These are representative sample records from Science.gov related to your search topic.
For comprehensive and current results, perform a real-time search at Science.gov.
1

Secure Distributed Data-Mining and Its Application to Large-Scale Network Measurements  

E-print Network

Secure Distributed Data-Mining and Its Application to Large-Scale Network Measurements Matthew]: Database Applications--data mining General Terms Management, Measurement, Security, Algorithms Keywords Secure Distributed Data-mining, Secure Distributed Summation, Network Measurement, Network Management 1

Roughan, Matthew

2

Ripley: Automatically Securing Distributed Web Applications  

E-print Network

of a server component implemented in Java J2EE, PHP or ASP.NET and a client-side component executing in Java complex and representative AJAX applications suggests that RIPLEY is a promising method for building

Livshits, Ben

3

An Immunological Model of Distributed Detection and Its Application to Computer Security  

E-print Network

An Immunological Model of Distributed Detection and Its Application to Computer Security By Steven vii #12;#12;An Immunological Model of Distributed Detection and Its Application to Computer Security By Steven Andrew Hofmeyr Doctor of Philosophy Computer Science May 1999 #12;#12;An Immunological Model

Forrest, Stephanie

4

Design and Applications of a Secure and Decentralized Distributed Hash Table  

E-print Network

, creating many fake identities is cheap; (2) an attacker can subvert periodic routing table maintenanceDesign and Applications of a Secure and Decentralized Distributed Hash Table by Christopher T and Applications of a Secure and Decentralized Distributed Hash Table by Christopher T. Lesniewski-Laas Submitted

5

Unidirectional Key Distribution Across Time and Space with Applications to RFID Security  

E-print Network

Unidirectional Key Distribution Across Time and Space with Applications to RFID Security Ari Juels problem, however, is that of practical key management in RFID (Radio-Frequency IDentification) systems. We describe the application of our techniques to RFID-enabled supply chains and a prototype privacy

6

Authorization and Trust Enhanced Security for Distributed Applications  

Microsoft Academic Search

\\u000a This paper addresses the issues of authorization and trust in a federated distributed environment. We describe some of design\\u000a principles involved in the development of authorization service for practical large scale distributed systems. We present\\u000a the design of web services authorization architecture and discuss its implementation within the .NET framework. Then we discuss\\u000a the notion of trusted computing and presented

Vijay Varadharajan

2005-01-01

7

Shared and Distributed Memory Parallel Security Analysis of Large-Scale Source Code and Binary Applications  

SciTech Connect

Many forms of security analysis on large scale applications can be substantially automated but the size and complexity can exceed the time and memory available on conventional desktop computers. Most commercial tools are understandably focused on such conventional desktop resources. This paper presents research work on the parallelization of security analysis of both source code and binaries within our Compass tool, which is implemented using the ROSE source-to-source open compiler infrastructure. We have focused on both shared and distributed memory parallelization of the evaluation of rules implemented as checkers for a wide range of secure programming rules, applicable to desktop machines, networks of workstations and dedicated clusters. While Compass as a tool focuses on source code analysis and reports violations of an extensible set of rules, the binary analysis work uses the exact same infrastructure but is less well developed into an equivalent final tool.

Quinlan, D; Barany, G; Panas, T

2007-08-30

8

Security of Quantum Key Distribution  

NASA Astrophysics Data System (ADS)

We propose various new techniques in quantum information theory, including a de Finetti style representation theorem for finite symmetric quantum states. As an application, we give a proof for the security of quantum key distribution which applies to arbitrary protocols.

Renner, Renato

2005-12-01

9

Distributed Trust Infrastructure and Trust-Security Articulation: Application to Heterogeneous Networks  

Microsoft Academic Search

In this paper, we propose a distributed trust infrastructure for heterogeneous networks. This infrastructure is inspired from the social trust model reflected in both mathematical heuristics and a communication protocol. It is with a view to optimize the cost of security, and therefore to use security means more effectively, that the trust infrastructure, which we distinguish from the security infrastructure,

Christian Tchepnda; Michel Riguidel

2006-01-01

10

Photonic sensor opportunities for distributed and wireless systems in security applications  

NASA Astrophysics Data System (ADS)

There are broad ranges of homeland security sensing applications that can be facilitated by distributed fiber optic sensors and photonics integrated wireless systems. These applications include [1]: Pipeline, (Monitoring, Security); Smart structures (Bridges, Tunnels, Dams, Public spaces); Power lines (Monitoring, Security); Transportation security; Chemical/biological detection; Wide area surveillance - perimeter; and Port Security (Underwater surveillance, Cargo container). Many vital assets which cover wide areas, such as pipeline and borders, are under constant threat of being attacked or breached. There is a rapidly emerging need to be able to provide identification of intrusion threats to such vital assets. Similar problems exit for monitoring the basic infrastructure such as water supply, power utilities, communications systems as well as transportation. There is a need to develop a coordinated and integrated solution for the detection of threats. From a sensor standpoint, consideration must not be limited to detection, but how does detection lead to intervention and deterrence. Fiber optic sensor technology must be compatible with other surveillance technologies such as wireless mote technology to facilitate integration. In addition, the multi-functionality of fiber optic sensors must be expanded to include bio-chemical detection. There have been a number of barriers for the acceptance and broad use of smart fiber optic sensors. Compared to telecommunications, the volume is low. This fact coupled with proprietary and custom specifications has kept the price of fiber optic sensors high. There is a general lack of a manufacturing infrastructure and lack of standards for packaging and reliability. Also, there are several competing technologies; some photonic based and other approaches based on conventional non-photonic technologies.

Krohn, David

2006-10-01

11

Abstract--Distribution factors play a key role in many system security analysis and market applications. The injection shift  

E-print Network

1 Abstract-- Distribution factors play a key role in many system security analysis and market of the other distribution factors. The line outage distribution factors (LODFs) may be computed using the ISFs distribution factors, line outage distribution factors, multiple-line outages, system security. I. INTRODUCTION

12

Distributed network of integrated 3D sensors for transportation security applications  

NASA Astrophysics Data System (ADS)

The US Port Security Agency has strongly emphasized the needs for tighter control at transportation hubs. Distributed arrays of miniature CMOS cameras are providing some solutions today. However, due to the high bandwidth required and the low valued content of such cameras (simple video feed), large computing power and analysis algorithms as well as control software are needed, which makes such an architecture cumbersome, heavy, slow and expensive. We present a novel technique by integrating cheap and mass replicable stealth 3D sensing micro-devices in a distributed network. These micro-sensors are based on conventional structures illumination via successive fringe patterns on the object to be sensed. The communication bandwidth between each sensor remains very small, but is of very high valued content. Key technologies to integrate such a sensor are digital optics and structured laser illumination.

Hejmadi, Vic; Garcia, Fred

2009-05-01

13

Application Security Automation  

ERIC Educational Resources Information Center

With today's high demand for online applications and services running on the Internet, software has become a vital component in our lives. With every revolutionary technology comes challenges unique to its characteristics; for online applications, security is one huge concern and challenge. Currently, there are several schemes that address…

Malaika, Majid A.

2011-01-01

14

Distributed Internet Security and Measurement  

E-print Network

rise in country-level Internet policies, such as nation-wide censorship and warrantless wiretaps#12;Distributed Internet Security and Measurement by Josh Karlin B.A., Computer Science Internet Security and Measurement by Josh Karlin ABSTRACT OF DISSERTATION Submitted in Partial Fulfillment

Forrest, Stephanie

15

Secure quantum key distribution  

NASA Astrophysics Data System (ADS)

Secure communication is crucial in the Internet Age, and quantum mechanics stands poised to revolutionize cryptography as we know it today. In this Review, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After briefly introducing recent experimental progress and challenges, we survey the latest developments in quantum hacking and countermeasures against it.

Lo, Hoi-Kwong; Curty, Marcos; Tamaki, Kiyoshi

2014-08-01

16

Secure Distributed Human Computation  

NASA Astrophysics Data System (ADS)

In Peha’s Financial Cryptography 2004 invited talk, he described the Cyphermint PayCash system (see www.cyphermint.com), which allows people without bank accounts or credit cards (a sizeable segment of the U.S. population) to automatically and instantly cash checks, pay bills, or make Internet transactions through publicly-accessible kiosks. Since PayCash offers automated financial transactions and since the system uses (unprotected) kiosks, security is critical. The kiosk must decide whether a person cashing a check is really the person to whom the check was made out, so it takes a digital picture of the person cashing the check and transmits this picture electronically to a central office, where a human worker compares the kiosk’s picture to one that was taken when the person registered with Cyphermint. If both pictures are of the same person, then the human worker authorizes the transaction.

Gentry, Craig; Ramzan, Zulfikar; Stubblebine, Stuart

17

Management of Network Security Applications Philip C. Hyland  

E-print Network

Management of Network Security Applications Philip C. Hyland Ph.D. Candidate, George Mason reported on management of distributed security applications. This paper reviews several security management projects and related secu- rity research to date. We present a core set of security managed objects for use

Sandhu, Ravi

18

Secure Distributed DNS Christian Cachin  

E-print Network

Secure Distributed DNS Christian Cachin IBM Research Zurich Research Laboratory CH-8803 R A correctly working Domain Name System (DNS) is essen- tial for the Internet. Due to its significance and because of deficiencies in its current design, the DNS is vulnerable to a wide range of attacks

Cachin, Christian

19

Design and applications of a secure and decentralized Distributed Hash Table  

E-print Network

Distributed Hash Tables (DHTs) are a powerful building block for highly scalable decentralized systems. They route requests over a structured overlay network to the node responsible for a given key. DHTs are subject to the ...

Lesniewski-Laas, Christopher T. (Christopher Tur), 1980-

2011-01-01

20

Quantum key distribution with delayed privacy amplification and its application to the security proof of a two-way deterministic protocol  

NASA Astrophysics Data System (ADS)

Privacy amplification (PA) is an essential postprocessing step in quantum key distribution (QKD) for removing any information an eavesdropper may have on the final secret key. In this paper, we consider delaying PA of the final key after its use in one-time pad encryption and prove its security. We prove that the security and the key generation rate are not affected by delaying PA. Delaying PA has two applications: it serves as a tool for significantly simplifying the security proof of QKD with a two-way quantum channel, and also it is useful in QKD networks with trusted relays. To illustrate the power of the delayed PA idea, we use it to prove the security of a qubit-based two-way deterministic QKD protocol which uses four states and four encoding operations.

Fung, Chi-Hang Fred; Ma, Xiongfeng; Chau, H. F.; Cai, Qing-Yu

2012-03-01

21

Perfectly-Secure Key Distribution for Dynamic Conferences  

Microsoft Academic Search

A key distribution scheme for dynamic conferences is a method by which initiallyan (off-line) trusted server distributes private individual pieces of informationto a set of users. Later, each member of any group of users of a given size (a dynamicconference) can compute a common secure group key. In this paper westudy the theory and applications of such perfectly secure systems.

Carlo Blundo; Alfredo De Santis; Amir Herzberg Shay Kutten; Ugo Vaccaro

1993-01-01

22

Evaluation of web application security risks and secure design patterns  

Microsoft Academic Search

The application of security in web application is of profound importance due to the extended use of web for business. Most of the attacks, are either because the developers are not considering security as a concern or due to the security flaws in designing and developing the applications. The enforcement of security in the software development life cycle of the

Asish Kumar Dalai; Sanjay Kumar Jena

2011-01-01

23

The Digital Distributed System Security Architecture  

Microsoft Academic Search

The Digital Distributed System Security Architecture is a comprehensive specification for security in a distributed system that employs state-of-the-art concepts to address the needs of both commercial and government environments. The architecture covers user and system authentication, mandatory and discretionary security, secure initialization and loading, and delegation in a general-purpose computing environment of heterogeneous systems where there are no central

Andy Goldstein; Butler Lampson; Charlie Kaufman; Morrie Gasser

1989-01-01

24

Security Concept for Distributed Service Execution Environments  

Microsoft Academic Search

This paper presents a concept to securely execute services on a distributed execution environment. The execution environment (SSEE), offers Interfaces In terms of Web Services (WS). Using these WS Interfaces a service developer can securely transfer service containers to SSEE or exchange other data with the SSEE, for example for the purpose of monitoring. The WS Interfaces employ WS-Security to

Ronald Marx; Tobias Wahl; Kpatcha M. Bayarou

2008-01-01

25

Application Instructions for: Cyber Security Fundamentals Certificate  

E-print Network

Application Instructions for: Cyber Security Fundamentals Certificate Naval Postgraduate School Center for Information Systems Security Studies and Research (CISR) Monterey, CA 93943 cyber@nps.edu #12;Cyber Security Fundamentals Certificate - Online Application Instructions 1. Go to https

26

INSTITUTE FOR CYBER SECURITY Application-Centric Security  

E-print Network

INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

Sandhu, Ravi

27

Security applications of magnetic sensors  

NASA Astrophysics Data System (ADS)

Magnetic sensors are often used for security and military applications such as detection, discrimination and localization of ferromagnetic and conducting objects, navigation, position tracking and antitheft systems. We give only general overview, few remarks and some interesting references on these applications.

Ripka, Pavel

2013-06-01

28

Network aware distributed applications  

SciTech Connect

Most distributed applications today manage to utilize only a small percentage of the needed and available network bandwidth. Often application developers are not aware of the potential bandwidth of the network, and therefore do not know what to expect. Even when application developers are aware of the specifications of the machines and network links, they have few resources that can help determine why the expected performance was not achieved. What is needed is a ubiquitous and easy-to-use service that provides reliable, accurate, secure, and timely estimates of dynamic network properties. This service will help advise applications on how to make use of the network's increasing bandwidth and capabilities for traffic shaping and engineering. When fully implemented, this service will make building currently unrealizable levels of network awareness into distributed applications a relatively mundane task. For example, a remote data visualization application could choose between sending a wireframe, a pre-rendered image, or a 3-D representation, based on forecasts of CPU availability and power, compression options, and available bandwidth. The same service will provide on-demand performance information so that applications can compare predicted with actual results, and allow detailed queries about the end-to-end path for application and network tuning and debugging.

Agarwal, Deborah; Tierney, Brian L.; Gunter, Dan; Lee, Jason; Johnston, William

2001-02-04

29

Security seal. [Patent application  

DOEpatents

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, G.W.

1981-11-17

30

Perfectly-Secure Key Distribution for Dynamic Conferences  

Microsoft Academic Search

A key distribution scheme for dynamic conferences is a method by which initially an (off-line) trusted server distributes private individ- ual pieces of information to a set of users. Later any group of users of a given size (a dynamic conference) is able to compute a common secure key. In this paper we study the theory and applications of such

Carlo Blundo; Alfredo De Santis; Amir Herzberg; Shay Kutten; Ugo Vaccaro; Moti Yung

1992-01-01

31

Integrating security in a group oriented distributed system  

NASA Technical Reports Server (NTRS)

A distributed security architecture is proposed for incorporation into group oriented distributed systems, and in particular, into the Isis distributed programming toolkit. The primary goal of the architecture is to make common group oriented abstractions robust in hostile settings, in order to facilitate the construction of high performance distributed applications that can tolerate both component failures and malicious attacks. These abstractions include process groups and causal group multicast. Moreover, a delegation and access control scheme is proposed for use in group oriented systems. The focus is the security architecture; particular cryptosystems and key exchange protocols are not emphasized.

Reiter, Michael; Birman, Kenneth; Gong, LI

1992-01-01

32

Homeland Security and Defense Applications  

ScienceCinema

Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

None

2015-01-09

33

Homeland Security and Defense Applications  

SciTech Connect

Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

None

2014-11-06

34

Model-based Security Engineering of Distributed Information Systems using UMLsec  

E-print Network

-patch past system development, but security analysis has to be an integral part of the system design processModel-based Security Engineering of Distributed Information Systems using UMLsec Bastian Best BMW information security arise. In order to make these applications secure, it is not sufficient to penetrate- and

Jurjens, Jan

35

Application Instructions for: Cyber Security Defense Certificate  

E-print Network

Application Instructions for: Cyber Security Defense Certificate Naval Postgraduate School Center for Information Systems Security Studies and Research (CISR) Monterey, CA 93943 cyber@nps.edu #12;Cyber Security ­ Cyber Security Defense iv. Academic Year/ Quarter: SELECT THE FOLLOWING START DATE: a. Quarter 3 Start

36

CORBASec Used to Secure Distributed Aerospace Propulsion Simulations  

NASA Technical Reports Server (NTRS)

The NASA Glenn Research Center and its industry partners are developing a Common Object Request Broker (CORBA) Security (CORBASec) test bed to secure their distributed aerospace propulsion simulations. Glenn has been working with its aerospace propulsion industry partners to deploy the Numerical Propulsion System Simulation (NPSS) object-based technology. NPSS is a program focused on reducing the cost and time in developing aerospace propulsion engines. It was developed by Glenn and is being managed by the NASA Ames Research Center as the lead center reporting directly to NASA Headquarters' Aerospace Technology Enterprise. Glenn is an active domain member of the Object Management Group: an open membership, not-for-profit consortium that produces and manages computer industry specifications (i.e., CORBA) for interoperable enterprise applications. When NPSS is deployed, it will assemble a distributed aerospace propulsion simulation scenario from proprietary analytical CORBA servers and execute them with security afforded by the CORBASec implementation. The NPSS CORBASec test bed was initially developed with the TPBroker Security Service product (Hitachi Computer Products (America), Inc., Waltham, MA) using the Object Request Broker (ORB), which is based on the TPBroker Basic Object Adaptor, and using NPSS software across different firewall products. The test bed has been migrated to the Portable Object Adaptor architecture using the Hitachi Security Service product based on the VisiBroker 4.x ORB (Borland, Scotts Valley, CA) and on the Orbix 2000 ORB (Dublin, Ireland, with U.S. headquarters in Waltham, MA). Glenn, GE Aircraft Engines, and Pratt & Whitney Aircraft are the initial industry partners contributing to the NPSS CORBASec test bed. The test bed uses Security SecurID (RSA Security Inc., Bedford, MA) two-factor token-based authentication together with Hitachi Security Service digital-certificate-based authentication to validate the various NPSS users. The test bed is expected to demonstrate NPSS CORBASec-specific policy functionality, confirm adequate performance, and validate the required Internet configuration in a distributed collaborative aerospace propulsion environment.

Blaser, Tammy M.

2003-01-01

37

Integrating security in a large distributed system  

Microsoft Academic Search

Andrew is a distributed computing environment that is a synthesis of the personal computing and timesharing paradigms. When mature, it is expected to encompass over 5,000 workstations spanning the Carnegie Mellon University campus. This paper examines the security issues that arise in such an environment and describes the mechanisms that have been developed to address them. These mechanisms include the

Mahadev Satyanarayanan

1989-01-01

38

Application Distribution Model and Related Security Attacks in Navid Nikaein, Soumya Kanti Datta, Irshad Marecar, Christian Bonnet  

E-print Network

Android and iOS in future and will be able to download and install applications from app stores. Today applications are being provided by trusted app stores of Apple and Google or property platform by car. For example, in case of Android apps the in-app capability can be enabled for a third party. Although content

Gesbert, David

39

Virtual Cyber-Security Testing Capability for Large Scale Distributed Information Infrastructure Protection  

Microsoft Academic Search

Security, reliability and interoperability are indispensable in today's distributed heterogeneous information infrastructure. For government and military applications, it is crucial to conduct effective and efficient testing of security properties for newly developed systems, which are to be integrated into existing information system. Yet little progress has been made in the technology advancement of rigorous and automated security testing. In this

Perry Pederson; D. Lee; Guoqiang Shu; Dongluo Chen; Zhijun Liu; Na Li; Lifeng Sang

2008-01-01

40

IBM Software IBM Security AppScan: Application  

E-print Network

IBM Software Security June 2012 IBM Security AppScan: Application security and risk managementScan: Application security and risk management Organizations today rely on software applications to drive essential solutions specific to the challenges of application security that go beyond basic security testing to manage

41

Securing Distributed Systems with Information Flow Control  

Microsoft Academic Search

Recent operating systems (12, 21, 26) have shown that decentralized information flow control (DIFC) can se- cure applications built from mostly untrusted code. This paper extends DIFC to the network. We present DStar, a system that enforces the security requirements of mu- tually distrustful components through cryptography on the network and local OS protection mechanisms on each host. DStar does

Nickolai Zeldovich; Silas Boyd-wickizer; David Mazières

2008-01-01

42

Security constraint processing in a multilevel secure distributed database management system  

Microsoft Academic Search

In a multilevel secure distributed database management system, users cleared at different security levels access and share a distributed database consisting of data at different sensitivity levels. An approach to assigning sensitivity levels, also called security levels, to data is one which utilizes constraints or classification rules. Security constraints provide an effective classification policy. They can be used to assign

Bhavani Thuraisingham; William Ford

1995-01-01

43

Security applications of terahertz technology  

NASA Astrophysics Data System (ADS)

Recent events have accelerated the quest for ever more effective security screening to detect an increasing variety of threats. Many techniques employing different parts of the electromagnetic spectrum from radio up to X- and gammaray are in use. Terahertz radiation, which lies between microwave and infrared, is the last part to be exploited for want, until recently, of suitable sources and detectors. This paper describes practical techniques for Terahertz imaging and spectroscopy which are now being applied to a variety of applications. We describe a number of proof-of-principle experiments which show that Terahertz imaging has the ability to use very low levels of this non-ionising radiation to detect hidden objects in clothing and common packing materials and envelopes. Moreover, certain hidden substances such as plastic explosives and other chemical and biological agents may be detected from their characteristic Terahertz spectra. The results of these experiments, coupled with availability of practical Terahertz systems which operate outside the laboratory environment, demonstrate the potential for Terahertz technology in security screening and counterterrorism.

Kemp, Michael C.; Taday, P. F.; Cole, Bryan E.; Cluff, J. A.; Fitzgerald, Anthony J.; Tribe, William R.

2003-08-01

44

Non-Detrimental Web Application Security Scanning  

Microsoft Academic Search

The World Wide Web has become a sophisticated platform capable of delivering a broad range of applications. However, its rapid growth has resulted in numerous security problems that current technologies cannot address. Researchers from both academic and private sector are devoting a considerable amount of resources to the development of Web application security scanners (i.e., automated software testing platforms for

Yao-wen Huang; Chung-hung Tsai; D. T. Lee; Sy-yen Kuo

2004-01-01

45

Secure application partitioning for intellectual property protection  

E-print Network

Intellectual property protection is a major concern for both hardware and software architects today. Recently secure platforms have been proposed to protect the privacy of application code and enforce that an application ...

O'Donnell, Charles W., S.M. Massachusetts Institute of Technology

2005-01-01

46

AT&T Consulting Application Security Program Management  

E-print Network

AT&T Consulting Application Security Program Management In today's global marketplace, businesses Program Management services in Application Security. By offering program management, we allow your a comprehensive approach to application security. This includes metrics, training, and management reporting

Fisher, Kathleen

47

Secure coprocessing applications and research issues  

SciTech Connect

The potential of secure coprocessing to address many emerging security challenges and to enable new applications has been a long-standing interest of many members of the Computer Research and Applications Group, including this author. The purpose of this paper is to summarize this thinking, by presenting a taxonomy of some potential applications and by summarizing what we regard as some particularly interesting research questions.

Smith, S.W.

1996-08-01

48

Video performance for high security applications.  

SciTech Connect

The complexity of physical protection systems has increased to address modern threats to national security and emerging commercial technologies. A key element of modern physical protection systems is the data presented to the human operator used for rapid determination of the cause of an alarm, whether false (e.g., caused by an animal, debris, etc.) or real (e.g., a human adversary). Alarm assessment, the human validation of a sensor alarm, primarily relies on imaging technologies and video systems. Developing measures of effectiveness (MOE) that drive the design or evaluation of a video system or technology becomes a challenge, given the subjectivity of the application (e.g., alarm assessment). Sandia National Laboratories has conducted empirical analysis using field test data and mathematical models such as binomial distribution and Johnson target transfer functions to develop MOEs for video system technologies. Depending on the technology, the task of the security operator and the distance to the target, the Probability of Assessment (PAs) can be determined as a function of a variety of conditions or assumptions. PAs used as an MOE allows the systems engineer to conduct trade studies, make informed design decisions, or evaluate new higher-risk technologies. This paper outlines general video system design trade-offs, discusses ways video can be used to increase system performance and lists MOEs for video systems used in subjective applications such as alarm assessment.

Connell, Jack C.; Norman, Bradley C.

2010-06-01

49

Secure and Robust Overlay Content Distribution  

ERIC Educational Resources Information Center

With the success of applications spurring the tremendous increase in the volume of data transfer, efficient and reliable content distribution has become a key issue. Peer-to-peer (P2P) technology has gained popularity as a promising approach to large-scale content distribution due to its benefits including self-organizing, load-balancing, and…

Kang, Hun Jeong

2010-01-01

50

Web Applications and Security Web protocol overview  

E-print Network

Web Applications and Security Web protocol overview Web forms Cookies Attacks against Web>University of Massachusetts Amherst #12;Basic Web scripting There are two basic HTTP request methods, GET and POST descriptor. #12;Securing basic web apps is easy DON'T TRUST USER INPUT, EVER... Never execute code provide

Massachusetts at Amherst, University of

51

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card  

E-print Network

now. 3. If you check "other" for CITIZENSHIP, provide a document from the Federal/State or local clarification about who can sign. HOW TO SUBMIT THE APPLICATION Mail the form and your evidence documents to the nearest Social Security office. We will return your documents to you. If you do not want to mail your

Li, Mo

52

Improving Mobile Application Security via Bridging User Expectations and Application Behaviors  

E-print Network

Improving Mobile Application Security via Bridging User Expectations and Application Behaviors Wei malware out of mobile application markets, exist- ing techniques analyze the security aspects of application behaviors and summarize patterns of these security aspects to determine what applications do

Xie, Tao

53

Secure Distributed Constraint Satisfaction: Reaching Agreement without Revealing Private Information  

Microsoft Academic Search

This paper develops a secure distributed Constraint Satisfaction algorithm. A Distributed Constraint Satisfaction Problem\\u000a (DisCSP) is a CSP in which variables and constraints are distributed among multiple agents. A major motivation for solving\\u000a a DisCSP without gathering all information in one server is the concern about privacy\\/security. However, existing DisCSP algorithms\\u000a leak some information during the search process and privacy\\/security

Makoto Yokoo; Koutarou Suzuki; Katsutoshi Hirayama

2002-01-01

54

Rendezvous Based Trust Propagation to Enhance Distributed Network Security  

E-print Network

Rendezvous Based Trust Propagation to Enhance Distributed Network Security Ningning Cheng, Kannan of the modern day trustworthy networks. Trust can be exploited to mitigate the security threats in wireless to improve the security in the network [1]. If a node gets the trust information of other nodes in advance

California at Davis, University of

55

A correct security evaluation of quantum key distribution  

E-print Network

There is no doubt that quantum key distribution is an excellent result as a science. However, this paper presents a view on quantum key distribution (QKD) wherein QKD may have a difficulty to provide a sufficient security and good communication performance in real world networks. In fact, a one-time pad forwarded by QKD model with $\\bar{\\epsilon}=10^{-6}$ may be easily decrypted by key estimation. Despite that researchers know several criticisms on the theoretical incompleteness on the security evaluation, Portmann and Rennner, and others still avert from the discussion on criticism, and experimental groups tend to make exaggerated claims about their own work by making it seems that QKD is applicable to commercial communication systems. All such claims are based on a misunderstanding of the meaning of criteria of information theoretic security in cryptography. A severe situation has arisen as a result, one that will impair a healthy development of quantum information science (QIS). Thus, the author hopes that this paper will help to stimulate discussions on developing a more detailed theory.

Osamu Hirota

2014-09-21

56

Using Replication and Partitioning to Build Secure Distributed Systems  

E-print Network

policies; this problem is even more acute in distributed systems with mutual dis­ trust. This paper securely on a distributed system with untrusted hosts. The code and data of the computation are partitioned, and without placing undue trust in any host. The compiler automatically generates secure run­time protocols

Zdancewic, Steve

57

Using Replication and Partitioning to Build Secure Distributed Systems  

E-print Network

policies; this problem is even more acute in distributed systems with mutual dis- trust. This paper securely on a distributed system with untrusted hosts. The code and data of the computation are partitioned, and without placing undue trust in any host. The compiler automatically generates secure run-time protocols

Zdancewic, Steve

58

Fabric: a platform for secure distributed computation and storage  

Microsoft Academic Search

Fabric is a new system and language for building secure distributed information systems. It is a decentralized system that allows hetero- geneous network nodes to securely share both information and com- putation resources despite mutual distrust. Its high-level program- ming language makes distribution and persistence largely transpar- ent to programmers. Fabric supports data-shipping and function- shipping styles of computation: both

Jed Liu; Michael D. George; K. Vikram; Xin Qi; Lucas Waye; Andrew C. Myers

2009-01-01

59

Irradiation applications for homeland security  

NASA Astrophysics Data System (ADS)

In October 2001, first-class mail laced with anthrax was sent to political and media targets resulting in several deaths, illnesses, significant mail-service disruption, and economic loss. The White House Office of Science and Technology Policy established a technical task force on mail decontamination that included three key agencies: National Institute of Standards and Technology with responsibility for radiation dosimetry and coordinating and performing experiments at industrial accelerator facilities; the Armed Forces Radiobiology Research Institute with responsibility for radiobiology; and the US Postal Service with responsibility for radiation-processing quality assurance and quality control. An overview of the anthrax attack decontamination events will be presented as well as expectations for growth in this area and the prospects of other homeland security areas where irradiation technology can be applied.

Desrosiers, Marc F.

2004-09-01

60

Video motion detection for physical security applications  

SciTech Connect

Physical security specialists have been attracted to the concept of video motion detection for several years. Claimed potential advantages included additional benefit from existing video surveillance systems, automatic detection, improved performance compared to human observers, and cost effectiveness. In recent years significant advances in image processing dedicated hardware and image analysis algorithms and software have accelerated the successful application of video motion detection systems to a variety of physical security applications. Currently Sandia is developing several advanced systems that employ image processing techniques for a broader set of safeguards and security applications. TCATS (Target Cueing and Tracking System) uses a set of powerful, flexible, modular algorithms and software to alarm on purposeful target motion. Custom TCATS hardware optimized for perimeter security applications is currently being evaluated with video input. VISDTA (Video Imaging System for Detection, Tracking, and Assessment) uses some of the same TCATS algorithms and operates with a thermal imager input. In the scan mode, VISDTA detects changes in a scene from the previous image at a given scan point; in the stare mode, VISDTA detects purposeful motion similar to TCATS.

Matter, J.C.

1990-01-01

61

Bluetooth Security in Wearable Computing Applications  

Microsoft Academic Search

Advances in wireless sensor networking technologies have been extended to wearable computing systems and opened a plethora of applications and opportunities in the development and integration of pervasive Bluetooth Technologies with the abundance of existing specialized technologies in monitoring, data collection, and real-time analysis and reporting. Although the Bluetooth framework is acceptably secure, there are still a number of weaknesses

R. Bouhenguel; I. Mahgoub; M. Ilyas

2008-01-01

62

17 CFR 230.139 - Publications or distributions of research reports by brokers or dealers distributing securities.  

Code of Federal Regulations, 2013 CFR

17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01...reports by brokers or dealers distributing securities. 230.139 Section 230.139 Commodity and Securities Exchanges SECURITIES AND EXCHANGE...

2013-04-01

63

17 CFR 230.139 - Publications or distributions of research reports by brokers or dealers distributing securities.  

Code of Federal Regulations, 2014 CFR

17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01...reports by brokers or dealers distributing securities. 230.139 Section 230.139 Commodity and Securities Exchanges SECURITIES AND EXCHANGE...

2014-04-01

64

Fundamental Security Issues in Continuous Variable Quantum Key Distribution  

E-print Network

Several fundamental issues in establishing security in continuous variable quantum key distribution are discussed, in particular on reverse reconciliation and security under heterodyne attack. It appears di?cult to derive quantum advantage in a concrete realistic protocol due to source and loss uncertainties, apart from the problem of bounding Eve's information after reconciliation. The necessity of proving robust security for QKD protocols is indicated.

Horace P. Yuen

2012-08-29

65

Security of quantum key distribution with arbitrary individual imperfections  

E-print Network

We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate, and show that only two parameters must be bounded to ensure security; the basis dependence of the source and a detector blinding parameter. The system may otherwise be completely uncharacterized and contain large losses.

Øystein Marøy; Lars Lydersen; Johannes Skaar

2009-03-20

66

Evaluating Security Mechanisms in Peer-to-Peer Applications  

Microsoft Academic Search

Many different kinds of peer-to-peer applications are in use today. Some allow inter-person communication, such as video and text messaging, while others provide data sharing capabilities. Some also function as large virtual computers, providing distributed compute services to a central source. One major difficulty in developing these systems is the selection of an appropriate security mechanism from the wide array

Manish Parashar; Manish Agarwal; Steele Arbeeny; Viraj Bhat; Rangini Chowdhury

67

From Trusted to Secure: Building and Executing Applications that Enforce System Security  

E-print Network

From Trusted to Secure: Building and Executing Applications that Enforce System Security Boniface in the mainline Linux dis- tributions known as Security Enhanced (SE)Linux [25]. Trusted Solaris [21] and Trusted Hicks, Sandra Rueda, Trent Jaeger, and Patrick McDaniel Systems and Internet Infrastructure Security

Yener, Aylin

68

Securing Dynamic Distributed Storage Systems Against Eavesdropping and Adversarial Attacks  

Microsoft Academic Search

We address the problem of securing distributed storage systems against eavesdropping and adversarial attacks. An important aspect of these systems is node failures over time, necessitating, thus, a repair mechanism in order to maintain a desired high system reliability. In such dynamic settings, an important security problem is to safeguard the system from an intruder who may come at different

Sameer Pawar; Salim El Rouayheb; Kannan Ramchandran

2011-01-01

69

Secure Computation of k-Anonymous Distributed Data Bradley Malin  

E-print Network

Secure Computation of k-Anonymous Distributed Data Bradley Malin Data Privacy Laboratory, Institute data, released from any set of locations, is guaranteed to be equally relatable to at least k identities, or is k-anonymous. #12;Keywords: privacy, confidentiality, security, re-identification, k

70

Using Replication and Partitioning to Build Secure Distributed Systems  

E-print Network

- trust. This paper describes a way to enforce policies for data confidentiality and integrity by the compiler to run securely on a distributed system with untrusted hosts. The code and data of the computation, and without placing undue trust in any host. The compiler automatically generates secure run-time protocols

Hamlen, Kevin W.

71

17 CFR 242.102 - Activities by issuers and selling security holders during a distribution.  

Code of Federal Regulations, 2011 CFR

17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01... Activities by issuers and selling security holders during a distribution. ...Section 242.102 Commodity and Securities Exchanges SECURITIES AND...

2011-04-01

72

17 CFR 242.102 - Activities by issuers and selling security holders during a distribution.  

Code of Federal Regulations, 2012 CFR

17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01... Activities by issuers and selling security holders during a distribution. ...Section 242.102 Commodity and Securities Exchanges SECURITIES AND...

2012-04-01

73

17 CFR 242.102 - Activities by issuers and selling security holders during a distribution.  

Code of Federal Regulations, 2013 CFR

17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01... Activities by issuers and selling security holders during a distribution. ...Section 242.102 Commodity and Securities Exchanges SECURITIES AND...

2013-04-01

74

17 CFR 242.102 - Activities by issuers and selling security holders during a distribution.  

Code of Federal Regulations, 2014 CFR

17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01... Activities by issuers and selling security holders during a distribution. ...Section 242.102 Commodity and Securities Exchanges SECURITIES AND...

2014-04-01

75

Securing Provenance of Distributed Processes in an Untrusted Environment  

NASA Astrophysics Data System (ADS)

Recently, there is much concern about the provenance of distributed processes, that is about the documentation of the origin and the processes to produce an object in a distributed system. The provenance has many applications in the forms of medical records, documentation of processes in the computer systems, recording the origin of data in the cloud, and also documentation of human-executed processes. The provenance of distributed processes can be modeled by a directed acyclic graph (DAG) where each node represents an entity, and an edge represents the origin and causal relationship between entities. Without sufficient security mechanisms, the provenance graph suffers from integrity and confidentiality problems, for example changes or deletions of the correct nodes, additions of fake nodes and edges, and unauthorized accesses to the sensitive nodes and edges. In this paper, we propose an integrity mechanism for provenance graph using the digital signature involving three parties: the process executors who are responsible in the nodes' creation, a provenance owner that records the nodes to the provenance store, and a trusted party that we call the Trusted Counter Server (TCS) that records the number of nodes stored by the provenance owner. We show that the mechanism can detect the integrity problem in the provenance graph, namely unauthorized and malicious “authorized” updates even if all the parties, except the TCS, collude to update the provenance. In this scheme, the TCS only needs a very minimal storage (linear with the number of the provenance owners). To protect the confidentiality and for an efficient access control administration, we propose a method to encrypt the provenance graph that allows access by paths and compartments in the provenance graph. We argue that encryption is important as a mechanism to protect the provenance data stored in an untrusted environment. We analyze the security of the integrity mechanism, and perform experiments to measure the performance of both mechanisms.

