Session Logout Bug Fails to 7: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions November 4, 2011 - 8:00am Addthis PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated user session may not terminate properly. reference LINKS: SecurityTracker Alert ID: 1026276 SecurityFocus Bug Traq Seclists: ESA-2011-035 CVE-2011-2740 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in RSA Key Manager Appliance. A remote authenticated user session may not terminate properly. When using Firefox 4 and 5, an authenticated user session is not terminated properly when logging out.

24

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and  

Broader source: Energy.gov (indexed) [DOE]

9: RSA enVision Bugs Permit Cross-Site Scripting, SQL 9: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks March 20, 2012 - 7:00am Addthis PROBLEM: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. Reference LINKS: SecurityTracker Alert ID: 1026819 CVE-2012-0403 IMPACT ASSESSMENT: High Discussion: The system does not properly filter HTML code from user-supplied input

25

TwoKind Authentication: Usable Authenticators for Untrustworthy Environments  

E-Print Network [OSTI]

damage if the session or their password is compromised. 1. INTRODUCTION In today's Internet. Current authentication mechanisms such as one-time passwords [4] (such as RSA SecurID [3]) and privileged-time passwords limit the damage caused by stolen passwords, but allow full-scale damage in a hijacked session

Smith, Sean W.

26

Using Two-Factor RSA Token  

Broader source: Energy.gov (indexed) [DOE]

Using Two-Factor RSA Token Using Two-Factor RSA Token with VPN User Guide November 2013 Using Your RSA token with WebVPN 1. Establish a connection to the Internet and connect to https://connect.doe.gov 2. Users who are using their RSA Token for the first time should follow the steps below for PIN creation. Others who have already set up their PIN and used their RSA token previously should enter their six digit numeric username and passcode; this is the PIN + the RSA token code. The result of this successful login will be Step 8 below. 3. A login page similar to the picture below will be displayed. Enter your VPN Username (six-digit numeric ID) and your Password by typing your generated RSA Token code and then click the Login button. Example; your generated RSA token code is 032848 (from above). In the Password box, you will enter

27

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Broader source: Energy.gov (indexed) [DOE]

5: RSA Access Manager Session Replay Flaw Lets Remote Users 5: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

28

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Broader source: Energy.gov (indexed) [DOE]

205: RSA Access Manager Session Replay Flaw Lets Remote Users 205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

29

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass...  

Broader source: Energy.gov (indexed) [DOE]

Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may...

30

T-582: RSA systems has resulted in certain information being...  

Broader source: Energy.gov (indexed) [DOE]

certain information being extracted from RSA systems that relates to RSA SecurID March 17, 2011 - 11:45pm Addthis PROBLEM: Recently EMC's security systems identified an extremely...

31

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...  

Energy Savers [EERE]

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit...

32

T-640: RSA Access Manager Server CVE-2011-0322 Update | Department of  

Broader source: Energy.gov (indexed) [DOE]

0: RSA Access Manager Server CVE-2011-0322 Update 0: RSA Access Manager Server CVE-2011-0322 Update T-640: RSA Access Manager Server CVE-2011-0322 Update June 7, 2011 - 5:18pm Addthis PROBLEM: ESA-2011-009 (revised): RSA, The Security Division of EMC, announces new fix for potential security vulnerability in RSA Access Manager Server. PLATFORM: RSA Access Manager Server version 5.5.x, 6.0.x, and 6.1.x ABSTRACT: RSA strongly recommends that all customers running RSA Access Manager Server versions 5.5.3, 6.0.4, and 6.1 apply the following updated security hot fixes, which contain the resolution to this issue, at the earliest opportunity. The hot fixes can be downloaded from SecurCare Online or by contacting RSA Security Customer Support. ?Security Hot fix # 5.5.3.174 for RSA Access Manager Server version 5.5.3

33

MOTOR VEHICLE (Pursuant to RSA 260:14)  

E-Print Network [OSTI]

permitted pursuant to RSA 260:14, V (a ), other than for bulk distribution for surveys, marketing/I.D. #: _________________________________ Vehicle Identification #: _________________________________ Last Known Address/Town _______________________________ Other Identification Information: ________________________ ***Reverse Side Must Be Completed Before

New Hampshire, University of

34

U-090: RSA enVision Discloses Environment Variable Information...  

Broader source: Energy.gov (indexed) [DOE]

and other fixes can be found in the Release Notes associated with RSA enVision 4.1, Patch 3 and enVision V4.0 Service Pack 4 Patch 5. Impact: Exposure of sensitive information...

35

Two-Factor Authentication  

Broader source: Energy.gov [DOE]

Two-Factor Authentication (2FA) is a system wherein two different methods are used to authenticate an individual. 2FA is based on something you know (a secret PIN) and something you have (an...

36

Multi-factor authentication  

DOE Patents [OSTI]

Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

Hamlet, Jason R; Pierson, Lyndon G

2014-10-21T23:59:59.000Z

37

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Broader source: Energy.gov (indexed) [DOE]

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

38

Authentication ofAuthentication ofAuthentication ofAuthentication of Degree Certificates Application Form Name in Full  

E-Print Network [OSTI]

Authentication ofAuthentication ofAuthentication ofAuthentication of Degree Certificates Application Form Name in Full Name in Full as Registered at King's Date of Birth Student ID number (IE degree certificate copies for authentication to: PLEASE REMEMBER TO INCLUDE COPIES OF YOUR CERTIFICATE(S

Applebaum, David

39

Fault-Based Attack of RSA Authentication Andrea Pellegrini, Valeria Bertacco and Todd Austin  

E-Print Network [OSTI]

a straightforward design architecture that en- tails a small silicon footprint and low-power profile. Our research enviromental manipulations. Our fault-based attack can be succ

Austin, Todd M.

40

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

3: RSA SecurID Software Token for Windows DLL Loading Error 3: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code December 16, 2011 - 8:00am Addthis PROBLEM: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code. PLATFORM: RSA SecurID Software Token 4.1 for Microsoft Windows ABSTRACT: A remote user can cause the target application to execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026426 ESA-2011-039 Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA SecurID Software Token. A remote user

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

63: RSA SecurID Software Token for Windows DLL Loading Error 63: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code December 16, 2011 - 8:00am Addthis PROBLEM: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code. PLATFORM: RSA SecurID Software Token 4.1 for Microsoft Windows ABSTRACT: A remote user can cause the target application to execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026426 ESA-2011-039 Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA SecurID Software Token. A remote user

42

U-120: RSA SecurID Software Token Converter Unspecified Buffer Overflow  

Broader source: Energy.gov (indexed) [DOE]

0: RSA SecurID Software Token Converter Unspecified Buffer 0: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability U-120: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability March 8, 2012 - 7:00am Addthis PROBLEM: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability PLATFORM: RSA SecurID Software Token Converter 2.x ABSTRACT: Successful exploitation may allow execution of arbitrary code. reference LINKS: Secunia Advisory SA48297 CVE-2012-0397 IMPACT ASSESSMENT: High Discussion: A vulnerability has been reported in RSA SecurID Software Token Converter, which can be exploited by malicious people to compromise a user's system. Impact: An unspecified error can be exploited to cause a buffer overflow. Solution: Update to version 2.6.1. Addthis Related Articles

43

Authentication of quantum messages.  

SciTech Connect (OSTI)

Authentication is a well-studied area of classical cryptography: a sender A and a receiver B sharing a classical private key want to exchange a classical message with the guarantee that the message has not been modified or replaced by a dishonest party with control of the communication line. In this paper we study the authentication of messages composed of quantum states. We give a formal definition of authentication in the quantum setting. Assuming A and B have access to an insecure quantum channel and share a private, classical random key, we provide a non-interactive scheme that both enables A to encrypt and authenticate (with unconditional security) an m qubit message by encoding it into m + s qubits, where the probability decreases exponentially in the security parameter s. The scheme requires a private key of size 2m + O(s). To achieve this, we give a highly efficient protocol for testing the purity of shared EPR pairs. It has long been known that learning information about a general quantum state will necessarily disturb it. We refine this result to show that such a disturbance can be done with few side effects, allowing it to circumvent cryptographic protections. Consequently, any scheme to authenticate quantum messages must also encrypt them. In contrast, no such constraint exists classically: authentication and encryption are independent tasks, and one can authenticate a message while leaving it publicly readable. This reasoning has two important consequences: On one hand, it allows us to give a lower bound of 2m key bits for authenticating m qubits, which makes our protocol asymptotically optimal. On the other hand, we use it to show that digitally signing quantum states is impossible, even with only computational security.

Barnum, Howard; Crpeau, Jean-Claude; Gottesman, D. (Daniel); Smith, A. (Adam); Tapp, Alan

2001-01-01T23:59:59.000Z

44

QKD Quantum Channel Authentication  

E-Print Network [OSTI]

Several simple yet secure protocols to authenticate the quantum channel of various QKD schemes, by coupling the photon sender's knowledge of a shared secret and the QBER Bob observes, are presented. It is shown that Alice can encrypt certain portions of the information needed for the QKD protocols, using a sequence whose security is based on computational-complexity, without compromising all of the sequence's entropy. It is then shown that after a Man-in-the-Middle attack on the quantum and classical channels, there is still enough entropy left in the sequence for Bob to detect the presence of Eve by monitoring the QBER. Finally, it is shown that the principles presented can be implemented to authenticate the quantum channel associated with any type of QKD scheme, and they can also be used for Alice to authenticate Bob.

J. T. Kosloski

2006-04-02T23:59:59.000Z

45

V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass  

Broader source: Energy.gov (indexed) [DOE]

4: EMC RSA Archer GRC Open Redirection Weakness and Security 4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September 4, 2013 - 6:00am Addthis PROBLEM: A weakness and a security issue have been reported in EMC RSA Archer GRC PLATFORM: EMC RSA Archer GRC 5.x ABSTRACT: This fixes multiple vulnerabilities, which can be exploited to bypass certain security restrictions and to conduct spoofing attacks REFERENCE LINKS: Secunia Advisory SA54717 SecurityTracker Alert ID 1028971 EMC Identifier: ESA-2013-057 CVE-2013-3276 CVE-2013-3277 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The application does not properly restrict deactivated users. This can be exploited by deactivated users to login and gain access to otherwise

46

U-090: RSA enVision Discloses Environment Variable Information to Remote  

Broader source: Energy.gov (indexed) [DOE]

0: RSA enVision Discloses Environment Variable Information to 0: RSA enVision Discloses Environment Variable Information to Remote Users U-090: RSA enVision Discloses Environment Variable Information to Remote Users January 27, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in RSA enVision PLATFORM: Version(s): 4.0 prior to 4.0 SP4 P5, 4.1 prior to 4.1 P3 ABSTRACT: A remote user can view potentially sensitive data on the target system. reference LINKS: CVE-2011-4143 SecurityTracker Alert ID: 1026591 Secunia Advisory IMPACT ASSESSMENT: Medium Discussion: The security issue is caused due to the application disclosing certain environment variables containing web system setup information via the web interface. Further information about this resolution and other fixes can be found in the Release Notes associated with RSA enVision 4.1, Patch 3 and

47

Key recycling in authentication  

E-Print Network [OSTI]

In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

Christopher Portmann

2012-02-06T23:59:59.000Z

48

V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access,  

Broader source: Energy.gov (indexed) [DOE]

84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain 84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks February 5, 2013 - 12:01am Addthis PROBLEM: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks PLATFORM: RSA Archer SmartSuite Framework version 4.x RSA Archer GRC version 5.x ABSTRACT: Several vulnerabilities were reported in RSA Archer eGRC. REFERENCE LINKS: Security Alert: ESA-2013-002 SecurityTracker Alert ID: 1028073 CVE-2012-1064 CVE-2012-2292 CVE-2012-2293 CVE-2012-2294 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can cause arbitrary scripting code to be executed by the target user's browser [CVE-2012-1064]. The code will originate from the

49

U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic 259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: RSA BSAFE SSL-C prior to 2.8.6 ABSTRACT: RSA BSAFE SSL-C Multiple Vulnerabilities reference LINKS: Secunia Advisory SA50601 SecurityTracker Alert ID: 1027514 SecurityTracker Alert ID: 1027513 CVE-2011-3389 CVE-2012-2110 CVE-2012-2131 IMPACT ASSESSMENT: High Discussion: EMC has acknowledged a weakness and a vulnerability in RSA BSAFE, which can

50

CERTIFICATE OF AUTHENTICITY  

Broader source: Energy.gov (indexed) [DOE]

CERTIFICATE OF AUTHENTICITY CERTIFICATE OF AUTHENTICITY I hereby certify that this transcript constitutes an accurate record of the full Council meeting of the National Coal Council held on November 14,2008 at the Westin Grand Hotel, Washington, D.C. ~ i c h a e l G. Mueller, Chair National Coal Council I NATIONAL COAL COUNCIL 1 FULL COUNCIL MEETING FRIDAY NOVEMBER 14, 2 0 0 8 The Full Council meeting convened at 9 : 0 0 a.m. in the Washington Ballroom of the Westin Grand Hotel, 2 3 5 0 M Street, NW, Washington, DC, Chair Michael G. Mueller presiding. ATTENDEES: MIKE MUELLER, Arneren Energy Fuels & Services Company, Chair RICH EIMER, Dynegy Inc., Vice-Chair ROBERT BECK, National Coal Council, Executive Vice-President SY ALI, Clean Energy Consulting BARB ALTIZER, Eastern Coal Council

51

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection...  

Broader source: Energy.gov (indexed) [DOE]

Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can...

52

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 5, NO. 9, SEPTEMBER 2006 2569 Mutual Authentication and Key Exchange Protocols  

E-Print Network [OSTI]

compromise and service abuse, etc. Several authentication Manuscript received February 3, 2005; revised May}@bbcr.uwaterloo.ca). Digital Object Identifier 10.1109/TWC.2006.05063. Internet B's home network, home agent (H) Fixed Internet

Shen, Xuemin "Sherman"

53

Secure Anonymous RFID Authentication Protocols Christy Chatmon  

E-Print Network [OSTI]

and scalable. Keywords: RFID, Authentication, Anonymity, Privacy, Availability, Scalability. 1 Introduction technology is to automatically identify objects that are contained in electromagnetic fields. RFID tags doSecure Anonymous RFID Authentication Protocols Christy Chatmon Computer & Information Sciences

Burmester, Mike

54

An Efficient Abuse-Free Fair Contract-Signing Protocol Based on RSA Signature and -protocol  

E-Print Network [OSTI]

An Efficient Abuse-Free Fair Contract-Signing Protocol Based on RSA Signature and -protocol Xi in this paper. The proposed protocol is not only fair and optimistic, but also efficient and abuse the Internet. In such scenario, fairness is critical, because they may be potentially mistrusted. That is

55

Research Student Handbook www.leeds.ac.uk/rsa/handbooks.html  

E-Print Network [OSTI]

that the information contained in this Handbook is accurate it does not accept liability for any inaccuraciesResearch Student Handbook 2011-2012 www.leeds.ac.uk/rsa/handbooks.html This Handbook should be read;Research Student Handbook 2011-2012 Important This Handbook was published in August 2011. Whilst

Haase, Markus

56

User Authentication Policy | Argonne Leadership Computing Facility  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Eureka / Gadzooks Eureka / Gadzooks Policies Pullback Policy ALCF Acknowledgment Policy Account Sponsorship & Retention Policy Accounts Policy Data Policy INCITE Quarterly Report Policy Job Scheduling Policy on BG/P Job Scheduling Policy on BG/Q Refund Policy Software Policy User Authentication Policy Documentation Feedback Please provide feedback to help guide us as we continue to build documentation for our new computing resource. [Feedback Form] User Authentication Policy Users of the Argonne production systems are required to use a CRYPTOCard one time password, multifactor authentication system. This document explains the policies users must follow regarding CRYPTOCard tokens for accessing the Argonne resources. MultiFactor Authentication "Authentication systems are frequently described by the authentication

57

Obfuscated authentication systems, devices, and methods  

DOE Patents [OSTI]

Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

Armstrong, Robert C; Hutchinson, Robert L

2013-10-22T23:59:59.000Z

58

CERTIFICATE OF AUTHENTICITY | Department of Energy  

Energy Savers [EERE]

D.C. Tran001.pdf CERTIFICATE OF AUTHENTICITY More Documents & Publications U.S. Offshore Wind Advanced Technology Demonstration Projects Public Meeting Transcript for...

59

A DAWP Technique for Audio Authentication  

Science Journals Connector (OSTI)

Digital audio content protection is part of information security for audio authentication and audio integrity evaluation. Watermarking is widely used in copyright protection. However, watermark requires a thir...

Tung-Shou Chen; Jeanne Chen; Jiun-Lin Tang; Keshou Wu

2011-01-01T23:59:59.000Z

60

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications  

E-Print Network [OSTI]

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

Sabatini, David M.

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...  

Broader source: Energy.gov (indexed) [DOE]

8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

62

Instructions for using HSPD-12 Authenticated Outlook Web Access...  

Energy Savers [EERE]

Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook...

63

Verifying authentication protocols with CSP Steve Schneider  

E-Print Network [OSTI]

Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

Doran, Simon J.

64

AUTHENTICATED  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2. AMENDMENT OF AGREEMENT BPA and Port Townsend amend the Agreement as follows: (a) The following Section 2.24 ("Wheel Turning Load") shall be added to the Agreement: "2.24...

65

E-Print Network 3.0 - archeological gold authentication Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

't do. Tests and quizzes aren't the gold standard either. - Fixed-choice test questions tend... by authentic use & authentic assessment. 12;Authentic performance...

66

Hardware device binding and mutual authentication  

DOE Patents [OSTI]

Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

Hamlet, Jason R; Pierson, Lyndon G

2014-03-04T23:59:59.000Z

67

The application of hyperspectral image techniques on MODIS data for the detection of oil spills in the RSA1  

E-Print Network [OSTI]

The application of hyperspectral image techniques on MODIS data for the detection of oil spills Oceanography Centre, Empress Dock, Southampton, S014 3ZH, UK ABSTRACT Oil spills pose a serious threat to the sensitive marine ecosystem of the RSA. The study aims to detect and identify oil spills using remote sensing

Quartly, Graham

68

Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes  

DOE Patents [OSTI]

Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

Kent, Alexander Dale (Los Alamos, NM)

2008-09-02T23:59:59.000Z

69

T-646: Debian fex authentication bypass | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

6: Debian fex authentication bypass 6: Debian fex authentication bypass T-646: Debian fex authentication bypass June 14, 2011 - 3:45pm Addthis PROBLEM: The vulnerability is caused due to the application not properly verifying the existence of "auth-ID" when uploading files and can be exploited to bypass the authentication mechanism. PLATFORM: Debian fex ABSTRACT: Debian security discovered that fex, a web service for transferring very large, files, is not properly validating authentication IDs. While the service properly validates existing authentication IDs, an attacker who is not specifying any authentication ID at all, can bypass the authentication procedure. reference LINKS: DSA-2259-1 fex Secunia Advisory SA44940 Debian Security Advisory DSA-2259-1 fex-20110610.tar Vulnerability Report: Debian GNU/Linux 6.0

70

A service-oriented architecture for authentication and authorization  

E-Print Network [OSTI]

THESIS A Service-oriented Architecture for AuthenticationSAN DIEGO A Service-oriented Architecture for Authentication2.0, which is a service-oriented architecture that addresses

Hamedtoolloei, Hamidreza

2009-01-01T23:59:59.000Z

71

CLOC: Authenticated Encryption for Short Input Tetsu Iwata1  

E-Print Network [OSTI]

. CLOC uses a variant of CFB mode in its encryption part and a variant of CBC MAC in the authentication

72

PAP: A Privacy and Authentication Protocol for Passive RFID Tags  

E-Print Network [OSTI]

PAP: A Privacy and Authentication Protocol for Passive RFID Tags Alex X. Liu LeRoy A. Bailey for RFID tags is necessary to ensure the privacy and authentication between each tag and their reader. In order to accomplish this, we propose PAP, a privacy and authentication protocol for passive RFID tags

Liu, Alex X.

73

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL  

E-Print Network [OSTI]

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL Christopher Mann and Daniel Loebenberger 15 August 2014 Abstract. We show how to realize two-factor authentication for a Bitcoin wal- let a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification

74

FORENSIC CONNOISSEURSHIP, JACKSON POLLOCK, AND THE AUTHENTIC EYE  

E-Print Network [OSTI]

FORENSIC CONNOISSEURSHIP, JACKSON POLLOCK, AND THE AUTHENTIC EYE by Francis V. O'Connor, Ph shall proceed to some general #12;Forensic Connoisseurship, Pollock, & The Authentic Eye - F. V. O, the training of authentic eyes and forensic connoisseurs -- concluding with a final thought on the historicity

Taylor, Richard

75

Robust video authentication system over internet protocol  

Science Journals Connector (OSTI)

This paper presents a video authentication system over internet protocol that is insusceptible to illumination and expression variations. The illumination and expression invariant features are extracted using multi-band feature extraction. These features are classified by a radial basis function neural network. A new adaptive decision fusion method is proposed to combine the scores from different modalities and the different frames during the authentication process. Three levels of decision fusion are carried out in the proposed adaptive decision fusion. Depending on the level of decision fusion, the level of illumination influence is taken into account during the decision making.

Sue Inn Ch'ng; Kah Phooi Seng; Li-Minn Ang; Fong Tien Ong; Yee Wan Wong

2011-01-01T23:59:59.000Z

76

Spatial Data Authentication Using Mathematical Visualization  

E-Print Network [OSTI]

Spatial Data Authentication Using Mathematical Visualization Vert, G., Harris, F., Nasser, S. Dept has become an increasingly compromised method to transmit any type of data including spatial data. Due to the criticality of spatial data in decision making processes that range from military targeting to urban planning

Harris Jr., Frederick C.

77

A generic mechanism for efficient authentication in B3G networks  

Science Journals Connector (OSTI)

A user in Beyond 3rd Generation (B3G) networks in order to get access to the network services must perform a multi-pass authentication procedure, which includes two or three sequential authentications steps. These multiple authentication steps include ... Keywords: Authentication performance, B3G networks, B3G security, Multi-pass authentication, Security binding

Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis

2010-06-01T23:59:59.000Z

78

Verifiable process monitoring through enhanced data authentication.  

SciTech Connect (OSTI)

To ensure the peaceful intent for production and processing of nuclear fuel, verifiable process monitoring of the fuel production cycle is required. As part of a U.S. Department of Energy (DOE)-EURATOM collaboration in the field of international nuclear safeguards, the DOE Sandia National Laboratories (SNL), the European Commission Joint Research Centre (JRC) and Directorate General-Energy (DG-ENER) developed and demonstrated a new concept in process monitoring, enabling the use of operator process information by branching a second, authenticated data stream to the Safeguards inspectorate. This information would be complementary to independent safeguards data, improving the understanding of the plant's operation. The concept is called the Enhanced Data Authentication System (EDAS). EDAS transparently captures, authenticates, and encrypts communication data that is transmitted between operator control computers and connected analytical equipment utilized in nuclear processes controls. The intent is to capture information as close to the sensor point as possible to assure the highest possible confidence in the branched data. Data must be collected transparently by the EDAS: Operator processes should not be altered or disrupted by the insertion of the EDAS as a monitoring system for safeguards. EDAS employs public key authentication providing 'jointly verifiable' data and private key encryption for confidentiality. Timestamps and data source are also added to the collected data for analysis. The core of the system hardware is in a security enclosure with both active and passive tamper indication. Further, the system has the ability to monitor seals or other security devices in close proximity. This paper will discuss the EDAS concept, recent technical developments, intended application philosophy and the planned future progression of this system.

Goncalves, Joao G. M. (European Commission Joint Research Centre, Italy); Schwalbach, Peter (European Commission Directorate General%3CU%2B2014%3EEnergy, Luxemburg); Schoeneman, Barry Dale; Ross, Troy D.; Baldwin, George Thomas

2010-09-01T23:59:59.000Z

79

V-231: Cisco Identity Services Engine Discloses Authentication Credentials  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

1: Cisco Identity Services Engine Discloses Authentication 1: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users August 30, 2013 - 3:01am Addthis PROBLEM: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials. PLATFORM: Cisco Identity Services Engine (ISE) 1.x ABSTRACT: A vulnerability was reported in Cisco Identity Services Engine REFERENCE LINKS: SecurityTracker Alert ID: 1028965 CVE-2013-3471 IMPACT ASSESSMENT: Meduim DISCUSSION: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials.The system stores the username and password of an authenticated user within hidden HTML form fields. A

80

Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc  

Broader source: Energy.gov (indexed) [DOE]

Factor Factor RSA Tokens with Citrix Workplace Environment (CWE) Revision 1.13 December, 2009 Associate CIO for Operations (IM) United States Department of Energy DOE HQ OCIO Application Hosting Environment Instructions for Using RSA Token with Citrix Workplace Environment Using Your RSA Token with Citrix Note: If you access Citrix Workplace from within the DOE network (DOEnet or VPN) then you do not need an RSA Two-Factor token. The Citrix Workplace logon screen will prompt you only for your Windows User name and Password. Step 1 - Establish a connection to the Internet and connect to https://workplace.doe.gov. Step 2 - Click "OK" to bypass the Government warning banner. DOE HQ OCIO Application Hosting Environment Instructions for Using RSA Token with Citrix Workplace Environment

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Formal analysis of device authentication applications in ubiquitous computing.  

SciTech Connect (OSTI)

Authentication between mobile devices in ad-hoc computing environments is a challenging problem. Without pre-shared knowledge, existing applications rely on additional communication methods, such as out-of-band or location-limited channels for device authentication. However, no formal analysis has been conducted to determine whether out-of-band channels are actually necessary. We answer this question through formal analysis, and use BAN logic to show that device authentication using a single channel is not possible.

Shin, Dongwan (New Mexico Tech, Socorro, NM); Claycomb, William R.

2010-11-01T23:59:59.000Z

82

VOLTTRON: An Agent Execution Platform for the Electric Power System  

SciTech Connect (OSTI)

Volttron is an agent execution platform that is engineered for use in the electric power system. Volttron provides resource guarantees for agents and the platform including memory and processor utilization; authentication and authorization services; directory services for agent and resource location; and agent mobility. Unlike most other agent platforms, Volttron does not depend on a single agent authoring language. Instead, we chose to design and implement Volttron as a platform service and framework that is decoupled from the agent execution environment. A prototype implementation of Volttron has been written in Python (using Python v2.7.2) and we have executed agents written in Python and Java and as shell scripts. The intended use of Volttron is in the power distribution system for managing distributed generation, demand-response, and plug-in electric vehicles.

Akyol, Bora A.; Haack, Jereme N.; Ciraci, Selim; Carpenter, Brandon J.; Vlachopoulou, Maria; Tews, Cody W.

2012-06-05T23:59:59.000Z

83

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...  

Broader source: Energy.gov (indexed) [DOE]

or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges. IMPACT: A remote authenticated user can...

84

U-268: Oracle Database Authentication Protocol Discloses Session...  

Broader source: Energy.gov (indexed) [DOE]

the authentication protocol at the time of this entry. Please visit the Oracle Critical Patch Updates, Security Alerts and Third Party Bulletin for additional information when it...

85

Dos and don'ts of client authentication on the web  

Science Journals Connector (OSTI)

Client authentication has been a continuous source of problems on the Web. Although many well-studied techniques exist for authentication, Web sites continue to use extremely weak authentication schemes, especially in non-enterprise environments such ...

Kevin Fu; Emil Sit; Kendra Smith; Nick Feamster

2001-08-01T23:59:59.000Z

86

Serious leisure, participation and experience in tourism: authenticity and ritual in a renaissance festival  

E-Print Network [OSTI]

the serious festival participation were reminiscent of tourism existential authenticity specified by Wang (1999) as two levels: intrapersonal authenticity (gaining one?s true self) and interpersonal authenticity (gaining true human relationship). A search...

Kim, Hyounggon

2005-02-17T23:59:59.000Z

87

Secure password-based authenticated key exchange for web services  

Science Journals Connector (OSTI)

This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based ... Keywords: authenticated key exchange, password, security, web services

Liang Fang; Samuel Meder; Olivier Chevassut; Frank Siebenlist

2004-10-01T23:59:59.000Z

88

Enhancing CardSpace Authentication Using a Mobile Device  

E-Print Network [OSTI]

, authentication. 1 Introduction In line with the continuing increase in the number of on-line services requir- ing design goals of CardSpace is to reduce reliance on password authentication. We address this limitation, since the additional overhead is handled by the client. The remainder of the paper is

Sheldon, Nathan D.

