Powered by Deep Web Technologies
Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

V-174: RSA Authentication Manager Writes Operating System, SNMP...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

4: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files V-174: RSA Authentication Manager Writes Operating System,...

2

U-212: RSA Authentication Manager Flaws Permit Cross-Site and...  

Energy Savers [EERE]

Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks V-026: RSA Data Protection Manager Bugs Permit Cross-Site...

3

V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass...

4

V-195: RSA Authentication Manager Lets Local Users View the Administra...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks...

5

T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...  

Broader source: Energy.gov (indexed) [DOE]

Articles U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks V-174: RSA Authentication Manager Writes Operating System, SNMP,...

6

T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw  

Broader source: Energy.gov [DOE]

An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session.

7

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System  

Broader source: Energy.gov [DOE]

A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

8

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...  

Energy Savers [EERE]

in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613...

9

T-640: RSA Access Manager Server CVE-2011-0322 Update | Department...  

Broader source: Energy.gov (indexed) [DOE]

7, 2011 - 5:18pm Addthis PROBLEM: ESA-2011-009 (revised): RSA, The Security Division of EMC, announces new fix for potential security vulnerability in RSA Access Manager Server....

10

V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...  

Energy Savers [EERE]

5.x ABSTRACT: Several vulnerabilities were reported in RSA Archer eGRC. REFERENCE LINKS: EMC SecurityTracker Alert ID: 1028516 CVE-2013-0932 CVE-2013-0933 CVE-2013-0934 IMPACT...

11

T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID  

Broader source: Energy.gov [DOE]

RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

12

V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...  

Broader source: Energy.gov (indexed) [DOE]

Key to Local Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5 RSA Web Agent for IIS versions...

13

U-027: RSA Key Manager Appliance Session Logout Bug Fails to...  

Broader source: Energy.gov (indexed) [DOE]

the 2.7.1.6 hotfix, since this hotfix addresses security related fixes, hot fix roll ups, and bug fixes. To obtain the latest RSA product downloads, log on at RSA SecurCare....

14

U-084: Cisco Digital Media Manager Lets Remote Authenticated...  

Broader source: Energy.gov (indexed) [DOE]

authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not...

15

V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere is a command

16

V-195: RSA Authentication Manager Lets Local Users View the Administrative  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere

17

U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6Scripting

18

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service  

Broader source: Energy.gov [DOE]

Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

19

T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data  

Broader source: Energy.gov [DOE]

Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

20

V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &Apple iOSEnergyRequirements |

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

TwoKind Authentication: Usable Authenticators for Untrustworthy Environments  

E-Print Network [OSTI]

damage if the session or their password is compromised. 1. INTRODUCTION In today's Internet. Current authentication mechanisms such as one-time passwords [4] (such as RSA SecurID [3]) and privileged-time passwords limit the damage caused by stolen passwords, but allow full-scale damage in a hijacked session

Smith, Sean W.

22

Another Generalization of Wiener's Attack on RSA  

E-Print Network [OSTI]

Another Generalization of Wiener's Attack on RSA Abderrahmane NITAJ Universit´e de Caen, France Casablanca, June 12, 2008 Abderrahmane NITAJ Another Generalization of Wiener's Attack on RSA #12;RSA and Wiener The new attack Conclusion RSA setting Wiener's attack Generalizations Colour conventions Red

Nitaj, Abderrahmane

23

T-582: RSA systems has resulted in certain information being...  

Broader source: Energy.gov (indexed) [DOE]

2: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID T-582: RSA systems has resulted in certain information being...

24

A Proposed Algorithm to improve security & Efficiency of SSL-TLS servers using Batch RSA decryption  

E-Print Network [OSTI]

Today, Internet becomes the essential part of our lives. Over 90 percent of the ecommerce is developed on the Internet. A security algorithm became very necessary for producer client transactions assurance and the financial applications safety. The rsa algorithm applicability derives from algorithm properties like confidentiality, safe authentication, data safety and integrity on the internet. Thus, this kind of networks can have a more easy utilization by practical accessing from short, medium, even long distance and from different public places. Rsa encryption in the client side is relatively cheap, whereas, the corresponding decryption in the server side is expensive because its private exponent is much larger. Thus ssl tls servers become swamped to perform public key decryption operations when the simultaneous requests increase quickly .The batch rsa method is useful for such highly loaded web server .In our proposed algorithm by reducing the response time and clients tolerable waiting time an improvement...

Pateriya, R K; Shrivastava, S C; Patel, Jaideep

2009-01-01T23:59:59.000Z

25

Identity-Based Mediated RSA , Xuhua Ding2  

E-Print Network [OSTI]

certificates. Mediated RSA (mRSA) [4] is a simple and practical method of splitting RSA private keys between signature or decryption must in- volve both parties. mRSA allows fast and fine-grained control (revocation) over users' security privileges. However, mRSA still relies on public key certificates to derive public

Ding, Xuhua

26

A new attack on RSA and CRT-RSA Abderrahmane Nitaj  

E-Print Network [OSTI]

A new attack on RSA and CRT-RSA Abderrahmane Nitaj Laboratoire de Math´ematiques Nicolas Oresme an attack on CRT-RSA when the CRT-exponents dp and dq are both suitably small. In this paper, we show and ex+y 0 (mod N). As an application of our new attack, we present the cryptanalysis of CRT-RSA if one

Nitaj, Abderrahmane

27

Anonymous, authentic, and accountable resource management based on the E-cash paradigm  

E-Print Network [OSTI]

AAA Anonymity, Authenticity, Accountability BC Binary Code BRGC Binary Reflected Gray Code CA Central Authority DHT Distributed Hashing Table DSI Double Spending Identification DVS Delegation Key, Verification Key, Secret Share GDA General... Disposable Authentication GDM General Divisibility Model GTM General Transferability Model MLBF Multi-Layer Bloom Filter KDM Key Dependency Map MSR Multi-Source Reusability P2P Peer-to-Peer RC Random Code SH Secret Handshake SOA Service Oriented...

Lam, Tak Cheung

2009-05-15T23:59:59.000Z

28

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...  

Broader source: Energy.gov (indexed) [DOE]

Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-233:...

29

U-130: JBoss Operations Network LDAP Authentication Bug Lets...  

Broader source: Energy.gov (indexed) [DOE]

Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability...

30

V-036: EMC Smarts Network Configuration Manager Database Authenticatio...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

36: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass...

31

An Attack on RSA Using LSBs of Multiples of the Prime Factors  

E-Print Network [OSTI]

An Attack on RSA Using LSBs of Multiples of the Prime Factors Abderrahmane Nitaj Laboratoire de attack on RSA with d in polynomial time under special conditions. For example, various partial key exposure attacks on RSA and some

Nitaj, Abderrahmane

32

U-063: RSA SecurID Software Token for Windows DLL Loading Error...  

Broader source: Energy.gov (indexed) [DOE]

Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA...

33

V-234: EMC RSA Archer GRC Open Redirection Weakness and Security...  

Energy Savers [EERE]

4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September...

34

MOTOR VEHICLE (Pursuant to RSA 260:14)  

E-Print Network [OSTI]

permitted pursuant to RSA 260:14, V (a ), other than for bulk distribution for surveys, marketing/I.D. #: _________________________________ Vehicle Identification #: _________________________________ Last Known Address/Town _______________________________ Other Identification Information: ________________________ ***Reverse Side Must Be Completed Before

New Hampshire, University of

35

T-703: Cisco Unified Communications Manager Open Query Interface...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Identity Services Engine Discloses Authentication Credentials to Remote Users V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability...

36

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection...  

Energy Savers [EERE]

129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and...

37

V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain...  

Broader source: Energy.gov (indexed) [DOE]

Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue U-129: RSA...

38

Authentication of byte sequences  

SciTech Connect (OSTI)

Algorithms for the authentication of byte sequences are described. The algorithms are designed to authenticate data in the Storage, Retrieval, Analysis, and Display (SRAD) Test Data Archive of the Radiation Effects and Testing Directorate (9100) at Sandia National Laboratories, and may be used in similar situations where authentication of stored data is required. The algorithms use a well-known error detection method called the Cyclic Redundancy Check (CRC). When a byte sequence is authenticated and stored, CRC bytes are generated and attached to the end of the sequence. When the authenticated data is retrieved, the authentication check consists of processing the entire sequence, including the CRC bytes, and checking for a remainder of zero. The error detection properties of the CRC are extensive and result in a reliable authentication of SRAD data.

Stearns, S.D.

1991-06-01T23:59:59.000Z

39

Multi-factor authentication  

DOE Patents [OSTI]

Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

Hamlet, Jason R; Pierson, Lyndon G

2014-10-21T23:59:59.000Z

40

A Faster Hardware Implementation of RSA Ajay C Shantilal  

E-Print Network [OSTI]

1 A Faster Hardware Implementation of RSA Algorithm Ajay C Shantilal Department of Electrical- cation systems. Central tools for achieving system security are cryptographic algorithms. For performance at the Department of Electrical & Computer Engineering, Oregon State University, Corvallis, Oregon 97331. E

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Fault-Based Attack of RSA Authentication Andrea Pellegrini, Valeria Bertacco and Todd Austin  

E-Print Network [OSTI]

a straightforward design architecture that en- tails a small silicon footprint and low-power profile. Our research enviromental manipulations. Our fault-based attack can be succ

Austin, Todd M.

42

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy StrainClient update resolve multiple

43

V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment ofEnergy,PotomacGeneratorsAUsersExecuteGainLet

44

V-223: RSA Authentication Agent for PAM Allows Remote Users to Make  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research PetroleumDepartment of Energy Kaveh Ghaemmaghami has discoveredSUSE

45

Authentication ofAuthentication ofAuthentication ofAuthentication of Degree Certificates Application Form Name in Full  

E-Print Network [OSTI]

Authentication ofAuthentication ofAuthentication ofAuthentication of Degree Certificates Application Form Name in Full Name in Full as Registered at King's Date of Birth Student ID number (IE degree certificate copies for authentication to: PLEASE REMEMBER TO INCLUDE COPIES OF YOUR CERTIFICATE(S

Applebaum, David

46

Public workstations: Authentication  

E-Print Network [OSTI]

identification. 3. Personal data With registration, library clients and guests accept that their personal dataPublic workstations: Authentication The public workstations require a personal login. This flyer will provide you with information on the procedure for receiving personal login details (authentication

Gilli, Adrian

47

authenticated key agreement: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

48

Course: Math 311w-01 Laboratory 6: The RSA cipher and public-key cryptography, part 2  

E-Print Network [OSTI]

, change to the Desktop directory if you aren't already there, and start ipython. Type ]: from RSA import

Reluga, Tim

49

Combined Attack on CRT-RSA Why Public Verification Must Not Be Public?  

E-Print Network [OSTI]

Combined Attack on CRT-RSA Why Public Verification Must Not Be Public? Guillaume Barbu1 , Alberto introduces a new Combined Attack on a CRT- RSA implementation resistant against Side-Channel Analysis and Fault Injection attacks. Such implementations prevent the attacker from ob- taining the signature when

Paris-Sud XI, Université de

50

A New Attack on RSA with Two or Three Decryption Exponents  

E-Print Network [OSTI]

A New Attack on RSA with Two or Three Decryption Exponents Abderrahmane Nitaj Laboratoire de Math-size. In this paper, we describe an attack on RSA in the presence of two or three exponents ei with the same modulus N. The new attack is an extension of Guo's continued fraction attack as well as the Bl¨omer and May lattice

Nitaj, Abderrahmane

51

A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes  

E-Print Network [OSTI]

A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes Y. Desmedt. Odlyzko AT&T Bell Laboratories Murray Hill, NJ 07974, USA ABSTRACT A new attack on the RSA cryptosystem is presented. This attack assumes less than previous chosen ciphertext attacks, since the cryptanalyst has

Odlyzko, Andrew M.

52

Attacking RSA-based Sessions in SSL/TLS* Vlastimil Klma  

E-Print Network [OSTI]

Attacking RSA-based Sessions in SSL/TLS* Vlastimil Klma , Ondej Pokorn1 and Toms Rosa2, 1 ICZ on RSA-based sessions in SSL/TLS protocols. These protocols incorporate the PKCS#1 (v. 1.5) encoding- secret can decrypt the whole captured SSL/TLS session. We show that incorporating a version number check

53

QKD Quantum Channel Authentication  

E-Print Network [OSTI]

Several simple yet secure protocols to authenticate the quantum channel of various QKD schemes, by coupling the photon sender's knowledge of a shared secret and the QBER Bob observes, are presented. It is shown that Alice can encrypt certain portions of the information needed for the QKD protocols, using a sequence whose security is based on computational-complexity, without compromising all of the sequence's entropy. It is then shown that after a Man-in-the-Middle attack on the quantum and classical channels, there is still enough entropy left in the sequence for Bob to detect the presence of Eve by monitoring the QBER. Finally, it is shown that the principles presented can be implemented to authenticate the quantum channel associated with any type of QKD scheme, and they can also be used for Alice to authenticate Bob.

J. T. Kosloski

2006-04-02T23:59:59.000Z

54

Key recycling in authentication  

E-Print Network [OSTI]

In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

Christopher Portmann

2014-09-29T23:59:59.000Z

55

U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic...  

Office of Environmental Management (EM)

1027513 CVE-2011-3389 CVE-2012-2110 CVE-2012-2131 IMPACT ASSESSMENT: High Discussion: EMC has acknowledged a weakness and a vulnerability in RSA BSAFE, which can be exploited by...

56

Cryptanalysis of Dual CRT-RSA Santanu Sarkar and Subhamoy Maitra  

E-Print Network [OSTI]

Cryptanalysis of Dual CRT-RSA Santanu Sarkar and Subhamoy Maitra Applied Statistics Unit, Indian Statistical Institute, 203 B T Road, Kolkata 700 108, India sarkar.santanu.bir@gmail.com, subho

Paris-Sud XI, Université de

57

Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach  

E-Print Network [OSTI]

Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach Ding Wang University, Beijing 100871, China 3 Automobile Management Institute of PLA, Bengbu City 233011, China wangdingg@mail.nankai.edu.cn Abstract. As the most prevailing two-factor authentication mechanism, smart

58

V-192: Symantec Security Information Manager Input Validation...  

Broader source: Energy.gov (indexed) [DOE]

Input Validation Flaws U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks T-731:Symantec IM Manager Code Injection Vulnerability...

59

Security analysis of RSA cryptosystem algorithm and its properties  

SciTech Connect (OSTI)

The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles to discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA.

Liu, Chenglian [School of Mathematics and Computer Science, Long Yan university, Lonyan 364012 (China); Guo, Yongning, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com; Lin, Juan, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com [Department of Mathematics and Computer Science, Fuqing Branch of Fujian Normal University, Fuqing 350300 (China)

2014-10-06T23:59:59.000Z

60

Cryptanalysis of Two Dynamic IDbased Remote User Authentication Schemes for  

E-Print Network [OSTI]

University, Harbin City 150001, China 2 Automobile Management Institute of PLA, Bengbu City 233011, China guessing attack under their nontamper resistance assumption of the smart card; (2) It fails to provide of schemes. Keywords: Cryptanalysis, Authentication protocol, O#ine password guessing attack, Smart card

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack  

E-Print Network [OSTI]

Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack Hung-Min Sun- Factorization is difficult, p and q are simply estimated as N. In the Wiener attack, 2 N is adopted of the Wiener attack can be considered to be brute-guessing for the MSBs of p + q. Comparing with their work

Chen, Sheng-Wei

62

Secure Anonymous RFID Authentication Protocols Christy Chatmon  

E-Print Network [OSTI]

and scalable. Keywords: RFID, Authentication, Anonymity, Privacy, Availability, Scalability. 1 Introduction technology is to automatically identify objects that are contained in electromagnetic fields. RFID tags doSecure Anonymous RFID Authentication Protocols Christy Chatmon Computer & Information Sciences

Burmester, Mike

63

IT Licentiate theses Query Authentication and  

E-Print Network [OSTI]

IT Licentiate theses 2008-002 Query Authentication and Data Confidentiality in Wireless Sensor of Licentiate of Philosophy in Computer Science at Uppsala University 2008 #12;Query Authentication and Data

Flener, Pierre

64

U-168: EMC Documentum Information Rights Management Server Bugs...  

Broader source: Energy.gov (indexed) [DOE]

8: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service U-168: EMC Documentum Information Rights Management Server Bugs Let Remote...

65

Obfuscated authentication systems, devices, and methods  

DOE Patents [OSTI]

Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

Armstrong, Robert C; Hutchinson, Robert L

2013-10-22T23:59:59.000Z

66

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications  

E-Print Network [OSTI]

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

Sabatini, David M.

67

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Unspecified Flaw Lets Remote Users Gain Access U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-026: Cisco Small...

68

T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...  

Broader source: Energy.gov (indexed) [DOE]

8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

69

V-231: Cisco Identity Services Engine Discloses Authentication...  

Energy Savers [EERE]

231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users...

70

DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING  

E-Print Network [OSTI]

DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING Sukriti Bhattacharya and Agostino Cortesi@dsi.unive.it, cortesi@unive.it Keywords: Database watermarking, ZAW, Public key watermark, Abstract interpretation the verification of integrity of the relational databases by using a public zero distortion authentication

Cortesi, Tino

71

Verifying authentication protocols with CSP Steve Schneider  

E-Print Network [OSTI]

Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

Doran, Simon J.

72

Final report for the network authentication investigation and pilot.  

SciTech Connect (OSTI)

New network based authentication mechanisms are beginning to be implemented in industry. This project investigated different authentication technologies to see if and how Sandia might benefit from them. It also investigated how these mechanisms can integrate with the Sandia Two-Factor Authentication Project. The results of these investigations and a network authentication path forward strategy are documented in this report.

Eldridge, John M.; Dautenhahn, Nathan; Miller, Marc M.; Wiener, Dallas J; Witzke, Edward L.

2006-11-01T23:59:59.000Z

73

T-606: Sun Java System Access Manager Lets Remote Users Partially...  

Broader source: Energy.gov (indexed) [DOE]

6: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote...

74

AUTHENTICATED  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)Productssondeadjustsondeadjust DocumentationARMStreamsUSBudget AdvancedASSESSINGEnergy

75

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08: Debian Security Advisoryand

76

U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03) OMB Control2: AppleSessions |

77

A Localized Authentication, Authorization, and Accounting (AAA) Protocol for Mobile Hotspots  

E-Print Network [OSTI]

of authentication, authorization, and accounting (AAA) protocol, which is a core technology for public mobile mobile hotspots. I. INTRODUCTION With the advances of wireless access technologies (e.g., 3G, IEEE 802 hotspots [3] [4] [5]. In terms of mobility management, the Internet Engineering Task Force (IETF) has

Paris-Sud XI, Universit de

78

An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards  

E-Print Network [OSTI]

An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards Pascal clients. This paper aims to solve this issue by proposing an innovative paradigm based on a grid of smart the scalability of this server linked to smart card grids whose distributed computation manages the concurrence

Paris-Sud XI, Université de

79

Hardware device binding and mutual authentication  

DOE Patents [OSTI]

Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

Hamlet, Jason R; Pierson, Lyndon G

2014-03-04T23:59:59.000Z

80

Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes  

DOE Patents [OSTI]

Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

Kent, Alexander Dale (Los Alamos, NM)

2008-09-02T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

A service-oriented architecture for authentication and authorization  

E-Print Network [OSTI]

THESIS A Service-oriented Architecture for AuthenticationSAN DIEGO A Service-oriented Architecture for Authentication2.0, which is a service-oriented architecture that addresses

Hamedtoolloei, Hamidreza

2009-01-01T23:59:59.000Z

82

PAP: A Privacy and Authentication Protocol for Passive RFID Tags  

E-Print Network [OSTI]

PAP: A Privacy and Authentication Protocol for Passive RFID Tags Alex X. Liu LeRoy A. Bailey for RFID tags is necessary to ensure the privacy and authentication between each tag and their reader. In order to accomplish this, we propose PAP, a privacy and authentication protocol for passive RFID tags

Liu, Alex X.

83

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL  

E-Print Network [OSTI]

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL Christopher Mann and Daniel Loebenberger 15 August 2014 Abstract. We show how to realize two-factor authentication for a Bitcoin wal- let a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification

84

FORENSIC CONNOISSEURSHIP, JACKSON POLLOCK, AND THE AUTHENTIC EYE  

E-Print Network [OSTI]

FORENSIC CONNOISSEURSHIP, JACKSON POLLOCK, AND THE AUTHENTIC EYE by Francis V. O'Connor, Ph shall proceed to some general #12;Forensic Connoisseurship, Pollock, & The Authentic Eye - F. V. O, the training of authentic eyes and forensic connoisseurs -- concluding with a final thought on the historicity

Taylor, Richard

85

Spatial Data Authentication Using Mathematical Visualization  

E-Print Network [OSTI]

Spatial Data Authentication Using Mathematical Visualization Vert, G., Harris, F., Nasser, S. Dept has become an increasingly compromised method to transmit any type of data including spatial data. Due to the criticality of spatial data in decision making processes that range from military targeting to urban planning

Harris Jr., Frederick C.

86

A SECURE AUTHENTICATION INFRASTRUCTURE FOR MOBILE  

E-Print Network [OSTI]

. In this paper, we propose to secure an infrastructure providing telecommunication services on the Internet- bile Internet Telecommunication services (MobInTel). We present this infrastructure in detailsA SECURE AUTHENTICATION INFRASTRUCTURE FOR MOBILE COMMUNICATION SERVICES OVER THE INTERNET Ir

von Bochmann, Gregor

87

Verifiable process monitoring through enhanced data authentication.  

