National Library of Energy BETA

Sample records for rsa authentication manager

  1. U-212: RSA Authentication Manager Flaws Permit Cross-Site and...

    Office of Environmental Management (EM)

    Cross-Site Scripting Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks V-026: RSA Data Protection Manager Bugs...

  2. V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...

    Broader source: Energy.gov (indexed) [DOE]

    Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability T-704: RSA enVision Lets Remote Users View Files and Remote...

  3. V-223: RSA Authentication Agent for PAM Allows Remote Users to...

    Broader source: Energy.gov (indexed) [DOE]

    Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability V-103: RSA Authentication Agent Lets Remote Users Bypass...

  4. U-267: RSA® Authentication Agent 7.1 for Microsoft Windows®...

    Broader source: Energy.gov (indexed) [DOE]

    Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability PLATFORM: Product: RSA Authentication Agent for Microsoft...

  5. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...

    Broader source: Energy.gov (indexed) [DOE]

    RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions...

  6. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  7. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Office of Environmental Management (EM)

    were reported in RSA Archer eGRC. REFERENCE LINKS: EMC SecurityTracker Alert ID: 1028516 CVE-2013-0932 CVE-2013-0933 CVE-2013-0934 IMPACT ASSESSMENT: Medium DISCUSSION: A...

  8. T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID

    Broader source: Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

  9. V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...

    Broader source: Energy.gov (indexed) [DOE]

    Key to Local Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5 RSA Web Agent for IIS versions...

  10. V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...

    Broader source: Energy.gov (indexed) [DOE]

    Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5 RSA Web Agent for IIS versions prior to 5.3.5 RSA PAM...

  11. Secure Authentication and Session State Management for Web Services

    E-Print Network [OSTI]

    Young, R. Michael

    Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young #12;Lehman 1 1. Introduction Web services protocol. In a web service, the server invokes a function based on the message sent from the client

  12. V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConduct Cross-Site Scripting

  13. V-195: RSA Authentication Manager Lets Local Users View the Administrative

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConductMultipleAccount Password |

  14. U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeed forUnruhDepartment ofM I C HCommandsEnergy

  15. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  16. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  17. V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects1:Department

  18. System and method for authentication

    DOE Patents [OSTI]

    Duerksen, Gary L.; Miller, Seth A.

    2015-12-29

    Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.

  19. 2012-2013 Keywords: Routing and spectrum allocation (RSA), flexible optical networks

    E-Print Network [OSTI]

    Varvarigo, Emmanouel "Manos"

    , "Conserving Transmission Power in Wireless Ad Hoc Networks" #12;), flexible optical networks WDM (FWDM) . (RSA) (RWA). FWDM Matlab. 2: Keywords: Routing and spectrum allocation (RSA), flexible optical networks

  20. U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory...

  1. V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain...

    Office of Environmental Management (EM)

    EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks...

  2. 2010/9/9 17:35-18:25RSA Conference Japan 20101 SECURITY DECODED

    E-Print Network [OSTI]

    Sumii, Eijiro

    2010/9/9 17:35-18:25RSA Conference Japan 20101 SECURITY DECODED ID: WH004 #12;2010/9/9 17:35-18:25RSA Conference Japan 20102 ­ ­ #12;2010/9/9 17:35-18:25RSA Conference Japan 20103 PC 17 20054 400 200512 ATM2 20085 15 20096 255 #12;2010/9/9 17:35-18:25RSA Conference Japan 20104

  3. Authentication of byte sequences

    SciTech Connect (OSTI)

    Stearns, S.D.

    1991-06-01

    Algorithms for the authentication of byte sequences are described. The algorithms are designed to authenticate data in the Storage, Retrieval, Analysis, and Display (SRAD) Test Data Archive of the Radiation Effects and Testing Directorate (9100) at Sandia National Laboratories, and may be used in similar situations where authentication of stored data is required. The algorithms use a well-known error detection method called the Cyclic Redundancy Check (CRC). When a byte sequence is authenticated and stored, CRC bytes are generated and attached to the end of the sequence. When the authenticated data is retrieved, the authentication check consists of processing the entire sequence, including the CRC bytes, and checking for a remainder of zero. The error detection properties of the CRC are extensive and result in a reliable authentication of SRAD data.

  4. Multi-factor authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  5. Parallel FPGA Implementation of RSA with Residue Number Systems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Multiplication based on Residue Num- ber Systems. Thanks to RNS, we develop a design able to perform an RSA propose a new DPA countermeasure in the framework of RNS. It is only (slightly) memory consuming (1]. That is the reason why Residue Number Systems (RNS for short) can be very useful. RNS have the main advantage of fast

  6. Parallel FPGA Implementation of RSA with Residue Number Systems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Multiplication based on Residue Num­ ber Systems. Thanks to RNS, we develop a design able to perform an RSA propose a new DPA countermeasure in the framework of RNS. It is only (slightly) memory consuming (1]. That is the reason why Residue Number Systems (RNS for short) can be very useful. RNS have the main advantage of fast

  7. V-223: RSA Authentication Agent for PAM Allows Remote Users to Make

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities |VulnerabilitiesUsersSUSE

  8. T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergyPlan | Department ofSUPPLEMENTSwitzerland|of Energy

  9. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLEStatutoryin theNuclearEnergy UtilityDepartmentV-138: Red HatLet

  10. Universal Padding Schemes for RSA Jean-S ebastien Coron, Marc Joye, David Naccache, and Pascal Paillier

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Universal Padding Schemes for RSA Jean-S#19;ebastien Coron, Marc Joye, David Naccache, and Pascal-sebastien.coron, marc.joye, david.naccache, pascal.paillierg@gemplus.com Abstract. A common practice to encrypt with RSA

  11. Generating RSA Keys on a Handheld Using an Untrusted Server Nagendra Modadugu Dan Boneh Michael Kim

    E-Print Network [OSTI]

    Boneh, Dan

    Ćciently generate RSA keys on a low power handheld device with the help of an untrusted server. Most of the key power handheld device is somewhat problematic. For example, generating a 1024 bit RSA signature life time is a concern. Consider a user who is given a new cellphone application while traveling

  12. T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...

    Broader source: Energy.gov (indexed) [DOE]

    Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT:...

  13. Entity Authentication and Authenticated Key Exchange with Tree Parity Machines

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    synchronization of two in­ teracting identically structured Tree Parity Machines (TPMs) has been proposed underEntity Authentication and Authenticated Key Exchange with Tree Parity Machines Markus Volkmer key exchange in the framework of Tree Parity Machines (TPMs). The interaction of TPMs has been

  14. Hardware Security for Device Authentication in the Smart Grid

    E-Print Network [OSTI]

    Murawski, Andrzej

    Hardware Security for Device Authentication in the Smart Grid Andrew J. Paverd and Andrew P. Martin. Secure communication between devices is a key aspect of smart grid security. In the future smart home environment, various smart devices, appliances and energy management systems will communicate with each other

  15. Cryptanalysis of Two Dynamic IDbased Remote User Authentication Schemes for

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    University, Harbin City 150001, China 2 Automobile Management Institute of PLA, Bengbu City 233011, China guessing attack under their non­tamper resistance assumption of the smart card; (2) It fails to provide of schemes. Keywords: Cryptanalysis, Authentication protocol, O#ine password guessing attack, Smart card

  16. Security analysis of RSA cryptosystem algorithm and it’s properties

    SciTech Connect (OSTI)

    Liu, Chenglian; Guo, Yongning E-mail: linjuanliucaihong@qq.com; Lin, Juan E-mail: linjuanliucaihong@qq.com

    2014-10-06

    The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles to discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA.

  17. The Security of all RSA and Discrete Log Bits JOHAN HASTAD

    E-Print Network [OSTI]

    Hĺstad, Johan

    and Phrases: Cryptography, complexity, RSA-encryption, bit-security, discrete logarithms 1. INTRODUCTION What applying a natural one-way function. In fact, any deterministic, public-key crypto system must leak some of Technology, SE-100 44 Stockholm, Sweden. Mats N¨aslund. Communicatons Security Lab, Ericsson Research, SE-164

  18. Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA Implementation Hwajeong Seo-AVX, ARM-NEON) and a massive body of research on vector-parallel implementations of modular arithmetic. Keywords: Public-key cryptography, Modular arithmetic, SIMD-level parallelism, Vector instructions, ARM

  19. SPA-based attack against the modular reduction within a partially secured RSA-CRT implementation

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Differential Power Analysis like in [2] and Differential Fault Analysis like in [3], in a secured RSA-CRT implementation on smartcards, p and q are multiplied by a secret random integer z. Then )(mod zpx is calculated a side channel leaks the integral quotient )( zpxs = during the reduction of x modulo zp

  20. NISTIR 7863 Cardholder Authentication for the

    E-Print Network [OSTI]

    NISTIR 7863 Cardholder Authentication for the PIV Digital Signature Key W. Timothy Polk Hildegard.IR.7863 #12;NISTIR 7863 Cardholder Authentication for the PIV Digital Signature Key W. Timothy Polk

  1. An Approach Towards Rebalanced RSA-CRT with Short Public Hung-Min Sun and Mu-En Wu

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    An Approach Towards Rebalanced RSA-CRT with Short Public Exponent Hung-Min Sun and Mu-En Wu. It is not only built into several operating systems, like Microsoft, Apple, Sun, and Novell, but is also used

  2. Obfuscated authentication systems, devices, and methods

    DOE Patents [OSTI]

    Armstrong, Robert C; Hutchinson, Robert L

    2013-10-22

    Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

  3. Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications

    E-Print Network [OSTI]

    Sabatini, David M.

    Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

  4. CERTIFICATE OF AUTHENTICITY | Department of Energy

    Energy Savers [EERE]

    D.C. Tran001.pdf PDF icon CERTIFICATE OF AUTHENTICITY More Documents & Publications U.S. Offshore Wind Advanced Technology Demonstration Projects Public Meeting Transcript for...

  5. Instructions for using HSPD-12 Authenticated Outlook Web Access...

    Energy Savers [EERE]

    Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook...

  6. DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING

    E-Print Network [OSTI]

    Cortesi, Tino

    DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING Sukriti Bhattacharya and Agostino Cortesi@dsi.unive.it, cortesi@unive.it Keywords: Database watermarking, ZAW, Public key watermark, Abstract interpretation the verification of integrity of the relational databases by using a public zero distortion authentication

  7. Verifying authentication protocols with CSP Steve Schneider

    E-Print Network [OSTI]

    Doran, Simon J.

    Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

  8. Instructions for Using Two-Factor RSA Tokens with Citrix Workplace |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuelsof EnergyApril 2014 | DepartmentDepartment of Energy Two-Factor RSA

  9. AUTHENTICATED

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsicloudden Documentation DataStreamsTotalproposals duenationalMeetingFAQs05-2010

  10. Database Outsourcing with Hierarchical Authenticated Data Structures Mohammad Etemad Alptekin Kupcu

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Database Outsourcing with Hierarchical Authenticated Data Structures Mohammad Etemad Alptekin K database scheme, the data owner delegates the data management tasks to a remote service provider. At a later time, the remote service is supposed to answer any query on the database. The essential

  11. Hardware device binding and mutual authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  12. U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at the Pu2: Apple

  13. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeedofDepartment ofDeployment |Energyand Let Local

  14. Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes

    DOE Patents [OSTI]

    Kent, Alexander Dale (Los Alamos, NM)

    2008-09-02

    Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

  15. CLOC: Authenticated Encryption for Short Input Tetsu Iwata1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    . CLOC uses a variant of CFB mode in its encryption part and a variant of CBC MAC in the authentication

  16. Site Sustainability Plan An Authentic Commitment

    E-Print Network [OSTI]

    #12;#12;Contents Site Sustainability Plan An Authentic Commitment Contents Acronyms and Abbreviations iv Executive Summary v Greenhouse Gas 1 Energy 6 High Performance Sustainable Buildings 9 Fleet 11 Water 13 Pollution Prevention 15 Sustainable Acquisition 19 Electronic Stewardship and Data Centers 20

  17. Massachusetts Institute of Technology Identification and Authentication

    E-Print Network [OSTI]

    Circuits Blaise Gassend, Dwaine Clarke, Daihyun Lim, Marten van Dijk, Srini Devadas To appear and Authentication of Integrated Circuits Blaise Gassend1, Dwaine Clarke1, Daihyun Lim1 Marten van Dijk2, Srinivas. VAN DIJK, S. DEVADAS However, with these techniques, the focus is simply on assigning a unique

  18. Scalable Protocols for Authenticated Group Key Exchange

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    a passive eavesdropper to an authenticated protocol which is secure against an active adversary who controls) to the original scheme. We then prove secure -- against a passive adversary -- a variant of the two-round group. The recent foundational papers of Bresson, et al. [16, 14, 15] (building on [9, 10, 7]) were the first

  19. Scalable Protocols for Authenticated Group Key Exchange

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    a passive eavesdropper to an authenticated protocol which is secure against an active adversary who controls) to the original scheme. We then prove secure --- against a passive adversary --- a variant of the two­round group. The recent foundational papers of Bresson, et al. [16, 14, 15] (building on [9, 10, 7]) were the first

  20. Lightweight Message Authentication for the Internet of

    E-Print Network [OSTI]

    Maguire Jr., Gerald Q.

    Lightweight Message Authentication for the Internet of Things RIKARD HÖGLUND KTH ROYAL INSTITUTE for the Internet of Things Rikard Höglund 2014-11-24 Master's Thesis Examiner and academic adviser Professor Gerald capable of connecting to the Internet has grown enormously. The Internet of Things describes a scenario

  1. V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access,

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of Electric SystemRemote Authenticated

  2. T-646: Debian fex authentication bypass | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of "auth-ID" when uploading files and can be exploited to bypass the authentication mechanism. PLATFORM: Debian fex ABSTRACT: Debian security discovered that fex, a web service...

  3. An Optimal Strong Password Authentication Protocol with USB Sticks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    transactions require a more stringent authentication process [11]. The use of digital certificates issued authentication mechanism has three class classifications are: the password-only PA protocols, the dedicated device-aided protocols and memory device-aided protocols. The Password-only PA protocol, has no extra

  4. IMAGE AUTHENTICATION AND TAMPER DETECTION USING TWO COMPLEMENTARY WATERMARKS

    E-Print Network [OSTI]

    Qi, Xiaojun

    IMAGE AUTHENTICATION AND TAMPER DETECTION USING TWO COMPLEMENTARY WATERMARKS Xiaojun Qi, Xing Xin-fragile watermarking scheme for image authentication and tamper detection. The proposed scheme extracts content coefficients after incidental distortions. We also generate the content-based watermark to localize tampered

  5. Image Authentication and Tampering Localization using Distributed Source Coding

    E-Print Network [OSTI]

    Girod, Bernd

    Image Authentication and Tampering Localization using Distributed Source Coding Yao-Chung Lin the legitimate diversity of encoded images from tampering. An authentication decoder was supplied with a Slepian the decoder to localize tampering in an image already deemed to be inauthentic. The localization decoder

  6. Yet Another Ultralightweight Authentication Protocol that is Broken

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    broken. These protocols rely on very simple building blocks, such as bitwise operations (,, ), modular in this paper how a passive attack can recover the 96-bit secret of a tag, using only 20 authentication sessions. The attack requires a passive adversary to eavesdrop one authentication session where a property

  7. Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio

    E-Print Network [OSTI]

    Du, Wenliang "Kevin"

    Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio Xi Tan, Kapil the usage of the spectrum to avoid interference with the primary user. However, achieving a trustworthy this attack, there should be a way to authenticate primary users' spectrum usage. We propose a method

  8. A Two-factor Authentication Mechanism Using Mobile Phones

    E-Print Network [OSTI]

    -03 Last Modification Date: 2008/08/20 Abstract Mobile devices are becoming more pervasive and more of mobile devices to provide a two-factor authentication method. Our approach uses a combination of one-time passwords, as the first authentication factor, and credentials stored on a mobile device, as the second

  9. Multi-Level TESLA: Broadcast Authentication for Distributed Sensor Networks

    E-Print Network [OSTI]

    Ning, Peng

    Multi-Level µTESLA: Broadcast Authentication for Distributed Sensor Networks DONGGANG LIU and PENG named multi-level µTESLA based on µTESLA, a broadcast authentication protocol whose scalability is limited by its unicast-based initial parameter distribution. Multi-level µTESLA satisfies several nice

  10. Proceedings of the 2009 Industrial Engineering Research Conference Portable Equipment Management in Hospitals

    E-Print Network [OSTI]

    Rossetti, Manuel D.

    . Introduction Asset management is a critical part of a hospital's logistical operations. Large quantities categories: asset management, inventory management, authenticity management, identity management and process management [2]. The scope of this study falls into asset management, which involves tracking and managing

  11. C. T. Lin, S. P. Shieh / Chain Authentication in Mobile Communication Systems Chain Authentication in Mobile Communication

    E-Print Network [OSTI]

    Shieh, Shiuhpyng Winston

    C. T. Lin, S. P. Shieh / Chain Authentication in Mobile Communication Systems 1 Chain Authentication in Mobile Communication Systems Chern-Tang Lin, Shiuh-Pyng Shieh Department of Computer Science systems have become a future trend in personal communications services (PCS) networks. To satisfy

  12. Pre-Authentication Filters: Providing DoS Resistance for Signature-Based Broadcast Authentication in Sensor

    E-Print Network [OSTI]

    Ning, Peng

    their battery power. This paper studies how to deal with such DoS attacks when signatures are used for broadcast types of solutions for broadcast authentication in sensor networks, µTESLA [19] and digital signature [5]. µTESLA and its variations achieve broad- cast authentication through delayed disclosure of authenti

  13. Improving Classical Authentication over a Quantum Channel F. M. Assis1

    E-Print Network [OSTI]

    Lisboa, Universidade Técnica de

    . Authentication tags allow to separate the secrecy Corresponding author. 1 #12;problem in message transmission

  14. Risk Management for Distributed Authorization Christian Skalka

    E-Print Network [OSTI]

    Wang, Xiaoyang "Sean"

    Risk Management for Distributed Authorization Christian Skalka University of Vermont X. Sean Wang assess risk, but risk in trust management is usually an informal consideration. In this paper, we de trust management systems treat all assertions as equally valid up to certificate authentication

  15. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  16. Does Future Social Exclusion have an Effect on State Authenticity

    E-Print Network [OSTI]

    Wilson, Craig Frank

    2010-06-30

    Previous research on social exclusion has found that it has many social and personal consequences, such as disrupting self-regulation, and lowering well-being, self-esteem and the need to belong. However, authenticity is ...

  17. Investigating the Effect of Social Exclusion on State Authenticity 

    E-Print Network [OSTI]

    Wilson, Poppy F

    2010-05-30

    This study examines the effect of social exclusion on state authenticity, the extent to which one feels real and true to the self in different situations. In addition to this, the effect of social exclusion on basic need ...

  18. Understanding 'It': Affective Authenticity, Space, and the Phish Scene

    E-Print Network [OSTI]

    Yeager, Elizabeth Anne

    2011-04-26

    "Understanding It: Affective Authenticity, Space, and the Phish Scene" is an ethnographic study of "scene identity" around the contemporary rock band Phish. Utilizing data generated from six years of ethnographic fieldwork, ...

  19. Authenticated writing assessments of agricultural education graduate students 

    E-Print Network [OSTI]

    Wright, Kimberly Dawn

    2004-11-15

    -1 AUTHENTICATED WRITING ASSESSMENTS OF AGRICULTURAL EDUCATION GRADUATE STUDENTS A Thesis by KIMBERLY DAWN WRIGHT Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree... of MASTER OF SCIENCE August 2004 Major Subject: Agricultural Education AUTHENTICATED WRITING ASSESSMENTS OF AGRICULTURAL EDUCATION GRADUATE STUDENTS A Thesis by KIMBERLY DAWN WRIGHT Submitted to Texas A...