89

Challenges and architectural approaches for authenticating mobile users  

Science Journals Connector (OSTI)

This paper casts an architectural eye at existing work on security and privacy in mobile computing. Specifically, it focuses on authentication as it leads up to access control from two points of view: servicer providers granting access to users, and ... Keywords: access control, anonymity, authentication, mobile computing, trust, ubiquitous computing, user mobility

Joo Pedro Sousa

2008-05-01T23:59:59.000Z

90

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Broader source: Energy.gov (indexed) [DOE]

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

91

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Broader source: Energy.gov (indexed) [DOE]

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

92

2011 Raj JainCSE571SWashington University in St. Louis Authentication, Authorization,Authentication, Authorization,  

E-Print Network [OSTI]

23-1 ©2011 Raj JainCSE571SWashington University in St. Louis Authentication, Authorization://www.cse.wustl.edu/~jain/cse571-11/ #12;23-2 ©2011 Raj JainCSE571SWashington University in St. Louis OverviewOverview RADIUS 802.1X #12;23-3 ©2011 Raj JainCSE571SWashington University in St. Louis RADIUSRADIUS Remote

Jain, Raj

93

Citrix_2FA_Authentication_09.09 | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

More Documents & Publications Microsoft Word - Citrix2FAAuthentication1232009.doc Using Two-Factor RSA Token with WebVPN Microsoft Word - SMailSecureWeb-BasedEmailv3 2...

94

V-220: Juniper Security Threat Response Manager Lets Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

0: Juniper Security Threat Response Manager Lets Remote 0: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands August 17, 2013 - 4:01am Addthis PROBLEM: A remote authenticated user can execute arbitrary commands on the target system. PLATFORM: 2010.0, 2012.0, 2012.1, 2013.1 ABSTRACT: A vulnerability was reported in Juniper Security Threat Response Manager (STRM) REFERENCE LINKS: SecurityTracker Alert ID: 1028921 CVE-2013-2970 IMPACT ASSESSMENT: High DISCUSSION: A remote authenticated user can inject commands to execute arbitrary operating system commands with the privileges of the target web service. This can be exploited to gain shell access on the target device.

95

V-036: EMC Smarts Network Configuration Manager Database Authentication  

Broader source: Energy.gov (indexed) [DOE]

6: EMC Smarts Network Configuration Manager Database 6: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability November 29, 2012 - 3:30am Addthis PROBLEM: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability PLATFORM: EMC Smarts Network Configuration Manager (NCM) all versions prior 9.1 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: EMC Identifier: ESA-2012-057 Secunia Advisory SA51408 SecurityTracker Alert ID: 1027812 CVE-2012-4614 CVE-2012-4615 IMPACT ASSESSMENT: Medium DISCUSSION: The systems uses a hard-coded key to encrypt authentication credentials on the target system [CVE-2012-4615]. A local user with knowledge of the key

96

Secure password-based authenticated key exchange for web services  

SciTech Connect (OSTI)

This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

2004-11-22T23:59:59.000Z

97

Using Semantics for Automating the Authentication of Web APIs  

E-Print Network [OSTI]

Abstract. Recent technology developments in the area of services on the Web are marked by the proliferation of Web applications and APIs. The implementation and evolution of applications based on Web APIs is, however, hampered by the lack of automation that can be achieved with current technologies. Research on semantic Web services is therefore trying to adapt the principles and technologies that were devised for traditional Web services, to deal with this new kind of services. In this paper we show that currently more than 80 % of the Web APIs require some form of authentication. Therefore authentication plays a major role for Web API invocation and should not be neglected in the context of mashups and composite data applications. We present a thorough analysis carried out over a body of publicly available APIs that determines the most commonly used authentication approaches. In the light of these results, we propose an ontology for the semantic annotation of Web API authentication information and demonstrate how it can be used to create semantic Web API descriptions. We evaluate the applicability of our approach by providing a prototypical implementation, which uses authentication annotations as the basis for automated service invocation. 1

Maria Maleshkova; Carlos Pedrinaci; John Domingue; Guillermo Alvaro; Ivan Martinez

98

U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

0: JBoss Operations Network LDAP Authentication Bug Lets Remote 0: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication March 21, 2012 - 7:00am Addthis PROBLEM: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication PLATFORM: JBoss Operations Network 2.x ABSTRACT: A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases. reference LINKS: SecurityTracker Alert ID: 1026826 Secunia Advisory SA48471 CVE-2012-1100 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based

99

Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding author)  

E-Print Network [OSTI]

1 Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding in the process algebra Communicating Sequential Processes (CSP) to specify authentication. The purpose, security protocols, CSP, formal specification, Kerberos 1. Introduction Schneider [1] uses Communicating

Doran, Simon J.

100

Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis  

Science Journals Connector (OSTI)

Authentication schemes relying on per-packet signature and per-signature verification introduce heavy cost for computation and communication. Due to its constraint resources, smart grid's authentication requirement cannot be satisfied by this scheme. ...

Depeng Li; Zeyar Aung; John R. Williams; Abel Sanchez

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without...  

Broader source: Energy.gov (indexed) [DOE]

LDAP Authentication Bug Lets Remote Users Bypass Authentication U-185: OpenLDAP May Ignore TLSCipherSuite Setting in Some Cases T-535: Oracle Critical Patch Update - January 2011...

102

PAAS: A Privacy-Preserving Attribute-based Authentication System for eHealth Networks  

E-Print Network [OSTI]

PAAS: A Privacy-Preserving Attribute-based Authentication System for eHealth Networks Linke Guo PAAS which leverages users' verifiable attributes to authenticate users in eHealth systems while

Latchman, Haniph A.

103

PAKE-based mutual HTTP authentication for preventing phishing attacks  

E-Print Network [OSTI]

This paper describes a new password-based mutual authentication protocol for Web systems which prevents various kinds of phishing attacks. This protocol provides a protection of user's passwords against any phishers even if dictionary attack is employed, and prevents phishers from imitating a false sense of successful authentication to users. The protocol is designed considering interoperability with many recent Web applications which requires many features which current HTTP authentication does not provide. The protocol is proposed as an Internet Draft submitted to IETF, and implemented in both server side (as an Apache extension) and client side (as a Mozilla-based browser and an IE-based one). The paper also proposes a new user-interface for this protocol which is always distinguishable from fake dialogs provided by phishers.

Oiwa, Yutaka; Takagi, Hiromitsu

2009-01-01T23:59:59.000Z

104

Quantum-Secure Authentication with a Classical Key  

E-Print Network [OSTI]

Authentication provides the trust people need to engage in transactions. The advent of physical keys that are impossible to copy promises to revolutionize this field. Up to now, such keys have been verified by classical challenge-response protocols. Such protocols are in general susceptible to emulation attacks. Here we demonstrate Quantum-Secure Authentication ("QSA") of an unclonable classical physical key in a way that is inherently secure by virtue of quantum-physical principles. Our quantum-secure authentication operates in the limit of a large number of channels, represented by the more than thousand degrees of freedom of an optical wavefront shaped with a spatial light modulator. This allows us to reach quantum security with weak coherent pulses of light containing dozens of photons, too few for an adversary to determine their complex spatial shapes, thereby rigorously preventing emulation.

Sebastianus A. Goorden; Marcel Horstmann; Allard P. Mosk; Boris kori?; Pepijn W. H. Pinkse

2014-06-03T23:59:59.000Z

105

Current Projects: Product Authenticity Tags - Vulnerability Assessment Team  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Product Authenticity Tags Product Authenticity Tags VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast µProcessor Shop Insanely Fast µProcessor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms Argonne's VAT (brochure)

106

U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote  

Broader source: Energy.gov (indexed) [DOE]

6: HP StorageWorks File Migration Agent Buffer Overflows Let 6: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code July 19, 2012 - 7:14am Addthis PROBLEM: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code PLATFORM: HP StorageWorks File Migration Agent ABSTRACT: Two vulnerabilities were reported in HP StorageWorks File Migration Agent. reference LINKS: SecurityTracker Alert ID: 1027281 ZDI-12-127 ZDI-12-126 IMPACT ASSESSMENT: High Discussion: The vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP StorageWorks File Migration Agent. Authentication is not required to exploit this vulnerability. 1. (ZDI-12-127) The specific flaw exists within the HsmCfgSvc.exe service

107

U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote  

Broader source: Energy.gov (indexed) [DOE]

U-216: HP StorageWorks File Migration Agent Buffer Overflows Let U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code July 19, 2012 - 7:14am Addthis PROBLEM: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code PLATFORM: HP StorageWorks File Migration Agent ABSTRACT: Two vulnerabilities were reported in HP StorageWorks File Migration Agent. reference LINKS: SecurityTracker Alert ID: 1027281 ZDI-12-127 ZDI-12-126 IMPACT ASSESSMENT: High Discussion: The vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP StorageWorks File Migration Agent. Authentication is not required to exploit this vulnerability.

108

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Dutertre, Bruno

109

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Doran, Simon J.

110

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

Dutertre, Bruno

111

Authenticity Issue in Performing Arts using Live Electronics  

E-Print Network [OSTI]

by the production process key elements for future assessment of authenticity. We will present some "case studies we intend to study the production process, and extract from the elements and traces left, the electronic processes are evaluated towards their robustness against changes of instrumentist, changes

Kouroupetroglou, Georgios

112

Robust RFID Authentication Protocol with Formal Proof and Its Feasibility  

E-Print Network [OSTI]

security models compatible with formal security analysis tools. We show that an RFID authentication, such as by letting us reference the price, origin and circulation route of specic goods. On the other hand-in-the-middle adversary and communication fault. We dene model and security proofs via a game-based approach makes our

113

Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio  

E-Print Network [OSTI]

Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio Xi Tan, Kapil frequency spectrum was inefficiently utilized. To fully use these spectrums, cognitive radio networks have of cognitive radio is to enable the current fixed spectrum channels assigned by Federal Communica- tions

Du, Wenliang "Kevin"

114

Final report for the mobile node authentication LDRD project.  

SciTech Connect (OSTI)

In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authentication is critical. In a wired infrastructure, this authentication service is typically facilitated by a centrally-located ''authentication certificate generator'' such as a Certificate Authority (CA) server. This centralized approach is ill-suited to meet the needs of mobile ad hoc networks, such as those required by military systems, because of the unpredictable connectivity and dynamic routing. There is a need for a secure and robust approach to mobile node authentication. Current mechanisms either assign a pre-shared key (shared by all participating parties) or require that each node retain a collection of individual keys that are used to communicate with other individual nodes. Both of these approaches have scalability issues and allow a single compromised node to jeopardize the entire mobile node community. In this report, we propose replacing the centralized CA with a distributed CA whose responsibilities are shared between a set of select network nodes. To that end, we develop a protocol that relies on threshold cryptography to perform the fundamental CA duties in a distributed fashion. The protocol is meticulously defined and is implemented it in a series of detailed models. Using these models, mobile wireless scenarios were created on a communication simulator to test the protocol in an operational environment and to gather statistics on its scalability and performance.

Michalski, John T.; Lanzone, Andrew J.

2005-09-01T23:59:59.000Z

115

Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols  

E-Print Network [OSTI]

to privacy of consumers. In recent years, the cryptographic community have made an extensive effort Zahra Ahmadian, Mahmoud Salmasizadeh, and Mohammad Reza Aref Abstract--Privacy is faced to serious years have focused on design and analysis of privacy friendly ultralightweight authentication protocols

116

Secure Password-Based Authenticated Key Exchange for Web Services  

E-Print Network [OSTI]

sign-on, delegation, and identity. The Grid Security Infrastructure (GSI) is the name given so. 1.3 Security in Grid Computing Security is one of the major requirements of Grid computing. Any Grid site deployment must at least provide the basic security mechanisms including authentication

117

SP 800-38B. Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication  

Science Journals Connector (OSTI)

This Recommendation specifies a message authentication code (MAC) algorithm based on a symmetric key block cipher. This block cipher-based MAC algorithm, called CMAC, may be used to provide assurance of the authenticity and, hence, the integrity of binary ... Keywords: Authentication, block cipher, cryptography, information security, integrity, message authentication code, mode of operation.

Morris J. Dworkin

2005-05-01T23:59:59.000Z

118

Hardware device to physical structure binding and authentication  

DOE Patents [OSTI]

Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

2013-08-20T23:59:59.000Z

119

Improving the security of quantum direct communication with authentication  

E-Print Network [OSTI]

Two protocols of quantum direct communication with authentication [Phys. Rev. A {\\bf 73}, 042305 (2006)] are recently proposed by Lee, Lim and Yang. In this paper we will show that in the two protocols the authenticator Trent should be prevented from knowing the secret message of communication. The first protocol can be eavesdropped by Trent using the the intercept-measure-resend attack, while the second protocol can be eavesdropped by Trent using single-qubit measurement. To fix these leaks, I revise the original versions of the protocols by using the Pauli-Z operation $\\sigma_z$ instead of the original bit-flip operation $X$. As a consequence, the protocol securities are improved.

Zhan-jun Zhang

2006-04-18T23:59:59.000Z

120

Simultaneous Authentication and Certification of Arms-Control Measurement Systems  

SciTech Connect (OSTI)

Most arms-control-treaty-monitoring scenarios involve a host party that makes a declaration regarding its nuclear material or items and a monitoring party that verifies that declaration. A verification system developed for such a use needs to be trusted by both parties. The first concern, primarily from the host party's point of view, is that any sensitive information that is collected must be protected without interfering in the efficient operation of the facility being monitored. This concern is addressed in what can be termed a 'certification' process. The second concern, of particular interest to the monitoring party, is that it must be possible to confirm the veracity of both the measurement system and the data produced by this measurement system. The monitoring party addresses these issues during an 'authentication' process. Addressing either one of these concerns independently is relatively straightforward. However, it is more difficult to simultaneously satisfy host party certification concerns and monitoring party authentication concerns. Typically, both parties will want the final access to the measurement system. We will describe an alternative approach that allows both parties to gain confidence simultaneously. This approach starts with (1) joint development of the measurement system followed by (2) host certification of several copies of the system and (3) random selection by the inspecting party of one copy to be use during the monitoring visit and one (or more) copy(s) to be returned to the inspecting party's facilities for (4) further hardware authentication; any remaining copies are stored under joint seal for use as spares. Following this process, the parties will jointly (5) perform functional testing on the selected measurement system and then (6) use this system during the monitoring visit. Steps (1) and (2) assure the host party as to the certification of whichever system is eventually used in the monitoring visit. Steps (1), (3), (4), and (5) increase the monitoring party's confidence in the authentication of the measurement system.

MacArthur, Duncan W. [Los Alamos National Laboratory; Hauck, Danielle K. [Los Alamos National Laboratory; Thron, Jonathan L. [Los Alamos National Laboratory

2012-07-09T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Authenticated group Diffie-Hellman key exchange: theory and practice  

SciTech Connect (OSTI)

Authenticated two-party Diffie-Hellman key exchange allows two principals A and B, communicating over a public network, and each holding a pair of matching public/private keys to agree on a session key. Protocols designed to deal with this problem ensure A (B resp.)that no other principals aside from B (A resp.) can learn any information about this value. These protocols additionally often ensure A and B that their respective partner has actually computed the shared secret value. A natural extension to the above cryptographic protocol problem is to consider a pool of principals agreeing on a session key. Over the years several papers have extended the two-party Diffie-Hellman key exchange to the multi-party setting but no formal treatments were carried out till recently. In light of recent developments in the formalization of the authenticated two-party Diffie-Hellman key exchange we have in this thesis laid out the authenticated group Diffie-Hellman key exchange on firmer foundations.

Chevassut, Olivier

2002-10-03T23:59:59.000Z

122

V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

V-057: eXtplorer "ext_find_user()" Authentication Bypass V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis December 28 2012 - 6:00am PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA51636 eXtplorer 2.1.3 Security Release IMPACT ASSESSMENT: Medium DISCUSSION: eXtplorer was notified of a problem within the authentication system of eXtplorer Versions 2.1.2, 2.1.1, 2.1.0 and 2.1.0RC5 that have been found to be vulnerable to an authentication bypass bug.

123

U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP  

Broader source: Energy.gov (indexed) [DOE]

6: Apache CXF Lets Remote Authenticated Users Execute 6: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions September 24, 2012 - 6:00am Addthis PROBLEM: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions PLATFORM: This vulnerability affects all released versions of Apache CXF. ABSTRACT: A vulnerability was reported in Apache CXF reference LINKS: SecurityTracker Alert ID: 1027554 Apache CXF Security Advisories Apache CXF Advisory - CVE-2012-3451 CVE-2012-3451 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache CXF. A remote authenticated user can execute unauthorized commands on the target web service. Impact: A remote authenticated user can execute potentially unauthorized actions on

124

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated 2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates February 28, 2012 - 8:45am Addthis PROBLEM: A vulnerability was reported in PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY DEFINER, a remote authenticated user can execute a trigger function and gain elevated privileges CVE-2012-0866.

125

U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP  

Broader source: Energy.gov (indexed) [DOE]

6: Apache CXF Lets Remote Authenticated Users Execute 6: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions September 24, 2012 - 6:00am Addthis PROBLEM: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions PLATFORM: This vulnerability affects all released versions of Apache CXF. ABSTRACT: A vulnerability was reported in Apache CXF reference LINKS: SecurityTracker Alert ID: 1027554 Apache CXF Security Advisories Apache CXF Advisory - CVE-2012-3451 CVE-2012-3451 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache CXF. A remote authenticated user can execute unauthorized commands on the target web service. Impact: A remote authenticated user can execute potentially unauthorized actions on

126

V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session  

Broader source: Energy.gov (indexed) [DOE]

5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct 5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks May 14, 2013 - 12:08am Addthis PROBLEM: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks PLATFORM: Tomcat 6.0.21 to 6.0.36, 7.0.0 to 7.0.32 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat SecurityTracker Alert ID: 1028534 CVE-2013-2067 IMPACT ASSESSMENT: High DISCUSSION: A remote user can repeatedly send a specially crafted request for a resource requiring authentication while the target user is completing the login form to cause the FORM authentication process to execute the remote user's request with the privileges of the target user.

127

E-Print Network 3.0 - authentic cost calculations Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

cost calculations Search Powered by Explorit Topic List Advanced Search Sample search results for: authentic cost calculations Page: << < 1 2 3 4 5 > >> 1 A Lightweight...

128

E-Print Network 3.0 - authentications algorithms based Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

functionality based... . 2.1 Authentication systems and techniques ... Source: Brunato, Mauro - Dipartimento di Ingegneria e Scienza dell'Informazione, Universit di Trento...

129

E-Print Network 3.0 - authenticated key agreement Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for authentication and managing and secret-key based proce... . An ... Source: Brunato, Mauro - Dipartimento di Ingegneria e Scienza dell'Informazione, Universit di Trento...

130

New foundations for efficient authentication, commutative cryptography, and private disjointness testing  

E-Print Network [OSTI]

This dissertation presents new constructions and security definitions related to three areas: authentication, cascadable and commutative crytpography, and private set operations. Existing works relevant to each of these ...

Weis, Stephen August, 1978-

2006-01-01T23:59:59.000Z

131

Counterfeit-resistant materials and a method and apparatus for authenticating materials  

DOE Patents [OSTI]

Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

2000-01-01T23:59:59.000Z

132

Authentication of medicinal plant material by DNA fingerprinting  

Science Journals Connector (OSTI)

Based on their positive therapeutic results, herbal medicines are gaining popularity worldwide for human wellbeing and healthcare. Unfortunately, one major hurdle that might impair their potential future as 'medicine of choice' is the lack of standardisation. Many scientific studies on adulteration of herbal medicines have demonstrated that health consequences of adulterants may vary from life threatening to death. Fortunately, the breakthrough in genetic analysis and identification promise herbal medicines challenging era. Genetics permit the capacity to police adulterants to protect patients and public from dangerous fraud. This article highlights useful analytical techniques that can be employed to analyse DNA for quality assurance, control and authentication of medicinal plant species.

Sundus Tewfik

2008-01-01T23:59:59.000Z

133

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider  

E-Print Network [OSTI]

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider Department In this paper we consider the nature of machine proofs used in the CSP approach to the veri cation of authentication protocols using the process algebra CSP Hoa85]. The CSP syntax provides a natural and precise way

Doran, Simon J.

134

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks  

E-Print Network [OSTI]

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks Tony Cheneau National public key distribution scheme adapted to ad hoc networks called TAKES for Trustful Authentication, or even implementing a light naming system can be enabled on top of ad hoc networks. TAKES is formally

Paris-Sud XI, Université de

135

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , Jinsong Han2  

E-Print Network [OSTI]

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems Li Lu1 , Jinsong Han2 an emerging requirement ­ protecting user privacy [13] in RFID authentications. In most RFID systems, tags sensitive information. For example, without pri- vacy protection, any reader can identify a consumer's ID

Liu, Yunhao

136

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , Jinsong Han2  

E-Print Network [OSTI]

- sitive information. For example, without privacy pro- tection, any reader can identify a consumer's IDDynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems Li Lu1 , Jinsong Han2 an emerging requirement ­ protecting user privacy [13] in RFID authentications. In most RFID systems, tags

Liu, Yunhao

137

End-to-end aggregate authentication of time-series data  

Science Journals Connector (OSTI)

We consider the problem of providing integrity of aggregate result in the presence of an untrusted data aggregator who may introduce errors into data fusion, causing the final aggregate result to far deviate from the true result determined by participating ... Keywords: aggregate authentication, computation over authenticated data, time-series

Di Ma; Yan Zhu; Mengyang Yu

2013-05-01T23:59:59.000Z

138

Comparative studies on authentication and key exchange methods for 802.11 wireless LAN  

Science Journals Connector (OSTI)

IEEE 802.11 wireless LAN has become one of the hot topics on the design and development of network access technologies. In particular, its authentication and key exchange (AKE) aspects, which form a vital building block for modern security mechanisms, ... Keywords: Authentication, Confidentiality, Key exchange, Security, WLAN

Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan

2007-08-01T23:59:59.000Z

139

eSeal -A System for Enhanced Electronic Assertion of Authenticity and Integrity  

E-Print Network [OSTI]

in the network and a communication protocol. The system is able to control various kinds of integrity settings to claim and assert the authenticity and integrity of goods, documents or other valued objects in storageeSeal - A System for Enhanced Electronic Assertion of Authenticity and Integrity Christian Decker1

Beigl, Michael

140

AUDIO FORENSIC AUTHENTICATION BASED ON MOCC BETWEEN ENF AND REFERENCE SIGNALS  

E-Print Network [OSTI]

AUDIO FORENSIC AUTHENTICATION BASED ON MOCC BETWEEN ENF AND REFERENCE SIGNALS Zhisheng Lv1 of Warwick, Coventry CV4 7AL, UK ABSTRACT This paper proposes a new audio authenticity detection algorithm Frequency) signal and the reference signal. We first extract the ENF signal from a query audio signal

Li, Chang-Tsun

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

94: IBM solidDB Password Hash Authentication Bypass 94: IBM solidDB Password Hash Authentication Bypass Vulnerability T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability April 4, 2011 - 6:08am Addthis PROBLEM: A vulnerability has been reported in IBM solidDB, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: IBM solidDB 4.x - IBM solidDB 6.x ABSTRACT: This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability. REFERENCE LINKS: IBM Security Alert Secunia Advisory: SA44030 ZDI Advisory: ZDI-11-115 IBM solidDB Support IMPACT ASSESSMENT: Medium Discussion: The specific flaw exists within the solid.exe process which listens by default on TCP ports 1315, 1964 and 2315. The authentication protocol

142

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Broader source: Energy.gov (indexed) [DOE]

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

143

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users  

Broader source: Energy.gov (indexed) [DOE]

0: Apache VCL Input Validation Flaw Lets Remote Authenticated 0: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges May 7, 2013 - 12:01am Addthis PROBLEM: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Apache VCL Versions: 2.1, 2.2, 2.2.1, 2.3, 2.3.1 ABSTRACT: A vulnerability was reported in Apache VCL. REFERENCE LINKS: Apache Securelist SecurityTracker Alert ID: 1028515 CVE-2013-0267 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated administrative user with minimal administrative privileges (i.e., nodeAdmin, manageGroup, resourceGrant, or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges.

144

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Broader source: Energy.gov (indexed) [DOE]

84: Cisco Digital Media Manager Lets Remote Authenticated Users 84: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges January 19, 2012 - 9:00am Addthis PROBLEM: A remote authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not properly validate unreferenced URLs. REFERENCE LINKS: Vendor Advisory SecurityTracker Alert ID: 1026541 CVE-2012-0329 IMPACT ASSESSMENT: medium Discussion: Cisco Show and Share is not directly affected by this vulnerability, but a user can exploit the Cisco Digital Media Manager to gain full access to Cisco Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port

145

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Broader source: Energy.gov (indexed) [DOE]

4: Cisco Digital Media Manager Lets Remote Authenticated Users 4: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges January 19, 2012 - 9:00am Addthis PROBLEM: A remote authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not properly validate unreferenced URLs. REFERENCE LINKS: Vendor Advisory SecurityTracker Alert ID: 1026541 CVE-2012-0329 IMPACT ASSESSMENT: medium Discussion: Cisco Show and Share is not directly affected by this vulnerability, but a user can exploit the Cisco Digital Media Manager to gain full access to Cisco Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port

146

A Novel Trigon based Dual Authentication Protocol for Enhancing Security in Grid Environment  

E-Print Network [OSTI]

In recent times, a necessity has been raised in order to distribute computing applications often across grids. These applications are dependent on the services like data transfer or data portal services as well as submission of jobs. Security is of utmost importance in grid computing applications as grid resources are heterogeneous, dynamic, and multidomain. Authentication remains as the significant security challenge in grid environment. In traditional authentication protocol a single server stores the sensitive user credentials, like username and password. When such a server is compromised, a large number of user passwords, will be exposed. Our proposed approach uses a dual authentication protocol in order to improve the authentication service in grid environment. The protocol utilizes the fundamental concepts of trigon and based on the parameters of the trigon the user authentication will be performed. In the proposed protocol, the password is interpreted and alienated into more than one unit and these uni...

Ruckmani, V

2010-01-01T23:59:59.000Z

147

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Broader source: Energy.gov (indexed) [DOE]

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

148

Dublin Bogtrotters: Agent Herders  

Science Journals Connector (OSTI)

This paper describes an entry to the Multi-Agent Programming Contest 2008. The approach employs the pre-existing Agent Factory framework and extends this framework in line with experience gained from its use within the robotics domain.

Mauro Dragone; David Lillis; Conor Muldoon; Richard Tynan; Rem W. Collier; Gregory M. O'Hare

2009-07-01T23:59:59.000Z

149

INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA)  

Broader source: Energy.gov (indexed) [DOE]

7/2013 Page 1 7/2013 Page 1 INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA) Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. HSPD-12 OWA REQUIREMENTS:  An EITS provided Exchange email account  A DOE issued HSPD-12 badge  DOEnet or Internet access and a supported web browser  A smart card reader installed* on your computer (*Windows Vista, Windows XP, MAC OS X 10.7 & 10.8, will also require smart card software to be installed in order to read the HSPD-12 badge) HSPD-12 OWA LOGIN PROCEDURE: 1. Insert HSPD-12 badge into card reader

150

IM Free Agent Sign Up 1 Wanted! Intramurals Free Agents!  

E-Print Network [OSTI]

IM Free Agent Sign Up 1 Wanted! Intramurals Free Agents! Individuals who do not have a full team a "Free Agent". Within the UNLV Intramural Sports program there are multiple ways to improve a Free Agent will not force any team to accept a Free Agent participant. History and research has shown that Free Agents

Hemmers, Oliver

151

V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

6: HP-UX Directory Server Discloses Passwords to Remote 6: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users May 29, 2013 - 12:32am Addthis PROBLEM: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users PLATFORM: Directory Server B.08.10.04 ABSTRACT: Two vulnerabilities were reported in HP-UX Directory Server. REFERENCE LINKS: HP Document ID: c03772083 SecurityTracker Alert ID: 1028593 CVE-2012-2678 CVE-2012-2746 IMPACT ASSESSMENT: High DISCUSSION: A local user can access the plaintext password in certain cases [CVE-2012-2678]. A remote authenticated user can can view the password for a target LDAP user when audit logging is enabled by reading the audit log [CVE-2012-2678].

