Powered by Deep Web Technologies
Note: This page contains sample records for the topic "web policies privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Understanding privacy policies  

Science Conference Proceedings (OSTI)

Their is growing recognition that users of web-based systems want to understand, if not control, what customer's data is stored by whom, for what purpose, for what duration, and with whom it is shared. We inform current language-based privacy efforts ... Keywords: Clone detection, Domain-specific languages, Empirical study, Language understanding, Language usage, P3P, Policy compliance, Policy enforcement, Privacy, Privacy policies, Software language engineering, Software linguistics, Software metrics, Web-based systems

Ralf Lämmel; Ekaterina Pek

2013-04-01T23:59:59.000Z

2

Privacy Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy Privacy Privacy/Security This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

3

NETL: Privacy Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy Policy Privacy Policy Privacy Policy National Energy Technology Laboratory strives to protect the privacy of website visitors. Information collected is strictly limited to the following: Information Collected and Stored Automatically The IP address, a number that is automatically assigned to each computer that connects to the World Wide Web; Date and time of website access; Pages browsed. NETL reviews this information in an effort to make the website more useful and informative. This information is used solely as a source of anonymous statistical information; NETL does not track or record information about individuals or their visits. This information is NOT shared with anyone beyond NETL website home page staff, except when required by law enforcement investigation.

4

The University of Texas at Austin Web Privacy Policy Office of the Chief Information Officer Written By: Chief Information Security Officer/  

E-Print Network (OSTI)

The University of Texas at Austin Web Privacy Policy Office of the Chief Information Officer....................................................................................................................5 13. Texas Public Information Act ..........................................................................................................................................6 1. Purpose The University of Texas at Austin (U. T. Austin) is committed to ensuring the privacy

Texas at Austin, University of

5

NASA Web Site Privacy and Important Notices  

NLE Websites -- All DOE Office Websites (Extended Search)

NASA Web Privacy Policy NASA Web Privacy Policy Thank you for visiting NASA and reviewing our policy notices. We have integrated these statements into a single posting for ease of use. The following links will help you navigate to a specific section: Privacy Policy Security Notice Accessibility Statement Linking Policy and Disclaimer of Endorsement Privacy Policy This notice provides NASA's policy regarding the nature, purpose, use and sharing of any information collected via this Web site. The information you provide on a NASA Web site will be used only for its intended purpose. We will protect your information consistent with the principles of the Privacy Act, the e-Government act of 2002, the Federal Records Act, and as applicable, the Freedom of Information Act. Submitting information is strictly voluntary. By doing so, you are giving

6

Privacy/Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

7

The University of Texas at Austin Web Privacy Policy Office of the Chief Information Officer Written By: Chief Information Security Officer/  

E-Print Network (OSTI)

The University of Texas at Austin Web Privacy Policy Office of the Chief Information Officer.......................................................................................................................5 13. Texas Public Information Act.............................................................................................. Error! Bookmark not defined. 1. Purpose The University of Texas at Austin (U. T. Austin) is committed

Texas at Austin, University of

8

WIPP Privacy Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

WIPP Privacy Policy and Disclaimers NOTICE: The Waste Isolation Pilot Plant (WIPP) Internet Server is provided as a service of the Department of Energy (DOE) for distribution of...

9

Web Policies  

NLE Websites -- All DOE Office Websites (Extended Search)

Web Policies Web Policies Accessibility The National Energy Research Scientific Computing Center (NERSC) is part of the Lawrence Berkeley National Laboratory (Berkeley Lab), which...

10

Privacy-enhanced web personalization  

Science Conference Proceedings (OSTI)

Consumer studies demonstrate that online users value personalized content. At the same time, providing personalization on websites seems quite profitable for web vendors. This win-win situation is however marred by privacy concerns since personalizing ...

Alfred Kobsa

2007-01-01T23:59:59.000Z

11

Privacy Policy | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy Policy Data.gov is committed to protecting the privacy and security of visitors to this website. Data.gov does not collect personal information when you visit our website...

12

Web Policies  

NLE Websites -- All DOE Office Websites (Extended Search)

Policies Policies /about/_assets/images/icon-70th.jpg Web Policies LANL places a high degree of emphasis on user experience and thus all webspaces are designed, developed, and tested thoroughly for usability and accessibility. Accessibility» Usability» Copyright, Legal» STC Summit Award» LOOK INTO LANL - highlights of our science, people, technologies close Scholarship fund changes lives Life-changing experience: springboard to a career in exercise science and physical therapy. READ MORE Jacob Leyba, recipient of the Los Alamos Employees' Scholarship Fund Domenici scholarship Jacob Leyba, recipient of the Senator Pete Domenici Endowed Scholarship Fund. Contact Us Web Team Email More Like This Bradbury Science Museum Calendar Corporate Responsibility Fact Sheets Publications

13

EERE: Web Site Policies  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Web Site Policies The Office of Energy Efficiency and Renewable Energy (EERE) has developed this page to detail its compliance with the Office of Management and Budget Policies for...

14

EERE: Web Site Policies  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy (EERE) has developed this page to detail its compliance with the Office of Management and Budget Policies for Federal Public Web Sites. To learn more about EERE, visit...

15

Department of Energy Idaho - Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Web Policies No Fear Act Site Map Privacy Phone Book You are here: DOE-ID Home > Privacy Privacy General Disclaimer This system is made available by an agency of the United States...

16

A privacy-aware architecture for a web rating system  

Science Conference Proceedings (OSTI)

Net Trust is a fraud-detection application that enhances security while protecting privacy. Net Trust identifies fraudulent Web sites by aggregating individual opinions, user-selected browsing histories, and third-party information. In this paper, we ...

C. Viecco; A. Tsow; L. J. Camp

2009-03-01T23:59:59.000Z

17

OSTIblog Online Privacy Policy | OSTI, US Dept of Energy, Office of  

Office of Scientific and Technical Information (OSTI)

Online Privacy Policy Online Privacy Policy We at OSTI.gov are committed to protecting the privacy and security of your visits to this Website. Outlined below is our online privacy policy. If you have questions about this policy, please let us know. Collection and disclosure of information: To ensure we are able to communicate effectively with visitors to our web site, we collect some information that can be directly associated with a specific person. We call this "Personal Information," and it includes, by way of illustration, names, addresses, telephone numbers and e-mail addresses. We collect Personal Information from eligible individuals who affirmatively request to receive e-mail or other services from us. We collect this Personal Information in order to provide these eligible individuals with

18

Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule  

Science Conference Proceedings (OSTI)

Organizations collect personal information from individuals to carry out their business functions. Federal privacy regulations, such as the Health Insurance Portability and Accountability Act (HIPAA), mandate how this collected information can be shared ... Keywords: HIPAA, obligations, policy analysis, privacy policy

Omar Chowdhury; Andreas Gampe; Jianwei Niu; Jeffery von Ronne; Jared Bennatt; Anupam Datta; Limin Jia; William H. Winsborough

2013-06-01T23:59:59.000Z

19

Web Policies | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Web Policies Web Policies Web Policies Accessibility The U.S. Department of Energy is committed to providing access to our web pages for individuals with disabilities. To meet this commitment, this site is built to comply with the requirements of Section 508 of the Rehabilitation Act. Section 508 requires that individuals with disabilities, who are members of the public seeking information or services from us, have access to and use of information and data that is comparable to that provided to the public who are not individuals with disabilities, unless an undue burden would be imposed on us. Section 508 also requires us to ensure that Federal employees with disabilities have access to and use of information and data that is comparable to the access to and use of information and data by Federal employees who are not individuals with

20

Tracking website data-collection and privacy practices with the iWatch web crawler  

Science Conference Proceedings (OSTI)

In this paper we introduce the iWatch web crawler, a tool designed to catalogue and analyze online data practices and the use of privacy related indicators and technologies. Our goal in developing iWatch was to make possible a new type of analysis of ... Keywords: P3P, cookies, data-collection practices, demographics, legislative impact, privacy, web-crawling, webbugs

Carlos Jensen; Chandan Sarkar; Christian Jensen; Colin Potts

2007-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "web policies privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Privacy-awareness information for web forums: results from an empirical study  

Science Conference Proceedings (OSTI)

While interacting with others on the internet, users share a lot of personal data with a potentially large but "invisible" audience. An important issue is maintaining control over personal data and therefore, in the first place, users need to be aware ... Keywords: empirical study, forum, privacy, privacy awareness, social software, social web, user-centered design

Stefanie Pötzsch; Peter Wolkerstorfer; Cornelia Graf

2010-10-01T23:59:59.000Z

22

Privacy Protection for Social Networking Platforms,” Web 2.0 Security and Privacy  

E-Print Network (OSTI)

Social networking platforms integrate third-party content into social networking sites and give third-party developers access to user data. These open interfaces enable popular site enhancements but pose serious privacy risks by exposing user data to third-party developers. We address the privacy risks associated with social networking APIs by presenting a privacy-by-proxy design for a privacy-preserving API. Our design is motivated by an analysis of the data needs and uses of Facebook applications. We studied 150 popular Facebook applications and found that nearly all applications could maintain their functionality using a limited interface that only provides access to an anonymized social graph and placeholders for user data. Since the platform host can control the third party applications’ output, privacy-by-proxy can be accomplished by using new tags and data transformations without major changes to either the platform architecture or applications.

Adrienne Felt; David Evans

2008-01-01T23:59:59.000Z

23

Web Policies | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

Web Policies Web Measurement and Tracking Opt-Out Contact Information Office of Science U.S. Department of Energy 1000 Independence Ave., SW Washington, DC 20585 P: (202)...

24

Energy Privacy Steering Committee  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) Privacy Steering Committee (EPSC) advises the Senior Agency Official for Privacy (SAOP) and the Department’s Privacy Program regarding policies and program...

25

Effective page refresh policies for Web crawlers  

Science Conference Proceedings (OSTI)

In this article, we study how we can maintain local copies of remote data sources "fresh," when the source data is updated autonomously and independently. In particular, we study the problem of Web crawlers that maintain local copies of remote ... Keywords: Web crawlers, page refresh, web search engines, world-wide web

Junghoo Cho; Hector Garcia-Molina

2003-12-01T23:59:59.000Z

26

Visual security policy for the web  

Science Conference Proceedings (OSTI)

Many web security vulnerabilities allow parts of a page to interact when they should be isolated. Such vulnerabilities can be mitigated by implementing protection boundaries between web page elements. Several methods exist for creating such boundaries, ...

Terri Oda; Anil Somayaji

2010-08-01T23:59:59.000Z

27

The impact of crawl policy on web search effectiveness  

Science Conference Proceedings (OSTI)

Crawl selection policy has a direct influence on Web search effectiveness, because a useful page that is not selected for crawling will also be absent from search results. Yet there has been little or no work on measuring this effect. We introduce an ... Keywords: corpus selection, crawl ordering, web crawling

Dennis Fetterly; Nick Craswell; Vishwa Vinay

2009-07-01T23:59:59.000Z

28

Reining in the web with content security policy  

Science Conference Proceedings (OSTI)

The last three years have seen a dramatic increase in both awareness and exploitation of Web Application Vulnerabilities. 2008 and 2009 saw dozens of high-profile attacks against websites using Cross Site Scripting (XSS) and Cross Site Request Forgery ... Keywords: content restrictions, http, security policy, web security

Sid Stamm; Brandon Sterne; Gervase Markham

2010-04-01T23:59:59.000Z

29

The Premier Information Source for Professionals Who Track Environmental and Energy Policy. 1996-2011 E&E Publishing, LLC Privacy Policy Site Map  

E-Print Network (OSTI)

The Premier Information Source for Professionals Who Track Environmental and Energy Policy. © 1996 testified before Congress in recent years on the economics of climate change and energy policy. He has also-2011 E&E Publishing, LLC Privacy Policy Site Map 11. TREASURY: Tufts economics professor picked to lead

Tufts University

30

Privacy Crisis due to Crisis Response on the Web Shao-Yu Wu, Ming-Hung Wang and Kuan-Ta Chen  

E-Print Network (OSTI)

--In recent disasters, the web has served as a medium of communication among disaster response teams are normally the top concerns in designing disaster response web services, where a design of free-formed inputs disclosure and privacy leakage. In this paper, using a case study of a real-life disaster response service

Chen, Sheng-Wei

31

Intelligent content-based privacy assistant for facebook  

E-Print Network (OSTI)

Abstract—Although most online social networks now offer fine-grained controls of information sharing, these are rarely used, both because their use imposes additional burden on the user and because there are too many control settings for an average user to handle. To mitigate this problem, we have developed an Intelligent Privacy Assistant for Facebook that partially automates the assignment of sharing permissions, taking into account the content of the information published and user’s high-level sharing policies. The Assistant uses a novel social web privacy language, employs named entity recognition algorithms to annotate sensitive parts of published information and an answer set programming system to evaluate user’s privacy policies and determine the list of safe recipients. On a test scenario, the Assistant reached 73.8 % and 95.2 % performance in correctly determining safe and unsafe recipients, respectively. Keywords-privacy protection, social web, information extraction, policies, Facebook I.

Michal Jakob; Zbyn?k Moler; Michal P?chou?ek; Roman Vaculín

2011-01-01T23:59:59.000Z

32

CAH Web Policy 1 | P a g e University of Central Florida  

E-Print Network (OSTI)

CAH Web Policy 1 | P a g e University of Central Florida Effective: 6/25/2009; Revised: 10/1/2011 CAH Web Policy Rationale for Policy The quality of information published by the College of Arts the Web is visually appealing and well written and follows the same high standards as other forms

Van Stryland, Eric

33

Finding lists of people on the web  

Science Conference Proceedings (OSTI)

Among the vast amounts of personal information published on the World Wide Web ("Web") and indexed by search engines are lists of names of people. Examples include employees at companies, students enrolled in universities, officers in the military, law ... Keywords: data linkage, data mining, information retrieval, policy, privacy

Latanya Sweeney

2004-03-01T23:59:59.000Z

34

GSE Web Policy Approved by Coordinating Council 5/11/2009  

E-Print Network (OSTI)

GSE Web Policy Approved by Coordinating Council 5/11/2009 Revision approved 11/22/2010 1 statement Students and the public at large are increasingly turning to the web as the primary information a consistent, accurate message. 3. The GSE WebTeam The GSE has developed a WebTeam to work directly

35

OSTI Web Measurement and Tracking Opt-Out | OSTI, US Dept of...  

Office of Scientific and Technical Information (OSTI)

Tracking Opt-Out As you use this website, OSTI collects web measurement and tracking data. For full details see User Privacy under Website Policies and Important Links. If you...

36

ACConv -- An Access Control Model for Conversational Web Services  

Science Conference Proceedings (OSTI)

With organizations increasingly depending on Web services to build complex applications, security and privacy concerns including the protection of access control policies are becoming a serious issue. Ideally, service providers would like to make sure ... Keywords: Web services, access control, conversations

Federica Paci; Massimo Mecella; Mourad Ouzzani; Elisa Bertino

2011-07-01T23:59:59.000Z

37

The Web economy: goods, users, models and policies  

E-Print Network (OSTI)

Web emerged as an antidote to the rapidly increasing quantity of accumulated knowledge and become successful because it facilitates massive participation and communication with minimum costs. Today, its enormous impact, scale and dynamism in time and space make very difficult (and sometimes impossible) to measure and anticipate the effects in human society. In addition to that, we demand from the Web to be fast, secure, reliable, all-inclusive and trustworthy in any transaction. The scope of the present article is to review a part of the Web economy literature that will help us to identify its major participants and their functions. The goal is to understand how the Web economy differs from the traditional setting and what implications have these differences. Secondarily, we attempt to establish a minimal common understanding about the incentives and properties of the Web economy. In this direction the concept of Web Goods and a new classification of Web Users are introduced and analyzed This article, is not,...

Vafopoulos, Michalis

2011-01-01T23:59:59.000Z

38

Privacy | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

issues. The Program is based on the Privacy Act of 1974, as implemented by Office of Management and Budget Circular A-130, the E-Government Act of 2002, and Departmental policies....

39

DOE Privacy Steering Committee Charter  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Privacy Steering Committee Charter Privacy Steering Committee Charter A. OBJECTIVE The purpose of the Department of Energy (DOE) Privacy Steering Committee (EPSC) is to advise the Senior Agency Official for Privacy (SAOP) and the Department's Privacy Program, providing recommendations to improve policies and program initiatives including breach response and notification, Privacy Impact Assessments, and other privacy matters. The EPSC is an essential component of DOE's ongoing efforts to identify processes to eliminate the unnecessary use of SSNs, and to safeguard Personally Identifiable Information (PII) while mitigating risks where the use of SSNs is authorized by a law, regulation or DOE Directive to fulfill a mission of the Department. B. AUTHORITY The EPSC is established at the direction of the Senior Agency Official for Privacy (SAOP).

40

K:\\Web\\WebMirror2\\ospa\\policiesandprocedures\\Allowability of B I start up costs Policy-1-12.doc SPA Procedure for Allowable B&I Clinical Trial Start-Up Costs  

E-Print Network (OSTI)

K:\\Web\\WebMirror2\\ospa\\policiesandprocedures\\Allowability of B I start up costs Policy-1-12.doc SPA

Amin, S. Massoud

Note: This page contains sample records for the topic "web policies privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Query-based database policy assurance using semantic web technologies  

E-Print Network (OSTI)

In this thesis, we present a novel approach to database security which looks at queries instead of the database tables themselves. In doing so, we use a number of Semantic Web technologies to define rules, translate queries, ...

Soltren, José Hiram

2009-01-01T23:59:59.000Z

42

Security and Privacy Notice  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

43

Web-based Analysis Tools for Appliance Efficiency Policies in...  

NLE Websites -- All DOE Office Websites (Extended Search)

Appliance Standards Project (CLASP) is to transfer appliance efficient policy analysis technologies and benefits to developing countries. In this talk we describe the...

44

A privacy expectations and security assurance offer system  

Science Conference Proceedings (OSTI)

Consumers accessing web sites for information or to purchase products face limited opportunity to express their privacy preferences, and even less recourse if security violations lead to inadvertent disclosure of privacy sensitive information. A privacy ... Keywords: e-commerce, incentives, insurance, privacy

Jeffrey Hunker

2008-07-01T23:59:59.000Z

45

Amateur Radio on the International Space Station (ARISS) Proposal Privacy Policy  

E-Print Network (OSTI)

the questions. Send only comments relating to our time estimate to: hq-oeidadmin1@mail.nasa.gov Submit this form. GENERAL INFORMATION Organization Name: Address: City, State, Zip Code: Web Site: Main Point of Contact Name: Main POC must be authorized to represent the organization Work Address: City, State, Zip

46

Keeping up appearances: understanding the dimensions of incidental information privacy  

Science Conference Proceedings (OSTI)

We conducted a survey of 155 participants to examine privacy concerns relating to the viewing of incidental information (i.e. traces of previous activity unrelated to the task at hand) in web browsers. We have identified several dimensions of privacy ... Keywords: collaboration, incidental information, privacy, survey, web browsing

Kirstie Hawkey; Kori M. Inkpen

2006-04-01T23:59:59.000Z

47

Citizen's Attitudes about Privacy While Accessing Government and Private  

E-Print Network (OSTI)

This paper reports the results of an investigation on citizens' attitudes and concerns regarding privacy and security on the Web, in general, and on the government websites they may visit, in particular. We examine to what extent those concerns can be alleviated by using a Secure Private Portal that protects citizen's personally identifying information when accessing government websites. The research project had two main goals: (a) to develop a comprehensive psychological instrument to assess citizens' attitudes and concerns regarding privacy and security on the Web; (b) to test the impact a Secure Private Portal may have on those concerns and on the way citizens use Government Websites. In order to accomplish these goals researchers from Columbia Business School and from Columbia departments of Computer Science and Psychology, developed and ran a web-based survey. Participants were recruited using online advertising through Google.com and provided their responses on the web. Early analyses of the results indicate a very high level of citizens' concerns regarding privacy and security of their personal data. Some of the concerns can appropriately be addressed only by fundamental policy changes. Furthermore, the results suggest that citizens perceive those sites which use secure portals as much safer and are more likely to visit them again. The results may indicate a new strategy for the presentation and design of government websites.

Websites Results Of; Salvatore J. Stolfo; Eric Johnson; Tomislav Pavlicic; Stephen Jan

2003-01-01T23:59:59.000Z

48

Towards the development of privacy-aware systems  

Science Conference Proceedings (OSTI)

Privacy and data protection are pivotal issues in nowadays society. They concern the right to prevent the dissemination of sensitive or confidential information of individuals. Many studies have been proposed on this topic from various perspectives, ... Keywords: Privacy policy, Privacy-Aware Access Control, Privacy-related legal requirements, Requirements Engineering

Paolo Guarda; Nicola Zannone

2009-02-01T23:59:59.000Z

49

PRIVACY/SECURITY NOTICE  

NLE Websites -- All DOE Office Websites (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

50

PNNL: Security & Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

51

STEP 2: To Be Completed by SOFC Privacy Policy "State law requires that you be informed of the following: (1) you are entitled to request to be informed about the information about  

E-Print Network (OSTI)

Part: 68 Mail Stop: STEP 2: To Be Completed by SOFC Privacy Policy "State law requires that you: STEP 4: Vendor, email invoice to ldarling@stuact.tamu.edu or mail invoice to SOFC Mail Stop 1236. STEP contact person: (Please notify SOFC @ 845-1114 if event is cancelled) Vendor phone number: Faculty

Behmer, Spencer T.

52

FOIA/Privacy Act  

NLE Websites -- All DOE Office Websites (Extended Search)

Freedom of Information Act/Privacy Act Freedom of Information Act/Privacy Act The Oak Ridge Office of Chief Counsel is responsible for administering policies, programs, and procedures to ensure DOE compliance with the Freedom of Information Act (FOIA) and the Privacy Act (PA), 5 U.S.C. 552 and 5 U.S.C. 552a, respectively. DOE continuously gathers site specific information about its facilities and record repositories. Links to DOE sites and major contractors are found at Energy.gov. The resources on these pages are provided to aid in finding answers to your questions about programs of the Department of Energy and to obtain information that is publicly available without submitting a FOIA request. If the information is not available here or on another Department website, submit a Freedom of Information Act request electronically.

53

Localization privacy  

Science Conference Proceedings (OSTI)

Location-aware technology and its applications are fundamental to ubiquitous computing. Essential to this technology is object localization and identification. RFID (radio frequency identification) technology has been shown to be very effective for identification ... Keywords: RFID, localization privacy, location privacy, location-aware applications, object localization

Mike Burmester

2012-01-01T23:59:59.000Z

54

Privacy Act  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy Act Privacy Act Privacy Act Code of Federal Regulations (CFR) for the Privacy Act is 10CFR 1008 Privacy Act of 1974 and Amendments (as of Jan 2, 1991) From GPO US Code on CD-ROM (GPO S/N 052-001-004-00439-6) $30.00 -CITE- 5 USC Sec. 552a -EXPCITE- TITLE 5 PART I CHAPTER 5 SUBCHAPTER II -HEAD- Sec. 552a. Records maintained on individuals -EXPCITE- TITLE 5 PART I CHAPTER 5 SUBCHAPTER II -HEAD- Sec. 552a. Records maintained on individuals -STATUTE- (a) Definitions. - For purposes of this section - (1) the term 'agency' means agency as defined in section 552(e) (FOOTNOTE 1) of this title; (FOOTNOTE 1) See References in Text note below. (2) the term 'individual' means a citizen of the United States or an alien lawfully admitted for permanent residence (3) the term 'maintain' includes maintain, collect, use, or disseminate;

55

Web tool for energy policy decision-making through geo-localized LCA models: A focus on offshore wind farms in Northern Europe  

E-Print Network (OSTI)

1 Web tool for energy policy decision-making through geo-localized LCA models: A focus on offshore for 2020. To achieve these objectives, it is necessary for energy policy makers to have a full main objective is to support environ- mental policy regarding wind energy. As a renewable energy source

Paris-Sud XI, Université de

56

Differential privacy under fire  

Science Conference Proceedings (OSTI)

Anonymizing private data before release is not enough to reliably protect privacy, as Netflix and AOL have learned to their cost. Recent research on differential privacy opens a way to obtain robust, provable privacy guarantees, and systems like PINQ ...

Andreas Haeberlen; Benjamin C. Pierce; Arjun Narayan

2011-08-01T23:59:59.000Z

57

A contract agreement policy-based workflow methodology for agents interacting in the semantic web  

Science Conference Proceedings (OSTI)

The Semantic Web aims at automating Web content understanding and user request satisfaction. Intelligent agents assist towards this by performing complex actions on behalf of their users into real-life applications, such as e-Contracts, which make transactions ... Keywords: defeasible reasoning, e-Contracts, intelligent agents, semantic web

Kalliopi Kravari; Grammati-Eirini Kastori; Nick Bassiliades; Guido Governatori

2010-10-01T23:59:59.000Z

58

NETL: Your Rights under the FOIA, the Privacy Act, and other Privacy Laws  

NLE Websites -- All DOE Office Websites (Extended Search)

FOIA/Privacy Act FOIA/Privacy Act Your Rights under the FOIA, the Privacy Act, and other Privacy Laws The Freedom of Information Act and Privacy Act Division/Office is responsible for administering policies, programs, and procedures to ensure DOE compliance with the Freedom of Information Act (FOIA) and the Privacy Act (PA), 5 U.S.C. 552 and 5 U.S.C. 552a, respectively. The resources on these pages are provided to aid in finding answers to your questions about programs of the Department of Energy and to obtain information that is publicly available without submitting a FOIA request. If the information is not available here, submit a Freedom of Information Act request electronically. To assist obtaining publicly available information, we suggest you first conduct a search on the specific topic or information you are seeking using

59

Secure and privacy-preserving execution model for data services  

Science Conference Proceedings (OSTI)

Data services have almost become a standard way for data publishing and sharing on top of the Web. In this paper, we present a secure and privacy-preserving execution model for data services. Our model controls the information returned during service ... Keywords: RDF views, data services, privacy preservation

Mahmoud Barhamgi, Djamal Benslimane, Said Oulmakhzoune, Nora Cuppens-Boulahia, Frederic Cuppens, Michael Mrissa, Hajer Taktak

2013-06-01T23:59:59.000Z

60

The University of Texas at Austin Web Accessibility Policy Office of the Chief Information Officer Written By: Written By: ADAAA, Section 504 and  

E-Print Network (OSTI)

The University of Texas at Austin Web Accessibility Policy Office of the Chief Information Officer ..............................................................................................................................................2 1. Purpose All Web applications and sites at The University of Texas at Austin must meet the statutory requirements in Texas Administrative Code 206.70 Accessibility Standards (TAC 206.70), which

Texas at Austin, University of

Note: This page contains sample records for the topic "web policies privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Web Measurement and Tracking Opt-Out | U.S. DOE Office of Science (SC)  

NLE Websites -- All DOE Office Websites (Extended Search)

Web Policies » Web Measurement and Tracking Web Policies » Web Measurement and Tracking Opt-Out Web Policies Web Measurement and Tracking Opt-Out Contact Information Office of Science U.S. Department of Energy 1000 Independence Ave., SW Washington, DC 20585 P: (202) 586-5430 Web Measurement and Tracking Opt-Out Print Text Size: A A A RSS Feeds FeedbackShare Page As you use this website, the Office of Science collects web measurement and tracking data. For full details see User Privacy. If you do not wish to participate in this web measurement and tracking activity, you may opt-out of this information collection by clicking on the opt-out button on this page. To opt-out, it is necessary to install a cookie on your computer. This cookie identifies that you have opted-out. If you delete the opt-out cookie, if you change computers or Web browsers, or upgrade your existing

62

OSTI Web Measurement and Tracking Opt-Out | OSTI, US Dept of Energy, Office  

Office of Scientific and Technical Information (OSTI)

OSTI Web Measurement and Tracking Opt-Out OSTI Web Measurement and Tracking Opt-Out As you use this website, OSTI collects web measurement and tracking data. For full details see User Privacy under Website Policies and Important Links. If you do not wish to participate in this web measurement and tracking activity, you may opt-out of this information collection by clicking on the opt-out button on this page. To opt-out, it is necessary to install a cookie on your computer. This cookie identifies that you have opted-out. If you delete the opt-out cookie, if you change computers or Web browsers, or upgrade your existing browser, you will need to opt-out again. I wish to be excluded from web measurement and tracking. OSTI Homepage Mobile Gallery Subscribe to RSS OSTI Blog Get Widgets Get Alert Services

63

A Temporal Description Logic Based Access Control Model for Expressing History Constrained Policies in Semantic Web  

Science Conference Proceedings (OSTI)

An access control model for Semantic Web should be compatible with the corresponding semantic model. The access control procedure(s) should also take the semantic relationships between the entities (specified as ontologies) into account. Considering ... Keywords: Access Control, Description Logic, Semantic Web, History of Accesses

Fathieh Faghih; Morteza Amini; Rasool Jalili

2009-07-01T23:59:59.000Z

64

C4PS: colors for privacy settings  

Science Conference Proceedings (OSTI)

The ever increasing popularity of Facebook and other Online Social Networks has left a wealth of personal and private data on the web, aggregated and readily accessible for broad and automatic retrieval. Protection from both undesired recipients and ... Keywords: access control, online social networks, privacy

Thomas Paul; Martin Stopczynski; Daniel Puscher; Melanie Volkamer; Thorsten Strufe

2012-04-01T23:59:59.000Z

65

Managing the Costs of Informational Privacy: Pure Bundling as a Strategy in the Individual Health Insurance Market  

Science Conference Proceedings (OSTI)

Advances in genetic testing and data mining technologies have increased the availability of genetic information to insurance companies and insureds (applicants and policy holders) in the individual health insurance market (IHIM). Regulators, concerned ... Keywords: Bundling Information Privacy Insurance Markets Insurey Words And Phrases Ance Policy Privacy Privacy Cost

Matt E. Thatcher; Eric K. Clemons

2000-08-01T23:59:59.000Z

66

A temporal description logic based access control model for expressing history constrained policies in semantic web  

Science Conference Proceedings (OSTI)

An access control model for Semantic Web should be compatible with the corresponding semantic model. The access control procedure(s) should also take the semantic relationships between the entities (specified as ontologies) into account. Considering ...

