Powered by Deep Web Technologies
Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

V-195: RSA Authentication Manager Lets Local Users View the Administrative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

95: RSA Authentication Manager Lets Local Users View the 95: RSA Authentication Manager Lets Local Users View the Administrative Account Password V-195: RSA Authentication Manager Lets Local Users View the Administrative Account Password July 9, 2013 - 12:51am Addthis PROBLEM: RSA Authentication Manager Lets Local Users View the Administrative Account Password PLATFORM: RSA Authentication Manager 7.1, 8.0 ABSTRACT: A vulnerability was reported in RSA Authentication Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028742 CVE-2013-3273 RSA IMPACT ASSESSMENT: Medium DISCUSSION: When the RSA Authentication Manager Software Development Kit (SDK) is used to develop a custom application that connects with RSA Authentication Manager and the trace logging is set to verbose, the administrative account password used by the custom application is written in clear text to trace

2

V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA Authentication Manager Writes Operating System, SNMP, 4: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files June 10, 2013 - 12:47am Addthis PROBLEM: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files PLATFORM: RSA Authentication Manager 8.0 ABSTRACT: A vulnerability was reported in RSA Authentication Manager. REFERENCE LINKS: RSA SecurityTracker Alert ID: 1028638 CVE-2013-0947 IMPACT ASSESSMENT: Medium DISCUSSION: The system may write operating system, SNMP, and HTTP plug-in proxy passwords in clear text to log and configuration files. IMPACT: A local user can obtain operating system, SNMP, and HTTP plug-in proxy

3

U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA Authentication Manager Flaws Permit Cross-Site and 2: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other versions may also be affected. ABSTRACT: RSA Authentication Manager is prone to multiple security vulnerabilities because it fails to properly sanitize user-supplied input. Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be possible.

4

T-659: Update support for RSA Authentication Manager | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Manager July 1, 2011 - 7:15am Addthis PROBLEM: Authentication Manager SP4 Patch 4 Windows Server 2008 PLATFORM: Windows Server 2008 SP4 Patch 4 32bit & 64bit (architectures)...

5

V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: RSA Authentication Agent Lets Remote Users Bypass 3: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements PLATFORM: RSA Authentication Agent 7.1, 7.1.1 for Microsoft Windows ABSTRACT: A vulnerability was reported in RSA Authentication Agent. REFERENCE LINKS: RSA SecurCare SecurityTracker Alert ID: 1028230 CVE-2013-0931 IMPACT ASSESSMENT: Medium DISCUSSION: On systems configured for Quick PIN Unlock, the system will request a PIN instead of a full Passcode when the session is activated from an active screensaver after the Quick PIN Unlock timeout has expired. RSA Authentication Agent on Windows Vista, Windows 7, Windows 2008, and

6

T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Adaptive Authentication Has Unspecified Remote 6: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw August 18, 2011 - 3:09pm Addthis PROBLEM: A vulnerability was reported in RSA Adaptive Authentication. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3, 6.0.2.1 SP2 and SP2 Patch 1, 6.0.2.1 SP3 ABSTRACT: An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. reference LINKS: Security Tracker: 1025956

7

V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA Adaptive Authentication (On-Premise) Input Validation 4: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks November 27, 2012 - 2:00am Addthis PROBLEM: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks PLATFORM: RSA Adaptive Authentication (On-Premise) 6.x ABSTRACT: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). REFERENCE LINKS: SecurityTracker Alert ID: 1027811 SecurityFocus Security Alert RSA Customer Support CVE-2012-4611 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). A remote user can conduct cross-site scripting attacks. The software does not

8

U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: RSA Key Manager Appliance Session Logout Bug Fails to 7: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions November 4, 2011 - 8:00am Addthis PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated user session may not terminate properly. reference LINKS: SecurityTracker Alert ID: 1026276 SecurityFocus Bug Traq Seclists: ESA-2011-035 CVE-2011-2740 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in RSA Key Manager Appliance. A remote authenticated user session may not terminate properly. When using Firefox 4 and 5, an authenticated user session is not terminated properly when logging out.

9

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

704: RSA enVision Lets Remote Users View Files and Remote 704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

10

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA enVision Lets Remote Users View Files and Remote 4: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

11

V-223: RSA Authentication Agent for PAM Allows Remote Users to Make  

NLE Websites -- All DOE Office Websites (Extended Search)

3: RSA Authentication Agent for PAM Allows Remote Users to Make 3: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts V-223: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts August 21, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in RSA Authentication Agent for PAM PLATFORM: RSA Authentication Agent for PAM 7.0.2 and prior ABSTRACT: A remote user can make unlimited login attempts REFERENCE LINKS: Security Tracker Alert ID 1028930 CVE-2013-3271 IMPACT ASSESSMENT: Medium DISCUSSION: The system does not restrict the number of login attempts made via the agent IMPACT: System Access SOLUTION: Vendor has issued a fix Addthis Related Articles U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability

12

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: RSA Adaptive Authentication Bugs Let Remote Users Bypass 1: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls December 14, 2011 - 8:17am Addthis PROBLEM: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may be able to bypass certain security controls. reference LINKS: SecurityTracker Alert ID: 1026420 Security Focus: ESA-2011-036 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA Adaptive Authentication (On-Premise). A remote user may be able to bypass certain security controls. A remote user can send specially crafted data elements to affect the Device

13

T-640: RSA Access Manager Server CVE-2011-0322 Update | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: RSA Access Manager Server CVE-2011-0322 Update 0: RSA Access Manager Server CVE-2011-0322 Update T-640: RSA Access Manager Server CVE-2011-0322 Update June 7, 2011 - 5:18pm Addthis PROBLEM: ESA-2011-009 (revised): RSA, The Security Division of EMC, announces new fix for potential security vulnerability in RSA Access Manager Server. PLATFORM: RSA Access Manager Server version 5.5.x, 6.0.x, and 6.1.x ABSTRACT: RSA strongly recommends that all customers running RSA Access Manager Server versions 5.5.3, 6.0.4, and 6.1 apply the following updated security hot fixes, which contain the resolution to this issue, at the earliest opportunity. The hot fixes can be downloaded from SecurCare Online or by contacting RSA Security Customer Support. ?Security Hot fix # 5.5.3.174 for RSA Access Manager Server version 5.5.3

14

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site...

15

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

16

T-642: RSA SecurID update to Customers | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA SecurID update to Customers 2: RSA SecurID update to Customers T-642: RSA SecurID update to Customers June 9, 2011 - 12:45am Addthis PROBLEM: Certain characteristics of the attack on RSA indicated that the perpetrator's most likely motive was to obtain an element of security information that could be used to target defense secrets and related IP, rather than financial gain, PII, or public embarrassment. PLATFORM: RSA SecurID implementations ABSTRACT: RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products. reference LINKS: Open Letter to RSA Customers (update) CVE-2011-0322 RSA Fraud Resource Center RSA Security Practice DOE-CIRC T-640: RSA Access Manager Server CVE-2011-0322 Update

17

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: RSA Access Manager Session Replay Flaw Lets Remote Users 5: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

18

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

205: RSA Access Manager Session Replay Flaw Lets Remote Users 205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

19

T-582: RSA systems has resulted in certain information being extracted from  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA systems has resulted in certain information being 2: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID March 17, 2011 - 11:45pm Addthis PROBLEM: Recently EMC's security systems identified an extremely sophisticated cyber attack in progress, targeting their RSA business unit. RSA took a variety of aggressive measures against the threat to protect their business and their customers, including further hardening of their IT infrastructure. PLATFORM: RSA SecurID implementations ABSTRACT: RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

20

V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Agent Discloses Node Secret Encryption Key to Local Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5...

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

V-036: EMC Smarts Network Configuration Manager Database Authentication  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: EMC Smarts Network Configuration Manager Database 6: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability November 29, 2012 - 3:30am Addthis PROBLEM: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability PLATFORM: EMC Smarts Network Configuration Manager (NCM) all versions prior 9.1 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: EMC Identifier: ESA-2012-057 Secunia Advisory SA51408 SecurityTracker Alert ID: 1027812 CVE-2012-4614 CVE-2012-4615 IMPACT ASSESSMENT: Medium DISCUSSION: The systems uses a hard-coded key to encrypt authentication credentials on the target system [CVE-2012-4615]. A local user with knowledge of the key

22

V-220: Juniper Security Threat Response Manager Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Juniper Security Threat Response Manager Lets Remote 0: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands August 17, 2013 - 4:01am Addthis PROBLEM: A remote authenticated user can execute arbitrary commands on the target system. PLATFORM: 2010.0, 2012.0, 2012.1, 2013.1 ABSTRACT: A vulnerability was reported in Juniper Security Threat Response Manager (STRM) REFERENCE LINKS: SecurityTracker Alert ID: 1028921 CVE-2013-2970 IMPACT ASSESSMENT: High DISCUSSION: A remote authenticated user can inject commands to execute arbitrary operating system commands with the privileges of the target web service. This can be exploited to gain shell access on the target device.

23

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: RSA enVision Bugs Permit Cross-Site Scripting, SQL 9: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks March 20, 2012 - 7:00am Addthis PROBLEM: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. Reference LINKS: SecurityTracker Alert ID: 1026819 CVE-2012-0403 IMPACT ASSESSMENT: High Discussion: The system does not properly filter HTML code from user-supplied input

24

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

84: Cisco Digital Media Manager Lets Remote Authenticated Users 84: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges January 19, 2012 - 9:00am Addthis PROBLEM: A remote authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not properly validate unreferenced URLs. REFERENCE LINKS: Vendor Advisory SecurityTracker Alert ID: 1026541 CVE-2012-0329 IMPACT ASSESSMENT: medium Discussion: Cisco Show and Share is not directly affected by this vulnerability, but a user can exploit the Cisco Digital Media Manager to gain full access to Cisco Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port

25

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Cisco Digital Media Manager Lets Remote Authenticated Users 4: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges January 19, 2012 - 9:00am Addthis PROBLEM: A remote authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not properly validate unreferenced URLs. REFERENCE LINKS: Vendor Advisory SecurityTracker Alert ID: 1026541 CVE-2012-0329 IMPACT ASSESSMENT: medium Discussion: Cisco Show and Share is not directly affected by this vulnerability, but a user can exploit the Cisco Digital Media Manager to gain full access to Cisco Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port

26

U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA®  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: RSA® Authentication Agent 7.1 for Microsoft Windows® and 7: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability September 25, 2012 - 6:00am Addthis PROBLEM: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability PLATFORM: Product: RSA Authentication Agent for Microsoft Windows version 7.1 Platforms: Windows XP and Windows 2003 Product: RSA Authentication Client 3.5 Platforms: Windows XP and Windows 2003 ABSTRACT: RSA Authentication Agent Lets Remote Authenticated Users Bypass an Authentication Step reference LINKS: SecurityTracker Alert ID: 1027559 Bugtraq ID: 55662

27

Factorization of a 512-bit RSA modulus  

Science Conference Proceedings (OSTI)

This paper reports on the factorization of the 512-bit number RSA-155 by the Number Field Sieve factoring method (NFS) and discusses the implications for RSA.

Stefania Cavallar; Bruce Dodson; Arjen K. Lenstra; Walter Lioen; Peter L. Montgomery; Brian Murphy; Herman Te Riele; Karen Aardal; Jeff Gilchrist; Grard Guillerm; Paul Leyland; Jol Marchand; Franois Morain; Alec Muffett; Chris Putnam; Craig Putnam; Paul Zimmermann

2000-05-01T23:59:59.000Z

28

Using Two-Factor RSA Token  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Two-Factor RSA Token Using Two-Factor RSA Token with VPN User Guide November 2013 Using Your RSA token with WebVPN 1. Establish a connection to the Internet and connect to https://connect.doe.gov 2. Users who are using their RSA Token for the first time should follow the steps below for PIN creation. Others who have already set up their PIN and used their RSA token previously should enter their six digit numeric username and passcode; this is the PIN + the RSA token code. The result of this successful login will be Step 8 below. 3. A login page similar to the picture below will be displayed. Enter your VPN Username (six-digit numeric ID) and your Password by typing your generated RSA Token code and then click the Login button. Example; your generated RSA token code is 032848 (from above). In the Password box, you will enter

29

CRT RSA algorithm protected against fault attacks  

Science Conference Proceedings (OSTI)

Embedded devices performing RSA signatures are subject to Fault Attacks, particularly when the Chinese Remainder Theorem is used. In most cases, the modular exponentiation and the Garner recombination algorithms are targeted. To thwart Fault Attacks, ... Keywords: RSA, chinese remainder theorem, fault attacks, modular exponentiation, simple power analysis, smart card

Arnaud Boscher; Robert Naciri; Emmanuel Prouff

2007-05-01T23:59:59.000Z

30

UNIXUNIXUNIXUNIX((((OpenSSHOpenSSHOpenSSHOpenSSH)))) (gw.ps.nifs.ac.jp) RSA  

E-Print Network (OSTI)

pdf SSH SSH SSH UNIXUNIXUNIXUNIX((((OpenSSHOpenSSHOpenSSHOpenSSH)))) ssh (gw.ps.nifsTerm: New connection TCP/IP gw.ps.nifs.ac.jp %ssh (-i ) (-l ) gw.ps.nifs.ac.jp The authenticity of host 'gw.ps.nifs.ps.nifs.ac.jp,133.75.37.11' (RSA) to the list of known hosts. Enter passphrase for key '/home

Ito, Atsushi

31

The RSA Group is Pseudo-Free  

E-Print Network (OSTI)

Rivest, On the notion of pseudo-free groups. In: Theory ofImplicit function theorem over free groups. J. Algebra 290(The RSA Group is Pseudo-Free ? Daniele Micciancio Department

Micciancio, Daniele

2010-01-01T23:59:59.000Z

32

U-090: RSA enVision Discloses Environment Variable Information...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: RSA enVision Discloses Environment Variable Information to Remote Users U-090: RSA enVision Discloses Environment Variable Information to Remote Users January 27, 2012 - 6:00am...

33

A Progressive Network Management Architecture Enabled By Java Technology  

E-Print Network (OSTI)

This paper proposes a framework based completely on Java technology. The advantages brought about by the use of Java in network management answer some critical problems existing in current systems. With this work we address several factors concerning interoperability and security in heterogeneous network environments. Specifically, we present a manager application and a multithreaded agent engine that make use of a lightweight communication mechanism for message exchange. A MIB parser is introduced to accelerate handling of incoming management requests, and the RSA public-key cryptosystem is implemented to provide both encryption and authentication features. Results, measured in terms of response time, compare favourably with other published work and standard management frameworks.

Gavalas, Damianos; Ghanbari, Mohammed; O'Mahony, Mike

2010-01-01T23:59:59.000Z

34

NIST Special Publication Expands Government Authentication ...  

Science Conference Proceedings (OSTI)

... The Office of Management and Budget's guidance, E-Authentication Guidance for Federal Agencies [OMB 04-04] can be found at www ...

2011-12-20T23:59:59.000Z

35

U-063: RSA SecurID Software Token for Windows DLL Loading Error...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote...

36

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: RSA SecurID Software Token for Windows DLL Loading Error 3: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code December 16, 2011 - 8:00am Addthis PROBLEM: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code. PLATFORM: RSA SecurID Software Token 4.1 for Microsoft Windows ABSTRACT: A remote user can cause the target application to execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026426 ESA-2011-039 Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA SecurID Software Token. A remote user

37

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

63: RSA SecurID Software Token for Windows DLL Loading Error 63: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code December 16, 2011 - 8:00am Addthis PROBLEM: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code. PLATFORM: RSA SecurID Software Token 4.1 for Microsoft Windows ABSTRACT: A remote user can cause the target application to execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026426 ESA-2011-039 Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA SecurID Software Token. A remote user

38

U-120: RSA SecurID Software Token Converter Unspecified Buffer Overflow  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: RSA SecurID Software Token Converter Unspecified Buffer 0: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability U-120: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability March 8, 2012 - 7:00am Addthis PROBLEM: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability PLATFORM: RSA SecurID Software Token Converter 2.x ABSTRACT: Successful exploitation may allow execution of arbitrary code. reference LINKS: Secunia Advisory SA48297 CVE-2012-0397 IMPACT ASSESSMENT: High Discussion: A vulnerability has been reported in RSA SecurID Software Token Converter, which can be exploited by malicious people to compromise a user's system. Impact: An unspecified error can be exploited to cause a buffer overflow. Solution: Update to version 2.6.1. Addthis Related Articles

39

Authentication of byte sequences  

SciTech Connect

Algorithms for the authentication of byte sequences are described. The algorithms are designed to authenticate data in the Storage, Retrieval, Analysis, and Display (SRAD) Test Data Archive of the Radiation Effects and Testing Directorate (9100) at Sandia National Laboratories, and may be used in similar situations where authentication of stored data is required. The algorithms use a well-known error detection method called the Cyclic Redundancy Check (CRC). When a byte sequence is authenticated and stored, CRC bytes are generated and attached to the end of the sequence. When the authenticated data is retrieved, the authentication check consists of processing the entire sequence, including the CRC bytes, and checking for a remainder of zero. The error detection properties of the CRC are extensive and result in a reliable authentication of SRAD data.

Stearns, S.D.

1991-06-01T23:59:59.000Z

40

V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: EMC RSA Archer GRC Open Redirection Weakness and Security 4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September 4, 2013 - 6:00am Addthis PROBLEM: A weakness and a security issue have been reported in EMC RSA Archer GRC PLATFORM: EMC RSA Archer GRC 5.x ABSTRACT: This fixes multiple vulnerabilities, which can be exploited to bypass certain security restrictions and to conduct spoofing attacks REFERENCE LINKS: Secunia Advisory SA54717 SecurityTracker Alert ID 1028971 EMC Identifier: ESA-2013-057 CVE-2013-3276 CVE-2013-3277 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The application does not properly restrict deactivated users. This can be exploited by deactivated users to login and gain access to otherwise

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

U-090: RSA enVision Discloses Environment Variable Information to Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: RSA enVision Discloses Environment Variable Information to 0: RSA enVision Discloses Environment Variable Information to Remote Users U-090: RSA enVision Discloses Environment Variable Information to Remote Users January 27, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in RSA enVision PLATFORM: Version(s): 4.0 prior to 4.0 SP4 P5, 4.1 prior to 4.1 P3 ABSTRACT: A remote user can view potentially sensitive data on the target system. reference LINKS: CVE-2011-4143 SecurityTracker Alert ID: 1026591 Secunia Advisory IMPACT ASSESSMENT: Medium Discussion: The security issue is caused due to the application disclosing certain environment variables containing web system setup information via the web interface. Further information about this resolution and other fixes can be found in the Release Notes associated with RSA enVision 4.1, Patch 3 and

42

V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain 84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks February 5, 2013 - 12:01am Addthis PROBLEM: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks PLATFORM: RSA Archer SmartSuite Framework version 4.x RSA Archer GRC version 5.x ABSTRACT: Several vulnerabilities were reported in RSA Archer eGRC. REFERENCE LINKS: Security Alert: ESA-2013-002 SecurityTracker Alert ID: 1028073 CVE-2012-1064 CVE-2012-2292 CVE-2012-2293 CVE-2012-2294 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can cause arbitrary scripting code to be executed by the target user's browser [CVE-2012-1064]. The code will originate from the

43

U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL  

NLE Websites -- All DOE Office Websites (Extended Search)

259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic 259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: RSA BSAFE SSL-C prior to 2.8.6 ABSTRACT: RSA BSAFE SSL-C Multiple Vulnerabilities reference LINKS: Secunia Advisory SA50601 SecurityTracker Alert ID: 1027514 SecurityTracker Alert ID: 1027513 CVE-2011-3389 CVE-2012-2110 CVE-2012-2131 IMPACT ASSESSMENT: High Discussion: EMC has acknowledged a weakness and a vulnerability in RSA BSAFE, which can

44

Towards practical anonymous password authentication  

Science Conference Proceedings (OSTI)

The conventional approach for anonymous password authentication incurs O(N) server computation, linear to the total number of users. In ACSAC'09, Yang et al. proposed a new approach for anonymous password authentication, breaking this lower ... Keywords: anonymity, guessing attack, password authentication

Yanjiang Yang; Jianying Zhou; Jun Wen Wong; Feng Bao

2010-12-01T23:59:59.000Z

45

Digital Image Authentication: A Review  

Science Conference Proceedings (OSTI)

Digital image authentication refers to all the techniques performing anti-falsification, digital image copyright protection, or access control. A large number of DIA techniques have been developed to authenticate digital images, including cryptography-based ... Keywords: Data Hiding, Digital Fingerprints, Forensic Science, Image Authentication, Watermarking

Chia-Hung Wei; Yue Li

2011-04-01T23:59:59.000Z

46

CERTIFICATE OF AUTHENTICITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CERTIFICATE OF AUTHENTICITY CERTIFICATE OF AUTHENTICITY I hereby certify that this transcript constitutes an accurate record of the full Council meeting of the National Coal Council held on November 14,2008 at the Westin Grand Hotel, Washington, D.C. ~ i c h a e l G. Mueller, Chair National Coal Council I NATIONAL COAL COUNCIL 1 FULL COUNCIL MEETING FRIDAY NOVEMBER 14, 2 0 0 8 The Full Council meeting convened at 9 : 0 0 a.m. in the Washington Ballroom of the Westin Grand Hotel, 2 3 5 0 M Street, NW, Washington, DC, Chair Michael G. Mueller presiding. ATTENDEES: MIKE MUELLER, Arneren Energy Fuels & Services Company, Chair RICH EIMER, Dynegy Inc., Vice-Chair ROBERT BECK, National Coal Council, Executive Vice-President SY ALI, Clean Energy Consulting BARB ALTIZER, Eastern Coal Council

47

CHALLENGE MEASUREMENTS FOR AUTHENTICATION  

Science Conference Proceedings (OSTI)

Authentication of systems with an information barrier that protects sensitive information is difficult; in particular, the information barrier can allow a hidden switch to be implemented by the system fabricator and operator. The hidden switch is the operators ability to subvert the measurement system and force it to produce a desired and false result. It is usually discussed in the context of an attribute measurement in which a faked item is presented in place of a real item regulated by an agreement, with the driving motivation being the ability to preserve a stock of valuable items. In simple terms, the hidden switch enables a shell game with assets, and the information barrier protects the switch. This presentation outlines challenge measurements that could be used to detect the implementation of a hidden switch and assist the authentication process.

Pitts, W. Karl

2009-10-07T23:59:59.000Z

48

Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1  

Science Conference Proceedings (OSTI)

This memo represents a republication of PKCS #1 v2.1 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document is taken directly from the PKCS #1 v2.1 document, ...

J. Jonsson; B. Kaliski

2003-02-01T23:59:59.000Z

49

Byzantine agreement method without authentication  

SciTech Connect

This invention relates to a method for achieving Byzantine agreement without authentication among n 100 communicating processors using event counting and thresholding rather than message exchanges and evaluations.

Reischuk, R.K.

1983-12-01T23:59:59.000Z

50

Requirements for signaling channel authentication  

SciTech Connect

This contribution addresses requirements for ATM signaling channel authentication. Signaling channel authentication is an ATM security service that binds an ATM signaling message to its source. By creating this binding, the message recipient, and even a third party, can confidently verify that the message originated from its claimed source. This provides a useful mechanism to mitigate a number of threats. For example, a denial of service attack which attempts to tear-down an active connection by surreptitiously injecting RELEASE or DROP PARTY messages could be easily thwarted when authenticity assurances are in place for the signaling channel. Signaling channel authentication could also be used to provide the required auditing information for accurate billing which is impervious to repudiation. Finally, depending on the signaling channel authentication mechanism, end-to-end integrity of the message (or at least part of it) can be provided. None of these capabilities exist in the current specifications.

Tarman, T.D.

1995-12-11T23:59:59.000Z

51

Citrix_2FA_Authentication-September09  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Factor RSA Token with Citrix Workplace Environment (CWE) Revision 1.13 September, 2009 Office of IT Operations (IM-621) United States Department of Energy DOE HQ OCIO Application...

52

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache VCL Input Validation Flaw Lets Remote Authenticated 0: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges May 7, 2013 - 12:01am Addthis PROBLEM: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Apache VCL Versions: 2.1, 2.2, 2.2.1, 2.3, 2.3.1 ABSTRACT: A vulnerability was reported in Apache VCL. REFERENCE LINKS: Apache Securelist SecurityTracker Alert ID: 1028515 CVE-2013-0267 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated administrative user with minimal administrative privileges (i.e., nodeAdmin, manageGroup, resourceGrant, or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges.

53

Mobile IP Authentication, Authorization, and Accounting Requirements  

Science Conference Proceedings (OSTI)

The Mobile IP and Authentication, Authorization, Accounting (AAA) working groups are currently looking at defining the requirements for Authentication, Authorization, and Accounting. This document contains the requirements which would have to be supported ...

S. Glass; T. Hiller; S. Jacobs; C. Perkins

2000-10-01T23:59:59.000Z

54

Authentication of FPGA bitstreams: why and how  

Science Conference Proceedings (OSTI)

Encryption of volatile FPGA bitstreams provides confidentiality to the design but does not ensure its authenticity. This paper motivates the need for adding authentication to the configuration process by providing application examples where this functionality ...

Saar Drimer

2007-03-01T23:59:59.000Z

55

ARM - Central Authentication Service  

NLE Websites -- All DOE Office Websites (Extended Search)

History History Organization Participants Facility Statistics Forms Contacts Research Themes Research Highlights Journal Articles Collaborations Atmospheric System Research (ASR) Propose a Campaign Submitting Proposals: Guidelines Featured Campaigns Campaign Data List of Campaigns Aerial Facility Mobile Facilities North Slope of Alaska Southern Great Plains Tropical Western Pacific Eastern North Atlantic Location Table Contacts Instrument Datastreams Value-Added Products PI Data Products Field Campaign Data Related Data Data Plots Data Policy Data Documentation Data Gathering and Delivery Data Quality Data Tools Data Archive Data Management Facility External Data Center Features and Releases Facility News Blogs: Air Time & Field Notes Meetings and Events Employment Research Highlights Data Announcements

56

User Authentication Policy | Argonne Leadership Computing Facility  

NLE Websites -- All DOE Office Websites (Extended Search)

Eureka / Gadzooks Eureka / Gadzooks Policies Pullback Policy ALCF Acknowledgment Policy Account Sponsorship & Retention Policy Accounts Policy Data Policy INCITE Quarterly Report Policy Job Scheduling Policy on BG/P Job Scheduling Policy on BG/Q Refund Policy Software Policy User Authentication Policy Documentation Feedback Please provide feedback to help guide us as we continue to build documentation for our new computing resource. [Feedback Form] User Authentication Policy Users of the Argonne production systems are required to use a CRYPTOCard one time password, multifactor authentication system. This document explains the policies users must follow regarding CRYPTOCard tokens for accessing the Argonne resources. MultiFactor Authentication "Authentication systems are frequently described by the authentication

57

A TESLA-Based Mutual Authentication . . .  

E-Print Network (OSTI)

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against man-in-the-middle attacks. Several solutions have been proposed to establish mutual entity authentication. However, none provide a flaw-free bilateral authentication protocol. In this paper, we show that a recently proposed solution is vulnerable to a "type attack". Then, we propose a novel mutual entity authentication using the TESLA protocol. The proposed solution not only provides secure bilateral authentication, but also decreases the call setup time and the required connection bandwidth. An important feature of the proposed protocol is that it is compatible with the GSM standard.

Ali Fanian; Mehdi Berenjkoub; T. Aaron Gulliver

2009-01-01T23:59:59.000Z

58

Quantum Key Distribution Protocol with User Authentication  

E-Print Network (OSTI)

We propose a quantum key distribution protocol with quantum based user authentication. User authentication is executed by validating the correlation of GHZ states. Alice and Bob can distribute a secure key using the remaining GHZ states after authentication. This secret key does not leak even to the arbitrator by the properties of the entanglement. We will show that our protocol is secure against the cloning attack.

