Powered by Deep Web Technologies
Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

V-174: RSA Authentication Manager Writes Operating System, SNMP...  

Broader source: Energy.gov (indexed) [DOE]

SNMP, and HTTP plug-in proxy passwords. SOLUTION: The vendor has issued a fix (8.0 Patch 1 (P1)). Addthis Related Articles V-195: RSA Authentication Manager Lets Local Users...

2

V-195: RSA Authentication Manager Lets Local Users View the Administrative  

Broader source: Energy.gov (indexed) [DOE]

95: RSA Authentication Manager Lets Local Users View the 95: RSA Authentication Manager Lets Local Users View the Administrative Account Password V-195: RSA Authentication Manager Lets Local Users View the Administrative Account Password July 9, 2013 - 12:51am Addthis PROBLEM: RSA Authentication Manager Lets Local Users View the Administrative Account Password PLATFORM: RSA Authentication Manager 7.1, 8.0 ABSTRACT: A vulnerability was reported in RSA Authentication Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028742 CVE-2013-3273 RSA IMPACT ASSESSMENT: Medium DISCUSSION: When the RSA Authentication Manager Software Development Kit (SDK) is used to develop a custom application that connects with RSA Authentication Manager and the trace logging is set to verbose, the administrative account password used by the custom application is written in clear text to trace

3

V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP  

Broader source: Energy.gov (indexed) [DOE]

4: RSA Authentication Manager Writes Operating System, SNMP, 4: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files June 10, 2013 - 12:47am Addthis PROBLEM: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files PLATFORM: RSA Authentication Manager 8.0 ABSTRACT: A vulnerability was reported in RSA Authentication Manager. REFERENCE LINKS: RSA SecurityTracker Alert ID: 1028638 CVE-2013-0947 IMPACT ASSESSMENT: Medium DISCUSSION: The system may write operating system, SNMP, and HTTP plug-in proxy passwords in clear text to log and configuration files. IMPACT: A local user can obtain operating system, SNMP, and HTTP plug-in proxy

4

U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame  

Broader source: Energy.gov (indexed) [DOE]

2: RSA Authentication Manager Flaws Permit Cross-Site and 2: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other versions may also be affected. ABSTRACT: RSA Authentication Manager is prone to multiple security vulnerabilities because it fails to properly sanitize user-supplied input. Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be possible.

5

V-195: RSA Authentication Manager Lets Local Users View the Administra...  

Broader source: Energy.gov (indexed) [DOE]

can view the administrative account password SOLUTION: The vendor has issued a fix (Patch 26 (P26) for RSA Authentication Manager 7.1 Service Pack 4 (SP4) and Appliance 3.0...

6

U-212: RSA Authentication Manager Flaws Permit Cross-Site and...  

Broader source: Energy.gov (indexed) [DOE]

actions on the site acting as the target user. Solution: The vendor has issued a fix (Patch 14 (P14) for RSA Authentication Manager 7.1 SP4 and Appliance 3.0 SP4). Addthis...

7

T-659: Update support for RSA Authentication Manager | Department...  

Broader source: Energy.gov (indexed) [DOE]

Manager July 1, 2011 - 7:15am Addthis PROBLEM: Authentication Manager SP4 Patch 4 Windows Server 2008 PLATFORM: Windows Server 2008 SP4 Patch 4 32bit & 64bit...

8

V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication  

Broader source: Energy.gov (indexed) [DOE]

3: RSA Authentication Agent Lets Remote Users Bypass 3: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements PLATFORM: RSA Authentication Agent 7.1, 7.1.1 for Microsoft Windows ABSTRACT: A vulnerability was reported in RSA Authentication Agent. REFERENCE LINKS: RSA SecurCare SecurityTracker Alert ID: 1028230 CVE-2013-0931 IMPACT ASSESSMENT: Medium DISCUSSION: On systems configured for Quick PIN Unlock, the system will request a PIN instead of a full Passcode when the session is activated from an active screensaver after the Quick PIN Unlock timeout has expired. RSA Authentication Agent on Windows Vista, Windows 7, Windows 2008, and

9

V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass...

10

T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

6: RSA Adaptive Authentication Has Unspecified Remote 6: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw August 18, 2011 - 3:09pm Addthis PROBLEM: A vulnerability was reported in RSA Adaptive Authentication. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3, 6.0.2.1 SP2 and SP2 Patch 1, 6.0.2.1 SP3 ABSTRACT: An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. reference LINKS: Security Tracker: 1025956

11

T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticate...  

Broader source: Energy.gov (indexed) [DOE]

A vulnerability was reported in RSA Adaptive Authentication. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3, 6.0.2.1 SP2 and SP2 Patch 1, 6.0.2.1 SP3 ABSTRACT: An issue with...

12

V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws  

Broader source: Energy.gov (indexed) [DOE]

4: RSA Adaptive Authentication (On-Premise) Input Validation 4: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks November 27, 2012 - 2:00am Addthis PROBLEM: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks PLATFORM: RSA Adaptive Authentication (On-Premise) 6.x ABSTRACT: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). REFERENCE LINKS: SecurityTracker Alert ID: 1027811 SecurityFocus Security Alert RSA Customer Support CVE-2012-4611 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). A remote user can conduct cross-site scripting attacks. The software does not

13

U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate  

Broader source: Energy.gov (indexed) [DOE]

7: RSA Key Manager Appliance Session Logout Bug Fails to 7: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions November 4, 2011 - 8:00am Addthis PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated user session may not terminate properly. reference LINKS: SecurityTracker Alert ID: 1026276 SecurityFocus Bug Traq Seclists: ESA-2011-035 CVE-2011-2740 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in RSA Key Manager Appliance. A remote authenticated user session may not terminate properly. When using Firefox 4 and 5, an authenticated user session is not terminated properly when logging out.

14

V-223: RSA Authentication Agent for PAM Allows Remote Users to Make  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

3: RSA Authentication Agent for PAM Allows Remote Users to Make 3: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts V-223: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts August 21, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in RSA Authentication Agent for PAM PLATFORM: RSA Authentication Agent for PAM 7.0.2 and prior ABSTRACT: A remote user can make unlimited login attempts REFERENCE LINKS: Security Tracker Alert ID 1028930 CVE-2013-3271 IMPACT ASSESSMENT: Medium DISCUSSION: The system does not restrict the number of login attempts made via the agent IMPACT: System Access SOLUTION: Vendor has issued a fix Addthis Related Articles U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability

15

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

704: RSA enVision Lets Remote Users View Files and Remote 704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

16

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

4: RSA enVision Lets Remote Users View Files and Remote 4: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

17

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain  

Broader source: Energy.gov (indexed) [DOE]

1: RSA Adaptive Authentication Bugs Let Remote Users Bypass 1: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls December 14, 2011 - 8:17am Addthis PROBLEM: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may be able to bypass certain security controls. reference LINKS: SecurityTracker Alert ID: 1026420 Security Focus: ESA-2011-036 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA Adaptive Authentication (On-Premise). A remote user may be able to bypass certain security controls. A remote user can send specially crafted data elements to affect the Device

18

Deniable Authentication with RSA and Multicasting Daniel R. L. Brown  

E-Print Network [OSTI]

. Related concepts to deniable authentication are plausible deniability and prevention of surreptitious

19

Deniable Authentication with RSA and Multicasting Daniel R. L. Brown  

E-Print Network [OSTI]

of surreptitious forwarding. The IETF S/MIME protocol, which can be used to secure email, includes an Authenticated

20

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...  

Energy Savers [EERE]

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit...

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

T-640: RSA Access Manager Server CVE-2011-0322 Update | Department of  

Broader source: Energy.gov (indexed) [DOE]

0: RSA Access Manager Server CVE-2011-0322 Update 0: RSA Access Manager Server CVE-2011-0322 Update T-640: RSA Access Manager Server CVE-2011-0322 Update June 7, 2011 - 5:18pm Addthis PROBLEM: ESA-2011-009 (revised): RSA, The Security Division of EMC, announces new fix for potential security vulnerability in RSA Access Manager Server. PLATFORM: RSA Access Manager Server version 5.5.x, 6.0.x, and 6.1.x ABSTRACT: RSA strongly recommends that all customers running RSA Access Manager Server versions 5.5.3, 6.0.4, and 6.1 apply the following updated security hot fixes, which contain the resolution to this issue, at the earliest opportunity. The hot fixes can be downloaded from SecurCare Online or by contacting RSA Security Customer Support. ?Security Hot fix # 5.5.3.174 for RSA Access Manager Server version 5.5.3

22

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Broader source: Energy.gov (indexed) [DOE]

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

23

T-642: RSA SecurID update to Customers | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2: RSA SecurID update to Customers 2: RSA SecurID update to Customers T-642: RSA SecurID update to Customers June 9, 2011 - 12:45am Addthis PROBLEM: Certain characteristics of the attack on RSA indicated that the perpetrator's most likely motive was to obtain an element of security information that could be used to target defense secrets and related IP, rather than financial gain, PII, or public embarrassment. PLATFORM: RSA SecurID implementations ABSTRACT: RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products. reference LINKS: Open Letter to RSA Customers (update) CVE-2011-0322 RSA Fraud Resource Center RSA Security Practice DOE-CIRC T-640: RSA Access Manager Server CVE-2011-0322 Update

24

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Broader source: Energy.gov (indexed) [DOE]

5: RSA Access Manager Session Replay Flaw Lets Remote Users 5: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

25

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Broader source: Energy.gov (indexed) [DOE]

205: RSA Access Manager Session Replay Flaw Lets Remote Users 205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

26

V-036: EMC Smarts Network Configuration Manager Database Authentication  

Broader source: Energy.gov (indexed) [DOE]

6: EMC Smarts Network Configuration Manager Database 6: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability November 29, 2012 - 3:30am Addthis PROBLEM: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability PLATFORM: EMC Smarts Network Configuration Manager (NCM) all versions prior 9.1 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: EMC Identifier: ESA-2012-057 Secunia Advisory SA51408 SecurityTracker Alert ID: 1027812 CVE-2012-4614 CVE-2012-4615 IMPACT ASSESSMENT: Medium DISCUSSION: The systems uses a hard-coded key to encrypt authentication credentials on the target system [CVE-2012-4615]. A local user with knowledge of the key

27

T-582: RSA systems has resulted in certain information being extracted from  

Broader source: Energy.gov (indexed) [DOE]

2: RSA systems has resulted in certain information being 2: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID March 17, 2011 - 11:45pm Addthis PROBLEM: Recently EMC's security systems identified an extremely sophisticated cyber attack in progress, targeting their RSA business unit. RSA took a variety of aggressive measures against the threat to protect their business and their customers, including further hardening of their IT infrastructure. PLATFORM: RSA SecurID implementations ABSTRACT: RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

28

V-220: Juniper Security Threat Response Manager Lets Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

0: Juniper Security Threat Response Manager Lets Remote 0: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands August 17, 2013 - 4:01am Addthis PROBLEM: A remote authenticated user can execute arbitrary commands on the target system. PLATFORM: 2010.0, 2012.0, 2012.1, 2013.1 ABSTRACT: A vulnerability was reported in Juniper Security Threat Response Manager (STRM) REFERENCE LINKS: SecurityTracker Alert ID: 1028921 CVE-2013-2970 IMPACT ASSESSMENT: High DISCUSSION: A remote authenticated user can inject commands to execute arbitrary operating system commands with the privileges of the target web service. This can be exploited to gain shell access on the target device.

29

V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...  

Broader source: Energy.gov (indexed) [DOE]

Agent Discloses Node Secret Encryption Key to Local Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5...

30

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Broader source: Energy.gov (indexed) [DOE]

84: Cisco Digital Media Manager Lets Remote Authenticated Users 84: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges January 19, 2012 - 9:00am Addthis PROBLEM: A remote authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not properly validate unreferenced URLs. REFERENCE LINKS: Vendor Advisory SecurityTracker Alert ID: 1026541 CVE-2012-0329 IMPACT ASSESSMENT: medium Discussion: Cisco Show and Share is not directly affected by this vulnerability, but a user can exploit the Cisco Digital Media Manager to gain full access to Cisco Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port

31

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Broader source: Energy.gov (indexed) [DOE]

4: Cisco Digital Media Manager Lets Remote Authenticated Users 4: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges January 19, 2012 - 9:00am Addthis PROBLEM: A remote authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not properly validate unreferenced URLs. REFERENCE LINKS: Vendor Advisory SecurityTracker Alert ID: 1026541 CVE-2012-0329 IMPACT ASSESSMENT: medium Discussion: Cisco Show and Share is not directly affected by this vulnerability, but a user can exploit the Cisco Digital Media Manager to gain full access to Cisco Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port

32

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and  

Broader source: Energy.gov (indexed) [DOE]

9: RSA enVision Bugs Permit Cross-Site Scripting, SQL 9: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks March 20, 2012 - 7:00am Addthis PROBLEM: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. Reference LINKS: SecurityTracker Alert ID: 1026819 CVE-2012-0403 IMPACT ASSESSMENT: High Discussion: The system does not properly filter HTML code from user-supplied input

33

U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA®  

Broader source: Energy.gov (indexed) [DOE]

7: RSA® Authentication Agent 7.1 for Microsoft Windows® and 7: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability September 25, 2012 - 6:00am Addthis PROBLEM: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability PLATFORM: Product: RSA Authentication Agent for Microsoft Windows version 7.1 Platforms: Windows XP and Windows 2003 Product: RSA Authentication Client 3.5 Platforms: Windows XP and Windows 2003 ABSTRACT: RSA Authentication Agent Lets Remote Authenticated Users Bypass an Authentication Step reference LINKS: SecurityTracker Alert ID: 1027559 Bugtraq ID: 55662

34

TwoKind Authentication: Usable Authenticators for Untrustworthy Environments  

E-Print Network [OSTI]

damage if the session or their password is compromised. 1. INTRODUCTION In today's Internet. Current authentication mechanisms such as one-time passwords [4] (such as RSA SecurID [3]) and privileged-time passwords limit the damage caused by stolen passwords, but allow full-scale damage in a hijacked session

Smith, Sean W.

35

Using Two-Factor RSA Token  

Broader source: Energy.gov (indexed) [DOE]

Using Two-Factor RSA Token Using Two-Factor RSA Token with VPN User Guide November 2013 Using Your RSA token with WebVPN 1. Establish a connection to the Internet and connect to https://connect.doe.gov 2. Users who are using their RSA Token for the first time should follow the steps below for PIN creation. Others who have already set up their PIN and used their RSA token previously should enter their six digit numeric username and passcode; this is the PIN + the RSA token code. The result of this successful login will be Step 8 below. 3. A login page similar to the picture below will be displayed. Enter your VPN Username (six-digit numeric ID) and your Password by typing your generated RSA Token code and then click the Login button. Example; your generated RSA token code is 032848 (from above). In the Password box, you will enter

36

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass...  

Broader source: Energy.gov (indexed) [DOE]

Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may...

37

T-582: RSA systems has resulted in certain information being...  

Broader source: Energy.gov (indexed) [DOE]

certain information being extracted from RSA systems that relates to RSA SecurID March 17, 2011 - 11:45pm Addthis PROBLEM: Recently EMC's security systems identified an extremely...

38

MOTOR VEHICLE (Pursuant to RSA 260:14)  

E-Print Network [OSTI]

permitted pursuant to RSA 260:14, V (a ), other than for bulk distribution for surveys, marketing/I.D. #: _________________________________ Vehicle Identification #: _________________________________ Last Known Address/Town _______________________________ Other Identification Information: ________________________ ***Reverse Side Must Be Completed Before

New Hampshire, University of

39

U-090: RSA enVision Discloses Environment Variable Information...  

Broader source: Energy.gov (indexed) [DOE]

and other fixes can be found in the Release Notes associated with RSA enVision 4.1, Patch 3 and enVision V4.0 Service Pack 4 Patch 5. Impact: Exposure of sensitive information...

40

Two-Factor Authentication  

Broader source: Energy.gov [DOE]

Two-Factor Authentication (2FA) is a system wherein two different methods are used to authenticate an individual. 2FA is based on something you know (a secret PIN) and something you have (an...

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Multi-factor authentication  

DOE Patents [OSTI]

Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

Hamlet, Jason R; Pierson, Lyndon G

2014-10-21T23:59:59.000Z

42

Authentication ofAuthentication ofAuthentication ofAuthentication of Degree Certificates Application Form Name in Full  

E-Print Network [OSTI]

Authentication ofAuthentication ofAuthentication ofAuthentication of Degree Certificates Application Form Name in Full Name in Full as Registered at King's Date of Birth Student ID number (IE degree certificate copies for authentication to: PLEASE REMEMBER TO INCLUDE COPIES OF YOUR CERTIFICATE(S

Applebaum, David

43

Fault-Based Attack of RSA Authentication Andrea Pellegrini, Valeria Bertacco and Todd Austin  

E-Print Network [OSTI]

a straightforward design architecture that en- tails a small silicon footprint and low-power profile. Our research enviromental manipulations. Our fault-based attack can be succ

Austin, Todd M.

44

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

3: RSA SecurID Software Token for Windows DLL Loading Error 3: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code December 16, 2011 - 8:00am Addthis PROBLEM: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code. PLATFORM: RSA SecurID Software Token 4.1 for Microsoft Windows ABSTRACT: A remote user can cause the target application to execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026426 ESA-2011-039 Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA SecurID Software Token. A remote user

45

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

63: RSA SecurID Software Token for Windows DLL Loading Error 63: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code December 16, 2011 - 8:00am Addthis PROBLEM: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code. PLATFORM: RSA SecurID Software Token 4.1 for Microsoft Windows ABSTRACT: A remote user can cause the target application to execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026426 ESA-2011-039 Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA SecurID Software Token. A remote user

46

U-120: RSA SecurID Software Token Converter Unspecified Buffer Overflow  

Broader source: Energy.gov (indexed) [DOE]

0: RSA SecurID Software Token Converter Unspecified Buffer 0: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability U-120: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability March 8, 2012 - 7:00am Addthis PROBLEM: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability PLATFORM: RSA SecurID Software Token Converter 2.x ABSTRACT: Successful exploitation may allow execution of arbitrary code. reference LINKS: Secunia Advisory SA48297 CVE-2012-0397 IMPACT ASSESSMENT: High Discussion: A vulnerability has been reported in RSA SecurID Software Token Converter, which can be exploited by malicious people to compromise a user's system. Impact: An unspecified error can be exploited to cause a buffer overflow. Solution: Update to version 2.6.1. Addthis Related Articles

47

E-Print Network 3.0 - authenticated key agreement Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for authentication and managing and secret-key based proce... . An ... Source: Brunato, Mauro - Dipartimento di Ingegneria e Scienza dell'Informazione, Universit di Trento...

48

Authentication of quantum messages.  

SciTech Connect (OSTI)

Authentication is a well-studied area of classical cryptography: a sender A and a receiver B sharing a classical private key want to exchange a classical message with the guarantee that the message has not been modified or replaced by a dishonest party with control of the communication line. In this paper we study the authentication of messages composed of quantum states. We give a formal definition of authentication in the quantum setting. Assuming A and B have access to an insecure quantum channel and share a private, classical random key, we provide a non-interactive scheme that both enables A to encrypt and authenticate (with unconditional security) an m qubit message by encoding it into m + s qubits, where the probability decreases exponentially in the security parameter s. The scheme requires a private key of size 2m + O(s). To achieve this, we give a highly efficient protocol for testing the purity of shared EPR pairs. It has long been known that learning information about a general quantum state will necessarily disturb it. We refine this result to show that such a disturbance can be done with few side effects, allowing it to circumvent cryptographic protections. Consequently, any scheme to authenticate quantum messages must also encrypt them. In contrast, no such constraint exists classically: authentication and encryption are independent tasks, and one can authenticate a message while leaving it publicly readable. This reasoning has two important consequences: On one hand, it allows us to give a lower bound of 2m key bits for authenticating m qubits, which makes our protocol asymptotically optimal. On the other hand, we use it to show that digitally signing quantum states is impossible, even with only computational security.

Barnum, Howard; Crpeau, Jean-Claude; Gottesman, D. (Daniel); Smith, A. (Adam); Tapp, Alan

2001-01-01T23:59:59.000Z

49

QKD Quantum Channel Authentication  

E-Print Network [OSTI]

Several simple yet secure protocols to authenticate the quantum channel of various QKD schemes, by coupling the photon sender's knowledge of a shared secret and the QBER Bob observes, are presented. It is shown that Alice can encrypt certain portions of the information needed for the QKD protocols, using a sequence whose security is based on computational-complexity, without compromising all of the sequence's entropy. It is then shown that after a Man-in-the-Middle attack on the quantum and classical channels, there is still enough entropy left in the sequence for Bob to detect the presence of Eve by monitoring the QBER. Finally, it is shown that the principles presented can be implemented to authenticate the quantum channel associated with any type of QKD scheme, and they can also be used for Alice to authenticate Bob.

J. T. Kosloski

2006-04-02T23:59:59.000Z

50

V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass  

Broader source: Energy.gov (indexed) [DOE]

4: EMC RSA Archer GRC Open Redirection Weakness and Security 4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September 4, 2013 - 6:00am Addthis PROBLEM: A weakness and a security issue have been reported in EMC RSA Archer GRC PLATFORM: EMC RSA Archer GRC 5.x ABSTRACT: This fixes multiple vulnerabilities, which can be exploited to bypass certain security restrictions and to conduct spoofing attacks REFERENCE LINKS: Secunia Advisory SA54717 SecurityTracker Alert ID 1028971 EMC Identifier: ESA-2013-057 CVE-2013-3276 CVE-2013-3277 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The application does not properly restrict deactivated users. This can be exploited by deactivated users to login and gain access to otherwise

51

U-090: RSA enVision Discloses Environment Variable Information to Remote  

Broader source: Energy.gov (indexed) [DOE]

0: RSA enVision Discloses Environment Variable Information to 0: RSA enVision Discloses Environment Variable Information to Remote Users U-090: RSA enVision Discloses Environment Variable Information to Remote Users January 27, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in RSA enVision PLATFORM: Version(s): 4.0 prior to 4.0 SP4 P5, 4.1 prior to 4.1 P3 ABSTRACT: A remote user can view potentially sensitive data on the target system. reference LINKS: CVE-2011-4143 SecurityTracker Alert ID: 1026591 Secunia Advisory IMPACT ASSESSMENT: Medium Discussion: The security issue is caused due to the application disclosing certain environment variables containing web system setup information via the web interface. Further information about this resolution and other fixes can be found in the Release Notes associated with RSA enVision 4.1, Patch 3 and

52

Key recycling in authentication  

E-Print Network [OSTI]

In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

Christopher Portmann

2012-02-06T23:59:59.000Z

53

V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access,  

Broader source: Energy.gov (indexed) [DOE]

84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain 84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks February 5, 2013 - 12:01am Addthis PROBLEM: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks PLATFORM: RSA Archer SmartSuite Framework version 4.x RSA Archer GRC version 5.x ABSTRACT: Several vulnerabilities were reported in RSA Archer eGRC. REFERENCE LINKS: Security Alert: ESA-2013-002 SecurityTracker Alert ID: 1028073 CVE-2012-1064 CVE-2012-2292 CVE-2012-2293 CVE-2012-2294 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can cause arbitrary scripting code to be executed by the target user's browser [CVE-2012-1064]. The code will originate from the

54

U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic 259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: RSA BSAFE SSL-C prior to 2.8.6 ABSTRACT: RSA BSAFE SSL-C Multiple Vulnerabilities reference LINKS: Secunia Advisory SA50601 SecurityTracker Alert ID: 1027514 SecurityTracker Alert ID: 1027513 CVE-2011-3389 CVE-2012-2110 CVE-2012-2131 IMPACT ASSESSMENT: High Discussion: EMC has acknowledged a weakness and a vulnerability in RSA BSAFE, which can

55

CERTIFICATE OF AUTHENTICITY  

Broader source: Energy.gov (indexed) [DOE]

CERTIFICATE OF AUTHENTICITY CERTIFICATE OF AUTHENTICITY I hereby certify that this transcript constitutes an accurate record of the full Council meeting of the National Coal Council held on November 14,2008 at the Westin Grand Hotel, Washington, D.C. ~ i c h a e l G. Mueller, Chair National Coal Council I NATIONAL COAL COUNCIL 1 FULL COUNCIL MEETING FRIDAY NOVEMBER 14, 2 0 0 8 The Full Council meeting convened at 9 : 0 0 a.m. in the Washington Ballroom of the Westin Grand Hotel, 2 3 5 0 M Street, NW, Washington, DC, Chair Michael G. Mueller presiding. ATTENDEES: MIKE MUELLER, Arneren Energy Fuels & Services Company, Chair RICH EIMER, Dynegy Inc., Vice-Chair ROBERT BECK, National Coal Council, Executive Vice-President SY ALI, Clean Energy Consulting BARB ALTIZER, Eastern Coal Council

56

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection...  

Broader source: Energy.gov (indexed) [DOE]

Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can...

57

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users  

Broader source: Energy.gov (indexed) [DOE]

0: Apache VCL Input Validation Flaw Lets Remote Authenticated 0: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges May 7, 2013 - 12:01am Addthis PROBLEM: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Apache VCL Versions: 2.1, 2.2, 2.2.1, 2.3, 2.3.1 ABSTRACT: A vulnerability was reported in Apache VCL. REFERENCE LINKS: Apache Securelist SecurityTracker Alert ID: 1028515 CVE-2013-0267 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated administrative user with minimal administrative privileges (i.e., nodeAdmin, manageGroup, resourceGrant, or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges.

58

Secure Anonymous RFID Authentication Protocols Christy Chatmon  

E-Print Network [OSTI]

and scalable. Keywords: RFID, Authentication, Anonymity, Privacy, Availability, Scalability. 1 Introduction technology is to automatically identify objects that are contained in electromagnetic fields. RFID tags doSecure Anonymous RFID Authentication Protocols Christy Chatmon Computer & Information Sciences

Burmester, Mike

59

An Efficient Abuse-Free Fair Contract-Signing Protocol Based on RSA Signature and -protocol  

E-Print Network [OSTI]

An Efficient Abuse-Free Fair Contract-Signing Protocol Based on RSA Signature and -protocol Xi in this paper. The proposed protocol is not only fair and optimistic, but also efficient and abuse the Internet. In such scenario, fairness is critical, because they may be potentially mistrusted. That is

60

Research Student Handbook www.leeds.ac.uk/rsa/handbooks.html  

E-Print Network [OSTI]

that the information contained in this Handbook is accurate it does not accept liability for any inaccuraciesResearch Student Handbook 2011-2012 www.leeds.ac.uk/rsa/handbooks.html This Handbook should be read;Research Student Handbook 2011-2012 Important This Handbook was published in August 2011. Whilst

Haase, Markus

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

was reported in RSA Authentication Manager. July 8, 2013 V-194: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host...

