Powered by Deep Web Technologies
Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass...

2

V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication  

Broader source: Energy.gov (indexed) [DOE]

3: RSA Authentication Agent Lets Remote Users Bypass 3: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements PLATFORM: RSA Authentication Agent 7.1, 7.1.1 for Microsoft Windows ABSTRACT: A vulnerability was reported in RSA Authentication Agent. REFERENCE LINKS: RSA SecurCare SecurityTracker Alert ID: 1028230 CVE-2013-0931 IMPACT ASSESSMENT: Medium DISCUSSION: On systems configured for Quick PIN Unlock, the system will request a PIN instead of a full Passcode when the session is activated from an active screensaver after the Quick PIN Unlock timeout has expired. RSA Authentication Agent on Windows Vista, Windows 7, Windows 2008, and

3

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain  

Broader source: Energy.gov (indexed) [DOE]

1: RSA Adaptive Authentication Bugs Let Remote Users Bypass 1: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls December 14, 2011 - 8:17am Addthis PROBLEM: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may be able to bypass certain security controls. reference LINKS: SecurityTracker Alert ID: 1026420 Security Focus: ESA-2011-036 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA Adaptive Authentication (On-Premise). A remote user may be able to bypass certain security controls. A remote user can send specially crafted data elements to affect the Device

4

V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

V-057: eXtplorer "ext_find_user()" Authentication Bypass V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis December 28 2012 - 6:00am PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA51636 eXtplorer 2.1.3 Security Release IMPACT ASSESSMENT: Medium DISCUSSION: eXtplorer was notified of a problem within the authentication system of eXtplorer Versions 2.1.2, 2.1.1, 2.1.0 and 2.1.0RC5 that have been found to be vulnerable to an authentication bypass bug.

5

V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

7: eXtplorer "ext_find_user()" Authentication Bypass 7: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA51636 eXtplorer 2.1.3 Security Release IMPACT ASSESSMENT: Medium DISCUSSION: eXtplorer was notified of a problem within the authentication system of eXtplorer Versions 2.1.2, 2.1.1, 2.1.0 and 2.1.0RC5 that have been found to be vulnerable to an authentication bypass bug. IMPACT: An error within the "ext_find_user()" function in users.php can be

6

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass...  

Broader source: Energy.gov (indexed) [DOE]

Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may...

7

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication |  

Broader source: Energy.gov (indexed) [DOE]

7: Barracuda SSL VPN Bug Lets Remote Users Bypass 7: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication January 25, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN. PLATFORM: The vulnerability has been verified to exist in Barracuda SSL VPN version 2.2.2.203 ABSTRACT: A remote user can gain administrative access to the target system. REFERENCE LINKS: SecurityTracker Alert ID: 1028039 Barracuda Networks Advisory IMPACT ASSESSMENT: High DISCUSSION: A remote user can set a specially crafted Java system property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database dumps, shutdown the system, and set new administrative

8

U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and  

Broader source: Energy.gov (indexed) [DOE]

44: McAfee Email Gateway Lets Remote Users Bypass Authentication 44: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks August 27, 2012 - 7:00am Addthis PROBLEM: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks PLATFORM: McAfee Email Gateway (MEG) 7.0.0 and 7.0.1 (MEG 6.7.x is NOT affected.) McAfee Email and Web Security (EWS) 5.6 Patch 3 and earlier McAfee Email and Web Security (EWS) 5.5 Patch 6 and earlier ABSTRACT: Several vulnerabilities were reported in McAfee Email Gateway. reference LINKS: McAfee Security Bulletin ID: SB10026 SecurityTracker Alert ID: 1027444

9

U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and  

Broader source: Energy.gov (indexed) [DOE]

4: McAfee Email Gateway Lets Remote Users Bypass Authentication 4: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks August 27, 2012 - 7:00am Addthis PROBLEM: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks PLATFORM: McAfee Email Gateway (MEG) 7.0.0 and 7.0.1 (MEG 6.7.x is NOT affected.) McAfee Email and Web Security (EWS) 5.6 Patch 3 and earlier McAfee Email and Web Security (EWS) 5.5 Patch 6 and earlier ABSTRACT: Several vulnerabilities were reported in McAfee Email Gateway. reference LINKS: McAfee Security Bulletin ID: SB10026 SecurityTracker Alert ID: 1027444

10

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication...  

Broader source: Energy.gov (indexed) [DOE]

property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database...

11

T-646: Debian fex authentication bypass | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

6: Debian fex authentication bypass 6: Debian fex authentication bypass T-646: Debian fex authentication bypass June 14, 2011 - 3:45pm Addthis PROBLEM: The vulnerability is caused due to the application not properly verifying the existence of "auth-ID" when uploading files and can be exploited to bypass the authentication mechanism. PLATFORM: Debian fex ABSTRACT: Debian security discovered that fex, a web service for transferring very large, files, is not properly validating authentication IDs. While the service properly validates existing authentication IDs, an attacker who is not specifying any authentication ID at all, can bypass the authentication procedure. reference LINKS: DSA-2259-1 fex Secunia Advisory SA44940 Debian Security Advisory DSA-2259-1 fex-20110610.tar Vulnerability Report: Debian GNU/Linux 6.0

12

V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability  

Broader source: Energy.gov (indexed) [DOE]

6: MediaWiki CentralAuth Extension Authentication Bypass 6: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability September 6, 2013 - 4:36am Addthis PROBLEM: A vulnerability has been reported in the CentralAuth extension for MediaWiki, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: MediaWiki CentralAuth Extension ABSTRACT: A vulnerability has been reported in the CentralAuth extension for MediaWik REFERENCE LINKS: Secunia Advisory SA54723 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an error when handling auto-logins and can be exploited to bypass the authentication mechanism by providing a valid username within the "centralauth_User" cookie. IMPACT:

13

T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without...  

Broader source: Energy.gov (indexed) [DOE]

LDAP Authentication Bug Lets Remote Users Bypass Authentication U-185: OpenLDAP May Ignore TLSCipherSuite Setting in Some Cases T-535: Oracle Critical Patch Update - January 2011...

14

U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

0: JBoss Operations Network LDAP Authentication Bug Lets Remote 0: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication March 21, 2012 - 7:00am Addthis PROBLEM: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication PLATFORM: JBoss Operations Network 2.x ABSTRACT: A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases. reference LINKS: SecurityTracker Alert ID: 1026826 Secunia Advisory SA48471 CVE-2012-1100 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based

15

T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass  

Broader source: Energy.gov (indexed) [DOE]

7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users 7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information August 31, 2011 - 12:00pm Addthis PROBLEM: A vulnerability was reported in Apache Tomcat. A remote user can bypass authentication or obtain potentially sensitive information. PLATFORM: Apache Tomcat 5.5.0 to 5.5.33, 6.0.0 to 6.0.33, 7.0.0 to 7.0.20 ABSTRACT: Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. reference LINKS: SecurityTracker Alert ID: 1025993 CVE-2011-3190 (under review) Apache Tomcat Security Updates IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can bypass

16

V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints |  

Broader source: Energy.gov (indexed) [DOE]

0: Apache Tomcat Bug Lets Remote Users Bypass Security 0: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints December 5, 2012 - 1:00am Addthis PROBLEM: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints PLATFORM: Version(s): 6.0.0 - 6.0.35, 7.0.0 - 7.0.29 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat Red Hat Bugzilla - Bug 883634 SecurityTracker Alert ID: 1027833 CVE-2012-3546 IMPACT ASSESSMENT: High DISCUSSION: When using FORM authentication it was possible to bypass the security constraint checks in the FORM authenticator by appending /j_security_check to the end of the URL if some other component (such as the Single-Sign-On valve) had called request.setUserPrincipal() before the call to

17

U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass  

Broader source: Energy.gov (indexed) [DOE]

7: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass 7: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access August 29, 2012 - 6:00am Addthis PROBLEM: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access PLATFORM: EMC Cloud Tiering Appliance (CTA) 7.4 and prior EMC Cloud Tiering Appliance Virtual Edition (CTA/VE) 7.4 and prior EMC Cloud Tiering Appliance (CTA) 9.0 and prior EMC Cloud Tiering Appliance Virtual Edition (CTA/VE) 9.0 and prior ABSTRACT: A vulnerability was reported in EMC Cloud Tiering Appliance. reference LINKS: SecurityTracker Alert ID: 1027448 Bugtraq ID: 55250 EMC.com CVE-2012-2285 IMPACT ASSESSMENT:

18

User Authentication Policy | Argonne Leadership Computing Facility  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Eureka / Gadzooks Eureka / Gadzooks Policies Pullback Policy ALCF Acknowledgment Policy Account Sponsorship & Retention Policy Accounts Policy Data Policy INCITE Quarterly Report Policy Job Scheduling Policy on BG/P Job Scheduling Policy on BG/Q Refund Policy Software Policy User Authentication Policy Documentation Feedback Please provide feedback to help guide us as we continue to build documentation for our new computing resource. [Feedback Form] User Authentication Policy Users of the Argonne production systems are required to use a CRYPTOCard one time password, multifactor authentication system. This document explains the policies users must follow regarding CRYPTOCard tokens for accessing the Argonne resources. MultiFactor Authentication "Authentication systems are frequently described by the authentication

19

U-234: Oracle MySQL User Login Security Bypass Vulnerability | Department  

Broader source: Energy.gov (indexed) [DOE]

234: Oracle MySQL User Login Security Bypass Vulnerability 234: Oracle MySQL User Login Security Bypass Vulnerability U-234: Oracle MySQL User Login Security Bypass Vulnerability August 14, 2012 - 7:00am Addthis PROBLEM: Oracle MySQL User Login Security Bypass Vulnerability PLATFORM: Version(s): prior to 5.1.63 and 5.5.25 are vulnerable. ABSTRACT: Oracle MySQL is prone to a security bypass vulnerability Attackers can exploit this issue to bypass certain security restrictions. REFERENCE LINKS: http://www.securityfocus.com/bid/53911/discuss CVE-2012-2122 IMPACT ASSESSMENT: Medium Discussion: Security researchers have released details about a vulnerability in the MySQL server that could allow potential attackers to access MySQL databases without inputting proper authentication credentials.The vulnerability is identified as CVE-2012-2122 and was addressed in MySQL 5.1.63 and 5.5.25 in

20

T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...  

Broader source: Energy.gov (indexed) [DOE]

8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

U-188: MySQL User Login Security Bypass and Unspecified Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

8: MySQL User Login Security Bypass and Unspecified 8: MySQL User Login Security Bypass and Unspecified Vulnerability U-188: MySQL User Login Security Bypass and Unspecified Vulnerability June 12, 2012 - 7:00am Addthis PROBLEM: A security issue and vulnerability have been reported in MySQL PLATFORM: MySQL 5.x ABSTRACT: An error when verifying authentication attempts can be exploited to bypass the authentication mechanism. Reference LINKS: Original Advisory CVE-2012-2122 Secunia Advisory 49409 IMPACT ASSESSMENT: High Discussion: Successful exploitation of this vulnerability requires MySQL to be built on a system with a library that allows "memcmp()" to return a value outside of the -128 through 127 range (e.g. sse-optimized glibc). NOTE: Vendor binaries are reportedly not affected. The security issue is reported in versions prior to 5.1.63 and 5.5.25.

22

T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

94: IBM solidDB Password Hash Authentication Bypass 94: IBM solidDB Password Hash Authentication Bypass Vulnerability T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability April 4, 2011 - 6:08am Addthis PROBLEM: A vulnerability has been reported in IBM solidDB, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: IBM solidDB 4.x - IBM solidDB 6.x ABSTRACT: This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability. REFERENCE LINKS: IBM Security Alert Secunia Advisory: SA44030 ZDI Advisory: ZDI-11-115 IBM solidDB Support IMPACT ASSESSMENT: Medium Discussion: The specific flaw exists within the solid.exe process which listens by default on TCP ports 1315, 1964 and 2315. The authentication protocol

23

Challenges and architectural approaches for authenticating mobile users  

Science Journals Connector (OSTI)

This paper casts an architectural eye at existing work on security and privacy in mobile computing. Specifically, it focuses on authentication as it leads up to access control from two points of view: servicer providers granting access to users, and ... Keywords: access control, anonymity, authentication, mobile computing, trust, ubiquitous computing, user mobility

Joăo Pedro Sousa

2008-05-01T23:59:59.000Z

24

V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session  

Broader source: Energy.gov (indexed) [DOE]

5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct 5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks May 14, 2013 - 12:08am Addthis PROBLEM: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks PLATFORM: Tomcat 6.0.21 to 6.0.36, 7.0.0 to 7.0.32 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat SecurityTracker Alert ID: 1028534 CVE-2013-2067 IMPACT ASSESSMENT: High DISCUSSION: A remote user can repeatedly send a specially crafted request for a resource requiring authentication while the target user is completing the login form to cause the FORM authentication process to execute the remote user's request with the privileges of the target user.

25

V-195: RSA Authentication Manager Lets Local Users View the Administrative  

Broader source: Energy.gov (indexed) [DOE]

95: RSA Authentication Manager Lets Local Users View the 95: RSA Authentication Manager Lets Local Users View the Administrative Account Password V-195: RSA Authentication Manager Lets Local Users View the Administrative Account Password July 9, 2013 - 12:51am Addthis PROBLEM: RSA Authentication Manager Lets Local Users View the Administrative Account Password PLATFORM: RSA Authentication Manager 7.1, 8.0 ABSTRACT: A vulnerability was reported in RSA Authentication Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028742 CVE-2013-3273 RSA IMPACT ASSESSMENT: Medium DISCUSSION: When the RSA Authentication Manager Software Development Kit (SDK) is used to develop a custom application that connects with RSA Authentication Manager and the trace logging is set to verbose, the administrative account password used by the custom application is written in clear text to trace

26

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated 2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates February 28, 2012 - 8:45am Addthis PROBLEM: A vulnerability was reported in PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY DEFINER, a remote authenticated user can execute a trigger function and gain elevated privileges CVE-2012-0866.

27

U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP  

Broader source: Energy.gov (indexed) [DOE]

6: Apache CXF Lets Remote Authenticated Users Execute 6: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions September 24, 2012 - 6:00am Addthis PROBLEM: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions PLATFORM: This vulnerability affects all released versions of Apache CXF. ABSTRACT: A vulnerability was reported in Apache CXF reference LINKS: SecurityTracker Alert ID: 1027554 Apache CXF Security Advisories Apache CXF Advisory - CVE-2012-3451 CVE-2012-3451 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache CXF. A remote authenticated user can execute unauthorized commands on the target web service. Impact: A remote authenticated user can execute potentially unauthorized actions on

28

U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP  

Broader source: Energy.gov (indexed) [DOE]

6: Apache CXF Lets Remote Authenticated Users Execute 6: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions September 24, 2012 - 6:00am Addthis PROBLEM: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions PLATFORM: This vulnerability affects all released versions of Apache CXF. ABSTRACT: A vulnerability was reported in Apache CXF reference LINKS: SecurityTracker Alert ID: 1027554 Apache CXF Security Advisories Apache CXF Advisory - CVE-2012-3451 CVE-2012-3451 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache CXF. A remote authenticated user can execute unauthorized commands on the target web service. Impact: A remote authenticated user can execute potentially unauthorized actions on

29

V-223: RSA Authentication Agent for PAM Allows Remote Users to Make  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

3: RSA Authentication Agent for PAM Allows Remote Users to Make 3: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts V-223: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts August 21, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in RSA Authentication Agent for PAM PLATFORM: RSA Authentication Agent for PAM 7.0.2 and prior ABSTRACT: A remote user can make unlimited login attempts REFERENCE LINKS: Security Tracker Alert ID 1028930 CVE-2013-3271 IMPACT ASSESSMENT: Medium DISCUSSION: The system does not restrict the number of login attempts made via the agent IMPACT: System Access SOLUTION: Vendor has issued a fix Addthis Related Articles U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability

30

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

704: RSA enVision Lets Remote Users View Files and Remote 704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

31

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

4: RSA enVision Lets Remote Users View Files and Remote 4: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

32

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Broader source: Energy.gov (indexed) [DOE]

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

33

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Broader source: Energy.gov (indexed) [DOE]

84: Cisco Digital Media Manager Lets Remote Authenticated Users 84: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges January 19, 2012 - 9:00am Addthis PROBLEM: A remote authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not properly validate unreferenced URLs. REFERENCE LINKS: Vendor Advisory SecurityTracker Alert ID: 1026541 CVE-2012-0329 IMPACT ASSESSMENT: medium Discussion: Cisco Show and Share is not directly affected by this vulnerability, but a user can exploit the Cisco Digital Media Manager to gain full access to Cisco Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port

34

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Broader source: Energy.gov (indexed) [DOE]

4: Cisco Digital Media Manager Lets Remote Authenticated Users 4: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges January 19, 2012 - 9:00am Addthis PROBLEM: A remote authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not properly validate unreferenced URLs. REFERENCE LINKS: Vendor Advisory SecurityTracker Alert ID: 1026541 CVE-2012-0329 IMPACT ASSESSMENT: medium Discussion: Cisco Show and Share is not directly affected by this vulnerability, but a user can exploit the Cisco Digital Media Manager to gain full access to Cisco Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port

35

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Broader source: Energy.gov (indexed) [DOE]

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

36

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users  

Broader source: Energy.gov (indexed) [DOE]

0: Apache VCL Input Validation Flaw Lets Remote Authenticated 0: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges May 7, 2013 - 12:01am Addthis PROBLEM: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Apache VCL Versions: 2.1, 2.2, 2.2.1, 2.3, 2.3.1 ABSTRACT: A vulnerability was reported in Apache VCL. REFERENCE LINKS: Apache Securelist SecurityTracker Alert ID: 1028515 CVE-2013-0267 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated administrative user with minimal administrative privileges (i.e., nodeAdmin, manageGroup, resourceGrant, or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges.

37

V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions |  

Broader source: Energy.gov (indexed) [DOE]

5: Adobe ColdFusion Lets Local Users Bypass Sandbox 5: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions December 12, 2012 - 2:00am Addthis PROBLEM: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions PLATFORM: ColdFusion 10, 9.0.2, 9.0.1 and 9.0 for Windows, Macintosh and UNIX ABSTRACT: A vulnerability was reported in Adobe ColdFusion. REFERENCE LINKS: SecurityTracker Alert ID: 1027853 Adobe Vulnerability identifier: APSB12-26 CVE 2012-5675 IMPACT ASSESSMENT: High DISCUSSION: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This hotfix resolves a vulnerability which could result in a sandbox permissions violation in a shared hosting environment. Adobe recommends users update their product installation using

38

U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

54: Webmin Flaws Let Remote Authenticated Users Execute 54: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files September 10, 2012 - 6:00am Addthis PROBLEM: Webmin Multiple Input Validation Vulnerabilities PLATFORM: The vulnerabilities are reported in version 1.580. Other versions may also be affected. ABSTRACT: An authenticated attacker may be able to execute arbitrary commands. reference LINKS: Webmin Security Alerts Bugtraq ID: 55446 Secunia Advisory SA50512 SecurityTracker Alert ID: 1027507 US CERT Vulnerability Note VU#788478 CVE-2012-2981 CVE-2012-2982 CVE-2012-2983 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities have been reported in Webmin, which can be exploited by malicious users to compromise a vulnerable system and by

39

T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid  

Broader source: Energy.gov (indexed) [DOE]

5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a 5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in OpenLDAP. A remote user can authenticate without a valid password. PLATFORM: Open LDAP version(s) 2.4.12 - 2.2.24 ABSTRACT: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password. reference LINKS: SecurityTracker Alert ID:1025190 Secunia Advisory:SA43331 OpenLDAP Issue OpenLDAP Download CVE-2011-1025 IMPACT ASSESSMENT: Medium Discussion: A remote user with knowledge of the target distinguished name can provide an arbitrary password to successfully authenticate on systems using the NDB back-end. Impact: Some vulnerabilities have been reported in OpenLDAP, which can be exploited

40

T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain  

Broader source: Energy.gov (indexed) [DOE]

8: HP Virtual Server Environment Lets Remote Authenticated 8: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges April 22, 2011 - 7:47am Addthis PROBLEM: A vulnerability was reported in HP Virtual Server Environment. A remote authenticated user can obtain elevated privileges on the target system. PLATFORM: HP Virtual Server Environment prior to v6.3 ABSTRACT: A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges. reference LINKS: HP Document ID: c02749050 SecurityTracker Alert ID: 1025429 CVE-2011-1724 HP Insight Software media set 6.3 HP Technical Knowledge Base Discussion: System management and security procedures must be reviewed frequently to

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and 36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls January 18, 2011 - 2:30pm Addthis PROBLEM: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls. PLATFORM: Cisco 5500 Series Adaptive Security Appliances (ASA) ABSTRACT: Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software vary depending on the specific vulnerability. Cisco ASA 5500 Series Adaptive Security Appliances may experience a TCP connection exhaustion condition (no new TCP connections are accepted) that can be triggered through the receipt of specific TCP segments during the

42

U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA®  

Broader source: Energy.gov (indexed) [DOE]

7: RSA® Authentication Agent 7.1 for Microsoft Windows® and 7: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability September 25, 2012 - 6:00am Addthis PROBLEM: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability PLATFORM: Product: RSA Authentication Agent for Microsoft Windows version 7.1 Platforms: Windows XP and Windows 2003 Product: RSA Authentication Client 3.5 Platforms: Windows XP and Windows 2003 ABSTRACT: RSA Authentication Agent Lets Remote Authenticated Users Bypass an Authentication Step reference LINKS: SecurityTracker Alert ID: 1027559 Bugtraq ID: 55662

43

SECURING UNFAMILAR SYSTEM ENTRY POINTS AGAINST FAULTY USER AUTHENTICATION VIA  

E-Print Network [OSTI]

of electromagnetic interference produced by these circuits. Furthermore, this paper outlines a novel approach to user the electromagnetic interference produced by the keyboard device, making it considerably harder to isolate

Thornton, Mitchell

44

A Primary User Authentication System for Mobile Cognitive Radio Networks  

E-Print Network [OSTI]

portion of the licensed spectrum to establish network commu- nications. Essential to the co Cognitive radio technology is expected to increase the spectrum utilization by allowing opportunistic use of the idle portion of the licensed spectrum by Secondary (unlincensed) Users (SUs) [1], [9], [15], [17

Lazos, Loukas

45

Enhancing security of electronic health records through grid-based user authentication scheme  

Science Journals Connector (OSTI)

Medical research and electronic health record (EHR) maintenance involves large databases that are geographically distributed which calls naturally for a grid computing environment. Huge data in medical image analysis, storage and genome processing demand large medical data storage and computing power. Data sharing, software specialisation and data processing which occur in a heterogeneous way tend to make use of the grid computing environment for the medical field. The security solution for authentication in the existing grid environment is non-scalable. This major drawback can hinder the growth of the user community in the medical field. A simple user authentication scheme is proposed, which enhances the security of the overall system but takes less time for execution and lesser communication cost.

G. Jaspher Willsie Kathrine; E. Kirubakaran; Elijah Blessing Rajsingh

2014-01-01T23:59:59.000Z

46

V-036: EMC Smarts Network Configuration Manager Database Authentication  

Broader source: Energy.gov (indexed) [DOE]

6: EMC Smarts Network Configuration Manager Database 6: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability November 29, 2012 - 3:30am Addthis PROBLEM: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability PLATFORM: EMC Smarts Network Configuration Manager (NCM) all versions prior 9.1 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: EMC Identifier: ESA-2012-057 Secunia Advisory SA51408 SecurityTracker Alert ID: 1027812 CVE-2012-4614 CVE-2012-4615 IMPACT ASSESSMENT: Medium DISCUSSION: The systems uses a hard-coded key to encrypt authentication credentials on the target system [CVE-2012-4615]. A local user with knowledge of the key

47

U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication...  

Broader source: Energy.gov (indexed) [DOE]

7.0.0 and 7.0.1 (MEG 6.7.x is NOT affected.) McAfee Email and Web Security (EWS) 5.6 Patch 3 and earlier McAfee Email and Web Security (EWS) 5.5 Patch 6 and earlier ABSTRACT:...

48

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users  

Broader source: Energy.gov (indexed) [DOE]

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain 9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication May 1, 2012 - 7:00am Addthis PROBLEM: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 6) ABSTRACT: A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration. reference LINKS: SecurityTracker Alert ID: 1026990 CVE-2011-3620 Red Hat advisory IMPACT ASSESSMENT: High Discussion: Qpid may accept arbitrary passwords and SASL mechanims. A remote user on the local private interconnect network with knowledge of a valid cluster

49

V-195: RSA Authentication Manager Lets Local Users View the Administra...  

Broader source: Energy.gov (indexed) [DOE]

can view the administrative account password SOLUTION: The vendor has issued a fix (Patch 26 (P26) for RSA Authentication Manager 7.1 Service Pack 4 (SP4) and Appliance 3.0...

50

U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

1: Microsoft Active Directory CRL Validation Flaw Lets Remote 1: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication November 9, 2011 - 8:30am Addthis PROBLEM: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Active Directory Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows 7 for 32-bit Systems Windows 7 for 32-bit Systems Service Pack 1

51

CAH and Shared Services Transition Plan CAH will move seven servers that provide daily operational services such as user authentication and access, central file  

E-Print Network [OSTI]

CAH and Shared Services Transition Plan CAH will move seven servers that provide daily operational the university's NET domain. Domains provide user authentication, access, and management to resources divide the transition plan, and each phase has goals and a deadline. The overall goal is to continue

Wu, Shin-Tson

52

Multi-factor authentication  

DOE Patents [OSTI]

Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

Hamlet, Jason R; Pierson, Lyndon G

2014-10-21T23:59:59.000Z

53

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications  

E-Print Network [OSTI]

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

Sabatini, David M.

54

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...  

Broader source: Energy.gov (indexed) [DOE]

or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges. IMPACT: A remote authenticated user can...

55

A generic mechanism for efficient authentication in B3G networks  

Science Journals Connector (OSTI)

A user in Beyond 3rd Generation (B3G) networks in order to get access to the network services must perform a multi-pass authentication procedure, which includes two or three sequential authentications steps. These multiple authentication steps include ... Keywords: Authentication performance, B3G networks, B3G security, Multi-pass authentication, Security binding

Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis

2010-06-01T23:59:59.000Z

56

T-709:Mac OS X Keychain Certificate Settings Can Be Bypassed...  

Broader source: Energy.gov (indexed) [DOE]

09:Mac OS X Keychain Certificate Settings Can Be Bypassed By Remote Users T-709:Mac OS X Keychain Certificate Settings Can Be Bypassed By Remote Users September 2, 2011 - 12:00pm...

57

PAAS: A Privacy-Preserving Attribute-based Authentication System for eHealth Networks  

E-Print Network [OSTI]

PAAS: A Privacy-Preserving Attribute-based Authentication System for eHealth Networks Linke Guo PAAS which leverages users' verifiable attributes to authenticate users in eHealth systems while

Latchman, Haniph A.

58

Ch.3 User Authentication Textbook?  

E-Print Network [OSTI]

· account lockout mechanisms · policies against using common passwords but rather hard to guess passwords

Dong, Yingfei

59

V-231: Cisco Identity Services Engine Discloses Authentication Credentials  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

1: Cisco Identity Services Engine Discloses Authentication 1: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users August 30, 2013 - 3:01am Addthis PROBLEM: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials. PLATFORM: Cisco Identity Services Engine (ISE) 1.x ABSTRACT: A vulnerability was reported in Cisco Identity Services Engine REFERENCE LINKS: SecurityTracker Alert ID: 1028965 CVE-2013-3471 IMPACT ASSESSMENT: Meduim DISCUSSION: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials.The system stores the username and password of an authenticated user within hidden HTML form fields. A

60

V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain  

Broader source: Energy.gov (indexed) [DOE]

3: Adobe ColdFusion Bugs Let Remote Users Gain Access and 3: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information January 7, 2013 - 1:00am Addthis PROBLEM: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information PLATFORM: ColdFusion 10, 9.0.2, 9.0.1 and 9.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe has identified three vulnerabilities affecting ColdFusion for Windows, Macintosh and UNIX REFERENCE LINKS: Adobe Security Bulletin APSA13-01 SecurityTracker Alert ID: 1027938 CVE-2013-0625 CVE-2013-0629 CVE-2013-0631 IMPACT ASSESSMENT: High DISCUSSION: A remote user can bypass authentication and take control of the target system [CVE-2013-0625]. Systems with password protection disabled or with no password set are affected.

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Broader source: Energy.gov (indexed) [DOE]

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

62

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Broader source: Energy.gov (indexed) [DOE]

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

63

Two-Factor Authentication  

Broader source: Energy.gov [DOE]

Two-Factor Authentication (2FA) is a system wherein two different methods are used to authenticate an individual. 2FA is based on something you know (a secret PIN) and something you have (an...

64

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

65

V-220: Juniper Security Threat Response Manager Lets Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

0: Juniper Security Threat Response Manager Lets Remote 0: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands August 17, 2013 - 4:01am Addthis PROBLEM: A remote authenticated user can execute arbitrary commands on the target system. PLATFORM: 2010.0, 2012.0, 2012.1, 2013.1 ABSTRACT: A vulnerability was reported in Juniper Security Threat Response Manager (STRM) REFERENCE LINKS: SecurityTracker Alert ID: 1028921 CVE-2013-2970 IMPACT ASSESSMENT: High DISCUSSION: A remote authenticated user can inject commands to execute arbitrary operating system commands with the privileges of the target web service. This can be exploited to gain shell access on the target device.

66

V-174: RSA Authentication Manager Writes Operating System, SNMP...  

Broader source: Energy.gov (indexed) [DOE]

SNMP, and HTTP plug-in proxy passwords. SOLUTION: The vendor has issued a fix (8.0 Patch 1 (P1)). Addthis Related Articles V-195: RSA Authentication Manager Lets Local Users...

67

Method and system for normalizing biometric variations to authenticate users from a public database and that ensures individual biometric data privacy  

DOE Patents [OSTI]

A password system comprises a set of codewords spaced apart from one another by a Hamming distance (HD) that exceeds twice the variability that can be projected for a series of biometric measurements for a particular individual and that is less than the HD that can be encountered between two individuals. To enroll an individual, a biometric measurement is taken and exclusive-ORed with a random codeword to produce a "reference value." To verify the individual later, a biometric measurement is taken and exclusive-ORed with the reference value to reproduce the original random codeword or its approximation. If the reproduced value is not a codeword, the nearest codeword to it is found, and the bits that were corrected to produce the codeword to it is found, and the bits that were corrected to produce the codeword are also toggled in the biometric measurement taken and the codeword generated during enrollment. The correction scheme can be implemented by any conventional error correction code such as Reed-Muller code R(m,n). In the implementation using a hand geometry device an R(2,5) code has been used in this invention. Such codeword and biometric measurement can then be used to see if the individual is an authorized user. Conventional Diffie-Hellman public key encryption schemes and hashing procedures can then be used to secure the communications lines carrying the biometric information and to secure the database of authorized users.

Strait, Robert S. (Oakland, CA); Pearson, Peter K. (Livermore, CA); Sengupta, Sailes K. (Livermore, CA)

2000-01-01T23:59:59.000Z

68

T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls...

69

Authentication ofAuthentication ofAuthentication ofAuthentication of Degree Certificates Application Form Name in Full  

E-Print Network [OSTI]

Authentication ofAuthentication ofAuthentication ofAuthentication of Degree Certificates Application Form Name in Full Name in Full as Registered at King's Date of Birth Student ID number (IE degree certificate copies for authentication to: PLEASE REMEMBER TO INCLUDE COPIES OF YOUR CERTIFICATE(S

Applebaum, David

70

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain...  

Broader source: Energy.gov (indexed) [DOE]

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass...

71

V-017: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities  

Broader source: Energy.gov (indexed) [DOE]

7: Apache Tomcat Security Bypass and Denial of Service 7: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities V-017: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities November 6, 2012 - 6:00am Addthis PROBLEM: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities PLATFORM: Apache Tomcat 5.x Apache Tomcat 6.x Apache Tomcat 7.x ABSTRACT: Two vulnerabilities were reported in Apache Tomcat REFERENCE LINKS: Apache.org Apache Tomcat Denial of Service Apache Tomcat DIGEST authentication weaknesses Secunia Advisory SA51138 CVE-2012-2733 CVE-2012-3439 IMPACT ASSESSMENT: Medium DISCUSSION: A weakness and a vulnerability have been reported in Apache Tomcat, which can be exploited by malicious people to bypass certain security restrictions and cause a DoS (Denial of Service). 1) An error within the "parseHeaders()" function

72

U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code | Department  

Broader source: Energy.gov (indexed) [DOE]

6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code 6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Obtain Information and Let Local Users Bypass Authentication. PLATFORM: iOS 3.0 through 5.0 for iPhone 3GS iPhone 4 and iPhone 4S iOS 3.1 through 5.0 for iPod touch (3rd generation) and later iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 ABSTRACT: A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. reference LINKS: Apple Security Article: HT5052 Apple Product Security SecurityTracker Alert ID: 1026311 IMPACT ASSESSMENT:

73

T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

6: RSA Adaptive Authentication Has Unspecified Remote 6: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw August 18, 2011 - 3:09pm Addthis PROBLEM: A vulnerability was reported in RSA Adaptive Authentication. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3, 6.0.2.1 SP2 and SP2 Patch 1, 6.0.2.1 SP3 ABSTRACT: An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. reference LINKS: Security Tracker: 1025956

74

V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

6: HP-UX Directory Server Discloses Passwords to Remote 6: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users May 29, 2013 - 12:32am Addthis PROBLEM: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users PLATFORM: Directory Server B.08.10.04 ABSTRACT: Two vulnerabilities were reported in HP-UX Directory Server. REFERENCE LINKS: HP Document ID: c03772083 SecurityTracker Alert ID: 1028593 CVE-2012-2678 CVE-2012-2746 IMPACT ASSESSMENT: High DISCUSSION: A local user can access the plaintext password in certain cases [CVE-2012-2678]. A remote authenticated user can can view the password for a target LDAP user when audit logging is enabled by reading the audit log [CVE-2012-2678].