Fathieh Faghih; Morteza Amini; Rasool Jalili

2009-07-01T23:59:59.000Z

67

Privacy & Security Notice | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy & Security Notice Privacy & Security Notice Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The U.S. Department of Energy (DOE) monitors this web site for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation is prohibited. Evidence of such acts may be disclosed to law enforcement authorities and

68

EIA - Privacy Statement & Security Policy  

U.S. Energy Information Administration (EIA)

... you should know that EIA collects and stores a standard set of Internet-related information, such as an Internet Protocol (IP) address, the date and time, the ...

69

Stalking online: on user privacy in social networks  

Science Conference Proceedings (OSTI)

With the extreme popularity of Web and online social networks, a large amount of personal information has been made available over the Internet. On the other hand, advances in information retrieval, data mining and knowledge discovery technologies have ... Keywords: attacks, privacy, social networks, web

Yuhao Yang; Jonathan Lutes; Fengjun Li; Bo Luo; Peng Liu

2012-02-01T23:59:59.000Z

70

Privacy Act Fees and Time Limits | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Privacy Act Fees and Time Limits The Act provides agencies to assess fees only for the cost of reproducing records. However, it is the policy of the DOE to provide an individual...

71

Evaluating sliding and sticky target policies by measuring temporal drift in acyclic walks through a web archive  

Science Conference Proceedings (OSTI)

When a user views an archived page using the archive's user interface (UI), the user selects a datetime to view from a list. The archived web page, if available, is then displayed. From this display, the web archive UI attempts to simulate the web browsing ... Keywords: digital preservation, http, resource versioning, temporal applications, web architecture, web archiving

Scott G. Ainsworth; Michael L. Nelson

2013-07-01T23:59:59.000Z

72

PRIVACY IMPACT ASSESSMENT: INL INGSM2009 PIA Template Version  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

* * PRIVACY IMPACT ASSESSMENT: INL INGSM2009 PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetext/neword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT D.. June 16, 2009 Deparlnient~", Element &Site Idaho National Laboratory N.....,e,df'llnformatlon 10th International Nuclear Graphite Specialists Meeting registration web site. ,SY8tem,orIT Project exhibit Project UID Enterprise Architecture Application 10 - 223419 NewPIA D Update 0 System

73

Notice of Privacy Practices THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE  

E-Print Network (OSTI)

extent of the law. In addition to various laws governing your privacy, we have our own privacy policies medical treatment you have received and about payment for health care you have received. It is our policy, counterintelligence, and other national security activities. 5. Individual Rights Access. You have the right

Salama, Khaled

74

"I know what you did last summer": query logs and user privacy  

Science Conference Proceedings (OSTI)

We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of users in web search query logs. We study the application of simple classifiers to map a sequence of queries into the gender, age, and location of the user ... Keywords: k-anonymity, privacy, query log analysis

Rosie Jones; Ravi Kumar; Bo Pang; Andrew Tomkins

2007-11-01T23:59:59.000Z

75

MasteringWeb Services Security MasteringWeb Services Security  

E-Print Network (OSTI)

Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

76

Relations among privacy notions  

Science Conference Proceedings (OSTI)

This article presents a hierarchy of privacy notions that covers multiple anonymity and unlinkability variants. The underlying definitions, which are based on the idea of indistinguishability between two worlds, provide new insights into the relation ... Keywords: Adversarial model, anonymity, privacy notions, unlinkability

Jens-Matthias Bohli; Andreas Pashalidis

2011-05-01T23:59:59.000Z

77

Privacy in (mobile) Telecommunications Services  

Science Conference Proceedings (OSTI)

Telecommunications services are for long subject to privacy regulations. At stake are traditionally: privacy of the communication and the protection of traffic data. Privacy of the communication is legally founded. Traffic data subsume under the notion ... Keywords: data protection, ethics, location data, privacy, telecommunications, traffic data

Jacques Penders

2004-12-01T23:59:59.000Z

78

About EIA - Policies - U.S. Energy Information Administration (EIA)  

Gasoline and Diesel Fuel Update (EIA)

About EIA About EIA Privacy Statement and Security Policy Privacy statement This website (http://www.eia.gov/) is provided as a public energy information service of the U.S. Energy Information Administration. stock photo EIA.gov utilizes web measurement software tools in order to improve the efficiency of our website and to provide a better user experience for our customers. If you visit this site to read or download information, you should know that EIA collects and stores a standard set of Internet-related information, such as an Internet Protocol (IP) address, the date and time, the type of browser and operating system used, the page(s) visited, and if you linked to the EIA website from another website, the address of that website. The Office of Management and Budget (OMB) classifies this as a Tier 2 usage

79

PRIVACY IMPACT ASSESSMENT: Office  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Office Office of Workforce Development for Teachers and Scientists Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextineword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element & Site August 1, 2009 U.S. Department of Energy; Office of Science; Office of Workforce Development for Teachers and Scientists (WDTS) System location - Pacific Northwest National Laboratory, Richland, WA Name of Information iPASS System for DOE Office of Science laboratory fellowship programs, including

80

PRIVACY IMPACT ASSESSMENT: Office  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Office Office of Information Resources - FOIAXpress Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetext/neword/206/02061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Depamnf!l1tal Elel1l~nt&$ite july 23, 2009 Office of Information Resources Office of Management DOE Headquarters, Germantown, Germantown Computer Center Server Room Nameonl1fol'l11i1tion Sysleijlprl'f 'Project FOIAXpress ExhibitProj~tUID TBD NeWPIA ~ Update D Please indicate whether this is a new

Note: This page contains sample records for the topic "web policies privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Security and privacy implications of cloud computing: lost in the cloud  

Science Conference Proceedings (OSTI)

Cloud computing - the new paradigm, the future for IT consumer utility, the economy of scale approach, the illusion of un infinite resources availability, yet the debate over security and privacy issues is still undergoing and a common policy framework ... Keywords: cloud computing, data, information, network, privacy, security

Vassilka Tchifilionova

2010-03-01T23:59:59.000Z

82

A comparative study of online privacy regulations in the U.S. and China  

Science Conference Proceedings (OSTI)

Online privacy seeks to protect the identity of individuals who use the internet to collect information or express opinions. However, given the proliferating vehicles through which one's identity can be ascertained, the question remains as to what policies ... Keywords: China, Internet, Privacy, United States

Yanfang Wu; Tuenyu Lau; David J. Atkin; Carolyn A. Lin

2011-08-01T23:59:59.000Z

83

The Privacy Act of 1974  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Privacy Act of 1974 Privacy Act of 1974 The Privacy Act of 1974, 5 U.S.C. §552a, governs an agency's collection, storage, and use of information about an individual. The Privacy Act protects the privacy of individuals by establishing fair information practices for the collection, maintenance, use, and dissemination of information by federal agencies. Frequently Asked Questions Who is an individual for the purposes of the Privacy Act? A (living) citizen of the United States or an alien lawfully admitted for permanent legal residence.  Deceased individuals are not covered by the Privacy Act, and their executors or next-of- kin can not pursue a Privacy Act claim on their behalf.

84

Web Site Map  

NLE Websites -- All DOE Office Websites (Extended Search)

Help » Web Site Map Help » Web Site Map Web Site Map The links listed below include all pages on the site except document topic pages. Home Privacy/Security Help Web Site Map Mailing Services Remove me from the List Contact Us About Us News and Events News Archives News/Media FAQs Internet Resources Documents DUF6 EIS Historical Context What is an EIS? Why EIS is Needed Who is Responsible? EIS Process EIS Topics EIS Alternatives EIS Schedule Public Involvement Opportunities Public Comment Form For More Info DUF6 Management and Uses Management Responsibilities DUF6 Storage How DUF6 is Stored Where DUF6 is Stored Cylinder Leakage DUF6 Storage Safety DUF6 PEIS Cylinder Surveillance and Maintenance Conversion Potential DU Uses "Business Case" for R&D on Beneficial Uses of DU Catalysts for Destruction of Air Pollutants

85

Facebook: Threats to Privacy  

E-Print Network (OSTI)

End-users share a wide variety of information on Facebook, but a discussion of the privacy implications of doing so has yet to emerge. We examined how Facebook affects privacy, and found serious flaws in the system. Privacy on Facebook is undermined by three principal factors: users disclose too much, Facebook does not take adequate steps to protect user privacy, and third parties are actively seeking out end-user information using Facebook. We based our end-user findings on a survey of MIT students and statistical analysis of Facebook data from MIT, Harvard, NYU, and the University of Oklahoma. We analyzed the Facebook system in terms of Fair Information Practices as recommended by the Federal Trade Commission. In light of the information available and the system that protects it, we used a threat model to analyze specific privacy risks. Specifically, university administrators are using Facebook for disciplinary purposes, firms are using it for marketing purposes, and intruders are exploiting security holes. For each threat, we analyze the efficacy of the current protection, and where solutions are inadequate, we make recommendations on how to address the issue.

Harvey Jones; José Hiram Soltren

2005-01-01T23:59:59.000Z

86

Web accessibility compliance of government web sites in Korea  

Science Conference Proceedings (OSTI)

This paper introduces Korean web accessibility activities, such as relational laws, ordinances, policies, guidelines. It also presents analytical result of the investigation on web-contents accessibilities of the 39 Korean government agencies. The result ...

Joonho Hyun; Doojin Choi; Sukil Kim

2007-07-01T23:59:59.000Z

87

Privacy is a process, not a PET: a theory for effective privacy practice  

Science Conference Proceedings (OSTI)

Privacy research has not helped practitioners -- who struggle to reconcile users' demands for information privacy with information security, legislation, information management and use -- to improve privacy practice. Beginning with the principle that ... Keywords: framework, privacy, security, trust

Anthony Morton; M. Angela Sasse

2012-09-01T23:59:59.000Z

88

The Failure of Online Social Network Privacy Settings  

E-Print Network (OSTI)

Increasingly, people are sharing sensitive personal information via online social networks (OSN). While such networks do permit users to control what they share with whom, access control policies are notoriously difficult to configure correctly; this raises the question of whether OSN users ’ privacy settings match their sharing intentions. We present the results of an empirical evaluation that measures privacy attitudes and intentions and compares these against the privacy settings on Facebook. Our results indicate a serious mismatch: every one of the 65 participants in our study confirmed that at least one of the identified violations was in fact a sharing violation. In other words, OSN users ’ privacy settings are incorrect. Furthermore, a majority of users cannot or will not fix such errors. We conclude that the current approach to privacy settings is fundamentally flawed and cannot be fixed; a fundamentally different approach is needed. We present recommendations to ameliorate the current problems, as well as provide suggestions for future research. 1 Related Work To the best of our knowledge this is the first attempt to measure the correctness of privacy settings by first surveying user’s sharing intentions, to aid the process of identifying potential violations, then confirming the potential violations with the user. We argue that this method produces a more accurate evaluation compared

Michelle Madejski; Maritza Johnson; Steven M. Bellovin

2011-01-01T23:59:59.000Z

89

Cyber Security and Privacy Landscape of the Electric Sector  

Science Conference Proceedings (OSTI)

This project provides ongoing updates on the status of research and development activities, federal and state policy and regulatory proposals, standards and guidance document development, key personnel, and organizations that are funding or executing smart grid cyber security and privacy activities.

2012-04-17T23:59:59.000Z

90

Smart Meter Privacy: A Utility-Privacy Framework  

E-Print Network (OSTI)

End-user privacy in smart meter measurements is a well-known challenge in the smart grid. The solutions offered thus far have been tied to specific technologies such as batteries or assumptions on data usage. Existing solutions have also not quantified the loss of benefit (utility) that results from any such privacy-preserving approach. Using tools from information theory, a new framework is presented that abstracts both the privacy and the utility requirements of smart meter data. This leads to a novel privacy-utility tradeoff problem with minimal assumptions that is tractable. Specifically for a stationary Gaussian Markov model of the electricity load, it is shown that the optimal utility-and-privacy preserving solution requires filtering out frequency components that are low in power, and this approach appears to encompass most of the proposed privacy approaches.

Rajagopalan, S Raj; Mohajer, Soheil; Poor, H Vincent

2011-01-01T23:59:59.000Z

91

DOE Privacy Best Practices/ Enabling Technologies Subcommittee...  

NLE Websites -- All DOE Office Websites (Extended Search)

More Documents & Publications Energy Privacy Steering Committee 90-day Interim Report on Shale Gas Production - Secretary of Energy Advisory Board Elements of a Federal Privacy...

92

INTERNET PRIVACY, IG-0493 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

here Home INTERNET PRIVACY, IG-0493 INTERNET PRIVACY, IG-0493 Recently enacted appropriations law required agency Inspectors General to report within 60 days on the collection...

93

Policy auditing over incomplete logs: theory, implementation and applications  

Science Conference Proceedings (OSTI)

We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce, addresses two fundamental challenges in compliance checking that arise ... Keywords: audit, formal logic, incomplete logs, privacy policy

Deepak Garg; Limin Jia; Anupam Datta

2011-10-01T23:59:59.000Z

94

POLICY NUMBER 2003-27 March 28, 2005  

E-Print Network (OSTI)

extent of the law. In addition to various laws governing your privacy, we have our own privacy policies medical treatment you have received and about payment for health care you have received. It is our policy, counterintelligence, and other national security activities. 5. Individual Rights Access. You have the right

Oliver, Douglas L.

95

Privacy Policy | Princeton Plasma Physics Lab  

NLE Websites -- All DOE Office Websites (Extended Search)

Join Our Mailing List A Collaborative National Center for Fusion & Plasma Research Search form Search Search Home About Overview Learn More Visiting PPPL History...

96

FOIA Reading Room - privacy act  

NLE Websites -- All DOE Office Websites (Extended Search)

Reading Room - pricacy act Reading Room - pricacy act CH Frequently Requested Documents Under FOIA Administrative Electronic FOIA Form Privacy Act Advisory (Microsoft Word(tm) document) DOE-CH Government Purchase Card Cardholders: December 2012 CH Organizational Chart: Current Version Policies and Procedures - Office of Science (including Chicago Office) Office of Hearings and Appeals Decisions Department of Justice Cases and Legal Documents Department of Energy Directives DOE Office of Inspector General Reports Responses Under FOIA FY10 Management and Operating Contracts "FY2012 Laboratory Performance Report Cards" The following management and operating prime contracts under the jurisdiction of DOE-CH have been renewed and posted for your convenience. Modifications that change, delete, or add language to any portion of these contracts (referred to as "M" Mods) will be posted as expeditiously as possible after execution. It is at the discretion of the Contractors whether or not they include modifications that change the amount obligated by the Government. Ames Laboratory - Contract No. No.DE-AC02-07CH11358

97

POLICY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3, 2013 3, 2013 POLICY * Successful execution of this research and development (R&D) program will materially contribute to U.S. supply of oil and gas both today and beyond the 10 year R&D horizon. It is the consensus of this Committee that the resource potential impacted by this technology program is significant and of major importance to the Nation. There is a critical need for a sustainable and consistent approach to the technology challenges facing unconventional resource development. * The Committee believes the Plan and the procedures followed in its development to be professional and inclusive, with a significant infusion of industry knowledge. * These Independents are faced with unique and ever more difficult technical challenges in developing new unconventional resources, yet they often lack the

98

Integrating Security and Privacy Requirements into ...  

Science Conference Proceedings (OSTI)

... Page 4. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 4 Unconventional Threats Affecting Security and Privacy Connectivity ...

2011-11-15T23:59:59.000Z

99

Managing Security and Privacy Risk in Healthcare ...  

Science Conference Proceedings (OSTI)

... Page 4. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 4 Unconventional Threats Affecting Security and Privacy Connectivity ...

2012-06-05T23:59:59.000Z

100

Information fusion in data privacy: A survey  

Science Conference Proceedings (OSTI)

In this paper, we review the role of information fusion in data privacy. To that end, we introduce data privacy, and describe how information and data fusion are used in some fields of data privacy. Our study is focused on the use of aggregation for ... Keywords: Data privacy, Information fusion, Microaggregation, Record linkage

Guillermo Navarro-Arribas; Vicenç Torra

2012-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "web policies privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Avoiding the prisoner's dilemma of the web  

Science Conference Proceedings (OSTI)

Everyone talks about increasing safety, security and privacy on the web. But in spite of decades of work to achieve these ends, people still find it hard to know which individuals they meet on the Internet they can trust. Worse still, many sites, including ... Keywords: individuals, prisoner's dilemma, security, strategy, transactions, trust, utility

Peter Mortensen; Conrad Wai

2007-11-01T23:59:59.000Z

102

Notice of Privacy Practices University of Connecticut Effective Date: April 14, 2003  

E-Print Network (OSTI)

providers of service may have different policies or notices regarding the information they maintain about this notice of our legal duties and privacy policy practices with respect to your PHI; and Follow the terms, counterintelligence, and other national security activities authorized by law. Protective Services for the President

Holsinger, Kent

103

Estimating the rate of web page updates  

Science Conference Proceedings (OSTI)

Estimating the rate of Web page updates helps in improving the Web crawler's scheduling policy. But, most of the Web sources are autonomous and updated independently. Clients like Web crawlers are not aware of when and how often the sources change. Unlike ...

Sanasam Ranbir Singh

2007-01-01T23:59:59.000Z

104

Web handbook  

Science Conference Proceedings (OSTI)

... WEB HANDBOOK. Name: WEB HANDBOOK Type: Support Command Purpose: Accesses the NIST/SEMATECH Engineering Statistics Handbook. ...

2013-11-27T23:59:59.000Z

105

Web engineering  

Science Conference Proceedings (OSTI)

Web Engineering is the application of systematic, disciplined and quantifiable approaches to development, operation, and maintenance of Web-based applications. It is both a pro-active approach and a growing collection of theoretical and empirical research ... Keywords: development methodologies, taxonomy of Web applications, web Engineering, web application development, web-based information systems

Yogesh Deshpande; San Murugesan; Athula Ginige; Steve Hansen; Daniel Schwabe; Martin Gaedke; Bebo White

2002-10-01T23:59:59.000Z

106

Pythia: a privacy aware, peer-to-peer network for social search  

Science Conference Proceedings (OSTI)

Emerging "live social search" systems such as Aardvark.com allow users to pose questions to their social network in real time. People can thus obtain answers from real humans for questions that prove too complex for web searches. Centralized systems ... Keywords: peer-to-peer, privacy, question-and-answer systems, social search

Shirin Nilizadeh; Naveed Alam; Nathaniel Husted; Apu Kapadia

2011-10-01T23:59:59.000Z

107

DOE O 206.1, Department of Energy Privacy Program  

Directives, Delegations, and Requirements

The order establishes Departmental implementation of agency statutory and regulatory requirements for privacy, specifically those provided in the Privacy Act ...

2009-01-16T23:59:59.000Z

108

Deficiencies in online privacy policies : factors and policy recommendations  

E-Print Network (OSTI)

Online service providers (OSPs) such as Google, Yahoo!, and Amazon provide customized features that do not behave as conventional experience goods. Absent familiar metaphors, unraveling the full. scope and implications of ...

Sowell, Jesse H., II (Jesse Horton)

2010-01-01T23:59:59.000Z

109

OpenTag: Privacy protection for RFID  

E-Print Network (OSTI)

Radio frequency identification's use in retail is good for pervasive computing, but raises considerable privacy issues. OpenTag programmable tags address privacy issues while remaining fully compatible with the supply-chain ...

Holtzman, Henry N.

110

Privacy: is there an app for that?  

Science Conference Proceedings (OSTI)

Users of social networking sites (SNSs) increasingly must learn to negotiate privacy online with multiple service providers. Facebook's third-party applications (apps) add an additional layer of complexity and confusion for users seeking to understand ... Keywords: Facebook, adverse privacy events, privacy, social networking applications

Jennifer King; Airi Lampinen; Alex Smolen

2011-07-01T23:59:59.000Z

111

DOE Privacy Steering Committee Meeting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EPSC Subcommittees EPSC Subcommittees EPSC Subcommittees EPSC Subcommittees April 23, 2009 April 23, 2009 Subcommittee Charge/Outcomes Members Chairs* Best Practices/ Enabling Technologies Subcommittee Charge of the Subcommittee The Best Practices/ Enabling Technologies Subcommittee will serve as a forum for the development and promotion of Privacy best practices, as well as for the review of available technologies that support and enable the mission of Privacy. Best practices may be drawn from the public and private sectors. Technology solutions may include consideration of enterprise licensing agreements, and experience of other Federal agencies. Best Practices and Technology will assess agency and industry solutions to develop implementation and performance measurement benchmarks.

112

Biometric Web Services  

Science Conference Proceedings (OSTI)

Biometric Web Services. The biometric web services project combines biometrics and web services to. ... What are Web services? ...

2012-08-15T23:59:59.000Z

113

Making Web services tradable  

Science Conference Proceedings (OSTI)

In service-oriented architectures, applications are developed by incorporating services which are often provided by different organizations. Since a service might be offered under different configurations by various different organizations, sophisticated ... Keywords: Automated negotiations, Preferences for functional/non-functional properties, Web service policies

Sudhir Agarwal; Steffen Lamparter; Rudi Studer

2009-01-01T23:59:59.000Z

114

Web Accessibility Office of Diversity and Inclusion  

E-Print Network (OSTI)

Web Accessibility Office of Diversity and Inclusion Applies to: Any website conducting university of the art digital and web based information delivery of information is increasingly central in carrying out constituencies. This policy establishes minimum standards for the accessibility of web based information

Jones, Michelle

115

Best Practices: Elements of a Federal Privacy Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Best Practices: Best Practices: Elements of a Federal Privacy Program Version 1.0 Sponsored By: Federal CIO Council Privacy Committee June 2010 Best Practices: Elements of a Federal Privacy Program June 2010 Page i Contents Acknowledgements __________________________________________________________________ ii Purpose ____________________________________________________________________________ 1 Introduction: Privacy Stewardship and Governance _________________________________________ 3 Element 1 -Leadership ________________________________________________________________ 6 Element 2 - Privacy Risk Management and Compliance Documentation _________________________ 9 Element 3 - Information Security _______________________________________________________ 14

116

An online experiment of privacy authorization dialogues for social applications  

Science Conference Proceedings (OSTI)

Several studies have documented the constantly evolving privacy practices of social networking sites and users' misunderstandings about them. Researchers have criticized the interfaces to "configure" privacy preferences as opaque, uninformative, and ... Keywords: information privacy, online social networks (osns), privacy awareness and control, privacy notice and consent, third-party applications (apps)

Na Wang; Jens Grossklags; Heng Xu

2013-02-01T23:59:59.000Z

117

Web Browser Interface (WBUI)  

NLE Websites -- All DOE Office Websites (Extended Search)

Browser Interface (WBUI) Browser Interface (WBUI) Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual Web Browser Interface (WBUI) Web Service Interface (API) FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Web Browser Interface (WBUI) 1. Login Before you can access the server you must login using the user name that

118

Web mining for web personalization  

Science Conference Proceedings (OSTI)

Web personalization is the process of customizing a Web site to the needs of specific users, taking advantage of the knowledge acquired from the analysis of the user's navigational behavior (usage data) in correlation with other information collected ... Keywords: WWW, Web personalization, Web usage mining, user profiling

Magdalini Eirinaki; Michalis Vazirgiannis

2003-02-01T23:59:59.000Z

119

Web Force-Field (WebFF)  

Science Conference Proceedings (OSTI)

Web Force-Field (WebFF). Summary: ... WebFF - A web hosted, extensible force field repository with integrated assignment engine. Description: ...

2013-07-19T23:59:59.000Z

120

DOE Web Managers Council Charter | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE Web Managers Council Charter DOE Web Managers Council Charter DOE Web Managers Council Charter Who We Are The Department of Energy (DOE) Web Managers Council (Web Council) was created in December 2010 as a way for DOE Web Managers to collaborate across programs, and share common challenges, ideas, and best practices. Members work in various Program Offices, National Laboratories and Staff Offices and include representatives from Policy, Communications, Public Affairs, and Chief Information Officer (CIO) staffs. Our Purpose The purpose of the DOE Web Managers Council is to: Promote the use of Web best practices on DOE web sites serving internal and external audiences; Address high-level web policy issues that affect all programs; Advise and make recommendations to policy-makers, partners and other

Note: This page contains sample records for the topic "web policies privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

In Pursuit of Privacy on a Public Internet  

E-Print Network (OSTI)

In Pursuit of Privacy on a Public Internet by Marc MendoncaUser privacy on the Internet has been an increasing concernof Privacy on a Public Internet A thesis submitted in

Mendonca, Marc

2012-01-01T23:59:59.000Z

122

Economic doctrines and network policy  

Science Conference Proceedings (OSTI)

Disagreements over how to craft Internet policy have become more and more contentious and political. Beyond the technical and engineering aspects are economic questions, and the points of view of various stakeholders and participants on such network ... Keywords: Broadband, Copyright, Doctrines, Economic ideology, Neoclassical economics, Net neutrality, Privacy

Robert D. Atkinson

2011-06-01T23:59:59.000Z

123

Web Server  

NLE Websites -- All DOE Office Websites (Extended Search)

Primegens Web Server Due to limited computer and human resource, we are unable to continue further support of this Web site at this time. If you like to use Primegens, please sign...

124

Public Roundtable- Data Access and Privacy Issues Related to...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Transcript of...

125

Freedom of Information Act (FOIA) and Privacy Act Requests |...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Freedom of Information Act (FOIA) and Privacy Act Requests Freedom of Information Act (FOIA) and Privacy Act Requests Calibration Facilities Ecosystem Management Team Environmental...

126

Public Roundtable- Data Access and Privacy Issues Related to...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Transcript...

127

Expandable grids for visualizing and authoring computer security policies  

Science Conference Proceedings (OSTI)

We introduce the Expandable Grid, a novel interaction technique for creating, editing, and viewing many types of security policies. Security policies, such as file permissions policies, have traditionally been displayed and edited in user interfaces ... Keywords: expandable grid, file permissions, privacy, security, visualization

Robert W. Reeder; Lujo Bauer; Lorrie Faith Cranor; Michael K. Reiter; Kelli Bacon; Keisha How; Heather Strong

2008-04-01T23:59:59.000Z

128

Authorization Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Authorization Policy Authorization Policy Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Authorization Policy Introduction An authorization decision consists of deciding if an authenticated entity

129

FOIA Requester Service Centers, FOIA Public Liaisons and Web Pages |  

National Nuclear Security Administration (NNSA)

Privacy Privacy Act (PA) of 1974 > FOIA Requester Service Centers, FOIA Public Liaisons ... FOIA Requester Service Centers, FOIA Public Liaisons and Web Pages Department of Energy Office Requestor Service Center Public Liason Web Page DOE Headquarters 202-586-5955 Abel Lopez 202-586-6026 http://www.mbe.doe.gov Chicago Office 630-252-2041 Gary Pitchford 630-252-2013 http://doe.lib.uic.edu/ Idaho Operations Office 208-526-0709 Brad Bugger 208-526-0833 http://www.id.doe.gov Oak Ridge Operations Office 865-576-1216 DiAnn Fields 865-576-0885 http://www.oakridge.doe.gov Office of Scientific and Technical Information 865-576-1261 David Gottholm 865-576-2623 No FOIA Web Page Richland Operations Office 509-376-6288 Al Hawkins 509-376-9936 http://www.hanford.gov Savannah River Field Office 803-952-8134 Lucy Knowles

130

Privacy in mobile technology for personal healthcare  

Science Conference Proceedings (OSTI)

Information technology can improve the quality, efficiency, and cost of healthcare. In this survey, we examine the privacy requirements of mobile computing technologies that have the potential to transform healthcare. Such mHealth technology enables ... Keywords: HIPAA, Privacy framework, e-health, electronic health record, home healthcare, mHealth, medicine, mobile healthcare, personal health record

Sasikanth Avancha; Amit Baxi; David Kotz

2012-11-01T23:59:59.000Z

131

Protecting consumer privacy from electric load monitoring  

Science Conference Proceedings (OSTI)

The smart grid introduces concerns for the loss of consumer privacy; recently deployed smart meters retain and distribute highly accurate profiles of home energy use. These profiles can be mined by Non Intrusive Load Monitors (NILMs) to expose much of ... Keywords: load monitor, privacy, smart meter

Stephen McLaughlin; Patrick McDaniel; William Aiello

2011-10-01T23:59:59.000Z

132

POPCORN: privacy-preserving charging for emobility  

Science Conference Proceedings (OSTI)

Upcoming years will see a massive deployment of electric vehicles and, combined with this, of charging infrastructure. This will require protocols and standards that will control authentication, authorization, and billing of electric-vehicle charging. ... Keywords: electric vehicle charging, iso/iec 15118, privacy, privacy enhancing technologies, security

Christina Höfer, Jonathan Petit, Robert Schmidt, Frank Kargl

2013-11-01T23:59:59.000Z

133

Employing PRBAC for privacy preserving data publishing  

Science Conference Proceedings (OSTI)

Issues about privacy-preserving data mining have emerged globally, but still the main problem is that non-sensitive information or unclassified data, one is able to infer sensitive information that is not supposed to be disclosed. Based on our previous ... Keywords: access control, data mining, data publishing, privacy

Anour F. A. Dafa-Alla; Gyoyong Sohn; Keun Ho Ryu

2009-11-01T23:59:59.000Z

134

Hearing on “Online Privacy, Social Networking, and Crime Victimization” Before the Committee on the Judiciary Subcommittee on Crime, Terrorism, and Homeland Security U.S. House of Representatives  

E-Print Network (OSTI)

Washington, DCMr. Chairman and Members of the Committee, thank you for the opportunity to testify today. My name is Marc Rotenberg, and I am the President of the Electronic Privacy Information Center. EPIC was established to focus public attention on emerging privacy and civil liberties issue. I also teach Information Privacy Law at Georgetown University Law Center. I want to thank you for holding this hearing today and also thank Chairman Conyers for his May letter to Facebook. EPIC has a particular interest in privacy and social networking services. We filed two complaints at the Federal Trade Commission in the last year following decisions by Facebook to change its privacy policies and the privacy settings of its users. We also filed a complaint when Google introduced Buzz, its social network service, because the company essentially opted in all of its Gmail users. We believe it is vitally important to protect the privacy of users of these services, and many users agree. To be clear, we do not object to social network services—they are enormously valuable—but we do believe that there are serious privacy risks to

Marc Rotenberg

2010-01-01T23:59:59.000Z

135

PRIVACY IMPACT ASSESSMENT: Occupational Medicine Assistant PIA  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Medicine Medicine - Assistant PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Deparlment of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT iDafe 'Depauwerltal El.ment& iSlte June 10, 2009 Idaho National Laboratory Name :of,lnfonnation Systetnol"'ITiPtoJect Occupational Medicine - Assistant Exhlblt;ProJect UID Indirect funded Occupational Safety and Health NewPIA 0 Update D N T 'tl I Contact Information arne I e . , Phone, Email System Owner Local Privacy Act Offtcer

136

PRIVACY IMPACT ASSESSMENT: INL E-IDR  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INL INL E-IDR (Invention Disclosure Record) PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. I MODULE 1- PRIVACY NEEDS ASSESSMENT Date O..parlmental Element & Site 6/10/09 Idaho National Laboratory Building: 654 BUilding Name: EROS Name of Information System or IT Project E-IDR (Invention Disclosure Record) Exhibit Project UID 61104 NewPIA GJ Update D N T 'tl I Contact Information arne, I e Ph E ' I one, mal System Owner Wendy Skinner Local Privacy Act

Note: This page contains sample records for the topic "web policies privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Flexiplace/Telework Policy | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

through FY 2018 Initial Budget Formulation "Kick-Off" Chief Information Officer (WFP) Energy.gov Careers & Internships Policy and Guidance Contact Us About This Site Web...