SciTech Connect (OSTI)

To ensure the peaceful intent for production and processing of nuclear fuel, verifiable process monitoring of the fuel production cycle is required. As part of a U.S. Department of Energy (DOE)-EURATOM collaboration in the field of international nuclear safeguards, the DOE Sandia National Laboratories (SNL), the European Commission Joint Research Centre (JRC) and Directorate General-Energy (DG-ENER) developed and demonstrated a new concept in process monitoring, enabling the use of operator process information by branching a second, authenticated data stream to the Safeguards inspectorate. This information would be complementary to independent safeguards data, improving the understanding of the plant's operation. The concept is called the Enhanced Data Authentication System (EDAS). EDAS transparently captures, authenticates, and encrypts communication data that is transmitted between operator control computers and connected analytical equipment utilized in nuclear processes controls. The intent is to capture information as close to the sensor point as possible to assure the highest possible confidence in the branched data. Data must be collected transparently by the EDAS: Operator processes should not be altered or disrupted by the insertion of the EDAS as a monitoring system for safeguards. EDAS employs public key authentication providing 'jointly verifiable' data and private key encryption for confidentiality. Timestamps and data source are also added to the collected data for analysis. The core of the system hardware is in a security enclosure with both active and passive tamper indication. Further, the system has the ability to monitor seals or other security devices in close proximity. This paper will discuss the EDAS concept, recent technical developments, intended application philosophy and the planned future progression of this system.

Goncalves, Joao G. M. (European Commission Joint Research Centre, Italy); Schwalbach, Peter (European Commission Directorate General%3CU%2B2014%3EEnergy, Luxemburg); Schoeneman, Barry Dale; Ross, Troy D.; Baldwin, George Thomas

2010-09-01T23:59:59.000Z

88

Formal analysis of device authentication applications in ubiquitous computing.  

SciTech Connect (OSTI)

Authentication between mobile devices in ad-hoc computing environments is a challenging problem. Without pre-shared knowledge, existing applications rely on additional communication methods, such as out-of-band or location-limited channels for device authentication. However, no formal analysis has been conducted to determine whether out-of-band channels are actually necessary. We answer this question through formal analysis, and use BAN logic to show that device authentication using a single channel is not possible.

Shin, Dongwan (New Mexico Tech, Socorro, NM); Claycomb, William R.

2010-11-01T23:59:59.000Z

89

Serious leisure, participation and experience in tourism: authenticity and ritual in a renaissance festival  

E-Print Network [OSTI]

the serious festival participation were reminiscent of tourism existential authenticity specified by Wang (1999) as two levels: intrapersonal authenticity (gaining one?s true self) and interpersonal authenticity (gaining true human relationship). A search...

Kim, Hyounggon

2005-02-17T23:59:59.000Z

90

A Flexible Approach to Embedded Network Multicast Authentication  

E-Print Network [OSTI]

A Flexible Approach to Embedded Network Multicast Authentication Chris Szilagyi ECE Department Carnegie Mellon University szilagyi@cmu.edu Philip Koopman ECE Department Carnegie Mellon University

Koopman, Philip

91

Shouhuai Xu 2000 1 Password-based Authentication and  

E-Print Network [OSTI]

&AKE FBackground knowledge FPrevious solutions to authentication: The Trouble FBeing implemented proposals: Server FBeing implemented proposals: Server has a cert. FWeaker assumption proposals: Server has no cert

Sandhu, Ravi

92

Enhancing CardSpace Authentication Using a Mobile Device  

E-Print Network [OSTI]

, authentication. 1 Introduction In line with the continuing increase in the number of on-line services requir- ing design goals of CardSpace is to reduce reliance on password authentication. We address this limitation, since the additional overhead is handled by the client. The remainder of the paper is

Sheldon, Nathan D.

93

Multi-Level TESLA: Broadcast Authentication for Distributed Sensor Networks  

E-Print Network [OSTI]

Multi-Level µTESLA: Broadcast Authentication for Distributed Sensor Networks DONGGANG LIU and PENG named multi-level µTESLA based on µTESLA, a broadcast authentication protocol whose scalability is limited by its unicast-based initial parameter distribution. Multi-level µTESLA satisfies several nice

Ning, Peng

94

On the construction of digest functions for manual authentication protocols  

E-Print Network [OSTI]

On the construction of digest functions for manual authentication protocols Abstract A digest. Frequently a digest function needs to have a very short output (e.g. 1632 bits) and no key is used to digest, notably message authentication codes or MACs. Short digests can be constructed directly or by "condensing

Jeavons, Peter

95

Hardware authentication using transmission spectra modified optical fiber.  

SciTech Connect (OSTI)

The ability to authenticate the source and integrity of data is critical to the monitoring and inspection of special nuclear materials, including hardware related to weapons production. Current methods rely on electronic encryption/authentication codes housed in monitoring devices. This always invites the question of implementation and protection of authentication information in an electronic component necessitating EMI shielding, possibly an on board power source to maintain the information in memory. By using atomic layer deposition techniques (ALD) on photonic band gap (PBG) optical fibers we will explore the potential to randomly manipulate the output spectrum and intensity of an input light source. This randomization could produce unique signatures authenticating devices with the potential to authenticate data. An external light source projected through the fiber with a spectrometer at the exit would 'read' the unique signature. No internal power or computational resources would be required.

Grubbs, Robert K.; Romero, Juan A.

2010-09-01T23:59:59.000Z

96

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...  

Broader source: Energy.gov (indexed) [DOE]

and Change User Passwords U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-173: Symantec Web Gateway Multiple Vulnerabilities...

97

CAH and Shared Services Transition Plan CAH will move seven servers that provide daily operational services such as user authentication and access, central file  

E-Print Network [OSTI]

CAH and Shared Services Transition Plan CAH will move seven servers that provide daily operational the university's NET domain. Domains provide user authentication, access, and management to resources divide the transition plan, and each phase has goals and a deadline. The overall goal is to continue

Wu, Shin-Tson

98

How to Balance Privacy and Key Management in User Authentication  

E-Print Network [OSTI]

without electronic data? Privacy vs. Accountability #12;· CURRENTLY: The worst of both worlds: ­ Personal ­ Personal data cannot be located when you need it ­ (Or cannot be released due to a poorly designed ­ Personal data is only disclosed under well- defined conditions, to which the person agrees Privacy vs

99

V-036: EMC Smarts Network Configuration Manager Database Authentication  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08: Debian SecurityBypass

100

V-220: Juniper Security Threat Response Manager Lets Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research PetroleumDepartment of Energy Kaveh Ghaemmaghami has discovered aUsers

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Authenticity and Physiological Changes during Defensive Verbal Response  

E-Print Network [OSTI]

who are more authentic experience higher subjective well-being because they feel in control of their self (Kifer, Heller, Perunovic, & Galinsky, 2013). Thus, by paying attention to how ones cognitions, physiology, and behavior support or challenge...

Yen, Yana

2013-08-31T23:59:59.000Z

102

Understanding 'It': Affective Authenticity, Space, and the Phish Scene  

E-Print Network [OSTI]

"Understanding It: Affective Authenticity, Space, and the Phish Scene" is an ethnographic study of "scene identity" around the contemporary rock band Phish. Utilizing data generated from six years of ethnographic fieldwork, ...

Yeager, Elizabeth Anne

2011-04-26T23:59:59.000Z

103

Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis  

E-Print Network [OSTI]

Authentication schemes relying on per-packet signature and per-signature verification introduce heavy cost for computation and communication. Due to its constraint resources, smart grid's authentication requirement cannot ...

Li, Depeng

104

Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding author)  

E-Print Network [OSTI]

1 Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding in the process algebra Communicating Sequential Processes (CSP) to specify authentication. The purpose, security protocols, CSP, formal specification, Kerberos 1. Introduction Schneider [1] uses Communicating

Doran, Simon J.

105

Authentic, Dialogic Writing: Th e Case of a Letter to the Editor  

E-Print Network [OSTI]

A teacher educator reflects on the educational value of an authentic writing assignment inspired by real-world local events.

Hallman, Heidi L.

2009-01-01T23:59:59.000Z

106

Quantum-Secure Authentication with a Classical Key  

E-Print Network [OSTI]

Authentication provides the trust people need to engage in transactions. The advent of physical keys that are impossible to copy promises to revolutionize this field. Up to now, such keys have been verified by classical challenge-response protocols. Such protocols are in general susceptible to emulation attacks. Here we demonstrate Quantum-Secure Authentication ("QSA") of an unclonable classical physical key in a way that is inherently secure by virtue of quantum-physical principles. Our quantum-secure authentication operates in the limit of a large number of channels, represented by the more than thousand degrees of freedom of an optical wavefront shaped with a spatial light modulator. This allows us to reach quantum security with weak coherent pulses of light containing dozens of photons, too few for an adversary to determine their complex spatial shapes, thereby rigorously preventing emulation.

Sebastianus A. Goorden; Marcel Horstmann; Allard P. Mosk; Boris kori?; Pepijn W. H. Pinkse

2014-06-03T23:59:59.000Z

107

PAKE-based mutual HTTP authentication for preventing phishing attacks  

E-Print Network [OSTI]

This paper describes a new password-based mutual authentication protocol for Web systems which prevents various kinds of phishing attacks. This protocol provides a protection of user's passwords against any phishers even if dictionary attack is employed, and prevents phishers from imitating a false sense of successful authentication to users. The protocol is designed considering interoperability with many recent Web applications which requires many features which current HTTP authentication does not provide. The protocol is proposed as an Internet Draft submitted to IETF, and implemented in both server side (as an Apache extension) and client side (as a Mozilla-based browser and an IE-based one). The paper also proposes a new user-interface for this protocol which is always distinguishable from fake dialogs provided by phishers.

Oiwa, Yutaka; Takagi, Hiromitsu

2009-01-01T23:59:59.000Z

108

The order of encryption and authentication for protecting communications (Or: how secure is SSL?)  

E-Print Network [OSTI]

The order of encryption and authentication for protecting communications (Or: how secure is SSL and authentication, including the authenticate-then-encrypt method used in SSL, are not generically secure. We show with a random or pseudorandom pad). Thus, while we show the generic security of SSL to be broken, the current

109

Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication  

E-Print Network [OSTI]

, or authentication of transmitted data [27,33]. The ISO (International Organization for Standardization) and IECProvably Repairing the ISO/IEC 9798 Standard for Entity Authentication David Basin, Cas Cremers the family of entity authentication protocols defined by the ISO/IEC 9798 standard and find numerous

Basin, David

110

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network [OSTI]

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol of receivers, and tolerates packet loss. TESLA is based on loose time synchronization between the sender

Tygar, Doug

111

The X.509 Privilege Management Infrastructure  

E-Print Network [OSTI]

Management Infrastructure (PMI) introduced in the 2000 edition of X.509. It describes the entities Management Infrastructure (PMI), and it enables privileges to be allocated, delegated, revoked and withdrawn in an electronic way. A PMI is to authorisation what a Public Key Infrastructure (PKI) is to authentication

Kent, University of

112

Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols  

E-Print Network [OSTI]

to privacy of consumers. In recent years, the cryptographic community have made an extensive effort Zahra Ahmadian, Mahmoud Salmasizadeh, and Mohammad Reza Aref Abstract--Privacy is faced to serious years have focused on design and analysis of privacy friendly ultralightweight authentication protocols

113

ELmE : A Misuse Resistant Parallel Authenticated Encryption  

E-Print Network [OSTI]

-Encrypt constructions (inherently inefficient but provide full pri- vacy) and online constructions, e.g., McOE, sponge bottleneck in processing associated data. In this paper, we design a new online secure authenticated in associated data) and pipeline implementable. It also provides full privacy when associated data (which

114

Final report for the mobile node authentication LDRD project.  

SciTech Connect (OSTI)

In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authentication is critical. In a wired infrastructure, this authentication service is typically facilitated by a centrally-located ''authentication certificate generator'' such as a Certificate Authority (CA) server. This centralized approach is ill-suited to meet the needs of mobile ad hoc networks, such as those required by military systems, because of the unpredictable connectivity and dynamic routing. There is a need for a secure and robust approach to mobile node authentication. Current mechanisms either assign a pre-shared key (shared by all participating parties) or require that each node retain a collection of individual keys that are used to communicate with other individual nodes. Both of these approaches have scalability issues and allow a single compromised node to jeopardize the entire mobile node community. In this report, we propose replacing the centralized CA with a distributed CA whose responsibilities are shared between a set of select network nodes. To that end, we develop a protocol that relies on threshold cryptography to perform the fundamental CA duties in a distributed fashion. The protocol is meticulously defined and is implemented it in a series of detailed models. Using these models, mobile wireless scenarios were created on a communication simulator to test the protocol in an operational environment and to gather statistics on its scalability and performance.

Michalski, John T.; Lanzone, Andrew J.

2005-09-01T23:59:59.000Z

115

Forging Attacks on two Authenticated Encryptions COBRA and POET  

E-Print Network [OSTI]

Forging Attacks on two Authenticated Encryptions COBRA and POET Mridul Nandi Indian Statistical COBRA [4], based on pseudorandom per- mutation (PRP) blockcipher, and POET [3], based on Almost XOR and a simple vari- ant of the original proposal of POET (due to a forging attack [13] on the original proposal

116

Authenticated Streamwise On-line Encryption Patrick P. Tsang  

E-Print Network [OSTI]

and end-to-end latency. Also, ASOE provides data authenticity as an option. ASOE can therefore be used construction incurs zero end-to-end latency due to buffering and only 48 bytes of message expansion, regardless 7.3 End-to-end Latency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 7

117

SSL Splitting and Barnraising: Cooperative Caching with Authenticity Guarantees  

E-Print Network [OSTI]

SSL Splitting and Barnraising: Cooperative Caching with Authenticity Guarantees by Christopher T by . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Arthur C. Smith Chairman, Department Committee on Graduate Students #12;SSL Splitting and Barnraising for the degree of Master of Engineering in Electrical Engineering and Computer Science Abstract SSL splitting

Gummadi, Ramakrishna

118

Cryptanalysis of a recent two factor authentication scheme  

E-Print Network [OSTI]

Centre Dublin City University Ballymun, Dublin 9, Ireland. mike.scott@certivox.com Abstract. Very recently a scheme has been proposed by Wang and Ma for a robust smart-card based password authentication scheme, which claims to be secure against a Smart Card security breach. In this short note we attempt

119

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Dutertre, Bruno

120

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Doran, Simon J.

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

Dutertre, Bruno

122

Authenticity Issue in Performing Arts using Live Electronics  

E-Print Network [OSTI]

by the production process key elements for future assessment of authenticity. We will present some "case studies we intend to study the production process, and extract from the elements and traces left, the electronic processes are evaluated towards their robustness against changes of instrumentist, changes

Kouroupetroglou, Georgios

123

Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio  

E-Print Network [OSTI]

Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio Xi Tan, Kapil frequency spectrum was inefficiently utilized. To fully use these spectrums, cognitive radio networks have of cognitive radio is to enable the current fixed spectrum channels assigned by Federal Communica- tions

Du, Wenliang "Kevin"

124

Hardware device to physical structure binding and authentication  

DOE Patents [OSTI]

Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

2013-08-20T23:59:59.000Z

125

Provably Secure Password-based Authentication in TLS  

SciTech Connect (OSTI)

In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised to the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.

Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier; Moeller,Bodo; Pointcheval, David

2005-12-20T23:59:59.000Z

126

New foundations for efficient authentication, commutative cryptography, and private disjointness testing  

E-Print Network [OSTI]

This dissertation presents new constructions and security definitions related to three areas: authentication, cascadable and commutative crytpography, and private set operations. Existing works relevant to each of these ...

Weis, Stephen August, 1978-

2006-01-01T23:59:59.000Z

127

Counterfeit-resistant materials and a method and apparatus for authenticating materials  

DOE Patents [OSTI]

Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters, the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided&

Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

2001-01-01T23:59:59.000Z

128

Counterfeit-resistant materials and a method and apparatus for authenticating materials  

DOE Patents [OSTI]

Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

2000-01-01T23:59:59.000Z

129

E-Print Network 3.0 - authentications algorithms based Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

soft- ware can certify particular outputs. Software Source: Schneier, Bruce - BT Group plc Collection: Computer Technologies and Information Sciences 9 A Local Authentication...

130

T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability  

Broader source: Energy.gov [DOE]

This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

131

Accountable Certificate Management using Undeniable Attestations  

E-Print Network [OSTI]

¨uberneetika AS Akadeemia tee 21 12618 Tallinn, Estonia ahto.buldas@cyber.ee Peeter Laud Universit¨at des Saarlandes FB 14 management system. Moreover, authenticated search trees can be used in many security-critical applications for personal or classroom use is granted without fee provided that copies are not made or distributed

132

ACCEPTED BY IEEE TRANSACTIONS ON IMAGE PROCESSING, JULY 28, 2014. 1 On Continuous User Authentication via Typing  

E-Print Network [OSTI]

such as keystroke dynamics (KD), TB provides reliable authentication with a short delay, while avoiding explicit key-logging

133

Final report and recommendations of the ESnet Authentication Pilot Project  

SciTech Connect (OSTI)

To conduct their work, U.S. Department of Energy (DOE) researchers require access to a wide range of computing systems and information resources outside of their respective laboratories. Electronically communicating with peers using the global Internet has become a necessity to effective collaboration with university, industrial, and other government partners. DOE`s Energy Sciences Network (ESnet) needs to be engineered to facilitate this {open_quotes}collaboratory{close_quotes} while ensuring the protection of government computing resources from unauthorized use. Sensitive information and intellectual properties must be protected from unauthorized disclosure, modification, or destruction. In August 1993, DOE funded four ESnet sites (Argonne National Laboratory, Lawrence Livermore National Laboratory, the National Energy Research Supercomputer Center, and Pacific Northwest Laboratory) to begin implementing and evaluating authenticated ESnet services using the advanced Kerberos Version 5. The purpose of this project was to identify, understand, and resolve the technical, procedural, cultural, and policy issues surrounding peer-to-peer authentication in an inter-organization internet. The investigators have concluded that, with certain conditions, Kerberos Version 5 is a suitable technology to enable ESnet users to freely share resources and information without compromising the integrity of their systems and data. The pilot project has demonstrated that Kerberos Version 5 is capable of supporting trusted third-party authentication across an inter-organization internet and that Kerberos Version 5 would be practical to implement across the ESnet community within the U.S. The investigators made several modifications to the Kerberos Version 5 system that are necessary for operation in the current Internet environment and have documented other technical shortcomings that must be addressed before large-scale deployment is attempted.

Johnson, G.R.; Moore, J.P. [Pacific Northwest Lab., Richland, WA (United States); Athey, C.L. [Lawrence Livermore National Lab., CA (United States); Engert, D.E. [Argonne National Lab., IL (United States); Ramus, J.E. [National Energy Research Supercomputer Center, Livermore, CA (United States)

1995-01-01T23:59:59.000Z

134

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , Jinsong Han2  

E-Print Network [OSTI]

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems Li Lu1 , Jinsong Han2 an emerging requirement ­ protecting user privacy [13] in RFID authentications. In most RFID systems, tags sensitive information. For example, without pri- vacy protection, any reader can identify a consumer's ID

Liu, Yunhao

135

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , Jinsong Han2  

E-Print Network [OSTI]

- sitive information. For example, without privacy pro- tection, any reader can identify a consumer's IDDynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems Li Lu1 , Jinsong Han2 an emerging requirement ­ protecting user privacy [13] in RFID authentications. In most RFID systems, tags

Liu, Yunhao

136

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks  

E-Print Network [OSTI]

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks Tony Cheneau National public key distribution scheme adapted to ad hoc networks called TAKES for Trustful Authentication, or even implementing a light naming system can be enabled on top of ad hoc networks. TAKES is formally

Paris-Sud XI, Université de

137

Breaking POET Authentication with a Single Query Jian Guo, Jeremy Jean, Thomas Peyrin, and Lei Wang  

E-Print Network [OSTI]

Breaking POET Authentication with a Single Query Jian Guo, J´er´emy Jean, Thomas Peyrin, and Lei article, we describe a very practical and simple attack on the au- thentication part of POET authenticated encryption mode proposed at FSE 2014. POET is a provably secure scheme that was designed to resist various

138

SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key  

E-Print Network [OSTI]

SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key Chunhua Chen1 , Chris J.mitchell@rhul.ac.uk Abstract. Most SSL/TLS-based electronic commerce (e-commerce) ap- plications (including Internet banking a server effectively, and because user authentication methods are typi- cally decoupled from SSL

Sheldon, Nathan D.