Lee, H; Lee, D; Lim, J; Yang, H J; Lee, Hwayean; Lee, Sangjin; Lee, Donghoon; Lim, Jongin; Yang, HyungJin

2005-01-01T23:59:59.000Z

59

Obfuscated authentication systems, devices, and methods  

SciTech Connect

Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

Armstrong, Robert C; Hutchinson, Robert L

2013-10-22T23:59:59.000Z

60

Secure Symmetric Authentication for RFID Tags  

E-Print Network (OSTI)

cryptographically secure authentication. Starting with a short introduction into common RFID systems with passive tags, we present a motivation why secure authentication with standardized symmetric crypto algorithms for RFID tags is necessary for many applications. We demonstrate vulnerabilities of current RFID systems and explain how application of an authentication mechanism can solve them. Furthermore we explain how authentication protocols work and how they can be included in the RFID protocol standard ISO 18000. By presenting the interim results of ART, we will show that the proposed enhancement is feasible with current RIFD infrastructure and silicon technology used for RFID tags.

Manfred Aigner; Martin Feldhofer

2005-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Virtual Server Environment Lets Remote Authenticated 8: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges April 22, 2011 - 7:47am Addthis PROBLEM: A vulnerability was reported in HP Virtual Server Environment. A remote authenticated user can obtain elevated privileges on the target system. PLATFORM: HP Virtual Server Environment prior to v6.3 ABSTRACT: A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges. reference LINKS: HP Document ID: c02749050 SecurityTracker Alert ID: 1025429 CVE-2011-1724 HP Insight Software media set 6.3 HP Technical Knowledge Base Discussion: System management and security procedures must be reviewed frequently to

62

Context-based authentication and transport of cultural assets  

Science Conference Proceedings (OSTI)

We present a ubiquitous system that combines context information, security mechanisms and a transport infrastructure to provide authentication and secure transport of works of art. Authentication is provided for both auctions and exhibitions, where users ... Keywords: Authentication, Ubiquitous systems

Leonardo Mostarda; Changyu Dong; Naranker Dulay

2010-05-01T23:59:59.000Z

63

T-608: HP Virtual Server Environment Lets Remote Authenticated...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated...

64

Instructions for using HSPD-12 Authenticated Outlook Web Access...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook access using...

65

Verifying authentication protocols with CSP Steve Schneider  

E-Print Network (OSTI)

Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

Doran, Simon J.

66

Back-of-device authentication on smartphones  

Science Conference Proceedings (OSTI)

This paper presents BoD Shapes, a novel authentication method for smartphones that uses the back of the device for input. We argue that this increases the resistance to shoulder surfing while remaining reasonably fast and easy-to-use. We performed ... Keywords: authentication, back of device interaction, security

Alexander De Luca; Emanuel von Zezschwitz; Ngo Dieu Huong Nguyen; Max-Emanuel Maurer; Elisa Rubegni; Marcello Paolo Scipioni; Marc Langheinrich

2013-04-01T23:59:59.000Z

67

On selecting Gabor features for biometric authentication  

Science Conference Proceedings (OSTI)

We describe a Gabor feature selection technique that allows us to develop a fast and robust Gabor-feature based biometric system. Existing Gabor based methods use a huge number of Gabor features to represent the patterns. Our experiments on different ... Keywords: Gabor features, automated identification, biometrics, ear authentication, equal error rate, feature selection, finger authentication

Loris Nanni; Alessandra Lumini

2009-04-01T23:59:59.000Z

68

Group-Based Authentication and Key Agreement  

Science Conference Proceedings (OSTI)

This paper presents an authentication and key agreement protocol to streamline communication activities for a group of mobile stations (MSs) roaming from the same home network (HN) to a serving network (SN). In such a roaming scenario, conventional schemes ... Keywords: Authentication and key agreement, Group key, Roaming, Security, Wireless network

Yu-Wen Chen; Jui-Tang Wang; Kuang-Hui Chi; Chien-Chao Tseng

2012-02-01T23:59:59.000Z

69

A class of authentication codes with secrecy  

Science Conference Proceedings (OSTI)

We study a class of authentication codes with secrecy. We determine the maximum success probabilities of the impersonation and the substitution attacks on these codes and the level of secrecy. Therefore we give an answer to an open problem stated in ... Keywords: 14G50, 94A60, 94A62, Algebraic function fields, Authentication codes with secrecy, Linearized polynomial

Elif Kurtaran zbudak; Ferruh zbudak; Zlfkar Sayg?

2011-04-01T23:59:59.000Z

70

Plugging a Scalable Authentication Framework into Shibboleth  

Science Conference Proceedings (OSTI)

In a VO (virtual organisation) environment where services are provided and shared by dissimilar organisations from different administrative domains and are protected with dissimilar security policies and measures, there is a need for a flexible authentication ... Keywords: Grid authentication, security architecture, smart tokens.

N. Zhang; L. Yao; J. Chin; A. Nenadic; A. McNab; A. Rector; C. Goble; Q. Shi

2005-06-01T23:59:59.000Z

71

A secure and efficient strong-password authentication protocol  

Science Conference Proceedings (OSTI)

Password authentication protocols are divided into two types. One employs the easy-to-remember password while the other requires the strong password. In 2001, Lin et al. proposed an optimal strong-password authentication protocol (OSPA) to resist the ... Keywords: denial-of-service attack, mutual authentication, password authentication, smart card, stolen-verifier attack, strong password

Ya-Fen Chang; Chin-Chen Chang

2004-07-01T23:59:59.000Z

72

A simple threshold authenticated key exchange from short secrets  

Science Conference Proceedings (OSTI)

This paper brings the password-based authenticated key exchange (PAKE) problem closer to practice. It takes into account the presence of firewalls when clients communicate with authentication servers. An authentication server can indeed be seen as two ... Keywords: password-based authentication, threshold protocols

Michel Abdalla; Olivier Chevassut; Pierre-Alain Fouque; David Pointcheval

2005-12-01T23:59:59.000Z

73

Password based key exchange with mutual authentication  

Science Conference Proceedings (OSTI)

A reasonably efficient password based key exchange (KE) protocol with provable security without random oracle was recently proposed by Katz, et al. [17] and later by Gennaro and Lindell [13]. However, these protocols do not support mutual authentication ...

Shaoquan Jiang; Guang Gong

2004-08-01T23:59:59.000Z

74

Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes  

DOE Patents (OSTI)

Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

Kent, Alexander Dale (Los Alamos, NM)

2008-09-02T23:59:59.000Z

75

T-646: Debian fex authentication bypass | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Debian fex authentication bypass 6: Debian fex authentication bypass T-646: Debian fex authentication bypass June 14, 2011 - 3:45pm Addthis PROBLEM: The vulnerability is caused due to the application not properly verifying the existence of "auth-ID" when uploading files and can be exploited to bypass the authentication mechanism. PLATFORM: Debian fex ABSTRACT: Debian security discovered that fex, a web service for transferring very large, files, is not properly validating authentication IDs. While the service properly validates existing authentication IDs, an attacker who is not specifying any authentication ID at all, can bypass the authentication procedure. reference LINKS: DSA-2259-1 fex Secunia Advisory SA44940 Debian Security Advisory DSA-2259-1 fex-20110610.tar Vulnerability Report: Debian GNU/Linux 6.0

76

T-606: Sun Java System Access Manager Lets Remote Users Partially...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

06: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote...

77

Kerberos authentication: The security answer for unsecured networks  

Science Conference Proceedings (OSTI)

Traditional authentication schemes do not properly address the problems encountered with today`s unsecured networks. Kerbmm developed by MIT, on the other hand is designed to operate in an open unsecured network, yet provide good authentication and security including encrypted session traffic. Basic Kerberos principles as well as experiences of the ESnet Authentication Pilot Project with Cross Realm. Authentication between four National Laboratories will also be described.

Engert, D.E.

1995-06-01T23:59:59.000Z

78

Using Rose and Compass for Authentication  

Science Conference Proceedings (OSTI)

Many recent non-proliferation software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project. ROSE is an LLNL-developed robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. It continues to be extended to support the automated analysis of binaries (x86, ARM, and PowerPC). We continue to extend ROSE to address a number of security specific requirements and apply it to software authentication for non-proliferation projects. We will give an update on the status of our work.

White, G

2009-07-09T23:59:59.000Z

79

Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Factor Factor RSA Tokens with Citrix Workplace Environment (CWE) Revision 1.13 December, 2009 Associate CIO for Operations (IM) United States Department of Energy DOE HQ OCIO Application Hosting Environment Instructions for Using RSA Token with Citrix Workplace Environment Using Your RSA Token with Citrix Note: If you access Citrix Workplace from within the DOE network (DOEnet or VPN) then you do not need an RSA Two-Factor token. The Citrix Workplace logon screen will prompt you only for your Windows User name and Password. Step 1 - Establish a connection to the Internet and connect to https://workplace.doe.gov. Step 2 - Click "OK" to bypass the Government warning banner. DOE HQ OCIO Application Hosting Environment Instructions for Using RSA Token with Citrix Workplace Environment

80

System and method for authentication of goods  

SciTech Connect

An authentication system comprising a medium having a plurality of elements, the elements being distinctive, detectable and disposed in an irregular pattern or having an intrinsic irregularity. Each element is characterized by a determinable attribute distinct from a two-dimensional coordinate representation of simple optical absorption or simple optical reflection intensity. An attribute and position of the plurality of elements, with respect to a positional reference is detected. A processor generates an encrypted message including at least a portion of the attribute and position of the plurality of elements. The encrypted message is recorded in physical association with the medium. The elements are preferably dichroic fibers, and the attribute is preferably a polarization or dichroic axis, which may vary over the length of a fiber. An authentication of the medium based on the encrypted message may be authenticated with a statistical tolerance, based on a vector mapping of the elements of the medium, without requiring a complete image of the medium and elements to be recorded.

Kaish, Norman (West Hampstead, NY); Fraser, Jay (Freeport, NY); Durst, David I. (Syosset, NY)

1999-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

System and method for authentication of goods  

SciTech Connect

An authentication system comprising a medium having a plurality of elements, the elements being distinctive, detectable and disposed in an irregular pattern or having an intrinsic irregularity is disclosed. Each element is characterized by a determinable attribute distinct from a two-dimensional coordinate representation of simple optical absorption or simple optical reflection intensity. An attribute and position of the plurality of elements, with respect to a positional reference is detected. A processor generates an encrypted message including at least a portion of the attribute and position of the plurality of elements. The encrypted message is recorded in physical association with the medium. The elements are preferably dichroic fibers, and the attribute is preferably a polarization or dichroic axis, which may vary over the length of a fiber. An authentication of the medium based on the encrypted message may be authenticated with a statistical tolerance, based on a vector mapping of the elements of the medium, without requiring a complete image of the medium and elements to be recorded.

Kaish, N.; Fraser, J.; Durst, D.I.

1999-10-26T23:59:59.000Z

82

V-231: Cisco Identity Services Engine Discloses Authentication Credentials  

NLE Websites -- All DOE Office Websites (Extended Search)

1: Cisco Identity Services Engine Discloses Authentication 1: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users August 30, 2013 - 3:01am Addthis PROBLEM: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials. PLATFORM: Cisco Identity Services Engine (ISE) 1.x ABSTRACT: A vulnerability was reported in Cisco Identity Services Engine REFERENCE LINKS: SecurityTracker Alert ID: 1028965 CVE-2013-3471 IMPACT ASSESSMENT: Meduim DISCUSSION: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials.The system stores the username and password of an authenticated user within hidden HTML form fields. A

83

Towards inclusive identity management  

Science Conference Proceedings (OSTI)

The article argues for a shift of perspective in identity management (IDM) research and development. Accessibility and usability issues affect identity management to such an extent that they demand a reframing and reformulation of basic designs and requirements ... Keywords: Authentication, Disabilities, E-Inclusion, Exclusion, Identity management, Information security, Privacy, Universal design, Usability

Lothar Fritsch; Kristin Skeide Fuglerud; Ivar Solheim

2010-12-01T23:59:59.000Z

84

Amateur Anthropologists: DIY Tourism as Learning Culture and Accessing Authenticity  

E-Print Network (OSTI)

Paula. A. Tourists as Pilgrims: Commercial Fashioning of1983:20). Considering tourists as pilgrims of sacralization,is a kind of contemporary pilgrim, seeking authenticity in

Nishijima, Ryoko

2012-01-01T23:59:59.000Z

85

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges. IMPACT: A remote authenticated user can...

86

U-268: Oracle Database Authentication Protocol Discloses Session...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Bug Lets Remote Authenticated Users Gain Elevated Privileges V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code T-535: Oracle Critical Patch Update -...

87

Multi-Level TESLA: Broadcast Authentication for Distributed Sensor Networks  

E-Print Network (OSTI)

Multi-Level µTESLA: Broadcast Authentication for Distributed Sensor Networks DONGGANG LIU and PENG named multi-level µTESLA based on µTESLA, a broadcast authentication protocol whose scalability is limited by its unicast-based initial parameter distribution. Multi-level µTESLA satisfies several nice

Ning, Peng

88

A framework for password-based authenticated key exchange1  

Science Conference Proceedings (OSTI)

In this paper, we present a general framework for password-based authenticated key exchange protocols, in the common reference string model. Our protocol is actually an abstraction of the key exchange protocol of Katz et al. and is based on the recently ... Keywords: Passwords, authentication, dictionary attack, projective hash functions

Rosario Gennaro; Yehuda Lindell

2006-05-01T23:59:59.000Z

89

Mutual Authentication for Low-Power Mobile Devices  

Science Conference Proceedings (OSTI)

We propose methods for mutual authentication and key exchange. Our methods are well suited for applications with strict power consumption restrictions, such as wireless medical implants and contactless smart cards. We prove the security of our schemes ... Keywords: gap problem, low power, medical informatics, mutual authentication

Markus Jakobsson; David Pointcheval

2002-02-01T23:59:59.000Z

90

Robust secret key based authentication scheme using smart cards  

Science Conference Proceedings (OSTI)

User authentication is an important part of security, along with confidentiality and integrity, for systems that allow remote access over untrustworthy networks, like the Internet. Recently, Chen et al. proposed an improvement on the SAS-like password ... Keywords: authentication, cryptography, secret key, smart card

Eun-Jun Yoon; Kee-Young Yoo

2005-11-01T23:59:59.000Z

91

An improved anonymous authentication and key exchange scheme  

Science Conference Proceedings (OSTI)

Nowadays, anonymity property of user authentication scheme becomes important. In 2003, Park et al. proposed an authentication and key exchange scheme using smart card. However, Juang et al. pointed out that Park et al.'s scheme did not provide the user ...

Kyung-kug Kim; Myung-Hwan Kim

2012-09-01T23:59:59.000Z

92

Challenges and architectural approaches for authenticating mobile users  

Science Conference Proceedings (OSTI)

This paper casts an architectural eye at existing work on security and privacy in mobile computing. Specifically, it focuses on authentication as it leads up to access control from two points of view: servicer providers granting access to users, and ... Keywords: access control, anonymity, authentication, mobile computing, trust, ubiquitous computing, user mobility

Joo Pedro Sousa

2008-05-01T23:59:59.000Z

93

On Automatic Authenticity Verification of Printed Security Documents  

Science Conference Proceedings (OSTI)

This paper presents a pioneering effort to involve machine in checking document authenticity. A particular class of security documents has been considered for the present experiment. Bank cheques, several kinds of tickets like lottery tickets, air tickets, ... Keywords: authenticity verification, security document, forensic document examination, bank cheques

Utpal Garain; Biswajit Halder

2008-12-01T23:59:59.000Z

94

RFID authentication protocol for low-cost tags  

Science Conference Proceedings (OSTI)

In this paper, we investigate the possible privacy and security threats to RFID systems, and consider whether previously proposed RFID protocols address these threats. We then propose a new authentication protocol which provides the identified privacy ... Keywords: privacy, rfid authentication protocol, security

Boyeon Song; Chris J. Mitchell

2008-03-01T23:59:59.000Z

95

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

96

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

97

Hardware authentication using transmission spectra modified optical fiber.  

SciTech Connect

The ability to authenticate the source and integrity of data is critical to the monitoring and inspection of special nuclear materials, including hardware related to weapons production. Current methods rely on electronic encryption/authentication codes housed in monitoring devices. This always invites the question of implementation and protection of authentication information in an electronic component necessitating EMI shielding, possibly an on board power source to maintain the information in memory. By using atomic layer deposition techniques (ALD) on photonic band gap (PBG) optical fibers we will explore the potential to randomly manipulate the output spectrum and intensity of an input light source. This randomization could produce unique signatures authenticating devices with the potential to authenticate data. An external light source projected through the fiber with a spectrometer at the exit would 'read' the unique signature. No internal power or computational resources would be required.

Grubbs, Robert K.; Romero, Juan A.

2010-09-01T23:59:59.000Z

98

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

RSA SecurID User Guide VPN Home What is RSA SecurID? RSA SecurID two-factor authentication is based on something you know (a password or PIN) and something you have (an...

99

A location based security framework for authenticating mobile phones  

Science Conference Proceedings (OSTI)

Although the utilisation of location information in mobile network access systems has given rise to a variety of applications and services, it is thought that the underlying service authentication model and the related security can be further enhanced. ...

Lishoy Francis; Keith Mayes; Gerhard Hancke; Konstantinos Markantonakis

2010-11-01T23:59:59.000Z

100

Bootstrapping Timed Efficient Stream Loss-Tolerant Authentication (TESLA)  

E-Print Network (OSTI)

This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards " (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2006). TESLA, the Timed Efficient Stream Loss-tolerant Authentication protocol, provides source authentication in multicast scenarios. TESLA is an efficient protocol with low communication and computation overhead that scales to large numbers of receivers and also tolerates packet loss. TESLA is based on loose time synchronization between the sender and the receivers. Source authentication is realized in TESLA by using Message Authentication Code (MAC) chaining. The use

Request Comments; H. Tschofenig; Status Of This Memo

2006-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Efficient password-based authenticated key exchange without public information  

Science Conference Proceedings (OSTI)

Since the first password-based authenticated key exchange (PAKE) was proposed, it has enjoyed a considerable amount of interest from the cryptographic research community. To our best knowledge, most of proposed PAKEs based on Diffie-Hellman key exchange ...

Jun Shao; Zhenfu Cao; Licheng Wang; Rongxing Lu

2007-09-01T23:59:59.000Z

102

U-130: JBoss Operations Network LDAP Authentication Bug Lets...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based...

103

T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

not checked realm values were not checked the server secret was hard-coded to a known string The result of these weaknesses is that DIGEST authentication was only as secure as...

104

@Yuan Xue (yuan.xue@vanderbilt.edu) Authentication Protocol  

E-Print Network (OSTI)

. If A trusts B and B is hacked, then the attacker could gain access to A. Network address impersonation (address spoofing) Ingress filtering #12;@Yuan Xue (yuan.xue@vanderbilt.edu) Cryptographic Authentication

Cui, Yi

105

Analog Video Authentication and Seal Verification Equipment Development  

SciTech Connect

Under contract to the US Department of Energy in support of arms control treaty verification activities, the Savannah River National Laboratory in conjunction with the Pacific Northwest National Laboratory, the Idaho National Laboratory and Milagro Consulting, LLC developed equipment for use within a chain of custody regime. This paper discussed two specific devices, the Authentication Through the Lens (ATL) analog video authentication system and a photographic multi-seal reader. Both of these devices have been demonstrated in a field trial, and the experience gained throughout will also be discussed. Typically, cryptographic methods are used to prove the authenticity of digital images and video used in arms control chain of custody applications. However, in some applications analog cameras are used. Since cryptographic authentication methods will not work on analog video streams, a simple method of authenticating analog video was developed and tested. A photographic multi-seal reader was developed to image different types of visual unique identifiers for use in chain of custody and authentication activities. This seal reader is unique in its ability to image various types of seals including the Cobra Seal, Reflective Particle Tags, and adhesive seals. Flicker comparison is used to compare before and after images collected with the seal reader in order to detect tampering and verify the integrity of the seal.

Gregory Lancaster

2012-09-01T23:59:59.000Z

106

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

168: EMC Documentum Information Rights Management Server Bugs Let 168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service May 14, 2012 - 7:00am Addthis PROBLEM: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service PLATFORM: Information Rights Management Server 4.x, 5.x ABSTRACT: Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions. Reference links: SecurityTracker Alert ID: 1027058 CVE-2012-2276 CVE-2012-2277 IMPACT ASSESSMENT: High Discussion: A remote authenticated user can send specially crafted data to trigger a NULL pointer dereference and cause the target service to crash. A remote

107

Implementing data security in student lifecycle management system at the university of Prishtina  

Science Conference Proceedings (OSTI)

In this paper is presented a novel approach for fulfilling the data security criteria in a Student Lifecycle Management System at the University of Prishtina. The four main criteria of data security such as: privacy, authentication, integrity and non-repudiation ... Keywords: X.509 certificate, authentication, digital signature, non-repudiation, privacy, security, smart cards, student lifecycle management

Blerim Rexha; Haxhi Lajqi; Myzafere Limani

2010-07-01T23:59:59.000Z

108

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

71 - 1880 of 28,905 results. 71 - 1880 of 28,905 results. Download EA-1388: Final Environmental Assessment Ground Water Compliance at the Shiprock Uranium Mill Tailings Site http://energy.gov/nepa/downloads/ea-1388-final-environmental-assessment Download Document Management & Control System (DMCS) http://energy.gov/cio/downloads/document-management-control-system-dmcs Article U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. http://energy.gov/cio/articles/u-129-rsa-envision-bugs-permit-cross-site-scripting-sql-injection-and-directory

109

Microsoft Word - SMail_Secure_Web-Based_Email_v3 _2_.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

HQ OCIO Instructions for Using Secure Email (SMail) via HQ OCIO Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Version 4 April 2010 Office of the Associate CIO for IT Support Services United States Department of Energy DOE HQ OCIO Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Requirements SMail: 1. An Energy IT Services (EITS) provided Exchange email account. 1 2. An EITS provided RSA SecureID Token with an active account in the EITS-managed RSA Authentication Server. 2 3. Appropriate access granted Active Directory group membership. 3 4. DOEnet or Internet access and a supported web browser. Login Procedure for SMail:

110

Ultra-wideband Location Authentication for Item Tracking  

SciTech Connect

International safeguards is increasingly utilizing unattended and remote monitoring methods to improve inspector efficiency and the timeliness of diversion detection. Item identification and tracking has been proposed as one unattended remote monitoring method, and a number of radio-frequency (RF) technologies have been proposed. When utilizing location information for verification purposes, strong assurance of the authenticity of the reported location is required, but most commercial RF systems are vulnerable to a variety of spoofing and relay attacks. ORNL has developed a distance bounding method that uses ultra-wideband technology to provide strong assurance of item location. This distance bounding approach can be coupled with strong symmetric key authentication methods to provide a fully authenticable tracking system that is resistant to both spoofing and relay attacks. This paper will discuss the overall problems associated with RF tracking including the common spoofing and relay attack scenarios, the ORNL distance bounding approach for authenticating location, and the potential applications for this technology.

Rowe, Nathan C [ORNL; Kuhn, Michael J [ORNL; Stinson, Brad J [ORNL; Holland, Stephen A [ORNL

2012-01-01T23:59:59.000Z

111

Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding author)  

E-Print Network (OSTI)

1 Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding in the process algebra Communicating Sequential Processes (CSP) to specify authentication. The purpose, security protocols, CSP, formal specification, Kerberos 1. Introduction Schneider [1] uses Communicating

Doran, Simon J.

112

U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: JBoss Operations Network LDAP Authentication Bug Lets Remote 0: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication March 21, 2012 - 7:00am Addthis PROBLEM: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication PLATFORM: JBoss Operations Network 2.x ABSTRACT: A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases. reference LINKS: SecurityTracker Alert ID: 1026826 Secunia Advisory SA48471 CVE-2012-1100 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based

113

Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card  

Science Conference Proceedings (OSTI)

Zero-knowledge authentication protocols are an alternative to authentication protocols based on public key cryptography. Low processing and memory consumption make them especially suitable for implementation in smart card microprocessors, which are severely ...

Kenan Kalajdzic; Ahmed Patel; Laleh Golafshan; Mona Taghavi

2011-07-01T23:59:59.000Z

114

Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis  

E-Print Network (OSTI)

Authentication schemes relying on per-packet signature and per-signature verification introduce heavy cost for computation and communication. Due to its constraint resources, smart grid's authentication requirement cannot ...

Li, Depeng

115

Current Projects: Product Authenticity Tags - Vulnerability Assessment Team  

NLE Websites -- All DOE Office Websites (Extended Search)

Product Authenticity Tags Product Authenticity Tags VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast µProcessor Shop Insanely Fast µProcessor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms Argonne's VAT (brochure)

116

Secure Access Control Through Challenge and Response Authentication  

E-Print Network (OSTI)

compares various types of key technology (mechanical, magnetic, contact, RFID), and evaluates these keys for their strengths and weaknesses. Keys with challenge and response authentication overcome the limitations of the traditional static data keys. The challenge and response concept is discussed; suitable keys are presented and compared. The document concludes with an explanation of why challenge and response authentication is more secure than concepts that rely on static data. A version of this app note was published by Embedded.com on March 15, 2011.

unknown authors

2011-01-01T23:59:59.000Z

117

Authentication and protection for e-finance consumers: the dichotomy of cost versus ease of use  

Science Conference Proceedings (OSTI)

Multifactor authentication is a tool to combat identity theft and is mandated by the Federal Financial Institutions Examination Council. However, there are only a few US financial institutions that have implemented two-factor authentication. A goal for ... Keywords: biometrics, e-banking, e-finance, electronic banking, electronic finance, identity theft, internet, multifactor authentication, online ID theft, online banking, phishing, security token, web authentication

Seungjae Shin; Jerry Cunningham; Jungwoo Ryoo; Jack E. Tucci

2009-03-01T23:59:59.000Z

118

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network (OSTI)

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol of receivers, and tolerates packet loss. TESLA is based on loose time synchronization between the sender

Tygar, Doug

119

Improvement on Pretty-Simple Password Authenticated Key-Exchange Protocol for Wireless Networks  

Science Conference Proceedings (OSTI)

This paper presents an improved method inspired by the recently proposed Pretty-Simple PAKE (Password Authenticated Key-Exchange) protocol, which is already a well-known, robust and simple password authenticated key exchange scheme. In our even more ... Keywords: elliptic curve discrete logarithm, key exchange, password authentication, wireless network

Ting-Yi Chang; Chou-Chen Yang; Chia-Meng Chen

2004-04-01T23:59:59.000Z

120

Mobile one-time passwords: two-factor authentication using mobile phones  

Science Conference Proceedings (OSTI)

Static password authentication has security drawbacks. In two-factor authentication (2FA,) each user carries a device, called token, to generate passwords that are valid only one time. 2FA based on one-time passwords (OTPs) provides improved protection ... Keywords: nested hashing chain, one-time password, two-factor authentication

Mohamed Hamdy Eldefrawy; Muhammad Khurram Khan; Khaled Alghathbar; Tai-Hoon Kim; Hassan Elkamchouchi

2012-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Comparative study of multicast authentication schemes with application to wide-area measurement system  

Science Conference Proceedings (OSTI)

Multicasting refers to the transmission of a message to multiple receivers at the same time. To enable authentication of sporadic multicast messages, a conventional digital signature scheme is appropriate. To enable authentication of a multicast data ... Keywords: multicast authentication, multiple-time signature scheme, smart grid, wide-area measurement system

Yee Wei Law, Zheng Gong, Tie Luo, Slaven Marusic, Marimuthu Palaniswami

2013-05-01T23:59:59.000Z

122

Serious leisure, participation and experience in tourism: authenticity and ritual in a renaissance festival  

E-Print Network (OSTI)

This study examined the Texas Renaissance Festival as perceived and experienced by (serious) visitors for whom this was a form of regular, repeated and highly meaningful participation. Specifically, the focus was to gain understanding of the notion of serious leisure as defined by Stebbins, in the context of festivals, and to understand the meanings associated with festival participation. Following a qualitative (constructivism paradigm) research frame, the data were collected through participant observation and 37 in-depth interviews for highly committed tourists to the Texas Renaissance Festival. The collected data were analyzed through Grounded Theory techniques specified by Glaser (1978). In regard to the characteristics of participation, the results indicated that their continuous participation in the Texas Renaissance Festival displays qualities of serious leisure: 1) identification; 2) long-term career; 3) unique ethos; 4) significant personal effort; 5) perseverance; and 6) durable personal benefits. As they become more seriously involved in the festival participation, they tend to be a part of a well-integrated subculture of which prominent values include personal freedom, hedonism, and anti-materialism. The experiences constructed through the serious festival participation were reminiscent of tourism existential authenticity specified by Wang (1999) as two levels: intrapersonal authenticity (gaining one?s true self) and interpersonal authenticity (gaining true human relationship). A search of such authentic experiences at the festival seems to be partly driven by the perceived alienation in everyday life. When these aspects were examined from an interpretive and meaning-based approach, attending the festival in a serious manner is not just a simple matter of escaping from the reality (e.g., alienation) of everyday life, but is an active quest for an ?alternative? to their lives at home as many indicated. Thus, the serious participation in a tourism activity such as the Texas Renaissance Festival could be best understood as a dynamic process of attaining existential state of Being in response to diverse sociocultural conditions. Several significant theoretical propositions were made based on the results derived from this study. Additionally, marketing and management implications associated with staging tourism events and festivals were discussed.