152

U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

54: Webmin Flaws Let Remote Authenticated Users Execute 54: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files September 10, 2012 - 6:00am Addthis PROBLEM: Webmin Multiple Input Validation Vulnerabilities PLATFORM: The vulnerabilities are reported in version 1.580. Other versions may also be affected. ABSTRACT: An authenticated attacker may be able to execute arbitrary commands. reference LINKS: Webmin Security Alerts Bugtraq ID: 55446 Secunia Advisory SA50512 SecurityTracker Alert ID: 1027507 US CERT Vulnerability Note VU#788478 CVE-2012-2981 CVE-2012-2982 CVE-2012-2983 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities have been reported in Webmin, which can be exploited by malicious users to compromise a vulnerable system and by

153

T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain  

Broader source: Energy.gov (indexed) [DOE]

8: HP Virtual Server Environment Lets Remote Authenticated 8: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges April 22, 2011 - 7:47am Addthis PROBLEM: A vulnerability was reported in HP Virtual Server Environment. A remote authenticated user can obtain elevated privileges on the target system. PLATFORM: HP Virtual Server Environment prior to v6.3 ABSTRACT: A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges. reference LINKS: HP Document ID: c02749050 SecurityTracker Alert ID: 1025429 CVE-2011-1724 HP Insight Software media set 6.3 HP Technical Knowledge Base Discussion: System management and security procedures must be reviewed frequently to

154

V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability  

Broader source: Energy.gov (indexed) [DOE]

6: MediaWiki CentralAuth Extension Authentication Bypass 6: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability September 6, 2013 - 4:36am Addthis PROBLEM: A vulnerability has been reported in the CentralAuth extension for MediaWiki, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: MediaWiki CentralAuth Extension ABSTRACT: A vulnerability has been reported in the CentralAuth extension for MediaWik REFERENCE LINKS: Secunia Advisory SA54723 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an error when handling auto-logins and can be exploited to bypass the authentication mechanism by providing a valid username within the "centralauth_User" cookie. IMPACT:

155

A Reduction for Automated Veri cation of Authentication Scott D. Stoller  

E-Print Network [OSTI]

A Reduction for Automated Veri cation of Authentication Protocols Scott D. Stoller Computer Science of those case studies were not rigorously justi ed. Reduction theorems are needed, which show

Stoller, Scott

156

Integrating an Efficient Authorization Protocol with Trigon-Based Authentication Mechanism for Improving Grid Security  

Science Journals Connector (OSTI)

Security is a vital part of an integrated grid application in which heterogeneous services and resources ... dynamically. Authentication and authorization are the major security concerns in grid environment. Most...

V. Ruckmani; G. Sudha Sadasivam

2010-01-01T23:59:59.000Z

157

Determination of 5-hydroxymethylfurfural after Winkler and by the HPLC method for authentication of honey  

Science Journals Connector (OSTI)

The quality and authenticity of commercially available honey from Slovak market and the development of HPLC method for determination of hydroxymethylfurfural (HMF) content of honey with fine separation efficie...

K. Kukurova; J. Karovi?ov; G. Greif; Z. Kohajdov; J. Lehkoivov

2006-06-01T23:59:59.000Z

158

Subverting value hierarchies : essays on the causes and responses to shifts in demand for authenticity  

E-Print Network [OSTI]

This dissertation includes three essays on the causes and responses to shifts in demand for authenticity. In the first chapter, I answer the question: why do previously cast-off products, practices, or styles abruptly ...

Hahl, Oliver (Oliver Douglas)

2013-01-01T23:59:59.000Z

159

T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid  

Broader source: Energy.gov (indexed) [DOE]

5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a 5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in OpenLDAP. A remote user can authenticate without a valid password. PLATFORM: Open LDAP version(s) 2.4.12 - 2.2.24 ABSTRACT: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password. reference LINKS: SecurityTracker Alert ID:1025190 Secunia Advisory:SA43331 OpenLDAP Issue OpenLDAP Download CVE-2011-1025 IMPACT ASSESSMENT: Medium Discussion: A remote user with knowledge of the target distinguished name can provide an arbitrary password to successfully authenticate on systems using the NDB back-end. Impact: Some vulnerabilities have been reported in OpenLDAP, which can be exploited

160

V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

7: eXtplorer "ext_find_user()" Authentication Bypass 7: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA51636 eXtplorer 2.1.3 Security Release IMPACT ASSESSMENT: Medium DISCUSSION: eXtplorer was notified of a problem within the authentication system of eXtplorer Versions 2.1.2, 2.1.1, 2.1.0 and 2.1.0RC5 that have been found to be vulnerable to an authentication bypass bug. IMPACT: An error within the "ext_find_user()" function in users.php can be

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Agent and environment  

E-Print Network [OSTI]

This paper is about how agents learn. There is a picture of learning that is very influential in epistemology; I call it 'the Classical Picture'. As influential as it is, it is a flawed picture of learning, and epistemology ...

Rochford, Damien (Damien Joseph)

2013-01-01T23:59:59.000Z

162

Microbubbles as Theranostics Agents  

Science Journals Connector (OSTI)

Clinically, ultrasound (US) has been used as a cheap, quick, and effective form of imaging that provides information useful for diagnostic purposes. With the advent of microbubbles as US contrast agents, this ...

Tuan Pham; Carl Beigie; Yoonjee Park Ph.D.; Joyce Y. Wong Ph.D.

2014-01-01T23:59:59.000Z

163

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

September 28, 2012 September 28, 2012 U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands Trend Micro has been notified of a potential product vulnerability in Control Manager. September 27, 2012 U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service A vulnerability was reported in Cisco IOS. September 26, 2012 U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users A vulnerability was reported in Oracle Database. September 25, 2012 U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability Multiple RSA Products Authentication Bypass Vulnerability September 21, 2012 U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain

164

Scatter secure code authentication for efficient reprogramming in wireless sensor networks  

Science Journals Connector (OSTI)

Currently proposed solutions to secure code dissemination in wireless sensor networks (WSNs) involve the use of expensive public-key digital signatures. In this work, we present Scatter, a secure code dissemination protocol that enables sensor nodes to authenticate the program image efficiently. To achieve this, we use a scheme that offers source authentication in the group setting like a public-key signature scheme, but with signature and verification times much closer to those of a MAC (message authentication code). In this way, Scatter avoids the use of elliptic curve cryptography and manages to surpass all previous attempts for secure code dissemination in terms of energy consumption, memory and time efficiency. Besides the design and theoretical analysis of the protocol, we also report the experimental evaluation of Scatter in two different hardware platforms, Mica2 and MicaZ, which proves its efficiency in practice.

Ioannis Krontiris; Tassos Dimitriou

2011-01-01T23:59:59.000Z

165

PAP: A privacy and authentication protocol for passive RFID tags Alex X. Liu *, LeRoy A. Bailey  

E-Print Network [OSTI]

people about consumer privacy protection and other security loopholes that make RFID tags an easy targetPAP: A privacy and authentication protocol for passive RFID tags Alex X. Liu *, LeRoy A. Bailey 2009 Accepted 20 March 2009 Available online 31 March 2009 Keywords: RFID Privacy Authentication

Liu, Alex X.

166

Improving Design with Agents, Improving Agents by Design  

E-Print Network [OSTI]

DCB 1 WPI Improving Design with Agents, or, Improving Agents by Design David C. Brown AI in Design ASSUMPTION ? Assume that the design environment is built using agents. i.e., situated, autonomous, flexible ?'s future design and synthesis environment will be built as a real multi-agent system. In what follows, we

Brown, David C.

167

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote 11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories July 12, 2012 - 7:00am Addthis PROBLEM: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories PLATFORM: EMC Celerra Network Server versions 6.0.36.4 through 6.0.60.2 EMC VNX versions 7.0.12.0 through 7.0.53.1 EMC VNXe 2.0 (including SP1, SP2, and SP3) EMC VNXe MR1 (including SP1, SP2, SP3, and SP3.1) EMC VNXe MR2 (including SP0.1) ABSTRACT: A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system. reference LINKS: The Vendor's Advisory

168

U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and  

Broader source: Energy.gov (indexed) [DOE]

44: McAfee Email Gateway Lets Remote Users Bypass Authentication 44: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks August 27, 2012 - 7:00am Addthis PROBLEM: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks PLATFORM: McAfee Email Gateway (MEG) 7.0.0 and 7.0.1 (MEG 6.7.x is NOT affected.) McAfee Email and Web Security (EWS) 5.6 Patch 3 and earlier McAfee Email and Web Security (EWS) 5.5 Patch 6 and earlier ABSTRACT: Several vulnerabilities were reported in McAfee Email Gateway. reference LINKS: McAfee Security Bulletin ID: SB10026 SecurityTracker Alert ID: 1027444

169

U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and  

Broader source: Energy.gov (indexed) [DOE]

4: McAfee Email Gateway Lets Remote Users Bypass Authentication 4: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks August 27, 2012 - 7:00am Addthis PROBLEM: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks PLATFORM: McAfee Email Gateway (MEG) 7.0.0 and 7.0.1 (MEG 6.7.x is NOT affected.) McAfee Email and Web Security (EWS) 5.6 Patch 3 and earlier McAfee Email and Web Security (EWS) 5.5 Patch 6 and earlier ABSTRACT: Several vulnerabilities were reported in McAfee Email Gateway. reference LINKS: McAfee Security Bulletin ID: SB10026 SecurityTracker Alert ID: 1027444

170

Multielemental Fingerprinting as a Tool for Authentication of Organic Wheat, Barley, Faba Bean, and Potato  

Science Journals Connector (OSTI)

Multielemental Fingerprinting as a Tool for Authentication of Organic Wheat, Barley, Faba Bean, and Potato ... Potato peels were also manually removed by a ceramic peeler on selected subsamples to allow comparison with automatically peeled potatoes. ... Analysis of automatically and manually peeled potatoes as well as potato peels confirmed that the automatic peeling process did not induce any systematic and significant contamination. ...

Kristian H. Laursen; Jan K. Schjoerring; Jrgen E. Olesen; Margrethe Askegaard; Ulrich Halekoh; Sren Husted

2011-03-21T23:59:59.000Z

171

Reliable and Semi-reliable Communication with Authentication in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Reliable and Semi-reliable Communication with Authentication in Mobile Ad Hoc Networks Falko of wireless ad hoc sensor networks is the error-proneness and, therefore, the unreliability of communication describe a new approach and an according protocol for usage in ad hoc networks that provides reliable

Breu, Ruth

172

Project List 1. Project Name: Efficient Anonymous Private Authentication Protocol for RFID Systems  

E-Print Network [OSTI]

based authentication. Publication: · Md. Endadul Hoque, Farzana Rahman, and Sheikh I. Ahamed, "Anon's geocoding and mapping API. Publication: ···· Farzana Rahman, Casey O'Brien, Sheikh I. Ahamed, He Zhang'Brien, Kristine Manning, Jason Cowdy, Sheikh Iqbal Ahamed, "Let EcoDrive be Your Guide: Development of a Mobile

Brylow, Dennis

173

Heart-to-Heart (H2H): Authentication for Implanted Medical Devices  

E-Print Network [OSTI]

Heart-to-Heart (H2H): Authentication for Implanted Medical Devices Masoud Rostami Rice University Rice University Houston, TX farinaz@rice.edu ABSTRACT We present Heart-to-Heart (H2H), a system patients to over-the-air attack and physical harm. H2H makes use of ECG (heartbeat data

174

Biometric authentication system using reduced joint feature vector of iris and face  

Science Journals Connector (OSTI)

In this paper, we present the biometric authentication system based on the fusion of two user-friendly biometric modalities: Iris and Face. Using one biometric feature can lead to good results, but there is no reliable way to verify the classification. ...

Byungjun Son; Yillbyung Lee

2005-07-01T23:59:59.000Z

175

Distillation Codes and Applications to DoS Resistant Multicast Authentication  

E-Print Network [OSTI]

Distillation Codes and Applications to DoS Resistant Multicast Authentication Chris Karlof UC We introduce distillation codes, a method for streaming and storing data. Like erasure codes, distillation codes allow information to be decoded from a sufficiently large quorum of symbols. In contrast

Perrig, Adrian

176

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks  

E-Print Network [OSTI]

Sciences Temple University Philadelphia, PA 19122 Email: jiewu@temple.edu Abstract--Message authentication by the degree of the polynomial: when the number of messages transmitted is larger than this threshold allows any node to transmit an unlimited number of messages without suffering the threshold problem

Wu, Jie

177

Hardware Acceleration of the SRP Authentication Protocol Peter Groen1,2  

E-Print Network [OSTI]

Hardware Acceleration of the SRP Authentication Protocol Peter Groen1,2 , Panu H¨am¨al¨ainen2 , Ben employed is the Secure Remote Password (SRP) authenti- cation protocol [15]. It makes extensive use of hash that can be called from soft- ware routines in the SRP protocol. This paper is structured as follows

Kuzmanov, Georgi

178

Integration of IEEE 802.21 services and pre-authentication framework  

Science Journals Connector (OSTI)

Providing multi-interface device users the ability to roam between different access networks is becoming a key requirement for service providers. The availability of multiple mobile broadband access technologies together with increasing use of real ... Keywords: IEEE 80221, MIH, MPA, authentication, handover performance, heterogeneous networks, media-independent handover, media-independent pre-, multi-interface devices, seamless mobility, testbed

Miriam Tauil; Ashutosh Dutta; Yuu-Heng Cheng; Subir Das; Donald Baker; Maya Yajnik; David Famolari; Yoshihiro Ohba; Kenichi Taniuchi; Victor Fajardo; Henning Schulzrinne

2010-07-01T23:59:59.000Z

179

ECG-Based Authentication Fahim Sufi, Ibrahim Khalil, and Jiankun Hu  

E-Print Network [OSTI]

ECG-Based Authentication Fahim Sufi, Ibrahim Khalil, and Jiankun Hu 17 Contents 17.1 Background of ECG . . . . . . . . . . . . . . . . . . . . . . 310 17.1.1 Physiology of ECG . . . . . . . . . . . . . . . . . . 310 17.1.2 Rhythm Analysis . . . . . . . . . . . . . . . . . . . . 312 17.2 What Can ECG Based

Hu, Jiankun

180

ID-based One-pass Authenticated Key Establishment M. Choudary Gorantla Colin Boyd Juan Manuel Gonzalez Nieto  

E-Print Network [OSTI]

ID-based One-pass Authenticated Key Establishment M. Choudary Gorantla Colin Boyd Juan Manuel Gonz, Brisbane, QLD 4001, Australia. Email: mc.gorantla@isi.qut.edu.au, {c.boyd

Boyd, Colin

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Page not found | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

71 - 22680 of 26,764 results. 71 - 22680 of 26,764 results. Article Small Wind Electric Systems Small wind electric systems are one of the most cost-effective home-based renewable energy systems -- with zero emissions and pollution. http://energy.gov/energysaver/articles/small-wind-electric-systems Article T-642: RSA SecurID update to Customers RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products http://energy.gov/cio/articles/t-642-rsa-securid-update-customers Article T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID RSA investigation has revealed that the attack resulted in certain

182

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication |  

Broader source: Energy.gov (indexed) [DOE]

7: Barracuda SSL VPN Bug Lets Remote Users Bypass 7: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication January 25, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN. PLATFORM: The vulnerability has been verified to exist in Barracuda SSL VPN version 2.2.2.203 ABSTRACT: A remote user can gain administrative access to the target system. REFERENCE LINKS: SecurityTracker Alert ID: 1028039 Barracuda Networks Advisory IMPACT ASSESSMENT: High DISCUSSION: A remote user can set a specially crafted Java system property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database dumps, shutdown the system, and set new administrative

183

Enhancing security of electronic health records through grid-based user authentication scheme  

Science Journals Connector (OSTI)

Medical research and electronic health record (EHR) maintenance involves large databases that are geographically distributed which calls naturally for a grid computing environment. Huge data in medical image analysis, storage and genome processing demand large medical data storage and computing power. Data sharing, software specialisation and data processing which occur in a heterogeneous way tend to make use of the grid computing environment for the medical field. The security solution for authentication in the existing grid environment is non-scalable. This major drawback can hinder the growth of the user community in the medical field. A simple user authentication scheme is proposed, which enhances the security of the overall system but takes less time for execution and lesser communication cost.

G. Jaspher Willsie Kathrine; E. Kirubakaran; Elijah Blessing Rajsingh

2014-01-01T23:59:59.000Z

184

Comparative studies on authentication and key exchange methods for 802.11 wireless LAN  

Science Journals Connector (OSTI)

IEEE 802.11 wireless LAN has become one of the hot topics on the design and development of network access technologies. In particular, its authentication and key exchange (AKE) aspects, which form a vital building block for modern security mechanisms, deserve further investigation. In this paper we first identify the general requirements used for WLAN authentication and key exchange (AKE) methods, and then classify them into three levels (mandatory, recommended, and additional operational requirements). We present a review of issues and proposed solutions for AKE in 802.11 WLANs. Three types of existing methods for addressing AKE issues are identified, namely, the legacy, layered and access control-based AKE methods. Then, we compare these methods against the identified requirements. Based on the analysis, a multi-layer AKE framework is proposed, together with a set of design guidelines, which aims at a flexible, extensible and efficient security as well as easy deployment.

Jun Lei; Xiaoming Fu; Dieter Hogrefe; Jianrong Tan

2007-01-01T23:59:59.000Z

185

Questioning the Meaning of Authenticity in Martin Heidegger's Being and Time  

E-Print Network [OSTI]

the proper context for authenticity will be to clarify those existential structures that describe what it means for Dasein to exist concretely in the world. Since Heidegger provides a fairly comprehensive account of the ontological constitution... the ontological and the ontic, and the existential and the existentiell. As a result, the traditional notions of selfhood and subjectivity get split between this new landscape of categories and subsequently lose their meaning. As Francois Raffoul points out...

Liwinski, Thomas

2011-10-21T23:59:59.000Z

186

V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote 1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service November 22, 2012 - 3:00am Addthis PROBLEM: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service PLATFORM: Version(s): XC10 2.0.0.0 - 2.0.0.3, 2.1.0.0 - 2.1.0.2 ABSTRACT: Several vulnerabilities were reported in IBM WebSphere DataPower. REFERENCE LINKS: IBM Security Bulletin SecurityTracker Alert ID: 1027798 CVE-2012-5758 CVE-2012-5759 CVE-2012-5756 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in IBM WebSphere DataPower. A remote

187

Designing a minimum-functionality neutron and gamma measurement instrument with a focus on authentication  

SciTech Connect (OSTI)

During the design and construction of the Next-Generation Attribute-Measurement System, which included a largely commercial off-the-shelf (COTS), nondestructive assay (NDA) system, we realized that commercial NDA equipment tends to include numerous features that are not required for an attribute-measurement system. Authentication of the hardware, firmware, and software in these instruments is still required, even for those features not used in this application. However, such a process adds to the complexity, cost, and time required for authentication. To avoid these added authenticat ion difficulties, we began to design NDA systems capable of performing neutron multiplicity and gamma-ray spectrometry measurements by using simplified hardware and software that avoids unused features and complexity. This paper discusses one possible approach to this design: A hardware-centric system that attempts to perform signal analysis as much as possible in the hardware. Simpler processors and minimal firmware are used because computational requirements are kept to a bare minimum. By hard-coding the majority of the device's operational parameters, we could cull large sections of flexible, configurable hardware and software found in COTS instruments, thus yielding a functional core that is more straightforward to authenticate.

Karpius, Peter J [Los Alamos National Laboratory; Williams, Richard B [Los Alamos National Laboratory

2009-01-01T23:59:59.000Z

188

Agent-based enterprise integration  

SciTech Connect (OSTI)

The authors are developing and deploying software agents in an enterprise information architecture such that the agents manage enterprise resources and facilitate user interaction with these resources. Their enterprise agents are built on top of a robust software architecture for data exchange and tool integration across heterogeneous hardware and software. The resulting distributed multi-agent system serves as a method of enhancing enterprises in the following ways: providing users with knowledge about enterprise resources and applications; accessing the dynamically changing enterprise; intelligently locating enterprise applications and services; and improving search capabilities for applications and data. Furthermore, agents can access non-agents (i.e., databases and tools) through the enterprise framework. The ultimate target of their effort is the user; they are attempting to increase user productivity in the enterprise. This paper describes their design and early implementation and discusses their planned future work.

N. M. Berry; C. M. Pancerella

1999-05-01T23:59:59.000Z

189

Facilitating Agent Messaging on PDAs  

Science Journals Connector (OSTI)

Java and middleware are becoming popular on PDAs and small devices with the advent of small-footprint virtual machines. In this paper, we examine agent messaging on small devices based on our experiences with Micro-FIPA-OS, which is an agent toolkit ...

Sasu Tarkoma; Mikko Laukkanen

2002-10-01T23:59:59.000Z

190

Plasmids encoding therapeutic agents  

DOE Patents [OSTI]

Plasmids encoding anti-HIV and anti-anthrax therapeutic agents are disclosed. Plasmid pWKK-500 encodes a fusion protein containing DP178 as a targeting moiety, the ricin A chain, an HIV protease cleavable linker, and a truncated ricin B chain. N-terminal extensions of the fusion protein include the maltose binding protein and a Factor Xa protease site. C-terminal extensions include a hydrophobic linker, an L domain motif peptide, a KDEL ER retention signal, another Factor Xa protease site, an out-of-frame buforin II coding sequence, the lacZ.alpha. peptide, and a polyhistidine tag. More than twenty derivatives of plasmid pWKK-500 are described. Plasmids pWKK-700 and pWKK-800 are similar to pWKK-500 wherein the DP178-encoding sequence is substituted by RANTES- and SDF-1-encoding sequences, respectively. Plasmid pWKK-900 is similar to pWKK-500 wherein the HIV protease cleavable linker is substituted by a lethal factor (LF) peptide-cleavable linker.

Keener, William K. (Idaho Falls, ID)

2007-08-07T23:59:59.000Z

191

Agent-Based Alerting for Forecasters  

E-Print Network [OSTI]

­ Temperature ­ Pressure ­ Wind direction ­ Wind speed ­ ... #12;Titan Radar System Provides current;Agents · Agent: software that is autonomous, situated in an environment · An intelligent agent is proactive, reactive, social · Also flexible, robust, rational #12;Agents vs. Objects · Agents are autonomous

Dance, Sandy

192

Facilitating Agent Messaging on PDAs  

Science Journals Connector (OSTI)

Java and middleware are becoming popular on PDAs and small devices with the advent of small-footprint virtual machines. In this paper, we examine agent messaging on small devices based on our experiences with ...

Sasu Tarkoma; Mikko Laukkanen

2002-01-01T23:59:59.000Z

193

Software Agents for Ubiquitous Computing  

Science Journals Connector (OSTI)

Ubiquitous computing draws a picture of a world where people access intelligent and easy-to-use services, irrespective of location and time. Software agent technology is a good candidate for ubiquitous computi...

Sasu Tarkoma; Mikko Laukkanen

2005-01-01T23:59:59.000Z

194

Agent review phase one report.  

SciTech Connect (OSTI)

This report summarizes the findings for phase one of the agent review and discusses the review methods and results. The phase one review identified a short list of agent systems that would prove most useful in the service architecture of an information management, analysis, and retrieval system. Reviewers evaluated open-source and commercial multi-agent systems and scored them based upon viability, uniqueness, ease of development, ease of deployment, and ease of integration with other products. Based on these criteria, reviewers identified the ten most appropriate systems. The report also mentions several systems that reviewers deemed noteworthy for the ideas they implement, even if those systems are not the best choices for information management purposes.

Zubelewicz, Alex Tadeusz; Davis, Christopher Edward; Bauer, Travis LaDell

2009-12-01T23:59:59.000Z

195

Poster sessions as an authentic assessment approach in an open-Ended University general chemistry laboratory  

Science Journals Connector (OSTI)

The purpose of this study is to explore the views of Pre-service Science Teachers (PSTs) on their posters as an authentic assessment tool in an open-ended chemistry laboratory course. Forty-three \\{PSTs\\} set up their research questions, designed and performed laboratory investigations, obtained results of their experiments and prepared their posters as an alternative to traditional laboratory reports. They engaged in the process of assessment in the course as both self and peer evaluators. At the end of each laboratory session, each group of the \\{PSTs\\} presented posters of their laboratory investigations to their peers and instructors. Results of the PSTs interview analyses indicated that most \\{PSTs\\} expressed many benefits to the presentation of laboratory investigations using posters in comparison to the traditional laboratory reports.

Alev Do?an; Osman Naf?z Kaya

2009-01-01T23:59:59.000Z

196

EER of fixed and trainable fusion classifiers: A theoretical study with application to biometric authentication tasks  

E-Print Network [OSTI]

Biometric authentication is a process of verifying an identity claim using a persons behavioural and physiological characteristics. Due to the vulnerability of the system to environmental noise and variation caused by the user, fusion of several biometric-enabled systems is identified as a promising solution. In the literature, various fixed rules (e.g. min, max, median, mean) and trainable classifiers (e.g. linear combination of scores or weighted sum) are used to combine the scores of several base-systems. How exactly do correlation and imbalance nature of base-system performance affect the fixed rules and trainable classifiers? We study these joint aspects using the commonly used error measurement in biometric authentication, namely Equal Error Rate (EER). Similar to several previous studies in the literature, the central assumption used here is that the class-dependent scores of a biometric system are approximately normally distributed. However, different from them, the novelty of this study is to make a direct link between the EER measure and the fusion schemes mentioned. Both synthetic and real experiments (with as many as 256 fusion experiments carried out on the XM2VTS benchmark score-level fusion data sets) verify our proposed theoretical modeling of EER of the two families of combination scheme. In particular, it is found that weighted sum can provide the best generalisation performance when its weights are estimated correctly. It also has the additional advantage that score normalisation prior to fusion is not needed, contrary to the rest of fixed fusion rules.

Norman Poh; Samy Bengio

2005-01-01T23:59:59.000Z

197

EER of Fixed and Trainable Fusion Classifiers: A Theoretical Study with Application to Biometric Authentication Tasks  

E-Print Network [OSTI]

submitted for publication Abstract. Biometric authentication is a process of verifying an identity claim using a persons behavioural and physiological characteristics. Due to the vulnerability of the system to environmental noise and variation caused by the user, fusion of several biometric-enabled systems is identified as a promising solution. In the literature, various fixed rules (e.g. min, max, median, mean) and trainable classifiers (e.g. linear combination of scores or weighted sum) are used to combine the scores of several base-systems. How exactly do correlation and imbalance nature of base-system performance affect the fixed rules and trainable classifiers? We study these joint aspects using the commonly used error measurement in biometric authentication, namely Equal Error Rate (EER). Similar to several previous studies in the literature, the central assumption used here is that the class-dependent scores of a biometric system are approximately normally distributed. However, different from them, the novelty of this study is to make a direct link between the EER measure and the fusion schemes mentioned. Both synthetic and real experiments (with as many as 512 fusion experiments carried out on the XM2VTS benchmark score-level fusion data sets) verify our proposed theoretical modeling of EER of the two families of combination scheme. In particular, it is found that weighted sum can provide the best generalisation performance when its weights are estimated correctly. It also has the additional advantage that score normalisation prior to fusion is not needed, contrary to the rest of fixed fusion rules. 2 IDIAPRR 05-01 1

Norman Poh A; Samy Bengio A; Norman Poh; Samy Bengio

2005-01-01T23:59:59.000Z

198

AgentTest: A specification language for agent-based system testing  

Science Journals Connector (OSTI)

Abstract AgentTest is a sublanguage of TTCN-3, aimed at specifying and testing agent-based systems. Its major strength is its unification and automation of abstract test suite generation and structured testing methodology for agent-based systems. AgentTest enables formal and strongly typed modelling of agent-based systems and their unit and agent testing. This paper introduces the syntax and semantics of AgentTest language and its modelling and testing methodology through the example of an agent-based weather system. AgentTest methodology is also complemented with an evolutionary testing methodology for test case generation based on a multi-objective genetic algorithm.

