National Library of Energy BETA

Sample records for rsa authentication agent

  1. V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    issued a fix (7.1.2). Addthis Related Articles U-267: RSA Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability...

  2. V-223: RSA Authentication Agent for PAM Allows Remote Users to...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    has issued a fix Addthis Related Articles U-267: RSA Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability...

  3. U-267: RSA® Authentication Agent 7.1 for Microsoft Windows®...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RSA Authentication Agent Lets Remote Authenticated Users Bypass an Authentication Step reference LINKS: SecurityTracker Alert ID: 1027559 Bugtraq ID: 55662 CVE-2012-2287...

  4. V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    has issued fixes. Addthis Related Articles U-267: RSA Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability...

  5. V-174: RSA Authentication Manager Writes Operating System, SNMP...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files V-174: RSA Authentication Manager Writes Operating System,...

  6. V-195: RSA Authentication Manager Lets Local Users View the Administra...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: RSA Authentication Manager Lets Local Users View the Administrative Account Password V-195: RSA Authentication Manager Lets Local Users View the Administrative Account Password...

  7. T-659: Update support for RSA Authentication Manager

    Broader source: Energy.gov [DOE]

    RSA posted SP4 Patch 4 of their Authentication Manager product 06/30/2011. There are a few pages of fixes in the README, but the most significant is that Authentication Manager can now be installed on Windows Server 2008 (both 32 and 64bit).

  8. U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Scripting and URL Redirection Attacks | Department of Energy 12: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other

  9. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Let Remote Users Conduct Cross-Site Scripting Attacks | Department of Energy 51: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks May 8, 2013 - 12:06am Addthis PROBLEM: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks

  10. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Energy Savers [EERE]

    Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users ...

  11. T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw

    Broader source: Energy.gov [DOE]

    An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session.

  12. U-212: RSA Authentication Manager Flaws Permit Cross-Site and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be ...

  13. T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID

    Broader source: Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

  14. T-642: RSA SecurID update to Customers

    Broader source: Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products

  15. U-027: RSA Key Manager Appliance Session Logout Bug Fails to...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated...

  16. T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain...

  17. Using Two-Factor RSA Token with WebVPN | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Using Two-Factor RSA Token with WebVPN Using Two-Factor RSA Token with WebVPN Your RSA token is used to esbablish a connection to the Internet and connect to https://connect.doe.gov . Using-TwoFactorRSA-Token w VPN.pdf (469 KB) More Documents & Publications Instructions for WebVPN Connectivity Citrix_2FA_Authentication_09.09 Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc

  18. User guide for remote access to VDI and Workplace using RSA token |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy User guide for remote access to VDI and Workplace using RSA token User guide for remote access to VDI and Workplace using RSA token User guide for remote access to VDI and Workplace using RSA token VDI_WP_RSA_Remote_Guide_Final.pdf (1.22 MB) More Documents & Publications User Guide for Remote Access to VDI/Workplace Using PIV Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc Citrix_2FA_Authentication_09.09

  19. Reviews of computing technology: Securing network applications, Kerberos and RSA

    SciTech Connect (OSTI)

    Johnson, S.M.

    1992-06-01

    This paper will focus on the first step in establishing network security, authentication, and describe the basic function of both RSA and Kerberos as used to provide authentication and confidential data transfer services. It will also discuss the Digital Signature Standard and the market acceptance of each. Proper identification of the principals involved in a network dialog is a necessary first step in providing network-wide security comparable to that of stand-alone systems.

  20. Digitally Marking RSA Moduli

    SciTech Connect (OSTI)

    Johnston, A.M.

    2000-10-09

    The moduli used in RSA (see [5]) can be generated by many different sources. The generator of that modulus (assuming a single entity generates the modulus) knows its factorization. They would have the ability to forge signatures or break any system based on this moduli. If a moduli and the RSA parameters associated with it were generated by a reputable source, the system would have higher value than if the parameters were generated by an unknown entity. So for tracking, security, confidence and financial reasons it would be beneficial to know who the generator of the RSA modulus was. This is where digital marking comes in. An RSA modulus ia digitally marked, or digitally trade marked, if the generator and other identifying features of the modulus (such as its intended user, the version number, etc.) can be identified and possibly verified by the modulus itself. The basic concept of digitally marking an RSA modulus would be to fix the upper bits of the modulus to this tag. Thus anyone who sees the public modulus can tell who generated the modulus and who the generator believes the intended user/owner of the modulus is.

  1. U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system.

  2. Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Citrix_2FA_Authentication_12_3_2009.doc Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc (453.3 KB) More Documents & Publications Citrix_2FA_Authentication_09.09 Using Two-Factor RSA Token with WebVPN User guide for remote access to VDI and Workplace using RSA token

  3. Authentication Protocol using Quantum Superposition States

    SciTech Connect (OSTI)

    Kanamori, Yoshito; Yoo, Seong-Moo; Gregory, Don A.; Sheldon, Frederick T

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  4. V-234: EMC RSA Archer GRC Open Redirection Weakness and Security...

    Office of Environmental Management (EM)

    4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September ...

  5. System and method for authentication

    SciTech Connect (OSTI)

    Duerksen, Gary L.; Miller, Seth A.

    2015-12-29

    Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.

  6. V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain...

    Office of Environmental Management (EM)

    84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain ...

  7. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic...

    Office of Environmental Management (EM)

    59: RSA BSAFE SSL-C Lets Remote Users Decrypt SSLTLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL...

  8. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Let Local Users Bypass Security Restrictions | Department of Energy 26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA

  9. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  10. V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Issue | Department of Energy 4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September 4, 2013 - 6:00am Addthis PROBLEM: A weakness and a security issue have been reported in EMC RSA Archer GRC PLATFORM: EMC RSA Archer GRC 5.x ABSTRACT: This fixes multiple vulnerabilities, which can be exploited to bypass certain security restrictions and to conduct spoofing

  11. Portable RSA encryption-decryption subprogram for protecting proprietary text

    SciTech Connect (OSTI)

    Hanson, R.J.

    1981-09-01

    A virtually portable (FORTRAN) version of the RSA (Rivest, Shamir, Adleman) algorithm for encryption and decryption of proprietary text has been written. This system uses three previously developed software packages. These are an extended precision integer arithmetic package, an error processing package, and machine-sensitive input/output subprograms from the Text Exchange System.

  12. V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access,

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Clickjacking, and File Upload Attacks | Department of Energy 84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks February 5, 2013 - 12:01am Addthis PROBLEM: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks PLATFORM: RSA Archer SmartSuite Framework version 4.x RSA Archer

  13. T-640: RSA Access Manager Server CVE-2011-0322 Update

    Broader source: Energy.gov [DOE]

    RSA strongly recommends that all customers running RSA Access Manager Server versions 5.5.3, 6.0.4, and 6.1 apply the following updated security hot fixes, which contain the resolution to this issue, at the earliest opportunity. The hot fixes can be downloaded from SecurCare Online or by contacting RSA Security Customer Support. ?Security Hot fix # 5.5.3.174 for RSA Access Manager Server version 5.5.3 ?Security Hot fix # 6.0.4.60 for RSA Access Manager Server version 6.0.4 ?Security Hot fix # 6.1.2.08 for RSA Access Manager Server version 6.1.2 ?Security Hot fix # 6.1.3.05 for RSA Access Manager Server version 6.1.3

  14. Multi-factor authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  15. Authentication of byte sequences

    SciTech Connect (OSTI)

    Stearns, S.D.

    1991-06-01

    Algorithms for the authentication of byte sequences are described. The algorithms are designed to authenticate data in the Storage, Retrieval, Analysis, and Display (SRAD) Test Data Archive of the Radiation Effects and Testing Directorate (9100) at Sandia National Laboratories, and may be used in similar situations where authentication of stored data is required. The algorithms use a well-known error detection method called the Cyclic Redundancy Check (CRC). When a byte sequence is authenticated and stored, CRC bytes are generated and attached to the end of the sequence. When the authenticated data is retrieved, the authentication check consists of processing the entire sequence, including the CRC bytes, and checking for a remainder of zero. The error detection properties of the CRC are extensive and result in a reliable authentication of SRAD data.

  16. Authentication of quantum messages.

    SciTech Connect (OSTI)

    Barnum, Howard; Crépeau, Jean-Claude; Gottesman, D.; Smith, A.; Tapp, Alan

    2001-01-01

    Authentication is a well-studied area of classical cryptography: a sender A and a receiver B sharing a classical private key want to exchange a classical message with the guarantee that the message has not been modified or replaced by a dishonest party with control of the communication line. In this paper we study the authentication of messages composed of quantum states. We give a formal definition of authentication in the quantum setting. Assuming A and B have access to an insecure quantum channel and share a private, classical random key, we provide a non-interactive scheme that both enables A to encrypt and authenticate (with unconditional security) an m qubit message by encoding it into m + s qubits, where the probability decreases exponentially in the security parameter s. The scheme requires a private key of size 2m + O(s). To achieve this, we give a highly efficient protocol for testing the purity of shared EPR pairs. It has long been known that learning information about a general quantum state will necessarily disturb it. We refine this result to show that such a disturbance can be done with few side effects, allowing it to circumvent cryptographic protections. Consequently, any scheme to authenticate quantum messages must also encrypt them. In contrast, no such constraint exists classically: authentication and encryption are independent tasks, and one can authenticate a message while leaving it publicly readable. This reasoning has two important consequences: On one hand, it allows us to give a lower bound of 2m key bits for authenticating m qubits, which makes our protocol asymptotically optimal. On the other hand, we use it to show that digitally signing quantum states is impossible, even with only computational security.

  17. Secure authenticated video equipment

    SciTech Connect (OSTI)

    Doren, N.E.

    1993-07-01

    In the verification technology arena, there is a pressing need for surveillance and monitoring equipment that produces authentic, verifiable records of observed activities. Such a record provides the inspecting party with confidence that observed activities occurred as recorded, without undetected tampering or spoofing having taken place. The secure authenticated video equipment (SAVE) system provides an authenticated series of video images of an observed activity. Being self-contained and portable, it can be installed as a stand-alone surveillance system or used in conjunction with existing monitoring equipment in a non-invasive manner. Security is provided by a tamper-proof camera enclosure containing a private, electronic authentication key. Video data is transferred communication link consisting of a coaxial cable, fiber-optic link or other similar media. A video review station, located remotely from the camera, receives, validates, displays and stores the incoming data. Video data is validated within the review station using a public key, a copy of which is held by authorized panics. This scheme allows the holder of the public key to verify the authenticity of the recorded video data but precludes undetectable modification of the data generated by the tamper-protected private authentication key.

  18. Authentication Without Secrets

    SciTech Connect (OSTI)

    Pierson, Lyndon G.; Robertson, Perry J.

    2015-11-01

    This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integrity of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.

  19. Instructions for Using Two-Factor RSA Tokens with Citrix Workplace...

    Broader source: Energy.gov (indexed) [DOE]

    Enter your user name in the User name field. Enter your password, which is your RSA token PIN plus the number displayed on the token in the Password field. Click Log on. For more ...

  20. Low-bandwidth authentication.

    SciTech Connect (OSTI)

    Donnelly, Patrick Joseph; McIver, Lauren; Gaines, Brian R.; Anderson, Erik; Collins, Michael Joseph; Thomas,Kurt Adam; McDaniel, Austin

    2007-09-01

    Remotely-fielded unattended sensor networks generally must operate at very low power--in the milliwatt or microwatt range--and thus have extremely limited communications bandwidth. Such sensors might be asleep most of the time to conserve power, waking only occasionally to transmit a few bits. RFID tags for tracking or material control have similarly tight bandwidth constraints, and emerging nanotechnology devices will be even more limited. Since transmitted data is subject to spoofing, and since sensors might be located in uncontrolled environments vulnerable to physical tampering, the high-consequence data generated by such systems must be protected by cryptographically sound authentication mechanisms; but such mechanisms are often lacking in current sensor networks. One reason for this undesirable situation is that standard authentication methods become impractical or impossible when bandwidth is severely constrained; if messages are small, a standard digital signature or HMAC will be many times larger than the message itself, yet it might be possible to spare only a few extra bits per message for security. Furthermore, the authentication tags themselves are only one part of cryptographic overhead, as key management functions (distributing, changing, and revoking keys) consume still more bandwidth. To address this problem, we have developed algorithms that provide secure authentication while adding very little communication overhead. Such techniques will make it possible to add strong cryptographic guarantees of data integrity to a much wider range of systems.

  1. Two-Factor Authentication

    Broader source: Energy.gov [DOE]

    Two-Factor Authentication (2FA) (also known as 2-Step Verification) is a system that employs two methods to identify an individual. More secure than reusable passwords, when a token's random number...

  2. International safeguards data authentication

    SciTech Connect (OSTI)

    Melton, R.B.; Smith, C.E.; DeLand, S.M.; Manatt, D.R.

    1996-07-01

    The International Safeguards community is becoming increasingly reliant on information stored in electronic form. In international monitoring and related activities it must be possible to verify and maintain the integrity of this electronic information. This paper discusses the use of data authentication technology to assist in accomplishing this task. The paper provides background information, identifies the relevance to international safeguards, discusses issues related to export controls, algorithm patents, key management and the use of commercial vs. custom software.

  3. U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection...

    Office of Environmental Management (EM)

    can inject SQL commands. A remote authenticated user can view files on the target system. ... A remote authenticated user can view files on the target system. Solution: The vendor has ...

  4. Security analysis of RSA cryptosystem algorithm and it’s properties

    SciTech Connect (OSTI)

    Liu, Chenglian; Guo, Yongning E-mail: linjuanliucaihong@qq.com; Lin, Juan E-mail: linjuanliucaihong@qq.com

    2014-10-06

    The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles to discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA.

  5. Anonymous authenticated communications

    DOE Patents [OSTI]

    Beaver, Cheryl L.; Schroeppel, Richard C.; Snyder, Lillian A.

    2007-06-19

    A method of performing electronic communications between members of a group wherein the communications are authenticated as being from a member of the group and have not been altered, comprising: generating a plurality of random numbers; distributing in a digital medium the plurality of random numbers to the members of the group; publishing a hash value of contents of the digital medium; distributing to the members of the group public-key-encrypted messages each containing a same token comprising a random number; and encrypting a message with a key generated from the token and the plurality of random numbers.

  6. CERTIFICATE OF AUTHENTICITY

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CERTIFICATE OF AUTHENTICITY I hereby certify that this transcript constitutes an accurate record of the full Council meeting of the National Coal Council held on November 14,2008 at the Westin Grand Hotel, Washington, D.C. ~ i c h a e l G. Mueller, Chair National Coal Council I NATIONAL COAL COUNCIL 1 FULL COUNCIL MEETING FRIDAY NOVEMBER 14, 2 0 0 8 The Full Council meeting convened at 9 : 0 0 a.m. in the Washington Ballroom of the Westin Grand Hotel, 2 3 5 0 M Street, NW, Washington, DC, Chair

  7. AVNG authentication features

    SciTech Connect (OSTI)

    Thron, Jonathan Louis; Mac Arthur, Duncan W; White, Greg; Razinkov, Sergey; Livke, Alexander

    2010-01-01

    Any verification measurement performed on potentially classified nuclear material must satisfy two seemingly contradictory constraints. First and foremost, no classified information can be released. At the same time, the monitoring party must have confidence in the veracity of the measurement (called authentication). An information barrier (IB) is included in the measurement system to protect the potentially classified information. To achieve both goals, the IB allows only very limited, previously agreed-on information to be displayed to the monitoring party. In addition to this limited information from the potentially classified measurement, other measurements are performed and procedures are put in place for the monitoring party to gain confidence that the material being measured is consistent with the host's declarations concerning that material. In this presentation, we will discuss the techniques used in the AVNG attribute measuring system to facilitate authentication of the verification measurements by the monitors. These techniques include measuring unclassified items while allowing more information to be displayed; having the monitor understand the system function, design, and implementation; and randomly selecting the order of measurements.

  8. Two-chip implementation of the RSA public-key encryption algorithm

    SciTech Connect (OSTI)

    Rieden, R.F.; Snyder, J.B.; Widman, R.J.; Barnard, W.J.

    1982-01-01

    A system has been developed which employs two identical integrated circuits to perform the encryption algorithm developed by Rivest, Shamir, and Adleman (RSA) on a 336-bit message. The integrated circuit used in the system employs the 3-micron polysilicon gate, radiation-hard, CMOS technology developed at Sandia National Laboratories.

  9. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Buffer Overflow Lets Remote Users Execute Arbitrary Code | Department of Energy 59: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute

  10. Authentication techniques for smart cards

    SciTech Connect (OSTI)

    Nelson, R.A.

    1994-02-01

    Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thorough understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system.

  11. RSA calibration accuracy of a fluoroscopy-based system using nonorthogonal images for measuring functional kinematics

    SciTech Connect (OSTI)

    Kedgley, Angela E.; Jenkyn, Thomas R.

