National Library of Energy BETA

Sample records for rsa authentication manager

  1. V-174: RSA Authentication Manager Writes Operating System, SNMP...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files V-174: RSA Authentication Manager Writes Operating System,...

  2. V-195: RSA Authentication Manager Lets Local Users View the Administra...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: RSA Authentication Manager Lets Local Users View the Administrative Account Password V-195: RSA Authentication Manager Lets Local Users View the Administrative Account Password...

  3. T-659: Update support for RSA Authentication Manager

    Broader source: Energy.gov [DOE]

    RSA posted SP4 Patch 4 of their Authentication Manager product 06/30/2011. There are a few pages of fixes in the README, but the most significant is that Authentication Manager can now be installed on Windows Server 2008 (both 32 and 64bit).

  4. U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Scripting and URL Redirection Attacks | Department of Energy 12: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other

  5. U-027: RSA Key Manager Appliance Session Logout Bug Fails to...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated...

  6. V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    issued a fix (7.1.2). Addthis Related Articles U-267: RSA Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability...

  7. U-212: RSA Authentication Manager Flaws Permit Cross-Site and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be ...

  8. V-223: RSA Authentication Agent for PAM Allows Remote Users to...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    has issued a fix Addthis Related Articles U-267: RSA Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability...

  9. U-267: RSA Authentication Agent 7.1 for Microsoft Windows...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RSA Authentication Agent Lets Remote Authenticated Users Bypass an Authentication Step reference LINKS: SecurityTracker Alert ID: 1027559 Bugtraq ID: 55662 CVE-2012-2287...

  10. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Let Remote Users Conduct Cross-Site Scripting Attacks | Department of Energy 51: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks May 8, 2013 - 12:06am Addthis PROBLEM: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks

  11. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Energy Savers [EERE]

    Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users ...

  12. T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw

    Broader source: Energy.gov [DOE]

    An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session.

  13. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  14. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Let Local Users Bypass Security Restrictions | Department of Energy 26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA

  15. T-640: RSA Access Manager Server CVE-2011-0322 Update

    Broader source: Energy.gov [DOE]

    RSA strongly recommends that all customers running RSA Access Manager Server versions 5.5.3, 6.0.4, and 6.1 apply the following updated security hot fixes, which contain the resolution to this issue, at the earliest opportunity. The hot fixes can be downloaded from SecurCare Online or by contacting RSA Security Customer Support. ?Security Hot fix # 5.5.3.174 for RSA Access Manager Server version 5.5.3 ?Security Hot fix # 6.0.4.60 for RSA Access Manager Server version 6.0.4 ?Security Hot fix # 6.1.2.08 for RSA Access Manager Server version 6.1.2 ?Security Hot fix # 6.1.3.05 for RSA Access Manager Server version 6.1.3

  16. V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    has issued fixes. Addthis Related Articles U-267: RSA Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability...

  17. T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID

    Broader source: Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

  18. T-642: RSA SecurID update to Customers

    Broader source: Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products

  19. T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain...

  20. V-036: EMC Smarts Network Configuration Manager Database Authentication

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Bypass Vulnerability | Department of Energy 6: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability November 29, 2012 - 3:30am Addthis PROBLEM: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability PLATFORM: EMC Smarts Network Configuration Manager (NCM) all versions prior 9.1 ABSTRACT: Two vulnerabilities were reported in EMC Smarts

  1. Using Two-Factor RSA Token with WebVPN | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Using Two-Factor RSA Token with WebVPN Using Two-Factor RSA Token with WebVPN Your RSA token is used to esbablish a connection to the Internet and connect to https://connect.doe.gov . Using-TwoFactorRSA-Token w VPN.pdf (469 KB) More Documents & Publications Instructions for WebVPN Connectivity Citrix_2FA_Authentication_09.09 Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc

  2. User guide for remote access to VDI and Workplace using RSA token |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy User guide for remote access to VDI and Workplace using RSA token User guide for remote access to VDI and Workplace using RSA token User guide for remote access to VDI and Workplace using RSA token VDI_WP_RSA_Remote_Guide_Final.pdf (1.22 MB) More Documents & Publications User Guide for Remote Access to VDI/Workplace Using PIV Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc Citrix_2FA_Authentication_09.09

  3. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  4. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  5. Reviews of computing technology: Securing network applications, Kerberos and RSA

    SciTech Connect (OSTI)

    Johnson, S.M.

    1992-06-01

    This paper will focus on the first step in establishing network security, authentication, and describe the basic function of both RSA and Kerberos as used to provide authentication and confidential data transfer services. It will also discuss the Digital Signature Standard and the market acceptance of each. Proper identification of the principals involved in a network dialog is a necessary first step in providing network-wide security comparable to that of stand-alone systems.

  6. Digitally Marking RSA Moduli

    SciTech Connect (OSTI)

    Johnston, A.M.

    2000-10-09

    The moduli used in RSA (see [5]) can be generated by many different sources. The generator of that modulus (assuming a single entity generates the modulus) knows its factorization. They would have the ability to forge signatures or break any system based on this moduli. If a moduli and the RSA parameters associated with it were generated by a reputable source, the system would have higher value than if the parameters were generated by an unknown entity. So for tracking, security, confidence and financial reasons it would be beneficial to know who the generator of the RSA modulus was. This is where digital marking comes in. An RSA modulus ia digitally marked, or digitally trade marked, if the generator and other identifying features of the modulus (such as its intended user, the version number, etc.) can be identified and possibly verified by the modulus itself. The basic concept of digitally marking an RSA modulus would be to fix the upper bits of the modulus to this tag. Thus anyone who sees the public modulus can tell who generated the modulus and who the generator believes the intended user/owner of the modulus is.

  7. U-084: Cisco Digital Media Manager Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port 8443 to access administrative resources and gain administrative privileges....

  8. U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system.

  9. Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Citrix_2FA_Authentication_12_3_2009.doc Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc (453.3 KB) More Documents & Publications Citrix_2FA_Authentication_09.09 Using Two-Factor RSA Token with WebVPN User guide for remote access to VDI and Workplace using RSA token

  10. Authentication Protocol using Quantum Superposition States

    SciTech Connect (OSTI)

    Kanamori, Yoshito; Yoo, Seong-Moo; Gregory, Don A.; Sheldon, Frederick T

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  11. V-234: EMC RSA Archer GRC Open Redirection Weakness and Security...

    Office of Environmental Management (EM)

    4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September ...

  12. System and method for authentication

    SciTech Connect (OSTI)

    Duerksen, Gary L.; Miller, Seth A.

    2015-12-29

    Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.

  13. Low-bandwidth authentication.

    SciTech Connect (OSTI)

    Donnelly, Patrick Joseph; McIver, Lauren; Gaines, Brian R.; Anderson, Erik; Collins, Michael Joseph; Thomas,Kurt Adam; McDaniel, Austin

    2007-09-01

    Remotely-fielded unattended sensor networks generally must operate at very low power--in the milliwatt or microwatt range--and thus have extremely limited communications bandwidth. Such sensors might be asleep most of the time to conserve power, waking only occasionally to transmit a few bits. RFID tags for tracking or material control have similarly tight bandwidth constraints, and emerging nanotechnology devices will be even more limited. Since transmitted data is subject to spoofing, and since sensors might be located in uncontrolled environments vulnerable to physical tampering, the high-consequence data generated by such systems must be protected by cryptographically sound authentication mechanisms; but such mechanisms are often lacking in current sensor networks. One reason for this undesirable situation is that standard authentication methods become impractical or impossible when bandwidth is severely constrained; if messages are small, a standard digital signature or HMAC will be many times larger than the message itself, yet it might be possible to spare only a few extra bits per message for security. Furthermore, the authentication tags themselves are only one part of cryptographic overhead, as key management functions (distributing, changing, and revoking keys) consume still more bandwidth. To address this problem, we have developed algorithms that provide secure authentication while adding very little communication overhead. Such techniques will make it possible to add strong cryptographic guarantees of data integrity to a much wider range of systems.

  14. International safeguards data authentication

    SciTech Connect (OSTI)

    Melton, R.B.; Smith, C.E.; DeLand, S.M.; Manatt, D.R.

    1996-07-01

    The International Safeguards community is becoming increasingly reliant on information stored in electronic form. In international monitoring and related activities it must be possible to verify and maintain the integrity of this electronic information. This paper discusses the use of data authentication technology to assist in accomplishing this task. The paper provides background information, identifies the relevance to international safeguards, discusses issues related to export controls, algorithm patents, key management and the use of commercial vs. custom software.

  15. V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain...

    Office of Environmental Management (EM)

    84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain ...

  16. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic...

    Office of Environmental Management (EM)

    59: RSA BSAFE SSL-C Lets Remote Users Decrypt SSLTLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL...

  17. V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Issue | Department of Energy 4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September 4, 2013 - 6:00am Addthis PROBLEM: A weakness and a security issue have been reported in EMC RSA Archer GRC PLATFORM: EMC RSA Archer GRC 5.x ABSTRACT: This fixes multiple vulnerabilities, which can be exploited to bypass certain security restrictions and to conduct spoofing

  18. Portable RSA encryption-decryption subprogram for protecting proprietary text

    SciTech Connect (OSTI)

    Hanson, R.J.

    1981-09-01

    A virtually portable (FORTRAN) version of the RSA (Rivest, Shamir, Adleman) algorithm for encryption and decryption of proprietary text has been written. This system uses three previously developed software packages. These are an extended precision integer arithmetic package, an error processing package, and machine-sensitive input/output subprograms from the Text Exchange System.

  19. V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access,

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Clickjacking, and File Upload Attacks | Department of Energy 84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks February 5, 2013 - 12:01am Addthis PROBLEM: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks PLATFORM: RSA Archer SmartSuite Framework version 4.x RSA Archer

  20. Multi-factor authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  1. Authentication of byte sequences

    SciTech Connect (OSTI)

    Stearns, S.D.

    1991-06-01

    Algorithms for the authentication of byte sequences are described. The algorithms are designed to authenticate data in the Storage, Retrieval, Analysis, and Display (SRAD) Test Data Archive of the Radiation Effects and Testing Directorate (9100) at Sandia National Laboratories, and may be used in similar situations where authentication of stored data is required. The algorithms use a well-known error detection method called the Cyclic Redundancy Check (CRC). When a byte sequence is authenticated and stored, CRC bytes are generated and attached to the end of the sequence. When the authenticated data is retrieved, the authentication check consists of processing the entire sequence, including the CRC bytes, and checking for a remainder of zero. The error detection properties of the CRC are extensive and result in a reliable authentication of SRAD data.

  2. Authentication of quantum messages.

    SciTech Connect (OSTI)

    Barnum, Howard; Crépeau, Jean-Claude; Gottesman, D.; Smith, A.; Tapp, Alan

    2001-01-01

    Authentication is a well-studied area of classical cryptography: a sender A and a receiver B sharing a classical private key want to exchange a classical message with the guarantee that the message has not been modified or replaced by a dishonest party with control of the communication line. In this paper we study the authentication of messages composed of quantum states. We give a formal definition of authentication in the quantum setting. Assuming A and B have access to an insecure quantum channel and share a private, classical random key, we provide a non-interactive scheme that both enables A to encrypt and authenticate (with unconditional security) an m qubit message by encoding it into m + s qubits, where the probability decreases exponentially in the security parameter s. The scheme requires a private key of size 2m + O(s). To achieve this, we give a highly efficient protocol for testing the purity of shared EPR pairs. It has long been known that learning information about a general quantum state will necessarily disturb it. We refine this result to show that such a disturbance can be done with few side effects, allowing it to circumvent cryptographic protections. Consequently, any scheme to authenticate quantum messages must also encrypt them. In contrast, no such constraint exists classically: authentication and encryption are independent tasks, and one can authenticate a message while leaving it publicly readable. This reasoning has two important consequences: On one hand, it allows us to give a lower bound of 2m key bits for authenticating m qubits, which makes our protocol asymptotically optimal. On the other hand, we use it to show that digitally signing quantum states is impossible, even with only computational security.