Kim, Hyounggon

2004-12-01T23:59:59.000Z

123

Acting Associate State Director Authenticated by  

E-Print Network (OSTI)

Purpose: Provide updated planning procedures, role definitions, review responsibilities, and other guidance for land use planning in Oregon and Washington. Policy/Action: The attached 1601 Manual Supplement supersedes the Oregon State Manual Supplement 1631, Program Management, release 1-315, dated 03/06/2003. Timeframe: This guidance is in effect immediately. Background: This manual supplement release prescribes standards for preparing and reviewing resource management plans (RMPs), amendments and revisions, documenting plan monitoring and maintenance, and conducting periodic evaluations in Oregon and Washington. It establishes procedures and roles for quality assurance in the planning and related environmental analyses processes. It establishes planning areas when current or proposed resource management planning areas are not expected to coincide with resource area boundaries. It clarifies field office authority for initiation of plan revisions or amendments, including amendments which are integrated with implementation or activity level actions. It prescribes minimum records submission, retention, and posting for plans and supporting records.

Branch Chiefs; Cathy L. Harris; Rhondalyn J. Darnell

1969-01-01T23:59:59.000Z

124

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network (OSTI)

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Doran, Simon J.

125

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network (OSTI)

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

Dutertre, Bruno

126

Secure RFID authentication scheme for EPC class Gen2  

Science Conference Proceedings (OSTI)

Recently, much research has been actively conducted for a new kind of network environment ubiquitous computing. This paper will define the essential technology called "ad hoc network" and the "RFID technology" required by a ubiquitous environment. Therefore, ... Keywords: RFID, authentication, security

Dae-Hee Seo; Jang-Mi Baek; Dong-sub Cho

2009-02-01T23:59:59.000Z

127

Undercover: authentication usable in front of prying eyes  

Science Conference Proceedings (OSTI)

A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the design, implementation, and evaluation of a novel class of user authentication ... Keywords: multisensory processes, security, usability

Hirokazu Sasamoto; Nicolas Christin; Eiji Hayashi

2008-04-01T23:59:59.000Z

128

Mobile token-based authentication on a budget  

Science Conference Proceedings (OSTI)

We propose a light-weight, cheap authentication device for unlocking a user's smartphone. The device can be carried on a key chain and automatically unlocks the smartphone whenever its owner wants to use it. Our goal is to build a device that works with ...

Hristo Bojinov; Dan Boneh

2011-03-01T23:59:59.000Z

129

Security problems with a chaos-based deniable authentication scheme  

E-Print Network (OSTI)

Recently, a new scheme was proposed for deniable authentication. Its main originality lied on applying a chaos-based encryption-hash parallel algorithm and the semi-group property of the Chebyshev chaotic map. Although original and practicable, its insecurity and inefficiency are shown in this paper, thus rendering it inadequate for adoption in e-commerce.

G. Alvarez

2004-12-09T23:59:59.000Z

130

Hardware device to physical structure binding and authentication  

Science Conference Proceedings (OSTI)

Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

2013-08-20T23:59:59.000Z

131

Defining the questions: a research agenda for nontraditional authentication in arms control  

Science Conference Proceedings (OSTI)

Many traditional authentication techniques have been based on hardware solutions. Thus authentication of measurement system hardware has been considered in terms of physical inspection and destructive analysis. Software authentication has implied hash function analysis or authentication tools such as Rose. Continuity of knowledge is maintained through TIDs and cameras. Although there is ongoing progress improving all of these authentication methods, there has been little discussion of the human factors involved in authentication. Issues of non-traditional authentication include sleight-of-hand substitutions, monitor perception vs. reality, and visual diversions. Since monitor confidence in a measurement system depends on the product of their confidences in each authentication element, it is important to investigate all authentication techniques, including the human factors. This paper will present an initial effort to identify the most important problems that traditional authentication approaches in safeguards have not addressed and are especially relevant to arms control verification. This will include a survey of the literature and direct engagement with nontraditional experts in areas like psychology and human factors. Based on the identification of problem areas, potential research areas will be identified and a possible research agenda will be developed.

Hauck, Danielle K [Los Alamos National Laboratory; Mac Arthur, Duncan W [Los Alamos National Laboratory; Smith, Morag K [Los Alamos National Laboratory; Thron, Jonathan L [Los Alamos National Laboratory; Budlong - Sylvester, Kory [Los Alamos National Laboratory

2010-01-01T23:59:59.000Z

132

Group key management  

SciTech Connect

This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

Dunigan, T.; Cao, C.

1997-08-01T23:59:59.000Z

133

Authenticated group Diffie-Hellman key exchange: theory and practice  

SciTech Connect

Authenticated two-party Diffie-Hellman key exchange allows two principals A and B, communicating over a public network, and each holding a pair of matching public/private keys to agree on a session key. Protocols designed to deal with this problem ensure A (B resp.)that no other principals aside from B (A resp.) can learn any information about this value. These protocols additionally often ensure A and B that their respective partner has actually computed the shared secret value. A natural extension to the above cryptographic protocol problem is to consider a pool of principals agreeing on a session key. Over the years several papers have extended the two-party Diffie-Hellman key exchange to the multi-party setting but no formal treatments were carried out till recently. In light of recent developments in the formalization of the authenticated two-party Diffie-Hellman key exchange we have in this thesis laid out the authenticated group Diffie-Hellman key exchange on firmer foundations.

Chevassut, Olivier

2002-10-03T23:59:59.000Z

134

V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-057: eXtplorer "ext_find_user()" Authentication Bypass V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis December 28 2012 - 6:00am PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA51636 eXtplorer 2.1.3 Security Release IMPACT ASSESSMENT: Medium DISCUSSION: eXtplorer was notified of a problem within the authentication system of eXtplorer Versions 2.1.2, 2.1.1, 2.1.0 and 2.1.0RC5 that have been found to be vulnerable to an authentication bypass bug.

135

U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apache CXF Lets Remote Authenticated Users Execute 6: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions September 24, 2012 - 6:00am Addthis PROBLEM: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions PLATFORM: This vulnerability affects all released versions of Apache CXF. ABSTRACT: A vulnerability was reported in Apache CXF reference LINKS: SecurityTracker Alert ID: 1027554 Apache CXF Security Advisories Apache CXF Advisory - CVE-2012-3451 CVE-2012-3451 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache CXF. A remote authenticated user can execute unauthorized commands on the target web service. Impact: A remote authenticated user can execute potentially unauthorized actions on

136

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated 2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates February 28, 2012 - 8:45am Addthis PROBLEM: A vulnerability was reported in PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY DEFINER, a remote authenticated user can execute a trigger function and gain elevated privileges CVE-2012-0866.

137

U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apache CXF Lets Remote Authenticated Users Execute 6: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions September 24, 2012 - 6:00am Addthis PROBLEM: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions PLATFORM: This vulnerability affects all released versions of Apache CXF. ABSTRACT: A vulnerability was reported in Apache CXF reference LINKS: SecurityTracker Alert ID: 1027554 Apache CXF Security Advisories Apache CXF Advisory - CVE-2012-3451 CVE-2012-3451 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache CXF. A remote authenticated user can execute unauthorized commands on the target web service. Impact: A remote authenticated user can execute potentially unauthorized actions on

138

V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct 5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks May 14, 2013 - 12:08am Addthis PROBLEM: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks PLATFORM: Tomcat 6.0.21 to 6.0.36, 7.0.0 to 7.0.32 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat SecurityTracker Alert ID: 1028534 CVE-2013-2067 IMPACT ASSESSMENT: High DISCUSSION: A remote user can repeatedly send a specially crafted request for a resource requiring authentication while the target user is completing the login form to cause the FORM authentication process to execute the remote user's request with the privileges of the target user.

139

T-606: Sun Java System Access Manager Lets Remote Users Partially Modify  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

06: Sun Java System Access Manager Lets Remote Users Partially 06: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data April 20, 2011 - 3:58am Addthis PROBLEM: Two vulnerabilities were reported in Sun Java System Access Manager. A remote authenticated user can partially access data on the target system. A remote user can partially modify data on the target system. PLATFORM: Sun Java versions 7.1, 8.0 ABSTRACT: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data. reference LINKS: SecurityTracker Alert ID: 1025408 CVE-2011-0844 CVE-2011-0847 Oracle Critical Patch Update Advisory

140

The Emotional and Spiritual Dimensions of Being a Pastor: Authenticity and Identity  

E-Print Network (OSTI)

Emotional labor and its influence on authenticity and identity amongst human service workers has been the focus of numerous studies. Often these studies viewed identity as a stable sense of self. This study set out to examine emotional labor amongst clergy and how it may differ from the emotional labor experienced in other occupations, with the premise that individuals have multiple identities that shift and change depending on the situational context. A thematic analysis of interviews conducted with twenty-seven clergy and a textual analysis of denominational/church texts was conducted to examine the following ideas: 1) how clergy negotiated tensions of authenticity and identity in their work; 2) how clergy described the spiritual and emotional dimensions of their work; 3) how denominational texts address issues of spiritual and emotional labor; and, 4) if clergy felt enabled and/or constrained by denominational standards and beliefs. The results of this study indicated that emotional and spiritual labor amongst clergy is unique for several reasons. One, the emotional labor clergy engaged in served a positive function because they see it as means of helping others. Second, clergy were aware that emotional labor was intrinsic to the job and they engaged in activities to preempt or manage the tension they felt when the job required them to mask their true feelings and display organizationally preferred feelings. Finally, clergy enjoyed the spiritual dimension of their jobs; thus they were engaged in spiritual work (authentic spirituality), not spiritual labor (inauthentic spirituality). Results also indicated that denominational texts did convey a preferred identity or ideal for how pastors should behave. Pastors indicated that the denominational expectations and guidelines for pastors both enabled and constrained them. The majority of the pastors felt the freedom to disagree civilly and the denomination/church provided venues in which pastors could communicate their dissenting views. However, in some cases, pastors felt the denominational guidelines for the "ideal pastor" were in conflict with how they saw their own role as pastor and they left the denomination. Results also revealed how pastors identities shifted and changed as the context in which they were ministering changed.

Otey, Penny Addison

2010-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the target system. A remote authenticated user can execute SQL commands on the underlying database. A remote user can spoof connections in certain cases. Solution: The vendor has...

142

Counterfeit-resistant materials and a method and apparatus for authenticating materials  

DOE Patents (OSTI)

Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters, the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided&

Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

2001-01-01T23:59:59.000Z

143

Counterfeit-resistant materials and a method and apparatus for authenticating materials  

DOE Patents (OSTI)

Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

2000-01-01T23:59:59.000Z

144

Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party Key Agreement Protocols  

E-Print Network (OSTI)

Recently, Al-Riyami and Paterson [1] proposed four authenticated tripartite key agreement protocols which make use of Weil pairing. In this paper, we show...

Kyungah Shim

2003-01-01T23:59:59.000Z

145

V-236: MediaWiki CentralAuth Extension Authentication Bypass...  

NLE Websites -- All DOE Office Websites (Extended Search)

IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an error when handling auto-logins and can be exploited to bypass the authentication mechanism by...

146

Instructions for Using Secure Email via Outlook Web Access | Department of  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Email via Outlook Web Access Secure Email via Outlook Web Access Instructions for Using Secure Email via Outlook Web Access Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. Secure Email Requirements: An EITS provided Exchange email account An EITS provided RSA SecureID Token with an active account in the EITS-managed RSA Authentication Server Appropriate access granted Active Directory group membership DOEnet or Internet access and a supported web browser Secure Email Login Procedure: Enter https://smail.doe.gov/ in the address field of your Internet browser. The Outlook Web Access window appears. When using an RSA SecurID hardware token: Enter your user name in the User name field. Enter your password, which is your RSA token PIN plus the number

147

Leveraging Personal Devices for Stronger Password Authentication from Untrusted Computers  

E-Print Network (OSTI)

Internet authentication for popular end-user transactions, such as online banking and e-commerce, continues to be dominated by passwords entered through end-user personal computers (PCs). Most users continue to prefer (typically untrusted) PCs over smaller personal devices for actual transactions, due to usability features related to keyboard and screen size. However most such transactions and their existing underlying protocols are vulnerable to attacks including keylogging, phishing, and pharming, which can extract user identity and sensitive account information allowing account access. We propose a simple approach to counter such attacks, which cryptographically separates a users long-term secret input (typically low-entropy password) from the client PC. The latter continues to be used for most of the interaction and computations but has access only to temporary secrets, while the users long-term secret is input through an independent personal trusted device such as a cellphone which makes it available to the PC only after encryption under the intended far-end recipients public key. Our proposal is intended to safeguard passwords from the attacks mentioned above, as well as to provide transaction security to foil session hijacking. To facilitate a comparison to our proposal, we also provide a comprehensive survey of web authentication techniques that use an additional factor of authentication such as a cellphone, PDA (personal digital assistant) or hardware token; this survey may be of independent interest. A proof sketch of MP-Auth using the Protocol Composition Logic (PCL) is also provided.

Mohammad Mannan; P. C. van Oorschot

2008-01-01T23:59:59.000Z

148

Final report and recommendations of the ESnet Authentication Pilot Project  

Science Conference Proceedings (OSTI)

To conduct their work, U.S. Department of Energy (DOE) researchers require access to a wide range of computing systems and information resources outside of their respective laboratories. Electronically communicating with peers using the global Internet has become a necessity to effective collaboration with university, industrial, and other government partners. DOE`s Energy Sciences Network (ESnet) needs to be engineered to facilitate this {open_quotes}collaboratory{close_quotes} while ensuring the protection of government computing resources from unauthorized use. Sensitive information and intellectual properties must be protected from unauthorized disclosure, modification, or destruction. In August 1993, DOE funded four ESnet sites (Argonne National Laboratory, Lawrence Livermore National Laboratory, the National Energy Research Supercomputer Center, and Pacific Northwest Laboratory) to begin implementing and evaluating authenticated ESnet services using the advanced Kerberos Version 5. The purpose of this project was to identify, understand, and resolve the technical, procedural, cultural, and policy issues surrounding peer-to-peer authentication in an inter-organization internet. The investigators have concluded that, with certain conditions, Kerberos Version 5 is a suitable technology to enable ESnet users to freely share resources and information without compromising the integrity of their systems and data. The pilot project has demonstrated that Kerberos Version 5 is capable of supporting trusted third-party authentication across an inter-organization internet and that Kerberos Version 5 would be practical to implement across the ESnet community within the U.S. The investigators made several modifications to the Kerberos Version 5 system that are necessary for operation in the current Internet environment and have documented other technical shortcomings that must be addressed before large-scale deployment is attempted.

Johnson, G.R.; Moore, J.P. [Pacific Northwest Lab., Richland, WA (United States); Athey, C.L. [Lawrence Livermore National Lab., CA (United States); Engert, D.E. [Argonne National Lab., IL (United States); Ramus, J.E. [National Energy Research Supercomputer Center, Livermore, CA (United States)

1995-01-01T23:59:59.000Z

149

BABAR Web job submission with Globus Authentication and AFS Access  

Science Conference Proceedings (OSTI)

We present two versions of a grid job submission system produced for the BaBar experiment. Both use globus job submission to process data spread across various sites, producing output which can be combined for analysis. The problems encountered with authorization and authentication, data location, job submission, and the input and output sandboxes are described, as are the solutions. The total system is still some way short of the aims of enterprises such as the EDG, but represent a significant step along the way.

Forti, Alessandra

2003-06-17T23:59:59.000Z

150

A framework for federated two-factor authentication enabling cost-effective secure access to distributed cyberinfrastructure  

Science Conference Proceedings (OSTI)

As cyber attacks become increasingly sophisticated, the security measures used to mitigate the risks must also increase in sophistication. One time password (OTP) systems provide strong authentication because security credentials are not reusable, thus ... Keywords: OTP, XSEDE, authentication, radius

Matthew A. Ezell; Gary L. Rogers; Gregory D. Peterson

2012-07-01T23:59:59.000Z

151

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider  

E-Print Network (OSTI)

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider Department In this paper we consider the nature of machine proofs used in the CSP approach to the veri cation of authentication protocols using the process algebra CSP Hoa85]. The CSP syntax provides a natural and precise way

Doran, Simon J.

152

The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network (OSTI)

The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss­tolerant Authentication) broadcast au­ thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro­ nization between

Perrig, Adrian

153

Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME  

E-Print Network (OSTI)

Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME Presented, Washington, DC 20375 E-mail: archer@itd.nrl.navy.mil The TESLA multicast stream authentication protocol just been revealed. While an informal argument for the correctness of TESLA has been published

154

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network (OSTI)

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast au- thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro- nization between

Perrig, Adrian

155

Attacks and improvements to an RIFD mutual authentication protocol and its extensions  

Science Conference Proceedings (OSTI)

In WiSec'08, Song and Mitchell proposed an RFID mutual authentication protocol. Song also extended this protocol for RFID tag ownership transfer. These two protocols are designed to have the most security properties in the literature. We discover that, ... Keywords: authentication, privacy, rfid, security

Shaoying Cai; Yingjiu Li; Tieyan Li; Robert H. Deng

2009-03-01T23:59:59.000Z

156

Transaction-based authentication and key agreement protocol for inter-domain VoIP  

Science Conference Proceedings (OSTI)

We present an authentication and key agreement protocol to secure Voice over IP call establishment between interconnection proxies of different domains. The protocol operates on a transaction basis. Each transaction is defined as the set of operations ... Keywords: Authentication, DDoS Protection, Inter-domain VoIP, Synchronisation, VoIP security

Patrick Battistello; Joaquin Garcia-Alfaro; Cyril DelTr

2012-09-01T23:59:59.000Z

157

Security Analysis of Lightweight Authentication Protocol from WISTP 2013 Wang Shao-HuiP  

E-Print Network (OSTI)

Security Analysis of Lightweight Authentication Protocol from WISTP 2013 Wang Shao-HuiP 1,2,3) P Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China) P 3) P( Network and Data Security Frequency Identification (RFID) is security and privacy. Many RFID authentication protocols have been

International Association for Cryptologic Research (IACR)

158

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems  

E-Print Network (OSTI)

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

Wang, Yongge

159

T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

94: IBM solidDB Password Hash Authentication Bypass 94: IBM solidDB Password Hash Authentication Bypass Vulnerability T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability April 4, 2011 - 6:08am Addthis PROBLEM: A vulnerability has been reported in IBM solidDB, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: IBM solidDB 4.x - IBM solidDB 6.x ABSTRACT: This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability. REFERENCE LINKS: IBM Security Alert Secunia Advisory: SA44030 ZDI Advisory: ZDI-11-115 IBM solidDB Support IMPACT ASSESSMENT: Medium Discussion: The specific flaw exists within the solid.exe process which listens by default on TCP ports 1315, 1964 and 2315. The authentication protocol

160

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

162

INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7/2013 Page 1 7/2013 Page 1 INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA) Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. HSPD-12 OWA REQUIREMENTS:  An EITS provided Exchange email account  A DOE issued HSPD-12 badge  DOEnet or Internet access and a supported web browser  A smart card reader installed* on your computer (*Windows Vista, Windows XP, MAC OS X 10.7 & 10.8, will also require smart card software to be installed in order to read the HSPD-12 badge) HSPD-12 OWA LOGIN PROCEDURE: 1. Insert HSPD-12 badge into card reader

163

Holographic Labeling And Reading Machine For Authentication And Security Appications  

DOE Patents (OSTI)

A holographic security label and automated reading machine for marking and subsequently authenticating any object such as an identification badge, a pass, a ticket, a manufactured part, or a package is described. The security label is extremely difficult to copy or even to read by unauthorized persons. The system comprises a holographic security label that has been created with a coded reference wave, whose specification can be kept secret. The label contains information that can be extracted only with the coded reference wave, which is derived from a holographic key, which restricts access of the information to only the possessor of the key. A reading machine accesses the information contained in the label and compares it with data stored in the machine through the application of a joint transform correlator, which is also equipped with a reference hologram that adds additional security to the procedure.

Weber, David C. (Rancho Santa Margarita, CA); Trolinger, James D. (Costa Mesa, CA)

1999-07-06T23:59:59.000Z

164

Management  

E-Print Network (OSTI)

Research has indicated that, depending upon driver and passenger characteristics, passengers can have either a positive or negative influence upon driver behaviour. In conclusion to a recent study investigating the roles that passengers can play to influence, positively and negatively, driver behaviour, Regan and Mitsopoulos (2001) recommended, among other things, that the principles of Crew Resource Management (CRM) training may increase passengers ability to positively influence driver behaviour and also drivers ability to accept constructive feedback. The present study investigated the potential application of CRM training within young driver training in the Australian Capital Territory (ACT). This involved a literature review, an analysis of the differences between the driving and aviation domains, an analysis of the team-based activities and the knowledge, skills and attitudes required during driving to perform those activities, consultation with CRM experts from the aviation and medicine domains and the conduct of six focus groups involving young learner drivers, provisional licence drivers and course teachers. The findings indicate that CRM training as part of young driver training in the ACT is a viable concept to pursue. The application of CRM training within young driver training has potential to significantly enhance the positive and reduce the negative effects of passengers on young driver behaviour, and thus the safety of young drivers and passengers alike. The outcomes of this study formed the basis for a set of recommendations for the development of a young driver CRM training program in the ACT.

Young Drivers; Eve Mitsopoulos; Michael Regan; Janet Anderson; Paul Salmon; Jessica Edquist; Ii Report Documentation Page

2005-01-01T23:59:59.000Z

165

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 19, 2011 August 19, 2011 T-697: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible. August 18, 2011 T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. August 16, 2011 T-694: IBM Tivoli Federated Identity Manager Products Multiple

166

U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

54: Webmin Flaws Let Remote Authenticated Users Execute 54: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files September 10, 2012 - 6:00am Addthis PROBLEM: Webmin Multiple Input Validation Vulnerabilities PLATFORM: The vulnerabilities are reported in version 1.580. Other versions may also be affected. ABSTRACT: An authenticated attacker may be able to execute arbitrary commands. reference LINKS: Webmin Security Alerts Bugtraq ID: 55446 Secunia Advisory SA50512 SecurityTracker Alert ID: 1027507 US CERT Vulnerability Note VU#788478 CVE-2012-2981 CVE-2012-2982 CVE-2012-2983 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities have been reported in Webmin, which can be exploited by malicious users to compromise a vulnerable system and by

167

V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: MediaWiki CentralAuth Extension Authentication Bypass 6: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability September 6, 2013 - 4:36am Addthis PROBLEM: A vulnerability has been reported in the CentralAuth extension for MediaWiki, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: MediaWiki CentralAuth Extension ABSTRACT: A vulnerability has been reported in the CentralAuth extension for MediaWik REFERENCE LINKS: Secunia Advisory SA54723 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an error when handling auto-logins and can be exploited to bypass the authentication mechanism by providing a valid username within the "centralauth_User" cookie. IMPACT:

168

V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP-UX Directory Server Discloses Passwords to Remote 6: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users May 29, 2013 - 12:32am Addthis PROBLEM: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users PLATFORM: Directory Server B.08.10.04 ABSTRACT: Two vulnerabilities were reported in HP-UX Directory Server. REFERENCE LINKS: HP Document ID: c03772083 SecurityTracker Alert ID: 1028593 CVE-2012-2678 CVE-2012-2746 IMPACT ASSESSMENT: High DISCUSSION: A local user can access the plaintext password in certain cases [CVE-2012-2678]. A remote authenticated user can can view the password for a target LDAP user when audit logging is enabled by reading the audit log [CVE-2012-2678].

169

Provably-Secure two-round password-authenticated group key exchange in the standard model  

Science Conference Proceedings (OSTI)

Password-authenticated group key exchange (PAGKE) allows group users to share a session key using a human-memorable password only. The fundamental security goal of PAGKE is security against dictionary attacks. Several solutions have been proposed ...

Jeong Ok Kwon; Ik Rae Jeong; Dong Hoon Lee

2006-10-01T23:59:59.000Z

170

Olive Oil: Chemistry and Technology, 2nd EditionChapter 7 Analysis and Authentication  

Science Conference Proceedings (OSTI)

Olive Oil: Chemistry and Technology, 2nd Edition Chapter 7 Analysis and Authentication Food Science Health Nutrition Biochemistry Processing eChapters Food Science & Technology Health - Nutrition - Biochemistry Processing Press

171

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6, 2012 6, 2012 U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information. July 5, 2012 U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. July 3, 2012 U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The

172

The Use of Timed Efficient Stream Loss-Tolerant Authentication (TESLA  

E-Print Network (OSTI)

This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards " (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2006). This memo describes the use of the Timed Efficient Stream Losstolerant Authentication (RFC 4082) transform within the Secure Realtime Transport Protocol (SRTP), to provide data origin authentication

M. Baugher; E. Carrara

2006-01-01T23:59:59.000Z

173

T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a 5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in OpenLDAP. A remote user can authenticate without a valid password. PLATFORM: Open LDAP version(s) 2.4.12 - 2.2.24 ABSTRACT: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password. reference LINKS: SecurityTracker Alert ID:1025190 Secunia Advisory:SA43331 OpenLDAP Issue OpenLDAP Download CVE-2011-1025 IMPACT ASSESSMENT: Medium Discussion: A remote user with knowledge of the target distinguished name can provide an arbitrary password to successfully authenticate on systems using the NDB back-end. Impact: Some vulnerabilities have been reported in OpenLDAP, which can be exploited

174

V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: eXtplorer "ext_find_user()" Authentication Bypass 7: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA51636 eXtplorer 2.1.3 Security Release IMPACT ASSESSMENT: Medium DISCUSSION: eXtplorer was notified of a problem within the authentication system of eXtplorer Versions 2.1.2, 2.1.1, 2.1.0 and 2.1.0RC5 that have been found to be vulnerable to an authentication bypass bug. IMPACT: An error within the "ext_find_user()" function in users.php can be

175

AUTHENTICATED SENSOR INTERFACE DEVICE FOR JOINT USE SAFEGUARDS APPLICATIONS - CONCEPTS AND CHALLENGES  

SciTech Connect

This paper will discuss the key features of the Authenticated Sensor Interface Device that collectively provide the ability to share data among a number of parties while ensuring the authentication of data and protecting both the operators and the IAEAs interests. The paper will also discuss the development of the prototype, the initial testing with an accountancy scale, and future plans and challenges to implementation into the joint use and remote monitoring applications. As nuclear fuel cycle technology becomes more prevalent throughout the world and the capacity of plants increases, limited resources of the IAEA are being stretched near a breaking point. A strategy is to increase efficiency in safeguards monitoring using joint use equipment that will provide the facility operator process data while also providing the IAEA key safeguards data. The data, however, must be authenticated and validated to ensure the data have not been tampered with. The Authenticated Sensor Interface Device provides the capability to share data and can be a valuable component in the IAEAs ability to collect accountancy data from scales in Uranium conversion and enrichment plants, as well as nuclear fuel fabrication plants. Likewise, the Authenticated Sensor Interface Device can be configured to accept a diverse array of input signals, ranging from analog voltage, to current, to digital interfaces and more. These modular capabilities provide the ability to collect authenticated, joint-use, data streams from various process monitoring sensors.