142

Web of Science Welcome to the Web of Science................................................................................................ 2  

E-Print Network (OSTI)

Web of Science #12; Welcome to the Web of Science................................................................................................ 2 Web of Science.................................................................................................................. 4 ISI Web of Knowledge

Huang, Su-Yun

143

DOE Launches New Smart Grid Web Portal | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Smart Grid Web Portal Smart Grid Web Portal DOE Launches New Smart Grid Web Portal January 13, 2011 - 5:54pm Addthis Today, the DOE General Counsel's Office is launching a new Smart Gird web portal. In October, the General Counsel's office released two reports exploring technological and legal issues critical for the continued development of the Smart Grid. Drawing upon significant public participation, the reports recommended several next steps to assist utilities and other stakeholders in the rollout of Smart Grid technologies and applications. One of these recommendations was to provide a public portal for information on a variety of issues, including data access and privacy, priority of service, wireless spectrum, and network reliability. The newly-designed and enhanced Smart Grid Information web page can be

144

PRIVACY IMPACT ASSESSMENT: Visitor Dosimeter Badge Tracking  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Visitor Visitor Dosimeter Badge Tracking PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetexUneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date June 11, 2009 Deparbnental Idaho National Laboratory Element & Site Building 616 Willow Creek Building Name of Information Visitor Dosimeter Badge Tracking System or IT Project Exhibit Project UID 217975 New PIA ~ Update D Name, Title I Contact Information Phone, Email Lynn Rockhold System Owner I' 1\ I \ \ ( y P II 114 I' "I

145

PRIVACY IMPACT ASSESSMENT: INL Energy Employees' Occupational  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INL INL Energy Employees' Occupational Illness Compensation Program Act (EEOICPA) Tracking Database PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance Is provided In the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element &Site June 11, 2009 Idaho National Laboratory Building 616 Willow Creek Building Name of Information Energy Employees' Occupational Illness Compensation Program Act (EEOICPA) System or IT ProJect Tracking Database Exhibit Project

146

PRIVACY IMPACT ASSESSMENT: OCCUPATIONAL MEDICINE- INL OCCUPATIONAL  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OCCUPATIONAL OCCUPATIONAL MEDICINE- INL OCCUPATIONAL MEDICAL SUVEILLANCE SYSTEM (OMSS) PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Dllte DepartmentAll Element~&Slte 06-16-2009 Idaho National Laboratory Building Number: WCB Building Name: WCB Name of Information System!«)r IT Project Occupational Medical Surveillance System (OMSS) ExhlbllProJect UIO 72 NewPIA D Update 0 DOE PIA - OMSS Finallxw.doc

147

PRIVACY IMPACT ASSESSMENT: Occupational Safety Health Occupational  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Occupational Occupational Safety & Health - Occupational Injury & Illness System PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1 J Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date June 12, 2009 Departmental Idaho National Laboratory Element & Site Name of Infonnatlon Occupational Injury & Illness System (01&15) System or IT Project Exhibit Project UID 136 New PIA ~ Update D Name, Title Contact Information Phone, Email Anthony J. Kavran (208) 526-5826

148

PRIVACY IMPACT ASSESSMENT: Integrated Safety Management Workshop  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Integrated Integrated Safety Management Workshop Registration PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element&·Slte 16/Jun/09 Idaho National Laboratory Engineering Research Office Building (EROB) Name of-Information System or IT Project Integrated Safety Management Workshop Registration Exhibit Project UID 207765 NewPIA D Update 0 DOE PIA - ISMS Workshop Finallxw.doc N T "tl I

149

PRIVACY IMPACT ASSESSMENT: Human Resources Personal Information  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Human Human Resources - Personal Information Change Request PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetext/neword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element & Site Idaho National Engineering Laboratory Engineering Research Office Building (EROB) Name of Information Human Resources - Personal Information Change Request System or IT Project Business Enclave Exhibit Project UID 106800 NewPIA ~ Update D N T 'tl I Contact Information arne,

150

Privacy Act Statement | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Statement | National Nuclear Security Administration Statement | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Privacy Act Statement Home > About Us > Our Operations > NNSA Office of General Counsel > Privacy Act (PA) of 1974 > Privacy Act Statement Privacy Act Statement Agency forms used to collect personal information protected by the Act must

151

PRIVACY IMPACT ASSESSMENT: INL Manchester Software  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Manchester Manchester Software 1099 Reporting PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program. Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date 06/09/09 Departmental Idaho National Laboratory Element &Site Building Name: lAB Name of Infonnatlon Manchester Software 1099 Reporting System or IT Project Exhibit Project UID 202021 New PIA GJ Update D Name, Title I Contact Information Phone, Email Bryan Larson, System Owner 208-526-8685 Technical Lead, Manchester

152

PRIVACY IMPACT ASSESSMENT: OCIO HSPD-12 Physical  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OCIO OCIO - HSPD-12 Physical and Logical System PIA Template Version 4- June, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element & Site August 27,2009 Office of the Chief Information Officer DOE Headquarters, Forrestal, 8H-065 Name of Information System or IT Project HSPD-12 Physical and Logical Access System Exhibit Project UID Project's Unique 10: 019-60-01-17-01-8062-04-404-140 (2010 UID) NewPIA D Update ~ HSPD-12

153

2013 Privacy Awareness Training | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

You are here You are here Home » 2013 Privacy Awareness Training 2013 Privacy Awareness Training October 11, 2013 5:00PM EDT Registration link: OLC Course type: Online Course Location: Online Course Description: This course is designed to address the importance of privacy, and to ensure that DOE employees are aware of the vital role they play in safeguarding privacy and protecting Personally Identifiable Information (PII). Audience: All Headquarters Federal and contractor employees and detailees with access to Federal information resources and all remote Federal and support services contractor employees provided access to the Federal Information Resources. This DOECAST does not apply to M&O contractors. M&O contractors should follow their respective guidelines for training.

154

A technology perspective on worldwide privacy regulations  

Science Conference Proceedings (OSTI)

In this paper we provide an overview of the worldwide privacy regulatory landscape from a technology perspective. We focus on data-centric definitions of personal information and then examine how these differ across different regulatory frameworks, such ...

D. A. Chapin; A. C. Nelson; B. S. Gerber

2009-03-01T23:59:59.000Z

155

Privacy Protection for Social Networking APIs  

E-Print Network (OSTI)

Social networking APIs integrate third-party content into the site and give third-party developers access to user data. These open interfaces enable popular site enhancements but pose serious privacy risks by exposing user data to third-party developers. We address the privacy risks associated with social networking APIs by presenting a privacy-by-proxy design for a privacypreserving API that is motivated by an analysis of the data needs and uses of Facebook applications. Our study of 150 popular Facebook applications reveals that nearly all applications could maintain their functionality using a limited interface that only provides access to an anonymized social graph and placeholders for user data. Since the platform host can control the third party applications ’ output, privacy-by-proxy can be accomplished without major changes to the platform architecture or applications by using new tags and data transformations.

Adrienne Felt; David Evans

2008-01-01T23:59:59.000Z

156

Privacy Impact Assessment | OSTI, US Dept of Energy, Office of Scientific  

Office of Scientific and Technical Information (OSTI)

Privacy Impact Assessment Privacy Impact Assessment Name of Project: Web Domains Maintained by the Office of Scientific and Technical Information (OSTI) Bureau: U.S. Department of Energy, Office of Science Project's Unique ID: N/A Contact Information: [Mailing address for 1 through 5 below is: DOE Office of Scientific and Technical Information, P.O. Box 62, Oak Ridge, TN 37831.] Who is the person completing this document? (Name, title, organization, and contact information.) Valerie S. Allen, Technical Information Specialist allenv@osti.gov, Telephone 865-576-3469 Who is the system owner? (Name, organization, and contact information.) Judy C. Gilmore, OSTI Acting Assistant Director for Program Integration gilmorej@osti.gov, Telephone 865-576-5600 Who is the system manager for this system or application? (Name,

157

Microsoft Word - Privacy 0818.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Empowering Consumers ) DOE-HQ-2009-0003-0818 Empowering Consumers ) DOE-HQ-2009-0003-0818 And the Smart Grid: Data Access, Third Party ) (Noticed May 11, 2010) Use, and Privacy ) ) Comments of San Diego Gas & Electric Company San Diego Gas & Electric Company ("SDG&E") submits these comments in response to the above-enumerated Request for Information noticed by the Department on May 11, 2010. SDG&E is a regulated electric and gas utility operating pursuant to authorities granted to it by the Federal Energy Regulatory Commission and the State of California. SDG&E serves 3.4 million consumers in the San Diego and southern Orange County areas of California via 1.4 million electric meters and 830,000 gas meters. SDG&E's sister company, the Southern California Gas

158

location privacy based on trusted computing and secure logging  

E-Print Network (OSTI)

Many operators of cellphone networks now offer locationbased services to their customers, whereby an operator often outsources service provisioning to a third-party provider. Since a person’s location could reveal sensitive information about the person, the operator must ensure that the service provider processes location information about the operator’s customers in a privacy-preserving way. So far, this assurance has been based on a legal contract between the operator and the provider. However, there has been no technical mechanism that lets the operator verify whether the provider adheres to the privacy policy outlined in the contract. We propose an architecture for location-based services based on Trusted Computing and Secure Logging that provides such a technical mechanism. Trusted Computing lets an operator query the configuration of a location-based service. The operator will hand over location information to the service only if the service is configured such that the service provider cannot get access to location information using software-based attacks. This includes passive attacks, where the provider monitors information flowing into and out of its service, and active attacks, where the provider modifies or injects customer queries to the service. We introduce several requirements that must be satisfied by a location-based service to defend against passive attacks. Furthermore, we present Secure Logging, an auditing mechanism to defend against active attacks.

Urs Hengartner

2008-01-01T23:59:59.000Z

159

User Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Policy Policy User Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs assurance of adequate access to the facility. On the other hand, qualified groups that make a large commitment of time and resources need some assurance of an equitable return on their investment. A national facility should be accessible to all qualified researchers and at the ALS there are three modes of access: as a General User, a member of an Approved Program (AP), or as a member of a Participating Research Team (PRT). All proposals for research to be conducted at the ALS are evaluated based on the criteria endorsed by the International Union of Pure and Applied Physics (IUPAP). These criteria are detailed on the IUPAP Web site at IUPAP Recommendations for the Use of Major Physics Users Facilities (pdf version).

160

Workload-Aware Load Balancing for Clustered Web Servers  

Science Conference Proceedings (OSTI)

We focus on load balancing policies for homogeneous clustered Web servers that tune their parameters on-the-fly to adapt to changes in the arrival rates and service times of incoming requests. The proposed scheduling policy, AdaptLoad, monitors the incoming ... Keywords: Clustered Web servers, self-managing clusters, load balance, locality awareness, workload characterization, static and dynamic pages.

Qi Zhang; Alma Riska; Wei Sun; Evgenia Smirni; Gianfranco Ciardo

2005-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "web policies privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Privacy Statement/SecurityNotice/Accessibility Statement  

Science Conference Proceedings (OSTI)

... Cookies are small files that Web servers place on a user's hard drive. They can serve several functions: they allow the Web ...

2013-07-19T23:59:59.000Z

162

WEB OF KNOWLEDGE --WEB OF SCIENCE--  

E-Print Network (OSTI)

WEB OF KNOWLEDGE --WEB OF SCIENCE-- #12; Web of Science (SCIE, SSCI, AHCI) EndNote Journal Citation Reports (JCR) Essential Science Indicators (ESI) ResearcherID.com #12;WEB OF SCIENCE ? · · · · EndNoteweb Copyright © 2009 Shou Ray Information Service Co., Ltd #12;Web of Science

Wu, Yih-Min

163

Web to Semantic Web & Role of Ontology  

E-Print Network (OSTI)

In this research paper we are briefly presenting current major web problems and introducing semantic web technologies with the claim of solving existing web's problems. Furthermore we are describing Ontology as the main building block of semantic web and focusing on its contributions to semantic web progress and current limitations.

Ahmed, Zeeshan

2010-01-01T23:59:59.000Z

164

Web>clicker Instructions web>clicker  

E-Print Network (OSTI)

Web>clicker Instructions web>clicker · As an instructor, you will operate web>clicker the same as your original i>clicker software. You simply need to enable web>clicker in "My Settings". · i>clicker remotes and web>clicker will work in the same classroom (e.g., students can use physical clickers

Peterson, Blake R.

165

Latina Web Content Study  

E-Print Network (OSTI)

of the Digital Divide he Latina Web Content (LWC) studyavailable via the web, thus it may seem implausible toof minority users and web content has been documented (

Salinas, Romelia

2006-01-01T23:59:59.000Z

166

Protecting location privacy: optimal strategy against localization attacks  

Science Conference Proceedings (OSTI)

The mainstream approach to protecting the location-privacy of mobile users in location-based services (LBSs) is to alter the users' actual locations in order to reduce the location information exposed to the service provider. The location obfuscation ... Keywords: location inference attacks, location privacy, location-based services, optimal defense strategy, privacy protection, service quality, stackelberg bayesian games

Reza Shokri; George Theodorakopoulos; Carmela Troncoso; Jean-Pierre Hubaux; Jean-Yves Le Boudec

2012-10-01T23:59:59.000Z

167

Privacy Rights and Protection: Foreign Values in Modern Thai Context  

Science Conference Proceedings (OSTI)

The concept of privacy as a basic human right which has to be protected by law is a recently adopted concept in Thailand, as the protection of human rights was only legally recognized by the National Human Rights Act in 1999. Moreover, along with other ... Keywords: Buddhism, Thai culture, data protection, human rights, privacy protection, privacy rights, smart ID cards

Krisana Kitiyadisai

2005-03-01T23:59:59.000Z

168

Efficient zero-knowledge identification schemes which respect privacy  

Science Conference Proceedings (OSTI)

At first glance, privacy and zero-knowledgeness seem to be similar properties. A scheme is private when no information is revealed on the prover and in a zero-knowledge scheme, communications should not leak provers' secrets. Until recently, privacy ... Keywords: identification, privacy, zero-knowledge

Julien Bringer; Hervé Chabanne; Thomas Icart

2009-03-01T23:59:59.000Z

169

SmokeScreen: flexible privacy controls for presence-sharing  

Science Conference Proceedings (OSTI)

Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both trusted social relations and untrusted strangers. In this paper, we present ... Keywords: location privacy, mobile computing, pervasive computing, presence-sharing, social networks

Landon P. Cox; Angela Dalton; Varun Marupadi

2007-06-01T23:59:59.000Z

170

Verification of data pattern for interactive privacy preservation model  

Science Conference Proceedings (OSTI)

The research problem of privacy-preserving data publishing is to release microdata in an aggregated form using distinguished techniques that will effectively conceal sensitive and private information but can be used by external users to exercise data ... Keywords: data mining, differential privacy, privacy preservation

Sujoy Ray; Mohammad Fahim Nizam; Swagata Das; Benjamin C. M. Fung

2011-03-01T23:59:59.000Z

171

User Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

User Policy Print User Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs assurance of adequate access to the facility. On the other hand, qualified groups that make a large commitment of time and resources need some assurance of an equitable return on their investment. A national facility should be accessible to all qualified researchers and at the ALS there are three modes of access: as a General User, a member of an Approved Program (AP), or as a member of a Participating Research Team (PRT). All proposals for research to be conducted at the ALS are evaluated based on the criteria endorsed by the International Union of Pure and Applied Physics (IUPAP). These criteria are detailed on the IUPAP Web site at IUPAP Recommendations for the Use of Major Physics Users Facilities (pdf version).

172

User Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Policy Print Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs assurance of adequate access to the facility. On the other hand, qualified groups that make a large commitment of time and resources need some assurance of an equitable return on their investment. A national facility should be accessible to all qualified researchers and at the ALS there are three modes of access: as a General User, a member of an Approved Program (AP), or as a member of a Participating Research Team (PRT). All proposals for research to be conducted at the ALS are evaluated based on the criteria endorsed by the International Union of Pure and Applied Physics (IUPAP). These criteria are detailed on the IUPAP Web site at IUPAP Recommendations for the Use of Major Physics Users Facilities (pdf version).

173

User Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Policy Print Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs assurance of adequate access to the facility. On the other hand, qualified groups that make a large commitment of time and resources need some assurance of an equitable return on their investment. A national facility should be accessible to all qualified researchers and at the ALS there are three modes of access: as a General User, a member of an Approved Program (AP), or as a member of a Participating Research Team (PRT). All proposals for research to be conducted at the ALS are evaluated based on the criteria endorsed by the International Union of Pure and Applied Physics (IUPAP). These criteria are detailed on the IUPAP Web site at IUPAP Recommendations for the Use of Major Physics Users Facilities (pdf version).

174

Confidentiality policies and their extraction from programs  

E-Print Network (OSTI)

We examine a well known confidentiality requirement called noninterference and argue that many systems do not meet this requirement despite maintaining the privacy of its users. We discuss a weaker requirement called incident-insensitive noninterference that captures why these systems maintain the privacy of its users while possibly not satisfying noninterference. We extend this requirement to depend on dynamic information in a novel way. Lastly, we present a method based on model checking to extract from program source code the dynamic incident-insensitive noninterference policy that the given program obeys.

Michael Carl Tschantz; Jeannette M. Wing

2007-01-01T23:59:59.000Z

175

A privacy preservation model for Facebook-style social network systems  

E-Print Network (OSTI)

Recent years have seen unprecedented growth in the popularity of social network systems, with Facebook being an archetypical example. The access control paradigm behind the privacy preservation mechanism of Facebook is distinctly different from such existing access control paradigms as Discretionary Access Control, Role-Based Access Control, Capability Systems, and Trust Management Systems. This work takes a first step in deepening the understanding of this access control paradigm, by proposing an access control model that formalizes and generalizes the privacy preservation mechanism of Facebook. The model can be instantiated into a family of Facebook-style social network systems, each with a recognizably different access control mechanism, so that Facebook is but one instantiation of the model. We also demonstrate that the model can be instantiated to express policies that are not currently supported by Facebook but possess rich and natural social significance. This work thus delineates the design space of privacy preservation mechanisms for Facebook-style social network systems, and lays out a formal framework for policy analysis in these systems.

Philip W. L. Fong; Mohd Anwar; Zhen Zhao

2009-01-01T23:59:59.000Z

176

Smart Meter Privacy: A Utility-Privacy Framework S. Raj Rajagopalan, Lalitha Sankar, Soheil Mohajer, H. Vincent Poor  

E-Print Network (OSTI)

Smart Meter Privacy: A Utility-Privacy Framework S. Raj Rajagopalan, Lalitha Sankar, Soheil Mohajer in smart meter measurements is a well-known challenge in the smart grid. The solutions offered thus far and the utility requirements of smart meter data. This leads to a novel privacy-utility tradeoff problem

Sankar, Lalitha

177

Biometric Web Services  

Science Conference Proceedings (OSTI)

... Biometric Web Services. ... This page last updated Thursday, November 14, 2013. Join the Biometric Web Services Mailing List. ...

2013-11-14T23:59:59.000Z

178

Privacy Policy | VIMSS - Virtual Institute for Microbial Stress...  

NLE Websites -- All DOE Office Websites (Extended Search)

Protocol (IP) address of the domain from which you access the Internet (i.e., 123.456.789.012), either your individual address or the proxy provided by your Internet Service...

179

NETL: Contact Info and Privacy Act Advisory  

NLE Websites -- All DOE Office Websites (Extended Search)

Contact Info and Privacy Act Advisory To contact us: National Energy Technology Laboratory 626 Cochrans Mill Road P.O. Box 10940 Pittsburgh, PA 15236-0940 Phone: 412-386-6167 PRIVACY ACT ADVISORY: Authority: 5 U.S.C. 301, 5 U.S.C. 552, Freedom of Information Act (FOIA); and Title 10, Code of Federal Regulations, Part 1004. Purpose: To allow individuals to file electronic FOIA requests; to track all FOIA requests from receipt to response to compile statistics for the Annual FOIA Report; to research and respond to FOIA requests; to maintain case files to comply with records disposal requirements; and to maintain an administrative record to support any litigation. Routine Use: Records related to the FOIA request will be maintained in DOE-55 "Freedom of Information and Privacy Act (FOIA/PA) Requests for Records." A record

180

Privacy and Security Research Group workshop on network and distributed system security: Proceedings  

Science Conference Proceedings (OSTI)

This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System. Selected papers were processed separately for inclusion in the Energy Science and Technology Database.

Not Available

1993-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "web policies privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Using the World Wide Web at the Lab  

NLE Websites -- All DOE Office Websites (Extended Search)

at the Lab at the Lab Browser information Web browser installation at the Lab Berkeley Lab (LBNL) policy about publishing Web pages Publishing web pages at Berkeley Lab (LBNL) Return to Top Return to Top Web Publishing, Publishing Tools, etc. w3.org: Many HTML converters (tools that create HTML from other formats) TableMaker (web interface to making Netscape-style tables) Colors in webpages CGIs, forms FrameShop (web interface to making frames for Netscape, etc.) The LaTeX2HTML package RosettaMan(reverse compile man pages from formatted form to a number of source formats, including HTML) wget: GNU web mirroring package web "mirroring" via DNS Yahoo's HTML Validators, checkers page HTML Standards, Documentation, the World Wide Web project Graphics Files Icons Imagemaps

182

Discriminatory Lossy Source Coding: Side Information Privacy  

E-Print Network (OSTI)

A lossy source coding problem is studied in which a source encoder communicates with two decoders, one with and one without correlated side information with an additional constraint on the privacy of the side information at the uninformed decoder. Two cases of this problem arise depending on the availability of the side information at the encoder. The set of all feasible rate-distortion-equivocation tuples are characterized for both cases. The difference between the informed and uninformed cases and the advantages of encoder side information for enhancing privacy are highlighted for a binary symmetric source with erasure side information and Hamming distortion.

Tandon, Ravi; Poor, H Vincent

2011-01-01T23:59:59.000Z

183

Analyzing Facebook privacy settings: User expectations vs. reality  

E-Print Network (OSTI)

The sharing of personal data has emerged as a popular activity over online social networking sites like Facebook. As a result, the issue of online social network privacy has received significant attention in both the research literature and the mainstream media. Our overarching goal is to improve defaults and provide better tools for managing privacy, but we are limited by the fact that the full extent of the privacy problem remains unknown; there is little quantification of the incidence of incorrect privacy settings or the difficulty users face when managing their privacy. In this paper, we focus on measuring the disparity between the desired and actual privacy settings, quantifying the magnitude of the problem of managing privacy. We deploy a survey, implemented as a Facebook application, to 200 Facebook users recruited via Amazon Mechanical Turk. We find that 36 % of content remains shared with the default privacy settings. We also find that, overall, privacy settings match users ’ expectations only 37 % of the time, and when incorrect, almost always expose content to more users than expected. Finally, we explore how our results have potential to assist users in selecting appropriate privacy settings by examining the user-created friend lists. We find that these have significant correlation with the social network, suggesting that information from the social network may be helpful in implementing new tools for managing privacy.

Yabing Liu; Balachander Krishnamurthy; Krishna P. Gummadi

2011-01-01T23:59:59.000Z

184

PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

'" '" " * .1 * PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS HANDLING SYSTEM: FREEDOM OF INFORMAnON ACT/ PRIVACY ACT PIA Template Version - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/02061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Oeparbn~ntal Element" Site June 4, 2009 Office of Legacy Management, Morgantown, WV Name of Information System or IT Project LM Records Handling System (LMRHS01) - Freedom of Information Act/Privacy

185

Friends Only: Examining a Privacy-Enhancing Behavior in Facebook  

E-Print Network (OSTI)

Privacy practices in social network sites often appear paradoxical, as content-sharing behavior stands in conflict with the need to reduce disclosure-related harms. In this study we explore privacy in social network sites as a contextual information practice, managed by a process of boundary regulation. Drawing on a sample survey of undergraduate Facebook users, we examine a particular privacy-enhancing practice: having a friends-only Facebook profile. Particularly, we look at the association between network composition, expectancy violations, interpersonal privacy practices and having a friends-only profile. We find that expectancy violations by weak ties and increased levels of interpersonal privacy management are positively associated with having a friends-only profile. We conclude with a discussion of how these findings may be integrated into the design of systems to facilitate interaction while enhancing individual privacy. Author Keywords Social network sites, social networking, Facebook, privacy,

Fred Stutzman; Jacob Kramer-duffield

2010-01-01T23:59:59.000Z

186

Web services roadmap: The Semantic Web perspective  

E-Print Network (OSTI)

Recently the field of Web services has gained focus both in industry and academia. While industry has been mostly interested in standardisation and promotion of the technology, academia has been looking for ways to fit the technology into other frameworks, such as the Semantic Web. Anyway, despite of the increased academic and commercial interest to Web services, there are currently only few case studies available about Web services in the Semantic Web context. Moreover, according to authors ’ knowledge, there is no publicly available study analysing which data is currently mostly provided/required by Web services. In this paper we target these shortcomings by providing a case study of semantically annotated commercial and governmental Web services. We analyse interaction and potential synergy between commercial and governmental Web services. Also the role ontologies for semantic integration of Web services is analysed. Moreover, we identify the most common data exploited by current Web services. 1

Peep Küngas

2006-01-01T23:59:59.000Z

187

PHEmail: designing a privacy honoring email system  

Science Conference Proceedings (OSTI)

Controlling one's personal and private information could help alleviate one of the greatest harms facing the Internet today - the loss of attention due to the over abundance of unsolicited email (spam). If one could control the dissemination and usage ... Keywords: design, email application, privacy, social network, spam

David Nguyen; Khai Truong

2003-04-01T23:59:59.000Z

188

Privacy, Technology, and Aging: A Proposed Framework  

E-Print Network (OSTI)

the development, adoption, and use of home-based ubiquitous technologies for older adults. We began with a five, adoption, and use of home-based ubiquitous technologies are highly contextual, individualized and aging can inform the development of a privacy framework for home-based technologies that can contribute

Camp, L. Jean

189

Using Dataplot with the Web  

Science Conference Proceedings (OSTI)

Using DATAPLOT with the Web. Web Applications Increasingly ... this. 1. Generating Dataplot Output for Web Applications. Output Can ...

2013-11-01T23:59:59.000Z

190

Characterizing Web Document Change  

Science Conference Proceedings (OSTI)

The World Wide Web is growing and changing at an astonishing rate. For the information in the web to be useful, web information systems such as search engines have to keep up with the growth and change of the web. In this paper we study how web documents ...

Lipyeow Lim; Min Wang; Sriram Padmanabhan; Jeffrey Scott Vitter; Ramesh C. Agarwal

2001-07-01T23:59:59.000Z

191

Web Site Metadata  

E-Print Network (OSTI)

International World Wide Web Conference, pages 1123–1124,Erik Wilde. Site Metadata on the Web. In Proceedings of theUCB ISchool Report 2009-028 Web Site Metadata [4] David R.

Wilde, Erik; Roy, Anuradha

2009-01-01T23:59:59.000Z

192

Verifying Interactive Web Programs  

Science Conference Proceedings (OSTI)

Web programs are important, increasingly representing the primary public interfaces of commercial organizations. Unfortunately, Web programs also exhibit numerous flaws. In addition to the usual correctness problems faced by software, Web programs must ...