Syalim, Amril; Nishide, Takashi; Sakurai, Kouichi

76

Design and Implementation of Security Camera Control Application for Mobile Phones  

Microsoft Academic Search

In recent years, due to the rise in crime, growing numbers of governments, companies, and schools are equipping their facilities with security cameras to deter crime and to investigate crimes that have happened. In this study, we investigate a distributed application that provides an efficient access method for security cameras placed in various areas. Peer-to-peer is a suitable technology for

Takeshi Kato; Tomoyuki Osano; Norihiro Ishikawa

2009-01-01

77

20 CFR 703.203 - Application for security deposit determination; information to be submitted; other requirements.  

Code of Federal Regulations, 2010 CFR

...false Application for security deposit determination; information to be submitted; other... Insurance Carrier Security Deposit Requirements...203 Application for security deposit determination; information to be submitted;...

2010-04-01

78

COCA: A secure distributed online certification authority  

Microsoft Academic Search

COCA is a fault-tolerant and secure online certification authority that has been built and deployed both in a local area network and in the Internet. Extremely weak assumptions characterize environments in which COCA's protocols execute correctly: no assumption is made about execution speed and message delivery delays; channels are expected to exhibit only intermittent reliability; and with 3 may be

Lidong Zhou; Fred B. Schneider; Robbert Van Renesse

2002-01-01

79

Scalable, Secure, and Highly Available Distributed File Access  

Microsoft Academic Search

A summary of and historical perspective on work done to implement easy-to-share distributed file systems based on the Unix model are presented. Andrew and Coda are distributed Unix file systems that embody many of the recent advances in solving the problem of data sharing in large, physically dispersed workstation environments. The Andrew architecture is presented, the scalability and security of

Mahadev Satyanarayanan

1990-01-01

80

Security-Typed Languages and Distributed Computation  

Microsoft Academic Search

Recently there has been considerable interest in programming languages that encode security policies in type declarations.\\u000a Type-checking is used to determine whether a program enforces these policies. This approach enjoys many of the benefits of\\u000a static type-checking, but is particularly of interest because it can enforce information flow properties such as noninterference,\\u000a for which purely dynamic mechanisms are ineffective.\\u000a \\u000a Enforcing

Andrew C. Myers

2001-01-01

81

Power laser application for security glass production  

NASA Astrophysics Data System (ADS)

Modern glass application needs to move from traditional tempering with only average controlled fragmentation of security glass to computerized controlled fragmentation by developing engineered stress profiles in glass article. The new treatment methods of soda-lime float glass using irradiation by power Nd:YAG laser which is moved by robot will be discussed. The transparency of glass for laser wavelength is one of the problems of glass treatment by laser. Noncontact stress control by light scattering will be shown. The two main objectives of this work will be discussed: 1. Glass treatment by power laser beam directed to secure glass production; 2. Control methods of residual stress into float glasses treated by laser.

Abashkin, Vladimir; Achimova, Elena

2009-09-01

82

Power laser application for security glass production  

NASA Astrophysics Data System (ADS)

Modern glass application needs to move from traditional tempering with only average controlled fragmentation of security glass to computerized controlled fragmentation by developing engineered stress profiles in glass article. The new treatment methods of soda-lime float glass using irradiation by power Nd:YAG laser which is moved by robot will be discussed. The transparency of glass for laser wavelength is one of the problems of glass treatment by laser. Noncontact stress control by light scattering will be shown. The two main objectives of this work will be discussed: 1. Glass treatment by power laser beam directed to secure glass production; 2. Control methods of residual stress into float glasses treated by laser.

Abashkin, Vladimir; Achimova, Elena

2010-05-01

83

On the Distributional Effects of Social Security Reform  

Microsoft Academic Search

How will the distribution of welfare, consumption, and leisure across households be affected by social security reform? This paper addresses this question for social security reforms with a two-tier structure by comparing steady states under a realistic version of the current U.S. system and under the two-tier system. The first tier is a mandatory, defined-contribution pension offering a retirement annuity

Mark Huggett; Gustavo Ventura

1999-01-01

84

Security proof of practical quantum key distribution schemes  

E-print Network

This paper provides a security proof of the Bennett-Brassard (BB84) quantum key distribution protocol in practical implementation. To prove the security, it is not assumed that defects in the devices are absorbed into an adversary's attack. In fact, the only assumption in the proof is that the source is characterized. The proof is performed by lower-bounding adversary's Renyi entropy about the key before privacy amplification. The bound reveals the leading factors reducing the key generation rate.

Yodai Watanabe

2005-06-29

85

Simple security proof of quantum key distribution via uncertainty principle  

E-print Network

We present an approach to the unconditional security of quantum key distribution protocols based on the uncertainty principle. The approach applies to every case that has been treated via the argument by Shor and Preskill, and relieve them from the constraints of finding quantum error correcting codes. It can also treat the cases with uncharacterized apparatuses. We derive a secure key rate for the Bennett-Brassard-1984 protocol with an arbitrary source characterized only by a single parameter representing the basis dependence.

Masato Koashi

2005-05-14

86

Security of Trusted Repeater Quantum Key Distribution Networks  

E-print Network

A Quantum Key Distribution (QKD) network is an infrastructure capable of performing long-distance and high-rate secret key agreement with information-theoretic security. In this paper we study security properties of QKD networks based on trusted repeater nodes. Such networks can already be deployed, based on current technology. We present an example of a trusted repeater QKD network, developed within the SECOQC project. The main focus is put on the study of secure key agreement over a trusted repeater QKD network, when some nodes are corrupted. We propose an original method, able to ensure the authenticity and privacy of the generated secret keys.

Louis Salvail; Momtchil Peev; Eleni Diamanti; Romain Alleaume; Norbert Lutkenhaus; Thomas Laenger

2009-04-27

87

Security of Continuous-Variable Quantum Key Distribution with Imperfect Phase Compensation  

NASA Astrophysics Data System (ADS)

Phase compensation is a necessary procedure in practical application of continuous-variable quantum key distribution (CVQKD) for the reason of unavoidable phase drifts of quantum signals in quantum channel. However, the phase compensation may become imperfect in practical applications. The security of CVQKD scheme with imperfect phase compensation is investigated under realistic conditions of quantum channel and detector. In particular, a tight security bound to the phase noise of the imperfect phase compensation are derived for reverse reconciliation and realistic homodyne detection. Moreover, the phase noise is analyzed experimentally and a practical phase compensation procedure is applied to simulate the imperct processing. The simulation results show its coincidence to the security bound, and reveal the sensitivity of the security of the reverse reconciliation CVQKD protocol to the noise arising from imperfect phase compensation.

Huang, Peng; Lin, Da-kai; Huang, Duan; Zeng, Gui-Hua

2015-01-01

88

26 CFR 1.731-2 - Partnership distributions of marketable securities.  

Code of Federal Regulations, 2012 CFR

...2012-04-01 false Partnership distributions of marketable securities. 1.731-2...CONTINUED) INCOME TAXES (CONTINUED) Distributions by A Partnership § 1.731-2 Partnership distributions of marketable securities....

2012-04-01

89

26 CFR 1.731-2 - Partnership distributions of marketable securities.  

Code of Federal Regulations, 2011 CFR

...2011-04-01 false Partnership distributions of marketable securities. 1.731-2...CONTINUED) INCOME TAXES (CONTINUED) Distributions by A Partnership § 1.731-2 Partnership distributions of marketable securities....

2011-04-01

90

26 CFR 1.731-2 - Partnership distributions of marketable securities.  

Code of Federal Regulations, 2013 CFR

...2013-04-01 false Partnership distributions of marketable securities. 1.731-2...CONTINUED) INCOME TAXES (CONTINUED) Distributions by A Partnership § 1.731-2 Partnership distributions of marketable securities....

2013-04-01

91

26 CFR 1.731-2 - Partnership distributions of marketable securities.  

Code of Federal Regulations, 2014 CFR

...2014-04-01 false Partnership distributions of marketable securities. 1.731-2...CONTINUED) INCOME TAXES (CONTINUED) Distributions by A Partnership § 1.731-2 Partnership distributions of marketable securities....

2014-04-01

92

26 CFR 1.731-2 - Partnership distributions of marketable securities.  

Code of Federal Regulations, 2010 CFR

...2010-04-01 false Partnership distributions of marketable securities. 1.731-2...TAX (CONTINUED) INCOME TAXES Distributions by A Partnership § 1.731-2 Partnership distributions of marketable securities....

2010-04-01

93

AT&TConsulting Application Security Health Check Assessment Bundle  

E-print Network

AT&TConsulting Application Security Health Check Assessment Bundle In today's global marketplace&T Consulting offers the Application Security Health Check Assessment Bundle, which offers a focused review this extended enterprise network, the impact of vulnerable software applications is significantly magnified

Fisher, Kathleen

94

Modeling and Simulation of Incident Management for Homeland Security Applications  

E-print Network

i Modeling and Simulation of Incident Management for Homeland Security Applications DRAFT in the breakout track on Incident Management at the workshop on Homeland Security Modeling & Simulation Organized For discussion at DHS/NIST Workshop on Homeland Security Modeling & Simulation June 14-15, 2011 Proposed matter

Magee, Joseph W.

95

Modelling and Verification of Layered Security Protocols: A Bank Application  

E-print Network

of security aspects has to be integrated into gen­ eral systems development [20, 1] and also take into accountModelling and Verification of Layered Security Protocols: A Bank Application Johannes GrË?unbauer 1 security­critical systems correctly is very di#cult and there are many examples of weaknesses arising

Jurjens, Jan

96

Modelling and Verification of Layered Security Protocols: A Bank Application  

E-print Network

of security aspects has to be integrated into gen- eral systems development [20, 1] and also take into accountModelling and Verification of Layered Security Protocols: A Bank Application Johannes Gr¨unbauer1, Ludwigstrasse 55, D-85399 Hallbergmoos, Germany hollmann@secaron.de Abstract. Designing security

Jurjens, Jan

97

COSC 490 Network Security Annie Lu 1 Authentication Applications  

E-print Network

address of C Kv = secret encryption key shared by AS an V #12;COSC 490 Network Security Annie Lu 11 (mutual authentication) #12;COSC 490 Network Security Annie Lu 14 Kerberos v4 Overview · a basic thirdCOSC 490 Network Security Annie Lu 1 Chapter 4 Authentication Applications #12;COSC 490 Network

Lu, Enyue "Annie"

98

Passive terahertz imaging for security application  

NASA Astrophysics Data System (ADS)

The passive detection is safe for passengers and operators as no radiation. Therefore, passive terahertz (THz) imaging can be applied to human body security check. Imaging in the THz band offers the unique property of being able to identify object through a range of materials. Therefore passive THz imaging is meaningful for security applications. This attribute has always been of interest to both the civil and military marks with applications. We took advantage of a single THz detector and a trihedral scanning mirror to propose another passive THz beam scanning imaging method. This method overcame the deficiencies of the serious decline in image quality due to the movement of the focused mirror. We exploited a THz scanning mirror with a trihedral scanning mirror and an ellipsoidal mirror to streamline the structure of the system and increase the scanning speed. Then the passive THz beam scanning imaging system was developed based on this method. The parameters were set as follows: the best imaging distance was 1.7m, the image height was 2m, the image width was 1m, the minimum imaging time of per frame was 8s, and the minimum resolution was 4cm. We imaged humans with different objects hidden under their clothes, such as fruit knife, belt buckle, mobile phone, screwdriver, bus cards, keys and other items. All the tested stuffs could be detected and recognized from the image.

Guo, Lan-tao; Deng, Chao; Zhao, Yuan-meng; Zhang, Cun-lin

2013-08-01

99

26 CFR 1.355-1 - Distribution of stock and securities of a controlled corporation.  

Code of Federal Regulations, 2010 CFR

...stock and securities of a controlled corporation. 1.355-1 Section 1.355-1 Internal Revenue INTERNAL REVENUE SERVICE...Effects on Shareholders and Security Holders § 1.355-1 Distribution of stock and securities of a...

2010-04-01

100

Security proof for quantum key distribution using qudit systems  

SciTech Connect

We provide security bounds against coherent attacks for two families of quantum key distribution protocols that use d-dimensional quantum systems. In the asymptotic regime, both the secret key rate for fixed noise and the robustness to noise increase with d. The finite key corrections are found to be almost insensitive to d < or approx. 20.

Sheridan, Lana [Centre for Quantum Technologies, National University of Singapore (Singapore); Scarani, Valerio [Centre for Quantum Technologies, National University of Singapore (Singapore); Department of Physics, National University of Singapore (Singapore)

2010-09-15

101

Multi-agent Based Distributed Secure Information Retrieval  

Microsoft Academic Search

Enterprise search differs from Internet search in many ways. The overwhelming majority of information in an enterprise is unstructured. Together with information in relational and proprietary databases, these documents constitute the enterprise information ecosystem. The information in an enterprise is distributed. A centric search engine does not satisfy the security requirement in enterprise information retrieval. In this paper, a multi-agent

Lixin Zhou

2010-01-01

102

Efficient and Secure Information Sharing in Distributed, Collaborative Environments  

E-print Network

Efficient and Secure Information Sharing in Distributed, Collaborative Environments Partha Dasgupta with computations and data in a dynamically changing collaboration [8], which can be informally described as "a on their individual behavior during the collaboration's lifetime ­ The collaboration partners' objectives translate

Dasgupta, Partha

103

Asynchronous Optimistic Rollback Recovery Using Secure Distributed Time  

E-print Network

Pittsburgh, PA 15213 c 1994 S.W. Smith, D.B. Johnson, J.D. Tygar This research was sponsored by the Avionics Laboratory, Wright Research and Development Center, Aeronautical Systems Division (AFSC), U. S. Air ForceAsynchronous Optimistic Rollback Recovery Using Secure Distributed Time Sean W. Smith, David B

Tygar, Doug

104

Asynchronous Optimistic Rollback Recovery Using Secure Distributed Time  

E-print Network

Pittsburgh, PA 15213 c fl1994 S.W. Smith, D.B. Johnson, J.D. Tygar This research was sponsored by the Avionics Laboratory, Wright Research and Development Center, Aeronautical Systems Division (AFSC), U. SAsynchronous Optimistic Rollback Recovery Using Secure Distributed Time Sean W. Smith, David B

105

Dissertation Secure and Privacy-Preserving Distributed Data Release  

E-print Network

privacy, we introduce a few different strategies and an adaptive algorithm to select and run the most effiDissertation Defense Secure and Privacy-Preserving Distributed Data Release Slawomir Goryczka Emory- preserving data descriptions can be still used. It remains a challenge, however, to ensure that adapted

Garibaldi, Skip

106

Autonomous Distributed System Paradigm to Secure Safety Critical  

Microsoft Academic Search

To secure modern complex system activities, rigid and heavily centralized organization is rather obstacle. To facilitate quick decision, mutual collaboration, and to maintain performability in unexpected severe situation, autonomous decision unit should act at best in intelligent way by itself. Autonomous distributed system concept plays a central role for operating complex systems commonly existing in todays networked society of 21st

Sadatoshi Kumagai; T. Miyamoto; Y. Morihiro

2006-01-01

107

SDSI A Simple Distributed Security Infrastructure Ronald L. Rivest  

E-print Network

Massachusetts Institute of Technology Cambridge, MA 02139 rivest@theory.lcs.mit.edu Butler Lampson Microsoft Corporation blampson@microsoft.com April 30, 1996 Abstract We propose a new distributed security by simple clear data structures, we emphasize clarity and readability at the expense of economical encodings

Guttman, Joshua

108

Industrial applications of distributed AI  

Microsoft Academic Search

Most work done in distributed artificial intelligence (DAI) had targeted sensory networks, including air traffic control, urban traffic control, and robotic systems. The main reason is that these applications necessitate distributed interpretation and distributed planning by means of intelligent sensors. Planning includes not only the activities to be undertaken, but also the use of material and cognitive resources to accomplish

Brahim Chaib-draa

1995-01-01

109

Machine intelligence applications to securities production  

SciTech Connect

The production of security documents provides a cache of interesting problems ranging across a broad spectrum. Some of the problems do not have rigorous scientific solutions available at this time and provide opportunities for less structured approaches such as AI. AI methods can be used in conjunction with traditional scientific and computational methods. The most productive applications of AI occur when this marriage of methods can be carried out without motivation to prove that one method is better than the other. Fields such as ink chemistry and technology, and machine inspection of graphic arts printing offer interesting challenges which will continue to intrigue current and future generations of researchers into the 21st century.

Johnson, C.K.

1987-01-01

110

Web Application Security Standards and Practices Page 1 of 13 Web Application Security Standard Operating Environment (SOE) V1 1 (2).  

E-print Network

Web Application Security Standards and Practices Page 1 of 13 Web Application Security Standard Operating Environment (SOE) V1 1 (2). Columbia University Web Application Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Application Security Standards and Practices

Grishok, Alla

111

On enabling secure applications through off-line biometric identification  

SciTech Connect

In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, the authors study secure off line authenticated user identification schemes based on a biometric system that can measure a user`s biometric accurately (up to some Hamming distance). The schemes presented here enhance identification and authorization in secure applications by binding a biometric template with authorization information on a token such as a magnetic strip. Also developed here are schemes specifically designed to minimize the compromise of a user`s private biometrics data, encapsulated in the authorization information, without requiring secure hardware tokens. In this paper the authors furthermore study the feasibility of biometrics performing as an enabling technology for secure system and application design. The authors investigate a new technology which allows a user`s biometrics to facilitate cryptographic mechanisms.

Davida, G.I. [Univ. of Wisconsin, Milwaukee, WI (United States); Frankel, Y. [CertCo LLC, New York, NY (United States); Matt, B.J. [Sandia National Labs., Albuquerque, NM (United States)

1998-04-01

112

From Trusted to Secure: Building and Executing Applications That Enforce System Security  

Microsoft Academic Search

Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections rely on restricting the flow of infor- mation between processes based on security levels. The problem is, there are many applications that defy simple classification by security level, some of them essential for system operation. Surprisingly, the

Boniface Hicks; Sandra Rueda; Trent Jaeger; Patrick Drew Mcdaniel

2007-01-01

113

Advances in Adaptive Secure Message-Oriented Middleware for Distributed Business-Critical Systems  

NASA Astrophysics Data System (ADS)

Distributed business-critical systems are often implemented using distributed messaging infrastructures with increasingly stringent requirements with regard to resilience, security, adaptability, intelligence and scalability. Current systems have limited ability in meeting these requirements. This paper describes advances in adaptive security, security metrics, anomaly detection and resilience, and authentication architecture in such distributed messaging systems.

Abie, Habtamu; Savola, Reijo M.; Wang, Jinfu; Rotondi, Domenico

2010-09-01

114

Tools for distributed application management  

NASA Technical Reports Server (NTRS)

Distributed application management consists of monitoring and controlling an application as it executes in a distributed environment. It encompasses such activities as configuration, initialization, performance monitoring, resource scheduling, and failure response. The Meta system (a collection of tools for constructing distributed application management software) is described. Meta provides the mechanism, while the programmer specifies the policy for application management. The policy is manifested as a control program which is a soft real-time reactive program. The underlying application is instrumented with a variety of built-in and user-defined sensors and actuators. These define the interface between the control program and the application. The control program also has access to a database describing the structure of the application and the characteristics of its environment. Some of the more difficult problems for application management occur when preexisting, nondistributed programs are integrated into a distributed application for which they may not have been intended. Meta allows management functions to be retrofitted to such programs with a minimum of effort.

Marzullo, Keith; Cooper, Robert; Wood, Mark; Birman, Kenneth P.

1990-01-01

115

Tools for distributed application management  

NASA Technical Reports Server (NTRS)

Distributed application management consists of monitoring and controlling an application as it executes in a distributed environment. It encompasses such activities as configuration, initialization, performance monitoring, resource scheduling, and failure response. The Meta system is described: a collection of tools for constructing distributed application management software. Meta provides the mechanism, while the programmer specifies the policy for application management. The policy is manifested as a control program which is a soft real time reactive program. The underlying application is instrumented with a variety of built-in and user defined sensors and actuators. These define the interface between the control program and the application. The control program also has access to a database describing the structure of the application and the characteristics of its environment. Some of the more difficult problems for application management occur when pre-existing, nondistributed programs are integrated into a distributed application for which they may not have been intended. Meta allows management functions to be retrofitted to such programs with a minimum of effort.

Marzullo, Keith; Wood, Mark; Cooper, Robert; Birman, Kenneth P.

1990-01-01

116

Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)  

SciTech Connect

Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

Hadley, Mark D.; Clements, Samuel L.

2009-01-01

117

Integrity and Security of the Application Level Active Networks  

Microsoft Academic Search

The advances in programmable networks enforce the importance of ensuring and maintaining the integrity and security of the network and the supporting systems. In the future programmable network scenarios, the threats to integrity and security will rapidly increase as third-party value added service providers and end-users start deploying their customised applications on the operator infrastructure. Here we discuss some typical

Ognjen Prnjat; Temitope Olukemi; Ioannis Liabotis; Lionel Sacks

118

Architectures for Inlining Security Monitors in Web Applications  

E-print Network

the modern browsing experience on the web. JavaScript enables dynamic and interactive web pages. Glued policies to be enforced in web applications. This paper focuses on securing JavaScript code by inlining architectures for inlining security monitors for JavaScript: via browser extension, via web proxy, via suffix

Sabelfeld, Andrei

119

A New Tool for Securing Applications  

E-print Network

) Next-Generation Secure Computing Base (NGSCB) Case study on integration of the two Technical merits Integrity, revenue, and confidentiality attacks are possible against a document in PDF #12;Electronic Legal Forms Security Issues - Integrity PDF - an open format A number of cracks are available PDF documents

Thomborson, Clark

120

Mobile Technologies Applications in Security Systems  

Microsoft Academic Search

On the improvement of the information technologies, the security systems are improving more and more as well, the extent of their integration is increasing too. The efficiency of the integrated security system is subject to the detection time, reaction time, and the time of determination of the location of breach. The reaction time consists of the two components: information transmission

Algimantas Valinevicius; Mindaugas Zilys; Sarunas Kilius

2007-01-01

121

POSH: A generalized CAPTCHA with security applications Waseem S. Daher  

E-print Network

POSH: A generalized CAPTCHA with security applications by Waseem S. Daher Bachelor of Science by . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Arthur C. Smith Chairman, Department Committee on Graduate Theses #12;2 #12;POSH: A generalized CAPTCHA

Goldwasser, Shafi

122

20 CFR 404.611 - How do I file an application for Social Security benefits?  

Code of Federal Regulations, 2010 CFR

... How do I file an application for Social Security benefits? 404.611 Section 404.611 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL... How do I file an application for Social Security benefits? (a)...

2010-04-01

123

20 CFR 404.611 - How do I file an application for Social Security benefits?  

Code of Federal Regulations, 2011 CFR

... How do I file an application for Social Security benefits? 404.611 Section 404.611 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL... How do I file an application for Social Security benefits? (a)...

2011-04-01

124

20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.  

Code of Federal Regulations, 2011 CFR

... Applications and other forms used in Social Security Administration programs. 422...Section 422.501 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION... Applications and other forms used in Social Security Administration programs....

2011-04-01

125

20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.  

Code of Federal Regulations, 2010 CFR

... Applications and other forms used in Social Security Administration programs. 422...Section 422.501 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION... Applications and other forms used in Social Security Administration programs....

2010-04-01

126

17 CFR 242.609 - Registration of securities information processors: form of application and amendments.  

Code of Federal Regulations, 2010 CFR

... false Registration of securities information processors: form of application...609 Registration of securities information processors: form of application...for the registration of a securities information processor shall be...

2010-04-01

127

Information Flow for Secure Distributed Applications  

E-print Network

Private and confidential information is increasingly stored online and increasingly being exposed due to human errors as well as malicious attacks. Information leaks threaten confidentiality, lead to lawsuits, damage ...

Cheng, Winnie Wing-Yee

2009-08-27

128

Information flow for secure distributed applications  

E-print Network

Private and confidential information is increasingly stored online and increasingly being exposed due to human errors as well as malicious attacks. Information leaks threaten confidentiality, lead to lawsuits, damage ...

Cheng, Winnie Wing-Yee

2009-01-01

129

Energy-efficiency and Security Issues in the Cisco Nexus Virtual Distributed Benjamin Peterson  

E-print Network

Energy-efficiency and Security Issues in the Cisco Nexus Virtual Distributed Switching Benjamin with the Cisco Nexus virtual switching environment. However, possible security issues of this environment have of the security implications of the Cisco Nexus virtual distributed switching environment. Keywords

Politècnica de Catalunya, Universitat

130

Systems architecture for distributed applications  

NASA Technical Reports Server (NTRS)

This paper describes the kernel of a distributed operating system called ADAPT. The system runs on top of existing single host operating systems that are networked together. It's purpose is to transform this network of individual systems into a single system that will be easier for application programmers to use. This single system need not be monolithic; ADAPT facilitates the construction of both integrated and modular distributed systems.

Peebles, R.

1980-01-01

131

Suggestions for Social Security Disability Applicants  

MedlinePLUS

... and specialty. How much will an attorney cost? Fee Agreement Before the attorney can charge you for ... and your attorney must sign and file a fee agreement with the Social Security Administration. Your attorney ...

132

Profiling and accelerating string matching algorithms in three network content security applications  

Microsoft Academic Search

The efficiency of string matching algorithms is essential for network con- tent security applications, such as intrusion detection systems, anti-virus sys- tems, and Web content filters. This work reviews typical algorithms and profiles their performance under various situations to study the influence of the number, the length, and the character distribution of the signatures on performance. This profiling can reveal

Po-ching Lin; Zhi-xiang Li; Ying-dar Lin; Yuan-cheng Lai; Frank C. Lin

2006-01-01

133

Service and cloud computing oriented web GIS for labor and social security applications  

Microsoft Academic Search

The service and cloud computing oriented architecture is a very promising architecture for practical implementation of the next generation geographical information systems. This paper investigated the service and cloud computing oriented architecture for constructing a distributed and web service enabled geographical information platform for labor and social security applications. The spatial cloud computing applies geographical information systems to the cloud

Xiaolin Lu

2010-01-01

134

A Cooperative Model for IS Security Risk Management in Distributed Environment  

PubMed Central

Given the increasing cooperation between organizations, the flexible exchange of security information across the allied organizations is critical to effectively manage information systems (IS) security in a distributed environment. In this paper, we develop a cooperative model for IS security risk management in a distributed environment. In the proposed model, the exchange of security information among the interconnected IS under distributed environment is supported by Bayesian networks (BNs). In addition, for an organization's IS, a BN is utilized to represent its security environment and dynamically predict its security risk level, by which the security manager can select an optimal action to safeguard the firm's information resources. The actual case studied illustrates the cooperative model presented in this paper and how it can be exploited to manage the distributed IS security risk effectively. PMID:24563626

Zheng, Chundong

2014-01-01

135

A cooperative model for IS security risk management in distributed environment.  

PubMed

Given the increasing cooperation between organizations, the flexible exchange of security information across the allied organizations is critical to effectively manage information systems (IS) security in a distributed environment. In this paper, we develop a cooperative model for IS security risk management in a distributed environment. In the proposed model, the exchange of security information among the interconnected IS under distributed environment is supported by Bayesian networks (BNs). In addition, for an organization's IS, a BN is utilized to represent its security environment and dynamically predict its security risk level, by which the security manager can select an optimal action to safeguard the firm's information resources. The actual case studied illustrates the cooperative model presented in this paper and how it can be exploited to manage the distributed IS security risk effectively. PMID:24563626

Feng, Nan; Zheng, Chundong

2014-01-01

136

Incompleteness and limit of security theory of quantum key distribution  

NASA Astrophysics Data System (ADS)

It is claimed in the many papers that a trace distance: d guarantees the universal composition security in quantum key distribution (QKD) like BB84 protocol. In this introduction paper, at first, it is explicitly explained what is the main misconception in the claim of the unconditional security for QKD theory. In general terms, the cause of the misunderstanding on the security claim is the Lemma in the paper of Renner. It suggests that the generation of the perfect random key is assured by the probability (1-d), and its failure probability is d. Thus, it concludes that the generated key provides the perfect random key sequence when the protocol is success. So the QKD provides perfect secrecy to the one time pad. This is the reason for the composition claim. However, the quantity of the trace distance (or variational distance) is not the probability for such an event. If d is not small enough, always the generated key sequence is not uniform. Now one needs the reconstruction of the evaluation of the trace distance if one wants to use it. One should first go back to the indistinguishability theory in the computational complexity based, and to clarify the meaning of the value of the variational distance. In addition, the same analysis for the information theoretic case is necessary. The recent serial papers by H.P.Yuen have given the answer on such questions. In this paper, we show more concise description of Yuen's theory, and clarify that the upper bound theories for the trace distance by Tomamichel et al and Hayashi et al are constructed by the wrong reasoning of Renner and it is unsuitable as the security analysis. Finally, we introduce a new macroscopic quantum communication to replace Q-bit QKD.

Hirota, Osamu; Murakami, Dan; Kato, Kentaro; Futami, Fumio

2012-10-01

137

17 CFR 240.15Ca2-1 - Application for registration as a government securities broker or government securities dealer.  

Code of Federal Regulations, 2013 CFR

... false Application for registration as a government securities broker or government securities dealer. 240.15Ca2-1 Section...Securities Exchange Act of 1934 Registration of Government Securities Brokers and Government...

2013-04-01

138

17 CFR 240.15Ca2-1 - Application for registration as a government securities broker or government securities dealer.  

Code of Federal Regulations, 2012 CFR

... false Application for registration as a government securities broker or government securities dealer. 240.15Ca2-1 Section...Securities Exchange Act of 1934 Registration of Government Securities Brokers and Government...

2012-04-01

139

17 CFR 240.15Ca2-1 - Application for registration as a government securities broker or government securities dealer.  

Code of Federal Regulations, 2011 CFR

... false Application for registration as a government securities broker or government securities dealer. 240.15Ca2-1 Section...Securities Exchange Act of 1934 Registration of Government Securities Brokers and Government...

2011-04-01

140

17 CFR 240.15Ca2-1 - Application for registration as a government securities broker or government securities dealer.  

Code of Federal Regulations, 2014 CFR

... false Application for registration as a government securities broker or government securities dealer. 240.15Ca2-1 Section...Securities Exchange Act of 1934 Registration of Government Securities Brokers and Government...

2014-04-01

141

17 CFR 240.15Ca2-1 - Application for registration as a government securities broker or government securities dealer.  

Code of Federal Regulations, 2010 CFR

... false Application for registration as a government securities broker or government securities dealer. 240.15Ca2-1 Section...Securities Exchange Act of 1934 Registration of Government Securities Brokers and Government...

2010-04-01

142

ESES\\/signature and its applications for secure data exchange  

Microsoft Academic Search

More and more devices including PCs, PDAs, mobile phones, and various kinds of appliances are being connected to the network and many people are trying to use them for network applications such as e-commerce. One of the most important requirements for a network application is the security of data exchanged through the network. XML has been widely accepted as a

Jae Seung Lee; Ki Young Moon; Seung Won Sohn

2002-01-01

143

Collaborative Knowledge Discovery & Marshalling for Intelligence & Security Applications  

SciTech Connect

This paper discusses the Knowledge Encapsulation Framework, a flexible, extensible evidence-marshalling environment built upon a natural language processing pipeline and exposed to users via an open-source semantic wiki. We focus our discussion on applications of the framework to intelligence and security applications, specifically, an instantiation of the KEF environment for researching illicit trafficking in nuclear materials.

Cowell, Andrew J.; Jensen, Russell S.; Gregory, Michelle L.; Ellis, Peter C.; Fligg, Alan K.; McGrath, Liam R.; O'Hara, Kelly A.; Bell, Eric B.

2010-05-24

144

Security and privacy in RFID and applications in telemedicine  

Microsoft Academic Search

Radio frequency identification systems have many applications in manufacturing, supply chain management, inventory control, and telemedicine. In an RFID system, products and objects are given RFID tags to identify themselves. However, security and privacy issues pose significant challenges on these systems. In this article we first briefly introduce RFID systems. Then two RFID applications in telemedicine are proposed: studying supply

Yang Xiao; Xuemin Shen; BO Sun; Lin Cai

2006-01-01

145

Secure Hamming Distance Based Computation and Its Applications  

Microsoft Academic Search

This paper examines secure two-party computation of functions which depend only on the Hamming distance of the inputs of the\\u000a two parties. We present efficient protocols for computing these functions. In particular, we present protocols which are secure\\u000a in the sense of full simulatability against malicious adversaries.\\u000a \\u000a We show different applications of this family of functions, including a protocol we

Ayman Jarrous; Benny Pinkas

2009-01-01

146

A resilient and secure software platform and architecture for distributed spacecraft  

NASA Astrophysics Data System (ADS)

A distributed spacecraft is a cluster of independent satellite modules flying in formation that communicate via ad-hoc wireless networks. This system in space is a cloud platform that facilitates sharing sensors and other computing and communication resources across multiple applications, potentially developed and maintained by different organizations. Effectively, such architecture can realize the functions of monolithic satellites at a reduced cost and with improved adaptivity and robustness. Openness of these architectures pose special challenges because the distributed software platform has to support applications from different security domains and organizations, and where information flows have to be carefully managed and compartmentalized. If the platform is used as a robust shared resource its management, configuration, and resilience becomes a challenge in itself. We have designed and prototyped a distributed software platform for such architectures. The core element of the platform is a new operating system whose services were designed to restrict access to the network and the file system, and to enforce resource management constraints for all non-privileged processes Mixed-criticality applications operating at different security labels are deployed and controlled by a privileged management process that is also pre-configuring all information flows. This paper describes the design and objective of this layer.

Otte, William R.; Dubey, Abhishek; Karsai, Gabor

2014-06-01

147

Optimal service distribution in WSN service system subject to data security constraints.  

PubMed

Services composition technology provides a flexible approach to building Wireless Sensor Network (WSN) Service Applications (WSA) in a service oriented tasking system for WSN. Maintaining the data security of WSA is one of the most important goals in sensor network research. In this paper, we consider a WSN service oriented tasking system in which the WSN Services Broker (WSB), as the resource management center, can map the service request from user into a set of atom-services (AS) and send them to some independent sensor nodes (SN) for parallel execution. The distribution of ASs among these SNs affects the data security as well as the reliability and performance of WSA because these SNs can be of different and independent specifications. By the optimal service partition into the ASs and their distribution among SNs, the WSB can provide the maximum possible service reliability and/or expected performance subject to data security constraints. This paper proposes an algorithm of optimal service partition and distribution based on the universal generating function (UGF) and the genetic algorithm (GA) approach. The experimental analysis is presented to demonstrate the feasibility of the suggested algorithm. PMID:25093346

Wu, Zhao; Xiong, Naixue; Huang, Yannong; Gu, Qiong

2014-01-01

148

Optimal Service Distribution in WSN Service System Subject to Data Security Constraints  

PubMed Central

Services composition technology provides a flexible approach to building Wireless Sensor Network (WSN) Service Applications (WSA) in a service oriented tasking system for WSN. Maintaining the data security of WSA is one of the most important goals in sensor network research. In this paper, we consider a WSN service oriented tasking system in which the WSN Services Broker (WSB), as the resource management center, can map the service request from user into a set of atom-services (AS) and send them to some independent sensor nodes (SN) for parallel execution. The distribution of ASs among these SNs affects the data security as well as the reliability and performance of WSA because these SNs can be of different and independent specifications. By the optimal service partition into the ASs and their distribution among SNs, the WSB can provide the maximum possible service reliability and/or expected performance subject to data security constraints. This paper proposes an algorithm of optimal service partition and distribution based on the universal generating function (UGF) and the genetic algorithm (GA) approach. The experimental analysis is presented to demonstrate the feasibility of the suggested algorithm. PMID:25093346

Wu, Zhao; Xiong, Naixue; Huang, Yannong; Gu, Qiong

2014-01-01

149

Integrated Network Security Protocol Layer for Open-Access Power Distribution Systems  

Microsoft Academic Search

Power distribution system cyber-security concerns are increasing rapidly with growing demands for open accesses to the distribution systems for electricity generation and trading imposed by new government deregulations. This paper proposes a new integrated network security protocol layer, located below the data-link layer of DNP3 - a popular utility protocol, to enhance the data transmission cyber-security for power distribution systems.

