Sample records for rsa authentication manager

  1. V-174: RSA Authentication Manager Writes Operating System, SNMP...

    Broader source: Energy.gov (indexed) [DOE]

    RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files PLATFORM: RSA Authentication Manager 8.0 ABSTRACT: A...

  2. T-659: Update support for RSA Authentication Manager

    Broader source: Energy.gov [DOE]

    RSA posted SP4 Patch 4 of their Authentication Manager product 06/30/2011. There are a few pages of fixes in the README, but the most significant is that Authentication Manager can now be installed on Windows Server 2008 (both 32 and 64bit).

  3. V-195: RSA Authentication Manager Lets Local Users View the Administra...

    Broader source: Energy.gov (indexed) [DOE]

    (Patch 26 (P26) for RSA Authentication Manager 7.1 Service Pack 4 (SP4) and Appliance 3.0 SP4; Patch 2 (P2) for RSA Authentication Manager 8.0). Addthis Related Articles T-704:...

  4. U-212: RSA Authentication Manager Flaws Permit Cross-Site and...

    Office of Environmental Management (EM)

    to be executed by the target user's browser. The code will originate from the site running the RSA Authentication Manager software and will run in the security context of that...

  5. U-267: RSA® Authentication Agent 7.1 for Microsoft Windows®...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Bypass Authentication Requirements V-159: RSA SecurID Agent Discloses Node Secret Encryption Key to Local Users V-195: RSA Authentication Manager Lets Local Users View...

  6. V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...

    Broader source: Energy.gov (indexed) [DOE]

    RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements PLATFORM: RSA Authentication Agent 7.1, 7.1.1 for Microsoft Windows ABSTRACT: A vulnerability was...

  7. V-223: RSA Authentication Agent for PAM Allows Remote Users to...

    Broader source: Energy.gov (indexed) [DOE]

    Vulnerability V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements V-159: RSA SecurID Agent Discloses Node Secret Encryption Key to Local Users...

  8. T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw

    Broader source: Energy.gov [DOE]

    An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session.

  9. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  10. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...

    Energy Savers [EERE]

    in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613...

  11. T-640: RSA Access Manager Server CVE-2011-0322 Update | Department...

    Broader source: Energy.gov (indexed) [DOE]

    7, 2011 - 5:18pm Addthis PROBLEM: ESA-2011-009 (revised): RSA, The Security Division of EMC, announces new fix for potential security vulnerability in RSA Access Manager Server....

  12. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Energy Savers [EERE]

    5.x ABSTRACT: Several vulnerabilities were reported in RSA Archer eGRC. REFERENCE LINKS: EMC SecurityTracker Alert ID: 1028516 CVE-2013-0932 CVE-2013-0933 CVE-2013-0934 IMPACT...

  13. T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID

    Broader source: Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

  14. V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...

    Broader source: Energy.gov (indexed) [DOE]

    Key to Local Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5 RSA Web Agent for IIS versions...

  15. U-027: RSA Key Manager Appliance Session Logout Bug Fails to...

    Broader source: Energy.gov (indexed) [DOE]

    the 2.7.1.6 hotfix, since this hotfix addresses security related fixes, hot fix roll ups, and bug fixes. To obtain the latest RSA product downloads, log on at RSA SecurCare....

  16. U-084: Cisco Digital Media Manager Lets Remote Authenticated...

    Broader source: Energy.gov (indexed) [DOE]

    authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not...

  17. U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury at FY6:EnergyScripting

  18. V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartment ofConductThere is a

  19. V-195: RSA Authentication Manager Lets Local Users View the Administrative

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of

  20. V-195: RSA Authentication Manager Lets Local Users View the Administrative

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your DensityEnergy U.S.-China Electric Vehicle and03/02 TUE 08:59Capability for2:ofDepartment|AttacksAccount

  1. AUTHENTICATED

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProducts (VAP) VAP7-0973 1 Introduction In the design ofSouthwesternAUTHENTICATED

  2. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  3. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  4. RSA-Based Secret Handshakes Damien Vergnaud

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    RSA-Based Secret Handshakes Damien Vergnaud Laboratoire de Math´ematiques Nicolas Oresme Universit. A secret handshake mechanism allows two entities, members of a same group, to authenticate each other secretly. This primitive was introduced recently by Balfanz, Durfee, Shankar, Smetters, Staddon and Wong

  5. V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department of EnergySUSE

  6. Another Generalization of Wiener's Attack on RSA

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    Another Generalization of Wiener's Attack on RSA Abderrahmane NITAJ Universit´e de Caen, France Casablanca, June 12, 2008 Abderrahmane NITAJ Another Generalization of Wiener's Attack on RSA #12;RSA and Wiener The new attack Conclusion RSA setting Wiener's attack Generalizations Colour conventions Red

  7. T-582: RSA systems has resulted in certain information being...

    Broader source: Energy.gov (indexed) [DOE]

    2: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID T-582: RSA systems has resulted in certain information being...

  8. Anonymous, authentic, and accountable resource management based on the E-cash paradigm

    E-Print Network [OSTI]

    Lam, Tak Cheung

    2009-05-15T23:59:59.000Z

    AAA Anonymity, Authenticity, Accountability BC Binary Code BRGC Binary Reflected Gray Code CA Central Authority DHT Distributed Hashing Table DSI Double Spending Identification DVS Delegation Key, Verification Key, Secret Share GDA General... Disposable Authentication GDM General Divisibility Model GTM General Transferability Model MLBF Multi-Layer Bloom Filter KDM Key Dependency Map MSR Multi-Source Reusability P2P Peer-to-Peer RC Random Code SH Secret Handshake SOA Service Oriented...

  9. A Proposed Algorithm to improve security & Efficiency of SSL-TLS servers using Batch RSA decryption

    E-Print Network [OSTI]

    Pateriya, R K; Shrivastava, S C; Patel, Jaideep

    2009-01-01T23:59:59.000Z

    Today, Internet becomes the essential part of our lives. Over 90 percent of the ecommerce is developed on the Internet. A security algorithm became very necessary for producer client transactions assurance and the financial applications safety. The rsa algorithm applicability derives from algorithm properties like confidentiality, safe authentication, data safety and integrity on the internet. Thus, this kind of networks can have a more easy utilization by practical accessing from short, medium, even long distance and from different public places. Rsa encryption in the client side is relatively cheap, whereas, the corresponding decryption in the server side is expensive because its private exponent is much larger. Thus ssl tls servers become swamped to perform public key decryption operations when the simultaneous requests increase quickly .The batch rsa method is useful for such highly loaded web server .In our proposed algorithm by reducing the response time and clients tolerable waiting time an improvement...

  10. authenticated key exchange: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 56 Authentication and Key Agreement via Memorable...

  11. V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...

    Broader source: Energy.gov (indexed) [DOE]

    Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-233:...

  12. U-130: JBoss Operations Network LDAP Authentication Bug Lets...

    Broader source: Energy.gov (indexed) [DOE]

    Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability...

  13. Identity-Based Mediated RSA , Xuhua Ding2

    E-Print Network [OSTI]

    Ding, Xuhua

    certificates. Mediated RSA (mRSA) [4] is a simple and practical method of splitting RSA private keys between signature or decryption must in- volve both parties. mRSA allows fast and fine-grained control (revocation) over users' security privileges. However, mRSA still relies on public key certificates to derive public

  14. A new attack on RSA and CRT-RSA Abderrahmane Nitaj

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    A new attack on RSA and CRT-RSA Abderrahmane Nitaj Laboratoire de Math´ematiques Nicolas Oresme an attack on CRT-RSA when the CRT-exponents dp and dq are both suitably small. In this paper, we show and ex+y 0 (mod N). As an application of our new attack, we present the cryptanalysis of CRT-RSA if one

  15. V-036: EMC Smarts Network Configuration Manager Database Authenticatio...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    36: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass...

  16. Message Authentication message authentication is concerned with

    E-Print Network [OSTI]

    Message Authentication · message authentication is concerned with: ­protecting the integrity of a message ­validating identity of originator ­non-repudiation of origin (dispute resolution) · will consider the security requirements · then three alternative functions used: ­message encryption ­message authentication

  17. User Guide Remote Workplace to VDI Using RSA | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    User Guide Remote Workplace to VDI Using RSA User Guide Remote Workplace to VDI Using RSA Last updated on March 17, 2015 This document provides instructions for logging onto Remote...

  18. T-703: Cisco Unified Communications Manager Open Query Interface...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Identity Services Engine Discloses Authentication Credentials to Remote Users V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability...

  19. authentication system based: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 58 Integrating identity-based cryptography in IMS...

  20. An Attack on RSA Using LSBs of Multiples of the Prime Factors

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    An Attack on RSA Using LSBs of Multiples of the Prime Factors Abderrahmane Nitaj Laboratoire de attack on RSA with d in polynomial time under special conditions. For example, various partial key exposure attacks on RSA and some

  1. U-063: RSA SecurID Software Token for Windows DLL Loading Error...

    Broader source: Energy.gov (indexed) [DOE]

    Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA...

  2. 2012-2013 Keywords: Routing and spectrum allocation (RSA), flexible optical networks

    E-Print Network [OSTI]

    Varvarigo, Emmanouel "Manos"

    , "Conserving Transmission Power in Wireless Ad Hoc Networks" #12;), flexible optical networks WDM (FWDM) . (RSA) (RWA). FWDM Matlab. 2: Keywords: Routing and spectrum allocation (RSA), flexible optical networks

  3. V-234: EMC RSA Archer GRC Open Redirection Weakness and Security...

    Energy Savers [EERE]

    4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September...

  4. CONTINUED FRACTIONS AND RSA WITH SMALL SECRET EXPONENT

    E-Print Network [OSTI]

    Dujella, Andrej

    CONTINUED FRACTIONS AND RSA WITH SMALL SECRET EXPONENT ANDREJ DUJELLA Abstract. Extending of Verheul and van Tilborg variant of Wiener's attack on RSA cryptosystem with small secret exponent. 1 of two large primes p and q. The public exponent e and the secret exponent d are related by ed 1 (mod (n

  5. Parallel FPGA Implementation of RSA with Residue Number Systems

    E-Print Network [OSTI]

    Parallel FPGA Implementation of RSA with Residue Number Systems --- Can side­channel threats Multiplication based on Residue Num­ ber Systems. Thanks to RNS, we develop a design able to perform an RSA signature in parallel on a set of identical and independent copro­ cessors. Of independent interest, we

  6. Parallel FPGA Implementation of RSA with Residue Number Systems

    E-Print Network [OSTI]

    Parallel FPGA Implementation of RSA with Residue Number Systems -- Can side-channel threats Multiplication based on Residue Num- ber Systems. Thanks to RNS, we develop a design able to perform an RSA signature in parallel on a set of identical and independent copro- cessors. Of independent interest, we

  7. Multi-factor authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21T23:59:59.000Z

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  8. Authentication of byte sequences

    SciTech Connect (OSTI)

    Stearns, S.D.

    1991-06-01T23:59:59.000Z

    Algorithms for the authentication of byte sequences are described. The algorithms are designed to authenticate data in the Storage, Retrieval, Analysis, and Display (SRAD) Test Data Archive of the Radiation Effects and Testing Directorate (9100) at Sandia National Laboratories, and may be used in similar situations where authentication of stored data is required. The algorithms use a well-known error detection method called the Cyclic Redundancy Check (CRC). When a byte sequence is authenticated and stored, CRC bytes are generated and attached to the end of the sequence. When the authenticated data is retrieved, the authentication check consists of processing the entire sequence, including the CRC bytes, and checking for a remainder of zero. The error detection properties of the CRC are extensive and result in a reliable authentication of SRAD data.

  9. U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection...

    Energy Savers [EERE]

    U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and...

  10. V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain...

    Broader source: Energy.gov (indexed) [DOE]

    Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue U-129: RSA...

  11. authenticated key agreement: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

  12. Secure Anonymous RFID Authentication Protocols Christy Chatmon

    E-Print Network [OSTI]

    Burmester, Mike

    technology is to automatically identify objects that are contained in electromagnetic fields. RFID tags do attention as is seen by an increase in its deployment, such as object tracking and monitoring, supply-chain management, and personal- ized information services. Numerous authentication protocols for RFID systems were

  13. T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilitiesVulnerability |Users Obtain Password

  14. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof Energy 2, 2015 -Helicopter-Japan Joint NuclearDepartment ofEnergy

  15. V-223: RSA Authentication Agent for PAM Allows Remote Users to Make

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015ofDepartment of Energy Microsoft SecurityEnergyDepartment ofSUSE

  16. A Faster Hardware Implementation of RSA Ajay C Shantilal

    E-Print Network [OSTI]

    1 A Faster Hardware Implementation of RSA Algorithm Ajay C Shantilal Department of Electrical- cation systems. Central tools for achieving system security are cryptographic algorithms. For performance at the Department of Electrical & Computer Engineering, Oregon State University, Corvallis, Oregon 97331. E

  17. Protocols and security proofs for data authentication

    E-Print Network [OSTI]

    Mityagin, Anton

    2006-01-01T23:59:59.000Z

    Generalized Carter-Wegman MACs . . . . . . . . . . . . . . .which constitute Carter-Wegman message authentication schemening generalized Carter-Wegman message authentication scheme

  18. Tools for Authentication

    SciTech Connect (OSTI)

    White, G

    2008-07-09T23:59:59.000Z

    Many recent Non-proliferation and Arms Control software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project (projects can have both common and custom rules to detect flaws and security holes). Any such extensible tool must be based on a complete language compiler infrastructure, that is, one that can parse and digest the full language through its standard grammar. ROSE is precisely such a compiler infrastructure developed within DOE. ROSE is a robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. This year, it has been extended to support the automated analysis of binaries. We continue to extend ROSE to address a number of security-specific requirements and apply it to software authentication for Non-proliferation and Arms Control projects. We will give an update on the status of our work.

  19. Key recycling in authentication

    E-Print Network [OSTI]

    Christopher Portmann

    2014-09-29T23:59:59.000Z

    In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

  20. Course: Math 311w-01 Laboratory 6: The RSA cipher and public-key cryptography, part 2

    E-Print Network [OSTI]

    Reluga, Tim

    , change to the Desktop directory if you aren't already there, and start ipython. Type ]: from RSA import

  1. Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach

    E-Print Network [OSTI]

    Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach Ding Wang University, Beijing 100871, China 3 Automobile Management Institute of PLA, Bengbu City 233011, China wangdingg@mail.nankai.edu.cn Abstract. As the most prevailing two-factor authentication mechanism, smart

  2. Combined Attack on CRT-RSA Why Public Verification Must Not Be Public?

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Combined Attack on CRT-RSA Why Public Verification Must Not Be Public? Guillaume Barbu1 , Alberto introduces a new Combined Attack on a CRT- RSA implementation resistant against Side-Channel Analysis and Fault Injection attacks. Such implementations prevent the attacker from ob- taining the signature when

  3. A New Attack on RSA with Two or Three Decryption Exponents

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    A New Attack on RSA with Two or Three Decryption Exponents Abderrahmane Nitaj Laboratoire de Math-size. In this paper, we describe an attack on RSA in the presence of two or three exponents ei with the same modulus N. The new attack is an extension of Guo's continued fraction attack as well as the Bl¨omer and May lattice

  4. A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes

    E-Print Network [OSTI]

    Odlyzko, Andrew M.

    A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes Y. Desmedt. Odlyzko AT&T Bell Laboratories Murray Hill, NJ 07974, USA ABSTRACT A new attack on the RSA cryptosystem is presented. This attack assumes less than previous chosen ciphertext attacks, since the cryptanalyst has

  5. Attacking RSA-based Sessions in SSL/TLS* Vlastimil Klma

    E-Print Network [OSTI]

    Attacking RSA-based Sessions in SSL/TLS* Vlastimil Klíma , Ondej Pokorný1 and Tomás Rosa2, 1 ICZ on RSA-based sessions in SSL/TLS protocols. These protocols incorporate the PKCS#1 (v. 1.5) encoding- secret can decrypt the whole captured SSL/TLS session. We show that incorporating a version number check

  6. Anonymous authenticated communications

    DOE Patents [OSTI]

    Beaver, Cheryl L. (Albuquerque, NM); Schroeppel, Richard C. (Woodland Hills, UT); Snyder, Lillian A. (Corrales, NM)

    2007-06-19T23:59:59.000Z

    A method of performing electronic communications between members of a group wherein the communications are authenticated as being from a member of the group and have not been altered, comprising: generating a plurality of random numbers; distributing in a digital medium the plurality of random numbers to the members of the group; publishing a hash value of contents of the digital medium; distributing to the members of the group public-key-encrypted messages each containing a same token comprising a random number; and encrypting a message with a key generated from the token and the plurality of random numbers.

  7. A Hybrid Authentication and Authorization Process for Control System Networks

    SciTech Connect (OSTI)

    Manz, David O.; Edgar, Thomas W.; Fink, Glenn A.

    2010-08-25T23:59:59.000Z

    Convergence of control system and IT networks require that security, privacy, and trust be addressed. Trust management continues to plague traditional IT managers and is even more complex when extended into control system networks, with potentially millions of entities, a mission that requires 100% availability. Yet these very networks necessitate a trusted secure environment where controllers and managers can be assured that the systems are secure and functioning properly. We propose a hybrid authentication management protocol that addresses the unique issues inherent within control system networks, while leveraging the considerable research and momentum in existing IT authentication schemes. Our hybrid authentication protocol for control systems provides end device to end device authentication within a remote station and between remote stations and control centers. Additionally, the hybrid protocol is failsafe and will not interrupt communication or control of vital systems in a network partition or device failure. Finally, the hybrid protocol is resilient to transitory link loss and can operate in an island mode until connectivity is reestablished.

  8. Cryptanalysis of Two Dynamic IDbased Remote User Authentication Schemes for

    E-Print Network [OSTI]

    University, Harbin City 150001, China 2 Automobile Management Institute of PLA, Bengbu City 233011, China guessing attack under their non­tamper resistance assumption of the smart card; (2) It fails to provide of schemes. Keywords: Cryptanalysis, Authentication protocol, O#ine password guessing attack, Smart card

  9. Quantum direct communication with authentication

    SciTech Connect (OSTI)

    Lee, Hwayean [Center for Information Security Technologies (CIST) and Graduate School of Information Security (GSIS), Korea University, Anam Dong, Sungbuk Gu, Seoul (Korea, Republic of); Institut fuer Experimentalphysik, Universitaet Wien (Austria); Lim, Jongin [Center for Information Security Technologies (CIST) and Graduate School of Information Security (GSIS), Korea University, Anam Dong, Sungbuk Gu, Seoul (Korea, Republic of); Yang, HyungJin [Center for Information Security Technologies (CIST) and Graduate School of Information Security (GSIS), Korea University, Anam Dong, Sungbuk Gu, Seoul (Korea, Republic of); Department of Physics, Korea University, Chochiwon, Choongnam (Korea, Republic of)

    2006-04-15T23:59:59.000Z

    We propose two quantum direct communication (QDC) protocols with user authentication. Users can identify each other by checking the correlation of Greenberger-Horne-Zeilinger (GHZ) states. Alice can directly send a secret message to Bob without any previously shared secret using the remaining GHZ states after authentication. Our second QDC protocol can be used even though there is no quantum link between Alice and Bob. The security of the transmitted message is guaranteed by properties of entanglement of GHZ states.

  10. T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...

    Broader source: Energy.gov (indexed) [DOE]

    Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT:...

  11. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic...

    Office of Environmental Management (EM)

    1027513 CVE-2011-3389 CVE-2012-2110 CVE-2012-2131 IMPACT ASSESSMENT: High Discussion: EMC has acknowledged a weakness and a vulnerability in RSA BSAFE, which can be exploited by...

  12. Cryptanalysis of Dual CRT-RSA Santanu Sarkar and Subhamoy Maitra

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Cryptanalysis of Dual CRT-RSA Santanu Sarkar and Subhamoy Maitra Applied Statistics Unit, Indian Statistical Institute, 203 B T Road, Kolkata 700 108, India sarkar.santanu.bir@gmail.com, subho

  13. IT Licentiate theses Query Authentication and

    E-Print Network [OSTI]

    Flener, Pierre

    IT Licentiate theses 2008-002 Query Authentication and Data Confidentiality in Wireless Sensor of Licentiate of Philosophy in Computer Science at Uppsala University 2008 #12;Query Authentication and Data

  14. Biometric Authentication using Nonparametric Methods

    E-Print Network [OSTI]

    Sheela, S V; 10.5121/ijcsit.2010.2309

    2010-01-01T23:59:59.000Z

    The physiological and behavioral trait is employed to develop biometric authentication systems. The proposed work deals with the authentication of iris and signature based on minimum variance criteria. The iris patterns are preprocessed based on area of the connected components. The segmented image used for authentication consists of the region with large variations in the gray level values. The image region is split into quadtree components. The components with minimum variance are determined from the training samples. Hu moments are applied on the components. The summation of moment values corresponding to minimum variance components are provided as input vector to k-means and fuzzy kmeans classifiers. The best performance was obtained for MMU database consisting of 45 subjects. The number of subjects with zero False Rejection Rate [FRR] was 44 and number of subjects with zero False Acceptance Rate [FAR] was 45. This paper addresses the computational load reduction in off-line signature verification based o...

  15. U-168: EMC Documentum Information Rights Management Server Bugs...

    Broader source: Energy.gov (indexed) [DOE]

    8: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service U-168: EMC Documentum Information Rights Management Server Bugs Let Remote...

  16. Security analysis of RSA cryptosystem algorithm and it’s properties

    SciTech Connect (OSTI)

    Liu, Chenglian [School of Mathematics and Computer Science, Long Yan university, Lonyan 364012 (China); Guo, Yongning, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com; Lin, Juan, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com [Department of Mathematics and Computer Science, Fuqing Branch of Fujian Normal University, Fuqing 350300 (China)

    2014-10-06T23:59:59.000Z

    The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles to discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA.