  20. V-220: Juniper Security Threat Response Manager Lets Remote Authenticated

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities |VulnerabilitiesUsers Execute

  1. V-036: EMC Smarts Network Configuration Manager Database Authentication

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeedofDepartment ofDeployment |Energyand LetBypass

  2. Analog Video Authentication and Seal Verification Equipment Development

    SciTech Connect (OSTI)

    Gregory Lancaster

    2012-09-01

    Under contract to the US Department of Energy in support of arms control treaty verification activities, the Savannah River National Laboratory in conjunction with the Pacific Northwest National Laboratory, the Idaho National Laboratory and Milagro Consulting, LLC developed equipment for use within a chain of custody regime. This paper discussed two specific devices, the Authentication Through the Lens (ATL) analog video authentication system and a photographic multi-seal reader. Both of these devices have been demonstrated in a field trial, and the experience gained throughout will also be discussed. Typically, cryptographic methods are used to prove the authenticity of digital images and video used in arms control chain of custody applications. However, in some applications analog cameras are used. Since cryptographic authentication methods will not work on analog video streams, a simple method of authenticating analog video was developed and tested. A photographic multi-seal reader was developed to image different types of visual unique identifiers for use in chain of custody and authentication activities. This seal reader is unique in its ability to image various types of seals including the Cobra Seal, Reflective Particle Tags, and adhesive seals. Flicker comparison is used to compare before and after images collected with the seal reader in order to detect tampering and verify the integrity of the seal.

  3. Active Social Media Management: The Case of Health Care

    E-Print Network [OSTI]

    Miller, Amalia R.

    Given the demand for authentic personal interactions over social media, it is unclear how much firms should actively manage their social media presence. We study this question empirically in a health care setting. We show ...

  4. management

    National Nuclear Security Administration (NNSA)

    5%2A en Management and Budget http:www.nnsa.energy.govaboutusouroperationsmanagementandbudget

  5. Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis

    E-Print Network [OSTI]

    Li, Depeng

    Authentication schemes relying on per-packet signature and per-signature verification introduce heavy cost for computation and communication. Due to its constraint resources, smart grid's authentication requirement cannot ...

  6. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain...

  7. Entity Authentication Schemes Using Braid Word Reduction Herve SIBERT, Patrick DEHORNOY, and Marc GIRAULT

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Entity Authentication Schemes Using Braid Word Reduction Hervâ??e SIBERT, Patrick DEHORNOY, and Marc, authentication, zero knowledge, handle reduction. 1 #12; 2 HERV â?? E SIBERT, PATRICK DEHORNOY, AND MARC GIRAULT 2

  8. Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding author)

    E-Print Network [OSTI]

    Doran, Simon J.

    1 Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding in the process algebra Communicating Sequential Processes (CSP) to specify authentication. The purpose, security protocols, CSP, formal specification, Kerberos 1. Introduction Schneider [1] uses Communicating

  9. Master's Thesis A Study on Location-Based Authenticated Key Agreement

    E-Print Network [OSTI]

    Kim, Kwangjo

    Master's Thesis A Study on Location-Based Authenticated Key Agreement Scheme in Wireless Sensor Institute of Science and Technology 2010 #12;A Study on Location-Based Authenticated Key Agreement Scheme in Wireless Sensor and Actor Networks #12;A Study on Location-Based Authenticated Key Agreement Scheme

  10. Password Protected Smart Card and Memory Stick Authentication Against Off-Line Dictionary Attacks

    E-Print Network [OSTI]

    Wang, Yongge

    Password Protected Smart Card and Memory Stick Authentication Against Off-Line Dictionary Attacks requirements for remote authentication with password protected smart card. In recent years, several protocols on the password based authentication between a smart card owner and smart card via an untrusted card reader

  11. Generic Compilers for Authenticated Key Exchange Tibor Jager Florian Kohlar Sven Schage Jorg Schwenk

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Generic Compilers for Authenticated Key Exchange Tibor Jager Florian Kohlar Sven Sch¨age J efficient attacks on the na¨ive combination of these protocols. In this paper, we propose new compilers challenge(s) exchanged during authentication. Keywords: authenticated key agreement, protocol compiler, TLS

  12. Efficient authentication mechanisms for navigation systems a radio-navigation case

    E-Print Network [OSTI]

    Stanford University

    upon the Timed Efficient Stream Loss- Tolerant Authentication (TESLA) algorithm. We analyze and a detailed security analysis of the needed key size, we developed adjusted TESLA, an authentication can use such a small authentication message is due to the insertion of a timestamp into the generation

  13. Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks

    E-Print Network [OSTI]

    Ning, Peng

    authentication in wireless sensor networks: digital signatures and µTESLA-based techniques. However, both signature-based and µTESLA-based broadcast authentication are vulnerable to Denial of Services (DoS) attacks verifications (in case of signature-based broadcast authentication) or packet forwarding (in case of µTESLA

  14. The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

    E-Print Network [OSTI]

    Tygar, Doug

    The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol of receivers, and tolerates packet loss. TESLA is based on loose time synchronization between the sender

  15. Non-Cryptographic Authentication and Identification in Wireless Networks

    E-Print Network [OSTI]

    California at Davis, University of

    1 Non-Cryptographic Authentication and Identification in Wireless Networks Kai Zeng, Kannan considered as potential alternatives/complements to provide security services in wireless networks identi- fication in wireless networks using lower/physical layer properties or information. We discuss

  16. On the Authentication of RFID Systems with Bitwise Operations

    E-Print Network [OSTI]

    Poovendran, Radha

    On the Authentication of RFID Systems with Bitwise Operations Basel Alomair Network Security Lab secure authenti- cation via bitwise operations. Following each proposal, a series of papers have been. We divide bitwise operations into two main categories and address the security limitations of each

  17. Automation-considered Logic of Authentication and Key Distribution

    E-Print Network [OSTI]

    Kwon, Taekyoung

    methods are focused on the automation-based model checking that relies on building a finite modelAutomation-considered Logic of Authentication and Key Distribution Taekyoung Kwon1 and Seongan Lim2 Abstract. This paper presents an automation-considered logic of au- thentication for reasoning about

  18. On the Security of the Tor Authentication Protocol

    E-Print Network [OSTI]

    Goldberg, Ian

    On the Security of the Tor Authentication Protocol Ian Goldberg David R. Cheriton School@cs.uwaterloo.ca Abstract. Tor is a popular anonymous Internet communication sys- tem, used by an estimated 250,000 users to anonymously exchange over five terabytes of data per day. The security of Tor depends on properly

  19. KERBEROS: AN AUTHENTICATION SERVICE FOR OPEN NETWORK SYSTEMS

    E-Print Network [OSTI]

    Pâris, Jehan-François

    consists of a Kerberos server and a ticket-granting server (TGS). Once users are authenticated by Kerberos, they receive a TGS ticket. This ticket will allow them to request from the TGS tickets for all the other servers. Kerberos keeps keys for (a) all the system users and (b) the ticket-granting server (TGS

  20. Authenticated Multicast Immune to DenialofService Shouhuai Xu

    E-Print Network [OSTI]

    Xu, Shouhuai

    using Merkle signature tree to tolerate packet loss. Although the cost for generating and verifying for each signature. Perrig et al. [13] propose a solution they call TESLA. The main idea is to let to authenticate the bu#11;ered packet. Although some of the shortcomings of TESLA are overcome in their following

  1. Digital Watermarking for Telltale Tamper Proofing and Authentication

    E-Print Network [OSTI]

    Kundur, Deepa

    Digital Watermarking for Telltale Tamper Proofing and Authentication DEEPA KUNDUR, STUDENT MEMBER the problem of fragile digital watermarking for the tamper proofing of still images. Applications of our domain of the image by quantizing the corresponding coefficients. Tamper detection is pos- sible

  2. Secure Password-Based Authenticated Key Exchange for Web Services

    E-Print Network [OSTI]

    sign-on, delegation, and identity. The Grid Security Infrastructure (GSI) is the name given so. 1.3 Security in Grid Computing Security is one of the major requirements of Grid computing. Any Grid site deployment must at least provide the basic security mechanisms including authentication

  3. Stronger security bounds for Wegman-Carter-Shoup authenticators

    E-Print Network [OSTI]

    Bernstein, Daniel

    messages. Here m is a message; n is a nonce chosen from a public group G; f is a secret uniform random permutation of G; h is a secret random function; and ffl is a differential probabili* *ty of the same systems is retained up top___ #G authenticated messages. In a typical state

  4. Stronger security bounds for Wegman-Carter-Shoup authenticators

    E-Print Network [OSTI]

    Bernstein, Daniel

    messages. Here m is a message; n is a nonce chosen from a public group G; f is a secret uniform random permutation of G; h is a secret random function; and ffl is a differential probability of the same systems is retained up top___ #G authenticated messages. In a typical state

  5. Cryptanalysis of a recent two factor authentication scheme

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Centre Dublin City University Ballymun, Dublin 9, Ireland. mike.scott@certivox.com Abstract. Very recently a scheme has been proposed by Wang and Ma for a robust smart-card based password authentication scheme, which claims to be secure against a Smart Card security breach. In this short note we attempt

  6. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Doran, Simon J.

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  7. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  8. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

  9. Ninja : Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments

    E-Print Network [OSTI]

    Mitchell, Chris

    authentication. In emerging ubiquitous computing paradigms which are highly dynamic and mobile in nature, entity, Ubiquitous, Trusted Computing. 1 Introduction In the Mobile VCE1 Core 4 research programme on Ubiquitous User ? IP Backbone? Pervasive User Environment WiMAX Bluetooth Fig. 1. A Ubiquitous Computing

  10. Defining the questions: a research agenda for nontraditional authentication in arms control

    SciTech Connect (OSTI)

    Hauck, Danielle K [Los Alamos National Laboratory; Mac Arthur, Duncan W [Los Alamos National Laboratory; Smith, Morag K [Los Alamos National Laboratory; Thron, Jonathan L [Los Alamos National Laboratory; Budlong - Sylvester, Kory [Los Alamos National Laboratory

    2010-01-01

    Many traditional authentication techniques have been based on hardware solutions. Thus authentication of measurement system hardware has been considered in terms of physical inspection and destructive analysis. Software authentication has implied hash function analysis or authentication tools such as Rose. Continuity of knowledge is maintained through TIDs and cameras. Although there is ongoing progress improving all of these authentication methods, there has been little discussion of the human factors involved in authentication. Issues of non-traditional authentication include sleight-of-hand substitutions, monitor perception vs. reality, and visual diversions. Since monitor confidence in a measurement system depends on the product of their confidences in each authentication element, it is important to investigate all authentication techniques, including the human factors. This paper will present an initial effort to identify the most important problems that traditional authentication approaches in safeguards have not addressed and are especially relevant to arms control verification. This will include a survey of the literature and direct engagement with nontraditional experts in areas like psychology and human factors. Based on the identification of problem areas, potential research areas will be identified and a possible research agenda will be developed.

  11. Hardware device to physical structure binding and authentication

    SciTech Connect (OSTI)

    Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

    2013-08-20

    Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

  12. Simultaneous Authentication and Certification of Arms-Control Measurement Systems

    SciTech Connect (OSTI)

    MacArthur, Duncan W. [Los Alamos National Laboratory; Hauck, Danielle K. [Los Alamos National Laboratory; Thron, Jonathan L. [Los Alamos National Laboratory

    2012-07-09

    Most arms-control-treaty-monitoring scenarios involve a host party that makes a declaration regarding its nuclear material or items and a monitoring party that verifies that declaration. A verification system developed for such a use needs to be trusted by both parties. The first concern, primarily from the host party's point of view, is that any sensitive information that is collected must be protected without interfering in the efficient operation of the facility being monitored. This concern is addressed in what can be termed a 'certification' process. The second concern, of particular interest to the monitoring party, is that it must be possible to confirm the veracity of both the measurement system and the data produced by this measurement system. The monitoring party addresses these issues during an 'authentication' process. Addressing either one of these concerns independently is relatively straightforward. However, it is more difficult to simultaneously satisfy host party certification concerns and monitoring party authentication concerns. Typically, both parties will want the final access to the measurement system. We will describe an alternative approach that allows both parties to gain confidence simultaneously. This approach starts with (1) joint development of the measurement system followed by (2) host certification of several copies of the system and (3) random selection by the inspecting party of one copy to be use during the monitoring visit and one (or more) copy(s) to be returned to the inspecting party's facilities for (4) further hardware authentication; any remaining copies are stored under joint seal for use as spares. Following this process, the parties will jointly (5) perform functional testing on the selected measurement system and then (6) use this system during the monitoring visit. Steps (1) and (2) assure the host party as to the certification of whichever system is eventually used in the monitoring visit. Steps (1), (3), (4), and (5) increase the monitoring party's confidence in the authentication of the measurement system.

  13. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

    2000-01-01

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

  14. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

    2001-01-01

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters, the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided&

  15. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  16. A new generic protocol for authentication and key agreement in lightweight systems

    E-Print Network [OSTI]

    Markowitch, Olivier

    A new generic protocol for authentication and key agreement in lightweight systems Na¨im Qachri1 frederic.lafitte@rma.ac.be Abstract. In this paper, we propose a new generic authenticated key agreement protocol where the master secret is automatically renewed based on a sequence of hash values, thus

  17. Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems

    E-Print Network [OSTI]

    Wang, Yongge

    Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

  18. Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID Systems(observing) about 90 runs of the protocol. Finding a nonce enables a passive attacker to recover all five secret. Key words: : RFID, Authentication Protocol, Passive Attack 1 Introduction As of today, RFID (Radio

  19. Information Theoretic Bounds on Authentication Systems in Query Reihaneh Safavi-Naini Peter Wild

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Information Theoretic Bounds on Authentication Systems in Query Model Reihaneh Safavi-Naini Peter Wild School of IT and CS Information Security Group University of Wollongong Royal Holloway University Authentication codes provide message integrity guarantees in an information theoretic sense within a symmetric

  20. Information Theoretic Bounds on Authentication Systems in Query Reihaneh SafaviNaini Peter Wild

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Information Theoretic Bounds on Authentication Systems in Query Model Reihaneh Safavi­Naini Peter Wild School of IT and CS Information Security Group University of Wollongong Royal Holloway University Authentication codes provide message integrity guarantees in an information theoretic sense within a symmetric

  1. Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME

    E-Print Network [OSTI]

    Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME Presented, Washington, DC 20375 E-mail: archer@itd.nrl.navy.mil The TESLA multicast stream authentication protocol just been revealed. While an informal argument for the correctness of TESLA has been published

  2. The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

    E-Print Network [OSTI]

    Perrig, Adrian

    The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss­tolerant Authentication) broadcast au­ thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro­ nization between

  3. The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

    E-Print Network [OSTI]

    Perrig, Adrian

    The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast au- thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro- nization between

  4. CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider

    E-Print Network [OSTI]

    Doran, Simon J.

    CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider Department In this paper we consider the nature of machine proofs used in the CSP approach to the veri cation of authentication protocols using the process algebra CSP Hoa85]. The CSP syntax provides a natural and precise way

  5. A Novel Trigon based Dual Authentication Protocol for Enhancing Security in Grid Environment

    E-Print Network [OSTI]

    Ruckmani, V

    2010-01-01

    In recent times, a necessity has been raised in order to distribute computing applications often across grids. These applications are dependent on the services like data transfer or data portal services as well as submission of jobs. Security is of utmost importance in grid computing applications as grid resources are heterogeneous, dynamic, and multidomain. Authentication remains as the significant security challenge in grid environment. In traditional authentication protocol a single server stores the sensitive user credentials, like username and password. When such a server is compromised, a large number of user passwords, will be exposed. Our proposed approach uses a dual authentication protocol in order to improve the authentication service in grid environment. The protocol utilizes the fundamental concepts of trigon and based on the parameters of the trigon the user authentication will be performed. In the proposed protocol, the password is interpreted and alienated into more than one unit and these uni...

  6. Holographic Labeling And Reading Machine For Authentication And Security Appications

    DOE Patents [OSTI]

    Weber, David C. (Rancho Santa Margarita, CA); Trolinger, James D. (Costa Mesa, CA)

    1999-07-06

    A holographic security label and automated reading machine for marking and subsequently authenticating any object such as an identification badge, a pass, a ticket, a manufactured part, or a package is described. The security label is extremely difficult to copy or even to read by unauthorized persons. The system comprises a holographic security label that has been created with a coded reference wave, whose specification can be kept secret. The label contains information that can be extracted only with the coded reference wave, which is derived from a holographic key, which restricts access of the information to only the possessor of the key. A reading machine accesses the information contained in the label and compares it with data stored in the machine through the application of a joint transform correlator, which is also equipped with a reference hologram that adds additional security to the procedure.

  7. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  8. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  9. Using Unlabelled Data To Update Classification Rules With Applications In Food Authenticity Studies

    E-Print Network [OSTI]

    Washington at Seattle, University of

    library . . . . . . . . . . . 3 2 Average correct classification rates for the five meat groupsUsing Unlabelled Data To Update Classification Rules With Applications In Food Authenticity Studies programme. #12;Abstract A classification method is developed to classify samples when both labelled

  10. Entity Authentication Schemes Using Braid Word Reduction Herve SIBERT, Patrick DEHORNOY, and Marc GIRAULT

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Entity Authentication Schemes Using Braid Word Reduction Herv´e SIBERT, Patrick DEHORNOY, and Marc, AND MARC GIRAULT 2. Difficult braid problems 2.1. Braid groups. For n 2, Artin's braid group Bn is defined

  11. Subverting value hierarchies : essays on the causes and responses to shifts in demand for authenticity

    E-Print Network [OSTI]

    Hahl, Oliver (Oliver Douglas)

    2013-01-01

    This dissertation includes three essays on the causes and responses to shifts in demand for authenticity. In the first chapter, I answer the question: why do previously cast-off products, practices, or styles abruptly ...

  12. The Emotional and Spiritual Dimensions of Being a Pastor: Authenticity and Identity 

    E-Print Network [OSTI]

    Otey, Penny Addison

    2011-10-21

    Emotional labor and its influence on authenticity and identity amongst human service workers has been the focus of numerous studies. Often these studies viewed identity as a stable sense of self. This study set out to examine emotional labor amongst...

  13. V-236: MediaWiki CentralAuth Extension Authentication Bypass...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    an error when handling auto-logins and can be exploited to bypass the authentication mechanism by providing a valid username within the "centralauthUser" cookie. IMPACT: Security...

  14. The Role of Psychological Needs for Autonomy, Competence, Relatedness and Money-luxury in State Authenticity 

    E-Print Network [OSTI]

    Renwick, Louisa Catherine

    2009-07-03

    This study aimed to determine the effects of psychological needs on states of authenticity. Self-determination theory proposes three basic psychological needs, for autonomy, competence and relatedness (Deci & Ryan, 1985). ...

  15. AUTHENTICATED SENSOR INTERFACE DEVICE FOR JOINT USE SAFEGUARDS APPLICATIONS - CONCEPTS AND CHALLENGES

    SciTech Connect (OSTI)

    Poland, R.; Drayer, R.; Wilson, J.

    2013-08-12

    This paper will discuss the key features of the Authenticated Sensor Interface Device that collectively provide the ability to share data among a number of parties while ensuring the authentication of data and protecting both the operator’s and the IAEA’s interests. The paper will also discuss the development of the prototype, the initial testing with an accountancy scale, and future plans and challenges to implementation into the joint use and remote monitoring applications. As nuclear fuel cycle technology becomes more prevalent throughout the world and the capacity of plants increases, limited resources of the IAEA are being stretched near a breaking point. A strategy is to increase efficiency in safeguards monitoring using “joint use” equipment that will provide the facility operator process data while also providing the IAEA key safeguards data. The data, however, must be authenticated and validated to ensure the data have not been tampered with. The Authenticated Sensor Interface Device provides the capability to share data and can be a valuable component in the IAEA’s ability to collect accountancy data from scales in Uranium conversion and enrichment plants, as well as nuclear fuel fabrication plants. Likewise, the Authenticated Sensor Interface Device can be configured to accept a diverse array of input signals, ranging from analog voltage, to current, to digital interfaces and more. These modular capabilities provide the ability to collect authenticated, joint-use, data streams from various process monitoring sensors.

  16. Approved Module Information for LE3024, 2014/5 Module Title/Name: Leadership & Management

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    will learn how to: select and use data and information from primary sources (e.g. authentic dataApproved Module Information for LE3024, 2014/5 Module Title/Name: Leadership & Management Module? Not Specified Module Credits: 20 Module Management Information Module Leader Name Judith Baxter

  17. Home News Products Blogs Buyers Guide Whitepapers Jobs Events Subscribe Issue Archive Topic Center: Email Security Compliance Patch Management Financial Services Health care RSA 2008 RSS | Login | Register

    E-Print Network [OSTI]

    Gupta, Minaxi

    SEARCH Home News Products Blogs Buyers Guide Whitepapers Jobs Events Subscribe Issue Archive Topic located the malicious files, mostly MP3 or AVI in format, on popular peer-to- peer (P2P) websites appear when users employ certain terms when searching for music and video, he said. Once the files

  18. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

  19. Authenticity as a state; its mediating relationship between mood and wellbeing, and the role of self-consciousness 

    E-Print Network [OSTI]

    Ames, Sophie

    2009-07-03

    State versus trait: the experiment explored the dichotomy in personality theory by investigating whether judgements of authenticity were susceptible to different mood conditions. Life satisfaction and self consciousness ...