    2009-07-15

    When performing radiostereometric analysis (RSA) in a clinical setting it may be desirable to orient the two imaging devices nonorthogonally to obtain the best views of an anatomical structure. In this study, a calibration frame was constructed that allowed the relative angles of fiducial and control planes to be adjusted. Precision and accuracy were quantified across multiple trials and orientations. The 90 deg. frame was always of equivalent or greater accuracy than a calibration frame with the fiducial and control planes aligned parallel to the image intensifiers. This study also showed that RSA may be performed with imaging devices at relative angles other than 90 deg. without compromising accuracy. This allows researchers greater freedom in positioning equipment.

  12. Decreased cell survival and DNA repair capacity after UVC irradiation in association with down-regulation of GRP78/BiP in human RSa cells

    SciTech Connect (OSTI)

    Zhai Ling; Kita, Kazuko . E-mail: kita@faculty.chiba-u.jp; Wano, Chieko; Wu Yuping; Sugaya, Shigeru; Suzuki, Nobuo

    2005-05-01

    In contrast to extensive studies on the roles of molecular chaperones, such as heat shock proteins, there are only a few reports about the roles of GRP78/BiP, an endoplasmic reticulum (ER) stress-induced molecular chaperone, in mammalian cell responses to DNA-damaging stresses. To investigate whether GRP78/BiP is involved in resistance to a DNA-damaging agent, UVC (principally 254 nm in wavelength), we established human cells with down-regulation of GRP78/BiP by transfection of human RSa cells with antisense cDNA for GRP78/BiP. We found that the transfected cells showed higher sensitivity to UVC-induced cell death than control cells transfected with the vector alone. In the antisense-cDNA transfected cells, the removal capacities of the two major types of UVC-damaged DNA (thymine dimers and (6-4) photoproducts) in vivo and DNA synthesis activity of whole cell extracts to repair UVC-irradiated plasmids in vitro were remarkably decreased compared with those in the control cells. Furthermore, the antisense-cDNA transfected cells also showed slightly higher sensitivity to cisplatin-induced cell death than the control cells. Cisplatin-induced DNA damage is primarily repaired by nucleotide excision repair, like UVC-induced DNA damage. The present results suggest that GRP78/BiP plays a protective role against UVC-induced cell death possibly via nucleotide excision repair, at least in the human RSa cells tested.

  13. A proposed generic authentication information element

    SciTech Connect (OSTI)

    Tarman, T.D.

    1995-08-01

    This contribution describes a proposed information element that can convey authentication information within an ATM signaling message. The design of this information element provides a large amount of flexibility to the user because it does not specify a particular signature algorithm, and it does not specify which information elements must accompany the Authentication IE in a signaling message. This allows the user to implement authenticated signaling based on her site`s security policies and performance requirements.

  14. Obfuscated authentication systems, devices, and methods

    DOE Patents [OSTI]

    Armstrong, Robert C; Hutchinson, Robert L

    2013-10-22

    Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

  15. CERTIFICATE OF AUTHENTICITY | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CERTIFICATE OF AUTHENTICITY CERTIFICATE OF AUTHENTICITY I hereby certify that this transcript constitutes an accurate record of the full Council meeting of the National Coal Council held on November 14,2008 at the Westin Grand Hotel, Washington, D.C. Tran_001.pdf CERTIFICATE OF AUTHENTICITY (4.5 MB) More Documents & Publications U.S. Offshore Wind Advanced Technology Demonstration Projects Public Meeting Transcript for Offshore Wind Demonstrations Office of Information Resources Office of

  16. CERTIFICATE OF AUTHENTICITY | Department of Energy

    Energy Savers [EERE]

    D.C. Tran001.pdf PDF icon CERTIFICATE OF AUTHENTICITY More Documents & Publications U.S. Offshore Wind Advanced Technology Demonstration Projects Public Meeting Transcript for...

  17. /ital Q/-modulation and four-wave mixing effects caused by RSA materials in a laser cavity

    SciTech Connect (OSTI)

    Zhang Tao; Yao Jianquan

    1989-04-01

    By making use of the density-matrix method, we give a unified explanation of /ital Q/-modulation and four-wave mixing effects caused by resonant saturable absorption (RSA) materials in a laser cavity. The underlying physical mechanism of the effects is expressed clearly. The theoretical calculation results agree very well with the experimental data.

  18. V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated...

  19. V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks...

  20. Instructions for using HSPD-12 Authenticated Outlook Web Access...

    Energy Savers [EERE]

    Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook...

  1. T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

  2. V-231: Cisco Identity Services Engine Discloses Authentication...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    system stores the username and password of an authenticated user within hidden ... or clickjacking attack to access the username and password of an authenticated session. ...

  3. AUTHENTICATED

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1 Contract No. 11PB-12330 AMENDMENT executed by the BONNEVILLE POWER ADMINISTRATION and PORT TOWNSEND PAPER CORPORATION This AMENDMENT to the Firm Power Sales Agreement (Agreement)...

  4. Data Authentication Demonstration for Radionuclide Stations

    SciTech Connect (OSTI)

    Harris, Mark; Herrington, Pres; Miley, Harry; Ellis, J. Edward; McKinnon, David; St. Pierre, Devon

    1999-08-03

    Data authentication is required for certification of sensor stations in the International Monitoring System (IMS). Authentication capability has been previously demonstrated for continuous waveform stations (seismic and infrasound). This paper addresses data surety for the radionuclide stations in the IMS, in particular the Radionuclide Aerosol Sampler/Analyzer (RASA) system developed by Pacific Northwest National Laboratory (PNNL). Radionuclide stations communicate data by electronic mail using formats defined in IMS 1.0, Formats and Protocols for Messages. An open message authentication standard exists, called S/MIME (Secure/Multipurpose Internet Mail Extensions), which has been proposed for use with all IMS radionuclide station message communications. This standard specifies adding a digital signature and public key certificate as a MIME attachment to the e-mail message. It is advantageous because it allows authentication to be added to all IMS 1.0 messages in a standard format and is commercially supported in e-mail software. For command and control, the RASA system uses a networked Graphical User Interface (GUI) based upon Common Object Request Broker Architecture (CORBA) communications, which requires special authentication procedures. The authors have modified the RASA system to meet CTBTO authentication guidelines, using a FORTEZZA card for authentication functions. They demonstrated signing radionuclide data messages at the RASA, then sending, receiving, and verifying the messages at a data center. They demonstrated authenticating command messages and responses from the data center GUI to the RASA. Also, the particular authentication system command to change the private/public key pair and retrieve the new public key was demonstrated. This work shows that data surety meeting IMS guidelines may be immediately applied to IMS radionuclide systems.

  5. Final report for the network authentication investigation and pilot.

    SciTech Connect (OSTI)

    Eldridge, John M.; Dautenhahn, Nathan; Miller, Marc M.; Wiener, Dallas J; Witzke, Edward L.

    2006-11-01

    New network based authentication mechanisms are beginning to be implemented in industry. This project investigated different authentication technologies to see if and how Sandia might benefit from them. It also investigated how these mechanisms can integrate with the Sandia Two-Factor Authentication Project. The results of these investigations and a network authentication path forward strategy are documented in this report.

  6. Hardware device binding and mutual authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  7. Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes

    DOE Patents [OSTI]

    Kent, Alexander Dale

    2008-09-02

    Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

  8. V-127: Samba Bug Lets Remote Authenticated Users Modify Files...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was...

  9. Kerberos authentication: The security answer for unsecured networks

    SciTech Connect (OSTI)

    Engert, D.E.

    1995-06-01

    Traditional authentication schemes do not properly address the problems encountered with today`s unsecured networks. Kerbmm developed by MIT, on the other hand is designed to operate in an open unsecured network, yet provide good authentication and security including encrypted session traffic. Basic Kerberos principles as well as experiences of the ESnet Authentication Pilot Project with Cross Realm. Authentication between four National Laboratories will also be described.

  10. Authentication of data for monitoring a comprehensive test ban treaty

    SciTech Connect (OSTI)

    Craft, R.L.; Draelos, T.J.

    1996-05-01

    The important issue of data integrity in the CTBT International Monitoring System (IMS) is discussed and a brief tutorial on data authentication techniques is offered. The utilization of data authentication as a solution to the data integrity problem is evaluated. Public key data authentication is recommended for multilateral monitoring regimes such as the CTBT. The ramifications and system considerations of applying data authentication at various locations in the IMS, or not at all, are reviewed in a data surety context. The paper concludes with a recommendation of authenticating data at all critical monitoring stations.

  11. System and method for authentication of goods

    DOE Patents [OSTI]

    Kaish, Norman; Fraser, Jay; Durst, David I.

    1999-01-01

    An authentication system comprising a medium having a plurality of elements, the elements being distinctive, detectable and disposed in an irregular pattern or having an intrinsic irregularity. Each element is characterized by a determinable attribute distinct from a two-dimensional coordinate representation of simple optical absorption or simple optical reflection intensity. An attribute and position of the plurality of elements, with respect to a positional reference is detected. A processor generates an encrypted message including at least a portion of the attribute and position of the plurality of elements. The encrypted message is recorded in physical association with the medium. The elements are preferably dichroic fibers, and the attribute is preferably a polarization or dichroic axis, which may vary over the length of a fiber. An authentication of the medium based on the encrypted message may be authenticated with a statistical tolerance, based on a vector mapping of the elements of the medium, without requiring a complete image of the medium and elements to be recorded.

  12. V-036: EMC Smarts Network Configuration Manager Database Authentication

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Bypass Vulnerability | Department of Energy 6: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability November 29, 2012 - 3:30am Addthis PROBLEM: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability PLATFORM: EMC Smarts Network Configuration Manager (NCM) all versions prior 9.1 ABSTRACT: Two vulnerabilities were reported in EMC Smarts

  13. V-231: Cisco Identity Services Engine Discloses Authentication Credentials

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to Remote Users | Department of Energy 1: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users August 30, 2013 - 3:01am Addthis PROBLEM: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials. PLATFORM: Cisco Identity Services Engine (ISE) 1.x ABSTRACT: A vulnerability was reported in Cisco Identity Services

  14. T-646: Debian fex authentication bypass | Department of Energy

    Energy Savers [EERE]

    PLATFORM: Debian fex ABSTRACT: Debian security discovered that fex, a web service for transferring very large, files, is not properly validating authentication IDs. While the ...

  15. U-084: Cisco Digital Media Manager Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port 8443 to access administrative resources and gain administrative privileges....

  16. Authenticating concealed private data while maintaining concealment

    DOE Patents [OSTI]

    Thomas, Edward V.; Draelos, Timothy J.

    2007-06-26

    A method of and system for authenticating concealed and statistically varying multi-dimensional data comprising: acquiring an initial measurement of an item, wherein the initial measurement is subject to measurement error; applying a transformation to the initial measurement to generate reference template data; acquiring a subsequent measurement of an item, wherein the subsequent measurement is subject to measurement error; applying the transformation to the subsequent measurement; and calculating a Euclidean distance metric between the transformed measurements; wherein the calculated Euclidean distance metric is identical to a Euclidean distance metric between the measurement prior to transformation.

  17. Multi-factor Authentication Update | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Multi-factor Authentication Update There is a delay in the purchase of the multi-factor authentication software solution that will cause a lag in the planned implementation. The Laboratory is currently in negotiations to complete the purchase. Once complete, the implementation can begin.

  18. Public-key data authentication for treaty verification

    SciTech Connect (OSTI)

    Draelos, T.J.; Goldsmith, S.Y.

    1992-08-01

    A public-key Treaty Data Authentication Module (TDAM) based on the National Institute of Standards and Technology (NIST) Digital Signature Standard (DSS) has been developed to support treaty verification systems. The TDAM utilizes the Motorola DSP56001 Digital Signal Processor as a coprocessor and supports both the STD Bus and PC-AT Bus platforms. The TDAM is embedded within an Authenticated Data Communication Subsystem (ADCS) which provides transparent data authentication and communications, thereby concealing the details of securely authenticating and communicating compliance data and commands. The TDAM has been designed according to the NIST security guidelines for cryptographic modules. Public-key data authentication is important for support of both bilateral and multi-lateral treaties. 8 refs.

  19. Public-key data authentication for treaty verification

    SciTech Connect (OSTI)

    Draelos, T.J.; Goldsmith, S.Y.

    1992-01-01

    A public-key Treaty Data Authentication Module (TDAM) based on the National Institute of Standards and Technology (NIST) Digital Signature Standard (DSS) has been developed to support treaty verification systems. The TDAM utilizes the Motorola DSP56001 Digital Signal Processor as a coprocessor and supports both the STD Bus and PC-AT Bus platforms. The TDAM is embedded within an Authenticated Data Communication Subsystem (ADCS) which provides transparent data authentication and communications, thereby concealing the details of securely authenticating and communicating compliance data and commands. The TDAM has been designed according to the NIST security guidelines for cryptographic modules. Public-key data authentication is important for support of both bilateral and multi-lateral treaties. 8 refs.

  20. Centralized Authentication with Kerberos 5, Part I

    SciTech Connect (OSTI)

    Wachsmann, A

    2004-06-09

    Account administration in a distributed Unix/Linux environment can become very complicated and messy if done by hand. Large sites use special tools to deal with this problem. I will describe how even very small installations like your three computer network at home can take advantage of the very same tools. The problem in a distributed environment is that password and shadow files need to be changed individually on each machine if an account change occurs. Account changes include: password change, addition/removal of accounts, name change of an account (UID/GID changes are a big problem in any case), additional or removed login privileges to a (group of) computer(s), etc. In this article, I will show how Kerberos 5 solves the authentication problem in a distributed computing environment. A second article will describe a solution for the authorization problem.

  1. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges

    Office of Energy Efficiency and Renewable Energy (EERE)

    A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system.

  2. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information

    Broader source: Energy.gov [DOE]

    Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information.

  3. Citrix_2FA_Authentication_09.09 | Department of Energy

    Energy Savers [EERE]

    More Documents & Publications Microsoft Word - Citrix2FAAuthentication1232009.doc Using Two-Factor RSA Token with WebVPN Microsoft Word - SMailSecureWeb-BasedEmailv3 ...

  4. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  5. INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS...

    Broader source: Energy.gov (indexed) [DOE]

    172013 Page 1 INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA) Outlook Web Access provides access to unencrypted email only and is suitable for use from any ...

  6. E-Labs - Learning with Authentic Data

    SciTech Connect (OSTI)

    Bardeen, Marjorie G.; Wayne, Mitchell

    2016-01-01

    the success teachers have had providing an opportunity for students to: • Organize and conduct authentic research. • Experience the environment of scientific collaborations. • Possibly make real contributions to a burgeoning scientific field. We've created projects that are problem-based, student driven and technology dependent. Students reach beyond classroom walls to explore data with other students and experts and share results, publishing original work to a worldwide audience. Students can discover and extend the research of other students, modeling the processes of modern, large-scale research projects. From start to finish e-Labs are student-led, teacher-guided projects. Students need only a Web browser to access computing techniques employed by professional researchers. A Project Map with milestones allows students to set the research plan rather than follow a step-by-step process common in other online projects. Most importantly, e-Labs build the learning experience around the students' own questions and let them use the very tools that scientists use. Students contribute to and access shared data, most derived from professional research databases. They use common analysis tools, store their work and use metadata to discover, replicate and confirm the research of others. This is where real scientific collaboration begins. Using online tools, students correspond with other research groups, post comments and questions, prepare summary reports, and in general participate in the part of scientific research that is often left out of classroom experiments. Teaching tools such as student and teacher logbooks, pre- and post-tests and an assessment rubric aligned with learner outcomes help teachers guide student work. Constraints on interface designs and administrative tools such as registration databases give teachers the "one-stop-shopping" they seek for multiple e-Labs. Teaching and administrative tools also allow us to track usage and assess the impact on

  7. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates

    Broader source: Energy.gov [DOE]

    A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases.

  8. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A ...

  9. X.509 Authentication/Authorization in FermiCloud

    SciTech Connect (OSTI)

    Kim, Hyunwoo; Timm, Steven

    2014-11-11

    We present a summary of how X.509 authentication and authorization are used with OpenNebula in FermiCloud. We also describe a history of why the X.509 authentication was needed in FermiCloud, and review X.509 authorization options, both internal and external to OpenNebula. We show how these options can be and have been used to successfully run scientific workflows on federated clouds, which include OpenNebula on FermiCloud and Amazon Web Services as well as other community clouds. We also outline federation options being used by other commercial and open-source clouds and cloud research projects.

  10. Proposed DSS-specific fields for the generic authentication information element

    SciTech Connect (OSTI)

    Tarman, T.D.