Todd Mander; Farhad Nabhani; Lin Wang; Richard Cheung

2007-01-01

150

Addressing security issues related to virtual institute distributed activities  

NASA Astrophysics Data System (ADS)

One issue confounding the development and experimentation of distributed modeling and simulation environments is the inability of the project team to identify and collaborate with resources, both human and technical, from outside the United States. This limitation is especially significant within the human behavior representation area where areas such as cultural effects research and joint command team behavior modeling require the participation of various cultural and national representatives. To address this limitation, as well as other human behavior representation research issues, NATO Research and Technology Organization initiated a project to develop a NATO virtual institute that enables more effective and more collaborative research into human behavior representation. However, in building and operating a virtual institute one of the chief concerns must be the cyber security of the institute. Because the institute "exists" in cyberspace, all of its activities are susceptible to cyberattacks, subterfuge, denial of service and all of the vulnerabilities that networked computers must face. In our opinion, for the concept of virtual institutes to be successful and useful, their operations and services must be protected from the threats in the cyber environment. A key to developing the required protection is the development and promulgation of standards for cyber security. In this paper, we discuss the types of cyber standards that are required, how new internet technologies can be exploited and can benefit the promulgation, development, maintenance, and robustness of the standards. This paper is organized as follows. Section One introduces the concept of the virtual institutes, the expected benefits, and the motivation for our research and for research in this area. Section Two presents background material and a discussion of topics related to VIs, uman behavior and cultural modeling, and network-centric warfare. Section Three contains a discussion of the security challenges that face the virtual institute and the characteristics of the standards that must be employed. Section Four contains our proposal for documentation of the cybersecurity standards. Section Five contains the conclusion and suggestions for further work.

Stytz, Martin R.; Banks, Sheila B.

2008-03-01

151

7: Network Security Comp 361, Fall 2003  

E-print Network

message integrity key distribution security in practice: firewalls security in application, transport security? 7.2 Principles of cryptography 7.3 Authentication 7.4 Integrity 7.5 Key Distribution7: Network Security 1 Comp 361, Fall 2003 Chapter 7: Network Security Chapter goals: understand

Golin, Mordecai J.

152

Proof of Security of a High-Capacity Quantum Key Distribution Protocol  

E-print Network

We prove the security of a high-capacity quantum key distribution protocol over noisy channels. By using entanglement purification protocol, we construct a modified version of the protocol in which we separate it into two consecutive stages. We prove their securities respectively and hence the security of the whole protocol.

Xiao-Wei Zhang; Kai Wen; Gui Lu Long

2005-12-25

153

Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices  

E-print Network

Randomness is a vital resource for modern day information processing, especially for cryptography. A wide range of applications critically rely on abundant, high quality random numbers generated securely. Here we show how to expand a random seed at an exponential rate without trusting the underlying quantum devices. Our approach is secure against the most general adversaries, and has the following new features: cryptographic quality output security, tolerating a constant level of implementation imprecision, requiring only a constant size quantum memory for the honest implementation, and allowing a large natural class of constructions. In conjunct with a recent work by Chung, Shi and Wu (QIP 2014), it also leads to robust unbounded expansion using just 2 multi-part devices. When adapted for distributing cryptographic keys, our method achieves, for the first time, exponential expansion combined with cryptographic security and noise tolerance. The proof proceeds by showing that the Renyi divergence of the outputs of the protocol (for a specific bounding operator) decreases linearly as the protocol iterates. At the heart of the proof are a new uncertainty principle on quantum measurements, and a method for simulating trusted measurements with untrusted devices.

Carl A. Miller; Yaoyun Shi

2014-02-25

154

Security of continuous-variable quantum key distribution against general attacks  

NASA Astrophysics Data System (ADS)

We prove the security of Gaussian continuous-variable quantum key distribution with coherent states against arbitrary attacks in the finite-size regime. In contrast to previously known proofs of principle (based on the de Finetti theorem), our result is applicable in the practically relevant finite-size regime. This is achieved using a novel proof approach, which exploits phase-space symmetries of the protocols as well as the postselection technique introduced by Christandl, Koenig and Renner (Phys. Rev. Lett. 102, 020504 (2009)).

Leverrier, Anthony

2013-03-01

155

Software and CyberSecurity: Attack Resistant Secure Software Development Survivable Distributed Communication Services (DCS)  

Microsoft Academic Search

Messaging is a critical prerequisite for the scalability, dependability, and reliability of distributed services. A scalable messaging platform accommodates multiple diverse clients and adapts seamlessly within a heterogeneous environment. A reliable and dependable messaging scheme also offers a specific level of guarantee for the delivery of messages to legitimate services. Application services rely on message transport intermediaries to preserve loosely

N. J. Fuller; G. Simco

2008-01-01

156

A Secure Key Distribution System of Quantum Cryptography Based on the Coherent State  

NASA Technical Reports Server (NTRS)

The cryptographic communication has a lot of important applications, particularly in the magnificent prospects of private communication. As one knows, the security of cryptographic channel depends crucially on the secrecy of the key. The Vernam cipher is the only cipher system which has guaranteed security. In that system the key must be as long as the message and most be used only once. Quantum cryptography is a method whereby key secrecy can be guaranteed by a physical law. So it is impossible, even in principle, to eavesdrop on such channels. Quantum cryptography has been developed in recent years. Up to now, many schemes of quantum cryptography have been proposed. Now one of the main problems in this field is how to increase transmission distance. In order to use quantum nature of light, up to now proposed schemes all use very dim light pulses. The average photon number is about 0.1. Because of the loss of the optical fiber, it is difficult for the quantum cryptography based on one photon level or on dim light to realize quantum key-distribution over long distance. A quantum key distribution based on coherent state is introduced in this paper. Here we discuss the feasibility and security of this scheme.

Guo, Guang-Can; Zhang, Xiao-Yu

1996-01-01

157

Application of homomorphism to secure image sharing  

NASA Astrophysics Data System (ADS)

In this paper, we present a new approach for sharing images between l players by exploiting the additive and multiplicative homomorphic properties of two well-known public key cryptosystems, i.e. RSA and Paillier. Contrary to the traditional schemes, the proposed approach employs secret sharing in a way that limits the influence of the dealer over the protocol and allows each player to participate with the help of his key-image. With the proposed approach, during the encryption step, each player encrypts his own key-image using the dealer's public key. The dealer encrypts the secret-to-be-shared image with the same public key and then, the l encrypted key-images plus the encrypted to-be shared image are multiplied homomorphically to get another encrypted image. After this step, the dealer can safely get a scrambled image which corresponds to the addition or multiplication of the l + 1 original images ( l key-images plus the secret image) because of the additive homomorphic property of the Paillier algorithm or multiplicative homomorphic property of the RSA algorithm. When the l players want to extract the secret image, they do not need to use keys and the dealer has no role. Indeed, with our approach, to extract the secret image, the l players need only to subtract their own key-image with no specific order from the scrambled image. Thus, the proposed approach provides an opportunity to use operators like multiplication on encrypted images for the development of a secure privacy preserving protocol in the image domain. We show that it is still possible to extract a visible version of the secret image with only l-1 key-images (when one key-image is missing) or when the l key-images used for the extraction are different from the l original key-images due to a lossy compression for example. Experimental results and security analysis verify and prove that the proposed approach is secure from cryptographic viewpoint.

Islam, Naveed; Puech, William; Hayat, Khizar; Brouzet, Robert

2011-09-01

158

Model-based Security Engineering of Distributed Information Systems  

E-print Network

Jürjens, Bashar Nuseibeh BMW Group Munich, Germany Department of Computing The Open University, GB http://www.jurjens.de/jan #12;Best (BMW), J�RJENS, Nuseibeh (OU): Model-based Security Engineering... 2 Security is holistic #12;Best (BMW), J�RJENS, Nuseibeh (OU): Model-based Security Engineering... 3 (UML) Models

Jurjens, Jan

159

Muon Fluence Measurements for Homeland Security Applications  

SciTech Connect

This report focuses on work conducted at Pacific Northwest National Laboratory to better characterize aspects of backgrounds in RPMs deployed for homeland security purposes. Two polyvinyl toluene scintillators were utilized with supporting NIM electronics to measure the muon coincidence rate. Muon spallation is one mechanism by which background neutrons are produced. The measurements performed concentrated on a broad investigation of the dependence of the muon flux on a) variations in solid angle subtended by the detector; b) the detector inclination with the horizontal; c) depth underground; and d) diurnal effects. These tests were conducted inside at Building 318/133, outdoors at Building 331G, and underground at Building 3425 at Pacific Northwest National Laboratory.

Ankney, Austin S.; Berguson, Timothy J.; Borgardt, James D.; Kouzes, Richard T.

2010-08-10

160

Part III: AFS - A Secure Distributed File System  

SciTech Connect

AFS is a secure distributed global file system providing location independence, scalability and transparent migration capabilities for data. AFS works across a multitude of Unix and non-Unix operating systems and is used at many large sites in production for many years. AFS still provides unique features that are not available with other distributed file systems even though AFS is almost 20 years old. This age might make it less appealing to some but with IBM making AFS available as open-source in 2000, new interest in use and development was sparked. When talking about AFS, people often mention other file systems as potential alternatives. Coda (http://www.coda.cs.cmu.edu/) with its disconnected mode will always be a research project and never have production quality. Intermezzo (http://www.inter-mezzo.org/) is now in the Linux kernel but not available for any other operating systems. NFSv4 (http://www.nfsv4.org/) which picked up many ideas from AFS and Coda is not mature enough yet to be used in serious production mode. This article presents the rich features of AFS and invites readers to play with it.

Wachsmann, A.; /SLAC

2005-06-29

161

KTDCKM-SDC: A Distributed Conference Key Management Scheme for Secure Dynamic Conferencing  

Microsoft Academic Search

Secure dynamic conferencing (SDC) is a scenario where given a group of participants, any subset of participants can form a privileged subgroup, called a conference, and communicate securely among themselves. The existing SDC schemes belong to two classes: centralized and distributed. The former incurs the single-point of failure, the central point of attack and performance bottleneck. The two existing distributed

Pratima Adusumilli; Xukai Zou

2005-01-01

162

Laser power beaming for defense and security applications  

NASA Astrophysics Data System (ADS)

Laser power beaming - transmitting electric power without wires via laser - has been demonstrated for kilowatt power levels and kilometer distances. This paper reviews the demonstrated and projected capabilities and limitations of laser power beaming, and analyzes the requirements for several application areas relevant to defense and security: unmanned aerial vehicles (UAVs), communications relays, sensor networks, and field unit or forward base power.

Nugent, Thomas J., Jr.; Kare, Jordin T.

2011-05-01

163

Custom electronic nose with potential homeland security applications  

Microsoft Academic Search

Detailed in this work is the design and development of a handheld electronic nose nose with an array of conducting polymer composite film sensors interfaced to a Compaq iPAQ. The device has potential applications in homeland security, such as screening people packages, luggage and vehicles at key locations such as airports or government buildings, for the prevention of terrorist attacks.

K. I. Arshak; C. Cunniffe; E. G. Moore; L. M. Cavanagh

2006-01-01

164

Mobile RFID Applications and Security Konidala M. Divyan, Kwangjo Kim  

E-print Network

Mobile RFID Applications and Security Challenges Konidala M. Divyan, Kwangjo Kim InformationDong, Daejeon 305732, Republic of Korea {divyan, kkj}@icu.ac.kr Abstract. With mobile RFID technology, handheld portable devices like mobile phones and PDAs, also behave as RFID readers and RFID tags. As RFID readers

Kim, Kwangjo

165

SECURE MANAGEMENT OF KEYS IN CRYPTOGRAPHIC APPLICATIONS: GUIDANCE FOR ORGANIZATIONS  

E-print Network

their security requirements. A cryptographic algorithm and a key are used to provide a number of cryptographic by strong cryptographic algorithms. The Information Technology Laboratory of the National Institute for selecting appropriate cryptographic algorithms and for managing the cryptographic keys. Part 3, Application

166

Active MMW multi-parametric imaging technique for security applications  

Microsoft Academic Search

Active millimeter wave (MMW) imaging is currently being considered as a technology that can essentially contribute to security applications in both outdoor and indoor scenarios. Proposed novel active quasi-optical imaging technique being based on multi-parametric encoded illumination of observed scenes adds principally new possibilities for imaging of the scenes. The technique allows to reveal multiple distinctive features of threat objects

Leonid V. Volkov; Alexander I. Voronko; N. L. Berendakova

2008-01-01

167

Fully Simulatable Quantum-Secure Coin-Flipping and Applications  

E-print Network

to generate a long random bit-string. In particular, no fully simulatable constant-round coin-flip protocolFully Simulatable Quantum-Secure Coin-Flipping and Applications Carolin Lunemann and Jesper Buus propose a coin-flip protocol which yields a string of strong, random coins and is fully simulatable

168

AppsPlayground: Automatic Security Analysis of Smartphone Applications  

E-print Network

3 968 f· Large scale measurements 3,968 apps from Android Market (Google Play) ­ 946 leak some ­ Google Play has over 700,000 apps This number is constantly increasing­ This number is constantlyAppsPlayground: Automatic Security Analysis of Smartphone Applications Vaibhav Rastogi, Yan Chen

Chen, Yan

169

Planar Microoptical Systems for Correlation and Security Applications  

NASA Astrophysics Data System (ADS)

In this chapter we focussed on the potential of microoptically integrated systems for security applications. Adopting the concept of planar-integrated free-space optics we demonstrated a variety of systems architectures of optical correlators which are usefull for this area of applications. The experiments with microoptical systems clearly show that optical systems for applications in homeland security can be miniaturized and integrated to extremely compact and rugged devices with state-of-the-art microoptics and lithographic technology. Especially the planar interfaces of PIFSO offer the chance for hybrid integration of a variety of devices such as opto-electronics or micromechanics. Thus, in combination with further technological improvement, the door seems to be open for real-world applications.

Sinzinger, Stefan; Jahns, Jürgen; Daria, Vincent R.; Glückstad, Jesper

170

Web Application Security—Past, Present, and Future  

Microsoft Academic Search

Web application security remains a major roadblock to universal acceptance of the Web for many kinds of online transactions,\\u000a especially since the recent sharp increase in remotely exploitable vulnerabilities has been attributed to Web application\\u000a bugs. In software engineering, software testing is an established and well-researched process for improving software quality.\\u000a Recently, formal verification tools have also shown success in

Yao-Wen Huang; D. T. Lee

171

X-ray imaging for security applications  

NASA Astrophysics Data System (ADS)

The X-ray screening of luggage by aviation security personnel may be badly hindered by the lack of visual cues to depth in an image that has been produced by transmitted radiation. Two-dimensional "shadowgraphs" with "organic" and "metallic" objects encoded using two different colors (usually orange and blue) are still in common use. In the context of luggage screening there are no reliable cues to depth present in individual shadowgraph X-ray images. Therefore, the screener is required to convert the 'zero depth resolution' shadowgraph into a three-dimensional mental picture to be able to interpret the relative spatial relationship of the objects under inspection. Consequently, additional cognitive processing is required e.g. integration, inference and memory. However, these processes can lead to serious misinterpretations of the actual physical structure being examined. This paper describes the development of a stereoscopic imaging technique enabling the screener to utilise binocular stereopsis and kinetic depth to enhance their interpretation of the actual nature of the objects under examination. Further work has led to the development of a technique to combine parallax data (to calculate the thickness of a target material) with the results of a basis material subtraction technique to approximate the target's effective atomic number and density. This has been achieved in preliminary experiments with a novel spatially interleaved dual-energy sensor which reduces the number of scintillation elements required by 50% in comparison to conventional sensor configurations.

Evans, J. Paul

2004-01-01

172

78 FR 79298 - Securities Exempted; Distribution of Shares by Registered Open-End Management Investment Company...  

Federal Register 2010, 2011, 2012, 2013, 2014

...Applications Regarding Joint Enterprises or Arrangements and Certain Profit-Sharing Plans AGENCY: Securities and Exchange Commission...Applications regarding joint enterprises or arrangements and certain profit-sharing plans. * * * * * (d) * * * (6) The receipt...

2013-12-30

173

A dynamic technique for enhancing the security and privacy of web applications  

Microsoft Academic Search

Web application security and privacy became a central concern among the security community. The problems that are faced once an application is compromised necessarily demands special attention. The emerging programming languages, which allow unexperienced users to quickly develop applications, still fail to introduce mechanisms for pre- venting the aforementioned attacks. We introduce a technique for en- hancing the security and

Ariel Futoransky; Ezequiel Gutesman; Ariel Waissbein

174

A Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Applications  

Microsoft Academic Search

This paper present and implement a Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Application. In the developing process is used a Windows Phone 7 application that interact with a WCF Web Service and a database. The types of Business Intelligence Mobile Applications are presented. The Windows mobile devices security and restrictions are presented. The namespaces and security

Silvia TRIF; Adrian VISOIU

2011-01-01

175

Security analysis of an untrusted source for quantum key distribution: passive approach  

NASA Astrophysics Data System (ADS)

We present a passive approach to the security analysis of quantum key distribution (QKD) with an untrusted source. A complete proof of its unconditional security is also presented. This scheme has significant advantages in real-life implementations as it does not require fast optical switching or a quantum random number generator. The essential idea is to use a beam splitter to split each input pulse. We show that we can characterize the source using a cross-estimate technique without active routing of each pulse. We have derived analytical expressions for the passive estimation scheme. Moreover, using simulations, we have considered four real-life imperfections: additional loss introduced by the 'plug&play' structure, inefficiency of the intensity monitor noise of the intensity monitor, and statistical fluctuation introduced by finite data size. Our simulation results show that the passive estimate of an untrusted source remains useful in practice, despite these four imperfections. Also, we have performed preliminary experiments, confirming the utility of our proposal in real-life applications. Our proposal makes it possible to implement the 'plug&play' QKD with the security guaranteed, while keeping the implementation practical.

Zhao, Yi; Qi, Bing; Lo, Hoi-Kwong; Qian, Li

2010-02-01

176

A strategy for the development of secure telemedicine applications.  

PubMed Central

Healthcare applications based on computer-supported collaboration technologies have the potential to improve the quality of care delivered to patients. Such applications can help overcome barriers to quality healthcare in the small, scattered populations of rural areas enabling telemedicine to be a part of the practice of medicine. However the growing concern about the potential for abuse through disclosure of personal health information to unauthorized parties has restricted the deployment and adoption of these potentially valuable tools. The authors, who built ARTEMIS--an Intranet healthcare collaboration facility, now describe their approach to develop secure telemedicine applications for rural healthcare practitioners. PMID:9357645

Raman, R. S.; Reddy, R.; Jagannathan, V.; Reddy, S.; Cleetus, K. J.; Srinivas, K.

1997-01-01

177

Practical Pocket PC Application w/Biometric Security  

NASA Technical Reports Server (NTRS)

I work in the Flight Software Engineering Branch, where we provide design and development of embedded real-time software applications for flight and supporting ground systems to support the NASA Aeronautics and Space Programs. In addition, this branch evaluates, develops and implements new technologies for embedded real-time systems, and maintains a laboratory for applications of embedded technology. The majority of microchips that are used in modern society have been programmed using embedded technology. These small chips can be found in microwaves, calculators, home security systems, cell phones and more. My assignment this summer entails working with an iPAQ HP 5500 Pocket PC. This top-of-the-line hand-held device is one of the first mobile PC's to introduce biometric security capabilities. Biometric security, in this case a fingerprint authentication system, is on the edge of technology as far as securing information. The benefits of fingerprint authentication are enormous. The most significant of them are that it is extremely difficult to reproduce someone else's fingerprint, and it is equally difficult to lose or forget your own fingerprint as opposed to a password or pin number. One of my goals for this summer is to integrate this technology with another Pocket PC application. The second task for the summer is to develop a simple application that provides an Astronaut EVA (Extravehicular Activity) Log Book capability. The Astronaut EVA Log Book is what an astronaut would use to report the status of field missions, crew physical health, successes, future plans, etc. My goal is to develop a user interface into which these data fields can be entered and stored. The applications that I am developing are created using eMbedded Visual C++ 4.0 with the Pocket PC 2003 Software Development Kit provided by Microsoft.

Logan, Julian

2004-01-01

178

Potential National Security Applications of Nuclear Resonance Fluorescence Methods  

SciTech Connect

The objective of this report is to document the initial investigation into the possible research issues related to the development of NRF-based national security applications. The report discusses several potential applications ranging from measuring uranium enrichment in UF6 canisters to characterization of gas samples. While these applications are varied, there are only a few research issues that need to be addressed to understand the limitation of NRF in solving these problems. These research issues range from source and detector development to measuring small samples. The next effort is to determine how best to answer the research issues, followed by a prioritization of those questions to ensure that the most important are addressed. These issues will be addressed through either analytical calculations, computer simulations, analysis of previous data or collection of new measurements. It will also be beneficial to conduct a thorough examination of a couple of the more promising applications in order to develop concrete examples of how NRF may be applied in specific situations. The goals are to develop an understanding of whether the application of NRF is limited by technology or physics in addressing national security applications, to gain a motivation to explore those possible applications, and to develop a research roadmap so that those possibilities may be made reality.

Warren, Glen A.; Peplowski, Patrick N.; Caggiano, Joseph A.

2009-06-09

179

Security of differential phase shift quantum key distribution against individual attacks  

E-print Network

We derive a proof of security for the Differential Phase Shift Quantum Key Distribution (DPSQKD) protocol under the assumption that Eve is restricted to individual attacks. The security proof is derived by bounding the average collision probability, which leads directly to a bound on Eve's mutual information on the final key. The security proof applies to realistic sources based on pulsed coherent light. We then compare individual attacks to sequential attacks and show that individual attacks are more powerful.

Edo Waks; Hiroki Takesue; Yoshihisa Yamamoto

2005-08-15

180

Security bound of continuous-variable quantum key distribution with noisy coherent states and channel  

E-print Network

Security of a continuous-variable quantum key distribution protocol based on noisy coherent states and channel is analyzed. Assuming the noise of coherent states is induced by Fred, a neutral party relative to others, we prove that the prepare and measurement scheme and entanglement-based scheme are equivalent. Then, we show that this protocol is secure against Gaussian collective attacks even if the channel is lossy and noisy, and further, a lower bound to the secure key rate is derived.

Yong Shen; Jian Yang; Hong Guo

2009-04-08

181

Business Models and Business Model Innovation in a “Secure and Distributed Cloud Clustering (DISC) Society”  

Microsoft Academic Search

The development and innovation of business models to a secure distributed cloud clustering society (DISC)—is indeed still\\u000a a complex venture and has not been widely researched yet. Numerous types of security technologies are in these years proposed\\u000a and in the “slip stream” of these the study of secure business models and how business models can be operated and innovated\\u000a in

Peter Lindgren; Yariv Taran

2011-01-01

182

The Design of a COTS Real-Time Distributed Security Kernel  

Microsoft Academic Search

This paper describes the design of a security kernel called TTCB, which has innovative features. Firstly, it is a distributed\\u000a subsystem with its own secure network. Secondly, the TTCB is real-time, that is, a synchronous subsystem capable of timely\\u000a behavior. These two characteristics together are uncommon in security kernels. Thirdly, the TTCB can be implemented using\\u000a only COTS components.\\u000a \\u000a We

Miguel Correia; Paulo Veríssimo; Nuno Ferreira Neves

183

Numerically Efficient Water Quality Modeling and Security Applications  

E-print Network

NUMERICALLY EFFICIENT WATER QUALITY MODELING AND SECURITY APPLICATIONS A Dissertation by ANGELICA VANESSA MANN Submitted to the O ce of Graduate Studies of Texas A&M University in partial ful llment of the requirements for the degree... of DOCTOR OF PHILOSOPHY Approved by: Chair of Committee, Carl D. Laird Committee Members, Sergiy I. Butenko Juergen Hahn Katy C. Kao Department Head, Muhammad N. Karim May 2013 Major Subject: Chemical Engineering Copyright 2013 Angelica Vanessa Mann...

Mann, Angelica

2013-02-04

184

Secure Middleware for Situation-Aware Naval C2 and Combat Systems In Proc. 9th International Workshop on Future Trends of Distributed Computing Systems FTDCS 2003  

E-print Network

Secure Middleware for Situation-Aware Naval C2 and Combat Systems In Proc. 9th International and Marine Corps for building distributed situation-aware applications that are rapidly recon gurable and sur for constructing situation-aware Command and Con- trol C2 and combat applications. We pay particu- lar attention

185

Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications  

NASA Astrophysics Data System (ADS)

The Third Generation Partnership Project (3GPP) standardisation group currently discusses advanced applications of mobile networks such as Machine-to-Machine (M2M) communication. Several security issues arise in these contexts which warrant a fresh look at mobile networks’ security foundations, resting on smart cards. This paper contributes a security/efficiency analysis to this discussion and highlights the role of trusted platform technology to approach these issues.

Meyerstein, Mike; Cha, Inhyok; Shah, Yogendra

186

Tools for monitoring and controlling distributed applications  

NASA Technical Reports Server (NTRS)

The Meta system is a UNIX-based toolkit that assists in the construction of reliable reactive systems, such as distributed monitoring and debugging systems, tool integration systems and reliable distributed applications. Meta provides mechanisms for instrumenting a distributed application and the environment in which it executes, and Meta supplies a service that can be used to monitor and control such an instrumented application. The Meta toolkit is built on top of the ISIS toolkit; they can be used together in order to build fault-tolerant and adaptive, distributed applications.

Marzullo, Keith; Wood, Mark D.

1991-01-01

187

An Authentication Technique Based on Distributed Security Management for the Global Mobility Network  

Microsoft Academic Search

This paper proposes an authentication technique for use in the global mobility network (GLOMONET), which provides a personal communication user with global roaming service. This technique is based on new distributed security management, where authentication management in roaming-service provision is conducted only by the roamed network (the visited network). The original security manager (OSM) administrates the original authentication key (OAK)

Shigefusa Suzuki; Kazuhiko Nakada

1997-01-01

188

Cyber-Physical Security via Geometric Control: Distributed Monitoring and Malicious Attacks  

E-print Network

Cyber-Physical Security via Geometric Control: Distributed Monitoring and Malicious Attacks Fabio Pasqualetti, Florian D¨orfler, and Francesco Bullo Abstract-- Cyber-physical systems are ubiquitous in power and extends our results on the security of cyber-physical systems based on geometric control theory: (i) we

Bullo, Francesco

189

17 CFR 249.1001 - Form SIP, for application for registration as a securities information processor or to amend such...  

Code of Federal Regulations, 2010 CFR

...application for registration as a securities information processor or to amend such...Registration of, and Reporting by Securities Information Processors § 249.1001...application for registration as a securities information processor or to amend...

2010-04-01

190

An ethernet/IP security review with intrusion detection applications  

SciTech Connect

Supervisory Control and Data Acquisition (SCADA) and automation networks, used throughout utility and manufacturing applications, have their own specific set of operational and security requirements when compared to corporate networks. The modern climate of heightened national security and awareness of terrorist threats has made the security of these systems of prime concern. There is a need to understand the vulnerabilities of these systems and how to monitor and protect them. Ethernet/IP is a member of a family of protocols based on the Control and Information Protocol (CIP). Ethernet/IP allows automation systems to be utilized on and integrated with traditional TCP/IP networks, facilitating integration of these networks with corporate systems and even the Internet. A review of the CIP protocol and the additions Ethernet/IP makes to it has been done to reveal the kind of attacks made possible through the protocol. A set of rules for the SNORT Intrusion Detection software is developed based on the results of the security review. These can be used to monitor, and possibly actively protect, a SCADA or automation network that utilizes Ethernet/IP in its infrastructure. (authors)

Laughter, S. A.; Williams, R. D. [Dept. of Electrical and Computer Engineering, Univ. of Virginia, Box 400743, 351 McCormick Rd., Charlottesville, VA 22904-4743 (United States)

2006-07-01

191

Supporting secure programming in web applications through interactive static analysis  

PubMed Central

Many security incidents are caused by software developers’ failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases. PMID:25685513

Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill

2013-01-01

192

Supporting secure programming in web applications through interactive static analysis.  

PubMed

Many security incidents are caused by software developers' failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases. PMID:25685513

Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill

2014-07-01

193

76 FR 17158 - Assumption Buster Workshop: Distributed Data Schemes Provide Security  

Federal Register 2010, 2011, 2012, 2013, 2014

...Security''. Distributed data architectures, such as cloud computing, offer very attractive cost savings and provide new...adversaries will have difficulty locating your data in the cloud, and by breaking it up and replicating different...

2011-03-28

194

Some Physics And System Issues In The Security Analysis Of Quantum Key Distribution Protocols  

E-print Network

In this paper we review a number of issues on the security of quantum key distribution (QKD) protocols that bear directly on the relevant physics or mathematical representation of the QKD cryptosystem. It is shown that the cryptosystem representation itself may miss out many possible attacks which are not accounted for in the security analysis and proofs. Hence the final security claims drawn from such analysis are not reliable, apart from foundational issues about the security criteria that are discussed elsewhere. The cases of continuous-variable QKD and multi-photon sources are elaborated upon.

Horace P. Yuen

2014-05-07

195

Some physics and system issues in the security analysis of quantum key distribution protocols  

NASA Astrophysics Data System (ADS)

In this paper, we review a number of issues on the security of quantum key distribution (QKD) protocols that bear directly on the relevant physics or mathematical representation of the QKD cryptosystem. It is shown that the cryptosystem representation itself may miss out many possible attacks, which are not accounted for in the security analysis and proofs. Hence, the final security claims drawn from such analysis are not reliable, apart from foundational issues about the security criteria that are discussed elsewhere. The cases of continuous-variable QKD and multi-photon sources are elaborated upon.

Yuen, Horace P.

2014-10-01

196

Trusted Computing: Security and Applications Eimear Gallery and Chris J. Mitchell  

E-print Network

Trusted Computing: Security and Applications Eimear Gallery and Chris J. Mitchell Information applications of the technology are then discussed. 1 #12;Keywords: trusted computing, computer security, trust 1 Introduction Trusted computing (TC) is a security technology that has become ubiqui- tous almost

Mitchell, Chris

197

Security against Hardware Trojan through a Novel Application of Design Obfuscation  

E-print Network

The issue of Trust is an emerging problem in semicon- ductor integrated circuit (IC) security [1Security against Hardware Trojan through a Novel Application of Design Obfuscation Rajat Subhra in safety-critical applications is a major threat to national security. In this work, we propose a novel

Bhunia, Swarup

198

A secure communication protocol based on public-key cryptography for distributed systems  

E-print Network

A SECURE COMMUNICATION PROTOCOL BASED ON PUBLIC-KEY CRYPTOGRAPHY FOR DISTRIBUTED SYSTEMS A Thesis by SANJAY DEO Submitted to the Office of Graduate Studies of Texas AkM University in partial fulfillment of the requirements for the degree... of MASTER OF SCIENCE December 1992 Major Subject: Computer Science A SECURE COMMUNICATION PROTOCOL BASED ON PUBLIC-KEY CRYPTOGRAPHY FOR DISTRIBUTED SYSTEMS A Thesis by SANJAY DEO Approved as to style and content by: Udo W. Pooch (Chair...

Deo, Sanjay

1992-01-01

199

Terahertz wave opto-mechanical scanner for security application  

NASA Astrophysics Data System (ADS)

This paper describes a new opto-mechanical scanner that is hopeful for terahertz imaging in security applications. The target of using this scanner is portal screening of personnel for high-resolution imaging of concealed threat objects. It is not only applied to active terahertz imaging but also applied to passive Terahertz imaging. Terahertz wave can penetrate many materials that are opaque to visible and infrared light, such as plastics, cardboard, textiles and so on. So the terahertz imaging technology has a potential to be applicable in security inspection at airports, stations and other public place. Now, the most terahertz imaging system works at point to point mechanical scan pattern. The speed of this raster scan is too slow to apply in practical field. 2-D terahertz array detector can be applied to real time imaging. But at present their cost is prohibitively high. Fortunately low cost, high performance, opto-mechanically scanner is able to meet the current requirements. An opto-mechanical scanner should be able to rapidly scan a 2-D image of the scene. It also should have high optical efficiency so that an image system can achieve the required thermal sensitivity with the minimum number of receivers. These ensure that it can easily operate at any wavelength, and be active or passive. The opto-mechanically scanning can meets these requirements and is being developed into a high performance, low-cost prototype system that will meet the future needs for terahertz security.

Deng, Chao; Zheng, Yongju; Zhang, Cunlin

2010-11-01

200

The Generalized Security Framework  

SciTech Connect

The Generalized Security Framework (GSF) consists of a set of libraries, classes, and tools that provide developers with the ability to easily secure distributed applications and collaborative environments. The GSF uses and enhances the Generic Security Services API (GSSAPI) to provide authentication, authorization, data protection, delegation, and auditing. It currently works with either DCE or Kerberos as the underlying security mechanism, and it has been designed so support for PKI can be easily added in the future. DCE/Kerberos is a scaleable, mature, robust security infrastructure embraced and accredited throughout the Nuclear Weapons Complex (NWC) for a secure collaborative modeling and simulation environment. The goal of the GSF is to provide a common security foundation that can be applied and extended to create secure distributed applications, independent of the communications protocol. The GSF provides a number of extensions that embed GSF security in specific remote communication APIs, such as Java sockets and Java RMI. The extensions have been designed and implemented in such a manner as to require minimum changes to application code in order to move from an unsecure application to a secure application. The advantage of this approach is that security can be enforced reliably and consistently since very little is required of the application developer. In this paper, the authors describe the goals, design, and implementation of the Generalized Security Framework.

Richard J. Detry; Stephen D. Kleban; Patrick C. Moore

2001-06-01

201

Secure Semantic Service Oriented Information Grid for Cyber Physical System and Applications  

Microsoft Academic Search

This paper describes our approach to designing a secure information grid for cyber physical systems and applications. We discuss access control and accountability for such semantic grid as well as secure infrastructure and storage issues.

Bhavani Thuraisingham; Sajal Das; Yonghe Liu; Elisa Bertino; Lorenzo Martino

202

LANSIM and its applications to distributed EMS  

SciTech Connect

Distributed energy management systems (EMS) open up a host of alternative design options. Simulation plays an important role in evaluating performance and in comparing alternative designs. Currently all the proposed distributed EMSs are local area network (LAN)-based. To illustrate the application of LANSIM, comparisons are made with different distributed EMS configurations, different LAN technologies (Ethernet and FDDI), and different Ethernet implementations.

Lun, S.M.; Lo, T.; Wu, F.; Murphy, L. [Univ. of California, Berkeley, CA (United States). Dept. of Electrical Engineering and Computer Sciences; Sen, A. [ABB Systems Control, Santa Clara, CA (USD)

1996-08-01

203

Intelligent Facial Recognition Systems: Technology advancements for security applications  

SciTech Connect

Insider problems such as theft and sabotage can occur within the security and surveillance realm of operations when unauthorized people obtain access to sensitive areas. A possible solution to these problems is a means to identify individuals (not just credentials or badges) in a given sensitive area and provide full time personnel accountability. One approach desirable at Department of Energy facilities for access control and/or personnel identification is an Intelligent Facial Recognition System (IFRS) that is non-invasive to personnel. Automatic facial recognition does not require the active participation of the enrolled subjects, unlike most other biological measurement (biometric) systems (e.g., fingerprint, hand geometry, or eye retinal scan systems). It is this feature that makes an IFRS attractive for applications other than access control such as emergency evacuation verification, screening, and personnel tracking. This paper discusses current technology that shows promising results for DOE and other security applications. A survey of research and development in facial recognition identified several companies and universities that were interested and/or involved in the area. A few advanced prototype systems were also identified. Sandia National Laboratories is currently evaluating facial recognition systems that are in the advanced prototype stage. The initial application for the evaluation is access control in a controlled environment with a constant background and with cooperative subjects. Further evaluations will be conducted in a less controlled environment, which may include a cluttered background and subjects that are not looking towards the camera. The outcome of the evaluations will help identify areas of facial recognition systems that need further development and will help to determine the effectiveness of the current systems for security applications.

Beer, C.L.