62

ARM - Central Authentication Service  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

History History Organization Participants Facility Statistics Forms Contacts Research Themes Research Highlights Journal Articles Collaborations Atmospheric System Research (ASR) Propose a Campaign Submitting Proposals: Guidelines Featured Campaigns Campaign Data List of Campaigns Aerial Facility Mobile Facilities North Slope of Alaska Southern Great Plains Tropical Western Pacific Eastern North Atlantic Location Table Contacts Instrument Datastreams Value-Added Products PI Data Products Field Campaign Data Related Data Data Plots Data Policy Data Documentation Data Gathering and Delivery Data Quality Data Tools Data Archive Data Management Facility External Data Center Features and Releases Facility News Blogs: Air Time & Field Notes Meetings and Events Employment Research Highlights Data Announcements

63

T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain  

Broader source: Energy.gov (indexed) [DOE]

8: HP Virtual Server Environment Lets Remote Authenticated 8: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges April 22, 2011 - 7:47am Addthis PROBLEM: A vulnerability was reported in HP Virtual Server Environment. A remote authenticated user can obtain elevated privileges on the target system. PLATFORM: HP Virtual Server Environment prior to v6.3 ABSTRACT: A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges. reference LINKS: HP Document ID: c02749050 SecurityTracker Alert ID: 1025429 CVE-2011-1724 HP Insight Software media set 6.3 HP Technical Knowledge Base Discussion: System management and security procedures must be reviewed frequently to

64

User Authentication Policy | Argonne Leadership Computing Facility  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Eureka / Gadzooks Eureka / Gadzooks Policies Pullback Policy ALCF Acknowledgment Policy Account Sponsorship & Retention Policy Accounts Policy Data Policy INCITE Quarterly Report Policy Job Scheduling Policy on BG/P Job Scheduling Policy on BG/Q Refund Policy Software Policy User Authentication Policy Documentation Feedback Please provide feedback to help guide us as we continue to build documentation for our new computing resource. [Feedback Form] User Authentication Policy Users of the Argonne production systems are required to use a CRYPTOCard one time password, multifactor authentication system. This document explains the policies users must follow regarding CRYPTOCard tokens for accessing the Argonne resources. MultiFactor Authentication "Authentication systems are frequently described by the authentication

65

Obfuscated authentication systems, devices, and methods  

DOE Patents [OSTI]

Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

Armstrong, Robert C; Hutchinson, Robert L

2013-10-22T23:59:59.000Z

66

CERTIFICATE OF AUTHENTICITY | Department of Energy  

Energy Savers [EERE]

D.C. Tran001.pdf CERTIFICATE OF AUTHENTICITY More Documents & Publications U.S. Offshore Wind Advanced Technology Demonstration Projects Public Meeting Transcript for...

67

A DAWP Technique for Audio Authentication  

Science Journals Connector (OSTI)

Digital audio content protection is part of information security for audio authentication and audio integrity evaluation. Watermarking is widely used in copyright protection. However, watermark requires a thir...

Tung-Shou Chen; Jeanne Chen; Jiun-Lin Tang; Keshou Wu

2011-01-01T23:59:59.000Z

68

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications  

E-Print Network [OSTI]

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

Sabatini, David M.

69

T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...  

Broader source: Energy.gov (indexed) [DOE]

8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

70

Instructions for using HSPD-12 Authenticated Outlook Web Access...  

Energy Savers [EERE]

Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook...

71

Verifying authentication protocols with CSP Steve Schneider  

E-Print Network [OSTI]

Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

Doran, Simon J.

72

AUTHENTICATED  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2. AMENDMENT OF AGREEMENT BPA and Port Townsend amend the Agreement as follows: (a) The following Section 2.24 ("Wheel Turning Load") shall be added to the Agreement: "2.24...

73

E-Print Network 3.0 - archeological gold authentication Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

't do. Tests and quizzes aren't the gold standard either. - Fixed-choice test questions tend... by authentic use & authentic assessment. 12;Authentic performance...

74

Hardware device binding and mutual authentication  

DOE Patents [OSTI]

Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

Hamlet, Jason R; Pierson, Lyndon G

2014-03-04T23:59:59.000Z

75

The application of hyperspectral image techniques on MODIS data for the detection of oil spills in the RSA1  

E-Print Network [OSTI]

The application of hyperspectral image techniques on MODIS data for the detection of oil spills Oceanography Centre, Empress Dock, Southampton, S014 3ZH, UK ABSTRACT Oil spills pose a serious threat to the sensitive marine ecosystem of the RSA. The study aims to detect and identify oil spills using remote sensing

Quartly, Graham

76

Scatter secure code authentication for efficient reprogramming in wireless sensor networks  

Science Journals Connector (OSTI)

Currently proposed solutions to secure code dissemination in wireless sensor networks (WSNs) involve the use of expensive public-key digital signatures. In this work, we present Scatter, a secure code dissemination protocol that enables sensor nodes to authenticate the program image efficiently. To achieve this, we use a scheme that offers source authentication in the group setting like a public-key signature scheme, but with signature and verification times much closer to those of a MAC (message authentication code). In this way, Scatter avoids the use of elliptic curve cryptography and manages to surpass all previous attempts for secure code dissemination in terms of energy consumption, memory and time efficiency. Besides the design and theoretical analysis of the protocol, we also report the experimental evaluation of Scatter in two different hardware platforms, Mica2 and MicaZ, which proves its efficiency in practice.

Ioannis Krontiris; Tassos Dimitriou

2011-01-01T23:59:59.000Z

77

Official Knowledge: Validation Mechanisms for Knowledge Management Systems.  

E-Print Network [OSTI]

??One of the most important roles of a knowledge management system is as a filter to verify, authenticate, or justify the knowledge of an organization. (more)

Watkins, Jennifer H

2009-01-01T23:59:59.000Z

78

V-036: EMC Smarts Network Configuration Manager Database Authenticatio...  

Energy Savers [EERE]

Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative...

79

Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes  

DOE Patents [OSTI]

Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

Kent, Alexander Dale (Los Alamos, NM)

2008-09-02T23:59:59.000Z

80

T-646: Debian fex authentication bypass | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

6: Debian fex authentication bypass 6: Debian fex authentication bypass T-646: Debian fex authentication bypass June 14, 2011 - 3:45pm Addthis PROBLEM: The vulnerability is caused due to the application not properly verifying the existence of "auth-ID" when uploading files and can be exploited to bypass the authentication mechanism. PLATFORM: Debian fex ABSTRACT: Debian security discovered that fex, a web service for transferring very large, files, is not properly validating authentication IDs. While the service properly validates existing authentication IDs, an attacker who is not specifying any authentication ID at all, can bypass the authentication procedure. reference LINKS: DSA-2259-1 fex Secunia Advisory SA44940 Debian Security Advisory DSA-2259-1 fex-20110610.tar Vulnerability Report: Debian GNU/Linux 6.0

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

A service-oriented architecture for authentication and authorization  

E-Print Network [OSTI]

THESIS A Service-oriented Architecture for AuthenticationSAN DIEGO A Service-oriented Architecture for Authentication2.0, which is a service-oriented architecture that addresses

Hamedtoolloei, Hamidreza

2009-01-01T23:59:59.000Z

82

CLOC: Authenticated Encryption for Short Input Tetsu Iwata1  

E-Print Network [OSTI]

. CLOC uses a variant of CFB mode in its encryption part and a variant of CBC MAC in the authentication

83

PAP: A Privacy and Authentication Protocol for Passive RFID Tags  

E-Print Network [OSTI]

PAP: A Privacy and Authentication Protocol for Passive RFID Tags Alex X. Liu LeRoy A. Bailey for RFID tags is necessary to ensure the privacy and authentication between each tag and their reader. In order to accomplish this, we propose PAP, a privacy and authentication protocol for passive RFID tags

Liu, Alex X.

84

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL  

E-Print Network [OSTI]

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL Christopher Mann and Daniel Loebenberger 15 August 2014 Abstract. We show how to realize two-factor authentication for a Bitcoin wal- let a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification

85

FORENSIC CONNOISSEURSHIP, JACKSON POLLOCK, AND THE AUTHENTIC EYE  

E-Print Network [OSTI]

FORENSIC CONNOISSEURSHIP, JACKSON POLLOCK, AND THE AUTHENTIC EYE by Francis V. O'Connor, Ph shall proceed to some general #12;Forensic Connoisseurship, Pollock, & The Authentic Eye - F. V. O, the training of authentic eyes and forensic connoisseurs -- concluding with a final thought on the historicity

Taylor, Richard

86

Robust video authentication system over internet protocol  

Science Journals Connector (OSTI)

This paper presents a video authentication system over internet protocol that is insusceptible to illumination and expression variations. The illumination and expression invariant features are extracted using multi-band feature extraction. These features are classified by a radial basis function neural network. A new adaptive decision fusion method is proposed to combine the scores from different modalities and the different frames during the authentication process. Three levels of decision fusion are carried out in the proposed adaptive decision fusion. Depending on the level of decision fusion, the level of illumination influence is taken into account during the decision making.

Sue Inn Ch'ng; Kah Phooi Seng; Li-Minn Ang; Fong Tien Ong; Yee Wan Wong

2011-01-01T23:59:59.000Z

87

Spatial Data Authentication Using Mathematical Visualization  

E-Print Network [OSTI]

Spatial Data Authentication Using Mathematical Visualization Vert, G., Harris, F., Nasser, S. Dept has become an increasingly compromised method to transmit any type of data including spatial data. Due to the criticality of spatial data in decision making processes that range from military targeting to urban planning

Harris Jr., Frederick C.

88

A generic mechanism for efficient authentication in B3G networks  

Science Journals Connector (OSTI)

A user in Beyond 3rd Generation (B3G) networks in order to get access to the network services must perform a multi-pass authentication procedure, which includes two or three sequential authentications steps. These multiple authentication steps include ... Keywords: Authentication performance, B3G networks, B3G security, Multi-pass authentication, Security binding

Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis

2010-06-01T23:59:59.000Z

89

Verifiable process monitoring through enhanced data authentication.  

SciTech Connect (OSTI)

To ensure the peaceful intent for production and processing of nuclear fuel, verifiable process monitoring of the fuel production cycle is required. As part of a U.S. Department of Energy (DOE)-EURATOM collaboration in the field of international nuclear safeguards, the DOE Sandia National Laboratories (SNL), the European Commission Joint Research Centre (JRC) and Directorate General-Energy (DG-ENER) developed and demonstrated a new concept in process monitoring, enabling the use of operator process information by branching a second, authenticated data stream to the Safeguards inspectorate. This information would be complementary to independent safeguards data, improving the understanding of the plant's operation. The concept is called the Enhanced Data Authentication System (EDAS). EDAS transparently captures, authenticates, and encrypts communication data that is transmitted between operator control computers and connected analytical equipment utilized in nuclear processes controls. The intent is to capture information as close to the sensor point as possible to assure the highest possible confidence in the branched data. Data must be collected transparently by the EDAS: Operator processes should not be altered or disrupted by the insertion of the EDAS as a monitoring system for safeguards. EDAS employs public key authentication providing 'jointly verifiable' data and private key encryption for confidentiality. Timestamps and data source are also added to the collected data for analysis. The core of the system hardware is in a security enclosure with both active and passive tamper indication. Further, the system has the ability to monitor seals or other security devices in close proximity. This paper will discuss the EDAS concept, recent technical developments, intended application philosophy and the planned future progression of this system.

Goncalves, Joao G. M. (European Commission Joint Research Centre, Italy); Schwalbach, Peter (European Commission Directorate General%3CU%2B2014%3EEnergy, Luxemburg); Schoeneman, Barry Dale; Ross, Troy D.; Baldwin, George Thomas

2010-09-01T23:59:59.000Z

90

V-231: Cisco Identity Services Engine Discloses Authentication Credentials  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

1: Cisco Identity Services Engine Discloses Authentication 1: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users August 30, 2013 - 3:01am Addthis PROBLEM: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials. PLATFORM: Cisco Identity Services Engine (ISE) 1.x ABSTRACT: A vulnerability was reported in Cisco Identity Services Engine REFERENCE LINKS: SecurityTracker Alert ID: 1028965 CVE-2013-3471 IMPACT ASSESSMENT: Meduim DISCUSSION: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials.The system stores the username and password of an authenticated user within hidden HTML form fields. A

91

Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc  

Broader source: Energy.gov (indexed) [DOE]

Factor Factor RSA Tokens with Citrix Workplace Environment (CWE) Revision 1.13 December, 2009 Associate CIO for Operations (IM) United States Department of Energy DOE HQ OCIO Application Hosting Environment Instructions for Using RSA Token with Citrix Workplace Environment Using Your RSA Token with Citrix Note: If you access Citrix Workplace from within the DOE network (DOEnet or VPN) then you do not need an RSA Two-Factor token. The Citrix Workplace logon screen will prompt you only for your Windows User name and Password. Step 1 - Establish a connection to the Internet and connect to https://workplace.doe.gov. Step 2 - Click "OK" to bypass the Government warning banner. DOE HQ OCIO Application Hosting Environment Instructions for Using RSA Token with Citrix Workplace Environment

92

Formal analysis of device authentication applications in ubiquitous computing.  

SciTech Connect (OSTI)

Authentication between mobile devices in ad-hoc computing environments is a challenging problem. Without pre-shared knowledge, existing applications rely on additional communication methods, such as out-of-band or location-limited channels for device authentication. However, no formal analysis has been conducted to determine whether out-of-band channels are actually necessary. We answer this question through formal analysis, and use BAN logic to show that device authentication using a single channel is not possible.

Shin, Dongwan (New Mexico Tech, Socorro, NM); Claycomb, William R.

2010-11-01T23:59:59.000Z

93

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...  

Broader source: Energy.gov (indexed) [DOE]

or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges. IMPACT: A remote authenticated user can...

94

U-268: Oracle Database Authentication Protocol Discloses Session...  

Broader source: Energy.gov (indexed) [DOE]

the authentication protocol at the time of this entry. Please visit the Oracle Critical Patch Updates, Security Alerts and Third Party Bulletin for additional information when it...

95

Dos and don'ts of client authentication on the web  

Science Journals Connector (OSTI)

Client authentication has been a continuous source of problems on the Web. Although many well-studied techniques exist for authentication, Web sites continue to use extremely weak authentication schemes, especially in non-enterprise environments such ...

Kevin Fu; Emil Sit; Kendra Smith; Nick Feamster

2001-08-01T23:59:59.000Z

96

Serious leisure, participation and experience in tourism: authenticity and ritual in a renaissance festival  

E-Print Network [OSTI]

the serious festival participation were reminiscent of tourism existential authenticity specified by Wang (1999) as two levels: intrapersonal authenticity (gaining one?s true self) and interpersonal authenticity (gaining true human relationship). A search...

Kim, Hyounggon

2005-02-17T23:59:59.000Z

97

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote  

Broader source: Energy.gov (indexed) [DOE]

168: EMC Documentum Information Rights Management Server Bugs Let 168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service May 14, 2012 - 7:00am Addthis PROBLEM: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service PLATFORM: Information Rights Management Server 4.x, 5.x ABSTRACT: Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions. Reference links: SecurityTracker Alert ID: 1027058 CVE-2012-2276 CVE-2012-2277 IMPACT ASSESSMENT: High Discussion: A remote authenticated user can send specially crafted data to trigger a NULL pointer dereference and cause the target service to crash. A remote

98

Secure password-based authenticated key exchange for web services  

Science Journals Connector (OSTI)

This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based ... Keywords: authenticated key exchange, password, security, web services

Liang Fang; Samuel Meder; Olivier Chevassut; Frank Siebenlist

2004-10-01T23:59:59.000Z

99

Enhancing CardSpace Authentication Using a Mobile Device  

E-Print Network [OSTI]

, authentication. 1 Introduction In line with the continuing increase in the number of on-line services requir- ing design goals of CardSpace is to reduce reliance on password authentication. We address this limitation, since the additional overhead is handled by the client. The remainder of the paper is

Sheldon, Nathan D.

100

Challenges and architectural approaches for authenticating mobile users  

Science Journals Connector (OSTI)

This paper casts an architectural eye at existing work on security and privacy in mobile computing. Specifically, it focuses on authentication as it leads up to access control from two points of view: servicer providers granting access to users, and ... Keywords: access control, anonymity, authentication, mobile computing, trust, ubiquitous computing, user mobility

Joo Pedro Sousa

2008-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Broader source: Energy.gov (indexed) [DOE]

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

102

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Broader source: Energy.gov (indexed) [DOE]

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

103

Implementing data security in student lifecycle management system at the university of Prishtina  

Science Journals Connector (OSTI)

In this paper is presented a novel approach for fulfilling the data security criteria in a Student Lifecycle Management System at the University of Prishtina. The four main criteria of data security such as: privacy, authentication, integrity and non-repudiation ... Keywords: X.509 certificate, authentication, digital signature, non-repudiation, privacy, security, smart cards, student lifecycle management

Blerim Rexha; Haxhi Lajqi; Myzafere Limani

2010-07-01T23:59:59.000Z

104

2011 Raj JainCSE571SWashington University in St. Louis Authentication, Authorization,Authentication, Authorization,  

E-Print Network [OSTI]

23-1 ©2011 Raj JainCSE571SWashington University in St. Louis Authentication, Authorization://www.cse.wustl.edu/~jain/cse571-11/ #12;23-2 ©2011 Raj JainCSE571SWashington University in St. Louis OverviewOverview RADIUS 802.1X #12;23-3 ©2011 Raj JainCSE571SWashington University in St. Louis RADIUSRADIUS Remote

Jain, Raj

105

Citrix_2FA_Authentication_09.09 | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

More Documents & Publications Microsoft Word - Citrix2FAAuthentication1232009.doc Using Two-Factor RSA Token with WebVPN Microsoft Word - SMailSecureWeb-BasedEmailv3 2...

106

CAH and Shared Services Transition Plan CAH will move seven servers that provide daily operational services such as user authentication and access, central file  

E-Print Network [OSTI]

CAH and Shared Services Transition Plan CAH will move seven servers that provide daily operational the university's NET domain. Domains provide user authentication, access, and management to resources divide the transition plan, and each phase has goals and a deadline. The overall goal is to continue

Wu, Shin-Tson

107

Secure password-based authenticated key exchange for web services  

SciTech Connect (OSTI)

This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

2004-11-22T23:59:59.000Z

108

Page not found | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

71 - 1880 of 28,905 results. 71 - 1880 of 28,905 results. Download EA-1388: Final Environmental Assessment Ground Water Compliance at the Shiprock Uranium Mill Tailings Site http://energy.gov/nepa/downloads/ea-1388-final-environmental-assessment Download Document Management & Control System (DMCS) http://energy.gov/cio/downloads/document-management-control-system-dmcs Article U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. http://energy.gov/cio/articles/u-129-rsa-envision-bugs-permit-cross-site-scripting-sql-injection-and-directory

109

Microsoft Word - SMail_Secure_Web-Based_Email_v3 _2_.doc  

Broader source: Energy.gov (indexed) [DOE]

HQ OCIO Instructions for Using Secure Email (SMail) via HQ OCIO Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Version 4 April 2010 Office of the Associate CIO for IT Support Services United States Department of Energy DOE HQ OCIO Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Requirements SMail: 1. An Energy IT Services (EITS) provided Exchange email account. 1 2. An EITS provided RSA SecureID Token with an active account in the EITS-managed RSA Authentication Server. 2 3. Appropriate access granted Active Directory group membership. 3 4. DOEnet or Internet access and a supported web browser. Login Procedure for SMail:

110

management  

National Nuclear Security Administration (NNSA)

5%2A en Management and Budget http:nnsa.energy.govaboutusouroperationsmanagementandbudget

P...

111

Using Semantics for Automating the Authentication of Web APIs  

E-Print Network [OSTI]

Abstract. Recent technology developments in the area of services on the Web are marked by the proliferation of Web applications and APIs. The implementation and evolution of applications based on Web APIs is, however, hampered by the lack of automation that can be achieved with current technologies. Research on semantic Web services is therefore trying to adapt the principles and technologies that were devised for traditional Web services, to deal with this new kind of services. In this paper we show that currently more than 80 % of the Web APIs require some form of authentication. Therefore authentication plays a major role for Web API invocation and should not be neglected in the context of mashups and composite data applications. We present a thorough analysis carried out over a body of publicly available APIs that determines the most commonly used authentication approaches. In the light of these results, we propose an ontology for the semantic annotation of Web API authentication information and demonstrate how it can be used to create semantic Web API descriptions. We evaluate the applicability of our approach by providing a prototypical implementation, which uses authentication annotations as the basis for automated service invocation. 1

Maria Maleshkova; Carlos Pedrinaci; John Domingue; Guillermo Alvaro; Ivan Martinez

112

U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

0: JBoss Operations Network LDAP Authentication Bug Lets Remote 0: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication March 21, 2012 - 7:00am Addthis PROBLEM: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication PLATFORM: JBoss Operations Network 2.x ABSTRACT: A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases. reference LINKS: SecurityTracker Alert ID: 1026826 Secunia Advisory SA48471 CVE-2012-1100 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based

113

Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding author)  

E-Print Network [OSTI]

1 Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding in the process algebra Communicating Sequential Processes (CSP) to specify authentication. The purpose, security protocols, CSP, formal specification, Kerberos 1. Introduction Schneider [1] uses Communicating

Doran, Simon J.

114

Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis  

Science Journals Connector (OSTI)

Authentication schemes relying on per-packet signature and per-signature verification introduce heavy cost for computation and communication. Due to its constraint resources, smart grid's authentication requirement cannot be satisfied by this scheme. ...

Depeng Li; Zeyar Aung; John R. Williams; Abel Sanchez

2012-01-01T23:59:59.000Z

115

T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without...  

Broader source: Energy.gov (indexed) [DOE]

LDAP Authentication Bug Lets Remote Users Bypass Authentication U-185: OpenLDAP May Ignore TLSCipherSuite Setting in Some Cases T-535: Oracle Critical Patch Update - January 2011...

116

PAAS: A Privacy-Preserving Attribute-based Authentication System for eHealth Networks  

E-Print Network [OSTI]

PAAS: A Privacy-Preserving Attribute-based Authentication System for eHealth Networks Linke Guo PAAS which leverages users' verifiable attributes to authenticate users in eHealth systems while

Latchman, Haniph A.

117

PAKE-based mutual HTTP authentication for preventing phishing attacks  

E-Print Network [OSTI]

This paper describes a new password-based mutual authentication protocol for Web systems which prevents various kinds of phishing attacks. This protocol provides a protection of user's passwords against any phishers even if dictionary attack is employed, and prevents phishers from imitating a false sense of successful authentication to users. The protocol is designed considering interoperability with many recent Web applications which requires many features which current HTTP authentication does not provide. The protocol is proposed as an Internet Draft submitted to IETF, and implemented in both server side (as an Apache extension) and client side (as a Mozilla-based browser and an IE-based one). The paper also proposes a new user-interface for this protocol which is always distinguishable from fake dialogs provided by phishers.

Oiwa, Yutaka; Takagi, Hiromitsu

2009-01-01T23:59:59.000Z

118

Quantum-Secure Authentication with a Classical Key  

E-Print Network [OSTI]

Authentication provides the trust people need to engage in transactions. The advent of physical keys that are impossible to copy promises to revolutionize this field. Up to now, such keys have been verified by classical challenge-response protocols. Such protocols are in general susceptible to emulation attacks. Here we demonstrate Quantum-Secure Authentication ("QSA") of an unclonable classical physical key in a way that is inherently secure by virtue of quantum-physical principles. Our quantum-secure authentication operates in the limit of a large number of channels, represented by the more than thousand degrees of freedom of an optical wavefront shaped with a spatial light modulator. This allows us to reach quantum security with weak coherent pulses of light containing dozens of photons, too few for an adversary to determine their complex spatial shapes, thereby rigorously preventing emulation.

Sebastianus A. Goorden; Marcel Horstmann; Allard P. Mosk; Boris kori?; Pepijn W. H. Pinkse

2014-06-03T23:59:59.000Z

119

Current Projects: Product Authenticity Tags - Vulnerability Assessment Team  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Product Authenticity Tags Product Authenticity Tags VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast µProcessor Shop Insanely Fast µProcessor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms Argonne's VAT (brochure)

120

T-606: Sun Java System Access Manager Lets Remote Users Partially Modify  

Broader source: Energy.gov (indexed) [DOE]

06: Sun Java System Access Manager Lets Remote Users Partially 06: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data April 20, 2011 - 3:58am Addthis PROBLEM: Two vulnerabilities were reported in Sun Java System Access Manager. A remote authenticated user can partially access data on the target system. A remote user can partially modify data on the target system. PLATFORM: Sun Java versions 7.1, 8.0 ABSTRACT: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data. reference LINKS: SecurityTracker Alert ID: 1025408 CVE-2011-0844 CVE-2011-0847 Oracle Critical Patch Update Advisory

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Dutertre, Bruno

122

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Doran, Simon J.

123

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

Dutertre, Bruno

124

Authenticity Issue in Performing Arts using Live Electronics  

E-Print Network [OSTI]

by the production process key elements for future assessment of authenticity. We will present some "case studies we intend to study the production process, and extract from the elements and traces left, the electronic processes are evaluated towards their robustness against changes of instrumentist, changes

Kouroupetroglou, Georgios

125

Robust RFID Authentication Protocol with Formal Proof and Its Feasibility  

E-Print Network [OSTI]

security models compatible with formal security analysis tools. We show that an RFID authentication, such as by letting us reference the price, origin and circulation route of specic goods. On the other hand-in-the-middle adversary and communication fault. We dene model and security proofs via a game-based approach makes our

126

Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio  

E-Print Network [OSTI]

Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio Xi Tan, Kapil frequency spectrum was inefficiently utilized. To fully use these spectrums, cognitive radio networks have of cognitive radio is to enable the current fixed spectrum channels assigned by Federal Communica- tions

Du, Wenliang "Kevin"

127

Final report for the mobile node authentication LDRD project.  

SciTech Connect (OSTI)

In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authentication is critical. In a wired infrastructure, this authentication service is typically facilitated by a centrally-located ''authentication certificate generator'' such as a Certificate Authority (CA) server. This centralized approach is ill-suited to meet the needs of mobile ad hoc networks, such as those required by military systems, because of the unpredictable connectivity and dynamic routing. There is a need for a secure and robust approach to mobile node authentication. Current mechanisms either assign a pre-shared key (shared by all participating parties) or require that each node retain a collection of individual keys that are used to communicate with other individual nodes. Both of these approaches have scalability issues and allow a single compromised node to jeopardize the entire mobile node community. In this report, we propose replacing the centralized CA with a distributed CA whose responsibilities are shared between a set of select network nodes. To that end, we develop a protocol that relies on threshold cryptography to perform the fundamental CA duties in a distributed fashion. The protocol is meticulously defined and is implemented it in a series of detailed models. Using these models, mobile wireless scenarios were created on a communication simulator to test the protocol in an operational environment and to gather statistics on its scalability and performance.

Michalski, John T.; Lanzone, Andrew J.

2005-09-01T23:59:59.000Z

128

Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols  

E-Print Network [OSTI]

to privacy of consumers. In recent years, the cryptographic community have made an extensive effort Zahra Ahmadian, Mahmoud Salmasizadeh, and Mohammad Reza Aref Abstract--Privacy is faced to serious years have focused on design and analysis of privacy friendly ultralightweight authentication protocols

129

Secure Password-Based Authenticated Key Exchange for Web Services  

E-Print Network [OSTI]

sign-on, delegation, and identity. The Grid Security Infrastructure (GSI) is the name given so. 1.3 Security in Grid Computing Security is one of the major requirements of Grid computing. Any Grid site deployment must at least provide the basic security mechanisms including authentication

130

SP 800-38B. Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication  

Science Journals Connector (OSTI)

This Recommendation specifies a message authentication code (MAC) algorithm based on a symmetric key block cipher. This block cipher-based MAC algorithm, called CMAC, may be used to provide assurance of the authenticity and, hence, the integrity of binary ... Keywords: Authentication, block cipher, cryptography, information security, integrity, message authentication code, mode of operation.