Poland, R.; Drayer, R.; Wilson, J.

2013-08-12T23:59:59.000Z

176

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Medium Impact Medium Impact Assessment Bulletins JC3 Medium Impact Assessment Bulletins RSS December 4, 2012 V-039: Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability Samsung has issued a security advisory and an optional firmware update for all current Samsung networked laser printers and multifunction devices to enhance Simple Network Management Protocol (SNMP) security. November 30, 2012 V-037: Wireshark Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Wireshark. November 29, 2012 V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. November 27, 2012 V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws

177

Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population  

E-Print Network (OSTI)

In this paper, we propose an HB-like protocol for privacy-preserving authentication of RFID tags, whereby a tag can remain anonymous and untraceable to an adversary during the authentication process. Previous proposals of such protocols were based on PRF computations. Our protocol can instead be used on low-cost tags that may be incapable of computing standard PRFs. Moreover, since the underlying computations in HB protocols are very efficient, our protocol also reduces reader load compared to PRF-based protocols. We suggest a tree-based approach that replaces the PRF-based authentication from prior work with a procedure such as HB+ or HB#. We optimize the tree- traversal stage through usage of a "light version" of the underlying protocol and shared random challenges across all levels of the tree. This provides significant reduction of the communication resources, resulting in a privacy-preserving protocol almost as efficient as the underlying HB+ or HB#

Halevi, Tzipora; Halevi, Shai

2009-01-01T23:59:59.000Z

178

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 12, 2013 June 12, 2013 V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Adobe Flash Player. June 10, 2013 V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files A vulnerability was reported in RSA Authentication Manager. June 5, 2013 V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks Several vulnerabilities were reported in Apple Safari. June 4, 2013 V-170: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability A vulnerability has been reported in Apache Subversion. June 3, 2013 V-169: Linux Kernel "iscsi_add_notunderstood_response()" Buffer Overflow

179

V-231: Cisco Identity Services Engine Discloses Authentication...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents...

180

Probabilistic Non-Repudiation for Source Authentication with TESLA Certificates in Hybrid Satellite/Wireless Networks and  

E-Print Network (OSTI)

Probabilistic Non-Repudiation for Source Authentication with TESLA Certificates in Hybrid Satellite describe a novel non-repudiation mechanism for an authentication protocol based on the extended TESLA to this problem, we have proposed a new class of lightweight, symmetric key certificates called extended TESLA

Baras, John S.

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

A Tree-Based TESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu Sushil Jajodia  

E-Print Network (OSTI)

A Tree-Based µTESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu to multiple nodes in an authenticated way. µTESLA and multi-level µTESLA have been proposed to provide of senders. Though multi-level µTESLA schemes can scale up to large sensor networks (in terms of receivers

Zhu, Sencun

182

An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings  

Science Conference Proceedings (OSTI)

With the continue evaluation of mobile devices in terms of the capabilities and services, security concerns increase dramatically. To provide secured communication in mobile client-server environment, many user authentication protocols from pairings ... Keywords: Bilinear pairing, ID-based, Key agreement, Mobile device, Mutual authentication, Provable security

Debiao He

2012-08-01T23:59:59.000Z

183

Design and development of a mobile EPC-RFID-based self-validation system (MESS) for product authentication  

Science Conference Proceedings (OSTI)

The increase in the number of counterfeits penetrating into the open market has created the need for a product authentication approach in tracing and tracking the product anytime, anywhere. Owing to the vague concepts frequently represented in flow of ... Keywords: Anti-counterfeit system, Counterfeiting, Electronic product code (EPC), Product authentication, Radio frequency identification (RFID)

S. K. Kwok; Jacky S. L. Ting; Albert H. C. Tsang; W. B. Lee; Benny C. F. Cheung

2010-09-01T23:59:59.000Z

184

SSH: secure login connections over the internet  

Science Conference Proceedings (OSTI)

SSH provides secure login, file transfer, X11, and TCP/IP connections over an untrusted network. It uses cryptographic authentication, automatic session encryption, and integrity protection for transferred data. RSA is used for key exchange and authentication, ...

Tatu Ylnen

1996-07-01T23:59:59.000Z

185

U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: McAfee Email Gateway Lets Remote Users Bypass Authentication 4: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks August 27, 2012 - 7:00am Addthis PROBLEM: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks PLATFORM: McAfee Email Gateway (MEG) 7.0.0 and 7.0.1 (MEG 6.7.x is NOT affected.) McAfee Email and Web Security (EWS) 5.6 Patch 3 and earlier McAfee Email and Web Security (EWS) 5.5 Patch 6 and earlier ABSTRACT: Several vulnerabilities were reported in McAfee Email Gateway. reference LINKS: McAfee Security Bulletin ID: SB10026 SecurityTracker Alert ID: 1027444

186

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote 11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories July 12, 2012 - 7:00am Addthis PROBLEM: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories PLATFORM: EMC Celerra Network Server versions 6.0.36.4 through 6.0.60.2 EMC VNX versions 7.0.12.0 through 7.0.53.1 EMC VNXe 2.0 (including SP1, SP2, and SP3) EMC VNXe MR1 (including SP1, SP2, SP3, and SP3.1) EMC VNXe MR2 (including SP0.1) ABSTRACT: A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system. reference LINKS: The Vendor's Advisory

187

U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

44: McAfee Email Gateway Lets Remote Users Bypass Authentication 44: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks August 27, 2012 - 7:00am Addthis PROBLEM: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks PLATFORM: McAfee Email Gateway (MEG) 7.0.0 and 7.0.1 (MEG 6.7.x is NOT affected.) McAfee Email and Web Security (EWS) 5.6 Patch 3 and earlier McAfee Email and Web Security (EWS) 5.5 Patch 6 and earlier ABSTRACT: Several vulnerabilities were reported in McAfee Email Gateway. reference LINKS: McAfee Security Bulletin ID: SB10026 SecurityTracker Alert ID: 1027444

188

Can we fix the security economics of federated authentication? (transcript of discussion)  

Science Conference Proceedings (OSTI)

OK, so the talk that I've got today is entitled "Can We Fix the Security Economics of Federated Authentication?" and some of this is stuff that I did while I was at Google in January and February. I'm on sabbatical this year and so I'm visiting various ...

Ross Anderson

2011-03-01T23:59:59.000Z

189

Strong password-based authentication in TLS using the three-party group Diffie Hellman protocol  

Science Conference Proceedings (OSTI)

The internet has evolved into a very hostile ecosystem where 'phishing' attacks are common practice. This paper shows that the three-party group Diffie-Hellman key exchange can help protect against these attacks. We have developed password-based ... Keywords: TLS, cryptography, group Diffie Hellman key exchange, networks, password authentication, phishing attacks, transport layer security

Michel Abdalla; Emmanuel Bresson; Olivier Chevassut; Bodo Moller; David Pointcheval

2007-04-01T23:59:59.000Z

190

Security Analysis and Implementation of JUITImage Based Authentication System Using Kerberos Protocol  

Science Conference Proceedings (OSTI)

Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. The need for something more secure along ... Keywords: Image Based Authentication System, AJAX, MySQL, Diffie-Hellman key Exchange, Kerberos Protocol, Keystroke Logging, Tempest Attack, Shoulder Attack, Brute-force Attack

Nitin; Durg Singh Chauhan; Vivek Kumar Sehgal; Ankit Mahanot; Pallavi Singh; Sohit Ahuja; Utkarsh Shrivastava; Manisha Rana; Vineet Punjabi; Shivam Vinay; Nakul Sharma

2008-05-01T23:59:59.000Z

191

Authentication of images for 3D cameras: Reversibly embedding information using intelligent approaches  

Science Conference Proceedings (OSTI)

In this work, a reversible watermarking approach for authentication of 3D cameras based on computational intelligence is presented. Two intelligent techniques based on differential evolution (DE) and hybrid DE are employed to optimize the tradeoff between ... Keywords: 3D camera, Depth maps, Differential evolution algorithm, Integer wavelet transform, Particle swarm optimization, Reversible watermarking

Sana Ambreen Malik; Asifullah Khan; Mutawarra Hussain; Khurram Jawad; Rafiullah Chamlawi; Abdul Jalil

2012-11-01T23:59:59.000Z

192

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

September 28, 2012 September 28, 2012 U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands Trend Micro has been notified of a potential product vulnerability in Control Manager. September 27, 2012 U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service A vulnerability was reported in Cisco IOS. September 26, 2012 U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users A vulnerability was reported in Oracle Database. September 25, 2012 U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability Multiple RSA Products Authentication Bypass Vulnerability September 21, 2012 U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain

193

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Barracuda SSL VPN Bug Lets Remote Users Bypass 7: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication January 25, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN. PLATFORM: The vulnerability has been verified to exist in Barracuda SSL VPN version 2.2.2.203 ABSTRACT: A remote user can gain administrative access to the target system. REFERENCE LINKS: SecurityTracker Alert ID: 1028039 Barracuda Networks Advisory IMPACT ASSESSMENT: High DISCUSSION: A remote user can set a specially crafted Java system property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database dumps, shutdown the system, and set new administrative

194

WIPP Transparency Project - container tracking and monitoring demonstration using the Authenticated Tracking and Monitoring System (ATMS)  

SciTech Connect

The Authenticated Tracking and Monitoring System (ATMS) is designed to answer the need for global monitoring of the status and location of proliferation-sensitive items on a worldwide basis, 24 hours a day. ATMS uses wireless sensor packs to monitor the status of the items within the shipment and surrounding environmental conditions. Receiver and processing units collect a variety of sensor event data that is integrated with GPS tracking data. The collected data are transmitted to the International Maritime Satellite (INMARSAT) communication system, which then sends the data to mobile ground stations. Authentication and encryption algorithms secure the data during communication activities. A typical ATMS application would be to track and monitor the stiety and security of a number of items in transit along a scheduled shipping route. The resulting tracking, timing, and status information could then be processed to ensure compliance with various agreements.

SCHOENEMAN, J. LEE; SMARTT, HEIDI ANNE; HOFER, DENNIS

2000-01-27T23:59:59.000Z

195

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

71 - 22680 of 26,764 results. 71 - 22680 of 26,764 results. Article Small Wind Electric Systems Small wind electric systems are one of the most cost-effective home-based renewable energy systems -- with zero emissions and pollution. http://energy.gov/energysaver/articles/small-wind-electric-systems Article T-642: RSA SecurID update to Customers RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products http://energy.gov/cio/articles/t-642-rsa-securid-update-customers Article T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID RSA investigation has revealed that the attack resulted in certain

196

V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote 1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service November 22, 2012 - 3:00am Addthis PROBLEM: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service PLATFORM: Version(s): XC10 2.0.0.0 - 2.0.0.3, 2.1.0.0 - 2.1.0.2 ABSTRACT: Several vulnerabilities were reported in IBM WebSphere DataPower. REFERENCE LINKS: IBM Security Bulletin SecurityTracker Alert ID: 1027798 CVE-2012-5758 CVE-2012-5759 CVE-2012-5756 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in IBM WebSphere DataPower. A remote

197

U-201: HP System Management Homepage Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP System Management Homepage Bugs Let Remote Users Deny 1: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in HP System Management Homepage. PLATFORM: Version(s): prior to 7.1.1 ABSTRACT: The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code. Reference links: Original Advisory Security Tracker ID 1027209 CVE-2012-2012, CVE-2012-2013, CVE-2012-2014 CVE-2012-2015, CVE-2012-2016 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP System Management Homepage. A remote authenticated user can gain elevated privileges. A remote authenticated

198

Verified implementations of the information card federated identity-management protocol  

Science Conference Proceedings (OSTI)

We describe reference implementations for selected configurations of the user authentication protocol defined by the Information Card Profile V1.0. Our code can interoperate with existing implementations of the roles of the protocol (client, identity ... Keywords: CardSpace, cryptographic protocol verification, federated identity management, verified implementations, web services security

Karthikeyan Bhargavan; Cdric Fournet; Andrew D. Gordon; Nikhil Swamy

2008-03-01T23:59:59.000Z

199

Using a personal device to strengthen password authentication from an untrusted computer  

E-Print Network (OSTI)

Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users financial accounts. Most existing or proposed solutions are vulnerable to session hijacking attacks. We propose a simple approach to counter these attacks, which cryptographically separates a users long-term secret input from (typically untrusted) client PCs; a client PC performs most computations but has access only to temporary secrets. The users long-term secret (typically short and low-entropy) is input through an independent personal trusted device such as a cellphone. The personal device provides a users long-term secrets to a client PC only after encrypting the secrets using a pre-installed, correct public key of a remote service (the intended recipient of the secrets). The proposed protocol (MP-Auth) realizes such an approach, and is intended to safeguard passwords from keyloggers, other malware (including rootkits), phishing attacks and pharming, as well as to provide transaction security to foil session hijacking. We report on a prototype implementation of MP-Auth, and provide a comparison of web authentication techniques that use an additional factor of authentication (e.g. a cellphone, PDA or hardware token).

Mohammad Mannan; P. C. van Oorschot

2007-01-01T23:59:59.000Z

200

Sensible Authentication  

Science Conference Proceedings (OSTI)

The problem with securing assets and their functionality is that, by definition, you don't want to protect them from everybody. It makes no sense to protect assets from their owners, or from other authorized individuals (including the trusted personnel ...

Bruce Schneier

2004-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for  

E-Print Network (OSTI)

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for Smart Grid Communications Mostafa M. Fouda, Member, IEEE, Zubair Md. Fadlullah, Member Abstract--Smart grid (SG) communication has recently received significant attentions to facilitate

Shen, Xuemin "Sherman"

202

EER of fixed and trainable fusion classifiers: A theoretical study with application to biometric authentication tasks  

E-Print Network (OSTI)

Biometric authentication is a process of verifying an identity claim using a persons behavioural and physiological characteristics. Due to the vulnerability of the system to environmental noise and variation caused by the user, fusion of several biometric-enabled systems is identified as a promising solution. In the literature, various fixed rules (e.g. min, max, median, mean) and trainable classifiers (e.g. linear combination of scores or weighted sum) are used to combine the scores of several base-systems. How exactly do correlation and imbalance nature of base-system performance affect the fixed rules and trainable classifiers? We study these joint aspects using the commonly used error measurement in biometric authentication, namely Equal Error Rate (EER). Similar to several previous studies in the literature, the central assumption used here is that the class-dependent scores of a biometric system are approximately normally distributed. However, different from them, the novelty of this study is to make a direct link between the EER measure and the fusion schemes mentioned. Both synthetic and real experiments (with as many as 256 fusion experiments carried out on the XM2VTS benchmark score-level fusion data sets) verify our proposed theoretical modeling of EER of the two families of combination scheme. In particular, it is found that weighted sum can provide the best generalisation performance when its weights are estimated correctly. It also has the additional advantage that score normalisation prior to fusion is not needed, contrary to the rest of fixed fusion rules.

Norman Poh; Samy Bengio

2005-01-01T23:59:59.000Z

203

T-703: Cisco Unified Communications Manager Open Query Interface Lets  

NLE Websites -- All DOE Office Websites (Extended Search)

703: Cisco Unified Communications Manager Open Query Interface 703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents August 26, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in Cisco Unified Communications Manager. A remote user can obtain database contents PLATFORM: Cisco Unified Communications Manager 6.x, 7.x, 8.0, 8.5 ABSTRACT: A remote user can obtain database contents, including authentication credentials. reference LINKS: SecurityTracker Alert ID: 1025971 Cisco Document ID: 113190 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Cisco Unified Communications Manager. A remote user can obtain database contents. A remote user can access an open

204

V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Symantec Endpoint Protection Manager Buffer Overflow 2: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability June 20, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Symantec Endpoint Protection Manager PLATFORM: The vulnerability is reported in versions 12.1.x prior to 12.1 RU3 ABSTRACT: Symantec was notified of a pre-authentication buffer overflow found in the Symantec Endpoint Protection Manager (SEPM) and Symantec Endpoint Protection Center (SPC) REFERENCE LINKS: Secunia Advisory SA53864 SecurityTracker Alert ID: 1028683 Symantec Adivsory SYM13-005 CVE-2013-1612 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to a boundary error within secars.dll and can be exploited to cause a buffer overflow via the web-based management

205

V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

82: Symantec Endpoint Protection Manager Buffer Overflow 82: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability June 20, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Symantec Endpoint Protection Manager PLATFORM: The vulnerability is reported in versions 12.1.x prior to 12.1 RU3 ABSTRACT: Symantec was notified of a pre-authentication buffer overflow found in the Symantec Endpoint Protection Manager (SEPM) and Symantec Endpoint Protection Center (SPC) REFERENCE LINKS: Secunia Advisory SA53864 SecurityTracker Alert ID: 1028683 Symantec Adivsory SYM13-005 CVE-2013-1612 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to a boundary error within secars.dll and can be exploited to cause a buffer overflow via the web-based management

206

A privilege management and enforcement system for distributed resource sharing  

Science Conference Proceedings (OSTI)

The Internet has been identified as one of the most dangerous aspects for an organization in today's information based world. Unauthorized access, misuse, and manipulation of data can create havoc. We have chosen a distributed environment with thousands ... Keywords: DCE based authentication, Distributed Informatics Computing and Collaborative Environments project, Internet, World Wide Web based interfaces, X Windows, access control, authorization, controlled access, data manipulation, delegated resource management, distributed environment, distributed resource sharing, end user access, enforcement system, information based world, operating system, privilege management, unauthorized access

K. J. Maly; A. Gupta; B. Kvande; I. B. Levinstein; R. Mukkamala; S. Nanjangud; M. Olson; R. Whitney; R. Chambers

1996-06-01T23:59:59.000Z

207

A privilege management system for a secure network  

Science Conference Proceedings (OSTI)

Modern research projects may involve dozens of geographically distributed collaborators who access distributed information, applications workstations and devices. We are developing an architecture and methods for distributed, decentralized privilege ... Keywords: CEBAF, Chinese Institute of High Energy Physics, Continuous Electron Beam Accelerator Facility, DICCE project, Distributed Informatics Computing and Collaborative Environments project, ESnet, Internet, Old Dominion University, US Department of Energy's Energy Science Network, World Wide Web based interfaces, X-windows, authentication, authorisation, authorization, computer network management, design, distributed computing environment networks, distributed information, implementation, network interfaces, privilege management system, secure network

K. J. Maly; A. Gupta; B. Kvande; I. B. Levinstein; R. Mukkamala; M. Olson; R. Whitney; R. Chambers

1996-06-01T23:59:59.000Z

208

Management Plan Management Plan  

E-Print Network (OSTI)

of a coevolving naturalcultural system. Suitable ecosystem attributes can be achieved by managing human maintenance that protects the riparian corridor. · Manage recreational use to protect riparian values Creek and the Warm Springs River during runoff periods. · Road systems and upland management practices

209

Enhancing the Authentication of Bank Cheque Signatures by Implementing Automated System Using Recurrent Neural Network  

E-Print Network (OSTI)

The associatie memory feature of the Hopfield type recurrent neural network is used for the pattern storage and pattern authentication.This paper outlines an optimization relaxation approach for signature verification based on the Hopfield neural network (HNN)which is a recurrent network.The standard sample signature of the customer is cross matched with the one supplied on the Cheque.The difference percentage is obtained by calculating the different pixels in both the images.The network topology is built so that each pixel in the difference image is a neuron in the network.Each neuron is categorized by its states,which in turn signifies that if the particular pixel is changed.The network converges to unwavering condition based on the energy function which is derived in experiments.The Hopfield's model allows each node to take on two binary state values (changed/unchanged)for each pixel.The performance of the proposed technique is evaluated by applying it in various binary and gray scale images.This paper con...

Rao, Mukta; Dhaka, Vijaypal Singh

2010-01-01T23:59:59.000Z

210

Management Programs  

NLE Websites -- All DOE Office Websites (Extended Search)

3MS Environment and Waste Management Programs Environment and Waste Management Programs Environment and Waste Management Programs AN L-934 Surveillance of Site A and Plot M...

211

Management Programs  

NLE Websites -- All DOE Office Websites (Extended Search)

Environment and Waste Management Programs Environment and Waste Management Programs Environment and Waste Management Programs AN L-9213 Surveillance of Site A and Plot M Report...

212

Management Programs  

NLE Websites -- All DOE Office Websites (Extended Search)

r Environment and Waste Management Programs Environment and Waste Management Programs Environment and Waste Management Programs ANL-949 Surveillance of Site A and Plot M Report...

213

A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme  

E-Print Network (OSTI)

always responds with it's EPC number to any querying RIFD reader. Therefore a powerful malicious reader overhead to the RIFD-based supply chain management system, as the stakeholder's reader needs to securely

Kim, Kwangjo

214

V-120: EMC Smarts Network Configuration Manager Java RMI Access Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: EMC Smarts Network Configuration Manager Java RMI Access 0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control March 27, 2013 - 12:51am Addthis PROBLEM: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control PLATFORM: Version(s): prior to 9.2 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028342 www.emc.com CVE-2013-0935 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can access some Java Remote Method Invocation methods without authenticating to gain control of the target system. A user can exploit unspecified flaws in the NCM System Management

215

V-120: EMC Smarts Network Configuration Manager Java RMI Access Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: EMC Smarts Network Configuration Manager Java RMI Access 0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control March 27, 2013 - 12:51am Addthis PROBLEM: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control PLATFORM: Version(s): prior to 9.2 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028342 www.emc.com CVE-2013-0935 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can access some Java Remote Method Invocation methods without authenticating to gain control of the target system. A user can exploit unspecified flaws in the NCM System Management

216

Dashboard Task Monitor for managing ATLAS user analysis on the Grid  

E-Print Network (OSTI)

The organization of the distributed user analysis on the Worldwide LHC Computing Grid (WLCG) infrastructure is one of the most challenging tasks among the computing activities at the Large Hadron Collider. The Experiment Dashboard offers a solution that not only monitors but also manages (kill, resubmit) user tasks and jobs via a web interface. The ATLAS Dashboard Task Monitor provides analysis users with a tool that is independent of the operating system and GRID environment . This contribution describes the functionality of the application and its implementation details, in particular authentication, authorization and audit of the management operations.

Sargsyan, L; The ATLAS collaboration; Jha, M; Karavakis, E; Kokoszkiewicz, L; Saiz, P; Schovancova, J; Tuckett, D

2013-01-01T23:59:59.000Z

217

Dashboard Task Monitor for managing ATLAS user analysis on the Grid  

E-Print Network (OSTI)

The organization of the distributed user analysis on the Worldwide LHC Computing Grid (WLCG) infrastructure is one of the most challenging tasks among the computing activities at the Large Hadron Collider. The Experiment Dashboard offers a solution that not only monitors but also manages (kill, resubmit) user tasks and jobs via a web interface. The ATLAS Dashboard Task Monitor provides analysis users with a tool that is operating system and GRID environment independent. This contribution describes the functionality of the application and its implementation details, in particular authentication, authorization and audit of the management operations.

Sargsyan, L; The ATLAS collaboration; Jha, M; Karavakis, E; Kokoszkiewicz, L; Saiz, P; Schovancova, J; Tuckett, D

2013-01-01T23:59:59.000Z

218

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 21, 2011 March 21, 2011 T-584: Microsoft March 2011 Security Bulletin Release Microsoft released 3 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. March 17, 2011 T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products. March 14, 2011 T-577: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat

219

Performance Management  

Science Conference Proceedings (OSTI)

*. Bookmark and Share. Performance Management. ... If you are unable to access these PDF files, please contact the Office of Workforce Management.

2013-04-20T23:59:59.000Z

220

A security solution for IEEE 802.11's ad hoc mode: password-authentication and group Diffie Hellman key exchange  

Science Conference Proceedings (OSTI)

IEEE 802 standards ease the deployment of networking infrastructures and enable employers to access corporate networks while travelling. These standards provide two modes of communication called infrastructure and ad hoc modes. A security solution for ... Keywords: Diffie Hellman, IEEE 80211, ad hoc networks, cryptography, dictionary attacks, group key exchange, mobile networks, network security, password authentication, provable security, random oracles, wireless networks

Emmanuel Bresson; Olivier Chevassut; David Pointcheval

2007-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Managing time  

Science Conference Proceedings (OSTI)

Professionals overwhelmed with information glut can find hope from new insights about time management.

Peter J. Denning

2011-03-01T23:59:59.000Z

222

Management Responsibilities  

NLE Websites -- All DOE Office Websites (Extended Search)

Management Responsibilities Management Responsibilities Depleted UF6 Management Responsibilities DOE has responsibility for safe and efficient management of approximately 700,000 metric tons of depleted UF6. Organizational Responsibilities In the United States, the U.S. Department of Energy is responsible for managing all the depleted uranium that has been generated by the government and has been declared surplus to national defense needs. In addition, as a result of two memoranda of agreement that have been signed between the DOE and USEC, the DOE has assumed management responsibility for approximately 145,000 metric tons of depleted UF6 that has been or will be generated by USEC. Any additional depleted UF6 that USEC generates will be USEC's responsibility to manage. DOE Management Responsibility

223

Efficient side-channel testing for public key algorithms: RSA ...  

Science Conference Proceedings (OSTI)

... it may also b nts. ... us far, can qu ations in a sem nt to consider when testing might be eas ... ervals, slight d er to isolate, h is performed re a t-test (or et ...

2011-09-21T23:59:59.000Z

224

Federal Energy Management Program: Energy Management Guidance  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Management Energy Management Guidance to someone by E-mail Share Federal Energy Management Program: Energy Management Guidance on Facebook Tweet about Federal Energy Management Program: Energy Management Guidance on Twitter Bookmark Federal Energy Management Program: Energy Management Guidance on Google Bookmark Federal Energy Management Program: Energy Management Guidance on Delicious Rank Federal Energy Management Program: Energy Management Guidance on Digg Find More places to share Federal Energy Management Program: Energy Management Guidance on AddThis.com... Requirements by Subject Requirements by Regulation Notices & Rules Guidance Facility Reporting Fleet Reporting Energy Management Guidance The Federal Energy Management Program (FEMP) provides guidance on Federal

225

Dynamic Group Key Management Protocol  

Science Conference Proceedings (OSTI)

If multicast communication appears as the most efficient way to send data to a group of participants, it presents also more vulnerabilities to attacks and requires services such as authentication, integrity and confidentiality to transport data securely. ...

Ghassan Chaddoud; Isabelle Chrisment; Andr Schaff

2001-05-01T23:59:59.000Z

226

Hybrid cryptography key management.  

SciTech Connect

Wireless communication networks are highly resource-constrained; thus many security protocols which work in other settings may not be efficient enough for use in wireless environments. This report considers a variety of cryptographic techniques which enable secure, authenticated communication when resources such as processor speed, battery power, memory, and bandwidth are tightly limited.

Draelos, Timothy John; Torgerson, Mark Dolan; Neumann, William Douglas; Gallup, Donald R.; Collins, Michael Joseph; Beaver, Cheryl Lynn

2003-11-01T23:59:59.000Z

227

Federal Energy Management Program: Computerized Maintenance Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Computerized Computerized Maintenance Management Systems to someone by E-mail Share Federal Energy Management Program: Computerized Maintenance Management Systems on Facebook Tweet about Federal Energy Management Program: Computerized Maintenance Management Systems on Twitter Bookmark Federal Energy Management Program: Computerized Maintenance Management Systems on Google Bookmark Federal Energy Management Program: Computerized Maintenance Management Systems on Delicious Rank Federal Energy Management Program: Computerized Maintenance Management Systems on Digg Find More places to share Federal Energy Management Program: Computerized Maintenance Management Systems on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance Federal Requirements Program Management

228

Data Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Documentation and Quality Assurance for Data Sharing and Archival Now that you have planned your project and data management, collected data, integrated imagery, or generated model...