  20. 29.01.03.M1.03 Information Resources-Account Management Page 1 of 5 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    29.01.03.M1.03 Information Resources- Account Management Page 1 of 5 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.03 Information Resources ­ Account Management Approved July 18, 2005 Revised February of establishing confidence in the identity of users or information systems. There are many ways to authenticate

  1. U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    Cisco Connected Grid Network Management System Multiple Vulnerabilities V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code U-255: Apache Wicket Input Validation...

  2. A Tree-Based TESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu Sushil Jajodia

    E-Print Network [OSTI]

    Zhu, Sencun

    A Tree-Based µTESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu to multiple nodes in an authenticated way. µTESLA and multi-level µTESLA have been proposed to provide of senders. Though multi-level µTESLA schemes can scale up to large sensor networks (in terms of receivers

  3. Reversible Image Authentication with Tamper Localization Based on Integer Wavelet Transform

    E-Print Network [OSTI]

    Devi, P Meenakshi; Duraiswamy, K

    2009-01-01

    In this paper, a new reversible image authentication technique with tamper localization based on watermarking in integer wavelet transform is proposed. If the image authenticity is verified, then the distortion due to embedding the watermark can be completely removed from the watermarked image. If the image is tampered, then the tampering positions can also be localized. Two layers of watermarking are used. The first layer embedded in spatial domain verifies authenticity and the second layer embedded in transform domain provides reversibility. This technique utilizes selective LSB embedding and histogram characteristics of the difference images of the wavelet coefficients and modifies pixel values slightly to embed the watermark. Experimental results demonstrate that the proposed scheme can detect any modifications of the watermarked image.

  4. 29.01.03.M1.14 Information Resources Password-based Authentication Page 1 of 7 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    Behmer, Spencer T.

    29.01.03.M1.14 Information Resources ­ Password-based Authentication Page 1 of 7 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.14 Information Resources ­ Password-based Authentication Approved July 18 authentication is a means to control who has access to an information resource system. Controlling the access

  5. Scalability and Security Conflict for RFID Authentication Protocols

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    chain management and inventory control. Because of low production costs and small size, RFID technology to be the main communication devices in ubiquitous environment with many applications in manufacturing, sup- ply

  6. On Person Authentication by Fusing Visual and Thermal Face Biometrics Ognjen Arandjelovic

    E-Print Network [OSTI]

    Cipolla, Roberto

    . This is due to the fact that a thermal infrared sensor measures the heat energy radiation emitted by the faceOn Person Authentication by Fusing Visual and Thermal Face Biometrics Ognjen Arandjelovi´c Riad in the thermal spectrum are promising in achieving invariance to extreme illumination changes that are often

  7. Efficient Compilers for Authenticated Group Key Qiang Tang and Chris J. Mitchell

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Efficient Compilers for Authenticated Group Key Exchange Qiang Tang and Chris J. Mitchell.tang,c.mitchell}@rhul.ac.uk 10th October, 2005 Abstract In this paper we propose two compilers which are designed to transform, or malicious insider. We show that the first proposed compiler gives protocols that are more ef- ficient than

  8. E#cient Compilers for Authenticated Group Key Qiang Tang and Chris J. Mitchell

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    E#cient Compilers for Authenticated Group Key Exchange Qiang Tang and Chris J. Mitchell Information.tang,c.mitchell}@rhul.ac.uk 10th October, 2005 Abstract In this paper we propose two compilers which are designed to transform, or malicious insider. We show that the first proposed compiler gives protocols that are more ef­ ficient than

  9. Time Valid One-Time Signature for Time-Critical Multicast Data Authentication

    E-Print Network [OSTI]

    Nahrstedt, Klara

    malicious attacks. In this paper, we propose a novel signature model ­ Time Valid One-Time Signature (TVTime Valid One-Time Signature for Time-Critical Multicast Data Authentication Qiyan Wang, Himanshu-OTS) ­ to boost the efficiency of regular one-time signature schemes. Based on the TV-OTS model, we design

  10. RADON/RIDGELET SIGNATURE FOR IMAGE AUTHENTICATION Zhen Yao Nasir Rajpoot

    E-Print Network [OSTI]

    Rajpoot, Nasir

    RADON/RIDGELET SIGNATURE FOR IMAGE AUTHENTICATION Zhen Yao Nasir Rajpoot Dept. of Computer Science transform. The signature is extracted from the Radon domain and entropy coded after a 1D wavelet transform- derlying Radon transform plays an essential role in provid- ing such non-separable, directional properties

  11. Nov. 15, 2001 Mohammad al-Kahtani 1 Emerging Authorization and Authentication

    E-Print Network [OSTI]

    Sandhu, Ravi

    1 Nov. 15, 2001 Mohammad al-Kahtani 1 XML Emerging Authorization and Authentication Standards Nov. 15, 2001 Mohammad al-Kahtani 2 About the speaker · Name: Mohammad al-Kahtani · Doctoral Candidate in Software Engineering: George Mason University · Contact info: malkahta@gmu.edu #12;2 Nov. 15, 2001 Mohammad

  12. Cryptanalysis of an IDbased Password Authentication Scheme using Smart Cards and

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Cryptanalysis of an ID­based Password Authentication Scheme using Smart Cards and Fingerprints Michael Scott School of Computer Applications Dublin City University Ballymun, Dublin 9, Ireland. mike two ID­based password authen­ tication schemes for logging onto a remote network server using smart

  13. A Secure and efficient elliptic curve based authentication and key agreement protocol suitable for WSN

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    for WSN Majid Bayat bayat@khu.ac.ir Department of Mathematical Sciences and Computer, University protocols for WSN which in this paper we show that the protocol has some security flaws. Also we introduce an enhanced authentication and key agreement protocol for WSN satisfying all the security requirements

  14. On the (in)security of some smart-card-based password authentication schemes for WSN

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On the (in)security of some smart-card-based password authentication schemes for WSN Ding Wang1 operations and thus is suitable for the resource-constrained WSN environments where an external user wants-tamper-resistant smart cards for WSN. We hope that, by following this principle, similar mistakes repeated in the past

  15. April 11, 2002 Computer Security Foundations Workshop 1 Security Protocol Design via Authentication Tests

    E-Print Network [OSTI]

    Guttman, Joshua

    process, and illustrate its use by creating ATSPECT, an Authentication Test-based Se- cure Protocol a basis for secure electronic commerce. It is not currently in use anywhere, presumably partly it was viewed as a high-risk un- Supported by the National Security Agency through US Army CE- COM contract DAAB

  16. Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home Mark Manulis1|francois.koeune|olivier.bonaventure|jean-jacques.quisquater}@uclouvain.be Abstract. In wireless roaming a mobile device obtains a service from some foreign network while being. Such Wireless Roaming via Tunnels (WRT) offers several (security) benefits but states also new security

  17. A Lightweight Certificate-based Source Authentication Protocol for Group Communication

    E-Print Network [OSTI]

    Baras, John S.

    of lightweight, symmetric-key certificates called TESLA certificate. The certificates bind the identities and verification frequently can prevent the CPU from other functions and drain the battery quickly. Therefore resources. We propose to achieve authentication using a new class of certificates called TESLA Certificate

  18. Robust Content-Based MPEG-4 XMT Scene Structure Authentication and Multimedia Content Location

    E-Print Network [OSTI]

    Ottawa, University of

    18 Robust Content-Based MPEG-4 XMT Scene Structure Authentication and Multimedia Content Location-based MPEG-4 XMT standard. XMT allows content authors to exchange their content with other authors, tools-4 XMT structure and its media content. Unlike images or videos, watermarking an XMT structure

  19. All Your Face Are Belong to Us: Breaking Facebook's Social Authentication

    E-Print Network [OSTI]

    Keromytis, Angelos D.

    All Your Face Are Belong to Us: Breaking Facebook's Social Authentication Iasonas Polakis FORTH adversaries from compromising accounts using stolen credentials. Facebook has recently released a two can obtain the information needed to solve the chal- lenges presented by Facebook. We implement

  20. Distance Measures for Gabor Jets-Based Face Authentication: A Comparative Evaluation

    E-Print Network [OSTI]

    Bicego, Manuele

    Distance Measures for Gabor Jets-Based Face Authentication: A Comparative Evaluation Daniel Gonz (Italy) tista@uniss.it Abstract. Local Gabor features (jets) have been widely used in face recognition systems. Once the sets of jets have been extracted from the two faces to be compared, a proper measure

  1. U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at theArbitrary Code |

  2. IDENTITY AND ACCESS MANAGEMENT -GOVERNANCE AND POLICY FOCUS GROUP POLICY GAP ANALYSIS

    E-Print Network [OSTI]

    Maroncelli, Mark

    and ITS policies including this policy. Written Acknowledgment includes image data base form from the PennIDENTITY AND ACCESS MANAGEMENT - GOVERNANCE AND POLICY FOCUS GROUP POLICY GAP ANALYSIS Issue Policy systems that use this Userid for authentication and authorization. Life Cycle-Affiliations Definition

  3. A preliminary version of this paper appears in Topics in Cryptology --CT-RSA '08, Lecture Notes in Computer Science Vol. ??, T. Malkin ed., Springer-Verlag, 2008. This is the full version.

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    : Standard Model Efficiency through Authenticated Symmetric Encryption Eike Kiltz1 Yevgeniy Vahlis2 1 Cryptology and Information Security Theme, CWI Amsterdam, The Netherlands kiltz@cwi.nl 2 Computer Science in the standard model, yet they offer performance competitive with all known random-oracle based schemes

  4. Provably-Secure Authenticated Group Diffie-Hellman KeyExchange

    SciTech Connect (OSTI)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2007-01-01

    Authenticated key exchange protocols allow two participantsA and B, communicating over a public network and each holding anauthentication means, to exchange a shared secret value. Methods designedto deal with this cryptographic problem ensure A (resp. B) that no otherparticipants aside from B (resp. A) can learn any information about theagreed value, and often also ensure A and B that their respective partnerhas actually computed this value. A natural extension to thiscryptographic method is to consider a pool of participants exchanging ashared secret value and to provide a formal treatment for it. Startingfrom the famous 2-party Diffie-Hellman (DH) key exchange protocol, andfrom its authenticated variants, security experts have extended it to themulti-party setting for over a decade and completed a formal analysis inthe framework of modern cryptography in the past few years. The presentpaper synthesizes this body of work on the provably-secure authenticatedgroup DH key exchange.

  5. Network Management Network Management

    E-Print Network [OSTI]

    Giaccone, Paolo

    Network Management Pag. 1 Network Management Network management and QoS provisioning - 1Andrea of this license visit: http://creativecommons.org/licenses/by-nc- /3 0/ Network management and QoS provisioning ­ Chapter 9, Network Management, of the book Jim Kurose, Keith Ross, Computer Networking, A Top Down

  6. Management Plan Management Plan

    E-Print Network [OSTI]

    Management Plan Management Plan "Management and restoration programs for native salmonids have communities" J. Lichatowich et al. 1998. A Conceptual Foundation for the Management of Native Salmonids in the Deschutes River. The Management Plan consists of five elements described in the Council's program: 1

  7. 5) Management 5) Management

    E-Print Network [OSTI]

    Nowak, Robert S.

    5) Management c) Control #12;5) Management c) Control Prioritizing control ­ From Hiebert in Luken & Thieret (1997) · Types of information utilized Ecological impacts #12;5) Management c) Control impacts Economic impacts #12;5) Management c) Control Prioritizing control ­ From Hiebert in Luken

  8. Network Management Network Management

    E-Print Network [OSTI]

    Giaccone, Paolo

    Network Management Pag. 1 Network Management Andrea Bianco Telecommunication Network Group Network management and QoS provisioning - 1Andrea Bianco ­ TNG group - Politecnico di Torino Telecommunication management and QoS provisioning - 2Andrea Bianco ­ TNG group - Politecnico di Torino Stanford, California

  9. Sex Work in Second Life: Scripts, presence, and Bounded Authenticity in a Virtual Environment

    E-Print Network [OSTI]

    Lynch, Michael J.

    2010-01-01

    from the Internet of 1994. Conclusion $V#3;ŔHGJOLQJ#3; WHFKQRORJLHV#3; RI#3; WKH#3; SDVW#3; KDYH#3; RIWHQ#3; EHHQ#3;żUVW#3; exploited for sexual purposes4, an argument could be made that 4#3;6XFK#3;DV#3;KRZ#3;WKH#3;żUVW#3;PRYLQJ#3... signal a heightened sense of intimacy and is a premium feature of virtual sex as an erotic service. These żQGLQJV#3;SURYLGH#3;IXUWKHU#3;HYLGHQFH#3;IRU#3;%HUQVWHLQ¶V#3;QRWLRQ#3;RI#3;ERXQGHG#3; authenticity, as virtual sex is a...

  10. IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for

    E-Print Network [OSTI]

    Shen, Xuemin "Sherman"

    IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for Smart Grid Communications Mostafa M. Fouda, Member, IEEE, Zubair Md. Fadlullah, Member Abstract--Smart grid (SG) communication has recently received significant attentions to facilitate

  11. T-570: HP Security Bulletin- HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass.

  12. A Novel RFID Authentication Protocol based on Elliptic Curve Cryptosystem Yalin Chen1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    system, access management, animal identification, e-passport, medical applications, asset management Tsing Hua University, Taiwan yalin78900@gmail.com 2,3,4 Department of Information Management, Nanhua, transportation and logistics management, etc [1, 5, 13]. #12;2 According to whether equipped with a power supply

  13. JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JANUARY 2007 1 Distributed Group Authentication for

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Frequency Identification) based product identification system for inventory and sup- ply management into RFID supply-chain management systems. Index Terms--Distributed RFID systems, supply-chain management to objects to be identified; ii) readers or interrogators, which manage tag population, read data from

  14. NH Timber Yield Tax Overview (RSA 79)

    E-Print Network [OSTI]

    New Hampshire, University of

    land. The bond is usually equal to the amount of expected yield tax. When can you appeal: If a taxpayer denies the appeal then the taxpayer may appeal to the Department of Revenue within 180 days of the tax

  15. Conference Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-11-03

    To establish requirements and responsibilities with respect to managing conferences sponsored by the Department of Energy (DOE) or by DOE management and operating contractors and other contractors who perform work at DOE-owned or -leased facilities, including management and integration contractors and environmental restoration management contractors (when using funds that will be reimbursed by DOE). Cancels DOE N 110.3.

  16. Security Proof for Password Authentication in TLS-Verifier-based Three-Party Group Diffie-Hellman

    SciTech Connect (OSTI)

    Chevassut, Olivier; Milner, Joseph; Pointcheval, David

    2008-04-21

    The internet has grown greatly in the past decade, by some numbers exceeding 47 million active web sites and a total aggregate exceeding100 million web sites. What is common practice today on the Internet is that servers have public keys, but clients are largely authenticated via short passwords. Protecting these passwords by not storing them in the clear on institutions's servers has become a priority. This paper develops password-based ciphersuites for the Transport Layer Security (TLS) protocol that are: (1) resistant to server compromise; (2) provably secure; (3) believed to be free from patent and licensing restrictions based on an analysis of relevant patents in the area.

  17. Energy Management in Microgrids: Algorithms and System

    E-Print Network [OSTI]

    Shi, Wenbo

    2015-01-01

    Energy Management . . . . . . . . . . . . . . . . . . . . .Distributed Energy Management . . . . . . . . . . . . . . .Energy Management . . . . . . . . . . . . . . . . . . . . .

  18. LIANG, WEI. Design and Analysis of Authentication Mechanisms in Single-and Multi-Hop Wireless Networks. (Under the direction of Professor Wenye Wang).

    E-Print Network [OSTI]

    Wang, Wenye

    -Hop Wireless Networks. (Under the direction of Professor Wenye Wang). The increasing demand for ubiquitous Internet services imposes more security threats to communications due to open mediums in wireless networks on the transmission. As one of most widely used security mechanisms, authentication is used to identify mobile nodes

  19. Lecturer, Management Lally School of Management

    E-Print Network [OSTI]

    Salama, Khaled

    Lecturer, Management Lally School of Management Rensselaer Polytechnic Institute The enterprise management and organization area of The Lally School of Management at Rensselaer Polytechnic Institute degree equivalent in management, strategy, organization behavior, or an appropriate related field

  20. project management

    National Nuclear Security Administration (NNSA)

    3%2A en Project Management and Systems Support http:www.nnsa.energy.govaboutusouroperationsapmprojectmanagementandsystemssupport

  1. Position Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-06-23

    The order prescribes the policies, responsibilities, and procedures for position management within (DOE). Canceled by DOE N 1321.140. Cancels DOE 3510.1

  2. Fabrication of Message Digest to Authenticate Audio Signals with Alternation of Coefficients of Harmonics in Multi-Stages (MDAC)

    E-Print Network [OSTI]

    Mondal, Uttam Kr

    2012-01-01

    Providing security to audio songs for maintaining its intellectual property right (IPR) is one of chanllenging fields in commercial world especially in creative industry. In this paper, an effective approach has been incorporated to fabricate authentication of audio song through application of message digest method with alternation of coefficients of harmonics in multi-stages of higher frequency domain without affecting its audible quality. Decomposing constituent frequency components of song signal using Fourier transform with generating secret code via applying message digest followed by alternating coefficients of specific harmonics in multi-stages generates a secret code and this unique code is utilized to detect the originality of the song. A comparative study has been made with similar existing techniques and experimental results are also supported with mathematical formula based on Microsoft WAVE (".wav") stereo sound file.

  3. Mitigating DoS Attacks against Signature-Based Broadcast Authentication in Wireless Sensor Networks

    E-Print Network [OSTI]

    Young, R. Michael

    and the ease of managing cryptographic keys, compared with the alternative of TESLA-based approaches. Though, and thus exhaust their limited battery power. This paper presents an efficient mechanism called message in short distances through wireless links [2]. These sensor nodes are typically battery

  4. Enterprise Risk Management Program

    E-Print Network [OSTI]

    Hayden, Nancy J.

    Enterprise Risk Management Program DRAFT Introduction to Enterprise Risk Management at UVM 1 #12;Enterprise Risk Management Program DRAFT What is Enterprise Risk Management? Enterprise risk management governance, and accountability · Facilitates effective management of the uncertainty and associated risks

  5. Constrained marine resource management

    E-Print Network [OSTI]

    Murray, Jason Hastings

    2007-01-01

    areas as a risk management tool A. Introduction . . . . .1. Effort management without Technologicalwith Technological Progress Under Effort Management F.

  6. Conference Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-01-25

    The Order establishes requirements and responsibilities for managing conferences sponsored or co-sponsored by the Department of Energy, including the National Nuclear Security Administration. Cancels DOE O 110.3. Canceled by DOE N 251.97.

  7. Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy AEnergy Managing SwimmingMicrosoft Word -AcqGuide71pt1.docBRCMicrosoft Word

  8. Time Management Managing Time and Tasks

    E-Print Network [OSTI]

    Kunkle, Tom

    Time Management Managing Time and Tasks What is time management? Time can't be managed ­ but you can manage the amount of time you use each day for fun, work, rest, and time spent with others. Why is time management important? You have responsibilities to yourself, to your family and friends, to your

  9. Palouse Subbasin Management Plan 3. Management Plan

    E-Print Network [OSTI]

    Palouse Subbasin Management Plan 3. Management Plan FINAL DRAFT ~ May 2004 Project Lead: Palouse-Rock Lake Conservation District Trevor Cook, Project Manager PO Box 438 St. John WA 99171 (509) 648;Palouse Subbasin Plan: MANAGEMENT PLAN Management Plan: Page 3 - 1 3. Management Plan 3.1 Background

  10. Managing the Management: CORBAbased Instrumentation of Management Systems

    E-Print Network [OSTI]

    Managing the Management: CORBA­based Instrumentation of Management Systems A. Keller Munich Network Management Team Department of Computer Science, TU MË? unchen Arcisstr. 21, D­80333 Munich, Germany akeller@ieee.org Proceedings of the Sixth IFIP/IEEE International Symposium on Integrated Network Management (IM'99), Boston

  11. Evaluation of the Geotech Smart24 data acquisition system with active Fortezza crypto card data signing and authentication.