Daniel R. Licata; Shriram Krishnamurthi

2004-09-01T23:59:59.000Z

193

Toward the Intelligent Web Systems  

Science Conference Proceedings (OSTI)

The grand vision of Tim Barners-Lee, director of the World Wide Web Consortium (W3C) founded in 1994, of changing the non-semantic Web (Web 1.0, Web 2.0) to semantic Web (Web 3.0) will connect all the web sites and will make their systems interoperable. ... Keywords: Semantic Web, Web 2.0, Web 3.0, Intelligent Web Systems

Radha Guha

2009-07-01T23:59:59.000Z

194

Privacy-friendly Energy-metering via Homomorphic Encryption  

E-Print Network (OSTI)

revealed is minimal. There is one issue though, for leakage or fraud detection and smart-grid optimizationPrivacy for the Smart Grid: Embedding Privacy into the Design of Electricity Conservation, 17 Nov 2009. www.ipc.on.ca/images/Resources/pbd-smartpriv-smartgrid Standards, 1 Dec 2009. http://epic.org/privacy/ smartgrid/EPIC_Smart_Grid-Cybersecurity_12-01-09.2.pdf. [Har

Jacobs, Bart

195

NBP RFI: Data Access, Third Party Use and Privacy- Comments of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Access, Third Party Use and Privacy- Comments of Utilities Telecom Council NBP RFI: Data Access, Third Party Use and Privacy- Comments of Utilities Telecom Council The Utilities...

196

NBP RFI: Data Access, Third Party Use and Privacy- Comments of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Third Party Use and Privacy- Comments of Baltimore Gas & Electric Company NBP RFI: Data Access, Third Party Use and Privacy- Comments of Baltimore Gas & Electric Company...

197

Best Practices: Elements of a Federal Privacy Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and information systems. 42 The SAOPCPO plays a key role, in conjunction with the CIO, CISO, the Chief Security Officer, and other officials having privacy related...

198

PRIVACY IMPACT ASSESSMENT: SPRO Physical Security Major Application  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Assessments, for requirements and additional gUidance for conducting a PIA: http:www.directives.doe.govpdfsdoedoetexUneword206o2061.pdf MODULE I - PRIVACY NEEDS...

199

Security and Privacy Controls for Federal Information Systems ...  

Science Conference Proceedings (OSTI)

Page 1. NIST Special Publication 800-53 Revision 4 Security and Privacy Controls for Federal Information Systems and Organizations Appendix F ...

2013-05-09T23:59:59.000Z

200

Security and Privacy Controls for Federal Information Systems  

Science Conference Proceedings (OSTI)

NIST Special Publication 800-53. Revision 4. Security and Privacy Controls for Federal Information Systems. and Organizations. JOINT TASK FORCE ...

2013-06-18T23:59:59.000Z

Note: This page contains sample records for the topic "web policies privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Privacy Act (PA) of 1974 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

unwarranted invasions of their privacy stemming from federal agencies' collection, maintenance, use, and disclosure of personal information about them. Therefore, unlike the...

202

Privacy Act Links to Relates Sites | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Proposed Rules, and Notices of Federal agencies and organizations, as well as Executive Orders and other Presidential Documents. The Privacy Act Issuances Compilation contains...

203

Enhancing Privacy in Participatory Sensing Applications with Multidimensional Data  

Science Conference Proceedings (OSTI)

Participatory sensing applications rely on individuals to share personal data to produce aggregated models and knowledge. In this setting, privacy concerns can discourage widespread adoption of new applications. We present a privacy-preserving participatory sensing scheme based on negative surveys for both continuous and multivariate categorical data. Without relying on encryption, our algorithms enhance the privacy of sensed data in an energy and computation efficient manner. Simulations and implementation on Android smart phones illustrate how multidimensional data can be aggregated in a useful and privacy-enhancing manner.

Forrest, Stephanie [University of New Mexico, Albuquerque; He, Wenbo [University of Nebraska, Lincoln; Groat, Michael [University of New Mexico, Albuquerque; Edwards, Benjamin [University of New Mexico, Albuquerque; Horey, James L [ORNL

2013-01-01T23:59:59.000Z

204

U.S. DEPARTMENT OF ENERGY PRIVACY ACT INFORMATION REQUEST  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PRIVACY ACT INFORMATION REQUEST PRIVACY ACT INFORMATION REQUEST (NOTE: Use of this form is recommended, but is not mandatory) To request Information or Action under the Act, complete appropriate Items in Part I. and establish identity in accordance with instructions on Reverse Side. Retain copy; submit original to the appropriate Privacy Act Officer at the U.S. Department of Energy Headquarters or Field location. . Fax PA Form to 202-586-8151 Attention: Privacy Act Office. NOTE: Records will be provided in CD format unless otherwise stated. Part II is For Agency Use Only. FALSE STATEMENTS SUBJECT TO CRIMINAL PENALTIES. PLEASE SEE REVERSE SIDE. (Please Print) PART I - REQUESTER (Please Print)

205

Land Validation web site  

NLE Websites -- All DOE Office Websites (Extended Search)

web site A web site is now available for the Land Validation project. It was created with the purpose of facilitating communication among MODIS Land Validation Principal...

206

SSRL Web Requests  

NLE Websites -- All DOE Office Websites (Extended Search)

pagesite Change Fix existing form or application Develop new form or application Web-ImagesGraphics Web-Flash Webserver bug - error report Login Help Details of your...

207

Information Solutions: Web Development  

NLE Websites -- All DOE Office Websites (Extended Search)

Web Development IS provides management, maintenance, and development of APS Internet and Intranet web pages. Contact Webmaster Configuring Dreamweaver: Windows | Mac Improving...

208

tms web events home  

Science Conference Proceedings (OSTI)

TMS Web events make authoritative research, technical applications and novel solutions available to you without leaving your home or office. The following Web

209

Web Browser Interface (WBUI)  

NLE Websites -- All DOE Office Websites (Extended Search)

ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) Documentation User Manual Web Browser Interface (WBUI) Web Service Interface (API) FAQ Design Specifications...

210

ORISE: Web Development  

NLE Websites -- All DOE Office Websites (Extended Search)

Web Development As computer-based applications become increasingly popular for the delivery of health care training and information, the need for Web development in support of...

211

Climate VISION: Security and Privacy Notices  

Office of Scientific and Technical Information (OSTI)

SECURITY AND PRIVACY NOTICES SECURITY AND PRIVACY NOTICES Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation is prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of

212

NREL Geothermal Policymakers' Guidebooks Web site (Fact Sheet)  

Science Conference Proceedings (OSTI)

This document highlights the NREL Geothermal Policymakers' Guidebooks Web site, including the five steps to effective geothermal policy development for geothermal electricity generation and geothermal heating and cooling technologies.

Not Available

2010-10-01T23:59:59.000Z

213

SIF: enforcing confidentiality and integrity in web applications  

Science Conference Proceedings (OSTI)

SIF (Servlet Information Flow) is a novel software framework for building high-assurance web applications, using language-based information-flow control to enforce security. Explicit, end-to-end confidentiality and integrity policies can be given either ...

Stephen Chong; K. Vikram; Andrew C. Myers

2007-08-01T23:59:59.000Z

214

Piggy bank: experience the semantic web inside your web browser  

Science Conference Proceedings (OSTI)

The Semantic Web Initiative envisions a Web wherein information is offered free of presentation, allowing more effective exchange and mixing across web sites and across web pages. But without substantial Semantic Web content, few tools will be written ...

David Huynh; Stefano Mazzocchi; David Karger

2005-11-01T23:59:59.000Z

215

Privacy-Preserving Friends Troubleshooting Network  

E-Print Network (OSTI)

Abstract — Content sharing is a popular use of peer-to-peer systems because of their inherent scalability and low cost of maintenance. In this paper, we leverage this nature of peer-topeer systems to tackle a new problem: automatic misconfiguration troubleshooting. In this setting, machine configurations from peers are shared to diagnose misconfigurations on a sick machine. The key challenges are preserving privacy of individual configuration data and ensuring the integrity of peer contributions. To this end, we construct the Friends Troubleshooting Network (FTN), a peer-to-peer overlay network, where the links between peer machines reflect the friendship of their owners. Our FTN manifests recursive trust rather than transitive trust. To achieve privacy, we use the general scheme of a historyless and futureless random-walk for routing, during which search is carried out simultaneously with secure parameter aggregation for the purpose of troubleshooting. Our design has been guided by the characteristics of a real-world friends network, the MSN Instant Messenger (IM) network. We have prototyped our FTN system and analyzed the tradeoff between privacy and protocol efficiency. I.

Qiang Huang; Helen J. Wang; Nikita Borisov

2005-01-01T23:59:59.000Z

216

Web accessible image similarity measurements  

Science Conference Proceedings (OSTI)

Web accessible image similarity measurements. Background: There ... messages). Web Access to Image Similarity Measurements. ...

2013-04-16T23:59:59.000Z

217

PlexC: a policy language for exposure control  

Science Conference Proceedings (OSTI)

With the widespread use of online social networks and mobile devices, it is not uncommon for people to continuously broadcast contextual information such as their current location or activity. These technologies present both new opportunities for social ... Keywords: exposure, policy languages, privacy

Yann G. Le Gall; Adam J. Lee; Apu Kapadia

2012-06-01T23:59:59.000Z

218

OMB Policies | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

OMB Policies OMB Policies OMB Policies Cybersecurity & Privacy OMB M-00-07, Incorporating and Funding Security in Information Systems Investments (02-28-2000) OMB M-02-01, Guidance for Preparing and Submitting Security Plans of Action and Milestones(10-19-2001) OMB M-02-09, Reporting Instructions for the Government Information Security Reform Act and Updated Guidance on Security Plans of Action and Milestones (07-02-2002) (pdf) OMB M-03-04, Determination Orders Organizing the Department of Homeland Security (01-07-2003) OMB M-03-17, Program Assessment Rating Tool (PART) Update (07-16-2003) (pdf) OMB M-03-19, Reporting Instructions for the Federal Information Security Management Act and Updated Guidance on Quarterly IT Security Reporting (08-06-2003) (pdf) OMB M-04-04, E-Authentication Guidance (12-06-2003)

219

A Model for Personalized Web-Scale Case Base Maintenance  

Science Conference Proceedings (OSTI)

The growing use of case-based reasoning (CBR) systems on the Web has brought with it increased awareness of the Web-scale case base maintenance (CBM). While most existing CBM policies and approaches, which were designed for smaller case bases with sizes ...

Jingyu Sun; Xueli Yu; Ruizhi Wang; Ning Zhong

2009-10-01T23:59:59.000Z

220

Personalized Web Services for Web Information Extraction  

E-Print Network (OSTI)

The field of information extraction from the Web emerged with the growth of the Web and the multiplication of online data sources. This paper is an analysis of information extraction methods. It presents a service oriented approach for web information extraction considering both web data management and extraction services. Then we propose an SOA based architecture to enhance flexibility and on-the-fly modification of web extraction services. An implementation of the proposed architecture is proposed on the middleware level of Java Enterprise Edition (JEE) servers.

Jarir, Zahi; Erradi, Mahammed

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "web policies privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Information Security and Privacy Advisory Board (ISPAB) ...  

Science Conference Proceedings (OSTI)

... Enhance user interface with REST design, Migrate database and web ... E-Gov Update Lisa Schlosser, Deputy CIO, Federal Government, OMB ...

2013-03-11T23:59:59.000Z

222

Energy Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Wind turbines Energy Policy Energy policy research at the Lawrence Berkeley National Laboratory covers a wide range of topics from the development of policy strategies to encourage...

223

Security and privacy threats in IoT architectures  

Science Conference Proceedings (OSTI)

In this paper, we describe developments towards the Internet of Things (IoT) and discuss architecture visions for the IoT. Our emphasis is to analyze the known and new threats for the security, privacy and trust (SPT) at different levels of architecture. ... Keywords: IoT architecture, energy consumption, future internet, privacy, security, trust

Denis Kozlov; Jari Veijalainen; Yasir Ali

2012-02-01T23:59:59.000Z

224

Do online social network friends still threaten my privacy?  

Science Conference Proceedings (OSTI)

A user's online social network (OSN) friends commonly share information on their OSN profiles that might also characterize the user him-/herself. Therefore, OSN friends are potentially jeopardizing users' privacy. Previous studies demonstrated that third ... Keywords: attribute prediction, facebook, homophily, online social networks, privacy

Sebastian Labitzke; Florian Werling; Jens Mittag; Hannes Hartenstein

2013-02-01T23:59:59.000Z

225

RFID, privacy and the perception of risk: A strategic framework  

Science Conference Proceedings (OSTI)

Against the background of the first RFID-Rollouts by large retailers in North America and Europe, this paper concerns itself with the perception of RFID technology as a risk to privacy. The objective of our contribution is to identify, at a relatively ... Keywords: Privacy, RFID, Risk perception, Technology acceptance

Frédéric Thiesse

2007-06-01T23:59:59.000Z

226

Class-Restricted Clustering and Microperturbation for Data Privacy  

Science Conference Proceedings (OSTI)

The extensive use of information technologies by organizations to collect and share personal data has raised strong privacy concerns. To respond to the public's demand for data privacy, a class of clustering-based data masking techniques is increasingly ... Keywords: confidentiality, data perturbation, information theory, microaggregation, minimum spanning tree

Xiao-Bai Li, Sumit Sarkar

2013-04-01T23:59:59.000Z

227

Privacy-friendly energy-metering via homomorphic encryption  

Science Conference Proceedings (OSTI)

The first part of this paper discusses developments wrt. smart (electricity) meters (simply called E-meters) in general, with emphasis on security and privacy issues. The second part will be more technical and describes protocols for secure communication ... Keywords: homomorphic encryption, privacy, smart-metering

Flavio D. Garcia; Bart Jacobs

2010-09-01T23:59:59.000Z

228

A_2-web immanants  

E-Print Network (OSTI)

We describe the rank 3 Temperley-Lieb-Martin algebras in terms of Kuperberg's A_2-webs. We define consistent labelings of webs, and use them to describe the coefficients of decompositions into irreducible webs. We introduce web immanants, inspired by Temperley-Lieb immanants of Rhoades and Skandera. We show that web immanants are positive when evaluated on totally positive matrices, and describe some further properties.

Pylyavskyy, Pavlo

2007-01-01T23:59:59.000Z

229

Looking at both the present and the past to efficiently update replicas of web content  

Science Conference Proceedings (OSTI)

Since Web sites are autonomous and independently updated, applications that keep replicas of Web data, such as Web warehouses and search engines, must periodically poll the sites and check for changes.Since this is a resource-intensive task, in order ... Keywords: indexing update, machine learning, update policy

Luciano Barbosa; Ana Carolina Salgado; Francisco de Carvalho; Jacques Robin; Juliana Freire

2005-11-01T23:59:59.000Z

230

Web Migration The Web What needs to be fixed?  

E-Print Network (OSTI)

Web Update Web Migration #12;2 The Web ­ What needs to be fixed? · Lack of governance · Lack of clear roles and responsibilities for Web team · Multiple people working with the Web across the site-term Web Task Force to get lab input on above #12;3 Where Do We Stand? · Creation of Web Task Force

Wechsler, Risa H.

231

PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

-. -. ., ,-- -.' * PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS HANDLING SYSTEM: ELECTRONIC RECORDS KEEPING SYSTEM PIA Template Version - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1. Department of Energy Privacy Program, Appendix A. Privacy Impact Assessments. for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetext/neword/206/02061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Deparbnental Element & Site . June 4, 2009 Office of Legacy Management, Morgantown, WV :;:~:f~~r~;;:reC: LM Records Handling System (LMRHS01) - Electronic Records Keeping System exhibit Project UID 019-10-01-31-02-1014-00

232

Privacy Act | U.S. DOE Office of Science (SC)  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy Act Privacy Act Integrated Support Center (ISC) ISC Home About Services Freedom of Information Act (FOIA) Privacy Act Compilation of Systems of Records Energy Employees Occupational Illness Compensation Program Act (EEOICPA) How to Submit a Privacy Act Request Reference Links Categorical Exclusion Determinations Contact Information Integrated Support Center Roxanne Purucker U.S. Department of Energy 9800 S. Cass Avenue Argonne, IL 60439 P: (630) 252-2110 Larry Kelly U.S. Department of Energy 200 Administration Road Oak Ridge, TN 37830 P: (865) 576-0885 Privacy Act Print Text Size: A A A RSS Feeds FeedbackShare Page General Disclaimer This system is made available by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of

233

PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

* PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS HANDLING SYSTEM ROCKY FLATS ENVIRONMENTAL RECORDS DATABASE PIA Template Version - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element & Site June 4,2009 Office of Legacy Management, Morgantown, WV Name of Information LM Records Handling System (LMRHS01) - Rocky Flats Environmental Records System or IT Project Database exhibit Project UID 019-10-01-31-02-1014-00

234

Department of Energy Adopts Rules to Protect Consumer Privacy | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Department of Energy Adopts Rules to Protect Consumer Privacy Department of Energy Adopts Rules to Protect Consumer Privacy Department of Energy Adopts Rules to Protect Consumer Privacy March 15, 2010 - 4:17pm Addthis The Weatherization Assistance Program (WAP) enables states to provide financial assistance to qualifying consumers who want to improve the energy-efficiency of their homes. In response to concerns about the potential disclosure by the States of personal information they collect from WAP applicants, the Department has issued an interim final rule that requires states to apply the standards of the Freedom of Information Act that protect the privacy of potentially sensitive personal information. These protections will ensure a consistent and balanced approach towards the twin goals of consumer privacy and government transparency. The entire

235

PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

,. - -i * PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS HANDLING SYSTEM: FERNALD HISTORICAL RECORDS SYSTEM PIA Template Version - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/02061.pdf Please complete electronically: no hand-written slibmisslons will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element & SIte· June 4, 2009 Office of Legacy Management, Morgantown, WV Name of Information System or IT Project LM Records Handling System (LMRHS01) - Fernald Historical Records System exhIbit Project UIO 019-10-01-31-02-1014-00

236

Cyberspace Policy Review: Assuring a Trusted and Resilient Information and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyberspace Policy Review: Assuring a Trusted and Resilient Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure The review team of government cybersecurity experts engaged and received input from a broad cross-section of industry, academia, the civil liberties and privacy communities, State governments, international partners, and the Legislative and Executive Branches. This paper summarizes the review team's conclusions and outlines the beginning of the way forward towards a reliable, resilient, trustworthy digital infrastructure for the future Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure More Documents & Publications

237

Judicial support systems: ideas for a privacy ontology-based case analyzer  

Science Conference Proceedings (OSTI)

Nowadays, ontology is applied as an integral part of many applications in several domains, especially in the world of law. The ontology based judicial support system is believed as a useful tool to support, for example, the legal argumentation assistant ... Keywords: privacy directives, privacy ontology, privacy ontology structure, privacy principles, woolf reforms

Yan Tang; Robert Meersman

2005-10-01T23:59:59.000Z

238

A PLA-based privacy-enhancing user modeling framework and its evaluation  

Science Conference Proceedings (OSTI)

Reconciling personalization with privacy has been a continuing interest in user modeling research. This aim has computational, legal and behavioral/attitudinal ramifications. We present a dynamic privacy-enhancing user modeling framework that supports ... Keywords: Compliance, Disclosure behavior, Performance evaluation, Privacy laws, Privacy preferences, Product line architecture, User experiment, User modeling

Yang Wang; Alfred Kobsa

2013-03-01T23:59:59.000Z

239

Semantic Web-Based Management of Routing Configurations  

Science Conference Proceedings (OSTI)

Today, network operators typically reason about network behaviour by observing the effects of a particular configuration in operation. This configuration process typically involves logging configuration changes and rolling back to a previous version ... Keywords: BGP, Conflict detection, Network management, Policy languages, Routing policy, Semantic web

Félix J. García Clemente; Jose M. Alcaraz Calero; Jorge Bernal Bernabé; Juan Manuel Marín Pérez; Gregorio Martínez Pérez; Antonio F. Gómez Skarmeta

2011-06-01T23:59:59.000Z

240

web identity standards introduction .............................................................................................................87  

E-Print Network (OSTI)

web identity standards sectionten 86 contents introduction............................................................................................................... 89-90 tagline and the web .................................................................................................91 tagline and the web: improper use

Mullins, Dyche

Note: This page contains sample records for the topic "web policies privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

ORISE: Web Development  

NLE Websites -- All DOE Office Websites (Extended Search)

Web Development Web Development As computer-based applications become increasingly popular for the delivery of health care training and information, the need for Web development in support of these tools continues to grow. The Oak Ridge Institute for Science and Education (ORISE) provides Web development capabilities to government agencies and organizations interested in converting training and education programs based on traditional means of communication into a variety of tools that suit the technology skills of today's health care providers and patients. ORISE develops Web-based training and informational products that expand the reach of targeted health messages to key audiences. Our specific capabilities include: Web applications development User experience testing

242

Web Mining for Web Personalization1 Magdalini Eirinaki, Michalis Vazirgiannis  

E-Print Network (OSTI)

Trends was one of the first suppliers of inexpensive and popular Web analysers, with its WebTrends Log Analyzer

Eirinaki, Magdalini

243

Web services @ MIT  

E-Print Network (OSTI)

There are several useful web services developed at MIT by students, faculty and researchers. However, they are scattered all over MIT. Most people at MIT are unaware of the availability of these web services and hence they ...

Tyagi, Sapna DevendraSingh, 1978-

2004-01-01T23:59:59.000Z

244

Redesigned Web Sites  

NLE Websites -- All DOE Office Websites (Extended Search)

Redesigned Web Sites In an ongoing effort to improve services to our customers, the ORNL DAAC is pleased to announce that it has released a major revision to its Web site. The new...

245

Grammatical framework web service  

Science Conference Proceedings (OSTI)

We present a web service for natural language parsing, prediction, generation, and translation using grammars in Portable Grammar Format (PGF), the target format of the Grammatical Framework (GF) grammar compiler. The web service implementation is open ...

Björn Bringert; Krasimir Angelov; Aarne Ranta

2009-04-01T23:59:59.000Z

246

The Center's Web Works  

NLE Websites -- All DOE Office Websites (Extended Search)

how much they can save by applying specific energy-efficiency measures. This web-based tool also directs users to related Web sites with supporting information, such as product...

247

Piggy Bank: Experience the Semantic Web inside your web browser  

Science Conference Proceedings (OSTI)

The Semantic Web Initiative envisions a Web wherein information is offered free of presentation, allowing more effective exchange and mixing across web sites and across web pages. But without substantial Semantic Web content, few tools will be written ... Keywords: Annotation, Browsing, Collaboration, Screen scraping, Semantic Web, Sharing, Tagging

David Huynh; Stefano Mazzocchi; David Karger

2007-03-01T23:59:59.000Z

248

Web-Style Multimedia Annotations  

E-Print Network (OSTI)

the Semantic Web. World Wide Web Consortium, Working Draft20] Erik Wilde. Declarative Web 2.0. In Weide Chang andUCB iSchool Report 2007-014 Web-Style Multimedia Annotations

Shaw, Ryan; Wilde, Erik

2007-01-01T23:59:59.000Z

249

ORNL DAAC WebGIS  

NLE Websites -- All DOE Office Websites (Extended Search)

WebGIS Overview WebGIS is an Internet based technology that enables users to browse, query, and display spatial data using a standard web browser. The ORNL DAAC WebGIS is based...

250

Indiana Web Sites  

U.S. Energy Information Administration (EIA)

Indiana Web Sites Other Links : Indiana Electricity Profile: Indiana Energy Profile: Indiana Restructuring: Last Updated: April 2007 . Sites: Links ...

251

Florida Web Sites  

U.S. Energy Information Administration (EIA)

Florida Web Sites Other Links : Florida Electricity Profile: Florida Energy Profile: Florida Restructuring: Last Updated: April 2007 . Sites: Links ...

252

Electronic Materials: Web resources  

Science Conference Proceedings (OSTI)

Jan 11, 2008 ... WEB: NETWORKS MATEC, Maricopa Community Colleges. NSF resource center focused on semiconductor and electronics education, 0, 811 ...

253

MIDC: Web Site Search  

NLE Websites -- All DOE Office Websites (Extended Search)

MIDC Web Site Search Enter words or phrases: Search Clear Help Also see the site directory. NREL MIDC...

254

Web Resources - TMS  

Science Conference Proceedings (OSTI)

New Messages, Rating, WEB RESOURCE: Research on Nuclear Wastes French Atomic Energy Commission. Strategies for radioactive waste management, 0 ...

255

Bias on the web  

Science Conference Proceedings (OSTI)

When it comes to measuring bias on the Web, there is clearly strength in numbers (of search engines, that is).

Abbe Mowshowitz; Akira Kawaguchi

2002-09-01T23:59:59.000Z

256

Diversity Policies; Diversity Office  

NLE Websites -- All DOE Office Websites (Extended Search)

Policies: Brookhaven National Laboratory Diversity Policies: Brookhaven Equal Employment Opportunity (EEO) Policy Brookhaven Sexual Harassment Policy Brookhaven Veterans Policy...

257

Web search clickstreams  

Science Conference Proceedings (OSTI)

Search engines are a vital part of the Web and thus the Internet infrastructure. Therefore understanding the behavior of users searching the Web gives insights into trends, and enables enhancements of future search capabilities. Possible data sources ... Keywords: HTTP traces, clickstream, markov model, web search

Nils Kammenhuber; Julia Luxenburger; Anja Feldmann; Gerhard Weikum

2006-10-01T23:59:59.000Z

258

How to Submit a Privacy Act Request | U.S. DOE Office of Science (SC)  

NLE Websites -- All DOE Office Websites (Extended Search)

How to Submit a Privacy Act Request How to Submit a Privacy Act Request Integrated Support Center (ISC) ISC Home About Services Freedom of Information Act (FOIA) Privacy Act Compilation of Systems of Records Energy Employees Occupational Illness Compensation Program Act (EEOICPA) How to Submit a Privacy Act Request Privacy Act Request Form .pdf file (99KB) Reference Links Categorical Exclusion Determinations Contact Information Integrated Support Center Roxanne Purucker U.S. Department of Energy 9800 S. Cass Avenue Argonne, IL 60439 P: (630) 252-2110 Larry Kelly U.S. Department of Energy 200 Administration Road Oak Ridge, TN 37830 P: (865) 576-0885 Privacy Act How to Submit a Privacy Act Request Print Text Size: A A A RSS Feeds FeedbackShare Page Related Links Privacy Act Request Form .pdf file (99KB) You may request your own Privacy Act records by submitting a request in

259

Weatherization Assistance for Low-Income Persons: Maintaining the Privacy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Weatherization Assistance for Low-Income Persons: Maintaining the Weatherization Assistance for Low-Income Persons: Maintaining the Privacy of Applicants for and Recipients of Services Weatherization Assistance for Low-Income Persons: Maintaining the Privacy of Applicants for and Recipients of Services Amending regulations to require all States and other service providers that participate in the Weatherization Assistance Program (WAP) to treat all requests for information concerning applicants and recipients of WAP funds in a manner consistent with the Federal government's treatment of information requested under the Freedom of Information Act (FOIA), 5 U.S.C. 552, including the privacy protections contained in Exemption (b)(6) of the FOIA, 5 U.S.C. 552(b)(6). Weatherization Assistance for Low-Income Persons: Maintaining the Privacy

260

PRIVACY IMPACT ASSESSMENT: IDAHO NATIONAL LABORATORY-TRAIN PIA  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IDAHO IDAHO NATIONAL LABORATORY-TRAIN PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetext/neword/206/02061.pdf Please complete electronically: no hand-wrltten submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element &Site June 11, 2009 Idaho National Laboratory Name of Infonnatlon SY8tem or IT Project Training Records and Information Network (TRAIN) Exhibit Project UID 70 NewPIA [!J Update D N T Otl I Contact Information ame, I e Ph E " I one, mal SY8tem Owner Carla J. Drake, Manager (208) 526-0841 Systems Approach

Note: This page contains sample records for the topic "web policies privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

PRIVACY IMPACT ASSESSMENT: Shaw Areva MOX Services, LLC MOX  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

. . ,-) ')7 73?Â¥i5": )~"'f"YC-:;'~dt?f(~"'f9'FrrZ , . PRIVACY IMPACT ASSESSMENT: Shaw Areva MOX Services, LLC MOX Services Unclassified Information System Template - January 30, 2009, Version 2 Department of Energy Privacy Impact Assessment (pIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: hltp:llwww.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. (803) 819-22700 Dstlnson@moxprolect.com Dave Stinson, President and Chief Executive Officer, Shaw AREVA MOX Services, LLC NNSA Shaw AREVA MOX Services Savannah River Site, Aiken SC .. .. . ": .' . ' .... .- ...: ......

262

PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OFFICE OFFICE OF LEGACY MANAGEMENT: RECORDS HANDLING SYSTEM: ENERGY EMPLOYEES OCCUPATIONAL ILLNESS COMPENSATION PROGRAM ACT PIA Template Version - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance Is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/02061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE I - PRIVACY NEEDS ASSESSMENT Date Departmental Element &Site June 4, 2009 Office of Legacy Management, Morgantown, WV Name of Information LM Records Handling System (LMRHS01) - Energy Employees Occupational Illness System or IT Project Compensation Program Act exhibit

263

Privacy Act Fees and Time Limits | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Fees and Time Limits | National Nuclear Security Administration Fees and Time Limits | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Privacy Act Fees and Time Limits Home > About Us > Our Operations > NNSA Office of General Counsel > Privacy Act (PA) of 1974 > Privacy Act Fees and Time Limits Privacy Act Fees and Time Limits The Act provides agencies to assess fees only for the cost of reproducing

264

PRIVACY IMPACT ASSESSMENT: INL Education Programs PIA Template  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Education Education Programs PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE I - PRIVACY NEEDS ASSESSMENT Date Departmental Elernent'& (Site 24/Jun/09 Idaho National Laboratory Information Operations and Research Center (IORC) Nameofll,f..,rrnatlon INL Education Programs System or IfPi'()ject Business Enclave Exhibit Proj.ctlUO NA NewPIA D Update [~] DOE PIA - INL Education Program Finallxw.doc N T "tl I Contact Information arne,

265

Privacy Act (PA) of 1974 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

(PA) of 1974 | National Nuclear Security Administration (PA) of 1974 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Privacy Act (PA) of 1974 Home > About Us > Our Operations > NNSA Office of General Counsel > Privacy Act (PA) of 1974 Privacy Act (PA) of 1974 The purpose of the Privacy Act of 1974 (Act), Title 5, United States Code,

266

Freedom of Information Act/Privacy Act Requests | National Nuclear...  