229

SUBCONTRACT MANAGEMENT  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

-1 -1 CHAPTER 10 SUBCONTRACT MANAGEMENT (Revised October 19, 2011) WHAT ARE THE BASIC PRINCIPLES AND OBJECTIVES OF SUBCONTRACT MANAGEMENT? 1. To ensure contractors establish, document, and maintain adequate purchasing systems. 2. To ensure contractors flow down contract requirements to subcontractors. WHY IS SUBCONTRACT MANAGEMENT IMPORTANT? In many Department prime contracts a significant portion of the obligated dollars is spent on subcontract work. Due to the absence of a direct contractual relationship with the subcontractor, the Department must rely on the prime contractor to manage subcontract work. Subcontractors perform significant work efforts at sites and are an integral part of the site's success. Prime

230

Reservation Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Reservation Management The ORR is home to three major facility complexes: the East Tennessee Technology Park (ETTP), the National Nuclear Security Administration's (NNSA's) Y-12...

231

Management Overview  

NLE Websites -- All DOE Office Websites (Extended Search)

to global waste vitrification and related programs Serve as a technical platform for DOE reviews Environmental Management Leadership Team Responsible for identifying or...

232

Management Plan  

NLE Websites -- All DOE Office Websites (Extended Search)

Management Plan (SSMP) to be submitted to Congress after the April 2010 release of the Nuclear Posture Review Report. It is aligned with the President's National Security Strategy...

233

DEACTIVATION MANAGEMENT  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

MANAGEMENT MANAGEMENT The purpose here is to provide information for specific aspects of project management that apply to deactivation. Overall management of deactivation projects should use a traditional project management approach, and as such is not addressed. The following specific topics are based on lessons learned during deactivation of DOE facilities.  The Deactivation Mission  The Stabilization/Deactivation "Customer"  Project Approach for a Complex Facility  Establishing the Overall End-State  Viewing Deactivation in Two Phases  Early Decisions  Early Deactivation Tasks  Facility-Specific Commitments  Hazard Reduction  Detailed End-Points  Set Up Method and Criteria  Post-Deactivation S&M Plan

234

Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices  

SciTech Connect

In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Aldridge, Hal [ORNL; Duren, Mike [Sypris Electronics, LLC; Ricci, Tracy [Sypris Electronics, LLC; Bertino, Elisa [ORNL; Kulatunga, Athula [Purdue University; Navaratne, Uditha Sudheera [Purdue University

2011-01-01T23:59:59.000Z

235

Safety & Emergency Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Coordination Management andor Coordination of APS Site WorkServices Safety & Emergency Management Database Maintenance Personnel Safety & Emergency Management Area...

236

Environmental Management Waste Management Facility (EMWMF) at...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Skip to main content Energy.gov Office of Environmental Management Search form Search Office of Environmental Management Services Waste Management Site & Facility Restoration...

237

Organization Update Assistant Manager for Environmental Management  

NLE Websites -- All DOE Office Websites (Extended Search)

EM-90 Office of the Manager Mark Whitney, Manager Sue Cange, Deputy Manager Brenda Hawks, Senior Technical Advisor Karen Ott, Chief of Staff Karen Forester, Administrative...

238

Federal Energy Management Program: Federal Energy Management...  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Energy Management Program Contacts to someone by E-mail Share Federal Energy Management Program: Federal Energy Management Program Contacts on Facebook Tweet about Federal...

239

Federal Energy Management Program: Energy Management Requirements...  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Management Requirements by Subject to someone by E-mail Share Federal Energy Management Program: Energy Management Requirements by Subject on Facebook Tweet about Federal...

240

Federal Energy Management Program: Best Management Practice:...  

NLE Websites -- All DOE Office Websites (Extended Search)

to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Water-Efficient Irrigation on Facebook Tweet about Federal Energy Management Program: Best...

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Federal Energy Management Program: Computerized Maintenance Management...  

NLE Websites -- All DOE Office Websites (Extended Search)

Computerized Maintenance Management Systems Computerized maintenance management systems (CMMS) are a type of management software that perform functions in support of operations and...

242

Management Overview  

NLE Websites -- All DOE Office Websites (Extended Search)

Immobilization Research Immobilization Research Kurt Gerdes U.S. DOE, Office of Engineering and Technology John Vienna Pacific Northwest National Laboratory Environmental Management May 19, 2009 2009 Hanford - Idaho - Savannah River Technical Exchange 2 Objectives Perform research and development to advance the waste stabilization technology options by through closely- coupled theory, experimentation, and modeling Develop solutions for Hanford, Idaho, Savannah River, and Oak Ridge wastes challenges (along with facilitating management of future wastes) Environmental Management General Approach Balance between near-term incremental technology improvements and long-term transformational solutions Address the requirements for high risk waste streams - high-level tank waste (RPP, SRS)

243

Work Manager  

Science Conference Proceedings (OSTI)

A real-time control system has been developed and deployed nationally to support BTs work management programme. This paper traces the history, system architecture, development, deployment and service aspects of this very large programme. Many ...

G. J. Garwood

1997-01-01T23:59:59.000Z

244

Management Solution  

E-Print Network (OSTI)

MEMO: Request for proposal for Computer-Aided Facilities and Maintenance Management application software; professional services; development services for interfaces to Financial Management and Human Resources systems; configuration, test, train, maintenance and support services to implement and maintain a CAFM Solution for the California Administrative Office of the Courts, the Trial Courts, the Appellate Courts and the Judicial Council, known as The AOC Group. You are invited to review and respond to the attached Request for Proposal (RFP):

Rfp Number Isdcafm

2004-01-01T23:59:59.000Z

245

Airflow Management  

Science Conference Proceedings (OSTI)

This technical update provides an overview of airflow management, with an emphasis on how reduced airflow can improve energy efficiency in data centers. Airflow management within a data center can have a dramatic impact on energy efficiency. Typically, much more cold air circulates within conventional data centers than is actually needed to cool equipment related to information and communication technology (ICT). It is not uncommon for facilities to supply more than two to three times the minimum require...

2011-12-14T23:59:59.000Z

246

NIST SP 800-146, DRAFT Cloud Computing Synopsis and ...  

Science Conference Proceedings (OSTI)

... Middleware components may provide database services, user authentication services, identity management, account management, etc. ...

2013-04-29T23:59:59.000Z

247

Environmental Management System  

NLE Websites -- All DOE Office Websites (Extended Search)

Video Community, Environment Environmental Stewardship Environmental Protection Environmental Management System Environmental Management System An Environmental...

248

Quality System Documentation Management  

Science Conference Proceedings (OSTI)

Quality System Documentation Management. ... Minutes, summaries, or notes from Management Meetings of significance are archived here. ...

2012-08-21T23:59:59.000Z

249

NIST Performance Management Program  

Science Conference Proceedings (OSTI)

NIST Performance Management Program. Performance ... appraisal. APMS and FWS Performance Management Programs: ...

2010-10-05T23:59:59.000Z

250

Presidential Management Fellows Program  

Science Conference Proceedings (OSTI)

Presidential Management Fellows Program. Summary: About the Program: The Presidential Management Fellows (PMF ...

2012-08-31T23:59:59.000Z

251

Crypto Key Management Framework  

Science Conference Proceedings (OSTI)

... A Framework for Designing Cryptographic Key Management Systems ... A Framework for Designing Cryptographic Key Management Systems ...

2013-08-13T23:59:59.000Z

252

MANAGEMENT SUMMARY  

E-Print Network (OSTI)

need to effectively manage business performance. This has never been more true than in todays complex, highly regulated and confusing business environment which requires better decisions and improved execution now! In spite of the billions of dollars invested in infor-mation technology to address these challenges, managers and executives in many organizations still make key decisions underpinned by their own personal versions of documents and spread-sheets. Their organization struggles to provide a seamless flow of trusted information between customers, suppliers and their employees. The result is that most organizations cannot provide their people with the right information at the right time, and in attempting to do so are committing significant resources to compiling and auditing numbers instead of using them to inform the business. Consequently, they are far more reac-tive than proactive and ultimately they are not efficiently and effectively managing their current and future performance. Leading organizations are investing in managing information and developing predictive insights to drive sustainable business results. These com-panies have become masters in Performance Management- going beyond mere users of business intelligence to become the Intelligent Enterprises. ...a new breed of company is upping the stakes....have dominated their fields by deploy-ing industrial-strength analytics across a wide variety of activities. In essence, they are trans-forming their organiza-tions into armies of killer apps and crunching their way to victory.

unknown authors

2006-01-01T23:59:59.000Z

253

Pretty good packet authentication  

Science Conference Proceedings (OSTI)

Internet addresses are routinely being used to infer the identity of persons who send offending traffic - a capability they were not designed to provide. As a result, problems abound: innocent users are being accused, while the culprits can easily avoid ...

Andreas Haeberlen; Rodrigo Rodrigues; Krishna Gummadi; Peter Druschel

2008-12-01T23:59:59.000Z

254

From Authentication to Authorization  

E-Print Network (OSTI)

PKIs focus on establishing a link between an entity and a key. Hence, PKIs provide a mechanism for entity identification by providing a link between an entity and a key. However, the real requirement in many systems is authorization, i.e., is a certain entity authorized to perform a specific action. For example, imagine a program for course registration at a university. Suppose a student, John Doe, wants to register for a graduate course in Computer Science. In order for a student to register for this course, he/she should be a graduate student in Computer Science or a undergraduate student with the requisite standing, e.g. a senior with GPA above 3.5. Therefore, the registration program needs to know that John Doe has the required credentials. In the PKI setting, John Doe will present a certificate (signed by a trusted certificate authority) which binds his identity to a key. This establishes that John Doe is interacting with the registration program. The program then consults a database to verify that John Doe has the required credentials. In this scenario, the PKI approach has the following disadvantages: Authorization decisions are adhoc

Somesh Jha

2001-01-01T23:59:59.000Z

255

CERTIFICATE OF AUTHENTICITY  

Energy.gov (U.S. Department of Energy (DOE))

I hereby certify that this transcript constitutes an accurate record of the full Council meeting of the National Coal Council held on November 14,2008 at the Westin Grand Hotel, Washington, D.C....

256

E-Authentication  

Science Conference Proceedings (OSTI)

... a more detailed discussion of these technologies. ... to constrict or constrain the development or use ... Identity Ecosystem will be developed through a ...

2013-08-01T23:59:59.000Z

257

NSLS II: Authentication Required  

NLE Websites -- All DOE Office Websites (Extended Search)

Project Pages Login Access to this area of the NSLS-II website requires a valid username and password. Username: Password: Next > Last Modified: April 2, 2013 Please forward all...

258

Operational Management | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Management Operational Management Aviation Management Executive Secretariat Energy Reduction at HQ Facilities and Infrastructure Federal Advisory Committee Management Freedom of...

259

Aviation Management | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Aviation Management Aviation Management Aviation Management Executive Secretariat Energy Reduction at HQ Facilities and Infrastructure Federal Advisory Committee Management Freedom...

260

Categorical Exclusion Determinations: Environmental Management...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Environmental Management Categorical Exclusion Determinations: Environmental Management Categorical Exclusion Determinations issued by Environmental Management. DOCUMENTS AVAILABLE...

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

ORISE: Emergency Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Management Emergency Management Effective emergency management relies on thorough integration of preparedness plans at all levels of government. The Oak Ridge Institute for Science...

262

Federal Energy Management Program: Best Management Practice: Cooling Tower  

NLE Websites -- All DOE Office Websites (Extended Search)

Cooling Tower Management to someone by E-mail Cooling Tower Management to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Google Bookmark Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Delicious Rank Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Cooling Tower Management on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance

263

Federal Energy Management Program: Best Management Practice: Water  

NLE Websites -- All DOE Office Websites (Extended Search)

Water Management Planning to someone by E-mail Water Management Planning to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Water Management Planning on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Water Management Planning on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Water Management Planning on Google Bookmark Federal Energy Management Program: Best Management Practice: Water Management Planning on Delicious Rank Federal Energy Management Program: Best Management Practice: Water Management Planning on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Water Management Planning on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance

264

MUSHROOM WASTE MANAGEMENT PROJECT LIQUID WASTE MANAGEMENT  

E-Print Network (OSTI)

#12;MUSHROOM WASTE MANAGEMENT PROJECT LIQUID WASTE MANAGEMENT PHASE I: AUDIT OF CURRENT PRACTICE The Mushroom Waste Management Project (MWMP) was initiated by Environment Canada, the BC Ministry of solid and liquid wastes generated at mushroom producing facilities. Environmental guidelines

265

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11, 2013 11, 2013 V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability The vulnerability is caused due to an unspecified error and can be exploited to invoke public methods on ColdFusion Components (CFC) using WebSockets July 10, 2013 V-196: Microsoft Security Bulletin Advance Notification for July 2013 Microsoft Security Bulletin Advance Notification for July 2013. Microsoft has posted 6 Critical Bulletin and 1 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" July allow remote execution of code. Microsoft will host a webcast to address customer questions on the security bulletins on July 10, 2013, at 11:00 AM Pacific Time (US & Canada). July 9, 2013 V-195: RSA Authentication Manager Lets Local Users View the Administrative

266

Summary - Environmental Management Waste Management Facility...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ETR Report Date: February 2008 ETR-11 United States Department of Energy Office of Environmental Management (DOE-EM) External Technical Review of Environmental Management...

267

Federal Energy Management Program: Best Management Practice:...  

NLE Websites -- All DOE Office Websites (Extended Search)

Faucets and Showerheads to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Faucets and Showerheads on Facebook Tweet about Federal Energy...

268

Federal Energy Management Program: Best Management Practice:...  

NLE Websites -- All DOE Office Websites (Extended Search)

Other Water Intensive Processes to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Other Water Intensive Processes on Facebook Tweet about...

269

Federal Energy Management Program: Best Management Practice:...  

NLE Websites -- All DOE Office Websites (Extended Search)

Water-Efficient Landscaping to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Water-Efficient Landscaping on Facebook Tweet about Federal...

270

DUF6 Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Management Depleted UF6 Management An introduction to DOE's Depleted UF6 Management Program. The mission of the DOE's Depleted UF6 Management Program is to safely and efficiently...

271

Your Records Management Responsibilities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Your Records Management Your Records Management Responsibilities Table of Contents INTRODUCTION RECORDS MANAGEMENT IN THE FEDERAL GOVERNMENT RECORDS MANAGEMENT IN THE DEPARTMENT OF ENERGY IMPORTANCE OF RECORDS MANAGEMENT YOUR RECORDS MANAGEMENT RESPONSIBILITIES RECORDS MANAGEMENT LIFE CYCLE ELECTRONIC RECORDS & RECORDKEEPING LAW, REGULATION, AND POLICY ASSISTANCE RECORDS MANAGEMENT TERMS 2 INTRODUCTION If you are a government employee or contractor working for a federal agency, records management is part of your job. This pamphlet explains your responsibilities for federal records and provides the context for understanding records management in the federal government and in the Department of Energy. TOP RECORDS MANAGEMENT IN THE FEDERAL GOVERNMENT

272

Integrated Safety Management Policy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INTEGRATED SAFETY INTEGRATED SAFETY MANAGEMENT SYSTEM DESCRIPTION U.S. DEPARTMENT OF ENERGY Office of Environmental Management Headquarters May 2008 Preparation: Braj K. sin& Occupational Safety and Health Manager Office of Safety Management Concurrence: Chuan-Fu wu Director, Offlce of Safety Management Deputy Assistant Secretary for safe& Management andoperations Operations Officer for 1 Environmental Management Approval: Date p/-g Date Environmental Management TABLE OF CONTENTS ACRONYMS................................................................................................................................................................v EXECUTIVE SUMMARY .........................................................................................................................................1

273

Managing time, part 2  

Science Conference Proceedings (OSTI)

Masterful time management means not just tracking of messages in your personal environment, but managing your coordination network with others.

Peter J. Denning; Ritu Raj

2011-09-01T23:59:59.000Z

274

Environmental Management Systems  

NLE Websites -- All DOE Office Websites (Extended Search)

Environmental Management Systems Technical Assistance Tools Technical Assistance Tool: Integrating Sustainable Practices into Environmental Management Systems , November 2009...

275

Managing PCBs  

Science Conference Proceedings (OSTI)

Compliance with Environmental Protection Agency regulations for managing the polychlorinated biphenyls (PCBs) that were widely distributed in electrical equipment will be costly to the utility industry, estimated at over $5 billion over a ten-year period by the Electric Power Research Institute (EPRI). Most of the budget could be needed to identify and reclaim 2.5 million contaminated transformers. Three divisions are coordinating EPRI research efforts with those of other companies and utilities in the areas of detection, destruction, spill cleanup, disposal, and health effects. (DCK)

Lihach, N.

1981-10-01T23:59:59.000Z

276

M E Environmental Management Environmental Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

safety  performance  cleanup  closure safety  performance  cleanup  closure M E Environmental Management Environmental Management M E Environmental Management Environmental Management Office of Site Restoration, EM-10 Office of D&D and Facility Engineering, EM-13 Facility Deactivation & Decommissioning (D&D) D&D Program Map Addendum: Impact of American Recovery and Reinvestment Act (ARRA) on EM's D&D Program 2013 Edition U.S. Department Of Energy safety  performance  cleanup  closure M E Environmental Management Environmental Management safety  performance  cleanup  closure M E Environmental Management Environmental Management M E Environmental Management Environmental Management 3/13/2013 The American Recovery and Reinvestment Act of 2009

277

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31, 2011 31, 2011 T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. August 30, 2011 T-706: Microsoft Fraudulent Digital Certificate Issued by DigiNotar Fraudulent Digital Certificate Issued by DigiNotar, a Certification Authority Present in the Trusted Root Certification Authorities August 30, 2011 T-705: Linux Kernel Weakness in Sequence Number Generation Facilitates Packet Injection Attacks Linux Kernel Weakness in Sequence Number Generation Facilitates Packet Injection Attacks. August 29, 2011 T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password RSA enVision lets remote users view files and remote authenticated users

278

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10, 2011 10, 2011 T-644: Prenotification Security Advisory - Adobe Acrobat & Adobe Readers Updates A prenotification Security Advisory has been posted in regards to the upcoming quarterly Adobe Reader and Acrobat updates scheduled for Tuesday, June 14, 2011. The updates will address critical security issues in the products. June 9, 2011 T-643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability A vulnerability has been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system. June 9, 2011 T-642: RSA SecurID update to Customers RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products

279

Overview - Data Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Help > Data Management Help > Data Management Data Management for Data Providers Click an arrow to follow the data management path of a data set from planning to curation. plan Overview plan Plan manage Manage archive Archive curation DAAC Curation Data Management Overview Plan Manage Archive DAAC Curation Related Links DAAC Help Best Practices PDF Workshops DataONE ESIP Data Management Overview Welcome to the data management pages for data providers to the ORNL Distributed Active Archive (DAAC). These pages provide an overview of data management planning and preparation and offer practical methods to successfully share and archive your data. Plan - write a short data management plan while preparing your research proposal, Manage - assign logical, descriptive file names, define the contents of your data files, and use consistent data values when preparing

280

Office of Legacy Management FY 2009 Energy Management Data Report...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Administration Other Agencies You are here Home Office of Legacy Management FY 2009 Energy Management Data Report Office of Legacy Management FY 2009 Energy Management Data...

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

ICT Supply Chain Risk Management  

Science Conference Proceedings (OSTI)

... ICT Supply Chain Risk Management Manager's Forum ... ICT Supply Chain Risk Management National Institute of Standards and Technology Page 6. ...

2013-06-04T23:59:59.000Z

282

Run manager module for CORAL laboratory management  

E-Print Network (OSTI)

This thesis describes a new module, the Run Manager (RM), for Stanford Nanofabrication Facility's Common Object Representation for Advanced Laboratories (CORAL). CORAL is the lab manager with which MIT's Microsystems ...

Klann, Jeffrey G

2004-01-01T23:59:59.000Z

283

Federal Energy Management Program: Best Management Practice:...  

NLE Websites -- All DOE Office Websites (Extended Search)

Single-Pass Cooling Equipment to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Single-Pass Cooling Equipment on Facebook Tweet about Federal...

284

Environmental Management System Plan  

E-Print Network (OSTI)

3) environmental management programs, (4) training, (5)Management Programs3-5 Structure and Responsibility.3-6 Training,Management System Plan Program Elements Additional information regarding EMS training

Fox, Robert

2009-01-01T23:59:59.000Z

285

Federal Energy Management Program: Operations and Maintenance Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Management Support to someone by E-mail Management Support to someone by E-mail Share Federal Energy Management Program: Operations and Maintenance Management Support on Facebook Tweet about Federal Energy Management Program: Operations and Maintenance Management Support on Twitter Bookmark Federal Energy Management Program: Operations and Maintenance Management Support on Google Bookmark Federal Energy Management Program: Operations and Maintenance Management Support on Delicious Rank Federal Energy Management Program: Operations and Maintenance Management Support on Digg Find More places to share Federal Energy Management Program: Operations and Maintenance Management Support on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance Federal Requirements Program Management

286

Energy Star Portfolio Manager  

NLE Websites -- All DOE Office Websites (Extended Search)

May 2013 What's New in Portfolio Manager ? EPA's ENERGY STAR Portfolio Manager tool helps you measure and track energy use, water use, and greenhouse gas emissions of your...

287

Target Cost Management Strategy  

E-Print Network (OSTI)

Target cost management (TCM) is an innovation of Japanese management accounting system and by common sense has been considered with great interest by practitioners. Nowadays, TCM related

Okano, Hiroshi

1996-01-01T23:59:59.000Z

288

FILE MANAGEMENT MANUAL  

NLE Websites -- All DOE Office Websites (Extended Search)

6.5.2 (ZAP BAD POINTERS) : Appendices :1 Glossary of Important File-Management Terms :29 SPIRES Documentation * SPIRES File Management ***...

289

Contract/Project Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fourth Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2011 Target FY 2011...

290

Contract/Project Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 nd Quarter Overall Contract and Project Management Performance Metrics and Targets ContractProject Management Performance Metrics FY 2009 Target FY 2009 Actual Comment 1....

291

Contract/Project Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Second Quarter Overall Contract and Project Management Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2010 Target FY 2010 Actual FY...

292

Contract/Project Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fourth Quarter Overall Contract and Project Management Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2010 Target FY 2010 Actual FY...

293

Contract/Project Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8 4 th Quarter Metrics Final Overall Contract and Project Management Performance Metrics and Targets ContractProject Management Performance Metrics FY 2008 Target FY 2008 Actual...

294

Contract/Project Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fourth Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Performance Metric FY 2012 Target FY 2012 Final FY...

295

Contract/Project Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 rd Quarter Overall Contract and Project Management Performance Metrics and Targets ContractProject Management Performance Metrics FY 2009 Target FY 2009 Actual Comment 1....

296

Contract/Project Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 st Quarter Overall Contract and Project Management Performance Metrics and Targets ContractProject Management Performance Metrics FY 2009 Target FY 2009 Actual Comment 1....

297

Waterway Management Districts (Indiana)  

Energy.gov (U.S. Department of Energy (DOE))

Waterway management districts are established to manage and supervise the use and development of waterways in municipalities with populations between 29,600 and 29,900.

298

K&N Management  

Science Conference Proceedings (OSTI)

... K&N Management (PDF version of this profile). (Photo courtesy of K&N Management). Download high-res version of this photo. ...

2011-04-19T23:59:59.000Z

299

Data Management Policy The  

NLE Websites -- All DOE Office Websites (Extended Search)

Data Management Policy The guidelines below describe Data Management procedures, processes and resources that need to be understood by both user projects and in-house research. 1....

300

Data Management Webinar  

NLE Websites -- All DOE Office Websites (Extended Search)

Environmental Data Management Best Practices Webinar Environmental Data Management Best Practices Webinar NASA EarthData Webinar Series September 10, 11, and 12, 2013 Abstract The...

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Stormwater Management Program (Pennsylvania)  

Energy.gov (U.S. Department of Energy (DOE))

Stormwater Management program of the Department of Environmental Protection's Bureau of Conservation and Restoration administers the rules and regulations for stormwater management for Pennsylvania...

302

ALS Project Management Manual  

E-Print Network (OSTI)

management practices across all ALS projects. It describesthat the primary weakness in ALS project management effortsrich projects common at the ALS. It is sometimes difficult

Krupnick, Jim; Harkins, Joe

2000-01-01T23:59:59.000Z

303

Corrective Action Management Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Corrective Action Management Program (CAMP) Home CAMP Background DOE Directives Corrective Action Management Team Corrective Action Tracking System (CATS) CAMP Quarterly Reports...

304

Emergency Management Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Emergency Management Evaluations Reports 2010 Independent Oversight Review of Emergency Management at the Pantex Site Office and Pantex Plant, November 2010 Independent Oversight...

305

A Security Solution for IEEE 802.11's Ad-hoc Mode:Password-Authentication and Group Diffie-Hellman Key Exchange  

Science Conference Proceedings (OSTI)

The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.

Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

2005-10-01T23:59:59.000Z

306

PROJECT MANAGEMENT PLANS Project Management Plans  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

MANAGEMENT PLANS MANAGEMENT PLANS Project Management Plans  Overview  Project Management Plan Suggested Outline Subjects  Crosswalk between the Suggested PMP Outline Subjects and a Listing of Project Planning Elements  Elements of Deactivation Project Planning  Examples From Project Management Plans Overview The purpose here is to assist project managers and project planners in creating a project plan by providing examples and pointing to information that have been successfully used by others in the past. Section 4.2 of DOE Guide 430.1-3, DEACTIVATION IMPLEMENTATION GUIDE discusses the content and purpose of deactivation project management plans. It is presented as a suggested outline followed by other potential subjects. For the convenience of readers, that information is repeated below.

307

Cryptographic Technology Group Homepage  

Science Conference Proceedings (OSTI)

... advanced authentication systems, cryptographic protocols ... key certificate management, biometrics, smart ... the Department of Energy, the Department ...

2013-04-22T23:59:59.000Z

308

Federal Energy Management Program: Energy Management Requirements by Law  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Management Energy Management Requirements by Law and Regulation to someone by E-mail Share Federal Energy Management Program: Energy Management Requirements by Law and Regulation on Facebook Tweet about Federal Energy Management Program: Energy Management Requirements by Law and Regulation on Twitter Bookmark Federal Energy Management Program: Energy Management Requirements by Law and Regulation on Google Bookmark Federal Energy Management Program: Energy Management Requirements by Law and Regulation on Delicious Rank Federal Energy Management Program: Energy Management Requirements by Law and Regulation on Digg Find More places to share Federal Energy Management Program: Energy Management Requirements by Law and Regulation on AddThis.com... Requirements by Subject Requirements by Regulation

309

Laboratory Management (Quality) Systems  

Science Conference Proceedings (OSTI)

Laboratory Management (Quality) Systems. NISTIR 7028 Type Evaluation Quality Manual Template. This NISTIR has been ...

2012-05-02T23:59:59.000Z

310

ADMINISTRATIVE AND RESOURCE MANAGEMENT  

E-Print Network (OSTI)

development of risk management- relatedITservicesthatbenefittheentireUCsystem. The systems developed at UC and maintenance have diminished so dramatically. #12;7 ADMINISTRATIVE AND RESOURCE MANAGEMENT AnnuAl RepoRt 2010, are collaborating to implement a new asset management, work management, and integrated planning system

Hammock, Bruce D.

311

Environmental Management System Plan  

E-Print Network (OSTI)

offices, the EMS Program Program Elements Environmental ManagementOffice of Institutional Assurance as stated in the OQMP. 3-7 Environmental ManagementEnvironmental Management System Fiscal Year Improve (EMP classification) Integrated Safety Management System International Organization for Standardization Lawrence Berkeley National Laboratory Office

Fox, Robert

2009-01-01T23:59:59.000Z

312

Cryptographic Key Management Workshop 2010  

Science Conference Proceedings (OSTI)

Cryptographic Key Management Workshop 2010. Purpose: ... Related Project(s): Cryptographic Key Management Project. Details: ...

