National Library of Energy BETA

Sample records for rsa authentication manager

  1. V-174: RSA Authentication Manager Writes Operating System, SNMP...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files V-174: RSA Authentication Manager Writes Operating System,...

  2. V-195: RSA Authentication Manager Lets Local Users View the Administra...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: RSA Authentication Manager Lets Local Users View the Administrative Account Password V-195: RSA Authentication Manager Lets Local Users View the Administrative Account Password...

  3. T-659: Update support for RSA Authentication Manager

    Broader source: Energy.gov [DOE]

    RSA posted SP4 Patch 4 of their Authentication Manager product 06/30/2011. There are a few pages of fixes in the README, but the most significant is that Authentication Manager can now be installed on Windows Server 2008 (both 32 and 64bit).

  4. U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Scripting and URL Redirection Attacks | Department of Energy 12: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other

  5. U-027: RSA Key Manager Appliance Session Logout Bug Fails to...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated...

  6. V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    issued a fix (7.1.2). Addthis Related Articles U-267: RSA Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability...

  7. U-212: RSA Authentication Manager Flaws Permit Cross-Site and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be ...

  8. V-223: RSA Authentication Agent for PAM Allows Remote Users to...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    has issued a fix Addthis Related Articles U-267: RSA Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability...

  9. U-267: RSA® Authentication Agent 7.1 for Microsoft Windows®...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RSA Authentication Agent Lets Remote Authenticated Users Bypass an Authentication Step reference LINKS: SecurityTracker Alert ID: 1027559 Bugtraq ID: 55662 CVE-2012-2287...

  10. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Let Remote Users Conduct Cross-Site Scripting Attacks | Department of Energy 51: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks May 8, 2013 - 12:06am Addthis PROBLEM: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks

  11. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Energy Savers [EERE]

    Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users ...

  12. T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw

    Broader source: Energy.gov [DOE]

    An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session.

  13. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  14. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Let Local Users Bypass Security Restrictions | Department of Energy 26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA

  15. T-640: RSA Access Manager Server CVE-2011-0322 Update

    Broader source: Energy.gov [DOE]

    RSA strongly recommends that all customers running RSA Access Manager Server versions 5.5.3, 6.0.4, and 6.1 apply the following updated security hot fixes, which contain the resolution to this issue, at the earliest opportunity. The hot fixes can be downloaded from SecurCare Online or by contacting RSA Security Customer Support. ?Security Hot fix # 5.5.3.174 for RSA Access Manager Server version 5.5.3 ?Security Hot fix # 6.0.4.60 for RSA Access Manager Server version 6.0.4 ?Security Hot fix # 6.1.2.08 for RSA Access Manager Server version 6.1.2 ?Security Hot fix # 6.1.3.05 for RSA Access Manager Server version 6.1.3

  16. V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    has issued fixes. Addthis Related Articles U-267: RSA Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability...

  17. T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID

    Broader source: Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

  18. T-642: RSA SecurID update to Customers

    Broader source: Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products

  19. T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain...

  20. V-036: EMC Smarts Network Configuration Manager Database Authentication

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Bypass Vulnerability | Department of Energy 6: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability November 29, 2012 - 3:30am Addthis PROBLEM: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability PLATFORM: EMC Smarts Network Configuration Manager (NCM) all versions prior 9.1 ABSTRACT: Two vulnerabilities were reported in EMC Smarts

  1. Using Two-Factor RSA Token with WebVPN | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Using Two-Factor RSA Token with WebVPN Using Two-Factor RSA Token with WebVPN Your RSA token is used to esbablish a connection to the Internet and connect to https://connect.doe.gov . Using-TwoFactorRSA-Token w VPN.pdf (469 KB) More Documents & Publications Instructions for WebVPN Connectivity Citrix_2FA_Authentication_09.09 Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc

  2. User guide for remote access to VDI and Workplace using RSA token |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy User guide for remote access to VDI and Workplace using RSA token User guide for remote access to VDI and Workplace using RSA token User guide for remote access to VDI and Workplace using RSA token VDI_WP_RSA_Remote_Guide_Final.pdf (1.22 MB) More Documents & Publications User Guide for Remote Access to VDI/Workplace Using PIV Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc Citrix_2FA_Authentication_09.09

  3. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  4. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  5. Reviews of computing technology: Securing network applications, Kerberos and RSA

    SciTech Connect (OSTI)

    Johnson, S.M.

    1992-06-01

    This paper will focus on the first step in establishing network security, authentication, and describe the basic function of both RSA and Kerberos as used to provide authentication and confidential data transfer services. It will also discuss the Digital Signature Standard and the market acceptance of each. Proper identification of the principals involved in a network dialog is a necessary first step in providing network-wide security comparable to that of stand-alone systems.

  6. Digitally Marking RSA Moduli

    SciTech Connect (OSTI)

    Johnston, A.M.

    2000-10-09

    The moduli used in RSA (see [5]) can be generated by many different sources. The generator of that modulus (assuming a single entity generates the modulus) knows its factorization. They would have the ability to forge signatures or break any system based on this moduli. If a moduli and the RSA parameters associated with it were generated by a reputable source, the system would have higher value than if the parameters were generated by an unknown entity. So for tracking, security, confidence and financial reasons it would be beneficial to know who the generator of the RSA modulus was. This is where digital marking comes in. An RSA modulus ia digitally marked, or digitally trade marked, if the generator and other identifying features of the modulus (such as its intended user, the version number, etc.) can be identified and possibly verified by the modulus itself. The basic concept of digitally marking an RSA modulus would be to fix the upper bits of the modulus to this tag. Thus anyone who sees the public modulus can tell who generated the modulus and who the generator believes the intended user/owner of the modulus is.

  7. U-084: Cisco Digital Media Manager Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port 8443 to access administrative resources and gain administrative privileges....

  8. U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system.

  9. Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Citrix_2FA_Authentication_12_3_2009.doc Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc (453.3 KB) More Documents & Publications Citrix_2FA_Authentication_09.09 Using Two-Factor RSA Token with WebVPN User guide for remote access to VDI and Workplace using RSA token

  10. Authentication Protocol using Quantum Superposition States

    SciTech Connect (OSTI)

    Kanamori, Yoshito; Yoo, Seong-Moo; Gregory, Don A.; Sheldon, Frederick T

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  11. V-234: EMC RSA Archer GRC Open Redirection Weakness and Security...

    Office of Environmental Management (EM)

    4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September ...

  12. System and method for authentication

    SciTech Connect (OSTI)

    Duerksen, Gary L.; Miller, Seth A.

    2015-12-29

    Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.

  13. Low-bandwidth authentication.

    SciTech Connect (OSTI)

    Donnelly, Patrick Joseph; McIver, Lauren; Gaines, Brian R.; Anderson, Erik; Collins, Michael Joseph; Thomas,Kurt Adam; McDaniel, Austin

    2007-09-01

    Remotely-fielded unattended sensor networks generally must operate at very low power--in the milliwatt or microwatt range--and thus have extremely limited communications bandwidth. Such sensors might be asleep most of the time to conserve power, waking only occasionally to transmit a few bits. RFID tags for tracking or material control have similarly tight bandwidth constraints, and emerging nanotechnology devices will be even more limited. Since transmitted data is subject to spoofing, and since sensors might be located in uncontrolled environments vulnerable to physical tampering, the high-consequence data generated by such systems must be protected by cryptographically sound authentication mechanisms; but such mechanisms are often lacking in current sensor networks. One reason for this undesirable situation is that standard authentication methods become impractical or impossible when bandwidth is severely constrained; if messages are small, a standard digital signature or HMAC will be many times larger than the message itself, yet it might be possible to spare only a few extra bits per message for security. Furthermore, the authentication tags themselves are only one part of cryptographic overhead, as key management functions (distributing, changing, and revoking keys) consume still more bandwidth. To address this problem, we have developed algorithms that provide secure authentication while adding very little communication overhead. Such techniques will make it possible to add strong cryptographic guarantees of data integrity to a much wider range of systems.

  14. International safeguards data authentication

    SciTech Connect (OSTI)

    Melton, R.B.; Smith, C.E.; DeLand, S.M.; Manatt, D.R.

    1996-07-01

    The International Safeguards community is becoming increasingly reliant on information stored in electronic form. In international monitoring and related activities it must be possible to verify and maintain the integrity of this electronic information. This paper discusses the use of data authentication technology to assist in accomplishing this task. The paper provides background information, identifies the relevance to international safeguards, discusses issues related to export controls, algorithm patents, key management and the use of commercial vs. custom software.

  15. V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain...

    Office of Environmental Management (EM)

    84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain ...

  16. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic...

    Office of Environmental Management (EM)

    59: RSA BSAFE SSL-C Lets Remote Users Decrypt SSLTLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL...

  17. V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Issue | Department of Energy 4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September 4, 2013 - 6:00am Addthis PROBLEM: A weakness and a security issue have been reported in EMC RSA Archer GRC PLATFORM: EMC RSA Archer GRC 5.x ABSTRACT: This fixes multiple vulnerabilities, which can be exploited to bypass certain security restrictions and to conduct spoofing

  18. Portable RSA encryption-decryption subprogram for protecting proprietary text

    SciTech Connect (OSTI)

    Hanson, R.J.

    1981-09-01

    A virtually portable (FORTRAN) version of the RSA (Rivest, Shamir, Adleman) algorithm for encryption and decryption of proprietary text has been written. This system uses three previously developed software packages. These are an extended precision integer arithmetic package, an error processing package, and machine-sensitive input/output subprograms from the Text Exchange System.

  19. V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access,

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Clickjacking, and File Upload Attacks | Department of Energy 84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks February 5, 2013 - 12:01am Addthis PROBLEM: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks PLATFORM: RSA Archer SmartSuite Framework version 4.x RSA Archer

  20. Multi-factor authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  1. Authentication of byte sequences

    SciTech Connect (OSTI)

    Stearns, S.D.

    1991-06-01

    Algorithms for the authentication of byte sequences are described. The algorithms are designed to authenticate data in the Storage, Retrieval, Analysis, and Display (SRAD) Test Data Archive of the Radiation Effects and Testing Directorate (9100) at Sandia National Laboratories, and may be used in similar situations where authentication of stored data is required. The algorithms use a well-known error detection method called the Cyclic Redundancy Check (CRC). When a byte sequence is authenticated and stored, CRC bytes are generated and attached to the end of the sequence. When the authenticated data is retrieved, the authentication check consists of processing the entire sequence, including the CRC bytes, and checking for a remainder of zero. The error detection properties of the CRC are extensive and result in a reliable authentication of SRAD data.

  2. Authentication of quantum messages.

    SciTech Connect (OSTI)

    Barnum, Howard; CrƩpeau, Jean-Claude; Gottesman, D.; Smith, A.; Tapp, Alan

    2001-01-01

    Authentication is a well-studied area of classical cryptography: a sender A and a receiver B sharing a classical private key want to exchange a classical message with the guarantee that the message has not been modified or replaced by a dishonest party with control of the communication line. In this paper we study the authentication of messages composed of quantum states. We give a formal definition of authentication in the quantum setting. Assuming A and B have access to an insecure quantum channel and share a private, classical random key, we provide a non-interactive scheme that both enables A to encrypt and authenticate (with unconditional security) an m qubit message by encoding it into m + s qubits, where the probability decreases exponentially in the security parameter s. The scheme requires a private key of size 2m + O(s). To achieve this, we give a highly efficient protocol for testing the purity of shared EPR pairs. It has long been known that learning information about a general quantum state will necessarily disturb it. We refine this result to show that such a disturbance can be done with few side effects, allowing it to circumvent cryptographic protections. Consequently, any scheme to authenticate quantum messages must also encrypt them. In contrast, no such constraint exists classically: authentication and encryption are independent tasks, and one can authenticate a message while leaving it publicly readable. This reasoning has two important consequences: On one hand, it allows us to give a lower bound of 2m key bits for authenticating m qubits, which makes our protocol asymptotically optimal. On the other hand, we use it to show that digitally signing quantum states is impossible, even with only computational security.

  3. Secure authenticated video equipment

    SciTech Connect (OSTI)

    Doren, N.E.

    1993-07-01

    In the verification technology arena, there is a pressing need for surveillance and monitoring equipment that produces authentic, verifiable records of observed activities. Such a record provides the inspecting party with confidence that observed activities occurred as recorded, without undetected tampering or spoofing having taken place. The secure authenticated video equipment (SAVE) system provides an authenticated series of video images of an observed activity. Being self-contained and portable, it can be installed as a stand-alone surveillance system or used in conjunction with existing monitoring equipment in a non-invasive manner. Security is provided by a tamper-proof camera enclosure containing a private, electronic authentication key. Video data is transferred communication link consisting of a coaxial cable, fiber-optic link or other similar media. A video review station, located remotely from the camera, receives, validates, displays and stores the incoming data. Video data is validated within the review station using a public key, a copy of which is held by authorized panics. This scheme allows the holder of the public key to verify the authenticity of the recorded video data but precludes undetectable modification of the data generated by the tamper-protected private authentication key.

  4. V-220: Juniper Security Threat Response Manager Lets Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute...

  5. Authentication Without Secrets

    SciTech Connect (OSTI)

    Pierson, Lyndon G.; Robertson, Perry J.

    2015-11-01

    This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integrity of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.

  6. Instructions for Using Two-Factor RSA Tokens with Citrix Workplace...

    Broader source: Energy.gov (indexed) [DOE]

    Enter your user name in the User name field. Enter your password, which is your RSA token PIN plus the number displayed on the token in the Password field. Click Log on. For more ...

  7. Two-Factor Authentication

    Broader source: Energy.gov [DOE]

    Two-Factor Authentication (2FA) (also known as 2-Step Verification) is a system thatĀ employs two methodsĀ to identify an individual.Ā More secure than reusable passwords,Ā when a token's random number...

  8. U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection...

    Office of Environmental Management (EM)

    can inject SQL commands. A remote authenticated user can view files on the target system. ... A remote authenticated user can view files on the target system. Solution: The vendor has ...

  9. Security analysis of RSA cryptosystem algorithm and itā€™s properties

    SciTech Connect (OSTI)

    Liu, Chenglian; Guo, Yongning E-mail: linjuanliucaihong@qq.com; Lin, Juan E-mail: linjuanliucaihong@qq.com

    2014-10-06

    The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles to discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA.

  10. Anonymous authenticated communications

    DOE Patents [OSTI]

    Beaver, Cheryl L.; Schroeppel, Richard C.; Snyder, Lillian A.

    2007-06-19

    A method of performing electronic communications between members of a group wherein the communications are authenticated as being from a member of the group and have not been altered, comprising: generating a plurality of random numbers; distributing in a digital medium the plurality of random numbers to the members of the group; publishing a hash value of contents of the digital medium; distributing to the members of the group public-key-encrypted messages each containing a same token comprising a random number; and encrypting a message with a key generated from the token and the plurality of random numbers.

  11. CERTIFICATE OF AUTHENTICITY

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CERTIFICATE OF AUTHENTICITY I hereby certify that this transcript constitutes an accurate record of the full Council meeting of the National Coal Council held on November 14,2008 at the Westin Grand Hotel, Washington, D.C. ~ i c h a e l G. Mueller, Chair National Coal Council I NATIONAL COAL COUNCIL 1 FULL COUNCIL MEETING FRIDAY NOVEMBER 14, 2 0 0 8 The Full Council meeting convened at 9 : 0 0 a.m. in the Washington Ballroom of the Westin Grand Hotel, 2 3 5 0 M Street, NW, Washington, DC, Chair

  12. AVNG authentication features

    SciTech Connect (OSTI)

    Thron, Jonathan Louis; Mac Arthur, Duncan W; White, Greg; Razinkov, Sergey; Livke, Alexander

    2010-01-01

    Any verification measurement performed on potentially classified nuclear material must satisfy two seemingly contradictory constraints. First and foremost, no classified information can be released. At the same time, the monitoring party must have confidence in the veracity of the measurement (called authentication). An information barrier (IB) is included in the measurement system to protect the potentially classified information. To achieve both goals, the IB allows only very limited, previously agreed-on information to be displayed to the monitoring party. In addition to this limited information from the potentially classified measurement, other measurements are performed and procedures are put in place for the monitoring party to gain confidence that the material being measured is consistent with the host's declarations concerning that material. In this presentation, we will discuss the techniques used in the AVNG attribute measuring system to facilitate authentication of the verification measurements by the monitors. These techniques include measuring unclassified items while allowing more information to be displayed; having the monitor understand the system function, design, and implementation; and randomly selecting the order of measurements.

  13. Two-chip implementation of the RSA public-key encryption algorithm

    SciTech Connect (OSTI)

    Rieden, R.F.; Snyder, J.B.; Widman, R.J.; Barnard, W.J.

    1982-01-01

    A system has been developed which employs two identical integrated circuits to perform the encryption algorithm developed by Rivest, Shamir, and Adleman (RSA) on a 336-bit message. The integrated circuit used in the system employs the 3-micron polysilicon gate, radiation-hard, CMOS technology developed at Sandia National Laboratories.

  14. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Buffer Overflow Lets Remote Users Execute Arbitrary Code | Department of Energy 59: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute

  15. Authentication techniques for smart cards

    SciTech Connect (OSTI)

    Nelson, R.A.

    1994-02-01

    Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thorough understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system.

  16. RSA calibration accuracy of a fluoroscopy-based system using nonorthogonal images for measuring functional kinematics

    SciTech Connect (OSTI)

    Kedgley, Angela E.; Jenkyn, Thomas R.

    2009-07-15

    When performing radiostereometric analysis (RSA) in a clinical setting it may be desirable to orient the two imaging devices nonorthogonally to obtain the best views of an anatomical structure. In this study, a calibration frame was constructed that allowed the relative angles of fiducial and control planes to be adjusted. Precision and accuracy were quantified across multiple trials and orientations. The 90 deg. frame was always of equivalent or greater accuracy than a calibration frame with the fiducial and control planes aligned parallel to the image intensifiers. This study also showed that RSA may be performed with imaging devices at relative angles other than 90 deg. without compromising accuracy. This allows researchers greater freedom in positioning equipment.

  17. ARM - Central Authentication Service

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Data Management Facility External Data Center Features and Releases Facility News Blogs: Air Time & Field Notes Meetings and Events Employment Research Highlights Data...

  18. Obfuscated authentication systems, devices, and methods

    DOE Patents [OSTI]

    Armstrong, Robert C; Hutchinson, Robert L

    2013-10-22

    Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

  19. A proposed generic authentication information element

    SciTech Connect (OSTI)

    Tarman, T.D.

    1995-08-01

    This contribution describes a proposed information element that can convey authentication information within an ATM signaling message. The design of this information element provides a large amount of flexibility to the user because it does not specify a particular signature algorithm, and it does not specify which information elements must accompany the Authentication IE in a signaling message. This allows the user to implement authenticated signaling based on her site`s security policies and performance requirements.

  20. CERTIFICATE OF AUTHENTICITY | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CERTIFICATE OF AUTHENTICITY CERTIFICATE OF AUTHENTICITY I hereby certify that this transcript constitutes an accurate record of the full Council meeting of the National Coal Council held on November 14,2008 at the Westin Grand Hotel, Washington, D.C. Tran_001.pdf CERTIFICATE OF AUTHENTICITY (4.5 MB) More Documents & Publications U.S. Offshore Wind Advanced Technology Demonstration Projects Public Meeting Transcript for Offshore Wind Demonstrations Office of Information Resources Office of

  1. CERTIFICATE OF AUTHENTICITY | Department of Energy

    Energy Savers [EERE]

    D.C. Tran001.pdf PDF icon CERTIFICATE OF AUTHENTICITY More Documents & Publications U.S. Offshore Wind Advanced Technology Demonstration Projects Public Meeting Transcript for...

  2. /ital Q/-modulation and four-wave mixing effects caused by RSA materials in a laser cavity

    SciTech Connect (OSTI)

    Zhang Tao; Yao Jianquan

    1989-04-01

    By making use of the density-matrix method, we give a unified explanation of /ital Q/-modulation and four-wave mixing effects caused by resonant saturable absorption (RSA) materials in a laser cavity. The underlying physical mechanism of the effects is expressed clearly. The theoretical calculation results agree very well with the experimental data.

  3. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...

    Office of Environmental Management (EM)

    A local user can conduct password guessing attacks. IMPACT: A remote user can access the ... A local user can can conduct brute force password guessing attacks without limits. ...

  4. V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated...

  5. V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks...

  6. Instructions for using HSPD-12 Authenticated Outlook Web Access...

    Energy Savers [EERE]

    Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook...

  7. V-231: Cisco Identity Services Engine Discloses Authentication...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    system stores the username and password of an authenticated user within hidden ... or clickjacking attack to access the username and password of an authenticated session. ...

  8. T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

  9. AUTHENTICATED

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1 Contract No. 11PB-12330 AMENDMENT executed by the BONNEVILLE POWER ADMINISTRATION and PORT TOWNSEND PAPER CORPORATION This AMENDMENT to the Firm Power Sales Agreement (Agreement)...

  10. Data Authentication Demonstration for Radionuclide Stations

    SciTech Connect (OSTI)

    Harris, Mark; Herrington, Pres; Miley, Harry; Ellis, J. Edward; McKinnon, David; St. Pierre, Devon

    1999-08-03

    Data authentication is required for certification of sensor stations in the International Monitoring System (IMS). Authentication capability has been previously demonstrated for continuous waveform stations (seismic and infrasound). This paper addresses data surety for the radionuclide stations in the IMS, in particular the Radionuclide Aerosol Sampler/Analyzer (RASA) system developed by Pacific Northwest National Laboratory (PNNL). Radionuclide stations communicate data by electronic mail using formats defined in IMS 1.0, Formats and Protocols for Messages. An open message authentication standard exists, called S/MIME (Secure/Multipurpose Internet Mail Extensions), which has been proposed for use with all IMS radionuclide station message communications. This standard specifies adding a digital signature and public key certificate as a MIME attachment to the e-mail message. It is advantageous because it allows authentication to be added to all IMS 1.0 messages in a standard format and is commercially supported in e-mail software. For command and control, the RASA system uses a networked Graphical User Interface (GUI) based upon Common Object Request Broker Architecture (CORBA) communications, which requires special authentication procedures. The authors have modified the RASA system to meet CTBTO authentication guidelines, using a FORTEZZA card for authentication functions. They demonstrated signing radionuclide data messages at the RASA, then sending, receiving, and verifying the messages at a data center. They demonstrated authenticating command messages and responses from the data center GUI to the RASA. Also, the particular authentication system command to change the private/public key pair and retrieve the new public key was demonstrated. This work shows that data surety meeting IMS guidelines may be immediately applied to IMS radionuclide systems.