    SciTech Connect (OSTI)

    Hart, Darren M.

    2008-05-01

    Sandia National Laboratories has tested and evaluated Geotech Smart24 data acquisition system with active Fortezza crypto card data signing and authentication. The test results included in this report were in response to static and tonal-dynamic input signals. Most test methodologies used were based on IEEE Standards 1057 for Digitizing Waveform Recorders and 1241 for Analog to Digital Converters; others were designed by Sandia specifically for infrasound application evaluation and for supplementary criteria not addressed in the IEEE standards. The objective of this work was to evaluate the overall technical performance of the Geotech Smart24 digitizer with a Fortezza PCMCIA crypto card actively implementing the signing of data packets. The results of this evaluation were compared to relevant specifications provided within manufacturer's documentation notes. The tests performed were chosen to demonstrate different performance aspects of the digitizer under test. The performance aspects tested include determining noise floor, least significant bit (LSB), dynamic range, cross-talk, relative channel-to-channel timing, time-tag accuracy, analog bandwidth and calibrator performance.

  12. Waste Management Quality Assurance Plan

    E-Print Network [OSTI]

    Waste Management Group

    2006-01-01

    management assessments. Management assessment results mustbe documented. WMG management must take prompt action tolegal advice to Laboratory management, periodically conducts

  13. Management'': Sunderraman

    E-Print Network [OSTI]

    Brass, Stefan

    INFSCI 2710 ``Database Management'': B. Oracle SQL*Plus B­1 Appendix B: Oracle SQL*Plus I have used: Oracle/SQL Tutorial, 1999. http://www.db.cs.ucdavis.edu/teaching/sqltutorial/ . Stefan Brass: Skript zur Vorlesung Informationssysteme (in German), UniversitË? at Hildesheim, 1996/97. . SQL*Plus User's Guide

  14. Risk Management Policy Category: Strategic Management

    E-Print Network [OSTI]

    1 Risk Management Policy Category: Strategic Management 1. PURPOSE To support the University will be encouraged to speak openly and honestly. (iii) Managers will monitor risk and will disclose risks identified's risk appetite. 2.3. Risk management standards 2.3.1 The University's risk management framework

  15. Privacy Management Plan 1 Privacy Management Plan

    E-Print Network [OSTI]

    University of Technology, Sydney

    Privacy Management Plan 1 Privacy Management Plan Abstract The Privacy Management Plan outlines how Impact Assessment Tool (.docm) (staff only) Records Management Vice-Chancellor's Directive Handling Management Plan 2 Legislation Privacy and Personal Information Protection Act 1998 (NSW) (PPIPIA) Health

  16. Environmental Engineering and Management

    E-Print Network [OSTI]

    Mirza, Umar Karim

    2001-01-01

    Review: Environmental Engineering and Management By J.M.H. Power (Eds. ). Environmental Engineering and Management.Conference on Environmental Engineering and Management,

  17. Environmental Management System Plan

    E-Print Network [OSTI]

    Fox, Robert

    2009-01-01

    OIA/OCA/assurance-sys/IA/index.html Management Program, R-3 • Environmental Management System Plan References 30.targets, and Environmental Management Programs 6. Structure

  18. ORISE: Emergency Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management Emergency Management Effective emergency management relies on thorough integration of preparedness plans at all levels of government. The Oak Ridge Institute for Science...

  19. Presented by FACILITIES MANAGEMENT

    E-Print Network [OSTI]

    Meyers, Steven D.

    Presented by FACILITIES MANAGEMENT TRANSFORMING USF'S TAMPA CAMPUS SUMMER 2011 #12; WELCOME Facili:es Management #12; Facili:es Management #12; NEW CONSTRUCTION Facili

  20. Stargate: Energy Management Techniques

    E-Print Network [OSTI]

    Vijay Raghunathan; Mani Srivastava; Trevor Pering; Roy Want

    2004-01-01

    Stargate: Energy Management Techniques Vijay Raghunathan,Platform specific energy management is crucial for longSolution: System level energy management techniques and

  1. Environmental Management System Plan

    E-Print Network [OSTI]

    Fox, Robert

    2009-01-01

    430.2B mandates an energy management program that considersSTAR® or Federal Energy Management Programs, and USDA-Environmental, Energy, and Transportation Management (

  2. Environmental Management System

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management System Environmental Management System An Environmental Management System is a systematic method for assessing mission activities, determining the environmental impacts...

  3. Environmental Management System Plan

    E-Print Network [OSTI]

    Fox, Robert

    2009-01-01

    Management Program, R-3 • Environmental Management SystemEnvironmental policy 3. Environmental aspects 4. Legal andObjectives, targets, and Environmental Management Programs

  4. Managing Critical Management Improvement Initiatives

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-10-01

    Provides requirements and responsibilities for planning, executing and assessing critical management improvement initiatives within DOE. DOE N 251.59, dated 9/27/2004, extends this Notice until 10/01/2005. Archived 11-8-10. Does not cancel other directives.

  5. MUSHROOM WASTE MANAGEMENT PROJECT LIQUID WASTE MANAGEMENT

    E-Print Network [OSTI]

    #12;MUSHROOM WASTE MANAGEMENT PROJECT LIQUID WASTE MANAGEMENT PHASE I: AUDIT OF CURRENT PRACTICE The Mushroom Waste Management Project (MWMP) was initiated by Environment Canada, the BC Ministry of solid and liquid wastes generated at mushroom producing facilities. Environmental guidelines

  6. Stormwater Management 

    E-Print Network [OSTI]

    Jaber, Fouad

    2008-10-23

    ), nitrogen (fertilizer), pesticides, oil and grease, concrete truck washout, and construction chemicals. Who Applies for Permits? Managers should designate an employee to be responsible for applying for the proper construction permits. The USEPA has labeled... of flowing water. When materials impervious to water, such as pavement and concrete, cover the ground or when soils are compacted, runoff increases. Differences between areas with natural ground cover (before urban development) and those with impervious...

  7. Environmental Management

    SciTech Connect (OSTI)

    2014-11-12

    Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

  8. Environmental Management

    ScienceCinema (OSTI)

    None

    2015-01-07

    Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

  9. Environmental Management Waste Management Facility (EMWMF) at...

    Office of Environmental Management (EM)

    Technical Review Report: Oak Ridge Reservation Review of the Environmental Management Waste Management Facility (EMWMF) at Oak Ridge By Craig H. Benson, PhD, PE; William H....

  10. Best Management Practice #1: Water Management Planning

    Office of Energy Efficiency and Renewable Energy (EERE)

    A successful water management program starts with developing a comprehensive water management plan. This plan should be included within existing facility operating plans.

  11. Environmental and managing

    E-Print Network [OSTI]

    Virginia Tech

    Environmental Education Assessing and managing visitor experiences and impacts Managing natural. A conservation worker Use your communications and management skills in an environmental organization, a government agen- cy, or in cooperative extension to enhance the environmental management. A nature guide

  12. PROJECT MANAGEMENT Professional Organizations

    E-Print Network [OSTI]

    Acton, Scott

    PROJECT MANAGEMENT Professional Organizations: Association of Collegiate Computing Services) Project Management Institute (PMI) Events & Training: UVA Local Support Partners (LSP) program training Project Management Institute webinars Project Management Institute events Scrum Alliance events Learning

  13. PROJECT MANAGEMENT Professional Organizations

    E-Print Network [OSTI]

    Acton, Scott

    PROJECT MANAGEMENT Professional Organizations: Project Management Institute International Association of Project and Program Management (IAPPM) Events & Training: UVa Center for Leadership Excellence classes SkillSoft classes PMO Symposium through PMI Project Management Institute (PMI) webinars American

  14. A survey on securing user authentication in vehicular ad hoc networks Mrs. Arzoo Dahiya Mr. Vaibhav Sharma

    E-Print Network [OSTI]

    Jagannatham, Aditya K.

    Department Institute of Technology and Management Institute of Technology and Management Sector-23 A, Gurgaon(MANET). On demand set up, fault tolerance and unconstrained connectivity are a couple of advantages that why mobile vehicle to vehicle (V2V) communication and vehicle to road side communication. This paper describes

  15. Negotiating Repair and Authenticity in the Conservation of Ornamental Architectural Stone: Managing Decay and Past Interventions on the Facades of Rosslyn Chapel and Mission San José 

    E-Print Network [OSTI]

    Nau, Anna

    of exterior carved stonework at the 15th century Rosslyn Chapel in Roslin, Scotland and the 18th century Church of Mission San José in San Antonio, Texas. Despite their stylistic, cultural and historical differences, both buildings are significant...

  16. DEACTIVATION MANAGEMENT

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About UsEnergyofSoftware Engineering Institute | DepartmentAugust8,,MANAGEMENT The

  17. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousandReport)Price (Dollars perManagement Council Emilio Bunel

  18. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousandReport)Price (Dollars perManagement Council Emilio

  19. Risk Management, Mar 2012 Risk Management

    E-Print Network [OSTI]

    Risk Management, Mar 2012 Risk Management Conditions of Volunteer Service (Please send completed form to the Office of Risk Management) riskmanagement@uoregon.edu Fax: 541-346-7008 As a volunteer Tort Claims Act, ORS 30.260-300, and Oregon Department of Administrative Services Risk Management

  20. Risk Management Procedures Category: Strategic Management

    E-Print Network [OSTI]

    1 Risk Management Procedures Category: Strategic Management 1. LEGISLATION/ENTERPRISE AGREEMENT/POLICY SUPPORTED Risk Management Policy Tertiary Education Quality Standards Agency Act 2011 (TEQSA Act 2011) 2 (a) Advise the Vice-Chancellor on the effective management of the University's risk profile

  1. Emergency Management Guide EMERGENCY MANAGEMENT GUIDE

    E-Print Network [OSTI]

    Dahlquist, Kam D.

    Emergency Management Guide #12;EMERGENCY MANAGEMENT GUIDE TABLE OF CONTENTS EXECUTIVE SUMMARY 2 Emergency Management Guide provides guidance to the LMU community to prevent, plan for and respond to events, property, financial condition and reputation of the University. The LMU Emer- gency Management Guide

  2. 8 Management Plan Introduction

    E-Print Network [OSTI]

    312 8 Management Plan Introduction The management plan integrates the vision for the Lower Mid and populations which form the bulk of the management plan is derived from that input. The scope of the management and inventory are designed and may be used to guide restoration and management actions by many parties under

  3. Virginia Commonwealth University Facilities Management

    E-Print Network [OSTI]

    Hammack, Richard

    .3 Solid Waste Management 14 018.4 Pest Management Plan 14 Facilities Management Construction & Design Virginia Commonwealth University Facilities Management Construction & Design Construction Management (804) 6285199 VCU Construction & Inspection Management jghosh

  4. Project Manager's Guide to Managing Impact and Process Evaluation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Project Manager's Guide to Managing Impact and Process Evaluation Studies Project Manager's Guide to Managing Impact and Process Evaluation Studies This report provides a...

  5. DOE Jobs Online (Hiring Manager), Office of Human Capitol Management...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Jobs Online (Hiring Manager), Office of Human Capitol Management Innovation and Solutions DOE Jobs Online (Hiring Manager), Office of Human Capitol Management Innovation and...

  6. DRAFT Fifteenmile Management Plan 5. Fifteenmile Subbasin Management Plan

    E-Print Network [OSTI]

    DRAFT Fifteenmile Management Plan 5. Fifteenmile Subbasin Management Plan DRAFT May 25 2004 Group 5. FIFTEENMILE SUBBASIN MANAGEMENT PLAN Management Plans

  7. Decision support for disaster management

    E-Print Network [OSTI]

    Rolland, Erik; Patterson, Raymond A.; Ward, Keith; Dodin, Bajis

    2010-01-01

    of the disaster management organizations. Therefore, thishybrid meta-heuristics. Keywords Disaster management . Meta-heuristics . Project management . Scheduling . Decision

  8. Essays on University Technology Management

    E-Print Network [OSTI]

    Drivas, Kyriakos

    2011-01-01

    of university technology management and their implicationson University Technology Management by Kyriakos Drivas Aon University Technology Management by Kyriakos Drivas

  9. Summary - Environmental Management Waste Management Facility...

    Office of Environmental Management (EM)

    Oak Ridge, TN EM Project: EM Waste Management Facility ETR Report Date: February 2008 ETR-11 United States Department of Energy Office of Environmental Management (DOE-EM) External...

  10. Run manager module for CORAL laboratory management

    E-Print Network [OSTI]

    Klann, Jeffrey G

    2004-01-01

    This thesis describes a new module, the Run Manager (RM), for Stanford Nanofabrication Facility's Common Object Representation for Advanced Laboratories (CORAL). CORAL is the lab manager with which MIT's Microsystems ...

  11. BUILDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PL LDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PLAN

    E-Print Network [OSTI]

    Florida, University of

    BUILDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PL LDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PLAN MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PLAN BUILDING A R RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PLAN BUILDIN T PLAN BUILDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEM

  12. Fleet Management | Department of Energy

    Energy Savers [EERE]

    Property Fleet Management Fleet Management Fleet management includes commercial and agency owned motor vehicles such as cars, vans, trucks, and buses. Fleet (vehicle) management...

  13. Enterprise Risk Management Program

    E-Print Network [OSTI]

    Hayden, Nancy J.

    Enterprise Risk Management Program Guide to Risk Assessment & Response August 16, 2012 #12; i ...........26 List of Figures Figure 1: The Risk Management Process.......................................................................................................12 #12; 1 Overview The risk management process--of identifying, analyzing, evaluating

  14. Classroom Management Study through

    E-Print Network [OSTI]

    Douches, David S.

    Classroom Management Study through Michigan State Extension What is the Incredible Years Teacher Classroom Management (IYTCM) Program? This program is an evidence-based interven4on focused on improving teachers' skills in using classroom management

  15. Coding AuthentiCity

    E-Print Network [OSTI]

    Mercier, Rachel Havens

    2008-01-01

    This thesis analyzes the impact of form-based codes, focusing on two research questions: (1) What is the underlying motivation for adopting a form-based code? (2) What motivations have the most significant impact on ...

  16. Principles of Authentication

    E-Print Network [OSTI]

    Peisert, Sean; Talbot, Ed; Kroeger, Tom

    2013-01-01

    Security Engineering: A Guide to Building Dependable Distributed Systems, Second Edition, chapter 13, Nuclear

  17. ARM - Central Authentication Service

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Comments? We would love to hear from you! Send us agovInstrumentswrf-chem Comments? We wouldCampaign

  18. CERTIFICATE OF AUTHENTICITY

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann JacksonDepartment|Marketing, LLCEfficiency |CBA.PDF� MoreJune

  19. Managing Web Data Managing Web Data

    E-Print Network [OSTI]

    Davulcu, Hasan

    Managing Web Data Dan Suciu AT&T Labs Managing Web Data Sigmod, 1999 Dan Suciu AT&T Labs 1 #12;How the Web is Today HTML documents all intended for human consumption many are generated automatically by applications Managing Web Data Sigmod, 1999 Dan Suciu AT&T Labs 2 #12;Paradigm Shift on the Web applications

  20. Supply Management Specialist

    Broader source: Energy.gov [DOE]

    This position is located in the Logistics Management organization (NSL), Supply Chain Services (NS), Chief Administrative Office (N). NSL manages the warehousing of materials; the investment...

  1. Contract/Project Management

    Office of Environmental Management (EM)

    Contract and Project Management Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2011 Target FY 2011 Actual & Forecast FY 2011...

  2. Contract/Project Management

    Office of Environmental Management (EM)

    and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2011 Target FY 2011 Forecast FY 2011 Pre- &...

  3. Contract/Project Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Contract and Project Management Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2010 Target FY 2010 Actual FY 2010 Pre- &...

  4. Contract/Project Management

    Broader source: Energy.gov (indexed) [DOE]

    Contract and Project Management Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2010 Target FY 2010 Forecast FY 2010 Pre- &...

  5. Contract/Project Management

    Energy Savers [EERE]

    and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Performance Metric FY 2012 Target FY 2012 Forecast FY 2012 Pre- & Post-CAP...

  6. Contract/Project Management

    Broader source: Energy.gov (indexed) [DOE]

    and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Performance Metric FY 2012 Target FY 2012 Final FY 2012 Pre- & Post-CAP Final...

  7. Contract/Project Management

    Broader source: Energy.gov (indexed) [DOE]

    2 nd Quarter Overall Contract and Project Management Performance Metrics and Targets ContractProject Management Performance Metrics FY 2009 Target FY 2009 Actual Comment 1....

  8. Contract/Project Management

    Office of Environmental Management (EM)

    1 st Quarter Overall Contract and Project Management Performance Metrics and Targets ContractProject Management Performance Metrics FY 2009 Target FY 2009 Actual Comment 1....

  9. Contract/Project Management

    Office of Environmental Management (EM)

    3 rd Quarter Overall Contract and Project Management Performance Metrics and Targets ContractProject Management Performance Metrics FY 2009 Target FY 2009 Actual Comment 1....

  10. Management of Nuclear Materials

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-08-17

    To establish requirements for the lifecycle management of DOE owned and/or managed accountable nuclear materials. Cancels DOE O 5660.1B.

  11. Digital Data Management Plans

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Digital Data Management Plans Digital Data Management Plans Investigating the field of high energy physics through experiments that strengthen our fundamental understanding of...

  12. Contract/Project Management

    Energy Savers [EERE]

    Third Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Performance Metric FY 2012 Target FY 2012 Forecast...

  13. Cryptanalysis of Cho et al.'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    been used in libraries, e-passports, manufacturing, inventory control, supply chain management, e Naderi1 1 Electrical Engineering Department, Iran University of Science and Technology, Tehran, Iran, {M Safkhani,M Nderi}@iust.ac.ir 2 Information Security and Privacy Lab, Delft University of Technology, Delft

  14. Cryptanalysis of Cho et al.'s Protocol, A HashBased Mutual Authentication Protocol for RFID Systems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    chain management, e­ health and so on. The tag, the reader and the back­end data base are three basic radio frequency signals by the reader. The back­end data base mainly aids the reader by an extra storage application is data security which may waives all its benefits. For example, an RFID system may lead

  15. Fair Encryption of RSA Keys Guillaume Poupard and Jacques Stern

    E-Print Network [OSTI]

    Stern, Jacques

    based on verifiable encryption of secret keys using double decker exponentiation which makes the proofs

  16. A Faster Hardware Implementation of RSA Ajay C Shantilal

    E-Print Network [OSTI]

    , RNS, Chinese remainder theorem power anal- ysis, timing attacks. I. Introduction. It is widely multiplication is based on Redundant Number System (RNS). In RNS an integer is Author is a graduate student-mail: ajay@ece.orst.edu represented by set of its residues in terms of base elements of RNS, and thus

  17. A variant of Wiener's attack on RSA Andrej Dujella

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    the form p q = rpm+1 ± spm rqm+1 ± sqm (3) for some m -1 and nonnegative integers r and s such that rs

  18. Risk Management Policy 1 Risk Management Policy (December, 2014)

    E-Print Network [OSTI]

    Wapstra, Erik

    Risk Management Policy 1 Risk Management Policy (December, 2014) Risk Management Policy Responsible Governance Level Principle No. 2 - Risk Management Responsible Organisational Unit Audit & Risk CONTENTS 1 ........................................................................................................2 3.1 Effective Risk Management

  19. PERFORMANCE MANAGEMENT TIP SHEET Performance Management for New Employees

    E-Print Network [OSTI]

    PERFORMANCE MANAGEMENT TIP SHEET Performance Management for New Employees NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION UNITED STATES DEPARTMENT OF COMMERCE Workforce Management Office Ready to Perform Management at NOAA Performance Management is the process used to communicate expectations, evaluate employee

  20. Business, management and finance

    E-Print Network [OSTI]

    Sussex, University of

    Business, management and finance Essentials Taught degrees Masters in Business Administration (MBA and Finance MSc in Managing Innovation and Projects MSc in Technology and Innovation Management Research 156-157 MBA You will have at least three years' management experience in a professional work

  1. 6 Management Plan Introduction

    E-Print Network [OSTI]

    147 6 Management Plan Introduction The management plan integrates the vision for the White Salmon for restoration of fish and wildlife habitat and populations which form the bulk of the management plan is derived from that input. The scope of the management plan is somewhat narrower than the scope of the assessment

  2. Chemical Management Contacts

    Broader source: Energy.gov [DOE]

    Contacts for additional information on Chemical Management and brief description on Energy Facility Contractors Group

  3. Benchmarking Corporate Energy Management 

    E-Print Network [OSTI]

    Norland, D. L.