  3. Secure authenticated video equipment

    SciTech Connect (OSTI)

    Doren, N.E.

    1993-07-01

    In the verification technology arena, there is a pressing need for surveillance and monitoring equipment that produces authentic, verifiable records of observed activities. Such a record provides the inspecting party with confidence that observed activities occurred as recorded, without undetected tampering or spoofing having taken place. The secure authenticated video equipment (SAVE) system provides an authenticated series of video images of an observed activity. Being self-contained and portable, it can be installed as a stand-alone surveillance system or used in conjunction with existing monitoring equipment in a non-invasive manner. Security is provided by a tamper-proof camera enclosure containing a private, electronic authentication key. Video data is transferred communication link consisting of a coaxial cable, fiber-optic link or other similar media. A video review station, located remotely from the camera, receives, validates, displays and stores the incoming data. Video data is validated within the review station using a public key, a copy of which is held by authorized panics. This scheme allows the holder of the public key to verify the authenticity of the recorded video data but precludes undetectable modification of the data generated by the tamper-protected private authentication key.

  4. Authentication Without Secrets

    SciTech Connect (OSTI)

    Pierson, Lyndon G.; Robertson, Perry J.

    2015-11-01

    This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integrity of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.

  5. V-220: Juniper Security Threat Response Manager Lets Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute...

  6. Instructions for Using Two-Factor RSA Tokens with Citrix Workplace...

    Broader source: Energy.gov (indexed) [DOE]

    Enter your user name in the User name field. Enter your password, which is your RSA token PIN plus the number displayed on the token in the Password field. Click Log on. For more ...

  7. Two-Factor Authentication

    Broader source: Energy.gov [DOE]

    Two-Factor Authentication (2FA) (also known as 2-Step Verification) is a system that employs two methods to identify an individual. More secure than reusable passwords, when a token's random number...

  8. U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection...

    Office of Environmental Management (EM)

    can inject SQL commands. A remote authenticated user can view files on the target system. ... A remote authenticated user can view files on the target system. Solution: The vendor has ...

  9. Security analysis of RSA cryptosystem algorithm and it’s properties

    SciTech Connect (OSTI)

    Liu, Chenglian; Guo, Yongning E-mail: linjuanliucaihong@qq.com; Lin, Juan E-mail: linjuanliucaihong@qq.com

    2014-10-06

    The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles to discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA.

  10. Anonymous authenticated communications

    DOE Patents [OSTI]

    Beaver, Cheryl L.; Schroeppel, Richard C.; Snyder, Lillian A.

    2007-06-19

    A method of performing electronic communications between members of a group wherein the communications are authenticated as being from a member of the group and have not been altered, comprising: generating a plurality of random numbers; distributing in a digital medium the plurality of random numbers to the members of the group; publishing a hash value of contents of the digital medium; distributing to the members of the group public-key-encrypted messages each containing a same token comprising a random number; and encrypting a message with a key generated from the token and the plurality of random numbers.

  11. CERTIFICATE OF AUTHENTICITY

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CERTIFICATE OF AUTHENTICITY I hereby certify that this transcript constitutes an accurate record of the full Council meeting of the National Coal Council held on November 14,2008 at the Westin Grand Hotel, Washington, D.C. ~ i c h a e l G. Mueller, Chair National Coal Council I NATIONAL COAL COUNCIL 1 FULL COUNCIL MEETING FRIDAY NOVEMBER 14, 2 0 0 8 The Full Council meeting convened at 9 : 0 0 a.m. in the Washington Ballroom of the Westin Grand Hotel, 2 3 5 0 M Street, NW, Washington, DC, Chair

  12. AVNG authentication features

    SciTech Connect (OSTI)

    Thron, Jonathan Louis; Mac Arthur, Duncan W; White, Greg; Razinkov, Sergey; Livke, Alexander

    2010-01-01

    Any verification measurement performed on potentially classified nuclear material must satisfy two seemingly contradictory constraints. First and foremost, no classified information can be released. At the same time, the monitoring party must have confidence in the veracity of the measurement (called authentication). An information barrier (IB) is included in the measurement system to protect the potentially classified information. To achieve both goals, the IB allows only very limited, previously agreed-on information to be displayed to the monitoring party. In addition to this limited information from the potentially classified measurement, other measurements are performed and procedures are put in place for the monitoring party to gain confidence that the material being measured is consistent with the host's declarations concerning that material. In this presentation, we will discuss the techniques used in the AVNG attribute measuring system to facilitate authentication of the verification measurements by the monitors. These techniques include measuring unclassified items while allowing more information to be displayed; having the monitor understand the system function, design, and implementation; and randomly selecting the order of measurements.

  13. Two-chip implementation of the RSA public-key encryption algorithm

    SciTech Connect (OSTI)

    Rieden, R.F.; Snyder, J.B.; Widman, R.J.; Barnard, W.J.

    1982-01-01

    A system has been developed which employs two identical integrated circuits to perform the encryption algorithm developed by Rivest, Shamir, and Adleman (RSA) on a 336-bit message. The integrated circuit used in the system employs the 3-micron polysilicon gate, radiation-hard, CMOS technology developed at Sandia National Laboratories.

  14. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Buffer Overflow Lets Remote Users Execute Arbitrary Code | Department of Energy 59: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute

  15. Authentication techniques for smart cards

    SciTech Connect (OSTI)

    Nelson, R.A.

    1994-02-01

    Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thorough understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system.

  16. RSA calibration accuracy of a fluoroscopy-based system using nonorthogonal images for measuring functional kinematics

    SciTech Connect (OSTI)

    Kedgley, Angela E.; Jenkyn, Thomas R.

    2009-07-15

    When performing radiostereometric analysis (RSA) in a clinical setting it may be desirable to orient the two imaging devices nonorthogonally to obtain the best views of an anatomical structure. In this study, a calibration frame was constructed that allowed the relative angles of fiducial and control planes to be adjusted. Precision and accuracy were quantified across multiple trials and orientations. The 90 deg. frame was always of equivalent or greater accuracy than a calibration frame with the fiducial and control planes aligned parallel to the image intensifiers. This study also showed that RSA may be performed with imaging devices at relative angles other than 90 deg. without compromising accuracy. This allows researchers greater freedom in positioning equipment.

  17. ARM - Central Authentication Service

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Data Management Facility External Data Center Features and Releases Facility News Blogs: Air Time & Field Notes Meetings and Events Employment Research Highlights Data...

  18. A proposed generic authentication information element

    SciTech Connect (OSTI)

    Tarman, T.D.

    1995-08-01

    This contribution describes a proposed information element that can convey authentication information within an ATM signaling message. The design of this information element provides a large amount of flexibility to the user because it does not specify a particular signature algorithm, and it does not specify which information elements must accompany the Authentication IE in a signaling message. This allows the user to implement authenticated signaling based on her site`s security policies and performance requirements.

  19. Obfuscated authentication systems, devices, and methods

    DOE Patents [OSTI]

    Armstrong, Robert C; Hutchinson, Robert L

    2013-10-22

    Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

  20. CERTIFICATE OF AUTHENTICITY | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CERTIFICATE OF AUTHENTICITY CERTIFICATE OF AUTHENTICITY I hereby certify that this transcript constitutes an accurate record of the full Council meeting of the National Coal Council held on November 14,2008 at the Westin Grand Hotel, Washington, D.C. Tran_001.pdf CERTIFICATE OF AUTHENTICITY (4.5 MB) More Documents & Publications U.S. Offshore Wind Advanced Technology Demonstration Projects Public Meeting Transcript for Offshore Wind Demonstrations Office of Information Resources Office of

  1. CERTIFICATE OF AUTHENTICITY | Department of Energy

    Energy Savers [EERE]

    D.C. Tran001.pdf PDF icon CERTIFICATE OF AUTHENTICITY More Documents & Publications U.S. Offshore Wind Advanced Technology Demonstration Projects Public Meeting Transcript for...

  2. /ital Q/-modulation and four-wave mixing effects caused by RSA materials in a laser cavity

    SciTech Connect (OSTI)

    Zhang Tao; Yao Jianquan

    1989-04-01

    By making use of the density-matrix method, we give a unified explanation of /ital Q/-modulation and four-wave mixing effects caused by resonant saturable absorption (RSA) materials in a laser cavity. The underlying physical mechanism of the effects is expressed clearly. The theoretical calculation results agree very well with the experimental data.

  3. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...

    Office of Environmental Management (EM)

    A local user can conduct password guessing attacks. IMPACT: A remote user can access the ... A local user can can conduct brute force password guessing attacks without limits. ...

  4. V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated...

  5. V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks...

  6. Instructions for using HSPD-12 Authenticated Outlook Web Access...

    Energy Savers [EERE]

    Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook...

  7. T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

  8. V-231: Cisco Identity Services Engine Discloses Authentication...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    system stores the username and password of an authenticated user within hidden ... or clickjacking attack to access the username and password of an authenticated session. ...

  9. AUTHENTICATED

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1 Contract No. 11PB-12330 AMENDMENT executed by the BONNEVILLE POWER ADMINISTRATION and PORT TOWNSEND PAPER CORPORATION This AMENDMENT to the Firm Power Sales Agreement (Agreement)...

  10. Data Authentication Demonstration for Radionuclide Stations

    SciTech Connect (OSTI)

    Harris, Mark; Herrington, Pres; Miley, Harry; Ellis, J. Edward; McKinnon, David; St. Pierre, Devon

    1999-08-03

    Data authentication is required for certification of sensor stations in the International Monitoring System (IMS). Authentication capability has been previously demonstrated for continuous waveform stations (seismic and infrasound). This paper addresses data surety for the radionuclide stations in the IMS, in particular the Radionuclide Aerosol Sampler/Analyzer (RASA) system developed by Pacific Northwest National Laboratory (PNNL). Radionuclide stations communicate data by electronic mail using formats defined in IMS 1.0, Formats and Protocols for Messages. An open message authentication standard exists, called S/MIME (Secure/Multipurpose Internet Mail Extensions), which has been proposed for use with all IMS radionuclide station message communications. This standard specifies adding a digital signature and public key certificate as a MIME attachment to the e-mail message. It is advantageous because it allows authentication to be added to all IMS 1.0 messages in a standard format and is commercially supported in e-mail software. For command and control, the RASA system uses a networked Graphical User Interface (GUI) based upon Common Object Request Broker Architecture (CORBA) communications, which requires special authentication procedures. The authors have modified the RASA system to meet CTBTO authentication guidelines, using a FORTEZZA card for authentication functions. They demonstrated signing radionuclide data messages at the RASA, then sending, receiving, and verifying the messages at a data center. They demonstrated authenticating command messages and responses from the data center GUI to the RASA. Also, the particular authentication system command to change the private/public key pair and retrieve the new public key was demonstrated. This work shows that data surety meeting IMS guidelines may be immediately applied to IMS radionuclide systems.