    1995-08-06

    This contribution proposes the format of the ``Algorithm-Specific Information`` and ``Signature`` fields within the ``Proposed Generic Authentication Information Element`` for authentication IEs based on the Digital Signature Standard (DSS). These fields are designed to allow various levels of authentication ``strength`` (or robustness), and many of these fields may be omitted in systems that optimize authentication performance by sharing common (public) Digital Signature Algorithm (DSA) parameters. This allows users and site security officers to design their authenticated signaling according to site security and performance requirements.

  11. Defining the questions: a research agenda for nontraditional authentication in arms control

    SciTech Connect (OSTI)

    Hauck, Danielle K; Mac Arthur, Duncan W; Smith, Morag K; Thron, Jonathan L; Budlong - Sylvester, Kory

    2010-01-01

    Many traditional authentication techniques have been based on hardware solutions. Thus authentication of measurement system hardware has been considered in terms of physical inspection and destructive analysis. Software authentication has implied hash function analysis or authentication tools such as Rose. Continuity of knowledge is maintained through TIDs and cameras. Although there is ongoing progress improving all of these authentication methods, there has been little discussion of the human factors involved in authentication. Issues of non-traditional authentication include sleight-of-hand substitutions, monitor perception vs. reality, and visual diversions. Since monitor confidence in a measurement system depends on the product of their confidences in each authentication element, it is important to investigate all authentication techniques, including the human factors. This paper will present an initial effort to identify the most important problems that traditional authentication approaches in safeguards have not addressed and are especially relevant to arms control verification. This will include a survey of the literature and direct engagement with nontraditional experts in areas like psychology and human factors. Based on the identification of problem areas, potential research areas will be identified and a possible research agenda will be developed.

  12. Hardware device to physical structure binding and authentication

    DOE Patents [OSTI]

    Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

    2013-08-20

    Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

  13. Simultaneous Authentication and Certification of Arms-Control Measurement Systems

    SciTech Connect (OSTI)

    MacArthur, Duncan W. [Los Alamos National Laboratory; Hauck, Danielle K. [Los Alamos National Laboratory; Thron, Jonathan L. [Los Alamos National Laboratory

    2012-07-09

    Most arms-control-treaty-monitoring scenarios involve a host party that makes a declaration regarding its nuclear material or items and a monitoring party that verifies that declaration. A verification system developed for such a use needs to be trusted by both parties. The first concern, primarily from the host party's point of view, is that any sensitive information that is collected must be protected without interfering in the efficient operation of the facility being monitored. This concern is addressed in what can be termed a 'certification' process. The second concern, of particular interest to the monitoring party, is that it must be possible to confirm the veracity of both the measurement system and the data produced by this measurement system. The monitoring party addresses these issues during an 'authentication' process. Addressing either one of these concerns independently is relatively straightforward. However, it is more difficult to simultaneously satisfy host party certification concerns and monitoring party authentication concerns. Typically, both parties will want the final access to the measurement system. We will describe an alternative approach that allows both parties to gain confidence simultaneously. This approach starts with (1) joint development of the measurement system followed by (2) host certification of several copies of the system and (3) random selection by the inspecting party of one copy to be use during the monitoring visit and one (or more) copy(s) to be returned to the inspecting party's facilities for (4) further hardware authentication; any remaining copies are stored under joint seal for use as spares. Following this process, the parties will jointly (5) perform functional testing on the selected measurement system and then (6) use this system during the monitoring visit. Steps (1) and (2) assure the host party as to the certification of whichever system is eventually used in the monitoring visit. Steps (1), (3), (4), and (5

  14. Authenticated group Diffie-Hellman key exchange: theory and practice

    SciTech Connect (OSTI)

    Chevassut, Olivier

    2002-10-03

    Authenticated two-party Diffie-Hellman key exchange allows two principals A and B, communicating over a public network, and each holding a pair of matching public/private keys to agree on a session key. Protocols designed to deal with this problem ensure A (B resp.)that no other principals aside from B (A resp.) can learn any information about this value. These protocols additionally often ensure A and B that their respective partner has actually computed the shared secret value. A natural extension to the above cryptographic protocol problem is to consider a pool of principals agreeing on a session key. Over the years several papers have extended the two-party Diffie-Hellman key exchange to the multi-party setting but no formal treatments were carried out till recently. In light of recent developments in the formalization of the authenticated two-party Diffie-Hellman key exchange we have in this thesis laid out the authenticated group Diffie-Hellman key exchange on firmer foundations.

  15. Provably Secure Password-based Authentication in TLS

    SciTech Connect (OSTI)

    Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier; Moeller,Bodo; Pointcheval, David

    2005-12-20

    In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised to the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.

  16. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  17. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael; Klatt, Leon N.

    2000-01-01

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

  18. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael; Klatt, Leon N.

    2001-01-01

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters, the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided&

  19. STEM Mentoring Café- Engaging Young Women in an Authentic Mentoring...

    Office of Environmental Management (EM)

    STEM Mentoring Caf- Engaging Young Women in an Authentic Mentoring Experience Melinda Higgins Albert Einstein Distinguished Educator Fellow, NASA Office of Education, ...

  20. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Password | Department of Energy 5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in OpenLDAP. A remote user can authenticate without a valid password. PLATFORM: Open LDAP version(s) 2.4.12 - 2.2.24 ABSTRACT: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password. reference LINKS: SecurityTracker

  1. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  2. Hydroxypyridonate chelating agents

    DOE Patents [OSTI]

    Raymond, Kenneth N.; Scarrow, Robert C.; White, David L.

    1987-01-01

    Chelating agents having 1-hydroxy-2-pyridinone (HOPO) and related moieties incorporated within their structures, including polydentate HOPO-substituted polyamines such as spermidine and spermine, and HOPO-substituted desferrioxamine. The chelating agents are useful in selectively removing certain cations from solution, and are particularly useful as ferric ion and actinide chelators. Novel syntheses of the chelating agents are provided.

  3. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  4. Holographic Labeling And Reading Machine For Authentication And Security Appications

    DOE Patents [OSTI]

    Weber, David C.; Trolinger, James D.

    1999-07-06

    A holographic security label and automated reading machine for marking and subsequently authenticating any object such as an identification badge, a pass, a ticket, a manufactured part, or a package is described. The security label is extremely difficult to copy or even to read by unauthorized persons. The system comprises a holographic security label that has been created with a coded reference wave, whose specification can be kept secret. The label contains information that can be extracted only with the coded reference wave, which is derived from a holographic key, which restricts access of the information to only the possessor of the key. A reading machine accesses the information contained in the label and compares it with data stored in the machine through the application of a joint transform correlator, which is also equipped with a reference hologram that adds additional security to the procedure.

  5. Standard Agent Framework 1

    Energy Science and Technology Software Center (OSTI)

    1999-04-06

    The Standard Agent framework provides an extensible object-oriented development environment suitable for use in both research and applications projects. The SAF provides a means for constructing and customizing multi-agent systems through specialization of standard base classes (architecture-driven framework) and by composition of component classes (data driven framework). The standard agent system is implemented as an extensible object-centerd framework. Four concrete base classes are developed: (1) Standard Agency; (2) Standard Agent; (3) Human Factor, and (4)more » Resources. The object-centered framework developed and utilized provides the best comprimise between generality and flexibility available in agent development systems today.« less

  6. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 7: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory

  7. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 57: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis December 28 2012 - 6:00am PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions.

  8. V-236: MediaWiki CentralAuth Extension Authentication Bypass...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The vulnerability is caused due to an error when handling auto-logins and can be exploited to bypass the authentication mechanism by providing a valid username within the ...

  9. AUTHENTICATED SENSOR INTERFACE DEVICE FOR JOINT USE SAFEGUARDS APPLICATIONS - CONCEPTS AND CHALLENGES

    SciTech Connect (OSTI)

    Poland, R.; Drayer, R.; Wilson, J.

    2013-08-12

    This paper will discuss the key features of the Authenticated Sensor Interface Device that collectively provide the ability to share data among a number of parties while ensuring the authentication of data and protecting both the operator’s and the IAEA’s interests. The paper will also discuss the development of the prototype, the initial testing with an accountancy scale, and future plans and challenges to implementation into the joint use and remote monitoring applications. As nuclear fuel cycle technology becomes more prevalent throughout the world and the capacity of plants increases, limited resources of the IAEA are being stretched near a breaking point. A strategy is to increase efficiency in safeguards monitoring using “joint use” equipment that will provide the facility operator process data while also providing the IAEA key safeguards data. The data, however, must be authenticated and validated to ensure the data have not been tampered with. The Authenticated Sensor Interface Device provides the capability to share data and can be a valuable component in the IAEA’s ability to collect accountancy data from scales in Uranium conversion and enrichment plants, as well as nuclear fuel fabrication plants. Likewise, the Authenticated Sensor Interface Device can be configured to accept a diverse array of input signals, ranging from analog voltage, to current, to digital interfaces and more. These modular capabilities provide the ability to collect authenticated, joint-use, data streams from various process monitoring sensors.

  10. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

  11. MpcAgent

    Energy Science and Technology Software Center (OSTI)

    2013-11-29

    MpcAgent software is a module for the VolltronLite platform from PNNL that regulates the operation of rooftop air conditioning units in small to medium commercial buildings for the purpose of reducing peak power consumption. The MpcAgent accomplishes this by restricting the number of units that may operate simultaneously and using a model predictive control strategy to select which units to operate in each control period. The outcome of this control is effective control of themore » building air temperature at the user specified set point while avoiding expensive peak demand charges that result from running all HVAC units simultaneously.« less

  12. Novel Authentication of Monitoring Data Through the use of Secret and Public Cryptographic Keys

    SciTech Connect (OSTI)

    Benz, Jacob M.; Tolk, Keith; Tanner, Jennifer E.

    2014-07-21

    The Office of Nuclear Verification (ONV) is supporting the development of a piece of equipment to provide data authentication and protection for a suite of monitoring sensors as part of a larger effort to create an arms control technology toolkit. This device, currently called the Red Box, leverages the strengths of both secret and public cryptographic keys to authenticate, digitally sign, and pass along monitoring data to allow for host review, and redaction if necessary, without the loss of confidence in the authenticity of the data by the monitoring party. The design of the Red Box will allow for the addition and removal of monitoring equipment and can also verify that the data was collected by authentic monitoring equipment prior to signing the data and sending it to the host and for review. The host will then forward the data to the monitor for review and inspection. This paper will highlight the progress to date of the Red Box development, and will explain the novel method of leveraging both symmetric and asymmetric (secret and public key) cryptography to authenticate data within a warhead monitoring regime.

  13. Surface polymerization agents

    SciTech Connect (OSTI)

    Taylor, C.; Wilkerson, C.

    1996-12-01

    This is the final report of a 1-year, Laboratory-Directed R&D project at LANL. A joint technical demonstration was proposed between US Army Missile Command (Redstone Arsenal) and LANL. Objective was to demonstrate that an unmanned vehicle or missile could be used as a platform to deliver a surface polymerization agent in such a manner as to obstruct the filters of an air-breathing mechanism, resulting in operational failure.

  14. Rigid bifunctional chelating agents

    DOE Patents [OSTI]

    Sweet, Mark P. (Coram, NY); Mease, Ronnie C. (Fairfax, VA); Srivastava, Suresh C. (Setauket, NY)

    1998-07-21

    Bicyclo›2.2.2! octane-2,3 diamine-N,N,N',N'-tetraacetic acids (BODTA) and bicyclo›2.2.1! heptane-2,3 diamine-N,N,N',N'-tetraacetic acid (BHDTA) are chelating agents useful in forming detectably labeled bioconjugate compounds for diagnostic and therapeutic purposes. New compounds and processes of forming BODTA and BHDTA are disclosed. Radioimmunoconjugates of the present invention show high and prolonged tumor uptake with low normal tissue uptakes.

  15. Rigid bifunctional chelating agents

    DOE Patents [OSTI]

    Sweet, M.P.; Mease, R.C.; Srivastava, S.C.

    1998-07-21

    Bicyclo[2.2.2] octane-2,3 diamine-N,N,N`,N`-tetraacetic acids (BODTA) and bicyclo[2.2.1] heptane-2,3 diamine-N,N,N`,N`-tetraacetic acid (BHDTA) are chelating agents useful in forming detectably labeled bioconjugate compounds for diagnostic and therapeutic purposes. New compounds and processes of forming BODTA and BHDTA are disclosed. Radioimmunoconjugates of the present invention show high and prolonged tumor uptake with low normal tissue uptakes.

  16. Rigid bifunctional chelating agents

    DOE Patents [OSTI]

    Sweet, Mark P.; Mease, Ronnie C.; Srivastava, Suresh C.

    1998-07-21

    Bicyclo›2.2.2! octane-2,3 diamine-N,N,N',N'-tetraacetic acids (BODTA) and bicyclo›2.2.1! heptane-2,3 diamine-N,N,N',N'-tetraacetic acid (BHDTA) are chelating agents useful in forming detectably labeled bioconjugate compounds for diagnostic and therapeutic purposes. New compounds and processes of forming BODTA and BHDTA are disclosed. Radioimmunoconjugates of the present invention show high and prolonged tumor uptake with low normal tissue uptakes.

  17. Rigid bifunctional chelating agents

    DOE Patents [OSTI]

    Sweet, Mark P.; Mease, Ronnie C.; Srivastava, Suresh C.

    2000-02-08

    Bicyclo[2.2.2]octane-2,3 diamine-N,N,N',N'-tetraacetic acids (BODTA) and bicyclo[2.2.1]heptane-2,3 diamine-N,N,N',N'-tetraacetic acid (BHDTA) are chelating agents useful in forming detectably labeled bioconjugate compounds for diagnostic and therapeutic purposes. New compounds and processes of forming BODTA and BHDTA are disclosed. Radioimmunoconjugates of the present invention show high and prolonged tumor uptake with low normal tissue uptakes.

  18. V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 6: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability September 6, 2013 - 4:36am Addthis PROBLEM: A vulnerability has been reported in the CentralAuth extension for MediaWiki, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: MediaWiki CentralAuth Extension ABSTRACT: A vulnerability has been reported in the CentralAuth extension for

  19. Liposome encapsulation of chelating agents

    DOE Patents [OSTI]

    Rahman, Yueh Erh

    1976-01-13

    A method for transferring a chelating agent across a cellular membrane by encapsulating the charged chelating agent within liposomes and carrying the liposome-encapsulated chelating agent to the cellular membrane where the liposomes containing the chelating agent will be taken up by the cells, thereby transferring the chelating agent across the cellular membrane. A chelating agent can be introduced into the interior of a cell of a living organism wherein the liposomes will be decomposed, releasing the chelating agent to the interior of the cell. The released chelating agent will complex intracellularly deposited toxic heavy metals, permitting the more soluble metal complex to transfer across the cellular membrane from the cell and subsequently be removed from the living organism.

  20. Hydroxypyridonate and hydroxypyrimidinone chelating agents

    DOE Patents [OSTI]

    Raymond, Kenneth N.; Doble, Daniel M.; Sunderland, Christopher J.; Thompson, Marlon

    2005-01-25

    The present invention provides hydroxypyridinone and hydroxypyrimidone chelating agents. Also provides are Gd(III) complexes of these agents, which are useful as contrast enhancing agents for magnetic resonance imaging. The invention also provides methods of preparing the compounds of the invention, as well as methods of using the compounds in magnetic resonance imaging applications.

  1. Flexible, secure agent development framework

    DOE Patents [OSTI]

    Goldsmith; Steven Y.

    2009-04-07

    While an agent generator is generating an intelligent agent, it can also evaluate the data processing platform on which it is executing, in order to assess a risk factor associated with operation of the agent generator on the data processing platform. The agent generator can retrieve from a location external to the data processing platform an open site that is configurable by the user, and load the open site into an agent substrate, thereby creating a development agent with code development capabilities. While an intelligent agent is executing a functional program on a data processing platform, it can also evaluate the data processing platform to assess a risk factor associated with performing the data processing function on the data processing platform.

  2. Plasmids encoding therapeutic agents

    DOE Patents [OSTI]

    Keener, William K.

    2007-08-07

    Plasmids encoding anti-HIV and anti-anthrax therapeutic agents are disclosed. Plasmid pWKK-500 encodes a fusion protein containing DP178 as a targeting moiety, the ricin A chain, an HIV protease cleavable linker, and a truncated ricin B chain. N-terminal extensions of the fusion protein include the maltose binding protein and a Factor Xa protease site. C-terminal extensions include a hydrophobic linker, an L domain motif peptide, a KDEL ER retention signal, another Factor Xa protease site, an out-of-frame buforin II coding sequence, the lacZ.alpha. peptide, and a polyhistidine tag. More than twenty derivatives of plasmid pWKK-500 are described. Plasmids pWKK-700 and pWKK-800 are similar to pWKK-500 wherein the DP178-encoding sequence is substituted by RANTES- and SDF-1-encoding sequences, respectively. Plasmid pWKK-900 is similar to pWKK-500 wherein the HIV protease cleavable linker is substituted by a lethal factor (LF) peptide-cleavable linker.