National Nuclear Security Administration (NNSA)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Freedom of Information ActPrivacy Act Requests Home > About Us > Our Operations > NNSA Office of General...

267

Imagined communities: awareness, information sharing, and privacy on the facebook  

Science Conference Proceedings (OSTI)

Online social networks such as Friendster, MySpace, or the Facebook have experienced exponential growth in membership in recent years. These networks offer attractive means for interaction and communication, but also raise privacy and security concerns. ...

Alessandro Acquisti; Ralph Gross

2006-06-01T23:59:59.000Z

268

Privacy-preserving anonymization of set-valued data  

Science Conference Proceedings (OSTI)

In this paper we study the problem of protecting privacy in the publication of set-valued data. Consider a collection of transactional data that contains detailed information about items bought together by individuals. Even after removing all personal ...

Manolis Terrovitis; Nikos Mamoulis; Panos Kalnis

2008-08-01T23:59:59.000Z

269

A privacy-preserving index for range queries  

Science Conference Proceedings (OSTI)

Database outsourcing is an emerging data management paradigm which has the potential to transform the IT operations of corporations. In this paper we address privacy threats in database outsourcing scenarios where trust in the service provider is limited. ...

Bijit Hore; Sharad Mehrotra; Gene Tsudik

2004-08-01T23:59:59.000Z

270

Bunker: a privacy-oriented platform for network tracing  

Science Conference Proceedings (OSTI)

ISPs are increasingly reluctant to collect and store raw network traces because they can be used to compromise their customers' privacy. Anonymization techniques mitigate this concern by protecting sensitive information. Trace anonymization can be performed ...

Andrew G. Miklas; Stefan Saroiu; Alec Wolman; Angela Demke Brown

2009-04-01T23:59:59.000Z

271

Proceedings of the Sixth Symposium on Usable Privacy and Security  

Science Conference Proceedings (OSTI)

Welcome to the Sixth Symposium On Usable Privacy and Security! This year's program features 16 technical papers, two workshops, 17 posters, 11 posters published in the past year at other conferences, a panel, five discussion sessions, and an invited ...

Lorrie Faith Cranor

2010-07-01T23:59:59.000Z

272

Flybynight: mitigating the privacy risks of social networking  

E-Print Network (OSTI)

Social networking websites are enormously popular, but they present a number of privacy risks to their users, one of the foremost of which being that social network service providers are able to observe and accumulate the information that users transmit through the network. We aim to mitigate this risk by presenting a new architecture for protecting information published through the social networking website, Facebook, through encryption. Our architecture makes a trade-off between security and usability in the interests of minimally affecting users ' workflow and maintaining universal accessibility. While active attacks by Facebook could compromise users ' privacy, our architecture dramatically raises the cost of such potential compromises and, importantly, places them within a framework for legal privacy protection because they would violate a user?s reasonable expectation of privacy. We have built a prototype Facebook application implementing our architecture, addressing some of the limitations of the Facebook platform through proxy cryptography.

Matthew M. Lucas; Nikita Borisov

2008-01-01T23:59:59.000Z

273

PRIVACY IMPACT ASSESSMENT: INL PERSONNEL SECURITY SECIMS PIA  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PERSONNEL PERSONNEL SECURITY - SECIMS PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element;& Site Name of Infonnatlon Syetemor Ilf Project Exhibit ProJect UIO NewPIA D Update ~ June 11, 2009 Idaho National Laboratory Willow Creek Building RIOT-Center INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE 311 DOE PIA - SECIMS Finallxw.doc N T 'tl I Contact Information arne I e . , Phone, Email

274

Drying of fiber webs  

DOE Patents (OSTI)

A process and an apparatus for high-intensity drying of fiber webs or sheets, such as newsprint, printing and writing papers, packaging paper, and paperboard or linerboard, as they are formed on a paper machine. The invention uses direct contact between the wet fiber web or sheet and various molten heat transfer fluids, such as liquified eutectic metal alloys, to impart heat at high rates over prolonged durations, in order to achieve ambient boiling of moisture contained within the web. The molten fluid contact process causes steam vapor to emanate from the web surface, without dilution by ambient air; and it is differentiated from the evaporative drying techniques of the prior industrial art, which depend on the uses of steam-heated cylinders to supply heat to the paper web surface, and ambient air to carry away moisture, which is evaporated from the web surface. Contact between the wet fiber web and the molten fluid can be accomplished either by submersing the web within a molten bath or by coating the surface of the web with the molten media. Because of the high interfacial surface tension between the molten media and the cellulose fiber comprising the paper web, the molten media does not appreciately stick to the paper after it is dried. Steam generated from the paper web is collected and condensed without dilution by ambient air to allow heat recovery at significantly higher temperature levels than attainable in evaporative dryers.

Warren, David W. (9253 Glenoaks Blvd., Sun Valley, CA 91352)

1997-01-01T23:59:59.000Z

275

Drying of fiber webs  

DOE Patents (OSTI)

A process and an apparatus are disclosed for high-intensity drying of fiber webs or sheets, such as newsprint, printing and writing papers, packaging paper, and paperboard or linerboard, as they are formed on a paper machine. The invention uses direct contact between the wet fiber web or sheet and various molten heat transfer fluids, such as liquefied eutectic metal alloys, to impart heat at high rates over prolonged durations, in order to achieve ambient boiling of moisture contained within the web. The molten fluid contact process causes steam vapor to emanate from the web surface, without dilution by ambient air; and it is differentiated from the evaporative drying techniques of the prior industrial art, which depend on the uses of steam-heated cylinders to supply heat to the paper web surface, and ambient air to carry away moisture, which is evaporated from the web surface. Contact between the wet fiber web and the molten fluid can be accomplished either by submersing the web within a molten bath or by coating the surface of the web with the molten media. Because of the high interfacial surface tension between the molten media and the cellulose fiber comprising the paper web, the molten media does not appreciatively stick to the paper after it is dried. Steam generated from the paper web is collected and condensed without dilution by ambient air to allow heat recovery at significantly higher temperature levels than attainable in evaporative dryers. 6 figs.

Warren, D.W.

1997-04-15T23:59:59.000Z

276

Cyber Security and Privacy Landscape of the Electric Sector  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2012-12-20T23:59:59.000Z

277

Cyber Security and Privacy Landscape of the Electric Sector  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2012-10-01T23:59:59.000Z

278

Privacy Preservation Technologies in Internet of Things  

E-Print Network (OSTI)

Since the beginning of the Internet thirty years ago, we have witnessed a number of changes in the application of communication technologies. Today, the Internet can be described to a large extent as a ubiquitous infrastructure that is always accessible. After the era of connecting places and connecting people, the Internet of the future will also connect things. The idea behind the resulting Internet of Things is to seamlessly gather and use information about objects of the real world during their entire lifecycle. In this paper, we consider different approaches to technological protection of user data privacy in the world of Internet of Things. In particular,we consider what kind of security problems are being faced and what level of protection can be provided by applying approaches based on secure multi-party computations.

Sen, Jaydip

2010-01-01T23:59:59.000Z

279

Information Security and Privacy Advisory Board (ISPAB) ...  

Science Conference Proceedings (OSTI)

... of Michigan Gregorg Garcia, Garcia Cyber Partners Brian ... explained how the transformation is executed - DoD is transforming IA policies ...

2013-03-08T23:59:59.000Z

280

Privacy - Information Protection Task Force - Charter | Department...  

NLE Websites -- All DOE Office Websites (Extended Search)

Policy Framework for a 21st Century Grid: Enabling our Secure Energy Future (July 12, 2011) Information Security: Coordination of Federal Cyber Security Research and Development...

Note: This page contains sample records for the topic "web policies privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Enhancing Privacy in Participatory Sensing Applications with Multidimensional Data  

SciTech Connect

Participatory sensing applications rely on individuals to share local and personal data with others to produce aggregated models and knowledge. In this setting, privacy is an important consideration, and lack of privacy could discourage widespread adoption of many exciting applications. We present a privacy-preserving participatory sensing scheme for multidimensional data which uses negative surveys. Multidimensional data, such as vectors of attributes that include location and environment fields, pose a particular challenge for privacy protection and are common in participatory sensing applications. When reporting data in a negative survey, an individual participant randomly selects a value from the set complement of the sensed data value, once for each dimension, and returns the negative values to a central collection server. Using algorithms described in this paper, the server can reconstruct the probability density functions of the original distributions of sensed values, without knowing the participants actual data. As a consequence, complicated encryption and key management schemes are avoided, conserving energy. We study trade-offs between accuracy and privacy, and their relationships to the number of dimensions, categories, and participants. We introduce dimensional adjustment, a method that reduces the magnification of error associated with earlier work. Two simulation scenarios illustrate how the approach can protect the privacy of a participant's multidimensional data while allowing useful population information to be aggregated.

Groat, Michael [University of New Mexico, Albuquerque; Forrest, Stephanie [University of New Mexico, Albuquerque; Horey, James L [ORNL; Edwards, Benjamin [University of New Mexico, Albuquerque; He, Wenbo [University of Nebraska, Lincoln

2012-01-01T23:59:59.000Z

282

A rhetorical analysis of the right to privacy  

E-Print Network (OSTI)

Although no guarantee exists in the Constitution to a right to privacy, it is now generally accepted that individuals have a right to be "let alone.'' In this thesis, I will propose an alternative formulation of the right to privacy, using insights gleaned from rhetorical and communication theory. I will bring "outside'' perspectives to the legal problem of privacy. The right to privacy as established in Griswold holds promise as a coherent interpretive model for evaluating the constitutionality of statutes concerning civil liberties. The systematic consideration of Kenneth Burke's writings on constitutions helps to clarify disputes in methods of constitutional interpretation, and helps to defend the right to privacy against texualists and original intent theorists. Expanding the analysis of privacy to its cultural implications, Michel Foucault's concept of "governmentality'' aids in charting the foundations of the power relationships animating contemporary society. New technologies and the Internet threaten to monopolize on the distribution of power in society. Consequently these technologies threaten the fulfillment of the ideal of a liberal political order. The understanding of the shift in the distribution of power within society facilitates recognition of the importance of subtle manifestation of resistance to the totalizing power of these technologies.

Spatz, George Reynolds

1999-01-01T23:59:59.000Z

283

Quality Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Policy110406 Page 1 of 3 EOTA - System Level Document Title: Quality Policy Document Number: Q-002 Rev. 110406 Document Owner: Elizabeth Sousa Backup Owner: Melissa Otero...

284

Microsoft Word - CPARS Web Based Training Modules  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 2010 1 March 2010 1 There are 5 web based training modules for Contractor Performance Assessment Reporting System (CPARS), Architect-Engineer Contract Administration Support Systems (ACASS), and Construction Contractor Appraisal Support System (CCASS). This on-line web based training is an interactive online classroom for the delivery of live training. There is no investment in software required. Web based training classes and the schedule for CPARS, ACASS, and CCASS classes are at http://www.cpars.csd.disa.mil/allapps/cpartrng/webtrain/webtrain_all.htm. The modules are as follows: 1 - ACASS/CCASS Overview (2 hours) (1 Continuous Learning Point) This training will give the student an overview of the policies and regulations governing ACASS/CCASS, the ACASS/CCASS Workflow, and ACASS/CCASS Application

285

Template:Cite web | Open Energy Information  

Open Energy Info (EERE)

Cite web Cite web Jump to: navigation, search This template is for citing online sources for Open Energy Information content. It is an important part of the OpenEI:Verifiability content policy. It should be used with the tag for providing references when creating content on the site. The only parameters that are required are title and url. Paramaters include: title - the title of the online source url - the URL for the source author - the author of the work date - the date of publication work - if the source is part of a larger work such as a periodical, book, or website title and url are required For example: * {{cite web |title=Carbon Offset Kiosks Help Air Travelers Ditch Guilt |url=http://www.npr.org/templates/story/story.php?storyId=113280463 |author=Rori Gallagher

286

Psychological Service Center NOTICE OF PRIVACY PRACTICES  

E-Print Network (OSTI)

: · Treating all of your health information that we collect as confidential. · Stating confidentiality policies provides the insurer the right to contest the claim under the policy Uses and Disclosures with Neither for lawful intelligence, counterintelligence, and other national security activities. We may be required

Almor, Amit

287

Parametric Optimization of Linear and Non-Linear Models via Parallel Computing to Enhance Web-Spatial DSS Interactivity  

Science Conference Proceedings (OSTI)

A web based Spatial Decision Support System web SDSS has been implemented in Thessaly, the most significant arable cropping region in Greece, to evaluate energy crop supply. The web SDSS uses an optimization module to support the decision process launching ... Keywords: Common Agricultural Policy CAP, Farm Model, Parallel Programming, Positive Mathematical Programming PMP, Spatial Decision Support Systems SDSS

D. Kremmydas; A. Petsakos; S. Rozakis

2012-01-01T23:59:59.000Z

288

Semantic Web approach to smart link generation for Web navigations  

Science Conference Proceedings (OSTI)

The rapid development of the Internet has led to diverse applications of accessing various Web resources, such as Web pages, XML documents, pictures and video and audio files. Intelligently discovering how these Web resources are related in order to ... Keywords: OWL, RuleML, Web navigation, XLink, semantic Web

Shang-Juh Kao; I-Ching Hsu

2007-07-01T23:59:59.000Z

289

Selective collision based medium access control protocol for proactive protection of privacy for RFID  

Science Conference Proceedings (OSTI)

RFID is rapidly being deployed because of its versatility. However, the privacy problem cannot be handled effectively because of limited capability of RFID tags. We propose a secure medium access control(MAC) protocol to solve the privacy problem. Our ...

JuSung Park; Jeonil Kang; DaeHun Nyang

2005-12-01T23:59:59.000Z

290

Privacy-preserving data mining through data publishing and knowledge model sharing  

Science Conference Proceedings (OSTI)

For the past decade or so, the needs for organizations to share data for knowledge discovery and data mining have increased significantly. Meanwhile, privacy issues have become widely recognized and motivated the research on privacy-preserving data mining ...

Hongwei Tian / Weining Zhang

2012-01-01T23:59:59.000Z

291

Blur Filtration Fails to Preserve Privacy for Home-Based Video Conferencing  

E-Print Network (OSTI)

Blur Filtration Fails to Preserve Privacy for Home-Based Video Conferencing CARMAN NEUSTAEDTER, S. and Boyle, M. (2006). Blur Filtration Fails to Preserve Privacy for Home-Based Video Conferencing

Greenberg, Saul

292

World Bank Safeguard Policies | Open Energy Information  

Open Energy Info (EERE)

World Bank Safeguard Policies World Bank Safeguard Policies Jump to: navigation, search Tool Summary LAUNCH TOOL Name: World Bank Safeguard Policies Agency/Company /Organization: World Bank Topics: Policies/deployment programs Resource Type: Guide/manual, Training materials, Lessons learned/best practices Website: web.worldbank.org/WBSITE/EXTERNAL/PROJECTS/EXTPOLICIES/EXTSAFEPOL/0,,m References: World Bank Safeguard Policies [1] Overview "The World Bank's environmental and social safeguard policies are a cornerstone of its support to sustainable poverty reduction. The objective of these policies is to prevent and mitigate undue harm to people and their environment in the development process. These policies provide guidelines for bank and borrower staffs in the identification, preparation, and

293

MODIS Land Products Subsets Web Service  

NLE Websites -- All DOE Office Websites (Extended Search)

Web Service The MODIS Web service provides users with subsets of MODIS Land Products through standards based SOAP (Simple Object Access Protocol) Web service. Through the Web...

294

Neutron Scattering Web  

NLE Websites -- All DOE Office Websites (Extended Search)

at neutronsources.org. The information contained here in the Neutron Scattering Web has been transferred to the new site. We will leave the current content here for...

295

MSTC - Web Development Team  

NLE Websites -- All DOE Office Websites (Extended Search)

Web Maintenance Microsystems Home Custom Microsystems Solutions Microsystems R&D Services Capabilities and Technologies Facilities Trusted Microsystems General Info About Us Awards...

296

TMS: Web Banner Advertising  

Science Conference Proceedings (OSTI)

For more than 10 years, TMS has been enhancing its Web site to meet the technical needs of professionals in the materials science and engineering fields.

297

Web Pages - CECM  

E-Print Network (OSTI)

Sep 11, 1998 ... Curriculum Vitae · Lectures and Pi · Math on the Web · Quotations · Library and Search · GFUN & AGM; Visualizing Numbers · MathResources ...

298

MatWeb  

Science Conference Proceedings (OSTI)

Feb 8, 2007 ... MatWeb is a free searchable database of material data sheets, including property information on thermoplastic and thermoset polymers such as ...

299

NIST Web Metrics FAQ  

Science Conference Proceedings (OSTI)

... How do I install Tcl/Tk? Tcl distributions with "Install Notes" can be found through the Tcl Developer Xchange web site http://tcl.activestate.com. ...

300

Web Resources - TMS  

Science Conference Proceedings (OSTI)

WEB RESOURCE: Waste Isolation Pilot Plant (WIPP) DOE. World's ... Proposed radiation protection standards, 0, 594, Lynne Robinson, 5/15/2007 11:24 AM

Note: This page contains sample records for the topic "web policies privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Web3D  

Science Conference Proceedings (OSTI)

... Progress in creating 3D for the Web by Sandy Ressler, a member of the Information Access Division (IAD) in ITL, and others was noted in a recent ...

302

The Design of a Context-Aware Home Media Space for Balancing Privacy and Awareness  

E-Print Network (OSTI)

. Specifically, we detail how and why: 1. existing privacy mechanisms are leveraged for use in home-based video

Greenberg, Saul

303

On Web Annotations: Promises and Pitfalls of Current Web Infrastructure  

Science Conference Proceedings (OSTI)

Annotations are a mechanism that can support a variety of document-centric collaboration applications. The ubiquity of web content motivates the need for a web annotation system that supports collaborative creation of web content. Annotation system implementations ...

Venu Vasudevan; Mark Palmer

1999-01-01T23:59:59.000Z

304

STANFORD UNIVERSITY NOTICE OF PRIVACY PRACTICES  

E-Print Network (OSTI)

of the workforce are committed to following the policies outlined in this Notice. HOW WE MAY USE AND DISCLOSE medical information about you to authorized federal officials for intelligence, counterintelligence

Ford, James

305

A framework for context-aware privacy of sensor data on mobile systems  

Science Conference Proceedings (OSTI)

We study the competing goals of utility and privacy as they arise when a user shares personal sensor data with apps on a smartphone. On the one hand, there can be value to the user for sharing data in the form of various personalized services and recommendations; ... Keywords: Android, behavioral privacy, context-awareness, inferences, ipShield, model-based privacy

Supriyo Chakraborty; Kasturi Rangan Raghavan; Matthew P. Johnson; Mani B. Srivastava

2013-02-01T23:59:59.000Z

306

The language of privacy: Learning from video media space analysis and design  

Science Conference Proceedings (OSTI)

Video media spaces are an excellent crucible for the study of privacy. Their design affords opportunities for misuse, prompts ethical questions, and engenders grave concerns from both users and nonusers. Despite considerable discussion of the privacy ... Keywords: Human-computer interaction, autonomy, computer-supported cooperative work (CSCW), confidentiality, environmental psychology, privacy, social interaction, solitude, user interface design, video media spaces

Michael Boyle; Saul Greenberg

2005-06-01T23:59:59.000Z

307

Home is safer than the cloud!: privacy concerns for consumer cloud storage  

Science Conference Proceedings (OSTI)

Several studies ranked security and privacy to be major areas of concern and impediments of cloud adoption for companies, but none have looked into end-users' attitudes and practices. Not much is known about consumers' privacy beliefs and expectations ... Keywords: cloud storage, cross-cultural, privacy, social factors, usability

Iulia Ion; Niharika Sachdeva; Ponnurangam Kumaraguru; Srdjan ?apkun

2011-07-01T23:59:59.000Z

308

WebKDD 2005: web mining and web usage analysis post-workshop report  

Science Conference Proceedings (OSTI)

In this report, we summarize the contents and outcomes of the recent WebKDD 2005 workshop on Web Mining and Web Usage Analysis that was held in conjunction with the 11th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD ... Keywords: clickstream analysis, mining evolving web data, personalization, profiling, recommender systems, web mining

Olfa Nasraoui; Osmar R. Zaïane; Myra Spiliopoulou; Bamshad Mobasher; Brij Masand; Philip S. YU

2005-12-01T23:59:59.000Z

309

WebSubmit: Web-based Applications with Tcl  

Science Conference Proceedings (OSTI)

WebSubmit: Web-based Applications with Tcl ... The software is implemented as a collection of Tcl CGI scripts and a large body of Tcl support code. ...

310

Restful web services, First edition  

Science Conference Proceedings (OSTI)

"Every developer working with the Web needs to read this book." -- David Heinemeier Hansson, creator of the Rails framework "RESTful Web Services finally provides a practical roadmap for constructing services that embrace the Web, instead of trying to ...

Leonard Richardson; Sam Ruby

2007-05-01T23:59:59.000Z

311

Data Integration Using Web Services  

Science Conference Proceedings (OSTI)

In this paper we examine the opportunities for data integration in the context of the emerging Web Services systems development paradigm. The paper introduces the programming standards associated with Web Services and provides an example of how Web Services ...

Mark Hansen; Stuart E. Madnick; Michael Siegel

2003-01-01T23:59:59.000Z

312

Web Recency Maintenance Protocol  

Science Conference Proceedings (OSTI)

In this paper, we propose a new protocol namely Web Recency Maintenance Protocol (WRMP) that employs "push" mechanism to maintain the currency of the World Wide Web (WWW) at Search Engine (SE) site. As of this writing SEs are adopting "pull" technology, ...

K. Satya Sai Prakash; S. V. Raghavan

2002-12-01T23:59:59.000Z

313

Web Science ” Dossier Presentation  

E-Print Network (OSTI)

The Internet is now a constant in all parts of life and at all levels: personal, academic and professional. In only a few years, the Internet has changed the way we relate, study, work, shop, spend our free time, etc. The web, the collection of resources accessible over the Internet, has become a gargantuan oracle where people search, create and share information on any subject, and where they communicate globally, breaking down the barriers of time and space. The possibility of being connected almost all the time from anywhere means that users have a perception of the web as something that is always available to cover any need. The rapid evolution of the technology available, both hardware and software, together with its relatively low cost, means that ever more users access the web and use it for more reasons. Web science, which has become a hot topic recently, looks to explain the evolution of the web as a complex organism and

Julià Minguillón; Daniel Riera; Julià Minguillón

2008-01-01T23:59:59.000Z

314

Feature, Office of Scientific and Technical Information, U.S...  

Office of Scientific and Technical Information (OSTI)

OSTI Web Measurement and Tracking Opt-Out As you use this website, OSTI collects web measurement and tracking data. For full details see User Privacy under Website Policies and...

315

Navigating computer science research through waves of privacy concerns: discussions among computer scientists at Carnegie Mellon University  

Science Conference Proceedings (OSTI)

Computer Science research and practice are raising growing privacy concerns among the public and government. Computer technology's increasing ability to capture, organize, interpret and share data about individuals raises questions about what privacy ... Keywords: data mining, ethics, face recognition, institutional review board, personal assistants, privacy, privacy technology, surveillance

Latanya Sweeney

2004-03-01T23:59:59.000Z

316

XHTML documents with inline, policy-aware provenance  

E-Print Network (OSTI)

Constructing code that aids users in making information policy decisions in a decentralized Web-based environment will require seamless integration between document content and metadata. A system of embedding and reasoning ...

Jones, Harvey C., III

2007-01-01T23:59:59.000Z

317

NVLAP Interactive Web Site (NIWS)  

Science Conference Proceedings (OSTI)

Welcome to the NVLAP Interactive Web Site (NIWS). ... The URL for the NVLAP Interactive Web Site (NIWS) is: https://www-s.nist.gov/niwsapp. ...

2012-02-03T23:59:59.000Z

318

Instructions for Web VPN Connectivity  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Instructions for WebVPN Connectivity October 2010 2 Requirements Web Browser (Internet Explorer, Firefox, Safari, MSN Explorer, etc.) Internet Connection (Preferably Broadband)...

319

Security Policy  

Science Conference Proceedings (OSTI)

... M/S ACES Pvt. Ltd. Pakistan Page Security Policy ... 2013 M/S ACES Pvt. Ltd. Pakistan 5/27/2013 Page 2. [SECURITY POLICY] May 27, 2013 ...

2013-05-29T23:59:59.000Z

320

Microsoft Word - Privacy_Contact_Listing_September_21_2010  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

US Department of Energy US Department of Energy Privacy Act Officers Contact Listing As of September 21, 2010 Chief Privacy Officer Jerry Hanley U.S. Department of Energy 1000 Independence Avenue, SW Washington, DC 20585 jerry.hanley@hq.doe.gov Phone: (202) 586-0483 Fax: (202) 586-0575 Operations Offices Chicago Office Miriam Legan U.S. Department of Energy Chicago Office 9800 S. Cass Avenue Argonne, IL 60439 miriam.legan@ch.doe.gov Phone: 630-252-2041 Fax: 630-252-2183 Idaho Operations Office Clayton Ogilvie U.S. Department of Energy 1955 Fremont Ave. MS 1203 Idaho Falls, Idaho 83415

Note: This page contains sample records for the topic "web policies privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

On mental privacy: the having of mental states  

E-Print Network (OSTI)

In three chapters this thesis seeks to demonstrate that (i) there historically has been no consensus in the use of the term 'mental privacy' and that several problematic doctrines are based on confused accounts of this term; (ii) there are contemporary debates which are maintained, in large order, by the opposing sides subscribing to different notions of mental privacy; and (iii) a preliminary investigation makes clear that both mental states with propositional content and mental states with non-propositional content are private in that both require the agent to have the state.

Dembitzer, Simon David

1998-01-01T23:59:59.000Z

322

Website Policies and Important Links | Scientific and Technical Information  

Office of Scientific and Technical Information (OSTI)

Website Policies and Important Links Website Policies and Important Links Print page Print page Email page Email page This page provides a comprehensive overview of the policies of this federally sponsored website, consistent with guidance established by the U.S. Office of Management and Budget (OMB) as implemented by the U.S. Department of Energy. Disclaimer Acceptable Use Policy User Privacy Copyright, Restrictions, and Permissions Notice Accessibility/Section 508 Website Security Linking to OSTI Website Linking to Outside Websites Data Rights Freedom of Information Information Quality No Fear Act Schedule for Posting Information Comments Policy USAJOBS Grants Regulations USA.gov Disclaimer This system is made available by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of

323

Science Open Access Journals - Website Policies/Important Links  

Office of Scientific and Technical Information (OSTI)

Website Policies and Important Links Website Policies and Important Links This page provides a comprehensive overview of the policies of this federally sponsored website, consistent with guidance established by the U.S. Office of Management and Budget (OMB) as implemented by the U.S. Department of Energy. Disclaimer Acceptable Use Policy User Privacy Copyright, Restrictions, and Permissions Notice Accessibility/Section 508 Website Security Linking to OSTI Website Linking to Outside Websites Data Rights Freedom of Information Information Quality No Fear Act Schedule for Posting Information Comments Policy USAJOBS Grants Regulations USA.gov Disclaimer This system is made available by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any

324

SC e-journals Website Policies and Important Links  

Office of Scientific and Technical Information (OSTI)

Website Policies and Important Links Website Policies and Important Links This page provides a comprehensive overview of the policies of this federally sponsored website, consistent with guidance established by the U.S. Office of Management and Budget (OMB) as implemented by the U.S. Department of Energy. Disclaimer Acceptable Use Policy User Privacy Copyright, Restrictions, and Permissions Notice Accessibility/Section 508 Website Security Linking to OSTI Website Linking to Outside Websites Data Rights Freedom of Information Information Quality No Fear Act Schedule for Posting Information Comments Policy USAJOBS Grants Regulations USA.gov Disclaimer This system is made available by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any

325

Web Mining – the Ontology Approach  

E-Print Network (OSTI)

The World Wide Web today provides users access to extremely large number of Web sites many of which contain information of education and commercial values. Due to the unstructured and semi-structured nature of Web pages and the design idiosyncrasy of Web sites, it is a challenging task to develop digital libraries for organizing and managing digital content from the Web. Web mining research, in its last 10 years, has on the other hand made significant progress in categorizing and extracting content from the Web. In this paper, we represent ontology as a set of concepts and their inter-relationships relevant to some knowledge domain. The knowledge provided by ontology is extremely useful in defining the structure and scope for mining Web content. We will therefore review Web mining and describe the ontology approach to Web mining. The application of these Web mining techniques to digital library systems will also be discussed.

Ee-peng Lim; Aixin Sun

2006-01-01T23:59:59.000Z

326

Silicon web process development  

DOE Green Energy (OSTI)

Silicon dendritic web is a ribbon form of silicon produced from the melt without die shaping, and capable of fabrication into solar cells with greater than 15% AM1 conversion efficiency. This quarterly report describes the work carried out during the period April to June 1980, as part of Phase III of a DOE/JPL-sponsored effort to develop silicon web process technology compatible with the national goals for low cost photovoltaic output power. We have successfully demonstrated eight hours of silicon web growth with closed loop melt level control, a key contract milestone. The result was achieved using a feedback system in which the change in output from a laser melt level sensor was used to control the rate at which silicon pellets were fed to replace the material frozen into web crystal. The melt level was controlled to about +- 0.1mm, well within the range required for stable long term web growth. This is an important step toward the development of a fully automated silicon web growth machine. A second major highlight of this quarter was the completion of an engineering design for a semi-automated web growth machine embodying all the desired features developed so far as part of this program (including e.g. melt replenishment, level sensing and control) as well as some system simplifications. The completed design will serve as a basis for complete system automation.