Marina Bagi? Babac; Dragan Jevti?

2014-01-01T23:59:59.000Z

199

Triggered pore-forming agents  

DOE Patents [OSTI]

An inactive pore-forming agent is revealed which is activated to lytic function by a condition such as pH, light, heat, reducing potential, or metal ion concentration, or substance such as a protease, at the surface of a cell. 30 figs.

Bayley, H.; Walker, B.J.; Chang, C.Y.; Niblack, B.; Panchal, R.

1998-07-07T23:59:59.000Z

200

Federated Authentication & Authorisation for e-Science J. Watt, R.O. Sinnott, J. Jiang, T. Doherty, A.J. Stell, D. Martin, G. Stewart  

E-Print Network [OSTI]

Federated Authentication & Authorisation for e-Science J. Watt, R.O. Sinnott, J. Jiang, T. Doherty, UK j.watt@nesc.gla.ac.uk Abstract The Grid and Web service community are defining a range of stan

Glasgow, University of

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

U-044: HP Operations Agent and Performance Agent Lets Local Users Access a  

Broader source: Energy.gov (indexed) [DOE]

44: HP Operations Agent and Performance Agent Lets Local Users 44: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory U-044: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory November 23, 2011 - 8:00am Addthis PROBLEM: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory. PLATFORM: HP Operations Agent v11.00 and Performance Agent v4.73, v5.0 for AIX, HP-UX, Linux, and Solaris ABSTRACT: A local user can access a directory on the target system. reference LINKS: HP Security Bulletin Document ID: c03091656 CVE-2011-4160 SecurityTracker Alert ID: 1026345 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP Operations Agent and Performance Agent. A local user can access data on the target system. A local user can gain

202

Animated agents in K-12 engineering outreach: Preferred agent characteristics across age levels  

E-Print Network [OSTI]

agent characteristics were assessed using survey methodology: agent gender, age, real- ism, clothing; Perez & Solomon, 2005; Wang et al., 2008). The current study investigates learner preferences

Reisslein, Martin

203

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

March 8, 2013 March 8, 2013 V-107: Wireshark Multiple Denial of Service Vulnerabilities Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). March 7, 2013 V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions. March 6, 2013 V-105: Google Chrome Multiple Vulnerabilities Multiple vulnerabilities have been reported in Google Chrome March 5, 2013 V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Oracle Java March 4, 2013 V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication

204

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

was reported in RSA Authentication Manager. July 8, 2013 V-194: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host...

205

Chelating agents for technetium-99M  

DOE Patents [OSTI]

The present invention relates to a novel family of Technetium chelating agents (ligands) based upon amide and mercaptide donor groups.

Fritzberg, A.R.; Kasina, S.

1987-06-02T23:59:59.000Z

206

Mobile Agents: An Introduction Gian Pietro Picco  

E-Print Network [OSTI]

1 Mobile Agents: An Introduction Gian Pietro Picco Dipartimento di Elettronica e Informazione, Politecnico di Milano, Italy picco@elet.polimi.it Abstract| Mobile agents are enjoying a lot of popularity to the related research #12;eld by showing evidence of the bene#12;ts mobile agents can potentially achieve

Picco, Gian Pietro

207

Intelligent Agents on the Web: A Review  

Science Journals Connector (OSTI)

Intelligent agents are goal-driven and autonomous and can communicate and interact with each other. Moreover they can evaluate information obtained online from heterogeneous sources and present information tailored to an individual's needs. This article covers different facets of the intelligent agent paradigm and applications while also exploring new opportunities and trends for intelligent agents.

Noureddine Boudriga; Mohammad S. Obaidat

2004-01-01T23:59:59.000Z

208

MDE and Mobile agents: another reflection on the agent migration Tahar GHERBI  

E-Print Network [OSTI]

MDE and Mobile agents: another reflection on the agent migration Tahar GHERBI Computer science code. Mobile agents are a very interesting technology to develop applications for mobile and distributed environments. A mobile agent is essentially a computer program that acts autonomously on behalf

Paris-Sud XI, Université de

209

Agent-based health care management An Agent-based Approach to Health Care Management  

E-Print Network [OSTI]

Agent-based health care management 1 An Agent-based Approach to Health Care Management Jun Huang1, London WC2A 3PX, UK. Abbreviated title: Agent-based health care management Complete Mailing Address. London E1 4NS UK #12;Agent-based health care management 2 Abstract The provision of medical care

Mascardi, Viviana

210

A mutual authentication and key establishment scheme for heterogeneous sensor networks supporting nodes mobility  

Science Journals Connector (OSTI)

In the last two decades, wireless sensor networks (WSNs) have greatly attracted the attention of the research community because their flexibility, adaptability and self-organising properties make them a technology solution suitable for diverse application scenarios ranging from home and industrial automation to military surveillance. Since these networks consist of resource constrained devices and can be deployed in remote and unattended areas, supporting security could represent a challenging task especially if mobility scenarios are taken into consideration. In this context, key management facilitates the adoption of cryptography techniques to support secure data communication and to protect the resource constrained devices from various security attacks. This paper specifically focuses on mobile heterogeneous wireless sensor networks consisting of mobile sensor nodes with few fixed sensor nodes and presents a mutual authentication and key management scheme suitable for the considered scenario. Analytical and OMNET++ simulation results show that the proposed scheme provides better network connectivity, consumes less memory, has better network resilience against attacks and introduces lower communication overhead compared to state-of-the-art solutions.

Sarmad Ullah Khan; Claudio Pastrone; Luciano Lavagno; Maurizio A. Spirito

2012-01-01T23:59:59.000Z

211

Timing Attacks on software implementation of RSA  

E-Print Network [OSTI]

the amount of time required to perform private key operations (Decryptions etc.). Timing attacks are related to a class of attacks called side-channel attacks. Others include power analysis and attacks based decryption times are masked by many concurrent processes running on the system. It is also believed

212

Agent-organized networks for dynamic team formation  

Science Journals Connector (OSTI)

Many multi-agent systems consist of a complex network of autonomous yet interdependent agents. Examples of such networked multi-agent systems include supply chains and sensor networks. In these systems, agents have a select set of other agents with whom ... Keywords: multi-agent systems, organizational learning, team formation

Matthew E. Gaston; Marie desJardins

2005-07-01T23:59:59.000Z

213

Multi-Agent based Microgrid Coordinated Control  

Science Journals Connector (OSTI)

There are obvious advantages in collaborative work for the system based on the multi-agent technology. According to a concrete microgrid in this paper, multi-agent control system is designed based on the microgrid control goals. The structure of multi-agent microgrid control system and the specific functions of each agent are proposed, expounding the microgrid coordinated control strategies at the grid-connected and islanded state respectively. The model of microgrid based on the multi-agent is established in the MATLAB/SIMULINK. The simulation model has simulated the microgrid's characteristics of running operation performance both under the grid-connected and islanded situation. Simulation results show that multi-agent microgrid control system can fully satisfy the requirement of power balance control and inhibit frequency fluctuation under the two situation.

Zhou Xiaoyan; Liu Tianqi; Liu Xueping

2012-01-01T23:59:59.000Z

214

Classifying Agent Behaviour through Relational Sequential Patterns  

E-Print Network [OSTI]

Classifying Agent Behaviour through Relational Sequential Patterns Grazia Bombini, Nicola Di Mauro. Di Mauro, S. Ferilli, F. Esposito frequent patterns, among the relational sequences useful

Di Mauro, Nicola

215

Relational Sequence Clustering for Aggregating Similar Agents  

E-Print Network [OSTI]

Relational Sequence Clustering for Aggregating Similar Agents Grazia Bombini, Nicola Di Mauro;2 Grazia Bombini, Nicola Di Mauro, Stefano Ferilli, and Floriana Esposito image segmentation and pattern

Di Mauro, Nicola

216

Business Models Guide: Real Estate Agent  

Broader source: Energy.gov [DOE]

With excellent marketing skills, a keen understanding of financing options, and a broad knowledge of the industry, real estate agents are natural advocates for smart energy efficiency upgrades.

217

Revising the trade-off between the number of agents and agent intelligence  

Science Journals Connector (OSTI)

Emergent agents are a promising approach to handle complex systems. Agent intelligence is thereby either defined by the number of states and the state transition function or the length of their steering programs. Evolution has shown to be successful ...

Marcus Komann; Dietmar Fey

2010-04-01T23:59:59.000Z

218

Authenticity of the Traditional Cypriot Spirit Zivania on the Basis of Metal Content Using a Combination of Coupled Plasma Spectroscopy and Statistical Analysis  

Science Journals Connector (OSTI)

Porous Solids Group, Department of Chemistry, University of Cyprus, P.O. ... In various publications, 1H and 13C NMR, as well as 2H SNIF (site natural isotopic fractionation) NMR, are mentioned as the most applicable methodologies to characterize the geographic origin and authenticity of wine products and are considered to be powerful tools for the authentication of beverages (11?13). ... Gas chromatography on a chiral stationary phase coupled with selected ion monitoring mass spectrometry was used to examine the presence of amino acid enantiomers (d-Aas) in different beers and vinegar (16). ...

Rebecca Kokkinofta; Panos V. Petrakis; Thomas Mavromoustakos; Charis R. Theocharis

2003-09-16T23:59:59.000Z

219

Agent Technology: Computing as Interaction A Roadmap for Agent Based Computing  

E-Print Network [OSTI]

Agent Technology: Computing as Interaction A Roadmap for Agent Based Computing Michael Luck, Peter Programming Languages Coordination Negotiation Communication Trends and Drivers Technologies Related Disciplines Related Techniques #12;Supported by #12;2 AgentLink Roadmap Michael Luck, Peter McBurney, Onn

Luck, Michael

220

The Mechanism of Action of Alkylating Agents  

Science Journals Connector (OSTI)

...the Sn2 and Sn1 reactors with their known...alkylating agents on nuclear material and cell...the Sn@ and Sni reactors with their known...alkylating agents on nuclear material and cell...then there was de generation, whereas with x-rays...oegiants, although nuclear granulation similar...

G. P. Warwick

1963-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Validating Complex Agent Behavior Scott A. Wallace  

E-Print Network [OSTI]

Behavior by Scott A. Wallace Chair: John E. Laird Developing software agents that replicate human behaviorValidating Complex Agent Behavior by Scott A. Wallace A dissertation submitted in partial) in The University of Michigan 2003 Doctoral Committee: Professor John E. Laird, Chair Associate Professor William P

Wallace, Scott

222

Posted 3/22/13 PURCHASING AGENT  

E-Print Network [OSTI]

Posted 3/22/13 PURCHASING AGENT Our Chicago-based Food Service Company is seeking an experienced Comparison, Food Service/Food Wholesale experience · Proficient computer skills in MS Word, Excel and Outlook Purchasing Agent who will be responsible for the following: · Buying a large range of food items, including

Heller, Barbara

223

Material Handling Problem: FIPA Compliant Agent Implementation  

Science Journals Connector (OSTI)

This paper describes a proposal of a multi-agent FIPA-compliant solution of a general material handling system problem. Simple knowledge ontology for material handling and basic classes of FIPA-compliant agents/messages for this kind of systems are presented ...

Pavel Vrba; Vaclav Hrdonka

2002-01-01T23:59:59.000Z

224

Supporting software agents on small devices  

Science Journals Connector (OSTI)

Current small devices, such as Personal Digital Assistants (PDAs), are powerful enough to enable the use of Java applications and middleware. In this paper, we present the Java based MicroFIPA-OS, which is an agent platform for enabling software agents ...

Sasu Tarkoma; Mikko Laukkanen

2002-07-01T23:59:59.000Z

225

Path Analysis Models of an Autonomous Agent  

E-Print Network [OSTI]

Path Analysis Models of an Autonomous Agent in a Complex Environment Paul R. Cohen, David M. Hart AFOSR-91-0067. #12;1 Phoenix Phoenix is a simulated environment populated by autonomous agents) the e orts of all, a reboss. Fires burn in unpredictable ways due to wind speed and direction, terrain

226

JC3 High Impact Assessment Bulletins | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

March 21, 2011 March 21, 2011 T-584: Microsoft March 2011 Security Bulletin Release Microsoft released 3 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. March 17, 2011 T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products. March 14, 2011 T-577: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat

227

CAH and Shared Services Transition Plan CAH will move seven servers that provide daily operational services such as user authentication and access, central file  

E-Print Network [OSTI]

CAH and Shared Services Transition Plan CAH will move seven servers that provide daily operational the university's NET domain. Domains provide user authentication, access, and management to resources divide the transition plan, and each phase has goals and a deadline. The overall goal is to continue

Wu, Shin-Tson

228

Collaborative Virtual Training with Physical and Communicative Autonomous Agents.  

E-Print Network [OSTI]

Collaborative Virtual Training with Physical and Communicative Autonomous Agents. Thomas Lopez1, Conversational Agents, Autonomous Actors, Avatars, Virtual Reality Introduction The use of virtual reality Environments for Train- ing (CVETs) where real users and autonomous agents efficiently collaborate toward

229

Agent Program Planning Information Money Smart  

E-Print Network [OSTI]

Agent Program Planning Information Money Smart http participated in Money Smart classes: Habitat for Humanity, Head Start, workforce center clients, adult Planning Model plans have been developed for a Money Smart outcome plan and a Money Smart output plan

230

The EO-1 Autonomous Science Agent  

Science Journals Connector (OSTI)

An Autonomous Science Agent is currently flying onboard the Earth Observing One Spacecraft. This software enables the spacecraft to autonomously detect and respond to science events occurring on the Earth. The package includes software systems that perform ...

Steve Chien; Rob Sherwood; Daniel Tran; Benjamin Cichy; Gregg Rabideau; Rebecca Castano; Ashley Davies; Rachel Lee; Dan Mandl; Stuart Frye; Bruce Trout; Jerry Hengemihle; Jeff D'Agostino; Seth Shulman; Stephen Ungar; Thomas Brakke; Darrell Boyer; Jim Van Gaasbeck; Ronald Greeley; Thomas Doggett; Victor Baker; James Dohm; Felipe Ip

2004-07-01T23:59:59.000Z

231

Compositional evaluation of asphalt binder recycling agents  

E-Print Network [OSTI]

Several experiments were performed to determine how recycling agent composition affects the high, intermediate, and low temperature properties as well as long term oxidative aging characteristics of recycled asphalt blends. Specifically, several...

Madrid, Richard Charles

1997-01-01T23:59:59.000Z

232

Efficient Agent Communication in Wireless Environments  

Science Journals Connector (OSTI)

In wireless environments, communication should be tailored to enable an efficient use of scarce and fluctuating data communication resources. In this chapter we consider software agent communication in such en...

Heikki Helin; Mikko Laukkanen

2005-01-01T23:59:59.000Z

233

Clinical Aspects of Resistance to Antineoplastic Agents  

Science Journals Connector (OSTI)

Were it not for the resistance of human tumors to antineoplastic agents, disseminated cancer would not be a clinical problem, and in fact surgery and radiotherapy would be pass. All too familiar to the layper...

Dr. Roland T. Skeel; Craig A. Lindquist

1977-01-01T23:59:59.000Z

234

When agents communicate hypotheses in critical situations  

Science Journals Connector (OSTI)

This paper discusses the problem of efficient propagation of uncertain information in dynamic environments and critical situations. When a number of (distributed) agents have only partial access to information, the explanation(s) and conclusion(s) ...

Gauvain Bourgne; Nicolas Maudet; Suzanne Pinson

2006-05-01T23:59:59.000Z

235

Precursors to radiopharmaceutical agents for tissue imaging  

DOE Patents [OSTI]

A class of radiolabeled compounds to be used in tissue imaging that exhibits rapid brain uptake, good brain:blood radioactivity ratios, and long retention times. The imaging agents are more specifically radioiodinated aromatic amines attached to dihydropyridine carriers, that exhibit heart as well as brain specificity. In addition to the radiolabeled compounds, classes of compounds are also described that are used as precursors and intermediates in the preparation of the imaging agents.

Srivastava, Prem C. (Oak Ridge, TN); Knapp, Jr., Furn F. (Oak Ridge, TN)

1988-01-01T23:59:59.000Z

236

1 Introduction 1 1.1 Mobile agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1  

E-Print Network [OSTI]

Contents 1 Introduction 1 1.1 Mobile agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Historical perspective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.3 Applications of mobile agents . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.4 Drawbacks

Tripathi, Anand

237

Single-Machine Two-Agent Scheduling Problems with ...  

E-Print Network [OSTI]

Jan 24, 2014 ... Abstract: We address a class of deterministic scheduling problems in which two agents compete for the usage of a single machine. The agents...

Gaia Nicosia

2014-01-24T23:59:59.000Z

238

E-Print Network 3.0 - agents tiamulin olanquindox Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES find local failures... agents will multiply. These irregular agents may use all of the...

239

E-Print Network 3.0 - agentes microbianos reportados Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES find local failures... agents will multiply. These irregular agents may use all of the...

240

E-Print Network 3.0 - antithyroid agents Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES find local failures... agents will multiply. These irregular agents may use all of the...

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

E-Print Network 3.0 - adrenergics-blocking agents Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES find local failures... agents will multiply. These irregular agents may use all of the...

242

E-Print Network 3.0 - agent pseudozyma flocculosa Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES find local failures... agents will multiply. These irregular agents may use all of the...

243

E-Print Network 3.0 - agente tensioactivo pulmonar Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES find local failures... agents will multiply. These irregular agents may use all of the...

244

E-Print Network 3.0 - agent marcaje indirecto Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES find local failures... agents will multiply. These irregular agents may use all of the...

245

E-Print Network 3.0 - anti-anxiety agents Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES find local failures... agents will multiply. These irregular agents may use all of the...

246

E-Print Network 3.0 - antiprotozoal agents Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES find local failures... agents will multiply. These irregular agents may use all of the...

247

E-Print Network 3.0 - antiparkinson agents Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES find local failures... agents will multiply. These irregular agents may use all of the...

248

E-Print Network 3.0 - agentes antitumorais inibidores Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES find local failures... agents will multiply. These irregular agents may use all of the...

249

Supporting nomadic agent-based applications in the FIPA agent architecture  

Science Journals Connector (OSTI)

A high variety of Quality of Service (QoS) in data transmission over wireless networks creates challenges that have not been adequately addressed in today's Internet-based services. Whereas today's distributed applications may result in treating rapid ... Keywords: adaptation, agent communication, nomadic application, software agent, wireless networks

Mikko Laukkanen; Heikki Helin; Heimo Laamanen

2002-07-01T23:59:59.000Z

250

AF-ABLE in the multi agent contest 2009  

Science Journals Connector (OSTI)

This is the second year in which a team from University College Dublin has participated in the Multi Agent Contest ( http://www.multiagentcontest.org/2009 Keywords: 68T42, AF-ABLE, Agent contest 2009, Agent factory, Multi agent systems

Howell Jordan; Jennifer Treanor; David Lillis; Mauro Dragone; Rem W. Collier; G. M. O'Hare

2010-08-01T23:59:59.000Z

251

Multi-agent policies: from centralized ones to decentralized ones  

Science Journals Connector (OSTI)

In this paper we divide multi-agent policies into two categories: centralized ones and decentralized ones. They reflect different views of multi-agent systems and different decision-theoretic underpinnings. While the centralized policies specify the ... Keywords: action selection and planning, agent comm languages and protocols, cooperation, coordinating multi agents & activities, methodologies and tools

Ping Xuan; Victor Lesser

2002-07-01T23:59:59.000Z

252

A pattern-based development tool for mobile agents  

Science Journals Connector (OSTI)

Mobile agents are a technology that is applicable in several courses. However, the development of applications using mobile agents can be difficult and time-consuming for students. To address this problem, a tool called Mobile Agent Development Environment ... Keywords: design patterns, development tool, distributed systems, mobile agents

Vishal D. Modak; David D. Langan; Thomas F. Hain

2005-02-01T23:59:59.000Z

253

Normative Agents in Health Care: Uses and Challenges  

E-Print Network [OSTI]

Normative Agents in Health Care: Uses and Challenges Javier V´azquez-Salceda institute;Normative Agents in Health Care: Uses and Challenges Javier V´azquez-Salceda 1 Abstract. The use of Multi-Agent Systems (MAS) in health-care domains is increasing. Such Agent-mediated Medical Systems are designed

Utrecht, Universiteit

254

Otvoren implementcia architektry Agent-Space  

E-Print Network [OSTI]

prejavy sú dané aktivovaním správnej sady agentov v správnom case image ball left/right Turn left direction ball interpolated ball recognizer interpolator left/right left/right #12;8 agent agent space blok zábran pridáva a odobera agentov, i takých ktorí ovládajú tie isté aktuátory robota. bumper right wheel

Lucny, Andrej

255

Detection of electrophilic and nucleophilic chemical agents  

DOE Patents [OSTI]

A "real time" method for detecting chemical agents generally and particularly electrophilic and nucleophilic species by employing tunable, precursor sensor materials that mimic the physiological interaction of these agents to form highly florescent berberine-type alkaloids that can be easily and rapidly detected. These novel precursor sensor materials can be tuned for reaction with both electrophilic (chemical species, toxins) and nucleophilic (proteins and other biological molecules) species. By bonding or otherwise attaching these precursor molecules to a surface or substrate they can be used in numerous applications.

McElhanon, James R.; Shepodd, Timothy J.

2014-08-12T23:59:59.000Z

256

Formal Transition in Agent Organizations Eric Matson  

E-Print Network [OSTI]

, the company's management must understand the methodology and process of transition, or more generally termedFormal Transition in Agent Organizations Eric Matson Department of Computer Science and Engineering define organization transition. Specifically, we describe a formal process of organi- zation transition

Deloach, Scott A.

257

A Practitioners' Review of Industrial Agent Applications  

Science Journals Connector (OSTI)

ERIM's1 Center for Electronic Commerce (CEC) hosted a two-day Workshop on Industrial Agents (WINA) in Ann Arbor, MI on Nov. 1213, 1998. Participation in the workshop was by invitation only, and was restricted to companies with whom ... Keywords: industrial applications, methods, software tools, workshop report

H. Van Dyke Parunak

2000-12-01T23:59:59.000Z

258

Active agents, intelligence and quantum Subhash Kak *  

E-Print Network [OSTI]

Active agents, intelligence and quantum computing Subhash Kak * Department of Electrical neuroscience and quantum computing theory in support of the notion of autonomy in the workings of cognitive processes. De®cits in speech, vision, and motor abilities are described to show how cognitive behavior

Kak, Subhash

259

Current and Emerging Azole Antifungal Agents  

Science Journals Connector (OSTI)

...data are valid only if the methodology in M27-A is followed. The current standard may be obtained from NCCLS, 940 West Valley Road, Suite 1400, Wayne, PA 19087. Shown are the breakpoints for Candida species against the indicated agents...

Daniel J. Sheehan; Christopher A. Hitchcock; Carol M. Sibley

1999-01-01T23:59:59.000Z

260

A New Class of Antituberculosis Agents  

Science Journals Connector (OSTI)

A New Class of Antituberculosis Agents ... This finding is consistent with the original design as any spacing greater than one atom would alter both the geometrical and electronic similarity between a potential inhibitor and the putative KAS transition state depicted in Scheme 1. ...

Paul B. Jones; Nikki M. Parrish; Todd A. Houston; Anthony Stapon; Niharika P. Bansal; James D. Dick; Craig A. Townsend

2000-08-24T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Buyer agent to Enhance Consumer Awareness: SAATHI  

E-Print Network [OSTI]

, collecting, or transforming information. On the other hand internet stores are providing services customized for deploying "buyer's agents" whose goal is to best serve the consumer's interests. The Internet contains Introduction The advent and easy accessibility to the Internet has allowed the average citizen to participate

Sen, Sandip

262

Commonsense and Embodied Agents A Panel Discussion  

E-Print Network [OSTI]

Commonsense and Embodied Agents A Panel Discussion Stuart C. Shapiro Computer Science and Engineering University at Buffalo, The State University of New York Buffalo, NY, USA shapiro Reasoning Group Grosskreutz: Knowledge-based Systems Group Shapiro: The SNePS Research Group Randell

Shapiro, Stuart C.

263

Commonsense and Embodied Agents A Panel Discussion  

E-Print Network [OSTI]

Commonsense and Embodied Agents A Panel Discussion Stuart C. Shapiro Computer Science and Engineering University at Bu#11;alo, The State University of New York Bu#11;alo, NY, USA shapiro Reasoning Group Grosskreutz: Knowledge-based Systems Group Shapiro: The SNePS Research Group Randell

Shapiro, Stuart C.

264

Reasoning about Incomplete Agents Hans Chalupsky  

E-Print Network [OSTI]

Admiralty Way Marina del Rey, CA 90292 hans@isi.edu Stuart C. Shapiro Department of Computer Science State: Hans Chalupsky and Stuart C. Shapiro, Reasoning about Incomplete Agents, Proceedings of the Fifth University of New York at Buffalo 226 Bell Hall Buffalo, NY 14260 shapiro@cs.buffalo.edu Abstract We show how

Shapiro, Stuart C.

265

Agent Notes Day 4 ~ Health Training  

E-Print Network [OSTI]

­ Agent Notes Day 4 ~ Health Training In preparation for the Health Day, you could order the National Institute on Aging, National Institutes of Health. To order these free booklets, go to www in the afternoon, and edit your agenda to reflect your choices. Several HealthHints newsletters are referenced

266

ETH Sustainability Educating Change Agents for  

E-Print Network [OSTI]

to "walk the path" + for ETH Zurich #12;VPPR SSHE Unit integration of all three pillars of conceptualETH Sustainability Educating Change Agents for Sustainability The ETH Sustainability Summer School for Sustainability» first results: summer schools 2009-2012 lessons learned 2ETH Sustainability content #12;VPPR

Richner, Heinz

267

BEHAVIORAL BUILDING BLOCKS FOR AUTONOMOUS AGENTS  

E-Print Network [OSTI]

BEHAVIORAL BUILDING BLOCKS FOR AUTONOMOUS AGENTS: DESCRIPTION, IDENTIFICATION, AND LEARNING of Computer Science #12;c Copyright by ?zgür imek 2008 All Rights Reserved #12;BEHAVIORAL BUILDING BLOCKS Mahadevan, Member Andrea R. Nahmod, Member Andrew G. Barto, Department Chair Department of Computer Science

Massachusetts at Amherst, University of

268

Imaging agent and method of use  

DOE Patents [OSTI]

A new radiopharmaceutical composition for use in nuclear medicine comprises a radioiodinated meta-iodobenzylguanidine. The composition is used as an imaging agent for the heart, adrenal medulla, and tumors of the adrenal medulla and can be used for treatment of tumors of the adrenal medulla. No Drawings

Wieland, D.M.; Brown, L.E.; Beierwaltes, W.H.; Wu, J.L.

1986-04-22T23:59:59.000Z

269

Imaging agent and method of use  

DOE Patents [OSTI]

A new radiopharmaceutical composition for use in nuclear medicine comprises a radioiodinated meta-iodobenzylguanidine. The composition is used as an imaging agent for the heart, adrenal medulla, and tumors of the adrenal medulla and can be used for treatment of tumors of the adrenal medulla.

Wieland, Donald M. (1204 Linwood, Ann Arbor, MI 48103); Brown, Lawrence E. (523 Thomas St., Ypsilanti, MI 48197); Beierwaltes, William H. (1025 Forest Rd., Ann Arbor, MI 48105); Wu, Jiann-long (2672 Velvet Way, Walnut Creek, CA 94596)

1986-04-22T23:59:59.000Z

270

The Mechanism of Action of Alkylating Agents  

Science Journals Connector (OSTI)

...agents. With regard to Sn2 reactors it was possible...correlate the reactivity of the Sn2 and Sn1 reactors with their...the likelihood of their reaction with the various cellular...CHART 4. "Mechanism of Sn2 reaction In second-order nucleophiic...