1993-07-01

204

Secure, Autonomous, Intelligent Controller for Integrating Distributed Sensor Webs  

NASA Technical Reports Server (NTRS)

This paper describes the infrastructure and protocols necessary to enable near-real-time commanding, access to space-based assets, and the secure interoperation between sensor webs owned and controlled by various entities. Select terrestrial and aeronautics-base sensor webs will be used to demonstrate time-critical interoperability between integrated, intelligent sensor webs both terrestrial and between terrestrial and space-based assets. For this work, a Secure, Autonomous, Intelligent Controller and knowledge generation unit is implemented using Virtual Mission Operation Center technology.

Ivancic, William D.

2007-01-01

205

Using Science Driven Technologies for the Defense and Security Applications  

NASA Technical Reports Server (NTRS)

For the past three decades, Earth science remote sensing technologies have been providing enormous amounts of useful data and information in broadening our understanding of our home planet as a system. This research, as it has expanded our learning process, has also generated additional questions. This has further resulted in establishing new science requirements, which have culminated in defining and pushing the state-of-the-art technology needs. NASA s Earth science program has deployed 18 highly complex satellites, with a total of 80 sensors, so far and is in a process of defining and launching multiple observing systems in the next decade. Due to the heightened security alert of the nation, researchers and technologists are paying serious attention to the use of these science driven technologies for dual use. In other words, how such sophisticated observing and measuring systems can be used in detecting multiple types of security concerns with a substantial lead time so that the appropriate law enforcement agencies can take adequate steps to defuse any potential risky scenarios. This paper examines numerous NASA technologies such as laser/lidar systems, microwave and millimeter wave technologies, optical observing systems, high performance computational techniques for rapid analyses, and imaging products that can have a tremendous pay off for security applications.

Habib, Shahid; Zukor, Dorthy; Ambrose, Stephen D.

2004-01-01

206

Integrating CLIPS applications into heterogeneous distributed systems  

NASA Technical Reports Server (NTRS)

SOCIAL is an advanced, object-oriented development tool for integrating intelligent and conventional applications across heterogeneous hardware and software platforms. SOCIAL defines a family of 'wrapper' objects called agents, which incorporate predefined capabilities for distributed communication and control. Developers embed applications within agents and establish interactions between distributed agents via non-intrusive message-based interfaces. This paper describes a predefined SOCIAL agent that is specialized for integrating C Language Integrated Production System (CLIPS)-based applications. The agent's high-level Application Programming Interface supports bidirectional flow of data, knowledge, and commands to other agents, enabling CLIPS applications to initiate interactions autonomously, and respond to requests and results from heterogeneous remote systems. The design and operation of CLIPS agents are illustrated with two distributed applications that integrate CLIPS-based expert systems with other intelligent systems for isolating and mapping problems in the Space Shuttle Launch Processing System at the NASA Kennedy Space Center.

Adler, Richard M.

1991-01-01

207

A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications  

NASA Astrophysics Data System (ADS)

Contact lists, Emails, SMS or custom applications on a professional smartphone could hold very confidential or sensitive information. What could happen in case of theft or accidental loss of such devices? Such events could be detected by the separation between the smartphone and a Bluetooth companion device. This event should typically block the applications and delete personal and sensitive data. Here, a solution is proposed based on a secured framework application running on the mobile phone as a rich client connected to a security server. The framework offers strong and customizable authentication and secured connectivity. A security server manages all security issues. User applications are then loaded via the framework. User data can be secured, synchronized, pushed or pulled via the framework. This contribution proposes a convenient although secured environment based on a client-server architecture using external authentications. Several features of the proposed system are exposed and a practical demonstrator is described.

Badan, Stephen; Probst, Julien; Jaton, Markus; Vionnet, Damien; Wagen, Jean-Frédéric; Litzistorf, Gérald

208

Security in the CernVM File System and the Frontier Distributed Database Caching System  

NASA Astrophysics Data System (ADS)

Both the CernVM File System (CVMFS) and the Frontier Distributed Database Caching System (Frontier) distribute centrally updated data worldwide for LHC experiments using http proxy caches. Neither system provides privacy or access control on reading the data, but both control access to updates of the data and can guarantee the authenticity and integrity of the data transferred to clients over the internet. CVMFS has since its early days required digital signatures and secure hashes on all distributed data, and recently Frontier has added X.509-based authenticity and integrity checking. In this paper we detail and compare the security models of CVMFS and Frontier.

Dykstra, D.; Blomer, J.

2014-06-01

209

Semi-device-independent security of one-way quantum key distribution  

SciTech Connect

By testing nonlocality, the security of entanglement-based quantum key distribution (QKD) can be enhanced to being ''device-independent.'' Here we ask whether such a strong form of security could also be established for one-way (prepare and measure) QKD. While fully device-independent security is impossible, we show that security can be guaranteed against individual attacks in a semi-device-independent scenario. In the latter, the devices used by the trusted parties are noncharacterized, but the dimensionality of the quantum systems used in the protocol is assumed to be bounded. Our security proof relies on the analogies between one-way QKD, dimension witnesses, and random-access codes.

Pawlowski, Marcin [Department of Mathematics, University of Bristol, Bristol BS8 1TW (United Kingdom); Institute of Theoretical Physics and Astrophysics, University of Gdansk, PL-80-952 Gdansk (Poland); Brunner, Nicolas [H. H. Wills Physics Laboratory, University of Bristol, Bristol BS8 1TL (United Kingdom)

2011-07-15

210

Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation  

E-print Network

We present a continuous-variable quantum key distribution protocol combining a discrete modulation and reverse reconciliation. This protocol is proven unconditionally secure and allows the distribution of secret keys over long distances, thanks to a reverse reconciliation scheme efficient at very low signal-to-noise ratio.

Anthony Leverrier; Philippe Grangier

2008-12-22

211

Security and Privacy Behavior-Based Access Control for Distributed Healthcare Systems  

E-print Network

Security and Privacy Behavior-Based Access Control for Distributed Healthcare Systems M. Yarmand, K requirements for using patient profiles in distributed healthcare environments. The amalgamation of new information technology with traditional healthcare workflows for sharing patient profiles has made the whole

Sartipi, Kamran

212

Security of quantum key distribution using a simplified trusted relay  

NASA Astrophysics Data System (ADS)

We propose a QKD protocol for trusted node relays. Our protocol shifts the communication and computational weight of classical postprocessing to the end users by reassigning the roles of error correction and privacy amplification, while leaving the exchange of quantum signals untouched. We perform a security analysis for this protocol based on the Bennett-Brassard 1984 protocol on the level of infinite key formulas, taking into account weak coherent implementations involving decoy analysis.

Stacey, William; Annabestani, Razieh; Ma, Xiongfeng; Lütkenhaus, Norbert

2015-01-01

213

COCA: A Secure Distributed On-line Certification Authority  

Microsoft Academic Search

Abstract COCA is a fault-tolerant and secure on-line certification authority that has been built and deployed both in a local area network and in the Internet. Extremely weak assumptions characterize environments in which COCA’s protocols execute correctly: no assumption is made about execution speed and message delivery delays; channels are expected to exhibit only inter- mittent reliability; and with 3t

Lidong Zhou; Fred B. Schneider; Robbert van Renesse

2000-01-01

214

Security applications of a remote electric-field sensor technology  

NASA Astrophysics Data System (ADS)

A new generation of electric field sensors developed at the University of Sussex is enabling an alternative to contact voltage and non-contact magnetic field measurements. We have demonstrated the capability of this technology in a number of areas including ECG through clothing, remote off-body ECG, through wall movement sensing and electric field imaging. Clearly, there are many applications for a generic sensor technology with this capability, including long term vital sign monitoring. The non-invasive nature of the measurement also makes these sensors ideal for man/machine and human/robot interfacing. In addition, there are obvious security and biometric possibilities since we can obtain physiological data remotely, without the knowledge of the subject. This is a clear advantage if such systems are to be used for evaluating the psychological state of a subject. In this paper we report the results obtained with a new version of the sensor which is capable of acquiring electrophysiological signals remotely in an open unshielded laboratory. We believe that this technology opens up a new area of remote biometrics which could have considerable implications for security applications. We have also demonstrated the ability of EPS to function in closely-packed one and two dimensional arrays for real-time imaging.

Prance, Robert J.; Harland, Christopher J.; Prance, Helen

2008-10-01

215

InkTag: Secure Applications on an Untrusted Operating System  

PubMed Central

InkTag is a virtualization-based architecture that gives strong safety guarantees to high-assurance processes even in the presence of a malicious operating system. InkTag advances the state of the art in untrusted operating systems in both the design of its hypervisor and in the ability to run useful applications without trusting the operating system. We introduce paraverification, a technique that simplifies the InkTag hypervisor by forcing the untrusted operating system to participate in its own verification. Attribute-based access control allows trusted applications to create decentralized access control policies. InkTag is also the first system of its kind to ensure consistency between secure data and metadata, ensuring recoverability in the face of system crashes. PMID:24429939

Hofmann, Owen S.; Kim, Sangman; Dunn, Alan M.; Lee, Michael Z.; Witchel, Emmett

2014-01-01

216

Unconditional Security of Time-Energy Entanglement Quantum Key Distribution Using Dual-Basis Interferometry  

NASA Astrophysics Data System (ADS)

High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric down-conversion and show that it is secure against collective attacks. Its security rests upon visibility data—obtained from Franson and conjugate-Franson interferometers—that probe photon-pair frequency correlations and arrival-time correlations. From these measurements, an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over a 200-km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700-bit/sec secure-key rate and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with a 15% system efficiency.

Zhang, Zheshen; Mower, Jacob; Englund, Dirk; Wong, Franco N. C.; Shapiro, Jeffrey H.

2014-03-01

217

T3: Secure, Scalable, Distributed Data Movement and Remote System Control for Enterprise Level Cyber Security  

SciTech Connect

Enterprise level cyber security requires the deployment, operation, and monitoring of many sensors across geographically dispersed sites. Communicating with the sensors to gather data and control behavior is a challenging task when the number of sensors is rapidly growing. This paper describes the system requirements, design, and implementation of T3, the third generation of our transport software that performs this task. T3 relies on open source software and open Internet standards. Data is encoded in MIME format messages and transported via NNTP, which provides scalability. OpenSSL and public key cryptography are used to secure the data. Robustness and ease of development are increased by defining an internal cryptographic API, implemented by modules in C, Perl, and Python. We are currently using T3 in a production environment. It is freely available to download and use for other projects.

Thomas, Gregory S.; Nickless, William K.; Thiede, David R.; Gorton, Ian; Pitre, Bill J.; Christy, Jason E.; Faultersack, Elizabeth M.; Mauth, Jeffery A.

2009-07-20

218

Unconditional security proof of a deterministic quantum key distribution with a two-way quantum channel  

SciTech Connect

In a deterministic quantum key distribution (DQKD) protocol with a two-way quantum channel, Bob sends a qubit to Alice who then encodes a key bit onto the qubit and sends it back to Bob. After measuring the returned qubit, Bob can obtain Alice's key bit immediately, without basis reconciliation. Since an eavesdropper may attack the qubits traveling on either the Bob-Alice channel or the Alice-Bob channel, the security analysis of DQKD protocol with a two-way quantum channel is complicated and its unconditional security has been controversial. This paper presents a security proof of a single-photon four-state DQKD protocol against general attacks.

Lu Hua [State Key Laboratory of Magnetics Resonances and Atomic and Molecular Physics, Wuhan Institute of Physics and Mathematics, Chinese Academy of Sciences, Wuhan 430071 (China); Department of Mathematics and Physics, Hubei University of Technology, Wuhan 430068 (China); Fung, Chi-Hang Fred [Department of Physics and Center of Computational and Theoretical Physics, University of Hong Kong, Pokfulam Road (Hong Kong); Ma Xiongfeng [Center for Quantum Information and Quantum Control, Department of Physics, University of Toronto, Toronto, M5S 1A7 (Canada); Cai Qingyu [State Key Laboratory of Magnetics Resonances and Atomic and Molecular Physics, Wuhan Institute of Physics and Mathematics, Chinese Academy of Sciences, Wuhan 430071 (China)

2011-10-15

219

Application of telecom planar lightwave circuits for homeland security sensing  

NASA Astrophysics Data System (ADS)

Over the past decade, a massive effort has been made in the development of planar lightwave circuits (PLCs) for application in optical telecommunications. Major advances have been made, on both the technological and functional performance front. Highly sophisticated software tools that are used to tailor designs to required functional performance support these developments. In addition extensive know-how in the field of packaging, testing, and failure mode and effects analysis (FMEA) has been built up in the struggle for meeting the stringent Telcordia requirements that apply to telecom products. As an example, silica-on-silicon is now a mature technology available at several industrial foundries around the world, where, on the performance front, the arrayed-waveguide grating (AWG) has evolved into an off-the-shelf product. The field of optical chemical-biological (CB) sensors for homeland security application can greatly benefit from the advances as described above. In this paper we discuss the currently available technologies, device concepts, and modeling tools that have emerged from the telecommunications arena and that can effectively be applied to the field of homeland security. Using this profound telecom knowledge base, standard telecom components can readily be tailored for detecting CB agents. Designs for telecom components aim at complete isolation from the environment to exclude impact of environmental parameters on optical performance. For sensing applications, the optical path must be exposed to the measurand, in this area additional development is required beyond what has already been achieved in telecom development. We have tackled this problem, and are now in a position to apply standard telecom components for CB sensing. As an example, the application of an AWG as a refractometer is demonstrated, and its performance evaluated.

Veldhuis, Gert J.; Elders, Job; van Weerden, Harm; Amersfoort, Martin

2004-03-01

220

Grammar based oracle for security testing of web applications  

Microsoft Academic Search

The goal of security testing is to detect those defects that could be exploited to conduct attacks. Existing works, however, address security testing mostly from the point of view of automatic generation of test cases. Less attention is paid to the problem of developing and integrating with a security oracle. In this paper we address the problem of the security

Andrea Avancini; Mariano Ceccato

2012-01-01

221

Security of Electronic Business Applications - Structure and Quantification  

Microsoft Academic Search

The rapid growth of the commercial use of the Internet goes along with a rising need for security for both customer and merchant. As many parties and different systems are involved, security becomes a complicated issue. There- fore, the need for definition, structuring, and quantification of security arises. This paper proposes a structured approach to analyze security measures and to

Konstantin Knorr; Susanne Röhrig

2000-01-01

222

WATER DISTRIBUTION SYSTEM OPERATION: APPLICATION OF  

E-print Network

CHAPTER 5 WATER DISTRIBUTION SYSTEM OPERATION: APPLICATION OF SIMULATED ANNEALING Fred E. Goldman Arizona State University, Tempe, Arizona 5.1 INTRODUCTION The operation of water distribution systems affects the water quality in these systems. EPA regulations require that water quality be maintained

Mays, Larry W.

223

Chile, 2009 APPLICATION OF A DISTRIBUTED WATERSHED  

E-print Network

7 th ISE & 8 th HIC Chile, 2009 APPLICATION OF A DISTRIBUTED WATERSHED HYDROLOGY AND WATER QUALITY spatial and temporal point and nonpoint source material distributions in Great Lakes watersheds. We automatically calibrated the DLBRM hydrology to reproduce the 1950-1964 and the 1999-2006 watershed outflows

224

Secure PVM  

SciTech Connect

This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

Dunigan, T.H.; Venugopal, N.

1996-09-01

225

26 CFR 1.355-7 - Recognition of gain on certain distributions of stock or securities in connection with an...  

Code of Federal Regulations, 2012 CFR

...false Recognition of gain on certain distributions of stock or securities in connection...355-7 Recognition of gain on certain distributions of stock or securities in connection...section, section 355(e) applies to any distribution— (1) To which section 355...

2012-04-01

226

26 CFR 1.355-7 - Recognition of gain on certain distributions of stock or securities in connection with an...  

Code of Federal Regulations, 2011 CFR

...false Recognition of gain on certain distributions of stock or securities in connection...355-7 Recognition of gain on certain distributions of stock or securities in connection...section, section 355(e) applies to any distribution— (1) To which section 355...

2011-04-01

227

26 CFR 1.355-7 - Recognition of gain on certain distributions of stock or securities in connection with an...  

Code of Federal Regulations, 2013 CFR

...false Recognition of gain on certain distributions of stock or securities in connection...355-7 Recognition of gain on certain distributions of stock or securities in connection...section, section 355(e) applies to any distribution— (1) To which section 355...

2013-04-01

228

26 CFR 1.355-7 - Recognition of gain on certain distributions of stock or securities in connection with an...  

Code of Federal Regulations, 2014 CFR

...false Recognition of gain on certain distributions of stock or securities in connection...355-7 Recognition of gain on certain distributions of stock or securities in connection...section, section 355(e) applies to any distribution— (1) To which section 355...

2014-04-01

229

Security Threats and Solutions for Application Server of IP Multimedia Subsystem (IMS-AS)  

Microsoft Academic Search

In this paper we will explore security threats and attacks possibility and security solution for Application Server of IP Multimedia Subsystem(IMS-AS). The SIP Application Server is an important entity of IP Multimedia Subsystem (IMS) because applications providing value added services are deployed on the Application Server. The SIP Application Server is triggered by Serving Call State Control Function (S-CSCF) which

Muhammad Sher; Shaoke Wu; Thomas Magedanz

230

Web-Based Training Applications in Safeguards and Security  

SciTech Connect

The U.S. Department of Energy (DOE) requires all employees who hold a security clearance and have access to classified information and/or special nuclear material to be trained in the area of Safeguards and Security. Since the advent of the World Wide Web, personnel who are responsible for training have capitalized on this communication medium to develop and deliver Web-based training. Unlike traditional computer based training where the student was required to find a workstation where the training program resided, one of Web-based training strongest advantage is that the training can be delivered right to the workers desk top computer. This paper will address reasons for the driving forces behind the utilization of Web-based training at the Laboratory with a brief explanation of the different types of training conducted. Also discussed briefly is the different types of distance learning used in conjunction with Web-based training. The implementation strategy will be addressed and how the Laboratory utilized a Web-Based Standards Committee to develop standards for Web-based training applications. Web-based problems resulting from little or no communication between training personnel across the Laboratory will be touched on and how this was solved. Also discussed is the development of a ''Virtual Training Center'' where personnel can shop on-line for their training needs. Web-based training programs within the Safeguards and Security arena will be briefly discussed. Specifically, Web-based training in the area of Materials Control and Accountability will be explored. A Web-based example of what a student would experience during a training session is also discussed. A short closing statement of what the future of Web-based Training holds in the future is offered.

Lopez, R.L.

1999-05-21

231

The application research of airport security information management system on the field of civil aviation security  

Microsoft Academic Search

The airport security information management system (ASIMS) has been playing very important role in preventing aircrafts from hijacking, terrorism attacks and other acts of unlawful interference. The system is designed to integrate a variety of security information of an airport into an organic body by analyzing and mining data collected form the security checkpoints and stored in central server database

Wu Wei

2009-01-01

232

Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey  

PubMed Central

Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs. PMID:22368458

Kumar, Pardeep; Lee, Hoon-Jae

2012-01-01

233

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, TPDS-0423-1206 1 Security-Aware Resource Allocation for Real-  

E-print Network

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, TPDS-0423-1206 1 Security-Aware Resource, and Xiao Qin, Member, IEEE Abstract-- Security is increasingly becoming an important issue in the design in security requirements when making allocation and scheduling decisions. In this paper, we develop two

Xie, Tao

234

Dynamic programming model estimates of Social Security Disability Insurance application timing  

Microsoft Academic Search

This paper develops a dynamic programming model of the Social Security Disability Insurance (SSDI) application timing decision. We estimate the time to application from the point at which a health condition first begins to affect the kind or amount of work that a currently employed person can do. We use Health and Retirement Study (HRS) and restricted access Social Security

Richard V. Burkhauser; J. S. Butler; Gulcin Gumus

2004-01-01

235

Satellite services for disaster management and security applications  

NASA Astrophysics Data System (ADS)

Advantages of communications satellites are the inherent broadcast capability, high bandwidth, reliability and flexibility in network expansion. Small transportable terminals can be made operational very quickly. Recent developments in communications and computer technology allow to provide low-cost equipment, which is affordable even in developing countries. Communications satellites can also play an important role in case of emergencies or natural disasters. The combination of satellite communications and navigation can support new services for emergency teams. At the Institute of Applied Systems Technology and the Institute of Communication Networks and Satellite Communications highly transportable terminals have been developed, both for star and mesh network topologies. A fully meshed VSAT system is used for symmetrical links. For other applications, which do not require high return link capacity an asymmetrical system is an efficient solution. It uses low-cost DVB technology for the forward link and satellite phones with data capability on the return link. Novel multicast protocols allow to use these asymmetrical links in an efficient way. The paper describes the different systems and their applications in disaster management and security applications. Emphasis is put on transfer of remote sensing images and voice over IP (VoIP) as well as videoconference services.

Koudelka, Otto; Schrotter, P.

2007-06-01

236

How Secure Are FPGAs in Cryptographic Applications? (Long Version) #  

E-print Network

to custom hardware, and only limited physical security, # This research was partially sponsored by the German Federal O#ce for Information Security (BSI). #12; especially with respect to key storage [Sch96

237

How Secure Are FPGAs in Cryptographic Applications? (Long Version)  

E-print Network

compared to custom hardware, and only limited physical security, This research was partially sponsored by the German Federal Office for Information Security (BSI). #12;especially with respect to key storage [Sch96

238

Empirical Distributional Semantics: Methods and Biomedical Applications  

PubMed Central

Over the past fifteen years, a range of methods have been developed that are able to learn human-like estimates of the semantic relatedness between terms from the way in which these terms are distributed in a corpus of unannotated natural language text. These methods have also been evaluated in a number of applications in the cognitive science, computational linguistics and the information retrieval literatures. In this paper, we review the available methodologies for derivation of semantic relatedness from free text, as well as their evaluation in a variety of biomedical and other applications. Recent methodological developments, and their applicability to several existing applications are also discussed. PMID:19232399

Cohen, Trevor; Widdows, Dominic

2009-01-01

239

Application-Oriented Confidentiality and Integrity Dynamic Union Security Model Based on MLS Policy  

NASA Astrophysics Data System (ADS)

We propose a new security model based on MLS Policy to achieve a better security performance on confidentiality, integrity and availability. First, it realizes a combination of BLP model and Biba model through a two-dimensional independent adjustment of integrity and confidentiality. And, the subject's access range is adjusted dynamically according to the security label of related objects and the subject's access history. Second, the security level of the trusted subject is extended to writing and reading privilege range respectively, following the principle of least privilege. Third, it adjusts the objects' security levels after adding confidential information to prevent the information disclosure. Fourth, it uses application-oriented logic to protect specific applications to avoid the degradation of security levels. Thus, it can ensure certain applications operate smoothly. Lastly, examples are presented to show the effectiveness and usability of the proposed model.

Xue, Mingfu; Hu, Aiqun; He, Chunlong

240

Security Certificate Revocation List Distribution for VANET Kenneth P. Laberteaux  

E-print Network

of trust and ignoring, or at least distrusting, information from untrusted senders. For two nodes.g. due to a breach of trust), it universally distributes a certificate revocation list. We pro- pose. To mitigate situations such as those described above, a universally-trusted Certificate Authority (CA), which

Hu, Yih-Chun

241

Applying SOA Concepts to Distributed Industrial Applications Using WCF Technology  

NASA Astrophysics Data System (ADS)

Software Development is subject to a constant process of change. In the meantime web services, access to remote services or distributed applications are already the standard. Simultaneously with their advancement demands on these techniques are rising significantly. Defined support for security issues, coordination of transactions and reliable communications are expected. Windows Communication Foundation (WCF)—as a part of Microsoft Corporation's .NET Framework—supports these requirements in line with wide range interoperability. WCF provides the development of distributed and interconnected software applications by means of a service-oriented programming model. This paper introduces a service-oriented communication concept based on WCF, which is specifically designed for industrial applications within a production environment using a central manufacturing information system (MIS) database. It introduces applied technologies and provides an overview of some important design aspects and base service sets of WCF. Additionally, this paper also shows a factual implementation of the presented service-oriented communication concept in the form of an industrial software application used in plastics industry.

Stopper, Markus; Gastermann, Bernd

2010-10-01

242

Trusted Virtual Domains: Toward secure distributed services John Linwood Griffin, Trent Jaeger, Ronald Perez, Reiner Sailer,  

E-print Network

Trusted Virtual Domains: Toward secure distributed services John Linwood Griffin, Trent Jaeger}@us.ibm.com Abstract The focus of trusted computing efforts to date has been to create islands of trust in a sea "bridges" among trusted islands, with such goals as enabling meaningful trade agreements between islands

Yener, Aylin

243

Secure Distributed Solution for Optimal Energy Consumption Scheduling in Smart Grid  

E-print Network

is crucial to optimize the energy usage with its production cost, so that the price paid by the users varying energy prices, giving incentive for using energy at off-peak hours. Smart grids provide innovativeSecure Distributed Solution for Optimal Energy Consumption Scheduling in Smart Grid Mohammad

Shehab, Mohamed

244

Quantum key distribution based on orthogonal states allows secure quantum bit commitment  

Microsoft Academic Search

For more than a decade, it was believed that unconditionally secure quantum bit commitment (QBC) is impossible. But based on a previously proposed quantum key distribution scheme using orthogonal states, here we build a QBC protocol in which the density matrices of the quantum states encoding the commitment do not satisfy a crucial condition on which the no-go proofs of

Guang Ping He

2011-01-01

245

Security Mechanism Based on Hospital Authentication Server for Secure Application of Implantable Medical Devices  

PubMed Central

After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance. PMID:25276797

2014-01-01

246

Security mechanism based on Hospital Authentication Server for secure application of implantable medical devices.  

PubMed

After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance. PMID:25276797

Park, Chang-Seop

2014-01-01

247

MKPS: A Multilevel Key Pre-distribution Scheme for Secure Wireless Sensor Networks  

Microsoft Academic Search

Key distribution is one of the most challenging issues for secure communication in wireless sensor networks. Even though the\\u000a random key pre-distribution approach is suitable for sensor nodes of low power and resource, a shared key between a pair of\\u000a nodes is not guaranteed to be found and thus they cannot communicate with each other. This paper proposes a new

Sung Jin Choi; Hee Yong Youn

2007-01-01

248

76 FR 8755 - Privacy Act of 1974; Department of Homeland Security/ALL-032 Official Passport Application and...  

Federal Register 2010, 2011, 2012, 2013, 2014

...1974; Department of Homeland Security/ALL--032 Official Passport Application and...Department of Homeland Security/ ALL--032 Official Passport Application and...Washington, DC 20528. Instructions: All submissions received must include the...

2011-02-15

249

Developing a distributed collaborative radiological visualization application.  

PubMed

Leveraging the advances of today's commodity graphics hardware, adoption of community proven collaboration technology, and the use of standard Web and Grid technologies a flexible system is designed to enable the construction of a distributed collaborative radiological visualization application. The system builds from a prototype application as well as requirements gathered from users. Finally constraints on the system are evaluated to complete the design process. PMID:15923717

Binns, Justin; Dech, Fred; McCrory, Matthew; Papka, Michael E; Silverstein, Jonathan C; Stevens, Rick

2005-01-01

250

USING DISTRIBUTED SOURCE CODING TO SECURE FINGERPRINT BIOMETRICS Stark C. Draper, Ashish Khisti, Emin Martinian, Anthony Vetro, Jonathan S. Yedidia  

E-print Network

USING DISTRIBUTED SOURCE CODING TO SECURE FINGERPRINT BIOMETRICS Stark C. Draper, Ashish Khisti Broadway Ave, Cambridge MA, 02139 ABSTRACT We describe a method to encode fingerprint biometrics securely fingerprint. Our approach is based on the use of distributed source coding techniques implemented with graph

Khisti, Ashish

251

Application of the JDL data fusion process model for cyber security  

NASA Astrophysics Data System (ADS)

A number of cyber security technologies have proposed the use of data fusion to enhance the defensive capabilities of the network and aid in the development of situational awareness for the security analyst. While there have been advances in fusion technologies and the application of fusion in intrusion detection systems (IDSs), in particular, additional progress can be made by gaining a better understanding of a variety of data fusion processes and applying them to the cyber security application domain. This research explores the underlying processes identified in the Joint Directors of Laboratories (JDL) data fusion process model and further describes them in a cyber security context.

Giacobe, Nicklaus A.

2010-04-01

252

Modulated digital images for biometric and other security applications  

NASA Astrophysics Data System (ADS)

There are, in general, two ways for an observer to deal with light that is incorrect in some way (e.g. which is partially out of focus). One approach is to correct the error (e.g. by using a lens to selectively bend the light). Another approach employs selective masking to block those portions of the light which are unwanted (e.g. out of focus). The principle of selective masking is used in a number of important industries. However it has not found widespread application in the field of optical security devices. This work describes the selective masking, or modulation, of digital images as a means of creating documents and transparent media containing overt or covert biometric and other images. In particular, we show how animation effects, flash-illumination features, color-shifting patches, information concealment devices, and biometric portraiture in various settings can be incorporated in transparent media like plastic packaging materials, credit cards, and plastic banknotes. We also demonstrate the application of modulated digital images to the preparation of optically variable diffractive foils which are readily customized to display biometric portraits and information. Selective masking is shown to be an important means of creating a diverse range of effects useful in authentication. Such effects can be readily and inexpensively produced without the need, for example, to fabricate lenses on materials which may not be conducive in this respect.

McCarthy, Lawry D.; Lee, Robert A.; Swiegers, Gerhard F.

2004-06-01

253

Applications of shape analysis to domestic and international security.  

SciTech Connect

The rapidly growing area of cooperative international security calls for pervasive deployment of smart sensors that render valuable information and reduce operational costs and errors. Among the sensors used, vision sensors are by far the most versatile, tangible, and rich in the information they provide about their environment. On the flip side, they are also the most complex to analyze automatically for the extraction of high-level information. The ability to process imagery in a useful manner requires at least partial functional emulation of human capabilities of visual understanding. Of all visual cues available in image data, shape is perhaps the most important for understanding the content of an image. In this paper we present an overview of ongoing research at LANL on geometric shape analysis. The objective of our research is to develop a computational framework for multiscale characterization, analysis, and recognition of shapes. This framework will enable the development of a comprehensive and connected body of mathematical methods and algorithms, based on the topological, metrical, and morphological properties of shapes. We discuss its potential applications to automated surveillance, monitoring, container tracking and inspection, weapons dismantlement, and treaty verification. The framework will develop a geometric filtering scheme for extracting semantically salient shape features. This effort creates a paradigm for solving shape-related problems in Pattern Recognition, Computer Vision, and Image Understanding in a conceptually cohesive and algorithmically amenable manner. The research aims to develop an advanced image analysis capability at LANL for solving a wide range of problems in automated facility surveillance, nuclear materials monitoring, treaty verification, and container inspection and tracking. The research provides the scientific underpinnings that will enable us to build smart surveillance cameras, with a direct practical impact on LANL's capabilities in domestic and international safeguards and security.

Prasad, Lakshman; Skourikhine, A. N. (Alexei N.); Doak, J. E. (Justin E.)

2002-01-01

254

Quantum key distribution for security guarantees over QoS-driven 3D satellite networks  

NASA Astrophysics Data System (ADS)

In recent years, quantum-based communication is emerging as a new technique for ensuring secured communications because it can guarantee absolute security between two different remote entities. Quantum communication performs the transmission and exchange of quantum information among distant nodes within a network. Quantum key distribution (QKD) is a methodology for generating and distributing random encryption keys using the principles of quantum physics. In this paper, we investigate the techniques on how to efficiently use QKD in 3D satellite networks and propose an effective method to overcome its communications-distance limitations. In order to implement secured and reliable communications over wireless satellite links, we develop a free-space quantum channel model in satellite communication networks. To enlarge the communications distances over 3D satellite networks, we propose to employ the intermediate nodes to relay the unconditional keys and guarantee the Quantum Bit Error Rate (QBER) for security requirement over 3D satellite networks. We also propose the communication model for QKD security-Quality of Service (QoS) guarantee and an adaptive cooperative routing selection scheme to optimize the throughput performance of QKD-based satellite communications networks. The obtained simulation results verify our proposed schemes.

Wang, Ping; Zhang, Xi; Chen, Genshe; Pham, Khanh; Blasch, Erik

2014-06-01

255

Space Applications for Distributed Constraint Reasoning  

E-print Network

- nology. Space missions offer a wide variety of multiagent problem domains, but the technology needsSpace Applications for Distributed Constraint Reasoning Bradley J. Clement, Anthony C. Barrett Jet Propulsion Laboratory California Institute of Technology Pasadena, California 91109 USA {brad.clement, tony

Clement, Bradley J.

256

High Speed Communication For Distributed Applications  

Microsoft Academic Search

The distributed applications of the 1990s, especially those related to factory automation, will require a new set of com- munications services and will demand a iiew standard of p~rf,-11- mance. In this paper we discuss the design of the Xpress Transfer Protocol which is intended to provide these new services. We explain its history and motivation as well as its

Alfred C. Weaver

1992-01-01

257

Security of two-way continuous-variable quantum key distribution with source noise  

NASA Astrophysics Data System (ADS)

We investigate the security of reverse reconciliation two-way continuous-variable quantum key distribution with source noise at both legitimate sides. Because the source noise originates from imperfect devices, we ascribe it to the legitimate sides rather than the eavesdropper. The trusted model consists of a thermal noise injected into a beam splitter. The expressions of secret key rate are derived against collective entangling cloner attacks for homodyne and heterodyne detections. Simulation results show that by applying the trusted model, the security bound of the reverse reconciliation two-way protocols can be tightened, while the advantage over one-way protocols still maintains.

Wang, Tianyi; Yu, Song; Zhang, Yi-Chen; Gu, Wanyi; Guo, Hong

2014-11-01

258

Secure Large-Scale Airport Simulations Using Distributed Computational Resources  

NASA Technical Reports Server (NTRS)

To fully conduct research that will support the far-term concepts, technologies and methods required to improve the safety of Air Transportation a simulation environment of the requisite degree of fidelity must first be in place. The Virtual National Airspace Simulation (VNAS) will provide the underlying infrastructure necessary for such a simulation system. Aerospace-specific knowledge management services such as intelligent data-integration middleware will support the management of information associated with this complex and critically important operational environment. This simulation environment, in conjunction with a distributed network of supercomputers, and high-speed network connections to aircraft, and to Federal Aviation Administration (FAA), airline and other data-sources will provide the capability to continuously monitor and measure operational performance against expected performance. The VNAS will also provide the tools to use this performance baseline to obtain a perspective of what is happening today and of the potential impact of proposed changes before they are introduced into the system.

McDermott, William J.; Maluf, David A.; Gawdiak, Yuri; Tran, Peter; Clancy, Dan (Technical Monitor)

2001-01-01

259

Secure authentication protocol for Internet applications over CATV network  

NASA Astrophysics Data System (ADS)

An authentication protocol is proposed in this paper to implement secure functions which include two way authentication and key management between end users and head-end. The protocol can protect transmission from frauds, attacks such as reply and wiretap. Location privacy is also achieved. A rest protocol is designed to restore the system once when systems fail. The security is verified by taking several security and privacy requirements into consideration.

Chin, Le-Pond

1998-02-01

260

Foundational Security Principles for Medical Application Platforms* (Extended Abstract)  

PubMed Central

We describe a preliminary set of security requirements for safe and secure next-generation medical systems, consisting of dynamically composable units, tied together through a real-time safety-critical middleware. We note that this requirement set is not the same for individual (stand-alone) devices or for electronic health record systems, and we must take care to define system-level requirements rather than security goals for components. The requirements themselves build on each other such that it is difficult or impossible to eliminate any one of the requirements and still achieve high-level security goals. PMID:25599096

Vasserman, Eugene Y.; Hatcliff, John

2014-01-01

261

One-sided device-independent quantum key distribution: Security, feasibility, and the connection with steering  

NASA Astrophysics Data System (ADS)

We analyze the security and feasibility of a protocol for quantum key distribution (QKD) in a context where only one of the two parties trusts his measurement apparatus. This scenario lies naturally between standard QKD, where both parties trust their measurement apparatuses, and device-independent QKD (DI-QKD), where neither do, and can be a natural assumption in some practical situations. We show that the requirements for obtaining secure keys are much easier to meet than for DI-QKD, which opens promising experimental opportunities. We clarify the link between the security of this one-sided DI-QKD scenario and the demonstration of quantum steering, in analogy to the link between DI-QKD and the violation of Bell inequalities.

Branciard, Cyril; Cavalcanti, Eric G.; Walborn, Stephen P.; Scarani, Valerio; Wiseman, Howard M.