  3. Provably-Secure Authenticated Group Diffie-Hellman KeyExchange

    SciTech Connect (OSTI)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2007-01-01

    Authenticated key exchange protocols allow two participantsA and B, communicating over a public network and each holding anauthentication means, to exchange a shared secret value. Methods designedto deal with this cryptographic problem ensure A (resp. B) that no otherparticipants aside from B (resp. A) can learn any information about theagreed value, and often also ensure A and B that their respective partnerhas actually computed this value. A natural extension to thiscryptographic method is to consider a pool of participants exchanging ashared secret value and to provide a formal treatment for it. Startingfrom the famous 2-party Diffie-Hellman (DH) key exchange protocol, andfrom its authenticated variants, security experts have extended it to themulti-party setting for over a decade and completed a formal analysis inthe framework of modern cryptography in the past few years. The presentpaper synthesizes this body of work on the provably-secure authenticatedgroup DH key exchange.

  4. Integrating end-to-end encryption and authentication technology into broadband networks

    SciTech Connect (OSTI)

    Pierson, L.G.

    1995-11-01

    BISDN services will involve the integration of high speed data, voice, and video functionality delivered via technology similar to Asynchronous Transfer Mode (ATM) switching and SONET optical transmission systems. Customers of BISDN services may need a variety of data authenticity and privacy assurances, via Asynchronous Transfer Mode (ATM) services Cryptographic methods can be used to assure authenticity and privacy, but are hard to scale for implementation at high speed. The incorporation of these methods into computer networks can severely impact functionality, reliability, and performance. While there are many design issues associated with the serving of public keys for authenticated signaling and for establishment of session cryptovariables, this paper is concerned with the impact of encryption itself on such communications once the signaling and setup have been completed. Network security protections should be carefully matched to the threats against which protection is desired. Even after eliminating unnecessary protections, the remaining customer-required network security protections can impose severe performance penalties. These penalties (further discussed below) usually involve increased communication processing for authentication or encryption, increased error rate, increased communication delay, and decreased reliability/availability. Protection measures involving encryption should be carefully engineered so as to impose the least performance, reliability, and functionality penalties, while achieving the required security protection. To study these trade-offs, a prototype encryptor/decryptor was developed. This effort demonstrated the viability of implementing certain encryption techniques in high speed networks. The research prototype processes ATM cells in a SONET OC-3 payload. This paper describes the functionality, reliability, security, and performance design trade-offs investigated with the prototype.

  5. Designing a minimum-functionality neutron and gamma measurement instrument with a focus on authentication

    SciTech Connect (OSTI)

    Karpius, Peter J; Williams, Richard B

    2009-01-01

    During the design and construction of the Next-Generation Attribute-Measurement System, which included a largely commercial off-the-shelf (COTS), nondestructive assay (NDA) system, we realized that commercial NDA equipment tends to include numerous features that are not required for an attribute-measurement system. Authentication of the hardware, firmware, and software in these instruments is still required, even for those features not used in this application. However, such a process adds to the complexity, cost, and time required for authentication. To avoid these added authenticat ion difficulties, we began to design NDA systems capable of performing neutron multiplicity and gamma-ray spectrometry measurements by using simplified hardware and software that avoids unused features and complexity. This paper discusses one possible approach to this design: A hardware-centric system that attempts to perform signal analysis as much as possible in the hardware. Simpler processors and minimal firmware are used because computational requirements are kept to a bare minimum. By hard-coding the majority of the device's operational parameters, we could cull large sections of flexible, configurable hardware and software found in COTS instruments, thus yielding a functional core that is more straightforward to authenticate.

  6. Agent Communications using Distributed Metaobjects

    SciTech Connect (OSTI)

    Goldsmith, Steven Y.; Spires, Shannon V.

    1999-06-10

    There are currently two proposed standards for agent communication languages, namely, KQML (Finin, Lobrou, and Mayfield 1994) and the FIPA ACL. Neither standard has yet achieved primacy, and neither has been evaluated extensively in an open environment such as the Internet. It seems prudent therefore to design a general-purpose agent communications facility for new agent architectures that is flexible yet provides an architecture that accepts many different specializations. In this paper we exhibit the salient features of an agent communications architecture based on distributed metaobjects. This architecture captures design commitments at a metaobject level, leaving the base-level design and implementation up to the agent developer. The scope of the metamodel is broad enough to accommodate many different communication protocols, interaction protocols, and knowledge sharing regimes through extensions to the metaobject framework. We conclude that with a powerful distributed object substrate that supports metaobject communications, a general framework can be developed that will effectively enable different approaches to agent communications in the same agent system. We have implemented a KQML-based communications protocol and have several special-purpose interaction protocols under development.

  7. Nuclear magnetic resonance contrast agents

    DOE Patents [OSTI]

    Smith, P.H.; Brainard, J.R.; Jarvinen, G.D.; Ryan, R.R.

    1997-12-30

    A family of contrast agents for use in magnetic resonance imaging and a method of enhancing the contrast of magnetic resonance images of an object by incorporating a contrast agent of this invention into the object prior to forming the images or during formation of the images. A contrast agent of this invention is a paramagnetic lanthanide hexaazamacrocyclic molecule, where a basic example has the formula LnC{sub 16}H{sub 14}N{sub 6}. Important applications of the invention are in medical diagnosis, treatment, and research, where images of portions of a human body are formed by means of magnetic resonance techniques. 10 figs.

  8. Nuclear magnetic resonance contrast agents

    DOE Patents [OSTI]

    Smith, Paul H.; Brainard, James R.; Jarvinen, Gordon D.; Ryan, Robert R.

    1997-01-01

    A family of contrast agents for use in magnetic resonance imaging and a method of enhancing the contrast of magnetic resonance images of an object by incorporating a contrast agent of this invention into the object prior to forming the images or during formation of the images. A contrast agent of this invention is a paramagnetic lanthanide hexaazamacrocyclic molecule, where a basic example has the formula LnC.sub.16 H.sub.14 N.sub.6. Important applications of the invention are in medical diagnosis, treatment, and research, where images of portions of a human body are formed by means of magnetic resonance techniques.

  9. Triggered pore-forming agents

    DOE Patents [OSTI]

    Bayley, Hagan; Walker, Barbara J.; Chang, Chung-yu; Niblack, Brett; Panchal, Rekha

    1998-01-01

    An inactive pore-forming agent which is activated to lytic function by a condition such as pH, light, heat, reducing potential, or metal ion concentration, or substance such as a protease, at the surface of a cell.

  10. Business Models Guide: Real Estate Agent

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    BUSINESS MODELS GUIDE - Real Estate Agent REAL ESTATE AGENT A real estate agent acts as an intermediary for the sale and purchase of buildings and land. "Realtor ® " is a trademarked term for real estate agents affiliated with the National Association of Realtors (NAR). Most agents and brokers are active in the residential market, but some specialize in commercial or agricultural properties. Only licensed brokers are allowed to sell properties, so they often sponsor real estate agents

  11. Agent review phase one report.

    SciTech Connect (OSTI)

    Zubelewicz, Alex Tadeusz; Davis, Christopher Edward; Bauer, Travis LaDell

    2009-12-01

    This report summarizes the findings for phase one of the agent review and discusses the review methods and results. The phase one review identified a short list of agent systems that would prove most useful in the service architecture of an information management, analysis, and retrieval system. Reviewers evaluated open-source and commercial multi-agent systems and scored them based upon viability, uniqueness, ease of development, ease of deployment, and ease of integration with other products. Based on these criteria, reviewers identified the ten most appropriate systems. The report also mentions several systems that reviewers deemed noteworthy for the ideas they implement, even if those systems are not the best choices for information management purposes.

  12. Nucleotide cleaving agents and method

    DOE Patents [OSTI]

    Que, Jr., Lawrence; Hanson, Richard S.; Schnaith, Leah M. T.

    2000-01-01

    The present invention provides a unique series of nucleotide cleaving agents and a method for cleaving a nucleotide sequence, whether single-stranded or double-stranded DNA or RNA, using and a cationic metal complex having at least one polydentate ligand to cleave the nucleotide sequence phosphate backbone to yield a hydroxyl end and a phosphate end.

  13. Triggered pore-forming agents

    DOE Patents [OSTI]

    Bayley, H.; Walker, B.J.; Chang, C.Y.; Niblack, B.; Panchal, R.

    1998-07-07

    An inactive pore-forming agent is revealed which is activated to lytic function by a condition such as pH, light, heat, reducing potential, or metal ion concentration, or substance such as a protease, at the surface of a cell. 30 figs.

  14. Limonene and tetrahydrofurfuryl alcohol cleaning agent

    DOE Patents [OSTI]

    Bohnert, George W.; Carter, Richard D.; Hand, Thomas E.; Powers, Michael T.

    1996-05-07

    The present invention is a tetrahydrofurfuryl alcohol and limonene or terpineol cleaning agent and method for formulating and/or using the cleaning agent. This cleaning agent effectively removes both polar and nonpolar contaminants from various electrical and mechanical parts and is readily used without surfactants, thereby reducing the need for additional cleaning operations. The cleaning agent is warm water rinsable without the use of surfactants. The cleaning agent can be azeotropic, enhancing ease of use in cleaning operations and ease of recycling.

  15. Limonene and tetrahydrofurfurly alcohol cleaning agent

    DOE Patents [OSTI]

    Bohnert, George W.; Carter, Richard D.; Hand, Thomas E.; Powers, Michael T.

    1997-10-21

    The present invention is a tetrahydrofurfuryl alcohol and limonene cleaning agent and method for formulating and/or using the cleaning agent. This cleaning agent effectively removes both polar and nonpolar contaminants from various electrical and mechanical parts and is readily used without surfactants, thereby reducing the need for additional cleaning operations. The cleaning agent is warm water rinsable without the use of surfactants. The cleaning agent can be azeotropic, enhancing ease of use in cleaning operations and ease of recycling.

  16. Limonene and tetrahydrofurfuryl alcohol cleaning agent

    DOE Patents [OSTI]

    Bohnert, G.W.; Carter, R.D.; Hand, T.E.; Powers, M.T.

    1997-10-21

    The present invention is a tetrahydrofurfuryl alcohol and limonene cleaning agent and method for formulating and/or using the cleaning agent. This cleaning agent effectively removes both polar and nonpolar contaminants from various electrical and mechanical parts and is readily used without surfactants, thereby reducing the need for additional cleaning operations. The cleaning agent is warm water rinsable without the use of surfactants. The cleaning agent can be azeotropic, enhancing ease of use in cleaning operations and ease of recycling.

  17. Using regulations.gov to find dockets and documents

    Office of Environmental Management (EM)

    Using Two-Factor RSA Token with WebVPN Using Two-Factor RSA Token with WebVPN Your RSA token is used to esbablish a connection to the Internet and connect to https://connect.doe.gov . Using-TwoFactorRSA-Token w VPN.pdf (469 KB) More Documents & Publications Instructions for WebVPN Connectivity Citrix_2FA_Authentication_09.09 Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc of Energy

    Using Weather Data to Improve Capacity of Existing Power Lines Using Weather Data to Improve

  18. Learning other agents` preferences in multiagent negotiation

    SciTech Connect (OSTI)

    Bui, H.H.; Kieronska, D.; Venkatesh, S.

    1996-12-31

    In multiagent systems, an agent does not usually have complete information about the preferences and decision making processes of other agents. This might prevent the agents from making coordinated choices, purely due to their ignorance of what others want. This paper describes the integration of a learning module into a communication-intensive negotiating agent architecture. The learning module gives the agents the ability to learn about other agents` preferences via past interactions. Over time, the agents can incrementally update their models of other agents` preferences and use them to make better coordinated decisions. Combining both communication and learning, as two complement knowledge acquisition methods, helps to reduce the amount of communication needed on average, and is justified in situations where communication is computationally costly or simply not desirable (e.g. to preserve the individual privacy).

  19. Chelating agents for technetium-99M

    DOE Patents [OSTI]

    Fritzberg, A.R.; Kasina, S.

    1987-06-02

    The present invention relates to a novel family of Technetium chelating agents (ligands) based upon amide and mercaptide donor groups.

  20. Chelating agents for technetium-99M

    DOE Patents [OSTI]

    Fritzberg, Alan R.; Kasina, Sudhakar

    1987-01-01

    The present invention relates to a novel family of Technetium chelating agents (ligands) based upon amide and mercaptide donor groups.

  1. Extinguishing agent for combustible metal fires

    DOE Patents [OSTI]

    Riley, John F.; Stauffer, Edgar Eugene

    1976-10-12

    A low chloride extinguishing agent for combustible metal fires comprising from substantially 75 to substantially 94 weight percent of sodium carbonate as the basic fire extinguishing material, from substantially 1 to substantially 5 weight percent of a water-repellent agent such as a metal stearate, from substantially 2 to substantially 10 weight percent of a flow promoting agent such as attapulgus clay, and from substantially 3 to substantially 15 weight percent of a polyamide resin as a crusting agent.

  2. Agent-based Infrastructure Interdependency Model

    Energy Science and Technology Software Center (OSTI)

    2003-10-01

    The software is used to analyze infrastructure interdependencies. Agent-based modeling is used for the analysis.

  3. Agent-based modeling of complex infrastructures

    SciTech Connect (OSTI)

    North, M. J.

    2001-06-01

    Complex Adaptive Systems (CAS) can be applied to investigate complex infrastructures and infrastructure interdependencies. The CAS model agents within the Spot Market Agent Research Tool (SMART) and Flexible Agent Simulation Toolkit (FAST) allow investigation of the electric power infrastructure, the natural gas infrastructure and their interdependencies.

  4. Radioactive scanning agents with hydroquinone stabilizer

    SciTech Connect (OSTI)

    Whitehouse, H.S.

    1980-10-21

    Stable compositions, useful as technetium-99m-based scintigraphic agents, comprise hydroquinone in combination with a pertechnetate reducing agent or dissolved in pertechnetate-99m (99mtco4-) solution. The compositions are especially useful in combination with a phosphate or phosphonate material which carries the radionuclide to bone, thus providing a skeletal imaging agent.

  5. Hydroxypyridonate chelating agents and synthesis thereof

    DOE Patents [OSTI]

    Raymond, K.N.; Scarrow, R.C.; White, D.L.

    1985-11-12

    Chelating agents having 1-hydroxy-2-pyridinone (HOPO) and related moieties incorporated within their structures, including polydentate HOPO-substituted polyamines such as spermidine and spermine, and HOPO-substituted desferrioxamine. The chelating agents are useful in selectively removing certain cations from solution, and are particularly useful as ferric ion and actinide chelators. Novel syntheses of the chelating agents are provided. 4 tabs.

  6. Method For Detecting Biological Agents

    DOE Patents [OSTI]

    Chen, Liaohai; McBranch, Duncan W.; Wang, Hsing-Lin; Whitten, David G.

    2005-12-27

    A sensor is provided including a polymer capable of having an alterable measurable property from the group of luminescence and electrical conductivity, the polymer having an intermediate combination of a recognition element, a tethering element and a property-altering element bound thereto and capable of altering the measurable property, the intermediate combination adapted for subsequent separation from the polymer upon exposure to an agent having an affinity for binding to the recognition element whereupon the separation of the intermediate combination from the polymer results in a detectable change in the alterable measurable property, and, detecting said detectable change in the alterable measurable property.

  7. T-570: HP Security Bulletin- HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass.

  8. A Framework for Federated Two-Factor Authentication Enabling Cost-Effective Secure Access to Distributed Cyberinfrastructure

    SciTech Connect (OSTI)

    Ezell, Matthew A; Rogers, Gary L; Peterson, Gregory D.

    2012-01-01

    As cyber attacks become increasingly sophisticated, the security measures used to mitigate the risks must also increase in sophistication. One time password (OTP) systems provide strong authentication because security credentials are not reusable, thus thwarting credential replay attacks. The credential changes regularly, making brute-force attacks significantly more difficult. In high performance computing, end users may require access to resources housed at several different service provider locations. The ability to share a strong token between multiple computing resources reduces cost and complexity. The National Science Foundation (NSF) Extreme Science and Engineering Discovery Environment (XSEDE) provides access to digital resources, including supercomputers, data resources, and software tools. XSEDE will offer centralized strong authentication for services amongst service providers that leverage their own user databases and security profiles. This work implements a scalable framework built on standards to provide federated secure access to distributed cyberinfrastructure.