75

Authentication of quantum messages.  

SciTech Connect (OSTI)

Authentication is a well-studied area of classical cryptography: a sender A and a receiver B sharing a classical private key want to exchange a classical message with the guarantee that the message has not been modified or replaced by a dishonest party with control of the communication line. In this paper we study the authentication of messages composed of quantum states. We give a formal definition of authentication in the quantum setting. Assuming A and B have access to an insecure quantum channel and share a private, classical random key, we provide a non-interactive scheme that both enables A to encrypt and authenticate (with unconditional security) an m qubit message by encoding it into m + s qubits, where the probability decreases exponentially in the security parameter s. The scheme requires a private key of size 2m + O(s). To achieve this, we give a highly efficient protocol for testing the purity of shared EPR pairs. It has long been known that learning information about a general quantum state will necessarily disturb it. We refine this result to show that such a disturbance can be done with few side effects, allowing it to circumvent cryptographic protections. Consequently, any scheme to authenticate quantum messages must also encrypt them. In contrast, no such constraint exists classically: authentication and encryption are independent tasks, and one can authenticate a message while leaving it publicly readable. This reasoning has two important consequences: On one hand, it allows us to give a lower bound of 2m key bits for authenticating m qubits, which makes our protocol asymptotically optimal. On the other hand, we use it to show that digitally signing quantum states is impossible, even with only computational security.

Barnum, Howard; Crépeau, Jean-Claude; Gottesman, D. (Daniel); Smith, A. (Adam); Tapp, Alan

2001-01-01T23:59:59.000Z

76

U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame  

Broader source: Energy.gov (indexed) [DOE]

2: RSA Authentication Manager Flaws Permit Cross-Site and 2: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other versions may also be affected. ABSTRACT: RSA Authentication Manager is prone to multiple security vulnerabilities because it fails to properly sanitize user-supplied input. Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be possible.

77

V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws  

Broader source: Energy.gov (indexed) [DOE]

4: RSA Adaptive Authentication (On-Premise) Input Validation 4: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks November 27, 2012 - 2:00am Addthis PROBLEM: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks PLATFORM: RSA Adaptive Authentication (On-Premise) 6.x ABSTRACT: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). REFERENCE LINKS: SecurityTracker Alert ID: 1027811 SecurityFocus Security Alert RSA Customer Support CVE-2012-4611 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). A remote user can conduct cross-site scripting attacks. The software does not

78

Bypass Flow Study  

SciTech Connect (OSTI)

The purpose of the fluid dynamics experiments in the MIR (Matched Index of-Refraction) flow system at Idaho National Laboratory (INL) is to develop benchmark databases for the assessment of Computational Fluid Dynamics (CFD) solutions of the momentum equations, scalar mixing, and turbulence models for the flow ratios between coolant channels and bypass gaps in the interstitial regions of typical prismatic standard fuel element (SFE) or upper reflector block geometries of typical Modular High-temperature Gas-cooled Reactors (MHTGR) in the limiting case of negligible buoyancy and constant fluid properties. The experiments use Particle Image Velocimetry (PIV) to measure the velocity fields that will populate the bypass flow study database.

Richard Schultz

2011-09-01T23:59:59.000Z

79

PAKE-based mutual HTTP authentication for preventing phishing attacks  

E-Print Network [OSTI]

This paper describes a new password-based mutual authentication protocol for Web systems which prevents various kinds of phishing attacks. This protocol provides a protection of user's passwords against any phishers even if dictionary attack is employed, and prevents phishers from imitating a false sense of successful authentication to users. The protocol is designed considering interoperability with many recent Web applications which requires many features which current HTTP authentication does not provide. The protocol is proposed as an Internet Draft submitted to IETF, and implemented in both server side (as an Apache extension) and client side (as a Mozilla-based browser and an IE-based one). The paper also proposes a new user-interface for this protocol which is always distinguishable from fake dialogs provided by phishers.

Oiwa, Yutaka; Takagi, Hiromitsu

2009-01-01T23:59:59.000Z

80

V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

6: Citrix Access Gateway Unspecified Security Bypass 6: Citrix Access Gateway Unspecified Security Bypass Vulnerability V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability March 7, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Citrix Access Gateway PLATFORM: Standard Edition 5.0.x prior to 5.0.4.223524. Versions 4.5.x and 4.6.x are not affected by this vulnerability ABSTRACT: A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA52479 Security Tracker Alert ID 1028255 com/id/1028255 CVE-2013-2263 Citrix Knowledge Center IMPACT ASSESSMENT: High DISCUSSION: The vulnerability could allow an unauthenticated user to gain access to network resources. IMPACT:

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

A Novel Trigon based Dual Authentication Protocol for Enhancing Security in Grid Environment  

E-Print Network [OSTI]

In recent times, a necessity has been raised in order to distribute computing applications often across grids. These applications are dependent on the services like data transfer or data portal services as well as submission of jobs. Security is of utmost importance in grid computing applications as grid resources are heterogeneous, dynamic, and multidomain. Authentication remains as the significant security challenge in grid environment. In traditional authentication protocol a single server stores the sensitive user credentials, like username and password. When such a server is compromised, a large number of user passwords, will be exposed. Our proposed approach uses a dual authentication protocol in order to improve the authentication service in grid environment. The protocol utilizes the fundamental concepts of trigon and based on the parameters of the trigon the user authentication will be performed. In the proposed protocol, the password is interpreted and alienated into more than one unit and these uni...

Ruckmani, V

2010-01-01T23:59:59.000Z

82

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , Jinsong Han2  

E-Print Network [OSTI]

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems Li Lu1 , Jinsong Han2 an emerging requirement ­ protecting user privacy [13] in RFID authentications. In most RFID systems, tags sensitive information. For example, without pri- vacy protection, any reader can identify a consumer's ID

Liu, Yunhao

83

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , Jinsong Han2  

E-Print Network [OSTI]

- sitive information. For example, without privacy pro- tection, any reader can identify a consumer's IDDynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems Li Lu1 , Jinsong Han2 an emerging requirement ­ protecting user privacy [13] in RFID authentications. In most RFID systems, tags

Liu, Yunhao

84

QKD Quantum Channel Authentication  

E-Print Network [OSTI]

Several simple yet secure protocols to authenticate the quantum channel of various QKD schemes, by coupling the photon sender's knowledge of a shared secret and the QBER Bob observes, are presented. It is shown that Alice can encrypt certain portions of the information needed for the QKD protocols, using a sequence whose security is based on computational-complexity, without compromising all of the sequence's entropy. It is then shown that after a Man-in-the-Middle attack on the quantum and classical channels, there is still enough entropy left in the sequence for Bob to detect the presence of Eve by monitoring the QBER. Finally, it is shown that the principles presented can be implemented to authenticate the quantum channel associated with any type of QKD scheme, and they can also be used for Alice to authenticate Bob.

J. T. Kosloski

2006-04-02T23:59:59.000Z

85

Key recycling in authentication  

E-Print Network [OSTI]

In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

Christopher Portmann

2012-02-06T23:59:59.000Z

86

U-212: RSA Authentication Manager Flaws Permit Cross-Site and...  

Broader source: Energy.gov (indexed) [DOE]

actions on the site acting as the target user. Solution: The vendor has issued a fix (Patch 14 (P14) for RSA Authentication Manager 7.1 SP4 and Appliance 3.0 SP4). Addthis...

87

V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP  

Broader source: Energy.gov (indexed) [DOE]

4: RSA Authentication Manager Writes Operating System, SNMP, 4: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files June 10, 2013 - 12:47am Addthis PROBLEM: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files PLATFORM: RSA Authentication Manager 8.0 ABSTRACT: A vulnerability was reported in RSA Authentication Manager. REFERENCE LINKS: RSA SecurityTracker Alert ID: 1028638 CVE-2013-0947 IMPACT ASSESSMENT: Medium DISCUSSION: The system may write operating system, SNMP, and HTTP plug-in proxy passwords in clear text to log and configuration files. IMPACT: A local user can obtain operating system, SNMP, and HTTP plug-in proxy

88

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users  

Broader source: Energy.gov (indexed) [DOE]

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information November 2, 2012 - 6:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information PLATFORM: Apple iOS prior to 6.0.1 ABSTRACT: Three vulnerabilities were reported in Apple iOS. REFERENCE LINKS: Apple Article: HT5567 SecurityTracker Alert ID: 1027716 Bugtraq ID: 56363 CVE-2012-3748 CVE-2012-3749 CVE-2012-3750 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the

89

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users...

90

CERTIFICATE OF AUTHENTICITY  

Broader source: Energy.gov (indexed) [DOE]

CERTIFICATE OF AUTHENTICITY CERTIFICATE OF AUTHENTICITY I hereby certify that this transcript constitutes an accurate record of the full Council meeting of the National Coal Council held on November 14,2008 at the Westin Grand Hotel, Washington, D.C. ~ i c h a e l G. Mueller, Chair National Coal Council I NATIONAL COAL COUNCIL 1 FULL COUNCIL MEETING FRIDAY NOVEMBER 14, 2 0 0 8 The Full Council meeting convened at 9 : 0 0 a.m. in the Washington Ballroom of the Westin Grand Hotel, 2 3 5 0 M Street, NW, Washington, DC, Chair Michael G. Mueller presiding. ATTENDEES: MIKE MUELLER, Arneren Energy Fuels & Services Company, Chair RICH EIMER, Dynegy Inc., Vice-Chair ROBERT BECK, National Coal Council, Executive Vice-President SY ALI, Clean Energy Consulting BARB ALTIZER, Eastern Coal Council

91

V-216: Drupal Monster Menus Module Security Bypass and Script Insertion  

Broader source: Energy.gov (indexed) [DOE]

216: Drupal Monster Menus Module Security Bypass and Script 216: Drupal Monster Menus Module Security Bypass and Script Insertion Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and Script Insertion Vulnerabilities August 12, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities have been reported in the Monster Menus module for Drupal PLATFORM: Drupal Monster Menus Module 6.x and 7.x ABSTRACT: The vulnerabilities can be exploited by malicious users to bypass certain security restrictions and conduct script insertion attacks. REFERENCE LINKS: Secunia Advisory SA54391 Drupal Security Advisory CVE-2013-4229 CVE-2013-4230 IMPACT ASSES SMENT: Medium DISCUSSION: 1) Input passed via the title when editing page settings is not properly sanitised before being edited the next time. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's

92

T-606: Sun Java System Access Manager Lets Remote Users Partially Modify  

Broader source: Energy.gov (indexed) [DOE]

06: Sun Java System Access Manager Lets Remote Users Partially 06: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data April 20, 2011 - 3:58am Addthis PROBLEM: Two vulnerabilities were reported in Sun Java System Access Manager. A remote authenticated user can partially access data on the target system. A remote user can partially modify data on the target system. PLATFORM: Sun Java versions 7.1, 8.0 ABSTRACT: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data. reference LINKS: SecurityTracker Alert ID: 1025408 CVE-2011-0844 CVE-2011-0847 Oracle Critical Patch Update Advisory

93

V-036: EMC Smarts Network Configuration Manager Database Authenticatio...  

Energy Savers [EERE]

Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative...

94

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote...

95

Interventions in Infrainguinal Bypass Grafts  

SciTech Connect (OSTI)

The interventional radiologist plays an important role in the detection and prevention of infrainguinal bypass failure. Early detection and evaluation of flow-limiting lesions effectively preserve graft (venous bypass and polyester or expanded polytetrafluoroethylene bypass) patency by identifying stenoses before occlusion occurs. Delay in treatment of the at-risk graft may result in graft failure and a reduced chance of successful revascularization. For this reason, surveillance protocols form an important part of follow-up after infrainguinal bypass surgery. As well as having an understanding of the application of imaging techniques including ultrasound, MR angiography, CT angiography and digital subtraction angiography, the interventional radiologist should have detailed knowledge of the minimally invasive therapeutic options. Percutaneous transluminal angioplasty (PTA), or alternatively cutting balloon angioplasty, is the interventional treatment of choice in prevention of graft failure and occlusion. Further alternatives include metallic stent placement, fibrinolysis, and mechanical thrombectomy. Primary assisted patency rates following PTA can be up to 65% at 5 years. When the endovascular approach is unsuccessful, these therapeutic options are complemented by surgical procedures including vein patch revision, jump grafting, or placement of a new graft.

Mueller-Huelsbeck, S., E-mail: muehue@rad.uni-kiel.de; Order, B.-M.; Jahnke, T. [University Hospital Schleswig-Holstein - Campus Kiel, Department of Radiology (Germany)

2006-02-15T23:59:59.000Z

96

Secure Anonymous RFID Authentication Protocols Christy Chatmon  

E-Print Network [OSTI]

and scalable. Keywords: RFID, Authentication, Anonymity, Privacy, Availability, Scalability. 1 Introduction technology is to automatically identify objects that are contained in electromagnetic fields. RFID tags doSecure Anonymous RFID Authentication Protocols Christy Chatmon Computer & Information Sciences

Burmester, Mike

97

V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass  

Broader source: Energy.gov (indexed) [DOE]

4: EMC RSA Archer GRC Open Redirection Weakness and Security 4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September 4, 2013 - 6:00am Addthis PROBLEM: A weakness and a security issue have been reported in EMC RSA Archer GRC PLATFORM: EMC RSA Archer GRC 5.x ABSTRACT: This fixes multiple vulnerabilities, which can be exploited to bypass certain security restrictions and to conduct spoofing attacks REFERENCE LINKS: Secunia Advisory SA54717 SecurityTracker Alert ID 1028971 EMC Identifier: ESA-2013-057 CVE-2013-3276 CVE-2013-3277 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The application does not properly restrict deactivated users. This can be exploited by deactivated users to login and gain access to otherwise

98

T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticate...  

Broader source: Energy.gov (indexed) [DOE]

A vulnerability was reported in RSA Adaptive Authentication. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3, 6.0.2.1 SP2 and SP2 Patch 1, 6.0.2.1 SP3 ABSTRACT: An issue with...

99

TwoKind Authentication: Usable Authenticators for Untrustworthy Environments  

E-Print Network [OSTI]

damage if the session or their password is compromised. 1. INTRODUCTION In today's Internet. Current authentication mechanisms such as one-time passwords [4] (such as RSA SecurID [3]) and privileged-time passwords limit the damage caused by stolen passwords, but allow full-scale damage in a hijacked session

Smith, Sean W.

100

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote 11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories July 12, 2012 - 7:00am Addthis PROBLEM: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories PLATFORM: EMC Celerra Network Server versions 6.0.36.4 through 6.0.60.2 EMC VNX versions 7.0.12.0 through 7.0.53.1 EMC VNXe 2.0 (including SP1, SP2, and SP3) EMC VNXe MR1 (including SP1, SP2, SP3, and SP3.1) EMC VNXe MR2 (including SP0.1) ABSTRACT: A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system. reference LINKS: The Vendor's Advisory

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Biometric authentication system using reduced joint feature vector of iris and face  

Science Journals Connector (OSTI)

In this paper, we present the biometric authentication system based on the fusion of two user-friendly biometric modalities: Iris and Face. Using one biometric feature can lead to good results, but there is no reliable way to verify the classification. ...

Byungjun Son; Yillbyung Lee

2005-07-01T23:59:59.000Z

102

Integration of IEEE 802.21 services and pre-authentication framework  

Science Journals Connector (OSTI)

Providing multi-interface device users the ability to roam between different access networks is becoming a key requirement for service providers. The availability of multiple mobile broadband access technologies together with increasing use of real ... Keywords: IEEE 80221, MIH, MPA, authentication, handover performance, heterogeneous networks, media-independent handover, media-independent pre-, multi-interface devices, seamless mobility, testbed

Miriam Tauil; Ashutosh Dutta; Yuu-Heng Cheng; Subir Das; Donald Baker; Maya Yajnik; David Famolari; Yoshihiro Ohba; Kenichi Taniuchi; Victor Fajardo; Henning Schulzrinne

2010-07-01T23:59:59.000Z

103

V-216: Drupal Monster Menus Module Security Bypass and Script...  

Office of Environmental Management (EM)

Module Security Bypass and Denial of Service Vulnerability U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities...

104

V-186: Drupal Login Security Module Security Bypass and Denial...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

105

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerabil...  

Broader source: Energy.gov (indexed) [DOE]

or later. Addthis Related Articles V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

106

Demonstrated Petroleum Reduction Using Oil Bypass Filter Technology...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Demonstrated Petroleum Reduction Using Oil Bypass Filter Technology on Heavy and Light Vehicles Demonstrated Petroleum Reduction Using Oil Bypass Filter Technology on Heavy and...

107

V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote 1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service November 22, 2012 - 3:00am Addthis PROBLEM: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service PLATFORM: Version(s): XC10 2.0.0.0 - 2.0.0.3, 2.1.0.0 - 2.1.0.2 ABSTRACT: Several vulnerabilities were reported in IBM WebSphere DataPower. REFERENCE LINKS: IBM Security Bulletin SecurityTracker Alert ID: 1027798 CVE-2012-5758 CVE-2012-5759 CVE-2012-5756 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in IBM WebSphere DataPower. A remote

108

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Java vulnerability to deliver the Poison Ivy RAT onto the unsuspecting victims' machines August 27, 2012 U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication...

109

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

vulnerabilities were reported in Symantec Messaging Gateway. August 29, 2012 U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative...

110

Obfuscated authentication systems, devices, and methods  

DOE Patents [OSTI]

Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

Armstrong, Robert C; Hutchinson, Robert L

2013-10-22T23:59:59.000Z

111

CERTIFICATE OF AUTHENTICITY | Department of Energy  

Energy Savers [EERE]

D.C. Tran001.pdf CERTIFICATE OF AUTHENTICITY More Documents & Publications U.S. Offshore Wind Advanced Technology Demonstration Projects Public Meeting Transcript for...

112

A DAWP Technique for Audio Authentication  

Science Journals Connector (OSTI)

Digital audio content protection is part of information security for audio authentication and audio integrity evaluation. Watermarking is widely used in copyright protection. However, watermark requires a thir...

Tung-Shou Chen; Jeanne Chen; Jiun-Lin Tang; Keshou Wu

2011-01-01T23:59:59.000Z

113

Instructions for using HSPD-12 Authenticated Outlook Web Access...  

Energy Savers [EERE]

Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook...

114

Prospective Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Prospective Users Prospective Users Prospective Users Print The Advanced Light Source (ALS) welcomes researchers from universities, government labs, and industry who are interested in performing experiments at the general sciences and structural biology beamlines open to users. An overview of user opportunities, and the procedures to become a user, are outlined below: What is an ALS User? Research Facilities Available to Users Costs to Users Users from Industry User Policy How to Become an ALS User What is an ALS User? The ALS is a third generation synchrotron light source, providing over 35 beamlines, where samples may be illuminated with x-ray, ultraviolet or infrared light to explore the structure and electronic properties of materials. The ALS operates as a national user facility, and is open to researchers worldwide to submit proposals for research.

115

V-236: MediaWiki CentralAuth Extension Authentication Bypass...  

Energy Savers [EERE]

Web: http:energy.govcioservicesincident-management E-mail: circ@jc3.doe.gov JC3 services are available to JC3-Joint Cybersecurity Coordination Center, and JC3 Contractors....

116

Verifying authentication protocols with CSP Steve Schneider  

E-Print Network [OSTI]

Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

Doran, Simon J.

117

Prospective Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Prospective Users Print Prospective Users Print The Advanced Light Source (ALS) welcomes researchers from universities, government labs, and industry who are interested in performing experiments at the general sciences and structural biology beamlines open to users. An overview of user opportunities, and the procedures to become a user, are outlined below: What is an ALS User? Research Facilities Available to Users Costs to Users Users from Industry User Policy How to Become an ALS User What is an ALS User? The ALS is a third generation synchrotron light source, providing over 35 beamlines, where samples may be illuminated with x-ray, ultraviolet or infrared light to explore the structure and electronic properties of materials. The ALS operates as a national user facility, and is open to researchers worldwide to submit proposals for research.

118

T-606: Sun Java System Access Manager Lets Remote Users Partially...  

Broader source: Energy.gov (indexed) [DOE]

LINKS: SecurityTracker Alert ID: 1025408 CVE-2011-0844 CVE-2011-0847 Oracle Critical Patch Update Advisory IMPACT ASSESSMENT: Medium Discussion: A remote authenticated user can...

119

User Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Contacts for Users Contacts for Users User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m.

120

Bypass diode for a solar cell  

DOE Patents [OSTI]

Bypass diodes for solar cells are described. In one embodiment, a bypass diode for a solar cell includes a substrate of the solar cell. A first conductive region is disposed above the substrate, the first conductive region of a first conductivity type. A second conductive region is disposed on the first conductive region, the second conductive region of a second conductivity type opposite the first conductivity type.

Rim, Seung Bum (Palo Alto, CA); Kim, Taeseok (San Jose, CA); Smith, David D. (Campbell, CA); Cousins, Peter J. (Menlo Park, CA)

2012-03-13T23:59:59.000Z

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

AUTHENTICATED  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2. AMENDMENT OF AGREEMENT BPA and Port Townsend amend the Agreement as follows: (a) The following Section 2.24 ("Wheel Turning Load") shall be added to the Agreement: "2.24...

122

Deniable Authentication with RSA and Multicasting Daniel R. L. Brown  

E-Print Network [OSTI]

. Related concepts to deniable authentication are plausible deniability and prevention of surreptitious

123

Occurrence of Pesticides in Water, Sediment, and Soil from the Yolo Bypass, California  

E-Print Network [OSTI]

water and sediment from Yolo Bypass, California, 2004-2005.L. 2002. California’s Yolo Bypass: Evidence that floodfish. KEYWORDS pesticides, Yolo Bypass, fish, surface water,

Smalling, Kelly L.; Orlando, James L.; Kuivila, Kathryn M.

2007-01-01T23:59:59.000Z

124

User-centric identity as a service-architecture for eIDs with selective attribute disclosure  

Science Journals Connector (OSTI)

Unique identification and secure authentication of users are essential processes in numerous security-critical areas such as e-Government, e-Banking, or e-Business. Therefore, many countries (particularly in Europe) have implemented national eID solutions ... Keywords: Austrian eID, authentication, citizen card, cloud computing, identity management, privacy, public cloud, selective attribute disclosure

Daniel Slamanig, Klaus Stranacher, Bernd Zwattendorfer

2014-06-01T23:59:59.000Z

125

User Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Home Contact Home Contact User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m.

126

E-Print Network 3.0 - archeological gold authentication Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

't do. Tests and quizzes aren't the gold standard either. - Fixed-choice test questions tend... by authentic use & authentic assessment. 12;Authentic performance...

127

Hardware device binding and mutual authentication  

DOE Patents [OSTI]

Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

Hamlet, Jason R; Pierson, Lyndon G

2014-03-04T23:59:59.000Z

128

Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes  

DOE Patents [OSTI]

Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

Kent, Alexander Dale (Los Alamos, NM)

2008-09-02T23:59:59.000Z

129

User Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Services Print User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

130

User Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Services Print User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

131

User Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Services Print User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

132

User Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Services Print User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

133

User Guide  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Guide Guide User Guide Print 1. Apply for Beam Time Submit a new proposal or a Beam Time Request (BTR) using an existing active proposal. 2. Establish a User Agreement Your institute must have a signed agreement with Berkeley Lab before you may do work at the ALS. 3. Complete Experiment Safety Documentation and Review Safety for Users Safety documentation must be completed and reviewed before your beam time. Experiments involving any biological material or radioactive material require more review steps so please allow several weeks for these. 4. Register with the User Office New and returning users need to register with the User Office TWO weeks before arriving at the ALS. Users arriving out of regular office hours must either have a valid Berkeley Lab ID badge, or have completed registration to be granted access to the ALS.

134

User Obligations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Obligations User Obligations Summary of what APS expects of users in return for access to the facility. Registration Register with the APS as far in advance of your initial visit as possible (even when you are simply planning an experiment). User Agreement Ensure that a User Agreement is in place between the APS and your home institution. Training Ensure that you complete all required training before conducting hands-on work at the APS. Safety Assessement Complete Experiment Safety Assessment Forms. End of Experiment Form Complete End of Experiment form to provide feedback (required for General Users, optional for others). Published Reports of Work Carried Out at the APS As an APS user, you are required to notify both the APS and your host beamline staff of all work published in the open literature (including

135

A service-oriented architecture for authentication and authorization  

E-Print Network [OSTI]

THESIS A Service-oriented Architecture for AuthenticationSAN DIEGO A Service-oriented Architecture for Authentication2.0, which is a service-oriented architecture that addresses

Hamedtoolloei, Hamidreza

2009-01-01T23:59:59.000Z

136

User Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Services Print Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

137

User Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Services Print Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

138

CLOC: Authenticated Encryption for Short Input Tetsu Iwata1  

E-Print Network [OSTI]

. CLOC uses a variant of CFB mode in its encryption part and a variant of CBC MAC in the authentication

139

Deniable Authentication with RSA and Multicasting Daniel R. L. Brown  

E-Print Network [OSTI]

of surreptitious forwarding. The IETF S/MIME protocol, which can be used to secure email, includes an Authenticated

140

PAP: A Privacy and Authentication Protocol for Passive RFID Tags  

E-Print Network [OSTI]

PAP: A Privacy and Authentication Protocol for Passive RFID Tags Alex X. Liu LeRoy A. Bailey for RFID tags is necessary to ensure the privacy and authentication between each tag and their reader. In order to accomplish this, we propose PAP, a privacy and authentication protocol for passive RFID tags

Liu, Alex X.

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL  

E-Print Network [OSTI]

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL Christopher Mann and Daniel Loebenberger 15 August 2014 Abstract. We show how to realize two-factor authentication for a Bitcoin wal- let a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification

142

FORENSIC CONNOISSEURSHIP, JACKSON POLLOCK, AND THE AUTHENTIC EYE  

E-Print Network [OSTI]

FORENSIC CONNOISSEURSHIP, JACKSON POLLOCK, AND THE AUTHENTIC EYE by Francis V. O'Connor, Ph shall proceed to some general #12;Forensic Connoisseurship, Pollock, & The Authentic Eye - F. V. O, the training of authentic eyes and forensic connoisseurs -- concluding with a final thought on the historicity

Taylor, Richard

143

Robust video authentication system over internet protocol  

Science Journals Connector (OSTI)

This paper presents a video authentication system over internet protocol that is insusceptible to illumination and expression variations. The illumination and expression invariant features are extracted using multi-band feature extraction. These features are classified by a radial basis function neural network. A new adaptive decision fusion method is proposed to combine the scores from different modalities and the different frames during the authentication process. Three levels of decision fusion are carried out in the proposed adaptive decision fusion. Depending on the level of decision fusion, the level of illumination influence is taken into account during the decision making.

Sue Inn Ch'ng; Kah Phooi Seng; Li-Minn Ang; Fong Tien Ong; Yee Wan Wong

2011-01-01T23:59:59.000Z

144

Industrial Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Industrial Users - Media Publications and Information The Invisible Neutron Threat Neutron-Induced Failures in Semiconductor Devices Nuclear Science Research at the LANSCE-WNR...

145

Industrial Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

on altitude. This large flux allows testing of semiconductor devices at greatly accelerated rates. Industry users are invited to contact Steve Wender, phone:505-667-1344 or...

146

T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

74: Google Chrome Multiple Flaws Let Remote Users Execute 74: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass the pop-up blocker. PLATFORM: Google Chrome prior to 10.0.648.127 ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system. reference LINKS: Secunia Advisory: SA43683 Google Chrome Support Chrome Stable Release SecurityTracker Alert ID:1025181

147

Hoover Dam Bypass Project Phase II  

Broader source: Energy.gov (indexed) [DOE]

DOE/EA-1478 DOE/EA-1478 ENVIRONMENTAL ASSESSMENT Western' s Hoover Dam Bypass Project Phase II (Double-Circuiting a Portion of the Hoover-Mead #5 and #7 230-kV Transmission Lines with the Henderson-Mead #1 230-kV Transmission Line, Clark County, Nevada) Prepared for: U.S. Department of Energy Western Area Power Administration 615 S. 43 rd Avenue Phoenix, Arizona 85009 Prepared by: Transcon Environmental 3740 East Southern Avenue, Suite 218 Mesa, Arizona 85206 (480) 807-0095 October 2003 Western Area Power Administration Hoover Dam Bypass Project Phase II page i Environmental Assessment TABLE OF CONTENTS 1.0 INTRODUCTION ............................................................................................................................1 1.1 Background..................................................................................................................................1

148

Oil Bypass filter technology evaluation final report  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

6-01355 6-01355 U.S. Department of Energy FreedomCAR & Vehicle Technologies Program Oil Bypass Filter Technology Evaluation Final Report TECHNICAL REPORT Larry Zirker James Francfort Jordan Fielding March 2006 Idaho National Laboratory Operated by Battelle Energy Alliance INL/EXT-06-01355 U.S. Department of Energy FreedomCAR & Vehicle Technologies Program Oil Bypass Filter Technology Evaluation Final Report Larry Zirker James Francfort Jordan Fielding March 2006 Idaho National Laboratory Transportation Technology Department Idaho Falls, Idaho 83415 Prepared for the U.S. Department of Energy Assistant Secretary for Energy Efficiency and Renewable Energy Under DOE Idaho Operations Office Contract DE-AC07-05ID14517

149

Spatial Data Authentication Using Mathematical Visualization  

E-Print Network [OSTI]

Spatial Data Authentication Using Mathematical Visualization Vert, G., Harris, F., Nasser, S. Dept has become an increasingly compromised method to transmit any type of data including spatial data. Due to the criticality of spatial data in decision making processes that range from military targeting to urban planning

Harris Jr., Frederick C.

150

User Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Policy Print User Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs assurance of adequate access to the facility. On the other hand, qualified groups that make a large commitment of time and resources need some assurance of an equitable return on their investment. A national facility should be accessible to all qualified researchers and at the ALS there are three modes of access: as a General User, a member of an Approved Program (AP), or as a member of a Participating Research Team (PRT). All proposals for research to be conducted at the ALS are evaluated based on the criteria endorsed by the International Union of Pure and Applied Physics (IUPAP). These criteria are detailed on the IUPAP Web site at IUPAP Recommendations for the Use of Major Physics Users Facilities (pdf version).

151

T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

0:Samba SWAT 'user' Field Cross Site Scripting Vulnerability 0:Samba SWAT 'user' Field Cross Site Scripting Vulnerability T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability August 1, 2011 - 2:10pm Addthis PROBLEM: Samba SWAT 'user' Field Cross Site Scripting Vulnerability PLATFORM: All Linux ABSTRACT: It was found that the 'Change Password' page / screen of the Samba Web Administration Tool did not properly sanitize content of the user-provided "user" field, prior printing it back to the page content. A remote attacker could provide a specially-crafted URL, which once visited by an authenticated Samba SWAT user could allow the attacker to conduct cross-site scripting attacks (execute arbitrary HTML or script code). reference LINKS: SecurityFocus - Bugtraq ID: 48901 Secunia CVE Reference: CVE-2011-2694

152

T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

80:Samba SWAT 'user' Field Cross Site Scripting Vulnerability 80:Samba SWAT 'user' Field Cross Site Scripting Vulnerability T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability August 1, 2011 - 2:10pm Addthis PROBLEM: Samba SWAT 'user' Field Cross Site Scripting Vulnerability PLATFORM: All Linux ABSTRACT: It was found that the 'Change Password' page / screen of the Samba Web Administration Tool did not properly sanitize content of the user-provided "user" field, prior printing it back to the page content. A remote attacker could provide a specially-crafted URL, which once visited by an authenticated Samba SWAT user could allow the attacker to conduct cross-site scripting attacks (execute arbitrary HTML or script code). reference LINKS: SecurityFocus - Bugtraq ID: 48901 Secunia CVE Reference: CVE-2011-2694

153

U-246: Tigase XMPP Dialback Protection Bypass Vulnerability | Department of  

Broader source: Energy.gov (indexed) [DOE]

6: Tigase XMPP Dialback Protection Bypass Vulnerability 6: Tigase XMPP Dialback Protection Bypass Vulnerability U-246: Tigase XMPP Dialback Protection Bypass Vulnerability August 28, 2012 - 7:00am Addthis PROBLEM: Tigase XMPP Dialback Protection Bypass Vulnerability PLATFORM: Tigase 5.x ABSTRACT: A vulnerability has been reported in Tigase, which can be exploited by malicious people to bypass certain security restrictions. reference LINKS: XMPP Standards Foundation Secunia Advisory SA50362 tigase.org CVE-2012-4670 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to an error within the XMPP protocol implementation, which does not properly verify the "Verify Response" and "Authorization Response" messages. This can be exploited to spoof a domain and bypass the Dialback protection.

154

NIF Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

have never been created in a laboratory environment and exist naturally only during thermonuclear burn, in supernovae and in the fusion reactions that power our stars. The NIF User...

155

User Community  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Community Community Given the pressures of conducting experiments, it's sometimes hard to find time to connect with new potential colleagues, even though they may be working at the next beamline. There are many opportunities for making informal connections with other users and with APS staff; this page lists only a few of the many communication channels at the APS. Reaching Other Users Coffee Cart A source of morning sustenance and a chance to see who's been working in the hutch next to yours all night. An APS manager makes the rounds with the Coffee Cart each morning. Scientific Interest Groups Self-organizing groups of users and beamline staff interested in advancing synchrotron research in a particular area. User Science Seminars, General Seminars and Conferences

156

User Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Policy Policy User Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs assurance of adequate access to the facility. On the other hand, qualified groups that make a large commitment of time and resources need some assurance of an equitable return on their investment. A national facility should be accessible to all qualified researchers and at the ALS there are three modes of access: as a General User, a member of an Approved Program (AP), or as a member of a Participating Research Team (PRT). All proposals for research to be conducted at the ALS are evaluated based on the criteria endorsed by the International Union of Pure and Applied Physics (IUPAP). These criteria are detailed on the IUPAP Web site at IUPAP Recommendations for the Use of Major Physics Users Facilities (pdf version).

157

Bypass Pigging of Subsea Pipelines Suffering Wax Deposition.  