Morris J. Dworkin

2005-05-01T23:59:59.000Z

131

Hardware device to physical structure binding and authentication  

DOE Patents [OSTI]

Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

2013-08-20T23:59:59.000Z

132

Improving the security of quantum direct communication with authentication  

E-Print Network [OSTI]

Two protocols of quantum direct communication with authentication [Phys. Rev. A {\\bf 73}, 042305 (2006)] are recently proposed by Lee, Lim and Yang. In this paper we will show that in the two protocols the authenticator Trent should be prevented from knowing the secret message of communication. The first protocol can be eavesdropped by Trent using the the intercept-measure-resend attack, while the second protocol can be eavesdropped by Trent using single-qubit measurement. To fix these leaks, I revise the original versions of the protocols by using the Pauli-Z operation $\\sigma_z$ instead of the original bit-flip operation $X$. As a consequence, the protocol securities are improved.

Zhan-jun Zhang

2006-04-18T23:59:59.000Z

133

Simultaneous Authentication and Certification of Arms-Control Measurement Systems  

SciTech Connect (OSTI)

Most arms-control-treaty-monitoring scenarios involve a host party that makes a declaration regarding its nuclear material or items and a monitoring party that verifies that declaration. A verification system developed for such a use needs to be trusted by both parties. The first concern, primarily from the host party's point of view, is that any sensitive information that is collected must be protected without interfering in the efficient operation of the facility being monitored. This concern is addressed in what can be termed a 'certification' process. The second concern, of particular interest to the monitoring party, is that it must be possible to confirm the veracity of both the measurement system and the data produced by this measurement system. The monitoring party addresses these issues during an 'authentication' process. Addressing either one of these concerns independently is relatively straightforward. However, it is more difficult to simultaneously satisfy host party certification concerns and monitoring party authentication concerns. Typically, both parties will want the final access to the measurement system. We will describe an alternative approach that allows both parties to gain confidence simultaneously. This approach starts with (1) joint development of the measurement system followed by (2) host certification of several copies of the system and (3) random selection by the inspecting party of one copy to be use during the monitoring visit and one (or more) copy(s) to be returned to the inspecting party's facilities for (4) further hardware authentication; any remaining copies are stored under joint seal for use as spares. Following this process, the parties will jointly (5) perform functional testing on the selected measurement system and then (6) use this system during the monitoring visit. Steps (1) and (2) assure the host party as to the certification of whichever system is eventually used in the monitoring visit. Steps (1), (3), (4), and (5) increase the monitoring party's confidence in the authentication of the measurement system.

MacArthur, Duncan W. [Los Alamos National Laboratory; Hauck, Danielle K. [Los Alamos National Laboratory; Thron, Jonathan L. [Los Alamos National Laboratory

2012-07-09T23:59:59.000Z

134

Authenticated group Diffie-Hellman key exchange: theory and practice  

SciTech Connect (OSTI)

Authenticated two-party Diffie-Hellman key exchange allows two principals A and B, communicating over a public network, and each holding a pair of matching public/private keys to agree on a session key. Protocols designed to deal with this problem ensure A (B resp.)that no other principals aside from B (A resp.) can learn any information about this value. These protocols additionally often ensure A and B that their respective partner has actually computed the shared secret value. A natural extension to the above cryptographic protocol problem is to consider a pool of principals agreeing on a session key. Over the years several papers have extended the two-party Diffie-Hellman key exchange to the multi-party setting but no formal treatments were carried out till recently. In light of recent developments in the formalization of the authenticated two-party Diffie-Hellman key exchange we have in this thesis laid out the authenticated group Diffie-Hellman key exchange on firmer foundations.

Chevassut, Olivier

2002-10-03T23:59:59.000Z

135

V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

V-057: eXtplorer "ext_find_user()" Authentication Bypass V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis December 28 2012 - 6:00am PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA51636 eXtplorer 2.1.3 Security Release IMPACT ASSESSMENT: Medium DISCUSSION: eXtplorer was notified of a problem within the authentication system of eXtplorer Versions 2.1.2, 2.1.1, 2.1.0 and 2.1.0RC5 that have been found to be vulnerable to an authentication bypass bug.

136

U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP  

Broader source: Energy.gov (indexed) [DOE]

6: Apache CXF Lets Remote Authenticated Users Execute 6: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions September 24, 2012 - 6:00am Addthis PROBLEM: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions PLATFORM: This vulnerability affects all released versions of Apache CXF. ABSTRACT: A vulnerability was reported in Apache CXF reference LINKS: SecurityTracker Alert ID: 1027554 Apache CXF Security Advisories Apache CXF Advisory - CVE-2012-3451 CVE-2012-3451 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache CXF. A remote authenticated user can execute unauthorized commands on the target web service. Impact: A remote authenticated user can execute potentially unauthorized actions on

137

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated 2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates February 28, 2012 - 8:45am Addthis PROBLEM: A vulnerability was reported in PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY DEFINER, a remote authenticated user can execute a trigger function and gain elevated privileges CVE-2012-0866.

138

U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP  

Broader source: Energy.gov (indexed) [DOE]

6: Apache CXF Lets Remote Authenticated Users Execute 6: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions September 24, 2012 - 6:00am Addthis PROBLEM: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions PLATFORM: This vulnerability affects all released versions of Apache CXF. ABSTRACT: A vulnerability was reported in Apache CXF reference LINKS: SecurityTracker Alert ID: 1027554 Apache CXF Security Advisories Apache CXF Advisory - CVE-2012-3451 CVE-2012-3451 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache CXF. A remote authenticated user can execute unauthorized commands on the target web service. Impact: A remote authenticated user can execute potentially unauthorized actions on

139

V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session  

Broader source: Energy.gov (indexed) [DOE]

5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct 5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks May 14, 2013 - 12:08am Addthis PROBLEM: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks PLATFORM: Tomcat 6.0.21 to 6.0.36, 7.0.0 to 7.0.32 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat SecurityTracker Alert ID: 1028534 CVE-2013-2067 IMPACT ASSESSMENT: High DISCUSSION: A remote user can repeatedly send a specially crafted request for a resource requiring authentication while the target user is completing the login form to cause the FORM authentication process to execute the remote user's request with the privileges of the target user.

140

E-Print Network 3.0 - authentic cost calculations Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

cost calculations Search Powered by Explorit Topic List Advanced Search Sample search results for: authentic cost calculations Page: << < 1 2 3 4 5 > >> 1 A Lightweight...

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

E-Print Network 3.0 - authentications algorithms based Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

functionality based... . 2.1 Authentication systems and techniques ... Source: Brunato, Mauro - Dipartimento di Ingegneria e Scienza dell'Informazione, Universit di Trento...

142

New foundations for efficient authentication, commutative cryptography, and private disjointness testing  

E-Print Network [OSTI]

This dissertation presents new constructions and security definitions related to three areas: authentication, cascadable and commutative crytpography, and private set operations. Existing works relevant to each of these ...

Weis, Stephen August, 1978-

2006-01-01T23:59:59.000Z

143

Counterfeit-resistant materials and a method and apparatus for authenticating materials  

DOE Patents [OSTI]

Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

2000-01-01T23:59:59.000Z

144

Instructions for Using Secure Email via Outlook Web Access | Department of  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Secure Email via Outlook Web Access Secure Email via Outlook Web Access Instructions for Using Secure Email via Outlook Web Access Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. Secure Email Requirements: An EITS provided Exchange email account An EITS provided RSA SecureID Token with an active account in the EITS-managed RSA Authentication Server Appropriate access granted Active Directory group membership DOEnet or Internet access and a supported web browser Secure Email Login Procedure: Enter https://smail.doe.gov/ in the address field of your Internet browser. The Outlook Web Access window appears. When using an RSA SecurID hardware token: Enter your user name in the User name field. Enter your password, which is your RSA token PIN plus the number

145

Password management strategies for online accounts  

Science Journals Connector (OSTI)

Given the widespread use of password authentication in online correspondence, subscription services, and shopping, there is growing concern about identity theft. When people reuse their passwords across multiple accounts, they increase their vulnerability; ... Keywords: password, password management, password reuse, security, survey, user behavior

Shirley Gaw; Edward W. Felten

2006-07-01T23:59:59.000Z

146

A new approach to ensure successful implementation and sustainable DSM in RSA mines / Danil Francois le Roux.  

E-Print Network [OSTI]

??In this study a new tool was developed that made new approaches possible for the successful implementation of Demand Side Management (DSM) projects. The new (more)

Le Roux, Danil Francois

2005-01-01T23:59:59.000Z

147

A mutual authentication and key establishment scheme for heterogeneous sensor networks supporting nodes mobility  

Science Journals Connector (OSTI)

In the last two decades, wireless sensor networks (WSNs) have greatly attracted the attention of the research community because their flexibility, adaptability and self-organising properties make them a technology solution suitable for diverse application scenarios ranging from home and industrial automation to military surveillance. Since these networks consist of resource constrained devices and can be deployed in remote and unattended areas, supporting security could represent a challenging task especially if mobility scenarios are taken into consideration. In this context, key management facilitates the adoption of cryptography techniques to support secure data communication and to protect the resource constrained devices from various security attacks. This paper specifically focuses on mobile heterogeneous wireless sensor networks consisting of mobile sensor nodes with few fixed sensor nodes and presents a mutual authentication and key management scheme suitable for the considered scenario. Analytical and OMNET++ simulation results show that the proposed scheme provides better network connectivity, consumes less memory, has better network resilience against attacks and introduces lower communication overhead compared to state-of-the-art solutions.

Sarmad Ullah Khan; Claudio Pastrone; Luciano Lavagno; Maurizio A. Spirito

2012-01-01T23:59:59.000Z

148

Authentication of medicinal plant material by DNA fingerprinting  

Science Journals Connector (OSTI)

Based on their positive therapeutic results, herbal medicines are gaining popularity worldwide for human wellbeing and healthcare. Unfortunately, one major hurdle that might impair their potential future as 'medicine of choice' is the lack of standardisation. Many scientific studies on adulteration of herbal medicines have demonstrated that health consequences of adulterants may vary from life threatening to death. Fortunately, the breakthrough in genetic analysis and identification promise herbal medicines challenging era. Genetics permit the capacity to police adulterants to protect patients and public from dangerous fraud. This article highlights useful analytical techniques that can be employed to analyse DNA for quality assurance, control and authentication of medicinal plant species.

Sundus Tewfik

2008-01-01T23:59:59.000Z

149

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider  

E-Print Network [OSTI]

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider Department In this paper we consider the nature of machine proofs used in the CSP approach to the veri cation of authentication protocols using the process algebra CSP Hoa85]. The CSP syntax provides a natural and precise way

Doran, Simon J.

150

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks  

E-Print Network [OSTI]

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks Tony Cheneau National public key distribution scheme adapted to ad hoc networks called TAKES for Trustful Authentication, or even implementing a light naming system can be enabled on top of ad hoc networks. TAKES is formally

Paris-Sud XI, Université de

151

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , Jinsong Han2  

E-Print Network [OSTI]

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems Li Lu1 , Jinsong Han2 an emerging requirement ­ protecting user privacy [13] in RFID authentications. In most RFID systems, tags sensitive information. For example, without pri- vacy protection, any reader can identify a consumer's ID

Liu, Yunhao

152

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , Jinsong Han2  

E-Print Network [OSTI]

- sitive information. For example, without privacy pro- tection, any reader can identify a consumer's IDDynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems Li Lu1 , Jinsong Han2 an emerging requirement ­ protecting user privacy [13] in RFID authentications. In most RFID systems, tags

Liu, Yunhao

153

End-to-end aggregate authentication of time-series data  

Science Journals Connector (OSTI)

We consider the problem of providing integrity of aggregate result in the presence of an untrusted data aggregator who may introduce errors into data fusion, causing the final aggregate result to far deviate from the true result determined by participating ... Keywords: aggregate authentication, computation over authenticated data, time-series

Di Ma; Yan Zhu; Mengyang Yu

2013-05-01T23:59:59.000Z

154

Comparative studies on authentication and key exchange methods for 802.11 wireless LAN  

Science Journals Connector (OSTI)

IEEE 802.11 wireless LAN has become one of the hot topics on the design and development of network access technologies. In particular, its authentication and key exchange (AKE) aspects, which form a vital building block for modern security mechanisms, ... Keywords: Authentication, Confidentiality, Key exchange, Security, WLAN

Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan

2007-08-01T23:59:59.000Z

155

eSeal -A System for Enhanced Electronic Assertion of Authenticity and Integrity  

E-Print Network [OSTI]

in the network and a communication protocol. The system is able to control various kinds of integrity settings to claim and assert the authenticity and integrity of goods, documents or other valued objects in storageeSeal - A System for Enhanced Electronic Assertion of Authenticity and Integrity Christian Decker1

Beigl, Michael

156

AUDIO FORENSIC AUTHENTICATION BASED ON MOCC BETWEEN ENF AND REFERENCE SIGNALS  

E-Print Network [OSTI]

AUDIO FORENSIC AUTHENTICATION BASED ON MOCC BETWEEN ENF AND REFERENCE SIGNALS Zhisheng Lv1 of Warwick, Coventry CV4 7AL, UK ABSTRACT This paper proposes a new audio authenticity detection algorithm Frequency) signal and the reference signal. We first extract the ENF signal from a query audio signal

Li, Chang-Tsun

157

T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

94: IBM solidDB Password Hash Authentication Bypass 94: IBM solidDB Password Hash Authentication Bypass Vulnerability T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability April 4, 2011 - 6:08am Addthis PROBLEM: A vulnerability has been reported in IBM solidDB, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: IBM solidDB 4.x - IBM solidDB 6.x ABSTRACT: This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability. REFERENCE LINKS: IBM Security Alert Secunia Advisory: SA44030 ZDI Advisory: ZDI-11-115 IBM solidDB Support IMPACT ASSESSMENT: Medium Discussion: The specific flaw exists within the solid.exe process which listens by default on TCP ports 1315, 1964 and 2315. The authentication protocol

158

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Broader source: Energy.gov (indexed) [DOE]

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

159

A Novel Trigon based Dual Authentication Protocol for Enhancing Security in Grid Environment  

E-Print Network [OSTI]

In recent times, a necessity has been raised in order to distribute computing applications often across grids. These applications are dependent on the services like data transfer or data portal services as well as submission of jobs. Security is of utmost importance in grid computing applications as grid resources are heterogeneous, dynamic, and multidomain. Authentication remains as the significant security challenge in grid environment. In traditional authentication protocol a single server stores the sensitive user credentials, like username and password. When such a server is compromised, a large number of user passwords, will be exposed. Our proposed approach uses a dual authentication protocol in order to improve the authentication service in grid environment. The protocol utilizes the fundamental concepts of trigon and based on the parameters of the trigon the user authentication will be performed. In the proposed protocol, the password is interpreted and alienated into more than one unit and these uni...

Ruckmani, V

2010-01-01T23:59:59.000Z

160

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Broader source: Energy.gov (indexed) [DOE]

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

JC3 High Impact Assessment Bulletins | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

August 19, 2011 August 19, 2011 T-697: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible. August 18, 2011 T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. August 16, 2011 T-694: IBM Tivoli Federated Identity Manager Products Multiple

162

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

6, 2012 6, 2012 U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information. July 5, 2012 U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. July 3, 2012 U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The

163

INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA)  

Broader source: Energy.gov (indexed) [DOE]

7/2013 Page 1 7/2013 Page 1 INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA) Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. HSPD-12 OWA REQUIREMENTS:  An EITS provided Exchange email account  A DOE issued HSPD-12 badge  DOEnet or Internet access and a supported web browser  A smart card reader installed* on your computer (*Windows Vista, Windows XP, MAC OS X 10.7 & 10.8, will also require smart card software to be installed in order to read the HSPD-12 badge) HSPD-12 OWA LOGIN PROCEDURE: 1. Insert HSPD-12 badge into card reader

164

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Medium Impact Medium Impact Assessment Bulletins JC3 Medium Impact Assessment Bulletins RSS December 4, 2012 V-039: Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability Samsung has issued a security advisory and an optional firmware update for all current Samsung networked laser printers and multifunction devices to enhance Simple Network Management Protocol (SNMP) security. November 30, 2012 V-037: Wireshark Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Wireshark. November 29, 2012 V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. November 27, 2012 V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws

165

V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

6: HP-UX Directory Server Discloses Passwords to Remote 6: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users May 29, 2013 - 12:32am Addthis PROBLEM: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users PLATFORM: Directory Server B.08.10.04 ABSTRACT: Two vulnerabilities were reported in HP-UX Directory Server. REFERENCE LINKS: HP Document ID: c03772083 SecurityTracker Alert ID: 1028593 CVE-2012-2678 CVE-2012-2746 IMPACT ASSESSMENT: High DISCUSSION: A local user can access the plaintext password in certain cases [CVE-2012-2678]. A remote authenticated user can can view the password for a target LDAP user when audit logging is enabled by reading the audit log [CVE-2012-2678].

166

U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

54: Webmin Flaws Let Remote Authenticated Users Execute 54: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files September 10, 2012 - 6:00am Addthis PROBLEM: Webmin Multiple Input Validation Vulnerabilities PLATFORM: The vulnerabilities are reported in version 1.580. Other versions may also be affected. ABSTRACT: An authenticated attacker may be able to execute arbitrary commands. reference LINKS: Webmin Security Alerts Bugtraq ID: 55446 Secunia Advisory SA50512 SecurityTracker Alert ID: 1027507 US CERT Vulnerability Note VU#788478 CVE-2012-2981 CVE-2012-2982 CVE-2012-2983 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities have been reported in Webmin, which can be exploited by malicious users to compromise a vulnerable system and by

167

V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability  

Broader source: Energy.gov (indexed) [DOE]

6: MediaWiki CentralAuth Extension Authentication Bypass 6: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability September 6, 2013 - 4:36am Addthis PROBLEM: A vulnerability has been reported in the CentralAuth extension for MediaWiki, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: MediaWiki CentralAuth Extension ABSTRACT: A vulnerability has been reported in the CentralAuth extension for MediaWik REFERENCE LINKS: Secunia Advisory SA54723 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an error when handling auto-logins and can be exploited to bypass the authentication mechanism by providing a valid username within the "centralauth_User" cookie. IMPACT:

168

A Reduction for Automated Veri cation of Authentication Scott D. Stoller  

E-Print Network [OSTI]

A Reduction for Automated Veri cation of Authentication Protocols Scott D. Stoller Computer Science of those case studies were not rigorously justi ed. Reduction theorems are needed, which show

Stoller, Scott

169

Integrating an Efficient Authorization Protocol with Trigon-Based Authentication Mechanism for Improving Grid Security  

Science Journals Connector (OSTI)

Security is a vital part of an integrated grid application in which heterogeneous services and resources ... dynamically. Authentication and authorization are the major security concerns in grid environment. Most...

V. Ruckmani; G. Sudha Sadasivam

2010-01-01T23:59:59.000Z

170

Determination of 5-hydroxymethylfurfural after Winkler and by the HPLC method for authentication of honey  

Science Journals Connector (OSTI)

The quality and authenticity of commercially available honey from Slovak market and the development of HPLC method for determination of hydroxymethylfurfural (HMF) content of honey with fine separation efficie...

K. Kukurova; J. Karovi?ov; G. Greif; Z. Kohajdov; J. Lehkoivov

2006-06-01T23:59:59.000Z

171

Subverting value hierarchies : essays on the causes and responses to shifts in demand for authenticity  

E-Print Network [OSTI]

This dissertation includes three essays on the causes and responses to shifts in demand for authenticity. In the first chapter, I answer the question: why do previously cast-off products, practices, or styles abruptly ...

Hahl, Oliver (Oliver Douglas)

2013-01-01T23:59:59.000Z

172

Home News Products Blogs Buyers Guide Whitepapers Jobs Events Subscribe Issue Archive Topic Center: Email Security Compliance Patch Management Financial Services Health care RSA 2008 RSS | Login | Register  

E-Print Network [OSTI]

SEARCH Home News Products Blogs Buyers Guide Whitepapers Jobs Events Subscribe Issue Archive Topic located the malicious files, mostly MP3 or AVI in format, on popular peer-to- peer (P2P) websites appear when users employ certain terms when searching for music and video, he said. Once the files

Gupta, Minaxi

173

T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid  

Broader source: Energy.gov (indexed) [DOE]

5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a 5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in OpenLDAP. A remote user can authenticate without a valid password. PLATFORM: Open LDAP version(s) 2.4.12 - 2.2.24 ABSTRACT: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password. reference LINKS: SecurityTracker Alert ID:1025190 Secunia Advisory:SA43331 OpenLDAP Issue OpenLDAP Download CVE-2011-1025 IMPACT ASSESSMENT: Medium Discussion: A remote user with knowledge of the target distinguished name can provide an arbitrary password to successfully authenticate on systems using the NDB back-end. Impact: Some vulnerabilities have been reported in OpenLDAP, which can be exploited

174

V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

7: eXtplorer "ext_find_user()" Authentication Bypass 7: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA51636 eXtplorer 2.1.3 Security Release IMPACT ASSESSMENT: Medium DISCUSSION: eXtplorer was notified of a problem within the authentication system of eXtplorer Versions 2.1.2, 2.1.1, 2.1.0 and 2.1.0RC5 that have been found to be vulnerable to an authentication bypass bug. IMPACT: An error within the "ext_find_user()" function in users.php can be

175

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

June 12, 2013 June 12, 2013 V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Adobe Flash Player. June 10, 2013 V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files A vulnerability was reported in RSA Authentication Manager. June 5, 2013 V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks Several vulnerabilities were reported in Apple Safari. June 4, 2013 V-170: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability A vulnerability has been reported in Apache Subversion. June 3, 2013 V-169: Linux Kernel "iscsi_add_notunderstood_response()" Buffer Overflow

176

T-608: HP Virtual Server Environment Lets Remote Authenticated...  

Broader source: Energy.gov (indexed) [DOE]

running HP software products should be applied in accordance with the customer's patch management policy. Recommended Update: HP Software media set 6.3 HP Insight Software...

177

PAP: A privacy and authentication protocol for passive RFID tags Alex X. Liu *, LeRoy A. Bailey  

E-Print Network [OSTI]

people about consumer privacy protection and other security loopholes that make RFID tags an easy targetPAP: A privacy and authentication protocol for passive RFID tags Alex X. Liu *, LeRoy A. Bailey 2009 Accepted 20 March 2009 Available online 31 March 2009 Keywords: RFID Privacy Authentication

Liu, Alex X.

178

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

September 28, 2012 September 28, 2012 U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands Trend Micro has been notified of a potential product vulnerability in Control Manager. September 27, 2012 U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service A vulnerability was reported in Cisco IOS. September 26, 2012 U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users A vulnerability was reported in Oracle Database. September 25, 2012 U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability Multiple RSA Products Authentication Bypass Vulnerability September 21, 2012 U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain

179

Hardware Security for Device Authentication in the Smart Grid  

Science Journals Connector (OSTI)

Secure communication between devices is a key aspect of smart grid security. In the future smart home...environment, various smart devices, appliances and energy management systems will communicate with each othe...

Andrew J. Paverd; Andrew P. Martin

2013-01-01T23:59:59.000Z

180

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote 11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories July 12, 2012 - 7:00am Addthis PROBLEM: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories PLATFORM: EMC Celerra Network Server versions 6.0.36.4 through 6.0.60.2 EMC VNX versions 7.0.12.0 through 7.0.53.1 EMC VNXe 2.0 (including SP1, SP2, and SP3) EMC VNXe MR1 (including SP1, SP2, SP3, and SP3.1) EMC VNXe MR2 (including SP0.1) ABSTRACT: A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system. reference LINKS: The Vendor's Advisory

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and  

Broader source: Energy.gov (indexed) [DOE]

44: McAfee Email Gateway Lets Remote Users Bypass Authentication 44: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks August 27, 2012 - 7:00am Addthis PROBLEM: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks PLATFORM: McAfee Email Gateway (MEG) 7.0.0 and 7.0.1 (MEG 6.7.x is NOT affected.) McAfee Email and Web Security (EWS) 5.6 Patch 3 and earlier McAfee Email and Web Security (EWS) 5.5 Patch 6 and earlier ABSTRACT: Several vulnerabilities were reported in McAfee Email Gateway. reference LINKS: McAfee Security Bulletin ID: SB10026 SecurityTracker Alert ID: 1027444

182

U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and  

Broader source: Energy.gov (indexed) [DOE]

4: McAfee Email Gateway Lets Remote Users Bypass Authentication 4: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks August 27, 2012 - 7:00am Addthis PROBLEM: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks PLATFORM: McAfee Email Gateway (MEG) 7.0.0 and 7.0.1 (MEG 6.7.x is NOT affected.) McAfee Email and Web Security (EWS) 5.6 Patch 3 and earlier McAfee Email and Web Security (EWS) 5.5 Patch 6 and earlier ABSTRACT: Several vulnerabilities were reported in McAfee Email Gateway. reference LINKS: McAfee Security Bulletin ID: SB10026 SecurityTracker Alert ID: 1027444

183

Multielemental Fingerprinting as a Tool for Authentication of Organic Wheat, Barley, Faba Bean, and Potato  

Science Journals Connector (OSTI)

Multielemental Fingerprinting as a Tool for Authentication of Organic Wheat, Barley, Faba Bean, and Potato ... Potato peels were also manually removed by a ceramic peeler on selected subsamples to allow comparison with automatically peeled potatoes. ... Analysis of automatically and manually peeled potatoes as well as potato peels confirmed that the automatic peeling process did not induce any systematic and significant contamination. ...

Kristian H. Laursen; Jan K. Schjoerring; Jrgen E. Olesen; Margrethe Askegaard; Ulrich Halekoh; Sren Husted

2011-03-21T23:59:59.000Z

184

Reliable and Semi-reliable Communication with Authentication in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Reliable and Semi-reliable Communication with Authentication in Mobile Ad Hoc Networks Falko of wireless ad hoc sensor networks is the error-proneness and, therefore, the unreliability of communication describe a new approach and an according protocol for usage in ad hoc networks that provides reliable

Breu, Ruth

185

Project List 1. Project Name: Efficient Anonymous Private Authentication Protocol for RFID Systems  

E-Print Network [OSTI]

based authentication. Publication: · Md. Endadul Hoque, Farzana Rahman, and Sheikh I. Ahamed, "Anon's geocoding and mapping API. Publication: ···· Farzana Rahman, Casey O'Brien, Sheikh I. Ahamed, He Zhang'Brien, Kristine Manning, Jason Cowdy, Sheikh Iqbal Ahamed, "Let EcoDrive be Your Guide: Development of a Mobile

Brylow, Dennis

186

Heart-to-Heart (H2H): Authentication for Implanted Medical Devices  

E-Print Network [OSTI]

Heart-to-Heart (H2H): Authentication for Implanted Medical Devices Masoud Rostami Rice University Rice University Houston, TX farinaz@rice.edu ABSTRACT We present Heart-to-Heart (H2H), a system patients to over-the-air attack and physical harm. H2H makes use of ECG (heartbeat data

187

Biometric authentication system using reduced joint feature vector of iris and face  

Science Journals Connector (OSTI)

In this paper, we present the biometric authentication system based on the fusion of two user-friendly biometric modalities: Iris and Face. Using one biometric feature can lead to good results, but there is no reliable way to verify the classification. ...