  9. A New Understanding of Chemical Agent Release

    SciTech Connect (OSTI)

    Nakafuji, G; Greenman, R; Theofanous, T

    2002-07-24

    The evolution of thickened chemical agent released at supersonic velocities, due to a missile defense intercept or a properly functioning warhead, has been misunderstood. Current and historical experimental and modeling efforts have attributed agent breakup to a variety of droplet breakup mechanisms. According to this model, drops of agent fragment into subsequent generations of smaller drops until a stable drop size is reached. Recent experimental data conducted in a supersonic wind tunnel show that agent breakup is not driven by any droplet breakup mechanism. The breakup of agent is instead governed by viscoelastic behavior and aerodynamic history effects. This viscoelastic breakup mechanism results in the formation of threads and sheets of liquid, instead of drops. The evolution and final state of agent released has broad implications not only for aerobreakup models, but also for all atmospheric dispersion models.

  10. Building Agent Software - Energy Innovation Portal

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Analysis Energy Analysis Find More Like This Return to Search Building Agent Software Occupancy Feedback for Building Controls National Renewable Energy Laboratory Contact NREL About This Technology Publications: PDF Document Publication Progress on Enabling an Interactive Conversation Between Commercial Building Occupants and Their Building To Improve Comfort and Energy Efficiency (948 KB) <p> Building Agent System Architecture</p> Building Agent System Architecture <p>

  11. MRI contrast agents and high-throughput screening by MRI

    DOE Patents [OSTI]

    Lu, Yi; Yigit, Mehmet Veysel; Mazumdar, Debapriya

    2013-10-29

    The present invention provides an MRI contrast agent, comprising: MRI contrast agent particles, and oligonucleotides, attached to the particles.

  12. Oak Ridge Mobile Agent Community (ORMAC)

    Energy Science and Technology Software Center (OSTI)

    2003-06-30

    The Oak Ridge Mobile Agent Community (ORMAC) framework software facilitates the execution of a collection of mobile software agents across a heterogeneous collection of computer systems. ORMAC provides the software agents with the ability to communicate with each other in a synchronous and asynchronous manner. Also, ORMAC allows the software agents to move to any computer system in the community and continue execution there. ORMAC is intended to aid programmers in solving a very generalmore » set of distributed software problems.« less

  13. Assurance in Agent-Based Systems

    SciTech Connect (OSTI)

    Gilliom, Laura R.; Goldsmith, Steven Y.

    1999-05-10

    Our vision of the future of information systems is one that includes engineered collectives of software agents which are situated in an environment over years and which increasingly improve the performance of the overall system of which they are a part. At a minimum, the movement of agent and multi-agent technology into National Security applications, including their use in information assurance, is apparent today. The use of deliberative, autonomous agents in high-consequence/high-security applications will require a commensurate level of protection and confidence in the predictability of system-level behavior. At Sandia National Laboratories, we have defined and are addressing a research agenda that integrates the surety (safety, security, and reliability) into agent-based systems at a deep level. Surety is addressed at multiple levels: The integrity of individual agents must be protected by addressing potential failure modes and vulnerabilities to malevolent threats. Providing for the surety of the collective requires attention to communications surety issues and mechanisms for identifying and working with trusted collaborators. At the highest level, using agent-based collectives within a large-scale distributed system requires the development of principled design methods to deliver the desired emergent performance or surety characteristics. This position paper will outline the research directions underway at Sandia, will discuss relevant work being performed elsewhere, and will report progress to date toward assurance in agent-based systems.

  14. Natural chelating agents for radionuclide decorporation

    DOE Patents [OSTI]

    Premuzic, E.T.

    1985-06-11

    This invention relates to the production of metal-binding compounds useful for the therapy of heavy metal poisoning, for biological mining and for decorporation of radionuclides. The present invention deals with an orderly and effective method of producing new therapeutically effective chelating agents. This method uses challenge biosynthesis for the production of chelating agents that are specific for a particular metal. In this approach, the desired chelating agents are prepared from microorganisms challenged by the metal that the chelating agent is designed to detoxify. This challenge induces the formation of specific or highly selective chelating agents. The present invention involves the use of the challenge biosynthetic method to produce new complexing/chelating agents that are therapeutically useful to detoxify uranium, plutonium, thorium and other toxic metals. The Pseudomonas aeruginosa family of organisms is the referred family of microorganisms to be used in the present invention to produce the new chelating agent because this family is known to elaborate strains resistant to toxic metals.

  15. Security Proof for Password Authentication in TLS-Verifier-based Three-Party Group Diffie-Hellman

    SciTech Connect (OSTI)

    Chevassut, Olivier; Milner, Joseph; Pointcheval, David

    2008-04-21

    The internet has grown greatly in the past decade, by some numbers exceeding 47 million active web sites and a total aggregate exceeding100 million web sites. What is common practice today on the Internet is that servers have public keys, but clients are largely authenticated via short passwords. Protecting these passwords by not storing them in the clear on institutions's servers has become a priority. This paper develops password-based ciphersuites for the Transport Layer Security (TLS) protocol that are: (1) resistant to server compromise; (2) provably secure; (3) believed to be free from patent and licensing restrictions based on an analysis of relevant patents in the area.

  16. Knowledge Acquisition Ubiquitous Agent Infrastructure (KAUAI)

    Energy Science and Technology Software Center (OSTI)

    2009-09-15

    Mobile agents are autonomous software programs that can move from one host to another during the course of execution. The KAUAI computer code is a middleware that supports the rapid development and deployment of mobile agent based applications. It is built on the J2ME (CLDC) technology. KAUAI handles the instantiation, execution, transportation, and disposal of mobile agents. KAUAI masks the underlying hardware and communication details from application developers and provides flexible functionality for distributed computing.more » KAUAI supports software development in systems that involve a large number of heterogeneous computing platforms ranging from workstations to handheld devices.« less

  17. Precursors to radiopharmaceutical agents for tissue imaging

    DOE Patents [OSTI]

    Srivastava, Prem C.; Knapp, Jr., Furn F.

    1988-01-01

    A class of radiolabeled compounds to be used in tissue imaging that exhibits rapid brain uptake, good brain:blood radioactivity ratios, and long retention times. The imaging agents are more specifically radioiodinated aromatic amines attached to dihydropyridine carriers, that exhibit heart as well as brain specificity. In addition to the radiolabeled compounds, classes of compounds are also described that are used as precursors and intermediates in the preparation of the imaging agents.

  18. Business Models Guide: Real Estate Agent | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Models Guide: Real Estate Agent Business Models Guide: Real Estate Agent With excellent marketing skills, a keen understanding of financing options, and a broad knowledge of the ...

  19. Temporary Bridging Agents for Use in Drilling and Completions...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Temporary Bridging Agents for Use in Drilling and Completions of EGS Temporary Bridging Agents for Use in Drilling and Completions of EGS DOE Geothermal Peer Review 2010 - ...

  20. FIPA agent based network distributed control system

    SciTech Connect (OSTI)

    D. Abbott; V. Gyurjyan; G. Heyes; E. Jastrzembski; C. Timmer; E. Wolin

    2003-03-01

    A control system with the capabilities to combine heterogeneous control systems or processes into a uniform homogeneous environment is discussed. This dynamically extensible system is an example of the software system at the agent level of abstraction. This level of abstraction considers agents as atomic entities that communicate to implement the functionality of the control system. Agents' engineering aspects are addressed by adopting the domain independent software standard, formulated by FIPA. Jade core Java classes are used as a FIPA specification implementation. A special, lightweight, XML RDFS based, control oriented, ontology markup language is developed to standardize the description of the arbitrary control system data processor. Control processes, described in this language, are integrated into the global system at runtime, without actual programming. Fault tolerance and recovery issues are also addressed.

  1. NISAC Agent Based Laboratory for Economics

    Energy Science and Technology Software Center (OSTI)

    2006-10-11

    The software provides large-scale microeconomic simulation of complex economic and social systems (such as supply chain and market dynamics of businesses in the US economy) and their dependence on physical infrastructure systems. The system is based on Agent simulation, where each entity of inteest in the system to be modeled (for example, a Bank, individual firms, Consumer households, etc.) is specified in a data-driven sense to be individually repreented by an Agent. The Agents interactmore » using rules of interaction appropriate to their roles, and through those interactions complex economic and social dynamics emerge. The software is implemented in three tiers, a Java-based visualization client, a C++ control mid-tier, and a C++ computational tier.« less

  2. NISAC Agent Based Laboratory for Economics

    SciTech Connect (OSTI)

    2006-10-11

    The software provides large-scale microeconomic simulation of complex economic and social systems (such as supply chain and market dynamics of businesses in the US economy) and their dependence on physical infrastructure systems. The system is based on Agent simulation, where each entity of inteest in the system to be modeled (for example, a Bank, individual firms, Consumer households, etc.) is specified in a data-driven sense to be individually repreented by an Agent. The Agents interact using rules of interaction appropriate to their roles, and through those interactions complex economic and social dynamics emerge. The software is implemented in three tiers, a Java-based visualization client, a C++ control mid-tier, and a C++ computational tier.

  3. Detection of electrophilic and nucleophilic chemical agents

    DOE Patents [OSTI]

    McElhanon, James R.; Shepodd, Timothy J.

    2014-08-12

    A "real time" method for detecting chemical agents generally and particularly electrophilic and nucleophilic species by employing tunable, precursor sensor materials that mimic the physiological interaction of these agents to form highly florescent berberine-type alkaloids that can be easily and rapidly detected. These novel precursor sensor materials can be tuned for reaction with both electrophilic (chemical species, toxins) and nucleophilic (proteins and other biological molecules) species. By bonding or otherwise attaching these precursor molecules to a surface or substrate they can be used in numerous applications.

  4. Intelligent Software Agents: Sensor Integration and Response

    SciTech Connect (OSTI)

    Kulesz, James J; Lee, Ronald W

    2013-01-01

    Abstract In a post Macondo world the buzzwords are Integrity Management and Incident Response Management. The twin processes are not new but the opportunity to link the two is novel. Intelligent software agents can be used with sensor networks in distributed and centralized computing systems to enhance real-time monitoring of system integrity as well as manage the follow-on incident response to changing, and potentially hazardous, environmental conditions. The software components are embedded at the sensor network nodes in surveillance systems used for monitoring unusual events. When an event occurs, the software agents establish a new concept of operation at the sensing node, post the event status to a blackboard for software agents at other nodes to see , and then react quickly and efficiently to monitor the scale of the event. The technology addresses a current challenge in sensor networks that prevents a rapid and efficient response when a sensor measurement indicates that an event has occurred. By using intelligent software agents - which can be stationary or mobile, interact socially, and adapt to changing situations - the technology offers features that are particularly important when systems need to adapt to active circumstances. For example, when a release is detected, the local software agent collaborates with other agents at the node to exercise the appropriate operation, such as: targeted detection, increased detection frequency, decreased detection frequency for other non-alarming sensors, and determination of environmental conditions so that adjacent nodes can be informed that an event is occurring and when it will arrive. The software agents at the nodes can also post the data in a targeted manner, so that agents at other nodes and the command center can exercise appropriate operations to recalibrate the overall sensor network and associated intelligence systems. The paper describes the concepts and provides examples of real-world implementations

  5. Imaging agent and method of use

    DOE Patents [OSTI]

    Wieland, Donald M.; Brown, Lawrence E.; Beierwaltes, William H.; Wu, Jiann-long

    1986-04-22

    A new radiopharmaceutical composition for use in nuclear medicine comprises a radioiodinated meta-iodobenzylguanidine. The composition is used as an imaging agent for the heart, adrenal medulla, and tumors of the adrenal medulla and can be used for treatment of tumors of the adrenal medulla.

  6. Imaging agent and method of use

    DOE Patents [OSTI]

    Wieland, D.M.; Brown, L.E.; Beierwaltes, W.H.; Wu, J.L.

    1986-04-22

    A new radiopharmaceutical composition for use in nuclear medicine comprises a radioiodinated meta-iodobenzylguanidine. The composition is used as an imaging agent for the heart, adrenal medulla, and tumors of the adrenal medulla and can be used for treatment of tumors of the adrenal medulla. No Drawings

  7. Detection of Electrophilic and Nucleophilic Chemical Agents

    DOE Patents [OSTI]

    McElhanon, James R.; Shepodd, Timothy J.

    2008-11-11

    A "real time" method for detecting electrophilic and nucleophilic species generally by employing tunable, precursor sensor materials that mimic the physiological interaction of these agents to form highly florescent berberine-type alkaloids that can be easily and rapidly detected. These novel precursor sensor materials can be tuned for reaction with both electrophilic (chemical species, toxins) and nucleophilic (proteins and other biological molecules) species.

  8. Natural chelating agents for radionuclide decorporation

    DOE Patents [OSTI]

    Premuzic, Eugene T.

    1988-01-01

    This invention relates to the preparation of new, naturally produced chelating agents as well as to the method and resulting chelates of desorbing cultures in a bioavailable form involving Pseudomonas species or other microorganisms. A preferred microorganism is Pseudomonas aeruginosa which forms multiple chelates with thorium in the range of molecular weight 100-1,000 and also forms chelates with uranium of molecular weight in the area of 100-1,000 and 1,000-2,000.

  9. Method of encapsulating polyaminopolycarboxylic acid chelating agents in liposomes

    DOE Patents [OSTI]

    Rahman, Yueh Erh

    1977-11-10

    A method is provided for transferring a polyaminopolycarboxylic acid chelating agent across a cellular membrane by encapsulating the charged chelating agent within liposomes, which liposomes will be taken up by the cells, thereby transferring the chelating agent across the cellular membrane. The chelating agent is encapsulated within liposomes by drying a lipid mixture to form a thin film and wetting the lipid film with a solution containing the chelating agent. Mixing then results in the formation of a suspension of liposomes encapsulating the chelating agent, which liposomes can then be separated.

  10. Commercial Buildings Sector Agent-Based Model | Open Energy Informatio...

    Open Energy Info (EERE)

    OpenEI Keyword(s): EERE tool, Commercial Buildings Sector Agent-Based Model Language: English References: Building Efficiency: Development of an Agent-based Model of the US...

  11. Lithium based electrochemical cell systems having a degassing agent

    DOE Patents [OSTI]

    Hyung, Yoo-Eup; Vissers, Donald R.; Amine, Khalil

    2012-05-01

    A lithium based electrochemical cell system includes a positive electrode; a negative electrode; an electrolyte; and a degassing agent.

  12. Agent-Based Mediation and Cooperative Information Systems

    SciTech Connect (OSTI)

    PHILLIPS, LAURENCE R.; LINK, HAMILTON E.; GOLDSMITH, STEVEN Y.

    2002-06-02

    This report describes the results of research and development in the area of communication among disparate species of software agents. The two primary elements of the work are the formation of ontologies for use by software agents and the means by which software agents are instructed to carry out complex tasks that require interaction with other agents. This work was grounded in the areas of commercial transport and cybersecurity.

  13. Business Models Guide: Real Estate Agent | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Business Models Guide: Real Estate Agent Business Models Guide: Real Estate Agent With excellent marketing skills, a keen understanding of financing options, and a broad knowledge of the industry, real estate agents are natural advocates for smart energy efficiency upgrades. Business Models Guide: Real Estate Agent (50.43 KB) More Documents & Publications Working with the Real Estate Sector Business Models and Case Examples for Working with the Real Estate Sector Trends in Real Estate and

  14. Evaluation of the Geotech Smart24 data acquisition system with active Fortezza crypto card data signing and authentication.

    SciTech Connect (OSTI)

    Hart, Darren M.

    2008-05-01

    Sandia National Laboratories has tested and evaluated Geotech Smart24 data acquisition system with active Fortezza crypto card data signing and authentication. The test results included in this report were in response to static and tonal-dynamic input signals. Most test methodologies used were based on IEEE Standards 1057 for Digitizing Waveform Recorders and 1241 for Analog to Digital Converters; others were designed by Sandia specifically for infrasound application evaluation and for supplementary criteria not addressed in the IEEE standards. The objective of this work was to evaluate the overall technical performance of the Geotech Smart24 digitizer with a Fortezza PCMCIA crypto card actively implementing the signing of data packets. The results of this evaluation were compared to relevant specifications provided within manufacturer's documentation notes. The tests performed were chosen to demonstrate different performance aspects of the digitizer under test. The performance aspects tested include determining noise floor, least significant bit (LSB), dynamic range, cross-talk, relative channel-to-channel timing, time-tag accuracy, analog bandwidth and calibrator performance.

  15. Modular strategies for PET imaging agents

    SciTech Connect (OSTI)

    Hooker, , J.M.

    2010-03-01

    In recent years, modular and simplified chemical and biological strategies have been developed for the synthesis and implementation of positron emission tomography (PET) radiotracers. New developments in bioconjugation and synthetic methodologies, in combination with advances in macromolecular delivery systems and gene-expression imaging, reflect a need to reduce radiosynthesis burden in order to accelerate imaging agent development. These new approaches, which are often mindful of existing infrastructure and available resources, are anticipated to provide a more approachable entry point for researchers interested in using PET to translate in vitro research to in vivo imaging.

  16. Designed TPR Modules as Novel Anticancer Agents

    SciTech Connect (OSTI)

    Cortajarena,A.; Yi, F.; Regan, L.