Duncan, C.S.; Seidensticker, R.G.; McHugh, J.P.; Skutch, M.E.; Hopkins, R.H.

1980-07-15T23:59:59.000Z

327

Title: Web Services Developer (Web Designer) Category: Exempt Staff  

E-Print Network (OSTI)

Title: Web Services Developer (Web Designer) Category: Exempt Staff Department: Information Libraries is seeking a web designer to join their Digital Technology & Interface Services (DTIS) department on the College Park campus. DTIS develops and supports web-based services designed to meet the research needs

Kane, Andrew S.

328

Web Sites about Infectious Disease Web Sites about Infectious Disease  

E-Print Network (OSTI)

Web Sites about Infectious Disease Web Sites about Infectious Disease Stanford Center for Tuberculosis Research-Site Links http://molepi.stanford.edu/tblinks.html Virology on the World Wide Web http://www.idsociety.org/ file:///C|/Program%20Files/Adobe/Adobe%20Dreamweav...nks/Web%20Sites%20about%20Infectious%20Disease

de Lijser, Peter

329

ISI Web of Knowledge111 , ,1111  

E-Print Network (OSTI)

ISI Web of Knowledge111 © , ,1111 -ISI Web of Knowledge (http://newisiknowledge.com) , , , . . -ISI Web of Knowledge : Web of Science(-1965) , . Biosis Previews(-1991) , ,, . MEDLINE(-1951) , , . Zoological Record(-1995). , . ISI Web of Knowledge . . -VPN( ). : 1.:http

Daniel, Rosenfeld

330

WebObjects Developer's Guide  

Science Conference Proceedings (OSTI)

From the Publisher:WebObjects is an object-oriented Web application server that is used to generate scalable Web and Java applications from reusable templates. A product of Apple Computer, WebObjects' client list includes such Fortune 500 companies as ...

Ravi Mendis

2002-05-01T23:59:59.000Z

331

Towards web security using PLASMA  

Science Conference Proceedings (OSTI)

The World Wide Web is one of the most significant multi-media applications ever developed-and therefore securing the web is one of the most pressing problems. There exist a number of approaches for securing the World Wide Web which, however, usually ... Keywords: high level security, multimedia, secure communications platform, world wide web

Annette Krannig

1998-01-01T23:59:59.000Z

332

Characterization of national Web domains  

Science Conference Proceedings (OSTI)

During the last few years, several studies on the characterization of the public Web space of various national domains have been published. The pages of a country are an interesting set for studying the characteristics of the Web because at the same ... Keywords: Web characterization, Web measurement

Ricardo Baeza-Yates; Carlos Castillo; Efthimis N. Efthimiadis

2007-05-01T23:59:59.000Z

333

Spider Web Preventing  

NLE Websites -- All DOE Office Websites (Extended Search)

Spider Web Preventing Name: William and Martha Location: NA Country: NA Date: NA Question: Hello. I found your site through the AskJeeves search engine doing a search for...

334

Maryland Web Site Report  

NLE Websites -- All DOE Office Websites (Extended Search)

Website M a r y l a n d Web site Introduction The University Of Maryland 2005 Solar Decathlon Team has created a website to inform the public about solar living, establish an...

335

Moss Web Sites  

NLE Websites -- All DOE Office Websites (Extended Search)

Moss Web Sites Name: Barbara Location: NA Country: NA Date: NA Question: I would like some on-line information about using various mosses in gardens - or pointers to other...

336

Spider Web Construction  

NLE Websites -- All DOE Office Websites (Extended Search)

Spider Web Construction Name: Stephanie Location: NA Country: NA Date: NA Question: Near our home on Lake Ontario, we often find spider websm that have a horizontal line at the...

337

Adaptive web usage profiling  

Science Conference Proceedings (OSTI)

Web usage models and profiles capture significant interests and trends from past accesses. They are used to improve user experience, say through recommendation of pages, pre-fetching of pages, etc. While browsing behavior changes dynamically over time, ...

Bhushan Shankar Suryavanshi; Nematollaah Shiri; Sudhir P. Mudur

2005-08-01T23:59:59.000Z

338

Web worlds, web-colouring matrices, and web-mixing matrices  

E-Print Network (OSTI)

We introduce a new combinatorial object called a web world that consists of a set of web diagrams. The diagrams of a web world are generalizations of graphs, and each is built on the same underlying graph. Instead of ordinary vertices the diagrams have pegs, and edges incident to a peg have different heights on the peg. The web world of a web diagram is the set of all web diagrams that result from permuting the order in which endpoints of edges appear on a peg. The motivation comes from particle physics, where web diagrams arise as particular types of Feynman diagrams describing scattering amplitudes in non-Abelian gauge (Yang-Mills) theories. To each web world we associate two matrices called the web-colouring matrix and web-mixing matrix. The entries of these matrices are indexed by ordered pairs of web diagrams (D_1,D_2), and are computed from those colourings of the edges of D_1 that yield D_2 under a transformation determined by each colouring. We show that colourings of a web diagram (whose constituent indecomposable diagrams are all unique) that lead to a reconstruction of the diagram are equivalent to order-preserving mappings of certain partially ordered sets (posets) that may be constructed from the web diagrams. For web worlds whose web graphs have all edge labels equal to 1, the diagonal entries of web-mixing and web-colouring matrices are obtained by summing certain polynomials determined by the descents in permutations in the Jordan-Holder set of all linear extensions of the associated poset. We derive tri-variate generating generating functions for the number of web worlds according to three statistics and enumerate the number of different web diagrams in a web world. Three special web worlds are examined in great detail, and the traces of the web-mixing matrices calculated in each case.

Mark Dukes; Einan Gardi; Einar Steingrimsson; Chris D. White

2013-01-28T23:59:59.000Z

339

Web dynamics and their ramifications for the development of web search engines  

Science Conference Proceedings (OSTI)

The World Wide Web has become the largest hypertext system in existence, providing an extremely rich collection of information resources. Compared with conventional information sources, the Web is highly dynamic in the following four factors: size (i.e., ... Keywords: personalized web searching, web dynamics, web link structures, web pages, web search engine, web size, web user interests

Yiping Ke; Lin Deng; Wilfred Ng; Dik-Lun Lee

2006-07-01T23:59:59.000Z

340

A measurement study of insecure javascript practices on the web  

Science Conference Proceedings (OSTI)

JavaScript is an interpreted programming language most often used for enhancing webpage interactivity and functionality. It has powerful capabilities to interact with webpage documents and browser windows, however, it has also opened the door for many ... Keywords: AST tree matching, JavaScript, Web engineering, execution-based measurement, same origin policy, security

Chuan Yue, Haining Wang

2013-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "web policies privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Security and privacy issues for the network of the future  

Science Conference Proceedings (OSTI)

The vision towards the Network of the Future cannot be separated from the fact that today's networks, and networking services are subject to sophisticated and very effective attacks. When these attacks first appeared, spoofing and distributed denial-of-service ... Keywords: networks, privacy, security

Giannis F. Marias; João Barros; Markus Fiedler; Andreas Fischer; Harald Hauff; Ralph Herkenhoener; Antonio Grillo; Alessandro Lentini; Luisa Lima; Charlott Lorentzen; Wojciech Mazurczyk; Hermann de Meer; Paulo F. Oliveira; George C. Polyzos; Enric Pujol; Krzysztof Szczypiorski; João P. Vilela; Tiago T. V. Vinhoza

2012-09-01T23:59:59.000Z

342

Model-based context privacy for personal data streams  

Science Conference Proceedings (OSTI)

Smart phones with increased computation and sensing capabilities have enabled the growth of a new generation of applications which are organic and designed to react depending on the user contexts. These contexts typically define the personal, social, ... Keywords: context streams, context-awareness, dynamic bayesian networks, information leakage, privacy

Supriyo Chakraborty; Kasturi Rangan Raghavan; Mani Srivastava; Harris Teague

2012-10-01T23:59:59.000Z

343

Analysis of privacy in online social networks of runet  

Science Conference Proceedings (OSTI)

In recent years, social networking sites (SNSs) gained high popularity among Internet users as they combine the best of both worlds: befriending people outside real life situations and staying in touch with people already known. An important aspect of ... Keywords: information revelation, privacy, security, social networking sites, trust

Slava Kisilevich; Florian Mansmann

2010-09-01T23:59:59.000Z

344

Private sector video surveillance in Toronto: not privacy compliant!  

Science Conference Proceedings (OSTI)

We report on the findings of a fieldwork study conducted on private sector video surveillance and signage in the Toronto area. The presence and operation of over 140 video surveillance camera schemes by large service providing corporations, in 2 major ... Keywords: PIPEDA, privacy, private sector, regulation, video surveillance

Andrew Clement; Joseph Ferenbok; Roxanna Dehghan; Laura Kaminker; Simeon Kanev

2012-02-01T23:59:59.000Z

345

Measuring long-term location privacy in vehicular communication systems  

Science Conference Proceedings (OSTI)

Vehicular communication systems are an emerging form of communication that enables new ways of cooperation among vehicles, traffic operators, and service providers. However, many vehicular applications rely on continuous and detailed location information ... Keywords: Accumulated information, Entropy, Location privacy, Metric, Vehicular communication systems

Zhendong Ma; Frank Kargl; Michael Weber

2010-07-01T23:59:59.000Z

346

Protecting the sink location privacy in wireless sensor networks  

Science Conference Proceedings (OSTI)

Wireless sensor networks (WSNs) are widely deployed to collect data in military and civilian applications today. Due to the open nature of a WSN, it is relatively easy for an adversary to eavesdrop and trace packets in order to capture the receiver. ... Keywords: Location privacy, Receiver, Sink, WSN

Lin Yao, Lin Kang, Pengfei Shang, Guowei Wu

2013-06-01T23:59:59.000Z

347

Location privacy and resilience in wireless sensor networks querying  

Science Conference Proceedings (OSTI)

Due to the wireless nature of communication in sensor networks, the communication patterns between sensors could be leaked regardless of the adoption of encryption mechanisms-those would just protect the message content. However, communication patterns ... Keywords: Location privacy, Probabilistic algorithm, Resiliency, Security, Wireless sensor networks

Roberto Di Pietro; Alexandre Viejo

2011-03-01T23:59:59.000Z

348

Privacy nudges for social media: an exploratory Facebook study  

Science Conference Proceedings (OSTI)

Anecdotal evidence and scholarly research have shown that a significant portion of Internet users experience regrets over their online disclosures. To help individuals avoid regrettable online disclosures, we employed lessons from behavioral decision ... Keywords: facebook, nudge, online disclosure, privacy, soft paternalism

Yang Wang, Pedro Giovanni Leon, Kevin Scott, Xiaoxuan Chen, Alessandro Acquisti, Lorrie Faith Cranor

2013-05-01T23:59:59.000Z

349

Trusting to learn: trust and privacy issues in serious games  

Science Conference Proceedings (OSTI)

Organizations are increasingly investing in technology-enhanced learning systems to improve their employees' skills. Serious games are one example; the competitive and fun nature of games is supposed to motivate employee participation. But any system ... Keywords: privacy, serious games, technology-enhanced learning, trust

Miguel Malheiros; Charlene Jennett; Will Seager; M. Angela Sasse

2011-06-01T23:59:59.000Z

350

Proceedings of the Ninth Symposium on Usable Privacy and Security  

Science Conference Proceedings (OSTI)

Welcome to the Ninth Symposium On Usable Privacy and Security! This year's program features 15 technical papers, three workshops, 25 posters, 5 posters/papers published in the past year at other conferences, a panel, two lightning talks and demo sessions, ...

Lorrie Faith Cranor, Lujo Bauer, Konstantin Beznosov

2013-07-01T23:59:59.000Z

351

Trust enhanced ubiquitous payment without too much privacy loss  

Science Conference Proceedings (OSTI)

Computational models of trust have been proposed for use in ubicomp environments for deciding whether to allow customers to pay with an e-purse or not. In order to build trust in a customer, a means to link transactions using the same e-purse is required. ... Keywords: context, payment, privacy, trust, ubicomp

Jean-Marc Seigneur; Christian Damsgaard Jensen

2004-03-01T23:59:59.000Z

352

Locanyms: towards privacy-preserving location-based services  

Science Conference Proceedings (OSTI)

Recent advances in geolocated capacities, secure and verified positioning techniques, ubiquitous connectivity, as well as mobile and embedded systems, have led to the development of a plethora of Location-Based Services (LBS), personalizing the services ... Keywords: location-based services, privacy, ubiquitous computing

Sebastien Gambs; Marc-Olivier Killijian; Matthieu Roy; Moussa Traore

2012-05-01T23:59:59.000Z

353

Security and privacy for geospatial data: concepts and research directions  

Science Conference Proceedings (OSTI)

Geospatial data play a key role in a wide spectrum of critical data management applications, such as disaster and emergency management, environmental monitoring, land and city planning, and military operations, often requiring the coordination among ... Keywords: GIS, geospatial data, privacy, security

Elisa Bertino; Bhavani Thuraisingham; Michael Gertz; Maria Luisa Damiani

2008-11-01T23:59:59.000Z

354

Impact of Personal Privacy Devices for WAAS Aviation Users  

E-Print Network (OSTI)

Impact of Personal Privacy Devices for WAAS Aviation Users Grace Xingxin Gao, Kazuma Gunning, Todd or monitored. Figure 1 lists some examples of PPDs currently for sale on Internet. They are low-cost jamming [3], potentially aviation users. Figure 1. PPDs for Sale on Internet Aviation users rely on Wide Area

Stanford University

355

Privacy-preserving smart metering with multiple data Consumers  

Science Conference Proceedings (OSTI)

The increasing diffusion of Automatic Meter Reading (AMR) and the possibility to open the system to third party services has raised many concerns about the protection of personal data related to energy, water or gas consumption, from which details about ... Keywords: Data privacy, Multiparty computation, Smart grid

Cristina Rottondi, Giacomo Verticale, Antonio Capone

2013-05-01T23:59:59.000Z

356

Privacy in the Smart Grid Smart Grid 101  

E-Print Network (OSTI)

Privacy in the Smart Grid #12;Smart Grid 101 Energy and information flows in many directions, from Distributed Generation & StorageThird party services #12;#12;Smart Grid Hopes/Promises #1 ­Better Utilization Grid Hopes/ Promisses (II) "The Smart Grid will:" · Reduce CO2 emissions by up to 480 MMT by 2020

Hoepman, Jaap-Henk

357

Semantic Web for Manufacturing Web Services  

Science Conference Proceedings (OSTI)

As markets become unexpectedly turbulent with a shortened product life cycle and a power shift towards buyers, the need for methods to rapidly and cost-effectively develop products, production facilities and supporting software is becoming urgent. The use of a virtual enterprise plays a vital role in surviving turbulent markets. However, its success requires reliable and large-scale interoperation among trading partners via a semantic web of trading partners' services whose properties, capabilities, and interfaces are encoded in an unambiguous as well as computer-understandable form. This paper demonstrates a promising approach to integration and interoperation between a design house and a manufacturer by developing semantic web services for business and engineering transactions. To this end, detailed activity and information flow diagrams are developed, in which the two trading partners exchange messages and documents. The properties and capabilities of the manufacturer sites are defined using DARPA Agent Markup Language (DAML) ontology definition language. The prototype development of semantic webs shows that enterprises can widely interoperate in an unambiguous and autonomous manner; hence, virtual enterprise is realizable at a low cost.

Kulvatunyou, Boonserm [ORNL; Ivezic, Nenad [ORNL

2002-06-01T23:59:59.000Z

358

Webs and Posets  

E-Print Network (OSTI)

The non-Abelian exponentiation theorem has recently been generalised to correlators of multiple Wilson line operators. The perturbative expansions of these correlators exponentiate in terms of sets of diagrams called webs, which together give rise to colour factors corresponding to connected graphs. The colour and kinematic degrees of freedom of individual diagrams in a web are entangled by mixing matrices of purely combinatorial origin. In this paper we relate the combinatorial study of these matrices to properties of partially ordered sets (posets), and hence obtain explicit solutions for certain families of web-mixing matrix, at arbitrary order in perturbation theory. We also provide a general expression for the rank of a general class of mixing matrices, which governs the number of independent colour factors arising from such webs. Finally, we use the poset language to examine a previously conjectured sum rule for the columns of web-mixing matrices which governs the cancellation of the leading subdivergences between diagrams in the web. Our results, when combined with parallel developments in the evaluation of kinematic integrals, offer new insights into the all-order structure of infrared singularities in non-Abelian gauge theories.

Mark Dukes; Einan Gardi; Heather McAslan; Darren J. Scott; Chris D. White

2013-10-11T23:59:59.000Z

359

Developing Web sites for Web based expert systems: A Web engineering approach  

E-Print Network (OSTI)

Abstract: This paper presents a developing process for Web based expert systems and specifically focuses on the developing process of their corresponding Web sites. As a case study, the architecture of a Web site/application, which includes the Landfill Operation Management Advisor (LOMA) expert system, will be presented. The Web site/application is available at

Ioannis M. Dokas

2005-01-01T23:59:59.000Z

360

Policies | Argonne Leadership Computing Facility  

NLE Websites -- All DOE Office Websites (Extended Search)

Eureka Gadzooks Policies Pullback Policy ALCF Acknowledgment Policy Account Sponsorship & Retention Policy Accounts Policy Data Policy INCITE Quarterly Report Policy ALCC...

Note: This page contains sample records for the topic "web policies privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Whom to Call Below are resources for questions about specific topic areas and related LBNL policies and  

E-Print Network (OSTI)

Information (HIPPA) Health Services Privacy Policy Health Services 510-486-6266 #12;Whom to Call Below, the LBNL Ombuds may be contacted at 510-642-7843. RIIO 2013-05-22- pg. 2 Environmental Health Environment, Safety and Health RPM 7.01 Environmental Health and Safety Division 510-486-5514 safetyconcerns

Geddes, Cameron Guy Robinson

362

ICLEI and REN21 Local Renewables Web Portal | Open Energy Information  

Open Energy Info (EERE)

ICLEI and REN21 Local Renewables Web Portal ICLEI and REN21 Local Renewables Web Portal Jump to: navigation, search Tool Summary Name: ICLEI and REN21 Local Renewable Web Portal Agency/Company /Organization: International Council for Local Environmental Initiatives Partner: Renewable Energy Policy Network for the 21st Century (REN21) Sector: Energy, Climate Focus Area: People and Policy, Economic Development Phase: Bring the Right People Together, Create a Vision, Evaluate Options, Develop Goals, Prepare a Plan, Create Early Successes, Evaluate Effectiveness and Revise as Needed Topics: Implementation, Policies/deployment programs Resource Type: Guide/manual, Training materials, Lessons learned/best practices User Interface: Website Website: www.local.ren21.net/home/ Cost: Free References: Local Renewables Web Portal[1]

363

Privacy Act Advisory | U.S. DOE Office of Science (SC)  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy Act Advisory Privacy Act Advisory Integrated Support Center (ISC) ISC Home About Services Freedom of Information Act (FOIA) Privacy Act Advisory Exemptions How to Submit a FOIA Request Fee Waiver and Reduction Criteria Electronic Reading Room ISC Conventional Reading Rooms Reference Links Privacy Act Categorical Exclusion Determinations Contact Information Integrated Support Center Roxanne Purucker U.S. Department of Energy 9800 S. Cass Avenue Argonne, IL 60439 P: (630) 252-2110 Larry Kelly U.S. Department of Energy 200 Administration Road Oak Ridge, TN 37830 P: (865) 576-0885 Freedom of Information Act (FOIA) Privacy Act Advisory Print Text Size: A A A RSS Feeds FeedbackShare Page To Contact Us Freedom of Information Act/Privacy Act Officer U.S. Department of Energy SC Integrated Support Center - Chicago

364

Freedom of Information Act (FOIA) and Privacy Act Requests | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Freedom of Information Act (FOIA) Freedom of Information Act (FOIA) and Privacy Act Requests Freedom of Information Act (FOIA) and Privacy Act Requests FOIA and Privacy Act Requests FOIA Requests FOIA information can be found at http://energy.gov/management/office-management/operational-management/freedom-information-act. Privacy Act Requests Privacy Act requests can not be submitted electronically. They must be submitted in writing or in person to: Cathy Harrell U.S. Department of Energy 1000 Independence Avenue, SW Washington, DC 20585 Be sure to include as much information as you can about when and where you worked, what records you are requesting, sign the request, and include copies of 2 forms of ID or a photo ID. You must either have your request notarized or 1) acknowledge that you understand the criminal penalty in the Privacy Act for requesting or

365

Economics of NetworkingEconomics of Networking TechnologyTechnology  

E-Print Network (OSTI)

"PROGRAMMING MXSEC "SECURITY" or "SECURE" PRIVACY "PRIVACY" COLD "COLD FUSION" MXWEBDV "WEB SITE DEVELOPMENT

Gruner, Daniel S.

366

Web sites related to consumer and professional information Web sites Related to Consumer & Professional Information  

E-Print Network (OSTI)

Web sites related to consumer and professional information Web sites Related to Consumer://ihpr.ubc.ca/ MedWeb Site Directory http://www.MedWeb.Emory.edu/MedWeb National Cancer Institute http

de Lijser, Peter

367

Privacy and identifiability in clinical research, personalized medicine, and public health surveillance  

E-Print Network (OSTI)

Electronic transmission of protected health information has become pervasive in research, clinical, and public health investigations, posing substantial risk to patient privacy. From clinical genetic screenings to publication ...

Cassa, Christopher A

2008-01-01T23:59:59.000Z

368

A World Wide Web Update  

NLE Websites -- All DOE Office Websites (Extended Search)

A World Wide Web Update The Center for Building Science now has a World Wide Web homepage accessible from the general LBL homepage. Through WWW and the Mosaic browser, Internet...

369

Redesigned ORNL DAAC Web Site  

NLE Websites -- All DOE Office Websites (Extended Search)

will be releasing a major revision to its Web site on Thursday, May 27, 2010. To implement this revision, the ORNL DAAC Web Site will be unavialable on May 27, from 10:00 a.m. EDT...

370

Versioning of Web service interfaces  

E-Print Network (OSTI)

This thesis investigates the problem of "design for change" in the context of Web Service based information systems. It describes the current status of architecting Web Services, an implementation of the Service Oriented ...

Agarwal, Anamika, 1981-

2004-01-01T23:59:59.000Z

371

Climate Change Development Policy Loan | Open Energy Information  

Open Energy Info (EERE)

Development Policy Loan Development Policy Loan Jump to: navigation, search Name Climate Change Development Policy Loan Agency/Company /Organization World Bank Sector Energy, Land Topics Finance, Policies/deployment programs, Background analysis Website http://web.worldbank.org/WBSIT Country Indonesia UN Region South-Eastern Asia References Indonesia Climate Change Project[1] "The project will support the Government's policy agenda on climate change, an issue of growing global concern. Indonesia is highly vulnerable to climate change impacts - sea level rise, changing weather patterns, and increased uncertainty. Potential impacts include: increased threats to food security and agricultural productivity; impacts on productive coastal zones and community livelihoods; consequences for water storage; intensification

372

Cyber Security and Privacy Industry Tracking Newsletter, April 2012  

Science Conference Proceedings (OSTI)

EPRI’s tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2012-04-11T23:59:59.000Z

373

Cyber Security and Privacy Industry Tracking Newsletter, April, 2013  

Science Conference Proceedings (OSTI)

EPRI’s tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2013-03-26T23:59:59.000Z

374

Cyber Security and Privacy Industry Tracking Newsletter, July 2013  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2013-06-25T23:59:59.000Z

375

Cyber Security and Privacy Industry Tracking Newsletter: December 2012  

Science Conference Proceedings (OSTI)

The Electric Power Research Institute (EPRI) remains committed to supporting the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts, EPRI works diligently to stay abreast of the present state of standards and guideline developments, as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups and insights into future activities.This ...

2012-12-28T23:59:59.000Z

376

Cyber Security and Privacy Industry Tracking Newsletter, October 2013  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2013-10-11T23:59:59.000Z

377

Cyber Security and Privacy Industry Tracking Newsletter, October 2012  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2012-09-26T23:59:59.000Z

378

Cyber Security and Privacy Industry Tracking Newsletter, July 2012  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2012-07-02T23:59:59.000Z

379

3D in Web Pages  

Science Conference Proceedings (OSTI)

3D in Web Pages. This page is currently under construction! Return to Visualization. *. Bookmark and Share. Return to Visualization.

2011-12-05T23:59:59.000Z

380

Fundamental Constants on the Web  

Science Conference Proceedings (OSTI)

... PHYSICS Find Your Fundamental Constants on the Web. ... Use of the fundamental constants database also is growing rapidly. ...

Note: This page contains sample records for the topic "web policies privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

The Dynamical Discrete Web  

E-Print Network (OSTI)

The dynamical discrete web (DDW), introduced in recent work of Howitt and Warren, is a system of coalescing simple symmetric one-dimensional random walks which evolve in an extra continuous dynamical parameter s. The evolution is by independent updating of the underlying Bernoulli variables indexed by discrete space-time that define the discrete web at any fixed s. In this paper, we study the existence of exceptional (random) values of s where the paths of the web do not behave like usual random walks and the Hausdorff dimension of the set of such exceptional s. Our results are motivated by those about exceptional times for dynamical percolation in high dimension by H\\"aggstrom, Peres and Steif, and in dimension two by Schramm and Steif. The exceptional behavior of the walks in DDW is rather different from the situation for dynamical random walks of Benjamini, H\\"aggstrom, Peres and Steif. In particular, we prove that there are exceptional values of s for which the walk from the origin S^s(n) has limsup S^s(n)/\\sqrt n \\leq K with a nontrivial dependence of the Hausdorff dimension on K. We also discuss how these and other results extend to the dynamical Brownian web, a natural scaling limit of DDW. The scaling limit is the focus of a paper in preparation; it was studied by Howitt and Warren and is related to the Brownian net of Sun and Swart.

L. R. G. Fontes; C. M. Newman; K. Ravishankar; E. Schertzer

2007-04-20T23:59:59.000Z

382

Continuations and Web Servers  

Science Conference Proceedings (OSTI)

Programming web applications in direct style with the help of continuations is a much simpler, safer, modular and better-performing technology than the current dominating "page-centric" technology combining CGI scripts, active pages or servlets. This ... Keywords: WWW, continuations, hypertext, scheme

Christian Queinnec

2004-12-01T23:59:59.000Z

383

Web based portfolio optimization  

Science Conference Proceedings (OSTI)

The portfolio optimization is implemented as e-service through Internet. Four-tier client-server model of WAN-based information system is designed satisfying the intersection of several domains: financial investments, optimization theory and information ... Keywords: portfolio optimization, system algorithmic architecture of information systems, web based information system

Todor Stoilov; Krasimira Stoilova

2009-06-01T23:59:59.000Z

384

Plug-in privacy for Smart Metering billing  

E-Print Network (OSTI)

Smart Metering is a concept that allows to collect fine-grained consumption profiles from customers by replacing traditional electricity meters with Smart Meters in customers' households. The recorded consumption profile is the basis for the calculation of time-dependent tariffs but also allows deduction of the inhabitant's personal schedules and habits. The current reporting of such consumption profiles only protects this data from 3rd parties but falls short to protect the customer's privacy from illegitimate abuse by the supplier itself. We propose a privacy-preserving profile reporting protocol that enables billing for time-dependent tariffs without disclosing the actual data of the consumption profile to the supplier. Our approach relies on a zero-knowledge proof based on Pedersen Commitments performed by a plug-in privacy component that is put into the communication link between Smart Meter and supplier's back-end systems and requires no change to Smart Meter hardware and only little change to the softw...

Jawurek, Marek; Kerschbaum, Florian

2010-01-01T23:59:59.000Z

385

Sensor system for web inspection  

DOE Patents (OSTI)

A system for electrically measuring variations over a flexible web has a capacitive sensor including spaced electrically conductive, transmit and receive electrodes mounted on a flexible substrate. The sensor is held against a flexible web with sufficient force to deflect the path of the web, which moves relative to the sensor.