  11. Final report for the network authentication investigation and pilot.

    SciTech Connect (OSTI)

    Eldridge, John M.; Dautenhahn, Nathan; Miller, Marc M.; Wiener, Dallas J; Witzke, Edward L.

    2006-11-01

    New network based authentication mechanisms are beginning to be implemented in industry. This project investigated different authentication technologies to see if and how Sandia might benefit from them. It also investigated how these mechanisms can integrate with the Sandia Two-Factor Authentication Project. The results of these investigations and a network authentication path forward strategy are documented in this report.

  12. Hardware device binding and mutual authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  13. Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes

    DOE Patents [OSTI]

    Kent, Alexander Dale

    2008-09-02

    Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

  14. V-127: Samba Bug Lets Remote Authenticated Users Modify Files...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was...

  15. Kerberos authentication: The security answer for unsecured networks

    SciTech Connect (OSTI)

    Engert, D.E.

    1995-06-01

    Traditional authentication schemes do not properly address the problems encountered with today`s unsecured networks. Kerbmm developed by MIT, on the other hand is designed to operate in an open unsecured network, yet provide good authentication and security including encrypted session traffic. Basic Kerberos principles as well as experiences of the ESnet Authentication Pilot Project with Cross Realm. Authentication between four National Laboratories will also be described.

  16. Authentication of data for monitoring a comprehensive test ban treaty

    SciTech Connect (OSTI)

    Craft, R.L.; Draelos, T.J.

    1996-05-01

    The important issue of data integrity in the CTBT International Monitoring System (IMS) is discussed and a brief tutorial on data authentication techniques is offered. The utilization of data authentication as a solution to the data integrity problem is evaluated. Public key data authentication is recommended for multilateral monitoring regimes such as the CTBT. The ramifications and system considerations of applying data authentication at various locations in the IMS, or not at all, are reviewed in a data surety context. The paper concludes with a recommendation of authenticating data at all critical monitoring stations.

  17. V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    Symantec was notified of a pre-authentication buffer overflow found in the Symantec Endpoint Protection Manager (SEPM) and Symantec Endpoint Protection Center (SPC)

  18. System and method for authentication of goods

    DOE Patents [OSTI]

    Kaish, Norman; Fraser, Jay; Durst, David I.

    1999-01-01

    An authentication system comprising a medium having a plurality of elements, the elements being distinctive, detectable and disposed in an irregular pattern or having an intrinsic irregularity. Each element is characterized by a determinable attribute distinct from a two-dimensional coordinate representation of simple optical absorption or simple optical reflection intensity. An attribute and position of the plurality of elements, with respect to a positional reference is detected. A processor generates an encrypted message including at least a portion of the attribute and position of the plurality of elements. The encrypted message is recorded in physical association with the medium. The elements are preferably dichroic fibers, and the attribute is preferably a polarization or dichroic axis, which may vary over the length of a fiber. An authentication of the medium based on the encrypted message may be authenticated with a statistical tolerance, based on a vector mapping of the elements of the medium, without requiring a complete image of the medium and elements to be recorded.

  19. V-231: Cisco Identity Services Engine Discloses Authentication Credentials

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to Remote Users | Department of Energy 1: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users August 30, 2013 - 3:01am Addthis PROBLEM: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials. PLATFORM: Cisco Identity Services Engine (ISE) 1.x ABSTRACT: A vulnerability was reported in Cisco Identity Services

  20. T-646: Debian fex authentication bypass | Department of Energy

    Energy Savers [EERE]

    PLATFORM: Debian fex ABSTRACT: Debian security discovered that fex, a web service for transferring very large, files, is not properly validating authentication IDs. While the ...

  1. Authenticating concealed private data while maintaining concealment

    DOE Patents [OSTI]

    Thomas, Edward V.; Draelos, Timothy J.

    2007-06-26

    A method of and system for authenticating concealed and statistically varying multi-dimensional data comprising: acquiring an initial measurement of an item, wherein the initial measurement is subject to measurement error; applying a transformation to the initial measurement to generate reference template data; acquiring a subsequent measurement of an item, wherein the subsequent measurement is subject to measurement error; applying the transformation to the subsequent measurement; and calculating a Euclidean distance metric between the transformed measurements; wherein the calculated Euclidean distance metric is identical to a Euclidean distance metric between the measurement prior to transformation.

  2. Multi-factor Authentication Update | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Multi-factor Authentication Update There is a delay in the purchase of the multi-factor authentication software solution that will cause a lag in the planned implementation. The Laboratory is currently in negotiations to complete the purchase. Once complete, the implementation can begin.

  3. Public-key data authentication for treaty verification

    SciTech Connect (OSTI)

    Draelos, T.J.; Goldsmith, S.Y.

    1992-08-01

    A public-key Treaty Data Authentication Module (TDAM) based on the National Institute of Standards and Technology (NIST) Digital Signature Standard (DSS) has been developed to support treaty verification systems. The TDAM utilizes the Motorola DSP56001 Digital Signal Processor as a coprocessor and supports both the STD Bus and PC-AT Bus platforms. The TDAM is embedded within an Authenticated Data Communication Subsystem (ADCS) which provides transparent data authentication and communications, thereby concealing the details of securely authenticating and communicating compliance data and commands. The TDAM has been designed according to the NIST security guidelines for cryptographic modules. Public-key data authentication is important for support of both bilateral and multi-lateral treaties. 8 refs.

  4. Public-key data authentication for treaty verification

    SciTech Connect (OSTI)

    Draelos, T.J.; Goldsmith, S.Y.

    1992-01-01

    A public-key Treaty Data Authentication Module (TDAM) based on the National Institute of Standards and Technology (NIST) Digital Signature Standard (DSS) has been developed to support treaty verification systems. The TDAM utilizes the Motorola DSP56001 Digital Signal Processor as a coprocessor and supports both the STD Bus and PC-AT Bus platforms. The TDAM is embedded within an Authenticated Data Communication Subsystem (ADCS) which provides transparent data authentication and communications, thereby concealing the details of securely authenticating and communicating compliance data and commands. The TDAM has been designed according to the NIST security guidelines for cryptographic modules. Public-key data authentication is important for support of both bilateral and multi-lateral treaties. 8 refs.

  5. Centralized Authentication with Kerberos 5, Part I

    SciTech Connect (OSTI)

    Wachsmann, A

    2004-06-09

    Account administration in a distributed Unix/Linux environment can become very complicated and messy if done by hand. Large sites use special tools to deal with this problem. I will describe how even very small installations like your three computer network at home can take advantage of the very same tools. The problem in a distributed environment is that password and shadow files need to be changed individually on each machine if an account change occurs. Account changes include: password change, addition/removal of accounts, name change of an account (UID/GID changes are a big problem in any case), additional or removed login privileges to a (group of) computer(s), etc. In this article, I will show how Kerberos 5 solves the authentication problem in a distributed computing environment. A second article will describe a solution for the authorization problem.

  6. Citrix_2FA_Authentication_09.09 | Department of Energy

    Energy Savers [EERE]

    More Documents & Publications Microsoft Word - Citrix2FAAuthentication1232009.doc Using Two-Factor RSA Token with WebVPN Microsoft Word - SMailSecureWeb-BasedEmailv3 ...

  7. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges

    Office of Energy Efficiency and Renewable Energy (EERE)

    A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system.

  8. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information

    Broader source: Energy.gov [DOE]

    Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information.

  9. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  10. INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS...

    Broader source: Energy.gov (indexed) [DOE]

    172013 Page 1 INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA) Outlook Web Access provides access to unencrypted email only and is suitable for use from any ...

  11. Instructions | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Secure Email via Outlook Web Access Instructions for Using Secure Email via Outlook Web Access Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. Secure Email Requirements: An EITS provided Exchange email account An EITS provided RSA SecureID Token with an active account in the EITS-managed RSA Authentication Server Appropriate access granted Active Directory group membership DOEnet or Internet access and a supported web browser

  12. E-Labs - Learning with Authentic Data

    SciTech Connect (OSTI)

    Bardeen, Marjorie G.; Wayne, Mitchell

    2016-01-01

    the success teachers have had providing an opportunity for students to: ā€¢ Organize and conduct authentic research. ā€¢ Experience the environment of scientific collaborations. ā€¢ Possibly make real contributions to a burgeoning scientific field. We've created projects that are problem-based, student driven and technology dependent. Students reach beyond classroom walls to explore data with other students and experts and share results, publishing original work to a worldwide audience. Students can discover and extend the research of other students, modeling the processes of modern, large-scale research projects. From start to finish e-Labs are student-led, teacher-guided projects. Students need only a Web browser to access computing techniques employed by professional researchers. A Project Map with milestones allows students to set the research plan rather than follow a step-by-step process common in other online projects. Most importantly, e-Labs build the learning experience around the students' own questions and let them use the very tools that scientists use. Students contribute to and access shared data, most derived from professional research databases. They use common analysis tools, store their work and use metadata to discover, replicate and confirm the research of others. This is where real scientific collaboration begins. Using online tools, students correspond with other research groups, post comments and questions, prepare summary reports, and in general participate in the part of scientific research that is often left out of classroom experiments. Teaching tools such as student and teacher logbooks, pre- and post-tests and an assessment rubric aligned with learner outcomes help teachers guide student work. Constraints on interface designs and administrative tools such as registration databases give teachers the "one-stop-shopping" they seek for multiple e-Labs. Teaching and administrative tools also allow us to track usage and assess the impact on

  13. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates

    Broader source: Energy.gov [DOE]

    A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases.

  14. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A ...

  15. X.509 Authentication/Authorization in FermiCloud

    SciTech Connect (OSTI)

    Kim, Hyunwoo; Timm, Steven

    2014-11-11

    We present a summary of how X.509 authentication and authorization are used with OpenNebula in FermiCloud. We also describe a history of why the X.509 authentication was needed in FermiCloud, and review X.509 authorization options, both internal and external to OpenNebula. We show how these options can be and have been used to successfully run scientific workflows on federated clouds, which include OpenNebula on FermiCloud and Amazon Web Services as well as other community clouds. We also outline federation options being used by other commercial and open-source clouds and cloud research projects.

  16. Decreased cell survival and DNA repair capacity after UVC irradiation in association with down-regulation of GRP78/BiP in human RSa cells

    SciTech Connect (OSTI)

    Zhai Ling; Kita, Kazuko . E-mail: kita@faculty.chiba-u.jp; Wano, Chieko; Wu Yuping; Sugaya, Shigeru; Suzuki, Nobuo

    2005-05-01

    In contrast to extensive studies on the roles of molecular chaperones, such as heat shock proteins, there are only a few reports about the roles of GRP78/BiP, an endoplasmic reticulum (ER) stress-induced molecular chaperone, in mammalian cell responses to DNA-damaging stresses. To investigate whether GRP78/BiP is involved in resistance to a DNA-damaging agent, UVC (principally 254 nm in wavelength), we established human cells with down-regulation of GRP78/BiP by transfection of human RSa cells with antisense cDNA for GRP78/BiP. We found that the transfected cells showed higher sensitivity to UVC-induced cell death than control cells transfected with the vector alone. In the antisense-cDNA transfected cells, the removal capacities of the two major types of UVC-damaged DNA (thymine dimers and (6-4) photoproducts) in vivo and DNA synthesis activity of whole cell extracts to repair UVC-irradiated plasmids in vitro were remarkably decreased compared with those in the control cells. Furthermore, the antisense-cDNA transfected cells also showed slightly higher sensitivity to cisplatin-induced cell death than the control cells. Cisplatin-induced DNA damage is primarily repaired by nucleotide excision repair, like UVC-induced DNA damage. The present results suggest that GRP78/BiP plays a protective role against UVC-induced cell death possibly via nucleotide excision repair, at least in the human RSa cells tested.

  17. Proposed DSS-specific fields for the generic authentication information element

    SciTech Connect (OSTI)

    Tarman, T.D.

    1995-08-06

    This contribution proposes the format of the ``Algorithm-Specific Information`` and ``Signature`` fields within the ``Proposed Generic Authentication Information Element`` for authentication IEs based on the Digital Signature Standard (DSS). These fields are designed to allow various levels of authentication ``strength`` (or robustness), and many of these fields may be omitted in systems that optimize authentication performance by sharing common (public) Digital Signature Algorithm (DSA) parameters. This allows users and site security officers to design their authenticated signaling according to site security and performance requirements.

  18. management

    National Nuclear Security Administration (NNSA)

    5%2A en Management and Budget http:www.nnsa.energy.govaboutusouroperationsmanagementandbudget

  19. Defining the questions: a research agenda for nontraditional authentication in arms control

    SciTech Connect (OSTI)

    Hauck, Danielle K; Mac Arthur, Duncan W; Smith, Morag K; Thron, Jonathan L; Budlong - Sylvester, Kory

    2010-01-01

    Many traditional authentication techniques have been based on hardware solutions. Thus authentication of measurement system hardware has been considered in terms of physical inspection and destructive analysis. Software authentication has implied hash function analysis or authentication tools such as Rose. Continuity of knowledge is maintained through TIDs and cameras. Although there is ongoing progress improving all of these authentication methods, there has been little discussion of the human factors involved in authentication. Issues of non-traditional authentication include sleight-of-hand substitutions, monitor perception vs. reality, and visual diversions. Since monitor confidence in a measurement system depends on the product of their confidences in each authentication element, it is important to investigate all authentication techniques, including the human factors. This paper will present an initial effort to identify the most important problems that traditional authentication approaches in safeguards have not addressed and are especially relevant to arms control verification. This will include a survey of the literature and direct engagement with nontraditional experts in areas like psychology and human factors. Based on the identification of problem areas, potential research areas will be identified and a possible research agenda will be developed.

  20. Hardware device to physical structure binding and authentication

    DOE Patents [OSTI]

    Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

    2013-08-20

    Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

  1. Simultaneous Authentication and Certification of Arms-Control Measurement Systems

    SciTech Connect (OSTI)

    MacArthur, Duncan W. [Los Alamos National Laboratory; Hauck, Danielle K. [Los Alamos National Laboratory; Thron, Jonathan L. [Los Alamos National Laboratory

    2012-07-09

    Most arms-control-treaty-monitoring scenarios involve a host party that makes a declaration regarding its nuclear material or items and a monitoring party that verifies that declaration. A verification system developed for such a use needs to be trusted by both parties. The first concern, primarily from the host party's point of view, is that any sensitive information that is collected must be protected without interfering in the efficient operation of the facility being monitored. This concern is addressed in what can be termed a 'certification' process. The second concern, of particular interest to the monitoring party, is that it must be possible to confirm the veracity of both the measurement system and the data produced by this measurement system. The monitoring party addresses these issues during an 'authentication' process. Addressing either one of these concerns independently is relatively straightforward. However, it is more difficult to simultaneously satisfy host party certification concerns and monitoring party authentication concerns. Typically, both parties will want the final access to the measurement system. We will describe an alternative approach that allows both parties to gain confidence simultaneously. This approach starts with (1) joint development of the measurement system followed by (2) host certification of several copies of the system and (3) random selection by the inspecting party of one copy to be use during the monitoring visit and one (or more) copy(s) to be returned to the inspecting party's facilities for (4) further hardware authentication; any remaining copies are stored under joint seal for use as spares. Following this process, the parties will jointly (5) perform functional testing on the selected measurement system and then (6) use this system during the monitoring visit. Steps (1) and (2) assure the host party as to the certification of whichever system is eventually used in the monitoring visit. Steps (1), (3), (4), and (5

  2. management

    National Nuclear Security Administration (NNSA)

    5%2A en Management and Budget http:nnsa.energy.govaboutusouroperationsmanagementandbudget

    P...

  3. Authenticated group Diffie-Hellman key exchange: theory and practice

    SciTech Connect (OSTI)

    Chevassut, Olivier

    2002-10-03

    Authenticated two-party Diffie-Hellman key exchange allows two principals A and B, communicating over a public network, and each holding a pair of matching public/private keys to agree on a session key. Protocols designed to deal with this problem ensure A (B resp.)that no other principals aside from B (A resp.) can learn any information about this value. These protocols additionally often ensure A and B that their respective partner has actually computed the shared secret value. A natural extension to the above cryptographic protocol problem is to consider a pool of principals agreeing on a session key. Over the years several papers have extended the two-party Diffie-Hellman key exchange to the multi-party setting but no formal treatments were carried out till recently. In light of recent developments in the formalization of the authenticated two-party Diffie-Hellman key exchange we have in this thesis laid out the authenticated group Diffie-Hellman key exchange on firmer foundations.

  4. Provably Secure Password-based Authentication in TLS

    SciTech Connect (OSTI)

    Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier; Moeller,Bodo; Pointcheval, David

    2005-12-20

    In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised to the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.

  5. Group key management

    SciTech Connect (OSTI)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  6. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael; Klatt, Leon N.

    2000-01-01

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

  7. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael; Klatt, Leon N.

    2001-01-01

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters, the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided&

  8. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Password | Department of Energy 5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in OpenLDAP. A remote user can authenticate without a valid password. PLATFORM: Open LDAP version(s) 2.4.12 - 2.2.24 ABSTRACT: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password. reference LINKS: SecurityTracker

  9. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  10. STEM Mentoring CafƩ- Engaging Young Women in an Authentic Mentoring...

    Office of Environmental Management (EM)

    STEM Mentoring Caf- Engaging Young Women in an Authentic Mentoring Experience Melinda Higgins Albert Einstein Distinguished Educator Fellow, NASA Office of Education, ...

  11. Holographic Labeling And Reading Machine For Authentication And Security Appications

    DOE Patents [OSTI]

    Weber, David C.; Trolinger, James D.

    1999-07-06

    A holographic security label and automated reading machine for marking and subsequently authenticating any object such as an identification badge, a pass, a ticket, a manufactured part, or a package is described. The security label is extremely difficult to copy or even to read by unauthorized persons. The system comprises a holographic security label that has been created with a coded reference wave, whose specification can be kept secret. The label contains information that can be extracted only with the coded reference wave, which is derived from a holographic key, which restricts access of the information to only the possessor of the key. A reading machine accesses the information contained in the label and compares it with data stored in the machine through the application of a joint transform correlator, which is also equipped with a reference hologram that adds additional security to the procedure.

  12. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 57: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis December 28 2012 - 6:00am PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions.

  13. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 7: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory

  14. V-236: MediaWiki CentralAuth Extension Authentication Bypass...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The vulnerability is caused due to an error when handling auto-logins and can be exploited to bypass the authentication mechanism by providing a valid username within the ...

  15. A key management concept for the CTBT International Monitoring System

    SciTech Connect (OSTI)

    Herrington, P.; Draelos, T.; Craft, R.; Brickell, E.; Frankel, Y.; Silvestri, M.

    1997-08-01

    Cryptographic authentication (commonly referred to as ``technical authentication`` in Working Group B) is an enabling technology which ensures the integrity of sensor data and security of digital networks under various data security compromise scenarios. The use of cryptographic authentication,however, implies the development of a key management infrastructure for establishing trust in the generation and distribution of cryptographic keys. This paper proposes security and operational requirements for a CTBT (Comprehensive Test Ban Treaty) key management system and, furthermore, presents a public key based solution satisfying the requirements. The key management system is instantiated with trust distribution technologies similar to those currently implemented in industrial public key infrastructures. A complete system solution is developed.

  16. AUTHENTICATED SENSOR INTERFACE DEVICE FOR JOINT USE SAFEGUARDS APPLICATIONS - CONCEPTS AND CHALLENGES

    SciTech Connect (OSTI)

    Poland, R.; Drayer, R.; Wilson, J.

    2013-08-12

    This paper will discuss the key features of the Authenticated Sensor Interface Device that collectively provide the ability to share data among a number of parties while ensuring the authentication of data and protecting both the operator’s and the IAEA’s interests. The paper will also discuss the development of the prototype, the initial testing with an accountancy scale, and future plans and challenges to implementation into the joint use and remote monitoring applications. As nuclear fuel cycle technology becomes more prevalent throughout the world and the capacity of plants increases, limited resources of the IAEA are being stretched near a breaking point. A strategy is to increase efficiency in safeguards monitoring using “joint use” equipment that will provide the facility operator process data while also providing the IAEA key safeguards data. The data, however, must be authenticated and validated to ensure the data have not been tampered with. The Authenticated Sensor Interface Device provides the capability to share data and can be a valuable component in the IAEA’s ability to collect accountancy data from scales in Uranium conversion and enrichment plants, as well as nuclear fuel fabrication plants. Likewise, the Authenticated Sensor Interface Device can be configured to accept a diverse array of input signals, ranging from analog voltage, to current, to digital interfaces and more. These modular capabilities provide the ability to collect authenticated, joint-use, data streams from various process monitoring sensors.

  17. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

  18. Novel Authentication of Monitoring Data Through the use of Secret and Public Cryptographic Keys

    SciTech Connect (OSTI)

    Benz, Jacob M.; Tolk, Keith; Tanner, Jennifer E.

    2014-07-21

    The Office of Nuclear Verification (ONV) is supporting the development of a piece of equipment to provide data authentication and protection for a suite of monitoring sensors as part of a larger effort to create an arms control technology toolkit. This device, currently called the Red Box, leverages the strengths of both secret and public cryptographic keys to authenticate, digitally sign, and pass along monitoring data to allow for host review, and redaction if necessary, without the loss of confidence in the authenticity of the data by the monitoring party. The design of the Red Box will allow for the addition and removal of monitoring equipment and can also verify that the data was collected by authentic monitoring equipment prior to signing the data and sending it to the host and for review. The host will then forward the data to the monitor for review and inspection. This paper will highlight the progress to date of the Red Box development, and will explain the novel method of leveraging both symmetric and asymmetric (secret and public key) cryptography to authenticate data within a warhead monitoring regime.

  19. V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 6: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability September 6, 2013 - 4:36am Addthis PROBLEM: A vulnerability has been reported in the CentralAuth extension for MediaWiki, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: MediaWiki CentralAuth Extension ABSTRACT: A vulnerability has been reported in the CentralAuth extension for

  20. T-703: Cisco Unified Communications Manager Open Query Interface...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A remote user can obtain database contents, including authentication credentials. ... This may include authentication credentials, configuration details, and other sensitive ...

  1. Key management for large scale end-to-end encryption

    SciTech Connect (OSTI)

    Witzke, E.L.