E-Print Network [OSTI]

?? Which criteria to pay attention to is important when finding the optimal pigging frequency. This thesis illustrates the forces acting on a bypass pig… (more)

Galta, Tore

2014-01-01T23:59:59.000Z

158

V-162: Apache Struts "ParameterInterceptor" Security Bypass Vulnerabil...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

to enable method execution and execute arbitrary methods, bypassing Struts and OGNL library protections. 2. Any unsanitized String variable exposed by an action and have it...

159

User Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Policy Print Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs assurance of adequate access to the facility. On the other hand, qualified groups that make a large commitment of time and resources need some assurance of an equitable return on their investment. A national facility should be accessible to all qualified researchers and at the ALS there are three modes of access: as a General User, a member of an Approved Program (AP), or as a member of a Participating Research Team (PRT). All proposals for research to be conducted at the ALS are evaluated based on the criteria endorsed by the International Union of Pure and Applied Physics (IUPAP). These criteria are detailed on the IUPAP Web site at IUPAP Recommendations for the Use of Major Physics Users Facilities (pdf version).

160

User Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Policy Print Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs assurance of adequate access to the facility. On the other hand, qualified groups that make a large commitment of time and resources need some assurance of an equitable return on their investment. A national facility should be accessible to all qualified researchers and at the ALS there are three modes of access: as a General User, a member of an Approved Program (AP), or as a member of a Participating Research Team (PRT). All proposals for research to be conducted at the ALS are evaluated based on the criteria endorsed by the International Union of Pure and Applied Physics (IUPAP). These criteria are detailed on the IUPAP Web site at IUPAP Recommendations for the Use of Major Physics Users Facilities (pdf version).

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Verifiable process monitoring through enhanced data authentication.  

SciTech Connect (OSTI)

To ensure the peaceful intent for production and processing of nuclear fuel, verifiable process monitoring of the fuel production cycle is required. As part of a U.S. Department of Energy (DOE)-EURATOM collaboration in the field of international nuclear safeguards, the DOE Sandia National Laboratories (SNL), the European Commission Joint Research Centre (JRC) and Directorate General-Energy (DG-ENER) developed and demonstrated a new concept in process monitoring, enabling the use of operator process information by branching a second, authenticated data stream to the Safeguards inspectorate. This information would be complementary to independent safeguards data, improving the understanding of the plant's operation. The concept is called the Enhanced Data Authentication System (EDAS). EDAS transparently captures, authenticates, and encrypts communication data that is transmitted between operator control computers and connected analytical equipment utilized in nuclear processes controls. The intent is to capture information as close to the sensor point as possible to assure the highest possible confidence in the branched data. Data must be collected transparently by the EDAS: Operator processes should not be altered or disrupted by the insertion of the EDAS as a monitoring system for safeguards. EDAS employs public key authentication providing 'jointly verifiable' data and private key encryption for confidentiality. Timestamps and data source are also added to the collected data for analysis. The core of the system hardware is in a security enclosure with both active and passive tamper indication. Further, the system has the ability to monitor seals or other security devices in close proximity. This paper will discuss the EDAS concept, recent technical developments, intended application philosophy and the planned future progression of this system.

Goncalves, Joao G. M. (European Commission Joint Research Centre, Italy); Schwalbach, Peter (European Commission Directorate General%3CU%2B2014%3EEnergy, Luxemburg); Schoeneman, Barry Dale; Ross, Troy D.; Baldwin, George Thomas

2010-09-01T23:59:59.000Z

162

Bypass diode for a solar cell  

DOE Patents [OSTI]

Methods of fabricating bypass diodes for solar cells are described. In once embodiment, a method includes forming a first conductive region of a first conductivity type above a substrate of a solar cell. A second conductive region of a second conductivity type is formed on the first conductive region. In another embodiment, a method includes forming a first conductive region of a first conductivity type above a substrate of a solar cell. A second conductive region of a second conductivity type is formed within, and surrounded by, an uppermost portion of the first conductive region but is not formed in a lowermost portion of the first conductive region.

Rim, Seung Bum; Kim, Taeseok; Smith, David D; Cousins, Peter J

2013-11-12T23:59:59.000Z

163

User Manual  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Manual Manual Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual Web Browser Interface (WBUI) Web Service Interface (API) FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net User Manual Introduction The OSCARS Interdomain Controller (IDC) allows end users to reserve high

164

V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution...  

Broader source: Energy.gov (indexed) [DOE]

2: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities December 21, 2012 -...

165

E-Print Network 3.0 - aortocoronary bypass surgery Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

by- pass surgery versus a femoral-femoral bypass procedure. In addition... In Vivo Validation of Numerical Prediction of Blood Flow in Arterial Bypass Grafts JOY ... Source:...

166

Oil Bypass Filter and Diesel Engine Idling Wear-Rate Evaluations...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Bypass Filter and Diesel Engine Idling Wear-Rate Evaluations Oil Bypass Filter and Diesel Engine Idling Wear-Rate Evaluations 2005 Diesel Engine Emissions Reduction (DEER)...

167

Formal analysis of device authentication applications in ubiquitous computing.  

SciTech Connect (OSTI)

Authentication between mobile devices in ad-hoc computing environments is a challenging problem. Without pre-shared knowledge, existing applications rely on additional communication methods, such as out-of-band or location-limited channels for device authentication. However, no formal analysis has been conducted to determine whether out-of-band channels are actually necessary. We answer this question through formal analysis, and use BAN logic to show that device authentication using a single channel is not possible.

Shin, Dongwan (New Mexico Tech, Socorro, NM); Claycomb, William R.

2010-11-01T23:59:59.000Z

168

U-268: Oracle Database Authentication Protocol Discloses Session...  

Broader source: Energy.gov (indexed) [DOE]

the authentication protocol at the time of this entry. Please visit the Oracle Critical Patch Updates, Security Alerts and Third Party Bulletin for additional information when it...

169

Dos and don'ts of client authentication on the web  

Science Journals Connector (OSTI)

Client authentication has been a continuous source of problems on the Web. Although many well-studied techniques exist for authentication, Web sites continue to use extremely weak authentication schemes, especially in non-enterprise environments such ...

Kevin Fu; Emil Sit; Kendra Smith; Nick Feamster

2001-08-01T23:59:59.000Z

170

Serious leisure, participation and experience in tourism: authenticity and ritual in a renaissance festival  

E-Print Network [OSTI]

the serious festival participation were reminiscent of tourism existential authenticity specified by Wang (1999) as two levels: intrapersonal authenticity (gaining one?s true self) and interpersonal authenticity (gaining true human relationship). A search...

Kim, Hyounggon

2005-02-17T23:59:59.000Z

171

V-237: TYPO3 Security Bypass Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

V-237: TYPO3 Security Bypass Vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities September 9, 2013 - 6:00am Addthis PROBLEM: Some vulnerabilities have been reported in TYPO3 PLATFORM: TYPO3 6.x ABSTRACT: TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations REFERENCE LINKS: Secunia Advisory SA54717 Security Focus ID 62257 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Some errors when handling file actions can be exploited to bypass file action permission restrictions and e.g. create or read arbitrary files within or outside the webroot. 2) An error when validating file names within the file renaming functionality can be exploited to bypass the denied file extensions check

172

V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and  

Broader source: Energy.gov (indexed) [DOE]

6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny 6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code January 24, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Cisco Wireless LAN Controller. PLATFORM: The vulnerabilities are reported in: Cisco 2000 Series WLC Cisco 2100 Series WLC Cisco 2500 Series WLC Cisco 4100 Series WLC Cisco 4400 Series WLC Cisco 5500 Series WLC Cisco 7500 Series WLC Cisco 8500 Series WLC Cisco 500 Series Wireless Express Mobility Controllers Cisco Wireless Services Module (Cisco WiSM) Cisco Wireless Services Module version 2 (Cisco WiSM version 2)

173

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and  

Broader source: Energy.gov (indexed) [DOE]

3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny 3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access June 21, 2013 - 6:00am Addthis PROBLEM: Three vulnerabilities were reported in Cisco TelePresence TC and TE PLATFORM: The following product models are affected by the vulnerabilities: Cisco TelePresence MX Series Cisco TelePresence System EX Series Cisco TelePresence Integrator C Series Cisco TelePresence Profiles Series running Cisco TelePresence Quick Set Series Cisco IP Video Phone E20 ABSTRACT: Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an

174

User Environment  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Environment Environment on Genepool When you log into the Genepool system you will land in your $HOME directory on NERSC's "global homes" file system. The global homes file system is mounted across all NERSC computation systems with the exception of PDSF. The $HOME directory has quota of 40GB and 1,000,000 inodes. To customize your environment, by setting environment variables or aliases, you will need to modify one of the "dot" files that NERSC has created for you. You may NOT modify the .bashrc or .cshrc files. These are set to read-only on NERSC systems and specify system specific customizations. Instead you should modify a file called .bashrc.ext or .cshrc.ext. Learn more about the global homes user environment. Important Environment Variables

175

User's Manual  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User's User's Manual for Pelegant - Yusong Wang, Michael Borland, Robert Soliday - APS Accelerator Systems Division, Advanced Photon Source 1 Introduction Pelegant stands for "parallel elegant," which is a parallelized version of elegant [1]. Written in the C programming language with MPICH, the Pelegant has been successfully ported to several clusters and supercomputers, such as the "weed" cluster (a heterogeneous system of 100 CPUs) at Advanced Photon Source (APS), and the Jazz cluster (350 Intel Xeon CPUs) at Argonne National Lab (ANL) and the BlueGene/L supercomputer (1024 dual PowerPC 440 nodes) at Argonne National Lab. Thanks to careful design in parallelization and good architecture of the serial elegant, the Pelegant achieves very good performance. For example, for a simulation of 10 5 particles in APS including symplectic element-by-element tracking,

176

Secure password-based authenticated key exchange for web services  

Science Journals Connector (OSTI)

This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based ... Keywords: authenticated key exchange, password, security, web services

Liang Fang; Samuel Meder; Olivier Chevassut; Frank Siebenlist

2004-10-01T23:59:59.000Z

177

Enhancing CardSpace Authentication Using a Mobile Device  

E-Print Network [OSTI]

, authentication. 1 Introduction In line with the continuing increase in the number of on-line services requir- ing design goals of CardSpace is to reduce reliance on password authentication. We address this limitation, since the additional overhead is handled by the client. The remainder of the paper is

Sheldon, Nathan D.

178

Extreme Users WHY engage with extreme users  

E-Print Network [OSTI]

Extreme Users METHOD WHY engage with extreme users HOW to engage extreme users Designers engage inspiration from their work-arounds and frameworks. When you speak with and observe extreme users, their needs extreme users are often also needs of a wider population. Determine who's extreme Determining who

Prinz, Friedrich B.

179

CFD Analysis of Core Bypass Phenomena  

SciTech Connect (OSTI)

The U.S. Department of Energy is exploring the potential for the VHTR which will be either of a prismatic or a pebble-bed type. One important design consideration for the reactor core of a prismatic VHTR is coolant bypass flow which occurs in the interstitial regions between fuel blocks. Such gaps are an inherent presence in the reactor core because of tolerances in manufacturing the blocks and the inexact nature of their installation. Furthermore, the geometry of the graphite blocks changes over the lifetime of the reactor because of thermal expansion and irradiation damage. The existence of the gaps induces a flow bias in the fuel blocks and results in unexpected increase of maximum fuel temperature. Traditionally, simplified methods such as flow network calculations employing experimental correlations are used to estimate flow and temperature distributions in the core design. However, the distribution of temperature in the fuel pins and graphite blocks as well as coolant outlet temperatures are strongly coupled with the local heat generation rate within fuel blocks which is not uniformly distributed in the core. Hence, it is crucial to establish mechanistic based methods which can be applied to the reactor core thermal hydraulic design and safety analysis. Computational Fluid Dynamics (CFD) codes, which have a capability of local physics based simulation, are widely used in various industrial fields. This study investigates core bypass flow phenomena with the assistance of commercial CFD codes and establishes a baseline for evaluation methods. A one-twelfth sector of the hexagonal block surface is modeled and extruded down to whole core length of 10.704m. The computational domain is divided vertically with an upper reflector, a fuel section and a lower reflector. Each side of the sector grid can be set as a symmetry boundary

Richard W. Johnson; Hiroyuki Sato; Richard R. Schultz

2010-03-01T23:59:59.000Z

180

CFD Analysis of Core Bypass Phenomena  

SciTech Connect (OSTI)

The U.S. Department of Energy is exploring the potential for the VHTR which will be either of a prismatic or a pebble-bed type. One important design consideration for the reactor core of a prismatic VHTR is coolant bypass flow which occurs in the interstitial regions between fuel blocks. Such gaps are an inherent presence in the reactor core because of tolerances in manufacturing the blocks and the inexact nature of their installation. Furthermore, the geometry of the graphite blocks changes over the lifetime of the reactor because of thermal expansion and irradiation damage. The existence of the gaps induces a flow bias in the fuel blocks and results in unexpected increase of maximum fuel temperature. Traditionally, simplified methods such as flow network calculations employing experimental correlations are used to estimate flow and temperature distributions in the core design. However, the distribution of temperature in the fuel pins and graphite blocks as well as coolant outlet temperatures are strongly coupled with the local heat generation rate within fuel blocks which is not uniformly distributed in the core. Hence, it is crucial to establish mechanistic based methods which can be applied to the reactor core thermal hydraulic design and safety analysis. Computational Fluid Dynamics (CFD) codes, which have a capability of local physics based simulation, are widely used in various industrial fields. This study investigates core bypass flow phenomena with the assistance of commercial CFD codes and establishes a baseline for evaluation methods. A one-twelfth sector of the hexagonal block surface is modeled and extruded down to whole core length of 10.704m. The computational domain is divided vertically with an upper reflector, a fuel section and a lower reflector. Each side of the one-twelfth grid can be set as a symmetry boundary

Richard W. Johnson; Hiroyuki Sato; Richard R. Schultz

2009-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,  

Broader source: Energy.gov (indexed) [DOE]

3: Apple Safari Multiple Flaws Let Remote Users Execute 3: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks July 21, 2011 - 1:27am Addthis PROBLEM: Multiple vulnerabilities were reported in Apple Safari. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. A remote user can bypass a certificate validation control. PLATFORM: Safari 5.1 and Safari 5.0.6 Products Affected: Safari 5 (Mac OS X 10.6), Safari 5 (Mac OS X 10.5), Product Security, Safari 5.1 (OS X Lion) ABSTRACT: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,

182

NIF User Group  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

users NIF User Group The National Ignition Facility User Group provides an organized framework and independent vehicle for interaction between the scientists who use NIF for...

183

EA-1262: McKay Bypass Canal Extension, Golden, Colorado  

Broader source: Energy.gov [DOE]

This EA evaluates the environmental impacts for the proposal to extend the McKay Bypass Canal in order to route water from the existing Canal north of the Walnut Creek drainage on the east side of...

184

Thermal Bypass Air Barriers in the 2009 International Energy...  

Energy Savers [EERE]

of thermal bypass air barriers, which led to their inclusion in ENERGY STAR for Homes Version 3 specifications in 2006 and then to inclusion in the 2009 IECC. Since...

185

U-201: HP System Management Homepage Bugs Let Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

1: HP System Management Homepage Bugs Let Remote Users Deny 1: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in HP System Management Homepage. PLATFORM: Version(s): prior to 7.1.1 ABSTRACT: The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code. Reference links: Original Advisory Security Tracker ID 1027209 CVE-2012-2012, CVE-2012-2013, CVE-2012-2014 CVE-2012-2015, CVE-2012-2016 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP System Management Homepage. A remote authenticated user can gain elevated privileges. A remote authenticated

186

Bypass flow computations on the LOFA transient in a VHTR  

SciTech Connect (OSTI)

Bypass flow in the prismatic gas-cooled very high temperature reactor (VHTR) is not intentionally designed to occur, but is present in the gaps between graphite blocks. Previous studies of the bypass flow in the core indicated that the cooling provided by flow in the bypass gaps had a significant effect on temperature and flow distributions for normal operating conditions. However, the flow and heat transports in the core are changed significantly after a Loss of Flow Accident (LOFA). This study aims to study the effect and role of the bypass flow after a LOFA in terms of the temperature and flow distributions and for the heat transport out of the core by natural convection of the coolant for a 1/12 symmetric section of the active core which is composed of images and mirror images of two sub-region models. The two sub-region models, 9 x 1/12 and 15 x 1/12 symmetric sectors of the active core, are employed as the CFD flow models using computational grid systems of 70.2 million and 117 million nodes, respectively. It is concluded that the effect of bypass flow is significant for the initial conditions and the beginning of LOFA, but the bypass flow has little effect after a long period of time in the transient computation of natural circulation.

Yu-Hsin Tung [National Tsing Hua Univ., Hsinchu (Taiwan). Inst. of Nuclear Engineering and Science; Richard W. Johnson [Idaho National Laboratory (INL), Idaho Falls, ID (United States); Yuh-Ming Ferng [National Tsing Hua Univ., Hsinchu (Taiwan). Inst. of Nuclear Engineering and Science; Ching-Chang Chieng [City Univ. of Hong Kong, Kowloon (Hong Kong). Dept. of Mechanical and Biomedical Engineering

2014-01-01T23:59:59.000Z

187

2011 Raj JainCSE571SWashington University in St. Louis Authentication, Authorization,Authentication, Authorization,  

E-Print Network [OSTI]

23-1 ©2011 Raj JainCSE571SWashington University in St. Louis Authentication, Authorization://www.cse.wustl.edu/~jain/cse571-11/ #12;23-2 ©2011 Raj JainCSE571SWashington University in St. Louis OverviewOverview RADIUS 802.1X #12;23-3 ©2011 Raj JainCSE571SWashington University in St. Louis RADIUSRADIUS Remote

Jain, Raj

188

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

2: Oracle Java Reflection API Flaw Lets Remote Users Execute 2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am Addthis PROBLEM: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 7 Update 21; possibly other versions (1.7.0_21-b11) Java Server JRE is also affected. ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: SecurityTracker Alert ID: 1028466 Oracle IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create a specially crafted Java application that, when loaded and approved by the target user, will trigger a flaw in the Reflection API to bypass the security sandbox. IMPACT: A remote user can create a Java file that, when loaded by the target user,

189

V-198: Red Hat Enterprise MRG Messaging Qpid Python Certificate...  

Broader source: Energy.gov (indexed) [DOE]

Qpid Bug Lets Certain Remote Users Bypass Authentication T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-712: Red Hat Enterprise MRG Grid 2.0...

190

Secure password-based authenticated key exchange for web services  

SciTech Connect (OSTI)

This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

2004-11-22T23:59:59.000Z

191

T-659: Update support for RSA Authentication Manager | Department...  

Broader source: Energy.gov (indexed) [DOE]

Manager July 1, 2011 - 7:15am Addthis PROBLEM: Authentication Manager SP4 Patch 4 Windows Server 2008 PLATFORM: Windows Server 2008 SP4 Patch 4 32bit & 64bit...

192

Evaluation of Oil Bypass Filter Technology on Heavy-Duty Vehicles  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

(Advanced Vehicle Testing Activity) (Advanced Vehicle Testing Activity) Evaluation of Oil Bypass Filter Technology on Heavy-Duty Vehicles James Francfort American Filtration and Separations Society April 2005 Presentation Outline * Background & Objectives * Oil bypass filters - features & reported benefits * INL testing method * puraDYN oil bypass filters * Refined Global Solutions (RGS) oil bypass filters * Testing results & trends * Particulate and ferrography testing * Initial INL Oil Bypass Filter Economics * Potential fleet oil savings * Testing Status Bypass Filter Evaluation - Background * Funded by the U.S. Department of Energy's FreedomCAR & Vehicle Technologies Program (Advanced Vehicle Testing Activity) * Vehicles operated by Idaho National Laboratory's Fleet Operations group * Idaho National Laboratory

193

U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary 8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code January 25, 2012 - 6:00am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. PLATFORM: Version(s): 12.5 SP3; pcAnywhere Solutions 7.1 GA, SP 1, and SP 2 ABSTRACT: Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system. reference LINKS: Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to trigger a but in the validation of authentication data and execute arbitrary code.

194

V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

2: Samba smbd CPU Processing Loop Lets Remote Users Deny 2: Samba smbd CPU Processing Loop Lets Remote Users Deny Service V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny Service August 6, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba PLATFORM: Samba 3.0.x - 4.0.7 ABSTRACT: All current released versions of Samba are vulnerable to a denial of service on an authenticated or guest connection REFERENCE LINKS: Secunia Advisory SA54436 Samba Security Release CVE-2013-4124 IMPACT ASSESSMENT: Medium DISCUSSION: A malformed packet can cause the smbd server to loop the CPU performing memory allocations and preventing any further service. A connection to a file share, or a local account is needed to exploit this problem, either authenticated or unauthenticated if guest connections are allowed. This

195

V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability  

Broader source: Energy.gov (indexed) [DOE]

5: ModSecurity Multipart Message Parsing Security Bypass 5: ModSecurity Multipart Message Parsing Security Bypass Vulnerability V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability October 18, 2012 - 6:00am Addthis PROBLEM: ModSecurity Multipart Message Parsing Security Bypass Vulnerability PLATFORM: Modsecurity Versions prior to 2.70 ABSTRACT: SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions REFERENCE LINKS: SEC Consult Secunia Advisory SA49853 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an error when parsing multipart requests and can be exploited to bypass certain filtering rules. IMPACT: Remote Security Bypass SOLUTION: Update to version 2.70. Addthis Related Articles V-017: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities

196

HYDROLOGY AND CHEMISTRY OF FLOODWATERS IN THE YOLO BYPASS, SACRAMENTO RIVER SYSTEM, CALIFORNIA, DURING 2000.  

E-Print Network [OSTI]

HYDROLOGY AND CHEMISTRY OF FLOODWATERS IN THE YOLO BYPASS, SACRAMENTO RIVER SYSTEM, CALIFORNIA..................................................1 Introduction..............................................2 Hydrology of the Yolo Bypass....................7 Dissolved Metals....................................10 Samples collected by boat in the Yolo

197

2014 NERSC User Survey  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2014 NERSC User Survey 2014 NERSC User Survey December 17, 2014 by Francesca Verdier (0 Comments) Please take a few minutes to fill out NERSC's annual user survey. Your feedback is...

198

Safety for Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Safety for Users Print Safety at the ALS The mission of the ALS is "Support users in doing outstanding science in a safe environment." All users and staff participate in creating a...

199

Safety for Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Safety for Users Print Safety at the ALS The mission of the ALS is "Support users in doing outstanding science in a safe environment." All users and staff participate in creating...

200

Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc  

Broader source: Energy.gov (indexed) [DOE]

Factor Factor RSA Tokens with Citrix Workplace Environment (CWE) Revision 1.13 December, 2009 Associate CIO for Operations (IM) United States Department of Energy DOE HQ OCIO Application Hosting Environment Instructions for Using RSA Token with Citrix Workplace Environment Using Your RSA Token with Citrix Note: If you access Citrix Workplace from within the DOE network (DOEnet or VPN) then you do not need an RSA Two-Factor token. The Citrix Workplace logon screen will prompt you only for your Windows User name and Password. Step 1 - Establish a connection to the Internet and connect to https://workplace.doe.gov. Step 2 - Click "OK" to bypass the Government warning banner. DOE HQ OCIO Application Hosting Environment Instructions for Using RSA Token with Citrix Workplace Environment

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

General User Proposals  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

General User Proposals Print General Users are granted beam time through a peer review proposal process. They may use beamlines and endstations provided by the ALS or the...

202

General User Proposals  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Office General User Proposals Print General Users are granted beam time through a peer review proposal process. They may use beamlines and endstations provided by the ALS...

203

Floodwater Chemistry in the Yolo Bypass during Winter and Spring 1998  

E-Print Network [OSTI]

Floodwater Chemistry in the Yolo Bypass during Winter and Spring 1998 Open-File Report 2007­1025 U.S. Department of the Interior U.S. Geological Survey #12;Floodwater Chemistry in the Yolo Bypass during Winter-USGS Suggested citation: Schemel, L.E., Cox, M.H., 2007, Floodwater Chemistry in the Yolo Bypass during Winter

204

Using Semantics for Automating the Authentication of Web APIs  

E-Print Network [OSTI]

Abstract. Recent technology developments in the area of services on the Web are marked by the proliferation of Web applications and APIs. The implementation and evolution of applications based on Web APIs is, however, hampered by the lack of automation that can be achieved with current technologies. Research on semantic Web services is therefore trying to adapt the principles and technologies that were devised for traditional Web services, to deal with this new kind of services. In this paper we show that currently more than 80 % of the Web APIs require some form of authentication. Therefore authentication plays a major role for Web API invocation and should not be neglected in the context of mashups and composite data applications. We present a thorough analysis carried out over a body of publicly available APIs that determines the most commonly used authentication approaches. In the light of these results, we propose an ontology for the semantic annotation of Web API authentication information and demonstrate how it can be used to create semantic Web API descriptions. We evaluate the applicability of our approach by providing a prototypical implementation, which uses authentication annotations as the basis for automated service invocation. 1

Maria Maleshkova; Carlos Pedrinaci; John Domingue; Guillermo Alvaro; Ivan Martinez

205

Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding author)  

E-Print Network [OSTI]

1 Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding in the process algebra Communicating Sequential Processes (CSP) to specify authentication. The purpose, security protocols, CSP, formal specification, Kerberos 1. Introduction Schneider [1] uses Communicating

Doran, Simon J.

206

Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis  

Science Journals Connector (OSTI)

Authentication schemes relying on per-packet signature and per-signature verification introduce heavy cost for computation and communication. Due to its constraint resources, smart grid's authentication requirement cannot be satisfied by this scheme. ...

Depeng Li; Zeyar Aung; John R. Williams; Abel Sanchez

2012-01-01T23:59:59.000Z

207

Cycling firing method for bypass operation of bridge converters  

SciTech Connect (OSTI)

The bridge converter comprises a number of switching elements and an electronic logic system which regulated the electric power levels by controlling the firing, i.e., the initiation of the conduction period of the switching elements. Cyclic firing of said elements allows the direct current to bypass the alternating current system with high power factor and negligible losses.

Zabar, Zivan (99-72 66th Rd., Apt. 9N, Forest Hills, NY 11375)

1982-01-01T23:59:59.000Z

208

U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site  

Broader source: Energy.gov (indexed) [DOE]

7: Red Hat Certificate System Bugs Let Remote Users Conduct 7: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks July 20, 2012 - 7:00am Addthis PROBLEM: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks PLATFORM: Red Hat Certificate System v8 ABSTRACT: Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate. reference LINKS: Advisory: RHSA-2012:1103-1 SecurityTracker Alert ID: 1027284 CVE-2012-2662 CVE-2012-3367 IMPACT ASSESSMENT: Medium Discussion: The Agent and End Entity pages do not properly filter HTML code from

209

U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject  

Broader source: Energy.gov (indexed) [DOE]

6: Cisco Small Business SRP500 Series Bug Lets Remote Users 6: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands November 3, 2011 - 8:15am Addthis PROBLEM: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands. PLATFORM: The following models are affected when running firmware prior to version 1.1.24: Cisco SRP521W Cisco SRP526W Cisco SRP527W The following models are affected when running firmware prior to version 1.2.1: Cisco SRP541W Cisco SRP546W Cisco SRP547W ABSTRACT: A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system. reference LINKS: Advisory ID: cisco-sa-20111102-srp500 SecurityTracker Alert ID: 1026266

210

U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service 31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service August 9, 2012 - 7:00am Addthis PROBLEM: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service PLATFORM: Version(s): ASA 5500 Series; 8.2 - 8.4 ABSTRACT: Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions. reference LINKS: Release Notes for the Cisco ASA 5500 Series, 8.4(x) SecurityTracker Alert ID: 1027355 CVE-2012-2472 CVE-2012-2474 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in Cisco ASA. 1. On systems with SIP inspection enabled, a remote user can send specially crafted SIP traffic to cause the target device to create many identical

211

Quantum-Secure Authentication with a Classical Key  

E-Print Network [OSTI]

Authentication provides the trust people need to engage in transactions. The advent of physical keys that are impossible to copy promises to revolutionize this field. Up to now, such keys have been verified by classical challenge-response protocols. Such protocols are in general susceptible to emulation attacks. Here we demonstrate Quantum-Secure Authentication ("QSA") of an unclonable classical physical key in a way that is inherently secure by virtue of quantum-physical principles. Our quantum-secure authentication operates in the limit of a large number of channels, represented by the more than thousand degrees of freedom of an optical wavefront shaped with a spatial light modulator. This allows us to reach quantum security with weak coherent pulses of light containing dozens of photons, too few for an adversary to determine their complex spatial shapes, thereby rigorously preventing emulation.

Sebastianus A. Goorden; Marcel Horstmann; Allard P. Mosk; Boris Škori?; Pepijn W. H. Pinkse

2014-06-03T23:59:59.000Z

212

U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

9:Apache Struts ParameterInterceptor() Flaw Lets Remote Users 9:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands January 26, 2012 - 6:45am Addthis PROBLEM: Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands PLATFORM: Struts 2.0.0 - Struts 2.3.1.1 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: CVE-2011-3923 SecurityTracker Alert ID: 1026575 Apache Struts 2 Documentation S2-009 blog.o0o.nu IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. The vulnerability allows a malicious user to bypass all the protections (regex pattern, deny method invocation) built into the ParametersInterceptor, thus being able to inject

213

VISION 2008 User's Guide  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

VISION 2008 User's Guide VISION 2008 User's Guide ANL-08/34 Energy Systems Division VISION 2008 User's Guide ANL-08/34 User's Guide by J. Ward Vehicle Technologies Program, U.S. Department of Energy, Energy Efficiency and Renewable Energy VISION model by A. Vyas and M. Singh Transportation Technology R&D Center, Argonne National Laboratory October 2008 VISION 2008 User's Guide October 2008 i Table of Contents Copyright Notification .............................................................................................................................. ii List of Abbreviations ................................................................................................................................ iii

214

Current Projects: Product Authenticity Tags - Vulnerability Assessment Team  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Product Authenticity Tags Product Authenticity Tags VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast µProcessor Shop Insanely Fast µProcessor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms Argonne's VAT (brochure)

215

FACET User Facility  

Broader source: All U.S. Department of Energy (DOE) Office Webpages

AD SLACPortal > Accelerator Research Division > FACET User Facility AD SLACPortal > Accelerator Research Division > FACET User Facility Sign In Launch the Developer Dashboard SLAC National Accelerator Laboratory DOE | Stanford | SLAC | SSRL | LCLS | AD | PPA | Photon Science | PULSE | SIMES FACET User Facility : FACET An Office of Science User Facility Search this site... Search Help (new window) Top Link Bar FACET User Facility FACET Home About FACET FACET Experimental Facilities FACET Users Research at FACET SAREC Expand SAREC FACET FAQs FACET User Facility Quick Launch FACET Users Home FACET Division ARD Home About FACET FACET News FACET Users FACET Experimental Facilities FACET Research Expand FACET Research FACET Images Expand FACET Images SAREC Expand SAREC FACET Project Site (restricted) FACET FAQs FACET Site TOC All Site Content

216

Users from Industry  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Users from Industry Users from Industry Users from Industry Print The Advanced Light Source (ALS) welcomes industrial users from large and small companies whose projects advance scientific knowledge, investigate the development of new products and manufacturing methods, or provide economic benefits and jobs to the economy. The nature of industrial research can be different from traditional university and government sponsored projects, so the ALS has created unique opportunities for new and existing industrial users to access our user facilities and engage in productive relationships with our scientific and engineering staff. Examples of past and current research conducted at the ALS can be viewed on the Industry @ ALS Web page. There are several modes of access; the ALS User and Scientific Support Groups are especially committed to helping new industrial users gain a foothold in our user community and welcome inquiries about how to make that happen.

217

User_ViewRecords  

Broader source: Energy.gov (indexed) [DOE]

User Records User Records © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Viewing User Records Purpose The purpose of this job aid is to guide users through the step-by-step process of viewing their records. Each task demonstrates viewing of different records. Task A. View To-Do List Enter the web address (URL) of the user application into your browser Address field and press the Enter key. Enter your user ID in the User ID textbox. Enter your password in the Password textbox. Click Sign In. View To-Do List (filter, view) 7 Steps Task A View Completed Work 8 Steps Task B View Curriculum Status and Details 11 Steps Task C 3 3 1 2 2 1 SuccessFactors Learning v 6.4 User Job Aid Viewing User Records

218

Designing the user in user interfaces  

Science Journals Connector (OSTI)

In the good old days, the human was here, the computer there, and a good living was to be made by designing ways to interface between the two. Now we find ourselves unthinkingly pinching to zoom in on a picture in a paper magazine. User interfaces are ... Keywords: mixed reality, posthuman factors, transhumanism, user interace, virtual reality

Mark Bolas

2014-10-01T23:59:59.000Z

219

The User Agreement  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Agreement User Agreement Oak Ridge National Laboratory is home to a number of highly sophisticated experimental user facilities. These research facilities, instruments, and laboratories are designed to serve Laboratory researchers, engineers, and technical staff, as well as external researchers from universities, industries, foreign institutions and other government laboratories. Sharing these state-of-the-art facilities with the scientific, industrial, and technical communities provides access to unique and specialized technology, equipment and instrumentation without burdening the user with the astronomical capital costs of building such facilities. Characteristics of User Agreements * User Agreements come in two types; proprietary and non-proprietary. The characteristics of

220

User Facilities | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

USER PORTAL USER PORTAL BTRICBuilding Technologies Research Integration Center CNMSCenter for Nanophase Materials Sciences CSMBCenter for Structural Molecular Biology CFTFCarbon Fiber Technology Facility HFIRHigh Flux Isotope Reactor MDF Manufacturing Demonstration Facility NTRCNational Transportation Research Center OLCFOak Ridge Leadership Computing Facility SNSSpallation Neutron Source Keeping it fresh at the Spallation Neutron Source Nanophase material sciences' nanotech toolbox Home | User Facilities SHARE ORNL User Facilities ORNL is home to a number of highly sophisticated experimental user facilities that provide unmatched capabilities to the broader scientific community, including a growing user community from universities, industry, and other laboratories research institutions, as well as to ORNL

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Dutertre, Bruno

222

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Doran, Simon J.