  17. The Power of Verification Queries in Message Authentication and Authenticated Encryption

    E-Print Network [OSTI]

    Bernstein, Daniel

    encryption. Keywords: Message authentication, PRFs, Carter-Wegman, symmetric encryption, authenticated-cipher based MACs [5, 22, 10, 4, 11, 20, 17, 18] and Carter-Wegman (CW) ma-schemes [25, 21, 23, 16, 8, 9

  18. The Power of Verification Queries in Message Authentication and Authenticated Encryption

    E-Print Network [OSTI]

    encryption. Keywords: Message authentication, PRFs, Carter­Wegman, symmetric encryption, authenticated­cipher based MACs [5, 22, 10, 4, 11, 20, 17, 18] and Carter­Wegman (CW) ma­schemes [25, 21, 23, 16, 8, 9

  19. Obfuscated authentication systems, devices, and methods

    DOE Patents [OSTI]

    Armstrong, Robert C; Hutchinson, Robert L

    2013-10-22T23:59:59.000Z

    Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

  20. Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications

    E-Print Network [OSTI]

    Sabatini, David M.

    Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

  1. Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack

    E-Print Network [OSTI]

    Chen, Sheng-Wei

    Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack Hung-Min Sun- Factorization is difficult, p and q are simply estimated as N. In the Wiener attack, 2 N is adopted of the Wiener attack can be considered to be brute-guessing for the MSBs of p + q. Comparing with their work

  2. Stronger security bounds for Wegman-Carter-Shoup authenticators

    E-Print Network [OSTI]

    Bernstein, Daniel

    Stronger security bounds for Wegman-Carter-Shoup authenticators, authentication, MAC, Wegman-Carter, provable security 1 Introduction This paper proves

  3. Stronger security bounds for Wegman-Carter-Shoup authenticators

    E-Print Network [OSTI]

    Bernstein, Daniel

    Stronger security bounds for Wegman-Carter-Shoup authenticators Daniel J. Bernstein Department probabilities for f. Keywords: mode of operation, authentication, MAC, Wegman-Carter, provable security 1

  4. T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

  5. DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING

    E-Print Network [OSTI]

    Cortesi, Tino

    DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING Sukriti Bhattacharya and Agostino Cortesi@dsi.unive.it, cortesi@unive.it Keywords: Database watermarking, ZAW, Public key watermark, Abstract interpretation the verification of integrity of the relational databases by using a public zero distortion authentication

  6. Verifying authentication protocols with CSP Steve Schneider

    E-Print Network [OSTI]

    Doran, Simon J.

    Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

  7. U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Unspecified Flaw Lets Remote Users Gain Access U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-026: Cisco Small...

  8. Final report for the network authentication investigation and pilot.

    SciTech Connect (OSTI)

    Eldridge, John M.; Dautenhahn, Nathan; Miller, Marc M.; Wiener, Dallas J; Witzke, Edward L.

    2006-11-01T23:59:59.000Z

    New network based authentication mechanisms are beginning to be implemented in industry. This project investigated different authentication technologies to see if and how Sandia might benefit from them. It also investigated how these mechanisms can integrate with the Sandia Two-Factor Authentication Project. The results of these investigations and a network authentication path forward strategy are documented in this report.

  9. An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards Pascal clients. This paper aims to solve this issue by proposing an innovative paradigm based on a grid of smart the scalability of this server linked to smart card grids whose distributed computation manages the concurrence

  10. A Localized Authentication, Authorization, and Accounting (AAA) Protocol for Mobile Hotspots

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    of authentication, authorization, and accounting (AAA) protocol, which is a core technology for public mobile mobile hotspots. I. INTRODUCTION With the advances of wireless access technologies (e.g., 3G, IEEE 802 hotspots [3] [4] [5]. In terms of mobility management, the Internet Engineering Task Force (IETF) has

  11. T-614: Cisco Unified Communications Manager Database Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Communications Manager contains a vulnerability that could allow an authenticated, remote attacker to inject arbitrary script code on a targeted system. PLATFORM: Cisco Unified...

  12. T-693: Symantec Endpoint Protection Manager Input Validation...

    Broader source: Energy.gov (indexed) [DOE]

    user's cookies (including authentication cookies), if any, associated with the site running the Symantec Endpoint Protection Manager software, access data recently submitted by...

  13. Improving Classical Authentication with Quantum Communication

    E-Print Network [OSTI]

    of short secret keys [1]. Brassard's scheme is itself an improvement of the Wegman-Carter protocol [2 of messages we want to authenticate, as opposed to the Wegman-Carter proposal. The security of PRGs is based

  14. Hardware device binding and mutual authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04T23:59:59.000Z

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  15. Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes

    DOE Patents [OSTI]

    Kent, Alexander Dale (Los Alamos, NM)

    2008-09-02T23:59:59.000Z

    Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

  16. Using Two-Factor RSA Token with WebVPN | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of Energy OfficeFactEnergy Bob UnderYour RSA

  17. REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL

    E-Print Network [OSTI]

    REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL Christopher Mann and Daniel Loebenberger 15 August 2014 Abstract. We show how to realize two-factor authentication for a Bitcoin wal- let a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification

  18. Authentication Procedures - The Procedures and Integration Working Group

    SciTech Connect (OSTI)

    Kouzes, Richard T.; Bratcher, Leigh; Gosnell, Tom; Langner, Diana; MacArthur, D.; Mihalczo, John T.; Pura, Carolyn; Riedy, Alex; Rexroth, Paul; Scott, Mary; Springarn, Jay

    2001-05-31T23:59:59.000Z

    Authentication is how we establish trust in monitoring systems and measurements to verify compliance with, for example, the storage of nuclear weapons material. Authentication helps assure the monitoring party that accurate and reliable information is provided by any measurement system and that any irregularities are detected. The U.S. is developing its point of view on the procedures for authentication of monitoring systems now planned or contemplated for arms reduction and control applications. The authentication of a system utilizes a set of approaches, including: functional testing using trusted calibration sources, evaluation of documentation, evaluation of software, evaluation of hardware, random selection of hardware and software, tamper-indicating devices, and operational procedures. Authentication of measurement systems should occur throughout their lifecycles, starting with the elements of design, and moving to off-site authentication, on-siste authentication, and continuing with authentication following repair. The most important of these is the initial design of systems. Hardware and software design criteria and procurement decisions can make future authentication relatively straightforward or conversely very difficult. Facility decisions can likewise ease the procedures for authentication since reliable and effective monitoring systems and tampering indicating devices can help provide the assurance needed in the integrity of such items as measurement systems, spare equipment, and reference sources. This paper will summarize the results of the U.S. Authentication Task Force discussion on the role of procedures in authentication.

  19. Using Rose and Compass for Authentication

    SciTech Connect (OSTI)

    White, G

    2009-07-09T23:59:59.000Z

    Many recent non-proliferation software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project. ROSE is an LLNL-developed robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. It continues to be extended to support the automated analysis of binaries (x86, ARM, and PowerPC). We continue to extend ROSE to address a number of security specific requirements and apply it to software authentication for non-proliferation projects. We will give an update on the status of our work.

  20. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyThe followingRemote Users

  1. U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOE O

  2. Trust-and Clustering-Based Authentication Services in Mobile Ad Hoc Edith C. H. Ngai and Michael R. Lyu

    E-Print Network [OSTI]

    Lyu, Michael R.

    distributed systems, security in ad hoc networks is based on the use of a key management system. Specific key the network. The new solution is evaluated through simulation and implementation, and the resultsTrust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith C. H. Ngai

  3. Comment on 'Quantum direct communication with authentication'

    SciTech Connect (OSTI)

    Zhang, Zhan-jun [Department of Physics and Center for Quantum Information Science, National Cheng Kung University, Tainan 70101, Taiwan (China); Key Laboratory of Optoelectronic Information Acquisition and Manipulation of Ministry of Education of China, School of Physics and Material Science, Anhui University, Hefei 230039 (China); Liu, Jun; Wang, Dong; Shi, Shou-hua [Key Laboratory of Optoelectronic Information Acquisition and Manipulation of Ministry of Education of China, School of Physics and Material Science, Anhui University, Hefei 230039 (China)

    2007-02-15T23:59:59.000Z

    Two protocols of quantum direct communication with authentication [Phys. Rev. A 73, 042305 (2006)] were recently proposed by Lee, Lim, and Yang. In this paper we will show that in the two protocols the authenticator Trent should be prevented from knowing the secret message. The first protocol can be eavesdropped on by Trent using the intercept-measure-resend attack, while the second protocol can be eavesdropped on by Trent using a simple single-qubit measurement. To fix these leaks, we revise the original versions of the protocols by using the Pauli Z operation {sigma}{sub z} instead of the original bit-flip operation X. As a consequence, the attacks we present can be prevented and accordingly the protocol securities are improved.

  4. System and method for authentication of goods

    DOE Patents [OSTI]

    Kaish, Norman (West Hampstead, NY); Fraser, Jay (Freeport, NY); Durst, David I. (Syosset, NY)

    1999-01-01T23:59:59.000Z

    An authentication system comprising a medium having a plurality of elements, the elements being distinctive, detectable and disposed in an irregular pattern or having an intrinsic irregularity. Each element is characterized by a determinable attribute distinct from a two-dimensional coordinate representation of simple optical absorption or simple optical reflection intensity. An attribute and position of the plurality of elements, with respect to a positional reference is detected. A processor generates an encrypted message including at least a portion of the attribute and position of the plurality of elements. The encrypted message is recorded in physical association with the medium. The elements are preferably dichroic fibers, and the attribute is preferably a polarization or dichroic axis, which may vary over the length of a fiber. An authentication of the medium based on the encrypted message may be authenticated with a statistical tolerance, based on a vector mapping of the elements of the medium, without requiring a complete image of the medium and elements to be recorded.

  5. Serious leisure, participation and experience in tourism: authenticity and ritual in a renaissance festival

    E-Print Network [OSTI]

    Kim, Hyounggon

    2005-02-17T23:59:59.000Z

    the serious festival participation were reminiscent of tourism existential authenticity specified by Wang (1999) as two levels: intrapersonal authenticity (gaining one?s true self) and interpersonal authenticity (gaining true human relationship). A search...

  6. authentic cost calculations: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ;Abstract iii We also show how to use two existing multicast authentication techniques (TESLA and a master for embedded control networks characterized by few re- ceivers and weak...

  7. STEM Mentoring Café- Engaging Young Women in an Authentic Mentoring...

    Broader source: Energy.gov (indexed) [DOE]

    Engaging Young Women in an Authentic Mentoring Experience Melinda Higgins Albert Einstein Distinguished Educator Fellow, NASA Office of Education, Headquarters and Goddard...

  8. Stronger security bounds for Wegman-Carter-Shoup authenticators

    E-Print Network [OSTI]

    Bernstein, Daniel

    Stronger security bounds for Wegman-Carter-Shoup authenticators, MAC, Wegman-Carter, provable security 1 Introduction This paper proves that various

  9. Shouhuai Xu 2000 1 Password-based Authentication and

    E-Print Network [OSTI]

    Sandhu, Ravi

    &AKE FBackground knowledge FPrevious solutions to authentication: The Trouble FBeing implemented proposals: Server FBeing implemented proposals: Server has a cert. FWeaker assumption proposals: Server has no cert

  10. A Flexible Approach to Embedded Network Multicast Authentication

    E-Print Network [OSTI]

    Koopman, Philip

    A Flexible Approach to Embedded Network Multicast Authentication Chris Szilagyi ECE Department Carnegie Mellon University szilagyi@cmu.edu Philip Koopman ECE Department Carnegie Mellon University

  11. Index Calculation Attacks on RSA Signature and Encryption Jean-Sebastien Coron1, Yvo Desmedt2, David Naccache1,

    E-Print Network [OSTI]

    Minnesota, University of

    a twitch in the technique made it effective against two very popular RSA signature standards, namely iso/iec 9796-1 and iso/iec 9796-2. Following the attack iso/iec 9796-1 was withdrawn and iso/iec 9796-2 amended. In this paper, we recall Desmedt and Odlyzko's attack as well as its application to the cryptanalysis of iso/iec

  12. IEEE TRANS. INFORM. THEORY, VOL. X, NO. XX, 2005 1 Authentication with Distortion Criteria

    E-Print Network [OSTI]

    Martinian, Emin

    authentication system constructions. Index Terms-- multimedia security, authentication, digi- tal signatures of possible perturbations, including, for example, degradation due to noise or compression; transformation

  13. Multi-Level TESLA: Broadcast Authentication for Distributed Sensor Networks

    E-Print Network [OSTI]

    Ning, Peng

    Multi-Level µTESLA: Broadcast Authentication for Distributed Sensor Networks DONGGANG LIU and PENG named multi-level µTESLA based on µTESLA, a broadcast authentication protocol whose scalability is limited by its unicast-based initial parameter distribution. Multi-level µTESLA satisfies several nice

  14. On the construction of digest functions for manual authentication protocols

    E-Print Network [OSTI]

    Jeavons, Peter

    On the construction of digest functions for manual authentication protocols Abstract A digest. Frequently a digest function needs to have a very short output (e.g. 16­32 bits) and no key is used to digest, notably message authentication codes or MACs. Short digests can be constructed directly or by "condensing

  15. Authenticating concealed private data while maintaining concealment

    DOE Patents [OSTI]

    Thomas, Edward V. (Albuquerque, NM); Draelos, Timothy J. (Albuquerque, NM)

    2007-06-26T23:59:59.000Z

    A method of and system for authenticating concealed and statistically varying multi-dimensional data comprising: acquiring an initial measurement of an item, wherein the initial measurement is subject to measurement error; applying a transformation to the initial measurement to generate reference template data; acquiring a subsequent measurement of an item, wherein the subsequent measurement is subject to measurement error; applying the transformation to the subsequent measurement; and calculating a Euclidean distance metric between the transformed measurements; wherein the calculated Euclidean distance metric is identical to a Euclidean distance metric between the measurement prior to transformation.

  16. Hardware authentication using transmission spectra modified optical fiber.

    SciTech Connect (OSTI)

    Grubbs, Robert K.; Romero, Juan A.

    2010-09-01T23:59:59.000Z

    The ability to authenticate the source and integrity of data is critical to the monitoring and inspection of special nuclear materials, including hardware related to weapons production. Current methods rely on electronic encryption/authentication codes housed in monitoring devices. This always invites the question of implementation and protection of authentication information in an electronic component necessitating EMI shielding, possibly an on board power source to maintain the information in memory. By using atomic layer deposition techniques (ALD) on photonic band gap (PBG) optical fibers we will explore the potential to randomly manipulate the output spectrum and intensity of an input light source. This randomization could produce unique signatures authenticating devices with the potential to authenticate data. An external light source projected through the fiber with a spectrometer at the exit would 'read' the unique signature. No internal power or computational resources would be required.

  17. Risk Management for Distributed Authorization Christian Skalka

    E-Print Network [OSTI]

    Wang, Xiaoyang "Sean"

    Risk Management for Distributed Authorization Christian Skalka University of Vermont X. Sean Wang assess risk, but risk in trust management is usually an informal consideration. In this paper, we de trust management systems treat all assertions as equally valid up to certificate authentication

  18. Active Social Media Management: The Case of Health Care

    E-Print Network [OSTI]

    Miller, Amalia R.

    Given the demand for authentic personal interactions over social media, it is unclear how much firms should actively manage their social media presence. We study this question empirically in a health care setting. We show ...

  19. V-036: EMC Smarts Network Configuration Manager Database Authentication

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyThe followingRemoteBypass Vulnerability

  20. V-220: Juniper Security Threat Response Manager Lets Remote Authenticated

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015ofDepartment of Energy Microsoft SecurityEnergyDepartment of

  1. Stronger security bounds for WegmanCarterShoup authenticators

    E-Print Network [OSTI]

    Bernstein, Daniel

    Stronger security bounds for Wegman­Carter­Shoup authenticators Daniel J. Bernstein # Department, Wegman­Carter, provable security 1 Introduction This paper proves that various state­of­the­art 128­bit

  2. Authenticated Encryption: How Reordering can Impact Performance Basel Alomair

    E-Print Network [OSTI]

    ciphertext blocks are then authenticated using a MAC based on a universal hash-function family (in the Carter-Wegman encryption [30]. The GCM standard is based on the Carter- Wegman Counter (CWC) blockcipher mode

  3. austrian meat authenticity: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of 2m key bits for authenticating m qubits, which makes our protocol asymptotically optimal. On the other hand, we use it to show that digitally signing quantum states is...

  4. V-231: Cisco Identity Services Engine Discloses Authentication...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    form fields. A remote or local user can conduct a cross-site scripting or clickjacking attack to access the username and password of an authenticated session. IMPACT: Disclosure of...

  5. Understanding 'It': Affective Authenticity, Space, and the Phish Scene

    E-Print Network [OSTI]

    Yeager, Elizabeth Anne

    2011-04-26T23:59:59.000Z

    "Understanding It: Affective Authenticity, Space, and the Phish Scene" is an ethnographic study of "scene identity" around the contemporary rock band Phish. Utilizing data generated from six years of ethnographic fieldwork, ...

  6. V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct...

    Broader source: Energy.gov (indexed) [DOE]

    Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks PLATFORM: Tomcat 6.0.21 to 6.0.36, 7.0.0 to 7.0.32 ABSTRACT: A vulnerability was reported in...

  7. Authenticity and Physiological Changes during Defensive Verbal Response

    E-Print Network [OSTI]

    Yen, Yana

    2013-08-31T23:59:59.000Z

    who are more authentic experience higher subjective well-being because they feel in control of their self (Kifer, Heller, Perunovic, & Galinsky, 2013). Thus, by paying attention to how one’s cognitions, physiology, and behavior support or challenge...

  8. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22T23:59:59.000Z

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  9. Analog Video Authentication and Seal Verification Equipment Development

    SciTech Connect (OSTI)

    Gregory Lancaster

    2012-09-01T23:59:59.000Z

    Under contract to the US Department of Energy in support of arms control treaty verification activities, the Savannah River National Laboratory in conjunction with the Pacific Northwest National Laboratory, the Idaho National Laboratory and Milagro Consulting, LLC developed equipment for use within a chain of custody regime. This paper discussed two specific devices, the Authentication Through the Lens (ATL) analog video authentication system and a photographic multi-seal reader. Both of these devices have been demonstrated in a field trial, and the experience gained throughout will also be discussed. Typically, cryptographic methods are used to prove the authenticity of digital images and video used in arms control chain of custody applications. However, in some applications analog cameras are used. Since cryptographic authentication methods will not work on analog video streams, a simple method of authenticating analog video was developed and tested. A photographic multi-seal reader was developed to image different types of visual unique identifiers for use in chain of custody and authentication activities. This seal reader is unique in its ability to image various types of seals including the Cobra Seal, Reflective Particle Tags, and adhesive seals. Flicker comparison is used to compare before and after images collected with the seal reader in order to detect tampering and verify the integrity of the seal.

  10. The X.509 Privilege Management Infrastructure

    E-Print Network [OSTI]

    Kent, University of

    Management Infrastructure (PMI) introduced in the 2000 edition of X.509. It describes the entities Management Infrastructure (PMI), and it enables privileges to be allocated, delegated, revoked and withdrawn in an electronic way. A PMI is to authorisation what a Public Key Infrastructure (PKI) is to authentication

  11. Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis

    E-Print Network [OSTI]

    Li, Depeng

    Authentication schemes relying on per-packet signature and per-signature verification introduce heavy cost for computation and communication. Due to its constraint resources, smart grid's authentication requirement cannot ...

  12. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...

    Broader source: Energy.gov (indexed) [DOE]

    PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject...

  13. Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding author)

    E-Print Network [OSTI]

    Doran, Simon J.

    1 Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding in the process algebra Communicating Sequential Processes (CSP) to specify authentication. The purpose, security protocols, CSP, formal specification, Kerberos 1. Introduction Schneider [1] uses Communicating

  14. The fragility of AES-GCM authentication algorithm Shay Gueron1,2

    E-Print Network [OSTI]

    for the authentication. The GHASH algorithm is a special form of the Carter-Wegman polynomial evaluation MAC. Each 16

  15. The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

    E-Print Network [OSTI]

    Tygar, Doug

    The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol of receivers, and tolerates packet loss. TESLA is based on loose time synchronization between the sender

  16. Building the Big Message Authentication Code Dale R. THOMPSON, J. Brad MAXWELL, and James P. PARKERSON

    E-Print Network [OSTI]

    Thompson, Dale R.