    1994-07-01

    Symmetric end-to-end encryption requires separate keys for each pair of communicating confidants. This is a problem of Order N{sup 2}. Other factors, such as multiple sessions per pair of confidants and multiple encryption points in the ISO Reference Model complicate key management by linear factors. Public-key encryption can reduce the number of keys managed to a linear problem which is good for scaleability of key management, but comes with complicating issues and performance penalties. Authenticity is the primary ingredient of key management. If each potential pair of communicating confidants can authenticate data from each other, then any number of public encryption keys of any type can be communicated with requisite integrity. These public encryption keys can be used with the corresponding private keys to exchange symmetric cryptovariables for high data rate privacy protection. The Digital Signature Standard (DSS), which has been adopted by the United States Government, has both public and private components, similar to a public-key cryptosystem. The Digital Signature Algorithm of the DSS is intended for authenticity but not for secrecy. In this paper, the authors will show how the use of the Digital Signature Algorithm combined with both symmetric and asymmetric (public-key) encryption techniques can provide a practical solution to key management scaleability problems, by reducing the key management complexity to a problem of order N, without sacrificing the encryption speed necessary to operate in high performance networks.

  2. Provably-Secure Authenticated Group Diffie-Hellman KeyExchange

    SciTech Connect (OSTI)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2007-01-01

    Authenticated key exchange protocols allow two participantsA and B, communicating over a public network and each holding anauthentication means, to exchange a shared secret value. Methods designedto deal with this cryptographic problem ensure A (resp. B) that no otherparticipants aside from B (resp. A) can learn any information about theagreed value, and often also ensure A and B that their respective partnerhas actually computed this value. A natural extension to thiscryptographic method is to consider a pool of participants exchanging ashared secret value and to provide a formal treatment for it. Startingfrom the famous 2-party Diffie-Hellman (DH) key exchange protocol, andfrom its authenticated variants, security experts have extended it to themulti-party setting for over a decade and completed a formal analysis inthe framework of modern cryptography in the past few years. The presentpaper synthesizes this body of work on the provably-secure authenticatedgroup DH key exchange.

  3. Integrating end-to-end encryption and authentication technology into broadband networks

    SciTech Connect (OSTI)

    Pierson, L.G.

    1995-11-01

    BISDN services will involve the integration of high speed data, voice, and video functionality delivered via technology similar to Asynchronous Transfer Mode (ATM) switching and SONET optical transmission systems. Customers of BISDN services may need a variety of data authenticity and privacy assurances, via Asynchronous Transfer Mode (ATM) services Cryptographic methods can be used to assure authenticity and privacy, but are hard to scale for implementation at high speed. The incorporation of these methods into computer networks can severely impact functionality, reliability, and performance. While there are many design issues associated with the serving of public keys for authenticated signaling and for establishment of session cryptovariables, this paper is concerned with the impact of encryption itself on such communications once the signaling and setup have been completed. Network security protections should be carefully matched to the threats against which protection is desired. Even after eliminating unnecessary protections, the remaining customer-required network security protections can impose severe performance penalties. These penalties (further discussed below) usually involve increased communication processing for authentication or encryption, increased error rate, increased communication delay, and decreased reliability/availability. Protection measures involving encryption should be carefully engineered so as to impose the least performance, reliability, and functionality penalties, while achieving the required security protection. To study these trade-offs, a prototype encryptor/decryptor was developed. This effort demonstrated the viability of implementing certain encryption techniques in high speed networks. The research prototype processes ATM cells in a SONET OC-3 payload. This paper describes the functionality, reliability, security, and performance design trade-offs investigated with the prototype.

  4. Designing a minimum-functionality neutron and gamma measurement instrument with a focus on authentication

    SciTech Connect (OSTI)

    Karpius, Peter J; Williams, Richard B

    2009-01-01

    During the design and construction of the Next-Generation Attribute-Measurement System, which included a largely commercial off-the-shelf (COTS), nondestructive assay (NDA) system, we realized that commercial NDA equipment tends to include numerous features that are not required for an attribute-measurement system. Authentication of the hardware, firmware, and software in these instruments is still required, even for those features not used in this application. However, such a process adds to the complexity, cost, and time required for authentication. To avoid these added authenticat ion difficulties, we began to design NDA systems capable of performing neutron multiplicity and gamma-ray spectrometry measurements by using simplified hardware and software that avoids unused features and complexity. This paper discusses one possible approach to this design: A hardware-centric system that attempts to perform signal analysis as much as possible in the hardware. Simpler processors and minimal firmware are used because computational requirements are kept to a bare minimum. By hard-coding the majority of the device's operational parameters, we could cull large sections of flexible, configurable hardware and software found in COTS instruments, thus yielding a functional core that is more straightforward to authenticate.

  5. T-614: Cisco Unified Communications Manager Database Security Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 14: Cisco Unified Communications Manager Database Security Vulnerability T-614: Cisco Unified Communications Manager Database Security Vulnerability May 3, 2011 - 7:37am Addthis PROBLEM: Cisco Unified Communications Manager contains a vulnerability that could allow an authenticated, remote attacker to inject arbitrary script code on a targeted system. PLATFORM: Cisco Unified Communications Manager versions prior to 8.5(1), 8.0(3), 7.1(5)su1, and 6.1(5)su2 are

  6. Flexible session management in a distributed environment

    SciTech Connect (OSTI)

    Miller, Zach; Bradley, Dan; Tannenbaum, Todd; Sfiligoi, Igor; /Fermilab

    2010-01-01

    Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers. In this paper we introduce CEDAR, the secure communication library used by the Condor High Throughput Computing software, and present the advantages to a distributed computing system resulting from CEDAR's separation of these layers. Regardless of the authentication method used, CEDAR establishes a secure session key, which has the flexibility to be used for multiple capabilities. We demonstrate how a layered approach to security sessions can avoid round-trips and latency inherent in network authentication. The creation of a distinct session management layer allows for optimizations to improve scalability by way of delegating sessions to other components in the system. This session delegation creates a chain of trust that reduces the overhead of establishing secure connections and enables centralized enforcement of system-wide security policies. Additionally, secure channels based upon UDP datagrams are often overlooked by existing libraries; we show how CEDAR's structure accommodates this as well. As an example of the utility of this work, we show how the use of delegated security sessions and other techniques inherent in CEDAR's architecture enables US CMS to meet their scalability requirements in deploying Condor over large-scale, wide-area grid systems.

  7. Using regulations.gov to find dockets and documents

    Office of Environmental Management (EM)

    Using Two-Factor RSA Token with WebVPN Using Two-Factor RSA Token with WebVPN Your RSA token is used to esbablish a connection to the Internet and connect to https://connect.doe.gov . Using-TwoFactorRSA-Token w VPN.pdf (469 KB) More Documents & Publications Instructions for WebVPN Connectivity Citrix_2FA_Authentication_09.09 Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc of Energy

    Using Weather Data to Improve Capacity of Existing Power Lines Using Weather Data to Improve

  8. T-570: HP Security Bulletin- HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass.

  9. A Framework for Federated Two-Factor Authentication Enabling Cost-Effective Secure Access to Distributed Cyberinfrastructure

    SciTech Connect (OSTI)

    Ezell, Matthew A; Rogers, Gary L; Peterson, Gregory D.

    2012-01-01

    As cyber attacks become increasingly sophisticated, the security measures used to mitigate the risks must also increase in sophistication. One time password (OTP) systems provide strong authentication because security credentials are not reusable, thus thwarting credential replay attacks. The credential changes regularly, making brute-force attacks significantly more difficult. In high performance computing, end users may require access to resources housed at several different service provider locations. The ability to share a strong token between multiple computing resources reduces cost and complexity. The National Science Foundation (NSF) Extreme Science and Engineering Discovery Environment (XSEDE) provides access to digital resources, including supercomputers, data resources, and software tools. XSEDE will offer centralized strong authentication for services amongst service providers that leverage their own user databases and security profiles. This work implements a scalable framework built on standards to provide federated secure access to distributed cyberinfrastructure.

  10. Security Proof for Password Authentication in TLS-Verifier-based Three-Party Group Diffie-Hellman

    SciTech Connect (OSTI)

    Chevassut, Olivier; Milner, Joseph; Pointcheval, David

    2008-04-21

    The internet has grown greatly in the past decade, by some numbers exceeding 47 million active web sites and a total aggregate exceeding100 million web sites. What is common practice today on the Internet is that servers have public keys, but clients are largely authenticated via short passwords. Protecting these passwords by not storing them in the clear on institutions's servers has become a priority. This paper develops password-based ciphersuites for the Transport Layer Security (TLS) protocol that are: (1) resistant to server compromise; (2) provably secure; (3) believed to be free from patent and licensing restrictions based on an analysis of relevant patents in the area.

  11. Deactivation Management

    Broader source: Energy.gov [DOE]

    The purpose here is to provide information for specific aspects of project management that apply to deactivation. Overall management of deactivation projects should use a traditional project...

  12. Conference Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-11-03

    To establish requirements and responsibilities with respect to managing conferences sponsored by the Department of Energy (DOE) or by DOE management and operating contractors and other contractors who perform work at DOE-owned or -leased facilities, including management and integration contractors and environmental restoration management contractors (when using funds that will be reimbursed by DOE). Cancels DOE N 110.3.

  13. Hybrid cryptography key management.

    SciTech Connect (OSTI)

    Draelos, Timothy John; Torgerson, Mark Dolan; Neumann, William Douglas; Gallup, Donald R.; Collins, Michael Joseph; Beaver, Cheryl Lynn

    2003-11-01

    Wireless communication networks are highly resource-constrained; thus many security protocols which work in other settings may not be efficient enough for use in wireless environments. This report considers a variety of cryptographic techniques which enable secure, authenticated communication when resources such as processor speed, battery power, memory, and bandwidth are tightly limited.

  14. Data Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Data Management Data Management PDSF and IHEP, in Beijing, China, are the two main computing facitilies for the Daya Bay experiment with PDSF being used primarily by North American ...

  15. STEM Mentoring CafƩ- Engaging Young Women in an Authentic Mentoring

    Energy Savers [EERE]

    CafĆ© Hits the Midwest STEM CafĆ© Hits the Midwest July 27, 2015 - 2:38pm Addthis Aerial view of STEM Mentoring CafƃĀ© table in Chicago: Photo Courtesy of Argonne National Aerial view of STEM Mentoring CafĆ© table in Chicago: Photo Courtesy of Argonne National Erin Twamley Project and Web Manager, Education & Workforce Development In the heart of the Midwest, the Museum of Science and Industry Chicago is helping to engage STEM professionals and middle school students. As part of the Energy

  16. MANAGEMENT ALERT

    Broader source: Energy.gov (indexed) [DOE]

    COMMISSION FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Management Alert: Review of Allegations of Improper Disclosure of Confidential, Nonpublic...

  17. Environmental Management Waste Management Facility (EMWMF) at...

    Office of Environmental Management (EM)

    Review of the Environmental Management Waste Management Facility (EMWMF) at Oak Ridge ... INTRODUCTION The Environmental Management Waste Management Facility (EMWMF) is a land ...

  18. Teaching Managers How to Manage

    SciTech Connect (OSTI)

    Hylko, J.M.

    2006-07-01

    Following graduation from a college or university with a technical degree, or through years of experience, an individual's training and career development activities typically focus on enhancing technical problem-solving skills. However, as these technical professionals, herein referred to as 'Techies', advance throughout their careers, they may be required to accept and adapt to the role of being a manager, and must undergo a transition to learn and rely on new problem-solving skills. However, unless a company has a specific manager-trainee class to address this subject and develop talent from within, an employee's management style is learned and developed 'on the job'. Both positive and negative styles are nurtured by those managers having similar qualities. Unfortunately, a negative style often contributes to the deterioration of employee morale and ultimate closing of a department or company. This paper provides the core elements of an effective management training program for 'Teaching Managers How to Manage' derived from the Department of Energy's Integrated Safety Management System and the Occupational Safety and Health Administration 's Voluntary Protection Program. Discussion topics and real-life examples concentrate on transitioning an employee from a 'Techie' to a manager; common characteristics of being a manager; the history and academic study of management; competition, change and the business of waste management; what to do after taking over a department by applying Hylko's Star of Success; command media; the formal and informal organizational charts; chain of command; hiring and developing high-degree, autonomous employees through effective communication and delegation; periodic status checks; and determining if the program is working successfully. These common characteristics of a strong management/leadership culture and practical career tips discussed herein provide a solid foundation for any company or department that is serious about developing

  19. Evaluation of the Geotech Smart24 data acquisition system with active Fortezza crypto card data signing and authentication.

    SciTech Connect (OSTI)

    Hart, Darren M.

    2008-05-01

    Sandia National Laboratories has tested and evaluated Geotech Smart24 data acquisition system with active Fortezza crypto card data signing and authentication. The test results included in this report were in response to static and tonal-dynamic input signals. Most test methodologies used were based on IEEE Standards 1057 for Digitizing Waveform Recorders and 1241 for Analog to Digital Converters; others were designed by Sandia specifically for infrasound application evaluation and for supplementary criteria not addressed in the IEEE standards. The objective of this work was to evaluate the overall technical performance of the Geotech Smart24 digitizer with a Fortezza PCMCIA crypto card actively implementing the signing of data packets. The results of this evaluation were compared to relevant specifications provided within manufacturer's documentation notes. The tests performed were chosen to demonstrate different performance aspects of the digitizer under test. The performance aspects tested include determining noise floor, least significant bit (LSB), dynamic range, cross-talk, relative channel-to-channel timing, time-tag accuracy, analog bandwidth and calibrator performance.

  20. project management

    National Nuclear Security Administration (NNSA)

    %2A en Project Management and Systems Support http:nnsa.energy.govaboutusouroperationsapmprojectmanagementandsystemssupport

  1. Bibliographic Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and more from varied resources and databases to organize references, keep notes to stay ahead of the game. Questions? 505-667-5809 Email Bibliographic management tools allow...

  2. acquisition management

    National Nuclear Security Administration (NNSA)

    the science, technology, and engineering base; and,

  3. Continue NNSA management reforms. 
  1. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Used Fuel Disposition R&D Campaign Working Group Meeting Introduction and Summary Peter Swift National Technical Director Used Fuel Disposition R&D Campaign Las Vegas, Nevada June 7, 2016 Sandia National Laboratories is a multiprogram laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2016-5194 PE Used

  2. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Site Evaluation David C. Sassani Sandia National Laboratories Used Fuel Disposition Campaign Annual Working Group Meeting June 6-9, 2016 Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04- 94AL85000. SAND2016-5400 PE Used Fuel Disposition Presentation Overview ļ® Deep Borehole Field Test

  3. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Disposal: Preliminary Performance Assessment Emily Stein, Geoff Freeze, Kris Kuhlman, Glenn Hammond, Jenn Frederick Sandia National Laboratories 2016 UFDC Annual Working Group Meeting Deep Borehole Session, June 8, 2016 Las Vegas, NV Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration under contract

  4. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Borehole Characterization Kris Kuhlman Sandia National Laboratories Used Fuel Disposition Working Group Meeting June 2016 Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2016-5041 PE Used Fuel Disposition Conceptual Profiles 2 1 2 3 4 5 Depth [km] Sources of Salinity *

  5. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Uranium(VI) Sorption and Diffusion in Montmorillonite and Bentonite: Experiments and Modeling Ruth M. Tinnacher 1 , Christophe Tournassat 2 , James A. Davis 1 1) Earth and Environmental Sciences Area, Lawrence Berkeley National Lab 2) BRGM, French Geological Survey, OrlƩans, France Used Fuel Disposition Campaign - Annual Meeting Las Vegas, June 8 2016 Used Fuel Disposition 2 Research Motivation The long-term management of nuclear waste requires reliable predictions of radionuclide transport

  6. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Engineering Overview Ernest Hardin, Andrew Clark, John Cochran, Elena Kalinina, Emily Stein and Jiann Su Sandia National Laboratories Fred Peretz Oak Ridge National Laboratory UFD Working Group - Las Vegas, NV June 7-9, 2016 Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000.

  7. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Waste Package Handling Conceptual Design Process Fred Peretz Oak Ridge National Laboratory UFD Annual Working Group Meeting June 8, 2016 Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04- 94AL85000. SAND2016-nnnnn Used Fuel Disposition June 8, 2016 UFD Annual Working Group Meeting 2

  8. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Options for Completing the Emplacement Zone for Deep Borehole Field Disposal John R. Cochran & Ernest L. Hardin Sandia National Laboratories 2016 UFDC Annual Working Group Meeting Deep Borehole Field Test Session, June 8, 2016 Las Vegas, NV Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration under

  9. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    A Reinvestigation into the Isothermal Room Closure Predictions at WIPP Benjamin Reedlunn Sandia National Laboratories Annual UFD Working Group Meeting June 8 th , 2016 Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04- 94AL85000. SAND2016-5495 C Used Fuel Disposition Acknowledgements /

  10. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Generic Disposal Systems Analysis (GDSA) Paul Mariner, Glenn Hammond, Emily Stein, David Sevougian, and Jennifer Frederick Sandia National Laboratories 2016 UFD Group Meeting UNLV, Las Vegas, Nevada June 8, 2016 Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04- 94AL85000. SAND2016-5393

  11. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Simulation Framework: PFLOTRAN Glenn Hammond Sandia National Laboratories 2016 UFDC Annual Working Group Meeting GDSA Session, June 8, 2016 Las Vegas, NV Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2016-5318 PE Used Fuel Disposition ļ® Petascale reactive

  12. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Isotope Chemistry and Source Term Paul Mariner, Glenn Hammond, and Jennifer Frederick Sandia National Laboratories 2016 UFD Meeting, Las Vegas, Nevada June 8, 2016, GDSA Session Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04- 94AL85000. SAND2016-5392 PE Used Fuel Disposition June 8,

  13. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Radioisotope Source Term Degradation and Implementation in PFLOTRAN Jennifer M. Frederick Glenn E. Hammond and Paul Mariner Sandia National Laboratories 2016 UFDC Annual Working Group Meeting GDSA Session, June 8, 2016 Las Vegas, NV Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration under contract

  14. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Preview of GDSA/Process Model Integration Session S. David Sevougian Sandia National Laboratories 2016 UFDC Annual Working Group Meeting GDSA Session, June 8, 2016 Las Vegas, NV Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2016-5294PE. Used Fuel Disposition

  15. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Building the Crystalline Reference Case Performance Assessment Emily Stein, Jenn Frederick, Glenn Hammond, Paul Mariner, Dave Sevougian Sandia National Laboratories 2016 UFDC Annual Working Group Meeting GDSA Session, June 8, 2016 Las Vegas, NV Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration under

  16. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Planning for FY2017 Paul Mariner, Glenn Hammond, Emily Stein, David Sevougian, and Jennifer Frederick Sandia National Laboratories 2016 UFD Group Meeting UNLV, Las Vegas, Nevada June 8, 2016 Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04- 94AL85000. SAND2016-5389 PE Used Fuel

  17. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Introduction and Objectives for GDSA ā‡” Process Model Integration S. David Sevougian Sandia National Laboratories 2016 UFDC Annual Working Group Meeting Process Model Integration Session, June 8, 2016 Las Vegas, NV Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000.

  18. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PFLOTRAN Process Modeling: Density Dependence on Salinity Glenn Hammond Sandia National Laboratories 2016 UFDC Annual Working Group Meeting Integration Session, June 8, 2016 Las Vegas, NV Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2016-5319 PE Used Fuel

  19. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Integrating Discrete Fracture Networks with Performance Assessment Emily Stein, Kris Kuhlman Sandia National Laboratories Nataliia Makedonska, Satish Karra, Jeffrey Hyman Los Alamos National Laboratory 2016 UFDC Annual Working Group Meeting GDSA Integration Session, June 8, 2016 Las Vegas, NV Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's

  20. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Package and Waste Form Degradation and Implementation in PFLOTRAN Jennifer M. Frederick Glenn E. Hammond and Paul Mariner Sandia National Laboratories 2016 UFDC Annual Working Group Meeting GDSA Session, June 8, 2016 Las Vegas, NV Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration under contract

  1. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Advances in PFLOTRAN Gridding: Octree Refinement and Ghost Node Correction Ayman Alzraiee and Glenn Hammond Sandia National Laboratories 2016 UFDC Annual Working Group Meeting Integration Session, June 8, 2016 Las Vegas, NV Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration under contract

  2. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Statistical Outputs of Probabilistic Performance Assessment Robert J. MacKinnon Sandia National Laboratories Used Fuel Disposition Working Group Meeting June 2016 Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04- 94AL85000. SAND2016-5123 PE Used Fuel Disposition Performance Assessment

  3. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remaining Process Model Gaps for GDSA Paul Mariner, David Sevougian, Glenn Hammond, Emily Stein, and Jennifer Frederick Sandia National Laboratories 2016 UFD Group Meeting UNLV, Las Vegas, Nevada June 8, 2016 Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04- 94AL85000. SAND2016-5391 PE

  4. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    KOSINA Collaboration Ed Matteo UFD Working Group University of Nevada/Las Vegas June 7-9, 2016 Sandia National Laboratories is a multiprogram laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2016-4049 PE Used Fuel Disposition What is KOSINA? June 9, 2016 KOSINA Collaboration - UFD Working Group Mtg. 2 Used Fuel

  5. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Feature, Event, and Process (FEP) Catalogue for SNF/HLW Disposal in Salt Geoff Freeze, S. David Sevougian, Mike Gross, Kris Kuhlman, Christi Leigh - SNL Jens Wolf, Dieter Buhmann, Jƶrg Mƶnig UFD Working Group Meeting Las Vegas, NV June 9, 2016 Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract

  6. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2016-5328PE Overview of Defense Repository Safety Analysis R&D S. David Sevougian Sandia National Laboratories 2016 UFDC Annual Working Group Meeting Defense Repository Session, June 9, 2016 Las Vegas, NV Used

  7. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    D-Repo Performance Assessment: Crystalline Reference Case Emily Stein, Dave Sevougian, Glenn Hammond, Jenn Frederick, Paul Mariner Sandia National Laboratories 2016 UFDC Annual Working Group Meeting Defense Repository Session, June 9, 2016 Las Vegas, NV Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration

  8. Management Overview

    Office of Environmental Management (EM)

    Department of Energy's Isotope Development and Production for Research and Applications Program's Fiscal Year 2009 Balance Sheet Audit OAS-FS-12-09 June 2012 January 30, 2012 Mr. Gregory Friedman, Inspector General Dr. Jehanne Gillo, Director, Facilities and Project Management Division, Office of Nuclear Physics U.S. Department of Energy Washington, DC 20585 Dear Mr. Friedman and Dr. Gillo: We have audited the balance sheet of the United States Department of Energy's (Department or DOE) Isotope

  9. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Session Summary Geoff Freeze Sandia National Laboratories UFD Working Group Meeting Las Vegas, NV June 9, 2016 Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2016-6237 C Used Fuel Disposition 2 Deep Borehole Disposal (DBD) Breakout Sessions SESSION 2 - WEDNESDAY, JUNE 8,

  10. Environmental Management

    ScienceCinema (OSTI)

    None

    2015-01-07

    Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

  11. Environmental Management

    SciTech Connect (OSTI)

    2014-11-12

    Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

  12. ORISE: Emergency Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management Emergency Management Effective emergency management relies on thorough integration of preparedness plans at all levels of government. The Oak Ridge Institute for Science...