223

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

Dutertre, Bruno

224

Authenticity Issue in Performing Arts using Live Electronics  

E-Print Network [OSTI]

by the production process key elements for future assessment of authenticity. We will present some "case studies we intend to study the production process, and extract from the elements and traces left, the electronic processes are evaluated towards their robustness against changes of instrumentist, changes

Kouroupetroglou, Georgios

225

Robust RFID Authentication Protocol with Formal Proof and Its Feasibility  

E-Print Network [OSTI]

security models compatible with formal security analysis tools. We show that an RFID authentication, such as by letting us reference the price, origin and circulation route of specic goods. On the other hand-in-the-middle adversary and communication fault. We dene model and security proofs via a game-based approach makes our

226

Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio  

E-Print Network [OSTI]

Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio Xi Tan, Kapil frequency spectrum was inefficiently utilized. To fully use these spectrums, cognitive radio networks have of cognitive radio is to enable the current fixed spectrum channels assigned by Federal Communica- tions

Du, Wenliang "Kevin"

227

Final report for the mobile node authentication LDRD project.  

SciTech Connect (OSTI)

In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authentication is critical. In a wired infrastructure, this authentication service is typically facilitated by a centrally-located ''authentication certificate generator'' such as a Certificate Authority (CA) server. This centralized approach is ill-suited to meet the needs of mobile ad hoc networks, such as those required by military systems, because of the unpredictable connectivity and dynamic routing. There is a need for a secure and robust approach to mobile node authentication. Current mechanisms either assign a pre-shared key (shared by all participating parties) or require that each node retain a collection of individual keys that are used to communicate with other individual nodes. Both of these approaches have scalability issues and allow a single compromised node to jeopardize the entire mobile node community. In this report, we propose replacing the centralized CA with a distributed CA whose responsibilities are shared between a set of select network nodes. To that end, we develop a protocol that relies on threshold cryptography to perform the fundamental CA duties in a distributed fashion. The protocol is meticulously defined and is implemented it in a series of detailed models. Using these models, mobile wireless scenarios were created on a communication simulator to test the protocol in an operational environment and to gather statistics on its scalability and performance.

Michalski, John T.; Lanzone, Andrew J.

2005-09-01T23:59:59.000Z

228

Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols  

E-Print Network [OSTI]

to privacy of consumers. In recent years, the cryptographic community have made an extensive effort Zahra Ahmadian, Mahmoud Salmasizadeh, and Mohammad Reza Aref Abstract--Privacy is faced to serious years have focused on design and analysis of privacy friendly ultralightweight authentication protocols

229

Secure Password-Based Authenticated Key Exchange for Web Services  

E-Print Network [OSTI]

sign-on, delegation, and identity. The Grid Security Infrastructure (GSI) is the name given so. 1.3 Security in Grid Computing Security is one of the major requirements of Grid computing. Any Grid site deployment must at least provide the basic security mechanisms including authentication

230

SP 800-38B. Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication  

Science Journals Connector (OSTI)

This Recommendation specifies a message authentication code (MAC) algorithm based on a symmetric key block cipher. This block cipher-based MAC algorithm, called CMAC, may be used to provide assurance of the authenticity and, hence, the integrity of binary ... Keywords: Authentication, block cipher, cryptography, information security, integrity, message authentication code, mode of operation.

Morris J. Dworkin

2005-05-01T23:59:59.000Z

231

Argonne CNM: Industrial Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

For Industrial Users For Industrial Users The Center for Nanoscale Materials (CNM) has specific interest in growing the industrial user program and encourages researchers in industry to consider the capabilities and expertise we have to offer. As a CNM user, you have easy access to sophisticated scientific instrumentation geared toward nanoscience and nanotechnology. Moreover, our widely recognized staff researchers offer support in designing your experiments, using the equipment, and analyzing your data. Access to the CNM is through peer review of user proposals. Before you submit your first user proposal, we encourage you to contact any of our staff researchers, group leaders, the User Office, or division management to discuss the feasibility of your intended research using the expertise and facilities at the CNM. We are here to serve you as part of our user community and will be happy to address any questions you might have.

232

Fermilab Users' Meeting, 2009  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Users Meeting Poster Fermilab Users' Meeting Users Meeting Poster Fermilab Users' Meeting June 3-4, 2009 The annual gathering of the Fermilab Users Organization will be held on June 3-4, 2009. This meeting is an opportunity for discussion of new physics results from the laboratory's experimental program, future initiatives at the lab, and thoughtful presentations from leaders of the scientific policy community. The meeting will also feature selected talks from outstanding young physicists. Topics to be covered at the Users Meeting include: Collider Physics Astro-particle Physics Neutrino Physics Future Plans Full Agenda Registration is now closed. NEW!: Pictures from the 2009 Users' Meeting can be found here. A poster session organized by the GSA will be held on June 3rd in the Atrium. The public lecture at this year's Users' Meeting will be given by Prof. Tom Katsouleas

233

NSLS Services | User Accounts  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Accounts User Accounts Operating Accounts (81000 accounts) General Users who are allocated beam time and Participating Research Teams (PRTs) or Contributing Users (CUs) who operate beamlines should establish a BNL operating account to cover the costs of materials while running an experiment, shipping, and/or miscellaneous BNL services (telephone & fax codes), if these needs are anticipated. The term of the purchase order must be specified and names of persons having signature authorization for charges against this account must be listed. Brookhaven's Fiscal Division will bill the user for any charges the user makes to the account. Users are obligated to pay outstanding debts promptly. All users should set up a $1,000 operating account to cover operating expenses while at the NSLS, such as charges for use of trades, shops, and

234

Users from Industry  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Users from Industry Print Users from Industry Print The Advanced Light Source (ALS) welcomes industrial users from large and small companies whose projects advance scientific knowledge, investigate the development of new products and manufacturing methods, or provide economic benefits and jobs to the economy. The nature of industrial research can be different from traditional university and government sponsored projects, so the ALS has created unique opportunities for new and existing industrial users to access our user facilities and engage in productive relationships with our scientific and engineering staff. Examples of past and current research conducted at the ALS can be viewed on the Industry @ ALS Web page. There are several modes of access; the ALS User and Scientific Support Groups are especially committed to helping new industrial users gain a foothold in our user community and welcome inquiries about how to make that happen.

235

EER of fixed and trainable fusion classifiers: A theoretical study with application to biometric authentication tasks  

E-Print Network [OSTI]

Biometric authentication is a process of verifying an identity claim using a person’s behavioural and physiological characteristics. Due to the vulnerability of the system to environmental noise and variation caused by the user, fusion of several biometric-enabled systems is identified as a promising solution. In the literature, various fixed rules (e.g. min, max, median, mean) and trainable classifiers (e.g. linear combination of scores or weighted sum) are used to combine the scores of several base-systems. How exactly do correlation and imbalance nature of base-system performance affect the fixed rules and trainable classifiers? We study these joint aspects using the commonly used error measurement in biometric authentication, namely Equal Error Rate (EER). Similar to several previous studies in the literature, the central assumption used here is that the class-dependent scores of a biometric system are approximately normally distributed. However, different from them, the novelty of this study is to make a direct link between the EER measure and the fusion schemes mentioned. Both synthetic and real experiments (with as many as 256 fusion experiments carried out on the XM2VTS benchmark score-level fusion data sets) verify our proposed theoretical modeling of EER of the two families of combination scheme. In particular, it is found that weighted sum can provide the best generalisation performance when its weights are estimated correctly. It also has the additional advantage that score normalisation prior to fusion is not needed, contrary to the rest of fixed fusion rules.

Norman Poh; Samy Bengio

2005-01-01T23:59:59.000Z

236

EER of Fixed and Trainable Fusion Classifiers: A Theoretical Study with Application to Biometric Authentication Tasks  

E-Print Network [OSTI]

submitted for publication Abstract. Biometric authentication is a process of verifying an identity claim using a person’s behavioural and physiological characteristics. Due to the vulnerability of the system to environmental noise and variation caused by the user, fusion of several biometric-enabled systems is identified as a promising solution. In the literature, various fixed rules (e.g. min, max, median, mean) and trainable classifiers (e.g. linear combination of scores or weighted sum) are used to combine the scores of several base-systems. How exactly do correlation and imbalance nature of base-system performance affect the fixed rules and trainable classifiers? We study these joint aspects using the commonly used error measurement in biometric authentication, namely Equal Error Rate (EER). Similar to several previous studies in the literature, the central assumption used here is that the class-dependent scores of a biometric system are approximately normally distributed. However, different from them, the novelty of this study is to make a direct link between the EER measure and the fusion schemes mentioned. Both synthetic and real experiments (with as many as 512 fusion experiments carried out on the XM2VTS benchmark score-level fusion data sets) verify our proposed theoretical modeling of EER of the two families of combination scheme. In particular, it is found that weighted sum can provide the best generalisation performance when its weights are estimated correctly. It also has the additional advantage that score normalisation prior to fusion is not needed, contrary to the rest of fixed fusion rules. 2 IDIAP–RR 05-01 1

Norman Poh A; Samy Bengio A; Norman Poh; Samy Bengio

2005-01-01T23:59:59.000Z

237

TRL Computer System User’s Guide  

SciTech Connect (OSTI)

We have developed a wiki-based graphical user-interface system that implements our technology readiness level (TRL) uncertainty models. This document contains the instructions for using this wiki-based system.

Engel, David W.; Dalton, Angela C.

2014-01-31T23:59:59.000Z

238

LANSCE | Users | LUG | Topical User Workshop  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

to NNSA's call for major NNSA facility upgrades, as well as new end stations at the Lujan Neutron Scattering Center. All current and potential LANSCE users are encouraged to...

239

Demonstrated Petroleum Reduction Using Oil Bypass Filter Technology on Heavy and Light Vehicles  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Demonstrated Petroleum Demonstrated Petroleum Reduction Using Oil Bypass Filter Technology on Heavy and Light Vehicles James Francfort (PI) Timothy Murphy Larry Zirker Oil Bypass Filter Technology Evaluation * Funded by the U.S. Department of Energy's FreedomCAR & Vehicle Technologies Program * Performed by Idaho National Engineering and Environmental Laboratory (INEEL) Fleet Operations * Goal - Support DOE's efforts to reduce petroleum consumption & ensure the energy security of the United States Oil Bypass Filter Technology Evaluation * Objectives - Test the concept of using oil bypass filters to minimize engine oil changes & the generation of waste oils - Demonstration the economics of oil bypass filter systems - Estimate potential engine oil saving from bypass filter technologies that can be achieved by INEEL,

240

STANDARD USER AGREEMENT  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

REV 6/3/2010 REV 6/3/2010 Proprietary User Agreement No. PR-14- BETWEEN UT-BATTELLE, LLC. ("CONTRACTOR") Operator of Oak Ridge National Laboratory (hereinafter "Laboratory") under U.S. Department of Energy (DOE) Contract No. DE-AC05-00OR22725 and NAME OF USER INSTITUTION ("USER") (Collectively, "the Parties") The obligations of the Contractor may be transferred and shall apply to any successor in interest to said Contractor continuing the operation of the DOE facilities involved in this Proprietary User Agreement. ARTICLE I. FACILITIES AND SCOPE OF WORK CONTRACTOR will make available to employees, consultants and representatives of USER

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

31, 2011 31, 2011 T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. August 30, 2011 T-706: Microsoft Fraudulent Digital Certificate Issued by DigiNotar Fraudulent Digital Certificate Issued by DigiNotar, a Certification Authority Present in the Trusted Root Certification Authorities August 30, 2011 T-705: Linux Kernel Weakness in Sequence Number Generation Facilitates Packet Injection Attacks Linux Kernel Weakness in Sequence Number Generation Facilitates Packet Injection Attacks. August 29, 2011 T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password RSA enVision lets remote users view files and remote authenticated users

242

Safety for Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Safety for Users Safety for Users Safety for Users Print Safety at the ALS The mission of the ALS is "Support users in doing outstanding science in a safe environment." All users and staff participate in creating a culture and environment where performing research using the proper safeguards and fulfilling all safety requirements result in the success of the facility and its scientific program. The documents and guidance below will assist users and staff to achieve these goals. How Do I...? A series of fact sheets that explain what users need to know and do when preparing to conduct experiments at the ALS. Complete Experiment Safety Documentation? Work with Biological Materials? Work with Chemicals? Work with Regulated Soil? Bring and Use Electrical Equipment at the ALS?

243

ALS User Meeting Archives  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Meeting Archives Print User Meeting Archives Print Past User Meeting Agendas, Workshops, and Awards Year Agenda Workshops David A. Shirley (Science) Klaus Halbach (Instrumentation) Tim Renner (Service) 2012 2012 User Meeting Agenda 2012 User Meeting Workshops 2012 ALS User Meeting Awards Carl Percival, Dudley Shallcross, Craig Taatjes and David Osborn (Sandia), for making the first direct measurements of the reactions of Criegee intermediates, and showing that their impact on tropospheric chemistry and climate may be substantially greater than previously assumed. 2012 ALS User Meeting Awards Jeff Dickert and Simon Morton of Berkeley Lab's Physical Biosciences Division for the invention and implementation of the Compact Variable Collimator (CVC), which has led to a dramatic increase in productivity of protein crystallography.

244

ALS User Meeting Archives  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ALS User Meeting Archives ALS User Meeting Archives Past User Meeting Agendas, Workshops, and Awards Year Agenda Workshops David A. Shirley (Science) Klaus Halbach (Instrumentation) Tim Renner (Service) 2012 2012 User Meeting Agenda 2012 User Meeting Workshops 2012 ALS User Meeting Awards Carl Percival, Dudley Shallcross, Craig Taatjes and David Osborn (Sandia), for making the first direct measurements of the reactions of Criegee intermediates, and showing that their impact on tropospheric chemistry and climate may be substantially greater than previously assumed. 2012 ALS User Meeting Awards Jeff Dickert and Simon Morton of Berkeley Lab's Physical Biosciences Division for the invention and implementation of the Compact Variable Collimator (CVC), which has led to a dramatic increase in productivity of protein crystallography.

245

NSLS User Access | Training  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Training Training Training for New Users and Users with Expired Training and/or Badges: All new users and users with expired badges must complete or update the training modules shown below prior to access to the experimental floor. The training can be completed online prior to arrival at the NSLS and is strongly recommended to save considerable time during check-in at the Guest, User, Visitor (GUV) Center in Building 400. Please note each training module is followed by an exam which asks for your name and guest number. If you do not already have a guest number, leave this entry blank. All new users and users with expired badges MUST arrive on a weekday (no weekends or holidays) and check in at the GUV Center so that your training can be verified and to receive a photo ID badge (new or updated). The GUV

246

E-Print Network 3.0 - aortocoronary bypass graft Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Materials Summary: . Holmes, Jr., and H. V. Schaff. Aortocoronary bypass grafting with expanded polytetrafluoroethylene: 12... , synthetic polymers currently used as artificial...

247

E-Print Network 3.0 - artery bypass operations Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

by intravenous delivery of salt and water. This route of delivery bypasses ... Source: Brand, Paul H. - Department of Physiology and Pharmacology, University of Toledo...

248

Hardware device to physical structure binding and authentication  

DOE Patents [OSTI]

Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

2013-08-20T23:59:59.000Z

249

Improving the security of quantum direct communication with authentication  

E-Print Network [OSTI]

Two protocols of quantum direct communication with authentication [Phys. Rev. A {\\bf 73}, 042305 (2006)] are recently proposed by Lee, Lim and Yang. In this paper we will show that in the two protocols the authenticator Trent should be prevented from knowing the secret message of communication. The first protocol can be eavesdropped by Trent using the the intercept-measure-resend attack, while the second protocol can be eavesdropped by Trent using single-qubit measurement. To fix these leaks, I revise the original versions of the protocols by using the Pauli-Z operation $\\sigma_z$ instead of the original bit-flip operation $X$. As a consequence, the protocol securities are improved.

Zhan-jun Zhang

2006-04-18T23:59:59.000Z

250

Simultaneous Authentication and Certification of Arms-Control Measurement Systems  

SciTech Connect (OSTI)

Most arms-control-treaty-monitoring scenarios involve a host party that makes a declaration regarding its nuclear material or items and a monitoring party that verifies that declaration. A verification system developed for such a use needs to be trusted by both parties. The first concern, primarily from the host party's point of view, is that any sensitive information that is collected must be protected without interfering in the efficient operation of the facility being monitored. This concern is addressed in what can be termed a 'certification' process. The second concern, of particular interest to the monitoring party, is that it must be possible to confirm the veracity of both the measurement system and the data produced by this measurement system. The monitoring party addresses these issues during an 'authentication' process. Addressing either one of these concerns independently is relatively straightforward. However, it is more difficult to simultaneously satisfy host party certification concerns and monitoring party authentication concerns. Typically, both parties will want the final access to the measurement system. We will describe an alternative approach that allows both parties to gain confidence simultaneously. This approach starts with (1) joint development of the measurement system followed by (2) host certification of several copies of the system and (3) random selection by the inspecting party of one copy to be use during the monitoring visit and one (or more) copy(s) to be returned to the inspecting party's facilities for (4) further hardware authentication; any remaining copies are stored under joint seal for use as spares. Following this process, the parties will jointly (5) perform functional testing on the selected measurement system and then (6) use this system during the monitoring visit. Steps (1) and (2) assure the host party as to the certification of whichever system is eventually used in the monitoring visit. Steps (1), (3), (4), and (5) increase the monitoring party's confidence in the authentication of the measurement system.

MacArthur, Duncan W. [Los Alamos National Laboratory; Hauck, Danielle K. [Los Alamos National Laboratory; Thron, Jonathan L. [Los Alamos National Laboratory

2012-07-09T23:59:59.000Z

251

APS Users Organization  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

APSUO APSUO By-Laws Steering Commitee Employment Meetings Compton Award Franklin Award APS Users Organization The APSUO is responsible for advising the APS Associate Laboratory Director in the following areas: The Organization will serve as an advocacy group for the Facility and its user community. The Organization will provide advice to the ALD on matters affecting the user community. The Organization will assure good communication between the APS user community and the APS management. APSUO By-Laws The by-laws upon which the APS User Organization is based. List of Steering Committee Members Steering committee for the APS Users Organization. Employment Bulletin Board APS-related employment opportunities. APSUO Steering Committee Meetings Minutes and presentations from the APSUO meetings.

252

User Financial Account Form  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

URA REVISED 2/20/13 URA REVISED 2/20/13 User Financial Account Form Establish a user financial account at SLAC to procure gases, chemicals, supplies or services to support your experiment at SLAC's user facilities and to send samples, dewars, or other equipment between SLAC and your institution. To open or renew your SLAC user financial account, complete and submit this form along with a Purchase Order (PO) from your institution. The PO should be made to SLAC National Accelerator Laboratory for the amount of estimated expenditures (the suggested minimum is $1,000). Send this form with the PO (or a letter from the financial officer of your institution) to: Jackie Kerlegan (SSRL) or Theresa Wong (LCLS) User Research Administration, MS 99 User Research Administration, MS 99 SLAC National Accelerator Laboratory

253

JGI User Meeting 2007  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Second Annual Second Annual DOE Joint Genome Institute User Meeting Marriott Hotel Walnut Creek, California March 28-30, 2007 The U.S. Department of Energy Joint Genome Institute (JGI) welcomed its users and collaborators, as well as prospective new users, to the second annual JGI User Meeting. This international gathering of researchers with an interest in sequence-based science offered three days of user presentations, tours, workshops, and poster sessions. This was a unique opportunity to meet fellow users and JGI staff. Sessions and posters in the fields of microbial genomics, microbial communities, eukaryotic genomics, and genome technologies were presented. ©2006-2007, The Regents of the University of California. Last updated May 9, 2007. Disclaimer | Webmaster Agenda

254

Zimbra for APS Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Calendar Calendar Zimbra Calendar  ZWC Benefits: - Usable lab-wide, can schedule meetings with users and rooms outside APS - User friendly  Each Zimbra user has a personal calendar - Users migrated from Sun Calendar System optionally elected to migrate data from their personal calendar  With Zimbra, calendar terminology: - Appointments - Events - Meetings  Users can: - Create appointments - Create recurring events - Schedule all day events - Accept/Tentative/Reject an invitation with one click - Create additional calendars - Share their calendars with other users on and off-site - Delegate calendar management - Accept calendar shares - View calendar in various ways and print - Use color for quick calendar recognition - Schedule meetings * View multiple calendars to see potential scheduling

255

User_Login  

Broader source: Energy.gov (indexed) [DOE]

Logging In to SuccessFactors Learning Logging In to SuccessFactors Learning © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Logging In to SuccessFactors Learning Purpose The purpose of this job aid is to guide users through the step-by-step process of logging in to the SuccessFactors Learning Management System (LMS), retrieving your forgotten password and/or user ID, and using the LMS Help system. Task A. Log In to SuccessFactors Learning Enter the web address (URL) of the user application into your browser Address field and press the Enter key. Enter your user ID in the User ID textbox. Enter your password in the Password textbox. Click Sign In. 3 3 Log In to SuccessFactors Learning 5 Steps Task A Retrieve Forgotten Password and/or User

256

User_Navigation  

Broader source: Energy.gov (indexed) [DOE]

Online Learning Center v 6.4 Online Learning Center v 6.4 User Job Aid Navigation © 2012 Department of Energy - 1 - Online Learning Center (OLC) Job Aid: Navigation Purpose The purpose of this job aid is to guide users through the step-by-step process of navigating and identifying areas of the OLC, The Department of Energy's Learning Management System (LMS) user interface, and identifying some commonly used navigation icons. Identify Areas of the User Interface Task A Navigation Tips Task B How to Access in Online Learning Center Task C Online Learning Center v 6.4 User Job Aid Navigation © 2012 Department of Energy - 2 - Online Learning Center (OLC) Task A. Identify Areas of the OLC User Interface (OLC) Top Menu: Use the Home menu options in the top menu to navigate within the Online

257

Authenticated group Diffie-Hellman key exchange: theory and practice  

SciTech Connect (OSTI)

Authenticated two-party Diffie-Hellman key exchange allows two principals A and B, communicating over a public network, and each holding a pair of matching public/private keys to agree on a session key. Protocols designed to deal with this problem ensure A (B resp.)that no other principals aside from B (A resp.) can learn any information about this value. These protocols additionally often ensure A and B that their respective partner has actually computed the shared secret value. A natural extension to the above cryptographic protocol problem is to consider a pool of principals agreeing on a session key. Over the years several papers have extended the two-party Diffie-Hellman key exchange to the multi-party setting but no formal treatments were carried out till recently. In light of recent developments in the formalization of the authenticated two-party Diffie-Hellman key exchange we have in this thesis laid out the authenticated group Diffie-Hellman key exchange on firmer foundations.

Chevassut, Olivier

2002-10-03T23:59:59.000Z

258

ATF Program Advisory & Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

paths for flexibility & efficiency Old documentation not adequate Old hardware (PLC) no longer programmable ATF Program Advisory & Users Meeting, April 2-3,2009 M.Babzien...

259

Programs & User Facilities  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Facilities Programs & User Facilities Enabling remarkable discoveries and tools that transform our understanding of energy and matter and advance national, economic, and energy...

260

User Electrical Equipment Inspections  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Electronic and Electrical Equipment Inspection Criteria In order to be in compliance with NEC, OSHA, and DOE regulations all electronic and electrical equipment at the APS...

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

General User Proposals  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Proposals Print General Users are granted beam time through a peer review proposal process. They may use beamlines and endstations provided by the ALS or the Participating Research...

262

E-Print Network 3.0 - authentic cost calculations Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

cost calculations Search Powered by Explorit Topic List Advanced Search Sample search results for: authentic cost calculations Page: << < 1 2 3 4 5 > >> 1 A Lightweight...

263

E-Print Network 3.0 - authentications algorithms based Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

functionality based... . 2.1 Authentication systems and techniques ... Source: Brunato, Mauro - Dipartimento di Ingegneria e Scienza dell'Informazione, Universit di Trento...

264

E-Print Network 3.0 - authenticated key agreement Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for authentication and managing and secret-key based proce... . An ... Source: Brunato, Mauro - Dipartimento di Ingegneria e Scienza dell'Informazione, Universit di Trento...

265

New foundations for efficient authentication, commutative cryptography, and private disjointness testing  

E-Print Network [OSTI]

This dissertation presents new constructions and security definitions related to three areas: authentication, cascadable and commutative crytpography, and private set operations. Existing works relevant to each of these ...

Weis, Stephen August, 1978-

2006-01-01T23:59:59.000Z

266

Counterfeit-resistant materials and a method and apparatus for authenticating materials  

DOE Patents [OSTI]

Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

2000-01-01T23:59:59.000Z

267

HVAC filter bypass modelling and experimental validation Jeffrey A. Siegel1,*  

E-Print Network [OSTI]

standards that address HVAC filtration efficacy including ASHRAE Standard 52.2 (ASHRAE, 2007) and EN 779HVAC filter bypass modelling and experimental validation Jeffrey A. Siegel1,* , David B. Chojnowski of filter bypass, an ASHRAE Standard 52.2-2007 compliant apparatus was modified to accept filters

Siegel, Jeffrey

268

2009 ASHRAE 199 The issue of filter bypass has long been a topic of much  

E-Print Network [OSTI]

©2009 ASHRAE 199 ABSTRACT The issue of filter bypass has long been a topic of much interest in the HVAC industry, but to date, there has been limited work that quantifies the effect of bypass. A matrix consisting of filters ranging from MERV 2 to MERV 14, different gap geometries, and gap sizes

Siegel, Jeffrey

269

T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the  

Broader source: Energy.gov (indexed) [DOE]

7: PHP File Upload Bug May Let Remote Users Overwrite Files on 7: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System June 15, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in PHP. A remote user may be able to overwrite files on the target system. PLATFORM: PHP prior to 5.3.7 ABSTRACT: PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected. reference LINKS: PHP Security Notice PHP CVE-2011-2202 SecurityTracker Alert ID: 1025659 Secunia Advisory: SA44874 CVE-2011-2202 IMPACT ASSESSMENT: High Discussion: The vulnerability lies in the 'SAPI_POST_HANDLER_FUNC()' function in

270

Nanotechnology User Facility for  

E-Print Network [OSTI]

A National Nanotechnology User Facility for Industry Academia Government #12;The National Institute of Commerce's nanotechnology user facility. The CNST enables innovation by providing rapid access to the tools new measurement and fabrication methods in response to national nanotechnology needs. www

271

ARM User Survey Report  

SciTech Connect (OSTI)

The objective of this survey was to obtain user feedback to, among other things, determine how to organize the exponentially growing data within the Atmospheric Radiation Measurement (ARM) Climate Research Facility, and identify users’ preferred data analysis system. The survey findings appear to have met this objective, having received approximately 300 responses that give insight into the type of work users perform, usage of the data, percentage of data analysis users might perform on an ARM-hosted computing resource, downloading volume level where users begin having reservations, opinion about usage if given more powerful computing resources (including ability to manipulate data), types of tools that would be most beneficial to them, preferred programming language and data analysis system, level of importance for certain types of capabilities, and finally, level of interest in participating in a code-sharing community.

Roeder, LR

2010-06-22T23:59:59.000Z

272

Chlamydial DNA polymerase I can bypass lesions in vitro  

SciTech Connect (OSTI)

We found that DNA polymerase I from Chlamydiophila pneumoniae AR39 (CpDNApolI) presents DNA-dependent DNA polymerase activity, but has no detectable 3' exonuclease activity. CpDNApolI-dependent DNA synthesis was performed using DNA templates carrying different lesions. DNAs containing 2'-deoxyuridine (dU), 2'-deoxyinosine (dI) or 2'-deoxy-8-oxo-guanosine (8-oxo-dG) served as templates as effectively as unmodified DNAs for CpDNApolI. Furthermore, the CpDNApolI could bypass natural apurinic/apyrimidinic sites (AP sites), deoxyribose (dR), and synthetic AP site tetrahydrofuran (THF). CpDNApolI could incorporate any dNMPs opposite both of dR and THF with the preference to dAMP-residue. CpDNApolI preferentially extended primer with 3'-dAMP opposite dR during DNA synthesis, however all four primers with various 3'-end nucleosides (dA, dT, dC, and dG) opposite THF could be extended by CpDNApolI. Efficiently bypassing of AP sites by CpDNApolI was hypothetically attributed to lack of 3' exonuclease activity.

Liu Xipeng [College of Life Sciences and Technology, Shanghai Jiaotong University, 800 Dongchuan Road, Shanghai 200240 (China); Hou Jingli [College of Life Sciences and Technology, Shanghai Jiaotong University, 800 Dongchuan Road, Shanghai 200240 (China); Liu Jianhua [College of Life Sciences and Technology, Shanghai Jiaotong University, 800 Dongchuan Road, Shanghai 200240 (China)]. E-mail: jianhualiudl@sjtu.edu.cn

2006-07-07T23:59:59.000Z

273

V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution  

Broader source: Energy.gov (indexed) [DOE]

52: Drupal Core Access Bypass and Arbitrary PHP Code Execution 52: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities December 21, 2012 - 12:15am Addthis PROBLEM: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities PLATFORM: Drupal 6.x versions prior to 6.27 Drupal 7.x versions prior to 7.18 ABSTRACT: Drupal Core Multiple vulnerabilities REFERENCE LINKS: SA-CORE-2012-004 - Drupal core Bugtraq ID: 56993 Secunia Advisory SA51517 CVE-2012-5651 CVE-2012-5652 CVE-2012-5653 IMPACT ASSESSMENT: Medium DISCUSSION: An attacker can exploit these issues to execute arbitrary PHP code within the context of the web server, bypass certain security restrictions, and perform unauthorized actions; this may aid in launching further attacks.

274

V-186: Drupal Login Security Module Security Bypass and Denial of Service  

Broader source: Energy.gov (indexed) [DOE]

6: Drupal Login Security Module Security Bypass and Denial of 6: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability June 26, 2013 - 1:28am Addthis PROBLEM: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability PLATFORM: Login Security 6.x-1.x versions prior to 6.x-1.2. Login Security 7.x-1.x versions prior to 7.x-1.2. ABSTRACT: A security issue and a vulnerability have been reported in the Login Security module for Drupal REFERENCE LINKS: Advisory ID: DRUPAL-SA-CONTRIB-2013-053 Secunia Advisory SA53717 CVE-2013-2197 CVE-2013-2198 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The security issue is caused due to an unspecified error and can be exploited to bypass the module features. Successful exploitation requires the "soft blocking" feature to be

275

Rankine cycle condenser pressure control using an energy conversion device bypass valve  

DOE Patents [OSTI]

The disclosure provides a waste heat recovery system and method in which pressure in a Rankine cycle (RC) system of the WHR system is regulated by diverting working fluid from entering an inlet of an energy conversion device of the RC system. In the system, an inlet of a controllable bypass valve is fluidly coupled to a working fluid path upstream of an energy conversion device of the RC system, and an outlet of the bypass valve is fluidly coupled to the working fluid path upstream of the condenser of the RC system such that working fluid passing through the bypass valve bypasses the energy conversion device and increases the pressure in a condenser. A controller determines the temperature and pressure of the working fluid and controls the bypass valve to regulate pressure in the condenser.

Ernst, Timothy C; Nelson, Christopher R; Zigan, James A

2014-04-01T23:59:59.000Z

276

Authentication of medicinal plant material by DNA fingerprinting  

Science Journals Connector (OSTI)

Based on their positive therapeutic results, herbal medicines are gaining popularity worldwide for human wellbeing and healthcare. Unfortunately, one major hurdle that might impair their potential future as 'medicine of choice' is the lack of standardisation. Many scientific studies on adulteration of herbal medicines have demonstrated that health consequences of adulterants may vary from life threatening to death. Fortunately, the breakthrough in genetic analysis and identification promise herbal medicines challenging era. Genetics permit the capacity to police adulterants to protect patients and public from dangerous fraud. This article highlights useful analytical techniques that can be employed to analyse DNA for quality assurance, control and authentication of medicinal plant species.

Sundus Tewfik

2008-01-01T23:59:59.000Z

277

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider  

E-Print Network [OSTI]

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider Department In this paper we consider the nature of machine proofs used in the CSP approach to the veri cation of authentication protocols using the process algebra CSP Hoa85]. The CSP syntax provides a natural and precise way

Doran, Simon J.

278

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks  

E-Print Network [OSTI]

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks Tony Cheneau National public key distribution scheme adapted to ad hoc networks called TAKES for Trustful Authentication, or even implementing a light naming system can be enabled on top of ad hoc networks. TAKES is formally

Paris-Sud XI, Université de

279

End-to-end aggregate authentication of time-series data  

Science Journals Connector (OSTI)

We consider the problem of providing integrity of aggregate result in the presence of an untrusted data aggregator who may introduce errors into data fusion, causing the final aggregate result to far deviate from the true result determined by participating ... Keywords: aggregate authentication, computation over authenticated data, time-series

Di Ma; Yan Zhu; Mengyang Yu

2013-05-01T23:59:59.000Z

280

Comparative studies on authentication and key exchange methods for 802.11 wireless LAN  

Science Journals Connector (OSTI)

IEEE 802.11 wireless LAN has become one of the hot topics on the design and development of network access technologies. In particular, its authentication and key exchange (AKE) aspects, which form a vital building block for modern security mechanisms, ... Keywords: Authentication, Confidentiality, Key exchange, Security, WLAN

Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan

2007-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

eSeal -A System for Enhanced Electronic Assertion of Authenticity and Integrity  

E-Print Network [OSTI]

in the network and a communication protocol. The system is able to control various kinds of integrity settings to claim and assert the authenticity and integrity of goods, documents or other valued objects in storageeSeal - A System for Enhanced Electronic Assertion of Authenticity and Integrity Christian Decker1

Beigl, Michael

282

AUDIO FORENSIC AUTHENTICATION BASED ON MOCC BETWEEN ENF AND REFERENCE SIGNALS  

E-Print Network [OSTI]

AUDIO FORENSIC AUTHENTICATION BASED ON MOCC BETWEEN ENF AND REFERENCE SIGNALS Zhisheng Lv1 of Warwick, Coventry CV4 7AL, UK ABSTRACT This paper proposes a new audio authenticity detection algorithm Frequency) signal and the reference signal. We first extract the ENF signal from a query audio signal

Li, Chang-Tsun

283

User_TalentProfile  

Broader source: Energy.gov (indexed) [DOE]

Accessing and Modifying Talent Profile Accessing and Modifying Talent Profile © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Accessing and Modifying Talent Profile Purpose The purpose of this job aid is to guide users through the step-by-step process of accessing their talent profiles, adding information to their profiles, and editing existing talent profile information. Task A. Access Talent Profile Enter the web address (URL) of the user application into your browser Address field and press the Enter key. Enter your user ID in the User ID textbox. Enter your password in the Password textbox. Click Sign In. Access Talent Profile 4 Steps Task A Add Information to Talent Profile Sections 5 Steps Task B Edit Talent Profile Sections

284

REScheck Software User's Guide  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

REScheck Software REScheck Software User's Guide Building Energy Codes Program Table Of Contents Overview ................................................................................... 1 Tutorials ................................................................................. 2 Table Columns and Rows ............................................................. 3 Rows ...................................................................................... 3 Columns ................................................................................. 5 Project Information ..................................................................... 7 Location.................................................................................. 7 Project Type (2006 IECC) ..........................................................