2012-01-01

262

NASA guidelines for assuring the adequacy and appropriateness of security safeguards in sensitive applications  

NASA Technical Reports Server (NTRS)

The Office of Management and Budget (OMB) Circular A-71, transmittal Memorandum No. 1, requires that each agency establish a management control process to assure that appropriate administrative, physical and technical safeguards are incorporated into all new computer applications. In addition to security specifications, the management control process should assure that the safeguards are adequate for the application. The security activities that should be integral to the system development process are examined. The software quality assurance process to assure that adequate and appropriate controls are incorporated into sensitive applications is also examined. Security for software packages is also discussed.

Tompkins, F. G.

1984-01-01

263

Advanced applications to security of IR smart microbolometers  

NASA Astrophysics Data System (ADS)

Advanced IR emitters and sensors are under development for high detection probability, low false alarm rate and identification capability of toxic gases. One of the most reliable technique to identify the gas species is Spectroscopy, especially in the infrared spectral range, where most of existing toxic compounds exhibit their stronger roto-vibrational absorption bands. Following the results obtained from simulations and analysis of expected absorption spectra, a compact non dispersive infrared multi-spectral system has been designed and developed for security applications. It utilizes a few square millimeters thermal source, a novel design multipass cell, and a smart architecture microbolometric sensor array coupled to a linear variable spectral filter to perform toxic gases detection and identification. This is done by means of differential absorption spectroscopic measurements in the spectral range of the LWIR (Long Wavelength Infrared) spectral region. Preliminary tests for sensitivity and selectivity are undergoing using mixtures of ammonia and ethylene. Detection capability down to tens of ppm has been demonstrated. Possible improvements owing to open path sensor or hollow-fiber based sensor implementation are also presented for future systems evolution.

Corsi, C.; Liberatore, N.; Mengali, S.; Mercuri, A.; Viola, R.; Zintu, D.

2007-10-01

264

Application of wireless sensor system on security network  

NASA Astrophysics Data System (ADS)

In this research we developed wireless sensor system for security application. We have used geophone to detect seismic signals which are generated by footsteps. Geophones are resonant devices. Therefore, vibration on the land can generate seismic waveforms which could be very similar to the signature by footstep. The signals from human footstep have weak signals to noise ratio and the signal strength is subject to the distance between the sensor and human. In order to detect weak signals from footstep, we designed and fabricated 2-stage amplification circuit which consists of active and RC filters and amplifiers. The bandwidth of filter is 0.7Hz-150Hz and the gain of amplifier is set to 1000. The wireless sensor system also developed to monitor the sensing signals at the remote place. The wireless sensor system consists of 3 units; a wireless sensor unit, a wireless receiver unit, and a monitoring unit. The wireless sensor unit transmits amplified signals from geophone with Zigbee, and the wireless receiver unit which has both Zigbee and Wi-Fi module receives signals from the sensor unit and transmits signals to the monitoring system with Zigbee and Wi-Fi, respectively. By using both Zigbee and Wi-Fi, the wireless sensor system can achieve the low power consumption and wide range coverage.

Oh, Sechang; Kwon, Hyeokjun; Yoon, Hargsoon; Varadan, Vijay K.

2010-04-01

265

Laser-induced breakdown spectroscopy in industrial and security applications  

SciTech Connect

Laser-induced breakdown spectroscopy (LIBS) offers rapid, localized chemical analysis of solid or liquid materials with high spatial resolution in lateral and depth profiling, without the need for sample preparation. Principal component analysis and partial least squares algorithms were applied to identify a variety of complex organic and inorganic samples. This work illustrates how LIBS analyzers can answer a multitude of real-world needs for rapid analysis, such as determination of lead in paint and children's toys, analysis of electronic and solder materials, quality control of fiberglass panels, discrimination of coffee beans from different vendors, and identification of generic versus brand-name drugs. Lateral and depth profiling was performed on children's toys and paint layers. Traditional one-element calibration or multivariate chemometric procedures were applied for elemental quantification, from single laser shot determination of metal traces at {approx}10 {mu}g/g to determination of halogens at 90 {mu}g/g using 50-shot spectral accumulation. The effectiveness of LIBS for security applications was demonstrated in the field by testing the 50-m standoff LIBS rasterizing detector.

Bol'shakov, Alexander A.; Yoo, Jong H.; Liu Chunyi; Plumer, John R.; Russo, Richard E.

2010-05-01

266

Security  

ERIC Educational Resources Information Center

Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

Technology & Learning, 2008

2008-01-01

267

Meteor: Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems  

E-print Network

Meteor: Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems David enabling the flexibility and independence of a multi-market environment. We propose Meteor as a security- plication (Meteorite) to demonstrate the technical feasibility of our proposal. The Meteor approach provides

Van Oorschot, Paul

268

Rule 144: The Applicability of the Restricted Securities Requirements to Colleges and Universities  

ERIC Educational Resources Information Center

The Federal Securities and Exchange Commission's new Rule 144 applicable to public transactions in restricted securities is reviewed with the conclusion that maximum benefits to colleges and universities can be obtained only after various areas of uncertainty engendered by the Rule are clarified by the Commission. (JT)

Hopkins, Bruce R.

1973-01-01

269

Modeling and Simulation of Healthcare Systems for Homeland Security Applications  

E-print Network

ACKNOWLEDGMENTS The U.S. Department of Homeland Security Science and Technology Directorate sponsored> ... ... Principal Project Staff Charles McLean, National Institute of Standards and Technology, Gaithersburg, MD Y by U.S. Department of Homeland Security And National Institute of Standards and Technology #12;ii

Magee, Joseph W.

270

Distributed Computing Framework for Synthetic Radar Application  

NASA Technical Reports Server (NTRS)

We are developing an extensible software framework, in response to Air Force and NASA needs for distributed computing facilities for a variety of radar applications. The objective of this work is to develop a Python based software framework, that is the framework elements of the middleware that allows developers to control processing flow on a grid in a distributed computing environment. Framework architectures to date allow developers to connect processing functions together as interchangeable objects, thereby allowing a data flow graph to be devised for a specific problem to be solved. The Pyre framework, developed at the California Institute of Technology (Caltech), and now being used as the basis for next-generation radar processing at JPL, is a Python-based software framework. We have extended the Pyre framework to include new facilities to deploy processing components as services, including components that monitor and assess the state of the distributed network for eventual real-time control of grid resources.

Gurrola, Eric M.; Rosen, Paul A.; Aivazis, Michael

2006-01-01

271

Laser Applications to Chemical, Security, and Environmental Analysis: introduction to the feature issue  

SciTech Connect

This Applied Optics feature issue on Laser Applications to Chemical, Security,and Environmental Analysis (LACSEA) highlights papers presented at theLACSEA 2006 Tenth Topical Meeting sponsored by the Optical Society ofAmerica.

Dreizler, Andreas; Fried, Alan; Gord, James R

2007-07-01

272

Network and Index Coding with Application to Robust and Secure Communications  

E-print Network

the traditional routing and tree packing techniques. In this dissertation, we study applications of network coding for guarantying reliable and secure information transmission in networks with compromised edges. First, we investigate the construction of robust...

El Rouayheb, Salim Y.

2011-02-22

273

Secure, Autonomous, Intelligent Controller for Integrating Distributed Emergency Response Satellite Operations  

NASA Technical Reports Server (NTRS)

This report describes a Secure, Autonomous, and Intelligent Controller for Integrating Distributed Emergency Response Satellite Operations. It includes a description of current improvements to existing Virtual Mission Operations Center technology being used by US Department of Defense and originally developed under NASA funding. The report also highlights a technology demonstration performed in partnership with the United States Geological Service for Earth Resources Observation and Science using DigitalGlobe(Registered TradeMark) satellites to obtain space-based sensor data.

Ivancic, William D.; Paulsen, Phillip E.; Miller, Eric M.; Sage, Steen P.

2013-01-01

274

Secure quantum carriers for distributing classical secrets and quantum states for a general threshold scheme  

Microsoft Academic Search

We provide a secure quantum carrier for distributing a secret (classical\\u000asymbol encoded into a state or a quantum state) among $n$ parties according to\\u000aa $(k,n)$ threshold scheme, where $2k-1$ is a prime number. The quantum carrier\\u000a\\\\cite{bk} is an entangled state which is shared between all the participants,\\u000aand is not measured at any stage. Quantum states are

Milad Marvian; Vahid Karimipour

2010-01-01

275

Developing a Secure Distributed OSGi Cloud Computing Infrastructure for Sharing Health Records  

Microsoft Academic Search

\\u000a Cloud Computing has become an emerging computing paradigm which brings new opportunities and challenges to overcome. While\\u000a the cloud provides seemingly limitless scalability and an alternative to expensive data center infrastructure, it raises new\\u000a issues in regards to security and privacy as processing and storage tasks are handed over to third parties. This article outlines\\u000a a Distributed OSGi (DOSGi) architecture

Sabah Mohammed; Daniel Servos; Jinan Fiaidhi

276

Security  

Microsoft Academic Search

\\u000a Because everything about the design and operation of Windows Phone 7 targets consumers, it is only natural that Microsoft\\u000a has carefully thought through the ways to protect consumers from both intended and unintentional harm. Windows Phone 7 ships\\u000a with a compelling set of built-in security features that go towards accomplishing that goal. The capabilities of the Windows\\u000a Phone 7 platform

Henry Lee; Eugene Chuvyrov

277

Towards a multilevel secure database management system for real-time applications  

Microsoft Academic Search

Database systems for real-time applications must satisfy timing constraints associated with transactions, in addition to maintaining data consistency. In addition to real-time requirements, security is usually required in many applications, because sensitive information must be safeguarded. Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems. The paper addresses issues that must be investigated in order

Sang H. Son; Bhavani Thuraisingham

1993-01-01

278

Operation of remote mobile sensors for security of drinking water distribution systems.  

PubMed

The deployment of fixed online water quality sensors in water distribution systems has been recognized as one of the key components of contamination warning systems for securing public health. This study proposes to explore how the inclusion of mobile sensors for inline monitoring of various water quality parameters (e.g., residual chlorine, pH) can enhance water distribution system security. Mobile sensors equipped with sampling, sensing, data acquisition, wireless transmission and power generation systems are being designed, fabricated, and tested, and prototypes are expected to be released in the very near future. This study initiates the development of a theoretical framework for modeling mobile sensor movement in water distribution systems and integrating the sensory data collected from stationary and non-stationary sensor nodes to increase system security. The methodology is applied and demonstrated on two benchmark networks. Performance of different sensor network designs are compared for fixed and combined fixed and mobile sensor networks. Results indicate that complementing online sensor networks with inline monitoring can increase detection likelihood and decrease mean time to detection. PMID:23764572

Perelman, By Lina; Ostfeld, Avi

2013-09-01

279

77 FR 1965 - Central Securities Corporation; Notice of Application  

Federal Register 2010, 2011, 2012, 2013, 2014

...writing to the Commission's Secretary. ADDRESSES: Elizabeth M. Murphy, Secretary, Commission, 100 F Street...Krumholz, Vice President and Secretary, Central Securities Corporation...competes for management talent are not registered...

2012-01-12

280

High-Resolution Laser-Induced Breakdown Spectroscopy used in Homeland Security and Forensic Applications  

Microsoft Academic Search

The technique of laser-induced breakdown spectroscopy (LIBS) to detect elements for a variety of homeland security applications such as nuclear materials identification and inventory,and forensic applications has been demonstrated. For nuclear materials applications, we detected and profiled metals in coatings that were used to encapsulate nuclear fuel. Multivariate analysis has been successfully employed in the quantification of elements present in

Madhavi Z Martin; Stan D Wullschleger; Arpad Alexander Vass; Rodger Carl Martin; Henri Grissino-Mayer

2006-01-01

281

Dark states ultra-long fiber laser for practically secure key distribution  

NASA Astrophysics Data System (ADS)

We present and demonstrate a novel ultra-long fiber laser key distribution system (UFL-KDS). The scheme quenches the lasing process when in its secure states, thus forming "dark states" which provide simple detection on one hand and increased difficulty of eavesdropping on the other. We analyze the practical aspects of previously studied UFL-KDS schemes as well as those of the one presented here and demonstrate successful key distribution across a 200 km link with bit-rates that can exceed 0.5 kbps. Spectral and temporal passive attack strategies are analyzed and discussed in details.

Kotlicki, Omer; Scheuer, Jacob

2014-10-01

282

Latest electro-optic and photonic devices for security and military applications  

NASA Astrophysics Data System (ADS)

This paper reveals performance capabilities of state-of-the-art electro-optic and photonic devices, which are best suited for security and defense system applications. These devices can be used in battlefield, space surveillance, medical diagnosis, and detection of terrorist activities. Performance capabilities of fiber optic components for possible applications in WDM and DWDM systems are summarized. Photonic devices for covert military and security communication applications are identified with particular emphasis on performance and reliability. Performance parameters of Erbium-doped fiber amplifiers (EDFAs), Erbium-doped waveguide amplifiers (EDWAs), and optical hybrid amplifiers (OHAs) comprising of EDFAs and Raman amplifiers are discussed with emphasis on bandwidth, gain-flatness, data handling capability, channel capacity and cost-effectiveness. Performance parameters of very long wavelength infrared (VLWIR) detectors are summarized, which have potential applications in remote sensing and ballistic missile defense applications. Electro-optic and photonic devices best suited for security and defense applications are identified.

Jha, A. R.

2006-09-01

283

Contributions to Human Errors and Breaches in National Security Applications.  

SciTech Connect

Los Alamos National Laboratory has recognized that security infractions are often the consequence of various types of human errors (e.g., mistakes, lapses, slips) and/or breaches (i.e., deliberate deviations from policies or required procedures with no intention to bring about an adverse security consequence) and therefore has established an error reduction program based in part on the techniques used to mitigate hazard and accident potentials. One cornerstone of this program, definition of the situational and personal factors that increase the likelihood of employee errors and breaches, is detailed here. This information can be used retrospectively (as in accident investigations) to support and guide inquiries into security incidents or prospectively (as in hazard assessments) to guide efforts to reduce the likelihood of error/incident occurrence. Both approaches provide the foundation for targeted interventions to reduce the influence of these factors and for the formation of subsequent 'lessons learned.' Overall security is enhanced not only by reducing the inadvertent releases of classified information but also by reducing the security and safeguards resources devoted to them, thereby allowing these resources to be concentrated on acts of malevolence.

Pond, D. J. (Daniel J.); Houghton, F. K. (Florence Kay); Gilmore, W. E. (Walter E.)

2002-01-01

284

Secure Optical Networks Based on Quantum Key Distribution and Weakly Trusted Repeaters  

E-print Network

In this paper we explore how recent technologies can improve the security of optical networks. In particular, we study how to use quantum key distribution (QKD) in common optical network infrastructures and propose a method to overcome its distance limitations. QKD is the first technology offering information theoretic secret-key distribution that relies only on the fundamental principles of quantum physics. Point-to-point QKD devices have reached a mature industrial state; however, these devices are severely limited in distance, since signals at the quantum level (e.g. single photons) are highly affected by the losses in the communication channel and intermediate devices. To overcome this limitation, intermediate nodes (i.e. repeaters) are used. Both, quantum-regime and trusted, classical, repeaters have been proposed in the QKD literature, but only the latter can be implemented in practice. As a novelty, we propose here a new QKD network model based on the use of not fully trusted intermediate nodes, referred as weakly trusted repeaters. This approach forces the attacker to simultaneously break several paths to get access to the exchanged key, thus improving significantly the security of the network. We formalize the model using network codes and provide real scenarios that allow users to exchange secure keys over metropolitan optical networks using only passive components. Moreover, the theoretical framework allows to extend these scenarios not only to accommodate more complex trust constraints, but also to consider robustness and resiliency constraints on the network.

David Elkouss; Jesus Martinez-Mateo; Alex Ciurana; Vicente Martin

2013-04-15

285

Applications of species distribution modeling to paleobiology  

NASA Astrophysics Data System (ADS)

Species distribution modeling (SDM: statistical and/or mechanistic approaches to the assessment of range determinants and prediction of species occurrence) offers new possibilities for estimating and studying past organism distributions. SDM complements fossil and genetic evidence by providing (i) quantitative and potentially high-resolution predictions of the past organism distributions, (ii) statistically formulated, testable ecological hypotheses regarding past distributions and communities, and (iii) statistical assessment of range determinants. In this article, we provide an overview of applications of SDM to paleobiology, outlining the methodology, reviewing SDM-based studies to paleobiology or at the interface of paleo- and neobiology, discussing assumptions and uncertainties as well as how to handle them, and providing a synthesis and outlook. Key methodological issues for SDM applications to paleobiology include predictor variables (types and properties; special emphasis is given to paleoclimate), model validation (particularly important given the emphasis on cross-temporal predictions in paleobiological applications), and the integration of SDM and genetics approaches. Over the last few years the number of studies using SDM to address paleobiology-related questions has increased considerably. While some of these studies only use SDM (23%), most combine them with genetically inferred patterns (49%), paleoecological records (22%), or both (6%). A large number of SDM-based studies have addressed the role of Pleistocene glacial refugia in biogeography and evolution, especially in Europe, but also in many other regions. SDM-based approaches are also beginning to contribute to a suite of other research questions, such as historical constraints on current distributions and diversity patterns, the end-Pleistocene megafaunal extinctions, past community assembly, human paleobiogeography, Holocene paleoecology, and even deep-time biogeography (notably, providing insights into biogeographic dynamics >400 million years ago). We discuss important assumptions and uncertainties that affect the SDM approach to paleobiology - the equilibrium postulate, niche stability, changing atmospheric CO 2 concentrations - as well as ways to address these (ensemble, functional SDM, and non-SDM ecoinformatics approaches). We conclude that the SDM approach offers important opportunities for advances in paleobiology by providing a quantitative ecological perspective, and hereby also offers the potential for an enhanced contribution of paleobiology to ecology and conservation biology, e.g., for estimating climate change impacts and for informing ecological restoration.

Svenning, Jens-Christian; Fløjgaard, Camilla; Marske, Katharine A.; Nógues-Bravo, David; Normand, Signe

2011-10-01

286

Security bound of two-basis quantum-key-distribution protocols using qudits  

SciTech Connect

We investigate the security bounds of quantum-cryptographic protocols using d-level systems. In particular, we focus on schemes that use two mutually unbiased bases, thus extending the Bennett-Brassard 1984 quantum-key-distribution scheme to higher dimensions. Under the assumption of general coherent attacks, we derive an analytic expression for the ultimate upper security bound of such quantum-cryptography schemes. This bound is well below the predictions of optimal cloning machines. The possibility of extraction of a secret key beyond entanglement distillation is discussed. In the case of qutrits we argue that any eavesdropping strategy is equivalent to a symmetric one. For higher dimensions such an equivalence is generally no longer valid.

Nikolopoulos, Georgios M.; Alber, Gernot [Institut fuer Angewandte Physik, Technische Universitaet Darmstadt, 64289 Darmstadt (Germany)

2005-09-15

287

Control and Communication for a Secure and Reconfigurable Power Distribution System  

NASA Astrophysics Data System (ADS)

A major transformation is taking place throughout the electric power industry to overlay existing electric infrastructure with advanced sensing, communications, and control system technologies. This transformation to a smart grid promises to enhance system efficiency, increase system reliability, support the electrification of transportation, and provide customers with greater control over their electricity consumption. Upgrading control and communication systems for the end-to-end electric power grid, however, will present many new security challenges that must be dealt with before extensive deployment and implementation of these technologies can begin. In this dissertation, a comprehensive systems approach is taken to minimize and prevent cyber-physical disturbances to electric power distribution systems using sensing, communications, and control system technologies. To accomplish this task, an intelligent distributed secure control (IDSC) architecture is presented and validated in silico for distribution systems to provide greater adaptive protection, with the ability to proactively reconfigure, and rapidly respond to disturbances. Detailed descriptions of functionalities at each layer of the architecture as well as the whole system are provided. To compare the performance of the IDSC architecture with that of other control architectures, an original simulation methodology is developed. The simulation model integrates aspects of cyber-physical security, dynamic price and demand response, sensing, communications, intermittent distributed energy resources (DERs), and dynamic optimization and reconfiguration. Applying this comprehensive systems approach, performance results for the IEEE 123 node test feeder are simulated and analyzed. The results show the trade-offs between system reliability, operational constraints, and costs for several control architectures and optimization algorithms. Additional simulation results are also provided. In particular, the advantages of an IDSC architecture are highlighted when an intermittent DER is present on the system.

Giacomoni, Anthony Michael

288

Performance Prediction of Distributed Enterprise Applications with Session Persistence  

Microsoft Academic Search

Distributed enterprise applications store client-specific data in application server memory, in a data structure commonly referred to as the session. The backing up of this session data (in a process known as session persistence) is essential for load balancing between application servers and for managing server failures, and hence is critical for the success of distributed enterprise applications. This paper

James W. J. Xue; David A. Bacigalupo; Stephen A. Jarvis; Graham R. Nudd

289

Security Models and Requirements for Healthcare Application Clouds  

E-print Network

different EMR systems are called electronic health records (EHRs). The interoperation and sharing among and Information Technology, Beijing Jiaotong University, Beijing, China rui.zhang21@gmail.com, lingliu@cc.gatech.edu Abstract: With the widespread use of electronic health record (EHR), building a secure EHR sharing

Liu, Ling

290

SECURE APPLICATION UPDATES ON POINT OF SALE DEVICES Manuel Mendonca  

E-print Network

- Portugal Email: nuno@di.fc.ul.pt Keywords: Electronic payment systems, point of sale devices, secure to automatically discover and upload new software updates. 1 INTRODUCTION Even though several electronic payment by the entity respon- sible for the network, the Payment Network Opera- tor (PNO), the new version is given

Neves, Nuno

291

Rescuing of Intelligence and Electronic Security Core Applications (RIESCA)  

Microsoft Academic Search

There are number of systems, such as transport and logistic, power and telecommunication, hydropower and nuclear power stations; that are critical systems for the functioning of day-to-day life of the society in Finland. When assessing possible risks, it is only seldom taken into account that power, hydropower and nuclear power plants are critically dependent on the reliability and security of

RAUNO PIRINEN; JYRI RAJAMÄKI; LILI AUNIMO

2008-01-01

292

An artificial immune system architecture for computer security applications  

Microsoft Academic Search

With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect their systems from intrusion and computer-virus attacks. Such protection must detect anomalous patterns by exploiting known signatures while monitoring normal computer programs and network usage for abnormalities. Current antivirus and net- work intrusion detection (ID) solutions can become overwhelmed

Paul K. Harmer; Paul D. Williams; Gregg H. Gunsch; Gary B. Lamont

2002-01-01

293

Security Models and Requirements for Healthcare Application Clouds  

Microsoft Academic Search

With the widespread use of electronic health record (EHR), building a secure EHR sharing environment has attracted a lot of attention in both healthcare industry and academic community. Cloud computing paradigm is one of the popular healthIT infrastructure for facilitating EHR sharing and EHR integration. In this paper we discuss important concepts related to EHR sharing and integration in healthcare

Rui Zhang; Ling Liu

2010-01-01

294

An empirical analysis of the social security disability application, appeal, and award process  

Microsoft Academic Search

We provide an empirical analysis of the Social Security disability application, award, and appeal process using the Health and Retirement Survey (HRS). We show that the appeal option increases the award probability from 46% to 73%. However, this comes at the cost of significant delays: the duration between application and award is over three times longer for those who are

Hugo Ben??tez-Silva; Moshe Buchinsky; Hiu Man Chan; John Rust; Sofia Sheidvasser

1999-01-01

295

Image-Based Electronic Patient Records for Secured Collaborative Medical Applications  

Microsoft Academic Search

We developed a Web-based system to interactively display image-based electronic patient records (EPR) for secured intranet and Internet collaborative medical applications. The system consists of four major components: EPR DICOM gateway (EPR-GW), image-based EPR repository server (EPR-Server), Web server and EPR DICOM viewer (EPR-Viewer). In the EPR-GW and EPR-Viewer, the security modules of digital signature and authentication are integrated to

Jianguo Zhang; Jianyong Sun; Yuanyuan Yang; Chenwen Liang; Yihong Yao; Jin Jin; Weihua Cai; Kun Sun; Guozhen Zhang

2005-01-01

296

Enforcing End-to-End Application Security in the Cloud - (Big Ideas Paper)  

Microsoft Academic Search

\\u000a Security engineering must be integrated with all stages of application specification and development to be effective. Doing\\u000a this properly is increasingly critical as organisations rush to offload their software services to cloud providers. Service-level\\u000a agreements (SLAs) with these providers currently focus on performance-oriented parameters, which runs the risk of exacerbating\\u000a an impedance mismatch with the security middleware. Not only do we

Jean Bacon; David Evans; David M. Eyers; Matteo Migliavacca; Peter R. Pietzuch; Brian Shand

2010-01-01

297

Secure and efficient decoy-state quantum key distribution with inexact pulse intensities  

E-print Network

We present a general theorem for the efficient verification of the lower bound of single-photon transmittance. We show how to do decoy-state quantum key distribution efficiently with large random errors in the intensity control. In our protocol, the linear terms of fluctuation disappear and only the quadratic terms take effect. We then show the unconditional security of decoy-state method with whatever error pattern in intensities of decoy pulses and signal pulses provided that the intensity of each decoy pulse is less than $\\mu$ and the intensity of each signal pulse is larger than $\\mu'$.

X. B. Wang

2006-11-22

298

Application of portable CDA for secure clinical-document exchange.  

PubMed

Health Level Seven (HL7) organization published the Clinical Document Architecture (CDA) for exchanging documents among heterogeneous systems and improving medical quality based on the design method in CDA. In practice, although the HL7 organization tried to make medical messages exchangeable, it is still hard to exchange medical messages. There are many issues when two hospitals want to exchange clinical documents, such as patient privacy, network security, budget, and the strategies of the hospital. In this article, we propose a method for the exchange and sharing of clinical documents in an offline model based on the CDA-the Portable CDA. This allows the physician to retrieve the patient's medical record stored in a portal device, but not through the Internet in real time. The security and privacy of CDA data will also be considered. PMID:20703907

Huang, Kuo-Hsuan; Hsieh, Sung-Huai; Chang, Yuan-Jen; Lai, Feipei; Hsieh, Sheau-Ling; Lee, Hsiu-Hui

2010-08-01

299

17 CFR 270.22c-1 - Pricing of redeemable securities for distribution, redemption and repurchase.  

Code of Federal Regulations, 2010 CFR

...business of investing in eligible trust securities (as defined in Rule 14a-3...side evaluation of the eligible trust securities in the Trust's portfolio...principal amount of eligible trust securities) greater than the current...

2010-04-01

300

17 CFR 270.22c-1 - Pricing of redeemable securities for distribution, redemption and repurchase.  

Code of Federal Regulations, 2011 CFR

...business of investing in eligible trust securities (as defined in Rule 14a-3...side evaluation of the eligible trust securities in the Trust's portfolio...principal amount of eligible trust securities) greater than the current...

2011-04-01

301

17 CFR 270.22c-1 - Pricing of redeemable securities for distribution, redemption and repurchase.  

Code of Federal Regulations, 2014 CFR

...business of investing in eligible trust securities (as defined in Rule 14a-3...side evaluation of the eligible trust securities in the Trust's portfolio...principal amount of eligible trust securities) greater than the current...

2014-04-01

302

17 CFR 270.22c-1 - Pricing of redeemable securities for distribution, redemption and repurchase.  

Code of Federal Regulations, 2012 CFR

...business of investing in eligible trust securities (as defined in Rule 14a-3...side evaluation of the eligible trust securities in the Trust's portfolio...principal amount of eligible trust securities) greater than the current...

2012-04-01

303

17 CFR 270.22c-1 - Pricing of redeemable securities for distribution, redemption and repurchase.  

Code of Federal Regulations, 2013 CFR

...business of investing in eligible trust securities (as defined in Rule 14a-3...side evaluation of the eligible trust securities in the Trust's portfolio...principal amount of eligible trust securities) greater than the current...

2013-04-01

304

17 CFR 242.102 - Activities by issuers and selling security holders during a distribution.  

Code of Federal Regulations, 2010 CFR

...traded on a securities exchange or...communications network; or (3...communications network; or (4) Exercises of securities. The exercise...communications network; or (7...in Rule 144A securities....

2010-04-01

305

Security of biased BB84 quantum key distribution with finite resource  

NASA Astrophysics Data System (ADS)

In the original BB84 quantum key distribution protocol, the states are prepared and measured randomly, which lose the unmatched detection results. To improve the sifting efficiency, biased bases selection BB84 protocol is proposed. Meanwhile, a practical quantum key distribution protocol can only transmit a finite number of signals, resulting in keys of finite length. The previous techniques for finite-key analysis focus mainly on the statistical fluctuations of the error rates and yields of the qubits. However, the prior choice probabilities of the two bases also have fluctuations by taking into account the finite-size effect. In this paper, we discuss the security of biased decoy state BB84 protocol with finite resources by considering all of the statistical fluctuations. The results can be directly used in the experimental realizations.

Zhao, Liang-Yuan; Li, Hong-Wei; Yin, Zhen-Qiang; Chen, Wei; You, Juan; Han, Zheng-Fu

2014-10-01

306

Construction of Distributed Object Group Framework and Its Execution Analysis Using Distributed Application Simulation  

Microsoft Academic Search

\\u000a The Distributed Object Group Framework(DOGF) we constructed supports the grouping of distributed objects that are required\\u000a for distributed application. From the DOGF, we manage distributed application as a logical single view by applying the concept\\u000a of object group, therefore the framework can provide distributed transparency for client’ request and binding service between\\/among\\u000a objects. The DOGF also has an adaptive structure

Chang-sun Shin; Chang-won Jeong; Su-chong Joo

2004-01-01

307

Finite-key-size security of the Phoenix-Barnett-Chefles 2000 quantum-key-distribution protocol  

NASA Astrophysics Data System (ADS)

The postselection technique was introduced by Christandl, König, and Renner [Phys. Rev. Lett. 102, 020504 (2009), 10.1103/PhysRevLett.102.020504] in order to simplify the security of quantum-key-distribution schemes. Here, we present how it can be applied to study the security of the Phoenix-Barnett-Chefles 2000 trine-state protocol, a symmetric version of the Bennett 1992 protocol.

Mafu, Mhlambululi; Garapo, Kevin; Petruccione, Francesco

2014-09-01

308

Time Scaling of Chaotic Systems: Application to Secure Communications  

E-print Network

The paper deals with time-scaling transformations of dynamical systems. Such scaling functions operate a change of coordinates on the time axis of the system trajectories preserving its phase portrait. Exploiting this property, a chaos encryption technique to transmit a binary signal through an analog channel is proposed. The scheme is based on a suitable time-scaling function which plays the role of a private key. The encoded transmitted signal is proved to resist known decryption attacks offering a secure and reliable communication.

Donatello Materassi; Michele Basso

2007-10-23

309

Fully Simulatable Quantum-Secure Coin-Flipping and Applications  

Microsoft Academic Search

We propose a coin-flip protocol which yields a string of strong, random coins\\u000aand is fully simulatable against poly-sized quantum adversaries on both sides.\\u000aIt can be implemented with quantum-computational security without any set-up\\u000aassumptions, since our construction only assumes mixed commitment schemes which\\u000awe show how to construct in the given setting. We then show that the\\u000ainteractive generation

Carolin Lunemann; Jesper Buus Nielsen

2011-01-01

310

Ultra Wideband (UWB) communication vulnerability for security applications.  

SciTech Connect

RF toxicity and Information Warfare (IW) are becoming omnipresent posing threats to the protection of nuclear assets, and within theatres of hostility or combat where tactical operation of wireless communication without detection and interception is important and sometimes critical for survival. As a result, a requirement for deployment of many security systems is a highly secure wireless technology manifesting stealth or covert operation suitable for either permanent or tactical deployment where operation without detection or interruption is important The possible use of ultra wideband (UWB) spectrum technology as an alternative physical medium for wireless network communication offers many advantages over conventional narrowband and spread spectrum wireless communication. UWB also known as fast-frequency chirp is nonsinusoidal and sends information directly by transmitting sub-nanosecond pulses without the use of mixing baseband information upon a sinusoidal carrier. Thus UWB sends information using radar-like impulses by spreading its energy thinly over a vast spectrum and can operate at extremely low-power transmission within the noise floor where other forms of RF find it difficult or impossible to operate. As a result UWB offers low probability of detection (LPD), low probability of interception (LPI) as well as anti-jamming (AJ) properties in signal space. This paper analyzes and compares the vulnerability of UWB to narrowband and spread spectrum wireless network communication.

Cooley, H. Timothy

2010-07-01

311

Practical security for multi-user web application databases  

E-print Network

Online web applications are continuously vulnerable to attacks on their users' data. Outside adversaries can gain unauthorized access by exploiting unknown vulnerabilities; curious or malicious database administrators can ...

Redfield, Catherine M. S

2012-01-01

312

Addressable flat-panel x-ray sources for medical, security, and industrial applications  

NASA Astrophysics Data System (ADS)

Traditional tube-based x-ray sources are widely employed in medical imaging, security screening, and industrial inspection. The cone-beam produced by these tubes is simple to apply, but often demands a long stand-off distance to the object of interest. When combined with the bulk of tubes and their attendant power supplies and cooling systems, the footprint requirement of traditional sources often impedes their use, especially in mobile situations. Here we present an approach to a distributed, flat-panel x-ray source, which eliminates the aforementioned bulk, weight and need for standoff. This source uses spontaneous polarization in pyroelectric crystals to generate high fields and field enhanced emission from micropatterned tips to create a large array of electron beamlets. When combined with a transmission Bremsstrahlung target, a mechanism for raster control of the emitters, and a collimator, this source offers a new and cost effective way to perform stationary and portable imaging. The working principles and performance characteristics of this source are presented. The demands placed on the imaging detector and image processing are also described. Finally, prospects for new promising applications (such as mammography) are mentioned.

Travish, Gil; Rangel, Felix J.; Evans, Mark A.; Hollister, Ben; Schmiedehausen, Kristin

2012-10-01

313

Securing while Sampling in Wireless Body Area Networks with Application to Electrocardiography.  

PubMed

Stringent resource constraints and broadcast transmission in wireless body area network raise serious security concerns when employed in biomedical applications. Protecting data transmission where any minor alteration is potentially harmful is of significant importance in healthcare. Traditional security methods based on public or private key infrastructure require considerable memory and computational resources and present an implementation obstacle in compact sensornodes. This paper proposes a lightweight encryption framework augmenting Compressed Sensing with Wireless Physical Layer Security. Augmenting compressed sensing to secure information is based on the use of the measurement matrix as an encryption key and allows for incorporating security in addition to compression at the time of sampling an analog signal. The proposed approach eliminates the need for a separate encryption algorithm as well as the pre-deployment of a key thereby conserving sensor-node's limited resources. The proposed framework is evaluated using analysis, simulation and experimentation applied to a wireless electrocardiogram setup consisting of a sensor-node, an access point, and an eavesdropper performing a proximity attack. Results show that legitimate communication is reliable and secure given that the eavesdropper is located at a reasonable distance from the sensor-node and the access point. PMID:25373134

Dautov, Ruslan; Tsouri, Gill R

2014-10-31

314

Security Technologies for Open Networking Environments (STONE)  

SciTech Connect

Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi-domain scenarios is supported by a set of security engines that represent the core of the Federated Identities Management Server, which is also an extension of the Domain Security Server. The Federated Identity Management server allows users to federate their identities or terminate the federation between the service provider and the identity provider. At the service provider web site, the users are offered a list of identity providers to which they can choose to federate their identities. After users federate their identity, they can perform Single Sign-On protocol in an environment of federated domains. The group security system consists of a number of security technologies under a unified architecture, which supports creation of secure groups and execution of secure group transactions and applications in an open networking environment. The system is based on extensions of the GSAKMP standard for group key distribution and management. The Top layer is the Security Infrastructure with the Security Management and Administration System components and protocols that provide security functions common to all secure network applications The Middle layer is the Secure Group Protocols and Applications layer, consisting of the Policy and Group Key Distribution Server and Web-based (thin) Client. The Bottom layer is the supporting Middleware Security Platform, the cryptographic platform already described above. The group security system is designed to perform the functions necessary to create secure groups and enable secure group applications. Specifically, the system can manage group roles, create and disseminate a group security policy, perform authentication and authorization of users using PKI certificates and Web services security, generate group keys, and recover from compromises. In accordance with the GSAKMP standard, the group security system must perform all the required group life-cycle functions: group definition, group establishment, group maintenance, and group removal. The group security system has been designed to support four roles: The Security Domain Ad

Muftic, Sead

2005-03-31

315

Game Theory with Costly Computation: Formulation and Application to Protocol Security  

E-print Network

Game Theory with Costly Computation: Formulation and Application to Protocol Security Joseph Y a general game-theoretic framework for reasoning about strategic agents performing possibly costly computation. In this framework, many traditional game-theoretic results (such as the existence of a Nash equi

Keinan, Alon

316

Towards Realising Secure and Efficient Image and Video Processing Applications on Quantum Computers  

Microsoft Academic Search

Exploiting the promise of security and efficiency that quantum computing offers, the basic foundations leading to commercial applications for quantum image processing are proposed. Two mathematical frameworks and algorithms to accomplish the watermarking of quantum images, authentication of ownership of already watermarked images and recovery of their unmarked versions on quantum computers are proposed. Encoding the images as 2n-sized normalised

Abdullah M. Iliyasu

2013-01-01

317

Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems  

E-print Network

Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems David Barrera1 only one market; however, social and economic pressures have resulted in multiple-market ecosystems computing as we know it is currently undergoing a transition. The emerging software ecosystem frequently

Van Oorschot, Paul

318

Incorruptible Self-Cleansing Intrusion Tolerance and Its Application to DNS Security  

E-print Network

Incorruptible Self-Cleansing Intrusion Tolerance and Its Application to DNS Security Yih Huang. In prior work, we developed a Self-Cleansing Intrusion Tolerance (SCIT) architecture that achieves the above goal by constantly cleansing the servers and rotating the role of individual servers

Sood, Arun K.