  11. Final report for the network authentication investigation and pilot.

    SciTech Connect (OSTI)

    Eldridge, John M.; Dautenhahn, Nathan; Miller, Marc M.; Wiener, Dallas J; Witzke, Edward L.

    2006-11-01

    New network based authentication mechanisms are beginning to be implemented in industry. This project investigated different authentication technologies to see if and how Sandia might benefit from them. It also investigated how these mechanisms can integrate with the Sandia Two-Factor Authentication Project. The results of these investigations and a network authentication path forward strategy are documented in this report.

  12. Hardware device binding and mutual authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  13. Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes

    DOE Patents [OSTI]

    Kent, Alexander Dale

    2008-09-02

    Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

  14. V-127: Samba Bug Lets Remote Authenticated Users Modify Files...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was...

  15. Kerberos authentication: The security answer for unsecured networks

    SciTech Connect (OSTI)

    Engert, D.E.

    1995-06-01

    Traditional authentication schemes do not properly address the problems encountered with today`s unsecured networks. Kerbmm developed by MIT, on the other hand is designed to operate in an open unsecured network, yet provide good authentication and security including encrypted session traffic. Basic Kerberos principles as well as experiences of the ESnet Authentication Pilot Project with Cross Realm. Authentication between four National Laboratories will also be described.

  16. Authentication of data for monitoring a comprehensive test ban treaty

    SciTech Connect (OSTI)

    Craft, R.L.; Draelos, T.J.

    1996-05-01

    The important issue of data integrity in the CTBT International Monitoring System (IMS) is discussed and a brief tutorial on data authentication techniques is offered. The utilization of data authentication as a solution to the data integrity problem is evaluated. Public key data authentication is recommended for multilateral monitoring regimes such as the CTBT. The ramifications and system considerations of applying data authentication at various locations in the IMS, or not at all, are reviewed in a data surety context. The paper concludes with a recommendation of authenticating data at all critical monitoring stations.

  17. V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    Symantec was notified of a pre-authentication buffer overflow found in the Symantec Endpoint Protection Manager (SEPM) and Symantec Endpoint Protection Center (SPC)

  18. System and method for authentication of goods

    DOE Patents [OSTI]

    Kaish, Norman; Fraser, Jay; Durst, David I.

    1999-01-01

    An authentication system comprising a medium having a plurality of elements, the elements being distinctive, detectable and disposed in an irregular pattern or having an intrinsic irregularity. Each element is characterized by a determinable attribute distinct from a two-dimensional coordinate representation of simple optical absorption or simple optical reflection intensity. An attribute and position of the plurality of elements, with respect to a positional reference is detected. A processor generates an encrypted message including at least a portion of the attribute and position of the plurality of elements. The encrypted message is recorded in physical association with the medium. The elements are preferably dichroic fibers, and the attribute is preferably a polarization or dichroic axis, which may vary over the length of a fiber. An authentication of the medium based on the encrypted message may be authenticated with a statistical tolerance, based on a vector mapping of the elements of the medium, without requiring a complete image of the medium and elements to be recorded.

  19. V-231: Cisco Identity Services Engine Discloses Authentication Credentials

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to Remote Users | Department of Energy 1: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users August 30, 2013 - 3:01am Addthis PROBLEM: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials. PLATFORM: Cisco Identity Services Engine (ISE) 1.x ABSTRACT: A vulnerability was reported in Cisco Identity Services

  20. T-646: Debian fex authentication bypass | Department of Energy

    Energy Savers [EERE]

    PLATFORM: Debian fex ABSTRACT: Debian security discovered that fex, a web service for transferring very large, files, is not properly validating authentication IDs. While the ...

  1. Authenticating concealed private data while maintaining concealment

    DOE Patents [OSTI]

    Thomas, Edward V.; Draelos, Timothy J.

    2007-06-26

    A method of and system for authenticating concealed and statistically varying multi-dimensional data comprising: acquiring an initial measurement of an item, wherein the initial measurement is subject to measurement error; applying a transformation to the initial measurement to generate reference template data; acquiring a subsequent measurement of an item, wherein the subsequent measurement is subject to measurement error; applying the transformation to the subsequent measurement; and calculating a Euclidean distance metric between the transformed measurements; wherein the calculated Euclidean distance metric is identical to a Euclidean distance metric between the measurement prior to transformation.

  2. Multi-factor Authentication Update | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Multi-factor Authentication Update There is a delay in the purchase of the multi-factor authentication software solution that will cause a lag in the planned implementation. The Laboratory is currently in negotiations to complete the purchase. Once complete, the implementation can begin.

  3. Public-key data authentication for treaty verification

    SciTech Connect (OSTI)

    Draelos, T.J.; Goldsmith, S.Y.

    1992-08-01

    A public-key Treaty Data Authentication Module (TDAM) based on the National Institute of Standards and Technology (NIST) Digital Signature Standard (DSS) has been developed to support treaty verification systems. The TDAM utilizes the Motorola DSP56001 Digital Signal Processor as a coprocessor and supports both the STD Bus and PC-AT Bus platforms. The TDAM is embedded within an Authenticated Data Communication Subsystem (ADCS) which provides transparent data authentication and communications, thereby concealing the details of securely authenticating and communicating compliance data and commands. The TDAM has been designed according to the NIST security guidelines for cryptographic modules. Public-key data authentication is important for support of both bilateral and multi-lateral treaties. 8 refs.

  4. Public-key data authentication for treaty verification

    SciTech Connect (OSTI)

    Draelos, T.J.; Goldsmith, S.Y.

    1992-01-01

    A public-key Treaty Data Authentication Module (TDAM) based on the National Institute of Standards and Technology (NIST) Digital Signature Standard (DSS) has been developed to support treaty verification systems. The TDAM utilizes the Motorola DSP56001 Digital Signal Processor as a coprocessor and supports both the STD Bus and PC-AT Bus platforms. The TDAM is embedded within an Authenticated Data Communication Subsystem (ADCS) which provides transparent data authentication and communications, thereby concealing the details of securely authenticating and communicating compliance data and commands. The TDAM has been designed according to the NIST security guidelines for cryptographic modules. Public-key data authentication is important for support of both bilateral and multi-lateral treaties. 8 refs.

  5. Centralized Authentication with Kerberos 5, Part I

    SciTech Connect (OSTI)

    Wachsmann, A

    2004-06-09

    Account administration in a distributed Unix/Linux environment can become very complicated and messy if done by hand. Large sites use special tools to deal with this problem. I will describe how even very small installations like your three computer network at home can take advantage of the very same tools. The problem in a distributed environment is that password and shadow files need to be changed individually on each machine if an account change occurs. Account changes include: password change, addition/removal of accounts, name change of an account (UID/GID changes are a big problem in any case), additional or removed login privileges to a (group of) computer(s), etc. In this article, I will show how Kerberos 5 solves the authentication problem in a distributed computing environment. A second article will describe a solution for the authorization problem.

  6. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges

    Office of Energy Efficiency and Renewable Energy (EERE)

    A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system.

  7. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information

    Broader source: Energy.gov [DOE]

    Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information.

  8. Citrix_2FA_Authentication_09.09 | Department of Energy

    Energy Savers [EERE]

    More Documents & Publications Microsoft Word - Citrix2FAAuthentication1232009.doc Using Two-Factor RSA Token with WebVPN Microsoft Word - SMailSecureWeb-BasedEmailv3 ...

  9. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  10. INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS...

    Broader source: Energy.gov (indexed) [DOE]

    172013 Page 1 INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA) Outlook Web Access provides access to unencrypted email only and is suitable for use from any ...

  11. Instructions | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Secure Email via Outlook Web Access Instructions for Using Secure Email via Outlook Web Access Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. Secure Email Requirements: An EITS provided Exchange email account An EITS provided RSA SecureID Token with an active account in the EITS-managed RSA Authentication Server Appropriate access granted Active Directory group membership DOEnet or Internet access and a supported web browser

  12. E-Labs - Learning with Authentic Data

    SciTech Connect (OSTI)

    Bardeen, Marjorie G.; Wayne, Mitchell

    2016-01-01

    the success teachers have had providing an opportunity for students to: • Organize and conduct authentic research. • Experience the environment of scientific collaborations. • Possibly make real contributions to a burgeoning scientific field. We've created projects that are problem-based, student driven and technology dependent. Students reach beyond classroom walls to explore data with other students and experts and share results, publishing original work to a worldwide audience. Students can discover and extend the research of other students, modeling the processes of modern, large-scale research projects. From start to finish e-Labs are student-led, teacher-guided projects. Students need only a Web browser to access computing techniques employed by professional researchers. A Project Map with milestones allows students to set the research plan rather than follow a step-by-step process common in other online projects. Most importantly, e-Labs build the learning experience around the students' own questions and let them use the very tools that scientists use. Students contribute to and access shared data, most derived from professional research databases. They use common analysis tools, store their work and use metadata to discover, replicate and confirm the research of others. This is where real scientific collaboration begins. Using online tools, students correspond with other research groups, post comments and questions, prepare summary reports, and in general participate in the part of scientific research that is often left out of classroom experiments. Teaching tools such as student and teacher logbooks, pre- and post-tests and an assessment rubric aligned with learner outcomes help teachers guide student work. Constraints on interface designs and administrative tools such as registration databases give teachers the "one-stop-shopping" they seek for multiple e-Labs. Teaching and administrative tools also allow us to track usage and assess the impact on

  13. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates

    Broader source: Energy.gov [DOE]

    A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases.

  14. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A ...

  15. X.509 Authentication/Authorization in FermiCloud

    SciTech Connect (OSTI)

    Kim, Hyunwoo; Timm, Steven

    2014-11-11

    We present a summary of how X.509 authentication and authorization are used with OpenNebula in FermiCloud. We also describe a history of why the X.509 authentication was needed in FermiCloud, and review X.509 authorization options, both internal and external to OpenNebula. We show how these options can be and have been used to successfully run scientific workflows on federated clouds, which include OpenNebula on FermiCloud and Amazon Web Services as well as other community clouds. We also outline federation options being used by other commercial and open-source clouds and cloud research projects.

  16. Proposed DSS-specific fields for the generic authentication information element

    SciTech Connect (OSTI)

    Tarman, T.D.

    1995-08-06

    This contribution proposes the format of the ``Algorithm-Specific Information`` and ``Signature`` fields within the ``Proposed Generic Authentication Information Element`` for authentication IEs based on the Digital Signature Standard (DSS). These fields are designed to allow various levels of authentication ``strength`` (or robustness), and many of these fields may be omitted in systems that optimize authentication performance by sharing common (public) Digital Signature Algorithm (DSA) parameters. This allows users and site security officers to design their authenticated signaling according to site security and performance requirements.