    Building the Big Message Authentication Code Dale R. THOMPSON, J. Brad MAXWELL, and James P.S.A. ABSTRACT Message Authentication Codes (MAC) are used to ensure the integrity of digital content is not compromised and to authenticate the sender. A MAC can be constructed by using a message digest and a shared

  17. University of Newcastle upon Tyne Evaluation of Authorization-Authentication Tools: PERMIS, OASIS,

    E-Print Network [OSTI]

    Newcastle upon Tyne, University of

    -Authentication Tools: PERMIS, OASIS, XACML & SHIBOLETH J. Wu and P. Periorellis TECHNICAL REPORT SERIES No. CS-TR-935 of Authorization-Authentication Tools: PERMIS, OASIS, XACML & SHIBOLETH J. Wu, P. Periorellis Abstract GOLD (Grid., PERIORELLIS, P.. Evaluation of Authorization-Authentication Tools: PERMIS, OASIS, XACML & SHIBOLETH [By] J. Wu

  18. The order of encryption and authentication for protecting communications (Or: how secure is SSL?)

    E-Print Network [OSTI]

    The order of encryption and authentication for protecting communications (Or: how secure is SSL and authentication, including the authenticate-then-encrypt method used in SSL, are not generically secure. We show with a random or pseudorandom pad). Thus, while we show the generic security of SSL to be broken, the current

  19. Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication

    E-Print Network [OSTI]

    Basin, David

    , or authentication of transmitted data [27,33]. The ISO (International Organization for Standardization) and IECProvably Repairing the ISO/IEC 9798 Standard for Entity Authentication David Basin, Cas Cremers the family of entity authentication protocols defined by the ISO/IEC 9798 standard and find numerous

  20. Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 8th Keystroke Biometric Test-Taker Authentication System

    E-Print Network [OSTI]

    Tappert, Charles

    Biometric Test-Taker Authentication System Michael Wuench, Mingfei Bi, Evelin Urbaez, Shaji Mary Varghese

  1. Title of Dissertation: EPISTEMOLOGICAL AUTHENTICITY IN SCIENCE CLASSROOMS

    E-Print Network [OSTI]

    Maryland at College Park, University of

    ABSTRACT Title of Dissertation: EPISTEMOLOGICAL AUTHENTICITY IN SCIENCE CLASSROOMS Paul S. Hutchison, Ph.D., 2008 Dissertation Directed By: Professor David Hammer, Departments of Curriculum Dissertation submitted to the Faculty of the Graduate School of the University of Maryland, College Park

  2. Authentication Control Point and Its Implications For Secure Processor Design

    E-Print Network [OSTI]

    Lee, Hsien-Hsin "Sean"

    Authentication Control Point and Its Implications For Secure Processor Design Weidong Shi Hsien. Despite a number of secure processor designs have been proposed, the delicate relationship between privacy and integrity protection in the context of modern out-of-order processor design is not well understood

  3. Bucket Hashing and its Application to Fast Message Authentication

    E-Print Network [OSTI]

    Bernstein, Daniel

    the contents of each bucket; then collect up all the buckets' contents. Used in the context of Wegman to authenticate. But it is well­known that this reasoning is specious: in particular, Wegman and Carter [32. In the Wegman--Carter approach communicating parties S and V share a secret key k = (h; P ) which specifies both

  4. Key recycling in authentication Christopher Portmann #1,2

    E-Print Network [OSTI]

    , Switzerland. May 31, 2012 Abstract In their seminal work on authentication, Wegman and Carter pro­ pose of rounds it is completely known. We show however that this leak is very small, and Wegman and Carter, and in their seminal work [1], Wegman and Carter showed that it can be achieved with information­theoretic security

  5. Key recycling in authentication Christopher Portmann1,2

    E-Print Network [OSTI]

    , Switzerland. May 31, 2012 Abstract In their seminal work on authentication, Wegman and Carter pro- pose finite amount of rounds it is completely known. We show however that this leak is very small, and Wegman], Wegman and Carter showed that it can be achieved with information-theoretic security by appending a tag

  6. Patent-Free Authenticated-Encryption As Fast As OCB

    E-Print Network [OSTI]

    Krovetz, Ted

    . Encryption is achieved via counter-mode while authenti- cation uses the Wegman-Carter paradigm. A single encryption and authentication under a single key. Some of the modes also switch to faster Wegman to nearly x cpb because recent Wegman-Carter schemes are as fast as 0.5 cpb--much faster than any known

  7. Universal hashing and authentication codes 1 D. R. Stinson

    E-Print Network [OSTI]

    Stinson, Douglas

    authentication codes without secrecy. This idea is due to Wegman and Carter [14], who gave a construction which states (plaintext messages). We generalize the Wegman and Carter construction by formally de#12;ning some to decrease the key length by a factor of four (roughly) compared to the Wegman and Carter construction, while

  8. Behavioral Authentication of Server Flows James P. Early

    E-Print Network [OSTI]

    Rosenberg, Catherine P.

    Behavioral Authentication of Server Flows James P. Early Carla E. Brodley ˇ Catherine Rosenberg, in the presence of proxy servers that re-map port numbers or host services that have been compromised to act as backdoors or covert channels. We present an approach to classify server traffic based on decision trees

  9. Forging Attacks on two Authenticated Encryptions COBRA and POET

    E-Print Network [OSTI]

    Forging Attacks on two Authenticated Encryptions COBRA and POET Mridul Nandi Indian Statistical COBRA [4], based on pseudorandom per- mutation (PRP) blockcipher, and POET [3], based on Almost XOR and a simple vari- ant of the original proposal of POET (due to a forging attack [13] on the original proposal

  10. Authenticated Streamwise On-line Encryption Patrick P. Tsang

    E-Print Network [OSTI]

    and end-to-end latency. Also, ASOE provides data authenticity as an option. ASOE can therefore be used construction incurs zero end-to-end latency due to buffering and only 48 bytes of message expansion, regardless 7.3 End-to-end Latency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 7

  11. SSL Splitting and Barnraising: Cooperative Caching with Authenticity Guarantees

    E-Print Network [OSTI]

    Gummadi, Ramakrishna

    SSL Splitting and Barnraising: Cooperative Caching with Authenticity Guarantees by Christopher T by . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Arthur C. Smith Chairman, Department Committee on Graduate Students #12;SSL Splitting and Barnraising for the degree of Master of Engineering in Electrical Engineering and Computer Science Abstract SSL splitting

  12. Non-Cryptographic Authentication and Identification in Wireless Networks

    E-Print Network [OSTI]

    California at Davis, University of

    1 Non-Cryptographic Authentication and Identification in Wireless Networks Kai Zeng, Kannan considered as potential alternatives/complements to provide security services in wireless networks identi- fication in wireless networks using lower/physical layer properties or information. We discuss

  13. ELmE : A Misuse Resistant Parallel Authenticated Encryption

    E-Print Network [OSTI]

    -Encrypt constructions (inherently inefficient but provide full pri- vacy) and online constructions, e.g., McOE, sponge bottleneck in processing associated data. In this paper, we design a new online secure authenticated in associated data) and pipeline implementable. It also provides full privacy when associated data (which

  14. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Doran, Simon J.

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  15. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  16. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

  17. An Authentication and Security Protocol for Mobile Computing

    E-Print Network [OSTI]

    Zheng, Yuliang

    networks such as public switched telephone/data networks, and hence many security issues with wire-line-air transmission of signals and low power supply of a mobile user. #12;When examining security in a wirelessAn Authentication and Security Protocol for Mobile Computing Yuliang Zheng Monash University Mc

  18. Cryptanalysis of a recent two factor authentication scheme

    E-Print Network [OSTI]

    Centre Dublin City University Ballymun, Dublin 9, Ireland. mike.scott@certivox.com Abstract. Very recently a scheme has been proposed by Wang and Ma for a robust smart-card based password authentication scheme, which claims to be secure against a Smart Card security breach. In this short note we attempt

  19. C. T. Lin, S. P. Shieh / Chain Authentication in Mobile Communication Systems Chain Authentication in Mobile Communication

    E-Print Network [OSTI]

    Shieh, Shiuhpyng Winston

    , video, image, and data, be available anytime and everywhere to everybody. The Federal Communications Commission (FCC), U. S. A., defines personal communications services as "a family of mobile or portable radioC. T. Lin, S. P. Shieh / Chain Authentication in Mobile Communication Systems 1 Chain

  20. Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key

    E-Print Network [OSTI]

    Aysajan Abidin; Jan-Ĺke Larsson

    2013-03-01T23:59:59.000Z

    Information-theoretically secure (ITS) authentication is needed in Quantum Key Distribution (QKD). In this paper, we study security of an ITS authentication scheme proposed by Wegman & Carter, in the case of partially known authentication key. This scheme uses a new authentication key in each authentication attempt, to select a hash function from an Almost Strongly Universal$_2$ hash function family. The partial knowledge of the attacker is measured as the trace distance between the authentication key distribution and the uniform distribution; this is the usual measure in QKD. We provide direct proofs of security of the scheme, when using partially known key, first in the information-theoretic setting and then in terms of witness indistinguishability as used in the Universal Composability (UC) framework. We find that if the authentication procedure has a failure probability $\\epsilon$ and the authentication key has an $\\epsilon'$ trace distance to the uniform, then under ITS, the adversary's success probability conditioned on an authentic message-tag pair is only bounded by $\\epsilon+|\\mT|\\epsilon'$, where $|\\mT|$ is the size of the set of tags. Furthermore, the trace distance between the authentication key distribution and the uniform increases to $|\\mT|\\epsilon'$ after having seen an authentic message-tag pair. Despite this, we are able to prove directly that the authenticated channel is indistinguishable from an (ideal) authentic channel (the desired functionality), except with probability less than $\\epsilon+\\epsilon'$. This proves that the scheme is ($\\epsilon+\\epsilon'$)-UC-secure, without using the composability theorem.

  1. Accountable Certificate Management using Undeniable Attestations

    E-Print Network [OSTI]

    ¨uberneetika AS Akadeemia tee 21 12618 Tallinn, Estonia ahto.buldas@cyber.ee Peeter Laud Universit¨at des Saarlandes FB 14 management system. Moreover, authenticated search trees can be used in many security-critical applications for personal or classroom use is granted without fee provided that copies are not made or distributed

  2. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

    2001-01-01T23:59:59.000Z

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters, the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided&

  3. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

    2000-01-01T23:59:59.000Z

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

  4. New foundations for efficient authentication, commutative cryptography, and private disjointness testing

    E-Print Network [OSTI]

    Weis, Stephen August, 1978-

    2006-01-01T23:59:59.000Z

    This dissertation presents new constructions and security definitions related to three areas: authentication, cascadable and commutative crytpography, and private set operations. Existing works relevant to each of these ...

  5. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  6. ACCEPTED BY IEEE TRANSACTIONS ON IMAGE PROCESSING, JULY 28, 2014. 1 On Continuous User Authentication via Typing

    E-Print Network [OSTI]

    such as keystroke dynamics (KD), TB provides reliable authentication with a short delay, while avoiding explicit key-logging

  7. The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

    E-Print Network [OSTI]

    Xu, Wenyuan

    The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast au- thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro- nization between

  8. The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

    E-Print Network [OSTI]

    Perrig, Adrian

    The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss­tolerant Authentication) broadcast au­ thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro­ nization between

  9. Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME

    E-Print Network [OSTI]

    Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME Presented, Washington, DC 20375 E-mail: archer@itd.nrl.navy.mil The TESLA multicast stream authentication protocol just been revealed. While an informal argument for the correctness of TESLA has been published

  10. Breaking POET Authentication with a Single Query Jian Guo, Jeremy Jean, Thomas Peyrin, and Lei Wang

    E-Print Network [OSTI]

    Breaking POET Authentication with a Single Query Jian Guo, J´er´emy Jean, Thomas Peyrin, and Lei article, we describe a very practical and simple attack on the au- thentication part of POET authenticated encryption mode proposed at FSE 2014. POET is a provably secure scheme that was designed to resist various

  11. SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key

    E-Print Network [OSTI]

    Sheldon, Nathan D.

    SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key Chunhua Chen1 , Chris J.mitchell@rhul.ac.uk Abstract. Most SSL/TLS-based electronic commerce (e-commerce) ap- plications (including Internet banking a server effectively, and because user authentication methods are typi- cally decoupled from SSL

  12. SSL/TLS Session-Aware User Authentication: A Lightweight Alternative to Client-Side Certificates

    E-Print Network [OSTI]

    Basin, David

    SSL/TLS Session-Aware User Authentication: A Lightweight Alternative to Client-Side Certificates E-Mail: basin@inf.ethz.ch Abstract Many SSL/TLS-based e-commerce applications employ traditional authentication mechanisms on the client side. These mechanisms--if decoupled from SSL/TLS session establishment

  13. SSL/TLS Session-Aware User Authentication Rolf Oppliger1

    E-Print Network [OSTI]

    Basin, David

    SSL/TLS Session-Aware User Authentication Revisited Rolf Oppliger1 , Ralf Hauser2 , and David Basin threat to SSL/TLS-based e-commerce applications. In [OHB06], we introduced the notion of SSL/TLS session-aware user authentication to protect SSL/TLS- based e-commerce applications against MITM attacks and we

  14. Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems

    E-Print Network [OSTI]

    Wang, Yongge

    Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

  15. A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication

    E-Print Network [OSTI]

    Paterson, Kenny

    to the pervasive electrical power grid. In particular, as commercial interest grows in grid computing, gridA Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication Jason propose a security infrastructure for grid applications, in which users are authenticated us- ing

  16. Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication

    E-Print Network [OSTI]

    Basin, David

    (International Organization for Standardization) and IEC (Interna- tional Electrotechnical Commission) jointlyProvably Repairing the ISO/IEC 9798 Standard for Entity Authentication David Basin, Cas Cremers the family of entity authentication proto- cols defined by the ISO/IEC 9798 standard and find numerous

  17. CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider

    E-Print Network [OSTI]

    Doran, Simon J.

    CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider Department In this paper we consider the nature of machine proofs used in the CSP approach to the veri cation of authentication protocols using the process algebra CSP Hoa85]. The CSP syntax provides a natural and precise way

  18. Formal Analysis and Systematic Construction of Two-factor Authentication Scheme

    E-Print Network [OSTI]

    , Duncan S. Wong1 , Huaxiong Wang2 , and Xiaotie Deng1 1 Department of Computer Science City University-factor authentication mechanisms is based on smart card and user's password. Throughout the years, there have been many-resistant hash functions. Keywords: Authentication, Password, Smart Card, Guessing Attack 1 Introduction Password

  19. A Measurement Study on IKEv2 Authentication Performance in Wireless Networks

    E-Print Network [OSTI]

    Nřrvĺg, Kjetil

    . The performance cost evaluation of security protocols, such as the Internet key exchange version 2 (IKEv2 and IKEv2 in an OPNET simulation environment. They used pre-shared key (PSK) based authentication methodsA Measurement Study on IKEv2 Authentication Performance in Wireless Networks Zolt´an Faigl , Stefan

  20. Atomic-scale Authentication Using Resonant Tunnelling Diodes

    E-Print Network [OSTI]

    J. Roberts; I. E. Bagci; M. A. M. Zawawi; J. Sexton; N. Hulbert; Y. J. Noori; M. P. Young; C. S. Woodhead; M. Missous; M. A. Migliorato; U. Roedig; R. J. Young

    2015-02-23T23:59:59.000Z

    The rapid development of technology has provided a wealth of resources enabling the trust of everyday interactions to be undermined. Authentication schemes aim to address this challenge by providing proof of identity. This can be achieved by using devices that, when challenged, give unique but reproducible responses. At present, these distinct signatures are commonly generated by physically unclonable functions, or PUFs. These devices provide a straightforward measurement of a physical characteristic of their structure that has inherent randomness, due to imperfections in the manufacturing process. These hard-to-predict physical responses can generate a unique identity that can be used for authentication without relying on the secrecy of stored data. However, the classical design of these devices limits both their size and security. Here we show that the extensively studied problematic fluctuations in the current-voltage measurements of resonant tunnelling diodes (RTDs) provide an uncomplicated, robust measurement that can function as a PUF without conventional resource limitations. This is possible due to quantum tunnelling within the RTD, and on account of these room temperature quantum effects, we term such devices QUFs - quantum unclonable functions. As a result of the current-voltage spectra being dependent on the atomic structure and composition of the nanostructure within the RTD, each device provides a high degree of uniqueness, whilst being impossible to clone or simulate, even with state-of-the-art technology. We have thus created PUF-like devices requiring the fewest resources which make use of quantum phenomena in a highly manufacturable electronic device operating at room temperature. Conventional spectral analysis techniques, when applied to our QUFs, will enable reliable generation of unpredictable unique identities which can be employed in advanced authentication systems.

  1. Final report and recommendations of the ESnet Authentication Pilot Project

    SciTech Connect (OSTI)

    Johnson, G.R.; Moore, J.P. [Pacific Northwest Lab., Richland, WA (United States); Athey, C.L. [Lawrence Livermore National Lab., CA (United States); Engert, D.E. [Argonne National Lab., IL (United States); Ramus, J.E. [National Energy Research Supercomputer Center, Livermore, CA (United States)

    1995-01-01T23:59:59.000Z

    To conduct their work, U.S. Department of Energy (DOE) researchers require access to a wide range of computing systems and information resources outside of their respective laboratories. Electronically communicating with peers using the global Internet has become a necessity to effective collaboration with university, industrial, and other government partners. DOE`s Energy Sciences Network (ESnet) needs to be engineered to facilitate this {open_quotes}collaboratory{close_quotes} while ensuring the protection of government computing resources from unauthorized use. Sensitive information and intellectual properties must be protected from unauthorized disclosure, modification, or destruction. In August 1993, DOE funded four ESnet sites (Argonne National Laboratory, Lawrence Livermore National Laboratory, the National Energy Research Supercomputer Center, and Pacific Northwest Laboratory) to begin implementing and evaluating authenticated ESnet services using the advanced Kerberos Version 5. The purpose of this project was to identify, understand, and resolve the technical, procedural, cultural, and policy issues surrounding peer-to-peer authentication in an inter-organization internet. The investigators have concluded that, with certain conditions, Kerberos Version 5 is a suitable technology to enable ESnet users to freely share resources and information without compromising the integrity of their systems and data. The pilot project has demonstrated that Kerberos Version 5 is capable of supporting trusted third-party authentication across an inter-organization internet and that Kerberos Version 5 would be practical to implement across the ESnet community within the U.S. The investigators made several modifications to the Kerberos Version 5 system that are necessary for operation in the current Internet environment and have documented other technical shortcomings that must be addressed before large-scale deployment is attempted.

  2. Holographic Labeling And Reading Machine For Authentication And Security Appications

    DOE Patents [OSTI]

    Weber, David C. (Rancho Santa Margarita, CA); Trolinger, James D. (Costa Mesa, CA)

    1999-07-06T23:59:59.000Z

    A holographic security label and automated reading machine for marking and subsequently authenticating any object such as an identification badge, a pass, a ticket, a manufactured part, or a package is described. The security label is extremely difficult to copy or even to read by unauthorized persons. The system comprises a holographic security label that has been created with a coded reference wave, whose specification can be kept secret. The label contains information that can be extracted only with the coded reference wave, which is derived from a holographic key, which restricts access of the information to only the possessor of the key. A reading machine accesses the information contained in the label and compares it with data stored in the machine through the application of a joint transform correlator, which is also equipped with a reference hologram that adds additional security to the procedure.

  3. USB Key Profile Manager for Advisor: Dr. Chris Pollett

    E-Print Network [OSTI]

    Pollett, Chris

    . · Search for profiles. · Load the profile to Mozilla's registry. · Clean up at shutdown. #12;Feature 2USB Key Profile Manager for Mozilla by Yun Zhou Advisor: Dr. Chris Pollett Committee Members: Dr. Design and Implementation · Event-driven structure · USB profile loader · User authentication · Bulk

  4. The Emotional and Spiritual Dimensions of Being a Pastor: Authenticity and Identity

    E-Print Network [OSTI]

    Otey, Penny Addison

    2011-10-21T23:59:59.000Z

    Emotional labor and its influence on authenticity and identity amongst human service workers has been the focus of numerous studies. Often these studies viewed identity as a stable sense of self. This study set out to examine emotional labor amongst...

  5. Subverting value hierarchies : essays on the causes and responses to shifts in demand for authenticity

    E-Print Network [OSTI]

    Hahl, Oliver (Oliver Douglas)

    2013-01-01T23:59:59.000Z

    This dissertation includes three essays on the causes and responses to shifts in demand for authenticity. In the first chapter, I answer the question: why do previously cast-off products, practices, or styles abruptly ...

  6. Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key

    E-Print Network [OSTI]

    Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key Aysajan Abidin by Wegman and Carter [24], in the case of partially known key. The scheme is based on secretly selecting

  7. Improving Classical Authentication over a Quantum Channel F. M. Assis1

    E-Print Network [OSTI]

    Lisboa, Universidade Técnica de

    be used to replace Wegman-Carter's classical authentication scheme in quantum key distribution (QKD the QKD protocol to bootstrap. The authenti- cation scheme commonly used in QKD is the Wegman

  8. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  9. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  10. Questioning the Meaning of Authenticity in Martin Heidegger's Being and Time

    E-Print Network [OSTI]

    Liwinski, Thomas

    2011-10-21T23:59:59.000Z

    , it is necessary to highlight those commitments to phenomenology and hermeneutics that informs Heidegger's effort. The third chapter first introduces the various characterizations of authenticity that Heidegger offers in Being and Time and the problematic meaning...

  11. Using Unlabelled Data To Update Classification Rules With Applications In Food Authenticity Studies

    E-Print Network [OSTI]

    Washington at Seattle, University of

    library . . . . . . . . . . . 3 2 Average correct classification rates for the five meat groupsUsing Unlabelled Data To Update Classification Rules With Applications In Food Authenticity Studies programme. #12;Abstract A classification method is developed to classify samples when both labelled

  12. AUTHENTICATED SENSOR INTERFACE DEVICE FOR JOINT USE SAFEGUARDS APPLICATIONS - CONCEPTS AND CHALLENGES

    SciTech Connect (OSTI)

    Poland, R.; Drayer, R.; Wilson, J.

    2013-08-12T23:59:59.000Z

    This paper will discuss the key features of the Authenticated Sensor Interface Device that collectively provide the ability to share data among a number of parties while ensuring the authentication of data and protecting both the operator’s and the IAEA’s interests. The paper will also discuss the development of the prototype, the initial testing with an accountancy scale, and future plans and challenges to implementation into the joint use and remote monitoring applications. As nuclear fuel cycle technology becomes more prevalent throughout the world and the capacity of plants increases, limited resources of the IAEA are being stretched near a breaking point. A strategy is to increase efficiency in safeguards monitoring using “joint use” equipment that will provide the facility operator process data while also providing the IAEA key safeguards data. The data, however, must be authenticated and validated to ensure the data have not been tampered with. The Authenticated Sensor Interface Device provides the capability to share data and can be a valuable component in the IAEA’s ability to collect accountancy data from scales in Uranium conversion and enrichment plants, as well as nuclear fuel fabrication plants. Likewise, the Authenticated Sensor Interface Device can be configured to accept a diverse array of input signals, ranging from analog voltage, to current, to digital interfaces and more. These modular capabilities provide the ability to collect authenticated, joint-use, data streams from various process monitoring sensors.

  13. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

  14. A Tree-Based TESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu Sushil Jajodia

    E-Print Network [OSTI]

    Zhu, Sencun

    A Tree-Based µTESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu to multiple nodes in an authenticated way. µTESLA and multi-level µTESLA have been proposed to provide of senders. Though multi-level µTESLA schemes can scale up to large sensor networks (in terms of receivers

  15. Probabilistic Non-Repudiation for Source Authentication with TESLA Certificates in Hybrid Satellite/Wireless Networks and

    E-Print Network [OSTI]

    Baras, John S.