    2001-01-01

    CORPORATE ENERGY MANAGEMENT Dr. Douglas L. Norland Director of Research and Industrial Programs Alliance to Save Energy Washington, DC ABSTRACT There is growing interest among energy managers in finding out how their company's energy management... procedures and perfonnance compare to that of other companies. Energy management involves everything from setting goals and targets to implementing best maintenance practices. This paper, however, discusses benchmarking energy management practices...

  4. Energy Management in Microgrids: Algorithms and System

    E-Print Network [OSTI]

    Shi, Wenbo

    2015-01-01

    Energy Management . . . . . . . . . . . . . . . . . . . . .116 Energy Scheduling . . . . . .Distributed Energy Management . . . . . . . . . . . . . . .

  5. The Waste Management Quality Assurance Implementing Management Plan (QAIMP)

    E-Print Network [OSTI]

    Albert editor, R.

    2009-01-01

    III I II QUALITY ASSURANCE IMPLEMENTING MANAGEMENT PLAN I III SECTION 1 - MANAGEMENT Criterion 1 - Program II II WM-AND SAFETY DIVISION Waste Management Quality Assurance

  6. The Waste Management Quality Assurance Implementing Management Plan (QAIMP)

    E-Print Network [OSTI]

    Albert editor, R.

    2009-01-01

    AND SAFETY DIVISION Waste Management Quality AssuranceII I RECORD I WM-QAIMP Waste Management Quality Assurancefor hazardous waste management that have leadership

  7. Fusing Integration Test Management with Change Management

    E-Print Network [OSTI]

    Perry, Dewayne E.

    - 1 - Infuse: Fusing Integration Test Management with Change Management Gail E. Kaiser* Dewayne E, NJ 07974 Murray Hill, NJ 07974 Infuse is an experimental software development environment focusing the change set into the baseline. We have previously described how Infuse enforces static consistency at each

  8. Research Data Management - Data Management Plans

    E-Print Network [OSTI]

    Collins, Anna

    2012-01-01

    -Graduate Teaching Materials for Research Data Management Adapted by Anna Collins (2012) from modules created by Lindsay Lloyd-Smith (2011) for post-graduate training in Archaeology It makes use of training materials produced by the UK Data Archive on Managing...

  9. Energy Management in Microgrids: Algorithms and System

    E-Print Network [OSTI]

    Shi, Wenbo

    2015-01-01

    Optimal Energy Management in Microgrids . . . . . . . . . .Management in Microgrids . . . . . . . . . . . . . . . .Hatziargyriou, and A. Dimeas, “Microgrids management,” IEEE

  10. Management of Nuclear Materials

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-08-17

    To establish requirements for the lifecycle management of DOE owned and/or managed accountable nuclear materials. Admin Chg 1 dated 4-10-2014, supersedes DOE O 410.2.

  11. Risk Management Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-01-18

    This Guide provides non-mandatory risk management approaches for implementing the requirements of DOE O 413.3B, Program and Project Management for the Acquisition of Capital Assets. Supersedes DOE G 413.3-7.

  12. Enabling better water management

    E-Print Network [OSTI]

    Greenslade, Diana

    CASE STUDY Enabling better water management Seasonal Streamflow Forecast Service influencing water decisions Water management decisions made with confidence Using the Bureau's streamflow forecasting, ACTEW Water confidently removed temporary water restrictions after the millennium drought. Millennium drought

  13. ENVIRONMENTAL MANAGEMENT Environmental Policy

    E-Print Network [OSTI]

    Haase, Markus

    ENVIRONMENTAL MANAGEMENT Environmental Policy February 2013 The University of Leeds is responsible to reflect best environmental practice, implement an environmental management system to pursue sustainability and continuous improvement and seek innovative ways of meeting environmental objectives. These include: To meet

  14. Information Technology Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2012-12-03

    The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Cancels DOE G 200.1-1. Admin Chg 1 approved 1-16-2013.

  15. Management Associate I

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as an analyst and advisor to an organization's manager and other managers within the organization within BPA. The position serves as a point of...

  16. Management Excellence by Sandra Waisley

    Office of Environmental Management (EM)

    Roadmap Goal 7 Achieve Excellence in Management and Leadership, www.em.doe.gov safety performance cleanup closure E M Environmental Management 1 Achieve Excellence in Management...

  17. Energy manager design for microgrids

    E-Print Network [OSTI]

    Firestone, Ryan; Marnay, Chris

    2005-01-01

    Energy Manager Design for Microgrids Hillier, F. , and G.Energy Manager Design for Microgrids Appendix A: Smart*DER:Manager Design for Microgrids Prepared for the California

  18. Waste Management Quality Assurance Plan

    E-Print Network [OSTI]

    Waste Management Group

    2006-01-01

    LBNL/PUB-5352, Revision 6 Waste Management QualityAssurance Plan Waste Management Group Environment, HealthRev. 6 WM QA Plan Waste Management Quality Assurance Plan

  19. Waste Management Quality Assurance Plan

    E-Print Network [OSTI]

    Waste Management Group

    2006-01-01

    Waste Management group organization chart. Revised to updatecurrent practices. New organization chart, roles, andManagement Group organization chart. EH&S Waste Management

  20. Wildlife Management Areas (Florida)

    Broader source: Energy.gov [DOE]

    Certain sites in Florida are designated as wildlife management areas, and construction and development is heavily restricted in these areas.

  1. Conservation and drought management 

    E-Print Network [OSTI]

    Finch, Calvin

    2012-01-01

    Column by Dr. Calvin Finch, Water Conservation and Technology Center director Conservation and Drought Management WAT E R CONSERVATION & TECHNOLOGY CENTER Securing Our Water Future Water conservation and drought management are related..., but they are not the same. Water conservation is a long-term e?ort to reduce the amount of water it takes to manufacture goods, manage households and care for landscapes. Drought management is water-use rules initiated to deal with reduced water supply or increased...

  2. Toward Strategic Watershed Management

    E-Print Network [OSTI]

    Toward Strategic Watershed Management: Lessons from the Boone River Watershed Program Evaluation Resources Ecology and Management June, 2013 #12;2 Introduction Water quality is a growing problem throughout management on private and working lands. The Iowa Soybean Association (ISA) began work in the Boone River

  3. NJIT STRATEGIC ENROLLMENT MANAGEMENT

    E-Print Network [OSTI]

    NJIT STRATEGIC ENROLLMENT MANAGEMENT PLAN: FIRST STAGE YEARS 2015 TO 2020 #12;1 NJIT STRATEGIC ENROLLMENT MANAGEMENT PLAN: FIRST STAGE YEARS 2015 TO 2020 SEM AT NJIT 2015-2020 2015-2020 "Strategic addressing all aspects of the institutions mission. " - A Practical Guide to Strategic Enrollment Management

  4. Risk Management Strategy Introduction

    E-Print Network [OSTI]

    Edinburgh, University of

    Risk Management Strategy Introduction 1. The risk of adverse consequences is inherent in all activity. Dynamic enterprise will inevitably create new risks. Risk management is about ensuring that all significant relevant risks are understood and prioritised as part of normal management

  5. February 2002 RISK MANAGEMENT

    E-Print Network [OSTI]

    February 2002 RISK MANAGEMENT GUIDANCE FOR INFORMATION TECHNOLOGY SYSTEMS By Joan S. Hash, Computer is the ability to iden tify and protect critical information assets. A sound risk management pro gram-30, Risk Management Guide For Information Technology Systems, by Gary Stoneburner, Alice Goguen, and Alexis

  6. Business, management and finance

    E-Print Network [OSTI]

    Sussex, University of

    Business, management and finance Essentials Taught degrees Masters in Business Administration (MBA) MSc in Banking and Finance MSc in Corporate and Financial Risk Management MSc in Financial Mathematics in International Accounting and Corporate Governance MSc in International Finance MSc in International Management

  7. Financial Management Oversight

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-08-31

    The Order defines requirements for effective financial management and adherence to DOE and applicable external financial management requirements and sets forth standards for ensuring the integrity and responsiveness of financial management and the accuracy and reliability of DOEs financial statements. Supersedes DOE O 2200.13.

  8. HAZARDOUS WASTE MANAGEMENT REFERENCE

    E-Print Network [OSTI]

    Winfree, Erik

    HAZARDOUS WASTE MANAGEMENT REFERENCE GUIDE Prepared by Environment, Health and Safety Office@caltech.edu http://safety.caltech.edu #12;Hazardous Waste Management Reference Guide Page 2 of 36 TABLE OF CONTENTS Satellite Accumulation Area 9 Waste Accumulation Facility 10 HAZARDOUS WASTE CONTAINER MANAGEMENT Labeling

  9. MAINTENANCE MANAGEMENT PROFESSIONAL (MMP)

    E-Print Network [OSTI]

    Saskatchewan, University of

    MAINTENANCE MANAGEMENT PROFESSIONAL (MMP) CERTIFICATE PROGRAM & Distance Education Ron and Jane for Continuing & Distance Education Module 1--Maintenance Management Skills and Techniques latest developments and trendsModule 1 introduces the basic concepts of physical asset management and the in effective

  10. Manage Your Time 

    E-Print Network [OSTI]

    White, Lynn

    2000-06-27

    People view time in different ways, but we all could do a better job of managing our time. This publication explains three different time management tools: the 24-hour time log and chart; a self-assessment of thinking styles and time management...

  11. University of Manchester Researchers Into Management Researchers into Management

    E-Print Network [OSTI]

    Higham, Nicholas J.

    University of Manchester ­ Researchers Into Management ! ! ! ! Researchers into Management ! ! Institute of Leadership and Management Candidate Guide and Unit Requirements ! !1 Version Updated December 2013 ! Institute of Leadership & Management Candidate Guide & Unit Requirements for Level 5 Award

  12. DOE - Office of Legacy Management -- Fernald Environmental Management...

    Office of Legacy Management (LM)

    Fernald Environmental Management Project - 027 FUSRAP Considered Sites Site: Fernald Environmental Management Project (027) Designated Name: Alternate Name: Location: Evaluation...

  13. Radioactive Waste Management Basis

    SciTech Connect (OSTI)

    Perkins, B K

    2009-06-03

    The purpose of this Radioactive Waste Management Basis is to describe the systematic approach for planning, executing, and evaluating the management of radioactive waste at LLNL. The implementation of this document will ensure that waste management activities at LLNL are conducted in compliance with the requirements of DOE Order 435.1, Radioactive Waste Management, and the Implementation Guide for DOE Manual 435.1-1, Radioactive Waste Management Manual. Technical justification is provided where methods for meeting the requirements of DOE Order 435.1 deviate from the DOE Manual 435.1-1 and Implementation Guide.

  14. Christopher J. Martin BUSINESS MANAGEMENT

    E-Print Network [OSTI]

    Pittendrigh, Barry

    Christopher J. Martin DIRECTOR BUSINESS MANAGEMENT Joanna M. Hutchins ADMINISTRATIVE ASSISTANT BUSINESS MANAGEMENT BUSINESS PROCESS MANAGEMENTCLUSTER MANAGERS & DIRECTORS OF FINANCIAL AFFAIRSFREEHAFER OPERATIONS #12;Christopher J. Martin DIRECTOR BUSINESS MANAGEMENT *Andrew J. Bean PHARMACY *Kristi L. Mickle

  15. A Manager's Approach to Energy Cost Management 

    E-Print Network [OSTI]

    Spencer, R. J.

    1985-01-01

    A major responsibility of management is the control and containment of operating costs. Energy costs are a major portion of the industrial budget. GM has developed a 3 phase approach to energy conservation. Phase I -Administrative Controls...

  16. Managing a Process Safety Management inspection

    SciTech Connect (OSTI)

    Mulvey, N.P. [AcuTech Consulting, Inc., Princeton, NJ (United States)

    1995-12-31

    The Occupational Safety and Health Administration (OSHA) Process Safety Management (PSM) regulations (29 CFR {section} 1910.119) have been in effect for almost three years. State level risk management programs, in New Jersey, California, and Delaware have been in effect for over six years. More recently, Nevada and Louisiana have enacted process safety management programs. These regulations have had a significant impact on all phases of plant operations, including preliminary design, construction, startup, and operations. Through proper planning and the commitment of resources, many facilities are beginning to realize the benefits of well developed PSM programs. This paper will discuss in greater detail some of these benefits, and in particular, the subject of governmental inspections of facilities for process safety management programs.

  17. Energy Management Working Group: Accelerating Energy Management 

    E-Print Network [OSTI]

    Scheihing, P.

    2014-01-01

    of energy management systems (EnMS) in the industrial and commercial building sectors. EnMS can help organizations potentially conserve 10%-40% of their energy use by institutionalizing the policies, procedures and tools to systematically track, analyze...

  18. Army Regulation 2550 Information Management: Records

    E-Print Network [OSTI]

    US Army Corps of Engineers

    Army Regulation 25­50 Information Management: Records Management Preparing and Managing Information Management: Records Management Preparing and Managing Correspondence *Army Regulation 25. This regulation on the prepa- ration and management of Army corre- spondence has been revised. This revision

  19. Strategies for Successful Energy Management

    Broader source: Energy.gov [DOE]

    This presentation, given through the DOE's Technical Assitance Program (TAP), provides information on energy management for the portfolio manager initiative

  20. Evaluation of the Geotech SMART24BH 20Vpp/5Vpp data acquisition system with active fortezza crypto card data signing and authentication.

    SciTech Connect (OSTI)

    Rembold, Randy Kai; Hart, Darren M.

    2009-09-01

    Sandia National Laboratories has tested and evaluated Geotech SMART24BH borehole data acquisition system with active Fortezza crypto card data signing and authentication. The test results included in this report were in response to static and tonal-dynamic input signals. Most test methodologies used were based on IEEE Standards 1057 for Digitizing Waveform Recorders and 1241 for Analog to Digital Converters; others were designed by Sandia specifically for infrasound application evaluation and for supplementary criteria not addressed in the IEEE standards. The objective of this work was to evaluate the overall technical performance of two Geotech SMART24BH digitizers with a Fortezza PCMCIA crypto card actively implementing the signing of data packets. The results of this evaluation were compared to relevant specifications provided within manufacturer's documentation notes. The tests performed were chosen to demonstrate different performance aspects of the digitizer under test. The performance aspects tested include determining noise floor, least significant bit (LSB), dynamic range, cross-talk, relative channel-to-channel timing, time-tag accuracy/statistics/drift, analog bandwidth.

  1. Master of Science in Engineering and Technology Management Engineering Management Concentration Management of Technology Concentration

    E-Print Network [OSTI]

    Selmic, Sandra

    Master of Science in Engineering and Technology Management Engineering Management Concentration Management of Technology Concentration Core Courses 21 Core Courses 6 FINC 577 Finance and Accounting for Non Management INEN 505 Manufacturing and Operations Analysis INEN 507 Engineering Administration Quantitative

  2. Nutrient Management TrainingNutrient Management Training for Technical Service Providersfor Technical Service Providers

    E-Print Network [OSTI]

    Nutrient Management TrainingNutrient Management Training for Technical Service Providersfor Management Planning Technical Guidance.Management Planning Technical Guidance. Manure and Wastewater Handling Nutrient ManagementNutrient Management ­­ Record KeepingRecord Keeping ­­ Feed ManagementFeed Management

  3. Weed Management Costs, Weed Best Management Practices, and The Roundup Ready Weed Management Program

    E-Print Network [OSTI]

    Mitchell, Paul D.

    Weed Management Costs, Weed Best Management Practices, and The Roundup Ready® Weed Management-commercial purposes by any means, provide that this copyright notice appears on all such copies. #12;1 Weed Management Costs, Weed Best Management Practices, and The Roundup Ready® Weed Management Program T.M. Hurley

  4. Managing Increased Charging Demand

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Managing Increased Charging Demand Carrie Giles ICF International, Supporting the Workplace Charging Challenge Workplace Charging Challenge Do you already own an EV? Are you...

  5. Efficient Water Use & Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Water Use Goal 4: Efficient Water Use & Management Aware of the arid climate of northern New Mexico, water reduction and conservation remains a primary concern at LANL. Energy...

  6. Hazardous Waste Management (Indiana)

    Broader source: Energy.gov [DOE]

    The state supports the implementation of source reduction, recycling, and other alternative solid waste management practices over incineration and land disposal. The Department of Environmental...

  7. Solid Waste Management (Indiana)

    Broader source: Energy.gov [DOE]

    The state supports the implementation of source reduction, recycling, and other alternative solid waste management practices over incineration and land disposal. The Indiana Department of...

  8. Radioactive Waste Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1984-02-06

    To establish policies and guidelines by which the Department of Energy (DOE) manages tis radioactive waste, waste byproducts, and radioactively contaminated surplus facilities.

  9. Comprehensive Emergency Management System

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-11-02

    The Order establishes policy and assigns roles and responsibilities for the Department of Energy (DOE) Emergency Management System. Supersedes DOE O 151.1B.

  10. Enterprise Risk Management Framework

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Framework The Enterprise Risk Management (ERM) framework includes four steps: identify the risks, determine the probability and impact of each one, identify controls that are...

  11. Parallel integrated thermal management

    DOE Patents [OSTI]

    Bennion, Kevin; Thornton, Matthew

    2014-08-19

    Embodiments discussed herein are directed to managing the heat content of two vehicle subsystems through a single coolant loop having parallel branches for each subsystem.

  12. Logistics Management Specialist

    Broader source: Energy.gov [DOE]

    The Deputy Assistant Secretary for the Office of Petroleum Reserves (OPR) manages the Strategic Petroleum Reserve (SPR) and is responsible for establishing policies, goals, and priorities for the...

  13. Chemical Industry Corrosion Management

    SciTech Connect (OSTI)

    2003-02-01

    Improved Corrosion Management Could Provide Significant Cost and Energy Savings for the Chemical Industry. In the chemical industry, corrosion is often responsible for significant shutdown and maintenance costs.

  14. Energy, Data Management, Reporting

    Broader source: Energy.gov (indexed) [DOE]

    Electric Sustainability Services 2014 4 - - How are you currently managing your energy data? Is your energy data collected manually, and stored in a spreadsheet? Is...

  15. Industrial Property Management Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will administer the property management program and establish policies, regulations and procedures. Verify that sound internal processes and good business...

  16. Information Technology Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-11-21

    This revised Order is needed to clarify the roles and responsibilities, policies, and procedures for effectively managing IT investments to ensure mission success.

  17. Acquisition Career Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-05-14

    The order sets forth requirements and responsibilities for the Department of Energy (DOE) Acquisition Career Management Program. Supersedes DOE O 361.1B.

  18. Change Control Management Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-29

    The Guide provides a suggested approach and uniform guidance for managing project and contract changes through applying the requirements of DOE O 413.3B. No cancellation.

  19. Records Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-02-03

    The Order sets forth requirements and responsibilities for implementing and maintaining a cost-effective records management program throughout the Department of Energy.

  20. Records Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-26

    The Order sets forth requirements and responsibilities for establishing and maintaining a program for the efficient and economical management of records and information assets.

  1. Dreissenid Mussel Prevention, Management...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management, Research, Coordination, and Outreach for the Columbia River Basin A Roadmap to Make Strategic Investments in Federal Columbia River Power System and Technology...

  2. Dreissenid Mussel Prevention, Management, ...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management, Research, Coordination, and Outreach for the Columbia River Basin A Roadmap to Make Strategic Investments in Federal Columbia River Power System and Technology...

  3. Management Control Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-04-18

    To establish requirements and responsibilities for the Department of Energy Management Control Program. Cancels DOE O 413.1. Canceled by DOE O 413.1B.

  4. International Commitments Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-11-18

    This Order establishes a process to manage the Department's International Commitments under the administrative direction of the Office of Policy and International Affairs. No cancellation.

  5. Energy Management Systems 

    E-Print Network [OSTI]

    Ferland, K.

    2007-01-01

    This presentation will address results from a pilot project with 10 chemical plants on energy management systems and the development of an energy efficiency plant certification program....

  6. Advisory Committee Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-10-22

    The Manual provides detailed DOE requirements, responsibilities, processes, and procedures for the establishment, operation, and management of advisory committees. Supersedes DOE M 510.1-1.