  13. Environmental Management System

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management System Environmental Management System An Environmental Management System (EMS) is a set of processes and practices that enable an organization to reduce its...

  14. M E Environmental Management Environmental Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    safety ļ¶ performance ļ¶ cleanup ļ¶ closure M E Environmental Management Environmental Management safety ļ¶ performance ļ¶ cleanup ļ¶ closure M E Environmental Management Environmental Management M E Environmental Management Environmental Management Office of Site Restoration, EM-10 Office of D&D and Facility Engineering, EM-13 Facility Deactivation & Decommissioning (D&D) D&D Program Map Addendum: Impact of American Recovery and Reinvestment Act (ARRA) on EM's D&D

  15. Best Management Practice #1: Water Management Planning

    Office of Energy Efficiency and Renewable Energy (EERE)

    A successful water management program starts with developing a comprehensive water management plan. This plan should be included within existing facility operating plans.

  16. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Safety Case Framework Geoff Freeze Sandia National Laboratories UFD Working Group Meeting Las Vegas, NV June 8, 2016 Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2016-5351PE Used Fuel Disposition 2 Safety Case Overview "The safety case is an integration of

  17. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    On-Line Waste Library (OWL) Walter Walkow Solutions Architect, Data Sciences, SNL Database and Capabilities June 7, 2016 SAND2016-5415 C Used Fuel Disposition June 2016 On-Line Waste Library (OWL) - Database & Capabilities SAND2016-5415 C 2 What is OWL, What objective does it support? ļ® OWL - The on-line waste library (OWL) contains detailed cross- linked information, both technical and organizational, regarding DOE-managed high-level waste (HLW) and spent nuclear fuel (SNF) (D-wastes),

  18. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    package degradation: Clay - Metal Interactions Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04- 94AL85000. SAND2016-nnnnn Carlos F. JovĆ© ColĆ³n Sandia National Laboratories Florie A. Caporuscio Los Alamos National Laboratory Las Vegas, Nevada - June 7 - 9, 2016 SAND2016-5247 PE Used

  19. 2016 DOE Project Management Workshop - "Enhancing Project Management...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6 DOE Project Management Workshop - "Enhancing Project Management" 2016 DOE Project Management Workshop - "Enhancing Project Management" 20160407-doe-project-management-workshop-AD...

  20. Risk Management Process Overview

    Broader source: Energy.gov [DOE]

    The cybersecurity risk management process explained in the Electricity Sector Cybersecurity Risk Management Process (RMP) Guideline has two primary components: the risk management model and the the risk management cycle.

  1. Your Records Management Responsibilities

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Your Records Management Responsibilities Table of Contents INTRODUCTION RECORDS MANAGEMENT IN THE FEDERAL GOVERNMENT RECORDS MANAGEMENT IN THE DEPARTMENT OF ENERGY IMPORTANCE OF RECORDS MANAGEMENT YOUR RECORDS MANAGEMENT RESPONSIBILITIES RECORDS MANAGEMENT LIFE CYCLE ELECTRONIC RECORDS & RECORDKEEPING LAW, REGULATION, AND POLICY ASSISTANCE RECORDS MANAGEMENT TERMS 2 INTRODUCTION If you are a government employee or contractor working for a federal agency, records management is part of your

  2. Energy Management and Financing

    Office of Energy Efficiency and Renewable Energy (EERE)

    This Tuesday Webcast for Industry covers how to become a Certified Energy Manager and Certified Practitioner in Energy Management Systems

  3. Integrated Safety Management Policy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    INTEGRATED SAFETY MANAGEMENT SYSTEM DESCRIPTION U.S. DEPARTMENT OF ENERGY Office of Environmental Management Headquarters May 2008 Preparation: Braj K. sin& Occupational Safety and Health Manager Office of Safety Management Concurrence: Chuan-Fu wu Director, Offlce of Safety Management Deputy Assistant Secretary for safe& Management andoperations Operations Officer for 1 Environmental Management Approval: Date p/-g Date Environmental Management TABLE OF CONTENTS

  4. Integrated Safety Management and Environmental Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Laboratory | Department of Energy Integrated Safety Management Workshop Registration, PIA, Idaho National Laboratory Integrated Safety Management Workshop Registration, PIA, Idaho National Laboratory Integrated Safety Management Workshop Registration, PIA, Idaho National Laboratory Integrated Safety Management Workshop Registration, PIA, Idaho National Laboratory (265.91 KB) More Documents & Publications TRAIN-PIA.pdf Occupational Medicine - Assistant PIA, Idaho National Laboratory PIA -

  5. John Angelis named Manager, Information Resource Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Names John S. Angelis Manager of Information Resource Management CARLSBAD, N.M., March 22, 2000 - The Westinghouse Waste Isolation Division (WID) has named John S. Angelis of Carlsbad as Manager of Information Resource Management at the Waste Isolation Pilot Plant (WIPP). "John's extensive computer technology and telecommunications experience, combined with his progressive attitude, make him an ideal choice for this increasingly important position," said WID General Manager Joe

  6. ENVIRONMENTAL MANAGEMENT OFFICE OF ENVIRONMENTAL MANAGEMENT

    Office of Environmental Management (EM)

    ENVIRONMENTAL MANAGEMENT OFFICE OF ENVIRONMENTAL MANAGEMENT OFFICE OF ENVIRONMENTAL MANAGEMENT OFFICE OF EM Recovery NEWS FLASH RECOVERY.GOV March 10, 2011 American Recovery and Reinvestment Act Payments Surge Past $4 Billion U.S. Depar tment of Energy | Office of Environmental Management For More Information on EM Recovery Act Work, Visit Us on the Web: http://www.em.doe.gov/emrecovery/ FINANCIAL HIGHLIGHTS * More than $4 BILLION in Recovery Act payments are accelerating environmental cleanup

  7. Best Management Practice #1: Water Management Planning | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Water Management Planning Best Management Practice 1: Water Management Planning A successful water management program starts with a comprehensive strategic plan. The process ...

  8. DOE Jobs Online (Hiring Manager), Office of Human Capitol Management...

    Broader source: Energy.gov (indexed) [DOE]

    Jobs Online (Hiring Manager), Office of Human Capitol Management Innovation and Solutions DOE Jobs Online (Hiring Manager), Office of Human Capitol Management Innovation and ...

  9. AWWA Utility Management Conference

    Broader source: Energy.gov [DOE]

    Hosted by the American Water Works Association (AWWA), the Utility Management Conference is one of the leading management conferences to share experiences and learn from others in similar situations to the most pressing management issues of the day.

  10. Data Management Policy The

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management Policy The guidelines below describe Data Management procedures, processes and resources that need to be understood by both user projects and in-house research. 1....

  11. Supply Management Specialist

    Broader source: Energy.gov [DOE]

    This position is located in the Logistics Management organization (NSL), Supply Chain Services (NS), Chief Administrative Office (N). NSL manages the warehousing of materials; the investment...

  12. COMPREHENSIVE LEGACY MANAGEMENT

    Office of Legacy Management (LM)

    Fernald Preserve, Fernald, Ohio Comprehensive Legacy Management and Institutional Controls ... blank LMSFERS03496-8.0 Comprehensive Legacy Management and Institutional Controls ...

  13. Turbine Thermal Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Turbine Thermal Management Fact Sheets Research Team Members Key Contacts Turbine Thermal Management The gas turbine is the workhorse of power generation, and technology advances ...

  14. Management of Nuclear Materials

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-08-17

    To establish requirements for the lifecycle management of DOE owned and/or managed accountable nuclear materials. Cancels DOE O 5660.1B.

  15. Management Control Cover

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    OAS-M-06-02 November 2005 REPORT ON MANAGEMENT CONTROLS OVER ASSESSING NATURAL ... and Methodology 5 Prior Audit Reports 6 Management Comments 7 NATURAL RESURCE DAMAGE ...

  16. Safety Management System Policy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SAFETY MANAGEMENT POLICY PURPOSE AND SCOPE To establish the Department of Energy's (DOE) expectation for safety, 1 including integrated safety management that will enable ...

  17. Contract/Project Management

    Broader source: Energy.gov (indexed) [DOE]

    Third Quarter Overall Contract and Project Management Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2010 Target FY 2010 Forecast FY ...

  18. Contract/Project Management

    Broader source: Energy.gov (indexed) [DOE]

    Contract and Project Management Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2011 Target FY 2011 Actual & Forecast FY 2011 Pre- & ...

  19. Contract/Project Management

    Broader source: Energy.gov (indexed) [DOE]

    and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2011 Target FY 2011 Forecast FY 2011 Pre- & ...

  20. Contract/Project Management

    Broader source: Energy.gov (indexed) [DOE]

    Second Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Performance Metric FY 2012 Target FY 2012 Forecast ...

  1. Contract/Project Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Fourth Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2011 Target FY 2011 ...

  2. Contract/Project Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2 nd Quarter Overall Contract and Project Management Performance Metrics and Targets ContractProject Management Performance Metrics FY 2009 Target FY 2009 Actual Comment 1. ...

  3. Contract/Project Management

    Broader source: Energy.gov (indexed) [DOE]

    3 rd Quarter Overall Contract and Project Management Performance Metrics and Targets ContractProject Management Performance Metrics FY 2009 Target FY 2009 Actual Comment 1. ...

  4. Contract/Project Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Fourth Quarter Overall Contract and Project Management Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2010 Target FY 2010 Actual FY ...

  5. Contract/Project Management

    Broader source: Energy.gov (indexed) [DOE]

    Third Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Performance Metric FY 2012 Target FY 2012 Forecast ...

  6. Contract/Project Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Fourth Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Performance Metric FY 2012 Target FY 2012 Final FY ...

  7. Contract/Project Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Third Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2011 Target FY 2011 ...

  8. Contract/Project Management

    Broader source: Energy.gov (indexed) [DOE]

    Second Quarter Overall Contract and Project Management Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2010 Target FY 2010 Actual FY ...

  9. Contract/Project Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1 st Quarter Overall Contract and Project Management Performance Metrics and Targets ContractProject Management Performance Metrics FY 2009 Target FY 2009 Actual Comment 1. ...

  10. Contract/Project Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8 4 th Quarter Metrics Final Overall Contract and Project Management Performance Metrics and Targets ContractProject Management Performance Metrics FY 2008 Target FY 2008 Actual ...

  11. Technical Standards Managers

    Broader source: Energy.gov (indexed) [DOE]

    FACILITYADDRESS LOC CODE DOE TECHNICAL STANDARD MANAGERS AU-30 DOE Technical Standards ... FACILITYADDRESS LOC CODE DOE TECHNICAL STANDARD MANAGERS DOE-CTA TSM Gustave E. (Bud) ...

  12. End Points Management

    Broader source: Energy.gov [DOE]

    The policy of the EM is that a formal project management approach be used for the planning, managing, and conducting of its projects.

  13. Ross Management | Open Energy Information

    Open Energy Info (EERE)

    Management Jump to: navigation, search Name: Ross Management Place: Goldendale, Washington State Product: Ross Management is the management parent for a group of family owned...

  14. Evaluation of the Geotech SMART24BH 20Vpp/5Vpp data acquisition system with active fortezza crypto card data signing and authentication.

    SciTech Connect (OSTI)

    Rembold, Randy Kai; Hart, Darren M.

    2009-09-01

    Sandia National Laboratories has tested and evaluated Geotech SMART24BH borehole data acquisition system with active Fortezza crypto card data signing and authentication. The test results included in this report were in response to static and tonal-dynamic input signals. Most test methodologies used were based on IEEE Standards 1057 for Digitizing Waveform Recorders and 1241 for Analog to Digital Converters; others were designed by Sandia specifically for infrasound application evaluation and for supplementary criteria not addressed in the IEEE standards. The objective of this work was to evaluate the overall technical performance of two Geotech SMART24BH digitizers with a Fortezza PCMCIA crypto card actively implementing the signing of data packets. The results of this evaluation were compared to relevant specifications provided within manufacturer's documentation notes. The tests performed were chosen to demonstrate different performance aspects of the digitizer under test. The performance aspects tested include determining noise floor, least significant bit (LSB), dynamic range, cross-talk, relative channel-to-channel timing, time-tag accuracy/statistics/drift, analog bandwidth.

  15. A Security Solution for IEEE 802.11's Ad-hoc Mode:Password-Authentication and Group Diffie-Hellman Key Exchange

    SciTech Connect (OSTI)

    Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

    2005-10-01

    The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.

  16. Environmental Management System

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management System Environmental Management System An Environmental Management System is a systematic method for assessing mission activities, determining the environmental impacts of those activities, prioritizing improvements, and measuring results. May 30, 2012 The continuous improvement cycle Our Environmental Management System encourages continuous improvement of our environmental performance. Contact Environmental Communication & Public Involvement P.O. Box 1663 MS M996 Los Alamos, NM

  17. Managing Your User Account

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Managing Your Account Managing Your User Account Use the NERSC Information Management (NIM) system to customize your user account and keep your personal information up-to-date. See the NIM User's Guide, especially the "Managing Your User Account with NIM" section. Last edited: 2016-04-29 11:35:06

  18. Chemical Management Contacts

    Broader source: Energy.gov [DOE]

    Contacts for additional information on Chemical Management and brief description on Energy Facility Contractors Group

  19. Manager`s views of public involvement

    SciTech Connect (OSTI)

    Branch, K.M.; Heerwagen, J.; Bradbury, J.

    1995-12-01

    Four issues commonly form the framework for debates about the acceptability of proposed projects or technologies--the substantive decision or technological choice; the treatment of the community by the proponent organization; the way the decision-making process has been structured and managed; and the status of institutional safeguards and protection. One of the clear messages of cultural theory is that differences in perspectives are a normal and inevitable part of society, and that attempts to resolve differences by persuasion are not likely to work. These findings are useful when considering the goals and possibilities of public involvement as a decision-making tool, and when designing or evaluating public involvement training programs for managers. The research reported here examines the viewpoints and concerns of managers and decision-makers about the four issues identified above, with particular emphasis on their perspectives and concerns about opening decision-making processes to the public and about managers` roles and responsibilities for structuring and managing open decision-making processes. Implications of these findings for public involvement training for managers is also discussed. The data presented in this paper were obtained from face-to-face interviews with managers and decision-makers with experience managing a variety of hazardous waste management decision-making processes. We conducted these interviews in the course of four separate research projects: needs assessments to support the design and development of a public involvement training program for managers; a study of community residents` and managers` perspectives on the chemical stockpile disposal program; an evaluation of the effectiveness of public involvement training for managers in the Department of Energy; and a study to develop indicators of the benefits and costs of public involvement.

  20. 2014 DOE Project Management Workshop

    Broader source: Energy.gov [DOE]

    What:Ā  2014 DOE Project Management Workshop (Meeting the Challengeā€”Integrated Acquisition & Project Management)

  1. V-036: EMC Smarts Network Configuration Manager Database Authenticatio...

    Broader source: Energy.gov (indexed) [DOE]

    The systems uses a hard-coded key to encrypt authentication credentials on the target system CVE-2012-4615. A local user with knowledge of the key can access the credentials. A ...

  2. Project Manager's Guide to Managing Impact and Process Evaluation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Project Manager's Guide to Managing Impact and Process Evaluation Studies This report provides a step-by-step approach to help managers of EERE evaluation projects create and ...

  3. Manager's Desk Reference on Human Capital Management Flexibilities...

    Broader source: Energy.gov (indexed) [DOE]

    that can be used in day-to-day human capital management activities, especially ... Manager's Desk Reference on Human Capital Management Flexibilities (640.69 KB) Responsible ...

  4. Risk Management Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-01-18

    This Guide provides non-mandatory risk management approaches for implementing the requirements of DOE O 413.3B, Program and Project Management for the Acquisition of Capital Assets. Supersedes DOE G 413.3-7.

  5. Management Associate I

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as an analyst and advisor to an organization's manager and other managers within the organization within BPA. The position serves as a point of...

  6. Risk Management Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-01-12

    The purpose of this guide is to describe effective risk management processes. The continuous and iterative process includes updating project risk documents and the risk management plan and emphasizes implementation communication of the risks and actions taken.

  7. Information Technology Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2012-12-03

    The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Cancels DOE G 200.1-1. Admin Chg 1 approved 1-16-2013.

  8. Management Control Cover

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    OAS-M-06-01 November 2005 REPORT ON MANAGEMENT CONTROLS OVER THE HANFORD SITE ... Project Management ORP did not fully identify and mitigate risks associated with the TRUM ...

  9. Women of Waste Management

    Broader source: Energy.gov [DOE]

    PHOENIX - For the seventh year at the Waste Management Conference, EM contractor Fluor hosted a discussion on the expanding role of women in environmental management this month in a panel session attended by more than 250 people.

  10. Management of Nuclear Materials

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-08-17

    To establish requirements for the lifecycle management of DOE owned and/or managed accountable nuclear materials. Admin Chg 1 dated 4-10-2014, supersedes DOE O 410.2.

  11. Stage Gate Management Guide

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Stage Gate Management in the Biomass Program February 2005 Revision 2 2 TABLE OF CONTENTS OVERVIEW............................................................................................................................. 4 STAGE GATE MANAGEMENT .................................................................................................... 4 STAGE GATE PROCESS AND LONG RANGE STRATEGIC PROGRAM PLANNING ........................ 5 GATE REVIEWS

  12. Information Technology Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2012-12-03

    The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Admin Chg 1, dated 1-16-2013, supersedes DOE O 415.1.

  13. emergency management systems

    National Nuclear Security Administration (NNSA)

    9%2A en Building International Emergency Management Systems http:nnsa.energy.govaboutusourprogramsemergencyoperationscounterterrorisminternationalprograms-1

  14. ENVIRONMENTAL MANAGEMENT ADVISORY BOARD

    Office of Environmental Management (EM)

    Manager | Department of Energy Webinar: Introducing Waste & Materials Tracking in Portfolio Manager ENERGY STAR Webinar: Introducing Waste & Materials Tracking in Portfolio Manager September 15, 2016 1:00PM to 2:00PM EDT Hosted by the U.S. Environmental Protection Agency's (EPA's) ENERGY STAR, this webinar will show how to track your building's waste and materials management. It will introduce the types of waste and disposal methods attendees can track, new metrics and reports, and

  15. System Management Software

    Energy Science and Technology Software Center (OSTI)

    2013-02-22

    MacPatch is Mac OS X system management software solution. It's used for patching, software distribution and inventory.

  16. Energy, Data Management, Reporting

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Design the Strategy | Deliver Efficiency | Sustain Results Energy, Data Management, Reporting This presentation does not contain any proprietary, confidential, or otherwise restricted information. - - Agenda ā— About Schneider Electric ā— Enterprise wide Data Management ā— Outputs ā— Foundation and results ā— Part of a complete energy management solution Schneider Electric Sustainability Services 2014 2 - - Schneider Electric Sustainability Services 2014 3 Schneider Electric - the global

  17. Financial Management Oversight

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-08-31

    The Order defines requirements for effective financial management and adherence to DOE and applicable external financial management requirements and sets forth standards for ensuring the integrity and responsiveness of financial management and the accuracy and reliability of DOEs financial statements. Supersedes DOE O 2200.13.

  18. ARM - Metadata Management Tool

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FormsMetadata Management Tool Ingest Ingest Workflow Graphic Supporting Workflow Documentation Supporting Tools and Forms Process Configuration Manager (PCM) Metadata Management Tool (MMT) ARM Data Integrator (ADI) Ingest Readiness Form Associated Status Reports Contacts Engineering Processes Engineering Home Workflow Graphic Engineering Workflow Document Tools for Workflow ECR ECO BCR Ingests Value-Added Products Reprocessing Instruments Data System Elements Field Campaign Startup Metadata

  19. ARM - Process Configuration Manager

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FormsProcess Configuration Manager Ingest Ingest Workflow Graphic Supporting Workflow Documentation Supporting Tools and Forms Process Configuration Manager (PCM) Metadata Management Tool (MMT) ARM Data Integrator (ADI) Ingest Readiness Form Associated Status Reports Contacts Engineering Processes Engineering Home Workflow Graphic Engineering Workflow Document Tools for Workflow ECR ECO BCR Ingests Value-Added Products Reprocessing Instruments Data System Elements Field Campaign Startup Process

  20. Energy Manager Webinar Series

    Broader source: Energy.gov [DOE]

    Energy Managers from leading manufacturing companies share lessons learned from implementing energy savings projects in these one-hour webinars. Topics include real-world challenges like creating a climate for successful project implementation, gaining management support, and obtaining financing. Each webinar highlights a different topic and features an energy manager from a different Better Plants Partner.

  1. Executive Branch Management Scorecard | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Branch Management Scorecard Executive Branch Management Scorecard PDF icon Executive Branch Management Scorecard More Documents & Publications Executive Branch Management Scorecard ...

  2. Environmental Management Advisory Board (EMAB) | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board ...

  3. Program Management | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management Program Management Safety Safety The Office of Environmental Management's (EM) top priority is to ensure proper implementation and continuous improvement of Integrated ...

  4. Managing a Process Safety Management inspection

    SciTech Connect (OSTI)

    Mulvey, N.P. [AcuTech Consulting, Inc., Princeton, NJ (United States)

    1995-12-31

    The Occupational Safety and Health Administration (OSHA) Process Safety Management (PSM) regulations (29 CFR {section} 1910.119) have been in effect for almost three years. State level risk management programs, in New Jersey, California, and Delaware have been in effect for over six years. More recently, Nevada and Louisiana have enacted process safety management programs. These regulations have had a significant impact on all phases of plant operations, including preliminary design, construction, startup, and operations. Through proper planning and the commitment of resources, many facilities are beginning to realize the benefits of well developed PSM programs. This paper will discuss in greater detail some of these benefits, and in particular, the subject of governmental inspections of facilities for process safety management programs.

  5. Multimedia environmental management

    SciTech Connect (OSTI)

    Soesilo, J.A.; Wiley, W.D.