285

JGI Compute User Training  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

JGI Compute JGI Compute User Training Series JGI Compute User Training Series homeh1 Overview NERSC and IT staff will host a series training sessions and open office hours to introduce new services and review best practices for using the Crius cluster. All sessions are hands on, so please bring your laptop. If you are or were a user of any of the following systems, Crius, Rhea, Kronos, Theia, Oceanus or Phoebe, it will be beneficial for you to attend these training sessions. And if you plan to use JGI compute resources in the future, we also encourage you to attend. It will also be an opportunity for JGI compute users to ask questions and give NERSC and IT staff feedback on your requirements. Session 3: February 24th, 2012 1:30-5pm rm 100-101 Agenda 1:30-1:45 - Intro and presentation of the transition schedule we talked

286

Office 2007 User Workshop  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Office 2007 User Workshop Office 2007 User Workshop M. Westbrook, APS-IT June 30, 2010 Goal: Quick Start for New Office 2007 Users Introduce and highlight new Office 2007 program feature (Word, Excel and PowerPoint) Identify sources of help with Office 2007 Provide opportunity for users to share experiences Office 2007: Introduction  Format for today's presentation is that of a workshop rather than training course  Many of the new features presented here apply to multiple Office applications  Sources for more information are identified throughout the presentation  Presenter is no expert, but plans to share what has been learned thus far  Attendees are encouraged to share what you have learned for the benefit of all

287

Bevalac user's handbook  

SciTech Connect (OSTI)

This report is a users manual on the Bevalac accelerator facility. This paper discuses: general information; the Bevalac and its operation; major facilities and experimental areas; and experimental equipment.

Not Available

1990-04-01T23:59:59.000Z

288

User Manual Extended Video  

E-Print Network [OSTI]

User Manual TDS3VID Extended Video Application Module 071-0328-02 *P071032802* 071032802 #12. . . . . . . . . . . . . . . . . . . . . . . . . . . Accessing Extended Video Functions 7. . . . . . . . . . . . Extended Video Conventions 10. . . . . . . . . . . . . . . . . . . Changes to the Video Trigger Menu 11. . . . . . . . . . . . . . Changes to the Display Menu 15

Kleinfeld, David

289

International aeronautical user charges  

E-Print Network [OSTI]

Introduction: 1.1 BACKGROUND AND MOTIVATION Very few issues relating to the international air transportation industry are today as divisive as those pertaining to user charges imposed at international airports and enroute ...

Odoni, Amedeo R.

1985-01-01T23:59:59.000Z

290

User Data Forum Presentations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

-pcds-user-forum-data-intensive-jun14-1.pdf | pdf | 459 KB T08: ACME - Accelerated Climate Modeling For Energy June 17, 2014 | Author(s): Marcia Branstetter, Katherine Evans, John...

291

User Data Forum Presentations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

File: T10-Joint-Facilities-User-Forum.pdf | pdf | 7 MB T08: ACME - Accelerated Climate Modeling For Energy June 17, 2014 | Author(s): Marcia Branstetter, Katherine Evans, John...

292

General User Proposals  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Proposals Print Tuesday, 01 June 2010 09:36 General Users are granted beam time through a peer review proposal process. They may use beamlines and endstations provided by the ALS...

293

User Operation Manual  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

SNS-NSSD-TOF-TD-0002 - R00 SNS-NSSD-TOF-TD-0002 - R00 1 SEQUOIA Operations Manual for Users G.E. Granroth SEQUOIA Lead Instrument Scientist A.I. Kolesnikov SEQUOIA Instrument Scientist L.M. DeBeer-Schmitt SEQUOIA Scientific Associate T.E. Sherline Sample Environment Scientist Revised - May 13, 2013 SNS-NSSD-TOF-TD-0002 - R00 2 Abstract The SEQUOIA Operations Manual for Users presents a description of the SEQUOIA spectrometer located at beamline 17 (BL17) of the Spallation Neutron Source (SNS). It is the intent of this manual to inform the user regarding the SEQUOIA spectrometer and available sample environment, to run experiments, to access and analyze the collected data, and to provide the user with other potentially useful information. The first section serves to describe the components of which the instrument is comprised.

294

VOLTTRON: User Guide  

SciTech Connect (OSTI)

This document is a user guide for the deployment of the Transactional Network platform and agent/application development within the VOLTTRON. The intent of this user guide is to provide a description of the functionality of the Transactional Network Platform. This document describes how to deploy the platform, including installation, use, guidance, and limitations. It also describes how additional features can be added to enhance its current functionality.

Lutes, Robert G.; Katipamula, Srinivas; Akyol, Bora A.; Tenney, Nathan D.; Haack, Jereme N.; Monson, Kyle E.; Carpenter, Brandon J.

2014-04-24T23:59:59.000Z

295

Pre-test CFD Calculations for a Bypass Flow Standard Problem  

SciTech Connect (OSTI)

The bypass flow in a prismatic high temperature gas-cooled reactor (HTGR) is the flow that occurs between adjacent graphite blocks. Gaps exist between blocks due to variances in their manufacture and installation and because of the expansion and shrinkage of the blocks from heating and irradiation. Although the temperature of fuel compacts and graphite is sensitive to the presence of bypass flow, there is great uncertainty in the level and effects of the bypass flow. The Next Generation Nuclear Plant (NGNP) program at the Idaho National Laboratory has undertaken to produce experimental data of isothermal bypass flow between three adjacent graphite blocks. These data are intended to provide validation for computational fluid dynamic (CFD) analyses of the bypass flow. Such validation data sets are called Standard Problems in the nuclear safety analysis field. Details of the experimental apparatus as well as several pre-test calculations of the bypass flow are provided. Pre-test calculations are useful in examining the nature of the flow and to see if there are any problems associated with the flow and its measurement. The apparatus is designed to be able to provide three different gap widths in the vertical direction (the direction of the normal coolant flow) and two gap widths in the horizontal direction. It is expected that the vertical bypass flow will range from laminar to transitional to turbulent flow for the different gap widths that will be available.

Rich Johnson

2011-11-01T23:59:59.000Z

296

LANSCE | Lujan Center | Industrial Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Industrial Users The Lujan Neutron Scattering Center offers a diverse set of capabilities and instruments for industrial projects. Industrial users are invited to contact the Lujan...

297

Fermilab | Users' Executive Committee | Home  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Users' Office Fermilab Student and Post Doc Association (FSPA) Fermi Research Alliance LLC (FRA) P5 Report HEPAP APS National User Facility Organization (NUFO) Library of...

298

Evaluation of a Stirling engine heater bypass with the NASA Lewis nodal-analysis performance code  

SciTech Connect (OSTI)

In support of the US Department of Energy's Stirling Engine Highway Vehicle Systems program, the NASA Lewis Research Center investigated whether bypassing the P-40 Stirling engine heater during regenerative cooling would improve the engine thermal efficiency. The investigation was accomplished by using the Lewis nodal-analysis Stirling engine computer model. Bypassing the P-40 Stirling engine heater at full power resulted in a rise in the indicated thermal efficiency from 40.6 to 41.0 percent. For the idealized (some losses not included) heater bypass that was analyzed, this benefit is not considered significant.

Sullivan, T.J.

1986-05-01T23:59:59.000Z

299

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

January 25, 2013 January 25, 2013 V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication A remote user can gain administrative access to the target system. January 24, 2013 V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code A remote authenticated user can execute arbitrary code on the target system. A remote authenticated user can modify the configuration on the target system. A remote user can cause denial of service conditions. January 23, 2013 V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code Two vulnerabilities were reported in EMC AlphaStor. January 22, 2013 V-074: IBM Informix Genero libpng Integer Overflow Vulnerability

300

User Charter Rights and Responsibilities of Neutron Sciences Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

-G01182/gim -G01182/gim User Charter Rights and Responsibilities of Neutron Sciences Users Rights of Users: * Be treated with respect and courtesy. * Have details of experiment proposals kept confidential. * Have consultations with instrument staff before proposal submission, during experiment planning, and while evaluating results and analyzing data. * Receive beam time on the basis of external peer evaluation of submitted proposals. Users can

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

User_RunReports  

Broader source: Energy.gov (indexed) [DOE]

Running Standard Reports Running Standard Reports © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Running Standard Reports Purpose The purpose of this job aid is to guide users through the step-by-step process of running standard reports in SuccessFactors Learning. Task A. Run Standard Report From the Home page, click the Reports easy link. In the Report Name table, locate the report you want to generate. Click the expand icon ( ) to expand the report group. Click the title link. For this example, select the User Curriculum Status Group by Item Details report. Note: Click Help ( ) for additional information on reports. 1 1 2 2 3 3 Run Standard Report 13 Steps Task A SuccessFactors Learning v 6.4 User Job Aid

302

General User Proposal Scores  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

General User Proposal Scores General User Proposal Scores General User Proposal Scores Print Tuesday, 01 June 2010 10:34 Scoring Proposals are scored on a scale of 1 to 5, with 1 being the best score and 5 the worst. Reviewers are requested to use the following ranking schema: Must do High Priority Medium Priority Low priority Don't do Beam time is assigned based on each proposal's score in relation to all other proposals for a given beamline. For beamlines where beamtime requests exceed available beamtime, a cutoff score is assigned after which no beam time is allocated. proposal scores Beam Time Cutoff Scores for the Current Cycle The table below lists the percent of beam time shifts allocated/requested for each beamline, and the cutoff scores, below which no beam time was assigned.

303

User Electrical Inspection Criteria  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Electronic and Electrical Equipment Inspection Criteria User Electronic and Electrical Equipment Inspection Criteria Any electrical or electronic equipment users bring to the APS will have to be inspected. In some cases, this inspection will be quite simple, e.g., if the equipment has already been inspected by a Nationally Recognized Testing Laboratory (NRTL) and is used for its designed purpose. Other equipment will require a more thorough inspection (this may include NRTL inspected equipment if it is assembled into an apparatus with other components). The inspection is based on an eight-part list of criteria. Paraphrased, those criteria are: The equipment must be suitable for its intended use (and if appropriate, installation). For example, a heater controller intended to control a 1000W heater cannot be used to control a 2000W heater. The

304

Science Accelerator : User Login  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Login Login The Science Accelerator ALERTS feature will automatically update you regarding newly available information in your specific area(s) of interest. Simply register for the service, then create a search strategy which will be run against information added to . Select a schedule (weekly, monthly, etc.) for receiving the email Alerts. If you are a new patron, Register to learn how to set up Alerts to meet your needs. If you are an existing patron, enter your user name and password in the boxes to login. Once logged in, you may review or modify your search, add a new search and see recent Alerts results. User Name: Password: Remember Me Remember me on this computer. Login Don't have a user name? Register! Forgot your password? Reset your password Alerts The Alerts function allows you to monitor a topic and receive timely

305

Fermilab Users' Meeting, 2007  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

6-7, 2007 6-7, 2007 The annual gathering of the Fermilab Users Organization will be held on June 6-7, 2007. This meeting is an opportunity for discussion of new physics results from the laboratory's experimental program, future initiatives at the lab, and thoughtful presentations from leaders of the scientific policy community. Topics to be covered at the Users Meeting include: Collider Physics Astro-particle Physics Neutrino Physics Future Plans This year, both an Outreach Workshop and a Grad Students' Meeting / Career Night (sponsored by the GSA) will be held in association with the Users Meeting on June 5. Watch this page for links to more information on those associated meetings as they become available. Registration Reserve Tickets (for the public lecture by Dr. George Smoot)

306

User Science Images  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Science Images User Science Images User Science Images Sort by: Default | Name | Date (low-high) | Date (high-low) | Category NIMROD-1.png FES: NIMROD Simulation February 18, 2010 | Author(s): Dr. Charlson C. Kim (University of Washington) | Category: Fusion Energy | URL: https://nimrodteam.org/ Download Image: NIMROD-1.png | png | 1.5 MB Trajectory of an energetic ion in a Field Reverse Configuration (FRC) magnetic field. Magnetic separatrix denoted by green surface. Spheres are colored by azimuthal velocity. Image courtesy of Charlson Kim, University of Washington; NERSC repos m487, mp21, m1552 Scheibe.png BER: Pore-Scale Fluid Flow for Subsurface Reactive Transport January 1, 2008 | Author(s): Timothy D. Scheibe, PNNL | Category: Environmental Science | URL: http://http://subsurface.pnl.gov/

307

SOAJ Search : User Login  

Office of Scientific and Technical Information (OSTI)

Login Login The SOAJ Search ALERTS feature will automatically update you regarding newly available information in your specific area(s) of interest. Simply register for the service, then create a search strategy which will be run against information added to . Select a schedule (weekly, monthly, etc.) for receiving the email Alerts. If you are a new patron, Register to learn how to set up Alerts to meet your needs. If you are an existing patron, enter your user name and password in the boxes to login. Once logged in, you may review or modify your search, add a new search and see recent Alerts results. User Name: Password: Remember Me Remember me on this computer. Login Don't have a user name? Register! Forgot your password? Reset your password Alerts The Alerts function allows you to monitor a topic and receive timely

308

V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability |  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

7: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability 7: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability July 11, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Adobe ColdFusion PLATFORM: The vulnerability is reported in version 10 for Windows, Macintosh, and Linux ABSTRACT: The vulnerability is caused due to an unspecified error and can be exploited to invoke public methods on ColdFusion Components (CFC) using WebSockets REFERENCE LINKS: Secunia Advisory SA54024 Adobe Security Bulletin APSB13-19 Stackoverflow.com CVE-2013-3350 IMPACT ASSESSMENT: High DISCUSSION: The hotfix resolves a vulnerability that could permit an attacker to invoke public methods on ColdFusion Components (CFC) using WebSockets IMPACT: Security Bypass

309

V-162: Apache Struts "ParameterInterceptor" Security Bypass Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

2: Apache Struts "ParameterInterceptor" Security Bypass 2: Apache Struts "ParameterInterceptor" Security Bypass Vulnerability V-162: Apache Struts "ParameterInterceptor" Security Bypass Vulnerability May 23, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Apache Struts PLATFORM: The vulnerability is reported in versions prior to 2.3.14.1 ABSTRACT: A vulnerability has been reported in Apache Struts, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA53495 Apache Struts Advisory S2-012 Apache Struts Advisory S2-013 CVE-2013-1965 CVE-2013-1966 IMPACT ASSESSMENT: High DISCUSSION: A request that included a specially crafted request parameter could be used to inject arbitrary OGNL code into the stack, afterward used as request

310

Variations in Oral Vitamin and Mineral Supplementation Following Bariatric Gastric Bypass Surgery: A National Survey  

Science Journals Connector (OSTI)

Bariatric surgery (including gastric bypass) is associated with long-term deficiencies in vitamins and minerals, which may have deleterious effects on physiology. The American Association of Clinical Endocrino...

Matt J. D. Dunstan; Emma J. Molena; Kumaran Ratnasingham; Anna Kamocka…

2014-11-01T23:59:59.000Z

311

Thermal Bypass Air Barriers in the 2009 International Energy Conservation Code- Building America Top Innovation  

Broader source: Energy.gov [DOE]

This Building America Innovations profile describes Building America research supporting Thermal Bypass Air Barrier requirements. Since these were adopted in the 2009 IECC, close to one million homes have been mandated to include this vitally important energy efficiency measure.

312

Initial Hydrologic Feasibility Analysis of the Proposed Ship Channel Bypass (lower Sacramento River, California  

E-Print Network [OSTI]

Project Modifications Works, Yolo County, CA. USACE (U.S.2006. Office Report: Yolo Bypass 2-D Hydraulic ModelPlan. Prepared by CDFG, Yolo Basin Foundation and EDAW.

Church, Tami C.

2012-01-01T23:59:59.000Z

313

APS User News, Issue 73  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

3, September 15, 2011 3, September 15, 2011 CONTENTS DIRECTOR'S CORNER USER MATTERS -- Tweet Time! APS Beamlines Now Tweet Operational Status Info -- Changes to User Electrical Safety Training Requirements -- Groundbreaking for the New Advanced Protein Crystallization Facility -- Meg Vigliocco-Hagen, APS General User Program Administrator, Retires! -- Meet Beverly Knott, New APS Beam Time Access Administrator -- Safety Snippets: Practice Good Housekeeping BRIEFLY NOTED -- 4th Annual Postdoctoral Research Symposium: Registration Deadline September 21 -- 2011 Advanced Light Source Users' Meeting, October 3-5, 2011 -- 2011 SSRL/LCLS Annual Users' Meeting & Workshops, October 22-26, 2011 -- General Users Proposals Now Being Accepted -- Changes to User Training Course Requirements

314

2002 NERSC User Survey Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2 User Survey Results 2 User Survey Results Show All | 1 2 3 4 5 ... 11 | Next » 2002 User Survey Results Table of Contents Response Summary User Information Overall Satisfaction and Importance All Satisfaction Questions and Changes from Previous Years Visualization and Grid Computing Web, NIM, and Communications Hardware Resources Software Training User Services Comments about NERSC Response Summary Many thanks to the 300 users who responded to this year's User Survey -- this represents the highest response level in the five years we have conducted the survey. The respondents represent all five DOE Science Offices and a variety of home institutions: see User Information. You can see the FY 2002 User Survey text, in which users rated us on a 7-point satisfaction scale. Some areas were also rated on a 3-point

315

INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA)  

Broader source: Energy.gov (indexed) [DOE]

7/2013 Page 1 7/2013 Page 1 INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA) Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. HSPD-12 OWA REQUIREMENTS: ď‚· An EITS provided Exchange email account ď‚· A DOE issued HSPD-12 badge ď‚· DOEnet or Internet access and a supported web browser ď‚· A smart card reader installed* on your computer (*Windows Vista, Windows XP, MAC OS X 10.7 & 10.8, will also require smart card software to be installed in order to read the HSPD-12 badge) HSPD-12 OWA LOGIN PROCEDURE: 1. Insert HSPD-12 badge into card reader

316

A Reduction for Automated Veri cation of Authentication Scott D. Stoller  

E-Print Network [OSTI]

A Reduction for Automated Veri cation of Authentication Protocols Scott D. Stoller Computer Science of those case studies were not rigorously justi ed. Reduction theorems are needed, which show

Stoller, Scott

317

Integrating an Efficient Authorization Protocol with Trigon-Based Authentication Mechanism for Improving Grid Security  

Science Journals Connector (OSTI)

Security is a vital part of an integrated grid application in which heterogeneous services and resources ... dynamically. Authentication and authorization are the major security concerns in grid environment. Most...

V. Ruckmani; G. Sudha Sadasivam

2010-01-01T23:59:59.000Z

318

Determination of 5-hydroxymethylfurfural after Winkler and by the HPLC method for authentication of honey  

Science Journals Connector (OSTI)

The quality and authenticity of commercially available honey from Slovak market and the development of HPLC method for determination of hydroxymethylfurfural (HMF) content of honey with fine separation efficie...

K. Kukurova; J. Karovi?ová; G. Greif; Z. Kohajdová; J. Lehkoživová

2006-06-01T23:59:59.000Z

319

Subverting value hierarchies : essays on the causes and responses to shifts in demand for authenticity  

E-Print Network [OSTI]

This dissertation includes three essays on the causes and responses to shifts in demand for authenticity. In the first chapter, I answer the question: why do previously cast-off products, practices, or styles abruptly ...

Hahl, Oliver (Oliver Douglas)

2013-01-01T23:59:59.000Z

320

Small Business Customized Excerpts from the User’s Guide  

Office of Energy Efficiency and Renewable Energy (EERE)

Small Business Customized Excerpts from the User’s Guide, to assist in the process for applying to the Small Business Innovation Research (SBIR) program of the U.S. Department of Energy.

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

NERSC User Group Meeting  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NERSC User Group Meeting NERSC User Group Meeting Oct 18, 2010 Outline * About OpenMP * Parallel Regions * Worksharing Constructs * Synchronization * Data Scope * Tasks * Using OpenMP at NERSC 2 3 Common Architectures * Shared Memory Architecture - Multiple CPUs share global memory, could have local cache - Uniform Memory Access (UMA) - Typical Shared Memory Programming Model: OpenMP, Pthreads, ... * Distributed Memory Architecture - Each CPU has own memory - Non-Uniform Memory Access (NUMA) - Typical Message Passing Programming Model: MPI, ... * Hybrid Architecture - UMA within one SMP node - NUMA across nodes - Typical Hybrid Programming Model: mixed MPI/OpenMP, ... What is OpenMP * OpenMP is an industry standard API of C/C++ and Fortran for shared memory parallel programming.

322

User_Sup_Registration  

Broader source: Energy.gov (indexed) [DOE]

Registration (Supervisor) Registration (Supervisor) © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Registration (Supervisor) Purpose The purpose of this job aid is to guide supervisor users through the step-by-step process of managing the registration of employees into scheduled offerings within SuccessFactors Learning. Task A. Register Employees in a Scheduled Offering From the Home page, click the My Employees tab. Click the Register/Withdraw Employees Supervisor Link. View Employee's Registrations 3 Steps Task C Withdraw Employees from a Scheduled Offering - 14 Steps Task B Register Employees in a Scheduled Offering - 17 Steps Task A 1 1 2 2 SuccessFactors Learning v 6.4 User Job Aid Registration (Supervisor)

323

NERSC Users Group  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NUGEX NUGEX NUG Executive Committee (NUGEX) NUGEX is the voice of the user community to NERSC and DOE. While all NUG events are open to all NERSC users, NUGEX members regularly participate in the monthly teleconfernces and the annual face-to-face meeting. NUGEX is consulted on many NERSC policy issues, e.g., batch configurations, disk quotas, services and training offerings. Members of NUGEX also participate in their office's NERSC Requirements Reviews of High Performance Computing and Storage. There are three representatives from each office and three members-at-large. Name Institution Email Address DOE Office Term Expires PI's Project Title Mark Adams Columbia University mark.adams@columbia.edu ASCR Dec 2015 Composable Hierarchically Nested Solvers Anubhav Jain Berkeley Lab

324

NERSC User Environment  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Environment Environment NERSC User Environment Home Directories, Shells and Startup Files All NERSC systems (except PDSF) use global home directories, which are are pre-populated with startup files (also known as dot files) for all available shells. NERSC fully supports bash, csh, and tcsh as login shells. Other shells (ksh, sh, and zsh) are also available. The default shell at NERSC is csh. Changing Your Default Login Shell Use the NERSC Information management (NIM) portal if you want to to change your default login shell. To do this, select Change Shell from the NIM Actions pull-down menu. Managing Your Startup Files The "standard" dot-files are symbolic links to read-only files that NERSC controls. For each standard dot-file, there is a user-writable ".ext" file.

325

User Facility Science Highlights  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

user-facilities/highlights/ The Office of Science user-facilities/highlights/ The Office of Science is the single largest supporter of basic research in the physical sciences in the United States, providing more than 40 percent of total funding for this vital area of national importance. It oversees - and is the principal federal funding agency of - the Nation's research programs in high-energy physics, nuclear physics, and fusion energy sciences. en {611EDD39-818D-4CBA-BFD7-9568495C1566}http://science.energy.gov/bes/highlights/2013/bes-2013-09-a/ The Role of Stripes in Superconducting Behavior Using neutron diffraction, movement of charged atoms arranged as "stripes"

326

User_Sup_Overview  

Broader source: Energy.gov (indexed) [DOE]

Employees (Supervisors) Employees (Supervisors) © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Managing Employees (Supervisors) Purpose The purpose of this job aid is to guide supervisor users through the step-by-step process of managing employees within SuccessFactors Learning. Task A. Open and View a Employee's Record From the Home page, select the My Employees tab. 1 1 Run Reports 5 Steps Task C Approve or Deny Training Requests 9 Steps Task B Open and View an Employee's Record 5 Steps Task A SuccessFactors Learning v 6.4 User Job Aid Managing Employees (Supervisors) © 2011 SuccessFactors, Inc. - 2 - SuccessFactors Learning Confidential. All rights reserved. The My Employees section is designed to

327

User_LaunchSurvey  

Broader source: Energy.gov (indexed) [DOE]

and Completing Assigned Survey and Completing Assigned Survey © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Launching and Completing Assigned Survey Purpose The purpose of this job aid is to guide users through the step-by-step process of launching and completing assigned surveys. Task A. Launch and Complete Assigned Survey From the Home page, filter the To-Do List to show only Surveys. Hover over the course evaluation title. Click Open. 1 2 3 3 2 1 Launch and Complete Assigned Survey 6 Steps Task A SuccessFactors Learning v 6.4 User Job Aid Launching and Completing Assigned Survey © 2011 SuccessFactors, Inc. - 2 - SuccessFactors Learning Complete the survey by selecting the radio button for the appropriate rating

328

User_LaunchOnline  

Broader source: Energy.gov (indexed) [DOE]

Online Content Online Content © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Launching Online Content Purpose The purpose of this job aid is to guide users through the step-by-step process of identifying and launching online content. Task A. Identify Online Content From the Home page, filter the To-Do List to show Online Courses only. The online icon ( ) in the Type column indicates the content type. 2 1 Launch Online Content 5 Steps Task B Identify Online Content 2 Steps Task A 1 2 SuccessFactors Learning v 6.4 User Job Aid Launching Online Content Task B. Launch Online Content From the To-Do List, hover over the title of the item you wish to launch and then click Go to Content.

329

ORPS User Registration Form  

Broader source: Energy.gov (indexed) [DOE]

DEPARTMENT OF ENERGY DEPARTMENT OF ENERGY OPERATIONAL EVENT INFORMATION SYSTEMS REGISTRATION FORM User Registration For: ORPS SUBMIT TO: U.S. DOE: PHONE: 800-473-4375 HSS InfoCenter, HS-1.22, 270CC FAX: 301-903-9823 1000 Independence Ave., SW Washington, DC 20585-0270 (Type or Print) 1. Name__________________________________________________________________________Birth date_______/_______ (Last) (First) (Middle Initial) (Month) (Day) 2.JobTitle_______________________________________________________________________________________________ 3. Company Name________________________________________________________________________________________ 4. Address________________________________________________ Mail Stop______________________________________

330

T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated  

Broader source: Energy.gov (indexed) [DOE]

2: VMware vFabric tc Server Lets Remote Users Login Using 2: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords August 12, 2011 - 3:47pm Addthis PROBLEM: A vulnerability was reported in VMware vFabric tc Server. A remote user can login using an obfuscated version of their password. PLATFORM: Version(s): vFabric tc Server 2.0.0.RELEASE to 2.0.5.SR01, 2.1.0.RELEASE to 2.1.1.SR01 ABSTRACT: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords. reference LINKS: SecurityTracker Alert ID: 1025923 VMware VFabric Download CVE-2011-0527 IMPACT ASSESSMENT: Medium Discussion: If the system stores passwords used for JMX authentication in an obfuscated form, a remote user can use the password in obfuscated form (or in plain

331

U-024: IBM Lotus Sametime Configuration Servlet Lets Remote Users Obtain  

Broader source: Energy.gov (indexed) [DOE]

024: IBM Lotus Sametime Configuration Servlet Lets Remote Users 024: IBM Lotus Sametime Configuration Servlet Lets Remote Users Obtain Configuration Data U-024: IBM Lotus Sametime Configuration Servlet Lets Remote Users Obtain Configuration Data November 1, 2011 - 8:15am Addthis PROBLEM: IBM Lotus Sametime Configuration Servlet Lets Remote Users Obtain Configuration Data. PLATFORM: All Sametime Platforms : 7.0, 7.5, 7.5.1, 7.5.1.1, 7.5.1.2, 8.0, 8.0.1, 8.0.2, 8.5, 8.5.1, 8.5.1.1, 8.5.2 ABSTRACT: A remote user can obtain configuration information. reference lINKS: IBM Sametime Security Bulletin SecurityTracker Alert ID: 1026255 CVE-2011-1370 IMPACT ASSESSMENT: Medium Discussion: The Sametime server contains a configuration servlet that is accessed by several Sametime server processes. By default, this servlet does not require authentication, which could potentially allow an unauthorized user

332

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Broader source: Energy.gov (indexed) [DOE]

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

333

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Broader source: Energy.gov (indexed) [DOE]

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

334

Biomass Feedstock National User Facility  

Broader source: Energy.gov [DOE]

Breakout Session 1B—Integration of Supply Chains I: Breaking Down Barriers Biomass Feedstock National User Facility Kevin L. Kenney, Director, Biomass Feedstock National User Facility, Idaho National Laboratory

335

MagLab - User Awards  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Users Hub Arrow User Awards Scientists who do research at the MagLab are often honored for their excellent work. Christopher Reddy 2014 C.C. Patterson Award (December 2013) Chris...

336

Investigation on the Core Bypass Flow in a Very High Temperature Reactor  

SciTech Connect (OSTI)

Uncertainties associated with the core bypass flow are some of the key issues that directly influence the coolant mass flow distribution and magnitude, and thus the operational core temperature profiles, in the very high-temperature reactor (VHTR). Designers will attempt to configure the core geometry so the core cooling flow rate magnitude and distribution conform to the design values. The objective of this project is to study the bypass flow both experimentally and computationally. Researchers will develop experimental data using state-of-the-art particle image velocimetry in a small test facility. The team will attempt to obtain full field temperature distribution using racks of thermocouples. The experimental data are intended to benchmark computational fluid dynamics (CFD) codes by providing detailed information. These experimental data are urgently needed for validation of the CFD codes. The following are the project tasks: • Construct a small-scale bench-top experiment to resemble the bypass flow between the graphite blocks, varying parameters to address their impact on bypass flow. Wall roughness of the graphite block walls, spacing between the blocks, and temperature of the blocks are some of the parameters to be tested. • Perform CFD to evaluate pre- and post-test calculations and turbulence models, including sensitivity studies to achieve high accuracy. • Develop the state-of-the art large eddy simulation (LES) using appropriate subgrid modeling. • Develop models to be used in systems thermal hydraulics codes to account and estimate the bypass flows. These computer programs include, among others, RELAP3D, MELCOR, GAMMA, and GAS-NET. Actual core bypass flow rate may vary considerably from the design value. Although the uncertainty of the bypass flow rate is not known, some sources have stated that the bypass flow rates in the Fort St. Vrain reactor were between 8 and 25 percent of the total reactor mass flow rate. If bypass flow rates are on the high side, the quantity of cooling flow through the core may be considerably less than the nominal design value, causing some regions of the core to operate at temperatures in excess of the design values. These effects are postulated to lead to localized hot regions in the core that must be considered when evaluating the VHTR operational and accident scenarios.

Hassan, Yassin

2013-10-22T23:59:59.000Z

337

Oil Bypass Filter Technology Evaluation, Fourth Quarterly Report, July--September 2003  

SciTech Connect (OSTI)

This fourth Oil Bypass Filter Technology Evaluation report details the ongoing fleet evaluation of an oil bypass filter technology by the Idaho National Engineering and Environmental Laboratory (INEEL) for the U.S. Department of Energy’s FreedomCAR & Vehicle Technologies Program. Eight four-cycle diesel-engine buses used to transport INEEL employees on various routes have been equipped with oil bypass filter systems from the puraDYN Corporation. The bypass filters are reported to have engine oil filtering capability of <1 micron and a built-in additive package to facilitate extended oil-drain intervals. To date, the eight buses have accumulated 259,398 test miles. This represents an avoidance of 21 oil changes, which equates to 740 quarts (185 gallons) of oil not used or disposed of. To validate the extended oil-drain intervals, an oil-analysis regime evaluates the fitness of the oil for continued service by monitoring the presence of necessary additives, undesirable contaminants, and engine-wear metals. For bus 73450, higher values of iron have been reported, but the wear rate ratio (parts per million of iron per thousand miles driven) has remained consistent. In anticipation of also evaluating oil bypass systems on six Chevrolet Tahoe sport utility vehicles, the oil is being sampled on each of the Tahoes to develop a characterization history or baseline for each engine.

James E. Francfort; Larry Zirker

2003-11-01T23:59:59.000Z

338

A user interface management system  

Science Journals Connector (OSTI)

The design and construction of the user interface to interactive systems is receiving increased attention. This paper describes a user interface management system that allows a designer/developer to focus on the logical functionality of an application ... Keywords: User interface management

David J. Kasik

1982-07-01T23:59:59.000Z

339

Prism users guide.  

SciTech Connect (OSTI)

Prism is a ParaView plugin that simultaneously displays simulation data and material model data. This document describes its capabilities and how to use them. A demonstration of Prism is given in the first section. The second section contains more detailed notes on less obvious behavior. The third and fourth sections are specifically for Alegra and CTH users. They tell how to generate the simulation data and SESAME files and how to handle aspects of Prism use particular to each of these codes.

Weirs, V. Gregory

2012-03-01T23:59:59.000Z

340

SSRL Users' Organization | Stanford Synchrotron Radiation Lightsource  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

concerned with representing the interests of the SSRL users (see Charter). Users elect members to serve on the Users' Executive Committee (UEC) to carry out the business of...