319

EPC RFID Tags in Security Applications: Passport Cards, Enhanced Drivers Licenses, and Beyond  

E-print Network

tags. We explore several issues: 1. Cloning: We report on the data format of Passport Cards and WA EDLsEPC RFID Tags in Security Applications: Passport Cards, Enhanced Drivers Licenses, and Beyond Karl Card and Washington State "enhanced" drivers license (WA EDL), both of which incor- porate Gen-2 EPC

Anderson, Richard

320

REMOTE SENSING APPLICATIONS FOR SUSTAINABLE WATERSHED MANAGEMENT AND FOOD SECURITY: JOURNAL ARTICLE  

EPA Science Inventory

NRMRL-CIN-1496A Rochon*, G., Szlag*, D., Daniel*, F.B., and Chifos**, C. Remote Sensing Applications for Sustainable Watershed Management and Food Security. Proceedings of the 21st European Association of Remote Sensing Laboratories Symposium, Marne-La-Valle, France, 5/14-16/200...

321

Safe VISITOR: visible, infrared, and terahertz object recognition for security screening application  

Microsoft Academic Search

Security solutions with the purpose to detect hidden objects underneath the clothing of persons are desired in many environments. With the variety of application scenarios criteria like flexibility and mobility become more important. So, many developments trend to focus on cameras, which can image scenes from a distance. This new generation of tools will have the advantage of hidden operation,

T. May; G. Zieger; S. Anders; V. Zakosarenko; H.-G. Meyer; M. Schubert; M. Starkloff; M. Rößler; G. Thorwirth; U. Krause

2009-01-01

322

THz imaging and sensing for security applications---explosives, weapons and drugs  

Microsoft Academic Search

Over the past 5 years, there has been a significant interest in employing terahertz (THz) technology, spectroscopy and imaging for security applications. There are three prime motivations for this interest: (a) THz radiation can detect concealed weapons since many non-metallic, non-polar materials are transparent to THz radiation; (b) target compounds such as explosives and illicit drugs have characteristic THz spectra

John F. Federici; Brian Schulkin; Feng Huang; Dale Gary; Robert Barat; Filipe Oliveira; David Zimdars

2005-01-01

323

Verification of initial-state opacity in security applications of DES  

Microsoft Academic Search

Motivated by security applications where the initial state of a system needs to be kept secret (opaque) to outside observers (intruders), we formulate, analyze and verify the notion of initial-state opacity in discrete event systems. Specifically, a system is initial-state opaque if the membership of its true initial state to a set of secret states remains opaque to an intruder

Anooshiravan Saboori; Christoforos N. Hadjicostis

2008-01-01

324

Data De-duplication and Event Processing for Security Applications on an Embedded Processor  

E-print Network

Data De-duplication and Event Processing for Security Applications on an Embedded Processor Harsha {hpn, shambhu}@buffalo.edu Vinodh Gopal Intel Corporation 75 Reed Road Hudson, MA 01749 USA vinodh is to preprocess such data to manageable sizes. In this paper, we show that data de- duplication using

Upadhyaya, Shambhu

325

Information security issue of enterprises adopting the application of cloud computing  

Microsoft Academic Search

Cloud computing has become one of the most significant issues in recent years. Those associative applications and services based on cloud computing are dramatically emerging. However, in order to enjoy the widely utilization of cloud computing through wired\\/wireless networking, providing sufficient assurance of information security such as confidentiality, authentication, non-repudiation, and integrity is the critical factor of success promotion. In

Chang-Lung Tsai; Uei-Chin Lin; Allen Y. Chang; Chun-Jung Chen

2010-01-01

326

Application of an explosive detection device based on quadrupole resonance (QR) technology in aviation security  

Microsoft Academic Search

The Federal Aviation Administration has deployed Advanced Technology (AT) based explosive detection devices for screening checked baggage in US domestic airports. The paper addresses the application of quadrupole resonance (QR) technology to detect explosives in checked baggage in aviation security. This technology was deployed in combination with advanced X-ray by the US government. The paper focuses on the quadrupole resonance

Ed Rao; William J. Hughes

2001-01-01

327

Security analysis on some experimental quantum key distribution systems with imperfect optical and electrical devices  

NASA Astrophysics Data System (ADS)

In general, quantum key distribution (QKD) has been proved unconditionally secure for perfect devices due to quantum uncertainty principle, quantum noncloning theorem and quantum nondividing principle which means that a quantum cannot be divided further. However, the practical optical and electrical devices used in the system are imperfect, which can be exploited by the eavesdropper to partially or totally spy the secret key between the legitimate parties. In this article, we first briefly review the recent work on quantum hacking on some experimental QKD systems with respect to imperfect devices carried out internationally, then we will present our recent hacking works in details, including passive faraday mirror attack, partially random phase attack, wavelength-selected photon-number-splitting attack, frequency shift attack, and single-photon-detector attack. Those quantum attack reminds people to improve the security existed in practical QKD systems due to imperfect devices by simply adding countermeasure or adopting a totally different protocol such as measurement-device independent protocol to avoid quantum hacking on the imperfection of measurement devices [Lo, et al., Phys. Rev. Lett., 2012, 108: 130503].

Liang, Lin-Mei; Sun, Shi-Hai; Jiang, Mu-Sheng; Li, Chun-Yan

2014-10-01

328

Secure E-Business applications based on the European Citizen Card  

NASA Astrophysics Data System (ADS)

The introduction of ID cards enhanced with electronic authentication services opens up the possibility to use these for identification and authentication in e-business applications. To avoid incompatible national solutions, the specification of the European Citizen Card aims at defining interoperable services for such use cases. Especially the given device authentication methods can help to eliminate security problems with current e-business and online banking applications.

Zipfel, Christian; Daum, Henning; Meister, Gisela

329

Idea: Java vs. PHP: Security Implications of Language Choice for Web Applications  

Microsoft Academic Search

\\u000a While Java and PHP are two of the most popular languages for open source web applications found at \\u000a freshmeat.net\\u000a , Java has had a much better security reputation than PHP. In this paper, we examine whether that reputation is deserved.\\u000a We studied whether the variation in vulnerability density is greater between languages or between different applications written\\u000a in a single

James Walden; Maureen Doyle; Robert Lenhof; John Murray

2010-01-01

330

Experimental quantum key distribution with finite-key security analysis for noisy channels.  

PubMed

In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable. PMID:24008848

Bacco, Davide; Canale, Matteo; Laurenti, Nicola; Vallone, Giuseppe; Villoresi, Paolo

2013-01-01

331

Experimental quantum key distribution with finite-key security analysis for noisy channels  

E-print Network

In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight-bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks, or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable.

Davide Bacco; Matteo Canale; Nicola Laurenti; Giuseppe Vallone; Paolo Villoresi

2014-06-17

332

MDPHnet: secure, distributed sharing of electronic health record data for public health surveillance, evaluation, and planning.  

PubMed

Electronic health record systems contain clinically detailed data from large populations of patients that could significantly enrich public health surveillance. Clinical practices' security, privacy, and proprietary concerns, however, have limited their willingness to share these data with public health agencies. We describe a novel distributed network for public health surveillance called MDPHnet. The system allows the Massachusetts Department of Public Health (MDPH) to initiate custom queries against participating practices' electronic health records while the data remain behind each practice's firewall. Practices can review proposed queries before execution and approve query results before releasing them to the health department. MDPH is using the system for routine surveillance for priority conditions and to evaluate the impact of public health interventions. PMID:25322301

Vogel, Joshua; Brown, Jeffrey S; Land, Thomas; Platt, Richard; Klompas, Michael

2014-12-01

333

Experimental quantum key distribution with finite-key security analysis for noisy channels  

NASA Astrophysics Data System (ADS)

In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable.

Bacco, Davide; Canale, Matteo; Laurenti, Nicola; Vallone, Giuseppe; Villoresi, Paolo

2013-09-01

334

Quantum key distribution based on orthogonal states allows secure quantum bit commitment  

NASA Astrophysics Data System (ADS)

For more than a decade, it was believed that unconditionally secure quantum bit commitment (QBC) is impossible. But based on a previously proposed quantum key distribution scheme using orthogonal states, here we build a QBC protocol in which the density matrices of the quantum states encoding the commitment do not satisfy a crucial condition on which the no-go proofs of QBC are based. Thus, the no-go proofs could be evaded. Our protocol is fault-tolerant and very feasible with currently available technology. It reopens the venue for other ‘post-cold-war’ multi-party cryptographic protocols, e.g. quantum bit string commitment and quantum strong coin tossing with an arbitrarily small bias. This result also has a strong influence on the Clifton-Bub-Halvorson theorem which suggests that quantum theory could be characterized in terms of information-theoretic constraints.

He, Guang Ping

2011-11-01

335

A Framework for Federated Two-Factor Authentication Enabling Cost-Effective Secure Access to Distributed Cyberinfrastructure  

SciTech Connect

As cyber attacks become increasingly sophisticated, the security measures used to mitigate the risks must also increase in sophistication. One time password (OTP) systems provide strong authentication because security credentials are not reusable, thus thwarting credential replay attacks. The credential changes regularly, making brute-force attacks significantly more difficult. In high performance computing, end users may require access to resources housed at several different service provider locations. The ability to share a strong token between multiple computing resources reduces cost and complexity. The National Science Foundation (NSF) Extreme Science and Engineering Discovery Environment (XSEDE) provides access to digital resources, including supercomputers, data resources, and software tools. XSEDE will offer centralized strong authentication for services amongst service providers that leverage their own user databases and security profiles. This work implements a scalable framework built on standards to provide federated secure access to distributed cyberinfrastructure.

Ezell, Matthew A [ORNL; Rogers, Gary L [University of Tennessee, Knoxville (UTK); Peterson, Gregory D. [University of Tennessee, Knoxville (UTK)

2012-01-01

336

Bayesian performance metrics and small system integration in recent homeland security and defense applications  

NASA Astrophysics Data System (ADS)

In this paper, Bayesian inference is applied to performance metrics definition of the important class of recent Homeland Security and defense systems called binary sensors, including both (internal) system performance and (external) CONOPS. The medical analogy is used to define the PPV (Positive Predictive Value), the basic Bayesian metrics parameter of the binary sensors. Also, Small System Integration (SSI) is discussed in the context of recent Homeland Security and defense applications, emphasizing a highly multi-technological approach, within the broad range of clusters ("nexus") of electronics, optics, X-ray physics, ?-ray physics, and other disciplines.

Jannson, Tomasz; Kostrzewski, Andrew; Patton, Edward; Pradhan, Ranjit; Shih, Min-Yi; Walter, Kevin; Savant, Gajendra; Shie, Rick; Forrester, Thomas

2010-04-01

337

A Multi-Agent Architecture for Distributed Services and Applications  

Microsoft Academic Search

Ambient Intelligence has acquired great importance in recent years and requires the development of new innovative solutions. This paper presents a novel architecture which facilitates the integration of multi-agent systems, distributed services and applications to optimize the construction of Ambient Intelligence environments. The architecture proposes a new and easier method to develop distributed intelligent ubiquitous systems, where applications and services

J. M. Corchado; D. I. Tapia; J. Bajo

338

Load Balancing in Distributed Applications Based on Extremal Optimization  

E-print Network

Load Balancing in Distributed Applications Based on Extremal Optimization I. De Falco1 , E. The paper shows how to use Extremal Optimization in load balancing of distributed applications executed optimization phases which improve program task placement on processors, the proposed load balancing method

Paris-Sud XI, Université de

339

Ripley: Automatically Securing Web 2.0 Applications Through Replicated Execution  

E-print Network

are becoming increasingly distributed, as demonstrated by the popularity of AJAX or Web 2.0 applications such as Facebook, Google Maps, Hotmail and many others. A typ- ical multi-tier AJAX application consists representative AJAX applications built in Volta and also on Hotmail, a large widely-used AJAX application. Our

Livshits, Ben

340

Applications of Photonuclear Physics for International Safeguards and Security  

SciTech Connect

Studies of nuclear resonance fluorescence based applications are presented. Important for these applications are data for isotopes such as {sup 239}Pu. Nuclear resonance fluorescence measurements of {sup 239}Pu were performed at the free electron laser facility at UC Santa Barbara using photons from a bremsstrahlung beam with an endpoint energies between 4.0 MeV and 5.5 MeV. Though no discrete states with significant confidence level were measured, we have excluded the region above 27(3) eV-barns, or 4-sigma, where we would expect only a small chance of false positives. Details of the measurements and the results are presented here.

Johnson, M S; Hall, J M; McNabb, D P; McFarland, J; Norman, E; Bertozzi, W; Korbly, S; Ledoux, R; Park, W

2010-04-16

341

Security surveillance challenges and proven thermal imaging capabilities in real-world applications  

NASA Astrophysics Data System (ADS)

Uncooled thermal imaging was first introduced to the public in early 1980's by Raytheon (legacy Texas Instruments Defense Segment Electronics Group) as a solution for military applications. Since the introduction of this technology, Raytheon has remained the leader in this market as well as introduced commercial versions of thermal imaging products specifically designed for security, law enforcement, fire fighting, automotive and industrial uses. Today, low cost thermal imaging for commercial use in security applications is a reality. Organizations of all types have begun to understand the advantages of using thermal imaging as a means to solve common surveillance problems where other popular technologies fall short. Thermal imaging has proven to be a successful solution for common security needs such as: ¸ vision at night where lighting is undesired and 24x7 surveillance is needed ¸ surveillance over waterways, lakes and ports where water and lighting options are impractical ¸ surveillance through challenging weather conditions where other technologies will be challenged by atmospheric particulates ¸ low maintenance requirements due to remote or difficult locations ¸ low cost over life of product Thermal imaging is now a common addition to the integrated security package. Companies are relying on thermal imaging for specific applications where no other technology can perform.

Francisco, Glen L.; Roberts, Sharon

2004-09-01

342

Integrating geolocation into electronic finance applications for additional security  

Microsoft Academic Search

People are increasingly using the web to conduct business. It is, therefore, important that users of services such as online banking have confidence in such services. Frameworks such as Google Gears now have the ability to determine the physical location of a person in real time. This geographical information can be very useful in e-finance applications. If we know the

Kevin Curran; Jonathan Orr

2011-01-01

343

A Survey on Mix Networks and Their Secure Applications  

Microsoft Academic Search

Anonymity is a subdiscipline of information hiding, required in a number of applications, such as in electronic voting. For network communications, anonymity can be provided by a mix network (mixnet). A mixnet is a multistage system that uses cryptography and permutations to provide anonymity. The basic idea of a mixnet has evolved into a number of different classes. In addition

Krishna Sampigethaya; Radha Poovendran

2006-01-01

344

Applications of nuclear techniques relevant for civil security  

NASA Astrophysics Data System (ADS)

The list of materials which are subject to inspection with the aim of reducing the acts of terrorism includes explosives, narcotics, chemical weapons, hazardous chemicals and radioactive materials. To this we should add also illicit trafficking with human beings. The risk of nuclear terrorism carried out by sub-national groups is considered not only in construction and/or use of nuclear device, but also in possible radioactive contamination of large urban areas. Modern personnel, parcel, vehicle and cargo inspection systems are non-invasive imaging techniques based on the use of nuclear analytical techniques. The inspection systems use penetrating radiations: hard x-rays (300 keV or more) or gamma-rays from radioactive sources (137Cs and 60Co with energies from 600 to 1300 keV) that produce a high resolution radiograph of the load. Unfortunately, this information is ''non-specific'' in that it gives no information on the nature of objects that do not match the travel documents and are not recognized by a visual analysis of the radiographic picture. Moreover, there are regions of the container where x and gamma-ray systems are ''blind'' due to the high average atomic number of the objects irradiated that appear as black spots in the radiographic image. Contrary to that is the use of neutrons; as results of the bombardment, nuclear reactions occur and a variety of nuclear particles, gamma and x-ray radiation is emitted, specific for each element in the bombarded material. The problem of material (explosive, drugs, chemicals, etc.) identification can be reduced to the problem of measuring elemental concentrations. Neutron scanning technology offers capabilities far beyond those of conventional inspection systems. The unique automatic, material specific detection of terrorist threats can significantly increase the security at ports, border-crossing stations, airports, and even within the domestic transportation infrastructure of potential urban targets as well as protecting armed forces and infrastructure.

Valkovi, Vlado

2006-05-01

345

Geospatial Applications on Different Parallel and Distributed Systems in enviroGRIDS Project  

NASA Astrophysics Data System (ADS)

The execution of Earth Science applications and services on parallel and distributed systems has become a necessity especially due to the large amounts of Geospatial data these applications require and the large geographical areas they cover. The parallelization of these applications comes to solve important performance issues and can spread from task parallelism to data parallelism as well. Parallel and distributed architectures such as Grid, Cloud, Multicore, etc. seem to offer the necessary functionalities to solve important problems in the Earth Science domain: storing, distribution, management, processing and security of Geospatial data, execution of complex processing through task and data parallelism, etc. A main goal of the FP7-funded project enviroGRIDS (Black Sea Catchment Observation and Assessment System supporting Sustainable Development) [1] is the development of a Spatial Data Infrastructure targeting this catchment region but also the development of standardized and specialized tools for storing, analyzing, processing and visualizing the Geospatial data concerning this area. For achieving these objectives, the enviroGRIDS deals with the execution of different Earth Science applications, such as hydrological models, Geospatial Web services standardized by the Open Geospatial Consortium (OGC) and others, on parallel and distributed architecture to maximize the obtained performance. This presentation analysis the integration and execution of Geospatial applications on different parallel and distributed architectures and the possibility of choosing among these architectures based on application characteristics and user requirements through a specialized component. Versions of the proposed platform have been used in enviroGRIDS project on different use cases such as: the execution of Geospatial Web services both on Web and Grid infrastructures [2] and the execution of SWAT hydrological models both on Grid and Multicore architectures [3]. The current focus is to integrate in the proposed platform the Cloud infrastructure, which is still a paradigm with critical problems to be solved despite the great efforts and investments. Cloud computing comes as a new way of delivering resources while using a large set of old as well as new technologies and tools for providing the necessary functionalities. The main challenges in the Cloud computing, most of them identified also in the Open Cloud Manifesto 2009, address resource management and monitoring, data and application interoperability and portability, security, scalability, software licensing, etc. We propose a platform able to execute different Geospatial applications on different parallel and distributed architectures such as Grid, Cloud, Multicore, etc. with the possibility of choosing among these architectures based on application characteristics and complexity, user requirements, necessary performances, cost support, etc. The execution redirection on a selected architecture is realized through a specialized component and has the purpose of offering a flexible way in achieving the best performances considering the existing restrictions.

Rodila, D.; Bacu, V.; Gorgan, D.

2012-04-01

346

Iodine-129 AMS for Earth Science, Biomedical, and National Security Applications  

SciTech Connect

This Laboratory Directed Research and Development project created the capability to analyze the radionuclide iodine-129 ({sup 129}I) by accelerator mass spectrometry (AMS) in the CAMS facility at LLNL, and enhanced our scientific foundation for its application through development of sample preparation technology required for environmental, biomedical, and national security applications. The project greatly improved our environmental iodine extraction and concentration methodology, and developed new techniques for the analysis of small quantities of {sup 129}I. The project can be viewed as having two phases, one in which the basic instrumental and chemical extraction methods necessary for general {sup 129}I analysis were developed, and a second in which these techniques were improved and new techniques were developed to enable broader and more sophisticated applications. The latter occurred through the mechanism of four subprojects that also serve as proof-of-principle demonstrations of our newly developed {sup 129}I capabilities. The first subproject determined the vertical distribution of bomb-pulse {sup 129}I ({sup 129}Iv distributed globally as fallout from 1950's atmospheric nuclear testing) through 5 meters in the upper vadose zone in the arid southwestern United States. This characterizes migration mechanisms of contaminant {sup 129}I, or {sup 129}I released by nuclear fuel reprocessing, as well as the migration of labile iodine in soils relative to moisture flux, permitting a determination of nutrient cycling. The second subproject minimized the amount of iodine required in an AMS sample target. Because natural iodine abundances are very low in almost all environments, many areas of research had been precluded or made extremely difficult by the demands of sample size. Also, certain sample types of potential interest to national security are intrinsically small - for example iodine on air filters. The result of this work is the ability to measure the {sup 129}I/{sup 127}I ratio at the 2E-07 level or higher in a sample as small as a single raindrop. The third subproject tested the feasibility of using bomb-pulse {sup 129}I in shallow groundwaters in the Sierra Nevada to determine the source of waters entering into the Merced River. The sources of water and their time (age) within the hydrologic system is crucial to understanding the effects of climate change on California waters. The project is in collaboration with faculty and students at the University of California - Merced, and is now the subject of a follow-on Ph.D. dissertation project funded by the LLNL-URP University Education Participation Program. The fourth subproject examined the requirements for using the decay of {sup 129}I to date pore waters associated with continental shelf methane hydrate deposits. Understanding the age of formation and the historical stability of these hydrates is important in determining their response to climate change. Thawing of the world's methane hydrates would quickly and dramatically increase greenhouse gases in the atmosphere. The calculations and testing performed on this project have led to a follow on project that selectively implants {sup 127}I to the exclusion of {sup 129}I, creating an analytical iodine carrier with a substantially lower {sup 129}I background than is available from natural sources. This will permit measurement of {sup 129}I/{sup 127}I ratios at sub-10-14 levels, thereby providing a method for dating hydrate pore waters that are tens of millions of years old.

Nimz, G; Brown, T; Tumey, S; Marchetti, A; Vu, A

2007-02-20

347

CODEX: A Robust and Secure Secret Distribution Michael A. Marsh, Member, IEEE, Fred B. Schneider, Member, IEEE  

E-print Network

quorum systems for storing state, and employing proactive secret sharing with threshold cryptography1 CODEX: A Robust and Secure Secret Distribution System Michael A. Marsh, Member, IEEE, Fred B. Schneider, Member, IEEE Abstract-- CODEX (COrnell Data EXchange) stores secrets for subsequent access

Schneider, Fred B.

348

CODEX: A Robust and Secure Secret Distribution Michael A. Marsh, Member, IEEE, Fred B. Schneider, Member, IEEE  

E-print Network

quorum systems for storing state, and employing proactive secret sharing with threshold cryptography1 CODEX: A Robust and Secure Secret Distribution System Michael A. Marsh, Member, IEEE, Fred B. Schneider, Member, IEEE Abstract--- CODEX (COrnell Data EXchange) stores secrets for subsequent access

Marsh, Michael

349

The Role of Earnings and Financial Risk in Distributional Analyses of Social Security Reform Measures  

ERIC Educational Resources Information Center

The Social Security Trustees project that the Social Security program faces longterm financing difficulties. Several proposals that have been offered to shore-up the finances of the Social Security program would create individual retirement accounts funded with part of the payroll tax. The authors of many of these proposals claim that future…

Hungerford, Thomas L.

2006-01-01

350

Distributed radio relay for communication and control with physical-layer security in smart grid  

Microsoft Academic Search

Information security has become a prominent issue, and this is especially critical for communications in the smart grid. For wideband connections with substations or end users, short and medium range radio communication can offer great convenience and flexibility. However, compared to network security of wired networks, achieving wireless security is more difficult. In general confining a radio signal in a

Terry N. Guo

2011-01-01

351

Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach  

Microsoft Academic Search

This paper describes a specification-based approach to detect exploitations of vulnerabdities in security- critical programs. The approach utilizes security spe- cifications that describe the intended behavior of pro- grams and scans audit trails for operations that are in violation of the specifications. We developed a formal framework for specifying the security-relevant behavior of programs, on which we based the design

Calvin Ko; Manfred Ruschitzka; Karl N. Levitt

1997-01-01

352

Concepts and applications of wireless security systems for tactical, portable, and fixed sites  

SciTech Connect

Intrusion detection systems sometimes use radio signals to convey sensor status in areas that wire conduits do not service or as a redundant path to wired systems. Some applications benefit from radio technology by minimizing setup time and reducing installation and operation costs. In recent years with the explosion in wireless communications, these radio-based security systems have become more capable while lowering costs, size, and power consumption. However, the very nature of radio communication raises issues regarding setup, operation, and security of these systems. Sandia National Laboratories, in cooperation with government and industry, has addressed many of these issues through the analysis and development of security systems, communications protocols, and operational procedures. Message encryption and frequent channel supervision are used to enhance security. Installation and maintenance of these systems are simplified by incorporating built-in radio link analysis, menu-driven configuration equipment, and other techniques. Commercial communications satellites and spread-spectrum radios are also being integrated to provide unique capabilities to the security community. The status of this work is presented here along with details of its development.

Harrington, J.J.

1997-06-01

353

Virtualization and Programming Support for Video Sensor Networks with Application to Wireless and Physical Security  

NASA Astrophysics Data System (ADS)

Network Security Systems are heavily anchored in the digital plane of "cyber space" and hence cannot be used effectively to derive the physical identity of an intruder in order to prevent further malicious wireless broadcasts (i.e., escorting an intruder off the premises based on physical evidence). Embedded Sensor Networks (SNs) can be used to bridge the gap between digital and physical security planes, and thus can provide reciprocal benefit to security tasks on both planes. Toward that end, we present our experience integrating wireless networking security services into snBench (the Sensor Network workBench). snBench provides an extensible framework that enables the rapid development and automated deployment of SN applications on a shared, embedded sensing and actuation infrastructure. snBench's extensible architecture allows an engineer to quickly integrate new sensing and response capabilities into the snBench framework, while high-level languages, compilers and execution environments allow novice SN programmers to compose SN service logic, unaware of the lower-level components on which their services rely. Concrete examples are provided to illustrate the power and potential of Wireless Security Services that span both the physical and digital plane.

Bestavros, Azer; Ocean, Michael J.

354

A Topology Visualization Early Warning Distribution Algorithm for Large-Scale Network Security Incidents  

PubMed Central

It is of great significance to research the early warning system for large-scale network security incidents. It can improve the network system's emergency response capabilities, alleviate the cyber attacks' damage, and strengthen the system's counterattack ability. A comprehensive early warning system is presented in this paper, which combines active measurement and anomaly detection. The key visualization algorithm and technology of the system are mainly discussed. The large-scale network system's plane visualization is realized based on the divide and conquer thought. First, the topology of the large-scale network is divided into some small-scale networks by the MLkP/CR algorithm. Second, the sub graph plane visualization algorithm is applied to each small-scale network. Finally, the small-scale networks' topologies are combined into a topology based on the automatic distribution algorithm of force analysis. As the algorithm transforms the large-scale network topology plane visualization problem into a series of small-scale network topology plane visualization and distribution problems, it has higher parallelism and is able to handle the display of ultra-large-scale network topology. PMID:24191145

He, Hui; Fan, Guotao; Ye, Jianwei; Zhang, Weizhe

2013-01-01

355

A topology visualization early warning distribution algorithm for large-scale network security incidents.  

PubMed

It is of great significance to research the early warning system for large-scale network security incidents. It can improve the network system's emergency response capabilities, alleviate the cyber attacks' damage, and strengthen the system's counterattack ability. A comprehensive early warning system is presented in this paper, which combines active measurement and anomaly detection. The key visualization algorithm and technology of the system are mainly discussed. The large-scale network system's plane visualization is realized based on the divide and conquer thought. First, the topology of the large-scale network is divided into some small-scale networks by the MLkP/CR algorithm. Second, the sub graph plane visualization algorithm is applied to each small-scale network. Finally, the small-scale networks' topologies are combined into a topology based on the automatic distribution algorithm of force analysis. As the algorithm transforms the large-scale network topology plane visualization problem into a series of small-scale network topology plane visualization and distribution problems, it has higher parallelism and is able to handle the display of ultra-large-scale network topology. PMID:24191145

He, Hui; Fan, Guotao; Ye, Jianwei; Zhang, Weizhe

2013-01-01

356

A distributed application server for automatic differentiation.  

SciTech Connect

The ADIC Application Server brings the accuracy and efficiency of automatic differentiation to the World Wide Web. Users of the ADIC Application Server can upload source code written in ANSI-C, manage remote files, differentiate selected functions, and download code augmented with derivative computations. Using a simple driver and linking to the appropriate libraries, the user can compile and run the differentiated code locally. We discuss the unique requirements for an automatic differentiation application server and describe the implementation of the ADIC Application Server.

Norris, B.; Hovland, P. D.

2000-11-30

357

Efficient security mechanisms for mHealth applications using wireless body sensor networks.  

PubMed

Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN) for health monitoring. Physiological signals of humans such as heartbeats, temperature and pulse can be monitored from a distant location using tiny biomedical wireless sensors. Hence, it is highly essential to combine the ubiquitous computing with mobile health technology using wireless sensors and smart phones to monitor the well-being of chronic patients such as cardiac, Parkinson and epilepsy patients. Since physiological data of a patient are highly sensitive, maintaining its confidentiality is highly essential. Hence, security is a vital research issue in mobile health (mHealth) applications, especially if a patient has an embarrassing disease. In this paper a three tier security architecture for the mHealth application is proposed, in which light weight data confidentiality and authentication protocols are proposed to maintain the privacy of a patient. Moreover, considering the energy and hardware constraints of the wireless body sensors, low complexity data confidential and authentication schemes are designed. Performance evaluation of the proposed architecture shows that they can satisfy the energy and hardware limitations of the sensors and still can maintain the secure fabrics of the wireless body sensor networks. Besides, the proposed schemes can outperform in terms of energy consumption, memory usage and computation time over standard key establishment security scheme. PMID:23112734

Sahoo, Prasan Kumar

2012-01-01

358

Distribution automation applications of fiber optics  

NASA Technical Reports Server (NTRS)

Motivations for interest and research in distribution automation are discussed. The communication requirements of distribution automation are examined and shown to exceed the capabilities of power line carrier, radio, and telephone systems. A fiber optic based communication system is described that is co-located with the distribution system and that could satisfy the data rate and reliability requirements. A cost comparison shows that it could be constructed at a cost that is similar to that of a power line carrier system. The requirements for fiber optic sensors for distribution automation are discussed. The design of a data link suitable for optically-powered electronic sensing is presented. Empirical results are given. A modeling technique that was used to understand the reflections of guided light from a variety of surfaces is described. An optical position-indicator design is discussed. Systems aspects of distribution automation are discussed, in particular, the lack of interface, communications, and data standards. The economics of distribution automation are examined.

Kirkham, Harold; Johnston, A.; Friend, H.

1989-01-01

359

Design and visualization of synthetic holograms for security applications  

NASA Astrophysics Data System (ADS)

In this paper we present a software for the design and visualization of holographic elements containing full scale of visual effects. It enables to simulate an observation of the holographic elements under general conditions including different light sources with various spectral and coherence properties and various geometries of reconstruction. Furthermore, recent technologies offer interesting possibilities for the 3D visualization such as the 3D techniques based on shutter or polarization glasses, anaglyphs, etc. The presented software is compatible with the mentioned techniques and enables an application of the 3D hardware tools for visualization. The software package can be used not only for visualization of the existing designs, but also for a fine tuning of the spatial, kinetic, and color properties of the hologram. Moreover, the holograms containing all types of the 3D effects, general color mixing, kinetic behavior, diffractive cryptograms, etc. can be translated using the software directly to a high resolution micro-structure.

Škere?, M.; Nývlt, M.; Svoboda, J.

2013-02-01

360

ESC/Java2 as a Tool to Ensure Security in the Source Code of Java Applications  

E-print Network

ESC/Java2 as a Tool to Ensure Security in the Source Code of Java Applications Aleksy Schubert1 static checking tools like ESC/Java2 can be used to ensure source code security properties of Java is further accompanied by a presentation on how these threats can be controlled by JML specifications and ESC/Java

Chrzaszcz, Jacek

361

Fuzzy Trust Integration for Security Enforcement in Grid Computing  

Microsoft Academic Search

How to build the mutual trust among Grid resources sites is crucial to secure distributed Grid applications. We suggest enhancing the trust index of resource sites by upgrading their intrusion defense capabilities and checking the success rate of jobs running on the platforms. We propose a new fuzzy-logic trust model for securing Grid resources. Grid security is enforced through trust

Shanshan Song; Kai Hwang; Mikin Macwan

2004-01-01

362

Miniature EO/IR sensors for border security applications  

NASA Astrophysics Data System (ADS)

The geographic lines of the land borders between the United States and Mexico total over 6,000 miles. The vast majority of those borders are in difficult to reach remote landscape. This makes it nearly impossible to patrol with any reasonable amount of personal or budget. Thus, the primary approach has been to mix a combination of low cost acoustic/seismic sensors with remotely controlled EO cameras. While moderately successful in controlled locations, these systems are expensive to install and expensive to man. The cost of these systems rises further when operation is required in night and adverse weather conditions. A lower cost of installation and maintenance could be achieved with miniaturized EO/IR cameras combined with intelligent remote and central processing. Advances in both VNIR and LW infrared sensors and developments in integrated signal processing now make possible a distributed low cost surveillance system. The ability now exists to detect, track, and classify people and equipment prior to notification of the responding agent.

Hornback, William B.

2006-05-01

363

Commodity Tracker: Mobile Application for Food Security Monitoring in Haiti  

NASA Astrophysics Data System (ADS)

Megan Chiu, Jason Baird, Xu Huang, Trishan de Lanerolle, Ralph Morelli, Jonathan Gourley Trinity College, Computer Science Department and Environmental Science Program, 300 Summit Street, Hartford, CT 06106 megan.chiu@trincoll.edu, Jason.baird@trincoll.edu, xu.huang@trincoll.edu, trishan.delanerolle@trincoll.edu, ralph.morelli@trincoll.edu, jonathan.gourley@trincoll.edu Price data for Haiti commodities such as rice and potatoes have been traditionally recorded by hand on paper forms for many years. The information is then entered onto computer manually, thus making the process a long and arduous one. With the development of the Haiti Commodity Tracker mobile app, we are able to make this commodity price data recording process more efficient. Officials may use this information for making inferences about the difference in commodity prices and for food distribution during critical time after natural disasters. This information can also be utilized by governments and aid agencies on their food assistance programs. Agronomists record the item prices from several sample sites in a marketplace and compare those results from other markets across the region. Due to limited connectivity in rural areas, data is first saved to the phone's database and then retransmitted to a central server via SMS messaging. The mobile app is currently being field tested by an international NGO providing agricultural aid and support in rural Haiti.

Chiu, M. T.; Huang, X.; Baird, J.; Gourley, J. R.; Morelli, R.; de Lanerolle, T. R.; Haiti Food Security Monitoring Mobile App Team

2011-12-01

364

Security Informatics Security Informatics  

E-print Network

Security Informatics Security Informatics Security Informatics is the study and design of information security technologies within social and economic contexts. Security Informatics builds upon strong of security and privacy. Security Informatics addresses both immediate problems of today, such as phishing

Camp, L. Jean

365

Trust, Security, and Contract Management Challenges for Grid-Based Application Service Provision  

Microsoft Academic Search

\\u000a The GRASP project aims to provide an OGSA compliant infrastructure to allow Application Service Providers to exploit Grid\\u000a concepts and infrastructure. Orchestration of grid service instances running “somewhere on the Grid” to deliver a service\\u000a raises a number of trust, security and contract management challenges, especially in a business context. This paper describes\\u000a the issues relating to SLA negotiation and

Matteo Gaeta; Giuseppe Laria; Pierluigi Ritrovato; N. Romano; Bassem Serhan; Stefan Wesner; Theodosis Dimitrakos; Damian Mac Randal

2004-01-01

366

Secure and quality of service assurance scheduling scheme for WBAN with application to eHealth  

Microsoft Academic Search

Wireless Body Area Network (WBAN) is gaining popularity due to its large scale of applications in eHealth. Due to its critical and real-time nature, eHealth care system must provide security, privacy, and quality of service (QoS) support, in order to provide an efficient, valuable and fully reliable assistance to patients. This paper studies packet scheduling schemes for real- time transmission

Mrinmoy Barua; M. S. Alam; Xiaohui Liang

2011-01-01

367

17 CFR 242.609 - Registration of securities information processors: form of application and amendments.  

Code of Federal Regulations, 2013 CFR

...Securities Exchanges SECURITIES AND EXCHANGE COMMISSION...MARGIN REQUIREMENTS FOR SECURITY FUTURES Regulation...of the National Market System § 242.609 Registration of securities information processors: form of...