139

SSL/TLS Session-Aware User Authentication: A Lightweight Alternative to Client-Side Certificates  

E-Print Network [OSTI]

SSL/TLS Session-Aware User Authentication: A Lightweight Alternative to Client-Side Certificates E-Mail: basin@inf.ethz.ch Abstract Many SSL/TLS-based e-commerce applications employ traditional authentication mechanisms on the client side. These mechanisms--if decoupled from SSL/TLS session establishment

Basin, David

140

SSL/TLS Session-Aware User Authentication Rolf Oppliger1  

E-Print Network [OSTI]

SSL/TLS Session-Aware User Authentication Revisited Rolf Oppliger1 , Ralf Hauser2 , and David Basin threat to SSL/TLS-based e-commerce applications. In [OHB06], we introduced the notion of SSL/TLS session-aware user authentication to protect SSL/TLS- based e-commerce applications against MITM attacks and we

Basin, David

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication  

E-Print Network [OSTI]

(International Organization for Standardization) and IEC (Interna- tional Electrotechnical Commission) jointlyProvably Repairing the ISO/IEC 9798 Standard for Entity Authentication David Basin, Cas Cremers the family of entity authentication proto- cols defined by the ISO/IEC 9798 standard and find numerous

Basin, David

142

Formal Analysis and Systematic Construction of Two-factor Authentication Scheme  

E-Print Network [OSTI]

, Duncan S. Wong1 , Huaxiong Wang2 , and Xiaotie Deng1 1 Department of Computer Science City University-factor authentication mechanisms is based on smart card and user's password. Throughout the years, there have been many-resistant hash functions. Keywords: Authentication, Password, Smart Card, Guessing Attack 1 Introduction Password

143

eSeal -A System for Enhanced Electronic Assertion of Authenticity and Integrity  

E-Print Network [OSTI]

in the network and a communication protocol. The system is able to control various kinds of integrity settings to claim and assert the authenticity and integrity of goods, documents or other valued objects in storageeSeal - A System for Enhanced Electronic Assertion of Authenticity and Integrity Christian Decker1

Beigl, Michael

144

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network [OSTI]

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast au- thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro- nization between

Xu, Wenyuan

145

The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network [OSTI]

The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss­tolerant Authentication) broadcast au­ thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro­ nization between

Perrig, Adrian

146

Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME  

E-Print Network [OSTI]

Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME Presented, Washington, DC 20375 E-mail: archer@itd.nrl.navy.mil The TESLA multicast stream authentication protocol just been revealed. While an informal argument for the correctness of TESLA has been published

147

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider  

E-Print Network [OSTI]

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider Department In this paper we consider the nature of machine proofs used in the CSP approach to the veri cation of authentication protocols using the process algebra CSP Hoa85]. The CSP syntax provides a natural and precise way

Doran, Simon J.

148

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems  

E-Print Network [OSTI]

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

Wang, Yongge

149

Home News Products Blogs Buyers Guide Whitepapers Jobs Events Subscribe Issue Archive Topic Center: Email Security Compliance Patch Management Financial Services Health care RSA 2008 RSS | Login | Register  

E-Print Network [OSTI]

SEARCH Home News Products Blogs Buyers Guide Whitepapers Jobs Events Subscribe Issue Archive Topic located the malicious files, mostly MP3 or AVI in format, on popular peer-to- peer (P2P) websites appear when users employ certain terms when searching for music and video, he said. Once the files

Gupta, Minaxi

150

Questioning the Meaning of Authenticity in Martin Heidegger's Being and Time  

E-Print Network [OSTI]

, it is necessary to highlight those commitments to phenomenology and hermeneutics that informs Heidegger's effort. The third chapter first introduces the various characterizations of authenticity that Heidegger offers in Being and Time and the problematic meaning...

Liwinski, Thomas

2011-10-21T23:59:59.000Z

151

A Reduction for Automated Veri cation of Authentication Scott D. Stoller  

E-Print Network [OSTI]

A Reduction for Automated Veri cation of Authentication Protocols Scott D. Stoller Computer Science of those case studies were not rigorously justi ed. Reduction theorems are needed, which show

Stoller, Scott

152

The Emotional and Spiritual Dimensions of Being a Pastor: Authenticity and Identity  

E-Print Network [OSTI]

Emotional labor and its influence on authenticity and identity amongst human service workers has been the focus of numerous studies. Often these studies viewed identity as a stable sense of self. This study set out to examine emotional labor amongst...

Otey, Penny Addison

2011-10-21T23:59:59.000Z

153

Subverting value hierarchies : essays on the causes and responses to shifts in demand for authenticity  

E-Print Network [OSTI]

This dissertation includes three essays on the causes and responses to shifts in demand for authenticity. In the first chapter, I answer the question: why do previously cast-off products, practices, or styles abruptly ...

Hahl, Oliver (Oliver Douglas)

2013-01-01T23:59:59.000Z

154

AUTHENTICATED SENSOR INTERFACE DEVICE FOR JOINT USE SAFEGUARDS APPLICATIONS - CONCEPTS AND CHALLENGES  

SciTech Connect (OSTI)

This paper will discuss the key features of the Authenticated Sensor Interface Device that collectively provide the ability to share data among a number of parties while ensuring the authentication of data and protecting both the operators and the IAEAs interests. The paper will also discuss the development of the prototype, the initial testing with an accountancy scale, and future plans and challenges to implementation into the joint use and remote monitoring applications. As nuclear fuel cycle technology becomes more prevalent throughout the world and the capacity of plants increases, limited resources of the IAEA are being stretched near a breaking point. A strategy is to increase efficiency in safeguards monitoring using joint use equipment that will provide the facility operator process data while also providing the IAEA key safeguards data. The data, however, must be authenticated and validated to ensure the data have not been tampered with. The Authenticated Sensor Interface Device provides the capability to share data and can be a valuable component in the IAEAs ability to collect accountancy data from scales in Uranium conversion and enrichment plants, as well as nuclear fuel fabrication plants. Likewise, the Authenticated Sensor Interface Device can be configured to accept a diverse array of input signals, ranging from analog voltage, to current, to digital interfaces and more. These modular capabilities provide the ability to collect authenticated, joint-use, data streams from various process monitoring sensors.

Poland, R.; Drayer, R.; Wilson, J.

2013-08-12T23:59:59.000Z

155

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories  

Broader source: Energy.gov [DOE]

A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

156

PAP: A privacy and authentication protocol for passive RFID tags Alex X. Liu *, LeRoy A. Bailey  

E-Print Network [OSTI]

people about consumer privacy protection and other security loopholes that make RFID tags an easy targetPAP: A privacy and authentication protocol for passive RFID tags Alex X. Liu *, LeRoy A. Bailey 2009 Accepted 20 March 2009 Available online 31 March 2009 Keywords: RFID Privacy Authentication

Liu, Alex X.

157

A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA)  

E-Print Network [OSTI]

A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA) Rolf, CH-8005 Zurich Abstract Most SSL/TLS-based e-commerce applications employ con- ventional mechanisms for user authentication. These mechanisms--if de- coupled from SSL/TLS session establishment

Basin, David

158

A Tree-Based TESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu Sushil Jajodia  

E-Print Network [OSTI]

A Tree-Based µTESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu to multiple nodes in an authenticated way. µTESLA and multi-level µTESLA have been proposed to provide of senders. Though multi-level µTESLA schemes can scale up to large sensor networks (in terms of receivers

Zhu, Sencun

159

Probabilistic Non-Repudiation for Source Authentication with TESLA Certificates in Hybrid Satellite/Wireless Networks and  

E-Print Network [OSTI]

Probabilistic Non-Repudiation for Source Authentication with TESLA Certificates in Hybrid Satellite describe a novel non-repudiation mechanism for an authentication protocol based on the extended TESLA to this problem, we have proposed a new class of lightweight, symmetric key certificates called extended TESLA

Baras, John S.

160

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03)Arbitrary Code | Department

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Heart-to-Heart (H2H): Authentication for Implanted Medical Devices  

E-Print Network [OSTI]

Heart-to-Heart (H2H): Authentication for Implanted Medical Devices Masoud Rostami Rice University Rice University Houston, TX farinaz@rice.edu ABSTRACT We present Heart-to-Heart (H2H), a system patients to over-the-air attack and physical harm. H2H makes use of ECG (heartbeat data

162

Reliable and Semi-reliable Communication with Authentication in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Reliable and Semi-reliable Communication with Authentication in Mobile Ad Hoc Networks Falko of wireless ad hoc sensor networks is the error-proneness and, therefore, the unreliability of communication describe a new approach and an according protocol for usage in ad hoc networks that provides reliable

Breu, Ruth

163

SSL/TLS Session-Aware User Authentication--Or How to Effectively Thwart  

E-Print Network [OSTI]

SSL/TLS Session-Aware User Authentication--Or How to Effectively Thwart the Man-in-the-Middle Rolf@inf.ethz.ch Abstract. Man-in-the-middle attacks pose a serious threat to SSL/TLS- based electronic commerce mechanisms fail to provide protection against this type of attack, even when they run on top of SSL

Basin, David

164

Project List 1. Project Name: Efficient Anonymous Private Authentication Protocol for RFID Systems  

E-Print Network [OSTI]

based authentication. Publication: Md. Endadul Hoque, Farzana Rahman, and Sheikh I. Ahamed, "Anon's geocoding and mapping API. Publication: Farzana Rahman, Casey O'Brien, Sheikh I. Ahamed, He Zhang'Brien, Kristine Manning, Jason Cowdy, Sheikh Iqbal Ahamed, "Let EcoDrive be Your Guide: Development of a Mobile

Brylow, Dennis

165

Cryptanalysis of an IDbased Password Authentication Scheme using Smart Cards and  

E-Print Network [OSTI]

Cryptanalysis of an IDbased Password Authentication Scheme using Smart Cards and Fingerprints Michael Scott School of Computer Applications Dublin City University Ballymun, Dublin 9, Ireland. mike two IDbased password authen tication schemes for logging onto a remote network server using smart

166

All Your Face Are Belong to Us: Breaking Facebook's Social Authentication  

E-Print Network [OSTI]

All Your Face Are Belong to Us: Breaking Facebook's Social Authentication Iasonas Polakis FORTH adversaries from compromising accounts using stolen credentials. Facebook has recently released a two can obtain the information needed to solve the chal- lenges presented by Facebook. We implement

Yang, Junfeng

167

Simplified authenticated key exchange based on the q(th) root problem  

SciTech Connect (OSTI)

Finding a q{sup th} root in GF(p), where p and q are prunes, q is large and q{sup 2} divides (p{minus}1) is a difficult problem equivalent to the discrete logarithm problem using an element of order q as the base. This paper describes an authenticated key exchange algorithm utilizing this hard problem.

JOHNSTON,ANNA M.; GEMMELL,PETER S.

2000-02-29T23:59:59.000Z

168

Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for  

E-Print Network [OSTI]

to connect their personal devices with devices encountered in their environment in order to take advantage the interaction of their personal device with the intended target device. They must be able to ascertainSecurity by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous

Hazas, Mike

169

ECG-Based Authentication Fahim Sufi, Ibrahim Khalil, and Jiankun Hu  

E-Print Network [OSTI]

ECG-Based Authentication Fahim Sufi, Ibrahim Khalil, and Jiankun Hu 17 Contents 17.1 Background of ECG . . . . . . . . . . . . . . . . . . . . . . 310 17.1.1 Physiology of ECG . . . . . . . . . . . . . . . . . . 310 17.1.2 Rhythm Analysis . . . . . . . . . . . . . . . . . . . . 312 17.2 What Can ECG Based

Hu, Jiankun

170

Simulation of PKI-Enabled Communication for Identity Management Using CyberCIEGE  

E-Print Network [OSTI]

, authentication, provenance, and access control. Keywords-network cyber security; identity management; information environment, players1 are guided through a series of scenarios that highlight various cyber security education colleges. CyberCIEGE was created by the Center for Information Systems Security Studies and Research (CISR

171

An EAP ID-Based Authentication Method for Wireless Networks  

E-Print Network [OSTI]

(Certification Author- ity) and the burdensome management of certificates is removed. The presented) into IEEE 802 wired networks. It gave also birth to the IEEE 802.11i [2] which is more specific to wireless between two stations or a signature mechanism that lies on certificates to prove the ownership of a public

Paris-Sud XI, Université de

172

Management Plan Management Plan  

E-Print Network [OSTI]

; and 5) consistency with the Endangered Species Act and Clean Water Act. In addition, the management plan Plan, Management Plan Page MP­ 1 #12;Management Plan water quality standards, instream flows, privateManagement Plan Management Plan "Management and restoration programs for native salmonids have

173

WIPP Transparency Project - container tracking and monitoring demonstration using the Authenticated Tracking and Monitoring System (ATMS)  

SciTech Connect (OSTI)

The Authenticated Tracking and Monitoring System (ATMS) is designed to answer the need for global monitoring of the status and location of proliferation-sensitive items on a worldwide basis, 24 hours a day. ATMS uses wireless sensor packs to monitor the status of the items within the shipment and surrounding environmental conditions. Receiver and processing units collect a variety of sensor event data that is integrated with GPS tracking data. The collected data are transmitted to the International Maritime Satellite (INMARSAT) communication system, which then sends the data to mobile ground stations. Authentication and encryption algorithms secure the data during communication activities. A typical ATMS application would be to track and monitor the stiety and security of a number of items in transit along a scheduled shipping route. The resulting tracking, timing, and status information could then be processed to ensure compliance with various agreements.

SCHOENEMAN, J. LEE; SMARTT, HEIDI ANNE; HOFER, DENNIS

2000-01-27T23:59:59.000Z

174

Integrating end-to-end encryption and authentication technology into broadband networks  

SciTech Connect (OSTI)

BISDN services will involve the integration of high speed data, voice, and video functionality delivered via technology similar to Asynchronous Transfer Mode (ATM) switching and SONET optical transmission systems. Customers of BISDN services may need a variety of data authenticity and privacy assurances, via Asynchronous Transfer Mode (ATM) services Cryptographic methods can be used to assure authenticity and privacy, but are hard to scale for implementation at high speed. The incorporation of these methods into computer networks can severely impact functionality, reliability, and performance. While there are many design issues associated with the serving of public keys for authenticated signaling and for establishment of session cryptovariables, this paper is concerned with the impact of encryption itself on such communications once the signaling and setup have been completed. Network security protections should be carefully matched to the threats against which protection is desired. Even after eliminating unnecessary protections, the remaining customer-required network security protections can impose severe performance penalties. These penalties (further discussed below) usually involve increased communication processing for authentication or encryption, increased error rate, increased communication delay, and decreased reliability/availability. Protection measures involving encryption should be carefully engineered so as to impose the least performance, reliability, and functionality penalties, while achieving the required security protection. To study these trade-offs, a prototype encryptor/decryptor was developed. This effort demonstrated the viability of implementing certain encryption techniques in high speed networks. The research prototype processes ATM cells in a SONET OC-3 payload. This paper describes the functionality, reliability, security, and performance design trade-offs investigated with the prototype.

Pierson, L.G.

1995-11-01T23:59:59.000Z

175

T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy StrainClient update resolve multipleAuthentication

176

ETD Management in the Texas Digital Library: lessons Learned from a Demonstrator  

E-Print Network [OSTI]

participants. Shiboleth Any web aplication that deals with personal information wil be dealing with authentication and identity management. In an educational seting, these aspects of the aplication are critical, and regulated by federal laws governing... is an open-source midleware aplication for providing identity management in a distributed environment (Shiboleth 208). In suport of its scholarly services, TDL established the first state-wide Shiboleth federation in Texas. Under this infrastructure, TDL...

Mikeal, Adam

2008-07-24T23:59:59.000Z

177

Hospitality Management Hospitality Management  

E-Print Network [OSTI]

of the global hospitality industry. Academic Offerings HOSPITALITY AND FOOD SERVICE MANAGEMENT MINOR HOSPITALITY AND FOOD SERVICE MANAGEMENT MINOR Students pursuing programs in other areas of study may choose a minor Lodging Management 3 HPM 309 Sports Arena Management 3 HPM 312* Cost Control in Food Services (Prereq

McConnell, Terry

178

Hospitality, Tourism and Event Management  

E-Print Network [OSTI]

Practical cooking Public speaking Responsible Service of Alcohol (RSA) certification Small to medium the best university in Melbourne for teaching quality (2007­2010) and graduate satisfaction (2007, 2008. As a Swinburne graduate you'll be in high demand, with a long menu of career prospects to select from. Swinburne

Liley, David

179

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for  

E-Print Network [OSTI]

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for Smart Grid Communications Mostafa M. Fouda, Member, IEEE, Zubair Md. Fadlullah, Member Abstract--Smart grid (SG) communication has recently received significant attentions to facilitate

Shen, Xuemin "Sherman"

180

Network Management Network Management  

E-Print Network [OSTI]

that pertain to the operation, administration, maintenance, and provisioning of networked systems Operation deals with keeping the network up (and the service provided by the network) Administration involvesNetwork Management Pag. 1 Network Management Andrea Bianco Telecommunication Network Group Network

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

SUBCONTRACT MANAGEMENT  

Energy Savers [EERE]

0-1 CHAPTER 10 SUBCONTRACT MANAGEMENT (Revised October 19, 2011) WHAT ARE THE BASIC PRINCIPLES AND OBJECTIVES OF SUBCONTRACT MANAGEMENT? 1. To ensure contractors establish,...

182

161 rue Ada F -34392 Montpellier Cedex 05 Tl : 33 (0)4 67 4 85 85 Fax : 33 (0)4 67 4 85 00 www. lirmm.fr Added Redundancy Explicit Authentication at  

E-Print Network [OSTI]

hardware-based (physical) attacks and work under th Technical Report 01/07/2007 lirmm-00171028,version1-11Sep2007 #12;Added Redundancy Explicit Authentication

Boyer, Edmond

183

Conference Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish requirements and responsibilities with respect to managing conferences sponsored by the Department of Energy (DOE) or by DOE management and operating contractors and other contractors who perform work at DOE-owned or -leased facilities, including management and integration contractors and environmental restoration management contractors (when using funds that will be reimbursed by DOE). Cancels DOE N 110.3.

1999-11-03T23:59:59.000Z

184

Project Management Plan Resident Management System (RMS)  

E-Print Network [OSTI]

1 Project Management Plan Resident Management System (RMS) And Quality Control System (QCS Resident Management System.........................................................................................................3 Project Management Plan - Purpose

US Army Corps of Engineers

185

V-236: MediaWiki CentralAuth Extension Authentication Bypass...  

Energy Savers [EERE]

Web: http:energy.govcioservicesincident-management E-mail: circ@jc3.doe.gov JC3 services are available to JC3-Joint Cybersecurity Coordination Center, and JC3 Contractors....

186

authentic food -simply prepared add green bean fair trade organic coffee or fair trade tea to your meal for $1.5  

E-Print Network [OSTI]

brunch authentic food - simply prepared #12;BREAKFAST add green bean fair trade organic coffee or fair trade tea to your meal for $1.5 BUILD YOUR OWN BREAKFAST 7 served with toast (rye or harvest grain · house cured back bacon · house smoked tofu · grilled tomatoes and onions · wilted greens · breakfast

Martin, Jeff

187

LRRB Pavement Management Systems Pavement Management Systems  

E-Print Network [OSTI]

LRRB Pavement Management Systems Pavement Management Systems Presented by: Michael Marti SRF for implementing and monitoring research results (RIC) #12;LRRB Pavement Management Systems LRRB Structure LRRB Current Pavement Management System Used ICON (Goodpointe) Year of Pavement Management System

Minnesota, University of

188

Position Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order prescribes the policies, responsibilities, and procedures for position management within (DOE). Canceled by DOE N 1321.140. Cancels DOE 3510.1

1992-06-23T23:59:59.000Z

189

Water Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Water Management This department applies multi-disciplinary science and technology-based modeling to assess complex environmental systems. It integrates ecology, anthropology, and...

190

Program Manager  

Broader source: Energy.gov [DOE]

A successful candidate in this position will participate in a wide spectrum of program and project management activities involving systems engineering and integration support for Defense Programs...

191

MANAGEMENT (MNG)  

Broader source: Energy.gov (indexed) [DOE]

and recommendations is adequately implemented. (DOE Order 414.1A, Criterion 3; 10 CFR 830, Subpart A) Approach Record Review * Review the SWS issues management systems and...

192

Quality Management  

Broader source: Energy.gov [DOE]

The Office of Quality Management, within the Office of Health, Safety and Security develops policies and procedures to ensure the classification and control of information is effective and...

193

On the use of ID-Based Cryptography for the definition of new EAP authentication methods  

E-Print Network [OSTI]

. As such, there is no need for deployment of a Certification Authority (CA) and the burdensome management of certificates is removed. IBC relies on a Private Key Generator (PKG) for the computation of stations private birth to the IEEE 802.11i [2] which is more specific to wireless networks but still refers to similar

Paris-Sud XI, Université de

194

Fabrication of Message Digest to Authenticate Audio Signals with Alternation of Coefficients of Harmonics in Multi-Stages (MDAC)  

E-Print Network [OSTI]

Providing security to audio songs for maintaining its intellectual property right (IPR) is one of chanllenging fields in commercial world especially in creative industry. In this paper, an effective approach has been incorporated to fabricate authentication of audio song through application of message digest method with alternation of coefficients of harmonics in multi-stages of higher frequency domain without affecting its audible quality. Decomposing constituent frequency components of song signal using Fourier transform with generating secret code via applying message digest followed by alternating coefficients of specific harmonics in multi-stages generates a secret code and this unique code is utilized to detect the originality of the song. A comparative study has been made with similar existing techniques and experimental results are also supported with mathematical formula based on Microsoft WAVE (".wav") stereo sound file.

Mondal, Uttam Kr

2012-01-01T23:59:59.000Z

195

BachelorofManagement InternationalManagement  

E-Print Network [OSTI]

on the official transcript (see Part 11 - Faculty of Management in the 2007/2008 Calendar). Program Planning Guide Management 3050/Political Science 3420 - Human Resource Management Management 3061 - Information Systems Environment Management 3640 - Cross-Cultural Management Practices Management 3660/Geography 3225 - Industrial

Seldin, Jonathan P.