Sleefe, Gerard E. (1 Snowcap Ct., Cedar Crest, NM 87008); Rudnick, Thomas J. (626 E. Jackson Rd., St. Louis, MO 63119); Novak, James L. (11048 Malaguena La. NE., Albuquerque, NM 87111)

2002-01-01T23:59:59.000Z

386

Efficient, automatic web resource harvesting  

Science Conference Proceedings (OSTI)

There are two problems associated with conventional web crawling techniques: a crawler cannot know if all resources at a non-trivial web site have been discovered and crawled ("the counting problem") and the human-readable format of the resources are ... Keywords: OAI-PMH, mod_oai, web crawling

Michael L. Nelson; Joan A. Smith; Ignacio Garcia del Campo

2006-11-01T23:59:59.000Z

387

Profiles for the situated web  

Science Conference Proceedings (OSTI)

The World Wide Web is evolving into a medium that will soon make it possible for conceiving and implementing situation-aware services. A situation-aware or situated web application is one that renders the user with an experience (content, interaction ... Keywords: CC/PP, XML, profiles, situated-aware applications, vocabulary, web architecture

Lalitha Suryanarayana; Johan Hjelm

2002-05-01T23:59:59.000Z

388

Semantic web reasoners and languages  

Science Conference Proceedings (OSTI)

Semantic web reasoners and languages enable the semantic web to function. Some of the latest reasoning models developed in the last few years are: DLP, FaCT, RACER, Pellet, MSPASS, CEL, Cerebra Engine, QuOnto, KAON2, HermiT and others. Some software ... Keywords: Description logic, Languages, Reasoners, Semantic web

R. B. Mishra; Sandeep Kumar

2011-04-01T23:59:59.000Z

389

POLICY FLASH  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6 6 DATE: TO: FROM: January 28,2005 Procurement Directors Office of Procurement and Assistance Policy, ME-61 Office of Procurement and Assistance Management SUBJECT: Changes in Small Business Contracting Policy SUMMARY: This Policy Flash forwards changes to the Small Disadvantaged Business (SDB) price evaluation adjustment, new guidance from the U.S. Small Business Administration (SBA) on improving subcontracting opportunities with small businesses, and the requirement for recertification of small business status. Page 1 of3 POLICY FLASH 2005-16 1. The statute for the SDB price evaluation adjustment implemented in FAR Subpart 19.11 is no longer in effect for civilian agencies, except the National Aeronautics and Space Administration and Coast Guard. See the attached Civilian Agency Acquisition Council Letter, dated December 27,2004: ~ CAAC Letter 2004-04, Expirationc

390

POLICY FLASH  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7 7 DATE: TO: FROM: February 10,2005 Procurement Directors Office of Procurement and Assistance Policy, ME-61 Office of Procurement and Assistance Management SUBJECT: Acquisition Guide Updates SUMMARY: This Policy Flash advises you of changes being made to five chapters of the Department of Energy Acquisition Guide. These changes are as follows: Pagel of 2 -_un - --- n__- Chapter 26.1 Energy Policy Act hnplementation - The changes to this chapter were updates and editorial style changes. Chapter 26.2 Energy Policy Act Cost Sharing Requirements - The changes to this chapter were updates and editorial style changes. Chapter 37.1 Support Service Contracting - Revisions were made to recognize performance based service acquisition. Other changes were updates and editorial style changes. Chapter39.1 Acquisitionof InformationResources- The changesto this chapterwere updates

391

Intelligent and adaptive crawling of Web applications for Web archiving  

E-Print Network (OSTI)

Abstract. Web sites are dynamic in nature with content and structure changing overtime. Many pages on the Web are produced by content management systems (CMSs) such as WordPress, vBulletin, or phpBB. Tools currently used by Web archivists to preserve the content of the Web blindly crawl and store Web pages, disregarding the CMS the site is based on (leading to suboptimal crawling strategies) and whatever structured content is contained in Web pages (resulting in page-level archives whose content is hard to exploit). We present in this paper an application-aware helper (AAH) that fits into an archiving crawl processing chain to perform intelligent and adaptive crawling of Web applications (e.g., the pages served by a CMS). Because the AAH is aware of the Web application currently crawled, it is able to refine the list of URLs to process and to extend the archive with semantic information about extracted content. To deal with possible changes in structure of Web applications, our AAH includes an adaptation module that makes crawling resilient to small changes in the structure of Web site. We show the value of our approach by comparing the output and efficiency of the AAH with respect to regular Web crawlers, also in the presence of structure change. 1

Muhammad Faheem; Pierre Senellart

2013-01-01T23:59:59.000Z

392

NNSA Policies | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

content > NNSA Policies content > NNSA Policies NNSA Policies Review the various NNSA and Department of Energy policies for additional information. Website Policy Accessibility The U.S. Department of Energy is committed to providing access to our Web pages for individuals with disabilities. To meet this commitment, this site is built to comply with the requirements of Section 508 of the Rehabilitation Act. Section 508 requires that individuals with disabilities, who are members of the public seeking information or services from us, have access to and use of information and data that is comparable to that provided to the public who are not individuals with disabilities, unless an undue burden would be imposed on us. Section 508 also requires us to ensure that Federal employees with disabilities have access to and use

393

CRB Policy Flashes | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CRB Policy Flashes CRB Policy Flashes CRB Policy Flashes In addition to granting certifications for DOE project management personnel, the Board is also tasked with developing and updating the policies that define the requisite knowledge, skills, and abilities needed to fulfill the Departmental mission for the effective management of capital asset projects as defined in DOE O 413.3B. To that end, the Board also establishes PMCDP certification requirements and publishes them in the Certification and Equivalency Guideline. In an effort to better inform the various participating program offices of changes within the PMCDP and the various certification requirements needed for each level of PMCDP certification, the Board publishes policy flash documents that are available for download here on the PMCDP Web site. New

394

Web worlds, web-colouring matrices, and web-mixing matrices  

E-Print Network (OSTI)

We introduce a new combinatorial object called a web world that consists of a set of web diagrams. The diagrams of a web world are generalizations of graphs, and each is built on the same underlying graph. Instead of ordinary vertices the diagrams have pegs, and edges incident to a peg have different heights on the peg. The web world of a web diagram is the set of all web diagrams that result from permuting the order in which endpoints of edges appear on a peg. The motivation comes from particle physics, where web diagrams arise as particular types of Feynman diagrams describing scattering amplitudes in non-Abelian gauge (Yang-Mills) theories. To each web world we associate two matrices called the web-colouring matrix and web-mixing matrix. The entries of these matrices are indexed by ordered pairs of web diagrams (D_1,D_2), and are computed from those colourings of the edges of D_1 that yield D_2 under a transformation determined by each colouring. We show that colourings of a web diagram (whose constituent ...

Dukes, Mark; Steingrimsson, Einar; White, Chris D

2013-01-01T23:59:59.000Z

395

Access Control Policy Tool (ACPT)  

Science Conference Proceedings (OSTI)

... In regard to cyber security, privacy, and information sharing, access control is one of the crucial elements in protecting the nation's critical IT ...

2013-01-15T23:59:59.000Z

396

WebWiseTclTk: A Safe-Tcl/Tk-based Toolkit Enhanced for the World Wide Web  

E-Print Network (OSTI)

The WebWiseTclTk toolkit is an enhancement of the existing feature set of Safe-Tcl and Safe-Tk that does not compromise security. The toolkit re-defines the functionality of the auto load mechanism in Tcl such that it works for packages located anywhere on the World Wide Web. It also re-introduces several commands not available in Safe-Tk such as toplevel and menu to provide a much richer feature set of Tk commands. The toolkit is written entirely in Safe-Tcl/Tk and uses the home policy for running applications as Tcl-plugins. The toolkit supports (1) creation of new Web-based Tcl applications with greatly enhanced functionality, and (2) migration of existing Tcl applications to the Web by merely writing an encapsulation script. We demonstrate the capabilities of the WebWiseTclTk toolkit by readily creating an encapsulation script for Web-based execution of the Tk Widget Demonstrations, distributed with the core Tcl/Tk.

Hemang Lavana; Franc Brglez

1998-01-01T23:59:59.000Z

397

Distributed Wind Policy Comparison Tool | Open Energy Information  

Open Energy Info (EERE)

Distributed Wind Policy Comparison Tool Distributed Wind Policy Comparison Tool Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Distributed Wind Policy Comparison Tool Focus Area: Renewable Energy Topics: Policy Impacts Website: www.eformativeoptions.com/distributed-wind-policy-comparison-tool-news Equivalent URI: cleanenergysolutions.org/content/distributed-wind-policy-comparison-to Language: English Policies: "Deployment Programs,Financial Incentives,Regulations" is not in the list of possible values (Deployment Programs, Financial Incentives, Regulations) for this property. DeploymentPrograms: Demonstration & Implementation Regulations: Feed-in Tariffs This Web-based tool allows users to identify policies that have had the most (and least) impact on improving the bottom line economics of wind

398

Fuel Economy Web Services  

NLE Websites -- All DOE Office Websites (Extended Search)

FuelEconomy.gov Web Services FuelEconomy.gov Web Services Data Description atvtype - alternative fuel or advanced technology vehicle Bifuel (CNG) - Bi-fuel gasoline and compressed natural gas vehicle Bifuel (LPG) - Bi-fuel gasoline and propane vehicle CNG - Compressed natural gas vehicle Diesel - Diesel vehicle EV - Electric vehicle FFV - Flexible fueled vehicle (gasoline or E85) Hybrid - Hybrid vehicle Plug-in Hybrid - Plug-in hybrid vehicle drive - drive axle type 2-Wheel Drive 4-Wheel Drive* 4-Wheel or All-Wheel Drive* All-Wheel Drive* Front-Wheel Drive Part-time 4-Wheel Drive* Rear-Wheel Drive *Prior to Model Year 2010 EPA did not differentiate between All Wheel Drive and Four Wheel Drive salesArea - EPA sales area code. The area of the country where the vehicle can legally be sold. New federally certified vehicles can be sold in all states except California

399

Spider Web Strength  

NLE Websites -- All DOE Office Websites (Extended Search)

Spider Web Strength Spider Web Strength Name: Lindsey Location: N/A Country: N/A Date: N/A Question: I need to know the stregth of a spider's thread for a science project but I can't find it anywhere. Replies: A major problem with this kind of question is that there are many different spiders and their silk can be quite different from one species to another. That may be one reason I couldn't find any specific numbers, the books I checked say "as strong as a steel thread of the same size," or "twice as strong as a steel thread of the same size," I don't know if that is going to be much help for a science project. The other thing that makes spider silk unique is that while it is super strong it can also stretch, some species as much as double length before breaking

400

Related Frog Web Pages  

NLE Websites -- All DOE Office Websites (Extended Search)

Related Web Pages on Frogs Related Web Pages on Frogs The images of the frog in this kit are computer-generated. For another approach, in which photos and movies are used to follow an actual frog dissection, see the University of Virginia's pages here. For a lot of kid-oriented information about frogs, see Frogland. For live frog lovers .... Sounds of North American Frogs (a CD from Smithsonian Folkways). The Exploratorium in San Francisco maintains an on-line exhibit on frogs. Don't Dissect a Frog, Build it is a section in Nicholas Negroponte's online version of Being Digital. For veterinary and conservation issues, see Association of Reptilian and Amphibian Veterinarians. And of course, The FROGGY Page Berkeley Lab | ACS | Notice to Users | Whole Frog Project | Virtual Frog Page last modified: 01/26/05

Note: This page contains sample records for the topic "web policies privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

The Curvaton Web  

E-Print Network (OSTI)

We discuss nontrivial features of the large scale structure of the universe in the simplest curvaton model proposed in our paper astro-ph/9610219. The amplitude of metric perturbations in this model takes different values in different parts of the universe. The spatial distribution of the amplitude looks like a web consisting of exponentially large cells. Depending on the relation between the cell size l_0 and the scale of the horizon l_H, one may either live in a part of the universe dominated by gaussian perturbations (inside a cell with l_0 >> l_H), or in the universe dominated by nongaussian perturbations (for l_0 web and anthropic considerations in the string theory landscape.

Andrei Linde; Viatcheslav Mukhanov

2005-11-28T23:59:59.000Z

402

Universe Adventure Web Standards  

NLE Websites -- All DOE Office Websites (Extended Search)

Universe Universe Adventure Web Standards for the Smart Physics Student Author: Patrick Lii - plii@ugastro.berkeley.edu Date: August 3, 2007 ABSTRACT You may be wondering: why are the Universe Adventure web standards so impor- tant? And why do I have to read this stupid document about them? The old versions of our site were plagued with messy (and faulty) coding: the pages were littered with broken links, missing images, broken flash files, and all sorts of other problems which made the site highly inaccessible. When we tried to fix these errors, we found that the coding was so incredibly messy that a simple edit like changing some of the words in a paragraph or adding an image took hours rather than minutes. In fact, the coding was so horrific that we simply constructed an entirely new site rather than making the laborious attempt to fix the old one. In order to make sure that future students working

403

Privacy and security issues in cloud computing: The role of institutions and institutional evolution  

Science Conference Proceedings (OSTI)

Cloud computing is likened and equated to the Industrial Revolution. Its transformational nature is, however, associated with significant security and privacy risks. This paper investigates how the contexts provided by formal and informal institutions ... Keywords: Cloud computing, Contradictions, Institutional changes, Institutions, Privacy and security, Trust production process

Nir Kshetri

2013-05-01T23:59:59.000Z

404

Resuscitating privacy-preserving mobile payment with customer in complete control  

Science Conference Proceedings (OSTI)

Credit/debit card payment transactions do not protect the privacy of the customer. Once the card is handed over to the merchant for payment processing, customers are "no longer in control" on how their card details and money are handled. This leads to ... Keywords: Customer centric payment model, Near field communication (NFC), Privacy, RFID, Secure mobile payment, Smartphone application

Divyan Munirathnam Konidala; Made Harta Dwijaksara; Kwangjo Kim; Dongman Lee; Byoungcheon Lee; Daeyoung Kim; Soontae Kim

2012-08-01T23:59:59.000Z

405

Privacy-preserving smart metering with regional statistics and personal enquiry services  

Science Conference Proceedings (OSTI)

In smart grid, households may send the readings of their energy usage to the utility and a third-party service provider which provides analyzed statistics data to users. User privacy becomes an important issue in this application. In this paper, we propose ... Keywords: authentication, privacy, smart metering

Cheng-Kang Chu; Joseph K. Liu; Jun Wen Wong; Yunlei Zhao; Jianying Zhou

2013-05-01T23:59:59.000Z

406

"Don't trust anyone": Privacy protection for location-based services  

Science Conference Proceedings (OSTI)

We present a decentralized approach that exploits the capability of mobile devices to form wireless personal ad-hoc networks in order to protect the privacy of users who access location-based services. The novelty of our approach is that users do not ... Keywords: Anonymity, Location-based service, Obfuscation, Privacy, Trust

Tanzima Hashem; Lars Kulik

2011-02-01T23:59:59.000Z

407

Legal concepts meet technology: a 50-state survey of privacy laws  

Science Conference Proceedings (OSTI)

Informational privacy consists of the ability to control how others use our personal information. Over the past several decades, we have lost a significant degree of control as a result of advances in information processing technology and the rise of ... Keywords: data disposal, data security, personally identifying information, privacy, state law

Miriam B. Russom; Robert H. Sloan; Richard Warner

2011-12-01T23:59:59.000Z

408

Genomic Research and Data-Mining Technology: Implications for Personal Privacy and Informed Consent  

Science Conference Proceedings (OSTI)

This essay examines issues involving personal privacy and informed consent that arise at the intersection of information and communication technology (ICT) and population genomics research. I begin by briefly examining the ethical, legal, and social ... Keywords: data mining, deCODE Genetics, distributional group profiles, epidemiology, genetic exceptionalism, genomic research, informed consent, non-distributional group profiles, personal privacy, population genomics

Herman T. Tavani

2004-03-01T23:59:59.000Z

409

My profile is my password, verify me!: the privacy/convenience tradeoff of facebook connect  

Science Conference Proceedings (OSTI)

We performed a laboratory experiment to study the privacy tradeoff offered by Facebook Connect: disclosing Facebook profile data to third-party websites for the convenience of logging in without creating separate accounts. We controlled for trustworthiness ... Keywords: facebook connect, privacy, user study

Serge Egelman

2013-04-01T23:59:59.000Z

410

Android and iOS users' differences concerning security and privacy  

Science Conference Proceedings (OSTI)

We compare Android and iOS users according to their demographic differences, security and privacy awareness, and reported behavior when installing apps. We present an exploratory study based on an online survey with more than 700 German students and ... Keywords: android, ios, iphone, personal data, privacy awareness, security awareness, smartphone

Zinaida Benenson; Freya Gassmann; Lena Reinfelder

2013-04-01T23:59:59.000Z

411

UDP: Usage-based Dynamic Pricing with Privacy Preservation for Smart Grid  

E-Print Network (OSTI)

UDP: Usage-based Dynamic Pricing with Privacy Preservation for Smart Grid Xiaohui Liang, Student for smart grid in a community environment, which enables the electricity price to correspond-preserving manner. Index Terms--Smart grid; dynamic price; privacy preserva- tion; community-specific I

Shen, Xuemin "Sherman"

412

EI04~ PRIVACY IMPACT ASSESSMENT: INL PeopleSoft Human Resource  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EI04~ PRIVACY IMPACT ASSESSMENT: INL PeopleSoft - Human Resource System PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT June 11, 2009 oep"rtrnental Element &Site Idaho National Laboratory (INL) Building Number: REC 608 Building Name: IORC Name 'of Infonnatlon System, or IT Project INL PeopleSoft - Human Resource System exhibit ProJect UID 157044 NewPIA D Update ~ _____ i DOE PIA - Peoplesoft Final.doc

413

"A Regulator's Privacy Guide to Third-Party Data Access for Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

"A Regulator's Privacy Guide to Third-Party Data Access for Energy "A Regulator's Privacy Guide to Third-Party Data Access for Energy Efficiency" Now Available "A Regulator's Privacy Guide to Third-Party Data Access for Energy Efficiency" Now Available January 4, 2013 - 9:32am Addthis The State and Local Energy Efficiency Action Network's (SEE Action) Customer Information and Behavior Working Group has released "A Regulator's Privacy Guide to Third-Party Data Access for Energy Efficiency." Funded by the Office of Electricity Delivery and Energy Reliability, the guide summarizes the range of approaches taken by states on privacy and security issues related to third-party access to customer data gathered under electric and gas ratepayer-funded energy efficiency programs and through mechanisms such as advanced metering infrastructure.

414

"A Regulator's Privacy Guide to Third-Party Data Access for Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

"A Regulator's Privacy Guide to Third-Party Data Access for Energy "A Regulator's Privacy Guide to Third-Party Data Access for Energy Efficiency" Now Available "A Regulator's Privacy Guide to Third-Party Data Access for Energy Efficiency" Now Available January 4, 2013 - 9:32am Addthis The State and Local Energy Efficiency Action Network's (SEE Action) Customer Information and Behavior Working Group has released "A Regulator's Privacy Guide to Third-Party Data Access for Energy Efficiency." Funded by the Office of Electricity Delivery and Energy Reliability, the guide summarizes the range of approaches taken by states on privacy and security issues related to third-party access to customer data gathered under electric and gas ratepayer-funded energy efficiency programs and through mechanisms such as advanced metering infrastructure.

415

Online query answering with differential privacy: a utility-driven approach using Bayesian inference  

E-Print Network (OSTI)

Data privacy issues frequently and increasingly arise for data sharing and data analysis tasks. In this paper, we study the problem of online query answering under the rigorous differential privacy model. The existing interactive mechanisms for differential privacy can only support a limited number of queries before the accumulated cost of privacy reaches a certain bound. This limitation has greatly hindered their applicability, especially in the scenario where multiple users legitimately need to pose a large number of queries. To minimize the privacy cost and extend the life span of a system, we propose a utility-driven mechanism for online query answering using Bayesian statistical inference. The key idea is to keep track of the query history and use Bayesian inference to answer a new query using previous query answers. The Bayesian inference algorithm provides both optimal point estimation and optimal interval estimation. We formally quantify the error of the inference result to determine if it satisfies t...

Xiao, Yonghui

2012-01-01T23:59:59.000Z

416

An Information-Theoretic Privacy Criterion for Query Forgery in Information Retrieval  

E-Print Network (OSTI)

In previous work, we presented a novel information-theoretic privacy criterion for query forgery in the domain of information retrieval. Our criterion measured privacy risk as a divergence between the user's and the population's query distribution, and contemplated the entropy of the user's distribution as a particular case. In this work, we make a twofold contribution. First, we thoroughly interpret and justify the privacy metric proposed in our previous work, elaborating on the intimate connection between the celebrated method of entropy maximization and the use of entropies and divergences as measures of privacy. Secondly, we attempt to bridge the gap between the privacy and the information-theoretic communities by substantially adapting some technicalities of our original work to reach a wider audience, not intimately familiar with information theory and the method of types.

Rebollo-Monedero, David; Forné, Jordi

2011-01-01T23:59:59.000Z

417

From RESTful Services to RDF: Connecting the Web and the Semantic Web  

E-Print Network (OSTI)

RDF data from Web resources . . . . . . . . . . . . . . .Contents 1 Introduction 2 Related Work 2.1 Semantic WebOWL-S: Semantic Markup for Web Services. Member Submission,

Alarcon, Rosa; Wilde, Erik

2010-01-01T23:59:59.000Z

418

Web Development Evolution: The Assimilation of Web Engineering Security  

E-Print Network (OSTI)

Glisson,W.B. Welland,R. 3rd Latin American Web Congress. c2005. Buenos Aires - Argentina: IEEE CS Press. IEEE Computer Society Press

Glisson, W.B.; Welland, R.; 3rd Latin American Web Congress.; c2005.; Buenos Aires - Argentina: IEEE CS Press.; IEEE Computer Society Press [More Details

419

POLICY CONTENT  

E-Print Network (OSTI)

March 31, 1999. It lists in alphabetical order the National Customs Rulings (NCR) that were made since the Memorandum was published. 2. Appendix B – Supplement 1 is a supplement to Appendix B of Memorandum D11-11-2. It presents the policy content of the more recent NCRs, which are listed by numerical order of tariff items for greater ease of reference.

Um D; National Customs Rulings (ncrs

1999-01-01T23:59:59.000Z

420

Towards purpose enforcement model for privacy-aware usage control policy in distributed healthcare  

Science Conference Proceedings (OSTI)

Enforcing the purpose of data usage means to ensure that data are used as it intends for and that excessive usage cannot happen. In general, the enforcement of purpose is a complicated task. The main difficulty is to identify the purpose of an agent ...

Annanda Thavymony Rath; Jean-Noël Colin

2013-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "web policies privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Policy implications of ubiquitous technologies in the car : privacy, data ownership, and regulation  

E-Print Network (OSTI)

Motor vehicle travel is the primary means of transportation in the United States, providing freedom in travel and enterprise for many people. However, motor vehicle accidents are the largest component of unintentional ...

Narváez Bustamante, Alex Fernando

2006-01-01T23:59:59.000Z

422

PIA - HS Web Services (HSWS) | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Web Services (HSWS) PIA - HS Web Services (HSWS) PIA - HS Web Services (HSWS) PIA - HS Web Services (HSWS) More Documents & Publications PIA - INL PeopleSoft - Human Resource...

423

PIA - Fossil Energy Web System (FEWEB) | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Fossil Energy Web System (FEWEB) PIA - Fossil Energy Web System (FEWEB) PIA - Fossil Energy Web System (FEWEB) PIA - Fossil Energy Web System (FEWEB) More Documents & Publications...

424

An Intelligent SQL Tutor on the Web  

Science Conference Proceedings (OSTI)

The paper presents SQLT-Web, a Web-enabled intelligent tutoring system for the SQL database language. SQLT-Web is a Web-enabled version of an earlier, standalone ITS. In this paper we describe how the components of the standalone system were reused to ... Keywords: Web-based ITS, architectures for adaptive and intelligent Web-based educational systems, empirical studies of Web-based adaptive and intelligent educational systems, intelligent problem solving support via the Web, student modelling and student model servers in the Web context

Antonija Mitrovic

2003-04-01T23:59:59.000Z

425

Renewable Energy Terms of Reference: Laws, Policies and Regulations | Open  

Open Energy Info (EERE)

form form View source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit with form History Facebook icon Twitter icon » Renewable Energy Terms of Reference: Laws, Policies and Regulations Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Renewable Energy Terms of Reference: Laws, Policies and Regulations Agency/Company /Organization: World Bank Sector: Energy Focus Area: Renewable Energy Topics: Policies/deployment programs Website: web.worldbank.org/WBSITE/EXTERNAL/TOPICS/EXTENERGY2/EXTRENENERGYTK/0,, References: Renewable Energy Terms of Reference: Laws, Policies and Regulations[1] Resources Sustainable Service Delivery Model Through Distributed Renewable

426

Special Topics: Nanomaterials: Web resources  

Science Conference Proceedings (OSTI)

WEB: Material Innovations: from Nanotech to Biotech and Beyond! Presentations from the 2007 ACS Presidential Session, 0, 759, Todd Osman, 1/9/2008 7:45 ...

427

Data Integration using Web Services  

E-Print Network (OSTI)

In this paper we examine the opportunities for data integration in the context of the emerging Web Services systems development paradigm. The paper introduces the ...

Hansen, Mark

2003-02-10T23:59:59.000Z

428

WebMetrics: Technical Overview  

Science Conference Proceedings (OSTI)

VUG Home Page NIST Web Metrics Technical Overview. Technical Overview. NIST Logo. Good usability is critical to the success of a website. ...

429

Inflation in a Web  

E-Print Network (OSTI)

In a given path with multiple branches, in principle, it can be expected that there are some fork points, where one branch is bifurcated into different branches, or various branches converge into one or several branches. In this paper, it is showed that if there is a web formed by such branches in a given field space, in which each branch can be responsible for a period of slow roll inflation, a multiverse separated by domain wall network will come into being, some of which might corresponds to our observable universe. We discuss this scenario and show possible observations of a given observer at late time.

Sheng Li; Yang Liu; Yun-Song Piao

2009-06-19T23:59:59.000Z

430

ITL Bulletin - ITL Publishes Security And Privacy Controls For ...  

Science Conference Proceedings (OSTI)

... derived from legislation, Executive Orders, policies, directives, regulations, standards, and ... organizations is for information only; it does not imply ...

2013-05-01T23:59:59.000Z

431

U-020: McAfee Web Gateway Web Access Cross Site Scripting Vulnerabilit...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability U-020: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability October 26, 2011 - 9:00am Addthis...

432

Three web accessibility evaluation perspectives for RIA  

Science Conference Proceedings (OSTI)

With the increasing popularity of Rich Internet Applications (RIAs), several challenges arise in the area of web accessibility evaluation. A particular set of challenges emerges from RIAs dynamic nature: original static Web specifications can change ... Keywords: automated evaluation, web accessibility, web browser processing, web science

Nádia Fernandes, Ana Sofia Batista, Daniel Costa, Carlos Duarte, Luís Carriço

2013-05-01T23:59:59.000Z

433

Composition and evaluation of trustworthy web services  

Science Conference Proceedings (OSTI)

Web service technology seamlessly enables integration of different software to fulfil dynamic business demands in a platform-neutral fashion. By means of standard interfaces, service requesters can obtain their desired functionalities through certain ... Keywords: Petri nets, composite web services, ontology, trust, trustworthy web services, web service composition, web service evaluation

Stephen J. H. Yang; James S. F. Hsieh; Blue C. W. Lan; Jen-Yao Chung

2006-02-01T23:59:59.000Z

434

Distributed Wind Policy Comparison Tool Guidebook  

DOE Green Energy (OSTI)

Power through Policy: 'Best Practices' for Cost-Effective Distributed Wind is a U.S. Department of Energy (DOE)-funded project to identify distributed wind technology policy best practices and to help policymakers, utilities, advocates, and consumers examine their effectiveness using a pro forma model. Incorporating a customized feed from the Database of State Incentives for Renewables and Efficiency (DSIRE), the Web-based Distributed Wind Policy Comparison Tool (Policy Tool) is designed to assist state, local, and utility officials in understanding the financial impacts of different policy options to help reduce the cost of distributed wind technologies. The Policy Tool can be used to evaluate the ways that a variety of federal and state policies and incentives impact the economics of distributed wind (and subsequently its expected market growth). It also allows policymakers to determine the impact of policy options, addressing market challenges identified in the U.S. DOE's '20% Wind Energy by 2030' report and helping to meet COE targets.

Not Available

2011-11-01T23:59:59.000Z

435

Website Policies and Important Links | OSTI, US Dept of Energy, Office of  

Office of Scientific and Technical Information (OSTI)

Website Policies and Important Links Website Policies and Important Links This page provides a comprehensive overview of the policies of this federally sponsored website, consistent with guidance established by the U.S. Office of Management and Budget (OMB) as implemented by the U.S. Department of Energy. Disclaimer Acceptable Use Policy User Privacy Copyright, Restrictions, and Permissions Notice Accessibility/Section 508 Website Security Linking to OSTI Website Linking to Outside Websites Data Rights Freedom of Information Information Quality No Fear Act Schedule for Posting Information Comments Policy USAJOBS Grants Regulations USA.gov Disclaimer This system is made available by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any

436

REVISION POLICY  

U.S. Energy Information Administration (EIA) Indexed Site

REVISION POLICY REVISION POLICY March 2007 Data are collected at the million cubic feet per month level and all calculations mentioned below are carried out at that precision. However, the data published in the Form EIA-914 Monthly Gas Production Report are rounded to the nearest 0.01 billion cubic feet per day (roughly 300 million cubic feet per month). Monthly estimates of gross production published in the Natural Gas Monthly at the national level are rounded to billion cubic feet and those for marketed production at the State level are rounded to million cubic feet. The prior month's production estimate will always be revised each month, when the production estimate for the latest data month is released. For example, a June estimate would be revised when a July estimate is released.

437

POLICY CONCLUSIONS  

E-Print Network (OSTI)

With the increased integration of the global economy, there has been a rising concern over the effects of trade policy on the environment. Recent research has shown that trade liberalisation can act as a ‘magnifier ’ of governance problems in the forest sector if the regulatory and institutional capacity is weak. Recognising this risk, the US-Peru free trade agreement includes a binding Forest Annex, which specifies numerous measures to strengthen the legal and institutional framework of Peru’s forest sector. The Forest Annex also outlines an innovative rule-based, bi-national verification system, which may be of wider relevance in the debate about verification systems design. This paper explores the challenges of this innovative environmental addition to trade policy, and considers implications for forest governance in Peru.

Bernardo Ortiz-von Halle; Braulio Buendía; Chen Hin Keong

2009-01-01T23:59:59.000Z

438

C4PS - helping facebookers manage their privacy settings  

Science Conference Proceedings (OSTI)

The ever increasing popularity of Online Social Networks has left a wealth of personal data on the web, accessible for broad and automatic retrieval. Protection from undesired recipients and harvesting by crawlers is implemented by access control, manually ...