    1999-09-01

    This book explores and supports the argument that effective environmental management must be based on a multimedia approach, which focuses simultaneously on air, water, and waste and enables managers to assess the resulting financial, operation, and management benefits. The multimedia approach, which can be used to design an effective compliance program, includes proper waste and material handling management, systematic monitoring, and record keeping requirements. This approach integrates a wide array of environmental requirements and decision processes, which the authors examine in sixteen chapters, organized into four parts: the role of environmental management; environmental aspects of business operation, environmental processes; and environmental management trends. Within these parts, the authors highlight the development of modern environmental management and provide an overview of federal laws pertinent to multimedia environmental management. They examine such issues as chemical storage and transportation, tank system operations and requirements, waste determination, spill response procedures, and employee training. Environmental processes addressed in the book include the management of solid and hazardous waste, wastewater treatment systems, stormwater management, air emission control, and site remediation. The authors also briefly discuss significant initiatives in US environmental management and look toward corporate sustainable development.

  6. DOE Jobs Online (Hiring Manager), Office of Human Capitol Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Innovation and Solutions | Department of Energy Jobs Online (Hiring Manager), Office of Human Capitol Management Innovation and Solutions DOE Jobs Online (Hiring Manager), Office of Human Capitol Management Innovation and Solutions DOE Jobs Online (Hiring Manager), Office of Human Capitol Management Innovation and Solutions DOE Jobs Online (Hiring Manager), Office of Human Capitol Management Innovation and Solutions (1.46 MB) More Documents & Publications PIA - GovTrip (DOE data) LM

  7. DOE Office of Environmental Management Project and Contract Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Improvement Timeline | Department of Energy Acquisition Ā» DOE Office of Environmental Management Project and Contract Management Improvement Timeline DOE Office of Environmental Management Project and Contract Management Improvement Timeline Improving DOE contract and project management is a top priority of the Department's senior management and entire organization. View some highlights of EM's improvement actions here. DOE Office of Environmental Management Contract and Project Management

  8. ORO Names New Assistant Manager for Environmental Management

    Broader source: Energy.gov [DOE]

    The U.S. Department of Energy Oak Ridge Office names John Eschenberg as its Assistant Manager for Environmental Management.

  9. DOE - Office of Legacy Management -- Fernald Environmental Management...

    Office of Legacy Management (LM)

    Fernald Environmental Management Project - 027 FUSRAP Considered Sites Site: Fernald Environmental Management Project (027) Designated Name: Alternate Name: Location: Evaluation ...

  10. Strategies for Successful Energy Management

    Broader source: Energy.gov [DOE]

    This presentation, given through the DOE's Technical Assitance Program (TAP), provides information on energy management for the portfolio manager initiative

  11. Breakout Group 3: Water Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Water Management Participants Name Organization Tom Benjamin Argonne National ... National Laboratory Breakout Group 3: Water Management GAPSBARRIERS The Water ...

  12. Sensor Authentication: Embedded Processor Code

    SciTech Connect (OSTI)

    2012-09-25

    Described is the c code running on the embedded Microchip 32bit PIC32MX575F256H located on the INL developed noise analysis circuit board. The code performs the following functions: Controls the noise analysis circuit board preamplifier voltage gains of 1, 10, 100, 000 Initializes the analog to digital conversion hardware, input channel selection, Fast Fourier Transform (FFT) function, USB communications interface, and internal memory allocations Initiates high resolution 4096 point 200 kHz data acquisition Computes complex 2048 point FFT and FFT magnitude. Services Host command set Transfers raw data to Host Transfers FFT result to host Communication error checking

  13. Sensor Authentication: Embedded Processor Code

    Energy Science and Technology Software Center (OSTI)

    2012-09-25

    Described is the c code running on the embedded Microchip 32bit PIC32MX575F256H located on the INL developed noise analysis circuit board. The code performs the following functions: Controls the noise analysis circuit board preamplifier voltage gains of 1, 10, 100, 000 Initializes the analog to digital conversion hardware, input channel selection, Fast Fourier Transform (FFT) function, USB communications interface, and internal memory allocations Initiates high resolution 4096 point 200 kHz data acquisition Computes complex 2048moreĀ Ā» point FFT and FFT magnitude. Services Host command set Transfers raw data to Host Transfers FFT result to host Communication error checkingĀ«Ā less

  14. NREL Announces Management Changes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Announces Management Changes For more information contact: Bob Noun (303) 275-3062 Golden, Colo., June 27, 1997 National Renewable Energy Laboratory (NREL) Director Richard Truly announced a reorganization that creates two new management positions at the laboratory. Effective July 1, 1997, Dr. Stanley Bull becomes Associate Director for Research Operations. He will manage the research and development of more than 30 renewable energy technologies such as solar energy, wind energy, fuels

  15. Configuration Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-10-27

    The purpose of this standard is to define the objectives of a configuration management process for DOE nuclear facilities (including activities and operations), and to provide detailed examples and supplementary guidance on methods of achieving those objectives. Configuration management is a disciplined process that involves both management and technical direction to establish and document the design requirements nd the physical configuration of the nuclear facility and to ensure that they remain consistent with each other and the documentation.

  16. Office of Personnel Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Personnel Management October 2014 Questions & Answers 1 Pathways Programs 5 CFR Parts 213, 302, 315, and 362 Questions and Answers Background Executive Order 13562 Recruiting and Hiring Students and Recent Graduates dated December 27, 2010, authorized two new excepted service hiring authorities and consolidated them with a revised Presidential Management Fellows Program to establish the Pathways Programs for students and recent graduates. The U.S. Office of Personnel Management (OPM)

  17. Land Management - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Land Management About Us About Hanford Cleanup Hanford History Hanford Site Wide Programs Hanford Cultural Resources Contact Us Land Management Email Email Page | Print Print Page | Text Increase Font Size Decrease Font Size Hanford Site - Hanford Reach The U.S. Department of Energy (DOE) Richland Operations Office (RL) is responsible for the management of Hanford Site property. RL has issued the Mission Support Contract (MSC) to provide direct support to RL, DOE Office River Protection (ORP)

  18. International Commitments Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-11-18

    This Order establishes a process to manage the Department's International Commitments under the administrative direction of the Office of Policy and International Affairs. No cancellation.

  19. Logistics Management Specialist

    Broader source: Energy.gov [DOE]

    The Deputy Assistant Secretary for the Office of Petroleum Reserves (OPR) manages the Strategic Petroleum Reserve (SPR) and is responsible for establishing policies, goals, and priorities for the...

  20. E M Environmental Management

    Office of Environmental Management (EM)

    E M Environmental Management safety performance cleanup closure EM RECOVERY ACT TOP LINE MESSAGES * The Department estimates the 6 billion Recovery Act investment has allowed us ...

  1. Managing Increased Charging Demand

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Managing Increased Charging Demand Carrie Giles ICF International, Supporting the Workplace Charging Challenge Workplace Charging Challenge Do you already own an EV? Are you...

  2. Information Technology Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-11-21

    This revised Order is needed to clarify the roles and responsibilities, policies, and procedures for effectively managing IT investments to ensure mission success.

  3. Advisory Committee Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-10-22

    The Manual provides detailed DOE requirements, responsibilities, processes, and procedures for the establishment, operation, and management of advisory committees. Supersedes DOE M 510.1-1.

  4. High Performance Energy Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Performance Energy Management Reduce energy use and meet your business objectives By applying continuous improvement practices similar to Lean and Six Sigma, the BPA Energy Smart...

  5. Asset Management Strategies

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Efficiency and Fish and Wildlife asset categories. The CAB, in consultation with affected business units and the Asset Management Executive Sponsors, determines whether and how...

  6. Management's Discussion & Analysis Profile

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in conformity with generally accepted accounting principles (GAAP) requires management to make estimates and assumptions that affect the reported amounts of assets and...

  7. Management's Discussion & Analysis Profile

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Adjusted Net Revenue is net revenue after removing the effects of certain debt management actions, in particular the Debt Service Reassignment, from prior years. These debt...

  8. Asset Management Strategies

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Asset-Management-Strategies Sign In About | Careers | Contact | Investors | bpa.gov Search News & Us Expand News & Us Projects & Initiatives Expand Projects & Initiatives...

  9. Grants Management Specialist

    Broader source: Energy.gov [DOE]

    The Office of Science manages fundamental research programs in basic energy sciences, biological and environmental sciences, and computational science. In addition, the Office of Science is the...

  10. Enterprise Risk Management Framework

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Framework The Enterprise Risk Management (ERM) framework includes four steps: identify the risks, determine the probability and impact of each one, identify controls that are...

  11. Financial Management Handbook - Complete

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... Management of Budgetary Resources. (1) Appropriations. ... The apportionment process is detailed in DOE M 135.1-1A, ... and reporting all business transactions under the ...

  12. Managing Large Capital Projects

    Broader source: Energy.gov [DOE]

    Presentation from the 2015 DOE National Cleanup Workshop by Ken Picha, Deputy Assistant Secretary for Tank Waste and Nuclear Material, Office of Environmental Management.

  13. Radioactive Waste Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1984-02-06

    To establish policies and guidelines by which the Department of Energy (DOE) manages tis radioactive waste, waste byproducts, and radioactively contaminated surplus facilities.

  14. Records Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-02-03

    The Order sets forth requirements and responsibilities for implementing and maintaining a cost-effective records management program throughout the Department of Energy.

  15. Change Control Management Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-29

    The Guide provides a suggested approach and uniform guidance for managing project and contract changes through applying the requirements of DOE O 413.3B. No cancellation.

  16. Records Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-26

    The Order sets forth requirements and responsibilities for establishing and maintaining a program for the efficient and economical management of records and information assets.

  17. Project Management Practices

    Broader source: Energy.gov (indexed) [DOE]

    Version) See Figure 3-3. 19. Administrative Controls 1. Provisions relating to organization and management, procedures, recordkeeping, assessment, and reporting necessary to...

  18. Office of Legacy Management

    Office of Legacy Management (LM)

    Energy Office of Legacy Management JUL 1 0 2008 Alonso Ramirez, Scientific Director EI Verde Research Station Institute for Tropical Ecosystem Studies University of Puerto Rico...

  19. Dreissenid Mussel Prevention, Management...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management, Research, Coordination, and Outreach for the Columbia River Basin A Roadmap to Make Strategic Investments in Federal Columbia River Power System and Technology...

  20. Dreissenid Mussel Prevention, Management, ...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management, Research, Coordination, and Outreach for the Columbia River Basin A Roadmap to Make Strategic Investments in Federal Columbia River Power System and Technology...

  1. EFRC Management Reference Document

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    EFRC management reference document Energy Frontier Research Centers Acknowledgments of Support (v.1, October 2009) Office of Basic Energy Sciences Office of Science US Department ...

  2. Parallel integrated thermal management

    DOE Patents [OSTI]

    Bennion, Kevin; Thornton, Matthew

    2014-08-19

    Embodiments discussed herein are directed to managing the heat content of two vehicle subsystems through a single coolant loop having parallel branches for each subsystem.

  3. Information Exchange management site

    Energy Science and Technology Software Center (OSTI)

    2012-08-01

    Django site used to manage the approved information exchanges (content models) after creation and public comment at https://github.com/usgin-models.

  4. Risk Management RM

    Office of Environmental Management (EM)

    Modules that address key functional areas of project management, engineering and design, safety, environment, security, and quality assurance, grouped by each specific CD phase. ...

  5. Efficient Water Use & Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Water Use Goal 4: Efficient Water Use & Management Aware of the arid climate of northern New Mexico, water reduction and conservation remains a primary concern at LANL. Energy ...

  6. EARNED VALUE MANAGEMENT SYSTEM

    Broader source: Energy.gov (indexed) [DOE]

    ... the costs associated with the authorized resources identified to accomplish the work and invalidates management's forecasting of future resource requirements and their costs. ...

  7. ORISE: Peer Review Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management Man participating in a peer review The Oak Ridge Institute for Science and Education (ORISE) ensures that scientific reviews are conducted in a professional manner and...

  8. Acquisition Career Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-05-14

    The order sets forth requirements and responsibilities for the Department of Energy (DOE) Acquisition Career Management Program. Supersedes DOE O 361.1B.

  9. Chemical Industry Corrosion Management

    SciTech Connect (OSTI)

    2003-02-01

    Improved Corrosion Management Could Provide Significant Cost and Energy Savings for the Chemical Industry. In the chemical industry, corrosion is often responsible for significant shutdown and maintenance costs.

  10. Comprehensive Emergency Management System

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-11-02

    The Order establishes policy and assigns roles and responsibilities for the Department of Energy (DOE) Emergency Management System. Supersedes DOE O 151.1B.

  11. Waste management progress report

    SciTech Connect (OSTI)

    1997-06-01

    During the Cold War era, when DOE and its predecessor agencies produced nuclear weapons and components, and conducted nuclear research, a variety of wastes were generated (both radioactive and hazardous). DOE now has the task of managing these wastes so that they are not a threat to human health and the environment. This document is the Waste Management Progress Report for the U.S. Department of Energy dated June 1997. This progress report contains a radioactive and hazardous waste inventory and waste management program mission, a section describing progress toward mission completion, mid-year 1997 accomplishments, and the future outlook for waste management.

  12. Management Control Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-04-18

    To establish requirements and responsibilities for the Department of Energy Management Control Program. Cancels DOE O 413.1. Canceled by DOE O 413.1B.

  13. Environmental Management System

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of those activities, prioritizing improvements, and measuring results. May 30, 2012 The continuous improvement cycle Our Environmental Management System encourages continuous...

  14. Efficient Water Use & Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Water Use Goal 4: Efficient Water Use & Management Aware of the arid climate of northern New Mexico, water reduction and conservation remains a primary concern at LANL. Energy...

  15. Digital Data Management Plans

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    energy physics through experiments that strengthen our fundamental understanding of matter, energy, space, and time. Plans HAWC gamma-Ray Observatory Data Management Plan (pdf)...

  16. Risk Management Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-09-16

    This Guide provides a framework for identifying and managing key technical, schedule, and cost risks through applying the requirements of DOE O 413.3A, Program and Project Management for the Acquisition of Capital Assets, dated 7-28-06. Canceled by DOE G 413.3-7A, dated 1-12-11. Does not cancel other directives.

  17. Tribal Financial Management Symposium

    Broader source: Energy.gov [DOE]

    The 3rd Annual Tribal Financial Management Symposium is a two-day event will focus on one of the most important aspects of a tribe's financial management. Attendees will learn about the state of the economy, building a financial constitution, both long- and short-term investments, alternative investment options, and much more.

  18. Metadata management staging system

    Energy Science and Technology Software Center (OSTI)

    2013-08-01

    Django application providing a user-interface for building a file and metadata management system. An evolution of our Node.js and CouchDb metadata management system. This one focuses on server functionality and uses a well-documented, rational and REST-ful API for data access.

  19. Comprehensive Emergency Management System

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-01

    To establish policy and to assign and describe roles and responsibilities for the Department of Energy (DOE) Emergency Management System. The Emergency Management System provides the framework for development, coordination, control, and direction of all emergency planning, preparedness, readiness assurance, response, and recovery actions. Canceled by DOE O 151.1B. Cancels DOE O 151.1.

  20. Procurement and Materials Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Procurement and Materials Management U.S. Department of Energy | Who We Are | Current Requests for Proposal | Requests for Information | Expression of Interest | Subcontractor Information | Small Business Home Washington River Protection Solutions | Hanford.gov | Energy.gov Procurement and Materials Management Small Business Resources Small Business Calendar Terms & Conditions Procedures to Subcontractors Instructions Forms Vendor Registration Solicitations Small Bus. Events Procedures

  1. Energy Management Webinar Series

    Broader source: Energy.gov [DOE]

    Boost your knowledge on how to implement an energy management system through this four-part webinar series from the Superior Energy Performance program. Each webinar introduces various elements of the ISO 50001 energy management standardā€”based on the Plan-Do-Check-Act approachā€”and the associated steps of DOE's eGuide for ISO 50001 software tool.

  2. Integrated Landscape Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    March 23, 2015 Ian Bonner Idaho National Laboratory This presentation does not contain any proprietary, confidential, or otherwise restricted information Sustainability Technology Area 4.2.1.20 Integrated Landscape Management 2 | Bioenergy Technologies Office PROJECT GOAL * OBJECTIVE - Develop model based innovative landscape design methods that estimate increased biomass availability, improve soil, water, and air quality, and reduce grower losses through subfield management decisions.

  3. Information Collection Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-10-11

    This Order sets forth DOE requirements and responsibilities for implementing the information collection management provisions of the Paperwork Reduction Act of 1995 and the Office of Management and Budgets implementing regulation Controlling Paperwork Burdens on the Public, as contained in 5 CFR 1320. No cancellation.

  4. Property Management | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management Property Management Personal Property Management and Accountability for Headquarters Management Personal property management includes all functions necessary for the proper determination of need, source, acquisition, receipt, accountability, utilization, maintenance, rehabilitation, storage, distribution and disposal of property. Authorized Property Representatives Effective April 1, 2016: Authorized Property Pass Signers List and Accountable Property Representatives List Personal

  5. Berkeley Storage Manager

    Energy Science and Technology Software Center (OSTI)

    2007-03-01

    Storage Resource Managers (SRMs) are middleware components whose function is to provide dynamic space allocation and file management of shared storage components on the Grid, They provide storage availability for the planning and execution of a Grid job. SRMs manage two types of resources: space and files. When managing space, SRMs negotiate space allocation with the requesting client, andlor assign default space quotas. When managing files, SRMs allocate space for files, invoke file transfer servicesmoreĀ Ā» to move files into the space. phi files for a certain lifetime, release files upon the clientsĀ’ request, and use file replacement policies to optimize the use of the shared space. SPMs can be designed to provide effective sharing of files, by monitoring the activity of shared files, and make dynamic decisions on which files to replace when space is needed. In addition, SRMs perform automatic gathage collection of unused files by removing selected files whose lifetime has expired when space is needed. BeStMan is a Java implementation of SRM functionality by the Scientific Data Management Group at LBNL. It manages multiple disks as well as the HPSS mass storage system, and can be adapted to other storage systems. The BeStMan package contains the SRM server, the SRM client tools, and SRM testing tools.Ā«Ā less

  6. Supply Chain Management Center | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Supply Chain Management Center

  7. Project Manager's Guide to Managing Impact and Process Evaluation Studies

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy Project Manager's Guide to Managing Impact and Process Evaluation Studies Project Manager's Guide to Managing Impact and Process Evaluation Studies This report provides a step-by-step approach to help managers of EERE evaluation projects create and manage objective, high quality, independent, and useful impact and process evaluations. It provides information to help with the following: Determine why, what and when to evaluate; identify the questions that need to be

  8. Nuclear materials management overview

    SciTech Connect (OSTI)

    DiGiallonardo, D.A. )

    1988-01-01

    The true goal of Nuclear Materials MANAGEMENT (NMM) is the strategical and economical management of all nuclear materials. Nuclear Materials Management's role involves near-term and long-term planning, reporting, forecasting, and reviewing of inventories. This function is administrative in nature. it is a growing area in need of future definition, direction, and development. Improvements are required in program structure, the way residues and wastes are determined, how ''what is and what if'' questions are handled, and in overall decision-making methods.

  9. Nuclear materials management overview

    SciTech Connect (OSTI)

    DiGiallonardo, D.A.

    1988-01-01

    The true goal of Nuclear Materials Management (NMM) is the strategical and economical management of all nuclear materials. Nuclear Materials Management's role involves near-term and long-term planning, reporting, forecasting, and reviewing of inventories. This function is administrative in nature. It is a growing area in need of future definition, direction, and development. Improvements are required in program structure, the way residues and wastes are determined, how /open quotes/What is and what if/close quotes/ questions are handled, and in overall decision-making methods. 2 refs.

  10. Radioactive Waste Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-07-09

    This Manual further describes the requirements and establishes specific responsibilities for implementing DOE O 435.1, Radioactive Waste Management, for the management of DOE high-level waste, transuranic waste, low-level waste, and the radioactive component of mixed waste. The purpose of the Manual is to catalog those procedural requirements and existing practices that ensure that all DOE elements and contractors continue to manage DOE's radioactive waste in a manner that is protective of worker and public health and safety, and the environment. Does not cancel other directives.

  11. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  12. EERE Program Management Guide - About the Program Management...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    EERE Program Management Guide - About the Program Management Guide The Introduction describes the need for an Operator's Guide, provides information on content and the relationship ...

  13. Line Management Perspective: Office of Environmental Management (EM)

    Broader source: Energy.gov [DOE]

    Slide Presentation by Matthew Moury, Deputy Assistant Secretary for Safety, Security and Quality Programs, Office of Environmental Management. EFCOG Integrated Safety Management Work Planning and Control.

  14. Management Not Available 12 MANAGEMENT OF RADIOACTIVE AND NON...

    Office of Scientific and Technical Information (OSTI)

    87 Oak Ridge model conference: Proceedings: Volume I, Part 3, Waste Management Not Available 12 MANAGEMENT OF RADIOACTIVE AND NON-RADIOACTIVE WASTES FROM NUCLEAR FACILITIES; 11...

  15. LTS Project Management - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Project Management About Us Hanford Cultural Resources LTS Home Page LTS Project Management LTS Transition and Timeline LTS Execution LTS Background LTS Information Management LTS Fact Sheets / Briefings LTS In The News LTS Related Links LTS Contact Us LTS Project Management Email Email Page | Print Print Page | Text Increase Font Size Decrease Font Size DOE-RL Office of Assistant Manager for Mission Support (AMMS) is responsible for LTS Program Management. The Site Stewardship Division is

  16. Carlsbad Field Office Manager Selected

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Carlsbad Field Office Manager Selected CARLSBAD, N.M., November 10, 2011 - The U.S. Department of Energy's (DOE) Richland Operations Office (RL) Assistant Manager for the River Corridor Joe Franco was selected as Manager for the Carlsbad Field Office (CBFO), which oversees the Waste Isolation Pilot Plant (WIPP). CBFO Deputy Manager Ed Ziemianski has been acting in the CBFO Manager's position for the past year and will continue to serve as Deputy Manager. In operation since 1999, WIPP is a DOE

  17. Waste Management | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management Waste Management Oak Ridge has an onsite CERCLA disposal facility, the Environmental Management Waste Management Facility, that reduces cleanup and transportation costs. Oak Ridge has an onsite CERCLA disposal facility, the Environmental Management Waste Management Facility, that reduces cleanup and transportation costs. Years of diverse research and uranium and isotope production led to numerous forms of waste in Oak Ridge. However, our EM program has worked to identify,

  18. Loan Specialist (Portfolio Management)

    Broader source: Energy.gov [DOE]

    This position is located in the Portfolio Management Division of the U. S. Department of Energy's (DOE) Loan Programs Office (LPO). The incumbent in this position will serve as a Loan Specialist,...