    Probabilistic Non-Repudiation for Source Authentication with TESLA Certificates in Hybrid Satellite describe a novel non-repudiation mechanism for an authentication protocol based on the extended TESLA to this problem, we have proposed a new class of lightweight, symmetric key certificates called extended TESLA

  16. A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA)

    E-Print Network [OSTI]

    Basin, David

    A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA) Rolf, CH-8005 Z¨urich Abstract Most SSL/TLS-based e-commerce applications employ con- ventional mechanisms for user authentication. These mechanisms--if de- coupled from SSL/TLS session establishment

  17. Authenticated Storage Using Small Trusted Hardware Hsin-Jung Yang, Victor Costan, Nickolai Zeldovich, and Srinivas Devadas

    E-Print Network [OSTI]

    Sabatini, David M.

    Authenticated Storage Using Small Trusted Hardware Hsin-Jung Yang, Victor Costan, Nickolai}@mit.edu ABSTRACT A major security concern with outsourcing data storage to third- party providers is authenticating hardware (e.g., a monotonic counter) at the storage server achieve low throughput. This pa- per proposes

  18. Home News Products Blogs Buyers Guide Whitepapers Jobs Events Subscribe Issue Archive Topic Center: Email Security Compliance Patch Management Financial Services Health care RSA 2008 RSS | Login | Register

    E-Print Network [OSTI]

    Gupta, Minaxi

    SEARCH Home News Products Blogs Buyers Guide Whitepapers Jobs Events Subscribe Issue Archive Topic located the malicious files, mostly MP3 or AVI in format, on popular peer-to- peer (P2P) websites appear when users employ certain terms when searching for music and video, he said. Once the files

  19. Simulation of PKI-Enabled Communication for Identity Management Using CyberCIEGE

    E-Print Network [OSTI]

    , authentication, provenance, and access control. Keywords-network cyber security; identity management; information environment, players1 are guided through a series of scenarios that highlight various cyber security education colleges. CyberCIEGE was created by the Center for Information Systems Security Studies and Research (CISR

  20. September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage

    E-Print Network [OSTI]

    September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage and True Random Number Storage via PUFs - Main Idea - Reliability - Randomness -- InstantiationsInstantiations 3. True Random, including side channel resistance ° Trusted security policy routines ° Secure and authentic key storage

  1. U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOEArbitrary Code | Department

  2. Nov. 15, 2001 Mohammad al-Kahtani 1 Emerging Authorization and Authentication

    E-Print Network [OSTI]

    Sandhu, Ravi

    1 Nov. 15, 2001 Mohammad al-Kahtani 1 XML Emerging Authorization and Authentication Standards Nov. 15, 2001 Mohammad al-Kahtani 2 About the speaker · Name: Mohammad al-Kahtani · Doctoral Candidate in Software Engineering: George Mason University · Contact info: malkahta@gmu.edu #12;2 Nov. 15, 2001 Mohammad

  3. All Your Face Are Belong to Us: Breaking Facebook's Social Authentication

    E-Print Network [OSTI]

    Yang, Junfeng

    All Your Face Are Belong to Us: Breaking Facebook's Social Authentication Iasonas Polakis FORTH adversaries from compromising accounts using stolen credentials. Facebook has recently released a two can obtain the information needed to solve the chal- lenges presented by Facebook. We implement

  4. Simplified authenticated key exchange based on the q(th) root problem

    SciTech Connect (OSTI)

    JOHNSTON,ANNA M.; GEMMELL,PETER S.

    2000-02-29T23:59:59.000Z

    Finding a q{sup th} root in GF(p), where p and q are prunes, q is large and q{sup 2} divides (p{minus}1) is a difficult problem equivalent to the discrete logarithm problem using an element of order q as the base. This paper describes an authenticated key exchange algorithm utilizing this hard problem.

  5. Distillation Codes and Applications to DoS Resistant Multicast Authentication

    E-Print Network [OSTI]

    Perrig, Adrian

    Distillation Codes and Applications to DoS Resistant Multicast Authentication Chris Karlof UC We introduce distillation codes, a method for streaming and storing data. Like erasure codes, distillation codes allow information to be decoded from a sufficiently large quorum of symbols. In contrast

  6. MMH: Software Message Authentication in the Gbit/second Rates \\Lambda

    E-Print Network [OSTI]

    Bernstein, Daniel

    universal hashing) applications. The construction is based on techniques due to Carter and Wegman Universal hash functions, which were first introduced by Carter and Wegman in [CW79], have a wide range authentication (introduced by Wegman and Carter [WC81] as well) received much attention lately. In particular

  7. MULTIMEDIA CONTENT AUTHENTICATION: FUNDAMENTAL LIMITS Emin Martinian and Gregory W. Wornell

    E-Print Network [OSTI]

    Martinian, Emin

    MULTIMEDIA CONTENT AUTHENTICATION: FUNDAMENTAL LIMITS Emin Martinian and Gregory W. Wornell Dept,gwwˇ @mit.edu ABSTRACT In many multimedia applications, there is a need to authen- ticate a source that has signature techniques are a natural tool for addressing such problems. However, in many emerging multimedia

  8. SSL/TLS Session-Aware User Authentication--Or How to Effectively Thwart

    E-Print Network [OSTI]

    Basin, David

    SSL/TLS Session-Aware User Authentication--Or How to Effectively Thwart the Man-in-the-Middle Rolf@inf.ethz.ch Abstract. Man-in-the-middle attacks pose a serious threat to SSL/TLS- based electronic commerce mechanisms fail to provide protection against this type of attack, even when they run on top of SSL

  9. On optimizing energy consumption: An adaptative authentication level in wireless sensor networks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    On optimizing energy consumption: An adaptative authentication level in wireless sensor networks-hungry. As energy is a scarce resource in wireless sensor networks, we propose a new approach that consists or third-party nodes. I. INTRODUCTION Wireless sensor networks (WSNs) are used in several fields

  10. An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks. In Section 3 we evaluate the performance and efficiency of our proposal, both in terms of energy consumption of Engineering & Built Environment Callaghan, The University of Newcastle (AUSTRALIA) Ljiljana

  11. CITI Technical Report 93-1 Long Running Jobs in an Authenticated Environment

    E-Print Network [OSTI]

    Michigan, University of

    . An unfortunate byproduct of building Kerberos-based systems is a loss of functionality, such as long running jobs-- -- CITI Technical Report 93-1 Long Running Jobs in an Authenticated Environment A. D. Rubin that a user have a valid token or ticket for a job to run. These tickets are issued with limited lifetimes

  12. Project List 1. Project Name: Efficient Anonymous Private Authentication Protocol for RFID Systems

    E-Print Network [OSTI]

    Brylow, Dennis

    based authentication. Publication: · Md. Endadul Hoque, Farzana Rahman, and Sheikh I. Ahamed, "Anon's geocoding and mapping API. Publication: ···· Farzana Rahman, Casey O'Brien, Sheikh I. Ahamed, He Zhang'Brien, Kristine Manning, Jason Cowdy, Sheikh Iqbal Ahamed, "Let EcoDrive be Your Guide: Development of a Mobile

  13. Cryptanalysis of an IDbased Password Authentication Scheme using Smart Cards and

    E-Print Network [OSTI]

    Cryptanalysis of an ID­based Password Authentication Scheme using Smart Cards and Fingerprints Michael Scott School of Computer Applications Dublin City University Ballymun, Dublin 9, Ireland. mike two ID­based password authen­ tication schemes for logging onto a remote network server using smart

  14. Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for

    E-Print Network [OSTI]

    Hazas, Mike

    to connect their personal devices with devices encountered in their environment in order to take advantage the interaction of their personal device with the intended target device. They must be able to ascertainSecurity by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous

  15. Efficient Authentication and Authorization of Mobile Users Based on Peer-to-Peer Network Mechanisms

    E-Print Network [OSTI]

    Braun, Torsten

    1 Efficient Authentication and Authorization of Mobile Users Based on Peer-to-Peer Network is to avoid exchanging security information between networks visited by a roaming user and the user's home network and retrieves the required security information from that AAA server. The AAA servers can

  16. Management Plan Management Plan

    E-Print Network [OSTI]

    Plan, Management Plan Page MP­ 1 #12;Management Plan water quality standards, instream flows, privateManagement Plan Management Plan "Management and restoration programs for native salmonids have communities" J. Lichatowich et al. 1998. A Conceptual Foundation for the Management of Native Salmonids

  17. Universal Hashing and Multiple Authentication M. Atici1*2and 11. R,. S t i n ~ o n ' > ~

    E-Print Network [OSTI]

    Bernstein, Daniel

    authentication without secrecy. Our point of view is the uni- vcrsal hashing approach pioneered by Wegman,ions, and obtained some improvements to the Wegman-Carter construction. Since 1991, several authors have given im

  18. Provably-Secure Authenticated Group Diffie-Hellman KeyExchange

    SciTech Connect (OSTI)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2007-01-01T23:59:59.000Z

    Authenticated key exchange protocols allow two participantsA and B, communicating over a public network and each holding anauthentication means, to exchange a shared secret value. Methods designedto deal with this cryptographic problem ensure A (resp. B) that no otherparticipants aside from B (resp. A) can learn any information about theagreed value, and often also ensure A and B that their respective partnerhas actually computed this value. A natural extension to thiscryptographic method is to consider a pool of participants exchanging ashared secret value and to provide a formal treatment for it. Startingfrom the famous 2-party Diffie-Hellman (DH) key exchange protocol, andfrom its authenticated variants, security experts have extended it to themulti-party setting for over a decade and completed a formal analysis inthe framework of modern cryptography in the past few years. The presentpaper synthesizes this body of work on the provably-secure authenticatedgroup DH key exchange.

  19. WIPP Transparency Project - container tracking and monitoring demonstration using the Authenticated Tracking and Monitoring System (ATMS)

    SciTech Connect (OSTI)

    SCHOENEMAN, J. LEE; SMARTT, HEIDI ANNE; HOFER, DENNIS

    2000-01-27T23:59:59.000Z

    The Authenticated Tracking and Monitoring System (ATMS) is designed to answer the need for global monitoring of the status and location of proliferation-sensitive items on a worldwide basis, 24 hours a day. ATMS uses wireless sensor packs to monitor the status of the items within the shipment and surrounding environmental conditions. Receiver and processing units collect a variety of sensor event data that is integrated with GPS tracking data. The collected data are transmitted to the International Maritime Satellite (INMARSAT) communication system, which then sends the data to mobile ground stations. Authentication and encryption algorithms secure the data during communication activities. A typical ATMS application would be to track and monitor the stiety and security of a number of items in transit along a scheduled shipping route. The resulting tracking, timing, and status information could then be processed to ensure compliance with various agreements.

  20. Using quantum routers to implement quantum message authentication and Bell-state manipulation

    E-Print Network [OSTI]

    Karol Bartkiewicz; Antonín ?ernoch; Karel Lemr

    2014-09-03T23:59:59.000Z

    In this paper we investigate the capability of quantum routing (quantum state fusion) to implement two useful quantum communications protocols. The analyzed protocols include quantum authentication of quantum messages and non-destructive linear-optical Bell state manipulation. We also present the concept of quantum decoupler -- a device implementing an inverse operation to quantum routing. We demonstrate that both quantum router and decoupler can work as specialized disentangling gates.

  1. Integrating end-to-end encryption and authentication technology into broadband networks

    SciTech Connect (OSTI)

    Pierson, L.G.

    1995-11-01T23:59:59.000Z

    BISDN services will involve the integration of high speed data, voice, and video functionality delivered via technology similar to Asynchronous Transfer Mode (ATM) switching and SONET optical transmission systems. Customers of BISDN services may need a variety of data authenticity and privacy assurances, via Asynchronous Transfer Mode (ATM) services Cryptographic methods can be used to assure authenticity and privacy, but are hard to scale for implementation at high speed. The incorporation of these methods into computer networks can severely impact functionality, reliability, and performance. While there are many design issues associated with the serving of public keys for authenticated signaling and for establishment of session cryptovariables, this paper is concerned with the impact of encryption itself on such communications once the signaling and setup have been completed. Network security protections should be carefully matched to the threats against which protection is desired. Even after eliminating unnecessary protections, the remaining customer-required network security protections can impose severe performance penalties. These penalties (further discussed below) usually involve increased communication processing for authentication or encryption, increased error rate, increased communication delay, and decreased reliability/availability. Protection measures involving encryption should be carefully engineered so as to impose the least performance, reliability, and functionality penalties, while achieving the required security protection. To study these trade-offs, a prototype encryptor/decryptor was developed. This effort demonstrated the viability of implementing certain encryption techniques in high speed networks. The research prototype processes ATM cells in a SONET OC-3 payload. This paper describes the functionality, reliability, security, and performance design trade-offs investigated with the prototype.

  2. Utilitas and venustas: balancing utility and authenticity in the stewardship of our built heritage

    E-Print Network [OSTI]

    Reich, Alene Wilmoth

    2007-04-25T23:59:59.000Z

    Members, John Alexander John Nichols Head of Department, Mardelle Shepley December 2005 Major Subject: Architecture iii ABSTRACT Utilitas and Venustas: Balancing Utility and Authenticity in the Stewardship of Our Built... Services (HPS). The aim of HPS is to, ?[help] our nation's citizens and communities identify, evaluate, protect and preserve historic properties for future generations of Americans.?17 HPS is responsible for the administration of educational, technical...

  3. Home Authentication / Biometrics Business / Finance Continuity / Recovery Cybersecurity Detection Education / Sci-Tech Emergency / Police / Mil. Government policy Infrastructure Public health / Biodefense Surveillance Systems integration Transport / Borde

    E-Print Network [OSTI]

    Rogers, John A.

    Home Authentication / Biometrics Business / Finance Continuity / Recovery Cybersecurity Detection Education / Sci-Tech Emergency / Police / Mil. Government policy Infrastructure Public health / Biodefense

  4. U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA®

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartmentAuthentication Client 3.5 Access

  5. Network Management Network Management

    E-Print Network [OSTI]

    that pertain to the operation, administration, maintenance, and provisioning of networked systems · Operation deals with keeping the network up (and the service provided by the network) · Administration involvesNetwork Management Pag. 1 Network Management Andrea Bianco Telecommunication Network Group Network

  6. Universal Hashing and Multiple Authentication M. Atici 1;2 and D. R. Stinson 1;3

    E-Print Network [OSTI]

    Stinson, Douglas

    . Our point of view is the uni­ versal hashing approach pioneered by Wegman and Carter in 1981. We first to the construction of unconditionally secure authentication codes without secrecy. This idea is due to Wegman formal def­ initions of relevant classes of hash functions, and obtained some improvements to the Wegman

  7. IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for

    E-Print Network [OSTI]

    Shen, Xuemin "Sherman"

    IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for Smart Grid Communications Mostafa M. Fouda, Member, IEEE, Zubair Md. Fadlullah, Member Abstract--Smart grid (SG) communication has recently received significant attentions to facilitate

  8. Hospitality, Tourism and Event Management

    E-Print Network [OSTI]

    Liley, David

    Practical cooking Public speaking Responsible Service of Alcohol (RSA) certification Small to medium the best university in Melbourne for teaching quality (2007­2010) and graduate satisfaction (2007, 2008. As a Swinburne graduate you'll be in high demand, with a long menu of career prospects to select from. Swinburne

  9. T-570: HP Security Bulletin- HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass.

  10. SUBCONTRACT MANAGEMENT

    Energy Savers [EERE]

    0-1 CHAPTER 10 SUBCONTRACT MANAGEMENT (Revised October 19, 2011) WHAT ARE THE BASIC PRINCIPLES AND OBJECTIVES OF SUBCONTRACT MANAGEMENT? 1. To ensure contractors establish,...

  11. Hospitality Management Hospitality Management

    E-Print Network [OSTI]

    McConnell, Terry

    of the Department of Hospitality Management and to the recorder in the College of Human Ecology. Required HPM 114 Food Safety and Quality Assurance 2 AND HPM 115 Food Science I 3 AND HPM 216 Restaurant and Food Service Operations 4 OR NSD 225 Nutrition in Health 3 12 credits needed: HPM 300 Selected Topics: Advanced

  12. Conference Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-11-03T23:59:59.000Z

    To establish requirements and responsibilities with respect to managing conferences sponsored by the Department of Energy (DOE) or by DOE management and operating contractors and other contractors who perform work at DOE-owned or -leased facilities, including management and integration contractors and environmental restoration management contractors (when using funds that will be reimbursed by DOE). Cancels DOE N 110.3.

  13. 161 rue Ada F -34392 Montpellier Cedex 05 Tl : 33 (0)4 67 4 85 85 Fax : 33 (0)4 67 4 85 00 www. lirmm.fr Added Redundancy Explicit Authentication at

    E-Print Network [OSTI]

    Boyer, Edmond

    hardware-based (physical) attacks and work under th Technical Report 01/07/2007 lirmm-00171028,version1-11Sep2007 #12;Added Redundancy Explicit Authentication

  14. Project Management Plan Resident Management System (RMS)

    E-Print Network [OSTI]

    US Army Corps of Engineers

    1 Project Management Plan Resident Management System (RMS) And Quality Control System (QCS Resident Management System.........................................................................................................3 Project Management Plan - Purpose

  15. How to reuse a one-time pad and other notes on authentication, encryption, and protection of quantum information

    SciTech Connect (OSTI)

    Oppenheim, Jonathan [Racah Institute of Theoretical Physics, Hebrew University of Jerusalem, Givat Ram, Jerusalem 91904 (Israel); Institute of Theoretical Physics and Astrophysics, University of Gdansk (Poland); Horodecki, Michal [Institute of Theoretical Physics and Astrophysics, University of Gdansk (Poland)

    2005-10-15T23:59:59.000Z

    Quantum information is a valuable resource which can be encrypted in order to protect it. We consider the size of the one-time pad that is needed to protect quantum information in a number of cases. The situation is dramatically different from the classical case: we prove that one can recycle the one-time pad without compromising security. The protocol for recycling relies on detecting whether eavesdropping has occurred, and further relies on the fact that information contained in the encrypted quantum state cannot be fully accessed. We prove the security of recycling rates when authentication of quantum states is accepted, and when it is rejected. We note that recycling schemes respect a general law of cryptography which we introduce relating the size of private keys, sent qubits, and encrypted messages. We discuss applications for encryption of quantum information in light of the resources needed for teleportation. Potential uses include the protection of resources such as entanglement and the memory of quantum computers. We also introduce another application: encrypted secret sharing and find that one can even reuse the private key that is used to encrypt a classical message. In a number of cases, one finds that the amount of private key needed for authentication or protection is smaller than in the general case.

  16. Position Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-06-23T23:59:59.000Z

    The order prescribes the policies, responsibilities, and procedures for position management within (DOE). Canceled by DOE N 1321.140. Cancels DOE 3510.1

  17. Management Analyst

    Broader source: Energy.gov [DOE]

    The Wind and Water Power Technologies Office (WWPTO) manages efforts to improve performance, lower costs, and accelerate deployment of wind and water power technologies, which can play a...

  18. Quality Management

    Broader source: Energy.gov [DOE]

    The Office of Quality Management, within the Office of Health, Safety and Security develops policies and procedures to ensure the classification and control of information is effective and...

  19. Enterprise Risk Management Program

    E-Print Network [OSTI]

    Hayden, Nancy J.

    Enterprise Risk Management Program DRAFT Introduction to Enterprise Risk Management at UVM 1 #12;Enterprise Risk Management Program DRAFT What is Enterprise Risk Management? Enterprise risk management governance, and accountability · Facilitates effective management of the uncertainty and associated risks

  20. LIANG, WEI. Design and Analysis of Authentication Mechanisms in Single-and Multi-Hop Wireless Networks. (Under the direction of Professor Wenye Wang).

    E-Print Network [OSTI]

    Wang, Wenye

    -Hop Wireless Networks. (Under the direction of Professor Wenye Wang). The increasing demand for ubiquitous Internet services imposes more security threats to communications due to open mediums in wireless networks on the transmission. As one of most widely used security mechanisms, authentication is used to identify mobile nodes

  1. authentic food -simply prepared add green bean fair trade organic coffee or fair trade tea to your meal for $1.5

    E-Print Network [OSTI]

    Martin, Jeff

    brunch authentic food - simply prepared #12;BREAKFAST add green bean fair trade organic coffee locally made corn tortillas · smoky pinto beans · salsa · red sauce Bothwell cheddar · two eggs (any style eggs · mesa red sauce · cheddar · salsa · pinto beans BREAKFAST BUN 5 toasted whole wheat bun · fried

  2. When HTTPS Meets CDN: A Case of Authentication in Delegated Service Jinjin Liang, Jian Jiang, Haixin Duan, Kang Li , Tao Wan , Jianping Wu,

    E-Print Network [OSTI]

    Li, Kang

    providers also start to offer DDoS mitigation services by hiding the original web site and distributingWhen HTTPS Meets CDN: A Case of Authentication in Delegated Service Jinjin Liang, Jian Jiang technologies, each of which has been well studied individually and independently. This paper provides

  3. Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices

    SciTech Connect (OSTI)

    Abercrombie, Robert K [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Aldridge, Hal [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC; Ricci, Tracy [Sypris Electronics, LLC] [Sypris Electronics, LLC; Bertino, Elisa [ORNL] [ORNL; Kulatunga, Athula [Purdue University] [Purdue University; Navaratne, Uditha Sudheera [Purdue University] [Purdue University

    2011-01-01T23:59:59.000Z

    In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

  4. Fabrication of Message Digest to Authenticate Audio Signals with Alternation of Coefficients of Harmonics in Multi-Stages (MDAC)

    E-Print Network [OSTI]

    Mondal, Uttam Kr

    2012-01-01T23:59:59.000Z

    Providing security to audio songs for maintaining its intellectual property right (IPR) is one of chanllenging fields in commercial world especially in creative industry. In this paper, an effective approach has been incorporated to fabricate authentication of audio song through application of message digest method with alternation of coefficients of harmonics in multi-stages of higher frequency domain without affecting its audible quality. Decomposing constituent frequency components of song signal using Fourier transform with generating secret code via applying message digest followed by alternating coefficients of specific harmonics in multi-stages generates a secret code and this unique code is utilized to detect the originality of the song. A comparative study has been made with similar existing techniques and experimental results are also supported with mathematical formula based on Microsoft WAVE (".wav") stereo sound file.