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Computations of high-pressure steam flow in the turbine bypass valve  

SciTech Connect (OSTI)

The objective of the present study is to investigate the steam flow behavior through the high-pressure turbine bypass valve. Efforts have mainly been directed at investigating the process of steam flow and property variations aforementioned bypass valve as well as to obtain correlations between the flow rate and the valve opening ratio. Modeling of the high-pressure turbulent steam flow was performed on a three-dimensional non-staggered grid system by employing the finite volume method and by solving the three-dimensional, turbulent, compressible Navier-Stokes, and energy equations. Through this research, numerous data have been acquired and analyzed. These efforts enable one to obtain a correlation data set for the valve opening versus flow rate coefficient of the valve. One of the significant accomplishments is to use the model presented here to further improve a design of a turbine bypass flow valve.

Amano, R.S.; Draxler, G.R.

1999-07-01T23:59:59.000Z

342

User_ApproveTrainingRequest  

Broader source: Energy.gov (indexed) [DOE]

Approving User Training Requests Approving User Training Requests © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Approving User Training Requests Purpose The purpose of this job aid is to guide users through the step-by-step process of approving a user training request. Task A. Approve a User Training Request From the Home Page, click the You have pending approval requests link in the Alerts box. The Pending Reviews and Approvals page displays and defaults open to the pending approval. Click the expand icon ( ) next to the user's name and/or click the Title link for additional information on the request. Select the Enter Reasons for Approvals or Denials checkbox to allow for comments. Select the Approve radio

343

EMSL User Executive Committe Meeting  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Executive User Executive Committee Meeting July 13, 2011 Recommendations Valerie Copie, UEC Chair User Meetings/Workshops EUC Comments & Recommendations: The UEC supports EMSL's focus on specific areas for User meetings and workshops rather than organizing a generalized User Meeting Focused meetings may provide opportunities for users to visit EMSL more often and to participate in team building as envisaged by the new vision of EMSL2.0 The UEC would like EMSL to have broad representations at these workshops to avoid having too many internal participants. The Pore-scale workshop may be a good model to follow for focused workshops While the UEC supports focused workshops, the entire user community should be welcome to attend them and informed about these activities

344

2001 NERSC User Survey Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

1 User Survey Results 1 User Survey Results Show All | 1 2 3 4 5 ... 11 | Next » 2001 User Survey Results Table of Contents Response Summary User Information Overall Satisfaction and Importance All Satisfaction Questions and Changes from Previous Years NERSC Information Management (NIM) System Web and Communications Hardware Resources Software Training User Services Comments about NERSC Response Summary NERSC extends its thanks to the 237 users who participated in this year's survey; this compares with 134 respondents last year. The respondents represent all five DOE Science Offices and a variety of home institutions: see User Information. Your responses provide feedback about every aspect of NERSC's operation, help us judge the quality of our services, give DOE information on how well

345

2006 NERSC User Survey Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

6 User Survey Results 6 User Survey Results Show All | 1 2 3 4 5 ... 15 | Next » 2006 User Survey Results Table of Contents Survey Results Users are invited to provide overall comments about NERSC: Here are the survey results: Respondent Demographics Overall Satisfaction and Importance All Satisfaction, Importance and Usefulness Ratings All Usefulness Topics Hardware Resources Software Visualization and Data Analysis HPC Consulting Services and Communications Web Interfaces Training Comments about NERSC Survey Results Many thanks to the 256 users who responded to this year's User Survey. This represents a response rate of about 13 percent of the active NERSC users. The respondents represent all six DOE Science Offices and a variety of home institutions: see Respondent Demographics. The survey responses provide feedback about every aspect of NERSC's

346

Photovoltaics information user study  

SciTech Connect (OSTI)

The results of a series of telephone interviews with groups of users of information on photovoltaics (PV) are described. These results, part of a larger study on many different solar technologies, identify types of information each group needed and the best ways to get information to each group. The report is 1 of 10 discussing study results. The overall study provides baseline data about information needs in the solar community. It covers these technological areas: photovoltaics, passive solar heating and cooling, active solar heating and cooling, biomass energy, solar thermal electric power, solar industrial and agricultural process heat, wind energy, ocean energy, and advanced energy storage. An earlier study identified the information user groups in the solar community and the priority (to accelerate solar energy commercialization) of getting information to each group. In the current study only high-priority groups were examined. Results from seven PV groups respondents are analyzed in this report: DOE-Funded Researchers, Non-DOE-Funded Researchers, Researchers Working for Manufacturers, Representatives of Other Manufacturers, Representatives of Utilities, Electric Power Engineers, and Educators.

Belew, W.W.; Wood, B.L.; Marie, T.L.; Reinhardt, C.L.

1980-10-01T23:59:59.000Z

347

Multi-Objective Analysis for Ecosystem Reconciliation on an Engineered Floodplain: The Yolo Bypass in California's Central Valley  

E-Print Network [OSTI]

i Multi-Objective Analysis for Ecosystem Reconciliation on an Engineered Floodplain: The Yolo on an Engineered Floodplain: the Yolo Bypass in California's Central Valley Abstract Floodplains in California. Results suggest several land use changes and inundation management strategies on the Yolo Bypass that can

Pasternack, Gregory B.

348

Oil Bypass Filter Technology Evaluation Ninth Quarterly Report October–December 2004  

SciTech Connect (OSTI)

This Oil Bypass Filter Technology Evaluation quarterly report (October–December 2004) details the ongoing fleet evaluation of oil bypass filter technologies being conducted by the Idaho National Laboratory (INL; formerly Idaho National Engineering and Environmental Laboratory) for the U.S. Department of Energy’s FreedomCAR & Vehicle Technologies Program. Eight INL four-cycle diesel-engine buses used to transport INL employees on various routes and six INL Chevrolet Tahoes with gasoline engines are equipped with oil bypass filter systems from the puraDYN Corporation. This quarter, three additional buses were equipped with bypass filters from Refined Global Solutions. Oil bypass filters are reported to have an engine oil filtering capability of less than 1 micron. Both the puraDYN and Refined Global Solutions bypass filters have a heating chamber to remove liquid contaminate from the oil. During the quarter, the eleven diesel engine buses traveled 62,188 miles, and as of January 3, 2005 the buses had accumulated 643,036 total test miles. Two buses had their engine oil changed this quarter. In one bus, the oil was changed due to its degraded quality as determined by a low total base number (<3.0 mg KOH/g). The other bus had high oxidation and nitration numbers (>30.0 Abs/cm). Although a total of six buses have had their oil changed during the last 26 months, by using the oil bypass filters the buses in the evaluation avoided 48 oil changes, which equates to 1,680 quarts (420 gallons) of new oil not consumed and 1,680 quarts of waste oil not generated. Therefore, over 80% of the oil normally required for oil-changes was not used, and, consequently, the evaluation achieved over 80% reduction in the amount of waste oil normally generated. The six Tahoe test vehicles traveled 39,514 miles, and as of January 3, 2005 the Tahoes had accumulated 189,970 total test miles. The Tahoe filter test is in transition. To increase the rate of bypass filter oil flow on the Tahoes, puraDYN provided a larger orifice assembly, and these are being changed out as the Tahoes come in for regular service.

Larry Zirker; James Francfort; Jordan Fielding

2005-02-01T23:59:59.000Z

349

EFFECTS OF GRAPHITE SURFACE ROUGHNESS ON BYPASS FLOW COMPUTATIONS FOR AN HTGR  

SciTech Connect (OSTI)

Bypass flow in a prismatic high temperature gas reactor (HTGR) occurs between graphite blocks as they sit side by side in the core. Bypass flow is not intentionally designed to occur in the reactor, but is present because of tolerances in manufacture, imperfect installation and expansion and shrinkage of the blocks from heating and irradiation. It is desired to increase the knowledge of the effects of such flow, which has been estimated to be as much as 20% of the total helium coolant flow. Computational fluid dynamic (CFD) simulations can provide estimates of the scale and impacts of bypass flow. Previous CFD calculations have examined the effects of bypass gap width, level and distribution of heat generation and effects of shrinkage. The present contribution examines the effects of graphite surface roughness on the bypass flow for different relative roughness factors on three gap widths. Such calculations should be validated using specific bypass flow measurements. While such experiments are currently underway for the specific reference prismatic HTGR design for the next generation nuclear plant (NGNP) program of the U. S. Dept. of Energy, the data are not yet available. To enhance confidence in the present calculations, wall shear stress and heat transfer results for several turbulence models and their associated wall treatments are first compared for flow in a single tube that is representative of a coolant channel in the prismatic HTGR core. The results are compared to published correlations for wall shear stress and Nusselt number in turbulent pipe flow. Turbulence models that perform well are then used to make bypass flow calculations in a symmetric onetwelfth sector of a prismatic block that includes bypass flow. The comparison of shear stress and Nusselt number results with published correlations constitutes a partial validation of the CFD model. Calculations are also compared to ones made previously using a different CFD code. Results indicate that increasing surface roughness increases the maximum fuel and helium temperatures as do increases in gap width. However, maximum coolant temperature variation due to increased gap width is not changed by surface roughness.

Rich Johnson; Yu-Hsin Tung; Hiroyuki Sato

2011-07-01T23:59:59.000Z

350

Effects of 60 minutes of hyperoxia followed by normoxia before coronary artery bypass grafting on the inflammatory response profile and myocardial injury  

Science Journals Connector (OSTI)

Pre-treatment with hyperoxia followed by normoxia before coronary artery bypass grafting does not protect against myocardial injury.

Inga Karu; Peeter Tähepőld; Arno Ruusalepp; Kersti Zilmer; Mihkel Zilmer; Joel Starkopf

2012-09-14T23:59:59.000Z

351

Automatic detection of users' skill levels using high-frequency user interface events  

Science Journals Connector (OSTI)

Computer users have different levels of system skills. Moreover, each user has different levels of skill across different applications and even in different portions of the same application. Additionally, users' skill levels change dynamically as users ... Keywords: Adaptive user interfaces, Expertise, GOMS, Graphical user interfaces, Intelligent user interfaces, Machine learning, Skill, User modeling

Arin Ghazarian; S. Majid Noorhosseini

2010-06-01T23:59:59.000Z

352

User' Software Manual  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

MM-Group Home MM-Group Home MMG Advisory Committees 4-ID-D Home Recent Publications Beamline Info Optics Instrumentation Software User Info FAQs 4-ID-D Beamline Software Manual Introduction Beamline 4-ID-D uses the EPICS platform for beamline control. This is a distributed client-server software where seperate server computers (IOCs) are used to control and monitor different portions of the beamline, and a separate client computer is used for data aquisition and display information. The client computer controls the other IOCs via the local ethernet network. The EPICS client "MEDM" is used for graphically displaying information about the beamline. The command line driven program SPEC is used for scanning adn other data acquisition fruncitons. More information on each of these is found below.

353

Fermilab Users' Executive Committee  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Outreach Subcommittee Outreach Subcommittee Purpose: Work with Fermilab and with external institutions to increase public awareness of the physics being done at Fermilab. Subcommittee Members 2012-2013 Name Organization Email Mandy Rominsky, Chair Fermilab rominsky AT fnal.gov Mary Anne Cummings Muons, Inc macc AT fnal.gov Daniel Kaplan Illinois Institute of Technology kaplan AT iit.edu Ryan Patterson California Institute of Technology rbpatter AT caltech.edu Breese Quinn University of Mississippi quinn AT phy.olemiss.edu Lee Roberts Boston University roberts AT bu.edu Nikos Varelas (ex-officio) University of Illinois at Chicago varelas AT uic.edu Fermilab User University Profiles Fermilab Outreach Fermilab Office of Communication Fermilab Guided Tours Ask a Scientist Program Physics for Everyone Lecture Series

354

users-guide  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Contents Contents Contents Contents ARGONNE NATIONAL LABORATORY 9700 South Cass Avenue Argonne, IL 60439 in ANL/MCS-TM-234 Users Guide for ROMIO: A High-Performance, Portable MPI-IO Implementation by Rajeev Thakur, Robert Ross, Ewing Lusk, William Gropp, Robert Latham Mathematics and Computer Science Division Technical Memorandum No. 234 Revised May 2004, November 2007, April 2010 This work was supported by the Mathematical, Information, and Computational Sciences Division subprogram of the Office of Advanced Scientific Computing Research, U.S. Department of Energy, under Contract W-31-109-Eng-38; and by the Scalable I/O Initiative, a multiagency project funded by the Defense Advanced Research Projects Agency (Contract DABT63-94-C-0049), the Department of Energy, the National Aeronautics and Space Administration,

355

End User Perspective - Industrial  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Solid State Research Center Solid State Research Center DOE Fuel Cell Portable Power Workshop End User Perspective - Industrial Consumer Electronics Power (< 20-50W) Department of Energy Fuel Cell Portable Power Workshop Jerry Hallmark Manager Energy Technologies Lab Motorola Labs Solid State Research Center DOE Fuel Cell Portable Power Workshop Outline * Energy & Power of Portable Devices * Fuel Cell Applications & Cost * Key Requirements & Challenges * Fuels for Portable Fuel Cells * Fuel Transportation Regulations and Standards * Methanol Fuel Cells - Direct Methanol Fuel Cells - Reformed Methanol Fuel Cells * Technical Challenges 2 Solid State Research Center DOE Fuel Cell Portable Power Workshop Portable Electronics Yearly Energy Usage  :KU 1990 1980  :KU

356

User_Self_Register  

Broader source: Energy.gov (indexed) [DOE]

Registering in a Scheduled Offering Registering in a Scheduled Offering © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Self-Registering in a Scheduled Offering Purpose The purpose of this job aid is to guide users through the step-by-step process of locating scheduled offerings and self-registering from the To-Do List, Calendar of Offerings, and the catalog. Each task below demonstrates a different method of registration. Task A. Register from the To-Do List From the Home page, filter the To-Do List to show All Learning. 1 1 Register from the Advanced Catalog Search - 10 Steps Task C Register from To-Do List 6 Steps Task A Register from the Calendar of Offerings 8 Steps Confirm Registration 3 Steps

357

Lujan Center User Guide  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

3 3 High-Pressure Preferred Orientation Neutron Diffractometer (HIPPO) HIPPO is the first third-generation neutron time- of-flight powder diffractometer constructed in the United States. It achieves very high neutron count rates by virtue of a short (9 m) initial flight path on a high-intensity water moderator and 1360 3 He detector tubes covering 4.8 m 2 of detector area from 10° - 150° in scattering angles. HIPPO was designed and manufactured as a joint effort between LANSCE and the University of California with the goal of doing world-class science by making neutron powder diffractometry an accessible tool to the national user community. D-spacing ranges from 0.12 - 4.80 Å (1.31 - 52.4 Å -1 ) to 1.2 - 47.5 Å (0.13 - 5.3 Å -1 ) are available to support studies of crystal orientation

358

National Library of Energy : User Account  

Office of Scientific and Technical Information (OSTI)

Reset your password Enter either your User Name or Email Address to reset your password. User Name: Email Address: Go...

359

POWGEN Users | ORNL Neutron Sciences  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Information User Information Announcement: POWGEN has started a new partnership with beam line 11A at the Advanced Photon Source where users can get x-ray data if they have an approved POWGEN proposal. Become a POWGEN User POWGEN Experiment Guide: A - Z POWGEN Mail In Program Guide Shipping Addresses for Samples For more detailed information, please visit the ORNL User Facilities Sample Handling and Shipping page. Non-activated samples coming to SNS: Attention: Special requirements (like refrigeration) To: Neutron Sciences User Sample IPTS # XXXX Oak Ridge National Laboratory / SNS Site Chestnut Ridge, Bldg 8920 Oak Ridge, TN 37830 Activated samples (these will also be brought to SNS but must go through check-in procedures at another on-site location): Attention: Special requirements (like refrigeration)

360

APS User News, Issue 76  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

6, February 21, 2012 6, February 21, 2012 CONTENTS DIRECTOR'S CORNER Special Announcement: George Srajer Appointed Project Director for the APS Upgrade and Deputy ALD USER MATTERS -- Registration Open for 2012 APS/CNM/EMC Users Meeting: Our User Science Shapes the Future! -- CALLING ALL VIDEO MAKERS! Submit Your Films for the "Usies Awards"! -- LCLS-II New Instruments Workshops March 19-22, 2012 -- NUFO Goes To Washington! -- Tax Presentation Available BRIEFLY NOTED -- Recognitions and Honors -- Users Meeting Satellite Workshop: "SAXS Software Packages Irena and Nika" -- New Web Page Offers Quick Help Links for Users -- New Mural Graces the Wall near Viewing Area -- General User Proposal Deadline for 2012-2 Run: March 9, 2012 =====================================================

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

1999 NERSC User Survey Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

9 User Survey Results 9 User Survey Results Show All | 1 2 3 4 5 ... 11 | Next » 1999 User Survey Results Table of Contents Respondent Summary Overall Satisfaction User Information Visualization Consulting and Account Support Information Technology and Communication Hardware Resources Software Training Comments about NERSC All Satisfaction Questions and FY 1998 to FY 1999 Changes Respondent Summary NERSC would like to thank all the users who participated in this year's survey. Your responses provide feedback about every aspect of NERSC's operation, help us judge the quality of our services, give DOE information on how well NERSC is doing, point us to areas we can improve, and show how we compare to similar facilities. This year 177 users responded to our survey, compared with 138 last year.

362

User Calendar | Advanced Photon Source  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

APS User Calendar Date Event November 19, 2013 Proposal Review Panel Meetings December 10, 2013 Beamtime Allocation Committee Meeting January 22, 2014 Joint APSUO Steering Committee and Partner User Council Meeting March 7, 2014 Proposal Deadline Run Cycle 2014-2 March 11-13, 2014 Scientific Advisory Committee Meeting May 12-15, 2014 APS/CNM/EMC Users Meeting May 13, 2014 Partner User Council Meeting May 14, 2014 APSUO Steering Committee Meeting July 9, 2014 Joint APSUO Steering Committee and Partner User Council Meeting July 11, 2014 Proposal Deadline Run Cycle 2014-3 September 17, 2014 Joint APSUO Steering Committee and Partner User Council Meeting November 4-6, 2014 Scientific Advisory Committee Meeting March 16-18, 2015 Scientific Advisory Committee Meeting

363

2000 NERSC User Survey Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

0 User Survey Results 0 User Survey Results Show All | 1 2 3 4 5 ... 10 | Next » 2000 User Survey Results Table of Contents Response Summary User Information Overall Satisfaction and Importance All Satisfaction Questions and FY 1999 to FY 2000 Changes Consulting and Account Support Web and Communications Hardware Resources Software Resources Training User Comments Response Summary NERSC extends its thanks to all the users who participated in this year's survey. Your responses provide feedback about every aspect of NERSC's operation, help us judge the quality of our services, give DOE information on how well NERSC is doing, and point us to areas we can improve. Every year we institute changes based on the survey; the FY 1999 survey resulted in the following changes: We created a long-running queue (12 hours maximum) for jobs using up

364

User_Sup_AssignDelegate  

Broader source: Energy.gov (indexed) [DOE]

Delegates (Supervisor) Delegates (Supervisor) © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Assigning Delegates (Supervisor) Purpose The purpose of this job aid is to guide you through the step-by-step process of using the delegate feature within SuccessFactors Learning. A delegate is another user who you identify to act on the work that you need to complete in the user interface. When you identify a user as a delegate through the Delegates area in your Options and Settings screen, the system adds that user's name to the Delegators list. Typically, you identify a user as a delegate when you want the user to perform some of your tasks. You can use the Delegates area to add or edit the permissions for a delegate, which you might want to do, for example, if you plan to take an

365

2013 ALS User Meeting Highlights  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2013 ALS User Meeting Highlights 2013 ALS User Meeting Highlights 2013 ALS User Meeting Highlights Print This year's ALS User Meeting launched with a welcome from Users' Executive Committee Chair Corie Ralston and LBNL Director Paul Alivisatos. ALS Director Roger Falcone followed with a "state of the ALS" presentation that began with a reminder of the ALS mission, which he noted remains true even in the midst of a government shutdown: "Supporting users in doing outstanding science in a safe environment." Falcone gave the 414 meeting attendees an update on the ALS beamlines, which included good news about increased user numbers thanks to the new RAPIDD access system, enhanced robotics, and remote capabilities. Falcone reflected that ALS metrics continue to represent our highly productive users-the number of journal articles and papers per user that come from ALS research have continued to grow in the past year. Looking forward, Falcone touched on how a proposed ALS upgrade to a diffraction-limited light source would increase scientific capabilities.

366

2013 ALS User Meeting Highlights  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2013 ALS User Meeting Highlights 2013 ALS User Meeting Highlights 2013 ALS User Meeting Highlights Print Thursday, 24 October 2013 09:06 This year's ALS User Meeting launched with a welcome from Users' Executive Committee Chair Corie Ralston and LBNL Director Paul Alivisatos. ALS Director Roger Falcone followed with a "state of the ALS" presentation that began with a reminder of the ALS mission, which he noted remains true even in the midst of a government shutdown: "Supporting users in doing outstanding science in a safe environment." Falcone gave the 414 meeting attendees an update on the ALS beamlines, which included good news about increased user numbers thanks to the new RAPIDD access system, enhanced robotics, and remote capabilities. Falcone reflected that ALS metrics continue to represent our highly productive users-the number of journal articles and papers per user that come from ALS research have continued to grow in the past year. Looking forward, Falcone touched on how a proposed ALS upgrade to a diffraction-limited light source would increase scientific capabilities.

367

User Facility | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Materials Center for Nanoscale Materials More Electron Microscopy Center More The Nanoscience and Technology Division hosts the following user facility: The Center for Nanoscale...

368

Library Terms That Users Understand  

E-Print Network [OSTI]

University of Newfoundland Libraries Test methods: user taskUsability of the Academic Library Web Site: ImplicationsDesign," College & Research Libraries (July Library Website

Kupersmith, John

2012-01-01T23:59:59.000Z

369

Fermilab | Users' Executive Committee | History  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Date Established: December 1967 Purpose: To conduct the business affairs of the Fermilab Users Organization between meetings of the general membership. Meeting Pattern: As...

370

Scatter – secure code authentication for efficient reprogramming in wireless sensor networks  

Science Journals Connector (OSTI)

Currently proposed solutions to secure code dissemination in wireless sensor networks (WSNs) involve the use of expensive public-key digital signatures. In this work, we present Scatter, a secure code dissemination protocol that enables sensor nodes to authenticate the program image efficiently. To achieve this, we use a scheme that offers source authentication in the group setting like a public-key signature scheme, but with signature and verification times much closer to those of a MAC (message authentication code). In this way, Scatter avoids the use of elliptic curve cryptography and manages to surpass all previous attempts for secure code dissemination in terms of energy consumption, memory and time efficiency. Besides the design and theoretical analysis of the protocol, we also report the experimental evaluation of Scatter in two different hardware platforms, Mica2 and MicaZ, which proves its efficiency in practice.

Ioannis Krontiris; Tassos Dimitriou

2011-01-01T23:59:59.000Z

371

PAP: A privacy and authentication protocol for passive RFID tags Alex X. Liu *, LeRoy A. Bailey  

E-Print Network [OSTI]

people about consumer privacy protection and other security loopholes that make RFID tags an easy targetPAP: A privacy and authentication protocol for passive RFID tags Alex X. Liu *, LeRoy A. Bailey 2009 Accepted 20 March 2009 Available online 31 March 2009 Keywords: RFID Privacy Authentication

Liu, Alex X.

372

Running Jobs Scott French" NERSC User Services Group" New User...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Scott French" NERSC User Services Group" " New User Training" October 30, 2014 Jobs at NERSC * Most j obs a re p arallel, u sing 1 0s t o 1 00,000+ c ores * Produc8on r uns e...

373

V-190: ASUS RT-N66U Router AiCloud Security Bypass Security Issue |  

Broader source: Energy.gov (indexed) [DOE]

0: ASUS RT-N66U Router AiCloud Security Bypass Security Issue 0: ASUS RT-N66U Router AiCloud Security Bypass Security Issue V-190: ASUS RT-N66U Router AiCloud Security Bypass Security Issue July 2, 2013 - 12:38am Addthis PROBLEM: ASUS RT-N66U Router AiCloud Security Bypass Security Issue PLATFORM: ASUS RT-N66U Router firmware versions 3.0.0.4.270 and 3.0.0.4.354. ABSTRACT: A security issue in ASUS RT-N66U Router has been reported REFERENCE LINKS: Secunia Advisory SA53931 neohapsis IMPACT ASSESSMENT: Medium DISCUSSION: The security issue is caused due to the device not properly restricting access when processing certain HTTPS requests and can be exploited to gain access to otherwise restricted functionality and e.g. disclose the contents of arbitrary files and directories. Successful exploitation requires the AiCloud web service to be enabled.

374

THE CRESCENT BYPASS: A RIPARIAN RESTORATION PROJECT ON THE KINGS RIVER (FRESNO COUNTY)1  

E-Print Network [OSTI]

THE CRESCENT BYPASS: A RIPARIAN RESTORATION PROJECT ON THE KINGS RIVER (FRESNO COUNTY)1 Jonathan A-24, 1988; Davis, California. 2 Staff Biologist and Environmental Division Chief, respectively, Kings River Conservation District, Fresno, Calif. Abstract: The Kings River Conservation District planted over 1200 plants

Standiford, Richard B.

375

Fermilab Users' Executive Committee  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2012-2013 UEC and GSA Members at October meeting 2012-2013 UEC and GSA Members at October meeting Current Members of the Fermilab Users Executive Committee 2012-2013 Name and Organization Term Email Nikos Varelas, Chair University of Illinois at Chicago 9/11 - 8/13 varelas AT uic.edu Mary Anne Cummings Muons, Inc. 9/12 - 8/14 macc AT fnal.gov Craig Group University of Virginia 9/12 - 8/14 group AT fnal.gov Sergo Jindariani Fermilab 9/11 - 8/13 sergo AT fnal.gov Daniel Kaplan Illinois Institute of Technology 9/11 - 8/13 kaplan AT iit.edu Ryan Patterson California Institute of Technology 9/11 - 8/13 rbpatter AT caltech.edu Greg Pawloski University of Minnesota 9/11 - 8/13 pawloski AT umn.edu Breese Quinn University of Mississippi 9/12 - 8/14 quinn AT phy.olemiss.edu Lee Roberts Boston University 9/12 - 8/14 roberts AT bu.edu Mandy Rominsky

376

NSLS Industrial User Program  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Jun Wang Physicist, Industrial Program Coordinator Phone: 344-2661 Email: junwang@bnl.gov Jun Wang is an Industrial Program Coordinator in the Photon Science Directorate at Brookhaven National Laboratory. She is working closely with industrial researchers as well as beamline staff to identify and explore new opportunities in industrial applications using synchrotron radiation. She has been leading the industrial research program including consultation, collaboration and outreach to the industrial user groups. Before joining BNL in 2008, Jun Wang was a Lead Scientist for a high-resolution high throughput powder diffraction program at the Advanced Photon Source (APS). As a Physicist at BNL, her research focuses on materials structure determination and evolution. Her expertise covers wide range x-ray techniques such as thin film x-ray diffraction and reflectivity, powder diffraction, small angle x-ray scattering, protein solution scattering and protein crystallography, as well as x-ray imaging. Currently she is the project leader of a multi-million dollar project on transmission x-ray microscopy recently funded by the U.S. DOE and the spokesperson for this new imaging beamline at the NSLS. She has also been collaborating with universities and industries for several projects on energy research at the NSLS.

377

Numerical control user experience  

SciTech Connect (OSTI)

AUTOCON is an acronym for Automatic Contouring, a program which generates a contour toolpath for the external profile of printed writing boards (PWB) using ICEM DDN. AUTOCON originates from the Computer Aided Process Planning (CAPP) Procedure developed by Electrical Manufacturing at Allied Bendix. The CAPP program uses electronically transmitted graphics files received from a design agency to generate automatic panel layouts and travellers for Process Engineers. The objective of AUTOCON is to utilize the information from the CAPP program to generate Numerical Control tapes. If the CAPP program can be utilized to its full potential, it is estimated that a good portion of the 60 to 90 PWB tapes shipped each month from our Numerical Control Department could be eliminated from conventional N/C Programming. The purpose of AUTOCON is to automatically generate a toolpath around the external profile of a PWB with no user intervention. The Process Engineer can generate a profile contour N/C tape after he has completed the panel layout and traveller through CAPPS for a part. After the layout and traveller illustrations have been completed, the same geometry can then be utilized again for the N/C tape. An N/C Analysist then reviews the listing for a final checkout of the job. 13 figs.

Butler, J.

1985-10-01T23:59:59.000Z

378

Register with the User Office  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Register with the User Office Print Register with the User Office Print The following registration process MUST be completed online by new and returning users at least TWO WEEKS prior to arrival at the ALS. Not a U.S. citizen? Please look at Documents for Foreign Nationals well ahead of your visit. Bring all relevant documents to the ALS in order to complete your registration. Step 1: Two Weeks Prior to Coming to the ALS New Users: complete and submit an ALS Participating Guest Registration Form - you will automatically receive a registration submission number when the form is submitted. Returning Users: complete and submit a returning user form - you will need your guest (badge) number, which can be found in the Lab Directory, under your name. Notify the ALS User Office of your arrival: This e-mail address is being protected from spambots. You need JavaScript enabled to view it the day and approximate time of your arrival and whether you will travel by car or shuttle bus to the ALS. Please include your registration submission number. The User Office will inform the main gate of your arrival and will prepare your paperwork so there will be no delay on arrival.

379

Register with the User Office  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Register with the User Office Print Register with the User Office Print The following registration process MUST be completed online by new and returning users at least TWO WEEKS prior to arrival at the ALS. Not a U.S. citizen? Please look at Documents for Foreign Nationals well ahead of your visit. Bring all relevant documents to the ALS in order to complete your registration. Step 1: Two Weeks Prior to Coming to the ALS New Users: complete and submit an ALS Participating Guest Registration Form - you will automatically receive a registration submission number when the form is submitted. Returning Users: complete and submit a returning user form - you will need your guest (badge) number, which can be found in the Lab Directory, under your name. Notify the ALS User Office of your arrival: This e-mail address is being protected from spambots. You need JavaScript enabled to view it the day and approximate time of your arrival and whether you will travel by car or shuttle bus to the ALS. Please include your registration submission number. The User Office will inform the main gate of your arrival and will prepare your paperwork so there will be no delay on arrival.

380

Register with the User Office  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Register with the User Office Print Register with the User Office Print The following registration process MUST be completed online by new and returning users at least TWO WEEKS prior to arrival at the ALS. Not a U.S. citizen? Please look at Documents for Foreign Nationals well ahead of your visit. Bring all relevant documents to the ALS in order to complete your registration. Step 1: Two Weeks Prior to Coming to the ALS New Users: complete and submit an ALS Participating Guest Registration Form - you will automatically receive a registration submission number when the form is submitted. Returning Users: complete and submit a returning user form - you will need your guest (badge) number, which can be found in the Lab Directory, under your name. Notify the ALS User Office of your arrival: This e-mail address is being protected from spambots. You need JavaScript enabled to view it the day and approximate time of your arrival and whether you will travel by car or shuttle bus to the ALS. Please include your registration submission number. The User Office will inform the main gate of your arrival and will prepare your paperwork so there will be no delay on arrival.

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

User experience with memory management  

SciTech Connect (OSTI)

Effects on computer users of the introduction of CMM at NOS1.3(485) at Sandia National Laboratories, Albuquerque are reported. Background information on the configuration, operating environment, users, and kinds of applications run on the different machines is given. Then some of the problems associated with CMM are described. Although they were overcome, they were more numerous than anticipated. (RWR)

Lane, G.L.

1980-01-01T23:59:59.000Z

382

Help:User page | Open Energy Information  

Open Energy Info (EERE)

A user page is a page about a wiki user; someone who registered on the A user page is a page about a wiki user; someone who registered on the wiki, and is (most probably) a contributor. If you have registered, you can create your own user page. Your user page is linked in the top right. More importantly, others will see links to your user page from various places which assist wiki collaboration. This includes the "Recent changes" and "page history" displays (See Help:Tracking changes). You can also link to your user page within text of a wiki page, which is mainly useful on talk pages when you sign your name. Contents 1 What to put on your user page 1.1 User scratchpad / development area 2 Other people's user pages 2.1 User Contributions 2.2 Editing someone else's page 2.3 User talk pages What to put on your user page

383

APS User News, Issue 70  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

70, July 7, 2011 70, July 7, 2011 CONTENTS 1. DIRECTOR'S CORNER USER MATTERS 2. More User Mysteries Solved! 3. Several APS Users Recognized in Inaugural Class of New American Crystallographic Association Fellows Program 4. Congratulations to Keith Moffat, Winner of the ACA 2011 Patterson Award 5. Paul Fenter Wins Warren Award for X-ray Diffraction Studies 6. Energy, Enthusiasm, Cooperation, and Commitment Characterize NUFO Annual Meeting BRIEFLY NOTED -- Heads Up: User Participation in Upcoming Reviews -- Upcoming General User Proposal Deadlines -- Reminder: Registration for 2011 X-ray Science Gordon Research Conference & Seminar Closes July 9, 2011 -- Shanghai Institute of Applied Physics Workshop on Science with Free-Electron Lasers on August 20-21, 2011 =====================================================

384

APS User News, Issue 82  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2, November 6, 2012 2, November 6, 2012 CONTENTS DIRECTOR'S CORNER USER MATTERS -- APS User Wins Nobel Prize in Chemistry -- Physics, Picasso, and House Paint: X-rays Solve a Mystery -- CALL FOR: APS Workshop Proposals and Invited Speaker Suggestions--Due January 11, 2013! --"There's an app for APS!" BRIEFLY NOTED -- Welcome Susan White-DePace, Associate Manager for User Programs -- Nature.com Launches Scientific Reports -- Sidewalk Construction Begins from APS to Building 314 -- Newly Reduced Speed Limit in 201 Area -- Upcoming Meetings of Interest -- General User Proposal Deadline for Run 2013-2: March 8, 2013 -- Current APS Job Openings -- Save the Date: 2013 APS/CNM/EMC Users Meeting Set for May 6-9, 2013 ==================================================== Instructions for subscribing, unsubscribing, and submitting info

385

2004 NERSC User Survey Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

4 User Survey Results 4 User Survey Results Show All | 1 2 3 4 5 ... 13 | Next » 2004 User Survey Results Table of Contents Response Summary Respondent Demographics Overall Satisfaction and Importance All Satisfaction, Importance and Usefulness Ratings Hardware Resources Software Security and One Time Passwords Visualization and Data Analysis HPC Consulting Services and Communications Web Interfaces Training Comments about NERSC Response Summary Many thanks to the 209 users who responded to this year's User Survey. The respondents represent all six DOE Science Offices and a variety of home institutions: see Respondent Demographics. The survey responses provide feedback about every aspect of NERSC's operation, help us judge the quality of our services, give DOE information on how well NERSC is doing, and point us to areas we can improve. The

386

2005 NERSC User Survey Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

5 User Survey Results 5 User Survey Results Show All | 1 2 3 4 5 ... 10 | Next » 2005 User Survey Results Table of Contents Response Summary Respondent Demographics All Satisfaction, Importance and Usefulness Ratings Hardware Resources Software Visualization and Data Analysis Services and Communications Web Interfaces Training Comments about NERSC Response Summary Many thanks to the 201 users who responded to this year's User Survey. The respondents represent all six DOE Science Offices and a variety of home institutions: see Respondent Demographics. The survey responses provide feedback about every aspect of NERSC's operation, help us judge the quality of our services, give DOE information on how well NERSC is doing, and point us to areas we can improve. The survey results are listed below.