196

Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices  

SciTech Connect (OSTI)

In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

Abercrombie, Robert K [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Aldridge, Hal [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC; Ricci, Tracy [Sypris Electronics, LLC] [Sypris Electronics, LLC; Bertino, Elisa [ORNL] [ORNL; Kulatunga, Athula [Purdue University] [Purdue University; Navaratne, Uditha Sudheera [Purdue University] [Purdue University

2011-01-01T23:59:59.000Z

197

Risk Management Procedures Category: Strategic Management  

E-Print Network [OSTI]

/POLICY SUPPORTED Risk Management Policy Tertiary Education Quality Standards Agency Act 2011 (TEQSA Act 2011) 21 Risk Management Procedures Category: Strategic Management 1. LEGISLATION/ENTERPRISE AGREEMENT. PROCEDURAL DETAILS 2.1. Responsibilities Entity / Officer Responsibilities Planning and Management Committee

198

Conference Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes requirements and responsibilities for managing conferences sponsored or co-sponsored by the Department of Energy, including the National Nuclear Security Administration. Cancels DOE O 110.3. Canceled by DOE N 251.97.

2007-01-25T23:59:59.000Z

199

Project Manager  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as a project manager in the Fuel Cell Technologies Office in the DOE-EERE Office of Transportation responsible for a wide variety of highly...

200

Stormwater Management  

E-Print Network [OSTI]

management program must be developed that would meet the standard of reducing pollutants to the maximum extent practicable. Stormwater management programs for medium and large MS4s include measures to: ? Identify major outfalls and pollutant loadings... seeding: The vegetation used will be part of final landscaping, but during construction it prevents soil erosion. ? Mulching: Materials such as hay, grass, woodchips, gravel, or straw are placed on top of the soil to keep it from eroding. Structural...

Jaber, Fouad

2008-10-23T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Managing the Management: CORBAbased Instrumentation of Management Systems  

E-Print Network [OSTI]

Managing the Management: CORBA­based Instrumentation of Management Systems A. Keller Munich Network to dynamically exchange customer­ and technology­related data. In this context, management systems are crucial providers: On the one hand, different service providers have chosen different management systems

202

Business Management Analyst Business Manager Director of Communication Contracts Manager  

E-Print Network [OSTI]

· Business Management Analyst · Business Manager · Director of Communication · Contracts Manager of Sales · President/Owner · Instructor of Business · Senior Buyer · North American Sales Manager · Talent graduation. You will have the skills & knowledge to manage and grow a successful business. You will be able

Maxwell, Bruce D.

203

Managing Solutions  

E-Print Network [OSTI]

tx H2O | pg. 19 Texas Water Resources Institute (TWRI) project managers work together with scientists and educators as well as government funding agencies to address water quality and quantity issues in Texas. Each of TWRI?s five project... the funds.? Gregory began his role at TWRI in 2006 upon com- pletion of a master?s degree in water management and hydrological science at Texas A&M University. A former Mills Scholar, Gregory was familiar with TWRI. He saw that the institute...

Baker, Emily

2007-01-01T23:59:59.000Z

204

Object Management Systems  

E-Print Network [OSTI]

Object-Oriented Database Management Systems for EngineeringR. Cassel. Distribution Management Systems: Functions and8-PWR 1988. Network Management Systems 52 Subodh Bapat.

Gollu, Aleks Ohannes

1995-01-01T23:59:59.000Z

205

Environmental Management System Plan  

E-Print Network [OSTI]

R-3 Environmental Management System Plan References 30.of Energy, Safety Management System Policy, DOE P 450.4 (E), Environmental Management Systems ? Requirements with

Fox, Robert

2009-01-01T23:59:59.000Z

206

Environmental Management System Plan  

E-Print Network [OSTI]

Management Program, R-3 Environmental Management SystemEnvironmental policy 3. Environmental aspects 4. Legal andObjectives, targets, and Environmental Management Programs

Fox, Robert

2009-01-01T23:59:59.000Z

207

MUSHROOM WASTE MANAGEMENT PROJECT LIQUID WASTE MANAGEMENT  

E-Print Network [OSTI]

of solid and liquid wastes generated at mushroom producing facilities. Environmental guidelines#12;MUSHROOM WASTE MANAGEMENT PROJECT LIQUID WASTE MANAGEMENT PHASE I: AUDIT OF CURRENT PRACTICE The Mushroom Waste Management Project (MWMP) was initiated by Environment Canada, the BC Ministry

208

Waste Management Program management plan. Revision 1  

SciTech Connect (OSTI)

As the prime contractor to the Department of Energy Idaho Operations Office (DOE-ID), Lockheed Martin Idaho Technologies Company (LMITCO) provides comprehensive waste management services to all contractors at the Idaho National Engineering and Environmental Laboratory (INEEL) through the Waste Management (WM) Program. This Program Management Plan (PMP) provides an overview of the Waste Management Program objectives, organization and management practices, and scope of work. This document will be reviewed at least annually and updated as needed to address revisions to the Waste Management`s objectives, organization and management practices, and scope of work. Waste Management Program is managed by LMITCO Waste Operations Directorate. The Waste Management Program manages transuranic, low-level, mixed low-level, hazardous, special-case, and industrial wastes generated at or transported to the INEEL.

NONE

1997-02-01T23:59:59.000Z

209

MATERIALS MANAGEMENT MATERIALS MANAGEMENT -INVENTORY CONTROL  

E-Print Network [OSTI]

MATERIALS MANAGEMENT MATERIALS MANAGEMENT - INVENTORY CONTROL Record of Property Transferred from ______ ___________________________________ 2. DEAN (If Applies) ______ ___________________________________ 5. UNIVERSITY DIRECTOR OF MATERIALS MANAGEMENT ______ ___________________________________ 3. HOSPITAL DIRECTOR (If Applies) ______ IF YOU NEED

Oliver, Douglas L.

210

Managing Critical Management Improvement Initiatives  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Provides requirements and responsibilities for planning, executing and assessing critical management improvement initiatives within DOE. DOE N 251.59, dated 9/27/2004, extends this Notice until 10/01/2005. Archived 11-8-10. Does not cancel other directives.

2003-10-01T23:59:59.000Z

211

Best Management Practice #1: Water Management Planning  

Broader source: Energy.gov [DOE]

A successful water management program starts with developing a comprehensive water management plan. This plan should be included within existing facility operating plans.

212

Environmental Management Waste Management Facility (EMWMF) at...  

Office of Environmental Management (EM)

Technical Review Report: Oak Ridge Reservation Review of the Environmental Management Waste Management Facility (EMWMF) at Oak Ridge By Craig H. Benson, PhD, PE; William H....

213

Environmental Management  

SciTech Connect (OSTI)

Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

None

2014-11-12T23:59:59.000Z

214

Environmental Management  

ScienceCinema (OSTI)

Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

None

2015-01-07T23:59:59.000Z

215

Contract Management Certificate Program  

E-Print Network [OSTI]

Contract Management Certificate Program Accelerate Your Career BusinessandManagement extension bearing the UC seal signifies a well- known, uncompromising standard of academic excellence. #12;Contract Management Certificate Program UC Irvine Extension's Contract Management Certificate Program focuses on core

Rose, Michael R.

216

Energy, Data Management, Reporting  

Broader source: Energy.gov (indexed) [DOE]

About Schneider Electric Enterprise wide Data Management Outputs Foundation and results Part of a complete energy management solution Schneider Electric...

217

Landscape Management Systems The Visual Management System  

E-Print Network [OSTI]

Landscape Management Systems The Visual Management System of the Forest Service, USDA1 Warren R presentation on how the Visual Management System (VMS) functions. 1/ Presented at the National Conference Manual 2380, Landscape Management, USDA. INTRODUCTION The American people are concerned about the quality

Standiford, Richard B.

218

Management Overview  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector General Office0-72.pdfGeorgeDoesn't HappenLow-Cost ProductionManagement Controls over

219

Management Overview  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector General Office0-72.pdfGeorgeDoesn't HappenLow-Cost ProductionManagement Controls overOverview -

220

Management Overview  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector General Office0-72.pdfGeorgeDoesn't HappenLow-Cost ProductionManagement Controls overOverview

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Management Overview  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector General Office0-72.pdfGeorgeDoesn't HappenLow-Cost ProductionManagement Controls

222

Management Overview  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector General Office0-72.pdfGeorgeDoesn't HappenLow-Cost ProductionManagement ControlsVHTR Materials

223

DEACTIVATION MANAGEMENT  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergy Cooperation |South42.2Consolidated Edison5 by ISA -ofDATA REPORT ON7 DATE:AFPsMANAGEMENT The

224

Management Overview  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: VegetationEquipment Surfaces and InterfacesAdministration -Lowellfor 2013Malcolm J.Management Alert:Used

225

Management Overview  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: VegetationEquipment Surfaces and InterfacesAdministration -Lowellfor 2013Malcolm J.Management

226

NIF Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest Regionat Cornell Batteries & FuelTechnologies |T I OPSNIF Management

227

Bibliographic Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to someone6 M. Babzien, I.Program InformationBibliographic Managment

228

DOE Jobs Online (Hiring Manager), Office of Human Capitol Management...  

Energy Savers [EERE]

Jobs Online (Hiring Manager), Office of Human Capitol Management Innovation and Solutions DOE Jobs Online (Hiring Manager), Office of Human Capitol Management Innovation and...

229

BUILDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PL LDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PLAN  

E-Print Network [OSTI]

BUILDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PL LDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PLAN MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PLAN BUILDING A R RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PLAN BUILDIN T PLAN BUILDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEM

Florida, University of

230

Functional Facilities Management Energy Management Structure  

E-Print Network [OSTI]

Functional Facilities Management Energy Management Structure Jerome Malmquist Director Erick Van Controls Systems Jeff Davis Assistant Director, Facilities Engineering & Energy Efficiency Gene Husted Principal Engineer / Commissioning Emily Robin-Abbott St. Paul Energy Engineer & Technicians Supervisor Dan

Gulliver, Robert

231

Load Management for Industry  

E-Print Network [OSTI]

In the electric utility industry, load management provides the opportunity to control customer loads to beneficially alter a utility's load curve Load management alternatives are covered. Load management methods can be broadly classified into four...

Konsevick, W. J., Jr.

1982-01-01T23:59:59.000Z

232

IT Project Manager  

Broader source: Energy.gov [DOE]

This position is located in the IT Project Management Office (JP). A successful candidate in this position will serve as an IT Program Manager and technical expert responsible for directly managing...

233

U-090: RSA enVision Discloses Environment Variable Information...  

Broader source: Energy.gov (indexed) [DOE]

CVE-2011-4143 SecurityTracker Alert ID: 1026591 Secunia Advisory IMPACT ASSESSMENT: Medium Discussion: The security issue is caused due to the application disclosing certain...

234

Exploratory Group Problem: RSA Encryption November 5, 2008  

E-Print Network [OSTI]

result and you shouldn't use any more advanced functions). To do this, you will need to develop some. (b) How many invertible elements are there in ZN where N = pq is a product of two primes? Explain why of multiplicatively invertible elements of ZN , and the size of the subgroup generated by x. 1 #12;(c) Calculate

Stange, Katherine E.

235

User Guide Remote Access to VDI/Workplace Using RSA  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access to VDI/Workplace Using PIV

236

Managing Web Data Managing Web Data  

E-Print Network [OSTI]

Managing Web Data Dan Suciu AT&T Labs Managing Web Data Sigmod, 1999 Dan Suciu AT&T Labs 1 #12;How the Web is Today HTML documents all intended for human consumption many are generated automatically by applications Managing Web Data Sigmod, 1999 Dan Suciu AT&T Labs 2 #12;Paradigm Shift on the Web applications

Davulcu, Hasan

237

MATERIALS MANAGEMENT MATERIALS MANAGEMENT -INVENTORY CONTROL  

E-Print Network [OSTI]

MATERIALS MANAGEMENT MATERIALS MANAGEMENT - INVENTORY CONTROL NOTICE OF DESIGNATED DEPARTMENTAL OF MATERIALS MANAGEMENT ______ FURTHER INSTRUCTIONS 1. Include a copy of any relevant documents. 2. Item MATERIALS COORDINATOR IC-8 Mail, Fax or PDF the entire package to: MC 2010 Fax: 679-4240 REFERENCE # DMC

Oliver, Douglas L.

238

Target Cost Management Strategy  

E-Print Network [OSTI]

Target cost management (TCM) is an innovation of Japanese management accounting system and by common sense has been considered with great interest by practitioners. Nowadays, TCM related

Okano, Hiroshi

1996-01-01T23:59:59.000Z

239

Stormwater Management Program (Pennsylvania)  

Broader source: Energy.gov [DOE]

Stormwater Management program of the Department of Environmental Protection's Bureau of Conservation and Restoration administers the rules and regulations for stormwater management for Pennsylvania...

240

Stormwater Management (Maryland)  

Broader source: Energy.gov [DOE]

Maryland's Stormwater Management Program, administered by the Department of the Environment, aims to reduce stormwater runoff. The program requires the submission of a stormwater management plan...

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Contract/Project Management  

Broader source: Energy.gov (indexed) [DOE]

3 rd Quarter Overall Contract and Project Management Performance Metrics and Targets ContractProject Management Performance Metrics FY 2009 Target FY 2009 Actual Comment 1....

242

Records Management Specialist  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as a Records Management Specialist in the Richland Operations Office (RL), Assistant Manager for Mission Support (AMMS), Infrastructure, Services...

243

Physics Department Management Review  

E-Print Network [OSTI]

ESSH Committee and Work Planning Security Cyber Security Accident and Incident Management was distributed to the ESSH Committee, Group Leaders, Group Safety Coordinators, and Line Management #12;Areas

Homes, Christopher C.

244

Management of Nuclear Materials  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish requirements for the lifecycle management of DOE owned and/or managed accountable nuclear materials. Cancels DOE O 5660.1B.

2009-08-17T23:59:59.000Z

245

ARM - Central Authentication Service  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformationbudapest Comments? We would love to heartotdngovInstrumentswrf-chemHistory Organization

246

CERTIFICATE OF AUTHENTICITY  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energyon ArmedWaste andAccess toSustainableClimateSealingColdEnergyClimateC C

247

Best Environmental Management Practices  

E-Print Network [OSTI]

Best Environmental Management Practices Farm Animal Production Comprehensive Nutrient Management with regulatory guidelines by addressing items such as manure management, field crop nutrients, and storm water What is a CNMP? A Comprehensive Nutrient Management Plan (CNMP) is a total planning tool that details

248

Environmental Best Management Practices  

E-Print Network [OSTI]

Environmental Best Management Practices for Virginia's Golf Courses Prepared by Virginia Golf Course Superintendents Association #12;#12;EnvironmEntal BEst managEmEnt PracticEs for virginia's golf III I am pleased to endorse the Environmental Best Management Practices for Virginia's Golf Courses

Liskiewicz, Maciej

249

Sport Management Academic Offerings  

E-Print Network [OSTI]

production and programming of events; marketing and public relations; technological operations management including (but not limited to) digital advertising, media law, new media business, operations managementSport Management Academic Offerings M.S. In Sport Venue And Event Management GRADUATE Chad Mc

Mather, Patrick T.

250

Chemical Management Contacts  

Broader source: Energy.gov [DOE]

Contacts for additional information on Chemical Management and brief description on Energy Facility Contractors Group

251

Information resource management concepts for records managers  

SciTech Connect (OSTI)

Information Resource Management (ERM) is the label given to the various approaches used to foster greater accountability for the use of computing resources. It is a corporate philosophy that treats information as it would its other resources. There is a reorientation from simply expenditures to considering the value of the data stored on that hardware. Accountability for computing resources is expanding beyond just the data processing (DP) or management information systems (MIS) manager to include senior organization management and user management. Management`s goal for office automation is being refocused from saving money to improving productivity. A model developed by Richard Nolan (1982) illustrates the basic evolution of computer use in organizations. Computer Era: (1) Initiation (computer acquisition), (2) Contagion (intense system development), (3) Control (proliferation of management controls). Data Resource Era: (4) Integration (user service orientation), (5) Data Administration (corporate value of information), (6) Maturity (strategic approach to information technology). The first three stages mark the growth of traditional data processing and management information systems departments. The development of the IRM philosophy in an organization involves the restructuring of the DP organization and new management techniques. The three stages of the Data Resource Era represent the evolution of IRM. This paper examines each of them in greater detail.

Seesing, P.R.

1992-10-01T23:59:59.000Z

252

Contract Signature Using Quantum Information  

E-Print Network [OSTI]

This paper describes how to perform contract signature in a fair way using quantum information. The protocol proposed permits two partners, users of a communication network, to perform a contract signature based on the RSA security. The authentication of the signers is based on the use of a non-local XOR function of two classical bits.

Paulo Benicio Melo de Sousa; Rubens Viana Ramos

2007-11-08T23:59:59.000Z

253

Information resource management concepts for records managers  

SciTech Connect (OSTI)

Information Resource Management (ERM) is the label given to the various approaches used to foster greater accountability for the use of computing resources. It is a corporate philosophy that treats information as it would its other resources. There is a reorientation from simply expenditures to considering the value of the data stored on that hardware. Accountability for computing resources is expanding beyond just the data processing (DP) or management information systems (MIS) manager to include senior organization management and user management. Management's goal for office automation is being refocused from saving money to improving productivity. A model developed by Richard Nolan (1982) illustrates the basic evolution of computer use in organizations. Computer Era: (1) Initiation (computer acquisition), (2) Contagion (intense system development), (3) Control (proliferation of management controls). Data Resource Era: (4) Integration (user service orientation), (5) Data Administration (corporate value of information), (6) Maturity (strategic approach to information technology). The first three stages mark the growth of traditional data processing and management information systems departments. The development of the IRM philosophy in an organization involves the restructuring of the DP organization and new management techniques. The three stages of the Data Resource Era represent the evolution of IRM. This paper examines each of them in greater detail.

Seesing, P.R.

1992-10-01T23:59:59.000Z

254

Management and Program Analyst (Operations Manager)  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as a Management and Program Analyst in the Office of Strategic Programs in the DOE-EERE.

255

The Waste Management Quality Assurance Implementing Management Plan (QAIMP)  

E-Print Network [OSTI]

DIVISION Waste Management Quality Assurance ImplementingI I IMPLEMENTING MANAGEMENT QUALITY PLAN ASSURANCE I lilillI WM-QAIMP Waste Management Quality Assurance Implementing

Albert editor, R.

2009-01-01T23:59:59.000Z

256

Fusing Integration Test Management with Change Management  

E-Print Network [OSTI]

- 1 - Infuse: Fusing Integration Test Management with Change Management Gail E. Kaiser* Dewayne E, NJ 07974 Murray Hill, NJ 07974 Infuse is an experimental software development environment focusing the change set into the baseline. We have previously described how Infuse enforces static consistency at each

Perry, Dewayne E.

257

Waste Management Quality Assurance Plan  

E-Print Network [OSTI]

Revision 6 Waste Management Quality Assurance Plan Waste6 WM QA Plan Waste Management Quality Assurance Plan LBNL/4 Management Quality Assurance

Waste Management Group

2006-01-01T23:59:59.000Z

258

Ground Water Management Act (Virginia)  

Broader source: Energy.gov [DOE]

Under the Ground Water Management Act of 1992, Virginia manages ground water through a program regulating the withdrawals in certain areas called Ground Water Management Areas (GWMA). Currently,...

259

Computerized Maintenance Management Systems  

Broader source: Energy.gov [DOE]

Computerized maintenance management systems (CMMS) are a type of management software that perform functions in support of operations and maintenance (O&M) programs. The software automates most of the logistical functions performed by O&M staff.

260

Environmental Management Systems (Iowa)  

Broader source: Energy.gov [DOE]

A solid waste planning area (e.g., the land encompassed by a municipality with a comprehensive solid waste management policy) may qualify to be an Environmental Management System if it provides...

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Business, management and finance  

E-Print Network [OSTI]

Business, management and finance Essentials Taught degrees Masters in Business Administration (MBA) MSc in Banking and Finance MSc in Corporate and Financial Risk Management MSc in Financial Mathematics MSc in International Accounting and Corporate Governance MSc in International Finance MSc

Sussex, University of

262

Coastal Management Act (Georgia)  

Broader source: Energy.gov [DOE]

The Coastal Management Act provides enabling authority for the State to prepare and administer a coastal management program. The Act does not establish new regulations or laws; it is designed to...

263

ENVIRONMENTAL MANAGEMENT Environmental Policy  

E-Print Network [OSTI]

ENVIRONMENTAL MANAGEMENT Environmental Policy February 2013 The University of Leeds is responsible to reflect best environmental practice, implement an environmental management system to pursue sustainability and continuous improvement and seek innovative ways of meeting environmental objectives. These include: To meet

Haase, Markus

264

Environmental Management System Plan  

E-Print Network [OSTI]

management Water conservation LBNLs approach to sustainable environmentalWater Discharges) of Introduction Environmental Managementenvironmental compliance programs, such as air and water quality, as well as less traditional programs, such as wildland fire management,

Fox, Robert

2009-01-01T23:59:59.000Z

265

Information Technology Project Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Cancels DOE G 200.1-1. Admin Chg 1 approved 1-16-2013.

2012-12-03T23:59:59.000Z

266

Management of Nuclear Materials  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish requirements for the lifecycle management of DOE owned and/or managed accountable nuclear materials. Cancels DOE O 410.2. Admin Chg 1 dated 4-10-2014, cancels DOE O 410.2.