  5. Conference Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-01-25T23:59:59.000Z

    The Order establishes requirements and responsibilities for managing conferences sponsored or co-sponsored by the Department of Energy, including the National Nuclear Security Administration. Cancels DOE O 110.3. Canceled by DOE N 251.97.

  6. Project Manager

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as a project manager in the Fuel Cell Technologies Office in the DOE-EERE Office of Transportation responsible for a wide variety of highly...

  7. Management Analyst

    Broader source: Energy.gov [DOE]

    The incumbent in this position will serve as a Management Analyst in the Strategy Execution group of the Corporate Strategy organization (SE). The Strategy Execution group develops and coordinates...

  8. Managing Solutions

    E-Print Network [OSTI]

    Baker, Emily

    2007-01-01T23:59:59.000Z

    , and Texas Water --------------------------------------------- Project Managers Cecilia Wagner, Kevin Wagner, Danielle Supercinski, Dr. Bill Fox and Lucas Gregory work to link university researchers and Extension specialists to appropriate funding agen... Irrigators Network. Kevin Wagner, who joined TWRI in 2005 from TSSWCB, has spent several years working with environmental issues. He is currently pursuing his doctorate evaluating best management practices for reducing bacterial runoff from cattle wastes...

  9. Management of Critical Machine Settings for Accelerators at CERN

    E-Print Network [OSTI]

    Sliwinski, W; Kain, V; Kruk, G

    2009-01-01T23:59:59.000Z

    In high energy and high intensity accelerators as the LHC, the energy stored in the beams is orders of magnitude above the damage level of accelerator components like magnets. Uncontrolled release of this energy can lead to serious damage of equipment and long machine downtimes. In order to cope with these potential risks Protection Systems were developed at CERN including two software systems: MCS (Management of Critical Settings) and RBAC (Role Based Access Control). RBAC provides an authentication and authorization facility for access to the critical parts of the control system. A second layer of security is provided by MCS which ensures that critical parameters are coherent within the software and hardware components and can only be changed by an authorized person. The MCS system is aimed at the most critical parameters in either potentially dangerous equipment or protection devices (e.g. Beam Loss Monitors). It is complementary to the RBAC infrastructure. Both systems are fully integrated in the control ...

  10. Business Management Analyst Business Manager Director of Communication Contracts Manager

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    · Business Management Analyst · Business Manager · Director of Communication · Contracts Manager of Sales · President/Owner · Instructor of Business · Senior Buyer · North American Sales Manager · Talent graduation. You will have the skills & knowledge to manage and grow a successful business. You will be able

  11. Risk Management Policy Category: Strategic Management

    E-Print Network [OSTI]

    1 Risk Management Policy Category: Strategic Management 1. PURPOSE To support the University will be encouraged to speak openly and honestly. (iii) Managers will monitor risk and will disclose risks identified's risk appetite. 2.3. Risk management standards 2.3.1 The University's risk management framework

  12. Environmental Management System Plan

    E-Print Network [OSTI]

    Fox, Robert

    2009-01-01T23:59:59.000Z

    Management Program, R-3 • Environmental Management SystemEnvironmental policy 3. Environmental aspects 4. Legal andObjectives, targets, and Environmental Management Programs

  13. Data Management Policy | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Data Management Policy Data Management Policy The data management resource information and data release policies below are provided to help researchers understand the data...

  14. NERSC Data Management Policies

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Data Management Policies NERSC Data Management Policies Introduction NERSC provides its users with the means to store, manage, and share their research data products. In addition...

  15. Riparian Area. . . . . . . . . . . . . . . . . . . . Management Handbook

    E-Print Network [OSTI]

    Balasundaram, Balabhaskar "Baski"

    ..............................................................................................................19 Bruce Hoagland, Oklahoma Biological Survey and the University of Oklahoma Forest Management Riparian Area. . . . . . . . . . . . . . . . . . . . Management Handbook E-952 Oklahoma Cooperative . . . . . . . . . . . . . Oklahoma Conservation Commission Management Handbook #12

  16. Office of Legacy Management FY 2009 Energy Management Data Report...

    Office of Environmental Management (EM)

    Office of Legacy Management FY 2009 Energy Management Data Report Office of Legacy Management FY 2009 Energy Management Data Report FY 2009 Energy Management Performance Summary...

  17. MUSHROOM WASTE MANAGEMENT PROJECT LIQUID WASTE MANAGEMENT

    E-Print Network [OSTI]

    of solid and liquid wastes generated at mushroom producing facilities. Environmental guidelines#12;MUSHROOM WASTE MANAGEMENT PROJECT LIQUID WASTE MANAGEMENT PHASE I: AUDIT OF CURRENT PRACTICE The Mushroom Waste Management Project (MWMP) was initiated by Environment Canada, the BC Ministry

  18. MATERIALS MANAGEMENT MATERIALS MANAGEMENT -INVENTORY CONTROL

    E-Print Network [OSTI]

    Oliver, Douglas L.

    MATERIALS MANAGEMENT MATERIALS MANAGEMENT - INVENTORY CONTROL Record of Property Transferred from ______ ___________________________________ 2. DEAN (If Applies) ______ ___________________________________ 5. UNIVERSITY DIRECTOR OF MATERIALS MANAGEMENT ______ ___________________________________ 3. HOSPITAL DIRECTOR (If Applies) ______ IF YOU NEED

  19. Managing Critical Management Improvement Initiatives

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-10-01T23:59:59.000Z

    Provides requirements and responsibilities for planning, executing and assessing critical management improvement initiatives within DOE. DOE N 251.59, dated 9/27/2004, extends this Notice until 10/01/2005. Archived 11-8-10. Does not cancel other directives.

  20. Best Management Practice #1: Water Management Planning

    Broader source: Energy.gov [DOE]

    A successful water management program starts with developing a comprehensive water management plan. This plan should be included within existing facility operating plans.

  1. Environmental Management Waste Management Facility (EMWMF) at...

    Office of Environmental Management (EM)

    Technical Review Report: Oak Ridge Reservation Review of the Environmental Management Waste Management Facility (EMWMF) at Oak Ridge By Craig H. Benson, PhD, PE; William H....

  2. Stormwater Management 

    E-Print Network [OSTI]

    Jaber, Fouad

    2008-10-23T23:59:59.000Z

    . Stormwater also may wash bacteria and other pathogens into swimming areas, creating health hazards that often close beaches. Stormwater may carry debris, such as plastic bags, six-pack rings, and cigarette butts, into water bodies; such debris can choke... the development and implementation of best management practices (BMPs) and achievement of measurable goals at levels sufficient to satisfy each of six minimum control measures and an optional seventh control measure: 1. Public education and outreach...

  3. Environmental Management

    ScienceCinema (OSTI)

    None

    2015-01-07T23:59:59.000Z

    Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

  4. Environmental Management

    SciTech Connect (OSTI)

    None

    2014-11-12T23:59:59.000Z

    Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

  5. Risk Management, Mar 2012 Risk Management

    E-Print Network [OSTI]

    Risk Management, Mar 2012 Risk Management Conditions of Volunteer Service (Please send completed form to the Office of Risk Management) riskmanagement@uoregon.edu Fax: 541-346-7008 As a volunteer Tort Claims Act, ORS 30.260-300, and Oregon Department of Administrative Services Risk Management

  6. Risk Management Procedures Category: Strategic Management

    E-Print Network [OSTI]

    1 Risk Management Procedures Category: Strategic Management 1. LEGISLATION/ENTERPRISE AGREEMENT/POLICY SUPPORTED Risk Management Policy Tertiary Education Quality Standards Agency Act 2011 (TEQSA Act 2011) 2 (a) Advise the Vice-Chancellor on the effective management of the University's risk profile

  7. Landscape Management Systems The Visual Management System

    E-Print Network [OSTI]

    Standiford, Richard B.

    Landscape Management Systems The Visual Management System of the Forest Service, USDA1 Warren R presentation on how the Visual Management System (VMS) functions. 1/ Presented at the National Conference Manual 2380, Landscape Management, USDA. INTRODUCTION The American people are concerned about the quality

  8. Management 301 Management and Organizational Behavior

    E-Print Network [OSTI]

    Young, Paul Thomas

    Management 301 Management and Organizational Behavior Section 003 Fall 2013 (8/20-12/3) College approaches management as that process of reaching organizational goals by working with and through people. Course Objectives 1. To understand management and organizational behavior (ob) concepts associated

  9. Data Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract Management Fermi SitePARTOfficeOctoberDaniel WoodID Service FirstData

  10. Data Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract Management Fermi SitePARTOfficeOctoberDaniel WoodID Service

  11. Data Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract Management Fermi SitePARTOfficeOctoberDaniel WoodID ServiceData

  12. SUBCONTRACT MANAGEMENT

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOrigin ofEnergy atLLC - FE DKT. 10-160-LNG - ORDERSTATE0-1 CHAPTER 10 SUBCONTRACT MANAGEMENT

  13. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your Home and It'll LoveMail andAbout UsManagement

  14. BUILDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PL LDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PLAN

    E-Print Network [OSTI]

    Florida, University of

    BUILDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PL LDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PLAN MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PLAN BUILDING A R RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PLAN BUILDIN T PLAN BUILDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEM

  15. Enterprise Risk Management Program

    E-Print Network [OSTI]

    Hayden, Nancy J.

    Enterprise Risk Management Program Guide to Risk Assessment & Response August 16, 2012 #12; i ...........26 List of Figures Figure 1: The Risk Management Process.......................................................................................................12 #12; 1 Overview The risk management process--of identifying, analyzing, evaluating

  16. IT Project Manager

    Broader source: Energy.gov [DOE]

    This position is located in the IT Project Management Office (JP). A successful candidate in this position will serve as an IT Program Manager and technical expert responsible for directly managing...

  17. environmental management radiation protection

    E-Print Network [OSTI]

    Entekhabi, Dara

    EHS environmental management biosafety radiation protection industrial hygiene safety Working: Biosafety, Environmental Management, Industrial Hygiene, Radiation Protection and Safety. Each specialized Management Program, Industrial Hygiene, Radiation Protection Program, and the Safety Program. (http

  18. Functional Facilities Management Energy Management Structure

    E-Print Network [OSTI]

    Gulliver, Robert

    Functional Facilities Management Energy Management Structure Jerome Malmquist Director Erick Van Controls Systems Jeff Davis Assistant Director, Facilities Engineering & Energy Efficiency Gene Husted Principal Engineer / Commissioning Emily Robin-Abbott St. Paul Energy Engineer & Technicians Supervisor Dan

  19. Energy Management Working Group: Accelerating Energy Management

    E-Print Network [OSTI]

    Scheihing, P.

    2014-01-01T23:59:59.000Z

    for Standardization (ISO) published the ISO 50001 energy management standard in 2011. ISO 50001 provides industrial companies with guidelines for integrating energy efficiency into their management practices— including fine-tuning production processes... efficiency. GSEP’s Energy Management Working Group (EMWG) advocates the increased adoption of EnMS or ISO 50001 in industry and commercial buildings. It goal is to accelerate the adoption and use of energy management systems in industrial facilities...

  20. Load Management for Industry

    E-Print Network [OSTI]

    Konsevick, W. J., Jr.

    1982-01-01T23:59:59.000Z

    customer management programs exist. EPRI Report (EM-1606) loads to beneficially alter a'utility's load curve. (Page 1-2) list them as: Load management alternatives are covered. 1. Direct or voluntary control of customer Load management methods can... and Electric Power Research Institute (EPRI) Report energy management programs. (EM-1606) states that "the objective of load manage ment is to alter the real or apparent pattern of Our load management program was designed electricity use in order to...

  1. Managing Web Data Managing Web Data

    E-Print Network [OSTI]

    Davulcu, Hasan

    Managing Web Data Dan Suciu AT&T Labs Managing Web Data Sigmod, 1999 Dan Suciu AT&T Labs 1 #12;How the Web is Today HTML documents all intended for human consumption many are generated automatically by applications Managing Web Data Sigmod, 1999 Dan Suciu AT&T Labs 2 #12;Paradigm Shift on the Web applications

  2. MATERIALS MANAGEMENT MATERIALS MANAGEMENT -INVENTORY CONTROL

    E-Print Network [OSTI]

    Oliver, Douglas L.

    MATERIALS MANAGEMENT MATERIALS MANAGEMENT - INVENTORY CONTROL NOTICE OF DESIGNATED DEPARTMENTAL OF MATERIALS MANAGEMENT ______ FURTHER INSTRUCTIONS 1. Include a copy of any relevant documents. 2. Item MATERIALS COORDINATOR ­ IC-8 Mail, Fax or PDF the entire package to: MC 2010 Fax: 679-4240 REFERENCE # DMC

  3. Physics Department Management Review

    E-Print Network [OSTI]

    Homes, Christopher C.

    ESSH Committee and Work Planning Security Cyber Security Accident and Incident Management was distributed to the ESSH Committee, Group Leaders, Group Safety Coordinators, and Line Management #12;Areas

  4. Contract/Project Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    by FY12. 95% Line Item 85% Cleanup 97% Line Item 85% Cleanup EVM represents Earned Value Management. FY2011 Second Quarter Overall Contract and Project Management Improvement...

  5. Contract/Project Management

    Broader source: Energy.gov (indexed) [DOE]

    by FY12. 95% Line Item 85% Cleanup 100% Line Item 88% Cleanup EVM represents Earned Value Management. FY2011 Fourth Quarter Overall Contract and Project Management Improvement...

  6. Contract/Project Management

    Energy Savers [EERE]

    by FY12. 95% Line Item 85% Cleanup 100% Line Item 88% Cleanup EVM represents Earned Value Management. FY2011 First Quarter Overall Contract and Project Management Performance...

  7. Contract/Project Management

    Energy Savers [EERE]

    by FY12. 95% Line Item 85% Cleanup 97% Line Item 89% Cleanup EVM represents Earned Value Management. FY2011 Third Quarter Overall Contract and Project Management Improvement...

  8. Management of Nuclear Materials

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-08-17T23:59:59.000Z

    To establish requirements for the lifecycle management of DOE owned and/or managed accountable nuclear materials. Cancels DOE O 5660.1B.

  9. Contract/Project Management

    Broader source: Energy.gov (indexed) [DOE]

    3 rd Quarter Overall Contract and Project Management Performance Metrics and Targets ContractProject Management Performance Metrics FY 2009 Target FY 2009 Actual Comment 1....

  10. Target Cost Management Strategy

    E-Print Network [OSTI]

    Okano, Hiroshi

    1996-01-01T23:59:59.000Z

    Target cost management (TCM) is an innovation of Japanese management accounting system and by common sense has been considered with great interest by practitioners. Nowadays, TCM related

  11. Best Environmental Management Practices

    E-Print Network [OSTI]

    Best Environmental Management Practices Farm Animal Production Comprehensive Nutrient Management with regulatory guidelines by addressing items such as manure management, field crop nutrients, and storm water What is a CNMP? A Comprehensive Nutrient Management Plan (CNMP) is a total planning tool that details

  12. Environmental Best Management Practices

    E-Print Network [OSTI]

    Liskiewicz, Maciej

    Environmental Best Management Practices for Virginia's Golf Courses Prepared by Virginia Golf Course Superintendents Association #12;#12;EnvironmEntal BEst managEmEnt PracticEs for virginia's golf III I am pleased to endorse the Environmental Best Management Practices for Virginia's Golf Courses

  13. Sport Management Academic Offerings

    E-Print Network [OSTI]

    Mather, Patrick T.

    production and programming of events; marketing and public relations; technological operations management including (but not limited to) digital advertising, media law, new media business, operations managementSport Management Academic Offerings M.S. In Sport Venue And Event Management GRADUATE Chad Mc

  14. Chemical Management Contacts

    Broader source: Energy.gov [DOE]

    Contacts for additional information on Chemical Management and brief description on Energy Facility Contractors Group

  15. Information resource management concepts for records managers

    SciTech Connect (OSTI)

    Seesing, P.R.

    1992-10-01T23:59:59.000Z

    Information Resource Management (ERM) is the label given to the various approaches used to foster greater accountability for the use of computing resources. It is a corporate philosophy that treats information as it would its other resources. There is a reorientation from simply expenditures to considering the value of the data stored on that hardware. Accountability for computing resources is expanding beyond just the data processing (DP) or management information systems (MIS) manager to include senior organization management and user management. Management`s goal for office automation is being refocused from saving money to improving productivity. A model developed by Richard Nolan (1982) illustrates the basic evolution of computer use in organizations. Computer Era: (1) Initiation (computer acquisition), (2) Contagion (intense system development), (3) Control (proliferation of management controls). Data Resource Era: (4) Integration (user service orientation), (5) Data Administration (corporate value of information), (6) Maturity (strategic approach to information technology). The first three stages mark the growth of traditional data processing and management information systems departments. The development of the IRM philosophy in an organization involves the restructuring of the DP organization and new management techniques. The three stages of the Data Resource Era represent the evolution of IRM. This paper examines each of them in greater detail.

  16. Coding AuthentiCity

    E-Print Network [OSTI]

    Mercier, Rachel Havens

    2008-01-01T23:59:59.000Z

    This thesis analyzes the impact of form-based codes, focusing on two research questions: (1) What is the underlying motivation for adopting a form-based code? (2) What motivations have the most significant impact on ...

  17. Principles of Authentication

    E-Print Network [OSTI]

    Peisert, Sean; Talbot, Ed; Kroeger, Tom

    2013-01-01T23:59:59.000Z

    All The Way Down: A Clean-Slate, Ground-Up, First-Principlesintegrity using clean-slate, ground-up techniques involvingsensor results, such as the clean slate solution referred to

  18. ARM - Central Authentication Service

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492air Comments? We would love to heargovInstrumentstdma Comments?History Organization Participants Facility

  19. CERTIFICATE OF AUTHENTICITY

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube platformBuilding Removal OngoingCERCLA Sites Quality Assurance Project

  20. Management and Program Analyst (Operations Manager)

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as a Management and Program Analyst in the Office of Strategic Programs in the DOE-EERE.

  1. Information resource management concepts for records managers

    SciTech Connect (OSTI)

    Seesing, P.R.

    1992-10-01T23:59:59.000Z

    Information Resource Management (ERM) is the label given to the various approaches used to foster greater accountability for the use of computing resources. It is a corporate philosophy that treats information as it would its other resources. There is a reorientation from simply expenditures to considering the value of the data stored on that hardware. Accountability for computing resources is expanding beyond just the data processing (DP) or management information systems (MIS) manager to include senior organization management and user management. Management's goal for office automation is being refocused from saving money to improving productivity. A model developed by Richard Nolan (1982) illustrates the basic evolution of computer use in organizations. Computer Era: (1) Initiation (computer acquisition), (2) Contagion (intense system development), (3) Control (proliferation of management controls). Data Resource Era: (4) Integration (user service orientation), (5) Data Administration (corporate value of information), (6) Maturity (strategic approach to information technology). The first three stages mark the growth of traditional data processing and management information systems departments. The development of the IRM philosophy in an organization involves the restructuring of the DP organization and new management techniques. The three stages of the Data Resource Era represent the evolution of IRM. This paper examines each of them in greater detail.

  2. The Waste Management Quality Assurance Implementing Management Plan (QAIMP)

    E-Print Network [OSTI]

    Albert editor, R.

    2009-01-01T23:59:59.000Z

    DIVISION Waste Management Quality Assurance ImplementingI I IMPLEMENTING MANAGEMENT QUALITY PLAN ASSURANCE I lilillI WM-QAIMP Waste Management Quality Assurance Implementing

  3. Fusing Integration Test Management with Change Management

    E-Print Network [OSTI]

    Perry, Dewayne E.

    - 1 - Infuse: Fusing Integration Test Management with Change Management Gail E. Kaiser* Dewayne E, NJ 07974 Murray Hill, NJ 07974 Infuse is an experimental software development environment focusing the change set into the baseline. We have previously described how Infuse enforces static consistency at each

  4. Waste Management Quality Assurance Plan

    E-Print Network [OSTI]

    Waste Management Group

    2006-01-01T23:59:59.000Z

    Revision 6 Waste Management Quality Assurance Plan Waste6 WM QA Plan Waste Management Quality Assurance Plan LBNL/4 Management Quality Assurance

  5. Ground Water Management Act (Virginia)

    Broader source: Energy.gov [DOE]

    Under the Ground Water Management Act of 1992, Virginia manages ground water through a program regulating the withdrawals in certain areas called Ground Water Management Areas (GWMA). Currently,...

  6. Business, management and finance

    E-Print Network [OSTI]

    Sussex, University of

    Business, management and finance Essentials Taught degrees Masters in Business Administration (MBA) MSc in Banking and Finance MSc in Corporate and Financial Risk Management MSc in Financial Mathematics MSc in International Accounting and Corporate Governance MSc in International Finance MSc

  7. Information Technology Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2012-12-03T23:59:59.000Z

    The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Cancels DOE G 200.1-1. Admin Chg 1, dated 1-16-2013, cancels DOE O 415.1.

  8. Portfolio Manager Overview

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Portfolio Manager 3 | TAP Webcast eere.energy.gov What is Portfolio Manager? Free, web-based tool for benchmarking existing buildings Measure and track the energy use of...

  9. Risk Management Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-01-18T23:59:59.000Z

    This Guide provides non-mandatory risk management approaches for implementing the requirements of DOE O 413.3B, Program and Project Management for the Acquisition of Capital Assets. Cancels DOE G 413.3-7.