  17. Decreased cell survival and DNA repair capacity after UVC irradiation in association with down-regulation of GRP78/BiP in human RSa cells

    SciTech Connect (OSTI)

    Zhai Ling; Kita, Kazuko . E-mail: kita@faculty.chiba-u.jp; Wano, Chieko; Wu Yuping; Sugaya, Shigeru; Suzuki, Nobuo

    2005-05-01

    In contrast to extensive studies on the roles of molecular chaperones, such as heat shock proteins, there are only a few reports about the roles of GRP78/BiP, an endoplasmic reticulum (ER) stress-induced molecular chaperone, in mammalian cell responses to DNA-damaging stresses. To investigate whether GRP78/BiP is involved in resistance to a DNA-damaging agent, UVC (principally 254 nm in wavelength), we established human cells with down-regulation of GRP78/BiP by transfection of human RSa cells with antisense cDNA for GRP78/BiP. We found that the transfected cells showed higher sensitivity to UVC-induced cell death than control cells transfected with the vector alone. In the antisense-cDNA transfected cells, the removal capacities of the two major types of UVC-damaged DNA (thymine dimers and (6-4) photoproducts) in vivo and DNA synthesis activity of whole cell extracts to repair UVC-irradiated plasmids in vitro were remarkably decreased compared with those in the control cells. Furthermore, the antisense-cDNA transfected cells also showed slightly higher sensitivity to cisplatin-induced cell death than the control cells. Cisplatin-induced DNA damage is primarily repaired by nucleotide excision repair, like UVC-induced DNA damage. The present results suggest that GRP78/BiP plays a protective role against UVC-induced cell death possibly via nucleotide excision repair, at least in the human RSa cells tested.

  18. management

    National Nuclear Security Administration (NNSA)

    5%2A en Management and Budget http:www.nnsa.energy.govaboutusouroperationsmanagementandbudget

  19. Defining the questions: a research agenda for nontraditional authentication in arms control

    SciTech Connect (OSTI)

    Hauck, Danielle K; Mac Arthur, Duncan W; Smith, Morag K; Thron, Jonathan L; Budlong - Sylvester, Kory

    2010-01-01

    Many traditional authentication techniques have been based on hardware solutions. Thus authentication of measurement system hardware has been considered in terms of physical inspection and destructive analysis. Software authentication has implied hash function analysis or authentication tools such as Rose. Continuity of knowledge is maintained through TIDs and cameras. Although there is ongoing progress improving all of these authentication methods, there has been little discussion of the human factors involved in authentication. Issues of non-traditional authentication include sleight-of-hand substitutions, monitor perception vs. reality, and visual diversions. Since monitor confidence in a measurement system depends on the product of their confidences in each authentication element, it is important to investigate all authentication techniques, including the human factors. This paper will present an initial effort to identify the most important problems that traditional authentication approaches in safeguards have not addressed and are especially relevant to arms control verification. This will include a survey of the literature and direct engagement with nontraditional experts in areas like psychology and human factors. Based on the identification of problem areas, potential research areas will be identified and a possible research agenda will be developed.

  20. Hardware device to physical structure binding and authentication

    DOE Patents [OSTI]

    Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

    2013-08-20

    Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

  1. Simultaneous Authentication and Certification of Arms-Control Measurement Systems

    SciTech Connect (OSTI)

    MacArthur, Duncan W. [Los Alamos National Laboratory; Hauck, Danielle K. [Los Alamos National Laboratory; Thron, Jonathan L. [Los Alamos National Laboratory

    2012-07-09

    Most arms-control-treaty-monitoring scenarios involve a host party that makes a declaration regarding its nuclear material or items and a monitoring party that verifies that declaration. A verification system developed for such a use needs to be trusted by both parties. The first concern, primarily from the host party's point of view, is that any sensitive information that is collected must be protected without interfering in the efficient operation of the facility being monitored. This concern is addressed in what can be termed a 'certification' process. The second concern, of particular interest to the monitoring party, is that it must be possible to confirm the veracity of both the measurement system and the data produced by this measurement system. The monitoring party addresses these issues during an 'authentication' process. Addressing either one of these concerns independently is relatively straightforward. However, it is more difficult to simultaneously satisfy host party certification concerns and monitoring party authentication concerns. Typically, both parties will want the final access to the measurement system. We will describe an alternative approach that allows both parties to gain confidence simultaneously. This approach starts with (1) joint development of the measurement system followed by (2) host certification of several copies of the system and (3) random selection by the inspecting party of one copy to be use during the monitoring visit and one (or more) copy(s) to be returned to the inspecting party's facilities for (4) further hardware authentication; any remaining copies are stored under joint seal for use as spares. Following this process, the parties will jointly (5) perform functional testing on the selected measurement system and then (6) use this system during the monitoring visit. Steps (1) and (2) assure the host party as to the certification of whichever system is eventually used in the monitoring visit. Steps (1), (3), (4), and (5

  2. Authenticated group Diffie-Hellman key exchange: theory and practice

    SciTech Connect (OSTI)

    Chevassut, Olivier

    2002-10-03

    Authenticated two-party Diffie-Hellman key exchange allows two principals A and B, communicating over a public network, and each holding a pair of matching public/private keys to agree on a session key. Protocols designed to deal with this problem ensure A (B resp.)that no other principals aside from B (A resp.) can learn any information about this value. These protocols additionally often ensure A and B that their respective partner has actually computed the shared secret value. A natural extension to the above cryptographic protocol problem is to consider a pool of principals agreeing on a session key. Over the years several papers have extended the two-party Diffie-Hellman key exchange to the multi-party setting but no formal treatments were carried out till recently. In light of recent developments in the formalization of the authenticated two-party Diffie-Hellman key exchange we have in this thesis laid out the authenticated group Diffie-Hellman key exchange on firmer foundations.

  3. Provably Secure Password-based Authentication in TLS

    SciTech Connect (OSTI)

    Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier; Moeller,Bodo; Pointcheval, David

    2005-12-20

    In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised to the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.

  4. management

    National Nuclear Security Administration (NNSA)

    5%2A en Management and Budget http:nnsa.energy.govaboutusouroperationsmanagementandbudget

    P...

  5. Group key management

    SciTech Connect (OSTI)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  6. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael; Klatt, Leon N.

    2000-01-01

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

  7. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael; Klatt, Leon N.

    2001-01-01

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters, the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided&

  8. STEM Mentoring Café- Engaging Young Women in an Authentic Mentoring...

    Office of Environmental Management (EM)

    STEM Mentoring Caf- Engaging Young Women in an Authentic Mentoring Experience Melinda Higgins Albert Einstein Distinguished Educator Fellow, NASA Office of Education, ...

  9. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Password | Department of Energy 5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in OpenLDAP. A remote user can authenticate without a valid password. PLATFORM: Open LDAP version(s) 2.4.12 - 2.2.24 ABSTRACT: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password. reference LINKS: SecurityTracker

  10. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  11. Holographic Labeling And Reading Machine For Authentication And Security Appications

    DOE Patents [OSTI]

    Weber, David C.; Trolinger, James D.

    1999-07-06

    A holographic security label and automated reading machine for marking and subsequently authenticating any object such as an identification badge, a pass, a ticket, a manufactured part, or a package is described. The security label is extremely difficult to copy or even to read by unauthorized persons. The system comprises a holographic security label that has been created with a coded reference wave, whose specification can be kept secret. The label contains information that can be extracted only with the coded reference wave, which is derived from a holographic key, which restricts access of the information to only the possessor of the key. A reading machine accesses the information contained in the label and compares it with data stored in the machine through the application of a joint transform correlator, which is also equipped with a reference hologram that adds additional security to the procedure.

  12. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 7: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory

  13. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 57: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis December 28 2012 - 6:00am PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions.

  14. V-236: MediaWiki CentralAuth Extension Authentication Bypass...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The vulnerability is caused due to an error when handling auto-logins and can be exploited to bypass the authentication mechanism by providing a valid username within the ...

  15. A key management concept for the CTBT International Monitoring System

    SciTech Connect (OSTI)

    Herrington, P.; Draelos, T.; Craft, R.; Brickell, E.; Frankel, Y.; Silvestri, M.

    1997-08-01

    Cryptographic authentication (commonly referred to as ``technical authentication`` in Working Group B) is an enabling technology which ensures the integrity of sensor data and security of digital networks under various data security compromise scenarios. The use of cryptographic authentication,however, implies the development of a key management infrastructure for establishing trust in the generation and distribution of cryptographic keys. This paper proposes security and operational requirements for a CTBT (Comprehensive Test Ban Treaty) key management system and, furthermore, presents a public key based solution satisfying the requirements. The key management system is instantiated with trust distribution technologies similar to those currently implemented in industrial public key infrastructures. A complete system solution is developed.

  16. AUTHENTICATED SENSOR INTERFACE DEVICE FOR JOINT USE SAFEGUARDS APPLICATIONS - CONCEPTS AND CHALLENGES

    SciTech Connect (OSTI)

    Poland, R.; Drayer, R.; Wilson, J.

    2013-08-12

    This paper will discuss the key features of the Authenticated Sensor Interface Device that collectively provide the ability to share data among a number of parties while ensuring the authentication of data and protecting both the operators and the IAEAs interests. The paper will also discuss the development of the prototype, the initial testing with an accountancy scale, and future plans and challenges to implementation into the joint use and remote monitoring applications. As nuclear fuel cycle technology becomes more prevalent throughout the world and the capacity of plants increases, limited resources of the IAEA are being stretched near a breaking point. A strategy is to increase efficiency in safeguards monitoring using joint use equipment that will provide the facility operator process data while also providing the IAEA key safeguards data. The data, however, must be authenticated and validated to ensure the data have not been tampered with. The Authenticated Sensor Interface Device provides the capability to share data and can be a valuable component in the IAEAs ability to collect accountancy data from scales in Uranium conversion and enrichment plants, as well as nuclear fuel fabrication plants. Likewise, the Authenticated Sensor Interface Device can be configured to accept a diverse array of input signals, ranging from analog voltage, to current, to digital interfaces and more. These modular capabilities provide the ability to collect authenticated, joint-use, data streams from various process monitoring sensors.

  17. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

  18. Novel Authentication of Monitoring Data Through the use of Secret and Public Cryptographic Keys

    SciTech Connect (OSTI)

    Benz, Jacob M.; Tolk, Keith; Tanner, Jennifer E.

    2014-07-21

    The Office of Nuclear Verification (ONV) is supporting the development of a piece of equipment to provide data authentication and protection for a suite of monitoring sensors as part of a larger effort to create an arms control technology toolkit. This device, currently called the Red Box, leverages the strengths of both secret and public cryptographic keys to authenticate, digitally sign, and pass along monitoring data to allow for host review, and redaction if necessary, without the loss of confidence in the authenticity of the data by the monitoring party. The design of the Red Box will allow for the addition and removal of monitoring equipment and can also verify that the data was collected by authentic monitoring equipment prior to signing the data and sending it to the host and for review. The host will then forward the data to the monitor for review and inspection. This paper will highlight the progress to date of the Red Box development, and will explain the novel method of leveraging both symmetric and asymmetric (secret and public key) cryptography to authenticate data within a warhead monitoring regime.

  19. V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 6: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability September 6, 2013 - 4:36am Addthis PROBLEM: A vulnerability has been reported in the CentralAuth extension for MediaWiki, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: MediaWiki CentralAuth Extension ABSTRACT: A vulnerability has been reported in the CentralAuth extension for

  20. T-703: Cisco Unified Communications Manager Open Query Interface...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A remote user can obtain database contents, including authentication credentials. ... This may include authentication credentials, configuration details, and other sensitive ...