2013-08-01T23:59:59.000Z

313

Environmental Management System  

NLE Websites -- All DOE Office Websites (Extended Search)

Management System Management System Environmental Management System An Environmental Management System is a systematic method for assessing mission activities, determining the environmental impacts of those activities, prioritizing improvements, and measuring results. May 30, 2012 The continuous improvement cycle Our Environmental Management System encourages continuous improvement of our environmental performance. Contact Environmental Communication & Public Involvement P.O. Box 1663 MS M996 Los Alamos, NM 87545 (505) 667-0216 Email Managing our effects on the environment We are committed to protecting the environment while conducting our national security and energy-related missions. Laboratory Environmental Governing Policy What is the Environmental Management System? It covers every program in the Laboratory

314

LPP Risk Management Plan  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

History and Process History and Process Slide 2 M E Environmental Management Environmental Management History ◦ Current Baseline Process Overview ◦ Identification ◦ Simulation ◦ Management Successes & Challenges Slide 3 M E Environmental Management Environmental Management Current Baseline Risks ◦ 1 Week Risk Summit held week of August 4 th , 2008 Broad representation from all levels of Isotek, DOE, PTC, and outside consultants Focused on risk and opportunity identification Included risk description, assumptions, and triggers No quantification or analysis No restrictions, constraints, or filtering HQ provided facilitator Prescribed format and capture methodology Slide 4 M E Environmental Management Environmental Management Current Baseline Risks ◦ Risk Summit Results

315

Office of Resource Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Resource Management Resource Management Home Sub Offices › Business Operations › Information Management › Human Resources and Administration Mission and Functions HSS Standard Operating Practices (For Internal Users Only) HSS Subject Matter Experts and Functional Points of Contacts Contact Us HSS Logo Office of Resource Management Direct Report to the Chief Health, Safety and Security Officer Mission and Functions Mission The Office of Resource Management supports the infrastructure of the Office of Health, Safety and Security (HSS) by providing balanced, unbiased, technically competent, and customer focused services in the areas of: (1) Financial Management, including budget formulation and execution; (2) Procurement Management, including contract and credit card programs; (3) Information Management, including technology-based solutions and programs; (4) Quality Assurance; (5) Human Resources, including recruitment and retention programs; (6) Administrative Services, including property management, travel, and work space management; and; (7) Strategic and Program Planning including performance and efficiency measures.

316

Federal Energy Management Program: Energy Management Requirements...  

NLE Websites -- All DOE Office Websites (Extended Search)

Law and Regulation Federal agencies must meet energy management requirements outlined by Federal various statutory laws and regulations. They include: National Energy Conservation...

317

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19, 2011 19, 2011 T-697: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible. August 18, 2011 T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. August 17, 2011 T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets

318

Office of Environmental Management | Department of Energy  

Office of Environmental Management (EM)

Environmental Management Search form Search Office of Environmental Management Services Waste Management Site & Facility Restoration Program Management Communication & Engagement...

319

Federal Energy Management Program: Best Management Practice: Information  

NLE Websites -- All DOE Office Websites (Extended Search)

Information and Education Programs to someone by E-mail Information and Education Programs to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Information and Education Programs on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Information and Education Programs on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Information and Education Programs on Google Bookmark Federal Energy Management Program: Best Management Practice: Information and Education Programs on Delicious Rank Federal Energy Management Program: Best Management Practice: Information and Education Programs on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Information and Education Programs on AddThis.com...

320

Federal Energy Management Program: Best Management Practice: Commercial  

NLE Websites -- All DOE Office Websites (Extended Search)

Commercial Kitchen Equipment to someone by E-mail Commercial Kitchen Equipment to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Commercial Kitchen Equipment on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Commercial Kitchen Equipment on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Commercial Kitchen Equipment on Google Bookmark Federal Energy Management Program: Best Management Practice: Commercial Kitchen Equipment on Delicious Rank Federal Energy Management Program: Best Management Practice: Commercial Kitchen Equipment on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Commercial Kitchen Equipment on AddThis.com... Sustainable Buildings & Campuses

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Federal Energy Management Program: Best Management Practice: Alternate  

NLE Websites -- All DOE Office Websites (Extended Search)

Alternate Water Sources to someone by E-mail Alternate Water Sources to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Alternate Water Sources on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Alternate Water Sources on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Alternate Water Sources on Google Bookmark Federal Energy Management Program: Best Management Practice: Alternate Water Sources on Delicious Rank Federal Energy Management Program: Best Management Practice: Alternate Water Sources on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Alternate Water Sources on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance Greenhouse Gases

322

Federal Energy Management Program: Bureau of Land Management...  

NLE Websites -- All DOE Office Websites (Extended Search)

Bureau of Land Management - Campground, Utah to someone by E-mail Share Federal Energy Management Program: Bureau of Land Management - Campground, Utah on Facebook Tweet about...

323

Federal Energy Management Program: DOE Enhances Management of...  

NLE Websites -- All DOE Office Websites (Extended Search)

resource Send a link to Federal Energy Management Program: DOE Enhances Management of Energy Savings Performance Contracts to someone by E-mail Share Federal Energy Management...

324

Federal Energy Management Program: Energy Management Guidance  

NLE Websites -- All DOE Office Websites (Extended Search)

Guidance Guidance The Federal Energy Management Program (FEMP) provides guidance on Federal laws and regulations related to energy management. General Guidance for Facilities Overview of Federal Energy Management Policy and Mandates: Guidance document outlining Federal energy management goals and requirements for Federal energy managers. Sustainability Requirement Crosswalk: Crosswalk of sustainability and energy goals and targets within executive orders and other statutes. Guidelines Establishing Criteria for Excluding Buildings from the Energy Performance Requirements of Section 543 of the National Energy Conservation Policy Act as Amended by the Energy Policy Act of 2005 (EPAct 2005): Guidelines that established criteria for exclusions from the energy performance requirement for a fiscal year or any Federal building or collection of Federal buildings within the statutory framework provided by the law.

325

Plan - Data Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Plan Plan Data Management for Data Providers Click an arrow to follow the data management path of a data set from planning to curation. plan Overview plan Plan manage Manage archive Archive curation DAAC Curation Data Management Overview Plan Manage Archive DAAC Curation Related Links DAAC Help Best Practices PDF Workshops DataONE ESIP Data Management Plans NASA's Terrestrial Ecology Program now requires that each proposal include a Data Management Plan (DMP) of up to two pages. A DMP for a proposal is a brief document that outlines what you will do with your data during and after your research, to ensure your data will be safe, documented, and accessible now and in the future. A DMP - developed early and used throughout the research project - will increase research efficiency by making the data understandable and usable in the future and

326

Depleted Uranium Hexafluoride Management  

NLE Websites -- All DOE Office Websites (Extended Search)

for for DUF 6 Conversion Project Environmental Impact Statement Scoping Meetings November/December 2001 Overview Depleted Uranium Hexafluoride (DUF 6 ) Management Program DUF 6 EIS Scoping Briefing 2 DUF 6 Management Program Organizational Chart DUF 6 Management Program Organizational Chart EM-10 Policy EM-40 Project Completion EM-20 Integration EM-50 Science and Technology EM-31 Ohio DUF6 Management Program EM-32 Oak Ridge EM-33 Rocky Flats EM-34 Small Sites EM-30 Office of Site Closure Office of Environmental Management EM-1 DUF 6 EIS Scoping Briefing 3 DUF 6 Management Program DUF 6 Management Program * Mission: Safely and efficiently manage the DOE inventory of DUF 6 in a way that protects the health and safety of workers and the public, and protects the environment DUF 6 EIS Scoping Briefing 4 DUF 6 Inventory Distribution

327

LFRG Program Management Plan  

Energy.gov (U.S. Department of Energy (DOE))

The purpose of the EM Low-Level Waste Disposal Facility Federal Review Group Program Management Plan (LFRG PMP) is to establish the LFRG roles and responsibilities, the LFRG management processes,...

328

Power Management Controls  

NLE Websites -- All DOE Office Websites (Extended Search)

additional savings of 1.3 billion are lost because power management is present, but disabled. In some cases, power management is not compatible with the application or doesn't...

329

Coastal Management Act (Georgia)  

Energy.gov (U.S. Department of Energy (DOE))

The Coastal Management Act provides enabling authority for the State to prepare and administer a coastal management program. The Act does not establish new regulations or laws; it is designed to...

330

Chemical Lifecycle Management Cost  

NLE Websites -- All DOE Office Websites (Extended Search)

Chemical Lifecycle Management Cost Presented by: J.M. Hieb, CH2M HILL Plateau Remediation Company CHPRC1204-04 Chemical Lifecycle Management Cost Everyone is trying to stretch a...

331

US CMS Program Management  

NLE Websites -- All DOE Office Websites (Extended Search)

USCMS US CMS Home US CMS @ Work US CMS Research Program Management Joel Butler, US CMS Research Program Manager E-mail: butler@fnal.gov Phone: (630) 840-3148, Fax: (630) 840-2194...

332

Personalized diabetes management  

E-Print Network (OSTI)

In this thesis, we present a system to make personalized lifestyle and health decisions for diabetes management, as well as for general health and diet management. In particular, we address the following components of the ...

O'Hair, Allison Kelly

2013-01-01T23:59:59.000Z

333

Optimizing IT process management  

Science Conference Proceedings (OSTI)

In this paper, the author discusses some key concepts in IT process management. The paper also includes the recommendations in these following aspects: team organization, physical environment, project selection, politics, organizational communication, ... Keywords: IT process management

Tony Tony Lee

2010-07-01T23:59:59.000Z

334

Emergency Management Forum  

NLE Websites -- All DOE Office Websites (Extended Search)

EM Forum The Oak Ridge Emergency Management Forum is sponsored by the U.S. Department of Energy (DOE) Oak Ridge Office (ORO) and Tennessee Emergency Management Agency (TEMA). Each...

335

Energy manager design for microgrids  

E-Print Network (OSTI)

Energy Manager Design for Microgrids Hillier, F. , and G.Energy Manager Design for Microgrids Appendix A: Smart*DER:Manager Design for Microgrids Prepared for the California

Firestone, Ryan; Marnay, Chris

2005-01-01T23:59:59.000Z

336

Use Portfolio Manager | ENERGY STAR  

NLE Websites -- All DOE Office Websites (Extended Search)

Use Portfolio Manager Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and managers Existing buildings Commercial new construction Industrial...

337

Energy manager design for microgrids  

E-Print Network (OSTI)

to a building energy management system already in place to2003. Microgrid Energy Management System Oak Ridge, TN:better. The term energy management systems (EMS) is widely

Firestone, Ryan; Marnay, Chris

2005-01-01T23:59:59.000Z

338

Meter Data Management  

Science Conference Proceedings (OSTI)

The traditional role of Meter Data Management (MDM) systems has been to acquire and prepare meter data for billing purposes, but these systems have much wider operational value for utilities. Advanced MDM systems could reshape electric power delivery, management, and economics if their cost and complexity could be managed. This White Paper lays out the potential advantages of improved Meter Data Management Systems (MDMS), discusses possible deployment strategies for such systems, and provides a descripti...

2008-07-07T23:59:59.000Z

339

Asset Management Best Practices  

Science Conference Proceedings (OSTI)

The Electric Power Research Institute (EPRI) has conducted a series of surveys on the status of the implementation of power delivery asset management and the maintenance of key substation components. The results will assist utilities in determining how to best adapt or adopt the principles of asset management in their organizations. This technical update presents the results of surveys covering organizational and technical aspects of asset management, including detailed questions on the management of pow...

2010-12-23T23:59:59.000Z

340

System and Network Management  

Science Conference Proceedings (OSTI)

This document covers Systems and Network Management Requirements and is the first deliverable in a joint EPRI and Utility User Project to develop Network Management capability for Electric Utility Automation Systems (UAS) using international communication standards such as IEC 61850. The management of substation automation systems is critical since tools are now based, for the most part, on proprietary hardware and software. In modern state-of-the art substations, traditional network management has ...

2012-12-20T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Maintenance and Veg Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Functions Infrastructure projects Interconnection OASIS OATT Reauthorization of Transmission Line Permits, Maintenance and Vegetation Management on Forest Service Lands...

342

Management Transition Guidance  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Records and Information Records and Information Management Transition Guidance November 2013 Records and Information Management Transition Guidance i Records and Information Management Transition Guidance Table of Contents Executive Summary ........................................................................................................................ 1 1.0 Introduction and Purpose ..................................................................................................... 1 LM Records Functions ................................................................................................................ 1 2.0 The Records Life Cycle ....................................................................................................... 2 3.0 Organizational Responsibilities ........................................................................................... 2

343

T-614: Cisco Unified Communications Manager Database Security Vulnerability  

Energy.gov (U.S. Department of Energy (DOE))

The vulnerability is due to unspecified errors in the affected software that may allow the attacker to perform SQL injections. An authenticated, remote attacker could inject arbitrary SQL code on the system, allowing the attacker to take unauthorized actions.

344

Radioactive Waste Management Basis  

SciTech Connect

The purpose of this Radioactive Waste Management Basis is to describe the systematic approach for planning, executing, and evaluating the management of radioactive waste at LLNL. The implementation of this document will ensure that waste management activities at LLNL are conducted in compliance with the requirements of DOE Order 435.1, Radioactive Waste Management, and the Implementation Guide for DOE Manual 435.1-1, Radioactive Waste Management Manual. Technical justification is provided where methods for meeting the requirements of DOE Order 435.1 deviate from the DOE Manual 435.1-1 and Implementation Guide.

Perkins, B K

2009-06-03T23:59:59.000Z

345

ENVIRONMENTAL MANAGEMENT OFFICE OF ENVIRONMENTAL MANAGEMENT  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ENVIRONMENTAL ENVIRONMENTAL MANAGEMENT OFFICE OF ENVIRONMENTAL MANAGEMENT OFFICE OF ENVIRONMENTAL MANAGEMENT OFFICE OF EM Recovery NEWS FLASH RECOVERY.GOV March 10, 2011 American Recovery and Reinvestment Act Payments Surge Past $4 Billion U.S. Depar tment of Energy | Office of Environmental Management For More Information on EM Recovery Act Work, Visit Us on the Web: http://www.em.doe.gov/emrecovery/ FINANCIAL HIGHLIGHTS * More than $4 BILLION in Recovery Act payments are accelerating environmental cleanup * 67% of EM Recovery Act funds have been paid Financial data are based on reporting as of March 9, 2011, and are subject to change. EM has made more than $4 billion in Recovery Act payments, or 32 percent of the DOE's $12.4 billion in Recovery Act payments. DOE received $35.2 billion

346

SHSD Manager Safety Engineering Group Manager  

E-Print Network (OSTI)

Safety, Excavation Safety, Scaffold Safety D. Cubillo: Division Database Programmer J. Durnan: Design. Horn (0.5) ORPS Categorizer S. Moss (Emeritus) S. Kane, Group Manager 9/7/10 Environment, Safety

347

Federal Energy Management Program: Federal Energy Management...  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Management Program Contacts Contact Us By phone: 202-586-5772 By mail: U.S. Department of Energy EE-2L 1000 Independence Ave., S.W. Washington, D.C. 20585-0121 Contact...

348

Integrated Safety Management (ISM)  

NLE Websites -- All DOE Office Websites (Extended Search)

Integrated Safety Management Integrated Safety Management Home ISM Policy ISM Champions ISM Workshops Resources Archives Contact Us Health and Safety HSS Logo Integrated Safety Management (ISM) ism logo Welcome to the Department of Energy's Office of Health, Safety and Security (HSS) Integrated Safety Management (ISM) Web Site. The Department and its contractors remain firmly committed to ISM as first defined in 1996. The objective of ISM is to perform work in a safe and environmentally sound manner. More specifically, as described in DOE P 450.4, Safety Management System Policy: "The Department and Contractors must systematically integrate safety into management and work practices at all levels so that missions are accomplished while protecting the public, the worker, and the environment. This is to be accomplished through effective integration of safety management into all facets of work planning and execution." "

349

Identity Management Systems Program Homepage  

Science Conference Proceedings (OSTI)

Identity Management Systems Program. ... Identity management systems are responsible for the creation, use, and termination of electronic identities. ...

2010-10-05T23:59:59.000Z

350

Managed Programs, Environmental Protection Division  

NLE Websites -- All DOE Office Websites (Extended Search)

training and supporting subject matter expertise. Environmental Information Management System: storing, managing, verifying, protecting, retrieving and archiving BNL's...

351

Enabling decentralised management through federation  

Science Conference Proceedings (OSTI)

Cross-domain management is an increasingly important concern in network management and such management capability is a key-enabler of many emerging computing environments. This paper analyses the requirements for management systems that aim to support ... Keywords: Federation, Management, Policy-based management, Semantics, Telecommunications

Kevin Feeney; Rob Brennan; John Keeney; Hendrik Thomas; Dave Lewis; Aidan Boran; Declan O'Sullivan

2010-11-01T23:59:59.000Z

352

Federal Energy Management Program: Federal Energy and Water Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Energy and Federal Energy and Water Management Awards to someone by E-mail Share Federal Energy Management Program: Federal Energy and Water Management Awards on Facebook Tweet about Federal Energy Management Program: Federal Energy and Water Management Awards on Twitter Bookmark Federal Energy Management Program: Federal Energy and Water Management Awards on Google Bookmark Federal Energy Management Program: Federal Energy and Water Management Awards on Delicious Rank Federal Energy Management Program: Federal Energy and Water Management Awards on Digg Find More places to share Federal Energy Management Program: Federal Energy and Water Management Awards on AddThis.com... Project Assistance Training Outreach Awards for Saving Energy Federal Energy and Water Management Better Buildings Federal Award

353

Federal Energy Management Program: Interagency Energy Management Task Force  

NLE Websites -- All DOE Office Websites (Extended Search)

About the Program About the Program Site Map Printable Version Share this resource Send a link to Federal Energy Management Program: Interagency Energy Management Task Force Members to someone by E-mail Share Federal Energy Management Program: Interagency Energy Management Task Force Members on Facebook Tweet about Federal Energy Management Program: Interagency Energy Management Task Force Members on Twitter Bookmark Federal Energy Management Program: Interagency Energy Management Task Force Members on Google Bookmark Federal Energy Management Program: Interagency Energy Management Task Force Members on Delicious Rank Federal Energy Management Program: Interagency Energy Management Task Force Members on Digg Find More places to share Federal Energy Management Program: Interagency Energy Management Task Force Members on AddThis.com...

354

TESLA: Multicast Source Authentication Transform  

E-Print Network (OSTI)

This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet-Drafts are working documents of the Internet Engineering

Internet Draft Perrig

2000-01-01T23:59:59.000Z

355

Program Management | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Management Management Program Management Safety The Office of Environmental Management's (EM) top priority is to ensure proper implementation and continuous improvement of Integrated Safety Management Systems (ISMS) in the EM complex and to serve as a focal point for EM safety standards and policy development and interpretation and interfaces with internal/external oversight organizations Read more Acquisition The Office of Environmental Management strives to assure effective project, acquisition, and contract management, by working closely with senior level officials in Headquarters and Field Managers; external stakeholders; and major contractors for the purpose of achieving acquisition and project management objectives of the Office of Environmental Management (EM)

356

Business System Management Review  

NLE Websites -- All DOE Office Websites (Extended Search)

P-004 Business System Management Review Process 11_0304Page 1 of 7 P-004 Business System Management Review Process 11_0304Page 1 of 7 EOTA - Business Process Document Title: Business System Management Review Process Document Number: P-004 Rev 11_0304 Document Owner: Elizabeth Sousa Backup Owner: Melissa Otero Approver(s): Melissa Otero Parent Document: Q-001, Quality Manual Notify of Changes: EOTA Employees Referenced Document(s): F-009, Business System Management Review Template P-004 Business System Management Review Process 11_0304Page 2 of 7 Revision History: Rev. Description of Change A Initial Release 08_0414 Corrective Actions, Preventive Actions, and Improvement Opportunity 09_1124 Edited document for clarity and to better fit the process in use. Added requirement to provide management with

357

Premises Energy Management  

Science Conference Proceedings (OSTI)

Premises energy management describes the automated management of electric appliances. The objective of the premises energy management system (PEMS) is to provide a value-added service to the PEMS owner and a single interface for the utility through which aggregated grid services can be supplied. This report provides two contributions to existing research: a functional requirement literature review and a simulated PEMS performance analysis.

2011-11-09T23:59:59.000Z

358

Depleted Uranium Hexafluoride Management  

NLE Websites -- All DOE Office Websites (Extended Search)

OFFICE OF DEPLETED URANIUM HEXAFLUORIDE MANAGEMENT Issuance Of Final Report On Preconceptual Designs For Depleted Uranium Hexafluoride Conversion Plants The Department of Energy...

359

EMERGENCY MANAGEMENT (EM)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

MANAGEMENT (EM) MANAGEMENT (EM) OBJECTIVE EM.1 A routine drill program and emergency operations drill program, including program records, have,been established and implemented. (Core Requirement 11) Criteria 1. Emergency preparedness drills and exercises are conducted and an adequate response capability,exists. 2. Routine operations drills and exercises are conducted and an adequate response capability exists. 3. Applicable emergency management documentation (e.g., Building Emergency Plan, emergency,response procedures, Emergency Preparedness Hazards Assessment, alarm response procedures,,and emergency response procedures) has been updated to reflect implementation of the TA-55 . Approach Record Reviews: Review the emergency management documents (e.g., Building

360

Federal Identity Management Handbook  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Identity Management Handbook Federal Identity Management Handbook Version 0.1 December 2005 VERSION 0.1 Federal Identity Management Handbook Acknowledgements The Office of Management and Budget and the Federal Identity Credentialing Committee would like to acknowledge the significant contributions of the National Institute of Standards and Technology (NIST) and the Government Smart Card Interagency Advisory Board (IAB) for providing valuable contributions to the development of this handbook. A special thanks goes out to those who participated in the various workshops and provided valuable subject matter expertise and lessons learned. The comments received from other government and industry organizations are also acknowledged. VERSION 0.1 i

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Numerical Simulation Management  

Science Conference Proceedings (OSTI)

... API. A high level API is required for customizing the management process when the SMT requirements do not meet the researcher's needs. ...

2013-07-19T23:59:59.000Z

362

Management Information Reporting Procedures  

Science Conference Proceedings (OSTI)

... but are not limited to assistance in developing environmental management systems, improving ... with a client that is already in the database, there is ...

2010-07-01T23:59:59.000Z

363

THE PRESIDENT'S MANAGEMENT AGENDA  

NLE Websites -- All DOE Office Websites (Extended Search)

For example, * Workforce planning and restructuring undertaken as part of Strategic Management of Human Capital will be defined in terms of each agency's mission, goals, and...

364

Environmental Management Commission (Alabama)  

Energy.gov (U.S. Department of Energy (DOE))

The Alabama Department of Environmental Management is charged with developing the state's environmental policy, hearing administrative appeals of permits, administrative orders and variances issued...

365

Revolutionizing Software Asset Management  

Science Conference Proceedings (OSTI)

... Security Automation Minimize Risk Page 3. ... Update Software Distribution/ Management ... 4 Test Devices One system has base OS + MSIE 8.0 ...

2012-11-02T23:59:59.000Z

366

Nuclear Waste Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Waste Management's Yucca Mountain Project and the Office of Nuclear Energy's Advanced Fuel Cycle Initiative (AFCI) and Global Nuclear Energy Partnership (GNEP) programs. Efforts...

367

Crypto Key Management Framework  

Science Conference Proceedings (OSTI)

... responsible to executive-level management (eg, the Chief Information Officer) for the ... entity information, keys, and metadata into a database used by ...

2013-08-15T23:59:59.000Z

368

Energy Management - TMS  

Science Conference Proceedings (OSTI)

TMS 2011: Lunchtime Session: Energy Management: Things Your Mother Didn't Teach You February 27 - March 3, 2011 San Diego, California. Anyone...

369

Efficient Water Use & Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Sustainability Goals Water Use Goal 4: Efficient Water Use & Management Aware of the arid climate of northern New Mexico, water reduction and conservation remains a primary...

370

E M Environmental Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

E M Environmental Management safety performance cleanup closure EM RECOVERY ACT TOP LINE MESSAGES * The Department estimates the 6 billion Recovery Act investment has allowed us...

371

Energy Management Systems  

E-Print Network (OSTI)

This presentation will address results from a pilot project with 10 chemical plants on energy management systems and the development of an energy efficiency plant certification program.

Ferland, K.

2007-01-01T23:59:59.000Z

372

GO MANAGERS OFFICE  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

starch 12122007 15:50 303275497* GO MANAGERS OFFICE PAGE 0306 * * processing and dry corn fractionation and has developed numerous proprietary technologies in the field of...

373

Integrated waste management.  

E-Print Network (OSTI)

??Integrated waste management is considered from a systems approach, with a particular emphasis on advancing sustainability. The focus of the thesis is to examine the (more)

Seadon, Jeffrey Keith

2010-01-01T23:59:59.000Z

374

b. FINANCIAL MANAGEMENT POLICY  

Science Conference Proceedings (OSTI)

The TMS Financial Management Policy establishes the methods and guidelines by which the .... INVESTMENT POLICIES AND PROCEDURES. 5.1 The...

375

Office of Quality Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Data. To meet these missions, the Office of Quality Management: Develops and revises DOE Regulations and Orders concerning Restricted Data, Formerly Restricted Data,...

376

Stormwater Management Act (Pennsylvania)  

Energy.gov (U.S. Department of Energy (DOE))

The policy and purpose of this act is to encourage planning and management of storm water runoff in each watershed consistent with sound water and land use practices.

377

Training Management System  

NLE Websites -- All DOE Office Websites (Extended Search)

Beam Time ESAF Contacts Calendars User Community Scientific Access Site AccessVisit Training Training Management System Argonne system used to track training requirements and...

378

Mixed Waste Management Guidelines  

Science Conference Proceedings (OSTI)

The management of mixed waste presents serious challenges to nuclear utilities. Regulatory and practical predicaments make compliance with the letter of all applicable regulations extremely difficult. Utility experts developed these guidelines to identify opportunities for improving work practices and regulatory compliance while minimizing any potential adverse impacts of mixed waste management.

1994-12-31T23:59:59.000Z

379

EPRI Tritium Management Model  

Science Conference Proceedings (OSTI)

While tritium generated by nuclear power plants has insignificant dose impacts to the public, its management can be a significant issue in terms of public relations and perception. This document provides a tool for nuclear power plant decision makers to assess their operating strategies for tritium management.

2005-11-10T23:59:59.000Z

380

Managing UX teams  

Science Conference Proceedings (OSTI)

This SIG will serve two purposes: as a forum to share the results from the two-day CHI workshop, and also as a forum for the management community to discuss topics of interest. Keywords: design, management, method, organizations, practice, research, technique, user experience

Janice Rohn; Dennis Wixon; Jim Nieters; Carola Thompson

2011-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Lawn Water Management  

E-Print Network (OSTI)

Water is a limited resource in Texas. This booklet explains how homeowners can establish a water management program for a home lawn that both maintains a healthy sod and also conserves water. The publication discusses soil types, grass varieties, management practices and watering techniques.

McAfee, James

2006-06-26T23:59:59.000Z

382

Sustainable warehouse management  

Science Conference Proceedings (OSTI)

Sustainable warehouse is about integrating, balancing and managing the economic, environmental and social inputs and outputs of the warehouse operations. Sustainability is a core value to many businesses but they find it hard to implement in their current ... Keywords: sustainability modelling, sustainable warehouse management, system dynamics

Kah-Shien Tan; M. Daud Ahmed; David Sundaram

2009-06-01T23:59:59.000Z

383

Substation Stormwater Management  

Science Conference Proceedings (OSTI)

Electric substations have unique considerations in stormwater management due to the presence of high voltage lines and fluids that create contaminant concerns. In response to the changing regulatory climate, Electric Power Research Institute (EPRI) members identified a need to assess and develop stormwater management strategies to control discharges from electric substation construction sites.BackgroundStormwater regulation is becoming more stringent across ...