G. P. Warwick

1963-09-01T23:59:59.000Z

271

Empathic agents to reduce user frustration: The effects of varying agent characteristics  

Science Journals Connector (OSTI)

......affective agent exhibiting the same active listening/empathic approach could reduce user...affective feedback including active listening) is a technique derived from human-human...1999. Expression glasses: a wearable device for facial expression recognition. Proceedings......

Kate Hone

2006-03-01T23:59:59.000Z

272

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

26, 2013 26, 2013 V-227: VMware Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root Privileges VMware Workstation and Player contain a vulnerability in the handling of the vmware-mount command August 24, 2013 V-226: HP StoreOnce D2D Backup Systems Denial of Service Vulnerability A vulnerability has been reported in HP StoreOnce D2D Backup Systems. August 23, 2013 V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service A vulnerability was reported in McAfee Email Gateway. August 22, 2013 V-224: Google Chrome Multiple Vulnerabilities Multiple vulnerabilities have been reported in Google Chrome. August 21, 2013 V-223: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts A remote user can make unlimited login attempts

273

Microsoft Word - SMail_Secure_Web-Based_Email_v3 _2_.doc  

Broader source: Energy.gov (indexed) [DOE]

HQ OCIO Instructions for Using Secure Email (SMail) via HQ OCIO Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Version 4 April 2010 Office of the Associate CIO for IT Support Services United States Department of Energy DOE HQ OCIO Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Requirements SMail: 1. An Energy IT Services (EITS) provided Exchange email account. 1 2. An EITS provided RSA SecureID Token with an active account in the EITS-managed RSA Authentication Server. 2 3. Appropriate access granted Active Directory group membership. 3 4. DOEnet or Internet access and a supported web browser. Login Procedure for SMail:

274

Fluorescently Detectable Magnetic Resonance Imaging Agents  

Science Journals Connector (OSTI)

Images acquired of single cells after injection with these bifunctional agents enabled us to follow the relative motions and reorganizations of different cell layers during amphibian gastrulation and neurulation in Xenopus laevis embryos. ... Approximately 10 nL of a buffered aqueous solution containing each compound at a known concentration was injected into the animal pole of one cell in a two-cell embryo. ... These molecules were designed to be used for embryonic cell lineage analyses. ...

Martina M. Hber; Andrea B. Staubli; Karen Kustedjo; Mike H. B. Gray; John Shih; Scott E. Fraser; Russell E. Jacobs; Thomas J. Meade

1998-02-27T23:59:59.000Z

275

Separation of concerns in hybrid component and agent systems  

Science Journals Connector (OSTI)

This paper discusses the Socially Situated Agent Architecture (SoSAA) a complete construction methodology that leverages existing well-established research and associated methodologies and frameworks in both the agent-oriented ...

Mauro Dragone; Howell Jordan; David Lillis; Rem W. Collier

2011-02-01T23:59:59.000Z

276

Adaptation and specialization for high performance mobile agents  

Science Journals Connector (OSTI)

Mobile agents as a new design paradigm for distributed computing potentially permit network applications to operate across dynamic and heterogeneous systems and networks. Agent computing, however, is subject to inefficiencies. Namely, due to the heterogeneous ...

Dong Zhou; Karsten Schwan

1999-05-01T23:59:59.000Z

277

Controlling individual agents in high-density crowd simulation  

Science Journals Connector (OSTI)

Simulating the motion of realistic, large, dense crowds of autonomous agents is still a challenge for the computer graphics community. Typical approaches either resemble particle simulations (where agents lack orientation controls) or are conservative ...

N. Pelechano; J. M. Allbeck; N. I. Badler

2007-08-01T23:59:59.000Z

278

A router agent for capacity assessment in packet video  

E-Print Network [OSTI]

available multicast bandwidth on the subnet and reports this information to receivers upon request. Prior to joining the enhancement layer, the receiver checks with the agent and video source to ensure that sufficient bandwidth is available. The agent...

Woodings, Mark Alexander

2012-06-07T23:59:59.000Z

279

Towards Efficient and Reliable Agent Communication in Wireless Environments  

Science Journals Connector (OSTI)

We discuss agent communication in wireless environment according to FIPA's communication model, which can be seen as a communication stack. From the stack, we focus on the message transport protocols, message envelope layer and agent communication language ...

Heikki Helin; Mikko Laukkanen

2001-09-01T23:59:59.000Z

280

Intelligent terrain avoidance agent for General Aviation Free Flight  

E-Print Network [OSTI]

the pilot handle this responsibility, a hierarchical agent system is under development. This system will take information from traffic, weather, and terrain to determine a safe and efficient flight path. The terrain agent in this system must avoid Controlled...

Gesting, Paul

2013-02-22T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

A generic model of cognitive agent to develop open systems  

Science Journals Connector (OSTI)

The paper presents an approach to building multi-agent systems. We are interested in complex agents able to reason about their tasks, and to display a proactive behavior, when installed on a network of heterog...

E. E. Scalabrin; L. Vandenberghe; H. de Azevedo

1996-01-01T23:59:59.000Z

282

Chemical kinetics of cetane number improving agents  

SciTech Connect (OSTI)

The increasing demand for diesel fuels has resulted in the use of greater percentage of cracked distillates having poor ignition properties. The ignition properties of diesel fuels can be rated in terms of their cetane number and diesel fuels having low cetane number may have poor ignition properties such as diesel knock, difficulties to start engines in the cold weather and so on. Such diesel fuels need cetane number improving agents. In the 1940s and 1950s alkyl nitrates, alkyl nitrites and organic peroxides were found to be effective cetane number improving additives. Our recent study suggests that free radicals produced from thermal decomposition just before ignition should have an important role to improve their ignition properties. However no studies on the reaction mechanism for improving effect of these additives have been attempted because of complex nature of spontaneous ignition reaction of hydrocarbons. In order to clarify the reaction mechanism for improving effects of cetane number improving agents. We here have attempted to simulate the spontaneous ignition of n-butane as a model compound in the presence of alkyl nitrites as cetane number improving agents.

Hashimoto, K.; Akutsu, Y.; Arai, M.; Tamura, M. [Univ. of Tokyo (Japan)

1996-12-31T23:59:59.000Z

283

SoSAA: a framework for integrating components & agents  

Science Journals Connector (OSTI)

Modern computing systems require powerful software frameworks to ease their development and manage their complexity. These issues are addressed within both Component-Based Software Engineering and Agent-Oriented Software Engineering, although few integrated ... Keywords: agent oriented software engineering, agent programming toolkit, component based software engineering, component framework

Mauro Dragone; David Lillis; Rem Collier; G. M. P. O'Hare

2009-03-01T23:59:59.000Z

284

Mobile Agents: Ten Reasons For Failure Giovanni Vigna  

E-Print Network [OSTI]

Mobile Agents: Ten Reasons For Failure Giovanni Vigna Reliable Software Group Department of Computer Science University of California, Santa Barbara vigna@cs.ucsb.edu Abstract Mobile agents have applications in a dynamic environment. Mobile agents pro- vide a very appealing, intuitive, and apparently

California at Santa Barbara, University of

285

Mobile agents for e-commerce Roll No. : 99329011  

E-Print Network [OSTI]

Mobile agents for e-commerce By Rahul Jha Roll No. : 99329011 Guided By Prof. Sridhar Iyer KR years, mobile agent (MA) paradigm has received a great deal of attention. While MAs have generated the effectiveness of mobile agents versus traditional approaches. This project contributes towards

Iyer, Sridhar

286

Infectious disease agents mediate interaction in food webs and ecosystems  

Science Journals Connector (OSTI)

...disease agents mediate interaction in food webs and ecosystems Sanja Selakovic 1 Peter...Netherlands Infectious agents are part of food webs and ecosystems via the relationship with...interactions, infectious agents influence food webs in terms of structure, functioning and...

2014-01-01T23:59:59.000Z

287

Building and Selecting Mobile Agents for Network Management  

Science Journals Connector (OSTI)

This paper presents a framework for reusable mobile agents for network management in the sense that they are independent of either particular networks or applications. The framework enables a mobile agent to be composed from two layered components, which ... Keywords: Network management, formal specification, mobile agent, process algebra, separation of concerns

Ichiro Satoh

2006-03-01T23:59:59.000Z

288

Contract-related Agents John Knottenbelt and Keith Clark  

E-Print Network [OSTI]

Contract-related Agents John Knottenbelt and Keith Clark Dept of Computing, Imperial College London the monitoring and execution of contract terms and conditions. We use the event calculus to deduce current- tracts, the agent is able to select which of its contracts with other agents are relevant to solving its

Clark, Keith L.

289

Enhancing Autonomous Agents Evolution with Learning by Imitation Elhanan Borenstein  

E-Print Network [OSTI]

Enhancing Autonomous Agents Evolution with Learning by Imitation Elhanan Borenstein School@post.tau.ac.il Abstract This paper presents a new mechanism to enhance the evolutionary process of autonomous agents of autonomous agents, when other forms of learning are not possible. 1 Introduction A large body of work

Borenstein, Elhanan

290

Privacy management in user-centred multi-agent systems  

Science Journals Connector (OSTI)

In all user-centred agent-based applications, for instance in the context of ambient computing, the user agent is often faced to a difficult trade-off between the protection of its own privacy, and the fluidity offered by the services. In existing applications, ... Keywords: personal agents, privacy, trusted computing, user-centring

Guillaume Piolle; Yves Demazeau; Jean Caelen

2006-09-01T23:59:59.000Z

291

Web Service Access Management for Integration with Agent Systems  

E-Print Network [OSTI]

Web Service Access Management for Integration with Agent Systems B.J. Overeinder, P.D. Verkaik, from the perspective of agent systems (and not as is gen- erally the case by web service providers). Mediating between web service requests from (virtual) organizations of agents, the web ser- vice gateway

292

A multi-agent model of several economic regions  

Science Journals Connector (OSTI)

This paper presents Lagom regiO: a multi-agent model of several growing economic areas in interaction. The model is part of the Lagom model family: economic multi-agent models developed to make steps toward understanding equilibrium selection and identifying ... Keywords: Economic regions, Emissions, Growing economy, Multi-agent model

Sarah Wolf; Steffen FRst; Antoine Mandel; Wiebke Lass; Daniel Lincke; Federico Pablo-Mart; Carlo Jaeger

2013-06-01T23:59:59.000Z

293

Page not found | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

71 - 1880 of 28,905 results. 71 - 1880 of 28,905 results. Download EA-1388: Final Environmental Assessment Ground Water Compliance at the Shiprock Uranium Mill Tailings Site http://energy.gov/nepa/downloads/ea-1388-final-environmental-assessment Download Document Management & Control System (DMCS) http://energy.gov/cio/downloads/document-management-control-system-dmcs Article U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. http://energy.gov/cio/articles/u-129-rsa-envision-bugs-permit-cross-site-scripting-sql-injection-and-directory

294

E-Print Network 3.0 - agent based classification Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Su-Chong Joo... of software architecture supporting for healthcare context information service platform based on multi agent... of multi agent software platform and multi agent ......

295

Evolutionary game theory using agent-based methods  

E-Print Network [OSTI]

Evolutionary game theory is a successful mathematical framework geared towards understanding the selective pressures that affect the evolution of the strategies of agents engaged in interactions with potential conflicts. While a mathematical treatment of the costs and benefits of decisions can predict the optimal strategy in simple settings, more realistic situations (finite populations, non-vanishing mutations rates, communication between agents, and spatial interactions) require agent-based methods where each agent is modeled as an individual, carries its own genes that determine its decisions, and where the evolutionary outcome can only be ascertained by evolving the population of agents forward in time. Here we discuss the use of agent-based methods in evolutionary game theory and contrast standard results to those obtainable by a mathematical treatment. We conclude that agent-based methods can predict evolutionary outcomes where purely mathematical treatments cannot tread, but that mathematics is crucial...

Adami, Christoph; Hintze, Arend

2014-01-01T23:59:59.000Z

296

Designed TPR Modules as Novel Anticancer Agents  

SciTech Connect (OSTI)

Molecules specifically designed to modulate protein-protein interactions have tremendous potential as novel therapeutic agents. One important anticancer target is the chaperone Hsp90, whose activity is essential for the folding of many oncogenic proteins, including HER2, IGFIR, AKT, RAF-1, and FLT-3. Here we report the design and characterization of new tetratricopeptide repeat modules, which bind to the C-terminus of Hsp90 with higher affinity and with greater specificity than natural Hsp90-binding co-chaperones. Thus, when these modules are introduced into the cell, they out-compete endogenous co-chaperones for binding, thereby inhibiting Hsp90 function. The effect of Hsp90 inhibition in this fashion is dramatic; HER2 levels are substantially decreased and BT474 HER2 positive breast cancer cells are killed. Our designs thus provide new tools with which to dissect the mechanism of Hsp90-mediated protein folding and also open the door to the development of an entirely new class of anticancer agents.

Cortajarena,A.; Yi, F.; Regan, L.

2008-01-01T23:59:59.000Z

297

E-Print Network 3.0 - agent-a feasibility research Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Its contract... agent a2 that agent a1 could damage its resources: should agent a2 grant agent ... Source: van der Torre, Leon - Computer Science and Communications Research...

298

Distributed coordination of autonomous agents by communicating on a need-to-know basis  

E-Print Network [OSTI]

Intelligent autonomous agents working cooperatively accomplish tasks more efficiently than single agents, as well as tasks that were infeasible for the single agent. For example, a single agent transporting a ton of blocks ...

Chen, Judy Y. (Judy Yann-Yun), 1980-

2004-01-01T23:59:59.000Z

299

Mnemonic Structure and Sociality: A Computational Agent-Based Simulation Model  

E-Print Network [OSTI]

Mnemonic Structure and Sociality: A Computational Agent-Based Simulation Model Claudio Cioffi-agent social simulation models are designed with agents lacking explicit internal information transformations affect human and social dynamics? Most computational multi-agent social simulation models

George Mason University

300

E-Print Network 3.0 - agent structure characterization Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

on Web Intelligence Intelligent Agent Technology, Summary: -configurable architecture is based on hierarchical architecture, and characterized with mediator agents and...

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Commercial Buildings Sector Agent-Based Model | Open Energy Information  

Open Energy Info (EERE)

Commercial Buildings Sector Agent-Based Model Commercial Buildings Sector Agent-Based Model Jump to: navigation, search Tool Summary Name: Commercial Buildings Sector Agent-Based Model Agency/Company /Organization: Argonne National Laboratory Sector: Energy Focus Area: Buildings - Commercial Phase: Evaluate Options Topics: Implementation Resource Type: Technical report User Interface: Website Website: web.anl.gov/renewables/research/building_agent_based_model.html OpenEI Keyword(s): EERE tool, Commercial Buildings Sector Agent-Based Model Language: English References: Building Efficiency: Development of an Agent-based Model of the US Commercial Buildings Sector[1] Model the market-participants, dynamics, and constraints-help decide whether to adopt energy-efficient technologies to meet commercial building

302

Manipulating decision making of typical agents  

E-Print Network [OSTI]

We investigate how the choice of decision makers can be varied under the presence of risk and uncertainty. Our analysis is based on the approach we have previously applied to individual decision makers, which we now generalize to the case of decision makers that are members of a society. The approach employs the mathematical techniques that are common in quantum theory, justifying our naming as Quantum Decision Theory. However, we do not assume that decision makers are quantum objects. The techniques of quantum theory are needed only for defining the prospect probabilities taking into account such hidden variables as behavioral biases and other subconscious feelings. The approach describes an agent's choice as a probabilistic event occurring with a probability that is the sum of a utility factor and of an attraction factor. The attraction factor embodies subjective and unconscious dimensions in the mind of the decision maker. We show that the typical aggregate amplitude of the attraction factor is $1/4$, and ...

Yukalov, V I

2014-01-01T23:59:59.000Z

303

1 Conversational Agents 1 1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1  

E-Print Network [OSTI]

Contents 1 Conversational Agents 1 1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.3 Technical Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.3.1 Natural

Lester, James C.

304

ORISE: Agents of Opportunity for Terrorism Continuing Medical...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Agents of Opportunity for Terrorism On-line CME Course on Toxic Radiological Materials, Toxic Industrial Chemicals, and Toxic Industrial Materials Dates Scheduled Available 247...

305

Agent-based method for distributed clustering of textual information  

DOE Patents [OSTI]

A computer method and system for storing, retrieving and displaying information has a multiplexing agent (20) that calculates a new document vector (25) for a new document (21) to be added to the system and transmits the new document vector (25) to master cluster agents (22) and cluster agents (23) for evaluation. These agents (22, 23) perform the evaluation and return values upstream to the multiplexing agent (20) based on the similarity of the document to documents stored under their control. The multiplexing agent (20) then sends the document (21) and the document vector (25) to the master cluster agent (22), which then forwards it to a cluster agent (23) or creates a new cluster agent (23) to manage the document (21). The system also searches for stored documents according to a search query having at least one term and identifying the documents found in the search, and displays the documents in a clustering display (80) of similarity so as to indicate similarity of the documents to each other.

Potok, Thomas E. (Oak Ridge, TN) [Oak Ridge, TN; Reed, Joel W. (Knoxville, TN) [Knoxville, TN; Elmore, Mark T. (Oak Ridge, TN) [Oak Ridge, TN; Treadwell, Jim N. (Louisville, TN) [Louisville, TN

2010-09-28T23:59:59.000Z

306

E-Print Network 3.0 - antimycobacterial agent tetrahydrolipstatin...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

biosynthesis evaluated by activity-based protein profiling Summary: by two small-molecule agents, RHC80267 and tetrahydrolipstatin (THL)2,4 (Fig. 1), which have been...

307

ARM - Central Authentication Service  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

History History Organization Participants Facility Statistics Forms Contacts Research Themes Research Highlights Journal Articles Collaborations Atmospheric System Research (ASR) Propose a Campaign Submitting Proposals: Guidelines Featured Campaigns Campaign Data List of Campaigns Aerial Facility Mobile Facilities North Slope of Alaska Southern Great Plains Tropical Western Pacific Eastern North Atlantic Location Table Contacts Instrument Datastreams Value-Added Products PI Data Products Field Campaign Data Related Data Data Plots Data Policy Data Documentation Data Gathering and Delivery Data Quality Data Tools Data Archive Data Management Facility External Data Center Features and Releases Facility News Blogs: Air Time & Field Notes Meetings and Events Employment Research Highlights Data Announcements

308

Coding AuthentiCity  

E-Print Network [OSTI]

This thesis analyzes the impact of form-based codes, focusing on two research questions: (1) What is the underlying motivation for adopting a form-based code? (2) What motivations have the most significant impact on ...

Mercier, Rachel Havens

2008-01-01T23:59:59.000Z

309

Validating agent based models through virtual worlds.  

SciTech Connect (OSTI)

As the US continues its vigilance against distributed, embedded threats, understanding the political and social structure of these groups becomes paramount for predicting and dis- rupting their attacks. Agent-based models (ABMs) serve as a powerful tool to study these groups. While the popularity of social network tools (e.g., Facebook, Twitter) has provided extensive communication data, there is a lack of ne-grained behavioral data with which to inform and validate existing ABMs. Virtual worlds, in particular massively multiplayer online games (MMOG), where large numbers of people interact within a complex environ- ment for long periods of time provide an alternative source of data. These environments provide a rich social environment where players engage in a variety of activities observed between real-world groups: collaborating and/or competing with other groups, conducting battles for scarce resources, and trading in a market economy. Strategies employed by player groups surprisingly re ect those seen in present-day con icts, where players use diplomacy or espionage as their means for accomplishing their goals. In this project, we propose to address the need for ne-grained behavioral data by acquiring and analyzing game data a commercial MMOG, referred to within this report as Game X. The goals of this research were: (1) devising toolsets for analyzing virtual world data to better inform the rules that govern a social ABM and (2) exploring how virtual worlds could serve as a source of data to validate ABMs established for analogous real-world phenomena. During this research, we studied certain patterns of group behavior to compliment social modeling e orts where a signi cant lack of detailed examples of observed phenomena exists. This report outlines our work examining group behaviors that underly what we have termed the Expression-To-Action (E2A) problem: determining the changes in social contact that lead individuals/groups to engage in a particular behavior. Results from our work indicate that virtual worlds have the potential for serving as a proxy in allocating and populating behaviors that would be used within further agent-based modeling studies.

Lakkaraju, Kiran; Whetzel, Jonathan H.; Lee, Jina [Sandia National Laboratories, Livermore, CA] [Sandia National Laboratories, Livermore, CA; Bier, Asmeret Brooke; Cardona-Rivera, Rogelio E. [North Carolina State University, Raleigh, NC] [North Carolina State University, Raleigh, NC; Bernstein, Jeremy Ray Rhythm [Gaikai, Inc., Aliso Viejo, CA] [Gaikai, Inc., Aliso Viejo, CA

2014-01-01T23:59:59.000Z

310

Cancer Treatment Using Multiple Chemotheraputic Agents Subject to Drug Resistance  

E-Print Network [OSTI]

Cancer Treatment Using Multiple Chemotheraputic Agents Subject to Drug Resistance J. J. Westman-7045 USA Abstract A compartment model for the evolution of cancer subject to multiple chemotherapeutic agents is presented. The formulation accounts for the heterogeneous nature of cancer and drug resistance

Hanson, Floyd B.

311

USING INTELLIGENT AGENTS TO UNDERSTAND MANAGEMENT PRACTICES AND RETAIL PRODUCTIVITY  

E-Print Network [OSTI]

USING INTELLIGENT AGENTS TO UNDERSTAND MANAGEMENT PRACTICES AND RETAIL PRODUCTIVITY Peer. In this paper we apply agent-based modeling and simulation to investigate a set of problems in a retail context and retail productivity. Despite the fact we are working within a relatively novel and complex domain

Aickelin, Uwe

312

Coordination Assistance for Mixed Human and Computational Agent Systems 1  

E-Print Network [OSTI]

will discuss the design of a set of distributed autonomous computer programs (``agents'') that assist peopleCoordination Assistance for Mixed Human and Computational Agent Systems 1 Keith S. Decker Commander) and his staff (intelligence, operations, logistics, weather, etc.). As the human planner makes

Massachusetts at Amherst, University of

313

Coordination Assistance for Mixed Human and Computational Agent Systems 1  

E-Print Network [OSTI]

will discuss the design of a set of distributed autonomous computer programs ("agents") that assist peopleCoordination Assistance for Mixed Human and Computational Agent Systems 1 Keith S. Decker Commander) and his staff (intelligence, operations, logistics, weather, etc.). As the human planner makes

Massachusetts at Amherst, University of

314

An agent-based approach to component management  

Science Journals Connector (OSTI)

This paper details the implementation of a software framework that aids the development of distributed and self-configurable software systems. This framework is an instance of a novel integration strategy called SoSAA (SOcially Situated Agent Architecture), ... Keywords: agent-oriented software engineering, distributed systems, methodologies

David Lillis; Rem Collier; Mauro Dragone; G. M. P. O'Hare

2009-05-01T23:59:59.000Z

315

Understanding Dynamic Pricing Agents Joan Morris, Pattie Maes  

E-Print Network [OSTI]

Curve market simulator, a tool for evaluating dynamic agent pricing strategies in a simulated-world marketplaces. Towards this goal, the simulator represents sellers using different agent strategies and buyers." While models and practices exist today for setting optimal prices, such as in the travel industry

316

Wood-Fiber/High-Density-Polyethylene Composites: Coupling Agent Performance  

E-Print Network [OSTI]

Wood-Fiber/High-Density-Polyethylene Composites: Coupling Agent Performance John Z. Lu,1 Qinglin Wu structure. As a coupling agent, mal- eated polyethylene (MAPE) had a better performance in WPC than oxidized polyethylene (OPE) and pure polyeth- ylene (PPE) because of its stronger interfacial bonding. A combination

317

Role-based and agent-oriented teamwork modeling  

E-Print Network [OSTI]

needs and proactively exchange information with them. Through RoB-PHB, agents can identify other agents?? help needs and proactively initialize actions to help them. Our experiments have shown that RoB-MALLET is flexible in specifying reusable plans, Ro...

Cao, Sen

2005-11-01T23:59:59.000Z

318

The Task Agent Resource Function application in UAV domain  

E-Print Network [OSTI]

The Task Agent Resource Function application in UAV domain Tan Viet Anh Truong Ecole National is to present an application of TARF (Task Agent Resource Function) in UAV domain. This TARF is used to optimize of a generic mission planner for cross domain such as UAV, maritime, automotive and manned aerial vehicle (MAV

Paris-Sud XI, Université de

319

Real-time control of individual agents for crowd simulation  

Science Journals Connector (OSTI)

This paper presents a novel approach for individual agent's motion simulation in real-time virtual environments. In our model, we focus on addressing two problems: 1) the control model for local motions. We propose to represent a combination of psychological ... Keywords: Crowd simulation, Individual agents controlling, Path planning, Virtual environments

Yunbo Rao; Leiting Chen; Qihe Liu; Weiyao Lin; Yanmei Li; Jun Zhou

2011-08-01T23:59:59.000Z

320

Minimum cost spanning tree problems with indierent agents Christian Trudeau  

E-Print Network [OSTI]

Minimum cost spanning tree problems with indi¤erent agents Christian Trudeau Economics Department, University of Windsor November 5, 2013 Abstract We consider an extension of minimum cost spanning tree (mcst) problems where some agents do not need to be connected to the source, but might reduce the cost of others

Virginia Tech

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Relational Agents for mHealth & Mental Health  

E-Print Network [OSTI]

Relational Agents for mHealth & Mental Health Interventions Timothy Bickmore, PhD College of Computer and Information Science Northeastern University #12;#12;Relational Agents #12;Motivation: Rapid higher (approaching significance) on credibility of health information and comfort using in the workplace

322

The engineering of micro agents in smart environments  

Science Journals Connector (OSTI)

Agent concepts are natural to describe intelligent and adaptive systems in a distributed and collaborative scenario. In this paper we outline the different aspects we have considered in order to build a tool for supporting developers to handle the complexity ... Keywords: Smart homes, control systems, domotics, home automation, home sapiens, micro agents, wireless sensor networks, zigbee

Caio Augustus Morais Bolzani; Marcio Lobo Netto

2009-01-01T23:59:59.000Z

323

Intelligent Mobile Agents for Information Retrieval and Knowledge Discovery from  

E-Print Network [OSTI]

or software agents for intelligent, selective, and context­sensitive data gathering and data assimilation assimilation, and knowl­ edge discovery using heterogeneous, distributed data and knowledge sources. (See [1Intelligent Mobile Agents for Information Retrieval and Knowledge Discovery from Distributed Data

Honavar, Vasant

324

Activity Prediction for Agent-based Home Energy Management  

E-Print Network [OSTI]

, the main chal- lenge is to predict the energy consumption activities of home- owners, so that the agent canActivity Prediction for Agent-based Home Energy Management Ngoc Cuong Truong, Long Tran on real­world data from a prominent database of home energy usage. We also show that the computational

Southampton, University of

325

Utility theory front to back inferring utility from agents' choices  

E-Print Network [OSTI]

Utility theory front to back ­ inferring utility from agents' choices A. M. G. Cox Dept to utility theory and consumption & investment problems. Instead of specifying an agent's utility function) and ask if it is possible to derive a utility function for which the observed behaviour is optimal. We

326

Virtual university-oriented cooperative mobile agent middleware  

Science Journals Connector (OSTI)

The autonomy, cooperativity, intelligence and mobility of mobile agents make them overcome the weakness of the traditional distributed computation mode of C/S and B/S, and bring new innovative solutions to the collaborative teaching, collaborative learning and collaborative management in virtual universities. However, nowadays most of the research in mobile agent technology in terms of the Virtual University is mostly focused on a certain application for some particular users. As a result, these researches do not provide an effective control mechanism for the universal management of multiapplication agents that work for the multiusers with multicharacters. This has prevented the implementation and promulgation of agent technology in virtual universities. As far as such insufficiency is concerned, this paper demonstrates its own solution. In this paper, a Virtual University-Oriented cooperative Mobile Agent Middleware (VUMAM) and a Virtual University framework based on VUMAM are designed. In addition, the paper discusses the assignment of agent characters and function, agent naming, the control mechanism of cooperative agents and the extendability of VUMAM.