  19. SLURM Resource Manager is

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    resource management (such as Torque) and job scheduling (such as Moab) into one system. ... Cori Phase 1. * Hopper stays with TorqueMoab un?l re?re. * Edison stays with Torque...

  20. Earned Value Management

    Broader source: Energy.gov [DOE]

    Earned Value Management (EVM)Ā is a systematic approach to the integration and measurement of cost, schedule, and technical (scope) accomplishments on a project or task. It provides both the...

  1. Energy, Data Management, Reporting

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    FY 2011sales Diversified end markets - FY 2011 sales North America 23% Asia Pacific 27% Rest of World 18% Western Europe 32% - - Enterprise-wide Facility Management 4 Demographics ...

  2. Acquisition and Project Management

    National Nuclear Security Administration (NNSA)

    4%2A en Acquisition and Project Management Office volunteers get up-close look at Office of Secure Transportation exercise http:nnsa.energy.govblogacquisition-and-project-mana...

  3. Project Management Lessons Learned

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-05

    The guide supports DOE O 413.3A, Program and Project Management for the Acquisition of Capital Assets, and aids the federal project directors and integrated project teams in the execution of projects.

  4. Management of Nuclear Materials

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1994-05-26

    To establish requirements and procedures for the management of nuclear materials within the Department of Energy (DOE). Cancels DOE 5660.1A. Canceled by DOE O 410.2.

  5. Transportation Management Workshop: Proceedings

    SciTech Connect (OSTI)

    Not Available

    1993-10-01

    This report is a compilation of discussions presented at the Transportation Management Workshop held in Gaithersburg, Maryland. Topics include waste packaging, personnel training, robotics, transportation routing, certification, containers, and waste classification.

  6. Stressor Management Video Slide

    Broader source: Energy.gov [DOE]

    A video excerpt from a U.S. Fish and Wildlife Service webinar that explains the ā€œStressor Management Approachā€ to analyzing impacts to migratory birds.Ā  The full length webinar can be viewed at...

  7. Office of Information Management

    Broader source: Energy.gov [DOE]

    The Office of Information Management provides a broad range of information technology services in support of the Associate Under Secretary for the Office of Environment, Health, Safety and Security (AU).

  8. Human Resource Management Delegation

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1996-06-28

    The notice is to clarifies and updates existing Human Resource Management Delegation Authorities and the levels to which they are delegated. Expired 6-28-97. Does not cancel any directives.

  9. ENVIRONMENTAL MANAGEMENT ADVISORY BOARD

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    EM Update and Discussion of Charges to the Board Mark Whitney, Principal Deputy Assistant Secretary for Environmental Management 2:30 p.m. Break 2:45 p.m. Public Comment Period ...

  10. Item Management Control System

    Energy Science and Technology Software Center (OSTI)

    1993-08-06

    The Item Management Control System (IMCS) has been developed at Idaho National Engineering Laboratory to assist in organizing collections of documents using an IBM-PC or similar DOS system platform.

  11. Headquarters Personal Property Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-10-25

    To establish procedures for managing Government personal property owned or leased by the Department of Energy and in the custody of DOE Headquarters employees, including those in the National Nuclear Security Administration. Cancels DOE HQ O 580.1A

  12. Office of Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-10-27

    Designates the Director, Office of Management as the DOE official responsible to perform the duties set forth in 22 CFR , sections 62.11 and 41.63 pertaining to the DOE Exchange Visitor Program,

  13. Comprehensive Emergency Management System

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2016-08-11

    The Order establishes policy and assigns roles and responsibilities for the Department of Energy (DOE) Emergency Management System. Supersedes DOE O 151.1C. Cancels DOE M 151.1-1.

  14. Information Technology Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-12-23

    The Order identifies the objectives, components, and responsibilities for implementing processes to ensure the effective management of information and information systems within the Department. Supersedes DOE O 200.1.

  15. managing the stockpile

    National Nuclear Security Administration (NNSA)

    managed by the National Nuclear Security Administration within the U. S. Department of Energy.

    OST is responsible for the safe and secure transport in the contiguous United...

  16. Change Control Management Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-29

    The Guide provides a suggested approach and uniform guidance for managing project and contract changes through applying the requirements of DOE O 413.3B. Admin Chg 1 dated 10-22-2015.

  17. 2014 Waste Management Conference

    Broader source: Energy.gov [DOE]

    When you hear about the U.S. Department of Energy (DOE) Office of Legacy Management (LM), what comes to mind? Is it long-term surveillance and maintenance (LTS&M) activities such as conducting...

  18. Strategic Energy Management

    Broader source: Energy.gov [DOE]

    The U.S. Department of Energy (DOE) SEE Action Network and Weatherization and Intergovernmental Program Technical Assistance Program sponsored this webinar about strategic management in the public sector on November 7, 2012.

  19. Personal Property Management Program Brochure | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Personal Property Management Program Brochure Personal Property Management Program Brochure PDF icon Personal Property Management Program Brochure More Documents & Publications...

  20. Environmental Management Associates | Open Energy Information

    Open Energy Info (EERE)

    Environmental Management Associates Jump to: navigation, search Name: Environmental Management Associates Abbreviation: EMA Website: www.emacorp.com Environmental Management...

  1. Project Management Career Development Program | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    are here Home Operational Management Certifications and Professional Development Project Management Career Development Program Project Management Career Development...

  2. Project Management Coordination Office | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Project Management Coordination Office Project Management Coordination Office The Project Management Coordination Office (PMCO) provides guidance, leadership, training, and tools ...

  3. Project Management Resources | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Project Management Resources Project Management Resources Performance & Project Completion Environmental Management Completed Projects 2005-Present EM Current Project Performance ...

  4. Acquisition and Project Management Continuous Improvement Presentation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Project Management Continuous Improvement Presentation Acquisition and Project Management Continuous Improvement Presentation Presentation on Acquisition and Project Management ...

  5. Environmental Management Advisory Board Subcommittees | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    EMAB Environmental Management Advisory Board Subcommittees Environmental Management Advisory Board Subcommittees ACQUISITION AND PROJECT MANAGEMENT SUBCOMMITTEE SUBCOMMITTEE ...

  6. The Utility Management Conference

    Broader source: Energy.gov [DOE]

    The Utility Management Conferenceā„¢ 2016 in San Diego is the place to be for leading utility and consulting staff. The technical program has been expanded to 36 sessions running in four concurrent rooms in order to provide utility leaders with the latest tools, techniques, best practices, and emerging solutions you need for effective utility management. This event will empower attendees, leading the water sector ā€œOn the Road to the Utilities of the Future.ā€

  7. Radioactive Waste Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-07-09

    This Manual further describes the requirements and establishes specific responsibilities for implementing DOE O 435.1, Radioactive Waste Management, for the management of DOE high-level waste, transuranic waste, low-level waste, and the radioactive component of mixed waste. Change 1 dated 6/19/01 removes the requirement that Headquarters is to be notified and the Office of Environment, Safety and Health consulted for exemptions for use of non-DOE treatment facilities. Certified 1-9-07.

  8. Lithium battery management system

    DOE Patents [OSTI]

    Dougherty, Thomas J.

    2012-05-08

    Provided is a system for managing a lithium battery system having a plurality of cells. The battery system comprises a variable-resistance element electrically connected to a cell and located proximate a portion of the cell; and a device for determining, utilizing the variable-resistance element, whether the temperature of the cell has exceeded a predetermined threshold. A method of managing the temperature of a lithium battery system is also included.

  9. Turbine Thermal Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Turbine Thermal Management Fact Sheets Research Team Members Key Contacts Turbine Thermal Management The gas turbine is the workhorse of power generation, and technology advances to current land-based turbines are directly linked to our country's economic and energy security. Technical advancement for any type of gas turbine generally implies better performance, greater efficiency, and extended component life. From the standpoint of cycle efficiency and durability, this suggests that a continual

  10. Environmental Management System

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Environmental Management Scientist Sets His Sights on Mars Environmental Management Scientist Sets His Sights on Mars September 4, 2012 - 3:29pm Addthis Curiosity, left, at NASAĆ¢Ā€Ā™s Jet Propulsion Laboratory in Pasadena, California, in late November 2011. Shown here is the flight hardware that was being assembled prior to shipment to Cape Canaveral Air Force Station in Florida for the launch. | Photo Credit Dr. Robert C. Nelson Curiosity, left, at NASA's Jet Propulsion Laboratory

  11. Defense Waste Management Programs

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Waste Management Programs - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced

  12. Facilities Management | Jefferson Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Facilities Management Facilities Management & Logistics is responsible for performing or specifying performance of all Jefferson Lab facility maintenance, construction, security, property, and facility services. The lab's 206-acre campus includes 169 acres owned by the U.S. Department of Energy and 37 acres owned by the Southeast Universities Research Association. In addition, the Commonwealth of Virginia owns an 8-acre parcel referred to as the Virginia Associated Research Campus (VARC)

  13. Issues Management Tool

    Energy Science and Technology Software Center (OSTI)

    2010-12-31

    IMTool performs the following: Ā• The IMTool can manage issues, actions, and activities from one screen. Ā• Provides enhanced and intuitive searching, sorting, and filtering capabilities. Grids allow for filtering any column instantly by any data heading. Ā• IMTool uses drop-down menus to ensure date is entered accurately with consistency. Ā• User-friendly system Ā– highly utilized commitment tracking screen functions. Information is viewed on the left side of the screen and managed on the right.

  14. TWRS safety management plan

    SciTech Connect (OSTI)

    Popielarczyk, R.S., Westinghouse Hanford

    1996-08-01

    The Tank Waste Remediation System (TWRS) Safety Management Program Plan for development, implementation and maintenance of the tank farm authorization basis is described. The plan includes activities and procedures for: (a) Updating the current Interim Safety Basis, (b) Development,implementation and maintenance of a Basis for Interim Operations, (c) Development, implementation and maintenance of the Final Safety Analyses Report, (d) Development and implementation of a TWRS information Management System for monitoring the authorization basis.

  15. Vantage Management | Open Energy Information

    Open Energy Info (EERE)

    Management Jump to: navigation, search Name: Vantage Management Place: New York Product: US-based firm which provides business and technical consulting to growing companies....

  16. Claridge Management | Open Energy Information

    Open Energy Info (EERE)

    Claridge Management Jump to: navigation, search Name: Claridge Management Place: United Kingdom Product: Claridge is focusing on setting up incubatortechnology development hubs in...

  17. Fleet Management | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Fleet management includes commercial and agency owned motor vehicles such as cars, vans, trucks, and buses. Fleet (vehicle) management at the headquarters level includes a range of...

  18. Project Management Policies & Principles Memo

    Broader source: Energy.gov [DOE]

    Memo enhances and clarifies departmental policy related to project management as a result of the Improving Project Management Study and subsequent Secretarial Memo dated December 2014.

  19. Risk Management Process Overview | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Risk Management Process Overview Risk Management Process Overview figure depicting three tier risk management process The cybersecurity risk management process explained in the ...

  20. Waste Management Update by Frank Marcinowski

    Office of Environmental Management (EM)

    U.S. DOE Environmental Management Update on Waste Management (and other EM Mission Units) Frank Marcinowski Deputy Assistant Secretary for Waste Management ENVIRONMENTAL MANAGEMENT ...

  1. OFFICE OF ENVIRONMENTAL MANAGEMENT NAMES NEW IDAHO CLEANUP MANAGER

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Danielle Miller (208) 526-5709 For Immediate Release May 30, 2014 OFFICE OF ENVIRONMENTAL MANAGEMENT NAMES NEW IDAHO CLEANUP MANAGER Idaho Falls, ID - The U.S. Department of Energy Office of Environmental Management today announced that John (Jack) Zimmerman has been named Deputy Manager of its highly-successful Idaho Cleanup program, which oversees the environmental cleanup and waste management mission at DOE's Idaho site. Mr. Zimmerman has more than 25 years of experience in nuclear

  2. Management control system description

    SciTech Connect (OSTI)

    Bence, P. J.

    1990-10-01

    This Management Control System (MCS) description describes the processes used to manage the cost and schedule of work performed by Westinghouse Hanford Company (Westinghouse Hanford) for the US Department of Energy, Richland Operations Office (DOE-RL), Richland, Washington. Westinghouse Hanford will maintain and use formal cost and schedule management control systems, as presented in this document, in performing work for the DOE-RL. This MCS description is a controlled document and will be modified or updated as required. This document must be approved by the DOE-RL; thereafter, any significant change will require DOE-RL concurrence. Westinghouse Hanford is the DOE-RL operations and engineering contractor at the Hanford Site. Activities associated with this contract (DE-AC06-87RL10930) include operating existing plant facilities, managing defined projects and programs, and planning future enhancements. This document is designed to comply with Section I-13 of the contract by providing a description of Westinghouse Hanford's cost and schedule control systems used in managing the above activities. 5 refs., 22 figs., 1 tab.

  3. Environmental Requirements Management

    SciTech Connect (OSTI)

    Cusack, Laura J.; Bramson, Jeffrey E.; Archuleta, Jose A.; Frey, Jeffrey A.

    2015-01-08

    CH2M HILL Plateau Remediation Company (CH2M HILL) is the U.S. Department of Energy (DOE) prime contractor responsible for the environmental cleanup of the Hanford Site Central Plateau. As part of this responsibility, the CH2M HILL is faced with the task of complying with thousands of environmental requirements which originate from over 200 federal, state, and local laws and regulations, DOE Orders, waste management and effluent discharge permits, Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) response and Resource Conservation and Recovery Act (RCRA) corrective action documents, and official regulatory agency correspondence. The challenge is to manage this vast number of requirements to ensure they are appropriately and effectively integrated into CH2M HILL operations. Ensuring compliance with a large number of environmental requirements relies on an organizationā€™s ability to identify, evaluate, communicate, and verify those requirements. To ensure that compliance is maintained, all changes need to be tracked. The CH2M HILL identified that the existing system used to manage environmental requirements was difficult to maintain and that improvements should be made to increase functionality. CH2M HILL established an environmental requirements management procedure and tools to assure that all environmental requirements are effectively and efficiently managed. Having a complete and accurate set of environmental requirements applicable to CH2M HILL operations will promote a more efficient approach to: ā€¢ Communicating requirements ā€¢ Planning work ā€¢ Maintaining work controls ā€¢ Maintaining compliance

  4. Analytical Services Management System

    Energy Science and Technology Software Center (OSTI)

    2005-03-30

    Analytical Services Management System (ASMS) provides sample management services. Sample management includes sample planning for analytical requests, sample tracking for shipping and receiving by the laboratory, receipt of the analytical data deliverable, processing the deliverable and payment of the laboratory conducting the analyses. ASMS is a web based application that provides the ability to manage these activities at multiple locations for different customers. ASMS provides for the assignment of single to multiple samples for standardmoreĀ Ā» chemical and radiochemical analyses. ASMS is a flexible system which allows the users to request analyses by line item code. Line item codes are selected based on the Basic Ordering Agreement (BOA) format for contracting with participating laboratories. ASMS also allows contracting with non-BOA laboratories using a similar line item code contracting format for their services. ASMS allows sample and analysis tracking from sample planning and collection in the field through sample shipment, laboratory sample receipt, laboratory analysis and submittal of the requested analyses, electronic data transfer, and payment of the laboratories for the completed analyses. The software when in operation contains business sensitive material that is used as a principal portion of the Kaiser Analytical Management Services business model. The software version provided is the most recent version, however the copy of the application does not contain business sensitive data from the associated Oracle tables such as contract information or price per line item code.Ā«Ā less

  5. Analytical Services Management System

    SciTech Connect (OSTI)

    Church, Shane; Nigbor, Mike; Hillman, Daniel

    2005-03-30

    Analytical Services Management System (ASMS) provides sample management services. Sample management includes sample planning for analytical requests, sample tracking for shipping and receiving by the laboratory, receipt of the analytical data deliverable, processing the deliverable and payment of the laboratory conducting the analyses. ASMS is a web based application that provides the ability to manage these activities at multiple locations for different customers. ASMS provides for the assignment of single to multiple samples for standard chemical and radiochemical analyses. ASMS is a flexible system which allows the users to request analyses by line item code. Line item codes are selected based on the Basic Ordering Agreement (BOA) format for contracting with participating laboratories. ASMS also allows contracting with non-BOA laboratories using a similar line item code contracting format for their services. ASMS allows sample and analysis tracking from sample planning and collection in the field through sample shipment, laboratory sample receipt, laboratory analysis and submittal of the requested analyses, electronic data transfer, and payment of the laboratories for the completed analyses. The software when in operation contains business sensitive material that is used as a principal portion of the Kaiser Analytical Management Services business model. The software version provided is the most recent version, however the copy of the application does not contain business sensitive data from the associated Oracle tables such as contract information or price per line item code.

  6. DOE Project Management Update (Metrics)

    Broader source: Energy.gov [DOE]

    Michael Peek, Deputy Director, Office of Project Management Oversight and Assessments March 22, 2016

  7. Management Reminders | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management Reminders Management Reminders This document is normally shared by the HQ Program Manager a week prior to the scheduled mediation and is intented to serve as a reminder of the pertinent aspects of the mediation process. OCPR-HQ-006 Final - Management Reminders.pdf (98.7 KB) More Documents & Publications Employee Reminders Mediation Process Mediator

  8. TWRS Configuration management program plan

    SciTech Connect (OSTI)

    Vann, J.M.

    1996-06-03

    The TWRS Configuration Management Program Plan (CMPP) integrates technical and administrative controls to establish and maintain consistency among requirements, product configuration, and product information for TWRS products during all life cycle phases. This CMPP will be used by TWRS management and configuration management personnel to establish and manage the technical and integrated baselines and controls and status changes to those baselines.

  9. Storage resource manager

    SciTech Connect (OSTI)

    Perelmutov, T.; Bakken, J.; Petravick, D.; /Fermilab

    2004-12-01

    Storage Resource Managers (SRMs) are middleware components whose function is to provide dynamic space allocation and file management on shared storage components on the Grid[1,2]. SRMs support protocol negotiation and reliable replication mechanism. The SRM standard supports independent SRM implementations, allowing for a uniform access to heterogeneous storage elements. SRMs allow site-specific policies at each location. Resource Reservations made through SRMs have limited lifetimes and allow for automatic collection of unused resources thus preventing clogging of storage systems with ''orphan'' files. At Fermilab, data handling systems use the SRM management interface to the dCache Distributed Disk Cache [5,6] and the Enstore Tape Storage System [15] as key components to satisfy current and future user requests [4]. The SAM project offers the SRM interface for its internal caches as well.

  10. Computer memory management system

    DOE Patents [OSTI]

    Kirk, III, Whitson John

    2002-01-01

    A computer memory management system utilizing a memory structure system of "intelligent" pointers in which information related to the use status of the memory structure is designed into the pointer. Through this pointer system, The present invention provides essentially automatic memory management (often referred to as garbage collection) by allowing relationships between objects to have definite memory management behavior by use of coding protocol which describes when relationships should be maintained and when the relationships should be broken. In one aspect, the present invention system allows automatic breaking of strong links to facilitate object garbage collection, coupled with relationship adjectives which define deletion of associated objects. In another aspect, The present invention includes simple-to-use infinite undo/redo functionality in that it has the capability, through a simple function call, to undo all of the changes made to a data model since the previous `valid state` was noted.

  11. Oil field management system

    DOE Patents [OSTI]

    Fincke, James R.

    2003-09-23

    Oil field management systems and methods for managing operation of one or more wells producing a high void fraction multiphase flow. The system includes a differential pressure flow meter which samples pressure readings at various points of interest throughout the system and uses pressure differentials derived from the pressure readings to determine gas and liquid phase mass flow rates of the high void fraction multiphase flow. One or both of the gas and liquid phase mass flow rates are then compared with predetermined criteria. In the event such mass flow rates satisfy the predetermined criteria, a well control system implements a correlating adjustment action respecting the multiphase flow. In this way, various parameters regarding the high void fraction multiphase flow are used as control inputs to the well control system and thus facilitate management of well operations.

  12. Berkeley Disk Resource Manager

    Energy Science and Technology Software Center (OSTI)

    2004-02-27

    The Berkeley Disk Resource Manager (B-DRM) is a middleware component whose function is to provide dynamic space allocation and file management of a shared disk system on the Grid. It provides space allocation and dynamic information on storage availability for the planning and execution of Grid jobs. The B-DRM manages two types of resources: space and files. Vi1en managing space, the B-DRM allocates space to the requesting client based on a default space quota, ThenmoreĀ Ā» managing files, the B-DRM allocates space for files, invokes file transfer services to move files into the space, pins files for a certain lifetime, releases files upon the clientĀ’s request, and uses file replacement policies to optimize the use of the shared space. The B-DRM is designed to provide effective sharing of files, by monitoring the activity of shared files, and making dynamic decisions on which files to replace when space is needed. In addition, the B-DRM performs automatic garbage collection of unused files when space is needed by removing selected files that were released by the client or whose lifetime has expired. The BDRM supports requests to get multiple files in a single call, manages a queue of the requested files, brings in as many files as the space quota permits, and continues to reuse the space when files are released to stream files to the client until the entire request is satisfied. Similarly, the B-DRM supports requests to put multiple files into its space, streaming files into the allocated space and reusing the space if necessary.Ā«Ā less

  13. Berkeley Disk Resource Manager

    SciTech Connect (OSTI)

    2004-02-27

    The Berkeley Disk Resource Manager (B-DRM) is a middleware component whose function is to provide dynamic space allocation and file management of a shared disk system on the Grid. It provides space allocation and dynamic information on storage availability for the planning and execution of Grid jobs. The B-DRM manages two types of resources: space and files. Vi1en managing space, the B-DRM allocates space to the requesting client based on a default space quota, Then managing files, the B-DRM allocates space for files, invokes file transfer services to move files into the space, pins files for a certain lifetime, releases files upon the client?s request, and uses file replacement policies to optimize the use of the shared space. The B-DRM is designed to provide effective sharing of files, by monitoring the activity of shared files, and making dynamic decisions on which files to replace when space is needed. In addition, the B-DRM performs automatic garbage collection of unused files when space is needed by removing selected files that were released by the client or whose lifetime has expired. The BDRM supports requests to get multiple files in a single call, manages a queue of the requested files, brings in as many files as the space quota permits, and continues to reuse the space when files are released to stream files to the client until the entire request is satisfied. Similarly, the B-DRM supports requests to put multiple files into its space, streaming files into the allocated space and reusing the space if necessary.