2009-08-17T23:59:59.000Z

267

DECENTRALIZED WASTEWATER MANAGEMENT  

E-Print Network [OSTI]

1 DECENTRALIZED WASTEWATER MANAGEMENT: A GUIDEBOOK FOR GEORGIA COMMUNITIES Katie Sheehan wastewater treatment technologies. www.njunsystems.com Version 1.0, April 2013 #12; 2 DECENTRALIZED WASTEWATER MANAGEMENT: A GUIDEBOOK FOR GEORGIA COMMUNITIES PART ONE: BACKGROUND, ISSUES, AND PROGRAM

Rosemond, Amy Daum

268

Information Technology Project Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Cancels DOE G 200.1-1. Admin Chg 1, dated 1-16-2013, cancels DOE O 415.1.

2012-12-03T23:59:59.000Z

269

Managing Director Buildings, Transportation  

E-Print Network [OSTI]

Site Development Will Terris Manager Gardening Maintenance Jim Gish Manager Landscape Specialty Tegwyn Maintenance and project Delivery Scott Sherwood Director Transportation Services Glenl Wear Director Grounds Supervisor Specialty Crews 17 Area supervisors Custodial Maintenance Charles Anderson Supervisor Activity

Seamons, Kent E.

270

Risk Management Guide  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides non-mandatory risk management approaches for implementing the requirements of DOE O 413.3B, Program and Project Management for the Acquisition of Capital Assets. Cancels DOE G 413.3-7.

2011-01-18T23:59:59.000Z

271

Best Environmental Management Practices  

E-Print Network [OSTI]

Best Environmental Management Practices Farm Animal Production Disposal of Farm Medical Wastes Dan Vitamins and minerals Topical Medications Sprays Dewormers Ointments #12;Best Environmental Management of environmental contamination with chemicals or infectious agents. These include, among others: Injectable

272

Benchmarking Corporate Energy Management  

E-Print Network [OSTI]

BENCHMARKING CORPORATE ENERGY MANAGEMENT Dr. Douglas L. Norland Director of Research and Industrial Programs Alliance to Save Energy Washington, DC ABSTRACT There is growing interest among energy managers in finding out how their company...'s energy management procedures and perfonnance compare to that of other companies. Energy management involves everything from setting goals and targets to implementing best maintenance practices. This paper, however, discusses benchmarking energy...

Norland, D. L.

273

Wildlife Management Areas (Florida)  

Broader source: Energy.gov [DOE]

Certain sites in Florida are designated as wildlife management areas, and construction and development is heavily restricted in these areas.

274

Workforce Management Office (WFMO) Functional Statements WORKFORCE MANAGEMENT OFFICE  

E-Print Network [OSTI]

, and destruction. BMD oversees WFMO's personal property management, Freedom of Information Act responses, Entry, organizing, and administering comprehensive human resources management programs in collaboration wMay 2014 Workforce Management Office (WFMO) ­ Functional Statements WORKFORCE MANAGEMENT OFFICE

275

Medical Management Treatment Manual  

E-Print Network [OSTI]

Medical Management Treatment Manual: A Clinical Guide for Researchers and Clinicians) This manual is an adaptation of: Medical Management Treatment Manual: A Clinical Research Guide for Medically, Maryland #12;Message to the Users of this Medical Management (MM) Manual from the Editors Background

Bezrukov, Sergey M.

276

Operating System Resource Management  

E-Print Network [OSTI]

Operating System Resource Management Date: Monday, September 27, 2010 Time: 2:00 ­ 3:00 pm Location constrained. This talk will propose a scheme for addressing the operating system resource management problem Sciences Seminar Series presents Pacific Northwest National Laboratory Resource management is the dynamic

277

FRESH THINKING FOR MANAGEMENT  

E-Print Network [OSTI]

FOR TECHNOLOGY MANAGEMENT Technology Acceptance in Organizations: What Can We Do to Improve it? by Patricia in organizations is thus an important topic in both management research and management practice. Technology choice of a mobile phone. In organizations, there are two steps in technology adoption. First

Yang, Eui-Hyeok

278

Business, management and finance  

E-Print Network [OSTI]

Business, management and finance Essentials Taught degrees Masters in Business Administration (MBA) MSc in Banking and Finance MSc in Corporate and Financial Risk Management MSc in Financial Mathematics in International Accounting and Corporate Governance MSc in International Finance MSc in International Management

Sussex, University of

279

Financial Management Oversight  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order defines requirements for effective financial management and adherence to DOE and applicable external financial management requirements and sets forth standards for ensuring the integrity and responsiveness of financial management and the accuracy and reliability of DOEs financial statements. Cancels DOE O 2200.13.

2006-08-31T23:59:59.000Z

280

Best Environmental Management Practices  

E-Print Network [OSTI]

Best Environmental Management Practices Farm Animal Production Land Application of Manure management practices to avoid polluting surface or groundwater. 1. Public and private water wells Public pollution of surface waters increases. Therefore, to avoid this risk, manure P loadings should be managed

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Database Management Certificate Program  

E-Print Network [OSTI]

Database Management Certificate Program DATABASE TECHNOLOGIES 13 Today, organizations in every to obtain general data analysis and management skills or apply both Oracle and Microsoft SQL Server database capabilities of relational databases in conjunction with the new "Big Data" management frameworks for data

Rose, Michael R.

282

Sport Management Academic Offerings  

E-Print Network [OSTI]

production and programming of events; marketing and public relations; technological operations management Exploration of a topic (to be determined) not covered by the standard curriculum but of interest to faculty and sponsoring events. Management process, including theory of management and practical applications within

Raina, Ramesh

283

Environmental Management at  

E-Print Network [OSTI]

: ANUgreen for the HotRot Organic Recycling Project Sustainable Transport Category Winner: LEAD Development Themes: 1. Community Engagement 2. Energy and Greenhouse Management 3. Water Management 4. Recycling and Waste Management 5. Transport 6. Pollution Prevention and Environmental Risk 7. Biodiversity The Future

284

HIERARCHICAL MANAGEMENT OF BATTLEFIELD NETWORKS WITH THE SHAMAN MANAGEMENT SYSTEM  

E-Print Network [OSTI]

HIERARCHICAL MANAGEMENT OF BATTLEFIELD NETWORKS WITH THE SHAMAN MANAGEMENT SYSTEM Adarshpal S with a description of the SHAMAN system and briefly introduces its applica- tions to the management of tactical for MANagement). This management system developed at the Network Management Laboratory of the Univer- sity

Sethi, Adarshpal

285

CAMPUS BLUEPRINT ENROLLMENT MANAGEMENT COUNCIL'S  

E-Print Network [OSTI]

CAMPUS BLUEPRINT ENROLLMENT MANAGEMENT COUNCIL'S STRATEGIC ENROLLMENT MANAGEMENT PLAN 2012'S ENROLLMENT MANAGEMENT COUNCIL'S STRATEGIC ENROLLMENT MANAGEMENT PLAN 2012-2017 Report Outline Building a Big: Student Recruitment Initiatives Sharing Our Story of Quality Improving the Academic Profile and Student

Powers, Robert

286

CSREES Nutrient Management Working Meeting  

E-Print Network [OSTI]

planning process Nutrient management training P-Indexes and tools developed Educational materials #12Welcome CSREES Nutrient Management Working Meeting May 4 and 5, 2004 Atlanta, GA #12;University Objectives Information Sharing Among States Nutrient management regulations Nutrient management

287

Radioactive Waste Management Basis  

SciTech Connect (OSTI)

The purpose of this Radioactive Waste Management Basis is to describe the systematic approach for planning, executing, and evaluating the management of radioactive waste at LLNL. The implementation of this document will ensure that waste management activities at LLNL are conducted in compliance with the requirements of DOE Order 435.1, Radioactive Waste Management, and the Implementation Guide for DOE Manual 435.1-1, Radioactive Waste Management Manual. Technical justification is provided where methods for meeting the requirements of DOE Order 435.1 deviate from the DOE Manual 435.1-1 and Implementation Guide.

Perkins, B K

2009-06-03T23:59:59.000Z

288

Strategies for Successful Energy Management  

Broader source: Energy.gov [DOE]

This presentation, given through the DOE's Technical Assitance Program (TAP), provides information on energy management for the portfolio manager initiative

289

Energy Management Working Group: Accelerating Energy Management  

E-Print Network [OSTI]

Countries participating in the Global Superior Energy Performance (GSEP) Energy Management Working Group (EMWG) are leveraging their resources and taking collective action to strengthen national and international efforts to facilitate the adoption...

Scheihing, P.

2014-01-01T23:59:59.000Z

290

Rangeland Drought Management for Texans: Livestock Management  

E-Print Network [OSTI]

Livestock producers need to create flexible plans for dealing with drought. This publication explains the steps that should be included in such a plan, including taking a forage inventory, using stocker animals, establishing a livestock management...

Carpenter, Bruce B.; Hart, Charles R.

2001-04-24T23:59:59.000Z

291

A Manager's Approach to Energy Cost Management  

E-Print Network [OSTI]

A major responsibility of management is the control and containment of operating costs. Energy costs are a major portion of the industrial budget. GM has developed a 3 phase approach to energy conservation. Phase I -Administrative Controls...

Spencer, R. J.

292

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and...

293

A Security Solution for IEEE 802.11's Ad-hoc Mode:Password-Authentication and Group Diffie-Hellman Key Exchange  

SciTech Connect (OSTI)

The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.

Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

2005-10-01T23:59:59.000Z

294

Corporate Energy Management Process  

E-Print Network [OSTI]

. May 21-24, 2013 Corporate Energy Management Process 2 ?Brief introduction to BASF ? BASF Corporate Energy Management ? Management Support ? Goals ? Continuous Improvement ? Best Practices ? Recognition ?Summary ESL-IE-13-05-25 Proceedings...-value products ? Intelligent, sustainable system solutions ? 2012 Sales: ?72.1 Billion ? Employees: 110,000 Company overview BASF ? The Chemical Company ESL-IE-13-05-25 Proceedings of the Thrity-Fifth Industrial Energy Technology Conference New Orleans, LA...

Geiger, T.

2013-01-01T23:59:59.000Z

295

Sustainable Energy Management Programs  

E-Print Network [OSTI]

Sustainable Energy Management Programs Steve Hanner Allen ISD/TEMA . ESL-KT-14-11-45 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 Starting an Energy Management Program Recognize need, Elicit District Commitment... Appoint Energy Manager Analyze Existing Conditions Develop Plan Implement and Monitor Program ESL-KT-14-11-45 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 Sustainable Programs Feature District Commitment...

Hanner, S.

2014-01-01T23:59:59.000Z

296

Contemporary heart failure management.  

E-Print Network [OSTI]

??The research presented within this thesis aims to add to the current knowledge regarding contemporary heart failure (HF) management. Chapter 2 describes a study collating (more)

Wasywich, Cara Anne

2009-01-01T23:59:59.000Z

297

Water Management Act (Massachusetts)  

Broader source: Energy.gov [DOE]

This Act regulates and registers water withdrawals in the Commonwealth of Massachusetts to enable effective planning and management of water use and conservation. The Act establishes a Water...

298

Hazardous Wastes Management (Alabama)  

Broader source: Energy.gov [DOE]

This legislation gives regulatory authority to the Department of Environmental Management to monitor commercial sites for hazardous wastes; fees on waste received at such sites; hearings and...

299

Hazardous Waste Management (Indiana)  

Broader source: Energy.gov [DOE]

The state supports the implementation of source reduction, recycling, and other alternative solid waste management practices over incineration and land disposal. The Department of Environmental...

300

CONFIGURATION MANAGEMENT (CM)  

Broader source: Energy.gov (indexed) [DOE]

Safety systems and mission critical systems are defined and a comprehensive Configuration Management systemprocedure to maintain control over the design and modifications of these...

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Total Light Management  

Broader source: Energy.gov [DOE]

Presentation covers total light management, and is given at the Spring 2010 Federal Utility Partnership Working Group (FUPWG) meeting in Providence, Rhode Island.

302

Project Risk Management:.  

E-Print Network [OSTI]

?? The recent increase in international projects has resulted in higher risk along with difficulties in control and coordination. Effective project management can therefore be (more)

Koelmeyer, Chris

2013-01-01T23:59:59.000Z

303

Parallel integrated thermal management  

DOE Patents [OSTI]

Embodiments discussed herein are directed to managing the heat content of two vehicle subsystems through a single coolant loop having parallel branches for each subsystem.

Bennion, Kevin; Thornton, Matthew

2014-08-19T23:59:59.000Z

304

ISSUES MANAGEMENT PROGRAM MANUAL  

E-Print Network [OSTI]

LBNL/PUB-5519 (1), Rev. 032 ISSUES MANAGEMENT PROGRAM MANUAL LBNL/PUB-5519 (1), Rev.Berkeley National Laboratory LBNL/PUB-5519 (1), Rev. 0

Gravois, Melanie

2007-01-01T23:59:59.000Z

305

Groundwater Management Areas (Texas)  

Broader source: Energy.gov [DOE]

This legislation authorizes the Texas Commission on Environmental Quality and the Texas Water Development Board to establish Groundwater Management Areas to provide for the conservation,...

306

Watershed Management Policy (Minnesota)  

Broader source: Energy.gov [DOE]

It is state policy to manage groundwater and surface water resources from the perspective of aquifers, watersheds, and river basins to achieve protection, preservation, enhancement, and restoration...

307

Project Management Practices  

Energy Savers [EERE]

on the DOE Project Management web page. 1.2 INTENDED USE Federal Project Directors, Contracting Officers, Contracting Officer's Technical Representatives, Integrated Project Team...

308

INL's Environmental Management System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and minimize environmental impacts throughout the lifecycle of INL facilities and operations. Conduct all activities and manage hazardous and radioactive materials and...

309

Stormwater Management (North Carolina)  

Broader source: Energy.gov [DOE]

The rules in this Section set forth the requirements for application and issuance of permits for stormwater management systems. These requirements to control pollutants associated with stormwater...

310

Energy Management Systems  

E-Print Network [OSTI]

This presentation will address results from a pilot project with 10 chemical plants on energy management systems and the development of an energy efficiency plant certification program....

Ferland, K.

2007-01-01T23:59:59.000Z

311

Stormwater Management Act (Pennsylvania)  

Broader source: Energy.gov [DOE]

The policy and purpose of this act is to encourage planning and management of storm water runoff in each watershed consistent with sound water and land use practices.

312

Advisory Committee Management Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual provides detailed DOE requirements, responsibilities, processes, and procedures for the establishment, operation, and management of advisory committees. Cancels DOE M 510.1-1.

2007-10-22T23:59:59.000Z

313

Change Control Management Guide  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Guide provides a suggested approach and uniform guidance for managing project and contract changes through applying the requirements of DOE O 413.3B. No cancellation.

2011-07-29T23:59:59.000Z

314

Hydro Capital Asset Manager  

Broader source: Energy.gov [DOE]

This position is located in Federal Hydro Projects, Generation Asset Management, Power Services. Additional vacancies may be filled through this vacancy announcement or if they become available.

315

Environmental Resource Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Environmental Resource Management This division delivers science-based engineering solutions to meet regional and national energy, water and other critical environmental...

316

Information Technology Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This revised Order is needed to clarify the roles and responsibilities, policies, and procedures for effectively managing IT investments to ensure mission success.

2013-11-21T23:59:59.000Z

317

Traffic Management Specialist  

Broader source: Energy.gov [DOE]

The incumbent in this position will serve as a Traffic Management Specialist for BPAs Transmission Business Line (TBL) and oversee commercial transportation services for the movement of materials...

318

Solid Waste Management (Indiana)  

Broader source: Energy.gov [DOE]

The state supports the implementation of source reduction, recycling, and other alternative solid waste management practices over incineration and land disposal. The Indiana Department of...

319

Efficient Water Use & Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Goals Water Use Goal 4: Efficient Water Use & Management Aware of the arid climate of northern New Mexico, water reduction and conservation remains a primary concern at LANL....

320

Records Management Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order sets forth requirements and responsibilities for implementing and maintaining a cost-effective records management program throughout the Department of Energy.

2006-02-03T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Records Management Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order sets forth requirements and responsibilities for establishing and maintaining a program for the efficient and economical management of records and information assets.

2011-07-26T23:59:59.000Z

322

Comprehensive Emergency Management System  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes policy and assigns roles and responsibilities for the Department of Energy (DOE) Emergency Management System. Cancels DOE O 151.1B.

2005-11-02T23:59:59.000Z

323

EMERGENCY MANAGEMENT (EM)  

Broader source: Energy.gov (indexed) [DOE]

EMERGENCY MANAGEMENT (EM) OBJECTIVE EM.1 A routine drill program and emergency operations drill program, including program records, have,been established and implemented. (Core...

324

ORISE: Emergency Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

provided direction and experienced leadership to the Federal Bureau of Investigation's (FBI) Crisis Management Unit to establish a standardized exercise program for the FBI that...

325

International Commitments Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Order establishes a process to manage the Department's International Commitments under the administrative direction of the Office of Policy and International Affairs. No cancellation.

2008-11-18T23:59:59.000Z

326

Radioactive Waste Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish policies and guidelines by which the Department of Energy (DOE) manages tis radioactive waste, waste byproducts, and radioactively contaminated surplus facilities.

1984-02-06T23:59:59.000Z

327

Management Control Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish requirements and responsibilities for the Department of Energy Management Control Program. Cancels DOE O 413.1. Canceled by DOE O 413.1B.

2002-04-18T23:59:59.000Z

328

Environmental Management Commission (Alabama)  

Broader source: Energy.gov [DOE]

The Alabama Department of Environmental Management is charged with developing the state's environmental policy, hearing administrative appeals of permits, administrative orders and variances issued...

329

Enterprise Risk Management Framework  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Framework The Enterprise Risk Management (ERM) framework includes four steps: identify the risks, determine the probability and impact of each one, identify controls that are...

330

Project Management vs. Systems Engineering Management: A Practitioners' View on  

E-Print Network [OSTI]

Project Management vs. Systems Engineering Management: A Practitioners' View on IntegratingPROJECT MANAGEMENT VS. SYSTEMS ENGINEERING MANAGEMENT Received 3 August 2010; Revised 18 December 2010 (wileyonlinelibrary.com). DOI 10.1002/sys.20187 ABSTRACT While most Systems Engineering Management (SEM) applications

de Weck, Olivier L.

331

Management and Performance NASA'S APPROACH TO PERFORMANCE MANAGEMENT  

E-Print Network [OSTI]

TO PERFORMANCE MANAGEMENT conduct the Agency's day-to-day work. Figure 1 depicts NASA's organizational structureManagement and Performance NASA'S APPROACH TO PERFORMANCE MANAGEMENT NASA's FY 2015 Management as an organization and NASA's approach to performance management, strategic planning, and performance reporting

Waliser, Duane E.

332

FORMALDEHYDE Formaldehyde Management Plan i  

E-Print Network [OSTI]

and Evaluation) Facilities Management Work Control Center (40)5-2222 (Repair of Facility Equipment DeficienciesFORMALDEHYDE MANAGEMENT PLAN #12;Formaldehyde Management Plan i Review and Approval Authority Formaldehyde Management Plan this page intentionally blank #12;Formaldehyde Management Plan iii Table

Rubloff, Gary W.

333

Facilities Management CAD Standards  

E-Print Network [OSTI]

Facilities Management CAD Standards 2011 #12;Facilities Management CAD Standards Providing: Layering Standards 2.1 Layer Name Format 2.2 Layer Name Modifiers 2.3 Layer Attributes 2.4 Special Layer of PDF and DWG Files APPENDIX A: DAL FM CAD Standard Layers APPENDIX B: DAL FM CAD Special Layers

Brownstone, Rob

334

MANUFACTURING & SERVICE OPERATIONS MANAGEMENT  

E-Print Network [OSTI]

MANUFACTURING & SERVICE OPERATIONS MANAGEMENT Vol. 14, No. 4, Fall 2012, pp. 495­511 ISSN 1523 research directions, expanding upon the key points raised by Green [Green LV (2012) The vital role of operations analysis in improving healthcare delivery. Manufacturing Service Oper. Management 14

Boucherie, Richard J.

335

MANUFACTURING & SERVICE OPERATIONS MANAGEMENT  

E-Print Network [OSTI]

;Green and Soares: Note Manufacturing & Service Operations Management 9(1), pp. 54­61, © 2007 INFORMS 55MANUFACTURING & SERVICE OPERATIONS MANAGEMENT Vol. 9, No. 1, Winter 2007, pp. 54­61 issn 1523-Dependent Waiting Time Probabilities in M t /M/s t Queuing Systems Linda V. Green Graduate School of Business

Soares, João Luís Cardoso

336

Forest Resources and Management  

E-Print Network [OSTI]

a sustainable bio-energy industry. Timber is an ideal construction material. Centre for Forest ResourcesForest Resources and Management Centre for The Centre for Forest Resources and Management aims the forest resource. Our aim is that British forests ­ from their creation to maturity and regeneration

337

Energy Management Webinar Series  

Broader source: Energy.gov [DOE]

Boost your knowledge on how to implement an energy management system through this four-part webinar series from the Superior Energy Performance program. Each webinar introduces various elements of the ISO 50001 energy management standardbased on the Plan-Do-Check-Act approachand the associated steps of DOE's eGuide for ISO 50001 software tool.

338

Information Collection Management Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Order sets forth DOE requirements and responsibilities for implementing the information collection management provisions of the Paperwork Reduction Act of 1995 and the Office of Management and Budgets implementing regulation Controlling Paperwork Burdens on the Public, as contained in 5 CFR 1320. No cancellation.