Byungjun Son; Yillbyung Lee

2005-07-01T23:59:59.000Z

188

Distillation Codes and Applications to DoS Resistant Multicast Authentication  

E-Print Network [OSTI]

Distillation Codes and Applications to DoS Resistant Multicast Authentication Chris Karlof UC We introduce distillation codes, a method for streaming and storing data. Like erasure codes, distillation codes allow information to be decoded from a sufficiently large quorum of symbols. In contrast

Perrig, Adrian

189

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks  

E-Print Network [OSTI]

Sciences Temple University Philadelphia, PA 19122 Email: jiewu@temple.edu Abstract--Message authentication by the degree of the polynomial: when the number of messages transmitted is larger than this threshold allows any node to transmit an unlimited number of messages without suffering the threshold problem

Wu, Jie

190

Hardware Acceleration of the SRP Authentication Protocol Peter Groen1,2  

E-Print Network [OSTI]

Hardware Acceleration of the SRP Authentication Protocol Peter Groen1,2 , Panu H¨am¨al¨ainen2 , Ben employed is the Secure Remote Password (SRP) authenti- cation protocol [15]. It makes extensive use of hash that can be called from soft- ware routines in the SRP protocol. This paper is structured as follows

Kuzmanov, Georgi

191

Integration of IEEE 802.21 services and pre-authentication framework  

Science Journals Connector (OSTI)

Providing multi-interface device users the ability to roam between different access networks is becoming a key requirement for service providers. The availability of multiple mobile broadband access technologies together with increasing use of real ... Keywords: IEEE 80221, MIH, MPA, authentication, handover performance, heterogeneous networks, media-independent handover, media-independent pre-, multi-interface devices, seamless mobility, testbed

Miriam Tauil; Ashutosh Dutta; Yuu-Heng Cheng; Subir Das; Donald Baker; Maya Yajnik; David Famolari; Yoshihiro Ohba; Kenichi Taniuchi; Victor Fajardo; Henning Schulzrinne

2010-07-01T23:59:59.000Z

192

ECG-Based Authentication Fahim Sufi, Ibrahim Khalil, and Jiankun Hu  

E-Print Network [OSTI]

ECG-Based Authentication Fahim Sufi, Ibrahim Khalil, and Jiankun Hu 17 Contents 17.1 Background of ECG . . . . . . . . . . . . . . . . . . . . . . 310 17.1.1 Physiology of ECG . . . . . . . . . . . . . . . . . . 310 17.1.2 Rhythm Analysis . . . . . . . . . . . . . . . . . . . . 312 17.2 What Can ECG Based

Hu, Jiankun

193

An EAP ID-Based Authentication Method for Wireless Networks  

E-Print Network [OSTI]

(Certification Author- ity) and the burdensome management of certificates is removed. The presented) into IEEE 802 wired networks. It gave also birth to the IEEE 802.11i [2] which is more specific to wireless between two stations or a signature mechanism that lies on certificates to prove the ownership of a public

Paris-Sud XI, Université de

194

U-201: HP System Management Homepage Bugs Let Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

1: HP System Management Homepage Bugs Let Remote Users Deny 1: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in HP System Management Homepage. PLATFORM: Version(s): prior to 7.1.1 ABSTRACT: The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code. Reference links: Original Advisory Security Tracker ID 1027209 CVE-2012-2012, CVE-2012-2013, CVE-2012-2014 CVE-2012-2015, CVE-2012-2016 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP System Management Homepage. A remote authenticated user can gain elevated privileges. A remote authenticated

195

Management Plan Management Plan  

E-Print Network [OSTI]

; and 5) consistency with the Endangered Species Act and Clean Water Act. In addition, the management plan Plan, Management Plan Page MP­ 1 #12;Management Plan water quality standards, instream flows, privateManagement Plan Management Plan "Management and restoration programs for native salmonids have

196

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 5, NO. 9, SEPTEMBER 2006 2569 Mutual Authentication and Key Exchange Protocols  

E-Print Network [OSTI]

compromise and service abuse, etc. Several authentication Manuscript received February 3, 2005; revised May}@bbcr.uwaterloo.ca). Digital Object Identifier 10.1109/TWC.2006.05063. Internet B's home network, home agent (H) Fixed Internet

Shen, Xuemin "Sherman"

197

ID-based One-pass Authenticated Key Establishment M. Choudary Gorantla Colin Boyd Juan Manuel Gonzalez Nieto  

E-Print Network [OSTI]

ID-based One-pass Authenticated Key Establishment M. Choudary Gorantla Colin Boyd Juan Manuel Gonz, Brisbane, QLD 4001, Australia. Email: mc.gorantla@isi.qut.edu.au, {c.boyd

Boyd, Colin

198

Page not found | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

71 - 22680 of 26,764 results. 71 - 22680 of 26,764 results. Article Small Wind Electric Systems Small wind electric systems are one of the most cost-effective home-based renewable energy systems -- with zero emissions and pollution. http://energy.gov/energysaver/articles/small-wind-electric-systems Article T-642: RSA SecurID update to Customers RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products http://energy.gov/cio/articles/t-642-rsa-securid-update-customers Article T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID RSA investigation has revealed that the attack resulted in certain

199

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication |  

Broader source: Energy.gov (indexed) [DOE]

7: Barracuda SSL VPN Bug Lets Remote Users Bypass 7: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication January 25, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN. PLATFORM: The vulnerability has been verified to exist in Barracuda SSL VPN version 2.2.2.203 ABSTRACT: A remote user can gain administrative access to the target system. REFERENCE LINKS: SecurityTracker Alert ID: 1028039 Barracuda Networks Advisory IMPACT ASSESSMENT: High DISCUSSION: A remote user can set a specially crafted Java system property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database dumps, shutdown the system, and set new administrative

200

Enhancing security of electronic health records through grid-based user authentication scheme  

Science Journals Connector (OSTI)

Medical research and electronic health record (EHR) maintenance involves large databases that are geographically distributed which calls naturally for a grid computing environment. Huge data in medical image analysis, storage and genome processing demand large medical data storage and computing power. Data sharing, software specialisation and data processing which occur in a heterogeneous way tend to make use of the grid computing environment for the medical field. The security solution for authentication in the existing grid environment is non-scalable. This major drawback can hinder the growth of the user community in the medical field. A simple user authentication scheme is proposed, which enhances the security of the overall system but takes less time for execution and lesser communication cost.

G. Jaspher Willsie Kathrine; E. Kirubakaran; Elijah Blessing Rajsingh

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Comparative studies on authentication and key exchange methods for 802.11 wireless LAN  

Science Journals Connector (OSTI)

IEEE 802.11 wireless LAN has become one of the hot topics on the design and development of network access technologies. In particular, its authentication and key exchange (AKE) aspects, which form a vital building block for modern security mechanisms, deserve further investigation. In this paper we first identify the general requirements used for WLAN authentication and key exchange (AKE) methods, and then classify them into three levels (mandatory, recommended, and additional operational requirements). We present a review of issues and proposed solutions for AKE in 802.11 WLANs. Three types of existing methods for addressing AKE issues are identified, namely, the legacy, layered and access control-based AKE methods. Then, we compare these methods against the identified requirements. Based on the analysis, a multi-layer AKE framework is proposed, together with a set of design guidelines, which aims at a flexible, extensible and efficient security as well as easy deployment.

Jun Lei; Xiaoming Fu; Dieter Hogrefe; Jianrong Tan

2007-01-01T23:59:59.000Z

202

Questioning the Meaning of Authenticity in Martin Heidegger's Being and Time  

E-Print Network [OSTI]

the proper context for authenticity will be to clarify those existential structures that describe what it means for Dasein to exist concretely in the world. Since Heidegger provides a fairly comprehensive account of the ontological constitution... the ontological and the ontic, and the existential and the existentiell. As a result, the traditional notions of selfhood and subjectivity get split between this new landscape of categories and subsequently lose their meaning. As Francois Raffoul points out...

Liwinski, Thomas

2011-10-21T23:59:59.000Z

203

V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote 1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service November 22, 2012 - 3:00am Addthis PROBLEM: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service PLATFORM: Version(s): XC10 2.0.0.0 - 2.0.0.3, 2.1.0.0 - 2.1.0.2 ABSTRACT: Several vulnerabilities were reported in IBM WebSphere DataPower. REFERENCE LINKS: IBM Security Bulletin SecurityTracker Alert ID: 1027798 CVE-2012-5758 CVE-2012-5759 CVE-2012-5756 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in IBM WebSphere DataPower. A remote

204

Designing a minimum-functionality neutron and gamma measurement instrument with a focus on authentication  

SciTech Connect (OSTI)

During the design and construction of the Next-Generation Attribute-Measurement System, which included a largely commercial off-the-shelf (COTS), nondestructive assay (NDA) system, we realized that commercial NDA equipment tends to include numerous features that are not required for an attribute-measurement system. Authentication of the hardware, firmware, and software in these instruments is still required, even for those features not used in this application. However, such a process adds to the complexity, cost, and time required for authentication. To avoid these added authenticat ion difficulties, we began to design NDA systems capable of performing neutron multiplicity and gamma-ray spectrometry measurements by using simplified hardware and software that avoids unused features and complexity. This paper discusses one possible approach to this design: A hardware-centric system that attempts to perform signal analysis as much as possible in the hardware. Simpler processors and minimal firmware are used because computational requirements are kept to a bare minimum. By hard-coding the majority of the device's operational parameters, we could cull large sections of flexible, configurable hardware and software found in COTS instruments, thus yielding a functional core that is more straightforward to authenticate.

Karpius, Peter J [Los Alamos National Laboratory; Williams, Richard B [Los Alamos National Laboratory

2009-01-01T23:59:59.000Z

205

ETD Management in the Texas Digital Library: lessons Learned from a Demonstrator  

E-Print Network [OSTI]

participants. Shiboleth Any web aplication that deals with personal information wil be dealing with authentication and identity management. In an educational seting, these aspects of the aplication are critical, and regulated by federal laws governing... is an open-source midleware aplication for providing identity management in a distributed environment (Shiboleth 208). In suport of its scholarly services, TDL established the first state-wide Shiboleth federation in Texas. Under this infrastructure, TDL...

Mikeal, Adam

2008-07-24T23:59:59.000Z

206

A generic security API for symmetric key management on cryptographic devices  

Science Journals Connector (OSTI)

Abstract We present a new symmetric key management API for cryptographic devices intended to implement security protocols in distributed systems. Our API has a formal security policy and proofs of security in the symbolic model, under various threat scenarios. This sets it apart from previous \\{APIs\\} such as RSA PKCS#11, which are under-specified, lack a clear security policy and are often subject to attacks. Our design is based on the principle of explicitness: the security policy for a key must be given at creation time, and this policy is then included in any ciphertext containing the key. Our API also contains novel features such as the possibility of insisting on a freshness check before accepting an encrypted key for import. To show the applicability of our design, we give an algorithm for automatically instantiating the API commands for a given key management protocol and apply it on the ClarkJacob protocols suite.

Vronique Cortier; Graham Steel

2014-01-01T23:59:59.000Z

207

Hospitality Management Hospitality Management  

E-Print Network [OSTI]

of the global hospitality industry. Academic Offerings HOSPITALITY AND FOOD SERVICE MANAGEMENT MINOR HOSPITALITY AND FOOD SERVICE MANAGEMENT MINOR Students pursuing programs in other areas of study may choose a minor Lodging Management 3 HPM 309 Sports Arena Management 3 HPM 312* Cost Control in Food Services (Prereq

McConnell, Terry

208

T-703: Cisco Unified Communications Manager Open Query Interface Lets  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

703: Cisco Unified Communications Manager Open Query Interface 703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents August 26, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in Cisco Unified Communications Manager. A remote user can obtain database contents PLATFORM: Cisco Unified Communications Manager 6.x, 7.x, 8.0, 8.5 ABSTRACT: A remote user can obtain database contents, including authentication credentials. reference LINKS: SecurityTracker Alert ID: 1025971 Cisco Document ID: 113190 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Cisco Unified Communications Manager. A remote user can obtain database contents. A remote user can access an open

209

V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

2: Symantec Endpoint Protection Manager Buffer Overflow 2: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability June 20, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Symantec Endpoint Protection Manager PLATFORM: The vulnerability is reported in versions 12.1.x prior to 12.1 RU3 ABSTRACT: Symantec was notified of a pre-authentication buffer overflow found in the Symantec Endpoint Protection Manager (SEPM) and Symantec Endpoint Protection Center (SPC) REFERENCE LINKS: Secunia Advisory SA53864 SecurityTracker Alert ID: 1028683 Symantec Adivsory SYM13-005 CVE-2013-1612 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to a boundary error within secars.dll and can be exploited to cause a buffer overflow via the web-based management

210

V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

82: Symantec Endpoint Protection Manager Buffer Overflow 82: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability June 20, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Symantec Endpoint Protection Manager PLATFORM: The vulnerability is reported in versions 12.1.x prior to 12.1 RU3 ABSTRACT: Symantec was notified of a pre-authentication buffer overflow found in the Symantec Endpoint Protection Manager (SEPM) and Symantec Endpoint Protection Center (SPC) REFERENCE LINKS: Secunia Advisory SA53864 SecurityTracker Alert ID: 1028683 Symantec Adivsory SYM13-005 CVE-2013-1612 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to a boundary error within secars.dll and can be exploited to cause a buffer overflow via the web-based management

211

Poster sessions as an authentic assessment approach in an open-Ended University general chemistry laboratory  

Science Journals Connector (OSTI)

The purpose of this study is to explore the views of Pre-service Science Teachers (PSTs) on their posters as an authentic assessment tool in an open-ended chemistry laboratory course. Forty-three \\{PSTs\\} set up their research questions, designed and performed laboratory investigations, obtained results of their experiments and prepared their posters as an alternative to traditional laboratory reports. They engaged in the process of assessment in the course as both self and peer evaluators. At the end of each laboratory session, each group of the \\{PSTs\\} presented posters of their laboratory investigations to their peers and instructors. Results of the PSTs interview analyses indicated that most \\{PSTs\\} expressed many benefits to the presentation of laboratory investigations using posters in comparison to the traditional laboratory reports.

Alev Do?an; Osman Naf?z Kaya

2009-01-01T23:59:59.000Z

212

EER of fixed and trainable fusion classifiers: A theoretical study with application to biometric authentication tasks  

E-Print Network [OSTI]

Biometric authentication is a process of verifying an identity claim using a persons behavioural and physiological characteristics. Due to the vulnerability of the system to environmental noise and variation caused by the user, fusion of several biometric-enabled systems is identified as a promising solution. In the literature, various fixed rules (e.g. min, max, median, mean) and trainable classifiers (e.g. linear combination of scores or weighted sum) are used to combine the scores of several base-systems. How exactly do correlation and imbalance nature of base-system performance affect the fixed rules and trainable classifiers? We study these joint aspects using the commonly used error measurement in biometric authentication, namely Equal Error Rate (EER). Similar to several previous studies in the literature, the central assumption used here is that the class-dependent scores of a biometric system are approximately normally distributed. However, different from them, the novelty of this study is to make a direct link between the EER measure and the fusion schemes mentioned. Both synthetic and real experiments (with as many as 256 fusion experiments carried out on the XM2VTS benchmark score-level fusion data sets) verify our proposed theoretical modeling of EER of the two families of combination scheme. In particular, it is found that weighted sum can provide the best generalisation performance when its weights are estimated correctly. It also has the additional advantage that score normalisation prior to fusion is not needed, contrary to the rest of fixed fusion rules.

Norman Poh; Samy Bengio

2005-01-01T23:59:59.000Z

213

EER of Fixed and Trainable Fusion Classifiers: A Theoretical Study with Application to Biometric Authentication Tasks  

E-Print Network [OSTI]

submitted for publication Abstract. Biometric authentication is a process of verifying an identity claim using a persons behavioural and physiological characteristics. Due to the vulnerability of the system to environmental noise and variation caused by the user, fusion of several biometric-enabled systems is identified as a promising solution. In the literature, various fixed rules (e.g. min, max, median, mean) and trainable classifiers (e.g. linear combination of scores or weighted sum) are used to combine the scores of several base-systems. How exactly do correlation and imbalance nature of base-system performance affect the fixed rules and trainable classifiers? We study these joint aspects using the commonly used error measurement in biometric authentication, namely Equal Error Rate (EER). Similar to several previous studies in the literature, the central assumption used here is that the class-dependent scores of a biometric system are approximately normally distributed. However, different from them, the novelty of this study is to make a direct link between the EER measure and the fusion schemes mentioned. Both synthetic and real experiments (with as many as 512 fusion experiments carried out on the XM2VTS benchmark score-level fusion data sets) verify our proposed theoretical modeling of EER of the two families of combination scheme. In particular, it is found that weighted sum can provide the best generalisation performance when its weights are estimated correctly. It also has the additional advantage that score normalisation prior to fusion is not needed, contrary to the rest of fixed fusion rules. 2 IDIAPRR 05-01 1

Norman Poh A; Samy Bengio A; Norman Poh; Samy Bengio

2005-01-01T23:59:59.000Z

214

Federated Authentication & Authorisation for e-Science J. Watt, R.O. Sinnott, J. Jiang, T. Doherty, A.J. Stell, D. Martin, G. Stewart  

E-Print Network [OSTI]

Federated Authentication & Authorisation for e-Science J. Watt, R.O. Sinnott, J. Jiang, T. Doherty, UK j.watt@nesc.gla.ac.uk Abstract The Grid and Web service community are defining a range of stan

Glasgow, University of

215

V-120: EMC Smarts Network Configuration Manager Java RMI Access Control  

Broader source: Energy.gov (indexed) [DOE]

0: EMC Smarts Network Configuration Manager Java RMI Access 0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control March 27, 2013 - 12:51am Addthis PROBLEM: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control PLATFORM: Version(s): prior to 9.2 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028342 www.emc.com CVE-2013-0935 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can access some Java Remote Method Invocation methods without authenticating to gain control of the target system. A user can exploit unspecified flaws in the NCM System Management

216

V-120: EMC Smarts Network Configuration Manager Java RMI Access Control  

Broader source: Energy.gov (indexed) [DOE]

0: EMC Smarts Network Configuration Manager Java RMI Access 0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control March 27, 2013 - 12:51am Addthis PROBLEM: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control PLATFORM: Version(s): prior to 9.2 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028342 www.emc.com CVE-2013-0935 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can access some Java Remote Method Invocation methods without authenticating to gain control of the target system. A user can exploit unspecified flaws in the NCM System Management

217

Program Managers  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Program Managers Program Managers Enabling remarkable discoveries and tools that transform our understanding of energy and matter and advance national, economic, and energy...

218

Conference Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish requirements and responsibilities with respect to managing conferences sponsored by the Department of Energy (DOE) or by DOE management and operating contractors and other contractors who perform work at DOE-owned or -leased facilities, including management and integration contractors and environmental restoration management contractors (when using funds that will be reimbursed by DOE). Cancels DOE N 110.3.

1999-11-03T23:59:59.000Z

219

Timing Attacks on software implementation of RSA  

E-Print Network [OSTI]

the amount of time required to perform private key operations (Decryptions etc.). Timing attacks are related to a class of attacks called side-channel attacks. Others include power analysis and attacks based decryption times are masked by many concurrent processes running on the system. It is also believed

220

Management Responsibilities  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Management Responsibilities Management Responsibilities Depleted UF6 Management Responsibilities DOE has responsibility for safe and efficient management of approximately 700,000 metric tons of depleted UF6. Organizational Responsibilities In the United States, the U.S. Department of Energy is responsible for managing all the depleted uranium that has been generated by the government and has been declared surplus to national defense needs. In addition, as a result of two memoranda of agreement that have been signed between the DOE and USEC, the DOE has assumed management responsibility for approximately 145,000 metric tons of depleted UF6 that has been or will be generated by USEC. Any additional depleted UF6 that USEC generates will be USEC's responsibility to manage. DOE Management Responsibility

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Federal Energy Management Program: Energy Management Guidance  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Management Energy Management Guidance to someone by E-mail Share Federal Energy Management Program: Energy Management Guidance on Facebook Tweet about Federal Energy Management Program: Energy Management Guidance on Twitter Bookmark Federal Energy Management Program: Energy Management Guidance on Google Bookmark Federal Energy Management Program: Energy Management Guidance on Delicious Rank Federal Energy Management Program: Energy Management Guidance on Digg Find More places to share Federal Energy Management Program: Energy Management Guidance on AddThis.com... Requirements by Subject Requirements by Regulation Notices & Rules Guidance Facility Reporting Fleet Reporting Energy Management Guidance The Federal Energy Management Program (FEMP) provides guidance on Federal

222

Environmental Management Waste Management Facility (EMWMF) at...  

Office of Environmental Management (EM)

Environmental Management Waste Management Facility (EMWMF) at Oak Ridge Environmental Management Waste Management Facility (EMWMF) at Oak Ridge Full Document and Summary Versions...

223

Authenticity of the Traditional Cypriot Spirit Zivania on the Basis of Metal Content Using a Combination of Coupled Plasma Spectroscopy and Statistical Analysis  

Science Journals Connector (OSTI)

Porous Solids Group, Department of Chemistry, University of Cyprus, P.O. ... In various publications, 1H and 13C NMR, as well as 2H SNIF (site natural isotopic fractionation) NMR, are mentioned as the most applicable methodologies to characterize the geographic origin and authenticity of wine products and are considered to be powerful tools for the authentication of beverages (11?13). ... Gas chromatography on a chiral stationary phase coupled with selected ion monitoring mass spectrometry was used to examine the presence of amino acid enantiomers (d-Aas) in different beers and vinegar (16). ...

Rebecca Kokkinofta; Panos V. Petrakis; Thomas Mavromoustakos; Charis R. Theocharis

2003-09-16T23:59:59.000Z

224

V-236: MediaWiki CentralAuth Extension Authentication Bypass...  

Energy Savers [EERE]

Web: http:energy.govcioservicesincident-management E-mail: circ@jc3.doe.gov JC3 services are available to JC3-Joint Cybersecurity Coordination Center, and JC3 Contractors....

225

INVESTMENT MANAGEMENT OFFICE MANAGEMENT OFFICE  

E-Print Network [OSTI]

INVESTMENT MANAGEMENT OFFICE INVESTMENT MANAGEMENT OFFICE THE UNIVERSITY OF UTAH University of Utah | Investment Management Office Quarterly Summary The Endowment Pool had a positive first quarter (ending March gain from investments of $7.8 million. The Endowment Pool unit value of $100 has grown to $175 in 10

226

JC3 High Impact Assessment Bulletins | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

March 21, 2011 March 21, 2011 T-584: Microsoft March 2011 Security Bulletin Release Microsoft released 3 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. March 17, 2011 T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products. March 14, 2011 T-577: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat

227

Federal Energy Management Program: Computerized Maintenance Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Computerized Computerized Maintenance Management Systems to someone by E-mail Share Federal Energy Management Program: Computerized Maintenance Management Systems on Facebook Tweet about Federal Energy Management Program: Computerized Maintenance Management Systems on Twitter Bookmark Federal Energy Management Program: Computerized Maintenance Management Systems on Google Bookmark Federal Energy Management Program: Computerized Maintenance Management Systems on Delicious Rank Federal Energy Management Program: Computerized Maintenance Management Systems on Digg Find More places to share Federal Energy Management Program: Computerized Maintenance Management Systems on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance Federal Requirements Program Management

228

LRRB Pavement Management Systems Pavement Management Systems  

E-Print Network [OSTI]

LRRB Pavement Management Systems Pavement Management Systems Presented by: Michael Marti SRF for implementing and monitoring research results (RIC) #12;LRRB Pavement Management Systems LRRB Structure LRRB Current Pavement Management System Used ICON (Goodpointe) Year of Pavement Management System

Minnesota, University of

229

SUBCONTRACT MANAGEMENT  

Broader source: Energy.gov (indexed) [DOE]

-1 -1 CHAPTER 10 SUBCONTRACT MANAGEMENT (Revised October 19, 2011) WHAT ARE THE BASIC PRINCIPLES AND OBJECTIVES OF SUBCONTRACT MANAGEMENT? 1. To ensure contractors establish, document, and maintain adequate purchasing systems. 2. To ensure contractors flow down contract requirements to subcontractors. WHY IS SUBCONTRACT MANAGEMENT IMPORTANT? In many Department prime contracts a significant portion of the obligated dollars is spent on subcontract work. Due to the absence of a direct contractual relationship with the subcontractor, the Department must rely on the prime contractor to manage subcontract work. Subcontractors perform significant work efforts at sites and are an integral part of the site's success. Prime

230

Program Manager  

Broader source: Energy.gov [DOE]

A successful candidate in this position will participate in a wide spectrum of program and project management activities involving systems engineering and integration support for Defense Programs...

231

Water Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Water Management This department applies multi-disciplinary science and technology-based modeling to assess complex environmental systems. It integrates ecology, anthropology, and...

232

Position Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order prescribes the policies, responsibilities, and procedures for position management within (DOE). Canceled by DOE N 1321.140. Cancels DOE 3510.1

1992-06-23T23:59:59.000Z

233

MANAGEMENT (MNG)  

Broader source: Energy.gov (indexed) [DOE]

and recommendations is adequately implemented. (DOE Order 414.1A, Criterion 3; 10 CFR 830, Subpart A) Approach Record Review * Review the SWS issues management systems and...

234

On the use of ID-Based Cryptography for the definition of new EAP authentication methods  

E-Print Network [OSTI]

. As such, there is no need for deployment of a Certification Authority (CA) and the burdensome management of certificates is removed. IBC relies on a Private Key Generator (PKG) for the computation of stations private birth to the IEEE 802.11i [2] which is more specific to wireless networks but still refers to similar

Paris-Sud XI, Université de

235

JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JANUARY 2007 1 Distributed Group Authentication for  

E-Print Network [OSTI]

an application of Radio Frequency Identification (RFID) referred to in the literature as group scanning, in which Frequency Identification) based product identification system for inventory and sup- ply management involves three main components: i) tags or transponders, which are electronic data storage devices attached

236

DEACTIVATION MANAGEMENT  

Broader source: Energy.gov (indexed) [DOE]

MANAGEMENT MANAGEMENT The purpose here is to provide information for specific aspects of project management that apply to deactivation. Overall management of deactivation projects should use a traditional project management approach, and as such is not addressed. The following specific topics are based on lessons learned during deactivation of DOE facilities.  The Deactivation Mission  The Stabilization/Deactivation "Customer"  Project Approach for a Complex Facility  Establishing the Overall End-State  Viewing Deactivation in Two Phases  Early Decisions  Early Deactivation Tasks  Facility-Specific Commitments  Hazard Reduction  Detailed End-Points  Set Up Method and Criteria  Post-Deactivation S&M Plan

237

BachelorofManagement InternationalManagement  

E-Print Network [OSTI]

on the official transcript (see Part 11 - Faculty of Management in the 2007/2008 Calendar). Program Planning Guide Management 3050/Political Science 3420 - Human Resource Management Management 3061 - Information Systems Environment Management 3640 - Cross-Cultural Management Practices Management 3660/Geography 3225 - Industrial

Seldin, Jonathan P.