  1. Provably-Secure Authenticated Group Diffie-Hellman KeyExchange

    SciTech Connect (OSTI)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2007-01-01

    Authenticated key exchange protocols allow two participantsA and B, communicating over a public network and each holding anauthentication means, to exchange a shared secret value. Methods designedto deal with this cryptographic problem ensure A (resp. B) that no otherparticipants aside from B (resp. A) can learn any information about theagreed value, and often also ensure A and B that their respective partnerhas actually computed this value. A natural extension to thiscryptographic method is to consider a pool of participants exchanging ashared secret value and to provide a formal treatment for it. Startingfrom the famous 2-party Diffie-Hellman (DH) key exchange protocol, andfrom its authenticated variants, security experts have extended it to themulti-party setting for over a decade and completed a formal analysis inthe framework of modern cryptography in the past few years. The presentpaper synthesizes this body of work on the provably-secure authenticatedgroup DH key exchange.

  2. Key management for large scale end-to-end encryption

    SciTech Connect (OSTI)

    Witzke, E.L.

    1994-07-01

    Symmetric end-to-end encryption requires separate keys for each pair of communicating confidants. This is a problem of Order N{sup 2}. Other factors, such as multiple sessions per pair of confidants and multiple encryption points in the ISO Reference Model complicate key management by linear factors. Public-key encryption can reduce the number of keys managed to a linear problem which is good for scaleability of key management, but comes with complicating issues and performance penalties. Authenticity is the primary ingredient of key management. If each potential pair of communicating confidants can authenticate data from each other, then any number of public encryption keys of any type can be communicated with requisite integrity. These public encryption keys can be used with the corresponding private keys to exchange symmetric cryptovariables for high data rate privacy protection. The Digital Signature Standard (DSS), which has been adopted by the United States Government, has both public and private components, similar to a public-key cryptosystem. The Digital Signature Algorithm of the DSS is intended for authenticity but not for secrecy. In this paper, the authors will show how the use of the Digital Signature Algorithm combined with both symmetric and asymmetric (public-key) encryption techniques can provide a practical solution to key management scaleability problems, by reducing the key management complexity to a problem of order N, without sacrificing the encryption speed necessary to operate in high performance networks.

  3. Integrating end-to-end encryption and authentication technology into broadband networks

    SciTech Connect (OSTI)

    Pierson, L.G.

    1995-11-01

    BISDN services will involve the integration of high speed data, voice, and video functionality delivered via technology similar to Asynchronous Transfer Mode (ATM) switching and SONET optical transmission systems. Customers of BISDN services may need a variety of data authenticity and privacy assurances, via Asynchronous Transfer Mode (ATM) services Cryptographic methods can be used to assure authenticity and privacy, but are hard to scale for implementation at high speed. The incorporation of these methods into computer networks can severely impact functionality, reliability, and performance. While there are many design issues associated with the serving of public keys for authenticated signaling and for establishment of session cryptovariables, this paper is concerned with the impact of encryption itself on such communications once the signaling and setup have been completed. Network security protections should be carefully matched to the threats against which protection is desired. Even after eliminating unnecessary protections, the remaining customer-required network security protections can impose severe performance penalties. These penalties (further discussed below) usually involve increased communication processing for authentication or encryption, increased error rate, increased communication delay, and decreased reliability/availability. Protection measures involving encryption should be carefully engineered so as to impose the least performance, reliability, and functionality penalties, while achieving the required security protection. To study these trade-offs, a prototype encryptor/decryptor was developed. This effort demonstrated the viability of implementing certain encryption techniques in high speed networks. The research prototype processes ATM cells in a SONET OC-3 payload. This paper describes the functionality, reliability, security, and performance design trade-offs investigated with the prototype.

  4. Designing a minimum-functionality neutron and gamma measurement instrument with a focus on authentication

    SciTech Connect (OSTI)

    Karpius, Peter J; Williams, Richard B

    2009-01-01

    During the design and construction of the Next-Generation Attribute-Measurement System, which included a largely commercial off-the-shelf (COTS), nondestructive assay (NDA) system, we realized that commercial NDA equipment tends to include numerous features that are not required for an attribute-measurement system. Authentication of the hardware, firmware, and software in these instruments is still required, even for those features not used in this application. However, such a process adds to the complexity, cost, and time required for authentication. To avoid these added authenticat ion difficulties, we began to design NDA systems capable of performing neutron multiplicity and gamma-ray spectrometry measurements by using simplified hardware and software that avoids unused features and complexity. This paper discusses one possible approach to this design: A hardware-centric system that attempts to perform signal analysis as much as possible in the hardware. Simpler processors and minimal firmware are used because computational requirements are kept to a bare minimum. By hard-coding the majority of the device's operational parameters, we could cull large sections of flexible, configurable hardware and software found in COTS instruments, thus yielding a functional core that is more straightforward to authenticate.

  5. T-614: Cisco Unified Communications Manager Database Security Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 14: Cisco Unified Communications Manager Database Security Vulnerability T-614: Cisco Unified Communications Manager Database Security Vulnerability May 3, 2011 - 7:37am Addthis PROBLEM: Cisco Unified Communications Manager contains a vulnerability that could allow an authenticated, remote attacker to inject arbitrary script code on a targeted system. PLATFORM: Cisco Unified Communications Manager versions prior to 8.5(1), 8.0(3), 7.1(5)su1, and 6.1(5)su2 are

  6. Flexible session management in a distributed environment

    SciTech Connect (OSTI)

    Miller, Zach; Bradley, Dan; Tannenbaum, Todd; Sfiligoi, Igor; /Fermilab

    2010-01-01

    Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers. In this paper we introduce CEDAR, the secure communication library used by the Condor High Throughput Computing software, and present the advantages to a distributed computing system resulting from CEDAR's separation of these layers. Regardless of the authentication method used, CEDAR establishes a secure session key, which has the flexibility to be used for multiple capabilities. We demonstrate how a layered approach to security sessions can avoid round-trips and latency inherent in network authentication. The creation of a distinct session management layer allows for optimizations to improve scalability by way of delegating sessions to other components in the system. This session delegation creates a chain of trust that reduces the overhead of establishing secure connections and enables centralized enforcement of system-wide security policies. Additionally, secure channels based upon UDP datagrams are often overlooked by existing libraries; we show how CEDAR's structure accommodates this as well. As an example of the utility of this work, we show how the use of delegated security sessions and other techniques inherent in CEDAR's architecture enables US CMS to meet their scalability requirements in deploying Condor over large-scale, wide-area grid systems.

  7. Using regulations.gov to find dockets and documents

    Office of Environmental Management (EM)

    Using Two-Factor RSA Token with WebVPN Using Two-Factor RSA Token with WebVPN Your RSA token is used to esbablish a connection to the Internet and connect to https://connect.doe.gov . Using-TwoFactorRSA-Token w VPN.pdf (469 KB) More Documents & Publications Instructions for WebVPN Connectivity Citrix_2FA_Authentication_09.09 Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc of Energy

    Using Weather Data to Improve Capacity of Existing Power Lines Using Weather Data to Improve

  8. T-570: HP Security Bulletin- HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass.

  9. A Framework for Federated Two-Factor Authentication Enabling Cost-Effective Secure Access to Distributed Cyberinfrastructure

    SciTech Connect (OSTI)

    Ezell, Matthew A; Rogers, Gary L; Peterson, Gregory D.

    2012-01-01

    As cyber attacks become increasingly sophisticated, the security measures used to mitigate the risks must also increase in sophistication. One time password (OTP) systems provide strong authentication because security credentials are not reusable, thus thwarting credential replay attacks. The credential changes regularly, making brute-force attacks significantly more difficult. In high performance computing, end users may require access to resources housed at several different service provider locations. The ability to share a strong token between multiple computing resources reduces cost and complexity. The National Science Foundation (NSF) Extreme Science and Engineering Discovery Environment (XSEDE) provides access to digital resources, including supercomputers, data resources, and software tools. XSEDE will offer centralized strong authentication for services amongst service providers that leverage their own user databases and security profiles. This work implements a scalable framework built on standards to provide federated secure access to distributed cyberinfrastructure.

  10. Security Proof for Password Authentication in TLS-Verifier-based Three-Party Group Diffie-Hellman

    SciTech Connect (OSTI)

    Chevassut, Olivier; Milner, Joseph; Pointcheval, David

    2008-04-21

    The internet has grown greatly in the past decade, by some numbers exceeding 47 million active web sites and a total aggregate exceeding100 million web sites. What is common practice today on the Internet is that servers have public keys, but clients are largely authenticated via short passwords. Protecting these passwords by not storing them in the clear on institutions's servers has become a priority. This paper develops password-based ciphersuites for the Transport Layer Security (TLS) protocol that are: (1) resistant to server compromise; (2) provably secure; (3) believed to be free from patent and licensing restrictions based on an analysis of relevant patents in the area.

  11. Deactivation Management

    Broader source: Energy.gov [DOE]

    The purpose here is to provide information for specific aspects of project management that apply to deactivation. Overall management of deactivation projects should use a traditional project...

  12. Conference Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-11-03

    To establish requirements and responsibilities with respect to managing conferences sponsored by the Department of Energy (DOE) or by DOE management and operating contractors and other contractors who perform work at DOE-owned or -leased facilities, including management and integration contractors and environmental restoration management contractors (when using funds that will be reimbursed by DOE). Cancels DOE N 110.3.

  13. Hybrid cryptography key management.

    SciTech Connect (OSTI)

    Draelos, Timothy John; Torgerson, Mark Dolan; Neumann, William Douglas; Gallup, Donald R.; Collins, Michael Joseph; Beaver, Cheryl Lynn

    2003-11-01

    Wireless communication networks are highly resource-constrained; thus many security protocols which work in other settings may not be efficient enough for use in wireless environments. This report considers a variety of cryptographic techniques which enable secure, authenticated communication when resources such as processor speed, battery power, memory, and bandwidth are tightly limited.

  14. STEM Mentoring Café- Engaging Young Women in an Authentic Mentoring

    Energy Savers [EERE]

    Café Hits the Midwest STEM Café Hits the Midwest July 27, 2015 - 2:38pm Addthis Aerial view of STEM Mentoring Café table in Chicago: Photo Courtesy of Argonne National Aerial view of STEM Mentoring Café table in Chicago: Photo Courtesy of Argonne National Erin Twamley Project and Web Manager, Education & Workforce Development In the heart of the Midwest, the Museum of Science and Industry Chicago is helping to engage STEM professionals and middle school students. As part of the Energy

  15. Data Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Data Management Data Management PDSF and IHEP, in Beijing, China, are the two main computing facitilies for the Daya Bay experiment with PDSF being used primarily by North American ...

  16. MANAGEMENT ALERT

    Broader source: Energy.gov (indexed) [DOE]

    COMMISSION FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Management Alert: Review of Allegations of Improper Disclosure of Confidential, Nonpublic...

  17. Environmental Management Waste Management Facility (EMWMF) at...

    Office of Environmental Management (EM)

    Review of the Environmental Management Waste Management Facility (EMWMF) at Oak Ridge ... INTRODUCTION The Environmental Management Waste Management Facility (EMWMF) is a land ...

  18. Teaching Managers How to Manage

    SciTech Connect (OSTI)

    Hylko, J.M.