2006-10-11T23:59:59.000Z

339

Comprehensive Emergency Management System  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish policy and to assign and describe roles and responsibilities for the Department of Energy (DOE) Emergency Management System. The Emergency Management System provides the framework for development, coordination, control, and direction of all emergency planning, preparedness, readiness assurance, response, and recovery actions. Canceled by DOE O 151.1B. Cancels DOE O 151.1.

2000-11-01T23:59:59.000Z

340

Risk Management Guide  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides a framework for identifying and managing key technical, schedule, and cost risks through applying the requirements of DOE O 413.3A, Program and Project Management for the Acquisition of Capital Assets, dated 7-28-06. Canceled by DOE G 413.3-7A, dated 1-12-11. Does not cancel other directives.

2008-09-16T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

POSITION MANAGEMENT ACTION FORM  

E-Print Network [OSTI]

POSITION MANAGEMENT ACTION FORM Workforce Planning | 408-924-2250 classcomp@sjsu.edu SJSU Human FOR POSITION MANAGEMENT FORM Workforce Planning | 408-924-2250| classcomp@sjsu.edu SJSU Human Resources Revised contact your Workforce Planning Analyst. List the name of the position this position reports to

Eirinaki, Magdalini

342

BUILDING MANAGEMENT & RESTRICTED ACCESS  

E-Print Network [OSTI]

BUILDING MANAGEMENT & RESTRICTED ACCESS Plan Annex 2014 VIII #12;#12;#12;The University of Texas at Austiniv #12;Building Management & Restricted Access Plan Annex v CONTENTS RECORD OF CHANGES .......................................................................................................15 J. BUILDING SECURITY OPERATIONS RESTRICTED ACCESS PROCEDURES FOR BUILDINGS ON ELECTRONIC ACCESS

Johnston, Daniel

343

OPERATIONS MANAGEMENT Spring 2008  

E-Print Network [OSTI]

1 MGSC 395 OPERATIONS MANAGEMENT Spring 2008 Course Syllabus Instructor: Professor Anand Nair Class MATERIALS Required Text Books Textbook: Krajewski, Lee, Ritzman, Larry, and Malhotra, Manoj. Operations Management: Processes and Value Chains, 8 th edition, Prentice Hall, 2007. (ISBN: 0-13-187294-X). Novel

Almor, Amit

344

DRAFT Fifteenmile Management Plan 5. Fifteenmile Subbasin Management Plan  

E-Print Network [OSTI]

DRAFT Fifteenmile Management Plan 5. Fifteenmile Subbasin Management Plan DRAFT May 25 2004 Compiled by Wasco County Soil and Water Conservation District in cooperation with Fifteenmile Coordinating Group 5. FIFTEENMILE SUBBASIN MANAGEMENT PLAN

345

Forensic Management Academy Spring 2011 Tentative Schedule Forensic Management Academy  

E-Print Network [OSTI]

Forensic Management Academy ­ Spring 2011 Tentative Schedule Forensic Management Academy Spring:00 Tour Forensic Program Facilities 4:30 ­ 7:30 Session VIII Conflict Management Joyce Heames7:00 Free

Mohaghegh, Shahab

346

PIA - Environmental Management Consolidated Business Center ...  

Office of Environmental Management (EM)

Management Consolidated Business Center (EMCBC) PIA - Environmental Management Consolidated Business Center (EMCBC) PIA - Environmental Management Consolidated Business Center...

347

Environmental Management Advisory Board Subcommittees | Department...  

Office of Environmental Management (EM)

EMAB Environmental Management Advisory Board Subcommittees Environmental Management Advisory Board Subcommittees ACQUISITION AND PROJECT MANAGEMENT SUBCOMMITTEE SUBCOMMITTEE...

348

Line Management Perspective: Office of Environmental Management (EM)  

Broader source: Energy.gov [DOE]

Slide Presentation by Matthew Moury, Deputy Assistant Secretary for Safety, Security and Quality Programs, Office of Environmental Management. EFCOG Integrated Safety Management Work Planning and Control.

349

Appendix 8 - iManage Change Management Standards  

Broader source: Energy.gov (indexed) [DOE]

not impact integration between iManage systems. These changes are managed by the specific project change control procedures. If there is uncertainty that a proposed change affects...

350

Georgia Hazardous Waste Management Act  

Broader source: Energy.gov [DOE]

The Georgia Hazardous Waste Management Act (HWMA) describes a comprehensive, Statewide program to manage hazardous wastes through regulating hazardous waste generation, transportation, storage,...

351

Fleet Management | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Fleet management includes commercial and agency owned motor vehicles such as cars, vans, trucks, and buses. Fleet (vehicle) management at the headquarters level includes a range of...

352

Performance Management Plan  

SciTech Connect (OSTI)

This Performance Management Plan describes the approach for accelerating cleanup activities of U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Operations Office (NNSA/NV) Environmental Management (EM) Program. This approach accelerates the reduction of risk at NNSA/NV sites while performing the work responsibly, effectively, and more efficiently. In May 2002, NNSA/NV EM and the Nevada Division of Environmental Protection signed a Letter of Intent formalizing an agreement to pursue accelerated risk reduction and cleanup for activities within the State of Nevada. This Performance Management Plan provides the strategic direction for implementing the Letter of Intent.

IT Corporation, Las Vegas, NV

2002-08-21T23:59:59.000Z

353

Radioactive Waste Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual further describes the requirements and establishes specific responsibilities for implementing DOE O 435.1, Radioactive Waste Management, for the management of DOE high-level waste, transuranic waste, low-level waste, and the radioactive component of mixed waste. The purpose of the Manual is to catalog those procedural requirements and existing practices that ensure that all DOE elements and contractors continue to manage DOE's radioactive waste in a manner that is protective of worker and public health and safety, and the environment. Does not cancel other directives.

1999-07-09T23:59:59.000Z

354

Asset management solutions To support your agency's mission  

E-Print Network [OSTI]

readiness and accountability, including work management, inventory management, service management, contract and service management functions. Work management Inventory management Procurement management ServiceAsset management solutions To support your agency's mission IBM Maximo® Asset Management

355

Transportation Management Workshop: Proceedings  

SciTech Connect (OSTI)

This report is a compilation of discussions presented at the Transportation Management Workshop held in Gaithersburg, Maryland. Topics include waste packaging, personnel training, robotics, transportation routing, certification, containers, and waste classification.

Not Available

1993-10-01T23:59:59.000Z

356

Contract/Project Management  

Broader source: Energy.gov (indexed) [DOE]

and Targets 1 ContractProject Management Performance Metric FY 2012 Target FY 2012 Forecast FY 2012 Pre- & Post-CAP Forecast Comment Capital Asset Project Success: Complete 90%...

357

Hazardous Waste Management (Arkansas)  

Broader source: Energy.gov [DOE]

The Hazardous Waste Program is carried out by the Arkansas Department of Environmental Quality which administers its' program under the Hazardous Waste management Act (Arkansas Code Annotated 8-7...

358

Hazardous Waste Management (Delaware)  

Broader source: Energy.gov [DOE]

The act authorizes the Delaware Department of Natural Resources and Environment Control (DNREC) to regulate hazardous waste and create a program to manage sources of hazardous waste. The act...

359

Construction work process management  

E-Print Network [OSTI]

-related activities. The study addresses relationships between selected TQM concepts (TQM tools, training, process focus, and teamwork) and work process management, defined in terms of planning, control, and improvement. The investigation was performed in two...

Soares, Jorge Barbosa

1994-01-01T23:59:59.000Z

360

COMPREHENSIVE LEGACY MANAGEMENT  

Office of Legacy Management (LM)

Revision 7.0 Final This page intentionally left blank LMSFERS03496-7.0 Comprehensive Legacy Management and Institutional Controls Plan Volumes I and II Fernald Preserve Fernald,...

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Configuration Change Management  

E-Print Network [OSTI]

shown that if a company does not continue to innovate, whether it is products or services, it will not be able to remain successful. This philosophy is extremely important with design engineering companies. If managed correctly, change can be a...

Yoder, Nathaniel

2012-05-11T23:59:59.000Z

362

Environmental Management System Plan  

E-Print Network [OSTI]

Water Discharges) of Introduction Environmental Managementmanagement Water conservation LBNLs approach to sustainable environmentalEnvironmental Management Systems (EMS) to implement sustainable environmental stewardship practices that: Protect the air, water,

Fox, Robert

2009-01-01T23:59:59.000Z

363

Management of Nuclear Materials  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish requirements and procedures for the management of nuclear materials within the Department of Energy (DOE). Cancels DOE 5660.1A. Canceled by DOE O 410.2.

1994-05-26T23:59:59.000Z

364

Stage Management & Technology  

E-Print Network [OSTI]

Stage managers provide centralized communication, organization, and task coordination for all individuals in the production team. This study explores the advantages and disadvantages of different and new forms of technology implemented into various...

O'Brien, Madison D

2013-02-04T23:59:59.000Z

365

Project Management Lessons Learned  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The guide supports DOE O 413.3A, Program and Project Management for the Acquisition of Capital Assets, and aids the federal project directors and integrated project teams in the execution of projects.

2008-08-05T23:59:59.000Z

366

Headquarters Personal Property Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish procedures for managing Government personal property owned or leased by the Department of Energy and in the custody of DOE Headquarters employees, including those in the National Nuclear Security Administration. Cancels DOE HQ O 580.1A

2004-10-25T23:59:59.000Z

367

Facility Manager Primary Purpose  

E-Print Network [OSTI]

for required goods or services to achieve maximum value for money; b. managing supplier/contractor performance, including employee qualifications, training and developing staff, performance evaluation, and related areas

Saskatchewan, University of

368

Human Resource Management Delegation  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The notice is to clarifies and updates existing Human Resource Management Delegation Authorities and the levels to which they are delegated. Expired 6-28-97. Does not cancel any directives.

1996-06-28T23:59:59.000Z

369

Lawn Water Management  

E-Print Network [OSTI]

Water is a limited resource in Texas. This booklet explains how homeowners can establish a water management program for a home lawn that both maintains a healthy sod and also conserves water. The publication discusses soil types, grass varieties...

McAfee, James

2006-06-26T23:59:59.000Z

370

Strategic Energy Management  

Broader source: Energy.gov [DOE]

The U.S. Department of Energy (DOE) See Action Network and Weatherization and Intergovernmental Program Technical Assistance Program sponsored this webinar about strategic management in the public sector on November 7, 2012.

371

Solid Waste Management (Kansas)  

Broader source: Energy.gov [DOE]

This act aims to establish and maintain a cooperative state and local program of planning and technical and financial assistance for comprehensive solid waste management. No person shall construct,...

372

Resources for Fleet Managers  

Broader source: Energy.gov [DOE]

Fleet managers will benefit from the lower fuel costs, more reliable fuel prices, and lower emissions that come from using alternative fuels and advanced technologies made possible through the work...

373

Information Technology Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order identifies the objectives, components, and responsibilities for implementing processes to ensure the effective management of information and information systems within the Department. Cancels DOE O 200.1.

2008-12-23T23:59:59.000Z

374

Wildlife Management Areas (Maryland)  

Broader source: Energy.gov [DOE]

Wildlife Management Areas exist in the State of Maryland as wildlife sanctuaries, and vehicles, tree removal, and construction are severely restricted in these areas. Some of these species are also...

375

Enterprise Risk Management Program  

E-Print Network [OSTI]

..........................................................................23 Appendix C - ERM Program Goals, ERM Guiding Principles, and Institutional Risk Philosophy Enterprise Risk Management Program Guide to Risk Assessment & Response August 16, 2012 #12; i ........................................................................................................................3 Step 2: Risk Identification

Hayden, Nancy J.

376

Streamside Management Zones (Montana)  

Broader source: Energy.gov [DOE]

This chapter sets streamside management zones as encompassing a strip at least 50 feet wide on each side of a stream, lake, or other body of water, measured from the ordinary high-water mark, and...

377

Towards CORBAbased Enterprise Management: Managing CORBAbased Systems with SNMP Platforms  

E-Print Network [OSTI]

of different management architectures. The aim of the work described in this paper con­ sists in helping1 Towards CORBA­based Enterprise Management: Managing CORBA­based Systems with SNMP Platforms, CA, USA, November 1998 Abstract--- Apart from the well established OSI/TMN and Internet management

378

Information Technology and Management Department of Information Technology and Management  

E-Print Network [OSTI]

Information Technology and Management Department of Information Technology and Management Daniel F Chicago, IL 60616 appliedtech.iit.edu/information-technology-and- management Dean and Chair: C. Robert in the information technology and cyber security fields. The Information Technology and Management degrees apply

Heller, Barbara

379

Lithium battery management system  

DOE Patents [OSTI]

Provided is a system for managing a lithium battery system having a plurality of cells. The battery system comprises a variable-resistance element electrically connected to a cell and located proximate a portion of the cell; and a device for determining, utilizing the variable-resistance element, whether the temperature of the cell has exceeded a predetermined threshold. A method of managing the temperature of a lithium battery system is also included.

Dougherty, Thomas J. (Waukesha, WI)

2012-05-08T23:59:59.000Z

380

Radioactive Waste Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual further describes the requirements and establishes specific responsibilities for implementing DOE O 435.1, Radioactive Waste Management, for the management of DOE high-level waste, transuranic waste, low-level waste, and the radioactive component of mixed waste. Change 1 dated 6/19/01 removes the requirement that Headquarters is to be notified and the Office of Environment, Safety and Health consulted for exemptions for use of non-DOE treatment facilities. Certified 1-9-07.

1999-07-09T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Emergency Management Concepts, Existing Guidance, and Changes  

Broader source: Energy.gov [DOE]

Presenter: David Freshwater, Emergency Management Specialist, Office of Emergency Management, National Nuclear Security Administration

382

Information & Records Management Process Manual  

E-Print Network [OSTI]

several significant failures to manage information in the public sector in New Zealand, which the Official Information, Privacy, Copyright and Public Records Acts. How you manage UC informationInformation & Records Management Process Manual 2013Information and Records Management #12;Contents

Hickman, Mark

383

Pest Management Recommendations for Horses  

E-Print Network [OSTI]

. Cultural controls include practices such as appropriate ma nure management and stall sanitation. Chemical

Boyer, Elizabeth W.

384

Energy Management Issued: June 2010  

E-Print Network [OSTI]

Energy Management Policy Issued: June 2010 Revised: Responsible Administrative Unit: Finance.0 BACKGROUND AND PURPOSE The Engineering and Energy Management division of the Department of Facilities Management at the Colorado School of Mines ("Mines" or "the school") has developed an Energy Management

385

December 2010 FACILITIES & PROPERTY MANAGEMENT  

E-Print Network [OSTI]

and water management and issued our Sustainability Specification for construction projects. The CollegeDecember 2010 FACILITIES & PROPERTY MANAGEMENT CARBON MANAGEMENT AND SUSTAINABILITY ACTIVITIES REPORT 2009/10 #12;Contents Page · Introduction 1 · Carbon and Energy Management 3 · Waste and Recycling

386

Assistant Director, Prospect Management Description  

E-Print Network [OSTI]

and to the Prospect Management Data Wranglers to assist their efforts in improving the quality of Prospect Management Management Enter and monitor prospect assignments and new prospect records requests. Monitor data quality of all functions and systems related to prospect management, including software applications, industry

Portman, Douglas

387

RECYCLING AND GENERAL WASTE MANAGEMENT OPERATIONAL PROCEDURE  

E-Print Network [OSTI]

RECYCLING AND GENERAL WASTE MANAGEMENT OPERATIONAL PROCEDURE Swansea University Estates Services.6.1/1 Recycling & General Waste Management Department: Estates & Facilities Management Site: Swansea University recycling and waste management facilities in Swansea university To ensure that Waste Management Objectives

Harman, Neal.A.

388

Nutrient Management TrainingNutrient Management Training for Technical Service Providersfor Technical Service Providers  

E-Print Network [OSTI]

to Water Quality", and "Nutrient & Pest Management ModulesQuality", and "Nutrient & Pest Management ModulesNutrient Management TrainingNutrient Management Training for Technical Service Providersfor Management Planning Technical Guidance.Management Planning Technical Guidance. Manure and Wastewater Handling

389

UNC Charlotte Government Property Management Plan 1 Government Property Management Plan  

E-Print Network [OSTI]

. MANAGEMENT AND ACQUISITION Under the University's property management system, the Materials ManagementUNC Charlotte Government Property Management Plan 1 Government Property Management Plan Initially approved: 21 October 2011 Updated: August 24, 2012 SCOPE This Government Property Management Plan applies

Howitt, Ivan

390

Computer memory management system  

DOE Patents [OSTI]

A computer memory management system utilizing a memory structure system of "intelligent" pointers in which information related to the use status of the memory structure is designed into the pointer. Through this pointer system, The present invention provides essentially automatic memory management (often referred to as garbage collection) by allowing relationships between objects to have definite memory management behavior by use of coding protocol which describes when relationships should be maintained and when the relationships should be broken. In one aspect, the present invention system allows automatic breaking of strong links to facilitate object garbage collection, coupled with relationship adjectives which define deletion of associated objects. In another aspect, The present invention includes simple-to-use infinite undo/redo functionality in that it has the capability, through a simple function call, to undo all of the changes made to a data model since the previous `valid state` was noted.

Kirk, III, Whitson John (Greenwood, MO)

2002-01-01T23:59:59.000Z

391

Uranium Mill Tailings Management  

SciTech Connect (OSTI)

This book presents the papers given at the Fifth Symposium on Uranium Mill Tailings Management. Advances made with regard to uranium mill tailings management, environmental effects, regulations, and reclamation are reviewed. Topics considered include tailings management and design (e.g., the Uranium Mill Tailings Remedial Action Project, environmental standards for uranium mill tailings disposal), surface stabilization (e.g., the long-term stability of tailings, long-term rock durability), radiological aspects (e.g. the radioactive composition of airborne particulates), contaminant migration (e.g., chemical transport beneath a uranium mill tailings pile, the interaction of acidic leachate with soils), radon control and covers (e.g., radon emanation characteristics, designing surface covers for inactive uranium mill tailings), and seepage and liners (e.g., hydrologic observations, liner requirements).

Nelson, J.D.

1982-01-01T23:59:59.000Z

392

Oil field management system  

DOE Patents [OSTI]

Oil field management systems and methods for managing operation of one or more wells producing a high void fraction multiphase flow. The system includes a differential pressure flow meter which samples pressure readings at various points of interest throughout the system and uses pressure differentials derived from the pressure readings to determine gas and liquid phase mass flow rates of the high void fraction multiphase flow. One or both of the gas and liquid phase mass flow rates are then compared with predetermined criteria. In the event such mass flow rates satisfy the predetermined criteria, a well control system implements a correlating adjustment action respecting the multiphase flow. In this way, various parameters regarding the high void fraction multiphase flow are used as control inputs to the well control system and thus facilitate management of well operations.

Fincke, James R.

2003-09-23T23:59:59.000Z

393

Radioactive Waste Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual further describes the requirements and establishes specific responsibilities for implementing DOE O 435.1, Radioactive Waste Management, for the management of DOE high-level waste, transuranic waste, low-level waste, and the radioactive component of mixed waste. Change 1 dated 6/19/01 removes the requirement that Headquarters is to be notified and the Office of Environment, Safety and Health consulted for exemptions for use of non-DOE treatment facilities. Certified 1-9-07. Admin Chg 2, dated 6-8-11, cancels DOE M 435.1-1 Chg 1.

1999-07-09T23:59:59.000Z

394

NS&T MANAGEMENT OBSERVATIONS  

SciTech Connect (OSTI)

The INL Management Observation Program (MOP) is designed to improve managers and supervisors understanding of work being performed by employees and the barriers impacting their success. The MOP also increases workers understanding of managements expectations as they relate to safety, security, quality, and work performance. Management observations (observations) are designed to improve the relationship and trust between employees and managers through increased engagement and interactions between managers and researchers in the field. As part of continuous improvement, NS&T management took initiative to focus on the participation and quality of observations in FY 14. This quarterly report is intended to (a) summarize the participation and quality of managements observations, (b) assess observations for commonalities or trends related to facility or process barriers impacting research, and (c) provide feedback and make recommendations for improvements NS&Ts MOP.

Gianotto, David

2014-06-01T23:59:59.000Z

395

Ch.3 User Authentication Textbook?  

E-Print Network [OSTI]

· account lockout mechanisms · policies against using common passwords but rather hard to guess passwords

Dong, Yingfei

396

Managing projects utilizing self-managed teams and managerial toolkits  

E-Print Network [OSTI]

Project Management is an essential function in most software companies today. With increasing complexity and inter connectivity between software projects, it is not surprising that managing such large scale development ...

Mathur, Praveen, S. M. Massachusetts Institute of Technology

2009-01-01T23:59:59.000Z

397

Best Environmental Management Practices  

E-Print Network [OSTI]

protection 3. Aesthetics Acceptable ways for managing mortality include: 1. Rendering 2. Composting 3, and composting methods recycle the nutrients. The other methods, in essence, waste the nutrients. Rendering by rendering plant vehicles and personnel. Composting Composting is the controlled aerobic biological

398

Monitoring informs management  

SciTech Connect (OSTI)

Improved regional monitoring and reporting of greenhouse-gas emissions depends on accurate estimates of emissions from different land-use regimes. An analysis suggests that measuring emissions per crop yield may be an optimum metric for refining land-management decisions.

West, Tristram O.