    2008-01-01

    Molecules specifically designed to modulate protein-protein interactions have tremendous potential as novel therapeutic agents. One important anticancer target is the chaperone Hsp90, whose activity is essential for the folding of many oncogenic proteins, including HER2, IGFIR, AKT, RAF-1, and FLT-3. Here we report the design and characterization of new tetratricopeptide repeat modules, which bind to the C-terminus of Hsp90 with higher affinity and with greater specificity than natural Hsp90-binding co-chaperones. Thus, when these modules are introduced into the cell, they out-compete endogenous co-chaperones for binding, thereby inhibiting Hsp90 function. The effect of Hsp90 inhibition in this fashion is dramatic; HER2 levels are substantially decreased and BT474 HER2 positive breast cancer cells are killed. Our designs thus provide new tools with which to dissect the mechanism of Hsp90-mediated protein folding and also open the door to the development of an entirely new class of anticancer agents.

  17. Epoxy foams using multiple resins and curing agents

    DOE Patents [OSTI]

    Russick, Edward M.; Rand, Peter B.

    2000-01-01

    An epoxy foam comprising a plurality of resins, a plurality of curing agents, at least one blowing agent, at least one surfactant and optionally at least one filler and the process for making. Preferred is an epoxy foam comprising two resins of different reactivities, two curing agents, a blowing agent, a surfactant, and a filler. According to the present invention, an epoxy foam is prepared with tailorable reactivity, exotherm, and pore size by a process of admixing a plurality of resins with a plurality of curing agents, a surfactant and blowing agent, whereby a foamable mixture is formed and heating said foamable mixture at a temperature greater than the boiling temperature of the blowing agent whereby said mixture is foamed and cured.

  18. Fluid extraction using carbon dioxide and organophosphorus chelating agents

    DOE Patents [OSTI]

    Smart, N.G.; Wai, C.M.; Lin, Y.; Kwang, Y.H.

    1998-11-24

    Methods for extracting metalloid and metal species from a solid or liquid material by exposing the material to a fluid solvent, particularly supercritical CO{sub 2}, and a chelating agent are described. The chelating agent forms a chelate with the species, the chelate being soluble in the fluid to allow removal of the species from the material. In preferred embodiments the extraction solvent is supercritical CO{sub 2} and the chelating agent comprises an organophosphorous chelating agent, particularly sulfur-containing organophosphorous chelating agents, including mixtures of chelating agents. Examples of chelating agents include monothiophosphinic acid, di-thiophosphinic acid, phosphine sulfite, phosphorothioic acid, and mixtures thereof. The method provides an environmentally benign process for removing metal and metalloids from industrial waste solutions, particularly acidic solutions. Both the chelate and the supercritical fluid can be regenerated and the contaminant species recovered to provide an economic, efficient process. 1 fig.

  19. Fluid extraction using carbon dioxide and organophosphorus chelating agents

    DOE Patents [OSTI]

    Smart, Neil G.; Wai, Chien M.; Lin, Yuehe; Kwang, Yak Hwa

    1998-01-01

    Methods for extracting metalloid and metal species from a solid or liquid material by exposing the material to a fluid solvent, particularly supercritical CO.sub.2, and a chelating agent are described. The chelating agent forms a chelate with the species, the chelate being soluble in the fluid to allow removal of the species from the material. In preferred embodiments the extraction solvent is supercritical CO.sub.2 and the chelating agent comprises an organophosphorous chelating agent, particularly sulfur-containing organophosphorous chelating agents, including mixtures of chelating agents. Examples of chelating agents include monothiophosphinic acid, di-thiophosphinic acid, phosphine sulfite, phosphorothioic acid, and mixtures thereof. The method provides an environmentally benign process for removing metal and metalloids from industrial waste solutions, particularly acidic solutions. Both the chelate and the supercritical fluid can be regenerated and the contaminant species recovered to provide an economic, efficient process.

  20. Instructions | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Secure Email via Outlook Web Access Instructions for Using Secure Email via Outlook Web Access Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. Secure Email Requirements: An EITS provided Exchange email account An EITS provided RSA SecureID Token with an active account in the EITS-managed RSA Authentication Server Appropriate access granted Active Directory group membership DOEnet or Internet access and a supported web browser

  1. Agent-Based Software for Gathering and Summarizing Textual and...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Find More Like This Return to Search Agent-Based Software for Gathering and Summarizing ... This requires software that can quickly filter, relate, and show documents and ...

  2. A mobile-agent based wireless sensing network for structural...

    Office of Scientific and Technical Information (OSTI)

    Furthermore, the mobile agent provides computational power to make near real-time assessments on the structural conditions. This paper will discuss such prototype systems, which ...

  3. A mobile-agent based wireless sensing network for structural...

    Office of Scientific and Technical Information (OSTI)

    Title: A mobile-agent based wireless sensing network for structural health monitoring ... Office of Scientific and Technical Information (OSTI) and is provided as a public service. ...

  4. Operating Experience Level 3, NRC Notice: Antifreeze Agents in...

    Broader source: Energy.gov (indexed) [DOE]

    October 2015 OE-3 2015-04: NRC Notice: Antifreeze Agents in Fire Water Sprinkler Systems This Operating Experience Level 3 (OE-3) document provides information about safety...

  5. A mobile-agent based wireless sensing network for structural...

    Office of Scientific and Technical Information (OSTI)

    for structural health monitoring applications Citation Details In-Document Search Title: A mobile-agent based wireless sensing network for structural health monitoring ...

  6. ORISE: Agents of Opportunity for Terrorism Continuing Medical...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Agents of Opportunity for Terrorism On-line CME Course on Toxic Radiological Materials, Toxic Industrial Chemicals, and Toxic Industrial Materials Dates Scheduled Available 247...

  7. Agent-based method for distributed clustering of textual information

    DOE Patents [OSTI]

    Potok, Thomas E [Oak Ridge, TN; Reed, Joel W [Knoxville, TN; Elmore, Mark T [Oak Ridge, TN; Treadwell, Jim N [Louisville, TN

    2010-09-28

    A computer method and system for storing, retrieving and displaying information has a multiplexing agent (20) that calculates a new document vector (25) for a new document (21) to be added to the system and transmits the new document vector (25) to master cluster agents (22) and cluster agents (23) for evaluation. These agents (22, 23) perform the evaluation and return values upstream to the multiplexing agent (20) based on the similarity of the document to documents stored under their control. The multiplexing agent (20) then sends the document (21) and the document vector (25) to the master cluster agent (22), which then forwards it to a cluster agent (23) or creates a new cluster agent (23) to manage the document (21). The system also searches for stored documents according to a search query having at least one term and identifying the documents found in the search, and displays the documents in a clustering display (80) of similarity so as to indicate similarity of the documents to each other.

  8. Cell-targeted lytic pore-forming agents

    DOE Patents [OSTI]

    Bayley, Hagen; Walker, Barbara J.

    1998-01-01

    A chimeric compound that contains a cell-specific ligand linked to a pore-forming agent capable of lysing a cell.

  9. Cell-targeted lytic pore-forming agents

    DOE Patents [OSTI]

    Bayley, H.; Walker, B.J.

    1998-10-06

    A chimeric compound that contains a cell-specific ligand linked to a pore-forming agent capable of lysing a cell. 21 figs.

  10. Cell-targeted lytic pore-forming agents

    DOE Patents [OSTI]

    Bayley, H.; Walker, B.J.

    1998-10-20

    A chimeric compound that contains a cell-specific ligand linked to a pore-forming agent capable of lysing a cell. 18 figs.

  11. Surface Modification Agents Increase Safety, Security of Lithium...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Surface Modification Agents Increase Safety, Security of Lithium-Ion Batteries New Process to Modify the Surface of the Active Material Used in Lithium-Ion Batteries Argonne ...

  12. Surface Modification Agents for Lithium-Ion Batteries | Argonne...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Surface Modification Agents for Lithium-Ion Batteries Technology available for licensing: ... and security of batteries Substantially reduces power fade and potential for explosions. ...

  13. A multi-agent system for coordinating international shipping

    SciTech Connect (OSTI)

    Goldsmith, S.Y.; Phillips, L.R.; Spires, S.V.

    1998-05-01

    Moving commercial cargo across the US-Mexico border is currently a complex, paper-based, error-prone process that incurs expensive inspections and delays at several ports of entry in the Southwestern US. Improved information handling will dramatically reduce border dwell time, variation in delivery time, and inventories, and will give better control of the shipment process. The Border Trade Facilitation System (BTFS) is an agent-based collaborative work environment that assists geographically distributed commercial and government users with transshipment of goods across the US-Mexico border. Software agents mediate the creation, validation and secure sharing of shipment information and regulatory documentation over the Internet, using the World Wide Web to interface with human actors. Agents are organized into Agencies. Each agency represents a commercial or government agency. Agents perform four specific functions on behalf of their user organizations: (1) agents with domain knowledge elicit commercial and regulatory information from human specialists through forms presented via web browsers; (2) agents mediate information from forms with diverse otologies, copying invariant data from one form to another thereby eliminating the need for duplicate data entry; (3) cohorts of distributed agents coordinate the work flow among the various information providers and they monitor overall progress of the documentation and the location of the shipment to ensure that all regulatory requirements are met prior to arrival at the border; (4) agents provide status information to human actors and attempt to influence them when problems are predicted.

  14. Removing Strongly Adsorbed Surfactants and Capping Agents from

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nanostructures - Energy Innovation Portal Industrial Technologies Industrial Technologies Advanced Materials Advanced Materials Find More Like This Return to Search Removing Strongly Adsorbed Surfactants and Capping Agents from Nanostructures Brookhaven National Laboratory Contact BNL About This Technology Technology Marketing Summary During production, nanostructures are often capped by surfactants or other capping agents to keep them from agglomerating. These moieties often interfere with

  15. Swarming behaviors in multi-agent systems with nonlinear dynamics

    SciTech Connect (OSTI)

    Yu, Wenwu; School of Electrical and Computer Engineering, RMIT University, Melbourne VIC 3001 ; Chen, Guanrong; Cao, Ming; Lü, Jinhu; Zhang, Hai-Tao

    2013-12-15

    The dynamic analysis of a continuous-time multi-agent swarm model with nonlinear profiles is investigated in this paper. It is shown that, under mild conditions, all agents in a swarm can reach cohesion within a finite time, where the upper bounds of the cohesion are derived in terms of the parameters of the swarm model. The results are then generalized by considering stochastic noise and switching between nonlinear profiles. Furthermore, swarm models with limited sensing range inducing changing communication topologies and unbounded repulsive interactions between agents are studied by switching system and nonsmooth analysis. Here, the sensing range of each agent is limited and the possibility of collision among nearby agents is high. Finally, simulation results are presented to demonstrate the validity of the theoretical analysis.

  16. AFECS. Multi-Agent Framework for Experiment Control Systems

    SciTech Connect (OSTI)

    Vardan Gyurjyan; David Abbott; William Heyes; Edward Jastrzembski; Carl Timmer; Elliott Wolin

    2008-01-23

    AFECS is a pure Java based software framework for designing and implementing distributed control systems. AFECS creates a control system environment as a collection of software agents behaving as finite state machines. These agents can represent real entities, such as hardware devices, software tasks, or control subsystems. A special control oriented ontology language (COOL), based on RDFS (Resource Definition Framework Schema) is provided for control system description as well as for agent communication. AFECS agents can be distributed over a variety of platforms. Agents communicate with their associated physical components using range of communication protocols, including tcl-DP, cMsg (publish-subscribe communication system developed at Jefferson Lab), SNMP (simple network management protocol), EPICS channel access protocol and JDBC.

  17. Oxidizer gels for detoxification of chemical and biological agents

    DOE Patents [OSTI]

    Hoffman, Dennis M.; McGuire, Raymond R.

    2002-01-01

    A gel composition containing oxidizing agents and thickening or gelling agents is used to detoxify chemical and biological agents by application directly to a contaminated area. The gelling agent is a colloidal material, such as silica, alumina, or alumino-silicate clays, which forms a viscous gel that does not flow when applied to tilted or contoured surfaces. Aqueous or organic solutions of oxidizing agents can be readily gelled with less than about 30% colloidal material. Gel preparation is simple and suitable for field implementation, as the gels can be prepared at the site of decontamination and applied quickly and uniformly over an area by a sprayer. After decontamination, the residue can be washed away or vacuumed up for disposal.

  18. ARM - Central Authentication Service

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Data Management Facility External Data Center Features and Releases Facility News Blogs: Air Time & Field Notes Meetings and Events Employment Research Highlights Data...

  19. A New Method of Comparing Forcing Agents in Climate Models

    SciTech Connect (OSTI)

    Kravitz, Benjamin S.; MacMartin, Douglas; Rasch, Philip J.; Jarvis, Andrew

    2015-10-14

    We describe a new method of comparing different climate forcing agents (e.g., CO2, CH4, and solar irradiance) that avoids many of the ambiguities introduced by temperature-related climate feedbacks. This is achieved by introducing an explicit feedback loop external to the climate model that adjusts one forcing agent to balance another while keeping global mean surface temperature constant. Compared to current approaches, this method has two main advantages: (i) the need to define radiative forcing is bypassed and (ii) by maintaining roughly constant global mean temperature, the effects of state dependence on internal feedback strengths are minimized. We demonstrate this approach for several different forcing agents and derive the relationships between these forcing agents in two climate models; comparisons between forcing agents are highly linear in concordance with predicted functional forms. Transitivity of the relationships between the forcing agents appears to hold within a wide range of forcing. The relationships between the forcing agents obtained from this method are consistent across both models but differ from relationships that would be obtained from calculations of radiative forcing, highlighting the importance of controlling for surface temperature feedback effects when separating radiative forcing and climate response.

  20. Volttron: An Agent Platform for the Smart Grid

    SciTech Connect (OSTI)

    Haack, Jereme N.; Akyol, Bora A.; Carpenter, Brandon J.; Tews, Cody W.; Foglesong, Lance W.

    2013-05-06

    VOLLTRON platform enables the deployment of intelligent sensors and controllers in the smart grid and provides a stable, secure and flexible framework that expands the sensing and control capabilities. VOLTTRON platform provides services fulfilling the essential requirements of resource management and security for agent operation in the power grid. The facilities provided by the platform allow agent developers to focus on the implementation of their agent system and not on the necessary "plumbing' code. For example, a simple collaborative demand response application was written in less than 200 lines of Python.

  1. NISAC Agent-Based Laboratory for Economics | NISAC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    NISACNISAC Agent-Based Laboratory for Economics content top NISAC Agent-Based Laboratory for Economics (N-ABLE(tm)) Posted by Admin on Mar 1, 2012 in | Comments 0 comments NISAC Agent-Based Laboratory for Economics (N-ABLE(tm)) NISAC has developed N-ABLE(tm) to assist federal decision makers in improving the security and resilience of the U.S. economy. N-ABLE(tm) is a large-scale microeconomic simulation tool that models the complex supply-chain, spatial market dynamics, and

  2. Biosecurity reference : CFR-listed agent and toxin summaries.

    SciTech Connect (OSTI)

    Barnett, Natalie Beth

    2003-09-01

    This reference document provides summary information on the animal, plant, zoonotic, and human pathogens and toxins regulated and categorized by 9 CFR 331 and 7 CFR 121, 'Agricultural Bioterrorism Protection Act of 2002; Possession, Use and Transfer of Biological Agents and Toxins,' and 42 CFR 73, 'Possession, Use, and Transfer of Select Agents and Toxins.' Summary information includes, at a minimum, a description of the agent and its associated symptoms; often additional information is provided on the diagnosis, treatment, geographic distribution, transmission, control and eradication, and impacts on public health.

  3. ORISE: Agents of Opportunity for Terrorism Continuing Medical Education

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Course Agents of Opportunity for Terrorism On-line CME Course on Toxic Radiological Materials, Toxic Industrial Chemicals, and Toxic Industrial Materials Dates Scheduled Available 24/7 online. Fees and Credits Course Credits Type Costs AoO-TRMs (REM) Agents of Opportunity Day One 6.00 enduring $94.50 AoO-TIMs (ACMT) Agents of Opportunity Day Two 5.50 enduring $87.00 The Oak Ridge Institute for Science and Education (ORISE) is accredited by the Accreditation Council for Continuing Medical

  4. Gallium and indium imaging agents. 2. Complexes of sulfonated catecholyamide sequestering agents

    SciTech Connect (OSTI)

    Pecoraro, V.L.; Wong, G.B.; Raymond, K.N.