    2006-07-01

    Following graduation from a college or university with a technical degree, or through years of experience, an individual's training and career development activities typically focus on enhancing technical problem-solving skills. However, as these technical professionals, herein referred to as 'Techies', advance throughout their careers, they may be required to accept and adapt to the role of being a manager, and must undergo a transition to learn and rely on new problem-solving skills. However, unless a company has a specific manager-trainee class to address this subject and develop talent from within, an employee's management style is learned and developed 'on the job'. Both positive and negative styles are nurtured by those managers having similar qualities. Unfortunately, a negative style often contributes to the deterioration of employee morale and ultimate closing of a department or company. This paper provides the core elements of an effective management training program for 'Teaching Managers How to Manage' derived from the Department of Energy's Integrated Safety Management System and the Occupational Safety and Health Administration 's Voluntary Protection Program. Discussion topics and real-life examples concentrate on transitioning an employee from a 'Techie' to a manager; common characteristics of being a manager; the history and academic study of management; competition, change and the business of waste management; what to do after taking over a department by applying Hylko's Star of Success; command media; the formal and informal organizational charts; chain of command; hiring and developing high-degree, autonomous employees through effective communication and delegation; periodic status checks; and determining if the program is working successfully. These common characteristics of a strong management/leadership culture and practical career tips discussed herein provide a solid foundation for any company or department that is serious about developing

  19. Evaluation of the Geotech Smart24 data acquisition system with active Fortezza crypto card data signing and authentication.

    SciTech Connect (OSTI)

    Hart, Darren M.

    2008-05-01

    Sandia National Laboratories has tested and evaluated Geotech Smart24 data acquisition system with active Fortezza crypto card data signing and authentication. The test results included in this report were in response to static and tonal-dynamic input signals. Most test methodologies used were based on IEEE Standards 1057 for Digitizing Waveform Recorders and 1241 for Analog to Digital Converters; others were designed by Sandia specifically for infrasound application evaluation and for supplementary criteria not addressed in the IEEE standards. The objective of this work was to evaluate the overall technical performance of the Geotech Smart24 digitizer with a Fortezza PCMCIA crypto card actively implementing the signing of data packets. The results of this evaluation were compared to relevant specifications provided within manufacturer's documentation notes. The tests performed were chosen to demonstrate different performance aspects of the digitizer under test. The performance aspects tested include determining noise floor, least significant bit (LSB), dynamic range, cross-talk, relative channel-to-channel timing, time-tag accuracy, analog bandwidth and calibrator performance.

  20. Quality Management

    Broader source: Energy.gov [DOE]

    The Office of Quality Management, within the Office of Health, Safety and Security develops policies and procedures to ensure the classification and control of information is effective and...

  1. Energy Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Management Utilize energy efficiency to improve your industrial customer's business performance without the cost of major capital improvements. Energy efficiency is not...

  2. Deputy Manager

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will support the Oak Ridge Office (ORO) Manager by providing overall executive leadership to ORO.

  3. Position Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-06-23

    The order prescribes the policies, responsibilities, and procedures for position management within (DOE). Canceled by DOE N 1321.140. Cancels DOE 3510.1

  4. project management

    National Nuclear Security Administration (NNSA)

    3%2A en Project Management and Systems Support http:www.nnsa.energy.govaboutusouroperationsapmprojectmanagementandsystemssupport

  5. project management

    National Nuclear Security Administration (NNSA)

    %2A en Project Management and Systems Support http:nnsa.energy.govaboutusouroperationsapmprojectmanagementandsystemssupport

  6. Bibliographic Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and more from varied resources and databases to organize references, keep notes to stay ahead of the game. Questions? 505-667-5809 Email Bibliographic management tools allow...

  7. acquisition management

    National Nuclear Security Administration (NNSA)

    the science, technology, and engineering base; and,

  8. Continue NNSA management reforms.


    • Our Values:<...

    • On the Importance of Composability of Ad Hoc Mobile Middleware and Trust Management

      SciTech Connect (OSTI)

      Drugan, Ovidiu VALENTIN.; Dionysiou, Ioanna; Bakken, David E.; Plagemann, Thomas P.; Hauser, Carl H.; Frincke, Deb A.

      2005-11-01

      Deciphering trust, using a universally acceptable set of rules and mechanisms, is a challenging process because of trust?s varying interpretations. Researchers have defined trust concepts for many perspectives, with the result that trust definitions overlap or contradict each other [8]. There are numerous models of trust, although the classification of neither trust nor its models has been identified yet. Nevertheless, there is a subtle feature that differentiates a generic trust model from a trust management system; the former category focuses on modeling specific aspects of trust, such as authentication, reputation, and cooperation, whereas the second focuses on dynamically managing the lifespan of trust relationships. The majority of trust models and trust management systems have been studied and their limitations are well known, ranging from being too complex to being too simple. This paper addresses that issue. http://www.informatik.hu-berlin.de/rok/isas2005.html

    • Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices

      SciTech Connect (OSTI)

      Abercrombie, Robert K; Sheldon, Frederick T; Aldridge, Hal; Duren, Mike; Ricci, Tracy; Bertino, Elisa; Kulatunga, Athula; Navaratne, Uditha Sudheera

      2011-01-01

      In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

    • Conference Management

      Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

      2007-01-25

      The Order establishes requirements and responsibilities for managing conferences sponsored or co-sponsored by the Department of Energy, including the National Nuclear Security Administration. Cancels DOE O 110.3. Canceled by DOE N 251.97.

    • T-602: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks

      Broader source: Energy.gov [DOE]

      The BlackBerry Web Desktop Manager not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the BlackBerry Web Desktop Manager software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

    • PROJECT MANAGEMENT PLANS Project Management Plans

      Office of Environmental Management (EM)

      MANAGEMENT PLANS Project Management Plans Overview Project Management Plan Suggested Outline Subjects Crosswalk between the Suggested PMP Outline Subjects and a Listing ...

    • Summary - Environmental Management Waste Management Facility...

      Office of Environmental Management (EM)

      Waste Management Facility (EMWMF) at Oak Ridge, TN Why DOE-EM Did This Review The Environmental Management Waste Management Facility (EMWMF) is a land disposal facility for ...

    • Environmental Management Waste Management Facility (EMWMF) at...

      Office of Environmental Management (EM)

      Waste Management Facility (EMWMF) at Oak Ridge Environmental Management Waste Management Facility (EMWMF) at Oak Ridge Full Document and Summary Versions are available for download ...

    • Management Overview

      Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

      Introduction to the DOE-Managed Spent Nuclear Fuel and High Level Waste Research (aka Defense Repository) David Sevougian, Kevin McMahon Sandia National Laboratories Used Fuel Disposition Working Group Meeting Las Vegas, Nevada June 7-9, 2016 Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration under

    • Management Overview

      Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

      Managed Spent Nuclear Fuel (SNF) and High Level Waste (HLW) Repository - Inventory Overview David C. Sassani Sandia National Laboratories Used Fuel Disposition Campaign Annual Working Group Meeting June 6-9, 2016 Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04- 94AL85000. SAND2016-5401

    • Management Overview

      Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

      DOE-Managed SNF and HLW Research: Preliminary Design Concepts -Work Package Overview -Waste Package Considerations -DREP Salt Design Concept Ed Matteo, Ernie Hardin, Mark Rigali, Teklu Hadgu, Heeho Park UFD Working Group University of Nevada/Las Vegas June 7-9, 2016 Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security

    • Management Overview

      Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

      Debrief for the DOE-Managed Spent Nuclear Fuel and High Level Waste Research (aka Defense Repository) David Sevougian, Kevin McMahon Sandia National Laboratories Used Fuel Disposition Working Group Meeting Las Vegas, Nevada June 7-9, 2016 Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration under contract

    • Oracle Management Tool Suite

      Energy Science and Technology Software Center (OSTI)

      2007-06-01

      The Oracle Management Tool Suite is used to automatically manage Oracle based systems. This includes startup and shutdown of databases and application servers as well as backup, space management, workload management and log file management.

    • Managing Critical Management Improvement Initiatives

      Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

      2003-10-01

      Provides requirements and responsibilities for planning, executing and assessing critical management improvement initiatives within DOE. DOE N 251.59, dated 9/27/2004, extends this Notice until 10/01/2005. Archived 11-8-10. Does not cancel other directives.

  1. Management Overview

    Office of Environmental Management (EM)

    Department of Energy's Isotope Development and Production for Research and Applications Program's Fiscal Year 2009 Balance Sheet Audit OAS-FS-12-09 June 2012 January 30, 2012 Mr. Gregory Friedman, Inspector General Dr. Jehanne Gillo, Director, Facilities and Project Management Division, Office of Nuclear Physics U.S. Department of Energy Washington, DC 20585 Dear Mr. Friedman and Dr. Gillo: We have audited the balance sheet of the United States Department of Energy's (Department or DOE) Isotope

  2. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Used Fuel Disposition R&D Campaign Working Group Meeting Introduction and Summary Peter Swift National Technical Director Used Fuel Disposition R&D Campaign Las Vegas, Nevada June 7, 2016 Sandia National Laboratories is a multiprogram laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2016-5194 PE Used

  3. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Site Evaluation David C. Sassani Sandia National Laboratories Used Fuel Disposition Campaign Annual Working Group Meeting June 6-9, 2016 Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04- 94AL85000. SAND2016-5400 PE Used Fuel Disposition Presentation Overview  Deep Borehole Field Test

  4. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Disposal: Preliminary Performance Assessment Emily Stein, Geoff Freeze, Kris Kuhlman, Glenn Hammond, Jenn Frederick Sandia National Laboratories 2016 UFDC Annual Working Group Meeting Deep Borehole Session, June 8, 2016 Las Vegas, NV Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration under contract

  5. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Borehole Characterization Kris Kuhlman Sandia National Laboratories Used Fuel Disposition Working Group Meeting June 2016 Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2016-5041 PE Used Fuel Disposition Conceptual Profiles 2 1 2 3 4 5 Depth [km] Sources of Salinity *

  6. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Uranium(VI) Sorption and Diffusion in Montmorillonite and Bentonite: Experiments and Modeling Ruth M. Tinnacher 1 , Christophe Tournassat 2 , James A. Davis 1 1) Earth and Environmental Sciences Area, Lawrence Berkeley National Lab 2) BRGM, French Geological Survey, Orléans, France Used Fuel Disposition Campaign - Annual Meeting Las Vegas, June 8 2016 Used Fuel Disposition 2 Research Motivation The long-term management of nuclear waste requires reliable predictions of radionuclide transport

  7. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Engineering Overview Ernest Hardin, Andrew Clark, John Cochran, Elena Kalinina, Emily Stein and Jiann Su Sandia National Laboratories Fred Peretz Oak Ridge National Laboratory UFD Working Group - Las Vegas, NV June 7-9, 2016 Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000.