  10. ENVIRONMENTAL MANAGEMENT Environmental Policy

    E-Print Network [OSTI]

    Haase, Markus

    ENVIRONMENTAL MANAGEMENT Environmental Policy February 2013 The University of Leeds is responsible to reflect best environmental practice, implement an environmental management system to pursue sustainability and continuous improvement and seek innovative ways of meeting environmental objectives. These include: To meet

  11. Information Technology Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2012-12-03T23:59:59.000Z

    The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Cancels DOE G 200.1-1. Admin Chg 1 approved 1-16-2013.

  12. Computerized Maintenance Management Systems

    Broader source: Energy.gov [DOE]

    Computerized maintenance management systems (CMMS) are a type of management software that perform functions in support of operations and maintenance (O&M) programs. The software automates most of the logistical functions performed by O&M staff.

  13. Management of Nuclear Materials

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-08-17T23:59:59.000Z

    To establish requirements for the lifecycle management of DOE owned and/or managed accountable nuclear materials. Cancels DOE O 410.2. Admin Chg 1 dated 4-10-2014, cancels DOE O 410.2.

  14. Personalized diabetes management

    E-Print Network [OSTI]

    O'Hair, Allison Kelly

    2013-01-01T23:59:59.000Z

    In this thesis, we present a system to make personalized lifestyle and health decisions for diabetes management, as well as for general health and diet management. In particular, we address the following components of the ...

  15. Coastal Management Act (Georgia)

    Broader source: Energy.gov [DOE]

    The Coastal Management Act provides enabling authority for the State to prepare and administer a coastal management program. The Act does not establish new regulations or laws; it is designed to...

  16. Wildlife Management Areas (Florida)

    Broader source: Energy.gov [DOE]

    Certain sites in Florida are designated as wildlife management areas, and construction and development is heavily restricted in these areas.

  17. Benchmarking Corporate Energy Management

    E-Print Network [OSTI]

    Norland, D. L.

    BENCHMARKING CORPORATE ENERGY MANAGEMENT Dr. Douglas L. Norland Director of Research and Industrial Programs Alliance to Save Energy Washington, DC ABSTRACT There is growing interest among energy managers in finding out how their company...'s energy management procedures and perfonnance compare to that of other companies. Energy management involves everything from setting goals and targets to implementing best maintenance practices. This paper, however, discusses benchmarking energy...

  18. Workforce Management Office (WFMO) Functional Statements WORKFORCE MANAGEMENT OFFICE

    E-Print Network [OSTI]

    , and destruction. BMD oversees WFMO's personal property management, Freedom of Information Act responses, Entry, organizing, and administering comprehensive human resources management programs in collaboration wMay 2014 Workforce Management Office (WFMO) ­ Functional Statements WORKFORCE MANAGEMENT OFFICE

  19. Business, management and finance

    E-Print Network [OSTI]

    Sussex, University of

    Business, management and finance Essentials Taught degrees Masters in Business Administration (MBA) MSc in Banking and Finance MSc in Corporate and Financial Risk Management MSc in Financial Mathematics in International Accounting and Corporate Governance MSc in International Finance MSc in International Management

  20. Risk Management Strategy Introduction

    E-Print Network [OSTI]

    Edinburgh, University of

    Risk Management Strategy Introduction 1. The risk of adverse consequences is inherent in all activity. Dynamic enterprise will inevitably create new risks. Risk management is about ensuring that all significant relevant risks are understood and prioritised as part of normal management

  1. Forest Resources and Management

    E-Print Network [OSTI]

    Forest Resources and Management Centre for The Centre for Forest Resources and Management aims the forest resource. Our aim is that British forests ­ from their creation to maturity and regeneration-energy development, forest resource forecasting, genetic improvement, woodland regeneration and creation, management

  2. Environmental Management at

    E-Print Network [OSTI]

    : ANUgreen for the HotRot Organic Recycling Project Sustainable Transport Category Winner: LEAD Development Themes: 1. Community Engagement 2. Energy and Greenhouse Management 3. Water Management 4. Recycling and Waste Management 5. Transport 6. Pollution Prevention and Environmental Risk 7. Biodiversity The Future

  3. Medical Management Treatment Manual

    E-Print Network [OSTI]

    Bezrukov, Sergey M.

    Medical Management Treatment Manual: A Clinical Guide for Researchers and Clinicians) This manual is an adaptation of: Medical Management Treatment Manual: A Clinical Research Guide for Medically, Maryland #12;Message to the Users of this Medical Management (MM) Manual from the Editors Background

  4. FRESH THINKING FOR MANAGEMENT

    E-Print Network [OSTI]

    Yang, Eui-Hyeok

    FOR TECHNOLOGY MANAGEMENT Technology Acceptance in Organizations: What Can We Do to Improve it? by Patricia in organizations is thus an important topic in both management research and management practice. Technology choice of a mobile phone. In organizations, there are two steps in technology adoption. First

  5. Records Management Administration & Finance

    E-Print Network [OSTI]

    Wu, Shin-Tson

    SUBJECT: Records Management Administration & Finance Number: 4010 Effective Date: 02 applies to the retention and disposal of public records. The university records management liaison officer for Administration and Finance,will provide liaison and assistance in allphases of the records management process

  6. Database Management Certificate Program

    E-Print Network [OSTI]

    Rose, Michael R.

    Database Management Certificate Program DATABASE TECHNOLOGIES 13 Today, organizations in every to obtain general data analysis and management skills or apply both Oracle and Microsoft SQL Server database capabilities of relational databases in conjunction with the new "Big Data" management frameworks for data

  7. Financial Management Oversight

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-08-31T23:59:59.000Z

    The Order defines requirements for effective financial management and adherence to DOE and applicable external financial management requirements and sets forth standards for ensuring the integrity and responsiveness of financial management and the accuracy and reliability of DOEs financial statements. Cancels DOE O 2200.13.

  8. Risk & QualityRisk & Quality ManagementManagement

    E-Print Network [OSTI]

    liability."" [Balsaono RR, Brown[Balsaono RR, Brown MK, Risk ManagementMK, Risk Management inin Legal

  9. CAMPUS BLUEPRINT ENROLLMENT MANAGEMENT COUNCIL'S

    E-Print Network [OSTI]

    Powers, Robert

    CAMPUS BLUEPRINT ENROLLMENT MANAGEMENT COUNCIL'S STRATEGIC ENROLLMENT MANAGEMENT PLAN 2012'S ENROLLMENT MANAGEMENT COUNCIL'S STRATEGIC ENROLLMENT MANAGEMENT PLAN 2012-2017 Report Outline Building a Big: Student Recruitment Initiatives Sharing Our Story of Quality Improving the Academic Profile and Student

  10. CSREES Nutrient Management Working Meeting

    E-Print Network [OSTI]

    planning process ­ Nutrient management training ­ P-Indexes and tools developed ­ Educational materials #12Welcome CSREES Nutrient Management Working Meeting May 4 and 5, 2004 Atlanta, GA #12;University Objectives · Information Sharing Among States ­ Nutrient management regulations ­ Nutrient management

  11. Radioactive Waste Management Basis

    SciTech Connect (OSTI)

    Perkins, B K

    2009-06-03T23:59:59.000Z

    The purpose of this Radioactive Waste Management Basis is to describe the systematic approach for planning, executing, and evaluating the management of radioactive waste at LLNL. The implementation of this document will ensure that waste management activities at LLNL are conducted in compliance with the requirements of DOE Order 435.1, Radioactive Waste Management, and the Implementation Guide for DOE Manual 435.1-1, Radioactive Waste Management Manual. Technical justification is provided where methods for meeting the requirements of DOE Order 435.1 deviate from the DOE Manual 435.1-1 and Implementation Guide.

  12. Army Regulation 2550 Information Management: Records

    E-Print Network [OSTI]

    US Army Corps of Engineers

    Army Regulation 25­50 Information Management: Records Management Preparing and Managing Information Management: Records Management Preparing and Managing Correspondence *Army Regulation 25. This regulation on the prepa- ration and management of Army corre- spondence has been revised. This revision

  13. Strategies for Successful Energy Management

    Broader source: Energy.gov [DOE]

    This presentation, given through the DOE's Technical Assitance Program (TAP), provides information on energy management for the portfolio manager initiative

  14. A Manager's Approach to Energy Cost Management

    E-Print Network [OSTI]

    Spencer, R. J.

    A major responsibility of management is the control and containment of operating costs. Energy costs are a major portion of the industrial budget. GM has developed a 3 phase approach to energy conservation. Phase I -Administrative Controls...

  15. Energy Management Working Group: Accelerating Energy Management 

    E-Print Network [OSTI]

    Scheihing, P.

    2014-01-01T23:59:59.000Z

    Countries participating in the Global Superior Energy Performance (GSEP) Energy Management Working Group (EMWG) are leveraging their resources and taking collective action to strengthen national and international efforts to facilitate the adoption...

  16. Rangeland Drought Management for Texans: Livestock Management

    E-Print Network [OSTI]

    Carpenter, Bruce B.; Hart, Charles R.

    2001-04-24T23:59:59.000Z

    Livestock producers need to create flexible plans for dealing with drought. This publication explains the steps that should be included in such a plan, including taking a forage inventory, using stocker animals, establishing a livestock management...

  17. Nutrient Management TrainingNutrient Management Training for Technical Service Providersfor Technical Service Providers

    E-Print Network [OSTI]

    Nutrient ManagementNutrient Management ­­ Record KeepingRecord Keeping ­­ Feed ManagementFeed ManagementNutrient Management TrainingNutrient Management Training for Technical Service Providersfor Management Planning Technical Guidance.Management Planning Technical Guidance. Manure and Wastewater Handling

  18. V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and...

  19. T-606: Sun Java System Access Manager Lets Remote Users Partially...

    Broader source: Energy.gov (indexed) [DOE]

    CVE-2011-0844 CVE-2011-0847 Oracle Critical Patch Update Advisory IMPACT ASSESSMENT: Medium Discussion: A remote authenticated user can partially access data on the target...

  20. Identity and Access Management: Access Management Survey 1 Access Management Survey Questions

    E-Print Network [OSTI]

    Maroncelli, Mark

    Identity and Access Management: Access Management Survey 1 Access Management Survey Questions has developed a survey to solicit your input for Access Management. Please take a moment to complete be submitted by Friday May 14, 2010. #12;Identity and Access Management: Access Management Survey 2 Group

  1. Sustainable Energy Management Programs

    E-Print Network [OSTI]

    Hanner, S.

    2014-01-01T23:59:59.000Z

    Sustainable Energy Management Programs Steve Hanner Allen ISD/TEMA . ESL-KT-14-11-45 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 Starting an Energy Management Program • Recognize need, Elicit District Commitment... • Appoint Energy Manager • Analyze Existing Conditions • Develop Plan • Implement and Monitor Program ESL-KT-14-11-45 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 Sustainable Programs Feature – District Commitment...

  2. Poultry Pest Management

    E-Print Network [OSTI]

    Tomberlin, Jeffery K.; Drees, Bastiaan M.

    2007-05-18T23:59:59.000Z

    sanitation program of manure manage- ment, water management and weed mowing. Keep the manure dry because wet manure pro- motes fl y breeding and inhibits benefi cial insect breeding. Other benefi cials in poultry manure include mites and beetles..., according to Pest Management Recommendations for Poultry, a publication by Cornell University and Penn State Cooperative Extension. Mites and beetles are major preda- tors in caged-layer operations. The macrochelid mite, Macrochelis muscaedo- mesticae...

  3. Corporate Energy Management Process

    E-Print Network [OSTI]

    Geiger, T.

    2013-01-01T23:59:59.000Z

    . May 21-24, 2013 Corporate Energy Management Process 2 ?Brief introduction to BASF ? BASF Corporate Energy Management ? Management Support ? Goals ? Continuous Improvement ? Best Practices ? Recognition ?Summary ESL-IE-13-05-25 Proceedings...-value products ? Intelligent, sustainable system solutions ? 2012 Sales: ?72.1 Billion ? Employees: 110,000 Company overview BASF ? The Chemical Company ESL-IE-13-05-25 Proceedings of the Thrity-Fifth Industrial Energy Technology Conference New Orleans, LA...

  4. Change Control Management Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-29T23:59:59.000Z

    The Guide provides a suggested approach and uniform guidance for managing project and contract changes through applying the requirements of DOE O 413.3B. No cancellation.

  5. Advisory Committee Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-10-22T23:59:59.000Z

    The Manual provides detailed DOE requirements, responsibilities, processes, and procedures for the establishment, operation, and management of advisory committees. Cancels DOE M 510.1-1.

  6. Records Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-02-03T23:59:59.000Z

    The Order sets forth requirements and responsibilities for implementing and maintaining a cost-effective records management program throughout the Department of Energy.

  7. Records Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-26T23:59:59.000Z

    The Order sets forth requirements and responsibilities for establishing and maintaining a program for the efficient and economical management of records and information assets.

  8. Total Light Management

    Broader source: Energy.gov [DOE]

    Presentation covers total light management, and is given at the Spring 2010 Federal Utility Partnership Working Group (FUPWG) meeting in Providence, Rhode Island.

  9. Enterprise Risk Management Framework

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Framework The Enterprise Risk Management (ERM) framework includes four steps: identify the risks, determine the probability and impact of each one, identify controls that are...

  10. Maintenance and Veg Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Vegetation Management on Forest Service Lands in Colorado, Nebraska and Utah Draft Environmental Impact Statement, DOEEIS-0442Project Description Western Area Power...

  11. About CRSP Management Center

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    assist customers in saving their valuable electrical resources by actively promoting energy management and conservation programs and helping them determine their future energy...

  12. Hydro Capital Asset Manager

    Broader source: Energy.gov [DOE]

    This position is located in Federal Hydro Projects, Generation Asset Management, Power Services. Additional vacancies may be filled through this vacancy announcement or if they become available.

  13. Energy, Data Management, Reporting

    Broader source: Energy.gov (indexed) [DOE]

    Design the Strategy | Deliver Efficiency | Sustain Results Energy, Data Management, Reporting This presentation does not contain any proprietary, confidential, or otherwise...

  14. Information Technology Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-11-21T23:59:59.000Z

    This revised Order is needed to clarify the roles and responsibilities, policies, and procedures for effectively managing IT investments to ensure mission success.

  15. Radioactive Waste Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1984-02-06T23:59:59.000Z

    To establish policies and guidelines by which the Department of Energy (DOE) manages tis radioactive waste, waste byproducts, and radioactively contaminated surplus facilities.

  16. International Commitments Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-11-18T23:59:59.000Z

    This Order establishes a process to manage the Department's International Commitments under the administrative direction of the Office of Policy and International Affairs. No cancellation.

  17. Project Management Practices

    Office of Environmental Management (EM)

    and applies it as the foundational, best case probability of occurrence. 2. 2. As applied to forecasting, planning, estimating in management: anchoring is a starting point,...

  18. Management Control Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-04-18T23:59:59.000Z

    To establish requirements and responsibilities for the Department of Energy Management Control Program. Cancels DOE O 413.1. Canceled by DOE O 413.1B.

  19. Water Management Act (Massachusetts)

    Broader source: Energy.gov [DOE]

    This Act regulates and registers water withdrawals in the Commonwealth of Massachusetts to enable effective planning and management of water use and conservation. The Act establishes a Water...

  20. Hazardous Wastes Management (Alabama)

    Broader source: Energy.gov [DOE]

    This legislation gives regulatory authority to the Department of Environmental Management to monitor commercial sites for hazardous wastes; fees on waste received at such sites; hearings and...

  1. Hazardous Waste Management (Indiana)

    Broader source: Energy.gov [DOE]

    The state supports the implementation of source reduction, recycling, and other alternative solid waste management practices over incineration and land disposal. The Department of Environmental...

  2. Solid Waste Management (Indiana)

    Broader source: Energy.gov [DOE]

    The state supports the implementation of source reduction, recycling, and other alternative solid waste management practices over incineration and land disposal. The Indiana Department of...

  3. Energy Management Systems

    E-Print Network [OSTI]

    Ferland, K.

    2007-01-01T23:59:59.000Z

    This presentation will address results from a pilot project with 10 chemical plants on energy management systems and the development of an energy efficiency plant certification program....

  4. Efficient Water Use & Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Water Use Goal 4: Efficient Water Use & Management Aware of the arid climate of northern New Mexico, water reduction and conservation remains a primary concern at LANL. Energy...

  5. Legacy Management Specific Training

    Broader source: Energy.gov [DOE]

    The following courses are specific to Legacy Management Employees, for more information about the courses below or to register for any of these courses please contact Chequita Johnson.

  6. Groundwater Management Areas (Texas)

    Broader source: Energy.gov [DOE]

    This legislation authorizes the Texas Commission on Environmental Quality and the Texas Water Development Board to establish Groundwater Management Areas to provide for the conservation,...

  7. Stormwater Management (North Carolina)

    Broader source: Energy.gov [DOE]

    The rules in this Section set forth the requirements for application and issuance of permits for stormwater management systems. These requirements to control pollutants associated with stormwater...

  8. Acquisition Career Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-05-14T23:59:59.000Z

    The order sets forth requirements and responsibilities for the Department of Energy (DOE) Acquisition Career Management Program. Cancels DOE O 361.1B.

  9. ISSUES MANAGEMENT PROGRAM MANUAL

    E-Print Network [OSTI]

    Gravois, Melanie

    2007-01-01T23:59:59.000Z

    LBNL/PUB-5519 (1), Rev. 032 ISSUES MANAGEMENT PROGRAM MANUAL LBNL/PUB-5519 (1), Rev.Berkeley National Laboratory LBNL/PUB-5519 (1), Rev. 0

  10. Site Office Manager, Princeton

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the Princeton Site Office (PSO) Manager by providing overall executive leadership to the PSO.

  11. ORISE: Emergency Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    provided direction and experienced leadership to the Federal Bureau of Investigation's (FBI) Crisis Management Unit to establish a standardized exercise program for the FBI that...

  12. Parallel integrated thermal management

    DOE Patents [OSTI]

    Bennion, Kevin; Thornton, Matthew

    2014-08-19T23:59:59.000Z

    Embodiments discussed herein are directed to managing the heat content of two vehicle subsystems through a single coolant loop having parallel branches for each subsystem.

  13. Comprehensive Emergency Management System

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-11-02T23:59:59.000Z

    The Order establishes policy and assigns roles and responsibilities for the Department of Energy (DOE) Emergency Management System. Cancels DOE O 151.1B.

  14. Management and Performance NASA'S APPROACH TO PERFORMANCE MANAGEMENT

    E-Print Network [OSTI]

    Waliser, Duane E.

    TO PERFORMANCE MANAGEMENT conduct the Agency's day-to-day work. Figure 1 depicts NASA's organizational structureManagement and Performance NASA'S APPROACH TO PERFORMANCE MANAGEMENT NASA's FY 2015 Management as an organization and NASA's approach to performance management, strategic planning, and performance reporting

  15. Information Records Information Management (RIM)

    E-Print Network [OSTI]

    Alpay, S. Pamir

    10/2012 Records & Information Management (RIM) Records Information Management (RIM) encompasses all, and properly manage all records from creation to disposition. Record Management Strategies Lock your offices, and properly destroy when the record retention period is met. Establish a plan for how to manage and protect

  16. Information Collection Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-10-11T23:59:59.000Z

    This Order sets forth DOE requirements and responsibilities for implementing the information collection management provisions of the Paperwork Reduction Act of 1995 and the Office of Management and Budgets implementing regulation Controlling Paperwork Burdens on the Public, as contained in 5 CFR 1320. No cancellation.

  17. Risk Management Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-09-16T23:59:59.000Z

    This Guide provides a framework for identifying and managing key technical, schedule, and cost risks through applying the requirements of DOE O 413.3A, Program and Project Management for the Acquisition of Capital Assets, dated 7-28-06. Canceled by DOE G 413.3-7A, dated 1-12-11. Does not cancel other directives.

  18. BUILDING MANAGEMENT & RESTRICTED ACCESS

    E-Print Network [OSTI]

    Johnston, Daniel

    BUILDING MANAGEMENT & RESTRICTED ACCESS Plan Annex 2014 VIII #12;#12;#12;The University of Texas at Austiniv #12;Building Management & Restricted Access Plan Annex v CONTENTS RECORD OF CHANGES .......................................................................................................15 J. BUILDING SECURITY OPERATIONS RESTRICTED ACCESS PROCEDURES FOR BUILDINGS ON ELECTRONIC ACCESS

  19. Forest management certification

    E-Print Network [OSTI]

    Liskiewicz, Maciej

    to the Montreal Process, certification systems lay out a set of criteria for sustainable management. Consumers. Each captures unique aspects of forestry and natural- resources management, offers indoor and outdoor.va.nrcs.usda.gov NRCS's natural resources conservation programs help people reduce soil erosion, enhance water supplies

  20. HAZARDOUS WASTE MANAGEMENT REFERENCE

    E-Print Network [OSTI]

    Faraon, Andrei

    Principal Investigators 7 Laboratory Personnel 8 EH&S Personnel 8 HAZARDOUS WASTE ACCUMULATION AREAS 9 Satellite Accumulation Area 9 Waste Accumulation Facility 10 HAZARDOUS WASTE CONTAINER MANAGEMENT LabelingHAZARDOUS WASTE MANAGEMENT REFERENCE GUIDE Prepared by Environment, Health and Safety Office

  1. Managing Soybean Insects.

    E-Print Network [OSTI]

    Drees, Bastiaan M.; Way, Michael O.

    1988-01-01T23:59:59.000Z

    defoliating beetles, grasshq>pers or pod-feeding stink bugs. Use of products containing Bacillus thuringiensis re quires a different approach to insect pest management. It is rather slow acting, is much more effective on smaller worms, and performs much... TABLE OF CONTENTS Page Pest ManageDlent Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Variety Selection...

  2. Comprehensive Emergency Management System

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-01T23:59:59.000Z

    To establish policy and to assign and describe roles and responsibilities for the Department of Energy (DOE) Emergency Management System. The Emergency Management System provides the framework for development, coordination, control, and direction of all emergency planning, preparedness, readiness assurance, response, and recovery actions. Canceled by DOE O 151.1B. Cancels DOE O 151.1.