  7. Site Office Manager, Princeton

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the Princeton Site Office (PSO) Manager by providing overall executive leadership to the PSO.

  8. Financial Management Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    will present actual revenue and REP expense running under budget. For BPA management reports, Gross Sales and Purchase Power are shown separated from the power bookout...

  9. Financial Management Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    present actual revenue and REP expense running under rate case estimates. For BPA management reports, Gross Sales and Purchase Power are shown separated from the power bookout...

  10. Management's Discussion & Analysis Profile

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    statements in conformity with generally accepted accounting principles requires management to make estimates and assumptions that affect the reported amounts of assets and...

  11. Management's Discussion & Analysis Profile

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in conformity with generally accepted accounting principles (GAAP) requires management to make estimates and assumptions that affect the reported amounts of assets and...

  12. Project Management Practices

    Broader source: Energy.gov (indexed) [DOE]

    Version) See Figure 3-3. 19. Administrative Controls 1. Provisions relating to organization and management, procedures, recordkeeping, assessment, and reporting necessary to...

  13. Constrained marine resource management

    E-Print Network [OSTI]

    Murray, Jason Hastings

    2007-01-01

    III Marine protected areas as a risk management tool A.Fishery Populations and Marine Ecosystmes,” Fisheries, 1999,11–25. Neubert, Michael G. , “Marine reserves and optimal

  14. Grants Management Specialist

    Broader source: Energy.gov [DOE]

    The Office of Science manages fundamental research programs in basic energy sciences, biological and environmental sciences, and computational science. In addition, the Office of Science is the...

  15. Page 1 of 2 Risk Management March 2012 Risk Management

    E-Print Network [OSTI]

    Page 1 of 2 Risk Management March 2012 Risk Management Supervisor's Vehicle Incident Report (Complete all sections of this form and return within 24 hours of incident to the Office of Risk Management Risk Management March 2012 Risk Management Unsafe Conditions or Actions (describe all contributing

  16. Evolution and Evaluation of the Active Management Area Management Plans

    E-Print Network [OSTI]

    Fay, Noah

    of the Fourth Management Plans. This evaluation provides a foundation for change in the approach and contentEvolution and Evaluation of the Active Management Area Management Plans FINAL January 2008 Sharon B and Evaluation of the Active Management Area Management Plans Table of Contents Executive Summary i Introduction

  17. HIERARCHICAL MANAGEMENT OF BATTLEFIELD NETWORKS WITH THE SHAMAN MANAGEMENT SYSTEM

    E-Print Network [OSTI]

    Sethi, Adarshpal

    HIERARCHICAL MANAGEMENT OF BATTLEFIELD NETWORKS WITH THE SHAMAN MANAGEMENT SYSTEM Adarshpal S Architecture for MANagement) is a novel management framework developed at the University of Delaware as a part of the research in network management sponsored by the ATIRP Consortium. SHAMAN extends the traditional flat SNMP

  18. Certificate in Arts Management The Certificate in Arts Management

    E-Print Network [OSTI]

    Certificate in Arts Management The Certificate in Arts Management is designed for those students interested in pursuing future careers in the management of arts organizations. It is also suitable for majors.uwindsor.ca/arts/certificate Training includes courses in marketing, management, fund-raising, publicity, board and volunteer management

  19. Continuous Remote Mobile Identity Management Using Biometric Integrated Touch-Display

    E-Print Network [OSTI]

    Carbunar, Bogdan

    of mobile devices and applications introduces new security and privacy vulnerabilities for the remote services accessed by mobile device users. A trusted and usable authentication archi- tecture for mobile mechanism that authenticates users of touch based mobile devices for accessing the local devices and remote

  20. Energy Management Webinar Series

    Broader source: Energy.gov [DOE]

    Boost your knowledge on how to implement an energy management system through this four-part webinar series from the Superior Energy Performance program. Each webinar introduces various elements of the ISO 50001 energy management standard—based on the Plan-Do-Check-Act approach—and the associated steps of DOE's eGuide for ISO 50001 software tool.

  1. Risk Management Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-09-16

    This Guide provides a framework for identifying and managing key technical, schedule, and cost risks through applying the requirements of DOE O 413.3A, Program and Project Management for the Acquisition of Capital Assets, dated 7-28-06. Canceled by DOE G 413.3-7A, dated 1-12-11. Does not cancel other directives.

  2. Comprehensive Irrigation Management 

    E-Print Network [OSTI]

    Cook, K.

    2011-01-01

    ? Disconnect with conservation investments & sustainable water savings ? High turnover rates among property managers and landscape contractors ? Economic pressures on operating expense to maintain system integrity Result: Devalued service with zero... consumption ? Soil characteristics ? Environmental conditions ? Landscape cultural practices ? Irrigation system performance Comprehensive Irrigation Management ? Restoration of antiquated irrigation systems ? Implementation of new control...

  3. Management of severe accidents

    SciTech Connect (OSTI)

    Jankowski, M.W.

    1988-01-01

    The definition and the multidimensionality aspects of accident management have been reviewed. The suggested elements in the development of a programme for severe accident management have been identified and discussed. The strategies concentrate on the two tiered approaches. Operative management utilizes the plant's equipment and operators capabilities. The recovery management concentrates on preserving the containment, or delaying its failure, inhibiting the release, and on strategies once there has been a release. The inspiration for this paper was an excellent overview report on perspectives on managing severe accidents in commercial nuclear power plants and extending plant operating procedures into the severe accident regime; and by the most recent publication of the International Nuclear Safety Advisory Group (INSAG) considering the question of risk reduction and source term reduction through accident prevention, management and mitigation. The latter document concludes that active development of accident management measures by plant personnel can lead to very large reductions in source terms and risk, and goes further in considering and formulating the key issue: The most fruitful path to follow in reducing risk even further is through the planning of accident management.

  4. Information Collection Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-10-11

    This Order sets forth DOE requirements and responsibilities for implementing the information collection management provisions of the Paperwork Reduction Act of 1995 and the Office of Management and Budgets implementing regulation Controlling Paperwork Burdens on the Public, as contained in 5 CFR 1320. No cancellation.

  5. COURSE OUTLINE Management 3313

    E-Print Network [OSTI]

    COURSE OUTLINE Management 3313 Developing Leadership Skills Online Syllabus Faculty: Andrew L Classroom): http://oc.okstate.edu Administrative contact: CEPD Distance Learning Office, 108 Gundersen, cepd, the focus will be on self- management and interpersonal concepts as opposed to organizational leadership

  6. Comprehensive Emergency Management System

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-01

    To establish policy and to assign and describe roles and responsibilities for the Department of Energy (DOE) Emergency Management System. The Emergency Management System provides the framework for development, coordination, control, and direction of all emergency planning, preparedness, readiness assurance, response, and recovery actions. Canceled by DOE O 151.1B. Cancels DOE O 151.1.

  7. EMERGENCY MANAGEMENT Effective Date

    E-Print Network [OSTI]

    Fernandez, Eduardo

    SUBJECT: EMERGENCY MANAGEMENT Effective Date: 4-7-14 Policy Number: 1.14 Supersedes: Policy 4 assets and ensure continued operations during and after all manner of emergencies, whether natural or man- made, by implementing appropriate emergency management policies, plans, and procedures designed

  8. Responsive classroom management 

    E-Print Network [OSTI]

    Stough, Laura

    2008-01-01

    stream_source_info Responsive classroom management.pdf.txt stream_content_type text/plain stream_size 9 Content-Encoding ISO-8859-1 stream_name Responsive classroom management.pdf.txt Content-Type text/plain; charset=ISO-8859-1 ...

  9. Salinity Management Desalination Technology

    E-Print Network [OSTI]

    Scott, Christopher

    Salinity Management and Desalination Technology for Brackish Water Resources in the Arid West.S. Bureau of Reclamation August, 2008 #12;Salinity Management and Desalination Technology for Brackish Water a practical roadmap forward for achieving sustainable, viable desalination of inland, moderate salinity waters

  10. Better Buildings Neighborhood Program Grant Recipient Management...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Grant Recipient Management Handbook Better Buildings Neighborhood Program Grant Recipient Management Handbook Better Buildings Neighborhood Program Grant Recipient Management...

  11. Energy Management in Microgrids: Algorithms and System

    E-Print Network [OSTI]

    Shi, Wenbo

    2015-01-01

    Energy Management System . . . . . . . . .An energy management system. . . . . . . . . . . . . .D. Saez, “A microgrid energy management system based on the

  12. CONTACTS FOR INFORMATION MANAGEMENT: Forms, Privacy & Records...

    Energy Savers [EERE]

    CONTACTS FOR INFORMATION MANAGEMENT: Forms, Privacy & Records CONTACTS FOR INFORMATION MANAGEMENT: Forms, Privacy & Records Maria Levesque, Director Records & Privacy Management...

  13. Environmental Management Advisory Board Subcommittees | Department...

    Energy Savers [EERE]

    Communication & Engagement EMAB Environmental Management Advisory Board Subcommittees Environmental Management Advisory Board Subcommittees ACQUISITION AND PROJECT MANAGEMENT...

  14. Project Management Career Development Program | Department of...

    Office of Environmental Management (EM)

    You are here Home Operational Management Certifications and Professional Development Project Management Career Development Program Project Management Career Development...

  15. Line Management Perspective: Office of Environmental Management (EM)

    Broader source: Energy.gov [DOE]

    Slide Presentation by Matthew Moury, Deputy Assistant Secretary for Safety, Security and Quality Programs, Office of Environmental Management. EFCOG Integrated Safety Management Work Planning and Control.

  16. Management Not Available 12 MANAGEMENT OF RADIOACTIVE AND NON...

    Office of Scientific and Technical Information (OSTI)

    87 Oak Ridge model conference: Proceedings: Volume I, Part 3, Waste Management Not Available 12 MANAGEMENT OF RADIOACTIVE AND NON-RADIOACTIVE WASTES FROM NUCLEAR FACILITIES; 11...

  17. Identity and Access Management: Access Management Survey 1 Access Management Survey Questions

    E-Print Network [OSTI]

    Maroncelli, Mark

    Identity and Access Management: Access Management Survey 1 Access Management Survey Questions The Identity and Access Management (IAM) Technical Architect Group (TAG) was formed by Kevin Morooney, the vice assistance with defining the requirements for Access Management, as outlined in Strategic Recommendations 4

  18. Risk Management Process Overview | Department of Energy

    Energy Savers [EERE]

    Risk Management Process Overview Risk Management Process Overview figure depicting three tier risk management process The cybersecurity risk management process explained in the...

  19. Copenhagen Waste Management and Incineration

    E-Print Network [OSTI]

    Columbia University

    Copenhagen Waste Management and Incineration Florence, April 24 2009 Julie B. Svendsen 24 20092 Presentation · General introduction to Copenhagen Waste Management System · National incentives · Waste Management plan 2012 · Incineration plants #12;Florence, April 24 20093 Copenhagen Waste

  20. Collection Management Policy Mission Statement

    E-Print Network [OSTI]

    Abrahams, I. David

    Collection Management Policy Mission Statement: To provide an efficient and effective service care, document supply, stock management, and logistical planning and relegation of the Library Management Policy ..................................3 2. Acquisition of Content

  1. October 2006 LOG MANAGEMENT: USING

    E-Print Network [OSTI]

    to Computer Security Log Management NIST's Information Technology Laboratory recently issued SpecialOctober 2006 LOG MANAGEMENT: USING COMPUTER AND NETWORK RECORDS TO IMPROVE INFORMATION SECURITY LOG MANAGEMENT: USING COMPUTER AND NETWORK RECORDS TO IMPROVE INFORMATION SECURITY Shirley Radack, Editor

  2. Nuclear materials management overview

    SciTech Connect (OSTI)

    DiGiallonardo, D.A. )

    1988-01-01

    The true goal of Nuclear Materials MANAGEMENT (NMM) is the strategical and economical management of all nuclear materials. Nuclear Materials Management's role involves near-term and long-term planning, reporting, forecasting, and reviewing of inventories. This function is administrative in nature. it is a growing area in need of future definition, direction, and development. Improvements are required in program structure, the way residues and wastes are determined, how ''what is and what if'' questions are handled, and in overall decision-making methods.

  3. Nuclear materials management overview

    SciTech Connect (OSTI)

    DiGiallonardo, D.A.

    1988-01-01

    The true goal of Nuclear Materials Management (NMM) is the strategical and economical management of all nuclear materials. Nuclear Materials Management's role involves near-term and long-term planning, reporting, forecasting, and reviewing of inventories. This function is administrative in nature. It is a growing area in need of future definition, direction, and development. Improvements are required in program structure, the way residues and wastes are determined, how /open quotes/What is and what if/close quotes/ questions are handled, and in overall decision-making methods. 2 refs.

  4. Radioactive Waste Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-07-09

    This Manual further describes the requirements and establishes specific responsibilities for implementing DOE O 435.1, Radioactive Waste Management, for the management of DOE high-level waste, transuranic waste, low-level waste, and the radioactive component of mixed waste. The purpose of the Manual is to catalog those procedural requirements and existing practices that ensure that all DOE elements and contractors continue to manage DOE's radioactive waste in a manner that is protective of worker and public health and safety, and the environment. Does not cancel other directives.

  5. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  6. Management Principles | Department of Energy

    Energy Savers [EERE]

    Management Principles Management Principles managementprinciples-S-2Poneman---2009-12-02.pdf More Documents & Publications Diversity and Inclusion Strategic Plan 2012 - 2015...

  7. Research Data Management: Tools & Services

    E-Print Network [OSTI]

    Tsang, Daniel C

    2013-01-01

    Research Data Management Tools & Services Daniel C.Data Librarian, UCI Libraries Research Data Management Manyand provide stewardship for research data generated by

  8. Office of Information Management

    Broader source: Energy.gov [DOE]

    The Office of Information Management provides a broad range of information technology services in support of the Associate Under Secretary for the Office of Environment, Health, Safety and Security (AU).

  9. Construction work process management 

    E-Print Network [OSTI]

    Soares, Jorge Barbosa

    1994-01-01

    for organizationand project-level work processes. Data to support the analysis were collected through a mailed questionnaire sent to construction executives and managers who were asked to provide information on organizational and project work processes, respectively....

  10. Strategic Energy Management

    Broader source: Energy.gov [DOE]

    The U.S. Department of Energy (DOE) SEE Action Network and Weatherization and Intergovernmental Program Technical Assistance Program sponsored this webinar about strategic management in the public sector on November 7, 2012.

  11. Brush Management Methods 

    E-Print Network [OSTI]

    Welch, Tommy G.

    2000-07-14

    . Brush plants such as mesquite may be useful for wood furniture, firewood and charcoal briquets. Brush has both positive and negative charac- teristics. Thus, brush should be managed to meet the established ranch objectives. Brush control methods are used...

  12. Managing Soybean Insects 

    E-Print Network [OSTI]

    Gouge, Dawn H.; Knutson, Allen E.; Cronholm, Gregory B.; Patrick, Carl D.; Way, M. O.

    1999-07-29

    , or if the field is very large, sample more areas to increase 3 Managing Soybean Insects Dawn H. Gouge, Michael O. Way, Allen Knutson, Greg Cronholm and Carl Patrick* *Assistant Professor and Extension Entomologist; Associate Professor, Texas Agricultural...

  13. Keloids: Pathophysiology and management

    E-Print Network [OSTI]

    Robles, David T; Moore, Erin; Draznin, Michelle; Berg, Daniel

    2007-01-01

    low- or high-dose rate brachytherapy [ 52 ]. Post-excisionalhigh dose rate brachytherapy (Ir-192) in the management ofkeloids by high-dose-rate brachytherapy: A seven-year study.

  14. Stage Gate Management Guide

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2 nd Edition. 1993, New York:Addison-Wesley Publishing Co. 2 Eidt, C.M., jr. and R.W. Cohen, 'Reinventing' Industrial Basic Research. Research Technology Management, 1997: p....

  15. Transportation Management Workshop: Proceedings

    SciTech Connect (OSTI)

    Not Available

    1993-10-01

    This report is a compilation of discussions presented at the Transportation Management Workshop held in Gaithersburg, Maryland. Topics include waste packaging, personnel training, robotics, transportation routing, certification, containers, and waste classification.

  16. Lawn Water Management 

    E-Print Network [OSTI]

    McAfee, James

    2006-06-26

    Water is a limited resource in Texas. This booklet explains how homeowners can establish a water management program for a home lawn that both maintains a healthy sod and also conserves water. The publication discusses soil types, grass varieties...

  17. Hazardous Waste Management (Delaware)

    Broader source: Energy.gov [DOE]

    The act authorizes the Delaware Department of Natural Resources and Environment Control (DNREC) to regulate hazardous waste and create a program to manage sources of hazardous waste. The act...

  18. Solid Waste Management (Kansas)

    Broader source: Energy.gov [DOE]

    This act aims to establish and maintain a cooperative state and local program of planning and technical and financial assistance for comprehensive solid waste management. No person shall construct,...

  19. Management of Nuclear Materials

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1994-05-26

    To establish requirements and procedures for the management of nuclear materials within the Department of Energy (DOE). Cancels DOE 5660.1A. Canceled by DOE O 410.2.

  20. managing the stockpile

    National Nuclear Security Administration (NNSA)

    managed by the National Nuclear Security Administration within the U. S. Department of Energy.

    OST is responsible for the safe and secure transport in the contiguous United...

  1. risk management annual report

    E-Print Network [OSTI]

    Frantz, Kyle J.

    ____________________________________________________________________ 2 The ERM Process______________________________________________________________________ 28 The ERM Process in 2014 and Beyond and mitigating the risks that threaten its mission, the Office of Enterprise Risk Management (ERM) was tasked

  2. Corporate Energy Management Process 

    E-Print Network [OSTI]

    Geiger, T.

    2013-01-01

    Guideline 2000 Geismar Cogeneration ? AOG Fuel Utilization 2001 Freeport Cogeneration Project 2002 Portsmouth Site Energy Team 2003 Freeport ISBL Energy Audits 2004 Energy Management Group (EM) 2004 Geismar Flare Best Practice 2005 Site Energy...

  3. OPERATIONS MANAGEMENT Spring 2008

    E-Print Network [OSTI]

    Almor, Amit

    performance, and various programs (TQM, Reengineering, Lean, Six-Sigma) that can be used for analyzing management in market launches, promotions, or auditing assignments; Six-Sigma in accounts receivables process

  4. Strategic Energy Management

    Broader source: Energy.gov [DOE]

    The U.S. Department of Energy (DOE) See Action Network and Weatherization and Intergovernmental Program Technical Assistance Program sponsored this webinar about strategic management in the public sector on November 7, 2012.

  5. Project Management Lessons Learned

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-05

    The guide supports DOE O 413.3A, Program and Project Management for the Acquisition of Capital Assets, and aids the federal project directors and integrated project teams in the execution of projects.

  6. Headquarters Personal Property Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-10-25

    To establish procedures for managing Government personal property owned or leased by the Department of Energy and in the custody of DOE Headquarters employees, including those in the National Nuclear Security Administration. Cancels DOE HQ O 580.1A

  7. Information Technology Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-12-23

    The Order identifies the objectives, components, and responsibilities for implementing processes to ensure the effective management of information and information systems within the Department. Supersedes DOE O 200.1.

  8. "Managing Department Climate Change"

    E-Print Network [OSTI]

    Sheridan, Jennifer

    "Managing Department Climate Change" #12;Presenters · Ronda Callister Professor, Department Department Climate? · Assesment is essential for determining strategies for initiating change · In a research climate · Each panelist will describe an intervention designed to improve department climate ­ Ronda

  9. Facilities Management Services Policy

    E-Print Network [OSTI]

    , central heating and chilled water plants, buildings HVAC, plumbing and electrical and emergency back/exterior finishes (e.g., signage, paint, floor coverings) x Distribution and Mail Services x Fleet Management x

  10. Financial Management Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to the COUs is reflected through a reduction in the Gross Sales amount. For BPA management reports, Gross Sales and Purchase Power are shown separated from the power bookout...

  11. Financial Management Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    is reflected through a reduction in the Gross Sales amount. FY 2012 FY 2011 For BPA management reports, Gross Sales and Purchase Power are shown separated from the power bookout...

  12. Implementing Motor Management 

    E-Print Network [OSTI]

    Colip, R. L.