  8. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Waste Package Handling Conceptual Design Process Fred Peretz Oak Ridge National Laboratory UFD Annual Working Group Meeting June 8, 2016 Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04- 94AL85000. SAND2016-nnnnn Used Fuel Disposition June 8, 2016 UFD Annual Working Group Meeting 2

  9. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Options for Completing the Emplacement Zone for Deep Borehole Field Disposal John R. Cochran & Ernest L. Hardin Sandia National Laboratories 2016 UFDC Annual Working Group Meeting Deep Borehole Field Test Session, June 8, 2016 Las Vegas, NV Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration under

  10. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    A Reinvestigation into the Isothermal Room Closure Predictions at WIPP Benjamin Reedlunn Sandia National Laboratories Annual UFD Working Group Meeting June 8 th , 2016 Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04- 94AL85000. SAND2016-5495 C Used Fuel Disposition Acknowledgements /

  11. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Generic Disposal Systems Analysis (GDSA) Paul Mariner, Glenn Hammond, Emily Stein, David Sevougian, and Jennifer Frederick Sandia National Laboratories 2016 UFD Group Meeting UNLV, Las Vegas, Nevada June 8, 2016 Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04- 94AL85000. SAND2016-5393

  12. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Simulation Framework: PFLOTRAN Glenn Hammond Sandia National Laboratories 2016 UFDC Annual Working Group Meeting GDSA Session, June 8, 2016 Las Vegas, NV Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2016-5318 PE Used Fuel Disposition  Petascale reactive

  13. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Isotope Chemistry and Source Term Paul Mariner, Glenn Hammond, and Jennifer Frederick Sandia National Laboratories 2016 UFD Meeting, Las Vegas, Nevada June 8, 2016, GDSA Session Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04- 94AL85000. SAND2016-5392 PE Used Fuel Disposition June 8,

  14. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Radioisotope Source Term Degradation and Implementation in PFLOTRAN Jennifer M. Frederick Glenn E. Hammond and Paul Mariner Sandia National Laboratories 2016 UFDC Annual Working Group Meeting GDSA Session, June 8, 2016 Las Vegas, NV Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration under contract

  15. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Preview of GDSA/Process Model Integration Session S. David Sevougian Sandia National Laboratories 2016 UFDC Annual Working Group Meeting GDSA Session, June 8, 2016 Las Vegas, NV Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2016-5294PE. Used Fuel Disposition

  16. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Building the Crystalline Reference Case Performance Assessment Emily Stein, Jenn Frederick, Glenn Hammond, Paul Mariner, Dave Sevougian Sandia National Laboratories 2016 UFDC Annual Working Group Meeting GDSA Session, June 8, 2016 Las Vegas, NV Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration under

  17. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Planning for FY2017 Paul Mariner, Glenn Hammond, Emily Stein, David Sevougian, and Jennifer Frederick Sandia National Laboratories 2016 UFD Group Meeting UNLV, Las Vegas, Nevada June 8, 2016 Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04- 94AL85000. SAND2016-5389 PE Used Fuel

  18. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Introduction and Objectives for GDSA ⇔ Process Model Integration S. David Sevougian Sandia National Laboratories 2016 UFDC Annual Working Group Meeting Process Model Integration Session, June 8, 2016 Las Vegas, NV Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000.

  19. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PFLOTRAN Process Modeling: Density Dependence on Salinity Glenn Hammond Sandia National Laboratories 2016 UFDC Annual Working Group Meeting Integration Session, June 8, 2016 Las Vegas, NV Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2016-5319 PE Used Fuel

  20. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Integrating Discrete Fracture Networks with Performance Assessment Emily Stein, Kris Kuhlman Sandia National Laboratories Nataliia Makedonska, Satish Karra, Jeffrey Hyman Los Alamos National Laboratory 2016 UFDC Annual Working Group Meeting GDSA Integration Session, June 8, 2016 Las Vegas, NV Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's

  1. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Package and Waste Form Degradation and Implementation in PFLOTRAN Jennifer M. Frederick Glenn E. Hammond and Paul Mariner Sandia National Laboratories 2016 UFDC Annual Working Group Meeting GDSA Session, June 8, 2016 Las Vegas, NV Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration under contract

  2. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Advances in PFLOTRAN Gridding: Octree Refinement and Ghost Node Correction Ayman Alzraiee and Glenn Hammond Sandia National Laboratories 2016 UFDC Annual Working Group Meeting Integration Session, June 8, 2016 Las Vegas, NV Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration under contract

  3. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Statistical Outputs of Probabilistic Performance Assessment Robert J. MacKinnon Sandia National Laboratories Used Fuel Disposition Working Group Meeting June 2016 Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04- 94AL85000. SAND2016-5123 PE Used Fuel Disposition Performance Assessment

  4. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remaining Process Model Gaps for GDSA Paul Mariner, David Sevougian, Glenn Hammond, Emily Stein, and Jennifer Frederick Sandia National Laboratories 2016 UFD Group Meeting UNLV, Las Vegas, Nevada June 8, 2016 Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04- 94AL85000. SAND2016-5391 PE

  5. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    KOSINA Collaboration Ed Matteo UFD Working Group University of Nevada/Las Vegas June 7-9, 2016 Sandia National Laboratories is a multiprogram laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2016-4049 PE Used Fuel Disposition What is KOSINA? June 9, 2016 KOSINA Collaboration - UFD Working Group Mtg. 2 Used Fuel

  6. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Feature, Event, and Process (FEP) Catalogue for SNF/HLW Disposal in Salt Geoff Freeze, S. David Sevougian, Mike Gross, Kris Kuhlman, Christi Leigh - SNL Jens Wolf, Dieter Buhmann, Jörg Mönig UFD Working Group Meeting Las Vegas, NV June 9, 2016 Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract

  7. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2016-5328PE Overview of Defense Repository Safety Analysis R&D S. David Sevougian Sandia National Laboratories 2016 UFDC Annual Working Group Meeting Defense Repository Session, June 9, 2016 Las Vegas, NV Used

  8. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    D-Repo Performance Assessment: Crystalline Reference Case Emily Stein, Dave Sevougian, Glenn Hammond, Jenn Frederick, Paul Mariner Sandia National Laboratories 2016 UFDC Annual Working Group Meeting Defense Repository Session, June 9, 2016 Las Vegas, NV Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration

  9. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Session Summary Geoff Freeze Sandia National Laboratories UFD Working Group Meeting Las Vegas, NV June 9, 2016 Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2016-6237 C Used Fuel Disposition 2 Deep Borehole Disposal (DBD) Breakout Sessions SESSION 2 - WEDNESDAY, JUNE 8,

  10. Environmental Management

    ScienceCinema (OSTI)

    None

    2015-01-07

    Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

  11. Environmental Management

    SciTech Connect (OSTI)

    2014-11-12

    Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

  12. ORISE: Emergency Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management Emergency Management Effective emergency management relies on thorough integration of preparedness plans at all levels of government. The Oak Ridge Institute for Science...

  13. Environmental Management System

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management System Environmental Management System An Environmental Management System (EMS) is a set of processes and practices that enable an organization to reduce its...

  14. M E Environmental Management Environmental Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    safety  performance  cleanup  closure M E Environmental Management Environmental Management safety  performance  cleanup  closure M E Environmental Management Environmental Management M E Environmental Management Environmental Management Office of Site Restoration, EM-10 Office of D&D and Facility Engineering, EM-13 Facility Deactivation & Decommissioning (D&D) D&D Program Map Addendum: Impact of American Recovery and Reinvestment Act (ARRA) on EM's D&D

  15. Best Management Practice #1: Water Management Planning

    Office of Energy Efficiency and Renewable Energy (EERE)

    A successful water management program starts with developing a comprehensive water management plan. This plan should be included within existing facility operating plans.

  16. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Safety Case Framework Geoff Freeze Sandia National Laboratories UFD Working Group Meeting Las Vegas, NV June 8, 2016 Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2016-5351PE Used Fuel Disposition 2 Safety Case Overview "The safety case is an integration of

  17. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    On-Line Waste Library (OWL) Walter Walkow Solutions Architect, Data Sciences, SNL Database and Capabilities June 7, 2016 SAND2016-5415 C Used Fuel Disposition June 2016 On-Line Waste Library (OWL) - Database & Capabilities SAND2016-5415 C 2 What is OWL, What objective does it support?  OWL - The on-line waste library (OWL) contains detailed cross- linked information, both technical and organizational, regarding DOE-managed high-level waste (HLW) and spent nuclear fuel (SNF) (D-wastes),

  18. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    package degradation: Clay - Metal Interactions Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04- 94AL85000. SAND2016-nnnnn Carlos F. Jové Colón Sandia National Laboratories Florie A. Caporuscio Los Alamos National Laboratory Las Vegas, Nevada - June 7 - 9, 2016 SAND2016-5247 PE Used

  19. 2016 DOE Project Management Workshop - "Enhancing Project Management...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6 DOE Project Management Workshop - "Enhancing Project Management" 2016 DOE Project Management Workshop - "Enhancing Project Management" 20160407-doe-project-management-workshop-AD...

  20. Risk Management Process Overview

    Broader source: Energy.gov [DOE]

    The cybersecurity risk management process explained in the Electricity Sector Cybersecurity Risk Management Process (RMP) Guideline has two primary components: the risk management model and the the risk management cycle.

  1. Your Records Management Responsibilities

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Your Records Management Responsibilities Table of Contents INTRODUCTION RECORDS MANAGEMENT IN THE FEDERAL GOVERNMENT RECORDS MANAGEMENT IN THE DEPARTMENT OF ENERGY IMPORTANCE OF RECORDS MANAGEMENT YOUR RECORDS MANAGEMENT RESPONSIBILITIES RECORDS MANAGEMENT LIFE CYCLE ELECTRONIC RECORDS & RECORDKEEPING LAW, REGULATION, AND POLICY ASSISTANCE RECORDS MANAGEMENT TERMS 2 INTRODUCTION If you are a government employee or contractor working for a federal agency, records management is part of your

  2. Energy Management and Financing

    Office of Energy Efficiency and Renewable Energy (EERE)

    This Tuesday Webcast for Industry covers how to become a Certified Energy Manager and Certified Practitioner in Energy Management Systems

  3. Integrated Safety Management Policy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    INTEGRATED SAFETY MANAGEMENT SYSTEM DESCRIPTION U.S. DEPARTMENT OF ENERGY Office of Environmental Management Headquarters May 2008 Preparation: Braj K. sin& Occupational Safety and Health Manager Office of Safety Management Concurrence: Chuan-Fu wu Director, Offlce of Safety Management Deputy Assistant Secretary for safe& Management andoperations Operations Officer for 1 Environmental Management Approval: Date p/-g Date Environmental Management TABLE OF CONTENTS

  4. Integrated Safety Management and Environmental Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Laboratory | Department of Energy Integrated Safety Management Workshop Registration, PIA, Idaho National Laboratory Integrated Safety Management Workshop Registration, PIA, Idaho National Laboratory Integrated Safety Management Workshop Registration, PIA, Idaho National Laboratory Integrated Safety Management Workshop Registration, PIA, Idaho National Laboratory (265.91 KB) More Documents & Publications TRAIN-PIA.pdf Occupational Medicine - Assistant PIA, Idaho National Laboratory PIA -

  5. John Angelis named Manager, Information Resource Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Names John S. Angelis Manager of Information Resource Management CARLSBAD, N.M., March 22, 2000 - The Westinghouse Waste Isolation Division (WID) has named John S. Angelis of Carlsbad as Manager of Information Resource Management at the Waste Isolation Pilot Plant (WIPP). "John's extensive computer technology and telecommunications experience, combined with his progressive attitude, make him an ideal choice for this increasingly important position," said WID General Manager Joe

  6. ENVIRONMENTAL MANAGEMENT OFFICE OF ENVIRONMENTAL MANAGEMENT

    Office of Environmental Management (EM)

    ENVIRONMENTAL MANAGEMENT OFFICE OF ENVIRONMENTAL MANAGEMENT OFFICE OF ENVIRONMENTAL MANAGEMENT OFFICE OF EM Recovery NEWS FLASH RECOVERY.GOV March 10, 2011 American Recovery and Reinvestment Act Payments Surge Past $4 Billion U.S. Depar tment of Energy | Office of Environmental Management For More Information on EM Recovery Act Work, Visit Us on the Web: http://www.em.doe.gov/emrecovery/ FINANCIAL HIGHLIGHTS * More than $4 BILLION in Recovery Act payments are accelerating environmental cleanup

  7. Best Management Practice #1: Water Management Planning | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Water Management Planning Best Management Practice 1: Water Management Planning A successful water management program starts with a comprehensive strategic plan. The process ...