2013-11-21T23:59:59.000Z

384

Risk Management RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Risk Management Review Module Risk Management Review Module March 2010 CD-0 O 0 OFFICE OF C CD-1 F ENVIRO Standard R Risk M Rev Critical Decis CD-2 M ONMENTAL Review Plan Managem view Module sion (CD) Ap CD March 2010 L MANAGE (SRP) ment e pplicability D-3 EMENT CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-1189-2008, Integration of Safety into the Design Process, and EM's internal

385

Office of Legacy Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

December 1.7, 2010 December 1.7, 2010 MEMORANDUM FOR DAVID W. GEISER, DIRECTOR, DOE-LM- 1 FROM: TRACY A. RIBEIRO, ENVIRONMENTAL PROGRAM MANAGER, DOE-LM , f , ,,, Tracy R i b e ~ r o n / / 2010.1 2 17 08:47:34 -07'00' SUBJECT: Approval of FY 201 1 EMS Goals and Initiatives In accordance with the requirements of the DOE-LM Environmental Management System Description, the highlighted EMS goals and initiatives for FY 201 1 are enclosed for your formal approval. The EMS goals and initiatives align with DOE Order 450.1 A, Environmental Protection Program; DOE Order 430.2B, Departmental Energy, Renewable Energy and Transportation Management; the Transformational Energy Action Management (TEAM) Initiative, Executive Order 13423, Strengthening Federal Environmental, Energy and Transportation Management,

386

Terrestrial Carbon Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Terrestrial Carbon Management Data Sets and Analyses Terrestrial Carbon Management Data Sets and Analyses Carbon Accumulation with Cropland Management Influence of Agricultural Management on Soil Organic Carbon: A Compendium and Assessment of Canadian Studies (VandenBygaart et al., Agriculture and Agri-Food Canada) Soil Carbon Sequestration by Tillage and Crop Rotation: A Global Data Analysis (West and Post, Oak Ridge National Laboratory) Preliminary Estimates of the Potential for Carbon Mitigation in European Soils Through No-Till Farming (Smith et al., University of Aberdeen, United Kingdom) Potential for Carbon Sequestration in European Soils: Preliminary Estimates for Five Scenarios Using Results from Long-Term Experiments (Smith et al., University of Aberdeen, United Kingdom) Carbon Accumulation with Grassland Management

387

Federal Energy Management Program: Best Management Practice: Laboratory and  

NLE Websites -- All DOE Office Websites (Extended Search)

Laboratory and Medical Equipment to someone by E-mail Laboratory and Medical Equipment to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Laboratory and Medical Equipment on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Laboratory and Medical Equipment on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Laboratory and Medical Equipment on Google Bookmark Federal Energy Management Program: Best Management Practice: Laboratory and Medical Equipment on Delicious Rank Federal Energy Management Program: Best Management Practice: Laboratory and Medical Equipment on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Laboratory and Medical Equipment on AddThis.com... Sustainable Buildings & Campuses

388

Federal Energy Management Program: Best Management Practice: Toilets and  

NLE Websites -- All DOE Office Websites (Extended Search)

Toilets and Urinals to someone by E-mail Toilets and Urinals to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Toilets and Urinals on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Toilets and Urinals on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Toilets and Urinals on Google Bookmark Federal Energy Management Program: Best Management Practice: Toilets and Urinals on Delicious Rank Federal Energy Management Program: Best Management Practice: Toilets and Urinals on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Toilets and Urinals on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance Greenhouse Gases Water Efficiency Basics

389

Best Management Practice: Water Management Planning | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Best Management Practice: Water Management Planning Best Management Practice: Water Management Planning Best Management Practice: Water Management Planning October 7, 2013 - 3:03pm Addthis A successful water management program starts with developing a comprehensive water management plan. This plan should be included within existing facility operating plans. Water management plans should provide clear information about how a facility uses water from the time it is piped in to its ultimate disposal. Knowing how water is used and what it costs enables Federal agencies to make appropriate water management decisions. Overview Federal facility water management plans should include the following: Water Use Policy Statement and Goals Senior management should indicate support for water efficiency in a material way. This can be done in two ways:

390

RSA BSAFE Crypto-C Micro Edition 3.0.0.20 Security Policy  

Science Conference Proceedings (OSTI)

... EC Diffie-Hellman primitives must use curve domain parameters ... library for their platform, which loads the Crypto ... the module is first loaded, must be ...

2013-06-24T23:59:59.000Z

391

Reducing energy consumption on RSA mines through optimised compressor control / Walter Booysen.  

E-Print Network (OSTI)

??South Africa experienced a severe shortfall in electricity supply during 2008. Eskom, the national electricity supplier, implemented several strategies to alleviate the situation. The Power (more)

Booysen, Walter

2010-01-01T23:59:59.000Z

392

Instructions for Using Two-Factor RSA Tokens with Citrix Workplace...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Login Procedure: Enter https:workplace.doe.gov in the address field of your Internet browser. The Citrix Workplace window appears. Enter your user name in the User name...

393

Proxy Documentation, Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Proxy Configuration Proxy Configuration Here you will find instructions for using the FTP and Web proxies. Keep in mind that depending on where you access the proxies from (whether you are inside or outside of the BNL network), the process will differ slightly. For FTP, you will not be required to enter any passwords to use the proxies while on the BNL network. However, when accessing the proxies from an outside network (e.g. anything not .bnl.gov), you will be required to authenticate using a RSA SecurID Token. If you do not already have one of these, please visit the RSA SecurID User Guide for instructions on obtaining one. Users who are only interested in configuring their web browsers need NOT bother with RSA SecurID, as the web proxies will not be needed when you are outside the BNL network.

394

Records Management POC Responsibilities | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

RespbsforHQPOCSREDESIGN.pdf More Documents & Publications POINT OF CONTACT RESPONSIBILITIES FOR RECORDS MANAGEMENT Records Management Handbook Records Management Handbook...

395

Information and Records Management Transition Guidance | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information and Records Management Transition Guidance Information and Records Management Transition Guidance Information and Records Management Transition Guidance (March 2004)...

396

Automated Transportation Management System (ATMS) | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Waste Management Packaging and Transportation Automated Transportation Management System (ATMS) Automated Transportation Management System (ATMS) The Department of Energy's...

397

Appendix 8 - iManage Change Management Standards  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Date: Robert Regan CHRISePerformance Project Manager Signature: Date: Matthew Sparks STRIPES Project Manager Signature: Date: Distribution This document has been distributed to:...

398

Federal Energy Management Program: DOE Enhances Management of...  

NLE Websites -- All DOE Office Websites (Extended Search)

and Renewable Energy Federal Energy Management Program DOE Enhances Management of Energy Savings Performance Contracts U.S. Department of Energy (DOE) Assistant Secretary...

399

Site Management Guide | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

here Home Site Management Guide Site Management Guide Site Management Guide (Blue Book) (Revision 14, December 2012) Site Management Guide More Documents & Publications...

400

Risk Management Process Overview | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cybersecurity Risk Management Process Risk Management Process Overview Risk Management Process Overview figure depicting three tier risk management process The cybersecurity...

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

College of Environmental Management | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Environmental Management College of Environmental Management College of Environmental Management Mission The College of Environmental Management (CEM) mission is to provide EM...

402

Procurement and Property Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Doing Business with... Doing Business with... Brookhaven National Laboratory (BNL) Procurement and Property Management provides customers with timely, cost-effective procurement and property management services integrated with and supporting the Laboratory's science, technology and cleanup missions in accordance with the prime contract and customer expectations. Services Include: Procurement of high quality supplies and services that meet customer requirements, Identification and control of government property, Maintaining an efficient stores operation, Expeditious shipping, receiving and delivery services. PPM Has Moved! We are located at: 44 Ramsey Road Shirley, NY 11967 Directions Procurement Property Management Purchasing System Approval (pdf) Personal Property Approval (pdf)

403

Risk Management Tool Attributes:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

- Tools & SMEs - Tools & SMEs Outline for Breakout Session TOOLS 1. Types of Tools a. Risk Management - Database & Reports, risk register, risk forms, risk tracking & monitoring, basis of estimate, action item tracking, historical record of risks & changes, configuration control, enterprise-wide, metrics, risk performance index, risk checklist, graphical display, management reporting (various levels), risk communications b. Risk Analysis i. Cost, ii. budgets, funding, cash-flow analysis, iii. Schedule iv. tailoring categories v. Integrated Cost & Schedule vi. Project phase analysis; organization ownership & joint planning c. Risk Knowledge and Lessons Learned Database i. Enterprise-wide ii. Job/owner-specific iii. Workshops - project specific, risk management,

404

Performance Management Plan  

SciTech Connect

This Performance Management Plan describes the approach for accelerating cleanup activities of U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Operations Office (NNSA/NV) Environmental Management (EM) Program. This approach accelerates the reduction of risk at NNSA/NV sites while performing the work responsibly, effectively, and more efficiently. In May 2002, NNSA/NV EM and the Nevada Division of Environmental Protection signed a Letter of Intent formalizing an agreement to pursue accelerated risk reduction and cleanup for activities within the State of Nevada. This Performance Management Plan provides the strategic direction for implementing the Letter of Intent.

IT Corporation, Las Vegas, NV

2002-08-21T23:59:59.000Z

405

Federal Energy Management Program: Best Management Practice: Distribution  

NLE Websites -- All DOE Office Websites (Extended Search)

Distribution System Audits, Leak Detection, and Repair to someone Distribution System Audits, Leak Detection, and Repair to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Distribution System Audits, Leak Detection, and Repair on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Distribution System Audits, Leak Detection, and Repair on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Distribution System Audits, Leak Detection, and Repair on Google Bookmark Federal Energy Management Program: Best Management Practice: Distribution System Audits, Leak Detection, and Repair on Delicious Rank Federal Energy Management Program: Best Management Practice: Distribution System Audits, Leak Detection, and Repair on Digg Find More places to share Federal Energy Management Program: Best

406

Federal Energy Management Program: Metering  

NLE Websites -- All DOE Office Websites (Extended Search)

Metering to Metering to someone by E-mail Share Federal Energy Management Program: Metering on Facebook Tweet about Federal Energy Management Program: Metering on Twitter Bookmark Federal Energy Management Program: Metering on Google Bookmark Federal Energy Management Program: Metering on Delicious Rank Federal Energy Management Program: Metering on Digg Find More places to share Federal Energy Management Program: Metering on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance Federal Requirements Program Management Commissioning Metering Systems Approaches Process Computerized Maintenance Management Systems Maintenance Types Major Equipment Types Resources Contacts Greenhouse Gases Water Efficiency Data Center Energy Efficiency Industrial Facilities

407

DOE Office of Environmental Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Environmental Management Environmental Management Project and Contract Management Improvement Timeline Improving DOE contract and project management is a top priority of the Department's senior management and entire organization. The DOE Office of Environmental Management (EM) has put in place a "Roadmap" for Journey to Excellence that sets specific performance expectations for continuous improvements in contract and project management. Following are some highlights of EM's improvement actions over the past five years. In 2006, the National Academy of Public Administration (NAPA) began a study of EM, which included acquisition and project management among its key focus areas. The resultant report from the study,

408

Cryptographic Key Management Workshop 2012  

Science Conference Proceedings (OSTI)

Cryptographic Key Management Workshop 2012. Purpose: NIST is conducting a two-day Key Management Workshop on September 10-11. ...

2013-08-01T23:59:59.000Z

409

Vencon Management | Open Energy Information  

Open Energy Info (EERE)

| Sign Up Search Page Edit with form History Facebook icon Twitter icon Vencon Management Jump to: navigation, search Name Vencon Management Place United States Sector...

410

Email in personal information management  

Science Conference Proceedings (OSTI)

Email's conduit function means the inbox, folders, search, and sort are used to support core PIM functions of task management, personal archiving, and contact management.

Steve Whittaker; Victoria Bellotti; Jacek Gwizdka

2006-01-01T23:59:59.000Z

411

Drilling Waste Management Technology Descriptions  

NLE Websites -- All DOE Office Websites (Extended Search)

skip navigation Drilling Waste Management Information System: The information resource for better management of drilling wastes DWM Logo Search Search you are in this section...

412

NIM (NERSC Information Management) system  

NLE Websites -- All DOE Office Websites (Extended Search)

NERSC Information Management (NIM) portal The NERSC Information Management (NIM) system is a web portal used to view and modify user account, usage, and allocations information....

413

Engage upper management | ENERGY STAR  

NLE Websites -- All DOE Office Websites (Extended Search)

Facility owners and managers Existing buildings Commercial new construction Industrial energy management Small business Service providers Service and product providers Verify...

414

Federal Energy Management Program: Publications  

NLE Websites -- All DOE Office Websites (Extended Search)

that about 10% of this is used to heat Details Bookmark & Share View Related Federal Energy Management Program Overview - Facilitating Sound, Cost-Effective Energy Management...

415

Industrial energy management | ENERGY STAR  

NLE Websites -- All DOE Office Websites (Extended Search)

Facility owners and managers Existing buildings Commercial new construction Industrial energy management Small business Service providers Service and product providers Verify...

416

Federal Energy Management Program: Technologies  

NLE Websites -- All DOE Office Websites (Extended Search)

Technologies Site Map Printable Version Share this resource Send a link to Federal Energy Management Program: Technologies to someone by E-mail Share Federal Energy Management...

417

Federal Energy Management Program: Outreach  

NLE Websites -- All DOE Office Websites (Extended Search)

Outreach to someone by E-mail Share Federal Energy Management Program: Outreach on Facebook Tweet about Federal Energy Management Program: Outreach on Twitter Bookmark Federal...

418

Jennifer Caldwell Senior Commercialization Manager  

NLE Websites -- All DOE Office Websites (Extended Search)

Caldwell, 865-574-4180, caldwelljt@ornl.gov Jennifer Caldwell Senior Commercialization Manager Jennifer Caldwell is a Senior Commercialization Manager for the Partnerships...

419

Federal Energy Management Program: Commissioning  

NLE Websites -- All DOE Office Websites (Extended Search)

Commissioning to someone by E-mail Share Federal Energy Management Program: Commissioning on Facebook Tweet about Federal Energy Management Program: Commissioning on Twitter...

420

Management Excellence by Sandra Waisley  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

cleanup closure E M Environmental Management 2 EM Journey to Excellence Roadmap DOE Strategic Plan (2011) (Goal: Management and Operational Excellence) Performance Agreement...

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Drilling Waste Management Information System  

NLE Websites -- All DOE Office Websites (Extended Search)

The Drilling Waste Management Information System is an online resource for technical and regulatory information on practices for managing drilling muds and cuttings, including...

422

Managing Radiation Emergencies: Prehospital Guidance  

NLE Websites -- All DOE Office Websites (Extended Search)

Guidance for Prehospital Emergency Services Guidance for Hospital Medical Management Procedure Demonstration How do you manage emergencies? Guidance for Prehospital Emergency...

423

Contract/Project Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fourth Quarter Fourth Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 Contract/Project Management Performance Metric FY 2012 Target FY 2012 Final FY 2012 Pre- & Post-CAP Final Comment Capital Asset Project Success: Complete 90% of capital asset projects at original scope and within 110% of CD-2 TPC. 90%* 86% Construction 87% Cleanup 84% 77% Pre-CAP 89% Post-CAP This is based on a 3- year rolling average (FY10 to FY12). TPC is Total Project Cost. Contract/Project Management Performance Metrics FY 2012 Target FY 2012 4th Qtr Actual Comment Certified EVM Systems: Post CD-3, (greater than $20 million). 95%* 100% EVM represents Earned Value Management. Certified FPD's at CD-1: Projects

424

Government Energy Management  

Energy.gov (U.S. Department of Energy (DOE))

The U.S. Department of Energy's Federal Energy Management Program (FEMP) plays a critical role in reducing energy use and increasing the use of renewable energy at federal agencies. The U.S....

425

Contract/Project Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

First Quarter First Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 Contract/Project Management Performance Metric FY 2012 Target FY 2012 Forecast FY 2012 Pre- & Post-CAP Forecast Comment Capital Asset Project Success: Complete 90% of capital asset projects at original scope and within 110% of CD-2 TPC. 90%* 84% Construction 83% Cleanup 85% 77% Pre-CAP 86% Post- CAP This is based on a 3- year rolling average (FY10 to FY12). TPC is Total Project Cost. Contract/Project Management Performance Metrics FY 2012 Target FY 2012 1st Qtr Actual Comment Certified EVM Systems: Post CD-3, (greater than $20 million). 95%* 94% EVM represents Earned Value Management. Certified FPD's at CD-1: Projects

426

Contract/Project Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Second Quarter Second Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 Contract/Project Management Performance Metric FY 2012 Target FY 2012 Forecast FY 2012 Pre- & Post-CAP Forecast Comment Capital Asset Project Success: Complete 90% of capital asset projects at original scope and within 110% of CD-2 TPC. 90%* 88% Construction 87% Cleanup 89% 77% Pre-CAP 92% Post- CAP This is based on a 3- year rolling average (FY10 to FY12). TPC is Total Project Cost. Contract/Project Management Performance Metrics FY 2012 Target FY 2012 2nd Qtr Actual Comment Certified EVM Systems: Post CD-3, (greater than $20 million). 95%* 96% EVM represents Earned Value Management. Certified FPD's at CD-1: Projects

427

Supplier Selection Management Process  

NLE Websites -- All DOE Office Websites (Extended Search)

ADMP-002 Vendor Selection and Management Process 11_0203 1 of 9 ADMP-002 Vendor Selection and Management Process 11_0203 1 of 9 EOTA - Business Process Document Title: Vendor Selection and Management Process Document Number: ADMP-002 Rev. 11_0203 Document Owner: Elizabeth Sousa Backup Owner: Melissa Otero Approver(s): Melissa Otero Parent Document: Q-001, Quality Manual Notify of Changes: EOTA Employees Referenced Document(s): ADMF-009 Vendor Audit Plan, ADMF-010 Vendor Audit Checklist, ADMF-011 Vendor Audit Report, ADMF-015 Vendor Evaluation Record, ADMP-001 Procurement Process, ADMF-016 EOTA Vendor List, REG-003 Record Register ADMP-002 Vendor Selection and Management Process 11_0203 2 of 9 Revision History: Rev. Description of Change A Initial Release 08_1110 Added verbiage and reference for ADMF-016, EOTA Vendor List to process.

428

Integrating Management Systems  

NLE Websites -- All DOE Office Websites (Extended Search)

Mission Execution by Mission Execution by Integrating our Management Systems Integrating our Management Systems 1 W e e k l y O p e r a t i o n s M e e t i n g N o v e m b e r 1 , 2 0 1 1 M i c h a e l J . W e i s Pulling the Pieces Together for Improving DOE Management to Enable Mission Execution 2  Process changes Process changes  Behavioral changes Behavioral changes  System changes System changes Process Change Approach Strengthening and Expediting Decision Making 3 Proposed Outcomes Horizontal Integration Incoming DOE Business Crosscutting Issues (i.e. NLDC input) Hi-level Roadblocks Operations Management Council Associate Deputy Secretary Collaborative Action Process Chief Operating Officer Weekly Operations Council (OMC) Super 8 Secretary (ADS) (CAP) Board (COOB) p Meeting Endorsement / Commitment Super 8 US Meetings COO Meetings

429

Safety Management System Policy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

POLICY POLICY Washington, D.C. Approved: 4-25-11 SUBJECT: INTEGRATED SAFETY MANAGEMENT POLICY PURPOSE AND SCOPE To establish the Department of Energy's (DOE) expectation for safety, 1 including integrated safety management that will enable the Department's mission goals to be accomplished efficiently while ensuring safe operations at all departmental facilities and activities. This Policy cancels and supersedes DOE Policy (P) 411.1, Safety Management Functions, Responsibilities, and Authorities Policy, dated 1-28-97; DOE P 441.1, DOE Radiological Health and Safety Policy, dated 4-26-96; DOE P 450.2A, Identifying, Implementing and Complying with Environment, Safety and Health Requirements, dated 5-15-96; DOE P 450.4, Safety Management

430

Transportation Management Workshop: Proceedings  

Science Conference Proceedings (OSTI)

This report is a compilation of discussions presented at the Transportation Management Workshop held in Gaithersburg, Maryland. Topics include waste packaging, personnel training, robotics, transportation routing, certification, containers, and waste classification.

Not Available

1993-10-01T23:59:59.000Z

431

COMPREHENSIVE LEGACY MANAGEMENT  

Office of Legacy Management (LM)

Revision 7.0 Final This page intentionally left blank LMSFERS03496-7.0 Comprehensive Legacy Management and Institutional Controls Plan Volumes I and II Fernald Preserve Fernald,...

432

BNL Environmental Management Directorate  

NLE Websites -- All DOE Office Websites (Extended Search)

Surface Projects Brookhaven Graphite Research Reactor High Flux Beam Reactor Waste Management Division OU IV Five-Year Review The five-year review of the Operable Unit IV...

433

Uranium Management and Policy  

Energy.gov (U.S. Department of Energy (DOE))

The Office of Uranium Management and Policy (NE-54), as part of the Office of Fuel Cycle Technologies (NE-5), supports the Department of Energy (DOE) by assuring domestic supplies of fuel for...

434

Manage Software Testing  

Science Conference Proceedings (OSTI)

Covering all aspects of test management, this book guides you through the business and organizational issues that you are confronted with on a daily basis, and explains what you need to focus on strategically, tactically, and operationally.

Peter Farrell-Vinay

2007-07-01T23:59:59.000Z

435

Management Control Cover  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fees in the Idaho National Laboratory Contract OAS-M-06-07 August 2006 REPORT ON MANAGEMENT CONTROLS OVER PERFORMANCE FEES IN THE IDAHO NATIONAL LABORATORY CONTRACT TABLE OF...

436

External > Programs > Environmental Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Haul Road Environmental Management The Oak Ridge Reservation is one of the U.S. Department of Energy's (DOE) most unique and complex sites, encompassing three major campuses and...

437

Integrated XML Document Management  

Science Conference Proceedings (OSTI)

XML has become a widely accepted data format for exchange and representation of semi-structured data. Efficiently managing XML as well as traditional business documents and content in an integrated fashion is a necessity for companies to be successful ...

Hui-I Hsiao; Joshua Hui; Ning Li; Parag Tijare

2003-01-01T23:59:59.000Z

438

Contract/Project Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 ContractProject Management Primary Performance Metrics FY 2011 Target FY 2011 Forecast FY 2011 Pre- & Post-CAP Forecast Comment 1a. Capital Asset Line Item Projects:...

439

Contract/Project Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and Targets 1 ContractProject Management Performance Metric FY 2012 Target FY 2012 Forecast FY 2012 Pre- & Post-CAP Forecast Comment Capital Asset Project Success: Complete 90%...

440

Contract/Project Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Project Management Primary Performance Metrics FY 2011 Target FY 2011 Actual & Forecast FY 2011 Pre- & Post-CAP Comment 1a. Capital Asset Line Item Projects: (Pre-RCACAP)...

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Contract/Project Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 ContractProject Management Primary Performance Metrics FY 2010 Target FY 2010 Forecast FY 2010 Pre- & Post-CAP Comment 1a. Capital Asset Line Item Projects: (Pre-RCACAP)...

442

ISSUES MANAGEMENT PROGRAM MANUAL  

E-Print Network (OSTI)

ISSUES MANAGEMENT PROGRAM MANUAL LBNL/PUB-5519 (1), Rev. 0and Analysis Program Manual. LBNL/PUB-5519 (1), Rev. 0the Regulations and Procedures Manual (RPM): CATS database o

Gravois, Melanie

2007-01-01T23:59:59.000Z

443

Waste Management Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Waste Management Facility ISO 14001 Registered A wide range of wastes are generated during the normal course of business at BNL. These waste streams are common to many businesses...

444

Environmental Management System Plan  

E-Print Network (OSTI)

Protection Program, DOE Order 450.1A (June 4, 3. DOE Oand Health Reporting, DOE Order 231.1A (1995, as amended).Emergency Management System, DOE Order 151.1B (October 29,

Fox, Robert

2009-01-01T23:59:59.000Z

445

Contract/Project Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Third Quarter Third Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 Contract/Project Management Performance Metric FY 2012 Target FY 2012 Forecast FY 2012 Pre- & Post-CAP Forecast Comment Capital Asset Project Success: Complete 90% of capital asset projects at original scope and within 110% of CD-2 TPC. 90%* 87% Construction 87% Cleanup 87% 77% Pre-CAP 90% Post- CAP This is based on a 3- year rolling average (FY10 to FY12). TPC is Total Project Cost. Contract/Project Management Performance Metrics FY 2012 Target FY 2012 3rd Qtr Actual Comment Certified EVM Systems: Post CD-3, (greater than $20 million). 95%* 98% EVM represents Earned Value Management. Certified FPD's at CD-1: Projects

446

Lithium battery management system  

SciTech Connect

Provided is a system for managing a lithium battery system having a plurality of cells. The battery system comprises a variable-resistance element electrically connected to a cell and located proximate a portion of the cell; and a device for determining, utilizing the variable-resistance element, whether the temperature of the cell has exceeded a predetermined threshold. A method of managing the temperature of a lithium battery system is also included.

Dougherty, Thomas J. (Waukesha, WI)

2012-05-08T23:59:59.000Z

447

Environmental information management plan  

Science Conference Proceedings (OSTI)

The Environmental Information Management Plan provides an overview of the management of environmental information generation by Hanford Site programs. The long-term nature of environmental programs requires that electronic data, documents, and other materials be kept for extended periods in a secure, controlled, and retrievable manner. An important part of the program is the maintenance of administrative records under the Hanford Federal Facility Agreement and Consent Order (Ecology et al. 1989). The Environmental Information Management Plan introduces Westinghouse Hanford records management and engineering document control systems and their relationship to environmental programs. Specific information is provided about the operation of the Environmental Data Management Center, a central facility that receives, processes, and maintains information related to environmental program activities. The Environmental Data Management Center maintains a reference file, coordinates administrative record activities, and distributes administrative record indexes and administrative record documents to the US Environmental Protection Agency, the US Department of Energy, the Washington State Department of Ecology, and four information repositories. 43 refs., 16 figs., 5 tabs.

Michael, L.E.; Main, G.C.; See, E.J.

1990-03-01T23:59:59.000Z

448

Data Management Tools  

SciTech Connect

What is data management (DM) and why is it important? As described in the ''Handbook of Data Management'' (Thuraisingham, 1998), data management is the process of understanding the data needs of an organization and making the data available to support the operations of the organization. The ultimate goal of data management is to provide the seamless access and fusion of massive amounts of data, information, and knowledge in a heterogeneous and real-time environment, and to support the functions and decision making processes of an organization. The important questions that need to be asked for proper data management are: who is going to be using the data, what types of data need to be stored, and how will this data be accessed? With these questions answered, the data management system (DMS) can then be created, or an existing system can be modified to meet the needs of the organization. The real importance of a data management system is to provide the end user with a consistent data set of known quality. The elements of a good data management system should include a system that: is modeled to how the data is collected and processed, is very well documented, has specifically defined data elements, and has supporting data documentation. Supporting documentation includes items like quality control (QC) data that is carried with the analytical data, and meta data (information about the data). Supporting documentation can be anything that is useful to the project and that needs to be accessed with the data. Data sets get better the more they are used. As errors and inconsistencies are identified and corrected, the data set improves. A good DMS will achieve this because its design promotes use, and the ultimate value of data is in its use rather than its storage. The development and use of Internet access tools, and existing environmental data management systems, can help reduce the effort and cost associated with setting up a DMS. This presentation will discuss the qualities of a good data management system and provide examples.

Ridley, M; Stoker, C

2001-02-12T23:59:59.000Z

449

National reconstruction information management system  

Science Conference Proceedings (OSTI)

National Reconstruction Information Management System (NARIMS) is a revolutionary concept designed and developed by the National Reconstruction Bureau, Government of Pakistan, to work as an aid in support of the Local Governments under the Devolution ... Keywords: administration, asset management, community development, decision support, e-governance, financial, geographical information system, human resource management, information management system, local government, monitoring, performance evaluation

Daniyal Aziz; Syed Adnan Shah; Deeba Gilani

2007-12-01T23:59:59.000Z

450

Thermal Management of Solar Cells  

E-Print Network (OSTI)

UNIVERSITY OF CALIFORNIA RIVERSIDE Thermal Management ofUniversity of California, Riverside Acknowledgments First, I

Saadah, Mohammed Ahmed

2013-01-01T23:59:59.000Z

451

Enterprise level IT risk management  

Science Conference Proceedings (OSTI)

Increasing IT budget and over-dependence of business on IT infra-structure makes risk management a critical component of enterprise management. The creation and sustenance of an IT risk management framework is one of the crucial and challenging tasks ... Keywords: enterprise level, information technology, risk management

Nadhirah Azizi; Khairuddin Hashim

2008-11-01T23:59:59.000Z

452

Biometrics Identity Management Agency Laboratory  

Science Conference Proceedings (OSTI)

Biometrics Identity Management Agency Laboratory. NVLAP Lab Code: 200933-0. Address and Contact Information: 1000 ...