  3. Hazardous Waste Management Training

    E-Print Network [OSTI]

    Dai, Pengcheng

    records. The initial training of Hazardous Waste Management and Waste Minimization is done in a classHazardous Waste Management Training Persons (including faculty, staff and students) working before handling hazardous waste. Departments are re- quired to keep records of training for as long

  4. Energy Management Webinar Series

    Broader source: Energy.gov [DOE]

    Boost your knowledge on how to implement an energy management system through this four-part webinar series from the Superior Energy Performance program. Each webinar introduces various elements of the ISO 50001 energy management standard—based on the Plan-Do-Check-Act approach—and the associated steps of DOE's eGuide for ISO 50001 software tool.

  5. OPERATIONS MANAGEMENT Spring 2008

    E-Print Network [OSTI]

    Almor, Amit

    the operations and supply chain strategy. This survey course in operations management introduces students1 MGSC 395 OPERATIONS MANAGEMENT Spring 2008 Course Syllabus Instructor: Professor Anand Nair Class MATERIALS Required Text Books Textbook: Krajewski, Lee, Ritzman, Larry, and Malhotra, Manoj. Operations

  6. DRAFT Fifteenmile Management Plan 5. Fifteenmile Subbasin Management Plan

    E-Print Network [OSTI]

    DRAFT Fifteenmile Management Plan 5. Fifteenmile Subbasin Management Plan DRAFT May 25 2004 Group 5. FIFTEENMILE SUBBASIN MANAGEMENT PLAN............................................... 38 5.5.2. Consistency with the Clean Water Act, Total Maximum Daily Loads and Existing Water Quality

  7. PIA - Environmental Management Consolidated Business Center ...

    Office of Environmental Management (EM)

    Management Consolidated Business Center (EMCBC) PIA - Environmental Management Consolidated Business Center (EMCBC) PIA - Environmental Management Consolidated Business Center...

  8. LRRB Pavement Management Systems Pavement Management Systems

    E-Print Network [OSTI]

    Minnesota, University of

    Survey: who is using what · Details about specific software/use · Case studies #12;Report (continued) Key Outcome ­ Matrix #12;Report (continued) Key Outcome ­ Case Studies (15 agencies) § Various levels of use Pavement Management Systems Workshop outline 1. Overview 2. Benefits 3. Elements 4. Case Studies 5

  9. User Guide Remote Access to VDI/Workplace Using RSA

    Office of Environmental Management (EM)

    benefits include the following. * Full-featured Microsoft Outlook client * Microsoft Word, Excel, and other Microsoft Office applications * Network files, such as the N, O, and...

  10. U-090: RSA enVision Discloses Environment Variable Information...

    Broader source: Energy.gov (indexed) [DOE]

    CVE-2011-4143 SecurityTracker Alert ID: 1026591 Secunia Advisory IMPACT ASSESSMENT: Medium Discussion: The security issue is caused due to the application disclosing certain...

  11. Exploratory Group Problem: RSA Encryption November 5, 2008

    E-Print Network [OSTI]

    Stange, Katherine E.

    result and you shouldn't use any more advanced functions). To do this, you will need to develop some. (b) How many invertible elements are there in ZN where N = pq is a product of two primes? Explain why of multiplicatively invertible elements of ZN , and the size of the subgroup generated by x. 1 #12;(c) Calculate

  12. Line Management Perspective: Office of Environmental Management (EM)

    Broader source: Energy.gov [DOE]

    Slide Presentation by Matthew Moury, Deputy Assistant Secretary for Safety, Security and Quality Programs, Office of Environmental Management. EFCOG Integrated Safety Management Work Planning and Control.

  13. Weed Management Costs, Weed Best Management Practices, and The Roundup Ready Weed Management Program

    E-Print Network [OSTI]

    Mitchell, Paul D.

    substantially increase weed management costs and so discourage adoption. This paper uses survey results: glyphosate, resistance management, BMP adoption, telephone survey, herbicide #12;2 INTRODUCTION Roundup ReadyWeed Management Costs, Weed Best Management Practices, and The Roundup Ready® Weed Management

  14. Fleet Management | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Fleet management includes commercial and agency owned motor vehicles such as cars, vans, trucks, and buses. Fleet (vehicle) management at the headquarters level includes a range of...

  15. Georgia Hazardous Waste Management Act

    Broader source: Energy.gov [DOE]

    The Georgia Hazardous Waste Management Act (HWMA) describes a comprehensive, Statewide program to manage hazardous wastes through regulating hazardous waste generation, transportation, storage,...

  16. An Identity and Certificate Manager

    E-Print Network [OSTI]

    Wu, Brian C

    2007-01-01T23:59:59.000Z

    We have designed and implemented a software library, called Identity and Certificate Manager (ICM), for managing, using, and exchanging application-level usernames, users' digital certificates, and cryptographic ...

  17. Fleet Management | Department of Energy

    Energy Savers [EERE]

    DOE Fleet Management Contact your Fleet manager for access to these systems Federal Automotive Statistical Tool (FAST): Supports EPAct of 1992 requirements , the Energy...

  18. Asset management solutions To support your agency's mission

    E-Print Network [OSTI]

    readiness and accountability, including work management, inventory management, service management, contract and service management functions. Work management Inventory management Procurement management ServiceAsset management solutions To support your agency's mission IBM Maximo® Asset Management

  19. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2014-10-15T23:59:59.000Z

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  20. Radioactive Waste Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-07-09T23:59:59.000Z

    This Manual further describes the requirements and establishes specific responsibilities for implementing DOE O 435.1, Radioactive Waste Management, for the management of DOE high-level waste, transuranic waste, low-level waste, and the radioactive component of mixed waste. The purpose of the Manual is to catalog those procedural requirements and existing practices that ensure that all DOE elements and contractors continue to manage DOE's radioactive waste in a manner that is protective of worker and public health and safety, and the environment. Does not cancel other directives.

  1. Conservation and drought management 

    E-Print Network [OSTI]

    Finch, Calvin

    2012-01-01T23:59:59.000Z

    management are related, but they are not the same. Water conservation is a long-term e#27;ort to reduce the amount of water it takes to manufacture goods, manage households and care for landscapes. Drought management is water-use rules initiated to deal... using less water comes only if people caring for the landscape choose to use the right amount of water at the right time to take advantage of the plants? capabilities. Water purveyors can conserve water with good maintenance and leak repair...

  2. Information Technology Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-12-23T23:59:59.000Z

    The Order identifies the objectives, components, and responsibilities for implementing processes to ensure the effective management of information and information systems within the Department. Cancels DOE O 200.1.

  3. Management of Nuclear Materials

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1994-05-26T23:59:59.000Z

    To establish requirements and procedures for the management of nuclear materials within the Department of Energy (DOE). Cancels DOE 5660.1A. Canceled by DOE O 410.2.

  4. Resources for Fleet Managers

    Broader source: Energy.gov [DOE]

    Fleet managers will benefit from the lower fuel costs, more reliable fuel prices, and lower emissions that come from using alternative fuels and advanced technologies made possible through the work...

  5. APS Building Managers

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Building Managers BUILDING CONTACT 400,401,402,411,412,413,415,420,431-436,438 Steven Downey 450 Glenn Kailus 382 Joe Gagliano 378 Ed Theres 314 Ed Russell...

  6. Contract/Project Management

    Broader source: Energy.gov (indexed) [DOE]

    EVM Systems: Post CD-3, (greater than 20 million). 95%* 94% EVM represents Earned Value Management. Certified FPD's at CD-1: Projects have certified FPDs no later than CD-1....

  7. Contract/Project Management

    Energy Savers [EERE]

    EVM Systems: Post CD-3, (greater than 20 million). 95%* 98% EVM represents Earned Value Management. Certified FPD's at CD-1: Projects have certified FPDs no later than CD-1....

  8. Contract/Project Management

    Office of Environmental Management (EM)

    EVM Systems: Post CD-3, (greater than 20 million). 95%* 100% EVM represents Earned Value Management. Certified FPD's at CD-1: Projects have certified FPDs no later than CD-1....

  9. Contract/Project Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    EVM Systems: Post CD-3, (greater than 20 million). 95%* 96% EVM represents Earned Value Management. Certified FPD's at CD-1: Projects have certified FPDs no later than CD-1....

  10. Project Management Lessons Learned

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-05T23:59:59.000Z

    The guide supports DOE O 413.3A, Program and Project Management for the Acquisition of Capital Assets, and aids the federal project directors and integrated project teams in the execution of projects.

  11. Human Resource Management Delegation

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1996-06-28T23:59:59.000Z

    The notice is to clarifies and updates existing Human Resource Management Delegation Authorities and the levels to which they are delegated. Expired 6-28-97. Does not cancel any directives.

  12. Load Management Made Simple

    E-Print Network [OSTI]

    Schneider, K.

    1985-01-01T23:59:59.000Z

    Up until the 1970's electric utilities were basically in a supply side management mode, in which plants were built to serve whatever demand customers required. However in the last 10- 15 years, many utilities, including Texas Utilities Electric...

  13. Manager, Carlsbad Field Office

    Broader source: Energy.gov [DOE]

    The U.S. Department of Energy (DOE), Office of Environmental Management (EM), Carlsbad Field Office (CBFO) is seeking a highly experienced and motivated executive-minded individual to fill its...

  14. Office of Information Management

    Broader source: Energy.gov [DOE]

    The Office of Information Management provides a broad range of information technology services in support of the Associate Under Secretary for the Office of Environment, Health, Safety and Security (AU).

  15. Lawn Water Management 

    E-Print Network [OSTI]

    McAfee, James

    2006-06-26T23:59:59.000Z

    Water is a limited resource in Texas. This booklet explains how homeowners can establish a water management program for a home lawn that both maintains a healthy sod and also conserves water. The publication discusses soil types, grass varieties...

  16. Hazardous Waste Management (Arkansas)

    Broader source: Energy.gov [DOE]

    The Hazardous Waste Program is carried out by the Arkansas Department of Environmental Quality which administers its' program under the Hazardous Waste management Act (Arkansas Code Annotated 8-7...

  17. Hazardous Waste Management (Delaware)

    Broader source: Energy.gov [DOE]

    The act authorizes the Delaware Department of Natural Resources and Environment Control (DNREC) to regulate hazardous waste and create a program to manage sources of hazardous waste. The act...

  18. Solid Waste Management (Kansas)

    Broader source: Energy.gov [DOE]

    This act aims to establish and maintain a cooperative state and local program of planning and technical and financial assistance for comprehensive solid waste management. No person shall construct,...

  19. Lawn Water Management

    E-Print Network [OSTI]

    McAfee, James

    2006-06-26T23:59:59.000Z

    Water is a limited resource in Texas. This booklet explains how homeowners can establish a water management program for a home lawn that both maintains a healthy sod and also conserves water. The publication discusses soil types, grass varieties...

  20. Headquarters Personal Property Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-10-25T23:59:59.000Z

    To establish procedures for managing Government personal property owned or leased by the Department of Energy and in the custody of DOE Headquarters employees, including those in the National Nuclear Security Administration. Cancels DOE HQ O 580.1A

  1. "Managing Department Climate Change"

    E-Print Network [OSTI]

    Sheridan, Jennifer

    "Managing Department Climate Change" #12;Presenters · Ronda Callister Professor, Department Department Climate? · Assesment is essential for determining strategies for initiating change · In a research climate · Each panelist will describe an intervention designed to improve department climate ­ Ronda

  2. Groundwater Protection Management Program

    SciTech Connect (OSTI)

    Wells, D.G.

    1999-10-20T23:59:59.000Z

    This document will be a useful reference for those engaged in groundwater protection and management. This document presents a great deal of detail while still addressing the larger issues.

  3. Transportation Management Workshop: Proceedings

    SciTech Connect (OSTI)

    Not Available

    1993-10-01T23:59:59.000Z

    This report is a compilation of discussions presented at the Transportation Management Workshop held in Gaithersburg, Maryland. Topics include waste packaging, personnel training, robotics, transportation routing, certification, containers, and waste classification.

  4. Facility Manager Primary Purpose

    E-Print Network [OSTI]

    Saskatchewan, University of

    for required goods or services to achieve maximum value for money; b. managing supplier/contractor performance, including employee qualifications, training and developing staff, performance evaluation, and related areas

  5. Streamside Management Zones (Montana)

    Broader source: Energy.gov [DOE]

    This chapter sets streamside management zones as encompassing a strip at least 50 feet wide on each side of a stream, lake, or other body of water, measured from the ordinary high-water mark, and...

  6. Strategic Energy Management

    Broader source: Energy.gov [DOE]

    The U.S. Department of Energy (DOE) See Action Network and Weatherization and Intergovernmental Program Technical Assistance Program sponsored this webinar about strategic management in the public sector on November 7, 2012.

  7. Towards CORBAbased Enterprise Management: Managing CORBAbased Systems with SNMP Platforms

    E-Print Network [OSTI]

    of different management architectures. The aim of the work described in this paper con­ sists in helping1 Towards CORBA­based Enterprise Management: Managing CORBA­based Systems with SNMP Platforms, CA, USA, November 1998 Abstract--- Apart from the well established OSI/TMN and Internet management

  8. Annex 2 Risk Management Guidance and Template SPO Project Management

    E-Print Network [OSTI]

    1 Annex 2 ­ Risk Management Guidance and Template SPO Project Management Guidance on Risk Management Introduction Risk is any action or event that affects a project's ability to achieve its on cost, schedule and technical performance. However, with appropriate procedures, risks can be managed

  9. Information Technology and Management Department of Information Technology and Management

    E-Print Network [OSTI]

    Heller, Barbara

    Information Technology and Management Department of Information Technology and Management Daniel F Chicago, IL 60616 appliedtech.iit.edu/information-technology-and- management Dean and Chair: C. Robert in the information technology and cyber security fields. The Information Technology and Management degrees apply

  10. Archives & Records Management Bulletin UW-Madison Records Management Program

    E-Print Network [OSTI]

    Sheridan, Jennifer

    1 Archives & Records Management Bulletin UW-Madison Records Management Program A Periodical Responsibilities and University Records Information technology has effectively made all of us records managers. The Campus Records Review Group and University Records Management Program are concerned and would like

  11. Evolution and Evaluation of the Active Management Area Management Plans

    E-Print Network [OSTI]

    Fay, Noah

    Evolution and Evaluation of the Active Management Area Management Plans FINAL January 2008 Sharon B with a grant from the Arizona Water Institute and by the Arizona Department of Water Resources #12;Evolution 1 Methodology 2 Management Plan Purpose and Intent 4 Evolution and Evaluation of the Management Plan

  12. Radioactive Waste Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-07-09T23:59:59.000Z

    This Manual further describes the requirements and establishes specific responsibilities for implementing DOE O 435.1, Radioactive Waste Management, for the management of DOE high-level waste, transuranic waste, low-level waste, and the radioactive component of mixed waste. Change 1 dated 6/19/01 removes the requirement that Headquarters is to be notified and the Office of Environment, Safety and Health consulted for exemptions for use of non-DOE treatment facilities. Certified 1-9-07.

  13. Lithium battery management system

    DOE Patents [OSTI]

    Dougherty, Thomas J. (Waukesha, WI)

    2012-05-08T23:59:59.000Z

    Provided is a system for managing a lithium battery system having a plurality of cells. The battery system comprises a variable-resistance element electrically connected to a cell and located proximate a portion of the cell; and a device for determining, utilizing the variable-resistance element, whether the temperature of the cell has exceeded a predetermined threshold. A method of managing the temperature of a lithium battery system is also included.

  14. Feed Feeds: Managing Feeds Using Feeds

    E-Print Network [OSTI]

    Wilde, Erik; Pesenson, Igor

    2008-01-01T23:59:59.000Z

    standards can be used to manage feed metadata, making feed management available through an established API.

  15. Project Management Plan Chinese Food

    E-Print Network [OSTI]

    Igusa, Kiyoshi

    impact of this project? · Data management: How do we collect, preserve and sort all of the files? Which special equipment, facilities needed or wanted? According to http://project-management-knowledge.com/ weProject Management Plan Chinese Food According to NSF, the basic elements of a project management

  16. CALIFORNIA STATE UNIVERSITY, RISK MANAGEMENT

    E-Print Network [OSTI]

    de Lijser, Peter

    CALIFORNIA STATE UNIVERSITY, FULLERTON RISK MANAGEMENT ANNUAL REPORT January 2008 OFFICE OF UNIVERSITY RISK MANAGEMENT CP-320 714-278-7346 #12;2006 ­ 2007 Risk Management Annual Report Page 2 I. Executive Summary A. Program Cost One method to assess the effectiveness of the University's risk management

  17. Eighth Annual Risk Management Conference

    E-Print Network [OSTI]

    Chaudhuri, Sanjay

    Eighth Annual Risk Management Conference Risk Management Amidst Global Rebalancing 10 ­ 11 July 2014, Singapore The Risk Management Institute (RMI) at the National University of Singapore invites submissions for its 8th annual conference on risk management in Singapore on 10 and 11 July 2014. We

  18. CALIFORNIA STATE UNIVERSITY, RISK MANAGEMENT

    E-Print Network [OSTI]

    de Lijser, Peter

    CALIFORNIA STATE UNIVERSITY, FULLERTON RISK MANAGEMENT ANNUAL REPORT November 2006 OFFICE OF UNIVERSITY RISK MANAGEMENT LH-806C 714-278-7346 #12;2005 ­ 2006 Risk Management Annual Report Page 2 I. Executive Summary A. Program Cost One method to assess the effectiveness of the University's risk management

  19. CALIFORNIA STATE UNIVERSITY, RISK MANAGEMENT

    E-Print Network [OSTI]

    de Lijser, Peter

    CALIFORNIA STATE UNIVERSITY, FULLERTON RISK MANAGEMENT ANNUAL REPORT November 2005 OFFICE OF UNIVERSITY RISK MANAGEMENT LH-806C 714-278-7346 #12;2004 ­ 2005 Risk Management Annual Report Page 2 I. Introduction The Office of University Risk Management provides resources, advice and training that allow

  20. Assistant Director, Prospect Management Description

    E-Print Network [OSTI]

    Portman, Douglas

    and to the Prospect Management Data Wranglers to assist their efforts in improving the quality of Prospect Management Management · Enter and monitor prospect assignments and new prospect records requests. · Monitor data quality of all functions and systems related to prospect management, including software applications, industry

  1. Energy Management Issued: June 2010

    E-Print Network [OSTI]

    Energy Management Policy Issued: June 2010 Revised: Responsible Administrative Unit: Finance.0 BACKGROUND AND PURPOSE The Engineering and Energy Management division of the Department of Facilities Management at the Colorado School of Mines ("Mines" or "the school") has developed an Energy Management

  2. Information & Records Management Process Manual

    E-Print Network [OSTI]

    Hickman, Mark

    several significant failures to manage information in the public sector in New Zealand, which the Official Information, Privacy, Copyright and Public Records Acts. How you manage UC informationInformation & Records Management Process Manual 2013Information and Records Management #12;Contents

  3. PRINCIPLES OF ARCHIVES & RECORDS MANAGEMENT

    E-Print Network [OSTI]

    New Mexico, University of

    PRINCIPLES OF ARCHIVES & RECORDS MANAGEMENT Archives and records management is based upon." The basic unit used in all discussions of records management and all records retention and disposi- tion of a record series is known as "appraisal," the second basic principle of records management. Appraisal

  4. RECYCLING AND GENERAL WASTE MANAGEMENT OPERATIONAL PROCEDURE

    E-Print Network [OSTI]

    Harman, Neal.A.

    RECYCLING AND GENERAL WASTE MANAGEMENT OPERATIONAL PROCEDURE Swansea University Estates Services.6.1/1 Recycling & General Waste Management Department: Estates & Facilities Management Site: Swansea University recycling and waste management facilities in Swansea university To ensure that Waste Management Objectives

  5. UNC Charlotte Government Property Management Plan 1 Government Property Management Plan

    E-Print Network [OSTI]

    Howitt, Ivan

    . MANAGEMENT AND ACQUISITION Under the University's property management system, the Materials ManagementUNC Charlotte Government Property Management Plan 1 Government Property Management Plan Initially approved: 21 October 2011 Updated: August 24, 2012 SCOPE This Government Property Management Plan applies

  6. Certified records manager exam

    SciTech Connect (OSTI)

    Not Available

    1990-01-01T23:59:59.000Z

    The Institute of Certified Records Managers (ICRM) is a non-profit, certifying organization of professional records managers and administrators. ICRM members are experienced in information requirements, records and information systems, and the related office systems and technologies. All members have met certification requirements and have received the Certified Records Manager (CRM) designation. As the field of information and records management moves toward standardization, and as the application of new technologies and technicalities complicate the measurement and demonstration of professional competence, the need for a means of identifying persons who have basic competency increases. The ICRM is providing such a means by testing and certifying basic knowledge. More and more job announcements are requiring this evidence of competency. Unfortunately, as an organization, NIRMA has a relatively small number of CRMs. The goal of the ICRM Development Group is two-fold; (1) to encourage NIRMA members to obtain their certification by providing basic information and support and; (2) to develop the Nuclear Specialist test module which will demonstrate that bearers have demonstrated expertise in nuclear records management as well as basic competencies. This report covers the examination process.

  7. Oil field management system

    DOE Patents [OSTI]

    Fincke, James R.

    2003-09-23T23:59:59.000Z

    Oil field management systems and methods for managing operation of one or more wells producing a high void fraction multiphase flow. The system includes a differential pressure flow meter which samples pressure readings at various points of interest throughout the system and uses pressure differentials derived from the pressure readings to determine gas and liquid phase mass flow rates of the high void fraction multiphase flow. One or both of the gas and liquid phase mass flow rates are then compared with predetermined criteria. In the event such mass flow rates satisfy the predetermined criteria, a well control system implements a correlating adjustment action respecting the multiphase flow. In this way, various parameters regarding the high void fraction multiphase flow are used as control inputs to the well control system and thus facilitate management of well operations.

  8. Uranium Mill Tailings Management

    SciTech Connect (OSTI)

    Nelson, J.D.