238

Management Overview  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Immobilization Research Immobilization Research Kurt Gerdes U.S. DOE, Office of Engineering and Technology John Vienna Pacific Northwest National Laboratory Environmental Management May 19, 2009 2009 Hanford - Idaho - Savannah River Technical Exchange 2 Objectives Perform research and development to advance the waste stabilization technology options by through closely- coupled theory, experimentation, and modeling Develop solutions for Hanford, Idaho, Savannah River, and Oak Ridge wastes challenges (along with facilitating management of future wastes) Environmental Management General Approach Balance between near-term incremental technology improvements and long-term transformational solutions Address the requirements for high risk waste streams - high-level tank waste (RPP, SRS)

239

The past, present, and future of password-based authentication on the Web  

E-Print Network [OSTI]

the evolution towards ded- icated password hashing and salting via the crypt() func- tion, along with the first analysis of dictionary attacks and brute-force guessing. A decade later, the 1988 Morris Internet worm demonstrated the vulnerability of many systems... of compromised accounts is just one of many forms of abuse, which include spam, phishing, click-fraud, bots, fake accounts, scams and payment fraud. None of these problems has been completely defeated tech- nologically, but all are managed effectively enough...

Bonneau, Joseph; Herley, Cormac; van Oorschot, Paul C.; Stajano, Frank

2014-01-01T23:59:59.000Z

240

ALLIANCE MANAGEMENT  

Science Journals Connector (OSTI)

In the last two decades, production and manufacturing management has rapidly adopted a range of new concepts: manufacturing strategy, focused factory, just-in-time manufacturing, concurrent engineering, total ...

2000-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Stormwater Management  

E-Print Network [OSTI]

management program must be developed that would meet the standard of reducing pollutants to the maximum extent practicable. Stormwater management programs for medium and large MS4s include measures to: ? Identify major outfalls and pollutant loadings... seeding: The vegetation used will be part of final landscaping, but during construction it prevents soil erosion. ? Mulching: Materials such as hay, grass, woodchips, gravel, or straw are placed on top of the soil to keep it from eroding. Structural...

Jaber, Fouad

2008-10-23T23:59:59.000Z

242

Managing the Management: CORBAbased Instrumentation of Management Systems  

E-Print Network [OSTI]

Management Team Department of Computer Science, TU M? unchen Arcisstr. 21, D­80333 Munich, Germany akeller approach to this problem by defining a MIB for manage­ ment systems. It can be regarded as a step towardsManaging the Management: CORBA­based Instrumentation of Management Systems A. Keller Munich Network

243

Managing Solutions  

E-Print Network [OSTI]

tx H2O | pg. 19 Texas Water Resources Institute (TWRI) project managers work together with scientists and educators as well as government funding agencies to address water quality and quantity issues in Texas. Each of TWRI?s five project... the funds.? Gregory began his role at TWRI in 2006 upon com- pletion of a master?s degree in water management and hydrological science at Texas A&M University. A former Mills Scholar, Gregory was familiar with TWRI. He saw that the institute...

Baker, Emily

2007-01-01T23:59:59.000Z

244

LTS Project Management - Hanford Site  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transition LTS Execution Project Management Planning Resource Management Reporting Interface Management Communications (InternalExternal) Information Management Records...

245

Risk management  

SciTech Connect (OSTI)

In the autumn of 1993 an incident occurred with a diving support vessel, whereby a live pipeline from a NAM gas production platform, situated in the Dutch sector of the North Sea, was considerably displaced. Key element in the repair of the line was to identify potential hazards involved in various remedial scenarios and to manage the associated risks.

Visser, M. [Nederlandse Aardolie Maatschappij, Velsen (Netherlands)

1995-12-31T23:59:59.000Z

246

Data Management Policy | EMSL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Data Management Policy Data Management Policy The data management resource information and data release policies below are provided to help researchers understand the data...

247

Object Management Systems  

E-Print Network [OSTI]

Object-Oriented Database Management Systems for EngineeringR. Cassel. Distribution Management Systems: Functions and8-PWR 1988. Network Management Systems 52 Subodh Bapat.

Gollu, Aleks Ohannes

1995-01-01T23:59:59.000Z

248

Environmental Management System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Management System Environmental Management System An Environmental Management System is a systematic method for assessing mission activities, determining the environmental impacts...

249

Environmental Management System Plan  

E-Print Network [OSTI]

R-3 Environmental Management System Plan References 30.of Energy, Safety Management System Policy, DOE P 450.4 (E), Environmental Management Systems ? Requirements with

Fox, Robert

2009-01-01T23:59:59.000Z

250

Federal Energy Management Program: Best Management Practice: Cooling Tower  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cooling Tower Management to someone by E-mail Cooling Tower Management to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Google Bookmark Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Delicious Rank Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Cooling Tower Management on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance

251

Federal Energy Management Program: Best Management Practice: Water  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Water Management Planning to someone by E-mail Water Management Planning to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Water Management Planning on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Water Management Planning on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Water Management Planning on Google Bookmark Federal Energy Management Program: Best Management Practice: Water Management Planning on Delicious Rank Federal Energy Management Program: Best Management Practice: Water Management Planning on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Water Management Planning on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance

252

Managing Critical Management Improvement Initiatives  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Provides requirements and responsibilities for planning, executing and assessing critical management improvement initiatives within DOE. DOE N 251.59, dated 9/27/2004, extends this Notice until 10/01/2005. Archived 11-8-10. Does not cancel other directives.

2003-10-01T23:59:59.000Z

253

Environmental Management  

SciTech Connect (OSTI)

Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

None

2014-11-12T23:59:59.000Z

254

Environmental Management  

ScienceCinema (OSTI)

Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

None

2015-01-07T23:59:59.000Z

255

Best Management Practice #1: Water Management Planning  

Broader source: Energy.gov [DOE]

A successful water management program starts with developing a comprehensive water management plan. This plan should be included within existing facility operating plans.

256

Contract Management Certificate Program  

E-Print Network [OSTI]

Contract Management Certificate Program Accelerate Your Career BusinessandManagement extension bearing the UC seal signifies a well- known, uncompromising standard of academic excellence. #12;Contract Management Certificate Program UC Irvine Extension's Contract Management Certificate Program focuses on core

Rose, Michael R.

257

Your Records Management Responsibilities  

Broader source: Energy.gov (indexed) [DOE]

Your Records Management Your Records Management Responsibilities Table of Contents INTRODUCTION RECORDS MANAGEMENT IN THE FEDERAL GOVERNMENT RECORDS MANAGEMENT IN THE DEPARTMENT OF ENERGY IMPORTANCE OF RECORDS MANAGEMENT YOUR RECORDS MANAGEMENT RESPONSIBILITIES RECORDS MANAGEMENT LIFE CYCLE ELECTRONIC RECORDS & RECORDKEEPING LAW, REGULATION, AND POLICY ASSISTANCE RECORDS MANAGEMENT TERMS 2 INTRODUCTION If you are a government employee or contractor working for a federal agency, records management is part of your job. This pamphlet explains your responsibilities for federal records and provides the context for understanding records management in the federal government and in the Department of Energy. TOP RECORDS MANAGEMENT IN THE FEDERAL GOVERNMENT

258

Integrated Safety Management Policy  

Broader source: Energy.gov (indexed) [DOE]

INTEGRATED SAFETY INTEGRATED SAFETY MANAGEMENT SYSTEM DESCRIPTION U.S. DEPARTMENT OF ENERGY Office of Environmental Management Headquarters May 2008 Preparation: Braj K. sin& Occupational Safety and Health Manager Office of Safety Management Concurrence: Chuan-Fu wu Director, Offlce of Safety Management Deputy Assistant Secretary for safe& Management andoperations Operations Officer for 1 Environmental Management Approval: Date p/-g Date Environmental Management TABLE OF CONTENTS ACRONYMS................................................................................................................................................................v EXECUTIVE SUMMARY .........................................................................................................................................1

259

Energy management  

SciTech Connect (OSTI)

This paper is a review of the Department of Energy's (DOE) Contractor Purchasing System Review (CPSR) Program, which oversees the extensive subcontracting activities of the Department's management and operating (M and O) contractors. This review is part of a special GAO audit effort to help ensure that areas vulnerable to fraud, waste, abuse, and mismanagement are identified and that adequate corrective actions are taken. This effort focuses on 16 areas, one of which is DOE contractor oversight. This report describes the subcontracting deficiencies occurring at DOE, identifies shortcomings in DOE's CPSR Program, and discusses the corrective actions that DOE has committed to take in its CPSR Program in response to these findings.

Glenn, J.

1991-10-01T23:59:59.000Z

260

Information Resources Management Strategic Plan FY2014-2018  

Broader source: Energy.gov (indexed) [DOE]

authentication, continuous diagnostic and mitigation, and Trusted Internet Connections (TIC), we acknowledge that our current CAP score indicates that we still have a significant...

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

M E Environmental Management Environmental Management  

Broader source: Energy.gov (indexed) [DOE]

safety  performance  cleanup  closure safety  performance  cleanup  closure M E Environmental Management Environmental Management M E Environmental Management Environmental Management Office of Site Restoration, EM-10 Office of D&D and Facility Engineering, EM-13 Facility Deactivation & Decommissioning (D&D) D&D Program Map Addendum: Impact of American Recovery and Reinvestment Act (ARRA) on EM's D&D Program 2013 Edition U.S. Department Of Energy safety  performance  cleanup  closure M E Environmental Management Environmental Management safety  performance  cleanup  closure M E Environmental Management Environmental Management M E Environmental Management Environmental Management 3/13/2013 The American Recovery and Reinvestment Act of 2009

262

Energy management  

SciTech Connect (OSTI)

In January 1990 GAO began implementing a special audit effort to help ensure that areas vulnerable to fraud, waste, abuse, and mismanagement are identified and that appropriate corrective actions are taken. This effort focuses on 16 areas, one of which is the Department of Energy's (DOE) contracting practices. As part of this effort, the authors determined if contract audits for monitoring and overseeing DOE's contracting process were being performed and that we identify the impact or potential impact to the government when contract audits were not performed. Specifically, this paper discusses audit coverage of DOE's management and operating (M and O) contractors and DOE contracts, the problems that may occur when contract audit activity is not performed, and factors that have impeded contract audit coverage.

Dingell, J.D.

1991-10-01T23:59:59.000Z

263

Overview - Data Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Help > Data Management Help > Data Management Data Management for Data Providers Click an arrow to follow the data management path of a data set from planning to curation. plan Overview plan Plan manage Manage archive Archive curation DAAC Curation Data Management Overview Plan Manage Archive DAAC Curation Related Links DAAC Help Best Practices PDF Workshops DataONE ESIP Data Management Overview Welcome to the data management pages for data providers to the ORNL Distributed Active Archive (DAAC). These pages provide an overview of data management planning and preparation and offer practical methods to successfully share and archive your data. Plan - write a short data management plan while preparing your research proposal, Manage - assign logical, descriptive file names, define the contents of your data files, and use consistent data values when preparing

264

FIRE MANAGEMENT PLAN MONTAGUE PLAIN  

E-Print Network [OSTI]

FIRE MANAGEMENT PLAN FOR MONTAGUE PLAIN WILDLIFE MANAGEMENT AREA #12;Fire Management Plan for Montague Plain Wildlife Management Area prepared for Massachusetts Dept. of Fisheries, Wildlife. 2003. Fire Management Plan for Montague Plain Wildlife Management Area. Department of Natural Resources

Schweik, Charles M.

265

Waste Management | Department of Energy  

Energy Savers [EERE]

Management Waste Management Oak Ridge has an onsite CERCLA disposal facility, the Environmental Management Waste Management Facility, that reduces cleanup and transportation costs....

266

Load Management for Industry  

E-Print Network [OSTI]

In the electric utility industry, load management provides the opportunity to control customer loads to beneficially alter a utility's load curve Load management alternatives are covered. Load management methods can be broadly classified into four...

Konsevick, W. J., Jr.

1982-01-01T23:59:59.000Z

267

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

11, 2013 11, 2013 V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability The vulnerability is caused due to an unspecified error and can be exploited to invoke public methods on ColdFusion Components (CFC) using WebSockets July 10, 2013 V-196: Microsoft Security Bulletin Advance Notification for July 2013 Microsoft Security Bulletin Advance Notification for July 2013. Microsoft has posted 6 Critical Bulletin and 1 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" July allow remote execution of code. Microsoft will host a webcast to address customer questions on the security bulletins on July 10, 2013, at 11:00 AM Pacific Time (US & Canada). July 9, 2013 V-195: RSA Authentication Manager Lets Local Users View the Administrative

268

Federal Energy Management Program: Operations and Maintenance Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Management Support to someone by E-mail Management Support to someone by E-mail Share Federal Energy Management Program: Operations and Maintenance Management Support on Facebook Tweet about Federal Energy Management Program: Operations and Maintenance Management Support on Twitter Bookmark Federal Energy Management Program: Operations and Maintenance Management Support on Google Bookmark Federal Energy Management Program: Operations and Maintenance Management Support on Delicious Rank Federal Energy Management Program: Operations and Maintenance Management Support on Digg Find More places to share Federal Energy Management Program: Operations and Maintenance Management Support on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance Federal Requirements Program Management

269

Records Management Specialist  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as a Records Management Specialist in the Richland Operations Office (RL), Assistant Manager for Mission Support (AMMS), Infrastructure, Services...

270

Renae Speck Commercialization Manager  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Manager Renae Speck, Ph.D is a Commercialization Manager in the Office of Technology Transfer in the Partnership Directorate at the United States Department of Energy's Oak...

271

Workforce Management Office  

Office of Energy Efficiency and Renewable Energy (EERE)

The Workforce Management Office provides leadership, policy guidance, and technical advice to Office of Energy Efficiency and Renewable Energy (EERE) managers, supervisors, and employees on a broad...

272

Contract/Project Management  

Energy Savers [EERE]

1 st Quarter Overall Contract and Project Management Performance Metrics and Targets ContractProject Management Performance Metrics FY 2009 Target FY 2009 Actual Comment 1....

273

Contract/Project Management  

Broader source: Energy.gov (indexed) [DOE]

3 First Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Performance Metric FY 2013 Target FY 2013 Final FY...

274

Project Management Methodology  

Broader source: Energy.gov [DOE]

The Project Management Coordination Office (PMCO) provides the tools and guidance necessary to ensure consistent and effective management oversight of performer performance and consolidated...

275

Project Management Coordination Office  

Broader source: Energy.gov [DOE]

The Project Management Coordination Office (PMCO) provides guidance, leadership, training, and tools to Office of Energy Efficiency and Renewable Energy (EERE) management and the field in the area...

276

Stormwater Management Program (Pennsylvania)  

Broader source: Energy.gov [DOE]

Stormwater Management program of the Department of Environmental Protection's Bureau of Conservation and Restoration administers the rules and regulations for stormwater management for Pennsylvania...

277

Management of Nuclear Materials  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish requirements for the lifecycle management of DOE owned and/or managed accountable nuclear materials. Cancels DOE O 5660.1B.

2009-08-17T23:59:59.000Z

278

Coding AuthentiCity  

E-Print Network [OSTI]

This thesis analyzes the impact of form-based codes, focusing on two research questions: (1) What is the underlying motivation for adopting a form-based code? (2) What motivations have the most significant impact on ...

Mercier, Rachel Havens

2008-01-01T23:59:59.000Z

279

PROJECT MANAGEMENT PLANS Project Management Plans  

Broader source: Energy.gov (indexed) [DOE]

MANAGEMENT PLANS MANAGEMENT PLANS Project Management Plans  Overview  Project Management Plan Suggested Outline Subjects  Crosswalk between the Suggested PMP Outline Subjects and a Listing of Project Planning Elements  Elements of Deactivation Project Planning  Examples From Project Management Plans Overview The purpose here is to assist project managers and project planners in creating a project plan by providing examples and pointing to information that have been successfully used by others in the past. Section 4.2 of DOE Guide 430.1-3, DEACTIVATION IMPLEMENTATION GUIDE discusses the content and purpose of deactivation project management plans. It is presented as a suggested outline followed by other potential subjects. For the convenience of readers, that information is repeated below.

280

Federal Energy Management Program: Energy Management Requirements by Law  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Management Energy Management Requirements by Law and Regulation to someone by E-mail Share Federal Energy Management Program: Energy Management Requirements by Law and Regulation on Facebook Tweet about Federal Energy Management Program: Energy Management Requirements by Law and Regulation on Twitter Bookmark Federal Energy Management Program: Energy Management Requirements by Law and Regulation on Google Bookmark Federal Energy Management Program: Energy Management Requirements by Law and Regulation on Delicious Rank Federal Energy Management Program: Energy Management Requirements by Law and Regulation on Digg Find More places to share Federal Energy Management Program: Energy Management Requirements by Law and Regulation on AddThis.com... Requirements by Subject Requirements by Regulation

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Chemical Management Contacts  

Broader source: Energy.gov [DOE]

Contacts for additional information on Chemical Management and brief description on Energy Facility Contractors Group

282

telecommunications system management  

Science Journals Connector (OSTI)

Communications system management applied to telecommunications systems, facilities, equipment, and components. See communications system , comm...

2001-01-01T23:59:59.000Z

283

Career Map: Engineering Manager  

Broader source: Energy.gov [DOE]

The Wind Program's Career Map provides job description information for Engineering Manager positions.

284

PRC Contract Management Plan  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Contract Management Team Members, Including Roles and Responsibilities ... 3 Contracting Officer ......

285

Environmental Best Management Practices  

E-Print Network [OSTI]

Environmental Best Management Practices for Virginia's Golf Courses Prepared by Virginia Golf Course Superintendents Association #12;#12;EnvironmEntal BEst managEmEnt PracticEs for virginia's golf III I am pleased to endorse the Environmental Best Management Practices for Virginia's Golf Courses

Liskiewicz, Maciej

286

LPP Risk Management Plan  

Broader source: Energy.gov (indexed) [DOE]

History and Process History and Process Slide 2 M E Environmental Management Environmental Management History ◦ Current Baseline Process Overview ◦ Identification ◦ Simulation ◦ Management Successes & Challenges Slide 3 M E Environmental Management Environmental Management Current Baseline Risks ◦ 1 Week Risk Summit held week of August 4 th , 2008 Broad representation from all levels of Isotek, DOE, PTC, and outside consultants Focused on risk and opportunity identification Included risk description, assumptions, and triggers No quantification or analysis No restrictions, constraints, or filtering HQ provided facilitator Prescribed format and capture methodology Slide 4 M E Environmental Management Environmental Management Current Baseline Risks ◦ Risk Summit Results

287

Environmental Management System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Management System Management System Environmental Management System An Environmental Management System is a systematic method for assessing mission activities, determining the environmental impacts of those activities, prioritizing improvements, and measuring results. May 30, 2012 The continuous improvement cycle Our Environmental Management System encourages continuous improvement of our environmental performance. Contact Environmental Communication & Public Involvement P.O. Box 1663 MS M996 Los Alamos, NM 87545 (505) 667-0216 Email Managing our effects on the environment We are committed to protecting the environment while conducting our national security and energy-related missions. Laboratory Environmental Governing Policy What is the Environmental Management System? It covers every program in the Laboratory

288

Office of Resource Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Resource Management Resource Management Home Sub Offices › Business Operations › Information Management › Human Resources and Administration Mission and Functions HSS Standard Operating Practices (For Internal Users Only) HSS Subject Matter Experts and Functional Points of Contacts Contact Us HSS Logo Office of Resource Management Direct Report to the Chief Health, Safety and Security Officer Mission and Functions Mission The Office of Resource Management supports the infrastructure of the Office of Health, Safety and Security (HSS) by providing balanced, unbiased, technically competent, and customer focused services in the areas of: (1) Financial Management, including budget formulation and execution; (2) Procurement Management, including contract and credit card programs; (3) Information Management, including technology-based solutions and programs; (4) Quality Assurance; (5) Human Resources, including recruitment and retention programs; (6) Administrative Services, including property management, travel, and work space management; and; (7) Strategic and Program Planning including performance and efficiency measures.

289

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

31, 2011 31, 2011 T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. August 30, 2011 T-706: Microsoft Fraudulent Digital Certificate Issued by DigiNotar Fraudulent Digital Certificate Issued by DigiNotar, a Certification Authority Present in the Trusted Root Certification Authorities August 30, 2011 T-705: Linux Kernel Weakness in Sequence Number Generation Facilitates Packet Injection Attacks Linux Kernel Weakness in Sequence Number Generation Facilitates Packet Injection Attacks. August 29, 2011 T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password RSA enVision lets remote users view files and remote authenticated users

290

Comparing Elliptic Curve Cryptography and RSA on 8-Bit CPUs  

E-Print Network [OSTI]

.Patel,Arvinderpal.Wander,Hans.Eberle, Sheueling.Chang}@sun.com http://www.research.sun.com/projects/crypto Abstract. Strong public

Han, Richard Y.

291

Federal Energy Management Program: Best Management Practice: Information  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Information and Education Programs to someone by E-mail Information and Education Programs to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Information and Education Programs on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Information and Education Programs on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Information and Education Programs on Google Bookmark Federal Energy Management Program: Best Management Practice: Information and Education Programs on Delicious Rank Federal Energy Management Program: Best Management Practice: Information and Education Programs on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Information and Education Programs on AddThis.com...

292

Federal Energy Management Program: Best Management Practice: Commercial  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Commercial Kitchen Equipment to someone by E-mail Commercial Kitchen Equipment to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Commercial Kitchen Equipment on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Commercial Kitchen Equipment on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Commercial Kitchen Equipment on Google Bookmark Federal Energy Management Program: Best Management Practice: Commercial Kitchen Equipment on Delicious Rank Federal Energy Management Program: Best Management Practice: Commercial Kitchen Equipment on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Commercial Kitchen Equipment on AddThis.com... Sustainable Buildings & Campuses

293

Federal Energy Management Program: Best Management Practice: Alternate  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Alternate Water Sources to someone by E-mail Alternate Water Sources to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Alternate Water Sources on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Alternate Water Sources on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Alternate Water Sources on Google Bookmark Federal Energy Management Program: Best Management Practice: Alternate Water Sources on Delicious Rank Federal Energy Management Program: Best Management Practice: Alternate Water Sources on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Alternate Water Sources on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance Greenhouse Gases

294

Fusing Integration Test Management with Change Management  

E-Print Network [OSTI]

- 1 - Infuse: Fusing Integration Test Management with Change Management Gail E. Kaiser* Dewayne E, NJ 07974 Murray Hill, NJ 07974 Infuse is an experimental software development environment focusing the change set into the baseline. We have previously described how Infuse enforces static consistency at each

Perry, Dewayne E.

295

Federal Energy Management Program: Energy Management Guidance  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Guidance Guidance The Federal Energy Management Program (FEMP) provides guidance on Federal laws and regulations related to energy management. General Guidance for Facilities Overview of Federal Energy Management Policy and Mandates: Guidance document outlining Federal energy management goals and requirements for Federal energy managers. Sustainability Requirement Crosswalk: Crosswalk of sustainability and energy goals and targets within executive orders and other statutes. Guidelines Establishing Criteria for Excluding Buildings from the Energy Performance Requirements of Section 543 of the National Energy Conservation Policy Act as Amended by the Energy Policy Act of 2005 (EPAct 2005): Guidelines that established criteria for exclusions from the energy performance requirement for a fiscal year or any Federal building or collection of Federal buildings within the statutory framework provided by the law.

296

JC3 High Impact Assessment Bulletins | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

10, 2011 10, 2011 T-644: Prenotification Security Advisory - Adobe Acrobat & Adobe Readers Updates A prenotification Security Advisory has been posted in regards to the upcoming quarterly Adobe Reader and Acrobat updates scheduled for Tuesday, June 14, 2011. The updates will address critical security issues in the products. June 9, 2011 T-643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability A vulnerability has been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system. June 9, 2011 T-642: RSA SecurID update to Customers RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products

297

Plan - Data Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Plan Plan Data Management for Data Providers Click an arrow to follow the data management path of a data set from planning to curation. plan Overview plan Plan manage Manage archive Archive curation DAAC Curation Data Management Overview Plan Manage Archive DAAC Curation Related Links DAAC Help Best Practices PDF Workshops DataONE ESIP Data Management Plans NASA's Terrestrial Ecology Program now requires that each proposal include a Data Management Plan (DMP) of up to two pages. A DMP for a proposal is a brief document that outlines what you will do with your data during and after your research, to ensure your data will be safe, documented, and accessible now and in the future. A DMP - developed early and used throughout the research project - will increase research efficiency by making the data understandable and usable in the future and

298

Depleted Uranium Hexafluoride Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for for DUF 6 Conversion Project Environmental Impact Statement Scoping Meetings November/December 2001 Overview Depleted Uranium Hexafluoride (DUF 6 ) Management Program DUF 6 EIS Scoping Briefing 2 DUF 6 Management Program Organizational Chart DUF 6 Management Program Organizational Chart EM-10 Policy EM-40 Project Completion EM-20 Integration EM-50 Science and Technology EM-31 Ohio DUF6 Management Program EM-32 Oak Ridge EM-33 Rocky Flats EM-34 Small Sites EM-30 Office of Site Closure Office of Environmental Management EM-1 DUF 6 EIS Scoping Briefing 3 DUF 6 Management Program DUF 6 Management Program * Mission: Safely and efficiently manage the DOE inventory of DUF 6 in a way that protects the health and safety of workers and the public, and protects the environment DUF 6 EIS Scoping Briefing 4 DUF 6 Inventory Distribution

299

Computerized Maintenance Management Systems  

Broader source: Energy.gov [DOE]

Computerized maintenance management systems (CMMS) are a type of management software that perform functions in support of operations and maintenance (O&M) programs. The software automates most of the logistical functions performed by O&M staff.

300

Managing Director Buildings, Transportation  

E-Print Network [OSTI]

Site Development Will Terris Manager Gardening Maintenance Jim Gish Manager Landscape Specialty Tegwyn Maintenance and project Delivery Scott Sherwood Director Transportation Services Glenl Wear Director Grounds Supervisor Specialty Crews 17 Area supervisors Custodial Maintenance Charles Anderson Supervisor Activity

Seamons, Kent E.

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Environmental Management System Plan  

E-Print Network [OSTI]

management Water conservation LBNLs approach to sustainable environmentalWater Discharges) of Introduction Environmental Managementenvironmental compliance programs, such as air and water quality, as well as less traditional programs, such as wildland fire management,

Fox, Robert

2009-01-01T23:59:59.000Z

302

Management of Nuclear Materials  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish requirements for the lifecycle management of DOE owned and/or managed accountable nuclear materials. Cancels DOE O 410.2. Admin Chg 1 dated 4-10-2014, cancels DOE O 410.2.

2009-08-17T23:59:59.000Z

303

Improving Project Management  

Broader source: Energy.gov [DOE]

On December 19, 2014, the Energy Department released its "Improving Project Management" report, a roadmap to transformation in funding, culture, project ownership, independent oversight and front-end planning from experienced project management leaders.