Wenqing Peng; Yuanming Luo

2006-01-01T23:59:59.000Z

327

Multi-Agent Simulation of Protein Folding Luca Bortolussi1  

E-Print Network [OSTI]

Multi-Agent Simulation of Protein Folding Luca Bortolussi1 , Agostino Dovier1 , and Federico residues) is known. The process for reaching this state is known as the protein fold- ing. This problem the feasibility and the power of the method. Keywords: Computational Biology, Agent-Based Technologies, Protein

Bortolussi, Luca

328

DESIGNING AN ECOLOGY OF DISTRIBUTED AGENTS Nelson Minar  

E-Print Network [OSTI]

DESIGNING AN ECOLOGY OF DISTRIBUTED AGENTS by Nelson Minar B.A. Mathematics (1994) Reed College, Departmental Committee on Graduate Students Program in Media Arts and Sciences #12; #12; DESIGNING AN ECOLOGY is an organizing principle for documents. This thesis introduces the idea of an ecology of distributed agents

329

Agent based modeling of energy networks  

Science Journals Connector (OSTI)

Abstract Attempts to model any present or future power grid face a huge challenge because a power grid is a complex system, with feedback and multi-agent behaviors, integrated by generation, distribution, storage and consumption systems, using various control and automation computing systems to manage electricity flows. Our approach to modeling is to build upon an established model of the low voltage electricity network which is tested and proven, by extending it to a generalized energy model. But, in order to address the crucial issues of energy efficiency, additional processes like energy conversion and storage, and further energy carriers, such as gas, heat, etc., besides the traditional electrical one, must be considered. Therefore a more powerful model, provided with enhanced nodes or conversion points, able to deal with multidimensional flows, is being required. This article addresses the issue of modeling a local multi-carrier energy network. This problem can be considered as an extension of modeling a low voltage distribution network located at some urban or rural geographic area. But instead of using an external power flow analysis package to do the power flow calculations, as used in electric networks, in this work we integrate a multiagent algorithm to perform the task, in a concurrent way to the other simulation tasks, and not only for the electric fluid but also for a number of additional energy carriers. As the model is mainly focused in system operation, generation and load models are not developed.

Jos Mara Gonzalez de Durana; Oscar Barambones; Enrique Kremers; Liz Varga

2014-01-01T23:59:59.000Z

330

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

31, 2011 31, 2011 T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. August 30, 2011 T-706: Microsoft Fraudulent Digital Certificate Issued by DigiNotar Fraudulent Digital Certificate Issued by DigiNotar, a Certification Authority Present in the Trusted Root Certification Authorities August 30, 2011 T-705: Linux Kernel Weakness in Sequence Number Generation Facilitates Packet Injection Attacks Linux Kernel Weakness in Sequence Number Generation Facilitates Packet Injection Attacks. August 29, 2011 T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password RSA enVision lets remote users view files and remote authenticated users

331

Comparing Elliptic Curve Cryptography and RSA on 8-Bit CPUs  

E-Print Network [OSTI]

.Patel,Arvinderpal.Wander,Hans.Eberle, Sheueling.Chang}@sun.com http://www.research.sun.com/projects/crypto Abstract. Strong public

Han, Richard Y.

332

Modeling Mobile Agent Systems with High Level Petri Nets Dianxiang Xu and Yi Deng  

E-Print Network [OSTI]

Modeling Mobile Agent Systems with High Level Petri Nets Dianxiang Xu and Yi Deng School-based approach for architectural modeling of mobile agent systems. Agent template (net) is proposed to model as a component, consisting of mobility environment (system net), agent templates (agent nets), and internal

333

Artificial neural network ensemble approach for creating a negotiation model with ethical artificial agents  

Science Journals Connector (OSTI)

Negotiation is one of the most prevalent methods that agents, in a multi-agent system, use to reach agreements. Nowadays, one important aspect of negotiation is moral behaviors of agents that involve in negotiation. For this reason, we propose an ethical ... Keywords: artificial neural network, artificial neural networks ensemble, ensemble method, ethical agent, ethical reasoning, intelligent agent, negotiation

Banafsheh Rekabdar; Mahmood Joorabian; Bita Shadgar

2012-04-01T23:59:59.000Z

334

Manipulating decision making of typical agents  

E-Print Network [OSTI]

We investigate how the choice of decision makers can be varied under the presence of risk and uncertainty. Our analysis is based on the approach we have previously applied to individual decision makers, which we now generalize to the case of decision makers that are members of a society. The approach employs the mathematical techniques that are common in quantum theory, justifying our naming as Quantum Decision Theory. However, we do not assume that decision makers are quantum objects. The techniques of quantum theory are needed only for defining the prospect probabilities taking into account such hidden variables as behavioral biases and other subconscious feelings. The approach describes an agent's choice as a probabilistic event occurring with a probability that is the sum of a utility factor and of an attraction factor. The attraction factor embodies subjective and unconscious dimensions in the mind of the decision maker. We show that the typical aggregate amplitude of the attraction factor is $1/4$, and it can be either positive or negative depending on the relative attraction of the competing choices. The most efficient way of varying the decision makers choice is realized by influencing the attraction factor. This can be done in two ways. One method is to arrange in a special manner the payoff weights, which induces the required changes of the values of attraction factors. We show that a slight variation of the payoff weights can invert the sign of the attraction factors and reverse the decision preferences, even when the prospect utilities remain unchanged. The second method of influencing the decision makers choice is by providing information to decision makers. The methods of influencing decision making are illustrated by several experiments, whose outcomes are compared quantitatively with the predictions of our approach.

V. I. Yukalov; D. Sornette

2014-09-02T23:59:59.000Z

335

Instructions for Using Secure Email via Outlook Web Access | Department of  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Secure Email via Outlook Web Access Secure Email via Outlook Web Access Instructions for Using Secure Email via Outlook Web Access Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. Secure Email Requirements: An EITS provided Exchange email account An EITS provided RSA SecureID Token with an active account in the EITS-managed RSA Authentication Server Appropriate access granted Active Directory group membership DOEnet or Internet access and a supported web browser Secure Email Login Procedure: Enter https://smail.doe.gov/ in the address field of your Internet browser. The Outlook Web Access window appears. When using an RSA SecurID hardware token: Enter your user name in the User name field. Enter your password, which is your RSA token PIN plus the number

336

JC3 High Impact Assessment Bulletins | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

10, 2011 10, 2011 T-644: Prenotification Security Advisory - Adobe Acrobat & Adobe Readers Updates A prenotification Security Advisory has been posted in regards to the upcoming quarterly Adobe Reader and Acrobat updates scheduled for Tuesday, June 14, 2011. The updates will address critical security issues in the products. June 9, 2011 T-643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability A vulnerability has been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system. June 9, 2011 T-642: RSA SecurID update to Customers RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products

337

Agents, Believabilityand Embodiment in Advanced Learning Environments Introduction to a Panel Discussion  

E-Print Network [OSTI]

Agents, Believabilityand Embodiment in Advanced Learning Environments Introduction to a Panel to ediicatiorial or en- tertuinnierit systenis, iriterjiaces to professional environ- merits, etc., where cin the issues that underlie the introduction of embodied agents in learning environments. Embodied agents appear

Nijholt, Anton

338

Artificial Neural Network Ensemble Approach for Creating a Negotiation Model with Ethical Artificial Agents  

Science Journals Connector (OSTI)

Negotiation is one of the most prevalent methods that agents, in a multi-agent system, use to reach agreements. Nowadays, one important aspect of negotiation is moral behaviors of agents that involve in negotiati...

Banafsheh Rekabdar; Mahmood Joorabian

2012-01-01T23:59:59.000Z

339

E-Print Network 3.0 - agents pending fda Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

already FDA-approved, as a biocidal agent... been used for over 40 years as an antisep- tic agent in oral care. Interest in CPC as a biocide has... , against bioterror agents. In...

340

A practical method for proactive information exchange within multi-agent teams  

E-Print Network [OSTI]

. This algorithm transforms a team plan into an individual plan by inserting coomunicative tasks in agents' individual plans to deliver information to those agents who need it. We will incorporate a previously developed architecture for multi-agent belief reasoning...

Rozich, Ryan Timothy

2004-11-15T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Agent-Based Modeling and Simulation for Hydrogen Transition Analysis  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Agent Agent Agent - - Based Modeling Based Modeling and Simulation (ABMS) and Simulation (ABMS) for Hydrogen Transition for Hydrogen Transition Analysis Analysis Marianne Mintz Hydrogen Transition Analysis Workshop US Department of Energy January 26, 2006 Objectives and Scope for Phase 1 2 Analyze the hydrogen infrastructure development as a complex adaptive system using an agent-based modeling and simulation (ABMS) approach Develop an ABMS model to simulate the evolution of that system, spanning the entire H2 supply chain from production to consumption Identify key factors that either promote or inhibit the growth of H2 infrastructure Apply ABMS to get new insights into transition, particularly early transition phase - Dynamic interplay between supply and demand

342

Agent Technology to Improve Building Energy Efficiency and Occupant Comfort  

E-Print Network [OSTI]

become central to building services control strategies. Achieving synergy between end users and buildings is the ultimate in intelligent comfort control. This new comfort control technology, based on use of the latest ICT development in agent technology...

Zeiler, W.; van Houten, R.; Kamphuis, R.; Hommelberg, M.

2006-01-01T23:59:59.000Z

343

Method and apparatus for enhanced detection of toxic agents  

DOE Patents [OSTI]

A biosensor based detection of toxins includes enhancing a fluorescence signal by concentrating a plurality of photosynthetic organisms in a fluid into a concentrated region using biased AC electro-osmosis. A measured photosynthetic activity of the photosynthetic organisms is obtained in the concentrated region, where chemical, biological or radiological agents reduce a nominal photosynthetic activity of the photosynthetic organisms. A presence of the chemical, biological and/or radiological agents or precursors thereof, is determined in the fluid based on the measured photosynthetic activity of the concentrated plurality of photosynthetic organisms. A lab-on-a-chip system is used for the concentrating step. The presence of agents is determined from feature vectors, obtained from processing a time dependent signal using amplitude statistics and/or time-frequency analysis, relative to a control signal. A linear discriminant method including support vector machine classification (SVM) is used to identify the agents.

Greenbaum, Elias; Rodriguez, Jr., Miguel; Wu, Jie Jayne; Qi, Hairong

2013-10-01T23:59:59.000Z

344

Robust distributed planning strategies for autonomous multi-agent teams  

E-Print Network [OSTI]

The increased use of autonomous robotic agents, such as unmanned aerial vehicles (UAVs) and ground rovers, for complex missions has motivated the development of autonomous task allocation and planning methods that ensure ...

Ponda, Sameera S

2012-01-01T23:59:59.000Z

345

Agent-Based Modeling and Simulation for Hydrogen Transition Analysis  

Broader source: Energy.gov [DOE]

Presentation on Agent-Based Modeling and Simulation for Hydrogen Transition Analysis given by Marianne Mintz of ANL during the DOE Hydrogen Transition Analysis Workshop on January 26, 2006.

346

Evolving Protocols and Agents in Multiagent Systems Scott N. Gerard  

E-Print Network [OSTI]

Evolving Protocols and Agents in Multiagent Systems Scott N. Gerard Department of Computer Science (AA- MAS 2013), Ito, Jonker, Gini, and Shehory (eds.), May, 6­10, 2013, Saint Paul, Minnesota, USA

347

Relationship between composition and performance of asphalt recycling agents  

E-Print Network [OSTI]

This research was aimed at determining the effects of recycling agent composition on the performance of recycled asphalt with aging. To accomplish this, five experiments were performed, in which blends were produced with controlled compositions...

Peterson, Gerald Dean

1993-01-01T23:59:59.000Z

348

Dynamical Analysis of Evolved Agents: A Primer Randall D. Beer  

E-Print Network [OSTI]

1 Dynamical Analysis of Evolved Agents: A Primer Randall D. Beer Cognitive Science Program School: Randall D. Beer Phone: (812) 856-0873 Cognitive Science Program Fax: (812) 855-1086 1910 E. 10th St. ­ 840

Beer, Randall D.

349

Iron oxide nanoparticles as a contrast agent for thermoacoustic tomography  

E-Print Network [OSTI]

radiation. The addition of an exogenous contrast agent improves image quality by more effectively converting microwave energy to heat. The use of iron oxide nanoparticles in MRI applications has been explored but super paramagnetic iron oxide nanoparticles...

Keho, Aaron Lopez

2009-06-02T23:59:59.000Z

350

Proliferation-dependent Cytotoxicity of Anticancer Agents: A Review  

Science Journals Connector (OSTI)

...has 2 important aspects. First is the fundamental mechanism by 2626 CANCER RESEARCH VOL...test of this possibility would be to force cells into the prolifera- tive state...tic and lmmunosuppressive Agents. Handbook of Experimental Phar- macology, Part...

Frederick Valeriote and Luke van Putten

1975-10-01T23:59:59.000Z

351

Agent Models for Self?Motivated Home?Assistant Bots  

Science Journals Connector (OSTI)

Modern society increasingly relies on technology to support everyday activities. In the past this technology has focused on automation using computer technology embedded in physical objects. More recently there is an expectation that this technology will not just embed reactive automation but also embed intelligent proactive automation in the environment. That is there is an emerging desire for novel technologies that can monitor assist inform or entertain when required and not just when requested. This paper presents three self?motivated home?assistant bot applications using different self?motivated agent models. Self?motivated agents use a computational model of motivation to generate goals proactively. Technologies based on self?motivated agents can thus respond autonomously and proactively to stimuli from their environment. Three prototypes of different self?motivated agent models using different computational models of motivation are described to demonstrate these concepts.

Kathryn Merrick; Kamran Shafi

2010-01-01T23:59:59.000Z

352

A formal semantics for agent (re)organization  

Science Journals Connector (OSTI)

......supply chain The opening of traditional monopolist markets, such of that of energy, to competition is an example of economic reforms from the last decade that have impacted large reorganizations. Agents have often been advocated for the modelling of supply......

Frank Dignum; Virginia Dignum

2014-12-01T23:59:59.000Z

353

Towards Efficient and Reliable Agent Communication in Wireless Environments  

Science Journals Connector (OSTI)

We discuss agent communication in wireless environment accordingto FIPAs communication model, which can be seen as a communication stack. From the stack, we focus on the message transport protocols, message e...

Heikki Helin; Mikko Laukkanen

2001-01-01T23:59:59.000Z

354

Adaptive Agent-Based Service Composition for Wireless Terminals  

Science Journals Connector (OSTI)

Software agents are one of the building blocks of ambient intelligence and pervasive computing. Adaptation to changes in the execution context is necessary in order to provide continuous and smooth provision o...

Sasu Tarkoma; Mikko Laukkanen

2003-01-01T23:59:59.000Z

355

Coordinated Searching and Target Identification Using Teams of Autonomous Agents  

E-Print Network [OSTI]

Coordinated Searching and Target Identification Using Teams of Autonomous Agents Christopher Lum;#12;University of Washington Abstract Coordinated Searching and Target Identification Using Teams of Autonomous & Astronautics Many modern autonomous systems actually require significant human involvement. Often, the amount

Washington at Seattle, University of

356

Optical techniques for detecting and identifying biological-warfare agents  

E-Print Network [OSTI]

Rapid and accurate detection and identification of biological agents is an objective of various national security programs. Detection in general is difficult owing to natural clutter and anticipated low concentrations of ...

Greenwood, Darryl P.

357

Application of Automation and Thermal Analysis to Resolving Agent Selection  

Science Journals Connector (OSTI)

The use of differential scanning calorimetry as a means to identify diastereoisomeric salts with a clear eutectic composition that is needed for effective resolution is described and forms the basis of a resolving agent screening process. Automated salt ...

Ulrich C. Dyer; David A. Henderson; Mark B. Mitchell

1999-03-19T23:59:59.000Z

358

Chemical Agent Induced Reduction of Skin Light Scattering  

E-Print Network [OSTI]

scattering with the potential to increase the efficacy of light based imaging and therapeutic applications. Three hypotheses have been suggested for the clearing mechanism: index of refraction matching between clearing agent and collagen, tissue dehydration...

Hirshburg, Jason M.

2011-02-22T23:59:59.000Z

359

Intelligent Collision Avoidance for Multi Agent Mobile Robots  

Science Journals Connector (OSTI)

This chapter presents a newly developed mobile robot based multi-agent system with capabilities of ... collision avoidance. The system consists of three mobile robots. One main robot acts as a master and the othe...

Aya Souliman; Abdulkader Joukhadar

2014-01-01T23:59:59.000Z

360

Collision Avoidance of Mobile Robots Using Multi-Agent Systems  

Science Journals Connector (OSTI)

This paper presents a new methodical approach to the problem of collision avoidance of mobile robots taking advantages of multi-agents systems to ... avoidance. In addition of simulations with virtual robots, in ...

Angel Soriano; Enrique J. Bernabeu

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

DESIGNING AN ECOLOGY OF DISTRIBUTED AGENTS Master's Thesis Proposal  

E-Print Network [OSTI]

DESIGNING AN ECOLOGY OF DISTRIBUTED AGENTS Master's Thesis Proposal November 5, 1997 Revised Lab #12; #12; Contents 1 Introduction 1 1.1 Ecologies of Programs of Computational Ecologies . . . . . . . . . . . . . . . . . . . 7 1.5 Summary of Expected Contributions

362

3-hydroxy-2(1H)-pyridinone chelating agents  

DOE Patents [OSTI]

Disclosed is a series of improved chelating agents and the chelates formed from these agents, which are highly effective upon both injection and oral administration. Several of the most effective are of low toxicity. These chelating agents incorporate within their structure 3-hydroxy-2-pyridinone (3,2-HOPO) moieties with a substituted carbamoyl group ortho to the hydroxy group of the hydroxypyridinone ring. The electron-withdrawing carbamoyl group increases the acidity, as well as the chemical stability towards oxidation and reduction, of the hydroxypyridinones. In the metal complexes of the chelating agents, the amide protons form very strong hydrogen bonds with the adjacent HOPO oxygen donor, making these complexes very stable at physiological conditions. The terminal N-substituents provide a certain degree of lipophilicity to the 3,2-HOPO, increasing oral activity.

Raymond, Kenneth (Berkeley, CA); Xu, Jide (Berkeley, CA)

1999-01-01T23:59:59.000Z

363

3-hydroxy-2(1H)-pyridinone chelating agents  

DOE Patents [OSTI]

Disclosed is a series of improved chelating agents and the chelates formed from these agents, which are highly effective upon both injection and oral administration. Several of the most effective are of low toxicity. These chelating agents incorporate within their structure 3-hydroxy-2-pyridinone (3,2-HOPO) moieties with a substituted carbamoyl group ortho to the hydroxy group of the hydroxypyridinone ring. The electron-withdrawing carbamoyl group increases the acidity, as well as the chemical stability towards oxidation and reduction, of the hydroxypyridinones. In the metal complexes of the chelating agents, the amide protons form very strong hydrogen bonds with the adjacent HOPO oxygen donor, making these complexes very stable at physiological conditions. The terminal N-substituents provide a certain degree of lipophilicity to the 3,2-HOPO, increasing oral activity. 2 figs.

Raymond, K.; Xu, J.

1999-04-06T23:59:59.000Z

364

COAL (Coalition Organization with Agent Leadership) 1. INTRODUCTION  

E-Print Network [OSTI]

1 COAL (Coalition Organization with Agent Leadership) 1. INTRODUCTION A coalition is an alliance sensing, personnel management [55], transportation, network communication [38], and power transmission, "individuals, rather than government, make the majority of decisions regarding economic activities

Allan, Vicki H.

365

Distributed Intelligent Agents for Decision Making at Local Distributed  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Distributed Intelligent Agents for Decision Making at Local Distributed Distributed Intelligent Agents for Decision Making at Local Distributed Energy Resource (DER) Levels Speaker(s): David Cohen Date: June 3, 2005 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Peng Xu Our goals are to develop and commercialize a system of adaptive, intelligent software components which run at distributed locations (DER-level) on the energy network to improve the reliability, efficiency, and security of the U.S. electrical distribution network. We are developing GridAgents, an enabling software technology framework and platform using a distributed multi-agent systems approach for advanced communications and control capabilities (large- scale automated demand response, distribution automation control, and Microgrid control applications). For more

366

Contract Signature Using Quantum Information  

E-Print Network [OSTI]

This paper describes how to perform contract signature in a fair way using quantum information. The protocol proposed permits two partners, users of a communication network, to perform a contract signature based on the RSA security. The authentication of the signers is based on the use of a non-local XOR function of two classical bits.

Paulo Benicio Melo de Sousa; Rubens Viana Ramos

2007-11-08T23:59:59.000Z

367

Use of antimicrobial agents in a novel cattle washing system  

E-Print Network [OSTI]

USE OF ANTIMICROBIAL AGENTS IN A NOVEL CATTLE WASHING SYSTEM A Thesis by BRIAN REED COVINGTON Submitted to thc Office of Graduate Studies of Texas ARM University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE... August 2001 Major Subject: Animal Science USE OF ANTIMICROBIAL AGENTS IN A NOVEL CATTLE WASHING SYSTEM A Thesis by BRIAN REED COVINGTON Submitted to Texas A&M University in partial fulfillment of the requtrements for the degree of MASTER...

Covington, Brian Reed

2012-06-07T23:59:59.000Z

368

An Autonomous Adaptive Scheduling Agent for Period Searching  

E-Print Network [OSTI]

We describe the design and implementation of an autonomous adaptive software agent that addresses the practical problem of observing undersampled, periodic, time-varying phenomena using a network of HTN-compliant robotic telescopes. The algorithm governing the behaviour of the agent uses an optimal geometric sampling technique to cover the period range of interest, but additionally implements proactive behaviour that maximises the optimality of the dataset in the face of an uncertain and changing operating environment.

Eric S. Saunders; Tim Naylor; Alasdair Allan

2008-01-24T23:59:59.000Z

369

The Impact of Blowing Agents on Residential Water Heater Performance  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

The Impact of Blowing Agents on Residential Water Heater Performance The Impact of Blowing Agents on Residential Water Heater Performance Title The Impact of Blowing Agents on Residential Water Heater Performance Publication Type Report LBNL Report Number LBNL-47352 Year of Publication 2001 Authors Lekov, Alexander B., James D. Lutz, Camilla Dunham Whitehead, and James E. McMahon Document Number LBNL-47352 Date Published January 12 Abstract The National Appliance Energy Conservation Act of 1987 (NAECA) requires the U.S. Department of Energy (DOE) to consider amendments to the energy conservation standards to increase energy efficiency in residential water heaters. A driving force affecting efficiency is the ozone-depletion regulation regarding blowing agents for insulation in all water heater fuel types. This paper presents results of cost and efficiency impacts of three potential blowing agents. Residential water heaters are typically insulated with polyurethane foam in the space between the tank and the jacket. Currently, water heater manufacturers use HCFC-141b, an ozone-depleting substance, as a blowing agent. After 2003, as a result of the Montreal Protocol (1993), manufacturers must use blowing agents that do not deplete the ozone layer. The analysis presented in this paper considers three replacement candidates, HFC-245fa, HFC-134a, and cyclopentane by comparing their efficiency and cost effectiveness when applied to water heater insulation. This analysis used computer simulation models and other analytical methods to investigate the efficiency improvements due to different design options, when alternative blowing agents are applied. The calculations were based on the DOE test procedure for residential water heaters. The analysis used average manufacturer, retailer, and installer costs to calculate the total consumer costs. Consumer operating expenses were calculated based on modeled energy consumption under test procedure conditions and U.S. average energy prices. With this information, a cost-efficiency relationship was developed to show the average manufacturer and consumer cost to achieve increased efficiency.

370

Separation of concerns in hybrid component and agent systems  

Science Journals Connector (OSTI)

This paper discusses the Socially Situated Agent Architecture (SoSAA) a complete construction methodology that leverages existing well-established research and associated methodologies and frameworks in both the agent-oriented and component-based software engineering domains. As a software framework, SoSAA is intended to serve as a foundation on which to build agent-based applications by promoting separation of concerns in the development of open, heterogeneous, adaptive and distributed systems. The paper highlights concerns typically addressed in the development of distributed systems, such as adaptation, concurrency and fault-tolerance. It analyses how a hybrid agent/component integration approach can improve the separation of these concerns by leveraging modularity constructs already available in agent and component systems. Finally, it provides a first evaluation of the framework's application by applying well-known metrics to a distributed information retrieval case study, and by discussing how these results can be projected to a typical multi-agent application developed with this hybrid approach.

Mauro Dragone; Howell Jordan; David Lillis; Rem W. Collier

2011-01-01T23:59:59.000Z

371

E-Print Network 3.0 - alguns procariotas agentes Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

da Computao n 3509 Um Agente Especialista em... -9741 Editor: Prof. Carlos Jos Pereira de Lucena Novembro, 2009 Um Agente Especialista em Recomendao de... presents a...

372

E-Print Network 3.0 - alguns agentes lixiviantes Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

da Computao n 3509 Um Agente Especialista em... -9741 Editor: Prof. Carlos Jos Pereira de Lucena Novembro, 2009 Um Agente Especialista em Recomendao de... presents a...

373

E-Print Network 3.0 - antirheumatic agents Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

- Arthritis Pharm: Nootropic Agents Pharm: Treatment of Migraine Pharm: Drugs of Abuse Path: Transfusion Med... 153 Pharm: Agents of Chemical Terrorism Pharm: Management of...

374

E-Print Network 3.0 - agents electron spin Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

a mental... language for multi- agent systems, which is intended to support the automatic verification of such systems... , MABLE provides a number of agent-oriented development...

375

E-Print Network 3.0 - adaptive agent architecture Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Aspects Alessandro Garcia Carlos Lucena Summary: Enforcement (a) aspect-oriented architecture of an user agent Behavior Adaptation Kernel Services Knowledge... -oriented agent...

376

E-Print Network 3.0 - agents identify distinctly Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

platform to target agent platforms. 6. Agents... ... Source: Roth, Volker - FX Palo Alto Laboratory Collection: Computer Technologies and Information Sciences 4 Supporting...

377

E-Print Network 3.0 - agent degradation products Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Sciences ; Engineering 22 NIST Special Publication 800-19 Mobile Agent Security Wayne Jansen, Tom Karygiannis Summary: from being harmed by other agents through masquerade. An...

378

E-Print Network 3.0 - agent tzt-1027 enhances Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

tumor vasculature... in these studies may be ideally suited for these particular activities, since a structurally related agent, TZT... the antitubulin agent monomethyl...

379

U-261: Novell GroupWise Internet Agent "Content-Length" Integer...  

Broader source: Energy.gov (indexed) [DOE]

1: Novell GroupWise Internet Agent "Content-Length" Integer Overflow Vulnerability U-261: Novell GroupWise Internet Agent "Content-Length" Integer Overflow Vulnerability September...

380

Design, Synthesis and Development of Transporter Targeting Agents for Image-guided Therapy and Drug Delivery.  

E-Print Network [OSTI]

?? The purpose of this study was to design, synthesize and develop novel transporter targeting agents for image-guided therapy and drug delivery. Two novel agents, (more)

Tsao, Ning

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

E-Print Network 3.0 - agent causing occupational Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

pathology andor an occupational exposure defined by noxious agent, profession... as shown in fig. 1D. D) The tripartite network: disease-noxious agent-occupation is the...

382

E-Print Network 3.0 - afecs multi-agent framework Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

late 1980s, we... developed a multi-agent system platform called made (the Multi-Agent Development ... Source: Deloach, Scott A. - Department of Computing and Information...

383

E-Print Network 3.0 - autonomic blocking agents Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

agents are taken as autonomous entities pursuing their own individual goals based... be applied to revise agent's goals that are not ... Source: Dastani, Mehdi - Department of...

384

E-Print Network 3.0 - adaptive multi-agent architecture Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

agent architecture Search Powered by Explorit Topic List Advanced Search Sample search results for: adaptive multi-agent architecture Page: << < 1 2 3 4 5 > >> 1 Presented at:...

385

E-Print Network 3.0 - agente oxidante uma Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Aumentar a quantidade do agente oxidante ou modificar o agente oxidante Canal... RESUMO Neste artigo apresentamos ... Source: Cengarle, Mara Victoria - Institut fr Informatik,...

386

E-Print Network 3.0 - agente quelatante del Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES ... Source: Siegelmann , Hava T - Department of Computer Science, University of...