2011-10-24T23:59:59.000Z

399

Radioactive Waste Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The objective of this Order is to ensure that all Department of Energy (DOE) radioactive waste is managed in a manner that is protective of worker and public health and safety and the environment. Cancels DOE O 5820.2A

1999-07-09T23:59:59.000Z

400

Office of Quality Management  

Broader source: Energy.gov [DOE]

The Office of Quality Management develops and interprets Government-wide policies and procedures and conducts training to ensure the accurate identification of information and documents that must be classified or controlled under statute or Executive order to protect the national security and controlled unclassified Official Use Only information for the effective operation of the Government.

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Purge water management system  

DOE Patents [OSTI]

A purge water management system is described for effectively eliminating the production of purge water when obtaining a groundwater sample from a monitoring well. In its preferred embodiment, the purge water management system comprises an expandable container, a transportation system, and a return system. The purge water management system is connected to a wellhead sampling configuration, typically permanently installed at the well site. A pump, positioned with the monitoring well, pumps groundwater through the transportation system into the expandable container, which expands in direct proportion with volume of groundwater introduced, usually three or four well volumes, yet prevents the groundwater from coming into contact with the oxygen in the air. After this quantity of groundwater has been removed from the well, a sample is taken from a sampling port, after which the groundwater in the expandable container can be returned to the monitoring well through the return system. The purge water management system prevents the purge water from coming in contact with the outside environment, especially oxygen, which might cause the constituents of the groundwater to oxidize. Therefore, by introducing the purge water back into the monitoring well, the necessity of dealing with the purge water as a hazardous waste under the Resource Conservation and Recovery Act is eliminated.

Cardoso-Neto, J.E.; Williams, D.W.

1995-01-01T23:59:59.000Z

402

Load Management Made Simple  

E-Print Network [OSTI]

Company have moved to a demand side or load management mode which seeks to influence customers to change electric usage patterns to more efficiently use available generating capacity. Since 1970, the TUEC system peak demand has more than doubled from about...

Schneider, K.

1985-01-01T23:59:59.000Z

403

"Managing Department Climate Change"  

E-Print Network [OSTI]

"Managing Department Climate Change" #12;Presenters · Ronda Callister Professor, Department Department Climate? · Assesment is essential for determining strategies for initiating change · In a research climate · Each panelist will describe an intervention designed to improve department climate ­ Ronda

Sheridan, Jennifer

404

OTHER APPROACHES TO MANAGING  

E-Print Network [OSTI]

requirements Include minimum separations between wells and conventional/alternative onsite sewage treatment systems Supplement public sanitary sewerage systems primarily in rural areas Legal Approaches ConstructionOTHER APPROACHES TO MANAGING POLLUTANT SOURCES Laws and Land Use [Chapter 10.2] Rules of Thumb Rule

405

Hazardous Waste Management Training  

E-Print Network [OSTI]

Hazardous Waste Management Training Persons (including faculty, staff and students) working with hazardous materials should receive annual training that addresses storage, use, and disposal of hazardous before handling hazardous waste. Departments are re- quired to keep records of training for as long

Dai, Pengcheng

406

International Conference MANAGING FORESTS  

E-Print Network [OSTI]

of Edinburgh, UK 1600-1620 Early thinning of energy wood in dense mixtures of Norway spruce and birch Finland, Finland 1640-1700 Long term effect of silviculture measures on forest-floor under Norway spruce management. Kjell Andreassen, Norwegian Forest & Landscape Institute, Norway 1140-1200 Climate change

407

Mobile Technology Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements, assigns responsibilities, and provides guidance for federal mobile technology management and employee use of both government furnished and personally-owned mobile devices within DOE and NNSA. Establishes requirements for use of User Agreements to govern mobile devices used for official duties. Does not cancel other directives.

2014-05-15T23:59:59.000Z

408

A bank management audit  

E-Print Network [OSTI]

. Bogle Letbetter for their assistance in the preparation of this thesis. Special acknowledgement is also extended to the exec- utives of the Blank Eational Bank foz their time and. co- operation in deueloplnp answers to the questions contained..., ~ ~ ~ 49 X EXECUTIVE EVALUATION w ~ ~ ~ ~ ~ ~ ~ ~ ~ 52 XI CCNCLUSION ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ BIBLIOGRAPHY ~ o APPENDIX ~ ~ ~ ~ 1 ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ e ~ ~ ~ ~ 6) LIST OP CHAHTS Chart I, Organisation Chart of the Bank Manage- ment...

Kennemer, Hoyt Granville

1957-01-01T23:59:59.000Z

409

Watershed Management & Science Conference  

E-Print Network [OSTI]

organic compounds, trace metals, and nutrients as indicators of wastewater treatment plant discharge Name Affiliation e-mail Aingworth, Catherine Binghamton wastewater treatment caingworth the Binghamton--to--Catskill urban-rural gradient. Homyak, P.M., Wood Chips: A potential best management practice

Suzuki, Masatsugu

410

Gas Cylinders: Proper Management  

E-Print Network [OSTI]

Compressed Gas Cylinders: Proper Management And Use Published by the Office of Environment, Health;1 Introduction University of California, Berkeley (UC Berkeley) departments that use compressed gas cylinders (MSDS) and your department's Job Safety Analyses (JSAs). Talk to your gas supplier about hands

Boyer, Elizabeth W.

411

Integrated Safety Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order ensures that DOE/NNSA, systematically integrates safety into management and work practices at all levels, so that missions are accomplished efficiently while protecting the workers, the public, and the environment. Cancels DOE M 450.4-1 and DOE M 411.1-1C

2011-04-25T23:59:59.000Z

412

Comprehensive Emergency Management System  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish policy and to assign and describe roles and responsibilities for the Department of Energy (DOE) Emergency Management System. (This is an administrative change to DOE O 151.1A). Canceled by DOE O 151.1C. Cancels DOE O 151.1A.

2003-10-29T23:59:59.000Z

413

Comprehensive Emergency Management System  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes policy and assigns and describes roles and responsibilities for the DOE Emergency Management System. Cancels DOE 5500.1B, DOE 5500.2B, DOE 5500.3A, DOE 5500.4A, 5500.5A,5500.7B, 5500.8A, 5500.9A, DOE 5500.10

1996-08-21T23:59:59.000Z

414

Radioactive Waste Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The objective of this Order is to ensure that all Department of Energy (DOE) radioactive waste is managed in a manner that is protective of worker and public health and safety and the environment. Cancels DOE O 5820.2A. Chg 1 dated 8-28-01. Certified 1-9-07.

1999-07-09T23:59:59.000Z

415

Purge water management system  

DOE Patents [OSTI]

A purge water management system for effectively eliminating the production of purge water when obtaining a groundwater sample from a monitoring well. In its preferred embodiment, the purge water management system comprises an expandable container, a transportation system, and a return system. The purge water management system is connected to a wellhead sampling configuration, typically permanently installed at the well site. A pump, positioned with the monitoring well, pumps groundwater through the transportation system into the expandable container, which expands in direct proportion with volume of groundwater introduced, usually three or four well volumes, yet prevents the groundwater from coming into contact with the oxygen in the air. After this quantity of groundwater has been removed from the well, a sample is taken from a sampling port, after which the groundwater in the expandable container can be returned to the monitoring well through the return system. The purge water management system prevents the purge water from coming in contact with the outside environment, especially oxygen, which might cause the constituents of the groundwater to oxidize. Therefore, by introducing the purge water back into the monitoring well, the necessity of dealing with the purge water as a hazardous waste under the Resource Conservation and Recovery Act is eliminated.

Cardoso-Neto, Joao E. (North Augusta, SC); Williams, Daniel W. (Aiken, SC)

1996-01-01T23:59:59.000Z

416

Position Management and Classification  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes departmental requirements and responsibilities for classifying positions using general schedule (GS) and federal wage system (FWS) standards and for developing and administering a sound position management and classification program within the Department. Cancels Chapter VII of DOE O 320.1.

2015-04-01T23:59:59.000Z

417

University Services Management Services  

E-Print Network [OSTI]

system U Services Finance organized a workforce planning process resulting in a team with better capacity > 3 Primary Services Human Resources Workforce Planning Recruitment and Selection Employee and Labor, and strategic planning efforts. In addition to supporting the University Services enterprise, the Management

Webb, Peter

418

Integrated Safety Management Policy  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The policy establishes DOE's expectation for safety, including integrated safety management that will enable the Departments mission goals to be accomplished efficiently while ensuring safe operations at all departmental facilities and activities. Cancels DOE P 411.1, DOE P 441.1, DOE P 450.2A, DOE P 450.4, and DOE P 450.7

2011-04-25T23:59:59.000Z

419

ENGINEERING MANAGEMENT AND LEADERSHIP  

E-Print Network [OSTI]

Architecture 1910 Aeronautical Engineering 1958 Nuclear Engineering 1974 Materials Engineering #12;HistoryENGINEERING MANAGEMENT AND LEADERSHIP Where did we come from? Where are we going? How do we get · If it works but no one knows why, it's ENGINEERING #12;The scientist explains that which exists; The engineer

Eagar, Thomas W.

420

Potassium & Potassium Management  

E-Print Network [OSTI]

Potassium & Potassium Management Carrie Laboski Department of Soil Science UW- Madison #12;Havlin Not irrigated #12;Environmental Factors Affecting K Availability to a Plant Soil moisture Low soil moisture moisture will increase K diffusion Increase soil moisture from 10 to 28 % can increase toatl K transport

Balser, Teri C.

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Trust Management Considerations For the Cooperative Infrastructure Defense Framework: Trust Relationships, Evidence, and Decisions  

SciTech Connect (OSTI)

Cooperative Infrastructure Defense (CID) is a hierarchical, agent-based, adaptive, cyber-security framework designed to collaboratively protect multiple enclaves or organizations participating in a complex infrastructure. CID employs a swarm of lightweight, mobile agents called Sensors designed to roam hosts throughout a security enclave to find indications of anomalies and report them to host-based Sentinels. The Sensors findings become pieces of a larger puzzle, which the Sentinel puts together to determine the problem and respond per policy as given by the enclave-level Sergeant agent. Horizontally across multiple enclaves and vertically within each enclave, authentication and access control technologies are necessary but insufficient authorization mechanisms to ensure that CID agents continue to fulfill their roles in a trustworthy manner. Trust management fills the gap, providing mechanisms to detect malicious agents and offering more robust mechanisms for authorization. This paper identifies the trust relationships throughout the CID hierarchy, the types of trust evidence that could be gathered, and the actions that the CID system could take if an entity is determined to be untrustworthy.

Maiden, Wendy M.

2009-12-01T23:59:59.000Z

422

Waste Management & Research172 Waste Manage Res 2003: 21: 172177  

E-Print Network [OSTI]

. Keywords: Waste incineration, PVC (polyvinylchloride), energy recovery, material recycling, HCLWaste Management & Research172 Waste Manage Res 2003: 21: 172­177 Printed in UK ­ all rights reserved Copyright © ISWA 2003 Waste Management & Research ISSN 0734­242X In many market segments

Columbia University

423

Managing Upper extremity Fx's Sweden 10-Managing Pediatric  

E-Print Network [OSTI]

Managing Upper extremity Fx's Sweden 10- 05 1 Managing Pediatric Fractures Andrew Pennock, M extremity Fx's Sweden 10- 05 2 Children Are Not Miniature Adults! · Open Growth Plates · Remodeling is Changing "Citius, Altius, Fortius" - Faster, Higher, Stronger #12;Managing Upper extremity Fx's Sweden 10

Squire, Larry R.

424

Evolution and Evaluation of the Active Management Area Management Plans  

E-Print Network [OSTI]

on Management Plan Information 29 Municipal 29 Agricultural 30 Industrial 31 Water Budgets 32 Other Summary 46 Appendix C: Tucson AMA 2006 Water Budget 48 Appendix D: Groundwater Management Plan Legislative of the Arizona Groundwater Management Act (GMA), the Arizona Department of Water Resources (ADWR

Fay, Noah

425

BSBA IN MANAGEMENT -HUMAN RESOURCE MANAGEMENT SPECIALIZATION ASSESSMENT PLAN  

E-Print Network [OSTI]

BSBA IN MANAGEMENT - HUMAN RESOURCE MANAGEMENT SPECIALIZATION ASSESSMENT PLAN (REV. 7 in Human Resource Management (HRM), the goal is to provide a foundation of all areas of human resources countries. · Content Delivered in: MGT 350, MGT 405, & MGT 357. · Assessment Method: Culminating exam

Gallo, Linda C.

426

Information Technology and Management Information Technology and Management  

E-Print Network [OSTI]

Information Technology and Management Information Technology and Management IIT School of Applied Technology Daniel F. and Ada L. Rice Campus 201 E. Loop Road Wheaton, IL 60187 www.iit.edu/applied tech/ Dean Technology & Management program is to educate and inform students to prepare them to assume technical

Heller, Barbara

427

Nutrient Management Module No. 13 Regulation and Management  

E-Print Network [OSTI]

Nutrient Management Module No. 13 Manure and Biosolids: Regulation and Management by Clain Jones is the thirteenth in a series of Extension materials designed to provide Extension agents, Certified Crop Advisers (CCAs), consultants, and producers with pertinent information on nutrient management issues. To make

Lawrence, Rick L.

428

4-Poster Tick Management and White-tailed Deer Management  

E-Print Network [OSTI]

the methodologies for Integrated Wildlife Damage Management approach #12;Environmental Assessment Purpose and NeedUpdate on: 4-Poster Tick Management and White-tailed Deer Management Tim Green Environmental been on hold until present #12;Environmental Assessment Current Status: Adopting two existing EAs - U

Homes, Christopher C.

429

DOE Challenge Home Recommended Quality Management Provisions...  

Broader source: Energy.gov (indexed) [DOE]

Recommended Quality Management Provisions DOE Challenge Home Recommended Quality Management Provisions DOE Challenge Home Recommended Quality Management Provisions. qm6-14-13.pdf...

430

Mobile Traffic Management System Test Deployment  

E-Print Network [OSTI]

BERKELEY Mobile Traf?c Management System Test DeploymentHIGHWAYS MOBILE TRAFFIC MANAGEMENT SYSTEM TEST DEPLOYMENTMobile Transportation Management System (MTMS). This new and

Gerfen, Jeffrey Brian

2005-01-01T23:59:59.000Z

431

Project Management Plans | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Management Plans Project Management Plans The purpose here is to assist project managers and project planners in creating a project plan by providing examples and pointing to...

432

Project Management Guide | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Project Management Guide Project Management Guide The purpose of this document is to present an overview of project management processes that can be consistently and repeatably...

433

Project management is not an accidental profession .  

E-Print Network [OSTI]

??This study investigates project management as a professional discipline and project manager as a professional person. Projects and the role of the project manager in (more)

Thobejane, Magarule Hendrick

2008-01-01T23:59:59.000Z

434

Risk Management Process Overview | Department of Energy  

Energy Savers [EERE]

risk management process The cybersecurity risk management process explained in the Electricity Sector Cybersecurity Risk Management Process (RMP) Guideline has two primary...

435

Interagency Energy Management Task Force Members  

Broader source: Energy.gov [DOE]

The Interagency Energy Management Task Force is led by the Federal Energy Management Program director. Members include energy and sustainability managers from federal agencies.

436

Southern Region Watershed Management Project  

E-Print Network [OSTI]

Coordinators and the organization, management and activities of the Southern Region Water Quality Planning1 Southern Region Watershed Management Project September 15, 2000 to September 14, 2005 Terminal responding to water quality and conservation issues with educational assistance, technology development

437

Enforcement Project Management Handbook. Directive  

SciTech Connect (OSTI)

The handbook has been prepared as a basic reference and training manual to assist RPMs (Remedial Project Managers) and OSCs (On-Scene Coordinators) in planning, negotiating, and managing various enforcement actions.

Not Available

1991-01-01T23:59:59.000Z

438

ENERGY STAR Portfolio Manager 101  

Office of Energy Efficiency and Renewable Energy (EERE)

Join us as we introduce and demonstrate the core functionality of EPAs ENERGY STAR Portfolio Manager tool. Attendees will learn how to: navigate Portfolio Manager; add a property and enter details...

439

Monitoring and Managing PDSF Jobs  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Monitoring and Managing Jobs Monitoring and Managing Jobs Commonly Used Commands Action How to do it Comment Get a summary of all batch jobs sgeusers Shows a tally of all jobs for...

440

Earned Value Management System (EVMS)  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Guide supports the Departments initiatives to improve program, project, and contract management through the implementation and surveillance of contractors earned value management systems. Canceled by DOE G 413.3-10A.

2008-05-06T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Data Management Group Annual Report  

E-Print Network [OSTI]

Data Management Group Annual Report 2001 prepared by: Data Management Group Joint Program..............................................................................2 Text Based Data Retrieval System `drs' ..........................................................2 Internet Browser Data Retrieval System (iDRS)..............................................3 Complex Data

Toronto, University of

442

Data Management Group Annual Report  

E-Print Network [OSTI]

Data Management Group Annual Report 1999 prepared by: Data Management Group Joint Program................................................................. 1 INFORMATION PROCESSING ............................................. 2 Text Based Data Retrieval System `drs' ........................ 2 Internet Browser Data Retrieval System (iDRS) ............ 3

Toronto, University of

443

Data Management Group Annual Report  

E-Print Network [OSTI]

iv Data Management Group Annual Report 2003 City of Hamilton City of Toronto GO Transit Regional of York Toronto Transit Commission The Data Management Group is a research program located ........................................................................................................ 3 Text-based Data Retrieval System `drs

Toronto, University of

444

Emergency Animal Management during Disasters  

E-Print Network [OSTI]

This publication explains how communities and counties can incorporate animal issues into their emergency management plans. It explains what local plans should include, what role county Extension agents can play, and how animal management plans can...

Dement, Angela

2006-10-23T23:59:59.000Z

445

Solid Waste Management Program (Missouri)  

Broader source: Energy.gov [DOE]

The Solid Waste Management Program in the Department of Natural Resources regulates the management of solid waste in the state of Missouri. A permit is required prior to the construction or...

446

ENERGY STAR Portfolio Manager 201  

Office of Energy Efficiency and Renewable Energy (EERE)

Continue to learn about EPAs new ENERGY STAR Portfolio Manager tool, with a deeper dive into more advanced functionalities such as: managing and tracking changes to your property uses over time;...

447

Operations and Maintenance Management Support  

Broader source: Energy.gov [DOE]

Federal operations and maintenance (O&M) programs must gain full support from management to succeed. Management understanding and buying into the program elevates O&M importance and allows...

448

Waste Management | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Cleanup Waste Management Waste Management July 15, 2014 Energy Expos Students work in groups to create hands-on exhibits about the energy sources that power the nation, ways to...

449

Contractor Human Resource Management Programs  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of this directive is to establish Department of Energy (DOE) responsibilities and requirements for the management and oversight of contractor Human Resource Management (HR) programs. Chg 1, 5-8-98; Chg 2, 11-22-09

1996-09-30T23:59:59.000Z

450

Contractor Human Resource Management Programs  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of this directive is to establish Department of Energy (DOE) responsibilities and requirements for the management and oversight of contractor Human Resource Management (HR) programs. Chg 1, 5-8-98; Chg 2, 11-22-09.

1996-09-30T23:59:59.000Z

451

TOURISM AND HOSPITALITY MANAGEMENT (TOUR)  

E-Print Network [OSTI]

TOURISM AND HOSPITALITY MANAGEMENT (TOUR) Bachelor of Commerce Degree The tourism industry & conferences, adventure tourism, travel trade, and tourism services. The Tourism and Hospitality concentration integrates general management concepts with the professional knowledge that is required by the tourism

Calgary, University of

452

Associate Vice President Facilities Management  

E-Print Network [OSTI]

Operations & Energy Services Jack Baker Executive Director Building & Landscape Maintenance Harry Teabout III Safety HVAC Systems HVAC Systems Administration/ Signs & Graphics Administration/ Signs & Graphics Piped-Campus Facilities Director Department of Engineering & Energy VACANT Energy Management Energy Management Engineering

Milchberg, Howard

453

Environmental Management (EM) Cleanup Projects  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The guide supports DOE O 413.3A, Program and Project Management for the Acquisition of Capital Assets, and provides guidance on environmental management cleanup projects. Canceled by DOE N 251.105.

2008-09-24T23:59:59.000Z

454

Departmental Cyber Security Management Policy  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

2001-05-08T23:59:59.000Z

455

Where do firms manage earnings?  

E-Print Network [OSTI]

Despite decades of research on how, why, and when companies manage earnings, there is a paucity of evidence about the geographic location of earnings management within multinational firms. In this study, we examine where ...

Dyreng, Scott D.

456

Greenhouse Gas Management Program Overview  

Broader source: Energy.gov [DOE]

Fact sheet describes the federal requirements for GHG emissions management, FEMP services to help agencies reduce emissions, and additional resources.

457

Quality assurance and data management  

SciTech Connect (OSTI)

This report contains graphs and tables relating to quality assurance and data management for environmental quality at Hanford Reservation.

Lockrem, L.L.

1998-01-12T23:59:59.000Z

458

Natural Resource Management Plan Update  

E-Print Network [OSTI]

wood industry, some farming in area of Solar Farm 3 #12;History of Natural Resource Management Formal

Homes, Christopher C.

459

Integrated Planning and Performance Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

management systems need clarification - Consolidated planning annual timetable needed for efficiency * Organizational rolesresponsibilities need alignment to defined planning...