387

NMG documentation, part 1: user`s guide  

SciTech Connect (OSTI)

This is the first of a three-part report documenting NMG, the Numerical Mathematics Guide. Part I is aimed at the user of the system. It contains an introduction, with an outline of the complete report, and Chapter 1, User`s Point of View. Part II is aimed at the programmer and contains Chapter 2, How It Works. Part III is aimed at the maintainer of NMG and contains Chapter 3, Maintenance, and Chapter 4, Validation. Each chapter has its own page numbering and table of contents.

Fritsch, F.N.; Dickinson, R.P. Jr.

1996-07-01T23:59:59.000Z

388

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

September 28, 2012 September 28, 2012 U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands Trend Micro has been notified of a potential product vulnerability in Control Manager. September 27, 2012 U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service A vulnerability was reported in Cisco IOS. September 26, 2012 U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users A vulnerability was reported in Oracle Database. September 25, 2012 U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability Multiple RSA Products Authentication Bypass Vulnerability September 21, 2012 U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain

389

Fermilab Users' Outreach Workshop, 2009  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Fermilab Users' Outreach Workshop Fermilab Users' Outreach Workshop June 4 & 5, 2009 The Fermilab UsersÂ’ Organization will host an Outreach Workshop on June 4th and 5th, 2009, in association with the annual Users Meeting. The workshop will be an opportunity to exchange ideas on effective and practical ways to communicate the excitement of physics and what we do as scientists to students, the general public and government officials. We hope the sessions will encourage members of the Users' community to become engaged in outreach activities. Activities Tesla Coils June 3rd 9:30PM, Parking Lot Lab 3: While enjoying the traditional Users Meeting Festa, see the Tesla Coil show. Directions June 4th During coffee breaks and lunch on the second day of the Users Meeting proper, browse posters and demonstrations showcasing sucessful educational outreach programs. Also featured, posters from students enrolled in the Saturday Morning Physics program detailing what the outreach program meant to them. Instructions for Poster Presenters, follow this link.

390

Multielemental Fingerprinting as a Tool for Authentication of Organic Wheat, Barley, Faba Bean, and Potato  

Science Journals Connector (OSTI)

Multielemental Fingerprinting as a Tool for Authentication of Organic Wheat, Barley, Faba Bean, and Potato ... Potato peels were also manually removed by a ceramic peeler on selected subsamples to allow comparison with automatically peeled potatoes. ... Analysis of automatically and manually peeled potatoes as well as potato peels confirmed that the automatic peeling process did not induce any systematic and significant contamination. ...

Kristian H. Laursen; Jan K. Schjoerring; Jřrgen E. Olesen; Margrethe Askegaard; Ulrich Halekoh; Sřren Husted

2011-03-21T23:59:59.000Z

391

Reliable and Semi-reliable Communication with Authentication in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Reliable and Semi-reliable Communication with Authentication in Mobile Ad Hoc Networks Falko of wireless ad hoc sensor networks is the error-proneness and, therefore, the unreliability of communication describe a new approach and an according protocol for usage in ad hoc networks that provides reliable

Breu, Ruth

392

Project List 1. Project Name: Efficient Anonymous Private Authentication Protocol for RFID Systems  

E-Print Network [OSTI]

based authentication. Publication: · Md. Endadul Hoque, Farzana Rahman, and Sheikh I. Ahamed, "Anon's geocoding and mapping API. Publication: ···· Farzana Rahman, Casey O'Brien, Sheikh I. Ahamed, He Zhang'Brien, Kristine Manning, Jason Cowdy, Sheikh Iqbal Ahamed, "Let EcoDrive be Your Guide: Development of a Mobile

Brylow, Dennis

393

Heart-to-Heart (H2H): Authentication for Implanted Medical Devices  

E-Print Network [OSTI]

Heart-to-Heart (H2H): Authentication for Implanted Medical Devices Masoud Rostami Rice University Rice University Houston, TX farinaz@rice.edu ABSTRACT We present Heart-to-Heart (H2H), a system patients to over-the-air attack and physical harm. H2H makes use of ECG (heartbeat data

394

Distillation Codes and Applications to DoS Resistant Multicast Authentication  

E-Print Network [OSTI]

Distillation Codes and Applications to DoS Resistant Multicast Authentication Chris Karlof UC We introduce distillation codes, a method for streaming and storing data. Like erasure codes, distillation codes allow information to be decoded from a sufficiently large quorum of symbols. In contrast

Perrig, Adrian

395

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks  

E-Print Network [OSTI]

Sciences Temple University Philadelphia, PA 19122 Email: jiewu@temple.edu Abstract--Message authentication by the degree of the polynomial: when the number of messages transmitted is larger than this threshold allows any node to transmit an unlimited number of messages without suffering the threshold problem

Wu, Jie

396

Hardware Acceleration of the SRP Authentication Protocol Peter Groen1,2  

E-Print Network [OSTI]

Hardware Acceleration of the SRP Authentication Protocol Peter Groen1,2 , Panu H¨am¨al¨ainen2 , Ben employed is the Secure Remote Password (SRP) authenti- cation protocol [15]. It makes extensive use of hash that can be called from soft- ware routines in the SRP protocol. This paper is structured as follows

Kuzmanov, Georgi

397

ECG-Based Authentication Fahim Sufi, Ibrahim Khalil, and Jiankun Hu  

E-Print Network [OSTI]

ECG-Based Authentication Fahim Sufi, Ibrahim Khalil, and Jiankun Hu 17 Contents 17.1 Background of ECG . . . . . . . . . . . . . . . . . . . . . . 310 17.1.1 Physiology of ECG . . . . . . . . . . . . . . . . . . 310 17.1.2 Rhythm Analysis . . . . . . . . . . . . . . . . . . . . 312 17.2 What Can ECG Based

Hu, Jiankun

398

T-721:Mac OS X Directory Services Lets Local Users View User Password  

Broader source: Energy.gov (indexed) [DOE]

21:Mac OS X Directory Services Lets Local Users View User 21:Mac OS X Directory Services Lets Local Users View User Password Hashes T-721:Mac OS X Directory Services Lets Local Users View User Password Hashes September 20, 2011 - 8:45am Addthis PROBLEM: Mac OS X Directory Services Lets Local Users View User Password Hashes. PLATFORM: Mac OS X Lion (10.7) ABSTRACT: A local user can view user password hashes. reference LINKS: SecurityTracker Alert ID: 1026067 Apple Support Downloads Apple Security Updates Apple OS X Lion v10.7.1 Update IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Mac OS X. A local user can view user password hashes. A local user can invoke the following Directory Services command line command to view the password hash for the target user: dscl localhost -read /Search/Users/[target user] A local user can change their

399

Project-Role Pair user_tokens  

E-Print Network [OSTI]

OSAC Users (U) Domains (D) Roles (R) User Assignment (UA) Permission Assignment (PA) Project Ownership (PO) Project-Role Pair (PRP) Projects (P) Tokens (T) User Ownership (UO) Services (S) user_tokens token_project Groups (G) Group Ownership (GO) User Group (UG) Group Assignment (GA) token_roles PERMS

Sandhu, Ravi

400

CFD Analysis of Core Bypass Flow and Crossflow in the Prismatic Very High Temperature Gas-cooled Nuclear Reactor  

E-Print Network [OSTI]

Very High Temperature Rector (VHTR) had been designated as one of those promising reactors for the Next Generation (IV) Nuclear Plant (NGNP). For a prismatic core VHTR, one of the most crucial design considerations is the bypass flow and crossflow...

Wang, Huhu 1985-

2012-12-13T23:59:59.000Z

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Left ventricular thrombosis following coronary artery bypass grafting in a patient with nephrotic syndrome: Report of a case  

Science Journals Connector (OSTI)

We present herein the case of a 63-year-old man with nephrotic syndrome who developed an apical infarction 4 days after undergoing coronary artery bypass grafting. Echocardiography done 2 weeks postoperatively...

Yukio Kioka; Hiroyuki Irié; Masahiro Okada; Nobuyuki Yamada…

1995-01-01T23:59:59.000Z

402

User Facilities for Industry 101  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Satellite!Workshop!10!-!User!Facilities!for!Industry!101! Satellite!Workshop!10!-!User!Facilities!for!Industry!101! Organizers:+Andreas+Roelofs+(CNM),+Jyotsana+Lal+(APS),+Katie+Carrado+Gregar+(CNM),+and+Susan+Strasser+ (APS)! ! In! order! to! increase! awareness! of! the! industrial! community! to! Argonne! National! Laboratory! user! facilities,!the!Advanced!Photon!Source!(APS),!the!Center!for!Nanoscale!Materials!(CNM)!and!the!Electron! Microscopy!Center!(EMC)!welcomed!industrial!scientists,!engineers!and!related!professionals!to!a!oneC day! workshop! to! learn! more! about! Argonne's! National! Laboratory! and! the! capabilities/techniques! available! for! their! use.! The! workshop! showcased! several! successful! industrial! user! experiments,! and! explained! the! different! ways! in! which! industrial! scientists! can! work! at! Argonne! or! with! Argonne!

403

APS USER TRAINING HISTORY Background  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

USER TRAINING HISTORY USER TRAINING HISTORY Background The User Program Division Director has delegated to the CATs the authority to authorize the conduct of experiments because the CATs have accepted responsibility for: * identifying and evaluating the hazards posed by the experiment, * specifying controls appropriate to the hazards, and * verifying that controls are in place. One form of hazard control frequently made mandatory by law and laboratory policy is worker knowledge. The accepted means of verifying that a worker has the required knowledge is ensuring that the worker has completed appropriate training. With CAT input, the APS has developed the APS User Training History. This web-based tool enables designated CAT personnel to examine data characterizing ES&H training courses

404

CCD Astronomy Software User's Guide  

E-Print Network [OSTI]

CCDSoft CCD Astronomy Software User's Guide Version 5 Revision 1.11 Copyright © 1992­2006 SantaSky Astronomy Software, and AutomaDome are trademarks of Software Bisque. WindowsTM is a trademark of Microsoft

405

Lisa Gerhardt NERSC User Services"  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Gerhardt " NERSC User Services" September 10, 2013" Getting Started at NERSC: Running Jobs Jobs at NERSC * Most j obs a re p arallel, u sing 1 0s t o 1 00,000+ c ores * Produc8on r...

406

Kirsten Fagnan NERSC User Services"  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Kirsten Fagnan " NERSC User Services" February 15, 2013" Running Parallel Jobs Outline * Parallel P rogramming M odels * NERSC S ystems a nd S ample S cripts * Queues a nd P...

407

Midwest Hydro Users Group Meeting  

Broader source: Energy.gov [DOE]

The Midwest Hydro Users Group will be holding their annual Fall meeting on November 12th and 13th in Wausau, Wisconsin.  An Owners-only meeting on the afternoon of the 12th followed by a full...

408

Oil Bypass Filter Technology Evaluation Eleventh Quarterly Report April- June 2005  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

651 651 U.S. Department of Energy FreedomCAR & Vehicle Technologies Program Oil Bypass Filter Technology Evaluation Eleventh Quarterly Report April-June 2005 TECHNICAL REPORT Larry Zirker James Francfort Jordan Fielding September 2005 Idaho National Laboratory Operated by Battelle Energy Alliance INL/EXT-05-00651 U.S. Department of Energy FreedomCAR & Vehicle Technologies Program Oil Bypass Filter Technology Evaluation Eleventh Quarterly Report April-June 2005 Larry Zirker James Francfort Jordan Fielding September 2005 Idaho National Laboratory Transportation Technology Department Idaho Falls, Idaho 83415 Prepared for the U.S. Department of Energy Assistant Secretary for Energy Efficiency and Renewable Energy Under DOE Idaho Operations Office

409

User Experience | Security | Advertising Picture CAPTCHA  

E-Print Network [OSTI]

User Experience | Security | Advertising Picture CAPTCHA #12;Context: CAPTCHAs · A test are solved/day · User Attention · Complete user attention while solving the CAPTCHA · Advertisers love

Militzer, Burkhard

410

User:Woodjr/Sandbox | Open Energy Information  

Open Energy Info (EERE)

icon Twitter icon User:WoodjrSandbox < User:Woodjr Jump to: navigation, search Test link: Dataset 40 Retrieved from "http:en.openei.orgwindex.php?titleUser:Woodjr...

411

Making Global Illumination User Friendly  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Making Global Illumination User Friendly Making Global Illumination User Friendly Title Making Global Illumination User Friendly Publication Type Conference Paper LBNL Report Number LBL-37860 Year of Publication 1995 Authors Ward, Gregory J. Conference Name 6th Eurographics Workshop on Rendering Date Published 06/1995 Conference Location Dublin, Ireland Call Number LBL-37860 Abstract Global illumination researchers tend to think in terms of mesh density and sampling frequency, and their software reflects this in its user interface. Advanced rendering systems are rife with long command lines and parameters for tuning the sample densities, thresholds and other algorithm-specific variables, and the novice user is quickly lost in a sea of possibilities. This paper details a successful effort of making one such global illumination system usable by people who understand their problems, even if they do not understand the methods needed to solve them, through an assisted oracle approach. A single program is introduced to map a small set of intuitive control variables to the rendering commands and parameter settings needed to produce the desired output in a reasonable time. This new executive program then serves as the basis for a graphical user interface that is both friendly in its appearance and reliable in its performance. Finally, we conclude with some future directions for improving this interface.

412

Oak Ridge National Laboratory - User Facilities  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Facilities Oak Ridge National Laboratory is home to a number of highly sophisticated experimental user facilities. These research laboratories are designed to serve staff...

413

APS User News-at-a-Glance  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Calendar of Events APS News User News Article Archives APS Brochure Annual Reports Posters Podcasts Image Gallery external site Video Library Syndicated Feeds (RSS) APS User...

414

New User Guide | Argonne Leadership Computing Facility  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Documentation Feedback Please provide feedback to help guide us as we continue to build documentation for our new computing resource. Feedback Form New User Guide USER TIP:...

415

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 5, NO. 9, SEPTEMBER 2006 2569 Mutual Authentication and Key Exchange Protocols  

E-Print Network [OSTI]

compromise and service abuse, etc. Several authentication Manuscript received February 3, 2005; revised May}@bbcr.uwaterloo.ca). Digital Object Identifier 10.1109/TWC.2006.05063. Internet B's home network, home agent (H) Fixed Internet

Shen, Xuemin "Sherman"

416

ID-based One-pass Authenticated Key Establishment M. Choudary Gorantla Colin Boyd Juan Manuel Gonzalez Nieto  

E-Print Network [OSTI]

ID-based One-pass Authenticated Key Establishment M. Choudary Gorantla Colin Boyd Juan Manuel Gonz, Brisbane, QLD 4001, Australia. Email: mc.gorantla@isi.qut.edu.au, {c.boyd

Boyd, Colin

417

User Agreements | Stanford Synchrotron Radiation Lightsource  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Agreements Agreements Institutional Agreements Required to Access DOE National User Facilities In recognition of the nation's expanding need to engage businesses and universities in the areas of commercial and basic science research, the Department of Energy (DOE) has developed two special types of agreements for use at all DOE National Laboratories with approved designated user facilities, see http://www.gc.doe.gov/1002.htm. Non-Proprietary User Agreement (PDF) (General User Agreement; no cost for general users) Proprietary User Agreement (PDF) (For Confidential or Proprietary Research; also requires advance payment) A User Agreement is required for all users and must be executed by the appropriate institutional officer(s) at the user's institution. A single User Agreement covers all experimenters from that institution (User

418

PIA - Advanced Test Reactor National Scientific User Facility...  

Energy Savers [EERE]

Advanced Test Reactor National Scientific User Facility Users Week 2009 PIA - Advanced Test Reactor National Scientific User Facility Users Week 2009 PIA - Advanced Test Reactor...

419

APS User News, Issue 71  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

1, August 18, 2011 1, August 18, 2011 CONTENTS 1. DIRECTOR'S CORNER USER MATTERS 2. How to Wow! "Secrets" for a Successful Proposal 3. Sweet Dreams Mean Safer Work 4. XSD's Linda Young Elected DAMOP Vice Chair 5. Successful 2011 APS/IIT Summer XAFS School BRIEFLY NOTED -- John Quintana Appointed Argonne's Deputy COO -- 2011 X-Ray Spectroscopy of Magnetic Solids Workshop Set for October 22-23 -- Workshops on Hard X-ray Instrumentation at the SwissFEL -- Next GUP Deadline is October 28, 2011 ===================================================== Instructions for subscribing, unsubscribing, and submitting info http://www.aps.anl.gov/Users/Communications/User_News/ ===================================================== DIRECTOR'S CORNER During the last week of July, we had the annual review of APS organized by

420

APS User News, Issue 65  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

5, November 1, 2010 5, November 1, 2010 CONTENTS DIRECTOR'S CORNER SCIENCE NEWS 1. Science Highlights USER MATTERS 2. New Badges for APS Users 3. APSUO Goes to Washington! 4. New Biosafety Web Page Available 5. Two New ANL Procedures: Injuries and Illnesses and Incident Notification FACILITY NEWS 6.Call for Workshop Proposals for APS/CNM/EMC Users Meeting 7. Cross-cut Review of APS X-ray Interface and Liquid Surface Scattering Science Held on October 6 8. APS SAC Meets, Sets Review Process for Scientific Priorities in APS-U 9. APS Upgrade on You Tube BRIEFLY NOTED -- Second Annual Meeting of the Prairie Section of the American Physical Society, November 18-20, 2010 -- PhD Scholarship on Virus Surrogate in New Zealand ===================================================== Instructions for subscribing, unsubscribing, and submitting info

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Cray XC30 User Documentation  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cray XC30 Cray XC30 Documentation Cray XC30 User Documentation L Cray XC30 Documentation Search Preferences | Advanced Search Home Browse Books Man Pages Glossary Platforms Cray XC30 Cray XE and Cray XK Cray XT Cray Sonexion Cray X2 Cray X1 Knowledge Base by Category by Date by Platform by Title by User Release Announcements @Twitter Cray XC30 System Documentation This site map also contains legacy documentation. Always consult the latest version of documentation for your site-specific configuration and ask your Cray Customer Service representative for additional guidance on the latest software documents. Getting Started Cray Linux Environment (CLE) Software Release Overview Programming Environment Cray Programming Environments User Guide Cray Compiling Environment (CCE) Cray Fortran Reference Manual

422

Cray XC30 User Documentation  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Documentation Documentation Cray XC30 User Documentation L Cray XC30 Documentation Search Preferences | Advanced Search Home Browse Books Man Pages Glossary Platforms Cray XC30 Cray XE and Cray XK Cray XT Cray Sonexion Cray X2 Cray X1 Knowledge Base by Category by Date by Platform by Title by User Release Announcements @Twitter Cray XC30 System Documentation This site map also contains legacy documentation. Always consult the latest version of documentation for your site-specific configuration and ask your Cray Customer Service representative for additional guidance on the latest software documents. Getting Started Cray Linux Environment (CLE) Software Release Overview Programming Environment Cray Programming Environments User Guide Cray Compiling Environment (CCE) Cray Fortran Reference Manual

423

APS User News, Issue 58  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

8, November 11, 2009 8, November 11, 2009 CONTENTS MESSAGE FROM MURRAY SCIENCE NEWS 1. Fast CCD Detector Collaboration 2. Science & Research Highlights The Power of Proteins: Prion Diseases Demystified Bacterium Helps in the Formation of Gold Getting to the Roots of Lethal Hairs Creating a Precise Atomic-Scale Map of Quantum Dots USER MATTERS 3. Users and the Flu Season 4. Workshop on the Role of Synchrotron Radiation in Solving Scientific Challenges in Advanced Nuclear Energy Systems 5. First Experiment at the Linac Coherent Light Source 6. New Postings Available on Employment Bulletin Board FACILITY NEWS 7. Recent SAC Meeting Focuses on APS Upgrade 8. The Life Sciences Council at the APS 9. Fitness Center Now Open in New Location AWARDS AND HONORS 10. APS Users Awarded 2009 Nobel Prize in Chemistry

424

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

March 8, 2013 March 8, 2013 V-107: Wireshark Multiple Denial of Service Vulnerabilities Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). March 7, 2013 V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions. March 6, 2013 V-105: Google Chrome Multiple Vulnerabilities Multiple vulnerabilities have been reported in Google Chrome March 5, 2013 V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Oracle Java March 4, 2013 V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication

425

Comparative studies on authentication and key exchange methods for 802.11 wireless LAN  

Science Journals Connector (OSTI)

IEEE 802.11 wireless LAN has become one of the hot topics on the design and development of network access technologies. In particular, its authentication and key exchange (AKE) aspects, which form a vital building block for modern security mechanisms, deserve further investigation. In this paper we first identify the general requirements used for WLAN authentication and key exchange (AKE) methods, and then classify them into three levels (mandatory, recommended, and additional operational requirements). We present a review of issues and proposed solutions for AKE in 802.11 WLANs. Three types of existing methods for addressing AKE issues are identified, namely, the legacy, layered and access control-based AKE methods. Then, we compare these methods against the identified requirements. Based on the analysis, a multi-layer AKE framework is proposed, together with a set of design guidelines, which aims at a flexible, extensible and efficient security as well as easy deployment.

Jun Lei; Xiaoming Fu; Dieter Hogrefe; Jianrong Tan

2007-01-01T23:59:59.000Z

426

Sentence Completion for Understanding Users and Evaluating User Experience  

Science Journals Connector (OSTI)

......Music and Video and Games Touch screen Not good for quick/rough everyday use Useful...users have access to a computer and the internet and are able to understand and write in...negative replies saying that using it is not good, the problem is quality and when using......

Sari Kujala; Tanja Walsh; Piia Nurkka; Marian Crisan

2014-05-01T23:59:59.000Z

427

Questioning the Meaning of Authenticity in Martin Heidegger's Being and Time  

E-Print Network [OSTI]

the proper context for authenticity will be to clarify those existential structures that describe what it means for Dasein to exist concretely in the world. Since Heidegger provides a fairly comprehensive account of the ontological constitution... the ontological and the ontic, and the existential and the existentiell. As a result, the traditional notions of selfhood and subjectivity get split between this new landscape of categories and subsequently lose their meaning. As Francois Raffoul points out...

Liwinski, Thomas

2011-10-21T23:59:59.000Z

428

Designing a minimum-functionality neutron and gamma measurement instrument with a focus on authentication  

SciTech Connect (OSTI)

During the design and construction of the Next-Generation Attribute-Measurement System, which included a largely commercial off-the-shelf (COTS), nondestructive assay (NDA) system, we realized that commercial NDA equipment tends to include numerous features that are not required for an attribute-measurement system. Authentication of the hardware, firmware, and software in these instruments is still required, even for those features not used in this application. However, such a process adds to the complexity, cost, and time required for authentication. To avoid these added authenticat ion difficulties, we began to design NDA systems capable of performing neutron multiplicity and gamma-ray spectrometry measurements by using simplified hardware and software that avoids unused features and complexity. This paper discusses one possible approach to this design: A hardware-centric system that attempts to perform signal analysis as much as possible in the hardware. Simpler processors and minimal firmware are used because computational requirements are kept to a bare minimum. By hard-coding the majority of the device's operational parameters, we could cull large sections of flexible, configurable hardware and software found in COTS instruments, thus yielding a functional core that is more straightforward to authenticate.

Karpius, Peter J [Los Alamos National Laboratory; Williams, Richard B [Los Alamos National Laboratory

2009-01-01T23:59:59.000Z

429

DOE VPN Client User Guide  

Broader source: Energy.gov (indexed) [DOE]

VPN Client VPN Client User Guide November 2013 U.S. Department of Energy Table of Contents Introduction ................................................................... 3 System Requirements ................................................... 3 Microsoft Windows ........................................................ 3 Mac OS X...................................................................... 4 Windows ......................................................................... 5 Installation for the Cisco AnyConnect Client ................... 5 Disconnecting from the Cisco AnyConnect Client ........... 8 Reconnecting to the Cisco AnyConnect Client ................ 9 Mac OS X ...................................................................... 10

430

Efficient Applications in User Transparent  

E-Print Network [OSTI]

Chapter 7 Efficient Applications in User Transparent Parallel Image Processing "Thy will by my parallel image processing. First, in Chapter 2 we have discussed the need for the availability is a sustainable software library consisting of an extensive set of operations commonly applied in state

Seinstra, Frank J.

431

LOCUS User's Guide Steve Scott  

E-Print Network [OSTI]

LOCUS User's Guide Steve Scott March, 2005 Last updated November 22, 2005 LOCUS is a database of the listed options, e.g. `Y' to define the variable to be plotted on the y-axis or `PL' to plot the data of items, e.g. a list of constraints, entering a semi-colon (";") terminates the list. For example, SET? X

Princeton Plasma Physics Laboratory

432

Special Issue: Organic User Interfaces  

Science Journals Connector (OSTI)

......of materials selected to foster organic designs, the authors paint an interesting portrait of the task of conveying OUI to the...M., Lee J. MoleBot: An Organic Usert-Interface-Based Robot That Provides Users with Richer Kinetic Interactions. Interact......

Audrey Girouard; Roel Vertegaal; Ivan Poupyrev

2013-03-01T23:59:59.000Z

433

DOE's BestPractices Steam End User Training Steam End User Training  

E-Print Network [OSTI]

DOE's BestPractices Steam End User Training Steam End User Training Steam Distribution Losses Module 1 June 29, 2010 Steam EndUser Training Steam Distribution System Losses Module Slide 1 pressure. #12;DOE's BestPractices Steam End User Training Steam End User Training Steam Distribution

Oak Ridge National Laboratory

434

DOE's BestPractices Steam End User Training Steam End User Training  

E-Print Network [OSTI]

DOE's BestPractices Steam End User Training Steam End User Training Welcome Module - 1 8/27/2010 Steam End User Training Welcome Module Slide 1 ­ Steam End User Training Welcome to the Department of Energy's Industrial Technologies Program BestPractices Steam End-User Training. The Department of Energy

Oak Ridge National Laboratory

435

Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the beamline should return with you when your beamtime is over, and a statement to this effect should be included with the list of substances. The list of substances and a list...

436

SLAC Lightsource User Access Guidelines and Agreement  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Lightsource User Access Guidelines & Agreement Lightsource User Access Guidelines & Agreement August 3, 2011 SLAC-I-030-306-001-00-R002 1 SLAC Lightsource User Access Guidelines and Agreement LCLS / SSRL User Research Administration approval (signature/date): LCLS Safety Office approval (signature/date): SSRL Safety Office approval (signature/date): XFO Operations approval (signature/date): Revision Record Revision Date Revised Section(s) Affected Description of Change R001 October 4 th , 2010 User Form Updated SLAC Lightsource User Access Agreement Form R000 Sept 14, 2009 Original Release SLAC Lightsource User Access Guidelines & Agreement August 3, 2011 SLAC-I-030-306-001-00-R002 1 SLAC LIGHTSOURCE USER ACCESS GUIDELINES & AGREEMENT Introduction Welcome to SSRL and LCLS, SLAC's lightsource user facilities. We hope that your stay here will be

437

User’s Search Behavior Graph for Aiding Personalized Web Search  

Science Journals Connector (OSTI)

The www is a dynamic environment and it is difficult to capture the user preferences and interests without interfering with the normal activity of the user. Hence to improve user searching in the World Wide We...

S. Sendhilkumar; T. V. Geetha

2007-01-01T23:59:59.000Z

438

A Security Solution for IEEE 802.11's Ad-hoc Mode:Password-Authentication and Group Diffie-Hellman Key Exchange  

SciTech Connect (OSTI)

The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.

Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

2005-10-01T23:59:59.000Z

439

User_Sup_AssignDelegate  

Broader source: Energy.gov (indexed) [DOE]

an Alternate Supervisor (Supervisor) an Alternate Supervisor (Supervisor) © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Assigning an Alternate Supervisor (Supervisor) Purpose The purpose of this job aid is to guide you through the step-by-step process of managing alternate supervisors within SuccessFactors Learning. When employees work for an extended period on a project where they report to a different manager or supervisor, you may want to transfer responsibility for completing the primary supervisor's tasks, for example, a performance review or competency assessment, to an alternate supervisor. The Manage Alternate Supervisors function allows you to identify other users as alternate supervisors and assign primary responsibility to them. After you assign a user as an alternate supervisor, the system

440

APS User News, Issue 62  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2, June 21, 2010 2, June 21, 2010 CONTENTS MESSAGE FROM MURRAY SCIENCE NEWS 1. Jaramillo Recognized for Techniques to Study Quantum Effects at High Pressure 2. Science Highlights USER MATTERS 3. APS Upgrade Seminar Series Scheduled for Summer Months 4. APS Beam Time Request System Goes Full Time FACILITY NEWS 5. Proposal Deadline July 9, for 2010-3 Run Cycle 6. Twenty Years of Groundbreaking Science and Beyond! 7. Workshop Summaries from the 2010 APS/EMC Users Meeting Available Online 8. New APSUO Members Elected 9. NUFO Report BRIEFLY NOTED -- First North American Core Shell Spectroscopy Conference: August 2-6, 2010 -- The 10th International Conference on X-ray Microscopy: August 15-20, 2010 -- Short Course on High Pressure Synchrotron Techniques: September 15-18, 2010 -- 16th Pan-American Synchrotron Radiation Instrumentation Conference:

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

User account | OpenEI  

Open Energy Info (EERE)

User account User account Create new account Log in Request new password Account information Username: * Spaces are allowed; punctuation is not allowed except for periods, hyphens, and underscores. E-mail address: * A valid e-mail address. All e-mails from the system will be sent to this address. The e-mail address is not made public and will only be used if you wish to receive a new password or wish to receive certain news or notifications by e-mail. Confirm e-mail address: * Please re-type your e-mail address to confirm it is accurate. Password: * Confirm password: * Please choose a password for your account; it must be at least 6 characters. Personal information Name: * Business Phone: * The content of this field is kept private and will not be shown publicly. Word verification: * Type the characters you see in this picture. (verify

442

User Manual 1 INTRODUCTION 3  

E-Print Network [OSTI]

AoC Admin User Manual #12;2 Contents 1 INTRODUCTION 3 1.1 AGE OF COMPUTERS HISTORY 3 1.2 AOC ADMIN 3 1.3 AOC GAME OBJECTS 3 2 LOGIN 6 3 COMMON 7 3.1 MENU BAR 7 3.1.1 FILE 7 3.1.2 VIEW 8 3.1.3 HELP 8 a short introduction to Age of Computers, AoC Admin and the objects used throughout these applications

Natvig, Lasse

443

Fifteenth LAMPF users group meeting  

SciTech Connect (OSTI)

The Fifteenth LAMPF Users Group Meeting was held November 2-3, 1981 at the Clinton P. Anderson Meson Physical Facility. The program of papers scheduled to be presented was amended to include a Report from Washington by Clarence R. Richardson, US Department of Energy. The general meeting ended with a round-table working group discussion concerning the Planning for a Kaon Factory. Individual items from the meeting were prepared separately for the data base.

Cochran, D.R.F. (comp.)

1982-03-01T23:59:59.000Z

444

Evaluating User Privacy in Bitcoin  

E-Print Network [OSTI]

Abstract. Bitcoin is quickly emerging as a popular digital payment system. However, in spite of its reliance on pseudonyms, Bitcoin raises a number of privacy concerns due to the fact that all of the transactions that take place are publicly announced in the system. In this paper, we investigate the privacy guarantees of Bitcoin in the setting where Bitcoin is used as a primary currency for the daily transactions of individuals. More specifically, we evaluate the privacy that is provided by Bitcoin (i) by analyzing the genuine Bitcoin system and (ii) through a simulator that faithfully mimics the operation of Bitcoin in the context where Bitcoin is used for all transactions within a university. In this setting, our results show that the profiles of almost 40 % of the users can be, to a large extent, recovered even when users adopt privacy measures recommended by Bitcoin. To the best of our knowledge, this is the first work that comprehensively analyzes, and evaluates the privacy implications of Bitcoin. As a by-product, we have designed and implemented the first simulator of Bitcoin; our simulator can be used to model the interaction between Bitcoin users in generic settings. 1

Elli Androulaki; Ghassan O. Karame; Marc Roeschlin; Tobias Scherer

445

Dynamic user profiles for web personalisation  

Science Journals Connector (OSTI)

Abstract Web personalisation systems are used to enhance the user experience by providing tailor-made services based on the user’s interests and preferences which are typically stored in user profiles. For such systems to remain effective, the profiles need to be able to adapt and reflect the users’ changing behaviour. In this paper, we introduce a set of methods designed to capture and track user interests and maintain dynamic user profiles within a personalisation system. User interests are represented as ontological concepts which are constructed by mapping web pages visited by a user to a reference ontology and are subsequently used to learn short-term and long-term interests. A multi-agent system facilitates and coordinates the capture, storage, management and adaptation of user interests. We propose a search system that utilises our dynamic user profile to provide a personalised search experience. We present a series of experiments that show how our system can effectively model a dynamic user profile and is capable of learning and adapting to different user browsing behaviours.