387

E-Print Network 3.0 - agentes del bioterrorismo Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES ... Source: Siegelmann , Hava T - Department of Computer Science, University of...

388

E-Print Network 3.0 - agente protector del Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES ... Source: Siegelmann , Hava T - Department of Computer Science, University of...

389

facets and dispatches a system mobile agent to carry them with it and extract the user agents at idle servers.  

E-Print Network [OSTI]

at idle servers. 6 Conclusions In this paper we have focused on small scale inter­cluster job coordination­ dination work and upgrade the features of remote clusters using mobile agents. We have implemented

Fukuda, Munehiro

390

3-hydroxy-2(1H)-pyridinone chelating agents  

DOE Patents [OSTI]

Disclosed is a series of improved metal chelating agents, which are highly effective upon both injection and oral administration; several of the most effective are of low toxicity. These chelating agents incorporate within their structure 1-hydroxy-2-pyridinone (1,2-HOPO) and 3-hydroxy-2-pyridinone (3,2-HOPO) moieties with a substituted carbamoyl group ortho to the hydroxy or oxo groups of the hydroxypyridinone ring. The electron-withdrawing carbamoyl group increases the acidity of the hydroxypyridinones. In the metal complexes of the chelating agents, the amide protons form very strong hydrogen bonds with its adjacent HOPO oxygen donor, making these complexes very stable at physiological conditions. The terminal N-substituents provides a certain degree of lipophilicity to the 3,2-HOPO, increasing oral activity. Also disclosed is a method of making the chelating agents and a method of producing a known compound, 3-hydroxy-1-alkyl-2(1H)pyridinone, used as a precursor to the chelating agent, safely and in large quantities. 2 figs.

Raymond, K.N.; Xu, J.

1997-04-29T23:59:59.000Z

391

3-hydroxy-2(1H)-pyridinone chelating agents  

DOE Patents [OSTI]

Disclosed is a series of improved metal chelating agents, which are highly effective upon both injection and oral administration; several of the most effective are of low toxicity. These chelating agents incorporate within their structure 1-hydroxy-2-pyridinone (1,2-HOPO) and 3-hydroxy-2-pyridinone (3,2-HOPO) moieties with a substituted carbamoyl group ortho to the hydroxy or oxo groups of the hydroxypyridinone ring. The electron-withdrawing carbamoyl group increases the acidity of the hydroxypyridinones. In the metal complexes of said chelating agents, the amide protons form very strong hydrogen bonds with its adjacent HOPO oxygen donor, making these complexes very stable at physiological conditions. The terminal N-substituents provides a certain degree of lipophilicity to said 3,2-HOPO, increasing oral activity. Also disclosed is a method of making the chelating agents and a method of producing a known compound, 3-hydroxy-1-alkyl-2(1H)pyridinone, used as a precursor to the chelating agent, safely and in large quantities.

Raymond, Kenneth N. (Berkeley, CA); Xu, Jide (Berkeley, CA)

1997-01-01T23:59:59.000Z

392

JC3 High Impact Assessment Bulletins | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

August 19, 2011 August 19, 2011 T-697: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible. August 18, 2011 T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. August 16, 2011 T-694: IBM Tivoli Federated Identity Manager Products Multiple

393

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

19, 2011 19, 2011 T-697: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible. August 18, 2011 T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. August 17, 2011 T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets

394

Mobile Agents Based Collective Communication: An Application to a Parallel Plasma Simulation  

E-Print Network [OSTI]

Mobile Agents Based Collective Communication: An Application to a Parallel Plasma Simulation lack in Mobile Agents systems even if mes- sage passing is always supported to grant communication benefit social ability and interactions of collaborative agents. Mobile Agents technology has been widely

Vlad, Gregorio

395

TAC-RMTO: trading agent competition in remanufacture-to-order  

Science Journals Connector (OSTI)

TAC-RMTO is a multi-agent-based game that extends and enhances the trading agent competition (TAC) scenario to work in remanufacturing area. The game is a configurable Internet-mediated remanufacture-to-order (RMTO) platform that supports both human ... Keywords: multi-agent system, remanufacture-to-order, reverse supply chain, trading agent competition

Bo Xing; Wen-jing Gao; Fulufhelo V. Nelwamondo; Kimberly Battle; Tshilidzi Marwala

2012-06-01T23:59:59.000Z

396

E-Print Network 3.0 - agent theories architectures Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Dynamic Modular Runtime Summary: agent architectures. Finally, the platform's service-oriented architecture greatly facilitates... . . . . . . . . . . . . . . . . . . . . . . . ....

397

Vicarious learning in mobile neurally controlled agents: The VMAXSON architecture. \\Lambda  

E-Print Network [OSTI]

where there are objects in the environment to be approached and avoided (called food, water, and poison). To survive, the agents need to eat the food, drink the water, and avoid the poison. V­MAXSON agents learn. As an agent's store of food and water goes down, its hunger and thirst rises. When the agent eats a poison

Crabbe, Frederick

398

Multi-agent-based integrated framework for intra-class testing of object-oriented software  

Science Journals Connector (OSTI)

The primary features of the object-oriented paradigm lead to develop a complex and compositional testing framework for object-oriented software. Agent-oriented approach has become a trend in software engineering. Agent technologies facilitate the software ... Keywords: Agent-based framework, Combinatorial approach, Intra-class testing, Multi-agent based, Test automation framework

P. Dhavachelvan; G. V. Uma

2005-01-01T23:59:59.000Z

399

A Security Solution for IEEE 802.11's Ad-hoc Mode:Password-Authentication and Group Diffie-Hellman Key Exchange  

SciTech Connect (OSTI)

The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.

Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

2005-10-01T23:59:59.000Z

400

Using Intelligent Agents to Understand Management Practices and Retail Productivity  

E-Print Network [OSTI]

Intelligent agents offer a new and exciting way of understanding the world of work. In this paper we apply agent-based modeling and simulation to investigate a set of problems in a retail context. Specifically, we are working to understand the relationship between human resource management practices and retail productivity. Despite the fact we are working within a relatively novel and complex domain, it is clear that intelligent agents could offer potential for fostering sustainable organizational capabilities in the future. The project is still at an early stage. So far we have conducted a case study in a UK department store to collect data and capture impressions about operations and actors within departments. Furthermore, based on our case study we have built and tested our first version of a retail branch simulator which we will present in this paper.

Siebers, Peer-Olaf; Celia, Helen; Clegg, Christopher

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

ACTINIDE-SPECIFIC SEQUESTERING AGENTS AND DECONTAMINATION APPLICATIONS  

SciTech Connect (OSTI)

We have briefly reviewed the biological hazards associated with the actinide elements. The most abundant transuranium element produced by both industrial nuclear power plants and nuclear weapons programs is plutonium. It is also potentially the most toxic - particularly due to its long-term hazard as a carcinogen if it is introduced into the body. This toxicity is due in large part to the chemical and biochemical similarities of Pu(IV) and Fe(III). Thus in mammals plutonium is transported and stored by the transport and storage systems for iron. This results in the concentration and long-term retention of an alpha-emitting radionuclide ({sup 239}Pu) at sites such as the bone marrow where cell division occurs at a high rate. The earliest attempts at removal of actinide contamination by chelation therapy were essentially heuristic in that sequestering agents known to be effective at binding other elements were tried with plutonium. The research described here is intended to be a rational approach that begins with the observation that since Fe(III) and Pu(IV) are so similar, and since microbes produce agents called siderophores that are extremely effective and selective sequestering agents for Fe(III), the construction of similar chelating agents for the actinides should be possible using the same chelating groups found in the siderophores. The incorporation of four such groups (primarily catechol and hydroxamic acid) results in multidentate chelating agents that can completely encapsulate the central actinide(IV) ion and achieve the eight-coordinate environment most favored by such ions. The continuing development and improvement of such sequestering agents has produced compounds which remove significant amounts of plutonium deposited in bone and which remove a greater fraction of the total body burden than any other chelation therapy developed to date.

Smith, William L.; Raymond, Kenneth N.

1980-07-01T23:59:59.000Z

402

Intelligent energy management agent for a parallel hybrid vehicle  

E-Print Network [OSTI]

INTELLIGENT ENERGY MANAGEMENT AGENT FOR A PARALLEL HYBRID VEHICLE A Dissertation by JONG-SEOB WON Submitted to the O ce of Graduate Studies of Texas A&M University in partial ful llment of the requirements for the degree of DOCTOR OF PHILOSOPHY May... 2003 Major Subject: Mechanical Engineering INTELLIGENT ENERGY MANAGEMENT AGENT FOR A PARALLEL HYBRID VEHICLE A Dissertation by JONG-SEOB WON Submitted to Texas A&M University in partial ful llment of the requirements for the degree of DOCTOR...

Won, Jong-Seob

2004-09-30T23:59:59.000Z

403

Modelling Electrical Car Diffusion Based on Agent Tao Zhang, 3  

E-Print Network [OSTI]

Modelling Electrical Car Diffusion Based on Agent 1 Lei Yu, ,2 Tao Zhang, 3 Siebers Peer-Ola, 4 to include things like car parking charges, price of electrical car, energy awareness and word of mouth parking rates and other incentives on the uptake of electrical cars. The goal of this case study

Aickelin, Uwe

404

Affect Transfer by Metaphor for an Intelligent Conversational Agent  

E-Print Network [OSTI]

Affect Transfer by Metaphor for an Intelligent Conversational Agent Alan Wallington and Rodrigo with a number of `worked examples'. Alan Wallington School of Computer Science, University of Birmingham, Birmingham B152TT, e-mail: Alan. Wallington@dunelm.org.uk,A.M.Wallington@cs.bham.ac.uk Rodrigo Agerri School

Lee, Mark

405

NASA/TM-1998-208419 Buckets: Aggregative, Intelligent Agents  

E-Print Network [OSTI]

May 1998 NASA/TM-1998-208419 Buckets: Aggregative, Intelligent Agents for Publishing Michael L Dominion University, Norfolk, Virginia #12;The NASA STI Program Office ... in Profile Since its founding, NASA has been dedicated to the advancement of aeronautics and space science. The NASA Scientific

Nelson, Michael L.

406

Information Sharing among Autonomous Agents in Referral Networks  

E-Print Network [OSTI]

Information Sharing among Autonomous Agents in Referral Networks Yathiraj B. Udupi and Munindar P {ybudupi,singh}@ncsu.edu Abstract. Referral networks are a kind of P2P system consisting of autonomous or respond by pro- viding the desired service or giving a referral. This use of referrals is inspired

407

Executable specification of open multi-agent systems  

Science Journals Connector (OSTI)

......dependence, powers and roles playing...and Multi Agent Systems (AAMAS...mechanisms. In: Handbook on Economics...example. All `operations' on commitments...explicit transition systems semantics, to...to express all operations on commitments...institutional power is at least as......

Alexander Artikis; Marek Sergot

2010-02-01T23:59:59.000Z

408

Carbon nanotubes as photoacoustic molecular imaging agents in living mice  

E-Print Network [OSTI]

Carbon nanotubes as photoacoustic molecular imaging agents in living mice ADAM DE LA ZERDA1 not shown to target a diseased site in living subjects. Here we show that single-walled carbon nanotubes of tumours. Intravenous administration of these targeted nanotubes to mice bearing tumours showed eight times

Khuri-Yakub, Butrus T. "Pierre"

409

Intgration oriente service des modles Grid et Multi-Agents  

E-Print Network [OSTI]

/Grid service, Service-oriented architecture, STROBE model, Software engineering, Mixed systems. JFSMA 2006 of a service-oriented approach. The concept of service is clearly at the intersection of GRID and MAS, Interaction, Grid, Intégration agent-Grid, Web/Grid service, Architecture orientée service, modèle STROBE

Paris-Sud XI, Université de

410

Detoxification of Organophosphate Nerve Agents by Immobilized Dual Functional  

E-Print Network [OSTI]

, low shear force, and low energy requirement. The successful application of this genetically engineered consumption of liquids or foods contaminated with nerve agents, there is a growing public concern regarding requires the world stockpiles of over 200 kilotons extremely toxic organophosphate-based nerve gases

Chen, Wilfred

411

Analyzing Knowledge Transfer Effectiveness An Agent-Oriented Modeling Approach  

E-Print Network [OSTI]

Analyzing Knowledge Transfer Effectiveness ­ An Agent-Oriented Modeling Approach Markus Strohmaier of knowledge between knowledge workers represents one of the main challenges of knowledge management. Knowledge transfer instruments, such as the experience factory concept, represent means for facilitating knowledge

412

Multi-agent systems support for Community-Based Learning  

Science Journals Connector (OSTI)

......1999 D'Souza D.F. , Wills A.C., Objects, Components, and Frameworks...McGuire, J., Pelavin, R., Shapiro, S., Beck, C., 1993. Specification of the KQML...1999 Franke A. , Hess S., Jung C., Kohlhase M., Sorge V., Agent-oriented......

Yugyung Lee; Quddus Chong

2003-01-01T23:59:59.000Z

413

Honeywell receives EPA acceptance for eco-friendly blowing agent  

Science Journals Connector (OSTI)

In the USA, Honeywell Specialty Materials' low global warming potential (GWP) product HFO-1234ze has been accepted for use in foam and aerosol applications by the Environmental Protection Agency, allowing the blowing agent to be used in products sold in the country.

2011-01-01T23:59:59.000Z

414

Honeywell fully commercializes eco-friendly blowing agent  

Science Journals Connector (OSTI)

Honeywell Specialty Materials has fully commercialized a novel low-global-warming-potential (GWP) blowing agent for one-component foam and aerosol applications in Europe. Hydrofluoroolefin HFO-1234ze has zero ozone-depletion potential and meets European Union regulatory requirements for reducing the use of high GWP substances, the company says.

2008-01-01T23:59:59.000Z

415

GLC Analysis of Organic Chelating Agents in Steam Propulsion Systems  

Science Journals Connector (OSTI)

......Chelating Agents in Steam Propulsion Systems by Paul J. Sniegoski...iminodi- acetic acid) in steam propulsion systems. For chromatogra...as an addi- tive to steam propulsion systems to prevent build-up...Fourth Internaval Conference on Marine Cor- rosion, Naval Research......

Paul J. Sniegoski; David L. Venezky

1974-06-01T23:59:59.000Z

416

Biomolecular Agents as Multi-behavioural Concurrent Objects  

Science Journals Connector (OSTI)

In recent years, there has been increasing interest in computational models of biological systems based on various calculi of communicating processes, such as the stochastic pi-calculus. These models make it possible to simulate and eventually visualize ... Keywords: biological systems, communicating agents, programming, simulation, stochastic pi-calculus, systems biology

Denys Duchier; Cline Kuttler

2006-03-01T23:59:59.000Z

417

Algorithms for Selfish Agents Mechanism Design for Distributed Computation  

E-Print Network [OSTI]

Algorithms for Selfish Agents Mechanism Design for Distributed Computation Noam Nisan \\Lambda mechanism design in our distributed computation setting. We do not intend here to give a balanced Abstract This paper considers algorithmic problems in a distributed setting where the participants cannot

Chen, Yiling

418

A New Malaria Agent in African Hominids Benjamin Ollomo1.  

E-Print Network [OSTI]

, Franceville, Gabon, 2 Laboratoire Ge´ne´tique et Evolution des Maladies Infectieuses, UMR 2724 CNRS-IRD, IRD, Franceville, Gabon Abstract Plasmodium falciparum is the major human malaria agent responsible for 200 to 300 chimpanzees (Pan troglodytes) kept as pets by villagers in Gabon (Africa). Analysis of its complete

419

Use of partner agents in training systems for complex tasks  

E-Print Network [OSTI]

to be due to one trainee "modeling" the other part of the task. However, it has also been shown that social interaction is not required, which suggests that equal benefits could be derived from using intelligent agents as automated partners. In this thesis...

Sims, Joseph Michael

2002-01-01T23:59:59.000Z

420

Biopharmaceutical Characterization of Nebulized Antimicrobial Agents in Rats: 2. Colistin  

Science Journals Connector (OSTI)

...Characterization of Nebulized Antimicrobial Agents in Rats: 2. Colistin Aline Vidal Lacerda Gontijo...intrapulmonary administration of colistin sulfate in rats. Colistin was infused or delivered in...dose of 0.35 mg/kg of body weight in rats, and plasma drug concentrations were measured...

Aline Vidal Lacerda Gontijo; Nicolas Grgoire; Isabelle Lamarche; Patrice Gobin; William Couet; Sandrine Marchand

2014-05-05T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Towards Modelling the research in Green IT with Agents  

E-Print Network [OSTI]

­ reliability Now: Green IT and new-Energy consumption ­ energy consumption awareness ­ interestingTowards Modelling the research in Green IT with Agents Christina Herzog, Jean-Marc Pierson, Laurent Lefevre #12;Page 2 Many questions There are many unanswered questions: · Why is Green IT important? What

Lefèvre, Laurent

422

Learning Organizational Roles in a Heterogeneous Multi-agent System  

E-Print Network [OSTI]

presented in this paper repre- sents one of the few attempts at demonstrating the viability and utility not necessarily reflect the position or the policy of the Government and no official endorsement should of the agents has its own local state information, a local database with static and dynamic constraints on its

Massachusetts at Amherst, University of

423

Integrative Negotiation In Complex Organizational Agent Xiaoqin Zhang  

E-Print Network [OSTI]

their own local utility; in cooperative ne- gotiation, agents work to find a solution that increases own utility though contracting, bidding and decommiting. In the cooperative negotiation class Contract F30602-99-2-0525. The U.S. Government is authorized to reproduce and distribute reprints

Massachusetts at Amherst, University of

424

Memory Systems for Cognitive Agents Uma Ramamurthy1  

E-Print Network [OSTI]

Memory Systems for Cognitive Agents Uma Ramamurthy1 and Stan Franklin2 Abstract. The several different memory systems in human beings play crucial roles in facilitating human cognition. To build and cognitive science. In this paper we describe the various memory systems in the LIDA Architecture, which

Ramamurthy, Uma

425

Multi-Agent Autonomous Pilot for Motorcycles Dana Vrajitoru  

E-Print Network [OSTI]

Multi-Agent Autonomous Pilot for Motorcycles Dana Vrajitoru Intelligent Systems Laboratory Indiana with an automatic pilot. The application is written in OpenGL and includes a model of a vehicle (a motorcycle) based (Mourant & Marangos 2003). Our approach targets motorcycles which have not yet been studied as extensively

Vrajitoru, Dana

426

Bringing comfort to the masses: A novel evaluation of comfort agent solution properties  

Science Journals Connector (OSTI)

Abstract Ocular comfort agents are molecules that relieve ocular discomfort by augmenting characteristics of the tear film to stabilize and retain tear volume and lubricate the ocular surface. While a number of clinical comparisons between ocular comfort agent solutions are available, very little work has been done correlating the properties of specific comfort agents (species, molecular weight, and water retention) and solution properties (concentration, viscosity, zero shear viscosity, and surface tension) to the performance and effectiveness of comfort agent solutions. In this work, comfort-promoting properties related strongly to comfort agent concentration and molecular weight, the first objective demonstration of this relationship across diverse comfort agent species and molecular weights. The comfort agents with the greatest comfort property contributions (independent of specific molecular weight and concentration considerations) were hyaluronic acid (HA), hydroxypropyl methylcellulose (HPMC), and carboxymethylcellulose (CMC), respectively. The observed, empirical relationships between comfort property contribution and comfort agent species, solution properties, comfort agent molecular weight, and solution concentration was used to develop novel comfort agent index values. The comfort agent index values provided much insight and understanding into the results of experimental studies and/or clinical trials and offer potential resolution to numerous conflicting reports within the literature by accounting for the difference in comfort agent performance due to molecular weight and concentration of comfort agents. The index values provide the first objective, experimental validation and explanation of numerous general trends suggested by clinical data.

Charles J. White; Calvin R. Thomas; Mark E. Byrne

2014-01-01T23:59:59.000Z

427

A Key Enzyme to the Potency of an Anticancer Agent  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

A Key Enzyme to the Potency of A Key Enzyme to the Potency of an Anticancer Agent A Key Enzyme to the Potency of an Anticancer Agent Print Wednesday, 28 May 2008 00:00 Incorporation of halogen atoms into drug molecules often increases biological activity. This is the case with salinosporamide A (sal A), a natural product from the marine bacterium Salinispora tropica that is 500 times more active than sal B, its nonchlorinated analog. Sal A is in phase I human clinical trials for the treatment of multiple myeloma and solid tumors. A group of researchers, using diffraction data collected at ALS Beamline 8.2.2, discovered and characterized the chlorinating SalL enzyme, a crucial component in sal A biosynthesis that uses a unique chlorine-activating mechanism. Chlorine-Loving Enzyme Speeds Things Up

428

Fluorescence cross section measurements of biological agent simulants  

SciTech Connect (OSTI)

Fluorescence is a powerful technique that has potential uses in detection and characterization of biological aerosols both in the battlefield and in civilian environments. Fluorescence techniques can be used with ultraviolet (UV) light detection and ranging (LIDAR) equipment to detect biological aerosol clouds at a distance, to provide early warning of a biological attack, and to track an potentially noxious cloud. Fluorescence can also be used for detection in a point sensor to monitor biological materials and to distinguish agents from benign aerosols. This work is part of a continuing program by the Army`s Chemical and Biological Defense Command to characterized the optical properties of biological agents. Reported here are ultraviolet fluorescence measurements of Bacillus megaterium and Bacillus Globigii aerosols suspended in an electrodynamic particle trap. Fluorescence spectra of a common atmospheric aerosol, pine pollen, are also presented.

Stephens, J.R.

1996-11-01T23:59:59.000Z

429

The effect of alkaline agents on retention of EOR chemicals  

SciTech Connect (OSTI)

This report summarizes a literature survey on how alkaline agents reduce losses of surfactants and polymers in oil recovery by chemical injection. Data are reviewed for crude sulfonates, clean anionic surfactants, nonionic surfactants, and anionic and nonionic polymers. The role of mineral chemistry is briefly described. Specific effects of various alkaline anions are discussed. Investigations needed to improve the design of alkaline-surfactant-polymer floods are suggested. 62 refs., 28 figs., 6 tabs.

Lorenz, P.B.

1991-07-01T23:59:59.000Z

430

Motion planning algorithms for a group of mobile agents  

E-Print Network [OSTI]

sampling, like the probabilis- tic roadmap (PRM) planners [46, 47] have gained popularity due to their eciency 5 and simplicity. Centralized methods using PRM have been developed for solving the motion planning problem for multiple agents [48, 49...]. The no- tion of coordination diagram was used in [57] and later analyzed for manipulators in [60, 61]. On similar lines roadmap coordination [62, 63] was used to plan the motion of multiple robots. The problem with decoupled approaches is that despite...

Lal, Mayank

2008-10-10T23:59:59.000Z

431

T-618: Debian update for exim4: Mail Transport Agent | Department...  

Office of Environmental Management (EM)

18: Debian update for exim4: Mail Transport Agent T-618: Debian update for exim4: Mail Transport Agent May 9, 2011 - 7:00am Addthis PROBLEM: Debian has issued an update for exim4....

432

E-Print Network 3.0 - anti-breast cancer agents Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

breast cancer agents Search Powered by Explorit Topic List Advanced Search Sample search results for: anti-breast cancer agents Page: << < 1 2 3 4 5 > >> 1 THE PUBLIC HEALTH...

433

PL17CH01-Page ARI 7 April 2014 11:58 Agent-Based Models  

E-Print Network [OSTI]

& Miller 1991). These agents can be identical, or each can be endowed with unique attributes (Bankes 2002, the agents' behavior is rule based (Miller & Page 2007). Rules can be simple (e.g., backward induction

Tesfatsion, Leigh

434

E-Print Network 3.0 - agents cell survival Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

four agents could occupy any given grid-cell within... ). An agent was able to move one grid-cell in any ... Source: Eiben, A.E. "Guszti" - Department of Computer Science, Vrije...

435

E-Print Network 3.0 - avec des agents Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

agents Search Powered by Explorit Topic List Advanced Search Sample search results for: avec des agents Page: << < 1 2 3 4 5 > >> 1 Direction des Ressources Humaines Service des...

436

E-Print Network 3.0 - agent transport modeling Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

results for: agent transport modeling Page: << < 1 2 3 4 5 > >> 1 Lecture Notes in Computer Science 1 Internet Agents for Effective Collaboration Summary: we present WAPM, a Web...

437

A Framework for Evaluation of Multi-Agent System Approaches to Logistics Network Management  

Science Journals Connector (OSTI)

We study the applicability of multi-agent systems (MAS) to production and logistics network management. The goal is to create and evaluate sets of intelligent agents that can cooperatively support production a...

Paul Davidsson; Fredrik Wernstedt

2004-01-01T23:59:59.000Z

438

Roadmap-Based Techniques for Modeling Group Behaviors in Multi-Agent Systems  

E-Print Network [OSTI]

Simulating large numbers of agents, performing complex behaviors in realistic environments is a difficult problem with applications in robotics, computer graphics and animation. A multi-agent system can be a useful tool for studying a range...

Rodriguez, Samuel Oscar

2012-07-16T23:59:59.000Z

439

Influence of frothing-agent oxidation on coking-coal flotation  

Science Journals Connector (OSTI)

The oxidation of frothing agents (KOBS, OPPG-3, and the tar fraction of peat bitumen) affects coking-coal flotation. The tar fraction of Krapivinsk-peat ... provides the basis for a frothing agent in coking-coal ...

M. Yu. Klimovich; S. I. Zherebtsov; Yu. V. Musin; A. I. Moiseev

2008-12-01T23:59:59.000Z

440

Metal-substituted protein MRI contrast agents engineered for enhanced relaxivity and ligand sensitivity  

E-Print Network [OSTI]

Engineered metalloproteins constitute a flexible new class of analyte-sensitive molecular imaging agents detectable by magnetic resonance imaging (MRI), but their contrast effects are generally weaker than synthetic agents. ...

Lelyveld, Victor S.

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Leader election in distributed networks using agent based self-stabilizing technique  

E-Print Network [OSTI]

There are many variants of leader election algorithm in distributed networks. In this research, an agent based approach to leader election in distributed networks is investigated. Agents have shown to be useful in several ways. In the theoretical...

Tandon, Raghav

2004-09-30T23:59:59.000Z

442

Method for tracking the location of mobile agents using stand-off detection technique  

DOE Patents [OSTI]

A method for tracking the movement and position of mobile agents using light detection and ranging (LIDAR) as a stand-off optical detection technique. The positions of the agents are tracked by analyzing the time-history of a series of optical measurements made over the field of view of the optical system. This provides a (time+3-D) or (time+2-D) mapping of the location of the mobile agents. Repeated pulses of a laser beam impinge on a mobile agent, such as a bee, and are backscattered from the agent into a LIDAR detection system. Alternatively, the incident laser pulses excite fluorescence or phosphorescence from the agent, which is detected using a LIDAR system. Analysis of the spatial location of signals from the agents produced by repeated pulses generates a multidimensional map of agent location.

Schmitt, Randal L. (Tijeras, NM); Bender, Susan Fae Ann (Tijeras, NM); Rodacy, Philip J. (Albuquerque, NM); Hargis, Jr., Philip J. (Albuquerque, NM); Johnson, Mark S. (Albuquerque, NM)

2006-12-26T23:59:59.000Z

443

Agent Decision-Making in Open Mixed Networks Ya'akov Gala,b  

E-Print Network [OSTI]

conditions, such as wind speed and traffic. In turn, computer agents might depend on people to provide up mean that the autonomous agents in the network may be designed by or represent different individuals

Kraus, Sarit

444

Agents Everywhere, All the Time Oscar Nierstrasz, Jean-Guy Schneider, Franz Achermann  

E-Print Network [OSTI]

software agents will have to represent them. Whereas conventional services on intranets will continue or intelligent. On the other hand, we are interested in the characteristics that these agents will exhibit

Schneider, Jean-Guy

445

Agents Everywhere, All the Time 1 Oscar Nierstrasz, Jean-Guy Schneider, Franz Achermann  

E-Print Network [OSTI]

will have to represent them. Whereas conventional services on intranets will continue to be distributed are interested in the characteristics that these agents will exhibit: · agents represent and wrap services

Nierstrasz, Oscar

446

Automatic generation of communication and teamwork within multi-agent teams  

E-Print Network [OSTI]

Teamwork and communication are two important processes within multi-agent systems designed to act in a coherent and coordinated manner. Modeling teamwork involves interleaving steps within shared plans that will allow agents to work together towards...