460

QUALITY MANAGEMENT AGENDA General Agenda  

E-Print Network [OSTI]

1 QUALITY MANAGEMENT AGENDA General Agenda A week before study commences, the following matters a meeting for the following purposes: 1. Read the report that is related to quality management for the previous term. 2. Conduct a general review of the procedures of quality management and reinforcement

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Regional Summary Pacific Management Context  

E-Print Network [OSTI]

. Bocaccio, Pacific ocean perch, cowcod, and darkblotched and widow rockfish are currently in rebuildingRegional Summary Pacific Management Context The Pacific Region includes California, Oregon, and Washington. Federal fisheries in this region are managed by the Pacific Fishery Management Council (PFMC

462

Decision Support and Risk Management  

E-Print Network [OSTI]

and emergency management officials during the planning, incident management preparedness, and response phasesDecision Support and Risk Management CVMDM: Community Vaccination and Mass Dispensing Model What and the performance of prophylaxis supply logistics and PODs. Decision and Information Sciences Division Decision

463

Energy Management and Conservation Plan  

E-Print Network [OSTI]

Energy Management and Conservation Plan December 2005 #12;Texas Transportation Institute December 2005 Energy Management and Conservation Plan Page 2 of 24 Table of Contents Section One: Executive: Reporting Progress #12;Texas Transportation Institute December 2005 Energy Management and Conservation Plan

464

Implementing Nutrient Management Practices in  

E-Print Network [OSTI]

/Implementation Efforts Nutrient and Pest Management Program (NPM) Certified Crop Adviser (CCA) Training Local Nutrient Assurance Team #12;Nutrient & Pest Management (NPM) Program What we do · Promote agricultural management conservation staff. · Over 400 participants to date Presented by: UWEX, NPM, DATCP, NRCS Financial support

Balser, Teri C.

465

MANAGEMENT CONTROL SYSTEM IN PUBLIC  

E-Print Network [OSTI]

essential aspect of the public management device: compliance with legal rules. Gradually, a new objective of the budgetary system. Thus, public organizations need to create new tools to manage their activities or use, despite the number of reforms adopted in the name of New Public Management, numerous authors also noted

Paris-Sud XI, Université de

466

Data Management Group Annual Report  

E-Print Network [OSTI]

Data Management Group Annual Report 2004 City of Hamilton City of Toronto GO Transit Regional of York Toronto Transit Commission The Data Management Group is a research program located of the funding partners: Ministry of Transportation, Ontario #12;SUMMARY The Data Management Group (DMG

Toronto, University of

467

Data Management Group Annual Report  

E-Print Network [OSTI]

Data Management Group Annual Report 1997 #12;Data Management Group Annual Report 1997 A co-operative project that is jointly funded by members of the Toronto Area Transportation Planning Data Collection: (416) 978-3941 #12;Data Management Group 1997 Annual Report Table of Contents 1 INTRODUCTION

Toronto, University of

468

Managing and Archiving Research Documents  

E-Print Network [OSTI]

Managing and Archiving Research Documents Summary of "Hantering och arkivering av Documents A Handbook for the Research Activity at the University of Gothenburg) #12;Managing and Archiving a method to manage and archive research documents1 . A project group of approximately 20 researchers formed

Johannesson, Henrik

469

Data Management Group Annual Report  

E-Print Network [OSTI]

Data Management Group Annual Report 2000 prepared by: Data Management Group Joint Program the operation of the EMME/2 simu- lation package on the Data Management Group's computer system. During the year computing resource at the DMG. A major challenge in 2000 was to maintain this service while operating out

Toronto, University of

470

Work Experience Guidance for Managers  

E-Print Network [OSTI]

Work Experience Guidance for Managers When approached with a request for work experience, managers. Any queries regarding CRB checks should be directed to your designated HR Manager. When a work any work, paid or unpaid: Before 7am or after 7pm For more than two hours on a school day or Sunday

471

Flexible Work Arrangements Manager Guidelines  

E-Print Network [OSTI]

Flexible Work Arrangements Manager Guidelines The Ohio State University Office of Human Resources Page 1 of 2 Flexible Work Arrangement ­ Manager Assessment Issued 07/15/10 When you receive a proposal your manager to review for a decision. Remember that granting a flexible work arrangement may help

Jones, Michelle

472

COMPARING FOREST MANAGEMENT PRACTICES UNDER  

E-Print Network [OSTI]

COMPARING FOREST MANAGEMENT PRACTICES UNDER COMMUNITY-BASED AND CONVENTIONAL TENURES IN BRITISH OF MASTER OF RESOURCE MANAGEMENT In the School of Resource and Environmental Management © David Mealiea 2011 of Canada, this work may be reproduced, without authorization, under the conditions for Fair Dealing

473

Vehicle Management Driver Safety Program  

E-Print Network [OSTI]

Vehicle Management and Driver Safety Program Manual Facilities & Operations / Finance & Administration Version 2 April 2012 #12; 2012 University of Alberta. #12;The Vehicle Management and Driver of employment. Driver Acknowledgement I have received the University of Alberta, Vehicle Management and Driver

Machel, Hans

474

Certificate in Transit Management and  

E-Print Network [OSTI]

Certificate in Transit Management and Operations UMass Transit, in partnership with the UMass Transportation Center and CTTransit, are pleased to offer "A Certificate in Transit Management and Operations Engineering and the School of Management - Internships with UMass Transit and CTTransit - A summer workshop

Massachusetts at Amherst, University of

475

Certificate in Transit Management and  

E-Print Network [OSTI]

Certificate in Transit Management and Operations UMass Transit, in partnership with the UMass Transportation Center and CTTransit, are pleased to offer "A Certificate in Transit Management and Operations contract to provide transit management services in Hartford and other cities in Connecticut. CTTRANSIT

Massachusetts at Amherst, University of

476

Professional Certificate in Management Skills  

E-Print Network [OSTI]

.carleton.ca/ppd A well-balanced program for employees in transition from a union to a management environment. KudosProfessional Certificate in Management Skills 2010 Program 12 days over 6 months Jan. 24 ­ June 14, 2011 An essential program for managers of today ­ gain a portfolio of tools and learn how to integrate

Carleton University

477

Learning Management System Transition Project  

E-Print Network [OSTI]

Learning Management System Transition Project Kickoff Jim Snell Director Instructional Technology Services #12;History · Texas A&M started using the Campus Edition WebCT learning management system (LMS Process March 2012 · Project manager hired March 2012 · ITS project team assigned April 2012 · Contract

478

A 17025:2005A 17025:2005 Management SystemManagement System  

E-Print Network [OSTI]

A 17025:2005A 17025:2005 Management SystemManagement System Made SimpleMade Simple What to think about when reviewingWhat to think about when reviewing the Management Systemthe Management System #12 role does top management play?le does top management play? Technical Manager/Quality Manager

479

Master of Science in Engineering and Technology Management Engineering Management Concentration Management of Technology Concentration  

E-Print Network [OSTI]

514 Statistical Analysis for Six Sigma INEN 502 Operations Research Methods for Six Sigma INEN 502 Operations Research Methods INEN 518 Project Management MGMT 470 Personnel Management ENGR 566 Six Sigma and Quality

Selmic, Sandra

480

Environmental Management System Plan  

SciTech Connect (OSTI)

Executive Order 13423, Strengthening Federal Environmental, Energy, and Transportation Management establishes the policy that Federal agencies conduct their environmental, transportation, and energy-related activities in a manner that is environmentally, economically and fiscally sound, integrated, continually improving, efficient, and sustainable. The Department of Energy (DOE) has approved DOE Order 450.1A, Environmental Protection Program and DOE Order 430.2B, Departmental Energy, Renewable Energy and Transportation Management as the means of achieving the provisions of this Executive Order. DOE Order 450.1A mandates the development of Environmental Management Systems (EMS) to implement sustainable environmental stewardship practices that: (1) Protect the air, water, land, and other natural and cultural resources potentially impacted by facility operations; (2) Meet or exceed applicable environmental, public health, and resource protection laws and regulations; and (3) Implement cost-effective business practices. In addition, the DOE Order 450.1A mandates that the EMS must be integrated with a facility's Integrated Safety Management System (ISMS) established pursuant to DOE P 450.4, 'Safety Management System Policy'. DOE Order 430.2B mandates an energy management program that considers energy use and renewable energy, water, new and renovated buildings, and vehicle fleet activities. The Order incorporates the provisions of the Energy Policy Act of 2005 and Energy Independence and Security Act of 2007. The Order also includes the DOE's Transformational Energy Action Management initiative, which assures compliance is achieved through an Executable Plan that is prepared and updated annually by Lawrence Berkeley National Laboratory (LBNL, Berkeley Lab, or the Laboratory) and then approved by the DOE Berkeley Site Office. At the time of this revision to the EMS plan, the 'FY2009 LBNL Sustainability Executable Plan' represented the most current Executable Plan. These DOE Orders and associated policies establish goals and sustainable stewardship practices that are protective of environmental, natural, and cultural resources, and take a life cycle approach that considers aspects such as: (1) Acquisition and use of environmentally preferable products; (2) Electronics stewardship; (3) Energy conservation, energy efficiency, and renewable energy; (4) Pollution prevention, with emphasis on toxic and hazardous chemical and material reduction; (5) Procurement of efficient energy and water consuming materials and equipment; (6) Recycling and reuse; (7) Sustainable and high-performance building design; (8) Transportation and fleet management; and (9) Water conservation. LBNL's approach to sustainable environmental stewardship required under Order 450.1A poses the challenge of implementing its EMS in a compliance-based, performance-based, and cost-effective manner. In other words, the EMS must deliver real and tangible business value at a minimal cost. The purpose of this plan is to describe Berkeley Lab's approach for achieving such an EMS, including an overview of the roles and responsibilities of key Laboratory parties. This approach begins with a broad-based environmental policy consistent with that stated in Chapter 11 of the LBNL Health and Safety Manual (PUB-3000). This policy states that Berkeley Lab is committed to the following: (1) Complying with applicable environmental, public health, and resource conservation laws and regulations. (2) Preventing pollution, minimizing waste, and conserving natural resources. (3) Correcting environmental hazards and cleaning up existing environmental problems, and (4) Continually improving the Laboratory's environmental performance while maintaining operational capability and sustaining the overall mission of the Laboratory. A continual cycle of planning, implementing, evaluating, and improving processes will be performed to achieve goals, objectives, and targets that will help LBNL carry out this policy. Each year, environmental aspects will be identified and their impacts to the environm

Fox, Robert; Thorson, Patrick; Horst, Blair; Speros, John; Rothermich, Nancy; Hatayama, Howard

2009-03-24T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Comprehensive Irrigation Management  

E-Print Network [OSTI]

The other irrigation ? Optimizing water consumption in urban landscapes Kenneth Cook President, Intelligent Irrigation Banyan Water Water risk ? increasing rapidly in the US 2 Sustainable property management 3 ? ?Green? ? Audubon Cert..., COO ? Improve efficiencies and use in urban landscapes ? Make efficiency changes in the landscape early on ? too important for all stakeholders to get to point of no water availability for irrigation ? Real estate values affected by as much...

Cook, K.

2011-01-01T23:59:59.000Z

482

Operations Task Management (OTM)  

SciTech Connect (OSTI)

This paper reviews the steps taken by management at Ashland Oil to reduce expenses, including an analysis of every aspect of the refinery. It was determined that the areas most adaptable to improvement were the maintenance department, storerooms, the laboratory and energy utilization. The authors focus, however, on the difficulties met in implementing an effective cost control program in the operations area, detailing the reasons why and examining the system ultimately installed in this area.

Miller, C.B.; Duck, C.H.

1985-10-01T23:59:59.000Z

483

Conditional data watchpoint management  

DOE Patents [OSTI]

A method, system and computer program product for managing a conditional data watchpoint in a set of instructions being traced is shown in accordance with illustrative embodiments. In one particular embodiment, the method comprises initializing a conditional data watchpoint and determining the watchpoint has been encountered. Upon that determination, examining a current instruction context associated with the encountered watchpoint prior to completion of the current instruction execution, further determining a first action responsive to a positive context examination; otherwise, determining a second action.

Burdick, Dean Joseph (Austin, TX); Vaidyanathan, Basu (Austin, TX)

2010-08-24T23:59:59.000Z

484

Emergency Management System  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes policy, and assigns and describes roles and responsibilities for the DOE Emergency Management System. DOE 5500.1B Chg 1; DOE 5500.2B Chg 1; DOE 5500.3A Chg 1; DOE 5500.4A; DOE 5500.5A; DOE 5500.7B; DOE 5500.8A; DOE 5500.9A, and DOE 5500.10A Chg 1. Canceled by DOE O 151.1A.

1995-09-25T23:59:59.000Z

485

Steam System Data Management  

E-Print Network [OSTI]

Steam System Data Management What Does It Include Safety In Motion Wal?Tech?Valve,?Inc. 251?438?2203 The Real Genius Behind Technology Is People ESL-IE-13-05-35 Proceedings of the Thrity-Fifth Industrial Energy Technology Conference New... ? Fabrication Training (Six Year Training) ? Welding Certifications ?Retired From Chevron After 25 Years ? Established A Steam System Program ? Planner For Routine Maintenance Work ? Planner For Steam System Improvements ? Wal-Tech Valve, Inc. ? Purchased...

Roberts, D.

2013-01-01T23:59:59.000Z

486

Conservation and drought management  

E-Print Network [OSTI]

conservation technologies are high e#19;ciency toilets, showerheads, washing machines and water heaters. Behavioral changes include turning the water o#27; except when rinsing while shaving and brushing teeth and pu#26;ing full loads in dishwashers...Fall 2012 tx H2O 5 Column by Dr. Calvin Finch, Water Conservation and Technology Center director Conservation and Drought Management WAT E R CONSERVATION & TECHNOLOGY CENTER Securing Our Water Future Water conservation and drought...

Finch, Calvin

2012-01-01T23:59:59.000Z

487

Best Management Practices for Aquatic Vegetation Management Principal Investigator: Joseph E. Morris  

E-Print Network [OSTI]

. Develop educational materials related to aquatic plant identification and their specific managementBest Management Practices for Aquatic Vegetation Management Principal Investigator: Joseph E vegetation management with the ultimate goal of producing the best management practices protocol in Iowa

Koford, Rolf R.

488

LEGACY MANAGEMENT REQUIRES INFORMATION  

SciTech Connect (OSTI)

''Legacy Management Requires Information'' describes the goal(s) of the US Department of Energy's Office of Legacy Management (LM) relative to maintaining critical records and the way those goals are being addressed at Hanford. The paper discusses the current practices for document control, as well as the use of modern databases for both storing and accessing the data to support cleanup decisions. In addition to the information goals of LM, the Hanford Federal Facility Agreement and Consent Order, known as the ''Tri-Party Agreement'' (TPA) is one of the main drivers in documentation and data management. The TPA, which specifies discrete milestones for cleaning up the Hanford Site, is a legally binding agreement among the US Department of Energy (DOE), the Washington State Department of Ecology (Ecology), and the US Environmental Protection Agency (EPA). The TPA requires that DOE provide the lead regulatory agency with the results of analytical laboratory and non-laboratory tests/readings to help guide them in making decisions. The Agreement also calls for each signatory to preserve--for at least ten years after the Agreement has ended--all of the records in its or its contractors, possession related to sampling, analysis, investigations, and monitoring conducted. The tools used at Hanford to meet TPA requirements are also the tools that can satisfy the needs of LM.

CONNELL, C.W.; HILDEBRAND, R.D.

2006-12-14T23:59:59.000Z

489

Life Cycle Asset Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

(The following directives are deleted or consolidated into this Order and shall be phased out as noted in Paragraph 2: DOE 1332.1A; DOE 4010.1A; DOE 4300.1C; DOE 4320.1B; DOE 4320.2A; DOE 4330.4B; DOE 4330.5; DOE 4540.1C; DOE 4700.1). This Order supersedes specific project management provisions within DOE O 430.1A, LIFE CYCLE ASSET MANAGEMENT. The specific paragraphs canceled by this Order are 6e(7); 7a(3); 7b(11) and (14); 7c(4),(6),(7),(11), and (16); 7d(4) and (8); 7e(3),(10), and (17); Attachment 1, Definitions (item 30 - Line Item Project, item 42 - Project, item 48 - Strategic System); and Attachment 2, Contractor Requirements Document (paragraph 1d regarding a project management system). The remainder of DOE O 430.1A remains in effect. Cancels DOE O 430.1. Canceled by DOE O 413.3.

1998-10-14T23:59:59.000Z

490

Avoidable waste management costs  

SciTech Connect (OSTI)

This report describes the activity based costing method used to acquire variable (volume dependent or avoidable) waste management cost data for routine operations at Department of Energy (DOE) facilities. Waste volumes from environmental restoration, facility stabilization activities, and legacy waste were specifically excluded from this effort. A core team consisting of Idaho National Engineering Laboratory, Los Alamos National Laboratory, Rocky Flats Environmental Technology Site, and Oak Ridge Reservation developed and piloted the methodology, which can be used to determine avoidable waste management costs. The method developed to gather information was based on activity based costing, which is a common industrial engineering technique. Sites submitted separate flow diagrams that showed the progression of work from activity to activity for each waste type or treatability group. Each activity on a flow diagram was described in a narrative, which detailed the scope of the activity. Labor and material costs based on a unit quantity of waste being processed were then summed to generate a total cost for that flow diagram. Cross-complex values were calculated by determining a weighted average for each waste type or treatability group based on the volume generated. This study will provide DOE and contractors with a better understanding of waste management processes and their associated costs. Other potential benefits include providing cost data for sites to perform consistent cost/benefit analysis of waste minimization and pollution prevention (WMIN/PP) options identified during pollution prevention opportunity assessments and providing a means for prioritizing and allocating limited resources for WMIN/PP.

Hsu, K.; Burns, M.; Priebe, S.; Robinson, P.

1995-01-01T23:59:59.000Z

491

Environmental management activities  

SciTech Connect (OSTI)

The Office of Environmental Management (EM) has been delegated the responsibility for the Department of Energy`s (DOE`s) cleanup of the nuclear weapons complex. The nature and magnitude of the waste management and environmental remediation problem requires the identification of technologies and scientific expertise from domestic and foreign sources. Within the United States, operational DOE facilities, as well as the decontamination and decommissioning of inactive facilities, have produced significant amounts of radioactive, hazardous, and mixed wastes. In order to ensure worker safety and the protection of the public, DOE must: (1) assess, remediate, and monitor sites and facilities; (2) store, treat, and dispose of wastes from past and current operations; and (3) develop and implement innovative technologies for environmental restoration and waste management. The EM directive necessitates looking beyond domestic capabilities to technological solutions found outside US borders. Following the collapse of the Soviet regime, formerly restricted elite Soviet scientific expertise became available to the West. EM has established a cooperative technology development program with Russian scientific institutes that meets domestic cleanup objectives by: (1) identifying and accessing Russian EM-related technologies, thereby leveraging investments and providing cost-savings; (2) improving access to technical information, scientific expertise, and technologies applicable to EM needs; and (3) increasing US private sector opportunities in Russian in EM-related areas.

NONE

1997-07-01T23:59:59.000Z

492

MANAGED OBJECT PATTERN Class Behavioral Provide direct control of individual resources in a managed system. The Managed Object  

E-Print Network [OSTI]

in a managed system. The Managed Object provides a one-to-one mapping to the manageable entities, as well system, in which case the Manager-Agent pattern might be more appropriate). #12;2 / 4 Structure management systems to learn about the contents of the MIB. · Managed Object - Represents a single resource

Keller, Rudolf K.

493

Employee Motivation in Energy Management Programs  

E-Print Network [OSTI]

Effective management of energy requires the same degree of manager/employee motivation as other management responsibilities. Basically the same factors cause managers and employees to be motivated and effective. In this discussion, we will review...

Hogeland, A. W.

1982-01-01T23:59:59.000Z

494

The Value of Information in Inventory Management  

E-Print Network [OSTI]

Inventory management traditionally assumes the precise knowledge of the ... stage inventory management in a robust optimization framework; the precise...

2007-05-24T23:59:59.000Z

495

Miamisburg Environmental Management Project Archived Soil & Groundwate...  

Office of Environmental Management (EM)

Miamisburg Environmental Management Project Archived Soil & Groundwater Master Reports Miamisburg Environmental Management Project Archived Soil & Groundwater Master Reports...

496

Fernald Environmental Management Project Archived Soil & Groundwater...  

Office of Environmental Management (EM)

Fernald Environmental Management Project Archived Soil & Groundwater Master Reports Fernald Environmental Management Project Archived Soil & Groundwater Master Reports Fernald...

497

Independent Oversight Focused Safety Management Evaluation, Idaho...  

Office of Environmental Management (EM)

Focused Safety Management Evaluation, Idaho National Engineering and Environmental Laboratory - January 2001 Independent Oversight Focused Safety Management Evaluation, Idaho...

498

DOE Releases Electricity Subsector Cybersecurity Risk Management...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

DOE Releases Electricity Subsector Cybersecurity Risk Management Process (RMP) Guideline DOE Releases Electricity Subsector Cybersecurity Risk Management Process (RMP) Guideline...

499

Training for Records and Information Management  

Broader source: Energy.gov [DOE]

Records Management Training: NARA Records Management Training NARA Targeted Assistance NARA Brochures Training Presentation: Information Collection Requests/PRA (pdf)

500

Better Buildings Neighborhood Program Grant Recipient Management...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Better Buildings Neighborhood Program Grant Recipient Management Handbook Better Buildings Neighborhood Program Grant Recipient Management Handbook Better Buildings Neighborhood...