2013-04-01

368

17 CFR 242.609 - Registration of securities information processors: form of application and amendments.  

Code of Federal Regulations, 2011 CFR

...Securities Exchanges SECURITIES AND EXCHANGE COMMISSION...MARGIN REQUIREMENTS FOR SECURITY FUTURES Regulation...of the National Market System § 242.609 Registration of securities information processors: form of...

2011-04-01

369

17 CFR 242.609 - Registration of securities information processors: form of application and amendments.  

Code of Federal Regulations, 2012 CFR

...Securities Exchanges SECURITIES AND EXCHANGE COMMISSION...MARGIN REQUIREMENTS FOR SECURITY FUTURES Regulation...of the National Market System § 242.609 Registration of securities information processors: form of...

2012-04-01

370

17 CFR 242.609 - Registration of securities information processors: form of application and amendments.  

Code of Federal Regulations, 2014 CFR

...Securities Exchanges SECURITIES AND EXCHANGE COMMISSION...MARGIN REQUIREMENTS FOR SECURITY FUTURES Regulation...of the National Market System § 242.609 Registration of securities information processors: form of...

2014-04-01

371

Design of an efficient distributed GIS application  

Microsoft Academic Search

In distributed GIS (geographical information system), all locations that store data are networked together and queries gain their results from any number of locations. The queries, which can be both spatial, and a spatial can be fired from any location in the network and the result is obtained by combining disseminated information across various repositories of data [K. Buchler and

S. Bandopadhyay; A. Ghosh; R. Sarkar

2003-01-01

372

75 FR 4595 - BATS Y-Exchange, Inc.; Notice of Filing of Application for Registration as a National Securities...  

Federal Register 2010, 2011, 2012, 2013, 2014

...Release No. 34-61400; File No. 10-198] BATS Y-Exchange, Inc.; Notice of Filing of Application...1934 January 22, 2010. On October 20, 2009, BATS Y-Exchange, Inc. (``BATS Y Exchange'') submitted to the Securities...

2010-01-28

373

A Secure Image Transfer Application for the NHSnet Kerry Jean kjean@ee.ucl.ac.uk, Walter Eaves weaves@ee.ucl.ac.uk, John Lam  

E-print Network

A Secure Image Transfer Application for the NHSnet Kerry Jean kjean@ee.ucl.ac.uk, Walter Eaves of Electronic Engineering, University College London Abstract: This paper outlines the application of some of the security technologies investigated in the HARP (Harmonisation for the security of web technologies and a

Haddadi, Hamed

374

Fieldbus application layer and real-time distributed systems  

Microsoft Academic Search

The author presents the application layer of Fieldbus as part of a real-time distributed system. The services of the layer must warrant the distributed process synchronization in real-time, and temporal and spatial data consistency. A model that fulfils these requirements is presented and a protocol with very low network and computational overhead is proposed. This protocol is intended to be

G. Ulloa

1991-01-01

375

APPLICATION RESPONSE MEASUREMENT OF DISTRIBUTED WEB SERVICES  

Microsoft Academic Search

Web service technology will provide a platform for dynamic e-business applications. This paper describes a framework for identifying, monitoring and reporting performance data of critical transactions within a web service using the Java ARM standard, a Transaction Definition Language (TDL) and a bytecode instrumentation tool. The data extracted using this framework is shown to be appropriate for dynamically selecting web

J. D. Turner; D. A. Bacigalupo; S. A. Jarvis; D. N. Dillenberger; G. R. Nudd

376

An Algorithm for Distributed Groupware Applications  

Microsoft Academic Search

Computer supported cooperative work (CSCW) is a rapidly growing field. Real-time groupware systems are addressed that allow a group of users to edit a shared document. The architecture and concurrency control algorithm used in this system are described. The algorithm is based on the semantics of the application and can be used by the developers of other groupware systems. The

Alain Karsenty; Michel Beaudouin-lafon

1993-01-01

377

High-Resolution Laser-Induced Breakdown Spectroscopy used in Homeland Security and Forensic Applications  

SciTech Connect

The technique of laser-induced breakdown spectroscopy (LIBS) to detect elements for a variety of homeland security applications such as nuclear materials identification and inventory,and forensic applications has been demonstrated. For nuclear materials applications, we detected and profiled metals in coatings that were used to encapsulate nuclear fuel. Multivariate analysis has been successfully employed in the quantification of elements present in treated wood and engineered wood composites. These examples demonstrate that LIBS-based techniques are inherently well suited for diverse environmental applications related to homeland security. Three key advantages are evident: (1) small samples (mg) are sufficient; (2) samples can be analyzed by LIBS very rapidly, and (3) biological materials such as human and animal bones and wood can be analyzed with minimal sample preparation. For forensic applications they have used LIBS to determine differences in animal and human bones. They have also applied this technique in the determination of counterfeit and non-counterfeit currency. They recently applied LIBS in helping to solve a murder case.

Martin, Madhavi Z [ORNL; Wullschleger, Stan D [ORNL; Vass, Arpad Alexander [ORNL; Martin, Rodger Carl [ORNL; Grissino-Mayer, Henri [ORNL

2006-01-01

378

Distributional Effects in a General Equilibrium Analysis of Social Security Laurence J. Kotlikoff  

E-print Network

Security's privatization can substantiallyraise long-run living standards. But achieving these gains will take advocated by the World Bank (1994), that provide a flat (minimum) benefit can actuallymake the long-run poor Security's privatization helps the long-run poor even absent any explicit redistribution mechanism

Spence, Harlan Ernest

379

Fabric: A Platform for Secure Distributed Computation and Storage Jed Liu Michael D. George K. Vikram  

E-print Network

medical errors, with incomplete patient information identified as a leading cause [25]. However, au- dependent administrative domains--each domain has poli- cies for security and privacy, but does not fully of two medical institutions that want to securely and quickly share patient information. This goal

Myers, Andrew C.

380

Future trends in distributed applications and problem-solving environments  

Microsoft Academic Search

As Grid computing technologies and infrastructures are being developed, suitable ab- stractions, methods, and tools will become necessary to enable application development, and software development of the components of Grid Computing Environments. Grid Computing will enable distributed applications with large numbers of involved components with dynamic interactions. This requires new approaches to understand and manage structure and behaviour, and the

José C. Cunha; Omer F. Rana; Pedro D. Medeiros

2005-01-01

381

Javanaise: distributed shared objects for Internet cooperative applications  

Microsoft Academic Search

We have implemented a service for the development of distributed cooperative applications on the Internet. The service consists of a set of system classes and a proxy generator implemented in the Java environment. The service and the applications that use it are dynamically deployed to client nodes at run -time, thanks to Java mobile code. The objects managed by the

D. Hagimont; SIRAC Project

1998-01-01

382

Distributed reinforcement learning for a traffic engineering application  

Microsoft Academic Search

In this paper, we report on novel reinforcement learning tech- niques applied to a real-world application. The problem do- main, a traffic engineering application, is formulated as a distributed reinforcement learning problem, where the re- turns of many agents are simultaneously updating a single shared policy. Learning occurs off-line in a traffic simulator, which allows us to retrieve and exploit

Mark D. Pendrith

2000-01-01

383

An automated approach for tone mapping operator parameter adjustment in security applications  

NASA Astrophysics Data System (ADS)

High Dynamic Range (HDR) imaging has been gaining popularity in recent years. Different from the traditional low dynamic range (LDR), HDR content tends to be visually more appealing and realistic as it can represent the dynamic range of the visual stimuli present in the real world. As a result, more scene details can be faithfully reproduced. As a direct consequence, the visual quality tends to improve. HDR can be also directly exploited for new applications such as video surveillance and other security tasks. Since more scene details are available in HDR, it can help in identifying/tracking visual information which otherwise might be difficult with typical LDR content due to factors such as lack/excess of illumination, extreme contrast in the scene, etc. On the other hand, with HDR, there might be issues related to increased privacy intrusion. To display the HDR content on the regular screen, tone-mapping operators (TMO) are used. In this paper, we present the universal method for TMO parameters tuning, in order to maintain as many details as possible, which is desirable in security applications. The method's performance is verified on several TMOs by comparing the outcomes from tone-mapping with default and optimized parameters. The results suggest that the proposed approach preserves more information which could be of advantage for security surveillance but, on the other hand, makes us consider possible increase in privacy intrusion.

Krasula, LukáÅ.¡; Narwaria, Manish; Le Callet, Patrick

2014-05-01

384

Multi-channel thermal infrared communications using engineered blackbody radiation for security applications  

NASA Astrophysics Data System (ADS)

The thermal (emitted) infrared frequency bands, typically from 20-40 THz and 60-100 THz, are best known for applications in thermography, such as target acquisition, surveillance, night vision, and remote sensing. This unregulated part of the spectral range offers opportunities for the development of short-range secure communications. The `THz Torch' concept was recently demonstrated by the authors. This technology fundamentally exploits engineered blackbody radiation, by partitioning thermally-generated spectral noise power into pre-defined frequency channels. The energy in each channel is then independently pulse-modulated, transmitted and detected, creating a robust form of short-range secure communications in the far/mid infrared. In this paper, recent progress for the `THz Torch' technology will be presented; the physical level integrity for multichannel proof-of-concept working demonstrators will be evaluated. By exploring a diverse range of methods, significant enhancements to both data rate and distance can be expected. Our thermodynamics-based approach represents a new paradigm in the sense that 19th century physics can be exploited with 20th century multiplexing concepts for low-cost 21st century ubiquitous security and defence applications in the thermal infrared range.

Hu, F.; Liang, X.; Lucyszyn, S.

2014-10-01

385

Mobility and Coordination for Distributed Java Applications  

Microsoft Academic Search

A mobile agent is a piece of code which can move among the nodes of a network of computers, looking for data and services.\\u000a There are currently several programming languages and systems to develop applications including mobile agents. They are widely\\u000a different, and it is not easy to understand how they differ. We propose a taxonomy classifying different kinds of

Paolo Ciancarini; Andrea Giovannini; Davide Rossi

1999-01-01

386

Adapting Distributed Scientific Applications to Run-Time Network Conditions  

Microsoft Academic Search

\\u000a High-performance applications place great demands on computation and communication resources of distributed computing platforms.\\u000a If the availability of resources changes dynamically, the application performance may suffer, which is especially true for\\u000a clusters. Thus, it is desirable to make an application aware of system run-time changes and to adapt it dynamically to the\\u000a new conditions. We show how this may be

Masha Sosonkina; Ames IA

2004-01-01

387

Security of the Bennett 1992 quantum-key distribution protocol against individual attack over a realistic channel  

Microsoft Academic Search

The security of two-state quantum-key distribution against individual attack is estimated when the channel has losses and noises. We assume that Alice and Bob use two nonorthogonal single-photon polarization states. To make our analysis simple, we propose a modified B92 protocol in which Alice and Bob make use of inconclusive results, and Bob performs a kind of symmetrization of received

Kiyoshi Tamaki; Masato Koashi; Nobuyuki Imoto

2003-01-01

388

Stable and generalized-t distributions and applications  

NASA Astrophysics Data System (ADS)

In this paper a generalized-t distribution is introduced and used as an alternative to the symmetric stable distribution. To do so, the ?2-divergence is presented and minimized to approximate the symmetric stable distribution, as accurately as possible, by the generalized-t distribution. Kth moments for the generalized-t distribution function are given. The stable distribution is defined in terms of generalized hypergeometric functions. Five applications with natural data (sunspots activity), and financial data (stock exchange in Brazil, South Africa and Venezuela, and daily variation of Petrobras stock market) are analyzed. A time series analysis is used to eliminate data correlation in each data set, and then the distributions are used to fit the residuals of these models.

Rathie, P. N.; Coutinho, M.; Sousa, T. R.; Rodrigues, G. S.; Carrijo, T. B.

2012-12-01

389

17 CFR 230.139 - Publications or distributions of research reports by brokers or dealers distributing securities.  

Code of Federal Regulations, 2010 CFR

...2010-04-01 2010-04-01 false Publications or distributions of research reports...ACT OF 1933 General § 230.139 Publications or distributions of research reports...section, a broker's or dealer's publication or distribution of a...

2010-04-01

390

A secure distribution method for digitized image scan using a two-step wavelet-based technique: A Telemedicine Case.  

PubMed

The objective of this paper is to present a secure distribution method to distribute healthcare records (e.g. video streams and digitized image scans). The availability of prompt and expert medical care can meaningfully improve health care services in understaffed rural and remote areas, sharing of available facilities, and medical records referral. Here, a secure method is developed for distributing healthcare records, using a two-step wavelet based technique; first, a 2-level db8 wavelets transform for textual elimination, and later a 4-level db8 wavelets transform for digital watermarking. The first db8 wavelets are used to detect and eliminate textual information found on images for protecting data privacy and confidentiality. The second db8 wavelets are to secure and impose imperceptible marks to identify the owner; track authorized users, or detects malicious tampering of documents. Experiments were performed on different digitized image scans. The experimental results have illustrated that both wavelet-based methods are conceptually simple and able to effectively detect textual information while our watermark technique is robust to noise and compression. PMID:17282675

Yee Lau, Phooi; Ozawa, Shinji

2005-01-01

391

Applications Analysis: Principles and Examples from Various Distributed Computer Applications at Sandia National Laboratories New Mexico  

SciTech Connect

As information systems have become distributed over many computers within the enterprise, managing those applications has become increasingly important. This is an emerging area of work, recognized as such by many large organizations as well as many start-up companies. In this report, we present a summary of the move to distributed applications, some of the problems that came along for the ride, and some specific examples of the tools and techniques we have used to analyze distributed applications and gain some insight into the mechanics and politics of distributed computing.

Bateman, Dennis; Evans, David; Jensen, Dal; Nelson, Spencer

1999-08-01

392

Security model for VM in cloud  

NASA Astrophysics Data System (ADS)

Cloud computing is a new approach emerged to meet ever-increasing demand for computing resources and to reduce operational costs and Capital Expenditure for IT services. As this new way of computation allows data and applications to be stored away from own corporate server, it brings more issues in security such as virtualization security, distributed computing, application security, identity management, access control and authentication. Even though Virtualization forms the basis for cloud computing it poses many threats in securing cloud. As most of Security threats lies at Virtualization layer in cloud we proposed this new Security Model for Virtual Machine in Cloud (SMVC) in which every process is authenticated by Trusted-Agent (TA) in Hypervisor as well as in VM. Our proposed model is designed to with-stand attacks by unauthorized process that pose threat to applications related to Data Mining, OLAP systems, Image processing which requires huge resources in cloud deployed on one or more VM's.

Kanaparti, Venkataramana; Naveen K., R.; Rajani, S.; Padmvathamma, M.; Anitha, C.

2013-03-01

393

Ripley: automatically securing web 2.0 applications through replicated execution  

Microsoft Academic Search

Rich Internet applications are becoming increasingly distributed, as demonstrated by the popularity of AJAX or Web 2.0 applications such as Facebook, Google Maps, Hotmail and many others. A typ- ical multi-tier AJAX application consists, at the least, of a server- side component implemented in Java J2EE, PHP or ASP.NET and a client-side component running JavaScript. The resulting applica- tion is

K. Vikram; Abhishek Prateek; V. Benjamin Livshits

2009-01-01

394

Adapting the Pretty Good Privacy Security Style to Power System Distributed Network Protocol  

Microsoft Academic Search

Power system modernization with increasing operation automation and integration results in growing computer network access. This facilitates cyber-attackers' capabilities to assume control over power system operations that could cause serious blackouts. Security therefore becomes a critical issue for DNP3, a commonly used protocol for power system communications. This paper proposes cyber-security based on Pretty Good Privacy (PGP) for DNP3 to

T. Mander; Lin Wang; R. Cheung; F. Nabhani

2006-01-01

395

Designing security into software  

E-print Network

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01

396

An efficient wireless power transfer system with security considerations for electric vehicle applications  

SciTech Connect

This paper presents a secure inductive wireless power transfer (WPT) system for electric vehicle (EV) applications, such as charging the electric devices inside EVs and performing energy exchange between EVs. The key is to employ chaos theory to encrypt the wirelessly transferred energy which can then be decrypted by specific receptors in the multi-objective system. In this paper, the principle of encrypted WPT is first revealed. Then, computer simulation is conducted to validate the feasibility of the proposed system. Moreover, by comparing the WPT systems with and without encryption, the proposed energy encryption scheme does not involve noticeable power consumption.

Zhang, Zhen; Chau, K. T., E-mail: ktchau@eee.hku.hk; Liu, Chunhua; Qiu, Chun; Lin, Fei [Department of Electrical and Electronic Engineering, The University of Hong Kong, Pokfulam Road, Hong Kong (China)

2014-05-07

397

Two-photon polarization data storage in bacteriorhodopsin films and its potential use in security applications  

NASA Astrophysics Data System (ADS)

Bacteriorhodopsin (BR) films allow write-once-read-many recording of polarization data by a two-photon-absorption (TPA) process. The optical changes in BR films induced by the TPA recording were measured and the Müller matrix of a BR film was determined. A potential application of BR films in security technology is shown. Polarization data can be angle-selective retrieved with high signal-to-noise ratio. The BR film does not only carry optical information but serves also as a linear polarizer. This enables that polarization features recorded in BR films may be retrieved by merely using polarized light from a mobile phone display.

Imhof, Martin; Rhinow, Daniel; Hampp, Norbert

2014-02-01

398

Nonlinear observer for synchronization of chaotic systems with application to secure data transmission  

NASA Astrophysics Data System (ADS)

The main issue of this work is related with the design of a class of nonlinear observer in order to synchronize chaotic dynamical systems in a master-slave scheme, considering different initial conditions. The oscillator of Chen is proposed as a benchmark model and a bounded-type observer is proposed to reach synchronicity between both two chaotic systems. The proposed observer contains a proportional and sigmoid form of a bounded function of the synchronization error in order to provide asymptotic synchronization with a satisfactory performance. Some numerical simulations were carrying out in order to show the operation of the proposed methodology, with possible applications to secure data communications issues.

Aguilar-López, Ricardo; Martínez-Guerra, Rafael; Perez-Pinacho, Claudia A.

2014-06-01

399

Distortion invariant correlation filters application for quality inspection of master-matrix for security holograms  

NASA Astrophysics Data System (ADS)

Security holograms (SH) are perspective for document and product authenticity protection due to difficulties of such a protection mark falsification. Mass production of SH uses widespread technology of hot foil or lavsan paper stamping. The quality of holograms significantly depends on perfection of nickel master-matrix that is used in stamping equipment. We represent the method of automatic quality inspection of nickel master-matrix based on digital processing of its surface relief microphotographs. Proposed processing algorithm is based on combination of image spatial frequency analysis and image matching using distortion invariant correlation filters. The results of our method application for real SH master-matrices inspection are shown in this paper.

Zlokazov, Evgeny; Shaulskiy, Dmitriy; Starikov, Rostislav; Odinokov, Sergey; Zherdev, Alexander; Koluchkin, Vasiliy; Shvetsov, Ivan; Smirnov, Andrey

2013-03-01

400

Making Wireless Networks Secure for NASA Mission Critical Applications using Virtual Private Network (VPN) Technology  

NASA Technical Reports Server (NTRS)

With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their offices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (IAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing acceptance. The user computer running the VPN client and the. target site that is running the . VPN firewall exchange this encryption key and therefore are the only ones that are able to decipher the data. The level of encryption offered by the VPN is making it possible for wireless networks to pass the strict security policies that have kept them from being used in the past. Now people will be able to benefit from the many advantages that wireless networking has to offer in the area of mission critical applications.

Nichols, Kelvin F.; Best, Susan; Schneider, Larry

2004-01-01

401

Making Wireless Networks Secure for NASA Mission Critical Applications Using Virtual Private Network (VPN) Technology  

NASA Technical Reports Server (NTRS)

With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their off ices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (LAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing acceptance. The user computer running the VPN client and the target site that is running the VPN firewall exchange this encryption key and therefore are the only ones that are able to decipher the data. The level of encryption offered by the VPN is making it possible for wireless networks to pass the strict security policies that have kept them from being used in the past. Now people will be able to benefit from the many advantages that wireless networking has to offer in the area of mission critical applications.

Nichols, Kelvin F.; Best, Susan; Schneider, Larry

2004-01-01

402

Two-photon polarization data storage in bacteriorhodopsin films and its potential use in security applications  

SciTech Connect

Bacteriorhodopsin (BR) films allow write-once-read-many recording of polarization data by a two-photon-absorption (TPA) process. The optical changes in BR films induced by the TPA recording were measured and the Müller matrix of a BR film was determined. A potential application of BR films in security technology is shown. Polarization data can be angle-selective retrieved with high signal-to-noise ratio. The BR film does not only carry optical information but serves also as a linear polarizer. This enables that polarization features recorded in BR films may be retrieved by merely using polarized light from a mobile phone display.

Imhof, Martin; Hampp, Norbert, E-mail: hampp@staff.uni-marburg.de [Department of Chemistry, Material Sciences Center, University of Marburg, Hans-Meerwein-Str., D-35032 Marburg (Germany); Rhinow, Daniel [Max-Planck-Institute of Biophysics, Max-von-Laue-Straße 3, D-60438 Frankfurt (Germany)

2014-02-24

403

8 CFR 1003.47 - Identity, law enforcement, or security investigations or examinations relating to applications...  

Code of Federal Regulations, 2010 CFR

...for relief for which identity, law enforcement, or security...initiate all relevant identity, law enforcement, or security investigations...among other things, increased demands placed upon such investigations...undertake the necessary identity, law enforcement, or security...

2010-01-01

404

78 FR 72132 - RBS Securities Inc. and Citizens Investment Advisors; Notice of Application and Temporary Order  

Federal Register 2010, 2011, 2012, 2013, 2014

...COMMISSION [Release No. IC-30808; 812-14232] RBS Securities Inc. and Citizens Investment Advisors...Act, with respect to an injunction entered against RBS Securities Inc. (``RBS Securities'') on November 25, 2013, by the...

2013-12-02

405

Securing wide-area storage in WheelFS  

E-print Network

WheelFS is a secure wide-area distributed file system that gives applications finegrained control over the various trade-offs inherent in wide-area storage. Because of the security risks of running a wide-area application ...

Pretzer, Xavid

2009-01-01

406

The Application of an Object-Oriented Method in Information System Security Evaluation  

Microsoft Academic Search

\\u000a It’s essential for critical systems to measure their security status. However, the research on the information system security\\u000a evaluation still faces many difficulties which are caused by the complexity of the system and the inexplicit relation between\\u000a the component security and the system security. In this paper, an object-oriented information system security evaluation method\\u000a is introduced, the security context object

Qiang Yan; Hua-ying Shu

2005-01-01

407

Resilience for Collaborative Applications on Clouds Fault-Tolerance for distributed HPC applications  

E-print Network

Resilience for Collaborative Applications on Clouds Fault-Tolerance for distributed HPC resilience, i.e., the ability to resume normal ex- ecution following application errors and abnormal; Resilience. 1 Introduction Scientific applications are required today to design, simulate, optimize and manu

Paris-Sud XI, Université de

408

17 CFR 249.801 - Form X-15AA-1, for application for registration as a national securities association or...  

Code of Federal Regulations, 2012 CFR

...2012-04-01 2012-04-01 false Form X-15AA-1, for application for registration...Securities Associations § 249.801 Form X-15AA-1, for application for registration...Federal Register citations affecting Form X-15AA-1, see the List of CFR...

2012-04-01

409

17 CFR 249.801 - Form X-15AA-1, for application for registration as a national securities association or...  

Code of Federal Regulations, 2014 CFR

...2014-04-01 2014-04-01 false Form X-15AA-1, for application for registration...Securities Associations § 249.801 Form X-15AA-1, for application for registration...Federal Register citations affecting Form X-15AA-1, see the List of CFR...

2014-04-01

410

17 CFR 249.801 - Form X-15AA-1, for application for registration as a national securities association or...  

Code of Federal Regulations, 2013 CFR

...2013-04-01 2013-04-01 false Form X-15AA-1, for application for registration...Securities Associations § 249.801 Form X-15AA-1, for application for registration...Federal Register citations affecting Form X-15AA-1, see the List of CFR...

2013-04-01

411

17 CFR 249.801 - Form X-15AA-1, for application for registration as a national securities association or...  

Code of Federal Regulations, 2011 CFR

...2011-04-01 2011-04-01 false Form X-15AA-1, for application for registration...Securities Associations § 249.801 Form X-15AA-1, for application for registration...Federal Register citations affecting Form X-15AA-1, see the List of CFR...

2011-04-01

412

17 CFR 249.801 - Form X-15AA-1, for application for registration as a national securities association or...  

Code of Federal Regulations, 2010 CFR

...2010-04-01 2010-04-01 false Form X-15AA-1, for application for registration...Securities Associations § 249.801 Form X-15AA-1, for application for registration...Federal Register citations affecting Form X-15AA-1, see the List of CFR...

2010-04-01

413

Secure Data Network System (SDNS) network, transport, and message security protocols  

NASA Astrophysics Data System (ADS)

The Secure Data Network System (SDNS) project, implements computer to computer communications security for distributed applications. The internationally accepted Open Systems Interconnection (OSI) computer networking architecture provides the framework for SDNS. SDNS uses the layering principles of OSI to implement secure data transfers between computer nodes of local area and wide area networks. Four security protocol documents developed by the National Security Agency (NSA) as output from the SDNS project are included. SDN.301 provides the framework for security at layer 3 of the OSI Model. Cryptographic techniques to provide data protection for transport connections or for connectionless-mode transmission are described in SDN.401. Specifications for message security service and protocol are contained in SDN.701. Directory System Specifications for Message Security Protocol are covered in SDN.702.

Dinkel, C.

1990-03-01

414

The application of artificial intelligence techniques to large distributed networks  

NASA Technical Reports Server (NTRS)

Data accessibility and transfer of information, including the land resources information system pilot, are structured as large computer information networks. These pilot efforts include the reduction of the difficulty to find and use data, reducing processing costs, and minimize incompatibility between data sources. Artificial Intelligence (AI) techniques were suggested to achieve these goals. The applicability of certain AI techniques are explored in the context of distributed problem solving systems and the pilot land data system (PLDS). The topics discussed include: PLDS and its data processing requirements, expert systems and PLDS, distributed problem solving systems, AI problem solving paradigms, query processing, and distributed data bases.

Dubyah, R.; Smith, T. R.; Star, J. L.

1985-01-01

415

Field measurements and guidelines for the application of wireless sensor networks to the environment and security.  

PubMed

Frequently, Wireless Sensor Networks (WSN) are designed focusing on applications and omitting transmission problems in these wireless networks. In this paper, we present a measurement campaign that has been carried out using one of the most commonly used WSN platforms, the micaZ from Crossbow(©). Based on these measurements, some guidelines to deploy a robust and reliable WSN are provided. The results are focused on security and environmental applications but can also be extrapolated to other scenarios. A main conclusion that can be extracted is that, from the transmission point of view, a dense WSN is one of the best choices to overcome many of the transmission problems such as the existence of a transitional region, redundance, forwarding, obstructions or interference with other systems. PMID:22303175

Gil Jiménez, Víctor P; Armada, Ana García

2009-01-01

416

Field Measurements and Guidelines for the Application of Wireless Sensor Networks to the Environment and Security  

PubMed Central

Frequently, Wireless Sensor Networks (WSN) are designed focusing on applications and omitting transmission problems in these wireless networks. In this paper, we present a measurement campaign that has been carried out using one of the most commonly used WSN platforms, the micaZ from Crossbow©. Based on these measurements, some guidelines to deploy a robust and reliable WSN are provided. The results are focused on security and environmental applications but can also be extrapolated to other scenarios. A main conclusion that can be extracted is that, from the transmission point of view, a dense WSN is one of the best choices to overcome many of the transmission problems such as the existence of a transitional region, redundance, forwarding, obstructions or interference with other systems. PMID:22303175

Gil Jiménez, Víctor P.; Armada, Ana García

2009-01-01

417

Applications Cloud Computing Developer World Mobilize Security Central Virtualization Adventures in IT Share or Email | Print | Add a comment | Recommend This  

E-print Network

Applications Cloud Computing Developer World Mobilize Security Central Virtualization Adventures of High Performance Computing in Singapore explain that the new technology could be used in displays "that

Rogers, John A.

418

Analysis on the threats and spatiotemporal distribution pattern of security in World Natural Heritage Sites.  

PubMed

World Natural Heritage Sites (WNHS) are treasures that need human protection and invite appreciation, which makes conservation of WNHS an urgent task. This paper assesses where in the world threats are most pressing and which WNHS require emergency assistance. Using an analysis of "hot spots" and inverse distance weighting, it finds that Africa is the region where WNHS are least secure. Reports of the state of the conservation of WNHS describe the many threats that exist. Of these, management activities and institutional factors are the primary threats. The paper suggests relevant measures to improve the WNHS security. PMID:25427826

Wang, Zhaoguo; Yang, Zhaoping; Du, Xishihui

2015-01-01

419

Nanostructure based EO/IR sensor development for homeland security applications  

NASA Astrophysics Data System (ADS)

Next Generation EO/IR focal plane arrays using nanostructure materials are being developed for a variety of Defense and Homeland Security Sensor Applications. Several different nanomaterials are being evaluated for these applications. These include ZnO nanowires, GaN Nanowires and II-VI nanowires, which have demonstrated large signal to noise ratio as a wide band gap nanostructure material in the UV band. Similarly, the work is under way using Carbon Nanotubes (CNT) for a high speed detector and focal plane array as two-dimensional array as bolometer for IR bands of interest, which can be implemented for the sensors for homeland security applications. In this paper, we will discuss the sensor design and model predicting performance of an EO/IR focal plane array and Sensor that can cover the UV to IR bands of interest. The model can provide a robust means for comparing performance of the EO/IR FPA's and Sensors that can operate in the UV, Visible-NIR (0.4- 1.8?), SWIR (2.0-2.5?), MWIR (3-5?), and LWIR bands (8-14?). This model can be used as a tool for predicting performance of nanostructure arrays under development. We will also discuss our results on growth and characterization of ZnO nanowires and CNT's for the next generation sensor applications. We also present several approaches for integrated energy harvesting using nanostructure based solar cells and Nanogenerators that can be used to supplement the energy required for nanostructure based sensors.

Sood, Ashok K.; Welser, Roger E.; Sood, Adam W.; Puri, Yash R.; Manzur, Tariq; Dhar, Nibir K.; Polla, Dennis L.; Wang, Zhong L.; Wijewarnasuriya, Priyalal S.; Anwar, A. F. M.

2011-06-01

420

Scheduling Distributed Applications: the SimGrid Simulation Framework  

Microsoft Academic Search

Since the advent of distributed computer systems an active field of research has been the inves- tigation of scheduling strategies for parallel applications. The common approach is to employ scheduling heuris- tics that approximate an optimal schedule. Unfortu- nately, it is often impossible to obtain analytical results to compare the ecacy of these heuristics. One possi- bility is to conducts

Arnaud Legrand; Loris Marchal; Henri Casanova

2003-01-01

421

Dosimetry of Heterogeneously Distributed Radionuclides with Applications to Radioimmunotherapy  

Microsoft Academic Search

The dosimetry of internally deposited radionuclides has been investigated for applications to radioimmunotherapy. The assumptions inherent in the MIRD method of dose calculation are shown to be inappropriate to the task of dosimetry for nonuniformly distributed radionuclides emitting lowly penetrating radiations. A method using the concept of dose point kernels has been developed, expanding the MIRD method to regions of

Douglas John Simpkin

1991-01-01

422

A Framework for Developing Distributed ICT Applications for Health  

Microsoft Academic Search

Distributed health information and communication technologies (ICT) applications tend to fail in the marketplace. A framework comprising of four pillars is constructed that explains the reasons of failure and how the trajectory from idea to a product in the marketplace could be managed more successfully

Niilo Saranummi; Ilkka Korhonen; Sirkku Kivisaari; Hannu Ahjopalo

2006-01-01

423

A Java Middleware Platform for Resource-Aware Distributed Applications  

E-print Network

A Java Middleware Platform for Resource-Aware Distributed Applications Frédéric Guidec, Yves Mahéo.Guidec|Yves.Maheo|Luc.Courtrai}@univ-ubs.fr Abstract This paper reports the development of D-RAJE (Dis- tributed Resource-Aware Java Environment), a Java-based middleware platform that makes it possible to model and to monitor resources

Paris-Sud XI, Université de

424

Adapting Distributed Scientific Applications to Run-Time Network Conditions  

E-print Network

747 Adapting Distributed Scientific Applications to Run-Time Network Conditions Masha Sosonkina Ames Laboratory and Iowa State University, Ames IA 50010 masha@scl.ameslab.gov Abstract. High 2004, LNCS 3732, pp. 747­755, 2005. c Springer-Verlag Berlin Heidelberg 2005 #12;748 Masha Sosonkina

Sosonkina, Masha

425

SHAMAN -An Environment for Distributed Management Applications 1  

E-print Network

management of networks with SNMP that provides flexible and dynamic network management by permitting of the SNMP framework with features for distributing application func- tionality, by and large the SNMP integrated with the SNMP frame- work. Our research group at the University of Delaware has designed a new

Sethi, Adarshpal

426

Some Applications of the Fractional Poisson Probability Distribution  

E-print Network

Physical and mathematical applications of fractional Poisson probability distribution have been presented. As a physical application, a new family of quantum coherent states has been introduced and studied. As mathematical applications, we have discovered and developed the fractional generalization of Bell polynomials, Bell numbers, and Stirling numbers. Appearance of fractional Bell polynomials is natural if one evaluates the diagonal matrix element of the evolution operator in the basis of newly introduced quantum coherent states. Fractional Stirling numbers of the second kind have been applied to evaluate skewness and kurtosis of the fractional Poisson probability distribution function. A new representation of Bernoulli numbers in terms of fractional Stirling numbers of the second kind has been obtained. A representation of Schlafli polynomials in terms of fractional Stirling numbers of the second kind has been found. A new representations of Mittag-Leffler function involving fractional Bell polynomials and fractional Stirling numbers of the second kind have been discovered. Fractional Stirling numbers of the first kind have been introduced and studied. Two new polynomial sequences associated with fractional Poisson probability distribution have been launched and explored. The relationship between new polynomials and the orthogonal Charlier polynomials has also been investigated. In the limit case when the fractional Poisson probability distribution becomes the Poisson probability distribution, all of the above listed developments and implementations turn into the well-known results of quantum optics, the theory of combinatorial numbers and the theory of orthogonal polynomials of discrete variable.

Nick Laskin

2011-11-17

427

Application of contract-based security assertion monitoring framework for telecommunications software engineering  

Microsoft Academic Search

Telecommunication software systems, containing security vulnerabilities, continue to be created and released to consumers. We need to adopt improved software engineering practices to reduce the security vulnerabilities in modern systems. Contracts can provide a useful mechanism for the identification, tracking, and validation of security vulnerabilities. In this work, we propose a new contract-based security assertion monitoring framework (CB_SAMF) that is

Alexander M. Hoole; Issa Traoré; Isabelle Simplot-Ryl

2011-01-01

428

The use of stimulated electron emission (SEE) in homeland security applications  

NASA Astrophysics Data System (ADS)

Certain insulating solids can store a fraction of the absorbed energy when irradiated by ionizing radiation. The stored energy can be released subsequently by heating or optical stimulation. As a result, light may be emitted through Thermoluminescence (TL) or Optically-Stimulated Luminescence (OSL) and electrons may be emitted through Thermally-Stimulated Electron Emission (TSEE) or Optically-Stimulated Electron Emission (OSEE). TL and OSL are widely used in current radiation dosimetry systems. However, despite considerable research effort during the early 1970s, SEE was not commonly adopted for dosimetry applications. One of the main reasons is that SEE is a surface phenomenon, while luminescence is a bulk phenomenon, making SEE more susceptible to humidity, absorption of gases, minor physical defects and handling, both before and after irradiation. Nevertheless, it has been recognized that SEE may be useful for homeland security applications in nuclear forensics, where dose accuracy is not the primary performance metric. In this research, we are investigating the use of SEE for nuclear forensic applications. Many common materials, both natural and man-made, exhibit the phenomenon, providing an opportunity to use the environment itself as an in-situ radiation detector. We have designed and constructed a unique prototype reader for conducting SEE measurements. We have demonstrated that the SEE measurements from a variety of materials are quantitatively reproducible and correlated to radiation exposure. Due to the broad applicability of SEE, significant additional studies are warranted to optimize this novel technique for nuclear forensic and other applications.