Ahmad Hawalah; Maria Fasli

2015-01-01T23:59:59.000Z

446

Electrical and thermal finite element modeling of arc faults in photovoltaic bypass diodes.  

SciTech Connect (OSTI)

Arc faults in photovoltaic (PV) modules have caused multiple rooftop fires. The arc generates a high-temperature plasma that ignites surrounding materials and subsequently spreads the fire to the building structure. While there are many possible locations in PV systems and PV modules where arcs could initiate, bypass diodes have been suspected of triggering arc faults in some modules. In order to understand the electrical and thermal phenomena associated with these events, a finite element model of a busbar and diode was created. Thermoelectrical simulations found Joule and internal diode heating from normal operation would not normally cause bypass diode or solder failures. However, if corrosion increased the contact resistance in the solder connection between the busbar and the diode leads, enough voltage potentially would be established to arc across micron-scale electrode gaps. Lastly, an analytical arc radiation model based on observed data was employed to predicted polymer ignition times. The model predicted polymer materials in the adjacent area of the diode and junction box ignite in less than 0.1 seconds.

Bower, Ward Isaac; Quintana, Michael A.; Johnson, Jay

2012-01-01T23:59:59.000Z

447

2008/2009 NERSC User Survey Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

8/2009 User Survey Results 8/2009 User Survey Results Show All | 1 2 3 4 5 ... 9 | Next » 2008/2009 User Survey Results Table of Contents Response Survey Respondent Demographics Overall Satisfaction and Importance All Satisfaction and Importance Ratings Hardware Resources Software HPC Consulting Services and Communications Comments Response Survey Many thanks to the 421 users who responded to this year's User Survey. The response rate is comparable to last year's and both are significantly increased from previous years: 77.4 percent of users who had used more than 250,000 XT4-based hours when the survey opened responded 36.6 percent of users who had used between 10,000 and 250,000 XT4-based hours responded The overall response rate for the 3,134 authorized users during the survey period was 13.4%.

448

2007/2008 NERSC User Survey Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

7/2008 User Survey Results 7/2008 User Survey Results Show All | 1 2 3 4 5 ... 10 | Next » 2007/2008 User Survey Results Table of Contents Response Summary Overall Satisfaction and Importance All Satisfaction, Importance and Usefulness Ratings Hardware Resources Software Visualization and Data Analysis HPC Consulting Services and Communications Web Interfaces Comments about NERSC Response Summary Many thanks to the 467 users who responded to this year's User Survey. The response rate has significantly increased from previous years: 70 percent of users who had used more than 1 million MPP hours when the survey opened responded 43 percent of users who had used between 10,000 and 1 million MPP hours responded The overall response rate for the 2,804 authorized users during the survey period was 16.3%.

449

User Financial Accounts | Stanford Synchrotron Radiation Lightsource  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Financial Accounts Financial Accounts Why Have a User Financial Account? Each user group should establish a user financial account to procure gases, chemicals, supplies or services to support your experiment at SLAC's user facilities and to send samples, dewars, or other equipment between SLAC and your institution. Establishing/Renewing a User Financial Account The most common method of establishing or renewing a user financial account is by providing a purchase order (PO) (or a letter from the financial officer of the user institution). The PO should be made to SLAC National Accelerator Laboratory for the amount of estimated expenditures (the suggested minimum is $1,000). The PO should include the expiration date, user names, funding agency, grant/contract number and whether expenditures

450

User Survey | Argonne Leadership Computing Facility  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Survey User Survey Results The ALCF conducts yearly surveys to gain a better understanding of how we can improve the user experience at ALCF. Below are the numeric results of these...

451

A linguistic approach to user interface design  

Science Journals Connector (OSTI)

... 2001 Elsevier Science B.V. All rights...Articles A linguistic approach to user interface...User Interface Management Systems 1992 Morgan-Kaufman...object-oriented approach to distributed data management, The Journal of Systems......

Rumen Dimov Andreev

2001-05-01T23:59:59.000Z

452

New User Training: July 15, 2014  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Training New User Training: July 15, 2014 July 15, 2014 NERSC will present a three-hour training for new users on July 15, 2014 from 09:00 to 12:00 PDT. This event is targeted to...

453

New User Training: July 15, 2014  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Training: 10302014 New User Training: October 30, 2014 October 30, 2014 NERSC will present a three-hour training for new users on October 30, 2014 from 09:00 to 12:00 PDT. This...

454

User:Harris | Open Energy Information  

Open Energy Info (EERE)

Harris Jump to: navigation, search Name harris Location Houston, Texas Edits 2 Friends User Edits DWC Bot 12006 Retrieved from "http:en.openei.orgwindex.php?titleUser:Harris&o...

455

MEASURING USER MOUNIA LALMAS, YAHOO! LABS  

E-Print Network [OSTI]

-of-brand-engagement-on-pinterest-come-from-users/ 51032/ http://iactionable.com/user-engagement/ http://www.cio.com.au/article/459294/ heart_foundation_uses_gamification

Lalmas, Mounia

456

Direct Combination: A New User Interaction  

Science Journals Connector (OSTI)

Direct Combination (DC) is a recently introduced user interaction principle. The principle (previously applied to desktop computing) can greatly reduce the degree of search, time, and attention required to operate user interfaces. We argue that Direct ...

Simon Holland; David R. Morse; Henrik Gedenryd

2002-09-01T23:59:59.000Z

457

User:Joebloggs | Open Energy Information  

Open Energy Info (EERE)

search Doofenshmirtz biteguard.png Name Joe Bloggs Location World Edits 3 This is a test user from someone on the OpenEI team. This user will simulate various spam to make sure...

458

NIF and Jupiter User Group Meeting 2015  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

5 Registration Opens November 21, 2014 Information on the NIF User Facility About the NIF and Jupiter Laser Facility User Group Meeting The NIF and Jupiter Laser Facility (JLF)...

459

National Library of Energy : User Account  

Office of Scientific and Technical Information (OSTI)

Create User Account User Name: Email Address: I want to: Always receive emails Receive emails if there are new results Never receive emails Email Format: HTML Text New Password:...

460

Managing Your User Account at NERSC  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Managing Managing Your Account Managing Your User Account Use the NERSC Information Management (NIM) system to customize your user account and keep your personal information up-to-date. See the NIM User's Guide, especially the "Managing Your User Account with NIM" section. Applying for your first NERSC Allocation Starting a new Allocation Request Renewing an Allocation Request Tips and Instructions for Filling out Allocation Request Form

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

User and Performance Impacts from Franklin Upgrades  

SciTech Connect (OSTI)

The NERSC flagship computer Cray XT4 system"Franklin" has gone through three major upgrades: quad core upgrade, CLE 2.1 upgrade, and IO upgrade, during the past year. In this paper, we will discuss the various aspects of the user impacts such as user access, user environment, and user issues etc from these upgrades. The performance impacts on the kernel benchmarks and selected application benchmarks will also be presented.

He, Yun (Helen)

2009-05-10T23:59:59.000Z

462

User:Clarknd | Open Energy Information  

Open Energy Info (EERE)

Clarknd Jump to: navigation, search Edits 1961 Retrieved from "http:en.openei.orgwindex.php?titleUser:Clarknd&oldid508286...

463

User:Mptonko | Open Energy Information  

Open Energy Info (EERE)

Mptonko Jump to: navigation, search Edits 456 Retrieved from "http:en.openei.orgwindex.php?titleUser:Mptonko&oldid74785...

464

User:Nmatin | Open Energy Information  

Open Energy Info (EERE)

Nmatin Jump to: navigation, search Retrieved from "http:en.openei.orgwindex.php?titleUser:Nmatin&oldid658628"...

465

IDAHO WATER USER RECOMMENDATIONS MAINSTEM PLAN  

E-Print Network [OSTI]

IDAHO WATER USER RECOMMENDATIONS ON THE MAINSTEM PLAN COLUMBIA RIVER BASIN FISH AND WILDLIFE PROGRAM SUBMITTED ON BEHALF OF THE COMMITTEE OF NINE AND THE IDAHO WATER USERS ASSOCIATION JUNE 15, 2001 and Flow Augmentation Policy in the Columbia River Basin #12;1 IDAHO WATER USER RECOMMENDATIONS

466

JC3 Bulletin Archive | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Bulletin Archive Bulletin Archive JC3 Bulletin Archive RSS September 9, 2013 V-237: TYPO3 Security Bypass Vulnerabilities TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations September 6, 2013 V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability A vulnerability has been reported in the CentralAuth extension for MediaWik that allows people to bypass certain security restrictions September 5, 2013 V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously A vulnerability was reported in Cisco Mobility Services Engine where a remote user can login anonymously. September 4, 2013 V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass

467

Manufactured Home Energy Audit user`s manual  

SciTech Connect (OSTI)

The Manufactured Home Energy Audit (MHEA) is a software tool that predicts manufactured home energy consumption and recommends weatherization retrofit measures. It was developed to assist local weatherization agencies working with the US Department of Energy (DOE) Weatherization Assistance Program. Whether new or experienced, employed within or outside the Weatherization Assistance Program, all users can benefit from incorporating MHEA into their manufactured home weatherization programs. DOE anticipates that the state weatherization assistance programs that incorporate MHEA into their programs will find significant growth in the energy and cost savings achieved from manufactured home weatherization. The easy-to-use MHEA displays a colorful, graphical interface for entering simple inputs and provides understandable, usable results. The user enters information about the manufactured home construction, heating equipment, cooling equipment, and weather site. MHEA then calculates annual energy consumption using a simplified building energy analysis technique. MHEA stands apart from other building energy analysis tools in many ways. Calculations incorporated into the computer code specifically address manufactured home heating and cooling load trends. The retrofit measures evaluated by MHEA are all applicable to manufactured homes. Help messages describe common manufactured home weatherization practices as well as provide hints on how to install retrofit measures. These and other features help make MHEA easy to use when evaluating energy consumption and the effects of weatherization retrofit measures for manufactured homes.

NONE

1997-09-01T23:59:59.000Z

468

User's guide to DOE facilities  

SciTech Connect (OSTI)

The Department of Energy's research laboratories represent valuable, often unique, resources for university and industrial scientists. It is DOE policy to make these laboratories and facilities available to qualified scientists. The answers to such questions as who are eligible, what and where are the facilities, what is the cost, when can they be used, are given. Data sheets are presented for each facility to provide information such as location, user contact, description of research, etc. A subject index refers to areas of research and equipment available.

Not Available

1984-01-01T23:59:59.000Z

469

MRDAP User/Developer Documentation  

SciTech Connect (OSTI)

The Multi-Reactor Design and Analysis Platform (MRDAP) is designed to simplify the creation, transfer and processing of data between computational codes. MRDAP accomplishes these objectives with three parts: 1. allows each integrated code, through a plugin, to specify the required input for execution and the required output needed, 2. creates an interface for execution and data transfer, 3. enables the creation of Graphical User Interfaces (GUI) to assist with input preparation and data visualization. Ultimately, the main motivation of this work is to enable analysts (who perform reactor physics calculations routinely), by providing a tool that increases efficiency and minimizes the potential for errors or failed executions.

Joshua Cogliati; Michael Milvich

2009-09-01T23:59:59.000Z

470

DOE's BestPractices Steam End User Training Steam End User Training  

E-Print Network [OSTI]

DOE's BestPractices Steam End User Training Steam End User Training Navigational Tutorial - 1 8/27/2010 Steam End User Training Navigational Tutorial Module Slide 1 ­ Introduction Hello, and welcome to the Steam End User Training. I would like to take a few minutes to show you how to navigate through

Oak Ridge National Laboratory

471

DOE's BestPractices Steam End User Training Steam End User Training  

E-Print Network [OSTI]

DOE's BestPractices Steam End User Training Steam End User Training Introduction Module - 1 8/27/2010 Steam End User Training Introduction Module Slide 1 - Introduction Title Page Hello, and welcome to the Steam System End User training. In this training, we will investigate how to assess, evaluate

Oak Ridge National Laboratory

472

SLAC Linac Coherent Light Source User Site  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Welcome to the LCLS User Resources Site Welcome to the LCLS User Resources Site User Portal | Agreements | Data Collection & Analysis | Logistics | Policies | Proposals | Safety | Schedules | Shipping The Linac Coherent Light Source (LCLS) encourages scientists from diverse fields to submit proposals for experiments that utilize the LCLS's unique capabilities. Interested scientists are encouraged to learn more about the latest developments by contacting LCLS staff scientists and by reviewing the instrument descriptions. Step-By-Step Instructions to Working at LCLS Review LCLS Policies Review Machine FAQ & Parameters Register and Submit Proposals Confirm User Agreement Reserve Accommodations Complete Safety Training Request Computer Account Establish User Account Ship Samples/Equipment Review Check-in Procedures

473

SLAC Linac Coherent Light Source User Site  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Schedules Schedules Schedule of Experiments for the Current Run | User Support Requests | Changes to the Operating Schedule LCLS Operations Schedules Step-By-Step Instructions to Working at LCLS Review LCLS Policies Review Machine FAQ & Parameters Register at User Portal Confirm User Agreement Reserve Accommodations Complete Safety Training Request Computer Account Establish User Account Ship Samples/Equipment Review Check-in Procedures Provide Feedback Inform us of Publications Participate in LCLS Users' Organization Tentative Long-Range Operating Plans Experiments Scheduled March to August 2014 Experiments Scheduled July 2013 to March 2014 Experiments Scheduled January to July 2013 Experiments Scheduled June to December 2012 Experiments Scheduled November 2011 to May 2012

474

Microsoft Word - NSRC precompetitive User Agreement amended 1...  

Broader source: Energy.gov (indexed) [DOE]

NSRC precompetitive User Agreement amended 1-18-07.doc Microsoft Word - NSRC precompetitive User Agreement amended 1-18-07.doc Microsoft Word - NSRC precompetitive User Agreement...

475

Office of Science User Facilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Office of Science User Facilities Office of Science User Facilities This presentation summarizes the information on the Office of Science User Facilities, which was given during...

476

Help:Blocking users | Open Energy Information  

Open Energy Info (EERE)

Blocking users Blocking users Jump to: navigation, search Blocking users is an action that sysops can perform upon users or IP addresses to prevent them from editing the wiki. Contents 1 Blocking 2 Unblocking 3 What it means to be blocked 4 See Also Blocking Blocking users is fairly straightforward, visit Special:BlockIP and follow these steps: IP Address or username: Enter in the username, IP address, or IP range to block in the "User" field. If blocking a username, make sure to check the spelling since nonexistent users can be blocked as well. Instead of typing this information in manually, it is also possible to click on a "block" link in recent changes, contributions pages, or history pages, which will automatically fill in this field with the appropriate username

477

NSLS User Access | Requesting Beam Time  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Requesting Beam Time Requesting Beam Time Use one of the following options depending on your research: General User Proposal General User proposals are peer reviewed for scientific merit by a Proposal Review Panel (PRP). General User proposals compete for beamtime with other General User Proposals based on scientific merit. Once the original proposal and beam time request is reviewed and rated in the PASS System, additional beam time requests can be submitted against the original proposal for its lifetime, a period of up to six cycles (two years). Data taken during experiments associated with a General User proposal is considered to be in the public domain. There is no charge for General User beamtime. Rapid Access Rapid Access proposals are a subset of General User proposals available for

478

SLAC Linac Coherent Light Source User Site  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

LCLS User Check-In Procedures LCLS User Check-In Procedures All users must check in at the User Research Administration (URA) offices upon arrival. Users must complete relevant training and return all forms to User Research Administration, Building 120, Room 211, prior to going to the LCLS Near Experimental Hall (NEH) or starting any experiments. The URA office is staffed Monday-Friday from 8 am to 4 pm. Many steps can and should be completed prior to your arrival: Automated access is now in operation 24/7 at Gate 17 and the Sector 30 Gate. Avoid delays by contacting us before arriving. If you have current safety training and an activated proximity card, your card will open the automated gate. Proceed to User Research Administration (URA) in Building 120 for check-in. However, you will need to first stop at SLAC Security IF you are a

479

User Agreement and Proprietary Account Status  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Agreement and Proprietary Account Status (04-Oct-2013) User Agreement and Proprietary Account Status (04-Oct-2013) Listed below are the 562 institutions that have signed APS User Agreements as financially contributing CAT members (indicated by CAT acronyms) and/or as non-members (indicated by "GU") as of (04-Oct-2013). A CAT Agreement covers users' activities at that CAT's beam lines; a GU Agreement covers users' activities at any APS beam line. All listed Agreements are nonproprietary unless otherwise noted. A superscript p indicates that a proprietary User Account has also been established. If you are not an ANL employee, a User Agreement signed by your home institution is a prerequisite for hands-on work at the APS. If your institution is not listed below (or if your institution is listed but a

480

Restricting query relaxation through user constraints  

SciTech Connect (OSTI)

This paper describes techniques to restrict and to heuristically control relaxation of deductive database queries. The process of query relaxation provides a user with a means to automatically identify new queries that are related to the user`s original query. However, for large databases, many relaxations may be possible. The methods to control and restrict the relaxation process introduced in this paper focus the relaxation process and make it more efficient. User restrictions over the data base domain may be expressed as user constraints. This paper describes how user constraints can restrict relaxed queries. Also, a set of heuristics based on cooperative answering techniques are presented for controlling the relaxation process. Finally, the interaction of the methods for relaxing queries, processing user constraints, and applying the heuristic rules is described.

Gaasterland, T.

1993-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

David Turner! User Services Group  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Services Group User Services Group Accounts and Allocations --- 1 --- September 10, 2013 Accounts There a re t wo t ypes o f a ccounts a t N ERSC. 1. Your p ersonal, p rivate a ccount * Associated w ith y our l ogin o r u ser n ame * Iden:fies y ou t o o ur s ystems a nd u sed w hen l ogging i n t o N ERSC systems a nd w eb s ervices * Your p roject's P rincipal I nves:gator ( PI) o r P roject M anager r equests an a ccount f or y ou * Four p rimary a ccount r oles - PI, P I P roxy, P roject M anager, U ser 2. An a lloca:on a ccount, o r r epository ( aka r epo) * Like a b ank a ccount y ou u se t o " pay" f or c omputer : me * PIs r equest a lloca:ons o f : me a nd/or s torage * An i ndividual u ser m ay b elong t o m ore t han o ne r epository - But o nly o ne d efault r epo --- 2 --- Allocations * You must belong to a repo to run jobs

482

2012 PATRIOT SCRIPT User's Guide  

SciTech Connect (OSTI)

PATRIOT Script is an application that executes Patriot batch runs. This document provides a description of this application and how to run it. The basic user access tool PATRIOT Client allows a user to generate several most reliable paths in one run: one can specify a list of sources (origins) and targets, and PATRIOT finds for a given architecture option and one choice of device all the most reliable paths between all these sources and targets. The main objective of PATRIOT Script is to provide a tool for making automatic PATRIOT runs not only for a prespecified set of sources and targets, but also for a pre-specified set of devices and various architecture options. Running PATRIOT Script requires two basic steps that will be explained in more detail next: (1) Pre-preparation of an excel spreadsheet with the information about the desired runs; and (2) Opening the PATRIOT Script application, reading in the excel-spreadsheet and running the desired scenarios. Sections 1 and 2 explain each of these steps, and section 3 describes the output of the PATRIOT Script. For a detail description of the models and data behind PATRIOT and a detailed explanation of all the architecture options see [1]. For instructions of how to run PATRIOT Client see [2].

Cuellar, Leticia [Los Alamos National Laboratory; Cleland, Timothy J. [Los Alamos National Laboratory; Kubicek, Deborah A. [Los Alamos National Laboratory; Mathis, Mark M. [Los Alamos National Laboratory; Stroud, Phillip D. [Los Alamos National Laboratory

2012-05-31T23:59:59.000Z

483

Trajectory analysis and optimization system (TAOS) user`s manual  

SciTech Connect (OSTI)

The Trajectory Analysis and Optimization System (TAOS) is software that simulates point--mass trajectories for multiple vehicles. It expands upon the capabilities of the Trajectory Simulation and Analysis program (TAP) developed previously at Sandia National Laboratories. TAOS is designed to be a comprehensive analysis tool capable of analyzing nearly any type of three degree-of-freedom, point-mass trajectory. Trajectories are broken into segments, and within each segment, guidance rules provided by the user control how the trajectory is computed. Parametric optimization provides a powerful method for satisfying mission-planning constraints. Althrough TAOS is not interactive, its input and output files have been designed for ease of use. When compared to TAP, the capability to analyze trajectories for more than one vehicle is the primary enhancement, although numerous other small improvements have been made. This report documents the methods used in TAOS as well as the input and output file formats.

Salguero, D.E.

1995-12-01T23:59:59.000Z

484

Workforce Transition Modeling Environment user`s guide  

SciTech Connect (OSTI)

The Pacific Northwest Laboratory (PNL) was tasked by the US Department of Energy Albuquerque Field Office (DOE-AL) to develop a workforce assessment and transition planning tool to support integrated decision making at a single DOE installation. The planning tool permits coordinated, integrated workforce planning to manage growth, decline, or transition within a DOE installation. The tool enhances the links and provides commonality between strategic, programmatic, and operations planners and human resources. Successful development and subsequent complex-wide implementation of the model also will facilitate planning at the national level by enforcing a consistent format on data that are now collected by installations in corporate-specific formats that are not amenable to national-level analyses. The workforce assessment and transition planning tool, the Workforce Transition Modeling Environment (WFTME), consists of two components: the Workforce Transition Model and the Workforce Budget Constraint Model. The Workforce Transition Model, the preponderant of the two, assists decision makers identify and evaluate alternatives for transitioning the current workforce to meet the skills required to support projected workforce requirements. The Workforce Budget Constraint Model helps estimate the number of personnel that will be affected by a given workforce budget increase or decrease and assists in identifying how the corresponding hirings or layoffs should be distributed across the Common Occupation Classification System (COCS) occupations. This user`s guide describes the use and operation of the WFTME. This includes the functions of modifying data and running models, interpreting output reports, and an approach for using the WFTME to evaluate various workforce transition scenarios.

Stahlman, E.J.; Oens, M.A.; Lewis, R.E.

1993-10-01T23:59:59.000Z

485

Superior Cardiac Function Via Anaplerotic Pyruvate in the Immature Swine Heart After Cardiopulmonary Bypass and Reperfusion  

SciTech Connect (OSTI)

Pyruvate produces inotropic responses in the adult reperfused heart. Pyruvate oxidation and anaplerotic entry into the citric acid cycle (CAC) via carboxylation are linked to stimulation of contractile function. The goals of this study were to determine if these metabolic pathways operate and are maintained in the developing myocardium after reperfusion. Immature male swine (age 10-18 days) were subjected to cardiopulmonary bypass (CPB). Intracoronary infusion of [2]-13C-pyruvate (to achieve a final concentration of 8 mM) was given for 35 minutes starting either during weaning (Group I), after discontinuation (Group II) or without (Control) CPB. Hemodynamic data was collected. 13C NMR spectroscopy was used to determine the fraction of pyruvate entering the CAC via pyruvate carboxylation (PC) to total CAC entry (PC plus decarboxlyation via pyruvate dehydrogenase). Liquid chromatography-mass spectrometry was used to determine total glutamate enrichment.

Olson, Aaron; Hyyti, Outi M.; Cohen, Gordon A.; Ning, Xue-Han; Sadilek, Martin; Isern, Nancy G.; Portman, Michael A.

2008-12-01T23:59:59.000Z

486

Particle Image Velocimetry Measurements and Analysis of Bypass Data for a Scaled 6mm Gap  

SciTech Connect (OSTI)

The purpose of the fluid dynamics experiments in the MIR (Matched Index of-Refraction) flow system at Idaho National Laboratory (INL) is to develop benchmark databases for the assessment of Computational Fluid Dynamics (CFD) solutions of the momentum equations, scalar mixing, and turbulence models for the flow ratios between coolant channels and bypass gaps in the interstitial regions of typical prismatic standard fuel element (SFE) or upper reflector block geometries of typical Modular High-temperature Gas-cooled Reactors (MHTGR) in the limiting case of negligible buoyancy and constant fluid properties. The experiments will use optical techniques, primarily particle image velocimetry (PIV) in the INL Matched Index of Refraction (MIR) flow system.

J.R. Wolf; T.E. Conder; R.R. Schultz

2012-09-01T23:59:59.000Z

487

2013 PDSF User Meering Minutes  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

3 Minutes 3 Minutes 2013 PDSF User Meeting Minutes December 3 Attending Shusu, Ernst, Mike, Craig, Iwona, Larry, Lisa Outages/Downtimes November 12 - 15: Mendel nodes offline for recabling Various Dates: Rolling upgrades of various PDSF interactive nodes Upcoming Downtimes January: Possible project outage December 16: Eliza 3, 8, 9 will no longer be accessible Other Issues New Mendel rack is in place, new interactives are open to a few beta testers. Amount of available scratch now tracked properly by queue system. Multicore jobs can be run on PDSF. Larry gave an update on the Mendel maintenance. Everything is stable, based on the lack of errors in the logs and no more connection hiccups. Slides You can find the slides shown at the meeting here. November 5 Attending Alex, Mike, Jeff, Iwona, Larry, Lisa

488

User_CompleteSF182  

Broader source: Energy.gov (indexed) [DOE]

Completing an External Training Request (SF-182) Completing an External Training Request (SF-182) © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Job Aid: Completing an External Training Request (SF-182) Purpose The purpose of this job aid is to guide users through the step-by-step process of completing an external training request form (SF-182). Complete an External Training Request (SF-182) - 11 Steps Task A Task A. Complete an External Training Request (SF-182) From the Home page, click the External Requests easy link. Click New Request to create a new training request form. Before completing the request form, it is recommended that you review the form to determine the required fields, indicated by red asterisks. This will assist you to determine the information you need to

489

User_CatalogItemAssign  

Broader source: Energy.gov (indexed) [DOE]

Self-Assign Items Self-Assign Items © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Self-Assign Items Purpose The purpose of this job aid is to guide users through the step-by-step process of using the catalog to locate and assign items to their To-Do List. Each task demonstrates a different method of searching the catalog. Task A. Locate and Self-Assign Items Using Simple Catalog Search Navigate to the Catalog search box above Easy Links. Enter keywords to search for in the item's title and description. Click the Search icon ( ). 2 1 3 Locate and Self-Assign Items Using Simple Catalog Search - 4 Steps Task A Locate and Self-Assign Items Using Advance Catalog Search - 7 Steps Task B

490

Elemental ABAREX -- a user's manual.  

SciTech Connect (OSTI)

ELEMENTAL ABAREX is an extended version of the spherical optical-statistical model code ABAREX, designed for the interpretation of neutron interactions with elemental targets consisting of up to ten isotopes. The contributions from each of the isotopes of the element are explicitly dealt with, and combined for comparison with the elemental observables. Calculations and statistical fitting of experimental data are considered. The code is written in FORTRAN-77 and arranged for use on the IBM-compatible personal computer (PC), but it should operate effectively on a number of other systems, particularly VAX/VMS and IBM work stations. Effort is taken to make the code user friendly. With this document a reasonably skilled individual should become fluent with the use of the code in a brief period of time.

Smith, A.B.

1999-05-26T23:59:59.000Z

491

News about NHMFL user program.  

SciTech Connect (OSTI)

For the past decade, ultrasound measurements have proven to be of great importance in the investigation of systems close to magnetic instabilities. Many interesting results can be found in thc literature (at reasonably high DC fields) dealing with systems presenting metamagnetic transitions where ultrasound measurenients provided important information regarding the electron-lattice coupling. The group Ketterson, Suslov, and Sarma has been the first in the United States to extend this technique to be used in pulsed magnets. Their report that follows describes experimental details of the technique and presents results regarding the lattice behavior around the 35 T metamagnetic transition of the heavy fermion compound URu,Si,. I am sure that many of you will find the article very interesting. We are working hard to make this technique available to the user community soon.

Lacerda, A. H. (Alex H.)

2001-01-01T23:59:59.000Z

492

Hybrid user interfaces : design guidelines and implementation examples  

E-Print Network [OSTI]

A hybrid user interface is a new type of computer user interface that achieves high usability by combining features of graphical user interfaces and command line interfaces. The main goal of a hybrid user interface is to ...

Ahn, Sehyun

2006-01-01T23:59:59.000Z

493

User:Graham7781 | Open Energy Information  

Open Energy Info (EERE)

User page User page Edit with form History Facebook icon Twitter icon » User:Graham7781 Jump to: navigation, search Brazil Name Graham Hill Location Denver, Colorado Edits 7932 Friends User Edits GregZiebold 3711 JZ 42 Jorn.Aabakken 5 Rmckeel 1772 Woodjr 59997 Twong 24774 Dbrodt 21 I am a Research Analyst at the National Renewable Energy Laboratory, and a recent graduate of the University of Denver in MAS Environmental Policy and Management. I've been working extensively at NREL on expanding Openei.org by adding contributions, editing and patrolling pages, and developing training tutorial videos to guide users on how to use the wiki. I also have led the creation of the Renewable Energy News Gateway and the Oil and Gas gateway. I've collaborated with Jarett Zuboy (User:JZ) on helping build the external

494

RHIC & AGS Userscenter;User Facilities  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Facilities User Facilities Experimenters work at one of five user facilities. The largest of these facilities is the Relativistic Heavy Ion Collider (RHIC), others include the Alternating Gradient Synchrotron facility (AGS), the Tandem Van de Graaff, the Accelerator Test Facility (ATF), and the NASA Space Radiation Laboratory (NSRL). See also: National User Facility Organization (NUFO). Accelerator Test Facility (ATF) Brookhaven's newest user facility, the ATF is a proposal driven Program Committee reviewed Users' Facility dedicated for long-term R&D in Physics of Beams. Alternating Gradient Synchrotron (AGS) Since 1960, the Alternating Gradient Synchrotron (AGS) has been one of the world's premiere particle accelerators, well known for the three Nobel Prizes won as a result of research performed there.

495

SLAC Linac Coherent Light Source User Site  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Logistics User Logistics Accommodations/Hours/Maps | Agreements | Check-In | Computing | Safety | Shipping | Supplies & Gases | User Feedback | Publications Proposal Submission and Scheduling Step-By-Step Instructions to Working at LCLS Review LCLS Policies Review Machine FAQ & Parameters Register and Submit Proposals Confirm User Agreement Reserve Accommodations Complete Safety Training Request Computer Account Establish User Account Ship Samples/Equipment Review Check-in Procedures Provide Feedback Inform us of Publications Participate in LCLS Users' Organization LCLS experiments start with submitting a proposal, usually due twice a year. Each proposal is for one specific experiment and each proposal is valid for one scheduling cycle only. There is no limit to the number of

496

User Manuals | OpenEI Community  

Open Energy Info (EERE)

User Manuals User Manuals Home > Groups > Utility Rate Dloomis's picture Submitted by Dloomis(21) Member 28 June, 2012 - 15:41 Illinois State University We have a beta version of two user manuals ready and we were wondering if it might be appropriate to host them on the NREL OpenEI site. The first user manual is for the novice user of the database. It explains terminology related to electricity rates and rate structures. This is focused on a broad audience. We thought it might go here: http://en.openei.org/services/ but if you have a better place, just let me know. The second user manual is for primarily for our data input-ers. It discusses complex rate designs and directs students in a standardized way to enter the data. I think this would also be very useful to software

497

The Annual DOE JGI User Meeting  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

1 Workshops 1 Workshops IMG Workshop Date: Monday, March 21 Time: 9:00 AM - 5:00 PM Location: Walnut Creek Marriott Audience: Users and potential users of the Integrated Microbial Genomes (IMG) data analysis systems. Description: 1-day workshop with hands-on tutorials on IMG. IMG-Metagenomes Workshop Date: Tuesday, March 22 Time: 9:00 AM - 12:00 PM Location: Walnut Creek Marriott Audience: Users and potential users of the Integrated Microbial Genomes (IMG) with Microbiome Samples (IMG/M) data analysis system. Description: half day workshop with hands-on tutorials on IMG/M. Mycocosm Workshop Date: Tuesday, March 22 Time: 9:00 AM - 12:00 PM Location: Walnut Creek Marriott Audience: Users and potential users of the Mycocosm fungal genomics portal. Description: The JGI Mycocosm web-portal provides data access,

498

User:Jayhuggins | Open Energy Information  

Open Energy Info (EERE)

User page User page Edit with form History Facebook icon Twitter icon » User:Jayhuggins Jump to: navigation, search Jay Huggins.jpg Name Jay Huggins Location Golden, CO Edits 4384 Friends User Edits Rmckeel 1772 Jweers 12390 Dbrodt 21 Graham7781 7932 Kch 858 I have been a back-end web developer for the National Renewable Energy Laboratory since October 2011. I am the father of two wonderful kids, husband to a wonderful wife, and when I'm not attached to a keyboard or parenting, I enjoy playing music, riding my bike, baking, brewing beer, and making furniture with wood and steel. Retrieved from "http://en.openei.org/w/index.php?title=User:Jayhuggins&oldid=671817" Categories: OpenEI Community Members Ryan's test What links here Related changes User contributions

499

Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices  

E-Print Network [OSTI]

to achieve explicit key confirmation. We also point out Wu's scheme decreases efficiency by using the double by the traditional public-key cryptography (Rivest et al., 1978; ElGama, l985). The computation ability and battery the number of users is increased, KAC needs a large storage space to store users' public keys

500

GSS, a user interface specification framework  

E-Print Network [OSTI]

of objects whose behavior is reasonably uniform. The ontology intro- duces two new constructs, the configuration set and the template. It also formalizes to some extent the output behavior of graphical user interfaces. An implementation architecture... is presented which elaborates this ontology into an object oriented development environment containing a substrate, a number of user interface building blocks and a user interface executive. The architecture describes in detail mechanisms for integrat- ing...

Morris, John Graham

2012-06-07T23:59:59.000Z