    1982-06-01

    The solution equilibria for the reaction of Ga(III) and In(III) with the hexadentate ligands N, N', N''-tris(2,3-dihydroxy-5-sulfonatobenzoyl)-1,3,5-tris(aminomethyl)benzene (MECAMS) and N, N', N''-tris(2,3-dihydroxy-5-sulfonatobenzoyl)-1,5,10-triazadecane (3,4-LICAMS) and the bidentate catechol N,N-dimethyl-2,3-dihydroxy-5-sulfonatobenzamide (DMBS) have been determined on 0.1 M KNO/sub 3/ at 25/sup 0/C. Both Ga(III) and In(III) are coordinated by three catecholate groups at high pH and have formation constants of the order ..beta../sub 110/ = 10/sup 38/ M/sup -1/. As the acidity of the medium is increased, the metal complexes of the hexadentate sequestering agents undergo protonation reactions. For the determination of the nature of the protonated metal chelates, the stretching frequency of the amide carbonyl has been monitored in D/sub 2/O by Fourier transform infrared spectroscopy (FT IR). These data support a series of two one-proton steps to form a mixed salicylate-catecholate coordination about the metal ion. In the salicylate bonding mode the metal is bound through the ortho phenolic oxygen and the amide cabonyl whereas catecholate coordination is via the adjacent phenols. In contrast, protonation of the M/sup III/(DMBS)/sub 3/ complexes results in dissociation of a catechol moiety to form M/sup III/(DMBS)/sub 2/. The potential use of these compounds as tumor-imaging agents in cancer diagnosis is discussed, with specific attention to the role of the gallium transferrin complex.

  5. T-618: Debian update for exim4: Mail Transport Agent

    Broader source: Energy.gov [DOE]

    It was discovered that Exim, the default mail transport agent in Debian, uses DKIM data obtain from DNS directly in a format string, potentially allowing malicious mail senders to execute arbitrary code.

  6. Measuring the Transport of Siloxane-Based Mold Release Agents...

    Office of Scientific and Technical Information (OSTI)

    Measuring the Transport of Siloxane-Based Mold Release Agents In An Encapsulation Mold. Citation Details In-Document Search Title: Measuring the Transport of Siloxane-Based Mold ...

  7. NRC Notice: Antifreeze Agents in Fire Water Sprinkler Systems

    Energy Savers [EERE]

    were identified in NRC Information Notice (IN) 2015-02, Antifreeze Agents in Fire Water Sprinkler Systems, (http:pbadupws.nrc.govdocsML1432ML14323A 176.pdf). This IN was...

  8. Method and apparatus for enhanced detection of toxic agents

    DOE Patents [OSTI]

    Greenbaum, Elias; Rodriguez, Jr., Miguel; Wu, Jie Jayne; Qi, Hairong

    2013-10-01

    A biosensor based detection of toxins includes enhancing a fluorescence signal by concentrating a plurality of photosynthetic organisms in a fluid into a concentrated region using biased AC electro-osmosis. A measured photosynthetic activity of the photosynthetic organisms is obtained in the concentrated region, where chemical, biological or radiological agents reduce a nominal photosynthetic activity of the photosynthetic organisms. A presence of the chemical, biological and/or radiological agents or precursors thereof, is determined in the fluid based on the measured photosynthetic activity of the concentrated plurality of photosynthetic organisms. A lab-on-a-chip system is used for the concentrating step. The presence of agents is determined from feature vectors, obtained from processing a time dependent signal using amplitude statistics and/or time-frequency analysis, relative to a control signal. A linear discriminant method including support vector machine classification (SVM) is used to identify the agents.

  9. 3-hydroxy-2(1H)-pyridinone chelating agents

    DOE Patents [OSTI]

    Raymond, K.; Xu, J.

    1999-04-06

    Disclosed is a series of improved chelating agents and the chelates formed from these agents, which are highly effective upon both injection and oral administration. Several of the most effective are of low toxicity. These chelating agents incorporate within their structure 3-hydroxy-2-pyridinone (3,2-HOPO) moieties with a substituted carbamoyl group ortho to the hydroxy group of the hydroxypyridinone ring. The electron-withdrawing carbamoyl group increases the acidity, as well as the chemical stability towards oxidation and reduction, of the hydroxypyridinones. In the metal complexes of the chelating agents, the amide protons form very strong hydrogen bonds with the adjacent HOPO oxygen donor, making these complexes very stable at physiological conditions. The terminal N-substituents provide a certain degree of lipophilicity to the 3,2-HOPO, increasing oral activity. 2 figs.

  10. 3-hydroxy-2(1H)-pyridinone chelating agents

    DOE Patents [OSTI]

    Raymond, Kenneth; Xu, Jide

    1999-01-01

    Disclosed is a series of improved chelating agents and the chelates formed from these agents, which are highly effective upon both injection and oral administration. Several of the most effective are of low toxicity. These chelating agents incorporate within their structure 3-hydroxy-2-pyridinone (3,2-HOPO) moieties with a substituted carbamoyl group ortho to the hydroxy group of the hydroxypyridinone ring. The electron-withdrawing carbamoyl group increases the acidity, as well as the chemical stability towards oxidation and reduction, of the hydroxypyridinones. In the metal complexes of the chelating agents, the amide protons form very strong hydrogen bonds with the adjacent HOPO oxygen donor, making these complexes very stable at physiological conditions. The terminal N-substituents provide a certain degree of lipophilicity to the 3,2-HOPO, increasing oral activity.

  11. Detoxification of organophosphate nerve agents by bacterial phosphotriesterase

    SciTech Connect (OSTI)

    Ghanem, Eman; Raushel, Frank M. . E-mail: raushel@tamu.edu

    2005-09-01

    Organophosphates have been widely used as insecticides and chemical warfare agents. The health risks associated with these agents have necessitated the need for better detoxification and bioremediation tools. Bacterial enzymes capable of hydrolyzing the lethal organophosphate nerve agents are of special interest. Phosphotriesterase (PTE) isolated from the soil bacteria Pseudomonas diminuta displays a significant rate enhancement and substrate promiscuity for the hydrolysis of organophosphate triesters. Directed evolution and rational redesign of the active site of PTE have led to the identification of new variants with enhanced catalytic efficiency and stereoselectivity toward the hydrolysis of organophosphate neurotoxins. PTE has been utilized to protect against organophosphate poisoning in vivo. Biotechnological applications of PTE for detection and decontamination of insecticides and chemical warfare agents are developing into useful tools. In this review, the catalytic properties and potential applications of this remarkable enzyme are discussed.

  12. Kit for providing a technetium medical radioimaging agent

    DOE Patents [OSTI]

    Wildung, Raymond E.; Garland, Thomas R.; Li, Shu-Mei W.

    2000-01-01

    The present invention is directed toward a kit for microbial reduction of a technetium compound to form other compounds of value in medical imaging. The technetium compound is combined in a mixture with non-growing microbial cells which contain a technetium-reducing enzyme system, a stabilizing agent and an electron donor in a saline solution under anaerobic conditions. The mixture is substantially free of an inorganic technetium reducing agent and its reduction products. The resulting product is Tc of lower oxidation states, the form of which can be partially controlled by the stabilizing agent. It has been discovered that the microorganisms Shewanella alga, strain Bry and Shewanella putrifacians, strain CN-32 contain the necessary enzyme systems for technetium reduction and can form both mono nuclear and polynuclear reduced Tc species depending on the stabilizing agent.

  13. Adaptive method with intercessory feedback control for an intelligent agent

    DOE Patents [OSTI]

    Goldsmith, Steven Y.

    2004-06-22

    An adaptive architecture method with feedback control for an intelligent agent provides for adaptively integrating reflexive and deliberative responses to a stimulus according to a goal. An adaptive architecture method with feedback control for multiple intelligent agents provides for coordinating and adaptively integrating reflexive and deliberative responses to a stimulus according to a goal. Re-programming of the adaptive architecture is through a nexus which coordinates reflexive and deliberator components.

  14. Trivalent chromium electrolyte and process employing reducing agents

    SciTech Connect (OSTI)

    Tomaszewski, T.W.

    1984-10-16

    An aqueous acidic trivalent chromium electrolyte and process for electrodepositing chromium platings comprising an electrolyte containing trivalent chromium ions, a complexing agent, halide ions, ammonium ions and a reducing agent comprising an ion selected from the group consisting of scandium, yttrium, lanthanum, titanium, zirconium, hafnium, molybdenum, arsenic, selenium, tellurium, cerium, uranium, and tin present in an amount effective to maintain the concentration of hexavalent chromium ions formed in the bath at a level at which satisfactory chromium electrodeposits are obtained.

  15. ARM - The Environmental Impacts of Agents for Change

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Environmental Impacts of Agents for Change Outreach Home Room News Publications Traditional Knowledge Kiosks Barrow, Alaska Tropical Western Pacific Site Tours Contacts Students Study Hall About ARM Global Warming FAQ Just for Fun Meet our Friends Cool Sites Teachers Teachers' Toolbox Lesson Plans The Environmental Impacts of Agents for Change What Has Been Happening Over the Past Century? Here we can refer to the Second Assessment Report of the Intergovernmental Panel on Climate Change approved

  16. Intelligent Software Agents for Enhancing Sensor Networks Monitoring of

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Changing Conditions - Energy Innovation Portal Energy Analysis Energy Analysis Find More Like This Return to Search Intelligent Software Agents for Enhancing Sensor Networks Monitoring of Changing Conditions Oak Ridge National Laboratory Contact ORNL About This Technology Technology Marketing SummaryIntelligent software agents developed by ORNL researchers can be used with sensor networks in distributed and centralized computing systems to enhance detection and response by sensors to

  17. Agent Model Development for Assessing Climate-Induced Geopolitical Instability.

    SciTech Connect (OSTI)

    Boslough, Mark B.; Backus, George A.

    2005-12-01

    We present the initial stages of development of new agent-based computational methods to generate and test hypotheses about linkages between environmental change and international instability. This report summarizes the first year's effort of an originally proposed three-year Laboratory Directed Research and Development (LDRD) project. The preliminary work focused on a set of simple agent-based models and benefited from lessons learned in previous related projects and case studies of human response to climate change and environmental scarcity. Our approach was to define a qualitative model using extremely simple cellular agent models akin to Lovelock's Daisyworld and Schelling's segregation model. Such models do not require significant computing resources, and users can modify behavior rules to gain insights. One of the difficulties in agent-based modeling is finding the right balance between model simplicity and real-world representation. Our approach was to keep agent behaviors as simple as possible during the development stage (described herein) and to ground them with a realistic geospatial Earth system model in subsequent years. This work is directed toward incorporating projected climate data--including various C02 scenarios from the Intergovernmental Panel on Climate Change (IPCC) Third Assessment Report--and ultimately toward coupling a useful agent-based model to a general circulation model.3

  18. Solid-water detoxifying reagents for chemical and biological agents

    DOE Patents [OSTI]

    Hoffman, Dennis M.; Chiu, Ing Lap

    2006-04-18

    Formation of solid-water detoxifying reagents for chemical and biological agents. Solutions of detoxifying reagent for chemical and biological agents are coated using small quantities of hydrophobic nanoparticles by vigorous agitation or by aerosolization of the solution in the presence of the hydrophobic nanoparticles to form a solid powder. For example, when hydrophobic fumed silica particles are shaken in the presence of IN oxone solution in approximately a 95:5-weight ratio, a dry powder results. The hydrophobic silica forms a porous coating of insoluble fine particles around the solution. Since the chemical or biological agent tends to be hydrophobic on contact with the weakly encapsulated detoxifying solution, the porous coating breaks down and the detoxifying reagent is delivered directly to the chemical or biological agent for maximum concentration at the point of need. The solid-water (coated) detoxifying solutions can be blown into contaminated ventilation ducting or other difficult to reach sites for detoxification of pools of chemical or biological agent. Once the agent has been detoxified, it can be removed by flushing the area with air or other techniques.

  19. Software with Mobile Agents for Peer-to-Peer Information Sharing...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of failure. To avoid potential sudden system collapse, researchers at ORNL developed a Java-based mobile agent information software called Knowledge Acquisition Ubiquitous Agent...

  20. Agent 2003 Conference on Challenges in Social Simulation

    SciTech Connect (OSTI)

    Margaret Clemmons, ed.

    2003-01-01

    Welcome to the Proceedings of the fourth in a series of agent simulation conferences cosponsored by Argonne National Laboratory and The University of Chicago. Agent 2003 is the second conference in which three Special Interest Groups from the North American Association for Computational Social and Organizational Science (NAACSOS) have been involved in planning the program--Computational Social Theory; Simulation Applications; and Methods, Toolkits and Techniques. The theme of Agent 2003, Challenges in Social Simulation, is especially relevant, as there seems to be no shortage of such challenges. Agent simulation has been applied with increasing frequency to social domains for several decades, and its promise is clear and increasingly visible. Like any nascent scientific methodology, however, it faces a number of problems or issues that must be addressed in order to progress. These challenges include: (1) Validating models relative to the social settings they are designed to represent; (2) Developing agents and interactions simple enough to understand but sufficiently complex to do justice to the social processes of interest; (3) Bridging the gap between empirically spare artificial societies and naturally occurring social phenomena; (4) Building multi-level models that span processes across domains; (5) Promoting a dialog among theoretical, qualitative, and empirical social scientists and area experts, on the one hand, and mathematical and computational modelers and engineers, on the other; (6) Using that dialog to facilitate substantive progress in the social sciences; and (7) Fulfilling the aspirations of users in business, government, and other application areas, while recognizing and addressing the preceding challenges. Although this list hardly exhausts the challenges the field faces, it does identify topics addressed throughout the presentations of Agent 2003. Agent 2003 is part of a much larger process in which new methods and techniques are applied to

  1. 3-hydroxy-2(1H)-pyridinone chelating agents

    DOE Patents [OSTI]

    Raymond, Kenneth N.; Xu, Jide

    1997-01-01

    Disclosed is a series of improved metal chelating agents, which are highly effective upon both injection and oral administration; several of the most effective are of low toxicity. These chelating agents incorporate within their structure 1-hydroxy-2-pyridinone (1,2-HOPO) and 3-hydroxy-2-pyridinone (3,2-HOPO) moieties with a substituted carbamoyl group ortho to the hydroxy or oxo groups of the hydroxypyridinone ring. The electron-withdrawing carbamoyl group increases the acidity of the hydroxypyridinones. In the metal complexes of said chelating agents, the amide protons form very strong hydrogen bonds with its adjacent HOPO oxygen donor, making these complexes very stable at physiological conditions. The terminal N-substituents provides a certain degree of lipophilicity to said 3,2-HOPO, increasing oral activity. Also disclosed is a method of making the chelating agents and a method of producing a known compound, 3-hydroxy-1-alkyl-2(1H)pyridinone, used as a precursor to the chelating agent, safely and in large quantities.

  2. 3-hydroxy-2(1H)-pyridinone chelating agents

    DOE Patents [OSTI]

    Raymond, K.N.; Xu, J.

    1997-04-29

    Disclosed is a series of improved metal chelating agents, which are highly effective upon both injection and oral administration; several of the most effective are of low toxicity. These chelating agents incorporate within their structure 1-hydroxy-2-pyridinone (1,2-HOPO) and 3-hydroxy-2-pyridinone (3,2-HOPO) moieties with a substituted carbamoyl group ortho to the hydroxy or oxo groups of the hydroxypyridinone ring. The electron-withdrawing carbamoyl group increases the acidity of the hydroxypyridinones. In the metal complexes of the chelating agents, the amide protons form very strong hydrogen bonds with its adjacent HOPO oxygen donor, making these complexes very stable at physiological conditions. The terminal N-substituents provides a certain degree of lipophilicity to the 3,2-HOPO, increasing oral activity. Also disclosed is a method of making the chelating agents and a method of producing a known compound, 3-hydroxy-1-alkyl-2(1H)pyridinone, used as a precursor to the chelating agent, safely and in large quantities. 2 figs.

  3. Decontamination of biological warfare agents by a microwave plasma torch

    SciTech Connect (OSTI)

    Lai, Wilson; Lai, Henry; Kuo, Spencer P.; Tarasenko, Olga; Levon, Kalle

    2005-02-01

    A portable arc-seeded microwave plasma torch running stably with airflow is described and applied for the decontamination of biological warfare agents. Emission spectroscopy of the plasma torch indicated that this torch produced an abundance of reactive atomic oxygen that could effectively oxidize biological agents. Bacillus cereus was chosen as a simulant of Bacillus anthracis spores for biological agent in the decontamination experiments. Decontamination was performed with the airflow rate of 0.393 l/s, corresponding to a maximum concentration of atomic oxygen produced by the torch. The experimental results showed that all spores were killed in less than 8 s at 3 cm distance, 12 s at 4 cm distance, and 16 s at 5 cm distance away from the nozzle of the torch.

  4. Air monitoring and detection of chemical and biological agents

    SciTech Connect (OSTI)

    Leonelli, J.; Althouse, M.L.