Biggers, Keith Edward

2012-06-07T23:59:59.000Z

447

E-Print Network 3.0 - agents removal consideration Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

loss to the best agent, taking into consideration... @cs.wayne.edu, vipin@wayne.edu Abstract Previous work on task scheduling mechanisms assumed that the agent's goal... is...

448

E-Print Network 3.0 - agentes clareadores ativados Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

L. Furtado Departamento de... .ciarlini@uniriotec.br PUC-RioInf.MCC3903 Outubro, 2003 Abstract: This work presents a general survey on agent and multi-agent... of stories...

449

E-Print Network 3.0 - agent deferoxamine induced Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

www.elsevier.comlocateartint Summary: to entice neighboring agents to die as well. HADES studies the ability to induce self-death on an agent... or inducing self-death if they...

450

Mercury removal in utility wet scrubber using a chelating agent  

DOE Patents [OSTI]

A method for capturing and reducing the mercury content of an industrial flue gas such as that produced in the combustion of a fossil fuel or solid waste adds a chelating agent, such as ethylenediaminetetraacetic acid (EDTA) or other similar compounds like HEDTA, DTPA and/or NTA, to the flue gas being scrubbed in a wet scrubber used in the industrial process. The chelating agent prevents the reduction of oxidized mercury to elemental mercury, thereby increasing the mercury removal efficiency of the wet scrubber. Exemplary tests on inlet and outlet mercury concentration in an industrial flue gas were performed without and with EDTA addition. Without EDTA, mercury removal totaled 42%. With EDTA, mercury removal increased to 71%. The invention may be readily adapted to known wet scrubber systems and it specifically provides for the removal of unwanted mercury both by supplying S.sup.2- ions to convert Hg.sup.2+ ions into mercuric sulfide (HgS) and by supplying a chelating agent to sequester other ions, including but not limited to Fe.sup.2+ ions, which could otherwise induce the unwanted reduction of Hg.sup.2+ to the form, Hg.sup.0.

Amrhein, Gerald T. (Louisville, OH)

2001-01-01T23:59:59.000Z

451

Resilient Control System Execution Agent (ReCoSEA)  

SciTech Connect (OSTI)

In an increasingly networked world, critical infrastructure systems suffer from two types of vulnerability. The first is the traditionally recognized problem of monitoring the systems for faults and failures, recognizing and analyzing data, and responding with real understanding to the problems of the system. Increasingly complex systems create the opportunity for single points of failure to cascade when inaccurate assessment of system health increases response time or leads to faulty analysis of the problems involved. A second problem involves vulnerability to cyber intrusion, in which bad actors can mask system deterioration or present false data about system status. A resilient system will protect stability, efficiency, and security. To ensure these three states, the system must react to changing conditions within the system with coordination: no one component of the system can be allowed to react to problems without real consideration of the effects of that action on other components within the system. Systems with multi-agent design typically have three layers of action, a management layer, a coordination layer, and an execution layer. A resilient multi-agent system will emphasize functions of the execution layer, which has the responsibility of initiating actions, monitoring, analyzing, and controlling its own processes, while feeding information back to the higher levels of management and coordination. The design concept of a resilient control system execution agent (ReCoSEA) grows out of these underpinnings, and through the use of computational intelligence techniques, this paper suggests an associated design methodology.

Craig G. Rieger; Kris Villez

2012-08-01T23:59:59.000Z

452

E-Print Network 3.0 - agent markup language Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

information... protocol messages, enclosed in FIPA Agent Communication ... Source: Navarro-Arribas, Guillermo - Artificial Intelligence Research Institute, Universitat...

453

Robust Agent Communities Sandip Sen, Sabyasachi Saha, Stephane Airiau, Teddy Candale,  

E-Print Network [OSTI]

opportunities as well as challenges that can be best addressed by robust, self-sustaining agent communi- ties

Sen, Sandip

454

Distributed Communication for Highly Mobile Agents Mohammad Samarah and Philip Chan  

E-Print Network [OSTI]

are autonomous and self sustained. In order for mobile agents to flourish they need a software environment

Chan, Philip K.

455

Computational Science Technical Note CSTN-004 An Agent Model Formulation of the Ising Model  

E-Print Network [OSTI]

0 Computational Science Technical Note CSTN-004 An Agent Model Formulation of the Ising Model K. A. Hawick 2003 The Ising model has proved an important test problem for many issues in computational physics for a spatial agent model. Keywords: Ising model; agent; update procedure BiBTeX reference: @TECHREPORT{CSTN-004

Hawick, Ken

456

When sex, drugs, and violence enter the classroom: Conversations between adolescents and a female pedagogical agent  

Science Journals Connector (OSTI)

......Articles Special Issue: On the Abuse and Misuse of Social Agents...female agents suffer more abuse than male or gender neutral...anthropomorphism may motivate agent abuse. Another reason that users...characters may be because the Internet lowers human inhibitions (Hudson......

George Veletsianos; Cassandra Scharber; Aaron Doering

2008-05-01T23:59:59.000Z

457

Agent-based artificial immune system approach for adaptive damage detection in monitoring networks  

Science Journals Connector (OSTI)

This paper presents an agent-based artificial immune system approach for adaptive damage detection in distributed monitoring networks. The presented approach establishes a new monitoring paradigm by embodying desirable immune attributes, such as adaptation, ... Keywords: Artificial immune systems, Mobile agents, Multi-agent systems, Pattern recognition, Structural health monitoring

Bo Chen

2010-11-01T23:59:59.000Z

458

DASMAS: dialogue based automation of semantic interoperability in multi agent systems  

Science Journals Connector (OSTI)

This paper presents our ongoing effort on developing a dialogue based framework for resolving semantic interoperability in multi agent systems. Our approach is characterized by: (1) multi agent systems that have real world heterogeneous ontologies; (2) ... Keywords: interoperability, multi agent systems, ontology

Bhavna Orgun; Mark Dras; Steve Cassidy; Abhaya Nayak

2005-11-01T23:59:59.000Z

459

Utilization of Modified CoreGRID Ontology in an Agent-based Grid Resource Management System  

E-Print Network [OSTI]

-driven, and initially was based on an in-house developed mini-ontology of the Grid. Our re- cent analysis has indicatedUtilization of Modified CoreGRID Ontology in an Agent-based Grid Resource Management System M, Morocco Abstract The Agents in Grid project is devoted to the de- velopment of an agent-based intelligent

Paris-Sud XI, Université de

460

An Agent-Based Approach for Trustworthy Service Pinar Yolum Munindar P. Singh  

E-Print Network [OSTI]

. An agent may provide a service to another agent or give a referral that leads it in the right direction. Through referrals, agents can help one another find trustworthy parties. Two, re- cent work has studied trustworthy service recommendations. Referrals are essential for locating services in decentralized systems

Yolum, Pýnar

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Mobile Agent Software Applied in Maintenance Scheduling X. Xu M. Kezunovic  

E-Print Network [OSTI]

Mobile Agent Software Applied in Maintenance Scheduling X. Xu M. Kezunovic Department of Electrical different entities is required. In this paper, the mobile agent software is applied in the facility and the ISO respectively, and the mobile agent takes care of the communication and coordination between

462

Mobile Agent Rendezvous in a Ring Evangelos Kranakis Danny Krizanc y Nicola Santoro Cindy Sawchuk  

E-Print Network [OSTI]

Mobile Agent Rendezvous in a Ring Evangelos Kranakis #3; Danny Krizanc y Nicola Santoro #3; Cindy Sawchuk #3; Abstract In the rendezvous search problem, two mobile agents must move along the n nodes of a network so as to minimize the time required to meet or rendezvous. When the mobile agents are identical

Devoto, Stephen H.

463

MOBILE AGENTS | | | |DS HOME ARCHIVES ABOUT US SUBSCRIBE |SEARCH CART August 2002  

E-Print Network [OSTI]

MOBILE AGENTS | | | |DS HOME ARCHIVES ABOUT US SUBSCRIBE |SEARCH CART August 2002 Back to Article Future Directions for Mobile Agent Research David Kotz, Robert Gray, and Daniela Rus Dartmouth College· he field of mobile agents should shift its emphasis toward mobile code, in all its forms, rather than

Kotz, David

464

Mobile Agents for Pervasive Computing Using a Novel Method of Message Passing  

E-Print Network [OSTI]

Mobile Agents for Pervasive Computing Using a Novel Method of Message Passing David Levine, Renjith devices throughout an individual's working and living environment. Mobile agents are software entities that can migrate between servers or mobile agent environments of the network accomplishing various tasks

Záruba, Gergely

465

Simulating working environments through the use of personality-based agents  

Science Journals Connector (OSTI)

This paper presents a multi-agent simulation system, named SimOrg (Simulation of human organization), in which the personality aspect is incorporated in the internal functioning of the agents. The general architecture of the agents has been based on ...

Anne M. P. Canuto; Andr M. C. Campos; Araken M. Santos; Eliane C. M. Moura; Emanuel B. Santos; Rodrigo G. Soares; Kaio A. A. Dantas

2006-10-01T23:59:59.000Z

466

Using Agents to Secure the Internet Marketplace Reactive Security and Social Control  

E-Print Network [OSTI]

Using Agents to Secure the Internet Marketplace Reactive Security and Social Control Lars Rasmusson present the idea to let agents handle security issues in Internet markets. The motivation for this is the difficulties in having external or centralized control over a system as open as the Internet. The agents use

467

Way portals: efficient multi-agent navigation with line-segment goals  

Science Journals Connector (OSTI)

It is a common artifact of multi-agent motion planning for groups of agents, following similar paths, to converge to a line. This occurs because the agents' immediate goals, also known as waypoints, are frequently a common point in space. Contention ... Keywords: local collision avoidance, navigation, non-player characters

Sean Curtis; Jamie Snape; Dinesh Manocha

2012-03-01T23:59:59.000Z

468

Multi-Agent Patrolling under Uncertainty and Threats Shaofei Chen1,2  

E-Print Network [OSTI]

Multi-Agent Patrolling under Uncertainty and Threats Shaofei Chen1,2 , Feng Wu2 , Lincheng Shen1 information is distributed alongside threats. The informa- tion and threat at each location are respectively by an agent. While agents obtain information at a location, they may suffer attacks from the threat

Yeoh, William

469

A multi-agent based infrastructure to support virtual communities in elderly care  

Science Journals Connector (OSTI)

The growing numbers of the elderly population impose an urgent need to develop new approaches to care provision. The convergence of a number of technologies such as multi-agent systems, federated information management, safe communications, hypermedia ... Keywords: agent-based systems, care provision, care services, elderly care support, elderly population, federated information management, multi-agent systems, virtual community, virtual organisation

Luis M. Camarinha-Matos; Hamideh Afsarmanesh

2004-10-01T23:59:59.000Z

470

ACC 2007, New York Visibility-based multi-agent deployment in orthogonal environments  

E-Print Network [OSTI]

ACC 2007, New York Visibility-based multi-agent deployment in orthogonal environments Anurag of robotic agents equipped with omnidirectional vision in a simply connected orthogonal environment with no prior knowledge of the environment. Each agent can sense distances to the environment boundary

Bullo, Francesco

471

Reliability enhancement in software testing an agent-based approach for complex systems  

Science Journals Connector (OSTI)

Although each paradigm have their own influence in the software engineering field with the support of their merits, researchers continue to strive for more efficient and powerful techniques. Agents are being advocated as a next generation model for engineering ... Keywords: agent-based framework, distributed frame work, integrated framework, intra-class testing, multi agent-based, reliability enhancement

P. Dhavachelvan; G. V. Uma

2004-12-01T23:59:59.000Z

472

Agent-based simulation of electricity markets: a survey of tools  

Science Journals Connector (OSTI)

Agent-based simulation has been a popular technique in modeling and analyzing electricity markets in recent years. The main objective of this paper is to study existing agent-based simulation packages for electricity markets. We first provide an overview ... Keywords: Adaptation, Agent-based simulation, Artificial life, Electricity market, Swarm intelligence

Zhi Zhou; Wai Kin Chan; Joe H. Chow

2007-12-01T23:59:59.000Z

473

DESIGNING AN ECOLOGY OF DISTRIBUTED AGENTS EXTENDED ABSTRACT FOR MASTER'S THESIS PROPOSAL  

E-Print Network [OSTI]

DESIGNING AN ECOLOGY OF DISTRIBUTED AGENTS EXTENDED ABSTRACT FOR MASTER'S THESIS PROPOSAL December will explore possibilities for Internet applications by creating an ecology of distributed agents, a new will build a system that represents peoples' pres­ ence by creating an ecology of agents. The applica­ tion

474

Building Multi-modal Personal Sales Agents as Interfaces to E-commerce Applications  

Science Journals Connector (OSTI)

The research presented explores a new paradigm for human-computer interaction with electronic retailing applications. A paradigm that deploys face-to-face interaction with intelligent, visual, lifelike, multimodal conversational agents, which take on ... Keywords: affective computing, conversational lifelike characters, electronic personal sales assistants, multi-agent systems, multi-modal interface agents

Yasmine Arafa; Abe Mamdani

2001-12-01T23:59:59.000Z

475

Spatial agent-based models for socio-ecological systems: Challenges and prospects  

Science Journals Connector (OSTI)

Departing from the comprehensive reviews carried out in the field, we identify the key challenges that agent-based methodology faces when modeling coupled socio-ecological systems. Focusing primarily on the papers presented in this thematic issue, we ... Keywords: Agent-based model, Human-environment system, Multi-agent system, Review, Socio-ecological system

Tatiana Filatova; Peter H. Verburg; Dawn Cassandra Parker; Carol Ann Stannard

2013-07-01T23:59:59.000Z

476

ECMI2008 Abstract Agent-Based Simulation as a Novel Decision Support Tool for Retail Managers  

E-Print Network [OSTI]

ECMI2008 Abstract Agent-Based Simulation as a Novel Decision Support Tool for Retail Managers Dr Strategy, Learning & Change (LUBS), Leeds, LS2 9JT, UK Abstract: Intelligent agents offer a new and exciting way of understanding the world of work. We apply agent-based simulation to investigate a set

Aickelin, Uwe

477

Formal Modeling of Communication Decisions in Cooperative Multi-agent Systems  

E-Print Network [OSTI]

-interested agents where each agent maximizes its own (local) utility. In our model, a local Markov process can, which is evaluated through a global utility function. We develop a multi- agent extension to Markov-9523419. The U.S. Government is authorized to reproduce and distribute reprints for Governmental purposes

Massachusetts at Amherst, University of

478

IMPLEMENTING ALLIANCE IN NETWORKED ROBOTS USING MOBILE AGENTS Liam Cragg and Huosheng Hu  

E-Print Network [OSTI]

IMPLEMENTING ALLIANCE IN NETWORKED ROBOTS USING MOBILE AGENTS Liam Cragg and Huosheng Hu Department this through a mobile agent implementation of the ALLIANCE architecture in multiple networked robots. Copyright © 2004 IFAC Keywords: Networked Multi-Robots, Mobile Agents, Fault Tolerance, ALLIANCE Architecture. 1

Hu, Huosheng

479

Multi-Agent System that Attains Longevity via Death Megan Olsen, Hava Siegelmann  

E-Print Network [OSTI]

surveillance. For that aim we in- troduce HADES, a self-regenerating cooperative multi-agent system with local monitoring. When agents of HADES find local failures they repair them. However, in extreme cases repair may their robustness with this system, called HADES (Healing and Agent Death Encouraging Stability). The purpose

Siegelmann , Hava T

480

T-560: Cisco Security Advisory: Management Center for Cisco Security Agent  

Broader source: Energy.gov (indexed) [DOE]

0: Cisco Security Advisory: Management Center for Cisco 0: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability February 18, 2011 - 7:00am Addthis PROBLEM: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability. PLATFORM: Cisco Security Agent software releases 5.1, 5.2, and 6.0 are affected by this vulnerability. Note: Only the Management Center for Cisco Security Agent is affected by this vulnerability. Cisco Security Agent installations on end-point workstations or servers are not affected by this vulnerability. ABSTRACT: The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary 208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code July 10, 2012 - 7:00am Addthis PROBLEM: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows prior to v11.03.12. ABSTRACT: Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027225 CVE-2012-2019 CVE-2012-2020 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities have been identified with HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in the execution of arbitrary code.

482

Ch.3 User Authentication Textbook?  

E-Print Network [OSTI]

· account lockout mechanisms · policies against using common passwords but rather hard to guess passwords

Dong, Yingfei

483

A Key Enzyme to the Potency of an Anticancer Agent  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

A Key Enzyme to the Potency of an Anticancer Agent Print A Key Enzyme to the Potency of an Anticancer Agent Print Incorporation of halogen atoms into drug molecules often increases biological activity. This is the case with salinosporamide A (sal A), a natural product from the marine bacterium Salinispora tropica that is 500 times more active than sal B, its nonchlorinated analog. Sal A is in phase I human clinical trials for the treatment of multiple myeloma and solid tumors. A group of researchers, using diffraction data collected at ALS Beamline 8.2.2, discovered and characterized the chlorinating SalL enzyme, a crucial component in sal A biosynthesis that uses a unique chlorine-activating mechanism. Chlorine-Loving Enzyme Speeds Things Up The smell of chlorine is unmistakable. It's in the swimming pool, in household bleach, and sometimes the faint odor of chlorine rises up from your tap water. But chlorine is more than a purifier and a disinfectant. It's found almost everywhere in nature-in table salt, dissolved in the ocean, and as a key ingredient in biosynthesis, a vital part of the metabolism of all living organisms.

484

Chemical warfare agent detectors probe the fogs of war  

SciTech Connect (OSTI)

The air-power-dominated Persian Gulf War was the largest massing of coalition forces since World War II. This short conflict left its own intriguing legacy of unanswered questions. Were chemical weapons used in the theater of war Some US Allies, many US service members, and a US Senator believe they were. Yet both US and U.K. defense establishments offer emphatic denials. If Saddam Hussein didn't use chemical weapons, how can the multitude of warning alarms that sounded, alarms indicating the presence of these warfare agents, be explained Did the chemical warfare (CW) agent monitors and detectors the US deployed operate properly And were they sensitive enough to detect not just militarily significant levels, for which troops would have had to don full protective gear, but also very low concentrations of these weapons, levels that Sen. Richard C. Shelby (D.-Ala.) believes may be responsible for the illnesses many Gulf War veterans are now experiencing In this paper, the author addressed these questions.

Ember, L.R. (C EN, Washington, DC (United States))

1994-08-01T23:59:59.000Z

485

Proxy Documentation, Cyber Security, Information Technology Division, ITD  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Proxy Configuration Proxy Configuration Here you will find instructions for using the FTP and Web proxies. Keep in mind that depending on where you access the proxies from (whether you are inside or outside of the BNL network), the process will differ slightly. For FTP, you will not be required to enter any passwords to use the proxies while on the BNL network. However, when accessing the proxies from an outside network (e.g. anything not .bnl.gov), you will be required to authenticate using a RSA SecurID Token. If you do not already have one of these, please visit the RSA SecurID User Guide for instructions on obtaining one. Users who are only interested in configuring their web browsers need NOT bother with RSA SecurID, as the web proxies will not be needed when you are outside the BNL network.

486

Validating the Autonomous EO-1 Science Agent Benjamin Cichy, Steve Chien, Steve Schaffer, Daniel Tran, Gregg Rabideau, Rob Sherwood  

E-Print Network [OSTI]

the validation process for the Autonomous Sciencecraft Experiment, a software agent currently flying onboard NASA describes the analysis used to define agent safety, elements of the design that increase the safety of the agent, and the process used to validate agent safety. 1 Introduction Autonomy technologies have

Schaffer, Steven

487

Tax Compliance and Public Goods Provision -- An Agent-based Econophysics Approach  

E-Print Network [OSTI]

We calculate the dynamics of tax evasion within a multi-agent econophysics model which is adopted from the theory of magnetism and previously has been shown to capture the main characteristics from agent-based based models which build on the standard Allingham and Sandmo approach. In particular, we implement a feedback of public goods provision on the decision-making of selfish agents which aim to pursue their self interest. Our results imply that such a feedback enhances the moral attitude of selfish agents thus reducing the percentage of tax evasion. Two parameters govern the behavior of selfish agents, (i) the rate of adaption to changes in public goods provision and (ii) the threshold of perception of public goods provision. Furtheron we analyze the tax evasion dynamics for different agent co mpositions and under the feedback of public goods provision. We conclude that policymakers may enhance tax compliance behavior via the threshold of perception by means of targeted public relations.

Hokamp, S

2014-01-01T23:59:59.000Z

488

Engineered plant biomass particles coated with bioactive agents  

DOE Patents [OSTI]

Plant biomass particles coated with a bioactive agent such as a fertilizer or pesticide, characterized by a length dimension (L) aligned substantially parallel to a grain direction and defining a substantially uniform distance along the grain, a width dimension (W) normal to L and aligned cross grain, and a height dimension (H) normal to W and L. In particular, the L.times.H dimensions define a pair of substantially parallel side surfaces characterized by substantially intact longitudinally arrayed fibers, the W.times.H dimensions define a pair of substantially parallel end surfaces characterized by crosscut fibers and end checking between fibers, and the L.times.W dimensions define a pair of substantially parallel top and bottom surfaces.

Dooley, James H; Lanning, David N

2013-07-30T23:59:59.000Z

489

Engineered plant biomass particles coated with biological agents  

DOE Patents [OSTI]

Plant biomass particles coated with a biological agent such as a bacterium or seed, characterized by a length dimension (L) aligned substantially parallel to a grain direction and defining a substantially uniform distance along the grain, a width dimension (W) normal to L and aligned cross grain, and a height dimension (H) normal to W and L. In particular, the L.times.H dimensions define a pair of substantially parallel side surfaces characterized by substantially intact longitudinally arrayed fibers, the W.times.H dimensions define a pair of substantially parallel end surfaces characterized by crosscut fibers and end checking between fibers, and the L.times.W dimensions define a pair of substantially parallel top and bottom surfaces.

Dooley, James H.; Lanning, David N.

2014-06-24T23:59:59.000Z

490

Efficacy of Phloxine B as a Bactericidal Agent in Plants  

Science Journals Connector (OSTI)

Halogenated xanthene dyes have been shown previously to have light-mediated herbicidal potential (Knox and Dodge, 1984, 1985a,b) but have been investigated mostly as insecticidal agents (Broome et al., 1975; Callahan et al., 1975). ... Sweet basil and jimsonweed were grown in a potting mix of peat moss and perlite (1:1) that had 29 kg of dolomitic lime/m3 and 3.3 kg of Micromax fertilizer/m3 (Scotts-Sierra Horticulture Products Co.) added. ... The flasks were placed in a completely randomized design on a rotary shaker thermostated at 25 C and supplemented with continuous lighting (2700 lx) for a period of 24 h. ...

Kenneth O. Willeford; Todd A. Parker; Susan V. Diehl

1998-03-13T23:59:59.000Z

491

Active cavitation detection of microbubble echocontrast agents in blood  

Science Journals Connector (OSTI)

Apfels active cavitation detector [Roy et al. J. Acoust. Soc. Am. 87 24512458 (1990)] has been improved to allow quantification of microbubble activity in reconstituted human blood. One?microsecond?long 20?MHz tone bursts are scattered from microbubbles undergoing transient cavitation at the focus of a pulsed 1?MHz transducer. The host medium consists either of human red blood cells suspended in autologous plasma or platelet?rich plasma with various concentrations of microbubble?based echocontrast agent present. The microbubble activity inferred from the backscattered tone bursts is compared to measured bioeffects (hemolysis platelet aggregation) in order to determine the physical basis for cavitational damage of blood components. Current results as a function of system parameters will be presented. [Work supported by NSF MSS?9253777.

Vilma E. Huertas; Inder Raj S. Makin; E. Carr Everbach

1994-01-01T23:59:59.000Z

492

Intelligent decision support feedback using Multi-Agent System in a defence maintenance environment  

Science Journals Connector (OSTI)

Safety and Airworthiness of airborne platforms rest heavily on the maintainability and reliability to maximise the availability and reduce logistics down time. Most of the test and maintenance data currently produced is either paper-based or discarded ... Keywords: DSS, IDSS, ILS, MAS, agent-based systems, aircraft platforms, airworthiness, avionics, data mining, defence maintenance, expert systems, integrated logistics systems, intelligent agents, intelligent decision support systems, multi-agent systems, safety

Kamal Haider; Jeffrey Tweedale; Lakhmi C. Jain; Pierre J. M. Urlings

2007-01-01T23:59:59.000Z

493

Adaptive Remote-Sensing Techniques Implementing Swarms of Mobile Agents  

SciTech Connect (OSTI)

In many situations, stand-off remote-sensing and hazard-interdiction techniques over realistic operational areas are often impractical "and difficult to characterize. An alternative approach is to implement an adap- tively deployable array of sensitive agent-specific devices. Our group has been studying the collective be- havior of an autonomous, multi-agent system applied to chedbio detection and related emerging threat applications, The current physics-based models we are using coordinate a sensor array for mukivanate sig- nal optimization and coverage as re,alized by a swarm of robots or mobile vehicles. These intelligent control systems integrate'glob"ally operating decision-making systems and locally cooperative learning neural net- works to enhance re+-timp operational responses to dynarnical environments examples of which include obstacle avoidance, res~onding to prevailing wind patterns, and overcoming other natural obscurants or in- terferences. Collectively',tkensor nefirons with simple properties, interacting according to basic community rules, can accomplish complex interconnecting functions such as generalization, error correction, pattern recognition, sensor fusion, and localization. Neural nets provide a greater degree of robusmess and fault tolerance than conventional systems in that minor variations or imperfections do not impair performance. The robotic platforms would be equipped with sensor devices that perform opticaI detection of biologicais in combination with multivariate chemical analysis tools based on genetic and neural network algorithms, laser-diode LIDAR analysis, ultra-wideband short-pulsed transmitting and receiving antennas, thermal im- a:ing sensors, and optical Communication technology providing robust data throughput pathways. Mission scenarios under consideration include ground penetrating radar (GPR) for detection of underground struc- tures, airborne systems, and plume migration and mitigation. We will describe our research in these areas anti give a status report on our progress.

Asher, R.B.; Cameron, S.M.; Loubriel, G.M.; Robinett, R.D.; Stantz, K.M.; Trahan, M.W.; Wagner, J.S.

1998-11-25T23:59:59.000Z

494

E-Print Network 3.0 - antibacterial agents tiamulin Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Broad-Spectrum Activity and Enhanced Potency against... of the antibacterial agent triclosan in a prodrug form with a cephalosporin scaffold. Unlike conventional -lactam... ,...

495

E-Print Network 3.0 - antibacterial agent bac1829 Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Broad-Spectrum Activity and Enhanced Potency against... of the antibacterial agent triclosan in a prodrug form with a cephalosporin scaffold. Unlike conventional -lactam... ,...

496

E-Print Network 3.0 - agent triclosan modulates Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

triclosan modulates Search Powered by Explorit Topic List Advanced Search Sample search results for: agent triclosan modulates Page: << < 1 2 3 4 5 > >> 1 Oxidative Transformation...

497

E-Print Network 3.0 - agent bindarit inhibits Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Anti-angiogenic agents may augment the activity of photodynamic therapy by inhibiting... Project title SYNERGY OF PHOTODYNAMIC THERAPY AND ... Source: Radenovic, Aleksandra -...

498

E-Print Network 3.0 - agent management system Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

are important in large-scale agent sys- tems. Here again, current ... Source: Kotz, David - Department of Computer Science, Dartmouth College Collection: Computer...

499

E-Print Network 3.0 - agent ni yoru Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Sciences 58 Motion Probes for Fault Detection and Recovery in Networked Control Mauro Franceschelli , Magnus Egerstedt, and Alessandro Giua Summary: -faulty agents, the...

500

E-Print Network 3.0 - anticancer agent purposes Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Stanford Linear Accelerator Center Collection: Physics 13 Multifunctional Micellar Nanomedicine for Cancer Therapy Summary: anticancer agent that inhibits microtubule growth by...