304

DECENTRALIZED WASTEWATER MANAGEMENT  

E-Print Network [OSTI]

1 DECENTRALIZED WASTEWATER MANAGEMENT: A GUIDEBOOK FOR GEORGIA COMMUNITIES Katie Sheehan wastewater treatment technologies. www.njunsystems.com Version 1.0, April 2013 #12; 2 DECENTRALIZED WASTEWATER MANAGEMENT: A GUIDEBOOK FOR GEORGIA COMMUNITIES PART ONE: BACKGROUND, ISSUES, AND PROGRAM

Rosemond, Amy Daum

305

Information Technology Project Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Cancels DOE G 200.1-1. Admin Chg 1 approved 1-16-2013.

2012-12-03T23:59:59.000Z

306

Information Technology Project Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Cancels DOE G 200.1-1. Admin Chg 1, dated 1-16-2013, cancels DOE O 415.1.

2012-12-03T23:59:59.000Z

307

COMPREHENSIVE LEGACY MANAGEMENT  

Office of Legacy Management (LM)

Comprehensive Legacy Management and Institutional Controls Plan U.S. Department of Energy Volume I-Legacy Management Plan Doc. No. S03496-8.0-Final Page 6 January 2015...

308

Risk Management Guide  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides non-mandatory risk management approaches for implementing the requirements of DOE O 413.3B, Program and Project Management for the Acquisition of Capital Assets. Cancels DOE G 413.3-7.

2011-01-18T23:59:59.000Z

309

Best Environmental Management Practices  

E-Print Network [OSTI]

Best Environmental Management Practices Farm Animal Production Disposal of Farm Medical Wastes Dan Vitamins and minerals Topical Medications Sprays Dewormers Ointments #12;Best Environmental Management of environmental contamination with chemicals or infectious agents. These include, among others: Injectable

310

Program Management | Department of Energy  

Energy Savers [EERE]

Management Program Management The Oak Ridge Office of Environmental Management is located in the Joe L. Evins Federal Building in Oak Ridge, Tennessee. The Oak Ridge Office of...

311

Conservation and drought management  

E-Print Network [OSTI]

Fall 2012 tx H2O 5 Column by Dr. Calvin Finch, Water Conservation and Technology Center director Conservation and Drought Management WAT E R CONSERVATION & TECHNOLOGY CENTER Securing Our Water Future Water conservation and drought... management are related, but they are not the same. Water conservation is a long-term e#27;ort to reduce the amount of water it takes to manufacture goods, manage households and care for landscapes. Drought management is water-use rules initiated to deal...

Finch, Calvin

2012-01-01T23:59:59.000Z

312

Portfolio Manager Overview Presentation  

Broader source: Energy.gov [DOE]

This presentation, given through the DOE's Technical Assitance Program (TAP), provides information on the Portfolio Manager Overview

313

Benchmarking Corporate Energy Management  

E-Print Network [OSTI]

BENCHMARKING CORPORATE ENERGY MANAGEMENT Dr. Douglas L. Norland Director of Research and Industrial Programs Alliance to Save Energy Washington, DC ABSTRACT There is growing interest among energy managers in finding out how their company...BENCHMARKING CORPORATE ENERGY MANAGEMENT Dr. Douglas L. Norland Director of Research and Industrial Programs Alliance to Save Energy Washington, DC ABSTRACT There is growing interest among energy managers in finding out how their company...

Norland, D. L.

314

Maintenance and Veg Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Infrastructure projects Interconnection OASIS OATT Reauthorization of Transmission Line Permits, Maintenance and Vegetation Management on Forest Service Lands in Colorado,...

315

Management Transition Guidance  

Broader source: Energy.gov (indexed) [DOE]

Records and Information Records and Information Management Transition Guidance November 2013 Records and Information Management Transition Guidance i Records and Information Management Transition Guidance Table of Contents Executive Summary ........................................................................................................................ 1 1.0 Introduction and Purpose ..................................................................................................... 1 LM Records Functions ................................................................................................................ 1 2.0 The Records Life Cycle ....................................................................................................... 2 3.0 Organizational Responsibilities ........................................................................................... 2

316

Sport Management Academic Offerings  

E-Print Network [OSTI]

production and programming of events; marketing and public relations; technological operations management Exploration of a topic (to be determined) not covered by the standard curriculum but of interest to faculty and sponsoring events. Management process, including theory of management and practical applications within

Raina, Ramesh

317

Best Environmental Management Practices  

E-Print Network [OSTI]

Best Environmental Management Practices Farm Animal Production Land Application of Manure management practices to avoid polluting surface or groundwater. 1. Public and private water wells Public pollution of surface waters increases. Therefore, to avoid this risk, manure P loadings should be managed

318

Financial Management Oversight  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order defines requirements for effective financial management and adherence to DOE and applicable external financial management requirements and sets forth standards for ensuring the integrity and responsiveness of financial management and the accuracy and reliability of DOEs financial statements. Cancels DOE O 2200.13.

2006-08-31T23:59:59.000Z

319

Contract Signature Using Quantum Information  

E-Print Network [OSTI]

This paper describes how to perform contract signature in a fair way using quantum information. The protocol proposed permits two partners, users of a communication network, to perform a contract signature based on the RSA security. The authentication of the signers is based on the use of a non-local XOR function of two classical bits.

Paulo Benicio Melo de Sousa; Rubens Viana Ramos

2007-11-08T23:59:59.000Z

320

HIERARCHICAL MANAGEMENT OF BATTLEFIELD NETWORKS WITH THE SHAMAN MANAGEMENT SYSTEM  

E-Print Network [OSTI]

HIERARCHICAL MANAGEMENT OF BATTLEFIELD NETWORKS WITH THE SHAMAN MANAGEMENT SYSTEM Adarshpal S with a description of the SHAMAN system and briefly introduces its applica- tions to the management of tactical for MANagement). This management system developed at the Network Management Laboratory of the Univer- sity

Sethi, Adarshpal

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Integrated Safety Management (ISM)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Integrated Safety Management Integrated Safety Management Home ISM Policy ISM Champions ISM Workshops Resources Archives Contact Us Health and Safety HSS Logo Integrated Safety Management (ISM) ism logo Welcome to the Department of Energy's Office of Health, Safety and Security (HSS) Integrated Safety Management (ISM) Web Site. The Department and its contractors remain firmly committed to ISM as first defined in 1996. The objective of ISM is to perform work in a safe and environmentally sound manner. More specifically, as described in DOE P 450.4, Safety Management System Policy: "The Department and Contractors must systematically integrate safety into management and work practices at all levels so that missions are accomplished while protecting the public, the worker, and the environment. This is to be accomplished through effective integration of safety management into all facets of work planning and execution." "

322

ENVIRONMENTAL MANAGEMENT OFFICE OF ENVIRONMENTAL MANAGEMENT  

Broader source: Energy.gov (indexed) [DOE]

ENVIRONMENTAL ENVIRONMENTAL MANAGEMENT OFFICE OF ENVIRONMENTAL MANAGEMENT OFFICE OF ENVIRONMENTAL MANAGEMENT OFFICE OF EM Recovery NEWS FLASH RECOVERY.GOV March 10, 2011 American Recovery and Reinvestment Act Payments Surge Past $4 Billion U.S. Depar tment of Energy | Office of Environmental Management For More Information on EM Recovery Act Work, Visit Us on the Web: http://www.em.doe.gov/emrecovery/ FINANCIAL HIGHLIGHTS * More than $4 BILLION in Recovery Act payments are accelerating environmental cleanup * 67% of EM Recovery Act funds have been paid Financial data are based on reporting as of March 9, 2011, and are subject to change. EM has made more than $4 billion in Recovery Act payments, or 32 percent of the DOE's $12.4 billion in Recovery Act payments. DOE received $35.2 billion

323

Energy Management Working Group: Accelerating Energy Management  

E-Print Network [OSTI]

Countries participating in the Global Superior Energy Performance (GSEP) Energy Management Working Group (EMWG) are leveraging their resources and taking collective action to strengthen national and international efforts to facilitate the adoption...

Scheihing, P.

2014-01-01T23:59:59.000Z

324

Strategies for Successful Energy Management  

Broader source: Energy.gov [DOE]

This presentation, given through the DOE's Technical Assitance Program (TAP), provides information on energy management for the portfolio manager initiative

325

Federal Energy Management Program: Federal Energy and Water Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Federal Energy and Federal Energy and Water Management Awards to someone by E-mail Share Federal Energy Management Program: Federal Energy and Water Management Awards on Facebook Tweet about Federal Energy Management Program: Federal Energy and Water Management Awards on Twitter Bookmark Federal Energy Management Program: Federal Energy and Water Management Awards on Google Bookmark Federal Energy Management Program: Federal Energy and Water Management Awards on Delicious Rank Federal Energy Management Program: Federal Energy and Water Management Awards on Digg Find More places to share Federal Energy Management Program: Federal Energy and Water Management Awards on AddThis.com... Project Assistance Training Outreach Awards for Saving Energy Federal Energy and Water Management Better Buildings Federal Award

326

Federal Energy Management Program: Interagency Energy Management Task Force  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

About the Program About the Program Site Map Printable Version Share this resource Send a link to Federal Energy Management Program: Interagency Energy Management Task Force Members to someone by E-mail Share Federal Energy Management Program: Interagency Energy Management Task Force Members on Facebook Tweet about Federal Energy Management Program: Interagency Energy Management Task Force Members on Twitter Bookmark Federal Energy Management Program: Interagency Energy Management Task Force Members on Google Bookmark Federal Energy Management Program: Interagency Energy Management Task Force Members on Delicious Rank Federal Energy Management Program: Interagency Energy Management Task Force Members on Digg Find More places to share Federal Energy Management Program: Interagency Energy Management Task Force Members on AddThis.com...

327

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

19, 2011 19, 2011 T-697: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible. August 18, 2011 T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. August 17, 2011 T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets

328

Program Management | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Management Management Program Management Safety The Office of Environmental Management's (EM) top priority is to ensure proper implementation and continuous improvement of Integrated Safety Management Systems (ISMS) in the EM complex and to serve as a focal point for EM safety standards and policy development and interpretation and interfaces with internal/external oversight organizations Read more Acquisition The Office of Environmental Management strives to assure effective project, acquisition, and contract management, by working closely with senior level officials in Headquarters and Field Managers; external stakeholders; and major contractors for the purpose of achieving acquisition and project management objectives of the Office of Environmental Management (EM)

329

Business System Management Review  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

P-004 Business System Management Review Process 11_0304Page 1 of 7 P-004 Business System Management Review Process 11_0304Page 1 of 7 EOTA - Business Process Document Title: Business System Management Review Process Document Number: P-004 Rev 11_0304 Document Owner: Elizabeth Sousa Backup Owner: Melissa Otero Approver(s): Melissa Otero Parent Document: Q-001, Quality Manual Notify of Changes: EOTA Employees Referenced Document(s): F-009, Business System Management Review Template P-004 Business System Management Review Process 11_0304Page 2 of 7 Revision History: Rev. Description of Change A Initial Release 08_0414 Corrective Actions, Preventive Actions, and Improvement Opportunity 09_1124 Edited document for clarity and to better fit the process in use. Added requirement to provide management with

330

A Security Solution for IEEE 802.11's Ad-hoc Mode:Password-Authentication and Group Diffie-Hellman Key Exchange  

SciTech Connect (OSTI)

The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.

Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

2005-10-01T23:59:59.000Z

331

Chapter 1 - Risk Management  

Science Journals Connector (OSTI)

This chapter describes the principles of risk management as they apply to the offshore oil and gas industry, the impact the Deepwater Horizon/Macondo event had on the industry and how safety management systems have evolved in response. The fundamentals of safety management are described including: acceptable risk, process safety and culture, the use of risk matrices, the economics of offshore safety, means of measuring progress, and leading and lagging indicators. The distinction between prescriptive and nonprescriptive systems is discussed.

Ian Sutton

2014-01-01T23:59:59.000Z

332

Sustainable Energy Management Programs  

E-Print Network [OSTI]

Sustainable Energy Management Programs Steve Hanner Allen ISD/TEMA . ESL-KT-14-11-45 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 Starting an Energy Management Program Recognize need, Elicit District Commitment... Appoint Energy Manager Analyze Existing Conditions Develop Plan Implement and Monitor Program ESL-KT-14-11-45 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 Sustainable Programs Feature District Commitment...

Hanner, S.

2014-01-01T23:59:59.000Z

333

EMERGENCY MANAGEMENT (EM)  

Broader source: Energy.gov (indexed) [DOE]

MANAGEMENT (EM) MANAGEMENT (EM) OBJECTIVE EM.1 A routine drill program and emergency operations drill program, including program records, have,been established and implemented. (Core Requirement 11) Criteria 1. Emergency preparedness drills and exercises are conducted and an adequate response capability,exists. 2. Routine operations drills and exercises are conducted and an adequate response capability exists. 3. Applicable emergency management documentation (e.g., Building Emergency Plan, emergency,response procedures, Emergency Preparedness Hazards Assessment, alarm response procedures,,and emergency response procedures) has been updated to reflect implementation of the TA-55 . Approach Record Reviews: Review the emergency management documents (e.g., Building

334

Federal Identity Management Handbook  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Federal Identity Management Handbook Federal Identity Management Handbook Version 0.1 December 2005 VERSION 0.1 Federal Identity Management Handbook Acknowledgements The Office of Management and Budget and the Federal Identity Credentialing Committee would like to acknowledge the significant contributions of the National Institute of Standards and Technology (NIST) and the Government Smart Card Interagency Advisory Board (IAB) for providing valuable contributions to the development of this handbook. A special thanks goes out to those who participated in the various workshops and provided valuable subject matter expertise and lessons learned. The comments received from other government and industry organizations are also acknowledged. VERSION 0.1 i

335

Integrated Safety Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Safety Management BEHAVIOR (SAFETY CULTURE) - principles of behavior (values) - align motivations PLAN WORK define project scope define facility functional requirements define and...

336

Traffic Management Specialist  

Broader source: Energy.gov [DOE]

The incumbent in this position will serve as a Traffic Management Specialist for BPAs Transmission Business Line (TBL) and oversee commercial transportation services for the movement of materials...

337

Radioactive Waste Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish policies and guidelines by which the Department of Energy (DOE) manages tis radioactive waste, waste byproducts, and radioactively contaminated surplus facilities.

1984-02-06T23:59:59.000Z

338

Advisory Committee Management Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual provides detailed DOE requirements, responsibilities, processes, and procedures for the establishment, operation, and management of advisory committees. Cancels DOE M 510.1-1.

2007-10-22T23:59:59.000Z

339

Change Control Management Guide  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Guide provides a suggested approach and uniform guidance for managing project and contract changes through applying the requirements of DOE O 413.3B. No cancellation.

2011-07-29T23:59:59.000Z

340

Environmental Resource Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Environmental Resource Management This division delivers science-based engineering solutions to meet regional and national energy, water and other critical environmental...

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Management Control Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish requirements and responsibilities for the Department of Energy Management Control Program. Cancels DOE O 413.1. Canceled by DOE O 413.1B.

2002-04-18T23:59:59.000Z

342

Contemporary heart failure management.  

E-Print Network [OSTI]

??The research presented within this thesis aims to add to the current knowledge regarding contemporary heart failure (HF) management. Chapter 2 describes a study collating (more)

Wasywich, Cara Anne

2009-01-01T23:59:59.000Z

343

Strategisches Management und Strategiegenese  

Science Journals Connector (OSTI)

Im vorhergenden Kapitel wurden die theoretischen Grundlagen von Total Quality Management erlutert und differenzierte Untersuchungen zu Umsetzungsversuchen im betrachteten Unternehmen angestellt. Ergebnis dies...

Martin Boehme

1998-01-01T23:59:59.000Z

344

Project Risk Management:.  

E-Print Network [OSTI]

?? The recent increase in international projects has resulted in higher risk along with difficulties in control and coordination. Effective project management can therefore be (more)

Koelmeyer, Chris

2013-01-01T23:59:59.000Z

345

Inventory Management Specialist  

Broader source: Energy.gov [DOE]

(See Frequently Asked Questions for more information). Where would I be working? Western Area Power Administration, Upper Great Plains Region, Management (B1000), duty station Fort Peck, Montana...

346

Property Management Specialist  

Broader source: Energy.gov [DOE]

(See Frequently Asked Questions for more information). Where would I be working? Western Area Power Administration, Upper Great Plains Region, Management (B1000), duty station, Bismarck, North...

347

EERE Program Management Guide  

Office of Energy Efficiency and Renewable Energy (EERE)

Updated in December 2007, this guide is a comprehensive reference manual on EERE program management. The following documents are available as Adobe Acrobat PDFs.

348

INL's Environmental Management System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and minimize environmental impacts throughout the lifecycle of INL facilities and operations. Conduct all activities and manage hazardous and radioactive materials and...

349

Energy Management Systems  

E-Print Network [OSTI]

This presentation will address results from a pilot project with 10 chemical plants on energy management systems and the development of an energy efficiency plant certification program....

Ferland, K.

2007-01-01T23:59:59.000Z

350

Parallel integrated thermal management  

DOE Patents [OSTI]

Embodiments discussed herein are directed to managing the heat content of two vehicle subsystems through a single coolant loop having parallel branches for each subsystem.

Bennion, Kevin; Thornton, Matthew

2014-08-19T23:59:59.000Z

351

Management's Discussion & Analysis Profile  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

7-26-2013. Management's Discussion & Analysis Profile The Bonneville Power Administration is a federal agency under the Department of Energy. BPA markets wholesale electrical power...

352

Energy, Data Management, Reporting  

Office of Environmental Management (EM)

Design the Strategy | Deliver Efficiency | Sustain Results Energy, Data Management, Reporting This presentation does not contain any proprietary, confidential, or otherwise...

353

ORISE: Peer Review Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Management Man participating in a peer review The Oak Ridge Institute for Science and Education (ORISE) ensures that scientific reviews are conducted in a professional manner and...

354

Records Management Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order sets forth requirements and responsibilities for implementing and maintaining a cost-effective records management program throughout the Department of Energy.

2006-02-03T23:59:59.000Z

355

Records Management Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order sets forth requirements and responsibilities for establishing and maintaining a program for the efficient and economical management of records and information assets.

2011-07-26T23:59:59.000Z

356

Comprehensive Emergency Management System  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes policy and assigns roles and responsibilities for the Department of Energy (DOE) Emergency Management System. Cancels DOE O 151.1B.

2005-11-02T23:59:59.000Z

357

Hydro Capital Asset Manager  

Broader source: Energy.gov [DOE]

This position is located in Federal Hydro Projects, Generation Asset Management, Power Services. Additional vacancies may be filled through this vacancy announcement or if they become available.

358

Environmental Management Commission (Alabama)  

Broader source: Energy.gov [DOE]

The Alabama Department of Environmental Management is charged with developing the state's environmental policy, hearing administrative appeals of permits, administrative orders and variances issued...

359

Faculty of Management University of Lethbridge | 2007 Faculty of Management  

E-Print Network [OSTI]

is what will be inside. new innovative approach- es to research, teaching and learning. Univ-Manage of Management and School of Health Sciences, is close to completion, and all levels of the University communitymatters MANAGEMENT Faculty of Management · University of Lethbridge | 2007 Faculty of Management

Seldin, Jonathan P.

360

Project Management vs. Systems Engineering Management: A Practitioners' View on  

E-Print Network [OSTI]

Project Management vs. Systems Engineering Management: A Practitioners' View on IntegratingPROJECT MANAGEMENT VS. SYSTEMS ENGINEERING MANAGEMENT Received 3 August 2010; Revised 18 December 2010 (wileyonlinelibrary.com). DOI 10.1002/sys.20187 ABSTRACT While most Systems Engineering Management (SEM) applications

de Weck, Olivier L.

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Integrated Water Management Options in the Nebraska Ground Water Management &  

E-Print Network [OSTI]

Integrated Water Management Options in the Nebraska Ground Water Management & Protection Act by J of the Nebraska Ground Water Management & Protection Act (GMPA) 2. the special GMPA integrated water management a correlative rights framework, and 5. what additional water management tools are needed to effectively deal

Nebraska-Lincoln, University of

362

Safeguards management inspection procedures  

SciTech Connect (OSTI)

The objective of this inspection module is to independently assess the contributions of licensee management to overall safeguards systems performance. The inspector accomplishes this objective by comparing the licensee's safeguards management to both the 10 CFR, parts 70 and 73, requirements and to generally accepted management practices. The vehicle by which this comparison is to be made consists of assessment questions and key issues which point the inspector to areas of primary concern to the NRC and which raise additional issues for the purpose of exposing management ineffectiveness. Further insight into management effectiveness is obtained through those assessment questions specifically directed toward the licensee's safeguards system performance. If the quality of the safeguards is poor, then the inspector should strongly suspect that management's role is ineffective and should attempt to determine management's influence (or lack thereof) on the underlying safeguards deficiencies. (The converse is not necessarily true, however.) The assessment questions in essence provide an opportunity for the inspector to identify, to single out, and to probe further, questionable management practices. Specific issues, circumstances, and concerns which point to questionable or inappropriate practices should be explicitly identified and referenced against the CFR and the assessment questions. The inspection report should also explain why the inspector feels certain management practices are poor, counter to the CFR, and/or point to ineffecive management. Concurrent with documenting the inspection results, the inspector should provide recommendations for alleviating observed management practices that are detrimental to effective safeguards. The recommendations could include: specific changes in the practices of the licensee, followup procedures on the part of NRC, and proposed license changes.

Barth, M.J.; Dunn, D.R.

1984-08-01T23:59:59.000Z

363

POSITION MANAGEMENT ACTION FORM  

E-Print Network [OSTI]

POSITION MANAGEMENT ACTION FORM Workforce Planning | 408-924-2250 classcomp@sjsu.edu SJSU Human FOR POSITION MANAGEMENT FORM Workforce Planning | 408-924-2250| classcomp@sjsu.edu SJSU Human Resources Revised contact your Workforce Planning Analyst. List the name of the position this position reports to

Eirinaki, Magdalini

364

Comprehensive Irrigation Management  

E-Print Network [OSTI]

The other irrigation ? Optimizing water consumption in urban landscapes Kenneth Cook President, Intelligent Irrigation Banyan Water Water risk ? increasing rapidly in the US 2 Sustainable property management 3 ? ?Green? ? Audubon Cert... ? Commoditized relationships ? Disconnect with conservation investments & sustainable water savings ? High turnover rates among property managers and landscape contractors ? Economic pressures on operating expense to maintain system integrity Result...

Cook, K.

2011-01-01T23:59:59.000Z

365

Facilities Management CAD Standards  

E-Print Network [OSTI]

Facilities Management CAD Standards 2011 #12;Facilities Management CAD Standards Providing: Layering Standards 2.1 Layer Name Format 2.2 Layer Name Modifiers 2.3 Layer Attributes 2.4 Special Layer of PDF and DWG Files APPENDIX A: DAL FM CAD Standard Layers APPENDIX B: DAL FM CAD Special Layers

Brownstone, Rob

366

Energy Management Webinar Series  

Broader source: Energy.gov [DOE]

Boost your knowledge on how to implement an energy management system through this four-part webinar series from the Superior Energy Performance program. Each webinar introduces various elements of the ISO 50001 energy management standardbased on the Plan-Do-Check-Act approachand the associated steps of DOE's eGuide for ISO 50001 software tool.

367

Assistant Provost Enrollment Management  

E-Print Network [OSTI]

Management Information Technology ·Admissions ·Financial Aid & Scholarships ·Office of the Registrar emails. OSU Opportunity Scholarships 2/29/08 deadline. #12;Enrollment Management Information Technology #12;Federal & State Issues · Reauthorization of the Higher Education Act ­ impacts many areas

Escher, Christine

368

Risk Management Guide  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides a framework for identifying and managing key technical, schedule, and cost risks through applying the requirements of DOE O 413.3A, Program and Project Management for the Acquisition of Capital Assets, dated 7-28-06. Canceled by DOE G 413.3-7A, dated 1-12-11. Does not cancel other directives.

2008-09-16T23:59:59.000Z

369

Information Collection Management Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Order sets forth DOE requirements and responsibilities for implementing the information collection management provisions of the Paperwork Reduction Act of 1995 and the Office of Management and Budgets implementing regulation Controlling Paperwork Burdens on the Public, as contained in 5 CFR 1320. No cancellation.

2006-10-11T23:59:59.000Z

370

Operating System Resource Management  

E-Print Network [OSTI]

Operating System Resource Management Date: Monday, September 27, 2010 Time: 2:00 ­ 3:00 pm Location allocation and de-allocation by an operating system of processor cores, memory pages, and various types constrained. This talk will propose a scheme for addressing the operating system resource management problem

371

6 Management Plan Introduction  

E-Print Network [OSTI]

and enhance the fish and wildlife populations and the aquatic and terrestrial ecosystems that exist within for restoration of fish and wildlife habitat and populations which form the bulk of the management plan is derived or the inventory. The assessment and inventory are designed and may be used to guide restoration and management

372

Risk Management RM  

Broader source: Energy.gov (indexed) [DOE]

Risk Management Review Module Risk Management Review Module March 2010 CD-0 O 0 OFFICE OF C CD-1 F ENVIRO Standard R Risk M Rev Critical Decis CD-2 M ONMENTAL Review Plan Managem view Module sion (CD) Ap CD March 2010 L MANAGE (SRP) ment e pplicability D-3 EMENT CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-1189-2008, Integration of Safety into the Design Process, and EM's internal

373

Office of Legacy Management  

Broader source: Energy.gov (indexed) [DOE]

December 1.7, 2010 December 1.7, 2010 MEMORANDUM FOR DAVID W. GEISER, DIRECTOR, DOE-LM- 1 FROM: TRACY A. RIBEIRO, ENVIRONMENTAL PROGRAM MANAGER, DOE-LM , f , ,,, Tracy R i b e ~ r o n / / 2010.1 2 17 08:47:34 -07'00' SUBJECT: Approval of FY 201 1 EMS Goals and Initiatives In accordance with the requirements of the DOE-LM Environmental Management System Description, the highlighted EMS goals and initiatives for FY 201 1 are enclosed for your formal approval. The EMS goals and initiatives align with DOE Order 450.1 A, Environmental Protection Program; DOE Order 430.2B, Departmental Energy, Renewable Energy and Transportation Management; the Transformational Energy Action Management (TEAM) Initiative, Executive Order 13423, Strengthening Federal Environmental, Energy and Transportation Management,

374

Terrestrial Carbon Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Terrestrial Carbon Management Data Sets and Analyses Terrestrial Carbon Management Data Sets and Analyses Carbon Accumulation with Cropland Management Influence of Agricultural Management on Soil Organic Carbon: A Compendium and Assessment of Canadian Studies (VandenBygaart et al., Agriculture and Agri-Food Canada) Soil Carbon Sequestration by Tillage and Crop Rotation: A Global Data Analysis (West and Post, Oak Ridge National Laboratory) Preliminary Estimates of the Potential for Carbon Mitigation in European Soils Through No-Till Farming (Smith et al., University of Aberdeen, United Kingdom) Potential for Carbon Sequestration in European Soils: Preliminary Estimates for Five Scenarios Using Results from Long-Term Experiments (Smith et al., University of Aberdeen, United Kingdom) Carbon Accumulation with Grassland Management

375

Federal Energy Management Program: Best Management Practice: Laboratory and  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Laboratory and Medical Equipment to someone by E-mail Laboratory and Medical Equipment to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Laboratory and Medical Equipment on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Laboratory and Medical Equipment on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Laboratory and Medical Equipment on Google Bookmark Federal Energy Management Program: Best Management Practice: Laboratory and Medical Equipment on Delicious Rank Federal Energy Management Program: Best Management Practice: Laboratory and Medical Equipment on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Laboratory and Medical Equipment on AddThis.com... Sustainable Buildings & Campuses

376

Federal Energy Management Program: Best Management Practice: Toilets and  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Toilets and Urinals to someone by E-mail Toilets and Urinals to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Toilets and Urinals on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Toilets and Urinals on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Toilets and Urinals on Google Bookmark Federal Energy Management Program: Best Management Practice: Toilets and Urinals on Delicious Rank Federal Energy Management Program: Best Management Practice: Toilets and Urinals on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Toilets and Urinals on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance Greenhouse Gases Water Efficiency Basics

377

Best Management Practice: Water Management Planning | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Best Management Practice: Water Management Planning Best Management Practice: Water Management Planning Best Management Practice: Water Management Planning October 7, 2013 - 3:03pm Addthis A successful water management program starts with developing a comprehensive water management plan. This plan should be included within existing facility operating plans. Water management plans should provide clear information about how a facility uses water from the time it is piped in to its ultimate disposal. Knowing how water is used and what it costs enables Federal agencies to make appropriate water management decisions. Overview Federal facility water management plans should include the following: Water Use Policy Statement and Goals Senior management should indicate support for water efficiency in a material way. This can be done in two ways:

378

DRAFT Fifteenmile Management Plan 5. Fifteenmile Subbasin Management Plan  

E-Print Network [OSTI]

DRAFT Fifteenmile Management Plan 5. Fifteenmile Subbasin Management Plan DRAFT May 25 2004 Compiled by Wasco County Soil and Water Conservation District in cooperation with Fifteenmile Coordinating Group 5. FIFTEENMILE SUBBASIN MANAGEMENT PLAN

379

Forensic Management Academy Spring 2011 Tentative Schedule Forensic Management Academy  

E-Print Network [OSTI]

Forensic Management Academy ­ Spring 2011 Tentative Schedule Forensic Management Academy Spring:00 Tour Forensic Program Facilities 4:30 ­ 7:30 Session VIII Conflict Management Joyce Heames7:00 Free

Mohaghegh, Shahab

380

Nuclear Transportation Management Services | Department of Energy  

Office of Environmental Management (EM)

Nuclear Transportation Management Services Nuclear Transportation Management Services Nuclear Transportation Management Services More Documents & Publications Transportation and...