  14. LTS Information Management - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Information Management About Us Hanford Cultural Resources LTS Home Page LTS Project Management LTS Transition and Timeline LTS Execution LTS Background LTS Information Management LTS Fact Sheets / Briefings LTS In The News LTS Related Links LTS Contact Us Email Email Page | Print Print Page | Text Increase Font Size Decrease Font Size Information Management HNF-50340 Rev.1, Hanford Site Long-Term Stewardship Information Management Program Plan describes the planning, responsibilities and

  15. Aviation Management | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management Ā» Aviation Management Aviation Management The Department of Energy, Aviation Program is the management function for all fleet aircraft and contracted aviation services for the Department. The program and its management personnel operate world-wide. To take advantage of the best communications and information services available, we have chosen the Net as one of our mainstays. The services provided from this page are designed to support our operating personnel. Except for our licensed

  16. Hoffman Joins Safety Management Elite

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Hoffman Joins Safety Management Elite CARLSBAD, N.M., June 21, 2001 - Paul Hoffman of Westinghouse TRU Solutions LLC (WTS) has joined the ranks of the safety management elite in the United States by earning his Certificate in Safety Management. WTS is the management and operating contractor for the U.S. Department of Energy at the Waste Isolation Pilot Plant (WIPP). The Certificate in Safety Management is awarded by the American Society of Safety Engineers (ASSE) to recognize completion of

  17. Fleet Management | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Property Ā» Fleet Management Fleet Management Fleet management includes commercial and agency owned motor vehicles such as cars, vans, trucks, and buses. Fleet (vehicle) management at the headquarters level includes a range of functions, such as vehicle data base management of the FAST, FMVRS, FedFMS, and UNICOR systems, annual motor vehicle utilization and budget forecast data, as well as the use and monitoring of GSA systems in their Fleet DriveThru data base. Fleet Briefings DOE Fleet

  18. Operational Management | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management Operational Management The Office of Management supports many leadership responsibilities for the Department of Energy (DOE), providing support for project and contract management and other administrative functions. For example, the office oversees more than $22 billion in annual contract obligations and $2 billion in financial assistance obligations. It supports the management of the Department's multi-billion dollar project portfolio, and provides the Secretary of Energy and senior

  19. Management Rachana Ananthakrishnan

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Globus for Data Management Rachana Ananthakrishnan (ranantha@uchicago.edu) Computation Institute Data Management Challenges * "Transfers often take longer than expected based on available network capacities" * "Lack of an easy to use interface to some of the high-performance tools" * "Tools [are] too difficult to install and use" * "Time and interruption to other work required to supervise large data transfers" * "Need data transfer tools that are

  20. Radioactive Waste Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-07-09

    This Manual further describes the requirements and establishes specific responsibilities for implementing DOE O 435.1, Radioactive Waste Management, for the management of DOE high-level waste, transuranic waste, low-level waste, and the radioactive component of mixed waste. Change 1 dated 6/19/01 removes the requirement that Headquarters is to be notified and the Office of Environment, Safety and Health consulted for exemptions for use of non-DOE treatment facilities. Certified 1-9-07. Admin Chg 2, dated 6-8-11, supersedes DOE M 435.1-1 Chg 1.

  1. Monitoring and Managing Jobs

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Monitoring and Managing Jobs Monitoring and Managing Jobs Commonly Used Commands Action How to do it Comment Get a summary of all batch jobs sgeusers Shows a tally of all jobs for all users including their states. This is a script that parses the output of qstat and is maintained by PDSF staff (located in /common/usg/bin). Do "sgeusers -h" for usage info. Get a listing of your jobs and their states qstat -u user_name If you skip the -u option, you'll get all the jobs on PDSF. Get

  2. Contract/Project Management

    Office of Environmental Management (EM)

    8 4 th Quarter Metrics Final Overall Contract and Project Management Performance Metrics and Targets Contract/Project Management Performance Metrics FY 2008 Target FY 2008 Actual Comment 1. Capital Asset Line Item Projects: 90% of projects completed within 110% of CD-2 TPC by FY11. 75% 76% This is a 3-year rolling average Data includes FY06 to FY08. (37/48) 2. EM Cleanup (Soil and Groundwater Remediation, D&D, and Waste Treatment and Disposal) Projects: 90% of EM cleanup projects complete

  3. Contract/Project Management

    Office of Environmental Management (EM)

    1 st Quarter Overall Contract and Project Management Performance Metrics and Targets Contract/Project Management Performance Metrics FY 2009 Target FY 2009 Actual Comment 1. Capital Asset Line Item Projects: 90% of projects completed within 110% of CD-2 TPC by FY11. 80% - No 1 st Qtr FY09 completions. This is a 3-year rolling average (FY07 to FY09). 2. EM Cleanup (Soil and Groundwater Remediation, D&D, and Waste Treatment and Disposal) Projects: 90% of EM cleanup projects complete 80% of

  4. Contract/Project Management

    Office of Environmental Management (EM)

    2 nd Quarter Overall Contract and Project Management Performance Metrics and Targets Contract/Project Management Performance Metrics FY 2009 Target FY 2009 Actual Comment 1. Capital Asset Line Item Projects: 90% of projects completed within 110% of CD-2 TPC by FY11. 80% - Two projects completed in the 2 nd Qtr FY09. This is a 3-year rolling average (FY07 to FY09). 2. EM Cleanup (Soil and Groundwater Remediation, D&D, and Waste Treatment and Disposal) Projects: 90% of EM cleanup projects

  5. Contract/Project Management

    Office of Environmental Management (EM)

    3 rd Quarter Overall Contract and Project Management Performance Metrics and Targets Contract/Project Management Performance Metrics FY 2009 Target FY 2009 Actual Comment 1. Capital Asset Line Item Projects: 90% of projects completed within 110% of CD-2 TPC by FY11. 80% 72% This is a 3-year rolling average (FY07 to FY09). No 3 rd qtr FY09 completions. 2. EM Cleanup (Soil and Groundwater Remediation, D&D, and Waste Treatment and Disposal) Projects: 90% of EM cleanup projects complete 80% of

  6. Contract/Project Management

    Office of Environmental Management (EM)

    4 th Quarter Metrics Final Overall Contract and Project Management Performance Metrics and Targets Contract/Project Management Performance Metrics FY 2009 Target FY 2009 Actual Comment 1. Capital Asset Line Item Projects: 90% of projects completed within 110% of CD-2 TPC by FY11. 80% 73% This is a 3-year rolling average (FY07 to FY09). 2. EM Cleanup (Soil and Groundwater Remediation, D&D, and Waste Treatment and Disposal) Projects: 90% of EM cleanup projects complete 80% of scope within 125%

  7. Contract/Project Management

    Office of Environmental Management (EM)

    1 st Quarter Overall Contract and Project Management Performance Metrics and Targets 1 Contract/Project Management Primary Performance Metrics FY 2010 Target 1st Qtr FY 2010 Actual FY 2010 Pre- & Post-CAP Comment 1a. Capital Asset Line Item Projects: (Pre-RCA/CAP) 90% of projects completed within 110% of CD-2 TPC by FY11. 1b. Capital Asset Line Item Projects: (Post-RCA/CAP) 85% Line Item 73% Line Item 70% Pre-CAP 100% Post-CAP This is a projection based on a 3-year rolling average (FY08 to

  8. Contract/Project Management

    Office of Environmental Management (EM)

    Second Quarter Overall Contract and Project Management Performance Metrics and Targets 1 Contract/Project Management Primary Performance Metrics FY 2010 Target FY 2010 Actual FY 2010 Pre- & Post-CAP Comment 1a. Capital Asset Line Item Projects: (Pre-RCA/CAP) 90% of projects completed within 110% of CD-2 TPC by FY11. 1b. Capital Asset Line Item Projects: (Post-RCA/CAP) 85% Line Item 73% Line Item 70% Pre-CAP 100% Post-CAP This is a projection based on a 3-year rolling average (FY08 to FY10).

  9. Contract/Project Management

    Office of Environmental Management (EM)

    Third Quarter Overall Contract and Project Management Performance Metrics and Targets 1 Contract/Project Management Primary Performance Metrics FY 2010 Target FY 2010 Forecast FY 2010 Pre- & Post-CAP Comment 1a. Capital Asset Line Item Projects: (Pre-RCA/CAP) 90% of projects completed within 110% of CD-2 TPC by FY11. 1b. Capital Asset Line Item Projects: (Post-RCA/CAP) 85% Line Item 71% Line Item 70% Pre-CAP 100% Post-CAP This is a projection based on a 3-year rolling average (FY08 to FY10).

  10. Contract/Project Management

    Office of Environmental Management (EM)

    Fourth Quarter Overall Contract and Project Management Performance Metrics and Targets 1 Contract/Project Management Primary Performance Metrics FY 2010 Target FY 2010 Actual FY 2010 Pre- & Post-CAP Comment 1a. Capital Asset Line Item Projects: (Pre-RCA/CAP) 90% of projects completed within 110% of CD-2 TPC by FY11. 1b. Capital Asset Line Item Projects: (Post-RCA/CAP) 85% Line Item 69% Line Item 67% Pre-CAP 100% Post-CAP This is based on a 3-year rolling average (FY08 to FY10). TPC is Total

  11. Contract/Project Management

    Office of Environmental Management (EM)

    First Quarter Overall Contract and Project Management Performance Metrics and Targets 1 Contract/Project Management Primary Performance Metrics FY 2011 Target FY 2011 Actual & Forecast FY 2011 Pre- & Post-CAP Comment 1a. Capital Asset Line Item Projects: (Pre-RCA/CAP) Projects completed within 110% of CD-2 TPC. 1b. Capital Asset Line Item Projects: (Post-RCA/CAP) 90% Line Item 79% Line Item 71% Pre-CAP 100% Post-CAP This is based on a 3-year rolling average (FY09 to FY11). TPC is Total

  12. Contract/Project Management

    Office of Environmental Management (EM)

    Second Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 Contract/Project Management Primary Performance Metrics FY 2011 Target FY 2011 Forecast FY 2011 Pre- & Post-CAP Forecast Comment 1a. Capital Asset Line Item Projects: (Pre-RCA/CAP) Projects completed within 110% of CD-2 TPC. 1b. Capital Asset Line Item Projects: (Post-RCA/CAP) 90% Line Item 84% Line Item 78% Pre-CAP 100% Post-CAP This is based on a 3-year rolling average (FY09 to FY11). TPC

  13. Contract/Project Management

    Office of Environmental Management (EM)

    Third Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 Contract/Project Management Primary Performance Metrics FY 2011 Target FY 2011 Forecast FY 2011 Pre- & Post-CAP Forecast Comment 1a. Capital Asset Line Item Projects: (Pre-RCA/CAP) Projects completed within 110% of CD-2 TPC. 1b. Capital Asset Line Item Projects: (Post-RCA/CAP) 90% Line Item 84% Line Item 78% Pre-CAP 100% Post-CAP This is based on a 3-year rolling average (FY09 to FY11). TPC is

  14. Contract/Project Management

    Office of Environmental Management (EM)

    Fourth Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 Contract/Project Management Primary Performance Metrics FY 2011 Target FY 2011 Actual FY 2011 Pre- & Post-CAP Actual Comment 1a. Capital Asset Line Item Projects: (Pre-RCA/CAP) Projects completed within 110% of CD-2 TPC. 1b. Capital Asset Line Item Projects: (Post-RCA/CAP) 90% Line Item 84% Line Item 77% Pre-CAP 100% Post-CAP This is based on a 3-year rolling average (FY09 to FY11). TPC is

  15. Contract/Project Management

    Office of Environmental Management (EM)

    First Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 Contract/Project Management Performance Metric FY 2012 Target FY 2012 Forecast FY 2012 Pre- & Post-CAP Forecast Comment Capital Asset Project Success: Complete 90% of capital asset projects at original scope and within 110% of CD-2 TPC. 90%* 84% Construction 83% Cleanup 85% 77% Pre-CAP 86% Post- CAP This is based on a 3- year rolling average (FY10 to FY12). TPC is Total Project Cost.

  16. Contract/Project Management

    Office of Environmental Management (EM)

    Second Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 Contract/Project Management Performance Metric FY 2012 Target FY 2012 Forecast FY 2012 Pre- & Post-CAP Forecast Comment Capital Asset Project Success: Complete 90% of capital asset projects at original scope and within 110% of CD-2 TPC. 90%* 88% Construction 87% Cleanup 89% 77% Pre-CAP 92% Post- CAP This is based on a 3- year rolling average (FY10 to FY12). TPC is Total Project Cost.

  17. Contract/Project Management

    Office of Environmental Management (EM)

    Third Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 Contract/Project Management Performance Metric FY 2012 Target FY 2012 Forecast FY 2012 Pre- & Post-CAP Forecast Comment Capital Asset Project Success: Complete 90% of capital asset projects at original scope and within 110% of CD-2 TPC. 90%* 87% Construction 87% Cleanup 87% 77% Pre-CAP 90% Post- CAP This is based on a 3- year rolling average (FY10 to FY12). TPC is Total Project Cost.

  18. Contract/Project Management

    Office of Environmental Management (EM)

    Fourth Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 Contract/Project Management Performance Metric FY 2012 Target FY 2012 Final FY 2012 Pre- & Post-CAP Final Comment Capital Asset Project Success: Complete 90% of capital asset projects at original scope and within 110% of CD-2 TPC. 90%* 86% Construction 87% Cleanup 84% 77% Pre-CAP 89% Post-CAP This is based on a 3- year rolling average (FY10 to FY12). TPC is Total Project Cost.

  19. Emergency Management Concepts, Existing Guidance, and Changes

    Broader source: Energy.gov [DOE]

    Presenter: David Freshwater, Emergency Management Specialist, Office of Emergency Management, National Nuclear Security Administration

  20. 2014 DEPARTMENT OF ENERGY PROJECT MANAGEMENT WORKSHOP

    Broader source: Energy.gov [DOE]

    What:Ā  2014 DOE Project Management Workshop (Meeting the Challengeā€”Integrated Acquisition & Project Management)

  1. Trust Management Considerations For the Cooperative Infrastructure Defense Framework: Trust Relationships, Evidence, and Decisions

    SciTech Connect (OSTI)

    Maiden, Wendy M.

    2009-12-01

    Cooperative Infrastructure Defense (CID) is a hierarchical, agent-based, adaptive, cyber-security framework designed to collaboratively protect multiple enclaves or organizations participating in a complex infrastructure. CID employs a swarm of lightweight, mobile agents called Sensors designed to roam hosts throughout a security enclave to find indications of anomalies and report them to host-based Sentinels. The Sensorsā€™ findings become pieces of a larger puzzle, which the Sentinel puts together to determine the problem and respond per policy as given by the enclave-level Sergeant agent. Horizontally across multiple enclaves and vertically within each enclave, authentication and access control technologies are necessary but insufficient authorization mechanisms to ensure that CID agents continue to fulfill their roles in a trustworthy manner. Trust management fills the gap, providing mechanisms to detect malicious agents and offering more robust mechanisms for authorization. This paper identifies the trust relationships throughout the CID hierarchy, the types of trust evidence that could be gathered, and the actions that the CID system could take if an entity is determined to be untrustworthy.

  2. Mobile Technology Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2014-05-15

    The order establishes requirements, assigns responsibilities, and provides guidance for federal mobile technology management and employee use of both government furnished and personally-owned mobile devices within DOE and NNSA. Establishes requirements for use of User Agreements to govern mobile devices used for official duties. Does not cancel other directives.

  3. Contractor Legal Management Requirements

    Broader source: Energy.gov [DOE]

    The purpose of this flash is to inform you of the issuance of two new Acquisition Guide Chapters, Chapters 70-31 C and 31.3, both titled "Contractor Legal Management Requirements." (Chapter 31.3 simply refers you to Chapter 70-31 C.)

  4. Radioactive Waste Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-07-09

    The objective of this Order is to ensure that all Department of Energy (DOE) radioactive waste is managed in a manner that is protective of worker and public health and safety and the environment. Supersedes DOE O 5820.2A. Chg 1 dated 8-28-01. Certified 1-9-07.

  5. Comprehensive stormwater management study

    SciTech Connect (OSTI)

    Morrison, T. ); Alter, M. ); Wassum, R.H. )

    1994-02-01

    This article examines Tucson, Arizona's approach to stormwater management. The topics of the article include the quantity and quality of stormwater, developing the stormwater master plan, meeting environmental and regulatory constraints. Tucson's comprehensive, watershed by watershed approach to public works planning and stormwater program development is described.

  6. Position Management and Classification

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-04-01

    The order establishes departmental requirements and responsibilities for classifying positions using general schedule (GS) and federal wage system (FWS) standards and for developing and administering a sound position management and classification program within the Department. Cancels Chapter VII of DOE O 320.1. Canceled by DOE O 325.2 Chg 1 (Admin Chg), 9-1-15.

  7. Integrated Safety Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-04-25

    The policy establishes DOE's expectation for safety, including integrated safety management that will enable the Departmentā€™s mission goals to be accomplished efficiently while ensuring safe operations at all departmental facilities and activities. Supersedes DOE P 450.4, DOE P 411.1, DOE P 441.1, DOE P 450.2A, and DOE P 450.7

  8. Position Management and Classification

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-04-01

    The order establishes departmental requirements and responsibilities for classifying positions using the general schedule (GS) and federal wage system (FWS) standards and to develop and administer a sound position management and classification program. Supersedes DOE O 325.2, dated 4-1-15.

  9. Risk Assessment & Management Information

    Broader source: Energy.gov [DOE]

    NRC - A Proposed Risk Management Regulatory Framework, April 2012 Risk Assessment Technical Experts Working Group (RWG) web page DOE Standard on Development and Use of Probabilistic Risk Assessment in DOE Nuclear Safety Applications (draft), December 2010 Consortium for Risk Evaluation with Stakeholder Participation Workshop on Risk Assessment and Safety Decision Making Under Uncertainty

  10. Comprehensive Emergency Management System

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1996-08-21

    The Order establishes policy and assigns and describes roles and responsibilities for the DOE Emergency Management System. Cancels DOE 5500.1B, DOE 5500.2B, DOE 5500.3A, DOE 5500.4A, 5500.5A,5500.7B, 5500.8A, 5500.9A, DOE 5500.10

  11. Comprehensive Emergency Management System

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-10-29

    To establish policy and to assign and describe roles and responsibilities for the Department of Energy (DOE) Emergency Management System. (This is an administrative change to DOE O 151.1A). Canceled by DOE O 151.1C. Cancels DOE O 151.1A.

  12. Purge water management system

    DOE Patents [OSTI]

    Cardoso-Neto, Joao E.; Williams, Daniel W.

    1996-01-01

    A purge water management system for effectively eliminating the production of purge water when obtaining a groundwater sample from a monitoring well. In its preferred embodiment, the purge water management system comprises an expandable container, a transportation system, and a return system. The purge water management system is connected to a wellhead sampling configuration, typically permanently installed at the well site. A pump, positioned with the monitoring well, pumps groundwater through the transportation system into the expandable container, which expands in direct proportion with volume of groundwater introduced, usually three or four well volumes, yet prevents the groundwater from coming into contact with the oxygen in the air. After this quantity of groundwater has been removed from the well, a sample is taken from a sampling port, after which the groundwater in the expandable container can be returned to the monitoring well through the return system. The purge water management system prevents the purge water from coming in contact with the outside environment, especially oxygen, which might cause the constituents of the groundwater to oxidize. Therefore, by introducing the purge water back into the monitoring well, the necessity of dealing with the purge water as a hazardous waste under the Resource Conservation and Recovery Act is eliminated.

  13. Purge water management system

    DOE Patents [OSTI]

    Cardoso-Neto, J.E.; Williams, D.W.

    1995-01-01

    A purge water management system is described for effectively eliminating the production of purge water when obtaining a groundwater sample from a monitoring well. In its preferred embodiment, the purge water management system comprises an expandable container, a transportation system, and a return system. The purge water management system is connected to a wellhead sampling configuration, typically permanently installed at the well site. A pump, positioned with the monitoring well, pumps groundwater through the transportation system into the expandable container, which expands in direct proportion with volume of groundwater introduced, usually three or four well volumes, yet prevents the groundwater from coming into contact with the oxygen in the air. After this quantity of groundwater has been removed from the well, a sample is taken from a sampling port, after which the groundwater in the expandable container can be returned to the monitoring well through the return system. The purge water management system prevents the purge water from coming in contact with the outside environment, especially oxygen, which might cause the constituents of the groundwater to oxidize. Therefore, by introducing the purge water back into the monitoring well, the necessity of dealing with the purge water as a hazardous waste under the Resource Conservation and Recovery Act is eliminated.

  14. Integrated Safety Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Safety Management BEHAVIOR (SAFETY CULTURE) - principles of behavior (values) - align motivations PLAN WORK define project scope define facility functional requirements define and analyze hazards mitigate hazards develop & implement controls authorize work assess & improve work execution reaction to changed conditions LEVELS - INSTITUTIONAL - site wide programs - DOE directives & requirements, cultural values - DOE/contractor interface - FACILITY OR PROJECT - Documented Safety

  15. Office of Quality Management

    Broader source: Energy.gov [DOE]

    The Office of Quality Management develops and interprets Government-wide policies and procedures and conducts training to ensure the accurate identification of information and documents that must be classified or controlled under statute or Executive order to protect the national security and controlled unclassified Official Use Only information for the effective operation of the Government.

  16. Substation asset management study

    SciTech Connect (OSTI)

    Conroy, M.W.; Conidi, J.

    1996-03-01

    This paper will present an overview of our recent findings in the area of substation asset management and will describe how several utilities, in response to the issues listed above, are re-examining their present maintenance practices in search of more cost-effective programs.

  17. Radioactive Waste Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-07-09

    The objective of this Order is to ensure that all Department of Energy (DOE) radioactive waste is managed in a manner that is protective of worker and public health and safety and the environment. Cancels DOE O 5820.2A

  18. OFFICE FOR EMERGENCY MANAGEMENT

    Office of Legacy Management (LM)

    OFFICE FOR EMERGENCY MANAGEMENT 155OP STREETNW. WiSHINGTON. D.C. ' , iQns 25,19&L At-t :. I' .' at l530 P Btmat, IO&, XtwMn&m, 0. 6., at 9130 A.Jb Sa 1 llmbemupoftbaaomlttaal8f...

  19. Comprehensive Environmental Management Process

    SciTech Connect (OSTI)

    Hjeresen, D.L.; Roybal, S.L.