    2002-01-01

    PRESIDENT-SALES, BALDOR ELECTRlC COMPANY, FORT SMITH, ARKANSAS IMPLEMENTING MOTOR MANAGEMENT ABSTRACT Electric motors account for sixty five percent of industrial energy consumed today. There are many opportunities to conserve electricity by using more...

  13. Human Resource Management Delegation

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1996-06-28

    The notice is to clarifies and updates existing Human Resource Management Delegation Authorities and the levels to which they are delegated. Expired 6-28-97. Does not cancel any directives.

  14. Island Wide Management Corporation

    Office of Legacy Management (LM)

    9 1986 Island Wide Management Corporation 3000 Marcus Avenue Lake Success, New York 11042 Dear Sir or Madam: I am sending you this letter and the enclosed information as you have...

  15. Configuration Change Management

    E-Print Network [OSTI]

    Yoder, Nathaniel

    2012-05-11

    shown that if a company does not continue to innovate, whether it is products or services, it will not be able to remain successful. This philosophy is extremely important with design engineering companies. If managed correctly, change can be a...

  16. Radioactive Waste Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-07-09

    This Manual further describes the requirements and establishes specific responsibilities for implementing DOE O 435.1, Radioactive Waste Management, for the management of DOE high-level waste, transuranic waste, low-level waste, and the radioactive component of mixed waste. Change 1 dated 6/19/01 removes the requirement that Headquarters is to be notified and the Office of Environment, Safety and Health consulted for exemptions for use of non-DOE treatment facilities. Certified 1-9-07.

  17. The Watershed Management Approach 

    E-Print Network [OSTI]

    Persyn, Russell A.; Griffin, Molly; Williams, Amy T.; Wolfe, Clint

    2008-08-11

    coordinated environmental management framework that focuses public and private efforts on a watershed?s highest- priority problems. In the past, such an approach was used more commonly in polluted watersheds or those with limited water supplies, but it also... network helps Texans meet their water needs. However, Texas surface water quality varies because of both natural processes and hu- man activities. The state of Texas also monitors and manages the Gulf of Mexico. Planning Determine the watershed planning...

  18. Lithium battery management system

    DOE Patents [OSTI]

    Dougherty, Thomas J. (Waukesha, WI)

    2012-05-08

    Provided is a system for managing a lithium battery system having a plurality of cells. The battery system comprises a variable-resistance element electrically connected to a cell and located proximate a portion of the cell; and a device for determining, utilizing the variable-resistance element, whether the temperature of the cell has exceeded a predetermined threshold. A method of managing the temperature of a lithium battery system is also included.

  19. TWRS safety management plan

    SciTech Connect (OSTI)

    Popielarczyk, R.S., Westinghouse Hanford

    1996-08-01

    The Tank Waste Remediation System (TWRS) Safety Management Program Plan for development, implementation and maintenance of the tank farm authorization basis is described. The plan includes activities and procedures for: (a) Updating the current Interim Safety Basis, (b) Development,implementation and maintenance of a Basis for Interim Operations, (c) Development, implementation and maintenance of the Final Safety Analyses Report, (d) Development and implementation of a TWRS information Management System for monitoring the authorization basis.

  20. Poisonous Plant Management

    E-Print Network [OSTI]

    McGinty, Allan

    1985-01-01

    range specialist, The Texas A&M University System . 2 DIAGNOSING POISONOOS PLANT PROBLEMS Accurate diagnosis of poisonous plant problems can be extremely difficult. Many cases of livestock poisoning by plants have been improperly diagnosed... Agricultural Extension Service ~-P~,IJ& H~iN!/ P~,IJ&--------------- poisonous Plant ___ Management_ ..... Texas Agricultural Extension Service. The Texas A&M University System. College Station, Texas POISONO(]S PLANT MANAGEMENT Allan McGinty* Poisonous...

  1. Change Management within Project Management: An Integrated Structured

    E-Print Network [OSTI]

    Lano, Kevin Charles

    Change Management within Project Management: An Integrated Structured Business Process Approach from a current state to a desired future state. The success of change and project management can is usually only 8% to 15% of the overall project effort (Gottesdiener, 2001). #12;Generic Change Management

  2. Annex 2 Risk Management Guidance and Template SPO Project Management

    E-Print Network [OSTI]

    1 Annex 2 ­ Risk Management Guidance and Template SPO Project Management Guidance on Risk Management Introduction Risk is any action or event that affects a project's ability to achieve its on cost, schedule and technical performance. However, with appropriate procedures, risks can be managed

  3. Mountain Caribou in Managed Forests: Recommendations for Managers

    E-Print Network [OSTI]

    Northern British Columbia, University of

    by the program. Financial support for the production of the second edition of Mountain Caribou in managed forestsMountain Caribou in Managed Forests: Recommendations for Managers Second Edition Susan K. Stevenson, Lands and Parks. #12;iv ACKNOWLEDGEMENTS The first edition of this report, Mountain Caribou in managed

  4. Workforce Management Office (WFMO) Functional Statements WORKFORCE MANAGEMENT OFFICE

    E-Print Network [OSTI]

    May 2014 Workforce Management Office (WFMO) ­ Functional Statements WORKFORCE MANAGEMENT OFFICE The Workforce Management Office (WFMO) is the servicing Human Resource Organization for NOAA and is the principal contact point with the Department of Commerce (DOC) Office of Human Resources Management. WFMO

  5. Faculty Search Announcement Strategic Management

    E-Print Network [OSTI]

    Frantz, Kyle J.

    Faculty Search Announcement Strategic Management Department of Managerial Sciences Robinson College and nominations for multiple tenure track faculty positions at multiple ranks in the area of Strategic Management and teaching interests that represent the different facets of Management including Strategic Management

  6. Risk Management Policy and Procedures

    E-Print Network [OSTI]

    Paxton, Anthony T.

    Risk Management Policy and Procedures #12;Risk Management Policy and Procedures Queen's University Belfast Updated January 2014 1. PURPOSE OF THIS DOCUMENT 1.1 This Risk Management Policy (the policy explains the University's underlying approach to risk management, documents the roles and responsibilities

  7. SUPPLY CHAIN MANAGER CHICAGO, IL

    E-Print Network [OSTI]

    Bustamante, Fabián E.

    or an MBA with emphasis on operations management. Additional training that includes SIX SIGMA, LEAN, CPIM

  8. Service management solutions White paper

    E-Print Network [OSTI]

    an end-to-end service perspective. · Service management platform is built on IBM Tivoli Change to help align operations with business context and enable customers to manage change. Tivoli CCMDBService management solutions White paper Netcool + Tivoli: delivering service management innovation

  9. December 2010 FACILITIES & PROPERTY MANAGEMENT

    E-Print Network [OSTI]

    change with carbon management being the key issue for many organisations. The HE sector must play itsDecember 2010 FACILITIES & PROPERTY MANAGEMENT CARBON MANAGEMENT AND SUSTAINABILITY ACTIVITIES REPORT 2009/10 #12;Contents Page · Introduction 1 · Carbon and Energy Management 3 · Waste and Recycling

  10. CALIFORNIA STATE UNIVERSITY, RISK MANAGEMENT

    E-Print Network [OSTI]

    de Lijser, Peter

    CALIFORNIA STATE UNIVERSITY, FULLERTON RISK MANAGEMENT ANNUAL REPORT January 2008 OFFICE OF UNIVERSITY RISK MANAGEMENT CP-320 714-278-7346 #12;2006 ­ 2007 Risk Management Annual Report Page 2 I. Executive Summary A. Program Cost One method to assess the effectiveness of the University's risk management

  11. Eighth Annual Risk Management Conference

    E-Print Network [OSTI]

    Chaudhuri, Sanjay

    Eighth Annual Risk Management Conference Risk Management Amidst Global Rebalancing 10 ­ 11 July 2014, Singapore The Risk Management Institute (RMI) at the National University of Singapore invites submissions for its 8th annual conference on risk management in Singapore on 10 and 11 July 2014. We

  12. CALIFORNIA STATE UNIVERSITY, RISK MANAGEMENT

    E-Print Network [OSTI]

    de Lijser, Peter

    CALIFORNIA STATE UNIVERSITY, FULLERTON RISK MANAGEMENT ANNUAL REPORT November 2006 OFFICE OF UNIVERSITY RISK MANAGEMENT LH-806C 714-278-7346 #12;2005 ­ 2006 Risk Management Annual Report Page 2 I. Executive Summary A. Program Cost One method to assess the effectiveness of the University's risk management

  13. CALIFORNIA STATE UNIVERSITY, RISK MANAGEMENT

    E-Print Network [OSTI]

    de Lijser, Peter

    CALIFORNIA STATE UNIVERSITY, FULLERTON RISK MANAGEMENT ANNUAL REPORT November 2005 OFFICE OF UNIVERSITY RISK MANAGEMENT LH-806C 714-278-7346 #12;2004 ­ 2005 Risk Management Annual Report Page 2 I. Introduction The Office of University Risk Management provides resources, advice and training that allow

  14. Information Security Office Risk Management

    E-Print Network [OSTI]

    Alpay, S. Pamir

    Information Security Office Risk Management Exception Template #12;Risk Management Exception or Approved) 6/01/2013 CISO Jason Pufahl, CISO Approved 6/01/2013 RMAC Risk Management Advisory Council Reviewed #12;Risk Management Exception Template 2 | P a g e Please check one of the following: Requester

  15. Management Systems Engineering Spring 2013

    E-Print Network [OSTI]

    Sobek II, Durward K.

    ) orientation, and be focused on the modern management paradigm surrounding lean manufacturing and related

  16. By Peter Sandborn Strategic Management

    E-Print Network [OSTI]

    Sandborn, Peter

    By Peter Sandborn Strategic Management of DMSMS in Systems DSP JOURNAL April/June 200824 #12;dsp and management support. However, the majority of the existing offerings focus on reactive and, to a lesser degree, proactive management of DMSMS issues associated with electronic parts. Effective long-term management

  17. Management of ancient wood pasture

    E-Print Network [OSTI]

    Guidance Management of ancient wood pasture Summary Ancient wood pasture is recognised. This guidance note provides an introduction to the restoration and management of ancient wood pastures in Scotland. It is aimed at land managers, their advisers and agency staff involved in land management

  18. Data Management Group Annual Report

    E-Print Network [OSTI]

    Toronto, University of

    Data Management Group Annual Report 1999 prepared by: Data Management Group Joint Program APPENDIX A: DATA REQUESTS ..................................... 11 #12;Data Management Group 1999 Annual Report Page 1 of 14 INTRODUCTION The Data Management Group is a research project located at the Joint

  19. Energy Management Issued: June 2010

    E-Print Network [OSTI]

    Energy Management Policy Issued: June 2010 Revised: Responsible Administrative Unit: Finance.0 BACKGROUND AND PURPOSE The Engineering and Energy Management division of the Department of Facilities Management at the Colorado School of Mines ("Mines" or "the school") has developed an Energy Management

  20. Project Management Plan Chinese Food

    E-Print Network [OSTI]

    Igusa, Kiyoshi

    impact of this project? · Data management: How do we collect, preserve and sort all of the files? Which special equipment, facilities needed or wanted? According to http://project-management-knowledge.com/ weProject Management Plan Chinese Food According to NSF, the basic elements of a project management

  1. Emergency Management Concepts, Existing Guidance, and Changes

    Broader source: Energy.gov [DOE]

    Presenter: David Freshwater, Emergency Management Specialist, Office of Emergency Management, National Nuclear Security Administration

  2. Best Practices in Industrial Data Management

    Broader source: Energy.gov (indexed) [DOE]

    or otherwise restricted information. Industrial Data Management What is energy data management? Monitoring Recording Analyzing Reporting ...

  3. Understanding and managing corporate agency problems

    E-Print Network [OSTI]

    Vojtech, Cindy M.

    2011-01-01

    Preceding Management Buyout Offers,” Journal of Accountingofferings, or management buyouts (Teoh, Wong and Rao, 1998b;

  4. Automating Personalized Battery Management on Smartphones

    E-Print Network [OSTI]

    Falaki, Mohamamd Hossein

    2012-01-01

    3 Automating Battery Management . . . . . . .122 Battery Goal Setting UI . . . . . . . . . . . . . . .Power and Battery Management . . . . . . . . . . . . . . .

  5. Personnel / Human Resource Management MGTK 302 Online

    E-Print Network [OSTI]

    Diestel, Geoff

    competencies: Strategic Human Resource Management: Knowledge of strategic management concepts (strategyPersonnel / Human Resource Management MGTK 302 Online Fall 2014 YOUR INSTRUCTOR Name: Ms. Amanda of human resource management; relationship between personnel management and organizations' emerging role

  6. Certified records manager exam

    SciTech Connect (OSTI)

    Not Available

    1990-01-01

    The Institute of Certified Records Managers (ICRM) is a non-profit, certifying organization of professional records managers and administrators. ICRM members are experienced in information requirements, records and information systems, and the related office systems and technologies. All members have met certification requirements and have received the Certified Records Manager (CRM) designation. As the field of information and records management moves toward standardization, and as the application of new technologies and technicalities complicate the measurement and demonstration of professional competence, the need for a means of identifying persons who have basic competency increases. The ICRM is providing such a means by testing and certifying basic knowledge. More and more job announcements are requiring this evidence of competency. Unfortunately, as an organization, NIRMA has a relatively small number of CRMs. The goal of the ICRM Development Group is two-fold; (1) to encourage NIRMA members to obtain their certification by providing basic information and support and; (2) to develop the Nuclear Specialist test module which will demonstrate that bearers have demonstrated expertise in nuclear records management as well as basic competencies. This report covers the examination process.

  7. FACULTY OF MANAGEMENT The University of Lethbridge's Faculty of Management offers five undergraduate Certificate programs in

    E-Print Network [OSTI]

    Seldin, Jonathan P.

    in Organizations Management 4390 - Leading Organizational Change Management 4901 - Applied Consulting One ofFACULTY OF MANAGEMENT The University of Lethbridge's Faculty of Management offers five undergraduate Certificate programs in · Finance · General Management · Human Resource Management and Labour

  8. Property Management Major Bachelor of Science in Apparel, Housing, and Resource Management

    E-Print Network [OSTI]

    Zallen, Richard

    Property Management Major Bachelor of Science in Apparel, Housing, and Resource Management College Management Major + AHRM 2664 (2675) Introduction to Residential Property Management + AHRM 2674 (2676) Multifamily Property Management and Operations + AHRM 3634 Managing Affordable and Specialized Housing

  9. Oil field management system

    DOE Patents [OSTI]

    Fincke, James R.

    2003-09-23

    Oil field management systems and methods for managing operation of one or more wells producing a high void fraction multiphase flow. The system includes a differential pressure flow meter which samples pressure readings at various points of interest throughout the system and uses pressure differentials derived from the pressure readings to determine gas and liquid phase mass flow rates of the high void fraction multiphase flow. One or both of the gas and liquid phase mass flow rates are then compared with predetermined criteria. In the event such mass flow rates satisfy the predetermined criteria, a well control system implements a correlating adjustment action respecting the multiphase flow. In this way, various parameters regarding the high void fraction multiphase flow are used as control inputs to the well control system and thus facilitate management of well operations.

  10. Storage resource manager

    SciTech Connect (OSTI)

    Perelmutov, T.; Bakken, J.; Petravick, D.; /Fermilab

    2004-12-01

    Storage Resource Managers (SRMs) are middleware components whose function is to provide dynamic space allocation and file management on shared storage components on the Grid[1,2]. SRMs support protocol negotiation and reliable replication mechanism. The SRM standard supports independent SRM implementations, allowing for a uniform access to heterogeneous storage elements. SRMs allow site-specific policies at each location. Resource Reservations made through SRMs have limited lifetimes and allow for automatic collection of unused resources thus preventing clogging of storage systems with ''orphan'' files. At Fermilab, data handling systems use the SRM management interface to the dCache Distributed Disk Cache [5,6] and the Enstore Tape Storage System [15] as key components to satisfy current and future user requests [4]. The SAM project offers the SRM interface for its internal caches as well.

  11. Computer memory management system

    DOE Patents [OSTI]

    Kirk, III, Whitson John (Greenwood, MO)

    2002-01-01

    A computer memory management system utilizing a memory structure system of "intelligent" pointers in which information related to the use status of the memory structure is designed into the pointer. Through this pointer system, The present invention provides essentially automatic memory management (often referred to as garbage collection) by allowing relationships between objects to have definite memory management behavior by use of coding protocol which describes when relationships should be maintained and when the relationships should be broken. In one aspect, the present invention system allows automatic breaking of strong links to facilitate object garbage collection, coupled with relationship adjectives which define deletion of associated objects. In another aspect, The present invention includes simple-to-use infinite undo/redo functionality in that it has the capability, through a simple function call, to undo all of the changes made to a data model since the previous `valid state` was noted.

  12. Sustainable Energy Management Programs 

    E-Print Network [OSTI]

    Hanner, S.

    2014-01-01

    stream_source_info ESL-KT-14-11-45.pdf.txt stream_content_type text/plain stream_size 4632 Content-Encoding UTF-8 stream_name ESL-KT-14-11-45.pdf.txt Content-Type text/plain; charset=UTF-8 Sustainable Energy Management... Existing Conditions • Develop Plan • Implement and Monitor Program ESL-KT-14-11-45 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 Sustainable Programs Feature – District Commitment – Qualified Energy Manager – Facility...

  13. Radioactive Waste Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-07-09

    This Manual further describes the requirements and establishes specific responsibilities for implementing DOE O 435.1, Radioactive Waste Management, for the management of DOE high-level waste, transuranic waste, low-level waste, and the radioactive component of mixed waste. Change 1 dated 6/19/01 removes the requirement that Headquarters is to be notified and the Office of Environment, Safety and Health consulted for exemptions for use of non-DOE treatment facilities. Certified 1-9-07. Admin Chg 2, dated 6-8-11, supersedes DOE M 435.1-1 Chg 1.

  14. Environmental Management System

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansasCommunitiesof Energy Services » Program Management »Management

  15. Management | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousandReport)Price (Dollars perManagement CouncilManagement Directors

  16. NS&T MANAGEMENT OBSERVATIONS

    SciTech Connect (OSTI)

    Gianotto, David

    2014-06-01

    The INL Management Observation Program (MOP) is designed to improve managers and supervisors understanding of work being performed by employees and the barriers impacting their success. The MOP also increases workers understanding of managements’ expectations as they relate to safety, security, quality, and work performance. Management observations (observations) are designed to improve the relationship and trust between employees and managers through increased engagement and interactions between managers and researchers in the field. As part of continuous improvement, NS&T management took initiative to focus on the participation and quality of observations in FY 14. This quarterly report is intended to (a) summarize the participation and quality of management’s observations, (b) assess observations for commonalities or trends related to facility or process barriers impacting research, and (c) provide feedback and make recommendations for improvements NS&T’s MOP.

  17. NS&T Management Observations

    SciTech Connect (OSTI)

    Gianotto, David

    2014-09-01

    The INL Management Observation Program (MOP) is designed to improve managers and supervisors understanding of work being performed by employees and the barriers impacting their success. The MOP also increases workers understanding of managements’ expectations as they relate to safety, security, quality, and work performance. Management observations (observations) are designed to improve the relationship and trust between employees and managers through increased engagement and interactions between managers and researchers in the field. As part of continuous improvement, NS&T management took initiative to focus on the participation and quality of observations in FY 14. This quarterly report is intended to (a) summarize the participation and quality of management’s observations, (b) assess observations for commonalities or trends related to facility or process barriers impacting research, and (c) provide feedback and make recommendations for improvements NS&T’s MOP.

  18. SILENTKNOCK: Practical, Provably Undetectable Authentication

    E-Print Network [OSTI]

    Hopper, Nicholas J.

    . Lopez (Eds.): ESORICS 2007, LNCS 4734, pp. 122­138, 2007. c Springer-Verlag Berlin Heidelberg 2007 #12

  19. Executive Director Jeff Grieve

    E-Print Network [OSTI]

    Lennard, William N.

    Telecom Solutions Server Support & Computer Accounts Virus Mgmt Server Management Web Infrastructure Active Directory Computer Accounts Authentication #12;

  20. Radioactive Waste Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-07-09

    The objective of this Order is to ensure that all Department of Energy (DOE) radioactive waste is managed in a manner that is protective of worker and public health and safety and the environment. Supersedes DOE O 5820.2A. Chg 1 dated 8-28-01. Certified 1-9-07.