2013-08-09T23:59:59.000Z

453

FACULTY OF SCIENCE FACULTY MANAGER  

E-Print Network (OSTI)

Lesley Barry EARTH SCIENCES School Manager Jane Coles GEOGRAPHICAL SCIENCES School Manager Jane Coles Manager Kev Williams BRISTOL CENTRE FOR NANOSCIENCE AND QUANTUM INFORMATION Centre Manager Fred Hale Executive support Senior Executive A ssistant Mary Mussett Administrative Assistant Liz Wainwright Executive

Bristol, University of

454

NIST Office of Financial Resource Management  

Science Conference Proceedings (OSTI)

NIST Office of Financial Resource Management. Divisions. Budget Division; Finance Division; Business Systems Division; Acquisition Management ...

2012-01-11T23:59:59.000Z

455

Automating Personalized Battery Management on Smartphones  

E-Print Network (OSTI)

3 Automating Battery Management . . . . . . .122 Battery Goal Setting UI . . . . . . . . . . . . . . .Power and Battery Management . . . . . . . . . . . . . . .

Falaki, Mohamamd Hossein

2012-01-01T23:59:59.000Z

456

Federal Computer Security Program Managers' Forum (Forum ...  

Science Conference Proceedings (OSTI)

Federal Computer Security Program Managers' Forum. Summary: The Federal Computer Security Program Managers' Forum ...

2013-01-15T23:59:59.000Z

457

Property Management | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Management Management Property Management Personal Property Management and Accountability for Headquarters Management Personal property management includes all functions necessary for the proper determination of need, source, acquisition, receipt, accountability, utilization, maintenance, rehabilitation, storage, distribution and disposal of property. Authorized Property Representatives Effective October 2, 2013: Authorized Property Pass Signers List and Accountable Property Representatives List Personal Property Guidance Personal property management requires a lifecycle approach to be effective. There are four major phases in the personal property lifecycle: acquisition, receipt, utilization, and disposal. Each phase has distinct processes and procedures associated with it to maintain proper stewardship

458

Records Management | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Management Management Records Management The Department of Energy (DOE) Records Management Program ensures compliance with the Federal Records Act of 1950, as amended, by promoting the management of records throughout their life cycle in an economical, efficient and effective manner. Implementation of a sound Records Management Program facilitates decision-makers and others having the right information in support of mission accomplishment; and the creation and maintenance of records to protect the rights and interests of the Department and those we serve. The Records Management Program is also responsible for the Department's Information Collection Program, and the Information Quality Program. The Information Collection Program is responsible for implementing the

459

Records Management | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Management Management Records Management The Department of Energy (DOE) Records Management Program ensures compliance with the Federal Records Act of 1950, as amended, by promoting the management of records throughout their life cycle in an economical, efficient and effective manner. Implementation of a sound Records Management Program facilitates decision-makers and others having the right information in support of mission accomplishment; and the creation and maintenance of records to protect the rights and interests of the Department and those we serve. The Records Management Program is also responsible for the Department's Information Collection Program, and the Information Quality Program. The Information Collection Program is responsible for implementing the

460

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 29, 2011 August 29, 2011 T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password RSA enVision lets remote users view files and remote authenticated users obtain password. August 25, 2011 T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks. August 22, 2011 T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks. August 17, 2011 T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Management Information Systems (MIS) Sample Occupations  

E-Print Network (OSTI)

Support Specialist Computer and Information Systems Manager Computer Training Specialist Consultant Data Recruiter Knowledge Manager Logistics Manager Management Analysis MIS Director/Specialist Network Securities & Exchange Commission Website Design Companies Wholesale & Retail Companies Operations Manager

Ronquist, Fredrik

462

About CRSP Management Center  

NLE Websites -- All DOE Office Websites (Extended Search)

CRSP Act Power Projects Contact CRSP Customers Environmental Review-NEPA Financial Data Operations Planning & Projects Power Marketing Rates CRSP Act Power Projects Contact CRSP Customers Environmental Review-NEPA Financial Data Operations Planning & Projects Power Marketing Rates About Colorado River Storage Project Management Center CRSP Management Center Office The Ak-Chin Indian Community in Arizona, the city of Aspen, Colo., and Kirtland Air Force Base in New Mexico are a few of the vital customers of the Colorado River Storage Project's Management Center. We assist customers in saving their valuable electrical resources by actively promoting energy management and conservation programs and helping them determine their future energy needs. When customers want new products and services tailored to their individual needs, we explore their ideas. We are also committed to protecting the delicate balance of the Colorado River and its tributaries. Agencies that manage this river's resources must weigh its many roles: irrigation, recreation, hydropower and native and non-native endangered species habitat protection. Balancing these resources with the needs of water and electrical energy customers is a chief concern.

463

Procurement and Property Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Traffic Management Services Plum Island Constructed 1827 Traffic Management Services Plum Island Constructed 1827 Shipping and Receiving Supervisor: M. White Phone: 631-344-2300 Email: mwhite@bnl.gov Traffic Management Services include the following: Transportation Services. Provide guidance on methods of shipment, carrier availability, and discount programs for moving freight for the account of the U. S. Government. Employee Relocation Program. Coordinate the movement of household goods for BNL employees. Receipt and Inspection of goods. Provide the services necessary to ensure that goods are received, inspected, and delivered on time. Ensure that damages are noted at time of delivery and establish claims as necessary. Import/Export Services. Provide guidance on the requirements for shipments made by the Laboratory to destinations outside the continental United States. Obtain Export Licenses as needed.

464

Safety & Emergency Management  

NLE Websites -- All DOE Office Websites (Extended Search)

F.A.Q.s F.A.Q.s Conference Center and APS Site Activity Coordination Management and/or Coordination of APS Site Work/Services Safety & Emergency Management Database Maintenance Personnel Safety & Emergency Management Area Emergency Supervision Drills/Training Page Bob Whitman with any questions or concerns. Area Emergency Supervisors and Building Monitors in your location can be found online. ESH 108 Building Orientation Page Bob Whitman with any questions regarding the newly designed ESH 108 Building Orientation course. Fire Alarm System Testing Through Argonne Fire Protection Services, the fire alarm system is tested visually and audibly annually. Life Safety Inspections Page Carl Nelson at 4-1892 with any questions. Life Safety Inspections are collected by Carl via fax at 2-9729 or delivery to office B0149

465

Nuclear Safety Management  

NLE Websites -- All DOE Office Websites (Extended Search)

[6450-01-P] [6450-01-P] DEPARTMENT OF ENERGY 10 CFR Part 830 Nuclear Safety Management AGENCY: Department of Energy (DOE). ACTION: Final Rule. SUMMARY: The Department of Energy (DOE) is issuing a final rule regarding Nuclear Safety Management. This Part establishes requirements for the safe management of DOE contractor and subcontractor work at the Department's nuclear facilities. Today's rule adopts the sections that will make up the generally applicable provisions for Part 830. It also adopts the specific section on provisions for developing and implementing a formalized quality assurance program. EFFECTIVE DATE: This regulation becomes effective [insert 30 days after publication in the Federal Register.] FOR FURTHER INFORMATION CONTACT: Frank Hawkins, U.S. Department of Energy, Nuclear Safety

466

PETSc: Docs: Code Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Code Management Code Management Home Download Features Documentation Manual pages and Users Manual Citing PETSc Tutorials Installation SAWs Changes Bug Reporting Code Management FAQ License Linear Solver Table Applications/Publications Miscellaneous External Software Developers Site In this file we list some of the techniques that may be used to increase one's efficiency when developing PETSc application codes. We have learned to use these techniques ourselves, and they have improved our efficiency tremendously. Editing and Compiling The biggest time sink in code development is generally the cycle of EDIT-COMPILE-LINK-RUN. We often see users working in a single window with a cycle such as: Edit a file with emacs. Exit emacs. Run make and see some error messages. Start emacs and try to fix the errors; often starting emacs hides

467

RMOTC - Testing - Carbon Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Carbon Management Carbon Management Ten Sleep Time Structure, 2nd Wall Creek Formation at RMOTC Notice: As of July 15th 2013, the Department of Energy announced the intent to sell Naval Petroleum Reserve Number 3 (NPR3). The sale of NPR-3 will also include the sale of all equipment and materials onsite. A decision has been made by the Department of Energy to complete testing at RMOTC by July 1st, 2014. RMOTC will complete testing in the coming year with the currently scheduled testing partners. For more information on the sale of NPR-3 and sale of RMOTC equipment and materials please join our mailing list here. RMOTC has the field setting, infrastructure, and expertise to play an important role in carbon management testing, demonstration, and research. The unique combination of a publicly-owned and DOE-operated oil field,

468

Computer memory management system  

DOE Patents (OSTI)

A computer memory management system utilizing a memory structure system of "intelligent" pointers in which information related to the use status of the memory structure is designed into the pointer. Through this pointer system, The present invention provides essentially automatic memory management (often referred to as garbage collection) by allowing relationships between objects to have definite memory management behavior by use of coding protocol which describes when relationships should be maintained and when the relationships should be broken. In one aspect, the present invention system allows automatic breaking of strong links to facilitate object garbage collection, coupled with relationship adjectives which define deletion of associated objects. In another aspect, The present invention includes simple-to-use infinite undo/redo functionality in that it has the capability, through a simple function call, to undo all of the changes made to a data model since the previous `valid state` was noted.

Kirk, III, Whitson John (Greenwood, MO)

2002-01-01T23:59:59.000Z

469

Load-management decision  

Science Conference Proceedings (OSTI)

Utilities require baseload, intermediate, and peaking plants to meet fluctuating customer demand. These can be supplemented with off-peak generation and storage and load management, which can take the form of direct utility control over interruptible and deferrable customers or customer incentives that require off-peak demand. Utilities should make a careful analysis of their load profile, their generation mix, their ability to shift loads, and customer attitudes before deciding on a load-management program that fits their individual needs. They should also be aware that load management is only a limited resource with a number of uncertainties. Research programs into customer relations, system reliability, communications devices, and special control switches and meters will help to relieve some of the uncertainties. (DCK)

Lihach, N.; Gupta, P.

1982-05-01T23:59:59.000Z

470

Management Control Cover  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Assess- Assess- ing Natural Resource Damage at Rocky Flats OAS-M-06-02 November 2005 REPORT ON MANAGEMENT CONTROLS OVER ASSESSING NATURAL RESUORCE DAMAGE AT ROCKY FLATS TABLE OF CONTENTS Natural Resource Damage Assessment at Rocky Flats Details of Finding 1 Recommendation and Comments 3 Appendices Objective, Scope, and Methodology 5 Prior Audit Reports 6 Management Comments 7 NATURAL RESURCE DAMAGE ASSESSMENT AT ROCKY FLATS Page 1 Details of Finding Natural Resource The Rocky Flats Project Office (Project Office) had not initiated, Damage Assessment and had no plans, at the time of our review, for conducting a Natural Resource Damage Assessment (NRDA) at the Rocky Flats

471

Senior Technical Safety Manager  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technical Program Technical Program Manager Qualification Standard DOE-STD-1178-2004 May 2013 Reference Guide The Functional Area Qualification Standard References Guides are developed to assist operators, maintenance personnel, and the technical staff in the acquisition of technical competence and qualification within the Technical Qualification Program. Please direct your questions or comments related to this document to the Office of Leadership and Career Manager, Technical Qualification Program (TQP), Albuquerque Complex. This page is intentionally blank. Table of Contents i FIGURES ....................................................................................................................................... ii TABLES ......................................................................................................................................... ii

472

Records Management: a manual  

SciTech Connect

Records Management provides a Records Depository service that enables an office to get rid of semi-active and inactive records. Cleaning out files makes it possible to manage active records more efficiently and find the files when they are needed. Records Depository will also store essential records on Blue Label tapes that must be preserved in case of disaster to Sandia National Laboratories at Albuquerque or Livermore. Step-by-step instructions make the procedure of storing, retrieving, and destroying records a simple matter.

Blair, T.L.

1985-03-01T23:59:59.000Z

473

Western Veg Management EA  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Environmental Assessment for the Environmental Assessment for the Glen Canyon to Pinnacle Peak 345 kV Transmission Lines Vegetation Management Project within the Coconino National Forest November 2011 Glen Canyon-Pinnacle Peak 345 kV Transmission Lines EPG Vegetation Management Project Draft EA i November 2011 TABLE OF CONTENTS 1 Section 1 - Purpose and Need for Action .................................................................................... 1-1 2 1.1 Introduction and Background ........................................................................... 1-1 3 1.2 Purpose and Need for Action ............................................................................ 1-3 4 1.3 Location and project Area Description ............................................................. 1-3 5

474

Performance Management Methodology Moving from Performance Measurement to Performance Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guide to a Balanced Scorecard: Guide to a Balanced Scorecard: Performance Management Methodology Moving from Performance Measurement to Performance Management Guide to a Balanced Scorecard Performance Management Methodology Richard H. Hopf Deputy Assistant Secretary for Procurement and Assistance Management Department of Energy Lloyd W. Pratsch Procurement Executive Department of State Robert A. Welch Director for Acquisition Management and Procurement Executive Department of Commerce Pauk A. Denett Director of Administration/Senior Procurement Executive Department of Interior David J. Litman Director, Office of Acquisition and Grants Management Department of Transportation Ida M. Ustad Deputy Associate Administrator for Acquisition Policy General Services Administration Terrence J. Tychan Deputy Assistant Secretary for Grants

475

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

91 - 21200 of 26,764 results. 91 - 21200 of 26,764 results. Article T-672: Oracle Critical Patch Update Advisory- July 2011 Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply CPU fixes as soon as possible. This Critical Patch Update contains 78 new security fixes across all product families. http://energy.gov/cio/articles/t-672-oracle-critical-patch-update-advisory-july-2011 Article T-640: RSA Access Manager Server CVE-2011-0322 Update RSA strongly recommends that all customers running RSA Access Manager Server versions 5.5.3, 6.0.4, and 6.1 apply the following updated security hot fixes, which contain the resolution to this issue, at the earliest opportunity. The hot fixes can be downloaded from SecurCare Online or by contacting RSA Security Customer Support.

476

Federal Energy Management Program: News  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PROJECT FUNDING PROJECT FUNDING TECHNOLOGIES SERVICES NEWS & EVENTS EERE » Federal Energy Management Program » News & Events Site Map Printable Version Share this resource Send a link to Federal Energy Management Program: News to someone by E-mail Share Federal Energy Management Program: News on Facebook Tweet about Federal Energy Management Program: News on Twitter Bookmark Federal Energy Management Program: News on Google Bookmark Federal Energy Management Program: News on Delicious Rank Federal Energy Management Program: News on Digg Find More places to share Federal Energy Management Program: News on AddThis.com... News Events News Subscribe to RSS News Feed RSS Feed icon January 13, 2014 FEMP Offers New Advanced eTraining on UESCs The U.S. Department of Energy (DOE) Federal Energy Management Program

477

Assessment of Project Management Experience  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Assessment of Project Management Experience PMCDP for CEG Competency 1.12.2 Assessment of Project Management Experience PMCDP for CEG Competency 1.12.2 Applicant Name: Applicant Supervisor: Date (mm/dd/yyyy): Directions: Step 1: Use this template to show project management experience for CEG competency 1.12.2. Rate your experience (0 - 5) in the following project management related activities using the scale below. Step 2: Sign the completed form and have your supervisor review and sign it. Step 3: Once approved by your supervisor, submit the form as part of your Level I certification package. Note: Project management experience is distinguished from FPD experience and applies to general project management activities and experience. Positions that do not count towards experience in project management include: program manager, property manager, health, safety and security (HSS) positions, and

478

Project Management Resources | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Project Project Management Resources Project Management Resources Performance & Project Completion Environmental Management Completed Projects 2005-Present EM Current Project Performance Office of Engineering and Construction Management (OECM) Monthly Project Dashboard Project Management Resources DOE Office of Environmental Management Project & Contract Management Improvement Timeline Project Management Approach Using Earned Value Management Root Cause Analysis and Corrective Actions Plan DOE Order 413.3B DOE Directives OMB Capital Programming Guide OECM Project Management Career Development Program OECM Project Management Policy and Guidance per Office of Management Project Definition Rating Index (PDRI) Project Management Institute (PMI) Construction Industry Institute (CII)

479

Trust Management Considerations For the Cooperative Infrastructure Defense Framework: Trust Relationships, Evidence, and Decisions  

Science Conference Proceedings (OSTI)

Cooperative Infrastructure Defense (CID) is a hierarchical, agent-based, adaptive, cyber-security framework designed to collaboratively protect multiple enclaves or organizations participating in a complex infrastructure. CID employs a swarm of lightweight, mobile agents called Sensors designed to roam hosts throughout a security enclave to find indications of anomalies and report them to host-based Sentinels. The Sensors findings become pieces of a larger puzzle, which the Sentinel puts together to determine the problem and respond per policy as given by the enclave-level Sergeant agent. Horizontally across multiple enclaves and vertically within each enclave, authentication and access control technologies are necessary but insufficient authorization mechanisms to ensure that CID agents continue to fulfill their roles in a trustworthy manner. Trust management fills the gap, providing mechanisms to detect malicious agents and offering more robust mechanisms for authorization. This paper identifies the trust relationships throughout the CID hierarchy, the types of trust evidence that could be gathered, and the actions that the CID system could take if an entity is determined to be untrustworthy.

Maiden, Wendy M.

2009-12-01T23:59:59.000Z

480

Stage Management & Technology  

E-Print Network (OSTI)

Stage managers provide centralized communication, organization, and task coordination for all individuals in the production team. This study explores the advantages and disadvantages of different and new forms of technology implemented into various facets of theatrical production and the provisions of the stage manager outlined above. Technology will be compared to traditional methods to determine the differences in the efficiency of communication and documentation. The purpose of this study is to determine if universal, user-friendly technologies are capable of achieving the desired tasks of the stage manager by reaching multiple points of reference. Three different forms of technology are utilized as tools to assess their efficiency: social networking, VirtualCallboard, and the iPad. These tools are employed to analyze communication across the production team. The intention is to eliminate the need for paper documentation and duplication while increasing the effectiveness of communication. These findings will determine which segments and systems of the research are universally applicable. They will also suggest which technologies are a practical approach for assisting with the tasks and responsibilities of the stage manager. Analysis of this research will establish if these sources provide a reasonable advantage in a theatrical setting and if they are dependable enough to use in place of traditional methods.

O'Brien, Madison D

2013-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Lighting management casebook  

SciTech Connect

Fifteen examples illustrate how lighting system projects can save energy as well as improve productivity and safety. The case histories include the use of programmable lighting, fiber optics, skylights, voltage reduction, ultrasonic and infrared sensors, and other strategies for improving lighting efficiency. Each case history includes the management approach, site information, and applications. (DCK)

1982-06-01T23:59:59.000Z

482

Software management issues  

SciTech Connect

The difficulty of managing the software in large HEP collaborations appears to becoming progressively worst with each new generation of detector. If one were to extrapolate to the SSC, it will become a major problem. This paper explores the possible causes of the difficulty and makes suggestions on what corrective actions should be taken.

Kunz, P.F.

1990-06-01T23:59:59.000Z

483

Comprehensive Environmental Management Process  

SciTech Connect

This report contains information about Los Alamos National Laboratory`s Comprehensive Environmental Management Plan. The topics covered include: waste minimization, waste generation, environmental concerns, public relations of the laboratory, and how this plan will help to answer to the demands of the laboratory as their mission changes.

Hjeresen, D.L.; Roybal, S.L.

1994-08-01T23:59:59.000Z

484

UNIVERSITY OF FINANCIAL MANAGEMENT  

E-Print Network (OSTI)

UNIVERSITY OF HAWAI`I FINANCIAL MANAGEMENT INFORMATION SYSTEMS (FMIS) ON-LINE QUICK REFERENCE GUIDE Reference Guide FIXED ASSETS SYSTEM (FFX) Scrn Num Screen Name 502 Asset Maintenance Use this screen-2093 Fixed Assets System (FFX), Inventory Maintenance - transfer, disposal of equipment, decal, equipment

485

Transportation Demand Management Plan  

E-Print Network (OSTI)

Transportation Demand Management Plan FALL 2009 #12;T r a n s p o r t a t i o n D e m a n d M a n the transportation impacts the expanded enrollment will have. Purpose and Goal The primary goal of the TDM plan is to ensure that adequate measures are undertaken and maintained to minimize the transportation impacts

486

Purge water management system  

DOE Patents (OSTI)

A purge water management system for effectively eliminating the production of purge water when obtaining a groundwater sample from a monitoring well. In its preferred embodiment, the purge water management system comprises an expandable container, a transportation system, and a return system. The purge water management system is connected to a wellhead sampling configuration, typically permanently installed at the well site. A pump, positioned with the monitoring well, pumps groundwater through the transportation system into the expandable container, which expands in direct proportion with volume of groundwater introduced, usually three or four well volumes, yet prevents the groundwater from coming into contact with the oxygen in the air. After this quantity of groundwater has been removed from the well, a sample is taken from a sampling port, after which the groundwater in the expandable container can be returned to the monitoring well through the return system. The purge water management system prevents the purge water from coming in contact with the outside environment, especially oxygen, which might cause the constituents of the groundwater to oxidize. Therefore, by introducing the purge water back into the monitoring well, the necessity of dealing with the purge water as a hazardous waste under the Resource Conservation and Recovery Act is eliminated.

Cardoso-Neto, Joao E. (North Augusta, SC); Williams, Daniel W. (Aiken, SC)

1996-01-01T23:59:59.000Z

487

Purge water management system  

DOE Patents (OSTI)

A purge water management system is described for effectively eliminating the production of purge water when obtaining a groundwater sample from a monitoring well. In its preferred embodiment, the purge water management system comprises an expandable container, a transportation system, and a return system. The purge water management system is connected to a wellhead sampling configuration, typically permanently installed at the well site. A pump, positioned with the monitoring well, pumps groundwater through the transportation system into the expandable container, which expands in direct proportion with volume of groundwater introduced, usually three or four well volumes, yet prevents the groundwater from coming into contact with the oxygen in the air. After this quantity of groundwater has been removed from the well, a sample is taken from a sampling port, after which the groundwater in the expandable container can be returned to the monitoring well through the return system. The purge water management system prevents the purge water from coming in contact with the outside environment, especially oxygen, which might cause the constituents of the groundwater to oxidize. Therefore, by introducing the purge water back into the monitoring well, the necessity of dealing with the purge water as a hazardous waste under the Resource Conservation and Recovery Act is eliminated.

Cardoso-Neto, J.E.; Williams, D.W.

1995-01-01T23:59:59.000Z

488

8 Management Plan Introduction  

E-Print Network (OSTI)

in the subbasin to mitigate and protect resources affected by the construction and operation of the Federal ratepayer funds to construct or improve existing infrastructure, to acquire land or protective easements geographic scope are: · Unknown management strategies for the Hanford Reach Monument, because the U.S. Fish

489

Hazardous Waste Management Training  

E-Print Network (OSTI)

Hazardous Waste Management Training Persons (including faculty, staff and students) working be thoroughly familiar with waste handling and emergency procedures ap- plicable to their job responsibilities before handling hazardous waste. Departments are re- quired to keep records of training for as long

Dai, Pengcheng

490

Monitoring informs management  

SciTech Connect

Improved regional monitoring and reporting of greenhouse-gas emissions depends on accurate estimates of emissions from different land-use regimes. An analysis suggests that measuring emissions per crop yield may be an optimum metric for refining land-management decisions.

West, Tristram O.

2011-10-24T23:59:59.000Z

491

Senior Director Project Management  

E-Print Network (OSTI)

(IG-13-003, November 15, 2012) The Office of Inspector General contracted with the independent public with the Government Accountability Office's Government Auditing Standards and the Office of Management and Budget section of NASA's FY 2012 Agency Financial Report for the Inspector General's transmittal letter and Pw

Ginzel, Matthew

492

OFFICE FOR EMERGENCY MANAGEMENT  

Office of Legacy Management (LM)

OFFICE FOR EMERGENCY MANAGEMENT 155OP STREETNW. WiSHINGTON. D.C. ' , iQns 25,19&L At-t :. I' .' at l530 P Btmat, IO&, XtwMn&m, 0. 6., at 9130 A.Jb Sa 1 llmbemupoftbaaomlttaal8f...

493

Energy Management and Sustainability Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Management and Sustainability Policy Management and Sustainability Policy USAA Real Estate Company has a reputation for excellence in customer service and taking a leadership role in the real estate industry. As part of our commitment to excellence, we will identify and implement improved financial and operation efficiencies, particularly in how we purchase and use energy, striving toward world-class status in energy management and sustainability. Commitment to Energy & Sustainability Management Energy Management and Sustainability will continually play a role in achieving our strategic objectives. Specifically, the USAA Real Estate Company Energy Management and Sustainability Strategy is to: Support the organization's strategic plan to maximize ownership value and provide customers and

494

Quality Management | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Quality Management Quality Management Quality Management The Office of Quality Management, within the Office of Health, Safety and Security develops policies and procedures to ensure the classification and control of information is effective and consistent. The Office of Quality Management also assists other Government agencies to meet the requirements contained in DOE-issued regulations concerning Restricted Data and Formerly Restricted Data. To meet these missions, the Office of Quality Management: Develops and revises DOE Regulations and Orders concerning Restricted Data, Formerly Restricted Data, Transclassified Foreign Nuclear Information, National Security Information, Unclassified Controlled Nuclear Information, and Official Use Only Responds to Mandatory Declassification Review Requests under

495

Managing projects utilizing self-managed teams and managerial toolkits  

E-Print Network (OSTI)

Project Management is an essential function in most software companies today. With increasing complexity and inter connectivity between software projects, it is not surprising that managing such large scale development ...

Mathur, Praveen, S. M. Massachusetts Institute of Technology

2009-01-01T23:59:59.000Z

496

Manager's Desk Reference on Human Capital Management Flexibilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Manager's Desk Reference on Human Capital Management Flexibilities Manager's Desk Reference on Human Capital Management Flexibilities Manager's Desk Reference on Human Capital Management Flexibilities The purpose of this document is to provide DOE managers and supervisors with information on available flexibilities that can be used in day-to-day human capital management activities, especially those bearing on the recruitment and retention of high-quality staff. Each section of the document includes a basic description of a particular tool as well as Frequently Asked Questions related to how to best use it in a given set of circumstances or in combination with other flexibilities, unless they are available elsewhere, in which the web link is listed under References for that section. At the end of each section are references with web links that

497

Project Management Plan (PMP) for Work Management Implementation  

SciTech Connect

The purpose of this document is to provide a project plan for Work Management Implementation by the River Protection Project (RPP). Work Management is an information initiative to implement industry best practices by replacing some Tank Farm legacy system

SHIPLER, C.E.

2000-01-13T23:59:59.000Z

498

POINT OF CONTACT RESPONSIBILITIES FOR RECORDS MANAGEMENT | Department...  

NLE Websites -- All DOE Office Websites (Extended Search)

OF CONTACT RESPONSIBILITIES FOR RECORDS MANAGEMENT More Documents & Publications Records Management POC Responsibilities Records Management Handbook Records Management Handbook...

499

Industrial Energy Management and Standards | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Management and Standards Industrial Energy Management and Standards Industrial Energy Management and Standards Industrial Energy Management and Standards More Documents &...

500

Process Management Maturity Assessment Process Management Maturity Assessment  

E-Print Network (OSTI)

This paper outlines a Business Process Management implementation approach in a large international company. It introduces a Process Management Maturity Assessment (PMMA) which was developed to assess the implementation of Business Process Management. The maturity model is based on the assessment of nine categories which comprehensively cover all aspects which impact the success of Business Process Management. Some findings of the first assessment round are presented to illustrate the benefits of the PMMA approach.

Michael Rohloff; Michael Rohloff

2009-01-01T23:59:59.000Z