Thomas Paul; Martin Stopczynski; Daniel Puscher; Melanie Volkamer; Thorsten Strufe

2012-12-01T23:59:59.000Z

439

"Dark Web: Exploring and Min-ing the Dark Side of the Web"  

E-Print Network (OSTI)

Title: "Dark Web: Exploring and Min- ing the Dark Side of the Web" Speaker: Director, Prof will review the emerging research in Terrorism Informatics based on a web mining perspective. Recent progress in the internationally re- nowned Dark Web project will be reviewed, including: deep/dark web spider- ing (web sites

Michelsen, Claus

440

What's new on the web?: the evolution of the web from a search engine perspective  

Science Conference Proceedings (OSTI)

We seek to gain improved insight into how Web search engines shouldcope with the evolving Web, in an attempt to provide users with themost up-to-date results possible. For this purpose we collectedweekly snapshots of some 150 Web sites over the course ... Keywords: change prediction, degree of change, link structure evolution, rate of change, search engines, web characterization, web evolution, web pages

Alexandros Ntoulas; Junghoo Cho; Christopher Olston

2004-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "web policies privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Topic: Regulatory & Policy Recommendations  

Science Conference Proceedings (OSTI)

... Regulatory & Policy Recommendations. The impact of regulations and policies on the manufacturing industry in areas such as tax, energy, trade ...

2013-11-19T23:59:59.000Z

442

arXiv.org help - Web Accessibility  

NLE Websites -- All DOE Office Websites (Extended Search)

Web Accessibility The arXiv.org web site is designed to work on the largest possible set of browsers and platforms, and to be accessible to users with disabilities. Our web pages...

443

Cohesion Web Interface to EmStar  

E-Print Network (OSTI)

Networked Sensing Cohesion: Web Interface to EmStar SaharSolution: Easy to Use Web Interface Title of Interface:of CGI-based World Wide Web applications. Common Gateway

Sahar Kashef; Jia Ning (Jane) Qu; Karen Weeks

2005-01-01T23:59:59.000Z

444

Thin film-coated polymer webs  

DOE Patents (OSTI)

The present invention relates to thin film-coated polymer webs, and more particularly to thin film electronic devices supported upon a polymer web, wherein the polymer web is treated with a purifying amount of electron beam radiation.

Wenz, Robert P. (Cottage Grove, MN); Weber, Michael F. (Shoreview, MN); Arudi, Ravindra L. (Woodbury, MN)

1992-02-04T23:59:59.000Z

445

Web Services for Recovery.gov  

E-Print Network (OSTI)

established and widely supported Web technologies such asof Information Report 2009-035 Web Services for Recovery.govof Recovery.gov as a user-friendly Web site and hence most

Wilde, Erik; Kansa, Eric C; Yee, Raymond

2009-01-01T23:59:59.000Z

446

Keeping Up with the Changing Web  

Science Conference Proceedings (OSTI)

Because information depreciates over time, keeping Web pages current presents new design challenges. This article quantifies what "current" means for Web search engines and estimates how often they must reindex the Web to keep current with its changing ...

Brian E. Brewington; George Cybenko

2000-05-01T23:59:59.000Z

447

Archiving the relaxed consistency web  

Science Conference Proceedings (OSTI)

The historical, cultural, and intellectual importance of archiving the web has been widely recognized. Today, all countries with high Internet penetration rate have established high-profile archiving initiatives to crawl and archive the fast-disappearing ... Keywords: consistency, digital preservation, social network, web archiving

Zhiwu Xie, Herbert Van de Sompel, Jinyang Liu, Johann van Reenen, Ramiro Jordan

2013-10-01T23:59:59.000Z

448

A framework for web science  

Science Conference Proceedings (OSTI)

This text sets out a series of approaches to the analysis and synthesis of the World Wide Web, and other web-like information structures. A comprehensive set of research questions is outlined, together with a sub-disciplinary breakdown, emphasising the ...

Tim Berners-Lee; Wendy Hall; James A. Hendler; Kieron O'Hara; Nigel Shadbolt; Daniel J. Weitzner

2006-01-01T23:59:59.000Z

449

Information retrieval on the web  

Science Conference Proceedings (OSTI)

In this paper we review studies of the growth of the Internet and technologies that are useful for information search and retrieval on the Web. We present data on the Internet from several different sources, e.g., current as well as projected number ... Keywords: Internet, World Wide Web, clustering, indexing, information retrieval, knowledge management, search engine

Mei Kobayashi; Koichi Takeda

2000-06-01T23:59:59.000Z

450

Domain bias in web search  

Science Conference Proceedings (OSTI)

This paper uncovers a new phenomenon in web search that we call domain bias --- a user's propensity to believe that a page is more relevant just because it comes from a particular domain. We provide evidence of the existence of domain bias in click activity ... Keywords: domain bias, user behavior, web search

Samuel Ieong; Nina Mishra; Eldar Sadikov; Li Zhang

2012-02-01T23:59:59.000Z

451

Redesigned ORNL DAAC Web Site  

NLE Websites -- All DOE Office Websites (Extended Search)

released a major revision to its Web site on Thursday, released a major revision to its Web site on Thursday, May 27, 2010. The new site includes many enhancements aimed at helping users locate and obtain data products and services. The simplified menu bar allows users to navigate quickly to products and services of interest and to access data through a variety of tools. The DAAC's Web site address remains unchanged (http://daac.ornl.gov), and as always, our products and services are available free of charge. Please note that your user account information will work on the new Web site. The Sign-in and Registration pages have a different look and will accept your email address as the User Name and retain your current password. If you have any problems accessing, signing-in, or registering with our new Web site, please contact our User Services Office, at +1 (865) 241-3952, or

452

Stakeholder Engagement and Outreach: Policy Resources and Tools  

Wind Powering America (EERE)

Policy Resources and Tools Policy Resources and Tools This page lists wind-related policy resources and tools such as publications, Web resources, and news. Search the Stakeholder Engagement and Outreach initiative's Database Choose a Type of Information All News Publications Web Resource Videos Choose # of Records per Page Default (10 per page) 5 25 50 To search the titles, enter a word or phrase. Start Search Clear Contents Total of 120 records found. Page 1 of 24, Sorted by descending date Filtered by: Policy 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 Next Page >> Date sort by ascending date sort by descending date State sort by ascending state sort by descending state Type of Information Program Area Title sort by ascending title sort by descending title

453

TO: Procurement Directors FROM: Director, Contract and Financial Assistance Policy Division  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

POLICY FLASH 2013-58 POLICY FLASH 2013-58 DATE: June 5, 2013 TO: Procurement Directors FROM: Director, Contract and Financial Assistance Policy Division Office of Policy Office of Acquisition and Project Management SUBJECT: Revised Guide for Financial Assistance SUMMARY: Attached is a revised Guide for Financial Assistance. The Guide has been updated to reflect changes to web sites, organization names, systems, and DOE policies and practices since the guide was last issued. The revision date has been inserted in the section heading for all sections that had substantive changes (not just web site or organization name changes). This flash and its attachments may be viewed at http://management.energy.gov/policy_guidance/policy_flashes.htm.

454

Land Validation web site  

NLE Websites -- All DOE Office Websites (Extended Search)

graphs and more worldwide NPP datasets graphs and more worldwide NPP datasets Graphs of biomass dyanmics and climate data for grassland sites have been added to the global terrestrial Net Primary Production (NPP) reference database at the ORNL DAAC. The NPP database has been compiled by Dick Olson and Jonathan Scurlock under the auspices of the International Geosphere-Biosphere Programme and funding from the Terrestrial Ecology Program of NASA's Office of Earth Science. Browsing through the graphs will help users to select data of interest, and to see relationships between grassland biomass changes and driving climate variables such as rainfall. Graphs are presently available for 14 of the 31 grassland sites. In addition, two more well-known worldwide datasets are available for browsing and downloading from the ORNL DAAC's NPP Web pages. The Osnabruck

455

BNL Web Communication Standards and Guidelines  

NLE Websites -- All DOE Office Websites (Extended Search)

Other Formatting User Accessible Styles Adding Images Layout Options Creating Effective Web Content Dynamic Info Modules Web Author Glossary Template Examples Unix Templates...

456

RussiaSNL2-web.indd  

National Nuclear Security Administration (NNSA)

high-current z-pinch driver. Russian Electromagnetic Pulse Generator Modifi ed for the Web Modifi ed for the Web Russian Electromagnetic Pulse Generator Collaboration between...

457

Darboux cyclides and webs from circles  

Science Conference Proceedings (OSTI)

Motivated by potential applications in architecture, we study Darboux cyclides. These algebraic surfaces of order =Keywords: Architectural geometry, Darboux cyclide, Geometry of webs, Möbius geometry, Web from circles

Helmut Pottmann; Ling Shi; Mikhail Skopenkov

2012-01-01T23:59:59.000Z

458

WebCAT: Installation Instructions for Windows  

Science Conference Proceedings (OSTI)

... Requirements, WebCAT can be installed on Windows systems running IIS, PWS, or Apache web servers and on Unix systems running Apache. ...

459

EERE: Golden Field Office - Search Results Page  

NLE Websites -- All DOE Office Websites (Extended Search)

CD-ROM Printable Version Skip footer navigation to end of page. U.S. Department of Energy | EERE Home | NETL Home Webmaster | Web Site Policies | Security & Privacy | USA.gov...

460

The Role of Narcissism on Concerns for SNS Privacy: Vulnerable Narcissism in Threatening Situations.  

E-Print Network (OSTI)

??This study aims to identify psychological factors that predict one’s likelihood to disengage with privacy-threatening activities on Social Networking Sites (SNS). Particularly, it pays special… (more)

Kwolek, Elizabeth A.

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "web policies privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Evaluating Laplace Noise Addition to Satisfy Differential Privacy for Numeric Data  

Science Conference Proceedings (OSTI)

Laplace noise addition is often advanced as an approach for satisfying differential privacy. There have been several illustrations of the application of Laplace noise addition for count data, but no evaluation of its performance for numeric data. In ...

Rathindra Sarathy; Krishnamurty Muralidhar

2011-04-01T23:59:59.000Z

462

Proceedings of the 3rd symposium on Usable privacy and security  

Science Conference Proceedings (OSTI)

Welcome to the Third Symposium On Usable Privacy and Security! This year's program features 13 technical papers, a workshop, two tutorials, 16 posters, a panel, three discussion sessions, and an invited talk. Continuing the tradition of interesting SOUPS ...

Lorrie Faith Cranor

2007-07-01T23:59:59.000Z

463

NBP RFI: Data Access, Third Party Use and Privacy- Comments of Utilities  

NLE Websites -- All DOE Office Websites (Extended Search)

Use and Privacy- Comments of Use and Privacy- Comments of Utilities Telecom Council NBP RFI: Data Access, Third Party Use and Privacy- Comments of Utilities Telecom Council The Utilities Telecom Council hereby comments in response to the Department of Energy (DOE) request for information on data access, third party use, and privacy. In summary, UTC submits that the innovative deployment by energy utilities of smart meters and smart control systems will create a smart energy grid that will unlock the value of what has been called the Energy Information Economy2. Smart energy grids will create an environment in which consumers will have greater abilities to manage their own energy usage and utilities will have new tools to affect grid-wide energy efficiencies never before possible. The key to all this is data. How to provide secure access to it

464

DEPARTMENT OF ENERGY DATA ACCESS AND PRIVACY ISSUES RELATED TO SMART GRID  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DEPARTMENT OF ENERGY DEPARTMENT OF ENERGY DATA ACCESS AND PRIVACY ISSUES RELATED TO SMART GRID TECHNOLOGIES October 5, 2010 i TABLE OF CONTENTS INTRODUCTION AND EXECUTIVE SUMMARY.................................................................... 1 Overview of Data Access and Privacy Concerns ....................................................................... 2 Summary of Recommendations .................................................................................................. 3 KEY FINDINGS ............................................................................................................................. 4 Consumer education and flexibility in both technology and pace of deployment will be critical to the long-term success of Smart Grid technologies. ................................................................ 7

465

Cyber Security and Privacy Landscape of the Electric Sector: Release 2  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies, such as the Department of Energy (DOE), the Department of Homeland Security (DHS), the Department of Defense (DOD), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the eff...

2012-07-02T23:59:59.000Z

466

Assessment of Technology Used to Protect the Privacy of Energy Usage Data  

Science Conference Proceedings (OSTI)

This EPRI Technical Update Report discusses proposed privacy enhancing technologies (PETs) that are applicable to advanced metering infrastructure (AMI) deployments.BackgroundNew laws are beginning to come into effect in California and Colorado in the United States and in European countries such as Germany. Ohio and the European Commission are contemplating additional laws.Potential privacy problems arise from the granularity and detail of ...

2012-12-31T23:59:59.000Z

467

Cyber Security and Privacy Landscape of the Electric Sector, Release 5  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2013-03-27T23:59:59.000Z

468

Working Paper #70 Smart-Grid Policies: An International Review  

E-Print Network (OSTI)

The electric power systems of many industrialized nations are challenged by the need to accommodate distributed renewable generation, increasing demands of a digital society, growing threats to infrastructure security, and concerns over global climate disruption. The “smart grid ” – with a two-way flow of electricity and information between utilities and consumers – can help address these challenges, but various financial, regulatory, and technical obstacles hinder its rapid deployment. An overview of experiences with smart-grids policies in pioneering countries shows that many governments have designed interventions to overcome these barriers and to facilitate grid modernization. Smart-grid policies include a new generation of regulations and finance models such as regulatory targets, requirements for data security and privacy, renewable energy credits, and various interconnection tariffs and utility subsidies. *Corresponding author:

Marilyn A. Brown; Shan Zhou; Dr. Marilyn; A. Brown; D. M. Smith Building

2012-01-01T23:59:59.000Z

469

Microsoft Word - DOE comments privacy - 7-6 _2_.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DEPARTMENT OF ENERGY In the Matter of Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy ) ) ) ) ) ) ) COMMENTS OF VERIZON AND VERIZON WIRELESS The development and deployment of smart grid technology hold tremendous promise towards improving the efficiency and reliability of our nation's energy systems and empowering consumers to make better decisions about the use of electricity. Because effective communications networks will be central to the success of smart grid technology, Verizon is working closely with utilities, the developers of energy management systems, and others to use its extensive wireline and wireless broadband networks and related expertise to quickly and efficiently realize the promise of smart grid

470

Overview: Office of the Chief Privacy Officer Security-Related ...  

Science Conference Proceedings (OSTI)

... Security Policy in Some Key Health Related Regulations Other than HIPAA DRAFT 4 ... 5 Security in Medicare Medicaid EHR Incentives Program ...

2012-06-05T23:59:59.000Z

471

WebUml: reverse engineering of web applications  

Science Conference Proceedings (OSTI)

Web applications have become complex and crucial for many firms, especially when combined with areas such as CRM (Customer Relationship Management) and BPR (Business Process Reengineering). Since then the scientific community has focused attention to ...

Carlo Bellettini; Alessandro Marchetto; Andrea Trentini

2004-03-01T23:59:59.000Z

472

RESTful Web Services at BNL  

Science Conference Proceedings (OSTI)

RESTful (REpresentational State Transfer) web services are an alternative implementation to SOAP/RPC web services in a client/server model. BNLs IT Division has started deploying RESTful Web Services for enterprise data retrieval and manipulation. Data is currently used by system administrators for tracking configuration information and as it is expanded will be used by Cyber Security for vulnerability management and as an aid to cyber investigations. This talk will describe the implementation and outstanding issues as well as some of the reasons for choosing RESTful over SOAP/RPC and future directions.

Casella, R.

2011-06-14T23:59:59.000Z

473

An empirical study on the change of web pages  

Science Conference Proceedings (OSTI)

As web pages are created, destroyed, and updated dynamically, web databases should be frequently updated to keep web pages up-to-date. Understanding the change behavior of web pages certainly helps the administrators manage their web databases. This ...

Sung Jin Kim; Sang Ho Lee

2005-03-01T23:59:59.000Z

474

Grid Renewable Energy-Policy and Regulatory Studies | Open Energy  

Open Energy Info (EERE)

Policy and Regulatory Studies Policy and Regulatory Studies Jump to: navigation, search Tool Summary Name: Grid Renewable Energy-Policy and Regulatory Studies Agency/Company /Organization: World Bank Sector: Energy Topics: Policies/deployment programs, Co-benefits assessment, Background analysis Website: web.worldbank.org/WBSITE/EXTERNAL/TOPICS/EXTENERGY2/EXTRENENERGYTK/0,, Country: Nicaragua, China, Mexico, Peru Central America, Eastern Asia, Central America, South America References: Grid Renewable Energy-Policy and Regulatory Studies[1] Resources Independent Evaluation of the ILZRO/RAPS Diesel/PV Hybrid System in Padre Cocha, the Amazon Region of Peru (CONSOLIDATED SUMMARY) Evaluating Impacts of Air Pollution in China on Public Health: Implications for Future Air Pollution and Energy Policies, Xiaoping Wang

475

General Renewable Energy-Policy and Regulatory Studies | Open Energy  

Open Energy Info (EERE)

General Renewable Energy-Policy and Regulatory Studies General Renewable Energy-Policy and Regulatory Studies Jump to: navigation, search Tool Summary LAUNCH TOOL Name: General Renewable Energy-Policy and Regulatory Studies Agency/Company /Organization: World Bank Sector: Energy Focus Area: Renewable Energy Topics: Implementation, Policies/deployment programs Website: web.worldbank.org/WBSITE/EXTERNAL/TOPICS/EXTENERGY2/EXTRENENERGYTK/0,, References: General Renewable Energy-Policy and Regulatory Studies[1] Resources Regulator's Handbook on Renewable Energy Programs & Tariffs, The Center for Resource Solutions. Conference Issue Paper, Renewables 2004, International Conference for Renewable Energies Electricity, Renewables and Climate Change: Searching for a Cost-Effective Policy, Karen Palmer and Dallas Burtraw, Resources for the

476

Zero-knowledge device authentication: Privacy & security enhanced RFID preserving business value and consumer convenience  

E-Print Network (OSTI)

expected to enhance the operational efficiency of supply chain processes and customer service as well as adding digital functionality to products that were previously non-digital such as, e.g., washing machines automatically adapting to the clothes put into the machine. However, consumer response clearly shows significant concern and resistance related to consumer tracking and profiling as well as problems related to government tracking, criminal or terrorist abuse etc. Multiple conferences warn that RFID take-up is likely dependant on solving the privacy and security problems early. These concerns are not adequately addressed by current technology and legislation. In this paper, we present a model of the lifecycle of RFID tags used in the retail sector and identify the different actors who may interact with a tag. The lifecycle model is analysed in order to identify potential threats to the privacy of consumers and define a threat model. We suggest that the in-store problem is more related to lack of privacy solutions for the consumer himself than for the RFID. We propose a solution to the RFID privacy problem, which through zero-knowledge protocols and consumer control of keys has the potential to ensure consumer privacy needs without reducing corporate value from utilising the potential of RFID. We propose that securing RFIDs will require a physical redesign of RFIDs but that this can be done without leaving security and privacy issues to consent or regulation.

Stephan J. Engberg; Morten B. Harning; Christian Damsgaard Jensen

2004-01-01T23:59:59.000Z

477

1.2 ADDITIONAL RESOURCES FOR CSM POLICIES AND PROCEDURES CSM Faculty Handbook  

E-Print Network (OSTI)

1.2 ADDITIONAL RESOURCES FOR CSM POLICIES AND PROCEDURES CSM Faculty Handbook: The Board employment in the CSM Faculty Handbook, and especially within Part II of that Handbook. The most current version of the Faculty Handbook is maintained on the Academic Policies web site at http

478

Department of Energy to Host Spectrum Policy Seminar for the Utility Sector  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to Host Spectrum Policy Seminar for the to Host Spectrum Policy Seminar for the Utility Sector on December 8, 2010 Department of Energy to Host Spectrum Policy Seminar for the Utility Sector on December 8, 2010 November 17, 2010 - 7:09pm Addthis On October 5, 2010, after an extensive public notice and comment process, the Department of Energy (DOE) issued a report entitled, "Communications Requirements of Smart Grid Technologies". The complete text of the report, and of a second report addressing data access and privacy issues arising from the deployment of smart grid technologies, can be found here. One recommendation in the report was to provide more information to the utility sector on spectrum policy issues in light of the role wireless communications will surely play in the deployment of smart grid

479

Building Energy-Efficiency Best Practice Policies and Policy...  

NLE Websites -- All DOE Office Websites (Extended Search)

Building Energy-Efficiency Best Practice Policies and Policy Packages Title Building Energy-Efficiency Best Practice Policies and Policy Packages Publication Type Report Year of...

480

Web Development Manual Curtin IT Services  

E-Print Network (OSTI)

Web Development Manual Curtin IT Services Document: IS-EOT-0003-D0.3 Web Development Manual Authors Release Date: May 2003 Updated: 15 December 2008 Version: V2.1 #12;Curtin Web Development Manual Page 2.................................................................................................................................... 5 Curtin web publishing mandatory elements

Note: This page contains sample records for the topic "web policies privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

EndNote Web Brief Guide  

E-Print Network (OSTI)

EndNote Web Brief Guide Victoria T. Kok Head, Veterinary Medical Library Virginia Polytechnic Institute & State University February 2010 #12;CREATING AN ENDNOTE WEB ACCOUNT Through Web-of-Knowledge: · GototheLibraryHomepagehttp://www.lib.vt.eduandlocatetheWebofKnowledge database. · ClickonMyEndnoteWeb

Wynne, Randolph H.

482

Cultural Signifiers of Web Site Images  

Science Conference Proceedings (OSTI)

Web sites rely on pictures and animation to convey subtle messages that are more effectively communicated nonverbally. We argue that such messages could have strong cultural content, which should be understood in developing Web sites. Hence, this paper ... Keywords: Cultural Signifiers, Grounded Theory, Hofstede'S Cultural Dimensions, Semiology, Web Site Images, Web-Image Signifiers Theory

Fatemeh Zahedi; Gaurav Bansal

2011-07-01T23:59:59.000Z

483

Standards for image annotation using Semantic Web  

Science Conference Proceedings (OSTI)

The impetus behind Semantic Web research remains the vision of supplementing availability with utility; that is, the World Wide Web provides availability of digital media, but the Semantic Web will allow presently available digital media to be used in ... Keywords: Annotation, Image gallery, Ontology, Semantic Web

Latifur Khan

2007-02-01T23:59:59.000Z

484

Evolution of web site design patterns  

Science Conference Proceedings (OSTI)

The Web enables broad dissemination of information and services; however, the ways in which sites are designed can either facilitate or impede users' benefit from these resources. We present a longitudinal study of web site design from 2000 to 2003. ... Keywords: World Wide Web, accessibility, automated usability evaluation, design guidelines, empirical studies, usability, web site design

Melody Y. Ivory; Rodrick Megraw

2005-10-01T23:59:59.000Z

485

Estimating the Change of Web Pages  

Science Conference Proceedings (OSTI)

This paper presents the estimation methods computing the probabilities of how many times web pages are downloaded and modified, respectively, in the future crawls. The methods can make web database administrators avoid unnecessarily requesting undownloadable ... Keywords: web database administration, web page change estimation

Sung Jin Kim; Sang Ho Lee

2007-05-01T23:59:59.000Z

486

SVG web environment for z specification language  

Science Conference Proceedings (OSTI)

This paper presents a web environment for the Z formal specification language using the Scalable Vector Graphics (SVG) technology. The Z Specification Web Editor (ZSWE) is the first prototype of a web based graphical editor for the Z specification language. ... Keywords: Z formal specification language, scalable vector graphics, web based tool support

Jing Sun; Hai Wang; Sasanka Athauda; Tazkiya Sheik

2005-11-01T23:59:59.000Z

487

World Wide Web Information Servers  

NLE Websites -- All DOE Office Websites (Extended Search)

World Wide Web Information Servers World Wide Web Information Servers Lawrence Berkeley Laboratory recently announced a gopher and World Wide Web site. To get to the web site, telnet to www.lbl.gov, login: www. Access is provided to LBL's gopher, library catalog, and publication list. The Center is funding the implementation of a WWW network node for on-line access to publications, databases, and documents full of hypermedia links to other documents or information systems from the Energy & Environment Division. Full implementation is expected by May 1994, and will include access to a variety of information from all the research programs and centers. The technology transfer project calls for this newsletter to be published on WWW using the Mosaic interface under development at the National Center

488

Basic EETD Web Page Design  

NLE Websites -- All DOE Office Websites (Extended Search)

Basic EETD Web Page Design Speaker(s): Eve Edelson Date: May 27, 2005 - 12:00pm Location: Bldg. 90 Seminar HostPoint of Contact: Allan Chen This talk will provide information...

489

BNL Web Services -- Contact Us  

NLE Websites -- All DOE Office Websites (Extended Search)

about employment at Broookhaven Lab question about a specific job posting Platform -- Web Browser Other -- Not Listed Windows XP -- Firefox 1.0 Windows XP -- Mozilla 1.7 Windows...

490

fall2009_web.indd  

NLE Websites -- All DOE Office Websites (Extended Search)

structures. Dur- ing this portion of the project, ESRI's 3-D Technical Services Group web conferenced into a few classes to provide training and support in the art of 3-D...

491

World Wide Web Without Walls  

E-Print Network (OSTI)

Today's Web is built upon a particular symbiotic relationship betweensites and users: the sites invest capital to create and market a setof features, and users gain access to the sites often in exchange fortheir data (e.g., ...

Brodsky, Micah

2007-08-24T23:59:59.000Z

492

Information Retrieval and Web Search  

E-Print Network (OSTI)

63 Information Retrieval and Web Search Amy N. Langville The College of Charleston Carl D. MeyerRank ................................. 63-10 References ................................................ 63-14 Information retrieval collections. Traditional information retrieval is search within small, controlled, nonlinked collections (e

Meyer, Carl

493

Managing change on the web  

Science Conference Proceedings (OSTI)

Increasingly, digital libraries are being defined that collect pointers to World-Wide Web based resources rather than hold the resources themselves. Maintaining these collections is challenging due to distributed document ownership and high fluidity. ... Keywords: Walden's path, path maintenance

Luis Francisco-Revilla; Frank Shipman; Richard Furuta; Unmil Karadkar; Avital Arora

2001-01-01T23:59:59.000Z

494

Goal-oriented Web search  

E-Print Network (OSTI)

We have designed and implemented a Goal-oriented Web application to search videos, images, and news by querying YouTube, Truveo, Google and Yahoo search services. The Planner module decomposes functionality in Goals and ...

Williamson, Victor Lamont

2010-01-01T23:59:59.000Z

495

LCLS AMO web page  

NLE Websites -- All DOE Office Websites (Extended Search)

Atomic, Molecular and Optical Science at the LCLS Atomic, Molecular and Optical Science at the LCLS Links: AMO LCLS SLAC LUSI Proposal Preparation Workshop: A workshop will be held June 2 & 3 at SLAC to assist users in preparing proposals to use the AMO instrument at the LCLS in anticipation of the first call for proposals due September 2008. The LCLS will begin user operations with the AMO instrument in August 2009. Information about the LCLS and the AMO instrument will be presented at the proposal preparation workshop to help users prepare successful proposals. The information will be made available on the LCLS-AMO web site after the meeting. Please see the workshop announcement for more information. LCLS Scientific Instruments: Four scientific instruments are currently being designed to capitalize on the unique properties of the LCLS, namely its high intensity short pulses x-rays. The Atomic, Molecular and Optical (AMO) science instrument will occupy a soft x-ray side branch of the LCLS in hutch 2 of the Near Experimental Hall (NEH). The AMO instrument is being built as a part of the LCLS construction project, while the other three instruments for x-ray pump probe(XPP), coherent x-ray imaging (CXI), and x-ray coherent scattering (XCS) are being built as part of a separate SLAC managed DOE project, the LCLS User Scientific Instruments project, LUSI.

496

the World Wide Web  

Office of Scientific and Technical Information (OSTI)

technical report has been made technical report has been made electronically available on the World Wide Web through a contribution from Walter L. Warnick In honor of Enrico Fermi Leader of the first nuclear reactor, Nobel Prize winner, and visionary technologist Dr. Warnick is delighted to be the first sponsor for posting a Department of Energy technical report and making it broadly available Office of Scientific and Technical Information Office of Science U.S. Department of Energy September 2008 osti.gov U N I T E D S T A T E S A T O M I C E N E R G Y C O M M I S S I O N AECD-3269 EXPERIMENTAL PRODUCTION OF A DNERGENT CHAIN REACTION BY E. Fermi January 4, 1952 [TIS Issuance ate] [chicago University] - T e c h n i c a l I n f o r m a t i o n S e r v i c e , O a k Ridge, T e n n e s s e e r ABSTRACTS Description of the construction and operation of the chain

497

TUFTS UNIVERSITY GROUP HEALTH PLANS NOTICE OF PRIVACY PRACTICES  

E-Print Network (OSTI)

officials for intelligence, counterintelligence, and other national security activities authorized by law harm to you. The Plans have implemented policies and pro- cedures to comply with the breach or that your employer has violated the policies adopted by the Plan Sponsor for protecting your rights, you may

Tufts University

498

WEB-BASED PPS 9.3 WEB-BASED PAN  

E-Print Network (OSTI)

WEB-BASED PPS 9.3 WEB-BASED PAN 9.3--1 Payroll/Personnel System Web-Based PAN January 2010, University of California, Santa Cruz PPS User Manual Post Authorization Notification Functions (Web PAN) Note: This section covers web PAN features, but not general background or information about PAN. For detailed

Lee, Herbie

499

Adaptive web transactions: an approach for achieving the atomicity of composed web services  

Science Conference Proceedings (OSTI)

The effective use of web services requires that new and more complex web services can be composed of other web services. With such composed web services, or web workflows as they are also called, the issues related to transactional properties are even ...

L. Pajunen; J. Korhonen; J. Puustjärvi

2002-12-01T23:59:59.000Z

500

The use of web structure and content to identify subjectively interesting web usage patterns  

Science Conference Proceedings (OSTI)

The discipline of Web Usage Mining has grown rapidly in the past few years, despite the crash of the e-commerce boom of the late 1990s. Web Usage Mining is the application of data mining techniques to Web clickstream data in order to extract usage patterns. ... Keywords: Data mining, Web usage mining, World Wide Web

Robert Cooley

2003-05-01T23:59:59.000Z