  1. Best Environmental Management Practices

    E-Print Network [OSTI]

    protection 3. Aesthetics Acceptable ways for managing mortality include: 1. Rendering 2. Composting 3, and composting methods recycle the nutrients. The other methods, in essence, waste the nutrients. Rendering by rendering plant vehicles and personnel. Composting Composting is the controlled aerobic biological

  2. Managing environmental information

    SciTech Connect (OSTI)

    Solyst, J. [Chemical Manufacturers Association, Arlington, VA (United States)

    1998-12-31

    The public`s right to know about environmental policy has moved to the forefront with the technological advances in recent years. Congress has not kept pace with these developments having twice considered and twice rejected legislation that is necessary in this field. Congress should provide leadership to the Environmental Protection Agency (EPA) for a broad strategy to improve information resources and management.

  3. Forest Resources and Management

    E-Print Network [OSTI]

    the forest resource. Our aim is that British forests ­ from their creation to maturity and regeneration and harvesting, and the physical properties of stands, trees and timber. Scope of our work Our research focuses expertise in forecasting forest growth is now applied to carbon assessment and management. We also work

  4. Hazardous Waste Management Training

    E-Print Network [OSTI]

    Dai, Pengcheng

    Hazardous Waste Management Training Persons (including faculty, staff and students) working with hazardous materials should receive annual training that addresses storage, use, and disposal of hazardous before handling hazardous waste. Departments are re- quired to keep records of training for as long

  5. Electrical Demand Management 

    E-Print Network [OSTI]

    Fetters, J. L.; Teets, S. J.

    1983-01-01

    The Demand Management Plan set forth in this paper has proven to be a viable action to reduce a 3 million per year electric bill at the Columbus Works location of Western Electric. Measures are outlined which have reduced the peak demand 5% below...

  6. Comprehensive Emergency Management System

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-10-29

    To establish policy and to assign and describe roles and responsibilities for the Department of Energy (DOE) Emergency Management System. (This is an administrative change to DOE O 151.1A). Canceled by DOE O 151.1C. Cancels DOE O 151.1A.

  7. Integrated Safety Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-04-25

    The order ensures that DOE/NNSA, systematically integrates safety into management and work practices at all levels, so that missions are accomplished efficiently while protecting the workers, the public, and the environment. Supersedes DOE M 450.4-1 and DOE M 411.1-1C

  8. Comprehensive Emergency Management System

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1996-08-21

    The Order establishes policy and assigns and describes roles and responsibilities for the DOE Emergency Management System. Cancels DOE 5500.1B, DOE 5500.2B, DOE 5500.3A, DOE 5500.4A, 5500.5A,5500.7B, 5500.8A, 5500.9A, DOE 5500.10

  9. Rice Insect Management

    E-Print Network [OSTI]

    Drees, Bastiaan M.

    1983-01-01

    8-1445 rexas Agricultural Extension Service, The Texas A&M University System Zerle L. Carpenter, Director, College Station, Texas Table of Contents Page Introduction .......................?...... Insect Management Practices.... . . . . . . . . . . . . . . . . . . . . . . . . . . .. 7 Other Insect Pests of Texas Rice. . . . . . . . . . . . . . 8 Texas Rice Production Practices. . . . . . . . . . . . . .. 9 1983 Rice Insect Control Suggestions .......... \\0 Acknowledgment This publication has been prepared to assist...

  10. Load Management Made Simple 

    E-Print Network [OSTI]

    Schneider, K.

    1985-01-01

    Company have moved to a demand side or load management mode which seeks to influence customers to change electric usage patterns to more efficiently use available generating capacity. Since 1970, the TUEC system peak demand has more than doubled from about...

  11. Purge water management system

    DOE Patents [OSTI]

    Cardoso-Neto, J.E.; Williams, D.W.

    1995-01-01

    A purge water management system is described for effectively eliminating the production of purge water when obtaining a groundwater sample from a monitoring well. In its preferred embodiment, the purge water management system comprises an expandable container, a transportation system, and a return system. The purge water management system is connected to a wellhead sampling configuration, typically permanently installed at the well site. A pump, positioned with the monitoring well, pumps groundwater through the transportation system into the expandable container, which expands in direct proportion with volume of groundwater introduced, usually three or four well volumes, yet prevents the groundwater from coming into contact with the oxygen in the air. After this quantity of groundwater has been removed from the well, a sample is taken from a sampling port, after which the groundwater in the expandable container can be returned to the monitoring well through the return system. The purge water management system prevents the purge water from coming in contact with the outside environment, especially oxygen, which might cause the constituents of the groundwater to oxidize. Therefore, by introducing the purge water back into the monitoring well, the necessity of dealing with the purge water as a hazardous waste under the Resource Conservation and Recovery Act is eliminated.

  12. Position Management and Classification

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-04-01

    The order establishes departmental requirements and responsibilities for classifying positions using the general schedule (GS) and federal wage system (FWS) standards and to develop and administer a sound position management and classification program. Supersedes DOE O 325.2, dated 4-1-15.

  13. Position Management and Classification

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-04-01

    The order establishes departmental requirements and responsibilities for classifying positions using general schedule (GS) and federal wage system (FWS) standards and for developing and administering a sound position management and classification program within the Department. Cancels Chapter VII of DOE O 320.1. Canceled by DOE O 325.2 Chg 1 (Admin Chg), 9-1-15.

  14. Integrated Safety Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-04-25

    The policy establishes DOE's expectation for safety, including integrated safety management that will enable the Department’s mission goals to be accomplished efficiently while ensuring safe operations at all departmental facilities and activities. Supersedes DOE P 450.4, DOE P 411.1, DOE P 441.1, DOE P 450.2A, and DOE P 450.7

  15. ENGINEERING MANAGEMENT AND LEADERSHIP

    E-Print Network [OSTI]

    Eagar, Thomas W.

    ENGINEERING MANAGEMENT AND LEADERSHIP Where did we come from? Where are we going? How do we get · If it works but no one knows why, it's ENGINEERING #12;The scientist explains that which exists; The engineer creates that which never was. Theodore von Karman #12;Engineer - Noun (from French "to contrive

  16. Office of Quality Management

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Office of Quality Management develops and interprets Government-wide policies and procedures and conducts training to ensure the accurate identification of information and documents that must be classified or controlled under statute or Executive order to protect the national security and controlled unclassified Official Use Only information for the effective operation of the Government.

  17. OFFICE FOR EMERGENCY MANAGEMENT

    Office of Legacy Management (LM)

    OFFICE FOR EMERGENCY MANAGEMENT 155OP STREETNW. WiSHINGTON. D.C. ' , iQns 25,19&L At-t :. I' .' at l530 P Btmat, IO&, XtwMn&m, 0. 6., at 9130 A.Jb Sa 1 llmbemupoftbaaomlttaal8f...

  18. Purge water management system

    DOE Patents [OSTI]

    Cardoso-Neto, Joao E. (North Augusta, SC); Williams, Daniel W. (Aiken, SC)

    1996-01-01

    A purge water management system for effectively eliminating the production of purge water when obtaining a groundwater sample from a monitoring well. In its preferred embodiment, the purge water management system comprises an expandable container, a transportation system, and a return system. The purge water management system is connected to a wellhead sampling configuration, typically permanently installed at the well site. A pump, positioned with the monitoring well, pumps groundwater through the transportation system into the expandable container, which expands in direct proportion with volume of groundwater introduced, usually three or four well volumes, yet prevents the groundwater from coming into contact with the oxygen in the air. After this quantity of groundwater has been removed from the well, a sample is taken from a sampling port, after which the groundwater in the expandable container can be returned to the monitoring well through the return system. The purge water management system prevents the purge water from coming in contact with the outside environment, especially oxygen, which might cause the constituents of the groundwater to oxidize. Therefore, by introducing the purge water back into the monitoring well, the necessity of dealing with the purge water as a hazardous waste under the Resource Conservation and Recovery Act is eliminated.

  19. Mobile Technology Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2014-05-15

    The order establishes requirements, assigns responsibilities, and provides guidance for federal mobile technology management and employee use of both government furnished and personally-owned mobile devices within DOE and NNSA. Establishes requirements for use of User Agreements to govern mobile devices used for official duties. Does not cancel other directives.

  20. Managing America's solid waste

    SciTech Connect (OSTI)

    Phillips, J. A.

    1998-09-15

    This report presents an historical overview of the federal role in municipal solid waste management from 1965 to approximately 1995. Attention is focuses on the federal role in safeguarding public health, protecting the environment, and wisely using material and energy resources. It is hoped that this report will provide important background for future municipal solid waste research and development initiatives.

  1. Radioactive Waste Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-07-09

    The objective of this Order is to ensure that all Department of Energy (DOE) radioactive waste is managed in a manner that is protective of worker and public health and safety and the environment. Cancels DOE O 5820.2A

  2. Managing projects utilizing self-managed teams and managerial toolkits

    E-Print Network [OSTI]

    Mathur, Praveen, S. M. Massachusetts Institute of Technology

    2009-01-01

    Project Management is an essential function in most software companies today. With increasing complexity and inter connectivity between software projects, it is not surprising that managing such large scale development ...

  3. Configuration Management for Open Source Software

    E-Print Network [OSTI]

    Bendix, Lars

    , configuration selection, workspace management, concurrency control, change management and release management. In this position paper, we do not present our full study, but just the change management task, which is where OSS configuration management differs mostly from CSD configuration management. Change management processes compared

  4. Privacy Management at UC Information and Records Management

    E-Print Network [OSTI]

    Hickman, Mark

    or criminal records. See a full list of the types of information collected about individuals at UC in SectionPrivacy. Privacy Management at UC Information and Records Management (IRM) www Records Management 3 1. Introduction Information that staff or contractors create and collect at UC needs

  5. Intellectual Property Management and Markets Intellectual Property Management and Markets

    E-Print Network [OSTI]

    Intellectual Property Management and Markets Intellectual Property Management and Markets Program are becoming cen- tral to the modern economy. IIT's Master of Intellectual Property Management and Markets exploitation. Graduates of this program will be equipped to take a strategic or leadership role leveraging

  6. Nutrient Management Module No. 13 Regulation and Management

    E-Print Network [OSTI]

    Lawrence, Rick L.

    , as seen in Table 1. Additional manure characteristics can be found in NRCS's Agricultural Waste Management and swine manure contain about as much N as commercial fertilizer applied to cropland each year (DEQ, 1996Nutrient Management Module No. 13 Manure and Biosolids: Regulation and Management by Clain Jones

  7. Waste Management & Research290 Waste Manage Res 2002: 20: 290301

    E-Print Network [OSTI]

    Florida, University of

    Waste Management & Research290 Waste Manage Res 2002: 20: 290­301 Printed in UK ­ all rights reserved Copyright © ISWA 2002 Waste Management & Research ISSN 0734­242X Introduction Chromated copper of sorting technologies for CCA treated wood waste Monika Blassino Helena Solo-Gabriele University of Miami

  8. Project Management Plan Project Title: Natural Resources Management

    E-Print Network [OSTI]

    US Army Corps of Engineers

    DEFINITION. The NRM Gateway is a knowledge management resource, designed to serve the needs of the NRMP; · Preserve institutional knowledge; · Develop practical and agency-approved webpages that provide usefulProject Management Plan Project Title: Natural Resources Management (NRM) Gateway Website

  9. Earned Value Management System (EVMS)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-05-06

    The Guide supports the Departments initiatives to improve program, project, and contract management through the implementation and surveillance of contractors earned value management systems. Canceled by DOE G 413.3-10A.

  10. Oklahoma Industrial Energy Management Program 

    E-Print Network [OSTI]

    Estes, C. B.; Turner, W. C.

    1980-01-01

    this, the Oklahoma Department of Energy designed a program to acquaint Oklahoma industry with the potential savings available through energy management and some basic techniques. The program is, entitled "Oklahoma Industrial Energy Management Program...

  11. Where do firms manage earnings?

    E-Print Network [OSTI]

    Dyreng, Scott D.

    Despite decades of research on how, why, and when companies manage earnings, there is a paucity of evidence about the geographic location of earnings management within multinational firms. In this study, we examine where ...

  12. Emergency Animal Management during Disasters 

    E-Print Network [OSTI]

    Dement, Angela

    2006-10-23

    This publication explains how communities and counties can incorporate animal issues into their emergency management plans. It explains what local plans should include, what role county Extension agents can play, and how animal management plans can...

  13. Data Management Group Annual Report

    E-Print Network [OSTI]

    Toronto, University of

    Data Management Group Annual Report 2000 prepared by: Data Management Group Joint Program PROCESSING ...................................................2 Text Based Data Retrieval System `drs'.................................2 Internet Browser Data Retrieval System (iDRS).....................3 Complex Data Requests

  14. Data Management Group Annual Report

    E-Print Network [OSTI]

    Toronto, University of

    iv Data Management Group Annual Report 2003 City of Hamilton City of Toronto GO Transit Regional of York Toronto Transit Commission The Data Management Group is a research program located ........................................................................................................ 3 Text-based Data Retrieval System `drs

  15. Data Management Group Annual Report

    E-Print Network [OSTI]

    Toronto, University of

    Data Management Group Annual Report 2001 prepared by: Data Management Group Joint Program..............................................................................2 Text Based Data Retrieval System `drs' ..........................................................2 Internet Browser Data Retrieval System (iDRS)..............................................3 Complex Data

  16. Data Management Group Annual Report

    E-Print Network [OSTI]

    Toronto, University of

    Data Management Group Annual Report 2002 prepared by: Data Management Group Joint Program Based Data Retrieval System `drs' ............................................... 3 Internet Browser Data Retrieval System (iDRS) .................................. 4 Complex Data Requests

  17. Environmental Management (EM) Cleanup Projects

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-09-24

    The guide supports DOE O 413.3A, Program and Project Management for the Acquisition of Capital Assets, and provides guidance on environmental management cleanup projects. Canceled by DOE N 251.105.

  18. Contractor Human Resource Management Programs

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1996-09-30

    The purpose of this directive is to establish Department of Energy (DOE) responsibilities and requirements for the management and oversight of contractor Human Resource Management (HR) programs. Chg 1, 5-8-98; Chg 2, 11-22-09

  19. Contractor Human Resource Management Programs

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1996-09-30

    The purpose of this directive is to establish Department of Energy (DOE) responsibilities and requirements for the management and oversight of contractor Human Resource Management (HR) programs. Chg 1, 5-8-98; Chg 2, 11-22-09.

  20. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  1. ENERGY STAR Portfolio Manager 201

    Office of Energy Efficiency and Renewable Energy (EERE)

    Continue to learn about EPA’s new ENERGY STAR Portfolio Manager tool, with a deeper dive into more advanced functionalities such as: managing and tracking changes to your property uses over time;...

  2. ENERGY STAR Portfolio Manager 101

    Office of Energy Efficiency and Renewable Energy (EERE)

    Join us as we introduce and demonstrate the core functionality of EPA’s ENERGY STAR Portfolio Manager tool. Attendees will learn how to: navigate Portfolio Manager; add a property and enter details...

  3. Essays on Competitive Strategy and Innovation Management

    E-Print Network [OSTI]

    Wang, Richard Dick

    2010-01-01

    Competitive Position. Strategic Management Journal, 21(7):Strategic Balance. Strategic Management Journal, 20(2): 147–Automobile Industry. Strategic Management Journal, 23: 307-

  4. Managing Knowledge Workers in Global Value Chains

    E-Print Network [OSTI]

    Brown, Clair; Linden, Greg

    2010-01-01

    Strategic Alliances. ” Strategic Management Journal, v.12,Overseas Knowledge. ” Strategic Management Journal, 22(4):Performance. ” Strategic Management Journal, 28(13): 1319–

  5. Robust Maintenance Policies in Asset Management

    E-Print Network [OSTI]

    Kuhn, Kenneth D.; Madanat, Samer M.

    2005-01-01

    Repair Policies in Asset Management Under Uncertain FacilityMAINTENANCE POLICIES IN ASSET MANAGEMENT Kenneth D. KuhnBerkeley, USA ABSTRACT Asset management systems help public

  6. EIS-0200: Waste Management Programmatic Environmental Impact...

    Office of Environmental Management (EM)

    00: Waste Management Programmatic Environmental Impact Statement for Managing Treatment, Storage, and Disposal of Radioactive and Hazardous Waste EIS-0200: Waste Management...

  7. Performance Feedback to Improve Classroom Management Practices

    E-Print Network [OSTI]

    Garcia, Melissa

    2015-01-01

    Implementation of a classroom management program with urbanof evidence-based classroom management strategies throughbased practices in classroom management: Considerations for

  8. DOE Challenge Home Recommended Quality Management Provisions...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Recommended Quality Management Provisions DOE Challenge Home Recommended Quality Management Provisions DOE Challenge Home Recommended Quality Management Provisions. qm6-14-13.pdf...

  9. IT Project Management | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management IT Project Management Qualification, Engineering and Quality Assurance The purpose of the Department of Energy (DOE) IT Project Management, Engineering, and Quality...

  10. Does Management Matter? Evidence from India

    E-Print Network [OSTI]

    Bloom, Nicholas; Eifert, Benn; Mahajan, Aprajit; McKenzie, David; Roberts, John

    2012-01-01

    DOES MANAGEMENT MATTER? EVIDENCE FROM INDIA Nicholas Bloomis whether differences in management practices across firmsTo investigate this, we ran a management field experiment on

  11. Performance Feedback to Improve Classroom Management Practices

    E-Print Network [OSTI]

    Garcia, Melissa

    2015-01-01

    teachers in behavior management: The PBISplus coachingand implementation of behavior management interventions inImplementation of a classroom management program with urban

  12. Pest Management For Grain Storage and Fumigation

    E-Print Network [OSTI]

    Dyer, Bill

    Pest Management For Grain Storage and Fumigation Seed Treatment -Pest Control- Grain Storage & Seed MANAGEMENT FOR GRAIN STORAGE AND FUMIGATION Introduction .................................................................................................................................................................. 12 Resistance Management Issues

  13. Federal Energy Management Program Report Template | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Federal Energy Management Program Report Template Federal Energy Management Program Report Template Template to create reports for the Federal Energy Management Program (FEMP)...

  14. Interagency Energy Management Task Force Members

    Broader source: Energy.gov [DOE]

    The Interagency Energy Management Task Force is led by the Federal Energy Management Program director. Members include energy and sustainability managers from federal agencies.

  15. Sandia Energy - Bureau of Land Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Bureau of Land Management Home Climate & Earth Systems Sustainable Subsurface Energy Development Program Leadership Bureau of Land Management Bureau of Land ManagementMaelyn...

  16. UMBC POLICY ON PASSWORD-BASED CREDENTIAL MANAGEMENT UMBC#X-1.00.03

    E-Print Network [OSTI]

    Suri, Manil

    in the history will be rejected. Password Aging and Lockout: 1. After 10 successive failed authentication times will result in a lockout from the password reset procedure, requiring the individual to initiate

  17. 5) Management ii) Mechanical methods

    E-Print Network [OSTI]

    Nowak, Robert S.

    5) Management c) Control ii) Mechanical methods = manually or mechanically damaging plants #12;5) Management c) Control ii) Mechanical methods Advantages · Generally much less public opposition #12;5) Management c) Control ii) Mechanical methods Advantages · Generally much less public opposition · Works well

  18. Quantitative Risk Management Rudiger Frey

    E-Print Network [OSTI]

    Frey, Rüdiger

    Lecture Quantitative Risk Management R¨udiger Frey Universit¨at Leipzig Wintersemester 2010 risk management C. Introduction to Portfolio Credit Derivatives c 2010 (Frey) 1 #12;A. Introduction of counterparties. Measuring and management of credit risk is of high importance for financial institutions

  19. Algorithmic Aspects of Risk Management

    E-Print Network [OSTI]

    Gehani, Ashish

    Algorithmic Aspects of Risk Management Ashish Gehani1 , Lee Zaniewski2 , and K. Subramani2 1 SRI International 2 West Virginia University Abstract. Risk analysis has been used to manage the security of sys configuration. This allows risk management to occur in real time and reduces the window of exposure to attack

  20. Therisk management-risk assessmentinterface

    E-Print Network [OSTI]

    Short, Daniel

    Therisk management- risk assessmentinterface Lastin afve-pan seies oncancernskassessmznt Paul.Evenso,Fuly sat- isfactorysolutioDsto the risk manage- menlDr.blemsof cancerafributableto industrialy relardE Dislc.,Jr. Hoqston,Tet:nO24 Everyonpracticesrisk management daily to rcduccrisksof nl3ny khds