    1982-01-01T23:59:59.000Z

    This book presents the papers given at the Fifth Symposium on Uranium Mill Tailings Management. Advances made with regard to uranium mill tailings management, environmental effects, regulations, and reclamation are reviewed. Topics considered include tailings management and design (e.g., the Uranium Mill Tailings Remedial Action Project, environmental standards for uranium mill tailings disposal), surface stabilization (e.g., the long-term stability of tailings, long-term rock durability), radiological aspects (e.g. the radioactive composition of airborne particulates), contaminant migration (e.g., chemical transport beneath a uranium mill tailings pile, the interaction of acidic leachate with soils), radon control and covers (e.g., radon emanation characteristics, designing surface covers for inactive uranium mill tailings), and seepage and liners (e.g., hydrologic observations, liner requirements).

  9. Computer memory management system

    DOE Patents [OSTI]

    Kirk, III, Whitson John (Greenwood, MO)

    2002-01-01T23:59:59.000Z

    A computer memory management system utilizing a memory structure system of "intelligent" pointers in which information related to the use status of the memory structure is designed into the pointer. Through this pointer system, The present invention provides essentially automatic memory management (often referred to as garbage collection) by allowing relationships between objects to have definite memory management behavior by use of coding protocol which describes when relationships should be maintained and when the relationships should be broken. In one aspect, the present invention system allows automatic breaking of strong links to facilitate object garbage collection, coupled with relationship adjectives which define deletion of associated objects. In another aspect, The present invention includes simple-to-use infinite undo/redo functionality in that it has the capability, through a simple function call, to undo all of the changes made to a data model since the previous `valid state` was noted.

  10. Radioactive Waste Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-07-09T23:59:59.000Z

    This Manual further describes the requirements and establishes specific responsibilities for implementing DOE O 435.1, Radioactive Waste Management, for the management of DOE high-level waste, transuranic waste, low-level waste, and the radioactive component of mixed waste. Change 1 dated 6/19/01 removes the requirement that Headquarters is to be notified and the Office of Environment, Safety and Health consulted for exemptions for use of non-DOE treatment facilities. Certified 1-9-07. Admin Chg 2, dated 6-8-11, cancels DOE M 435.1-1 Chg 1.

  11. Earned Value Management

    E-Print Network [OSTI]

    Ferguson, J

    2002-01-01T23:59:59.000Z

    Earned Value Management is a methodology used to measure and communicate the real physical progress of a project and show its true cost situation. This tool was developed by the US Department of Defense in 1967 and later used successfully for monitoring DOE projects, in particular the US LHC accelerator project. A clear distinction must be made between an earned value management system and other tools under consideration or already existing at CERN which permit accurate predictions of the amount and date of future payments or a detailed follow up of contracts.

  12. Manage Your Time 

    E-Print Network [OSTI]

    White, Lynn

    2000-06-27T23:59:59.000Z

    , you expect unused time to come around again, so that when the same opportunities appear you will be wiser about how to use it. Consider how your cultural background af_fects the w ay you plan and manage time. W *Both cited in Bauer, J. It?s Time.... Effective time management means decid- ing which activity should be done from all the possibilities available, and then doing it. It is a matter of setting priorities. Deciding which jobs are most important and working on those may be better than doing less...

  13. NS&T MANAGEMENT OBSERVATIONS

    SciTech Connect (OSTI)

    Gianotto, David

    2014-06-01T23:59:59.000Z

    The INL Management Observation Program (MOP) is designed to improve managers and supervisors understanding of work being performed by employees and the barriers impacting their success. The MOP also increases workers understanding of managements’ expectations as they relate to safety, security, quality, and work performance. Management observations (observations) are designed to improve the relationship and trust between employees and managers through increased engagement and interactions between managers and researchers in the field. As part of continuous improvement, NS&T management took initiative to focus on the participation and quality of observations in FY 14. This quarterly report is intended to (a) summarize the participation and quality of management’s observations, (b) assess observations for commonalities or trends related to facility or process barriers impacting research, and (c) provide feedback and make recommendations for improvements NS&T’s MOP.

  14. Managing projects utilizing self-managed teams and managerial toolkits

    E-Print Network [OSTI]

    Mathur, Praveen, S. M. Massachusetts Institute of Technology

    2009-01-01T23:59:59.000Z

    Project Management is an essential function in most software companies today. With increasing complexity and inter connectivity between software projects, it is not surprising that managing such large scale development ...

  15. BEST PAPER PROCEEDING ACADEMY OF MANAGEMENT Technology and Innovation Management

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    BEST PAPER PROCEEDING ACADEMY OF MANAGEMENT Technology and Innovation Management Philadelphia, 6 FOURCADE ESCP-EAP, Paris ABSTRACT How firms combine incremental and radical innovation? The ambidextrous exploring new businesses and technologies (Dougherty, 1992 ; Leonard-Barton, 1992). Several organizational

  16. Integrated Safety Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-04-25T23:59:59.000Z

    The order ensures that DOE/NNSA, systematically integrates safety into management and work practices at all levels, so that missions are accomplished efficiently while protecting the workers, the public, and the environment. Cancels DOE M 450.4-1 and DOE M 411.1-1C

  17. Gas Cylinders: Proper Management

    E-Print Network [OSTI]

    Boyer, Elizabeth W.

    Compressed Gas Cylinders: Proper Management And Use Published by the Office of Environment, Health;1 Introduction University of California, Berkeley (UC Berkeley) departments that use compressed gas cylinders (MSDS) and your department's Job Safety Analyses (JSAs). Talk to your gas supplier about hands

  18. Integrated Safety Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-04-25T23:59:59.000Z

    The policy establishes DOE's expectation for safety, including integrated safety management that will enable the Department’s mission goals to be accomplished efficiently while ensuring safe operations at all departmental facilities and activities. Cancels DOE P 411.1, DOE P 441.1, DOE P 450.2A, DOE P 450.4, and DOE P 450.7

  19. Comprehensive Irrigation Management 

    E-Print Network [OSTI]

    Cook, K.

    2011-01-01T23:59:59.000Z

    ? Commoditized relationships ? Disconnect with conservation investments & sustainable water savings ? High turnover rates among property managers and landscape contractors ? Economic pressures on operating expense to maintain system integrity Result... for conserving water ? Irrigation manufactures disputed claims regarding documentable savings ? Irrigation professionals blamed for excessive application ? Regulatory agencies not accountable ? Water utilities imposing restrictions & blaming landscapes...

  20. Facilities Management Field Services

    E-Print Network [OSTI]

    Hickman, Mark

    Facilities Management Field Services FieldStationsAnnualReport2006 #12;Cover Photo by Dr Mark Jermy coast #12; Introduction A very wet Steve Weaver emerges from the river. Ah, field work! The Government broadband, at least there is now an alternative to the telephone line. Electrical power spikes (and outages

  1. Position Management and Classification

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-04-01T23:59:59.000Z

    The order establishes departmental requirements and responsibilities for classifying positions using general schedule (GS) and federal wage system (FWS) standards and for developing and administering a sound position management and classification program within the Department. Cancels Chapter VII of DOE O 320.1.

  2. Purge water management system

    DOE Patents [OSTI]

    Cardoso-Neto, Joao E. (North Augusta, SC); Williams, Daniel W. (Aiken, SC)

    1996-01-01T23:59:59.000Z

    A purge water management system for effectively eliminating the production of purge water when obtaining a groundwater sample from a monitoring well. In its preferred embodiment, the purge water management system comprises an expandable container, a transportation system, and a return system. The purge water management system is connected to a wellhead sampling configuration, typically permanently installed at the well site. A pump, positioned with the monitoring well, pumps groundwater through the transportation system into the expandable container, which expands in direct proportion with volume of groundwater introduced, usually three or four well volumes, yet prevents the groundwater from coming into contact with the oxygen in the air. After this quantity of groundwater has been removed from the well, a sample is taken from a sampling port, after which the groundwater in the expandable container can be returned to the monitoring well through the return system. The purge water management system prevents the purge water from coming in contact with the outside environment, especially oxygen, which might cause the constituents of the groundwater to oxidize. Therefore, by introducing the purge water back into the monitoring well, the necessity of dealing with the purge water as a hazardous waste under the Resource Conservation and Recovery Act is eliminated.

  3. ENGINEERING MANAGEMENT AND LEADERSHIP

    E-Print Network [OSTI]

    Eagar, Thomas W.

    ENGINEERING MANAGEMENT AND LEADERSHIP Where did we come from? Where are we going? How do we get · If it works but no one knows why, it's ENGINEERING #12;The scientist explains that which exists; The engineer creates that which never was. Theodore von Karman #12;Engineer - Noun (from French "to contrive

  4. Radioactive Waste Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-07-09T23:59:59.000Z

    The objective of this Order is to ensure that all Department of Energy (DOE) radioactive waste is managed in a manner that is protective of worker and public health and safety and the environment. Cancels DOE O 5820.2A. Chg 1 dated 8-28-01. Certified 1-9-07.

  5. Comprehensive Emergency Management System

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-10-29T23:59:59.000Z

    To establish policy and to assign and describe roles and responsibilities for the Department of Energy (DOE) Emergency Management System. (This is an administrative change to DOE O 151.1A). Canceled by DOE O 151.1C. Cancels DOE O 151.1A.

  6. Comprehensive Emergency Management System

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1996-08-21T23:59:59.000Z

    The Order establishes policy and assigns and describes roles and responsibilities for the DOE Emergency Management System. Cancels DOE 5500.1B, DOE 5500.2B, DOE 5500.3A, DOE 5500.4A, 5500.5A,5500.7B, 5500.8A, 5500.9A, DOE 5500.10

  7. Best Environmental Management Practices

    E-Print Network [OSTI]

    protection 3. Aesthetics Acceptable ways for managing mortality include: 1. Rendering 2. Composting 3, and composting methods recycle the nutrients. The other methods, in essence, waste the nutrients. Rendering by rendering plant vehicles and personnel. Composting Composting is the controlled aerobic biological

  8. Computing & Communications PROFILE MANAGEMENT

    E-Print Network [OSTI]

    Warkentin, Ian G.

    Computing & Communications PROFILE MANAGEMENT What is a profile? If you use a SWGC computing account, a profile will be created for you. A profile is a special file which is used to store your are provided with a default profile which is the same for all users. Any changes you then make to your working

  9. Radioactive Waste Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-07-09T23:59:59.000Z

    The objective of this Order is to ensure that all Department of Energy (DOE) radioactive waste is managed in a manner that is protective of worker and public health and safety and the environment. Cancels DOE O 5820.2A

  10. Office of Quality Management

    Broader source: Energy.gov [DOE]

    The Office of Quality Management develops and interprets Government-wide policies and procedures and conducts training to ensure the accurate identification of information and documents that must be classified or controlled under statute or Executive order to protect the national security and controlled unclassified Official Use Only information for the effective operation of the Government.

  11. Managing environmental information

    SciTech Connect (OSTI)

    Solyst, J. [Chemical Manufacturers Association, Arlington, VA (United States)

    1998-12-31T23:59:59.000Z

    The public`s right to know about environmental policy has moved to the forefront with the technological advances in recent years. Congress has not kept pace with these developments having twice considered and twice rejected legislation that is necessary in this field. Congress should provide leadership to the Environmental Protection Agency (EPA) for a broad strategy to improve information resources and management.

  12. Purge water management system

    DOE Patents [OSTI]

    Cardoso-Neto, J.E.; Williams, D.W.

    1995-01-01T23:59:59.000Z

    A purge water management system is described for effectively eliminating the production of purge water when obtaining a groundwater sample from a monitoring well. In its preferred embodiment, the purge water management system comprises an expandable container, a transportation system, and a return system. The purge water management system is connected to a wellhead sampling configuration, typically permanently installed at the well site. A pump, positioned with the monitoring well, pumps groundwater through the transportation system into the expandable container, which expands in direct proportion with volume of groundwater introduced, usually three or four well volumes, yet prevents the groundwater from coming into contact with the oxygen in the air. After this quantity of groundwater has been removed from the well, a sample is taken from a sampling port, after which the groundwater in the expandable container can be returned to the monitoring well through the return system. The purge water management system prevents the purge water from coming in contact with the outside environment, especially oxygen, which might cause the constituents of the groundwater to oxidize. Therefore, by introducing the purge water back into the monitoring well, the necessity of dealing with the purge water as a hazardous waste under the Resource Conservation and Recovery Act is eliminated.

  13. Mobile Technology Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2014-05-15T23:59:59.000Z

    The order establishes requirements, assigns responsibilities, and provides guidance for federal mobile technology management and employee use of both government furnished and personally-owned mobile devices within DOE and NNSA. Establishes requirements for use of User Agreements to govern mobile devices used for official duties. Does not cancel other directives.

  14. A bank management audit

    E-Print Network [OSTI]

    Kennemer, Hoyt Granville

    1957-01-01T23:59:59.000Z

    . Bogle Letbetter for their assistance in the preparation of this thesis. Special acknowledgement is also extended to the exec- utives of the Blank Eational Bank foz their time and. co- operation in deueloplnp answers to the questions contained..., ~ ~ ~ 49 X EXECUTIVE EVALUATION w ~ ~ ~ ~ ~ ~ ~ ~ ~ 52 XI CCNCLUSION ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ BIBLIOGRAPHY ~ o APPENDIX ~ ~ ~ ~ 1 ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ e ~ ~ ~ ~ 6) LIST OP CHAHTS Chart I, Organisation Chart of the Bank Manage- ment...

  15. Potassium & Potassium Management

    E-Print Network [OSTI]

    Balser, Teri C.

    Potassium & Potassium Management Carrie Laboski Department of Soil Science UW- Madison #12;Havlin Not irrigated #12;Environmental Factors Affecting K Availability to a Plant Soil moisture Low soil moisture moisture will increase K diffusion Increase soil moisture from 10 to 28 % can increase toatl K transport

  16. BSBA IN MANAGEMENT -HUMAN RESOURCE MANAGEMENT SPECIALIZATION ASSESSMENT PLAN

    E-Print Network [OSTI]

    Gallo, Linda C.

    BSBA IN MANAGEMENT - HUMAN RESOURCE MANAGEMENT SPECIALIZATION ASSESSMENT PLAN (REV. 7 in Human Resource Management (HRM), the goal is to provide a foundation of all areas of human resources countries. · Content Delivered in: MGT 350, MGT 405, & MGT 357. · Assessment Method: Culminating exam

  17. Project Management Plan Project Title: Natural Resources Management

    E-Print Network [OSTI]

    US Army Corps of Engineers

    DEFINITION. The NRM Gateway is a knowledge management resource, designed to serve the needs of the NRMP; · Preserve institutional knowledge; · Develop practical and agency-approved webpages that provide usefulProject Management Plan Project Title: Natural Resources Management (NRM) Gateway Website

  18. Information Technology and Management Information Technology and Management

    E-Print Network [OSTI]

    Heller, Barbara

    Information Technology and Management Information Technology and Management IIT School of Applied Technology Daniel F. and Ada L. Rice Campus 201 E. Loop Road Wheaton, IL 60187 www.iit.edu/applied tech/ Dean Technology & Management program is to educate and inform students to prepare them to assume technical

  19. Nutrient Management Module No. 13 Regulation and Management

    E-Print Network [OSTI]

    Lawrence, Rick L.

    Nutrient Management Module No. 13 Manure and Biosolids: Regulation and Management by Clain Jones is the thirteenth in a series of Extension materials designed to provide Extension agents, Certified Crop Advisers (CCAs), consultants, and producers with pertinent information on nutrient management issues. To make

  20. 4-Poster Tick Management and White-tailed Deer Management

    E-Print Network [OSTI]

    Homes, Christopher C.

    the methodologies for Integrated Wildlife Damage Management approach #12;Environmental Assessment Purpose and NeedUpdate on: 4-Poster Tick Management and White-tailed Deer Management Tim Green Environmental been on hold until present #12;Environmental Assessment Current Status: · Adopting two existing EAs - U

  1. Trust Management Considerations For the Cooperative Infrastructure Defense Framework: Trust Relationships, Evidence, and Decisions

    SciTech Connect (OSTI)

    Maiden, Wendy M.

    2009-12-01T23:59:59.000Z

    Cooperative Infrastructure Defense (CID) is a hierarchical, agent-based, adaptive, cyber-security framework designed to collaboratively protect multiple enclaves or organizations participating in a complex infrastructure. CID employs a swarm of lightweight, mobile agents called Sensors designed to roam hosts throughout a security enclave to find indications of anomalies and report them to host-based Sentinels. The Sensors’ findings become pieces of a larger puzzle, which the Sentinel puts together to determine the problem and respond per policy as given by the enclave-level Sergeant agent. Horizontally across multiple enclaves and vertically within each enclave, authentication and access control technologies are necessary but insufficient authorization mechanisms to ensure that CID agents continue to fulfill their roles in a trustworthy manner. Trust management fills the gap, providing mechanisms to detect malicious agents and offering more robust mechanisms for authorization. This paper identifies the trust relationships throughout the CID hierarchy, the types of trust evidence that could be gathered, and the actions that the CID system could take if an entity is determined to be untrustworthy.

  2. Automated Transportation Management System (ATMS) | Department...

    Broader source: Energy.gov (indexed) [DOE]

    of Energy's (DOE's) Automated Transportation Management System is an integrated web-based logistics management system allowing users to manage inbound and outbound freight...

  3. Risk Management Process Overview | Department of Energy

    Office of Environmental Management (EM)

    risk management process The cybersecurity risk management process explained in the Electricity Sector Cybersecurity Risk Management Process (RMP) Guideline has two primary...

  4. Interagency Energy Management Task Force Members

    Broader source: Energy.gov [DOE]

    The Interagency Energy Management Task Force is led by the Federal Energy Management Program director. Members include energy and sustainability managers from federal agencies.

  5. DOE Challenge Home Recommended Quality Management Provisions...

    Broader source: Energy.gov (indexed) [DOE]

    Recommended Quality Management Provisions DOE Challenge Home Recommended Quality Management Provisions DOE Challenge Home Recommended Quality Management Provisions. qm6-14-13.pdf...

  6. California cotton growers utilize integrated pest management

    E-Print Network [OSTI]

    Brodt, Sonja; Goodell, Peter B.; Krebill-Prather, Rose L.; Vargas, Ron N.

    2007-01-01T23:59:59.000Z

    a comprehensive survey of pest management decision-makingfor overall health. Surveys of pest management prac- ticespest management advice was almost universal among the survey

  7. Does Management Matter? Evidence from India

    E-Print Network [OSTI]

    Bloom, Nicholas; Eifert, Benn; Mahajan, Aprajit; McKenzie, David; Roberts, John

    2012-01-01T23:59:59.000Z

    a detailed ground- based management survey of every textileoutput markets. A2) Management survey in 2011 In 2011 weUS Census 2011 Management and Organization Survey http://

  8. Operations and Maintenance Program Management

    Broader source: Energy.gov [DOE]

    Effective management is critical to any operations and maintenance (O&M) program. The management function should bind the distinct parts of the O&M program into a cohesive entity.

  9. Waste Management | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Cleanup Waste Management Waste Management July 15, 2014 Energy Expos Students work in groups to create hands-on exhibits about the energy sources that power the nation, ways to...

  10. Environmental Management (EM) Cleanup Projects

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-09-24T23:59:59.000Z

    The guide supports DOE O 413.3A, Program and Project Management for the Acquisition of Capital Assets, and provides guidance on environmental management cleanup projects. Canceled by DOE N 251.105.

  11. Operations and Maintenance Management Support

    Broader source: Energy.gov [DOE]

    Federal operations and maintenance (O&M) programs must gain full support from management to succeed. Management understanding and buying into the program elevates O&M importance and allows...

  12. ENERGY STAR Portfolio Manager 101

    Office of Energy Efficiency and Renewable Energy (EERE)

    Join us as we introduce and demonstrate the core functionality of EPA’s ENERGY STAR Portfolio Manager tool. Attendees will learn how to: navigate Portfolio Manager; add a property and enter details...

  13. Data Management Group Annual Report

    E-Print Network [OSTI]

    Toronto, University of

    Data Management Group Annual Report 2001 prepared by: Data Management Group Joint Program..............................................................................2 Text Based Data Retrieval System `drs' ..........................................................2 Internet Browser Data Retrieval System (iDRS)..............................................3 Complex Data

  14. Data Management Group Annual Report

    E-Print Network [OSTI]

    Toronto, University of

    Data Management Group Annual Report 1999 prepared by: Data Management Group Joint Program................................................................. 1 INFORMATION PROCESSING ............................................. 2 Text Based Data Retrieval System `drs' ........................ 2 Internet Browser Data Retrieval System (iDRS) ............ 3

  15. Data Management Group Annual Report

    E-Print Network [OSTI]

    Toronto, University of

    iv Data Management Group Annual Report 2003 City of Hamilton City of Toronto GO Transit Regional of York Toronto Transit Commission The Data Management Group is a research program located ........................................................................................................ 3 Text-based Data Retrieval System `drs

  16. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08T23:59:59.000Z

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  17. Emergency Animal Management during Disasters

    E-Print Network [OSTI]

    Dement, Angela

    2006-10-23T23:59:59.000Z

    This publication explains how communities and counties can incorporate animal issues into their emergency management plans. It explains what local plans should include, what role county Extension agents can play, and how animal management plans can...

  18. Associate Vice President Facilities Management

    E-Print Network [OSTI]

    Milchberg, Howard

    Operations & Energy Services Jack Baker Executive Director Building & Landscape Maintenance Harry Teabout III Safety HVAC Systems HVAC Systems Administration/ Signs & Graphics Administration/ Signs & Graphics Piped-Campus Facilities Director Department of Engineering & Energy VACANT Energy Management Energy Management Engineering

  19. Solid Waste Management Program (Missouri)

    Broader source: Energy.gov [DOE]

    The Solid Waste Management Program in the Department of Natural Resources regulates the management of solid waste in the state of Missouri. A permit is required prior to the construction or...

  20. Southern Region Watershed Management Project

    E-Print Network [OSTI]

    Coordinators and the organization, management and activities of the Southern Region Water Quality Planning1 Southern Region Watershed Management Project September 15, 2000 to September 14, 2005 Terminal responding to water quality and conservation issues with educational assistance, technology development