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Information and Records Management Transition Guidance | Department...  

Energy Savers [EERE]

Information and Records Management Transition Guidance Information and Records Management Transition Guidance Information and Records Management Transition Guidance (March 2004)...

382

Administrative Management Records | Department of Energy  

Office of Environmental Management (EM)

Administrative Management Records Administrative Management Records This schedule covers those administrative management activities not covered by other Administrative Schedules...

383

Appendix 8 - iManage Change Management Standards  

Broader source: Energy.gov (indexed) [DOE]

not impact integration between iManage systems. These changes are managed by the specific project change control procedures. If there is uncertainty that a proposed change affects...

384

Robust Investment Management with Uncertainty in Fund Managers  

E-Print Network [OSTI]

Abstract: We consider a problem where an investment manager must allocate an available budget among a set of fund managers, whose asset allocations are...

Yang Dong

385

Line Management Perspective: Office of Environmental Management (EM)  

Broader source: Energy.gov [DOE]

Slide Presentation by Matthew Moury, Deputy Assistant Secretary for Safety, Security and Quality Programs, Office of Environmental Management. EFCOG Integrated Safety Management Work Planning and Control.

386

BS in RECREATION MANAGEMENT: Experience Industry Management Emphasis (664521) MAP Sheet Department of Recreation Management  

E-Print Network [OSTI]

BS in RECREATION MANAGEMENT: Experience Industry Management Emphasis (664521) MAP Sheet Department of Recreation Management For students entering the degree program during the 2013­2014 curricular year Recreation Management Core courses: RecM 404 Principles of Recreation Management RecM 420 Event

Olsen Jr., Dan R.

387

Enumeration Cases in Management Mathematics  

Science Journals Connector (OSTI)

......illustration of the five stage approach to mathematical modelling...model without such an approach, whereas most can...Starr, M. K., "Management Science," McGraw-Hill...Financial Management, and Management Sciences degree programmes......

MALCOM KING

1988-01-01T23:59:59.000Z

388

MANAGEMENT CONTROL SYSTEM IN PUBLIC  

E-Print Network [OSTI]

1 MANAGEMENT CONTROL SYSTEM IN PUBLIC ADMINISTRATION: BEYOND RATIONAL MYTHS Nicolas Berland of practices around their management control systems. Despite some apparent failures, the implemented systems organizations have developed management control systems. Historically, these systems have been invented

Paris-Sud XI, Université de

389

Federal Energy Management Program: Best Management Practice: Distribution  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Distribution System Audits, Leak Detection, and Repair to someone Distribution System Audits, Leak Detection, and Repair to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Distribution System Audits, Leak Detection, and Repair on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Distribution System Audits, Leak Detection, and Repair on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Distribution System Audits, Leak Detection, and Repair on Google Bookmark Federal Energy Management Program: Best Management Practice: Distribution System Audits, Leak Detection, and Repair on Delicious Rank Federal Energy Management Program: Best Management Practice: Distribution System Audits, Leak Detection, and Repair on Digg Find More places to share Federal Energy Management Program: Best

390

Procurement and Property Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Doing Business with... Doing Business with... Brookhaven National Laboratory (BNL) Procurement and Property Management provides customers with timely, cost-effective procurement and property management services integrated with and supporting the Laboratory's science, technology and cleanup missions in accordance with the prime contract and customer expectations. Services Include: Procurement of high quality supplies and services that meet customer requirements, Identification and control of government property, Maintaining an efficient stores operation, Expeditious shipping, receiving and delivery services. PPM Has Moved! We are located at: 44 Ramsey Road Shirley, NY 11967 Directions Procurement Property Management Purchasing System Approval (pdf) Personal Property Approval (pdf)

391

Risk Management Tool Attributes:  

Broader source: Energy.gov (indexed) [DOE]

- Tools & SMEs - Tools & SMEs Outline for Breakout Session TOOLS 1. Types of Tools a. Risk Management - Database & Reports, risk register, risk forms, risk tracking & monitoring, basis of estimate, action item tracking, historical record of risks & changes, configuration control, enterprise-wide, metrics, risk performance index, risk checklist, graphical display, management reporting (various levels), risk communications b. Risk Analysis i. Cost, ii. budgets, funding, cash-flow analysis, iii. Schedule iv. tailoring categories v. Integrated Cost & Schedule vi. Project phase analysis; organization ownership & joint planning c. Risk Knowledge and Lessons Learned Database i. Enterprise-wide ii. Job/owner-specific iii. Workshops - project specific, risk management,

392

Radioactive Waste Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual further describes the requirements and establishes specific responsibilities for implementing DOE O 435.1, Radioactive Waste Management, for the management of DOE high-level waste, transuranic waste, low-level waste, and the radioactive component of mixed waste. The purpose of the Manual is to catalog those procedural requirements and existing practices that ensure that all DOE elements and contractors continue to manage DOE's radioactive waste in a manner that is protective of worker and public health and safety, and the environment. Does not cancel other directives.

1999-07-09T23:59:59.000Z

393

Federal Energy Management Program: Metering  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Metering to Metering to someone by E-mail Share Federal Energy Management Program: Metering on Facebook Tweet about Federal Energy Management Program: Metering on Twitter Bookmark Federal Energy Management Program: Metering on Google Bookmark Federal Energy Management Program: Metering on Delicious Rank Federal Energy Management Program: Metering on Digg Find More places to share Federal Energy Management Program: Metering on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance Federal Requirements Program Management Commissioning Metering Systems Approaches Process Computerized Maintenance Management Systems Maintenance Types Major Equipment Types Resources Contacts Greenhouse Gases Water Efficiency Data Center Energy Efficiency Industrial Facilities

394

DOE Office of Environmental Management  

Broader source: Energy.gov (indexed) [DOE]

Environmental Management Environmental Management Project and Contract Management Improvement Timeline Improving DOE contract and project management is a top priority of the Department's senior management and entire organization. The DOE Office of Environmental Management (EM) has put in place a "Roadmap" for Journey to Excellence that sets specific performance expectations for continuous improvements in contract and project management. Following are some highlights of EM's improvement actions over the past five years. In 2006, the National Academy of Public Administration (NAPA) began a study of EM, which included acquisition and project management among its key focus areas. The resultant report from the study,

395

Karen Nunez, Procedures Center Manager  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Karen Nunez, Procedures Center Manager Print Procedures Center Manager Karen Nunez has been working somewhat "behind the scenes" at the ALS for the past seven years, ensuring that...

396

NIM (NERSC Information Management) system  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NERSC Information Management (NIM) portal The NERSC Information Management (NIM) system is a web portal used to view and modify user account, usage, and allocations information....

397

PNNL: About - Environmental Management System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Policy. Pacific Northwest Division (PNWD) uses the International Organization for Standardization (ISO 14001) Environmental Management System (EMS) as a tool to manage, control,...

398

Management Principles | Department of Energy  

Energy Savers [EERE]

Management Principles Management Principles managementprinciples-S-2Poneman---2009-12-02.pdf More Documents & Publications Diversity and Inclusion Strategic Plan 2012 - 2015...

399

Records Management | The Ames Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Training, Documents, & Records Records Management The Records Management Program at the Ames Laboratory provides guidance and assistance for administrative departments and...

400

Contract/Project Management  

Broader source: Energy.gov (indexed) [DOE]

First Quarter First Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 Contract/Project Management Performance Metric FY 2012 Target FY 2012 Forecast FY 2012 Pre- & Post-CAP Forecast Comment Capital Asset Project Success: Complete 90% of capital asset projects at original scope and within 110% of CD-2 TPC. 90%* 84% Construction 83% Cleanup 85% 77% Pre-CAP 86% Post- CAP This is based on a 3- year rolling average (FY10 to FY12). TPC is Total Project Cost. Contract/Project Management Performance Metrics FY 2012 Target FY 2012 1st Qtr Actual Comment Certified EVM Systems: Post CD-3, (greater than $20 million). 95%* 94% EVM represents Earned Value Management. Certified FPD's at CD-1: Projects

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Contract/Project Management  

Broader source: Energy.gov (indexed) [DOE]

Second Quarter Second Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 Contract/Project Management Performance Metric FY 2012 Target FY 2012 Forecast FY 2012 Pre- & Post-CAP Forecast Comment Capital Asset Project Success: Complete 90% of capital asset projects at original scope and within 110% of CD-2 TPC. 90%* 88% Construction 87% Cleanup 89% 77% Pre-CAP 92% Post- CAP This is based on a 3- year rolling average (FY10 to FY12). TPC is Total Project Cost. Contract/Project Management Performance Metrics FY 2012 Target FY 2012 2nd Qtr Actual Comment Certified EVM Systems: Post CD-3, (greater than $20 million). 95%* 96% EVM represents Earned Value Management. Certified FPD's at CD-1: Projects

402

Supplier Selection Management Process  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ADMP-002 Vendor Selection and Management Process 11_0203 1 of 9 ADMP-002 Vendor Selection and Management Process 11_0203 1 of 9 EOTA - Business Process Document Title: Vendor Selection and Management Process Document Number: ADMP-002 Rev. 11_0203 Document Owner: Elizabeth Sousa Backup Owner: Melissa Otero Approver(s): Melissa Otero Parent Document: Q-001, Quality Manual Notify of Changes: EOTA Employees Referenced Document(s): ADMF-009 Vendor Audit Plan, ADMF-010 Vendor Audit Checklist, ADMF-011 Vendor Audit Report, ADMF-015 Vendor Evaluation Record, ADMP-001 Procurement Process, ADMF-016 EOTA Vendor List, REG-003 Record Register ADMP-002 Vendor Selection and Management Process 11_0203 2 of 9 Revision History: Rev. Description of Change A Initial Release 08_1110 Added verbiage and reference for ADMF-016, EOTA Vendor List to process.

403

Integrating Management Systems  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Mission Execution by Mission Execution by Integrating our Management Systems Integrating our Management Systems 1 W e e k l y O p e r a t i o n s M e e t i n g N o v e m b e r 1 , 2 0 1 1 M i c h a e l J . W e i s Pulling the Pieces Together for Improving DOE Management to Enable Mission Execution 2  Process changes Process changes  Behavioral changes Behavioral changes  System changes System changes Process Change Approach Strengthening and Expediting Decision Making 3 Proposed Outcomes Horizontal Integration Incoming DOE Business Crosscutting Issues (i.e. NLDC input) Hi-level Roadblocks Operations Management Council Associate Deputy Secretary Collaborative Action Process Chief Operating Officer Weekly Operations Council (OMC) Super 8 Secretary (ADS) (CAP) Board (COOB) p Meeting Endorsement / Commitment Super 8 US Meetings COO Meetings

404

Safety Management System Policy  

Broader source: Energy.gov (indexed) [DOE]

POLICY POLICY Washington, D.C. Approved: 4-25-11 SUBJECT: INTEGRATED SAFETY MANAGEMENT POLICY PURPOSE AND SCOPE To establish the Department of Energy's (DOE) expectation for safety, 1 including integrated safety management that will enable the Department's mission goals to be accomplished efficiently while ensuring safe operations at all departmental facilities and activities. This Policy cancels and supersedes DOE Policy (P) 411.1, Safety Management Functions, Responsibilities, and Authorities Policy, dated 1-28-97; DOE P 441.1, DOE Radiological Health and Safety Policy, dated 4-26-96; DOE P 450.2A, Identifying, Implementing and Complying with Environment, Safety and Health Requirements, dated 5-15-96; DOE P 450.4, Safety Management

405

Contract/Project Management  

Broader source: Energy.gov (indexed) [DOE]

Fourth Quarter Fourth Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 Contract/Project Management Performance Metric FY 2012 Target FY 2012 Final FY 2012 Pre- & Post-CAP Final Comment Capital Asset Project Success: Complete 90% of capital asset projects at original scope and within 110% of CD-2 TPC. 90%* 86% Construction 87% Cleanup 84% 77% Pre-CAP 89% Post-CAP This is based on a 3- year rolling average (FY10 to FY12). TPC is Total Project Cost. Contract/Project Management Performance Metrics FY 2012 Target FY 2012 4th Qtr Actual Comment Certified EVM Systems: Post CD-3, (greater than $20 million). 95%* 100% EVM represents Earned Value Management. Certified FPD's at CD-1: Projects

406

Contract/Project Management  

Broader source: Energy.gov (indexed) [DOE]

Management Secondary Performance Metrics FY 2010 Target FY 2010 Actual Comment 4. PDRI Use: By the end of FY11, 80% of projects (>100M) will use PDRI methodologies no later...

407

Management of Nuclear Materials  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish requirements and procedures for the management of nuclear materials within the Department of Energy (DOE). Cancels DOE 5660.1A. Canceled by DOE O 410.2.

1994-05-26T23:59:59.000Z

408

Environmental Management System Plan  

E-Print Network [OSTI]

Water Discharges) of Introduction Environmental Managementmanagement Water conservation LBNLs approach to sustainable environmentalEnvironmental Management Systems (EMS) to implement sustainable environmental stewardship practices that: Protect the air, water,

Fox, Robert

2009-01-01T23:59:59.000Z

409

Smart street lighting management  

Science Journals Connector (OSTI)

In this work, we propose a new street lighting energy management system in order to reduce ... demand meaning that energy, in this case light, is provided only when needed. In ... demand model, which in the case...

S. Pizzuti; M. Annunziato; F. Moretti

2013-08-01T23:59:59.000Z

410

Transportation Management Workshop: Proceedings  

SciTech Connect (OSTI)

This report is a compilation of discussions presented at the Transportation Management Workshop held in Gaithersburg, Maryland. Topics include waste packaging, personnel training, robotics, transportation routing, certification, containers, and waste classification.

Not Available

1993-10-01T23:59:59.000Z

411

Configuration Change Management  

E-Print Network [OSTI]

shown that if a company does not continue to innovate, whether it is products or services, it will not be able to remain successful. This philosophy is extremely important with design engineering companies. If managed correctly, change can be a...

Yoder, Nathaniel

2012-05-11T23:59:59.000Z

412

Documents and Records Management  

Science Journals Connector (OSTI)

Walk into many enterprise organizations and ask someone in a department to describe their document storage and processing operations, and they will likely give you a story about how management of documents and...

Robert Garrett

2011-01-01T23:59:59.000Z

413

Enterprise Risk Management Model  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Model The Enterprise Risk Management (ERM) Model is a system used to analyze the cost and benefit of addressing risks inherent in the work performed by the Department of Energy....

414

Stage Management & Technology  

E-Print Network [OSTI]

Stage managers provide centralized communication, organization, and task coordination for all individuals in the production team. This study explores the advantages and disadvantages of different and new forms of technology implemented into various...

O'Brien, Madison D

2013-02-04T23:59:59.000Z

415

Supplier Management Responsibility  

Science Journals Connector (OSTI)

Supplier management, at the organization level, has two basic responsibilities: (1) to ensure that the engineering environment is based on a defined engineering process, with engineers trained to work within that...

Raymond Kehoe; Alka Jarvis

1996-01-01T23:59:59.000Z

416

Headquarters Personal Property Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish procedures for managing Government personal property owned or leased by the Department of Energy and in the custody of DOE Headquarters employees, including those in the National Nuclear Security Administration. Cancels DOE HQ O 580.1A

2004-10-25T23:59:59.000Z

417

Project Management Lessons Learned  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The guide supports DOE O 413.3A, Program and Project Management for the Acquisition of Capital Assets, and aids the federal project directors and integrated project teams in the execution of projects.

2008-08-05T23:59:59.000Z

418

2015 Information Management Conference  

Broader source: Energy.gov [DOE]

The 34th Information Management Conference (IMC) sponsored by the Office of the Chief Information Officer (OCIO) will be held at the Gaylord Opryland Convention Center in Nashville, TN, June 15-18,...

419

Information Management Conference  

Broader source: Energy.gov [DOE]

The 34th Information Management Conference (IMC) sponsored by the Office of the Chief Information Officer (OCIO) will be held at the Gaylord Opryland Convention Center in Nashville, TN, June 15-18,...

420

Human Resource Management Delegation  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The notice is to clarifies and updates existing Human Resource Management Delegation Authorities and the levels to which they are delegated. Expired 6-28-97. Does not cancel any directives.

1996-06-28T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Strategic Energy Management  

Broader source: Energy.gov [DOE]

The U.S. Department of Energy (DOE) See Action Network and Weatherization and Intergovernmental Program Technical Assistance Program sponsored this webinar about strategic management in the public sector on November 7, 2012.

422

ENVIRONMENTAL MANAGEMENT ADVISORY BOARD  

Office of Environmental Management (EM)

Mansaray, e-Management Mr. Doug Shoop, DOE-ROL Ms. Kristen Skopeck, DOE-ROL Mr. Kevin Smith, DOE-ORP Mr. Terry Walton, PNNL Dr. Dawn Wellman, PNNL Mr. Mark Whitney, Principal...

423

Information Technology Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order identifies the objectives, components, and responsibilities for implementing processes to ensure the effective management of information and information systems within the Department. Cancels DOE O 200.1.

2008-12-23T23:59:59.000Z

424

Contract/Project Management  

Broader source: Energy.gov (indexed) [DOE]

Third Quarter Third Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 Contract/Project Management Performance Metric FY 2012 Target FY 2012 Forecast FY 2012 Pre- & Post-CAP Forecast Comment Capital Asset Project Success: Complete 90% of capital asset projects at original scope and within 110% of CD-2 TPC. 90%* 87% Construction 87% Cleanup 87% 77% Pre-CAP 90% Post- CAP This is based on a 3- year rolling average (FY10 to FY12). TPC is Total Project Cost. Contract/Project Management Performance Metrics FY 2012 Target FY 2012 3rd Qtr Actual Comment Certified EVM Systems: Post CD-3, (greater than $20 million). 95%* 98% EVM represents Earned Value Management. Certified FPD's at CD-1: Projects

425

Radioactive Waste Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual further describes the requirements and establishes specific responsibilities for implementing DOE O 435.1, Radioactive Waste Management, for the management of DOE high-level waste, transuranic waste, low-level waste, and the radioactive component of mixed waste. Change 1 dated 6/19/01 removes the requirement that Headquarters is to be notified and the Office of Environment, Safety and Health consulted for exemptions for use of non-DOE treatment facilities. Certified 1-9-07.

1999-07-09T23:59:59.000Z

426

4-Poster Tick Management and White-tailed Deer Management  

E-Print Network [OSTI]

Update on: 4-Poster Tick Management and White-tailed Deer Management Tim Green Environmental Protection Division April 12, 2012 #12;4-Poster Tick Management System Employees affected by ticks account for the highest number of visits annually to the Occupational Medical Clinic 4-Poster Tick Management System

Homes, Christopher C.

427

Towards CORBAbased Enterprise Management: Managing CORBAbased Systems with SNMP Platforms  

E-Print Network [OSTI]

1 Towards CORBA­based Enterprise Management: Managing CORBA­based Systems with SNMP Platforms are in widespread use. The consen­ sus on the advantages of CORBA for managing complex system infrastuctures distributed object environments. Keywords--- CORBA, Enterprise Management, SNMP Platforms, Distributed Systems

428

Data Management Group Annual Report  

E-Print Network [OSTI]

Data Management Group Annual Report 2002 prepared by: Data Management Group Joint Program......................................................................................... 9 2001 EMME/2 Road Network Inclusion of Links to CCDRS .................. 9 Road and Transit Management Group 2002 Annual Report i SUMMARY The Data Management Group (DMG), in cooperation

Toronto, University of

429

Pest Management Recommendations for Horses  

E-Print Network [OSTI]

. Cultural controls include practices such as appropriate ma nure management and stall sanitation. Chemical

Boyer, Elizabeth W.

430

Records Management | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Management Management Records Management The Department of Energy (DOE) Records Management Program ensures compliance with the Federal Records Act of 1950, as amended, by promoting the management of records throughout their life cycle in an economical, efficient and effective manner. Implementation of a sound Records Management Program facilitates decision-makers and others having the right information in support of mission accomplishment; and the creation and maintenance of records to protect the rights and interests of the Department and those we serve. The Records Management Program is also responsible for the Department's Information Collection Program, and the Information Quality Program. The Information Collection Program is responsible for implementing the

431

Records Management | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Management Management Records Management The Department of Energy (DOE) Records Management Program ensures compliance with the Federal Records Act of 1950, as amended, by promoting the management of records throughout their life cycle in an economical, efficient and effective manner. Implementation of a sound Records Management Program facilitates decision-makers and others having the right information in support of mission accomplishment; and the creation and maintenance of records to protect the rights and interests of the Department and those we serve. The Records Management Program is also responsible for the Department's Information Collection Program, and the Information Quality Program. The Information Collection Program is responsible for implementing the

432

Property Management | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Management Management Property Management Personal Property Management and Accountability for Headquarters Management Personal property management includes all functions necessary for the proper determination of need, source, acquisition, receipt, accountability, utilization, maintenance, rehabilitation, storage, distribution and disposal of property. Authorized Property Representatives Effective October 2, 2013: Authorized Property Pass Signers List and Accountable Property Representatives List Personal Property Guidance Personal property management requires a lifecycle approach to be effective. There are four major phases in the personal property lifecycle: acquisition, receipt, utilization, and disposal. Each phase has distinct processes and procedures associated with it to maintain proper stewardship

433

Marketing Demand-Side Management  

E-Print Network [OSTI]

they the only game in town, enjoying a captive market. Demand-side management (DSM) again surfaced as a method for increasing customer value and meeting these competitive challenges. In designing and implementing demand-side management (DSM) programs we... have learned a great deal about what it takes to market and sell DSM. This paper focuses on how to successfully market demand-side management. KEY STEPS TO MARKETING DEMAND-SIDE MANAGEMENT Management Commitment The first key element in marketing...

O'Neill, M. L.

1988-01-01T23:59:59.000Z

434

About CRSP Management Center  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

CRSP Act Power Projects Contact CRSP Customers Environmental Review-NEPA Financial Data Operations Planning & Projects Power Marketing Rates CRSP Act Power Projects Contact CRSP Customers Environmental Review-NEPA Financial Data Operations Planning & Projects Power Marketing Rates About Colorado River Storage Project Management Center CRSP Management Center Office The Ak-Chin Indian Community in Arizona, the city of Aspen, Colo., and Kirtland Air Force Base in New Mexico are a few of the vital customers of the Colorado River Storage Project's Management Center. We assist customers in saving their valuable electrical resources by actively promoting energy management and conservation programs and helping them determine their future energy needs. When customers want new products and services tailored to their individual needs, we explore their ideas. We are also committed to protecting the delicate balance of the Colorado River and its tributaries. Agencies that manage this river's resources must weigh its many roles: irrigation, recreation, hydropower and native and non-native endangered species habitat protection. Balancing these resources with the needs of water and electrical energy customers is a chief concern.

435

BS in RECREATION MANAGEMENT: Experience Industry Management Emphasis (664521) MAP Sheet Department of Recreation Management  

E-Print Network [OSTI]

BS in RECREATION MANAGEMENT: Experience Industry Management Emphasis (664521) MAP Sheet Department of Recreation Management For students entering the degree program during the 2014­2015 curricular year accepted to the program. 3. Complete the following Recreation Management Core courses: RecM 404 Principles

Olsen Jr., Dan R.

436

Nuclear Safety Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

[6450-01-P] [6450-01-P] DEPARTMENT OF ENERGY 10 CFR Part 830 Nuclear Safety Management AGENCY: Department of Energy (DOE). ACTION: Final Rule. SUMMARY: The Department of Energy (DOE) is issuing a final rule regarding Nuclear Safety Management. This Part establishes requirements for the safe management of DOE contractor and subcontractor work at the Department's nuclear facilities. Today's rule adopts the sections that will make up the generally applicable provisions for Part 830. It also adopts the specific section on provisions for developing and implementing a formalized quality assurance program. EFFECTIVE DATE: This regulation becomes effective [insert 30 days after publication in the Federal Register.] FOR FURTHER INFORMATION CONTACT: Frank Hawkins, U.S. Department of Energy, Nuclear Safety

437

PETSc: Docs: Code Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Code Management Code Management Home Download Features Documentation Manual pages and Users Manual Citing PETSc Tutorials Installation SAWs Changes Bug Reporting Code Management FAQ License Linear Solver Table Applications/Publications Miscellaneous External Software Developers Site In this file we list some of the techniques that may be used to increase one's efficiency when developing PETSc application codes. We have learned to use these techniques ourselves, and they have improved our efficiency tremendously. Editing and Compiling The biggest time sink in code development is generally the cycle of EDIT-COMPILE-LINK-RUN. We often see users working in a single window with a cycle such as: Edit a file with emacs. Exit emacs. Run make and see some error messages. Start emacs and try to fix the errors; often starting emacs hides

438

RMOTC - Testing - Carbon Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Carbon Management Carbon Management Ten Sleep Time Structure, 2nd Wall Creek Formation at RMOTC Notice: As of July 15th 2013, the Department of Energy announced the intent to sell Naval Petroleum Reserve Number 3 (NPR3). The sale of NPR-3 will also include the sale of all equipment and materials onsite. A decision has been made by the Department of Energy to complete testing at RMOTC by July 1st, 2014. RMOTC will complete testing in the coming year with the currently scheduled testing partners. For more information on the sale of NPR-3 and sale of RMOTC equipment and materials please join our mailing list here. RMOTC has the field setting, infrastructure, and expertise to play an important role in carbon management testing, demonstration, and research. The unique combination of a publicly-owned and DOE-operated oil field,

439

Procurement and Property Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Traffic Management Services Plum Island Constructed 1827 Traffic Management Services Plum Island Constructed 1827 Shipping and Receiving Supervisor: M. White Phone: 631-344-2300 Email: mwhite@bnl.gov Traffic Management Services include the following: Transportation Services. Provide guidance on methods of shipment, carrier availability, and discount programs for moving freight for the account of the U. S. Government. Employee Relocation Program. Coordinate the movement of household goods for BNL employees. Receipt and Inspection of goods. Provide the services necessary to ensure that goods are received, inspected, and delivered on time. Ensure that damages are noted at time of delivery and establish claims as necessary. Import/Export Services. Provide guidance on the requirements for shipments made by the Laboratory to destinations outside the continental United States. Obtain Export Licenses as needed.