  8. DOE Jobs Online (Hiring Manager), Office of Human Capitol Management...

    Broader source: Energy.gov (indexed) [DOE]

    Jobs Online (Hiring Manager), Office of Human Capitol Management Innovation and Solutions DOE Jobs Online (Hiring Manager), Office of Human Capitol Management Innovation and ...

  9. AWWA Utility Management Conference

    Broader source: Energy.gov [DOE]

    Hosted by the American Water Works Association (AWWA), the Utility Management Conference is one of the leading management conferences to share experiences and learn from others in similar situations to the most pressing management issues of the day.

  10. Contract/Project Management

    Broader source: Energy.gov (indexed) [DOE]

    Second Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Performance Metric FY 2012 Target FY 2012 Forecast ...

  11. Contract/Project Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Fourth Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2011 Target FY 2011 ...

  12. Contract/Project Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2 nd Quarter Overall Contract and Project Management Performance Metrics and Targets ContractProject Management Performance Metrics FY 2009 Target FY 2009 Actual Comment 1. ...

  13. Contract/Project Management

    Broader source: Energy.gov (indexed) [DOE]

    3 rd Quarter Overall Contract and Project Management Performance Metrics and Targets ContractProject Management Performance Metrics FY 2009 Target FY 2009 Actual Comment 1. ...

  14. Contract/Project Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Fourth Quarter Overall Contract and Project Management Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2010 Target FY 2010 Actual FY ...

  15. Contract/Project Management

    Broader source: Energy.gov (indexed) [DOE]

    Third Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Performance Metric FY 2012 Target FY 2012 Forecast ...

  16. Contract/Project Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Fourth Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Performance Metric FY 2012 Target FY 2012 Final FY ...

  17. Contract/Project Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Third Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2011 Target FY 2011 ...

  18. Contract/Project Management

    Broader source: Energy.gov (indexed) [DOE]

    Second Quarter Overall Contract and Project Management Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2010 Target FY 2010 Actual FY ...

  19. Contract/Project Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1 st Quarter Overall Contract and Project Management Performance Metrics and Targets ContractProject Management Performance Metrics FY 2009 Target FY 2009 Actual Comment 1. ...

  20. Contract/Project Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8 4 th Quarter Metrics Final Overall Contract and Project Management Performance Metrics and Targets ContractProject Management Performance Metrics FY 2008 Target FY 2008 Actual ...

  1. Turbine Thermal Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Turbine Thermal Management Fact Sheets Research Team Members Key Contacts Turbine Thermal Management The gas turbine is the workhorse of power generation, and technology advances ...

  2. Data Management Policy The

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management Policy The guidelines below describe Data Management procedures, processes and resources that need to be understood by both user projects and in-house research. 1....

  3. Supply Management Specialist

    Broader source: Energy.gov [DOE]

    This position is located in the Logistics Management organization (NSL), Supply Chain Services (NS), Chief Administrative Office (N). NSL manages the warehousing of materials; the investment...

  4. COMPREHENSIVE LEGACY MANAGEMENT

    Office of Legacy Management (LM)

    Fernald Preserve, Fernald, Ohio Comprehensive Legacy Management and Institutional Controls ... blank LMSFERS03496-8.0 Comprehensive Legacy Management and Institutional Controls ...

  5. End Points Management

    Broader source: Energy.gov [DOE]

    The policy of the EM is that a formal project management approach be used for the planning, managing, and conducting of its projects.

  6. Contract/Project Management

    Broader source: Energy.gov (indexed) [DOE]

    Third Quarter Overall Contract and Project Management Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2010 Target FY 2010 Forecast FY ...

  7. Contract/Project Management

    Broader source: Energy.gov (indexed) [DOE]

    Contract and Project Management Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2011 Target FY 2011 Actual & Forecast FY 2011 Pre- & ...

  8. Contract/Project Management

    Broader source: Energy.gov (indexed) [DOE]

    and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2011 Target FY 2011 Forecast FY 2011 Pre- & ...

  9. Technical Standards Managers

    Broader source: Energy.gov (indexed) [DOE]

    FACILITYADDRESS LOC CODE DOE TECHNICAL STANDARD MANAGERS AU-30 DOE Technical Standards ... FACILITYADDRESS LOC CODE DOE TECHNICAL STANDARD MANAGERS DOE-CTA TSM Gustave E. (Bud) ...

  10. Management of Nuclear Materials

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-08-17

    To establish requirements for the lifecycle management of DOE owned and/or managed accountable nuclear materials. Cancels DOE O 5660.1B.

  11. Management Control Cover

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    OAS-M-06-02 November 2005 REPORT ON MANAGEMENT CONTROLS OVER ASSESSING NATURAL ... and Methodology 5 Prior Audit Reports 6 Management Comments 7 NATURAL RESURCE DAMAGE ...

  12. Safety Management System Policy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SAFETY MANAGEMENT POLICY PURPOSE AND SCOPE To establish the Department of Energy's (DOE) expectation for safety, 1 including integrated safety management that will enable ...

  13. Evaluation of the Geotech SMART24BH 20Vpp/5Vpp data acquisition system with active fortezza crypto card data signing and authentication.

    SciTech Connect (OSTI)

    Rembold, Randy Kai; Hart, Darren M.

    2009-09-01

    Sandia National Laboratories has tested and evaluated Geotech SMART24BH borehole data acquisition system with active Fortezza crypto card data signing and authentication. The test results included in this report were in response to static and tonal-dynamic input signals. Most test methodologies used were based on IEEE Standards 1057 for Digitizing Waveform Recorders and 1241 for Analog to Digital Converters; others were designed by Sandia specifically for infrasound application evaluation and for supplementary criteria not addressed in the IEEE standards. The objective of this work was to evaluate the overall technical performance of two Geotech SMART24BH digitizers with a Fortezza PCMCIA crypto card actively implementing the signing of data packets. The results of this evaluation were compared to relevant specifications provided within manufacturer's documentation notes. The tests performed were chosen to demonstrate different performance aspects of the digitizer under test. The performance aspects tested include determining noise floor, least significant bit (LSB), dynamic range, cross-talk, relative channel-to-channel timing, time-tag accuracy/statistics/drift, analog bandwidth.

  14. A Security Solution for IEEE 802.11's Ad-hoc Mode:Password-Authentication and Group Diffie-Hellman Key Exchange

    SciTech Connect (OSTI)

    Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

    2005-10-01

    The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.

  15. Ross Management | Open Energy Information

    Open Energy Info (EERE)

    Management Jump to: navigation, search Name: Ross Management Place: Goldendale, Washington State Product: Ross Management is the management parent for a group of family owned...

  16. Chemical Management Contacts

    Broader source: Energy.gov [DOE]

    Contacts for additional information on Chemical Management and brief description on Energy Facility Contractors Group

  17. Managing Your User Account

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Managing Your Account Managing Your User Account Use the NERSC Information Management (NIM) system to customize your user account and keep your personal information up-to-date. See the NIM User's Guide, especially the "Managing Your User Account with NIM" section. Last edited: 2016-04-29 11:35:06

  18. Environmental Management System

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management System Environmental Management System An Environmental Management System is a systematic method for assessing mission activities, determining the environmental impacts of those activities, prioritizing improvements, and measuring results. May 30, 2012 The continuous improvement cycle Our Environmental Management System encourages continuous improvement of our environmental performance. Contact Environmental Communication & Public Involvement P.O. Box 1663 MS M996 Los Alamos, NM

  19. Manager`s views of public involvement

    SciTech Connect (OSTI)

    Branch, K.M.; Heerwagen, J.; Bradbury, J.

    1995-12-01

    Four issues commonly form the framework for debates about the acceptability of proposed projects or technologies--the substantive decision or technological choice; the treatment of the community by the proponent organization; the way the decision-making process has been structured and managed; and the status of institutional safeguards and protection. One of the clear messages of cultural theory is that differences in perspectives are a normal and inevitable part of society, and that attempts to resolve differences by persuasion are not likely to work. These findings are useful when considering the goals and possibilities of public involvement as a decision-making tool, and when designing or evaluating public involvement training programs for managers. The research reported here examines the viewpoints and concerns of managers and decision-makers about the four issues identified above, with particular emphasis on their perspectives and concerns about opening decision-making processes to the public and about managers` roles and responsibilities for structuring and managing open decision-making processes. Implications of these findings for public involvement training for managers is also discussed. The data presented in this paper were obtained from face-to-face interviews with managers and decision-makers with experience managing a variety of hazardous waste management decision-making processes. We conducted these interviews in the course of four separate research projects: needs assessments to support the design and development of a public involvement training program for managers; a study of community residents` and managers` perspectives on the chemical stockpile disposal program; an evaluation of the effectiveness of public involvement training for managers in the Department of Energy; and a study to develop indicators of the benefits and costs of public involvement.

  20. 2014 DOE Project Management Workshop

    Broader source: Energy.gov [DOE]

    What:  2014 DOE Project Management Workshop (Meeting the Challenge—Integrated Acquisition & Project Management)

  1. V-036: EMC Smarts Network Configuration Manager Database Authenticatio...

    Broader source: Energy.gov (indexed) [DOE]

    The systems uses a hard-coded key to encrypt authentication credentials on the target system CVE-2012-4615. A local user with knowledge of the key can access the credentials. A ...

  2. Project Manager's Guide to Managing Impact and Process Evaluation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Project Manager's Guide to Managing Impact and Process Evaluation Studies This report provides a step-by-step approach to help managers of EERE evaluation projects create and ...

  3. Manager's Desk Reference on Human Capital Management Flexibilities...

    Broader source: Energy.gov (indexed) [DOE]

    that can be used in day-to-day human capital management activities, especially ... Manager's Desk Reference on Human Capital Management Flexibilities (640.69 KB) Responsible ...

  4. Risk Management Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-01-12

    The purpose of this guide is to describe effective risk management processes. The continuous and iterative process includes updating project risk documents and the risk management plan and emphasizes implementation communication of the risks and actions taken.

  5. Information Technology Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2012-12-03

    The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Cancels DOE G 200.1-1. Admin Chg 1 approved 1-16-2013.

  6. Risk Management Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-01-18

    This Guide provides non-mandatory risk management approaches for implementing the requirements of DOE O 413.3B, Program and Project Management for the Acquisition of Capital Assets. Supersedes DOE G 413.3-7.

  7. Management Associate I

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as an analyst and advisor to an organization's manager and other managers within the organization within BPA. The position serves as a point of...

  8. Information Technology Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2012-12-03

    The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Admin Chg 1, dated 1-16-2013, supersedes DOE O 415.1.

  9. Stage Gate Management Guide

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Stage Gate Management in the Biomass Program February 2005 Revision 2 2 TABLE OF CONTENTS OVERVIEW............................................................................................................................. 4 STAGE GATE MANAGEMENT .................................................................................................... 4 STAGE GATE PROCESS AND LONG RANGE STRATEGIC PROGRAM PLANNING ........................ 5 GATE REVIEWS

  10. Management Control Cover

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    OAS-M-06-01 November 2005 REPORT ON MANAGEMENT CONTROLS OVER THE HANFORD SITE ... Project Management ORP did not fully identify and mitigate risks associated with the TRUM ...