    1994-08-01

    This report contains information about Los Alamos National Laboratory`s Comprehensive Environmental Management Plan. The topics covered include: waste minimization, waste generation, environmental concerns, public relations of the laboratory, and how this plan will help to answer to the demands of the laboratory as their mission changes.

  20. Integrated Safety Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-04-25

    The order ensures that DOE/NNSA, systematically integrates safety into management and work practices at all levels, so that missions are accomplished efficiently while protecting the workers, the public, and the environment. Supersedes DOE M 450.4-1 and DOE M 411.1-1C

  1. User Guide for Remote Access to VDI/Workplace Using PIV | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy User Guide for Remote Access to VDI/Workplace Using PIV User Guide for Remote Access to VDI/Workplace Using PIV User guide for remote access to VDI/Workplace using a PIV card . VDI_WP_PIV_Remote_Guide_Final.pdf (1.39 MB) More Documents & Publications User guide for remote access to VDI and Workplace using RSA token Remote Access Options Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA)

  2. Microsoft Word - Testimony of Gregory H Friedman, June 24, 2013 _FINAL_

    Energy Savers [EERE]

    Energy SMail_Secure_Web-Based_Email_v3 _2_.doc Microsoft Word - SMail_Secure_Web-Based_Email_v3 _2_.doc Instructions for Using Secure Email via Outlook Web Access (455.9 KB) More Documents & Publications Using Two-Factor RSA Token with WebVPN Citrix_2FA_Authentication_09.09 Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc

    BEFORE THE U.S. HOUSE OF REPRESENTATIVES COMMITTEE ON GOVERNMENT REFORM SUBCOMMITTEE ON THE FEDERAL WORKFORCE AND AGENCY ORGANIZATION FOR RELEASE ON

  3. Use of Management and Operating or Other Facility Management...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    50.2C, Use of Management and Operating or Other Facility Management Contractor Employees for Services to DOE in the Washington, D.C. Area by Andrew Geary Functional areas: Work for...

  4. OFFICE OF ENVIRONMENTAL MANAGEMENT NAMES NEW IDAHO CLEANUP MANAGER

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy OFFICE OF ENVIRONMENTAL MANAGEMENT (EM) ORGANIZATION CHART OFFICE OF ENVIRONMENTAL MANAGEMENT (EM) ORGANIZATION CHART OFFICE OF ENVIRONMENTAL MANAGEMENT (EM) ORGANIZATION CHART Download Printable Version Mission & Functions Statement for the Office of Environmental Management

    Tim Jackson (208) 526-8484 For Immediate Release May 29, 2014 Public invited to comment on Draft Environmental Assessment on the Disposition of Five Signature Properties at Idaho National Laboratory The

  5. Organic Matter Management

    SciTech Connect (OSTI)

    Izaurralde, Roberto C.; Cerri, Carlos C.

    2002-01-01

    Soil organic matter (S)M) is an essential attribute of soil quality with a key role in soil conservation and sustainable agriculture. Many practices-some involving land use changes-have been shown to increase SOM and thus received considerable attention for their possible role in climate change mitigation. Carbon sequestration in managed soils occurs when there is a net removal of atmospheric CO2 because of the balance between carbon inputs (net primary productivity) and outputs (soil respiration, management-related C emissions). Soil C sequestration has the additional appeal that all its practices conform to principles of sustainable agriculture (e.g., reduced tillage, erosion control, diverse cropping systems, improved soil fertility). Long-term field experiments have been instrumental to increase our understanding of SOM dynamics. This chapter presents fundamental concepts to guide readers on the role of SOM in sustainable agriculture and climate change mitigation.

  6. Environmental Management (EM) Cleanup Projects

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-09-24

    The guide supports DOE O 413.3A, Program and Project Management for the Acquisition of Capital Assets, and provides guidance on environmental management cleanup projects. Canceled by DOE N 251.105.

  7. ENERGY STAR Portfolio Manager 101

    Broader source: Energy.gov [DOE]

    Join us as we introduce and demonstrate the core functionality of EPAā€™s ENERGY STAR Portfolio Manager tool. Attendees will learn how to: navigate Portfolio Manager; add a property and enter details...

  8. Contractor Human Resource Management Programs

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1996-09-30

    The purpose of this directive is to establish Department of Energy (DOE) responsibilities and requirements for the management and oversight of contractor Human Resource Management (HR) programs. Chg 1, 5-8-98; Chg 2, 11-22-09.

  9. Earned Value Management System (EVMS)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-05-06

    The Guide supports the Departments initiatives to improve program, project, and contract management through the implementation and surveillance of contractors earned value management systems. Canceled by DOE G 413.3-10A.

  10. Contractor Human Resource Management Programs

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1996-09-30

    The purpose of this directive is to establish Department of Energy (DOE) responsibilities and requirements for the management and oversight of contractor Human Resource Management (HR) programs. Chg 1, 5-8-98; Chg 2, 11-22-09

  11. Project Management Career Development Program

    Office of Energy Efficiency and Renewable Energy (EERE)

    TheĀ Project Management Career Development ProgramĀ (PMCDP) inĀ Office of Project Management Oversight and AssessmentsĀ was established in 2001 by a Congressional mandate to ensure the Department of...

  12. ENERGY STAR Portfolio Manager 201

    Broader source: Energy.gov [DOE]

    Continue to learn about EPAā€™s new ENERGY STAR Portfolio Manager tool, with a deeper dive into more advanced functionalities such as: managing and tracking changes to your property uses over time;...

  13. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  14. Excess Uranium Inventory Management Plan

    Office of Energy Efficiency and Renewable Energy (EERE)

    The 2013 Excess Uranium Inventory Management Plan describes a framework for the effective management of the Energy Departmentā€™s surplus uranium inventory in support of meeting its critical...

  15. NERSC Information Management (NIM) portal

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The NERSC Information Management (NIM) system is a web portal used to view and modify user ... The NERSC Information Management (NIM) system is a web portal used to view and modify user ...

  16. Records Management Exit Procedures

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Records Management Exit Procedures For Departing Federal and contractor Employees PRESERVATION OF FEDERAL RECORDS The Federal Records Act requires the Department of Energy (DOE) Records Officer to remind departing Federal and contractor employees that Federal records may not be removed from Government custody nor may they be destroyed except in accordance with a records disposition schedule that has been approved by the Archivist of the United States. The creation of adequate documentation and

  17. Doug Shoop, Deputy Manager

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Rand About Us Doug Rand - Senior Policy Advisor at OSTP Doug Rand is a Senior Policy Advisor at the White House Office of Science and Technology Policy. Most Recent Accelerating Clean Energy Technology Solutions through the President's Budget February 12 From Lab to Market: DOE's America's Next Top Energy Innovator Program April 5

    Shoop, Deputy Manager September 9, 2015 Richland Operations Office Agency Update Hanford Advisory Board 2 ļ‚§ Voluntary Protection Program (VPP) --Star status for

  18. Enterprise Risk Management Framework

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Framework The Enterprise Risk Management (ERM) framework includes four steps: identify the risks, determine the probability and impact of each one, identify controls that are already in place that mitigate that risk, and propose additional controls if needed. Step 1: Identify Risks - What can go wrong? This step should identify the negative outcomes that could result from an action or decision . It is important to consider a wide range of risks, and so the Department's ERM framework includes

  19. Enterprise Risk Management Model

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Model The Enterprise Risk Management (ERM) Model is a system used to analyze the cost and benefit of addressing risks inherent in the work performed by the Department of Energy. This system measures risk using a combination of qualitative and quantitative methods to set a standard method for analyzing risk across the many functions within the department. Risks generally fall within five categories regardless ofthe subject matter ofthe subsystem. These categories are (1) risks to people, (2)

  20. Senior Management - JCAP

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (NNSA) Senior Executive Service The Senior Executive Service (SES) is an elite group of men and women meeting the highest professional standards who administer public programs at the top levels of the Federal government. SES employees' salaries are linked directly to individual performance. The U.S. Office of Personnel Management's (OPM) SES web page offsite link contains additional information. To browse current NNSA SES Vacancies, please visit NNSA SES Jobs offsite link . For general

  1. Conditional data watchpoint management

    DOE Patents [OSTI]

    Burdick, Dean Joseph; Vaidyanathan, Basu

    2010-08-24

    A method, system and computer program product for managing a conditional data watchpoint in a set of instructions being traced is shown in accordance with illustrative embodiments. In one particular embodiment, the method comprises initializing a conditional data watchpoint and determining the watchpoint has been encountered. Upon that determination, examining a current instruction context associated with the encountered watchpoint prior to completion of the current instruction execution, further determining a first action responsive to a positive context examination; otherwise, determining a second action.

  2. Chemical Management System

    Energy Science and Technology Software Center (OSTI)

    1998-10-30

    CMS provides an inventory of all chemicals on order or being held in the laboratory, to provide a specific location for all chemical containers, to ensure that health and safety regulatory codes are being upheld, and to provide PNNL staff with hazardous chemical information to better manage their inventories. CMS is comprised of five major modules: 1) chemical purchasing, 2) chemical inventory, 3) chemical names, properties, and hazard groups, 4) reporting, and 5) system administration.

  3. Emergency Management System

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-25

    The order establishes policy, and assigns and describes roles and responsibilities for the DOE Emergency Management System. DOE 5500.1B Chg 1; DOE 5500.2B Chg 1; DOE 5500.3A Chg 1; DOE 5500.4A; DOE 5500.5A; DOE 5500.7B; DOE 5500.8A; DOE 5500.9A, and DOE 5500.10A Chg 1. Canceled by DOE O 151.1A.

  4. Island Wide Management Corporation

    Office of Legacy Management (LM)

    9 1986 Island Wide Management Corporation 3000 Marcus Avenue Lake Success, New York 11042 Dear Sir or Madam: I am sending you this letter and the enclosed information as you have been identified by L. I. Trinin of Glick Construction Company as the representatives of the owners of the property that was formerly the site of the Sylvania-Corning Nuclear Corporation in Bayside, New York. The Department of Energy is evaluating the radiological condition of sites that were utilized under the Manhattan

  5. Environmental management activities

    SciTech Connect (OSTI)

    1997-07-01

    The Office of Environmental Management (EM) has been delegated the responsibility for the Department of Energy`s (DOE`s) cleanup of the nuclear weapons complex. The nature and magnitude of the waste management and environmental remediation problem requires the identification of technologies and scientific expertise from domestic and foreign sources. Within the United States, operational DOE facilities, as well as the decontamination and decommissioning of inactive facilities, have produced significant amounts of radioactive, hazardous, and mixed wastes. In order to ensure worker safety and the protection of the public, DOE must: (1) assess, remediate, and monitor sites and facilities; (2) store, treat, and dispose of wastes from past and current operations; and (3) develop and implement innovative technologies for environmental restoration and waste management. The EM directive necessitates looking beyond domestic capabilities to technological solutions found outside US borders. Following the collapse of the Soviet regime, formerly restricted elite Soviet scientific expertise became available to the West. EM has established a cooperative technology development program with Russian scientific institutes that meets domestic cleanup objectives by: (1) identifying and accessing Russian EM-related technologies, thereby leveraging investments and providing cost-savings; (2) improving access to technical information, scientific expertise, and technologies applicable to EM needs; and (3) increasing US private sector opportunities in Russian in EM-related areas.

  6. Accident management information needs

    SciTech Connect (OSTI)

    Hanson, D.J.; Ward, L.W.; Nelson, W.R.; Meyer, O.R. (EG and G Idaho, Inc., Idaho Falls, ID (USA))

    1990-04-01

    In support of the US Nuclear Regulatory Commission (NRC) Accident Management Research Program, a methodology has been developed for identifying the plant information needs necessary for personnel involved in the management of an accident to diagnose that an accident is in progress, select and implement strategies to prevent or mitigate the accident, and monitor the effectiveness of these strategies. This report describes the methodology and presents an application of this methodology to a Pressurized Water Reactor (PWR) with a large dry containment. A risk-important severe accident sequence for a PWR is used to examine the capability of the existing measurements to supply the necessary information. The method includes an assessment of the effects of the sequence on the measurement availability including the effects of environmental conditions. The information needs and capabilities identified using this approach are also intended to form the basis for more comprehensive information needs assessment performed during the analyses and development of specific strategies for use in accident management prevention and mitigation. 3 refs., 16 figs., 7 tabs.

  7. Life Cycle Asset Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-10-14

    (The following directives are deleted or consolidated into this Order and shall be phased out as noted in Paragraph 2: DOE 1332.1A; DOE 4010.1A; DOE 4300.1C; DOE 4320.1B; DOE 4320.2A; DOE 4330.4B; DOE 4330.5; DOE 4540.1C; DOE 4700.1). This Order supersedes specific project management provisions within DOE O 430.1A, LIFE CYCLE ASSET MANAGEMENT. The specific paragraphs canceled by this Order are 6e(7); 7a(3); 7b(11) and (14); 7c(4),(6),(7),(11), and (16); 7d(4) and (8); 7e(3),(10), and (17); Attachment 1, Definitions (item 30 - Line Item Project, item 42 - Project, item 48 - Strategic System); and Attachment 2, Contractor Requirements Document (paragraph 1d regarding a project management system). The remainder of DOE O 430.1A remains in effect. Cancels DOE O 430.1. Canceled by DOE O 413.3.

  8. LEGACY MANAGEMENT REQUIRES INFORMATION

    SciTech Connect (OSTI)

    CONNELL, C.W.; HILDEBRAND, R.D.

    2006-12-14

    ''Legacy Management Requires Information'' describes the goal(s) of the US Department of Energy's Office of Legacy Management (LM) relative to maintaining critical records and the way those goals are being addressed at Hanford. The paper discusses the current practices for document control, as well as the use of modern databases for both storing and accessing the data to support cleanup decisions. In addition to the information goals of LM, the Hanford Federal Facility Agreement and Consent Order, known as the ''Tri-Party Agreement'' (TPA) is one of the main drivers in documentation and data management. The TPA, which specifies discrete milestones for cleaning up the Hanford Site, is a legally binding agreement among the US Department of Energy (DOE), the Washington State Department of Ecology (Ecology), and the US Environmental Protection Agency (EPA). The TPA requires that DOE provide the lead regulatory agency with the results of analytical laboratory and non-laboratory tests/readings to help guide them in making decisions. The Agreement also calls for each signatory to preserve--for at least ten years after the Agreement has ended--all of the records in its or its contractors, possession related to sampling, analysis, investigations, and monitoring conducted. The tools used at Hanford to meet TPA requirements are also the tools that can satisfy the needs of LM.

  9. Waste Management Committee | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Waste Management Committee Waste Management Committee Waste Management Committee Waste Management Committee Mission Statement The Northern New Mexico Citizens' Advisory Board (NNMCAB) Waste Management (WM) Committee reviews policies, practices and procedures, existing and proposed to provide recommendations, advice, suggestions and opinions to the US Department of Energy (DOE), regarding the waste management operations of Los Alamos National Laboratory (LANL), including Environmental Management

  10. Project Management Plans | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management Plans Project Management Plans The purpose here is to assist project managers and project planners in creating a project plan by providing examples and pointing to information that have been successfully used by others in the past. Project Management Plans (353.99 KB) More Documents & Publications Project Management Plan Examples Project Management Plan Examples 1 - 80 Deactivation Management

  11. Management & Administration | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management & Administration Management & Administration Management & Administration The Office of Management and Administration directs the development, coordination, and execution of overall OIG management and administrative policy and planning. This responsibility includes directing the OIG's strategic planning process, financial management activities, personnel management and security programs, administrative support services, and information resources programs. In addition, the

  12. management | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    management No Fear Act The NNSA Office of Civil Rights is committed to upholding anti-discrimination and civil rights laws. This is the NNSA reporting page for the Notification and Federal Employee Anti-discrimination and Retaliation Act of 2002 (No Fear Act), Public Law 207-174. Signed by President... EEO Complaints Information for Managers Managers & supervisors are often confused when an EEO complaint is filed naming them. This page is intended to provide managers & supervisors with

  13. Project Management Improvements Drive Progress

    Broader source: Energy.gov [DOE]

    WASHINGTON, D.C. ā€“ Improving project management has been a top priority of EMā€™s senior leadership.

  14. Managing Financing Programs- Spreadsheet Models

    Broader source: Energy.gov [DOE]

    This webinar, held on Jan. 24, 2011, provides a tutorial for managing financing programs through excel spreadsheets.

  15. Categorical Exclusion Determinations: Environmental Management...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Consolidated Business Service Center Categorical Exclusion Determinations: Environmental Management Consolidated Business Service Center Categorical Exclusion Determinations issued ...

  16. Quality assurance and data management

    SciTech Connect (OSTI)

    Lockrem, L.L.

    1998-01-12

    This report contains graphs and tables relating to quality assurance and data management for environmental quality at Hanford Reservation.

  17. PORTFOLIO MANAGEMENT | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    PORTFOLIO MANAGEMENT PORTFOLIO MANAGEMENT PORTFOLIO MANAGEMENT Once LPO closes a loan or loan guarantee, projects are monitored and evaluated throughout project development, construction, commissioning, and operation until the loan has been repaid in full. LPO's team of financial, technical, environmental, and legal professionals is dedicated to advancing an all-of-the-above energy strategy that avoids, reduces, or sequesters greenhouse gases. PORTFOLIO MANAGEMENT DIVISION (PMD) After financial

  18. ADMINISTRATIVE SUPPORT INFORMATION MANAGEMENT ADMINISTRATIVE...

    National Nuclear Security Administration (NNSA)

    TECHNICAL WRITEREDITOR NETWORK SYSTEMS ANALYST WEB DESIGN AND DEVELOPMENT SUPPORT TECHNOLOGIST PROGRAMMERANALYST WEB DESIGNER AND DEVELOPER SENIOR MANAGER, DEPUTY CHIEF ...

  19. NIF & Photon Science Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    management NIF & Photon Science Management The management team for the NIF & Photon Science Principal Directorate supports the directorate's key mission areas: Stockpile Stewardship, national security applications, NIF Discovery Science, laser-based directed energy and related laser and optical technologies, and advanced photon technologies. Directorate Programs Jeff Wisoff Principal Associate Director NIF & Photon Science Jeff Atherton Principal Deputy Principal Associate Director

  20. Office of Management and Budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Office of Management and Budget

  1. Guide to Scientific Management | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Guide to Scientific Management A Practical Guide to Scientifıc Management for Postdocs and New Faculty. PDF icon Guide to Scientific Management second edition.pdf

  2. Office of Project Management Oversight & Assessments | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Office of Project Management Oversight & Assessments Career Development Project Management Career Development Program (DOE Only) Acquisition Career Management Program (DOE Only)...

  3. Information Management Governance Council | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management Governance Council Information Management Governance Council Describes the establishment of the Information Management Governance Council and What They Do. PDF icon...

  4. Ethanol Capital Management | Open Energy Information

    Open Energy Info (EERE)

    Management Jump to: navigation, search Name: Ethanol Capital Management Place: Tucson, Arizona Zip: 85711 Product: Manages funds investing in Ethanol plants in the US Coordinates:...

  5. Solar International Management Inc | Open Energy Information

    Open Energy Info (EERE)

    International Management Inc Jump to: navigation, search Name: Solar International Management Inc Place: Washington,DC, Washington, DC Zip: 20006 Sector: Solar Product: Manager of...

  6. GHG Management Institute | Open Energy Information

    Open Energy Info (EERE)

    GHG Management Institute Jump to: navigation, search Name: GHG Management Institute Address: Greenhouse Gas Management Institute 9215 View Avenue NW Seattle, WA USA 98117 Place:...

  7. Records Management Handbook | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Records Management Handbook (628.31 KB) More Documents & Publications Records Management Handbook PROCEDURE FOR CONDUCTING A RECORDS INVENTORY Information and Records Management ...

  8. Federal Energy Management Program Report Template | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Federal Energy Management Program Report Template Federal Energy Management Program Report Template Template to create reports for the Federal Energy Management Program (FEMP)...

  9. Project Management Information Systems (PMIS) | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Project Management Information Systems (PMIS) Project Management Information Systems (PMIS) Project Assessment & Reporting System (PARS IIe) Office of Project Management Oversight...

  10. Green Capital Management | Open Energy Information

    Open Energy Info (EERE)

    Capital Management Jump to: navigation, search Name: Green Capital Management Place: London, United Kingdom Zip: SW10 0BB Sector: Services Product: The Green Capital Management...

  11. Change Control Management Guide - DOE Directives, Delegations...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    20, Change Control Management Guide by Ruben Sanchez Functional areas: Program Management, Project Management The Guide provides a suggested approach and uniform guidance for...

  12. TPA Project Manager's Lists - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    TPA Project Manager's Lists Tri-Party Agreement The Agreement Announcements List of Approved Changes TPA Project Manager's Lists Modifications for Public Comment Data Management...

  13. DOE - Office of Legacy Management -- GJP

    Office of Legacy Management (LM)

    Responsibility for management and long-term custody of the site's contaminated groundwater transferred to DOE's Office of Legacy Management in 2003. Management requirements include ...

  14. DOE - Office of Legacy Management -- GJD

    Office of Legacy Management (LM)

    Responsibility for custody and long-term management of the site transferred to DOE's Office of Legacy Management in 2003. Management responsibilities include routine inspection and ...

  15. DOE - Office of Legacy Management -- GJO

    Office of Legacy Management (LM)

    (D&D) Program, the Office of Legacy Management manages the Grand Junction ... The site transferred to the Office of Legacy Management in 2003 and requires routine ...

  16. Interagency Energy Management Task Force Members

    Broader source: Energy.gov [DOE]

    The Interagency Energy Management Task Force is led by the Federal Energy Management Program director. Members include energy and sustainability managers from federal agencies.

  17. Generation Investment Management LLP | Open Energy Information

    Open Energy Info (EERE)

    Investment Management LLP Jump to: navigation, search Name: Generation Investment Management LLP Place: London, Greater London, United Kingdom Zip: W1J 0AH Product: Fund manager of...

  18. PPPO Program Management | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management PPPO Program Management PPPO provides program and operations management for the cleanup of the former gaseous diffusion plant sites at Portsmouth, Ohio and Paducah, ...

  19. Project Management Perspective - Paul Bosco, Director, Office...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Project Management Perspective - Paul Bosco, Director, Office of Acquisition and Project Management Project Management Perspective - Paul Bosco, Director, Office of Acquisition and ...

  20. Fermilab | Directorate | Office of Project Management Oversight...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Office of Project Management Oversight Fermilab ManagementNon-Scientific Projects Current Management Projects IARC OTE Building Liquid Argon Test Building (LArTB) TeV ...