    1999-06-01

    This volume contains the proceedings of SPIE`s remote sensing symposium which was held November 2--3, 1998 in Boston, Massachusetts. Topics of discussion include the following: system simulations, atmospheric modeling, and performance prediction studies of chemical warfare remote sensing technologies; ultraviolet laser-induced fluorescence and aerosol detection methods for remote sensing of biological warfare agents; passive detection methods for remote detection of chemical warfare agents; and lidar-based system performance assessments, demonstrations, and new concepts for chemical warfare/biological warfare detection.

  5. Method and apparatus for enhanced detection of toxic agents

    DOE Patents [OSTI]

    Greenbaum, Elias; Rodriguez, Jr., Miguel; Wu, Jie Jayne; Qi, Hairong

    2012-06-12

    A water quality analyzer for real-time detection according to the invention comprises a biased AC electro-osmosis (ACEO) cell for receiving a fluid to be analyzed having a plurality photosynthetic organisms therein, and concentrating the plurality photosynthetic organisms into at least one concentrated region. A photodetector is provided for obtaining a measured photosynthetic activity of the plurality of photosynthetic organisms in the concentrated region, wherein chemical, biological or radiological agents reduce a nominal photosynthetic activity of the photosynthetic organisms. An electronics package analyzes the measured photosynthetic activity to indicate a presence of the chemical, biological or radiological agents in the fluid.

  6. An agent-based tool for infrastructure interdependency policy analysis.

    SciTech Connect (OSTI)

    North, M. J.

    2000-12-14

    Complex Adaptive Systems (CAS) can be applied to investigate complex infrastructure interdependencies such as those between the electric power and natural gas markets. These markets are undergoing fundamental transformations including major changes in electric generator fuel sources. Electric generators that use natural gas as a fuel source are rapidly gaining market share. These generators introduce direct interdependency between the electric power and natural gas markets. These interdependencies have been investigated using the emergent behavior of CAS model agents within the Spot Market Agent Research Tool Version 2.0 Plus Natural Gas (SMART II+).

  7. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    A Key Enzyme to the Potency of an Anticancer Agent A Key Enzyme to the Potency of an Anticancer Agent Print Wednesday, 28 May 2008 00:00 Incorporation of halogen atoms into drug molecules often increases biological activity. This is the case with salinosporamide A (sal A), a natural product from the marine bacterium Salinispora tropica that is 500 times more active than sal B, its nonchlorinated analog. Sal A is in phase I human clinical trials for the treatment of multiple myeloma and solid

  8. 4-haloethenylphenyl tropane:serotonin transporter imaging agents

    DOE Patents [OSTI]

    Goodman, Mark M.; Martarello, Laurent

    2005-01-18

    A series of compounds in the 4-fluoroalkyl-3-halophenyl nortropanes and 4-haloethenylphenyl tropane families are described as diagnostic and therapeutic agents for diseases associated with serotonin transporter dysfunction. These compounds bind to serotonin transporter protein with high affinity and selectivity. The invention provides methods of synthesis which incorporate radioisotopic halogens at a last step which permit high radiochemical yield and maximum usable product life. The radiolabeled compounds of the invention are useful as imaging agents for visualizing the location and density of serotonin transporter by PET and SPECT imaging.

  9. HOW TO CREATE A SEARCH AGENT IN YOUR USAJOBS ACCOUNT

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    HOW TO CREATE A SEARCH AGENT IN YOUR USAJOBS ACCOUNT Why spend hours searching for your ideal job. Make the USAJOBS website do all the work for you by creating a Search Agent! STEP 1: Log into your USAJOBS "My Account" and select "Saved Searches." STEP 2: Select the "Create a new saved search" button. STEP 3: Select all jobs in the Richland, WA area. NOTE: that you can create up to 10 saved searches and they'll search around the clock and e-mail you the results!

  10. Bisamide bisthiol compounds useful for making technetium radiodiagnostic renal agents

    DOE Patents [OSTI]

    Davison, Alan; Brenner, David; Lister-James, John; Jones, Alun G.

    1987-06-16

    A radiodiagnostic bisamido-bisthio ligand useful for producing Tc-labelled radiodiagnostic renal agents is described. The ligand forms a complex with the radionuclide .sup.99m Tc suitable for administration as a radiopharmaceutical to obtain images of the kidney for diagnosis of kidney disfunction.

  11. Isonitrile radionuclide complexes for labelling and imaging agents

    DOE Patents [OSTI]

    Jones, Alun G.; Davison, Alan; Abrams, Michael J.

    1984-06-04

    A coordination complex of an isonitrile ligand and radionuclide such as Tc, Ru, Co, Pt, Fe, Os, Ir, W, Re, Cr, Mo, Mn, Ni, Rh, Pd, Nb and Ta, is useful as a diagnostic agent for labelling liposomes or vesicles, and selected living cells containing lipid membranes, such as blood clots, myocardial tissue, gall bladder tissue, etc.

  12. Dimensions of Usability: Cougaar, Aglets and Adaptive Agent Architecture (AAA)

    SciTech Connect (OSTI)

    Haack, Jereme N.; Cowell, Andrew J.; Gorton, Ian

    2004-06-20

    Research and development organizations are constantly evaluating new technologies in order to implement the next generation of advanced applications. At Pacific Northwest National Laboratory, agent technologies are perceived as an approach that can provide a competitive advantage in the construction of highly sophisticated software systems in a range of application areas. An important factor in selecting a successful agent architecture is the level of support it provides the developer in respect to developer support, examples of use, integration into current workflow and community support. Without such assistance, the developer must invest more effort into learning instead of applying the technology. Like many other applied research organizations, our staff are not dedicated to a single project and must acquire new skills as required, underlining the importance of being able to quickly become proficient. A project was instigated to evaluate three candidate agent toolkits across the dimensions of support they provide. This paper reports on the outcomes of this evaluation and provides insights into the agent technologies evaluated.

  13. Evaluation of the Geotech SMART24BH 20Vpp/5Vpp data acquisition system with active fortezza crypto card data signing and authentication.

    SciTech Connect (OSTI)

    Rembold, Randy Kai; Hart, Darren M.

    2009-09-01

    Sandia National Laboratories has tested and evaluated Geotech SMART24BH borehole data acquisition system with active Fortezza crypto card data signing and authentication. The test results included in this report were in response to static and tonal-dynamic input signals. Most test methodologies used were based on IEEE Standards 1057 for Digitizing Waveform Recorders and 1241 for Analog to Digital Converters; others were designed by Sandia specifically for infrasound application evaluation and for supplementary criteria not addressed in the IEEE standards. The objective of this work was to evaluate the overall technical performance of two Geotech SMART24BH digitizers with a Fortezza PCMCIA crypto card actively implementing the signing of data packets. The results of this evaluation were compared to relevant specifications provided within manufacturer's documentation notes. The tests performed were chosen to demonstrate different performance aspects of the digitizer under test. The performance aspects tested include determining noise floor, least significant bit (LSB), dynamic range, cross-talk, relative channel-to-channel timing, time-tag accuracy/statistics/drift, analog bandwidth.

  14. A Security Solution for IEEE 802.11's Ad-hoc Mode:Password-Authentication and Group Diffie-Hellman Key Exchange

    SciTech Connect (OSTI)

    Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

    2005-10-01

    The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.

  15. Tissue-based standoff biosensors for detecting chemical warfare agents

    DOE Patents [OSTI]

    Greenbaum, Elias; Sanders, Charlene A.

    2003-11-18

    A tissue-based, deployable, standoff air quality sensor for detecting the presence of at least one chemical or biological warfare agent, includes: a cell containing entrapped photosynthetic tissue, the cell adapted for analyzing photosynthetic activity of the entrapped photosynthetic tissue; means for introducing an air sample into the cell and contacting the air sample with the entrapped photosynthetic tissue; a fluorometer in operable relationship with the cell for measuring photosynthetic activity of the entrapped photosynthetic tissue; and transmitting means for transmitting analytical data generated by the fluorometer relating to the presence of at least one chemical or biological warfare agent in the air sample, the sensor adapted for deployment into a selected area.

  16. System configured for applying multiple modifying agents to a substrate

    DOE Patents [OSTI]

    Propp, W. Alan; Argyle, Mark D.; Janikowski, Stuart K.; Fox, Robert V.; Toth, William J.; Ginosar, Daniel M.; Allen, Charles A.; Miller, David L.

    2003-11-25

    The present invention is related to the modifying of substrates with multiple modifying agents in a single continuous system. At least two processing chambers are configured for modifying the substrate in a continuous feed system. The processing chambers can be substantially isolated from one another by interstitial seals. Additionally, the two processing chambers can be substantially isolated from the surrounding atmosphere by end seals. Optionally, expansion chambers can be used to separate the seals from the processing chambers.

  17. System Configured For Applying Multiple Modifying Agents To A Substrate.

    DOE Patents [OSTI]

    Propp, W. Alan; Argyle, Mark D.; Janikowski, Stuart K.; Fox, Robert V.; Toth, William J.; Ginosar, Daniel M.; Allen, Charles A.; Miller, David L.

    2005-11-08

    The present invention is related to the modifying of substrates with multiple modifying agents in a single continuous system. At least two processing chambers are configured for modifying the substrate in a continuous feed system. The processing chambers can be substantially isolated from one another by interstitial seals. Additionally, the two processing chambers can be substantially isolated from the surrounding atmosphere by end seals. Optionally, expansion chambers can be used to separate the seals from the processing chambers.

  18. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    A Key Enzyme to the Potency of an Anticancer Agent Print Incorporation of halogen atoms into drug molecules often increases biological activity. This is the case with salinosporamide A (sal A), a natural product from the marine bacterium Salinispora tropica that is 500 times more active than sal B, its nonchlorinated analog. Sal A is in phase I human clinical trials for the treatment of multiple myeloma and solid tumors. A group of researchers, using diffraction data collected at ALS Beamline

  19. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    A Key Enzyme to the Potency of an Anticancer Agent Print Incorporation of halogen atoms into drug molecules often increases biological activity. This is the case with salinosporamide A (sal A), a natural product from the marine bacterium Salinispora tropica that is 500 times more active than sal B, its nonchlorinated analog. Sal A is in phase I human clinical trials for the treatment of multiple myeloma and solid tumors. A group of researchers, using diffraction data collected at ALS Beamline

  20. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    A Key Enzyme to the Potency of an Anticancer Agent Print Incorporation of halogen atoms into drug molecules often increases biological activity. This is the case with salinosporamide A (sal A), a natural product from the marine bacterium Salinispora tropica that is 500 times more active than sal B, its nonchlorinated analog. Sal A is in phase I human clinical trials for the treatment of multiple myeloma and solid tumors. A group of researchers, using diffraction data collected at ALS Beamline

  1. A Key Enzyme to the Potency of an Anticancer Agent

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    A Key Enzyme to the Potency of an Anticancer Agent Print Incorporation of halogen atoms into drug molecules often increases biological activity. This is the case with salinosporamide A (sal A), a natural product from the marine bacterium Salinispora tropica that is 500 times more active than sal B, its nonchlorinated analog. Sal A is in phase I human clinical trials for the treatment of multiple myeloma and solid tumors. A group of researchers, using diffraction data collected at ALS Beamline

  2. Visual agent-based model development with repast simphony.

    SciTech Connect (OSTI)

    North, M. J.; Tatara, E.; Collier, N. T.; Ozik, J.; Decision and Information Sciences; Univ. of Chicago; PantaRei Corp.

    2007-01-01

    Repast is a widely used, free, and open-source agent-based modeling and simulation toolkit. Three Repast platforms are currently available, each of which has the same core features but a different environment for these features. Repast Simphony (Repast S) extends the Repast portfolio by offering a new approach to simulation development and execution. This paper presents a model of physical infrastructure network interdependency as an introductory tutorial and illustration of the visual modeling capabilities of Repast S.

  3. Carbonyl sulfide: potential agent of atmospheric sulfur corrosion

    SciTech Connect (OSTI)

    Graedel, T.E.; Kammlott, G.W.; Franey, J.P.

    1981-05-08

    Laboratory exposure experiments demonstrate that carbonyl sulfide in wet air corrodes copper at 22/sup 0/C at a rate that is approximately linear with total exposure (the product of exposure time and carbonyl sulfide concentration). The corrosion rate is similar to that of hydrogen sulfide, a widely recognized corrodant. The much greater average atmospheric abundance of carbonyl sulfide compared with that of hydrogen sulfide or sulfur dioxide suggests that carbonyl sulfide may be a major agent of atmospheric sulfur corrosion.

  4. Enhanced Detection of Toxic Agents - Energy Innovation Portal

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Hydropower, Wave and Tidal Hydropower, Wave and Tidal Energy Analysis Energy Analysis Advanced Materials Advanced Materials Find More Like This Return to Search Enhanced Detection of Toxic Agents Oak Ridge National Laboratory Contact ORNL About This Technology Publications: PDF Document Publication 12-G00200_1549.pdf (672 KB) Technology Marketing SummaryResearchers at ORNL and the University of Tennessee have taken the next step in the development of their AquaSentinel water quality monitoring

  5. Resilient Control System Execution Agent (ReCoSEA)

    SciTech Connect (OSTI)

    Craig G. Rieger; Kris Villez

    2012-08-01

    In an increasingly networked world, critical infrastructure systems suffer from two types of vulnerability. The first is the traditionally recognized problem of monitoring the systems for faults and failures, recognizing and analyzing data, and responding with real understanding to the problems of the system. Increasingly complex systems create the opportunity for single points of failure to cascade when inaccurate assessment of system health increases response time or leads to faulty analysis of the problems involved. A second problem involves vulnerability to cyber intrusion, in which bad actors can mask system deterioration or present false data about system status. A resilient system will protect stability, efficiency, and security. To ensure these three states, the system must react to changing conditions within the system with coordination: no one component of the system can be allowed to react to problems without real consideration of the effects of that action on other components within the system. Systems with multi-agent design typically have three layers of action, a management layer, a coordination layer, and an execution layer. A resilient multi-agent system will emphasize functions of the execution layer, which has the responsibility of initiating actions, monitoring, analyzing, and controlling its own processes, while feeding information back to the higher levels of management and coordination. The design concept of a resilient control system execution agent (ReCoSEA) grows out of these underpinnings, and through the use of computational intelligence techniques, this paper suggests an associated design methodology.

  6. Mercury removal in utility wet scrubber using a chelating agent

    DOE Patents [OSTI]

    Amrhein, Gerald T.

    2001-01-01

    A method for capturing and reducing the mercury content of an industrial flue gas such as that produced in the combustion of a fossil fuel or solid waste adds a chelating agent, such as ethylenediaminetetraacetic acid (EDTA) or other similar compounds like HEDTA, DTPA and/or NTA, to the flue gas being scrubbed in a wet scrubber used in the industrial process. The chelating agent prevents the reduction of oxidized mercury to elemental mercury, thereby increasing the mercury removal efficiency of the wet scrubber. Exemplary tests on inlet and outlet mercury concentration in an industrial flue gas were performed without and with EDTA addition. Without EDTA, mercury removal totaled 42%. With EDTA, mercury removal increased to 71%. The invention may be readily adapted to known wet scrubber systems and it specifically provides for the removal of unwanted mercury both by supplying S.sup.2- ions to convert Hg.sup.2+ ions into mercuric sulfide (HgS) and by supplying a chelating agent to sequester other ions, including but not limited to Fe.sup.2+ ions, which could otherwise induce the unwanted reduction of Hg.sup.2+ to the form, Hg.sup.0.

  7. Agent based control of power systems, ForskEL (Smart Grid Project...

    Open Energy Info (EERE)

    Agent based control of power systems, ForskEL (Smart Grid Project) Jump to: navigation, search Project Name Agent based control of power systems, ForskEL Country Denmark...

  8. Method for tracking the location of mobile agents using stand-off detection technique

    DOE Patents [OSTI]

    Schmitt, Randal L.; Bender, Susan Fae Ann; Rodacy, Philip J.; Hargis, Jr., Philip J.; Johnson, Mark S.

    2006-12-26

    A method for tracking the movement and position of mobile agents using light detection and ranging (LIDAR) as a stand-off optical detection technique. The positions of the agents are tracked by analyzing the time-history of a series of optical measurements made over the field of view of the optical system. This provides a (time+3-D) or (time+2-D) mapping of the location of the mobile agents. Repeated pulses of a laser beam impinge on a mobile agent, such as a bee, and are backscattered from the agent into a LIDAR detection system. Alternatively, the incident laser pulses excite fluorescence or phosphorescence from the agent, which is detected using a LIDAR system. Analysis of the spatial location of signals from the agents produced by repeated pulses generates a multidimensional map of agent location.

  9. U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system

  10. Methods to radiolabel natural organic matter by reduction with hydrogen labeled reducing agents

    DOE Patents [OSTI]

    Tinnacher, Ruth M.; Honeyman, Bruce D.

    2011-10-18

    Methods to radiolabel natural organic matter by reduction with a hydrogen labeled reducing agent, and compositions, are provided.