440

Safety & Emergency Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

F.A.Q.s F.A.Q.s Conference Center and APS Site Activity Coordination Management and/or Coordination of APS Site Work/Services Safety & Emergency Management Database Maintenance Personnel Safety & Emergency Management Area Emergency Supervision Drills/Training Page Bob Whitman with any questions or concerns. Area Emergency Supervisors and Building Monitors in your location can be found online. ESH 108 Building Orientation Page Bob Whitman with any questions regarding the newly designed ESH 108 Building Orientation course. Fire Alarm System Testing Through Argonne Fire Protection Services, the fire alarm system is tested visually and audibly annually. Life Safety Inspections Page Carl Nelson at 4-1892 with any questions. Life Safety Inspections are collected by Carl via fax at 2-9729 or delivery to office B0149

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Performance Management Methodology Moving from Performance Measurement to Performance Management  

Broader source: Energy.gov (indexed) [DOE]

Guide to a Balanced Scorecard: Guide to a Balanced Scorecard: Performance Management Methodology Moving from Performance Measurement to Performance Management Guide to a Balanced Scorecard Performance Management Methodology Richard H. Hopf Deputy Assistant Secretary for Procurement and Assistance Management Department of Energy Lloyd W. Pratsch Procurement Executive Department of State Robert A. Welch Director for Acquisition Management and Procurement Executive Department of Commerce Pauk A. Denett Director of Administration/Senior Procurement Executive Department of Interior David J. Litman Director, Office of Acquisition and Grants Management Department of Transportation Ida M. Ustad Deputy Associate Administrator for Acquisition Policy General Services Administration Terrence J. Tychan Deputy Assistant Secretary for Grants

442

Management Control Cover  

Broader source: Energy.gov (indexed) [DOE]

Assess- Assess- ing Natural Resource Damage at Rocky Flats OAS-M-06-02 November 2005 REPORT ON MANAGEMENT CONTROLS OVER ASSESSING NATURAL RESUORCE DAMAGE AT ROCKY FLATS TABLE OF CONTENTS Natural Resource Damage Assessment at Rocky Flats Details of Finding 1 Recommendation and Comments 3 Appendices Objective, Scope, and Methodology 5 Prior Audit Reports 6 Management Comments 7 NATURAL RESURCE DAMAGE ASSESSMENT AT ROCKY FLATS Page 1 Details of Finding Natural Resource The Rocky Flats Project Office (Project Office) had not initiated, Damage Assessment and had no plans, at the time of our review, for conducting a Natural Resource Damage Assessment (NRDA) at the Rocky Flats

443

Senior Technical Safety Manager  

Broader source: Energy.gov (indexed) [DOE]

Technical Program Technical Program Manager Qualification Standard DOE-STD-1178-2004 May 2013 Reference Guide The Functional Area Qualification Standard References Guides are developed to assist operators, maintenance personnel, and the technical staff in the acquisition of technical competence and qualification within the Technical Qualification Program. Please direct your questions or comments related to this document to the Office of Leadership and Career Manager, Technical Qualification Program (TQP), Albuquerque Complex. This page is intentionally blank. Table of Contents i FIGURES ....................................................................................................................................... ii TABLES ......................................................................................................................................... ii

444

Radioactive Waste Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual further describes the requirements and establishes specific responsibilities for implementing DOE O 435.1, Radioactive Waste Management, for the management of DOE high-level waste, transuranic waste, low-level waste, and the radioactive component of mixed waste. Change 1 dated 6/19/01 removes the requirement that Headquarters is to be notified and the Office of Environment, Safety and Health consulted for exemptions for use of non-DOE treatment facilities. Certified 1-9-07. Admin Chg 2, dated 6-8-11, cancels DOE M 435.1-1 Chg 1.

1999-07-09T23:59:59.000Z

445

Western Veg Management EA  

Broader source: Energy.gov (indexed) [DOE]

Environmental Assessment for the Environmental Assessment for the Glen Canyon to Pinnacle Peak 345 kV Transmission Lines Vegetation Management Project within the Coconino National Forest November 2011 Glen Canyon-Pinnacle Peak 345 kV Transmission Lines EPG Vegetation Management Project Draft EA i November 2011 TABLE OF CONTENTS 1 Section 1 - Purpose and Need for Action .................................................................................... 1-1 2 1.1 Introduction and Background ........................................................................... 1-1 3 1.2 Purpose and Need for Action ............................................................................ 1-3 4 1.3 Location and project Area Description ............................................................. 1-3 5

446

Federal Energy Management Program: News  

Broader source: Energy.gov (indexed) [DOE]

PROJECT FUNDING PROJECT FUNDING TECHNOLOGIES SERVICES NEWS & EVENTS EERE » Federal Energy Management Program » News & Events Site Map Printable Version Share this resource Send a link to Federal Energy Management Program: News to someone by E-mail Share Federal Energy Management Program: News on Facebook Tweet about Federal Energy Management Program: News on Twitter Bookmark Federal Energy Management Program: News on Google Bookmark Federal Energy Management Program: News on Delicious Rank Federal Energy Management Program: News on Digg Find More places to share Federal Energy Management Program: News on AddThis.com... News Events News Subscribe to RSS News Feed RSS Feed icon January 13, 2014 FEMP Offers New Advanced eTraining on UESCs The U.S. Department of Energy (DOE) Federal Energy Management Program

447

Assessment of Project Management Experience  

Broader source: Energy.gov (indexed) [DOE]

Assessment of Project Management Experience PMCDP for CEG Competency 1.12.2 Assessment of Project Management Experience PMCDP for CEG Competency 1.12.2 Applicant Name: Applicant Supervisor: Date (mm/dd/yyyy): Directions: Step 1: Use this template to show project management experience for CEG competency 1.12.2. Rate your experience (0 - 5) in the following project management related activities using the scale below. Step 2: Sign the completed form and have your supervisor review and sign it. Step 3: Once approved by your supervisor, submit the form as part of your Level I certification package. Note: Project management experience is distinguished from FPD experience and applies to general project management activities and experience. Positions that do not count towards experience in project management include: program manager, property manager, health, safety and security (HSS) positions, and

448

NS&T MANAGEMENT OBSERVATIONS  

SciTech Connect (OSTI)

The INL Management Observation Program (MOP) is designed to improve managers and supervisors understanding of work being performed by employees and the barriers impacting their success. The MOP also increases workers understanding of managements expectations as they relate to safety, security, quality, and work performance. Management observations (observations) are designed to improve the relationship and trust between employees and managers through increased engagement and interactions between managers and researchers in the field. As part of continuous improvement, NS&T management took initiative to focus on the participation and quality of observations in FY 14. This quarterly report is intended to (a) summarize the participation and quality of managements observations, (b) assess observations for commonalities or trends related to facility or process barriers impacting research, and (c) provide feedback and make recommendations for improvements NS&Ts MOP.

Gianotto, David

2014-06-01T23:59:59.000Z

449

Project Management Resources | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Project Project Management Resources Project Management Resources Performance & Project Completion Environmental Management Completed Projects 2005-Present EM Current Project Performance Office of Engineering and Construction Management (OECM) Monthly Project Dashboard Project Management Resources DOE Office of Environmental Management Project & Contract Management Improvement Timeline Project Management Approach Using Earned Value Management Root Cause Analysis and Corrective Actions Plan DOE Order 413.3B DOE Directives OMB Capital Programming Guide OECM Project Management Career Development Program OECM Project Management Policy and Guidance per Office of Management Project Definition Rating Index (PDRI) Project Management Institute (PMI) Construction Industry Institute (CII)

450

Energy Management and Sustainability Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Management and Sustainability Policy Management and Sustainability Policy USAA Real Estate Company has a reputation for excellence in customer service and taking a leadership role in the real estate industry. As part of our commitment to excellence, we will identify and implement improved financial and operation efficiencies, particularly in how we purchase and use energy, striving toward world-class status in energy management and sustainability. Commitment to Energy & Sustainability Management Energy Management and Sustainability will continually play a role in achieving our strategic objectives. Specifically, the USAA Real Estate Company Energy Management and Sustainability Strategy is to: Support the organization's strategic plan to maximize ownership value and provide customers and

451

Quality Management | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Quality Management Quality Management Quality Management The Office of Quality Management, within the Office of Health, Safety and Security develops policies and procedures to ensure the classification and control of information is effective and consistent. The Office of Quality Management also assists other Government agencies to meet the requirements contained in DOE-issued regulations concerning Restricted Data and Formerly Restricted Data. To meet these missions, the Office of Quality Management: Develops and revises DOE Regulations and Orders concerning Restricted Data, Formerly Restricted Data, Transclassified Foreign Nuclear Information, National Security Information, Unclassified Controlled Nuclear Information, and Official Use Only Responds to Mandatory Declassification Review Requests under

452

Strategic Plan Recreation Management  

E-Print Network [OSTI]

Strategic Plan Recreation Management Department Brigham Young University 2013 #12;Vision We strive in meaningful recreational experiences. Core Values We value the role wholesome recreation plays in the well strive to make meaningful contributions to both recreation related research and practice. Department

Olsen Jr., Dan R.

453

University Services Management Services  

E-Print Network [OSTI]

system U Services Finance organized a workforce planning process resulting in a team with better capacity > 3 Primary Services Human Resources Workforce Planning Recruitment and Selection Employee and Labor, and strategic planning efforts. In addition to supporting the University Services enterprise, the Management

Webb, Peter

454

Load Management Made Simple  

E-Print Network [OSTI]

Company have moved to a demand side or load management mode which seeks to influence customers to change electric usage patterns to more efficiently use available generating capacity. Since 1970, the TUEC system peak demand has more than doubled from about...

Schneider, K.

1985-01-01T23:59:59.000Z

455

Office of Quality Management  

Broader source: Energy.gov [DOE]

The Office of Quality Management develops and interprets Government-wide policies and procedures and conducts training to ensure the accurate identification of information and documents that must be classified or controlled under statute or Executive order to protect the national security and controlled unclassified Official Use Only information for the effective operation of the Government.

456

"Managing Department Climate Change"  

E-Print Network [OSTI]

"Managing Department Climate Change" #12;Presenters · Ronda Callister Professor, Department Department Climate? · Assesment is essential for determining strategies for initiating change · In a research climate · Each panelist will describe an intervention designed to improve department climate ­ Ronda

Sheridan, Jennifer

457

OTHER APPROACHES TO MANAGING  

E-Print Network [OSTI]

requirements Include minimum separations between wells and conventional/alternative onsite sewage treatment systems Supplement public sanitary sewerage systems primarily in rural areas Legal Approaches ConstructionOTHER APPROACHES TO MANAGING POLLUTANT SOURCES Laws and Land Use [Chapter 10.2] Rules of Thumb Rule

458

Adaptation and risk management  

SciTech Connect (OSTI)

Adaptation assessment methods are compatible with the international risk management standard ISO:31000. Risk management approaches are increasingly being recommended for adaptation assessments at both national and local levels. Two orientations to assessments can commonly be identified: top-down and bottom-up, and prescriptive and diagnostic. Combinations of these orientations favor different types of assessments. The choice of orientation can be related to uncertainties in prediction and taking action, in the type of adaptation and in the degree of system stress. Adopting multiple viewpoints is to be encouraged, especially in complex situations. The bulk of current guidance material is consistent with top-down and predictive approaches, thus is most suitable for risk scoping and identification. Abroad range ofmaterial fromwithin and beyond the climate change literature can be used to select methods to be used in assessing and implementing adaptation. The framing of risk, correct formulation of the questions being investigated and assessment methodology are critical aspects of the scoping phase. Only when these issues have been addressed should be issue of specific methods and tools be addressed. The reorientation of adaptation from an assessment focused solely on anthropogenic climate change to broader issues of vulnerability/resilience, sustainable development and disaster risk, especially through a risk management framework, can draw from existing policy and management understanding in communities, professions and agencies, incorporating existing agendas, knowledge, risks, and issues they already face.

Preston, Benjamin L [ORNL

2011-01-01T23:59:59.000Z

459

Substation asset management study  

SciTech Connect (OSTI)

This paper will present an overview of our recent findings in the area of substation asset management and will describe how several utilities, in response to the issues listed above, are re-examining their present maintenance practices in search of more cost-effective programs.

Conroy, M.W.; Conidi, J. [Sargent & Lundy, Chicago, IL (United States)

1996-03-01T23:59:59.000Z

460

Decentralized wastewater management  

SciTech Connect (OSTI)

Decentralized wastewater management systems maintain both the solid and liquid fractions of the wastewater near their point of origin. In the future, as long-term strategies are developed to optimize the use of water resources and to protect the environment, it is clear that decentralized systems will become an important element of those strategies.

Tchobanoglous, G.

1998-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Purge water management system  

DOE Patents [OSTI]

A purge water management system is described for effectively eliminating the production of purge water when obtaining a groundwater sample from a monitoring well. In its preferred embodiment, the purge water management system comprises an expandable container, a transportation system, and a return system. The purge water management system is connected to a wellhead sampling configuration, typically permanently installed at the well site. A pump, positioned with the monitoring well, pumps groundwater through the transportation system into the expandable container, which expands in direct proportion with volume of groundwater introduced, usually three or four well volumes, yet prevents the groundwater from coming into contact with the oxygen in the air. After this quantity of groundwater has been removed from the well, a sample is taken from a sampling port, after which the groundwater in the expandable container can be returned to the monitoring well through the return system. The purge water management system prevents the purge water from coming in contact with the outside environment, especially oxygen, which might cause the constituents of the groundwater to oxidize. Therefore, by introducing the purge water back into the monitoring well, the necessity of dealing with the purge water as a hazardous waste under the Resource Conservation and Recovery Act is eliminated.

Cardoso-Neto, J.E.; Williams, D.W.

1995-01-01T23:59:59.000Z

462

Automation Creates New Managers  

Science Journals Connector (OSTI)

AUTOMATION will bring about new and broader patterns in the use of labor and creation of a large group of managers of a new type, says E. W. Engstrom, senior executive vice president of the Radio Corporation of America. With automation, there will no ...

1955-12-12T23:59:59.000Z

463

Watershed Management & Science Conference  

E-Print Network [OSTI]

organic compounds, trace metals, and nutrients as indicators of wastewater treatment plant discharge Name Affiliation e-mail Aingworth, Catherine Binghamton wastewater treatment caingworth the Binghamton--to--Catskill urban-rural gradient. Homyak, P.M., Wood Chips: A potential best management practice

Suzuki, Masatsugu

464

February 2002 RISK MANAGEMENT  

E-Print Network [OSTI]

to an acceptable level. The objective of performing risk man agement is to enable the organization to accomplishFebruary 2002 RISK MANAGEMENT GUIDANCE FOR INFORMATION TECHNOLOGY SYSTEMS By Joan S. Hash, Computer This ITL Bulletin describes risk man agement methodology and how to integrate it into an information tech

465

Radioactive Waste Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The objective of this Order is to ensure that all Department of Energy (DOE) radioactive waste is managed in a manner that is protective of worker and public health and safety and the environment. Cancels DOE O 5820.2A

1999-07-09T23:59:59.000Z

466

Mobile Technology Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements, assigns responsibilities, and provides guidance for federal mobile technology management and employee use of both government furnished and personally-owned mobile devices within DOE and NNSA. Establishes requirements for use of User Agreements to govern mobile devices used for official duties. Does not cancel other directives.

2014-05-15T23:59:59.000Z

467

Gas Cylinders: Proper Management  

E-Print Network [OSTI]

Compressed Gas Cylinders: Proper Management And Use Published by the Office of Environment, Health;1 Introduction University of California, Berkeley (UC Berkeley) departments that use compressed gas cylinders (MSDS) and your department's Job Safety Analyses (JSAs). Talk to your gas supplier about hands

Boyer, Elizabeth W.

468

Integrated Safety Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order ensures that DOE/NNSA, systematically integrates safety into management and work practices at all levels, so that missions are accomplished efficiently while protecting the workers, the public, and the environment. Cancels DOE M 450.4-1 and DOE M 411.1-1C

2011-04-25T23:59:59.000Z

469

ENGINEERING MANAGEMENT AND LEADERSHIP  

E-Print Network [OSTI]

Architecture 1910 Aeronautical Engineering 1958 Nuclear Engineering 1974 Materials Engineering #12;HistoryENGINEERING MANAGEMENT AND LEADERSHIP Where did we come from? Where are we going? How do we get · If it works but no one knows why, it's ENGINEERING #12;The scientist explains that which exists; The engineer

Eagar, Thomas W.

470

Manager's Desk Reference on Human Capital Management Flexibilities |  

Broader source: Energy.gov (indexed) [DOE]

Manager's Desk Reference on Human Capital Management Flexibilities Manager's Desk Reference on Human Capital Management Flexibilities Manager's Desk Reference on Human Capital Management Flexibilities The purpose of this document is to provide DOE managers and supervisors with information on available flexibilities that can be used in day-to-day human capital management activities, especially those bearing on the recruitment and retention of high-quality staff. Each section of the document includes a basic description of a particular tool as well as Frequently Asked Questions related to how to best use it in a given set of circumstances or in combination with other flexibilities, unless they are available elsewhere, in which the web link is listed under References for that section. At the end of each section are references with web links that

471

Managing projects utilizing self-managed teams and managerial toolkits  

E-Print Network [OSTI]

Project Management is an essential function in most software companies today. With increasing complexity and inter connectivity between software projects, it is not surprising that managing such large scale development ...

Mathur, Praveen, S. M. Massachusetts Institute of Technology

2009-01-01T23:59:59.000Z

472

Project Management Plan (PMP) for Work Management Implementation  

SciTech Connect (OSTI)

The purpose of this document is to provide a project plan for Work Management Implementation by the River Protection Project (RPP). Work Management is an information initiative to implement industry best practices by replacing some Tank Farm legacy system

SHIPLER, C.E.

2000-01-13T23:59:59.000Z

473

Ch.3 User Authentication Textbook?  

E-Print Network [OSTI]

· account lockout mechanisms · policies against using common passwords but rather hard to guess passwords

Dong, Yingfei

474

Managing Upper extremity Fx's Sweden 10-Managing Pediatric  

E-Print Network [OSTI]

Managing Upper extremity Fx's Sweden 10- 05 1 Managing Pediatric Fractures Andrew Pennock, M extremity Fx's Sweden 10- 05 2 Children Are Not Miniature Adults! · Open Growth Plates · Remodeling is Changing "Citius, Altius, Fortius" - Faster, Higher, Stronger #12;Managing Upper extremity Fx's Sweden 10

Squire, Larry R.

475

Evolution and Evaluation of the Active Management Area Management Plans  

E-Print Network [OSTI]

on Management Plan Information 29 Municipal 29 Agricultural 30 Industrial 31 Water Budgets 32 Other Summary 46 Appendix C: Tucson AMA 2006 Water Budget 48 Appendix D: Groundwater Management Plan Legislative of the Arizona Groundwater Management Act (GMA), the Arizona Department of Water Resources (ADWR

Fay, Noah

476

Trust Management Considerations For the Cooperative Infrastructure Defense Framework: Trust Relationships, Evidence, and Decisions  

SciTech Connect (OSTI)

Cooperative Infrastructure Defense (CID) is a hierarchical, agent-based, adaptive, cyber-security framework designed to collaboratively protect multiple enclaves or organizations participating in a complex infrastructure. CID employs a swarm of lightweight, mobile agents called Sensors designed to roam hosts throughout a security enclave to find indications of anomalies and report them to host-based Sentinels. The Sensors findings become pieces of a larger puzzle, which the Sentinel puts together to determine the problem and respond per policy as given by the enclave-level Sergeant agent. Horizontally across multiple enclaves and vertically within each enclave, authentication and access control technologies are necessary but insufficient authorization mechanisms to ensure that CID agents continue to fulfill their roles in a trustworthy manner. Trust management fills the gap, providing mechanisms to detect malicious agents and offering more robust mechanisms for authorization. This paper identifies the trust relationships throughout the CID hierarchy, the types of trust evidence that could be gathered, and the actions that the CID system could take if an entity is determined to be untrustworthy.

Maiden, Wendy M.

2009-12-01T23:59:59.000Z

477

Operations and Maintenance Management Support  

Broader source: Energy.gov [DOE]

Federal operations and maintenance (O&M) programs must gain full support from management to succeed. Management understanding and buying into the program elevates O&M importance and allows...

478

Safety and Occupational Health Manager  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as a Health and Safety, Compliance and Quality Assurance Manager providing program management, technical oversight, and expertise in the area of...

479

Monitoring and Managing PDSF Jobs  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Monitoring and Managing Jobs Monitoring and Managing Jobs Commonly Used Commands Action How to do it Comment Get a summary of all batch jobs sgeusers Shows a tally of all jobs for...

480

Earned Value Management System (EVMS)  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Guide supports the Departments initiatives to improve program, project, and contract management through the implementation and surveillance of contractors earned value management systems. Canceled by DOE G 413.3-10A.

2008-05-06T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

TOURISM AND HOSPITALITY MANAGEMENT (TOUR)  

E-Print Network [OSTI]

TOURISM AND HOSPITALITY MANAGEMENT (TOUR) Bachelor of Commerce Degree The tourism industry & conferences, adventure tourism, travel trade, and tourism services. The Tourism and Hospitality concentration integrates general management concepts with the professional knowledge that is required by the tourism

Calgary, University of

482

Environmental Management (EM) Cleanup Projects  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The guide supports DOE O 413.3A, Program and Project Management for the Acquisition of Capital Assets, and provides guidance on environmental management cleanup projects. Canceled by DOE N 251.105.

2008-09-24T23:59:59.000Z

483

Weed Management: Fact or Fable?  

Science Journals Connector (OSTI)

...distinguish the systematic approach to weed control, based...The need for a weed management approach is increasingly recognized...leguminous crops. In such management systems, interference...of support for weed science as a discipline, limited...

1981-01-01T23:59:59.000Z

484

ENERGY STAR Portfolio Manager 101  

Office of Energy Efficiency and Renewable Energy (EERE)

Join us as we introduce and demonstrate the core functionality of EPAs ENERGY STAR Portfolio Manager tool. Attendees will learn how to: navigate Portfolio Manager; add a property and enter details...

485

Communications and the Energy Manager  

E-Print Network [OSTI]

Todays Energy Manager faces a myriad of communications problems. The message of energy management and conservation must be heard from the production lines to the Board Room. Everyone must know that when you save energy, you are adding...

Cooper, J. I.

486

Steve Criss Marketing & Communications Manager  

E-Print Network [OSTI]

Steve Criss Marketing & Communications Manager Steve Criss communications initiatives, including electronic and print media, direct marketing than 15 years of hands-on marketing and public relations management experience

Alpay, S. Pamir

487

Energy Management Issued: June 2010  

E-Print Network [OSTI]

Energy Management Policy Issued: June 2010 Revised: Responsible Administrative Unit: Finance Policy to help the campus understand: · Measures being implemented to conserve energy and keep utility equipment. #12;Energy Management Policy Issued: June 2010 Revised: Responsible Administrative Unit: Finance

488

ENERGY STAR Portfolio Manager 201  

Office of Energy Efficiency and Renewable Energy (EERE)

Continue to learn about EPAs new ENERGY STAR Portfolio Manager tool, with a deeper dive into more advanced functionalities such as: managing and tracking changes to your property uses over time;...

489

Departmental Cyber Security Management Policy  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

2001-05-08T23:59:59.000Z

490

Contractor Human Resource Management Programs  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of this directive is to establish Department of Energy (DOE) responsibilities and requirements for the management and oversight of contractor Human Resource Management (HR) programs. Chg 1, 5-8-98; Chg 2, 11-22-09

1996-09-30T23:59:59.000Z

491

Contractor Human Resource Management Programs  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of this directive is to establish Department of Energy (DOE) responsibilities and requirements for the management and oversight of contractor Human Resource Management (HR) programs. Chg 1, 5-8-98; Chg 2, 11-22-09.

1996-09-30T23:59:59.000Z

492

Data Management Group Annual Report  

E-Print Network [OSTI]

iv Data Management Group Annual Report 2003 City of Hamilton City of Toronto GO Transit Regional of York Toronto Transit Commission The Data Management Group is a research program located ........................................................................................................ 3 Text-based Data Retrieval System `drs

Toronto, University of

493

Data Management Group Annual Report  

E-Print Network [OSTI]

Data Management Group Annual Report 2001 prepared by: Data Management Group Joint Program..............................................................................2 Text Based Data Retrieval System `drs' ..........................................................2 Internet Browser Data Retrieval System (iDRS)..............................................3 Complex Data

Toronto, University of

494

Data Management Group Annual Report  

E-Print Network [OSTI]

Data Management Group Annual Report 1999 prepared by: Data Management Group Joint Program................................................................. 1 INFORMATION PROCESSING ............................................. 2 Text Based Data Retrieval System `drs' ........................ 2 Internet Browser Data Retrieval System (iDRS) ............ 3

Toronto, University of

495

Data Management Group Annual Report  

E-Print Network [OSTI]

Data Management Group Annual Report 2000 prepared by: Data Management Group Joint Program PROCESSING ...................................................2 Text Based Data Retrieval System `drs'.................................2 Internet Browser Data Retrieval System (iDRS).....................3 Complex Data Requests

Toronto, University of

496

Ethanol Capital Management | Open Energy Information  

Open Energy Info (EERE)

Management Jump to: navigation, search Name: Ethanol Capital Management Place: Tucson, Arizona Zip: 85711 Product: Manages funds investing in Ethanol plants in the US Coordinates:...

497

Program Management Initiative | Department of Energy  

Energy Savers [EERE]

Program Management Initiative Program Management Initiative Building the Foundation for our Future. Pyramid diagram showing how the improvement in program management...

498

Cybersecurity Program Manager (CSPM) | Department of Energy  

Energy Savers [EERE]

Cybersecurity Program Manager (CSPM) Cybersecurity Program Manager (CSPM) The CSPM is the Senior DOE Manager of an organization or is a Federal employee appointed by the Senior DOE...

499

Transportation and Program Management Services | Department of...  

Office of Environmental Management (EM)

and Program Management Services Transportation and Program Management Services Overview of Secured Transportation Services (STS) Transportation and Program Management Services More...

500

SES Performance Management System Plan Training | Department...  

Broader source: Energy.gov (indexed) [DOE]

Management System Plan Training SES Performance Management System Plan Training Overview of the DOE SES Performance Management System. Senior Executive Service Performance...