Ing, H.; Andrews, H. R.; Facina, M.; Lee, W. T.; Niu, H. W.

2012-06-01

429

Coordinating complex decision support activities across distributed applications  

NASA Technical Reports Server (NTRS)

Knowledge-based technologies have been applied successfully to automate planning and scheduling in many problem domains. Automation of decision support can be increased further by integrating task-specific applications with supporting database systems, and by coordinating interactions between such tools to facilitate collaborative activities. Unfortunately, the technical obstacles that must be overcome to achieve this vision of transparent, cooperative problem-solving are daunting. Intelligent decision support tools are typically developed for standalone use, rely on incompatible, task-specific representational models and application programming interfaces (API's), and run on heterogeneous computing platforms. Getting such applications to interact freely calls for platform independent capabilities for distributed communication, as well as tools for mapping information across disparate representations. Symbiotics is developing a layered set of software tools (called NetWorks! for integrating and coordinating heterogeneous distributed applications. he top layer of tools consists of an extensible set of generic, programmable coordination services. Developers access these services via high-level API's to implement the desired interactions between distributed applications.

Adler, Richard M.

1994-01-01

430

Income Distribution and Social Security in an OECD Perspective Koen Caminada and Kees Goudswaard  

E-print Network

.l.j.caminada@law.leidenuniv.nl k.p.goudswaard@law.leidenuniv.nl Leiden University Public Finance Department P.O. Box 9521, 2300 RA of Economics at Public Finance Section, Law School, Leiden University, the Netherlands. Research areas: social Security at Public Finance Section, Law School, Leiden University, the Netherlands, and Crown

Galis, Frietson

431

LEAP: efficient security mechanisms for large-scale distributed sensor networks  

Microsoft Academic Search

In this paper, we describe LEAP (Localized Encryption and Authentication Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the same time restricting the security impact of a node compromise to the immediate network neighborhood of the compromised node. The design of the protocol is motivated by the observation that different types

Sencun Zhu; Sanjeev Setia; Sushil Jajodia

2003-01-01

432

Classification: //Dell SecureWorks/Confidential -Limited External Distribution: Better TogetherMay 13, 2014  

E-print Network

: The Impact of Cyber Crime #1 - Hacker's Inc. · Would be the largest company in the world · Translate costs into "hacker revenue" · Global costs of cyber crime is $500B * - Center for Strategic and International Studies and state security-related laws 50 U.S. states with varying data breach laws 2013 480 million records stolen

Sura, Philip

433

Overcoming the challenges of secure mobile applications for network-centric, data-sensitive applications  

NASA Astrophysics Data System (ADS)

Gaining the competitive advantage in today's aggressive environment requires our corporate leaders and Warfighters alike to be armed with up-to-date knowledge related to friendly and opposing forces. This knowledge has to be delivered in real-time between the core enterprise and tactical/mobile units at the edge. The type and sensitivity of data delivered will vary depending on users, threat level and current rules of dissemination. This paper will describe the mobile security management that basis access rights on positive identification of user, authenticating the user and the edge device. Next, Access Management is granted on a fine grain basis where each data element is tagged with meta-data that is crypto-bound to the data itself to ensure authenticity of contents and observance of data sensitivity.

Farroha, Bassam; Farroha, Deborah

2012-05-01

434

Upper bounds for the security of differential-phase-shift quantum key distribution with weak coherent states  

NASA Astrophysics Data System (ADS)

In this paper we present limitations imposed by sequential attacks on the maximal distance achievable by a differential-phase-shift (DPS) quantum key distribution (QKD) protocol with weak coherent pulses. Specifically, we compare the performance of two possible sequential attacks against DPS QKD where Eve realizes, respectively, optimal unambiguous state discrimination of Alice's signal states, and optimal unambiguous discrimination of the relative phases between consecutive signal states. We show that the second eavesdropping strategy provides tighter upper bounds for the security of a DPS QKD scheme than the former one.

Curty, Marcos; Tamaki, Kiyoshi; Moroder, Tobias; Gómez-Sousa, Hipólito

2009-04-01

435

Highly purified mussel adhesive protein to secure biosafety for in vivo applications  

PubMed Central

Background Unique adhesive and biocompatibility properties of mussel adhesive proteins (MAPs) are known for their great potential in many tissue engineering and biomedical applications. Previously, it was successfully demonstrated that redesigned hybrid type MAP, fp-151, mass-produced in Gram-negative bacterium Escherichia coli, could be utilized as a promising adhesive biomaterial. However, purification of recombinant fp-151 has been unsatisfactory due to its adhesive nature and polarity which make separation of contaminants (especially, lipopolysaccharide, a toxic Gram-negative cell membrane component) very difficult. Results In the present work, we devised a high resolution purification approach to secure safety standards of recombinant fp-151 for the successful use in in vivo applications. Undesirable impurities were remarkably eliminated as going through sequential steps including treatment with multivalent ion and chelating agent for cell membrane washing, mechanical cell disruption, non-ionic surfactant treatment for isolated inclusion body washing, acid extraction of washed inclusion body, and ion exchange chromatography purification of acid extracted sample. Through various analyses, such as high performance liquid chromatographic purity assay, limulus amoebocyte lysate endotoxin assay, and in vitro mouse macrophage cell tests on inflammation, viability, cytotoxicity, and apoptosis, we confirmed the biological safety of bacterial-derived purified recombinant fp-151. Conclusions Through this purification design, recombinant fp-151 achieved 99.90% protein purity and 99.91% endotoxin reduction that nearly no inflammation response was observed in in vitro experiments. Thus, the highly purified recombinant MAP would be successfully used as a safety-secured in vivo bioadhesive for tissue engineering and biomedical applications. PMID:24725543

2014-01-01

436

Some applications of the fractional Poisson probability distribution  

SciTech Connect

Physical and mathematical applications of the recently invented fractional Poisson probability distribution have been presented. As a physical application, a new family of quantum coherent states has been introduced and studied. As mathematical applications, we have developed the fractional generalization of Bell polynomials, Bell numbers, and Stirling numbers of the second kind. The appearance of fractional Bell polynomials is natural if one evaluates the diagonal matrix element of the evolution operator in the basis of newly introduced quantum coherent states. Fractional Stirling numbers of the second kind have been introduced and applied to evaluate the skewness and kurtosis of the fractional Poisson probability distribution function. A representation of the Bernoulli numbers in terms of fractional Stirling numbers of the second kind has been found. In the limit case when the fractional Poisson probability distribution becomes the Poisson probability distribution, all of the above listed developments and implementations turn into the well-known results of the quantum optics and the theory of combinatorial numbers.

Laskin, Nick [TopQuark Inc., Toronto, Ontario M6P 2P2 (Canada)

2009-11-15

437

Analyzing Comprehensive QoS with Security Constraints for Services Composition Applications in Wireless Sensor Networks  

PubMed Central

Services composition is fundamental to software development in multi-service wireless sensor networks (WSNs). The quality of service (QoS) of services composition applications (SCAs) are confronted with severe challenges due to the open, dynamic, and complex natures of WSNs. Most previous research separated various QoS indices into different fields and studied them individually due to the computational complexity. This approach ignores the mutual influence between these QoS indices, and leads to a non-comprehensive and inaccurate analysis result. The universal generating function (UGF) shows the speediness and precision in QoS analysis. However, only one QoS index at a time can be analyzed by the classic UGF. In order to efficiently analyze the comprehensive QoS of SCAs, this paper proposes an improved UGF technique—vector universal generating function (VUGF)—which considers the relationship between multiple QoS indices, including security, and can simultaneously analyze multiple QoS indices. The numerical examples demonstrate that it can be used for the evaluation of the comprehensive QoS of SCAs subjected to the security constraint in WSNs. Therefore, it can be effectively applied to the optimal design of multi-service WSNs. PMID:25470488

Xiong, Naixue; Wu, Zhao; Huang, Yannong; Xu, Degang

2014-01-01

438

8: Network Security 8-1 Network Security Overview  

E-print Network

"confidentiality" authentication message integrity security in practice: security in application (eg. Email8: Network Security 8-1 Network Security Overview Computer Networking: A Top Down Approach , Jim Kurose, Keith Ross Based on: Chapter 8 #12;8: Network Security 8-2 Chapter 8: Network Security Chapter

Lu, Enyue "Annie"

439

A Distributed Energy-Aware Trust Management System for Secure Routing in Wireless Sensor Networks  

Microsoft Academic Search

Wireless sensor networks are inherently vulnerable to security attacks, due to their wireless operation. The situation is\\u000a further aggravated because they operate in an infrastructure-less environment, which mandates the cooperation among nodes\\u000a for all networking tasks, including routing, i.e. all nodes act as “routers”, forwarding the packets generated by their neighbours\\u000a in their way to the sink node. This implies

Yannis Stelios; Nikos Papayanoulas; Panagiotis Trakadas; Sotiris Maniatis; Helen C. Leligou; Theodore Zahariadis

2009-01-01

440

A Novel Key Management and Distribution Solution for Secure Video Multicast  

Microsoft Academic Search

\\u000a In secure video multicast systems, access control is a very important and challenging issue. A common practice is to encrypt\\u000a the video content using a group key, shared only by legitimate clients. Since the clients can join and leave the multicast session frequently, the group key\\u000a needs to be updated and delivered to the legitimate clients accordingly in order to

Hao Yin; Xiaowen Chu; Chuang Lin; Feng Qiu; Geyong Min

2005-01-01

441

Securing the Networked e-Business Throughout an Internet Distributed Organization  

Microsoft Academic Search

This paper explores an Internet-based VPN solution, built upon IPSec, which combines tunneling with PKI authentication and encryption. To protect the valuable company resources, an efficient intrusion\\/misuse detection and response system was incorporated into deployed security solution. This approach enabled a large-scale customer provide their global e-business safely. As a result, an integrated policy-based management system and a PKI environment

STANISLAV MILANOVIC; ZORAN PETROVIC

2002-01-01

442

Efficient Key Distribution Schemes for Large Scale Mobile Computing Applications  

E-print Network

openers, security cameras etc., equipped with short range radios, will be controlled by hand-held devices networks consisting of large-scale deployments of mobile devices, efficient security mechanisms for securing large scale deployments of mobile devices. I. INTRODUCTION Rapidly lowering costs of computing

443

Sensor-enabled chem/bio contamination detection system dedicated to situational awareness of water distribution security status  

NASA Astrophysics Data System (ADS)

Both real events and models have proven that drinking water systems are vulnerable to deliberate and/or accidental contamination. Additionally, homeland security initiatives and modeling efforts have determined that it is relatively easy to orchestrate the contamination of potable water supplies. Such contamination can be accomplished with classic and non-traditional chemical agents, toxic industrial chemicals (TICs), and/or toxic industrial materials (TIMs). Subsequent research and testing has developed a proven network for detection and response to these threats. The method uses offthe- shelf, broad-spectrum analytical instruments coupled with advanced interpretive algorithms. The system detects and characterizes any backflow events involving toxic contaminants by employing unique chemical signature (fingerprint) response data. This instrumentation has been certified by the Office of Homeland Security for detecting deliberate and/or accidental contamination of critical water infrastructure. The system involves integration of several mature technologies (sensors, SCADA, dynamic models, and the HACH HST Guardian Blue instrumentation) into a complete, real-time, management system that also can be used to address other water distribution concerns, such as corrosion. This paper summarizes the reasons and results for installing such a distribution-based detection and protection system.

Ginsberg, Mark D.; Smith, Eddy D.; VanBlaricum, Vicki; Hock, Vincent F.; Kroll, Dan; Russell, Kevin J.

2010-04-01

444

Using Application Servers to Build Distributed Data Systems  

NASA Astrophysics Data System (ADS)

Space and Earth scientists increasingly require data products from multiple sensors. Frequently these data are widely distributed and each source may have very different types of data products. For instance a single space science research project can require data from more than one instrument on more than one spacecraft, data from Earth based sensors and results from theoretical models. These data and model results are housed at many locations around the world. The location of the data may change with time as spacecraft are complete their missions. Unless care is taken in providing access to these data, using them will require a great deal of effort on the part of individual scientists. Today's data system designers are challenged to link these distributed sources and make them work together as one. One approach to providing universal support is to base the core functionality of each data provider on common technology. An emerging technology platform is Sun's Java Application Server. With an application server approach all services offered by the data center are provided through Java servlets that can be invoked through the application server while responding to a request for a specific URL. The benefits of using an application server include a well established framework for development, broad corporate support for the technology and increased sharing of implementations between data centers. We will illustrate the use of an application server by describing the system currently being deployed at the Planetary Plasma Interactions Node of NASA's Planetary Data System.

King, T. A.; Walker, R. J.; Joy, S. P.

2004-12-01

445

Vectorized presentation-level services for scientific distributed applications  

SciTech Connect

The use of heterogeneous distributed systems is a promising approach to significantly increase computational performance of scientific applications. However, one key to this strategy is to minimize the percentage of lime spent by an application moving data between machines. This percentage is composed of two parts: (1) the time to translate data between the formats used on different machines, and (2) the time to move data over the network that interconnects the machines. Previous work suggests that data format conversion activity, generally known as presentation-level services, is by far the more costly of the two. In this paper we describe how vectorization can be used to improve presentation-level performance in scientific applications by one or two orders of magnitude over the conventional approach. While others have recognized the advantages of vectorized data format conversion, we describe how to automate this process so that an application programmer need not explicitly call vectorization routines. We explore the impact of presentation-level vectorization on software portability, programming efficiency and protocol standards. We compare our performance results with those of two other popular distributed application programming tools and then summarize the lessons we have learned during the course of our research.

Stanberry, L.C.; Branstetter, M.L.; Nessett, D.M.

1993-03-01

446

Exponential synchronization of discontinuous chaotic systems via delayed impulsive control and its application to secure communication  

NASA Astrophysics Data System (ADS)

This paper investigates drive-response synchronization of chaotic systems with discontinuous right-hand side. Firstly, a general model is proposed to describe most of known discontinuous chaotic system with or without time-varying delay. An uniform impulsive controller with multiple unknown time-varying delays is designed such that the response system can be globally exponentially synchronized with the drive system. By utilizing a new lemma on impulsive differential inequality and the Lyapunov functional method, several synchronization criteria are obtained through rigorous mathematical proofs. Results of this paper are universal and can be applied to continuous chaotic systems. Moreover, numerical examples including discontinuous chaotic Chen system, memristor-based Chua's circuit, and neural networks with discontinuous activations are given to verify the effectiveness of the theoretical results. Application of the obtained results to secure communication is also demonstrated in this paper.

Yang, Xinsong; Yang, Zhichun; Nie, Xiaobing

2014-05-01

447

THz all-electronic 3D imaging for safety and security applications  

NASA Astrophysics Data System (ADS)

The ability of terahertz and millimeter-wave imaging to detect suspicious hidden objects underneath or in luggage has led to increased interest in these techniques. Several approaches have been demonstrated in the past few years, amongst which active, all-electronic terahertz imaging has proven to be particularly adapted for safety and security applications. It combines a large dynamic range and the ability to perform range measurements with increased spatial resolution. At the French-German Research Institute of Saint Louis (ISL), we use an all-electronic 3D imaging system for a comprehensive study on various suspicious objects and cloth types. We demonstrate an enhanced detection capability for hidden suspicious objects if the range information is extracted and visualized in appropriate ways.

Fischer, Bernd M.; Demarty, Ya"l.; Schneider, Markus; Löffler, Torsten; Keil, Andreas; Quast, Holger

2010-04-01

448

Modeling and simulation for small system integration of military and homeland security applications  

NASA Astrophysics Data System (ADS)

A highly productive approach to small systems design and integration (SSDI), and modeling and simulation (M&S), based on rapid/interactive prototyping has been effectively used at Physical Optics Corporation (POC) to support small system development of "intellectual products" that cover a broad range of electromagnetic spectra (X-ray, optical, infrared, and microwave). In particular, the implementation of an accelerated interactive modeling (AIM) environment produces effective engineering solutions for tackling difficult and complex technical issues for combining 3D mechanical design and microwave engineering. In addition, using established small systems engineering principles and the effective use of collaborative input at the start of a development effort that incorporates a diverse range of areas like optics, mechanics, electronics, software, thermal modeling, electromagnetism, surface chemistry, and manufacturing plays an important role in the success of future military and homeland security applications.

Bennahmias, Mark; Esterkin, Vladimir; Lee, Kang; Koziol, Richard; Kostrzewski, Andrew; Savant, Gajendra; Jannson, Tomasz

2007-04-01

449

Integrated luminescent chemical microsensors based on GaN LEDs for security applications using smartphones  

NASA Astrophysics Data System (ADS)

Development of PCB-integrateable microsensors for monitoring chemical species is a goal in areas such as lab-on-a-chip analytical devices, diagnostics medicine and electronics for hand-held instruments where the device size is a major issue. Cellular phones have pervaded the world inhabitants and their usefulness has dramatically increased with the introduction of smartphones due to a combination of amazing processing power in a confined space, geolocalization and manifold telecommunication features. Therefore, a number of physical and chemical sensors that add value to the terminal for health monitoring, personal safety (at home, at work) and, eventually, national security have started to be developed, capitalizing also on the huge number of circulating cell phones. The chemical sensor-enabled "super" smartphone provides a unique (bio)sensing platform for monitoring airborne or waterborne hazardous chemicals or microorganisms for both single user and crowdsourcing security applications. Some of the latest ones are illustrated by a few examples. Moreover, we have recently achieved for the first time (covalent) functionalization of p- and n-GaN semiconductor surfaces with tuneable luminescent indicator dyes of the Ru-polypyridyl family, as a key step in the development of innovative microsensors for smartphone applications. Chemical "sensoring" of GaN-based blue LED chips with those indicators has also been achieved by plasma treatment of their surface, and the micrometer-sized devices have been tested to monitor O2 in the gas phase to show their full functionality. Novel strategies to enhance the sensor sensitivity such as changing the length and nature of the siloxane buffer layer are discussed in this paper.

Orellana, Guillermo; Muñoz, Elias; Gil-Herrera, Luz K.; Muñoz, Pablo; Lopez-Gejo, Juan; Palacio, Carlos

2012-09-01

450

Realization of the Bell-LaPadula Security Policy in an OSI-Distributed System using Asymmetric and Symmetric Cryptographic Algorithms  

Microsoft Academic Search

This article discusses a distributed implementation of the Bell-LaPadula security policy model. Implementation of a confidentiality service in the OSIRM is not sufficient for enforcing the Bell-LaPadula model. Also integrity services are necessary. In this article both public key systems (PKSs) as well as symmetric cryptographic systems are considered for the realisation of these security services. By concentrating on the

Jan Verschuren; René Govaerts; Joos Vandewalle

1992-01-01

451

Security and privacy issues of personal health.  

PubMed

While health systems in developed countries and increasingly also in developing countries are moving from organisation-centred to person-centred health service delivery, the supporting communication and information technology is faced with new risks regarding security and privacy of stakeholders involved. The comprehensively distributed environment puts special burden on guaranteeing communication security services, but even more on guaranteeing application security services dealing with privilege management, access control and audit regarding social implication and connected sensitivity of personal information recorded, processed, communicated and stored in an even internationally distributed environment. PMID:17901620

Blobel, Bernd; Pharow, Peter

2007-01-01

452

JECho: Supporting Distributed High Performance Applications with Java Event Channels  

Microsoft Academic Search

This paper presents JECho, a Java-based communication infrastructure for collaborative high performance applications. JECho implements a publish\\/subscribe communication paradigm, permitting distributed, concurrently executing sets of components to provide interactive service to collaborating end users via event channels. JECho's efficient implementation enables it to move events at rates higher than other Java-based event system implementations. In addition, using JECho's eager handler

Dong Zhou; Karsten Schwan; Greg Eisenhauer; Yuan Chen

2001-01-01

453

7 CFR 1717.857 - Refinancing of existing secured debt-distribution and power supply borrowers.  

Code of Federal Regulations, 2010 CFR

...forecasts for at least 5 years comparing the borrower's debt service and other costs, revenues, margins, cash flows, TIER, and DSC, with and without the proposed refinancing. (e) Application process and timeframes. The application process and...

2010-01-01

454

Measurements of radiation dose distributions for shielded cervical applicators  

SciTech Connect

Cervical applicators with shielded ovoids are employed to reduce dose to the rectum and bladder. Because of asymmetries introduced by the shields, dose distribution calculations for individual patients will require extensive computer reference data for the ovoid sources. Requisite 3-D dose distributions were measured for an unshielded and a shielded ovoid containing a Cs-137 source, using a computerized system employing a diode in a water phantom. The probe stops at each measurement point and accumulates dose for several seconds. The system automates horizontal positioning of the detector and angular motion of the ovoid to obtain dose in one plane. The detector is moved manually to other planes for a complete three dimensional set of measurements. In order to suppress the energy and directional dependence of the diode, final dose distributions are calculated from ratios of shielded to unshielded data in conjunction with independently measured TLD data for unshielded sources.

Mohan, R.; Ding, I.Y.; Martel, M.K.; Anderson, L.L.; Nori, D.

1985-04-01

455

Application of GIS in water distribution system assessment.  

PubMed

Water distribution system (WDS) is the most important component of water supply chain--supplying water from source to consumer. When supply system is poorly maintained, contaminants enter into the supply pipes through cracks and this leads to significant public health risk. Being underground, pipe condition assessment is a difficult task. In this paper, a case study is presented for assessment of pipe condition in a water distribution network of Moinbagh area in Hyderabad (India). The mathematical model-Pipe Condition Assessment (PCA) Model was used, which utilizes GIS based maps of water distribution network, sewer network, drains and soil as input in addition to data on physical properties of the network as well as operational parameters. The application of PCA identified that only 3% pipes in the network were in bad condition. PMID:21117426

Sargaonkar, Aabha; Islam, Raisul

2009-10-01

456

A Study of Android Application Security William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri  

E-print Network

, and enterprise services for any user with a cellular data plan. Appli- cation markets such as Apple's App Store and vulnerabilities, and apply a wide range of analysis techniques. In this, we make two primary contributions: · We The fluidity of application markets complicate smart- phone security. Although recent efforts have shed light

McDaniel, Patrick Drew

457

Name Change Application Employees: Bring all documentation (including your Social Security card) to Human Resources (McClain Hall 101).  

E-print Network

Clain Hall 104). You must provide original documentation for name changes to be processed. This formName Change Application Employees: Bring all documentation (including your Social Security card of Admissions (Ruth Towne Museum and Visitors Center). You must provide original documentation for name changes

Gering, Jon C.

458

A brief analysis on data encryption's application in electronic business transaction security  

Microsoft Academic Search

Electronic business transaction security involves confidentiality, integrity indefensibility and identity conformity. Data encryption technology and its relevant applied technology including digital envelop, digital abstract, digital signature, digital timestamp, digital certificate, security transaction agreement and so on, which proved playing an important role in the electronic business security and promoting favorable development .

Wenzhe Liu

2010-01-01

459

Secure Spread: An Integrated Architecture for Secure Group Communication  

Microsoft Academic Search

Group communication systems are high-availability distributed systems providing reliable and ordered message delivery, as well as a membership service, to group-oriented applications. Many such systems are built using a distributed client-server architecture where a relatively small set of servers provide service to numerous clients. In this work, we show how group communication systems can be enhanced with security services without

Yair Amir; Cristina Nita-rotaru; Jonathan Robert Stanton; Gene Tsudik

2005-01-01

460

Secure distribution of watermarked images for a digital library of ancient papers  

Microsoft Academic Search

The electronic publishing, storage and distribution of documents is growing increasingly important and will have profound implications for our economy, cul- ture and society. The multimedia digitalisation of li- braries and the distribution of the contents of museums is revolutionising these organisations and will make these resources available to a much wider audience than was previously possible. The main goal

Christian Rauber; Joseph Ó Ruanaidh; Thierry Pun

1997-01-01

461

Efficient Use of Distributed Systems for Scientific Applications  

NASA Technical Reports Server (NTRS)

Distributed computing has been regarded as the future of high performance computing. Nationwide high speed networks such as vBNS are becoming widely available to interconnect high-speed computers, virtual environments, scientific instruments and large data sets. One of the major issues to be addressed with distributed systems is the development of computational tools that facilitate the efficient execution of parallel applications on such systems. These tools must exploit the heterogeneous resources (networks and compute nodes) in distributed systems. This paper presents a tool, called PART, which addresses this issue for mesh partitioning. PART takes advantage of the following heterogeneous system features: (1) processor speed; (2) number of processors; (3) local network performance; and (4) wide area network performance. Further, different finite element applications under consideration may have different computational complexities, different communication patterns, and different element types, which also must be taken into consideration when partitioning. PART uses parallel simulated annealing to partition the domain, taking into consideration network and processor heterogeneity. The results of using PART for an explicit finite element application executing on two IBM SPs (located at Argonne National Laboratory and the San Diego Supercomputer Center) indicate an increase in efficiency by up to 36% as compared to METIS, a widely used mesh partitioning tool. The input to METIS was modified to take into consideration heterogeneous processor performance; METIS does not take into consideration heterogeneous networks. The execution times for these applications were reduced by up to 30% as compared to METIS. These results are given in Figure 1 for four irregular meshes with number of elements ranging from 30,269 elements for the Barth5 mesh to 11,451 elements for the Barth4 mesh. Future work with PART entails using the tool with an integrated application requiring distributed systems. In particular this application, illustrated in the document entails an integration of finite element and fluid dynamic simulations to address the cooling of turbine blades of a gas turbine engine design. It is not uncommon to encounter high-temperature, film-cooled turbine airfoils with 1,000,000s of degrees of freedom. This results because of the complexity of the various components of the airfoils, requiring fine-grain meshing for accuracy. Additional information is contained in the original.

Taylor, Valerie; Chen, Jian; Canfield, Thomas; Richard, Jacques

2000-01-01

462

SECURING UNTRUSTWORTHY SOFTWARE USING INFORMATION FLOW CONTROL  

E-print Network

and there are no fully-trusted machines or components. Building secure applications from untrusted code requires safely this technique we construct a scalable distributed web server, in which most application code is untrusted-like environment with acceptable performance that is implemented in an untrusted user-level library but uses

463

Distribution System Reliability Analysis for Smart Grid Applications  

NASA Astrophysics Data System (ADS)

Reliability of power systems is a key aspect in modern power system planning, design, and operation. The ascendance of the smart grid concept has provided high hopes of developing an intelligent network that is capable of being a self-healing grid, offering the ability to overcome the interruption problems that face the utility and cost it tens of millions in repair and loss. To address its reliability concerns, the power utilities and interested parties have spent extensive amount of time and effort to analyze and study the reliability of the generation and transmission sectors of the power grid. Only recently has attention shifted to be focused on improving the reliability of the distribution network, the connection joint between the power providers and the consumers where most of the electricity problems occur. In this work, we will examine the effect of the smart grid applications in improving the reliability of the power distribution networks. The test system used in conducting this thesis is the IEEE 34 node test feeder, released in 2003 by the Distribution System Analysis Subcommittee of the IEEE Power Engineering Society. The objective is to analyze the feeder for the optimal placement of the automatic switching devices and quantify their proper installation based on the performance of the distribution system. The measures will be the changes in the reliability system indices including SAIDI, SAIFI, and EUE. The goal is to design and simulate the effect of the installation of the Distributed Generators (DGs) on the utility's distribution system and measure the potential improvement of its reliability. The software used in this work is DISREL, which is intelligent power distribution software that is developed by General Reliability Co.

Aljohani, Tawfiq Masad

464

Current state of commercial radiation detection equipment for homeland security applications.  

SciTech Connect

With the creation of the U.S. Department of Homeland Security (DHS) came the increased concern that terrorist groups would attempt to manufacture and use an improvised nuclear device or radiological dispersal device. As such, a primary mission of DHS is to protect the public against the use of these devices and to assist state and local responders in finding, locating, and identifying these types of devices and materials used to manufacture these devices. This assistance from DHS to state and local responders comes in the form of grant money to procure radiation detection equipment. In addition to this grant program, DHS has supported the development of American National Standards Institute standards for radiation detection equipment and has conducted testing of commercially available instruments. This paper identifies the types and kinds of commercially available equipment that can be used to detect and identify radiological material - for use in traditional search applications as well as primary and secondary screening of personnel, vehicles, and cargo containers. In doing so, key considerations for the conduct of operations are described as well as critical features of the instruments for specific applications. The current state of commercial instruments is described for different categories of detection equipment including personal radiation detectors, radioisotope identifiers, man-portable detection equipment, and radiation portal monitors. In addition, emerging technologies are also discussed, such as spectroscopic detectors and advanced spectroscopic portal monitors.

Klann, R. T.; Shergur, J.; Mattesich, G.; Nuclear Engineering Division; DHS

2009-10-01

465

A novel low cost alternative to THz for security and defence applications  

NASA Astrophysics Data System (ADS)

A novel technique of NIR imaging is presented that gives access to most of the applications currently published as being solely suitable for Terahertz (THz) waves. The technique uses NIR beams wavelengths found in ordinary domestic remote controls (circa 850 nm) and various signal recovery techniques commonly found in astronomy. This alternative technique can be realised by very simple and inexpensive electronics and is inherently far more portable and easy to use and no special sources are required. Transmission imaging results from this technique are presented from several industrial examples and various security applications and are compared and contrasted directly with their THz-derived counterparts. It would appear possible to very cheaply and simply emulate the performance of commercial terahertz systems at a fraction of the cost and with greatly reduced processing times Another advantage is that apart from imaging, this technique affords the means to provide simultaneous in-situ chemical-bond analysis for stand-off detection of certain chemical signatures - for example, those found in drugs and explosives (both molecular and oxidiser based). Also, unlike THz, this technique can penetrate bulk water and high humidity atmospheres and be used in transmission mode on biological and medical samples. Several results are presented of non-ionising X-ray type images that even differentiate between separate types of soft tissue

Diamond, G. G.; Hutchins, D. A.; Pallav, P.; Green, R. J.

2008-04-01

466

Novel low-cost alternative to THz for security and defence applications  

NASA Astrophysics Data System (ADS)

A novel technique of NIR imaging is presented that gives access to most of the applications currently published as being solely suitable for Terahertz (THz) waves. The technique uses NIR beams wavelengths found in ordinary domestic remote controls (circa 850 nm) and various signal recovery techniques commonly found in astronomy. This alternative technique can be realised by very simple and inexpensive electronics and is inherently far more portable and easy to use and no special sources are required. Transmission imaging results from this technique are presented from several industrial examples and various security applications and are compared and contrasted directly with their THz-derived counterparts. It would appear possible to very cheaply and simply emulate the performance of commercial terahertz systems at a fraction of the cost and with greatly reduced processing times Another advantage is that apart from imaging, this technique affords the means to provide simultaneous in-situ chemical-bond analysis for stand-off detection of certain chemical signatures - for example, those found in drugs and explosives (both molecular and oxidiser based). Also, unlike THz, this technique can penetrate bulk water and high humidity atmospheres and be used in transmission mode on biological and medical samples. Several results are presented of non-ionising X-ray type images that even differentiate between separate types of soft tissue

Diamond, G. G.; Hutchins, D. A.; Pallav, P.; Green, R. J.

2008-10-01

467

Study of distributed computing system based on web services  

NASA Astrophysics Data System (ADS)

For the security issues in distributed computing applications, combined with Web Services management system design and implementation, based on the research of Web Services and its security technology, this paper designs a distributed computing test system based on Web Services, in detail describes its key technologies, which further validates the advantages of Web Services technology for the distributed computing in loosely coupled network environment.

Wang, Lu-Feng

2013-03-01

468

Resilient group key agreement protocol with authentication security  

Microsoft Academic Search

Many applications in Dynamic Peer Group are becoming increasing popular nowadays. There is a need for security services to provide group-oriented communication privacy and data integrity. To provide this form of group communication privacy, it is important that members of the group can establish a common secret key for encrypting group communication data. A secure distributed group key agreement and

M. Rajaram; D. Thilagavathy; N. Kanjana Devi

2010-01-01

469

Power-aware applications for scientific cluster and distributed computing  

E-print Network

The aggregate power use of computing hardware is an important cost factor in scientific cluster and distributed computing systems. The Worldwide LHC Computing Grid (WLCG) is a major example of such a distributed computing system, used primarily for high throughput computing (HTC) applications. It has a computing capacity and power consumption rivaling that of the largest supercomputers. The computing capacity required from this system is also expected to grow over the next decade. Optimizing the power utilization and cost of such systems is thus of great interest. A number of trends currently underway will provide new opportunities for power-aware optimizations. We discuss how power-aware software applications and scheduling might be used to reduce power consumption, both as autonomous entities and as part of a (globally) distributed system. As concrete examples of computing centers we provide information on the large HEP-focused Tier-1 at FNAL, and the Tigress High Performance Computing Center at Princeton University, which provides HPC resources in a university context.

David Abdurachmanov; Peter Elmer; Giulio Eulisse; Paola Grosso; Curtis Hillegas; Burt Holzman; Ruben L. Janssen; Sander Klous; Robert Knight; Shahzad Muzaffar

2014-10-22

470

High-speed free-space quantum key distribution system for urban daylight applications.  

PubMed

We report a free-space quantum key distribution system designed for high-speed key transmission in urban areas. Clocking the system at gigahertz frequencies and efficiently filtering background enables higher secure key rates than those previously achieved by similar systems. The transmitter and receiver are located in two separate buildings 300 m apart in downtown Madrid and they exchange secure keys at rates up to 1 Mbps. The system operates in full bright daylight conditions with an average secure key rate of 0.5 Mbps and 24 h stability without human intervention. PMID:23669845

García-Martínez, M J; Denisenko, N; Soto, D; Arroyo, D; Orue, A B; Fernandez, V

2013-05-10

471

Analysis of security vulnerabilities in the movie production and distribution process  

Microsoft Academic Search

Unauthorized copying of movies is a major concern for the motion picture industry. While unauthorized copies of movies have been distributed via portable physical media for some time, low-cost, high-bandwidth Internet connections and peer-to-peer file sharing networks provide highly efficient distribution media. Many movies are showing up on file sharing networks shortly after, and in some cases prior to, theatrical

Simon Byers; Lorrie Faith Cranor; Dave Korman; Patrick Drew McDaniel; Eric Cronin

2003-01-01

472

Quantum circuit for the proof of the security of quantum key distribution without encryption of error syndrome and noisy processing  

SciTech Connect

One of the simplest security proofs of quantum key distribution is based on the so-called complementarity scenario, which involves the complementarity control of an actual protocol and a virtual protocol [M. Koashi, e-print arXiv:0704.3661 (2007)]. The existing virtual protocol has a limitation in classical postprocessing, i.e., the syndrome for the error-correction step has to be encrypted. In this paper, we remove this limitation by constructing a quantum circuit for the virtual protocol. Moreover, our circuit with a shield system gives an intuitive proof of why adding noise to the sifted key increases the bit error rate threshold in the general case in which one of the parties does not possess a qubit. Thus, our circuit bridges the simple proof and the use of wider classes of classical postprocessing.

Tamaki, Kiyoshi; Kato, Go [NTT Basic Research Laboratories, NTT Corporation, 3-1, Morinosato Wakamiya Atsugi-Shi, Kanagawa, 243-0198 (Japan) and CREST, JST Agency, 4-1-8 Honcho, Kawaguchi, Saitama, 332-0012 (Japan); NTT Communication Science Laboratories, NTT Corporation, 3-1, Morinosato Wakamiya Atsugi-Shi, Kanagawa, 243-0198 (Japan)

2010-02-15

473

DAVE: A plug and play model for distributed multimedia application development  

SciTech Connect

This paper presents a model being used for the development of distributed multimedia applications. The Distributed Audio Video Environment (DAVE) was designed to support the development of a wide range of distributed applications. The implementation of this model is described. DAVE is unique in that it combines a simple ``plug and play`` programming interface, supports both centralized and fully distributed applications, provides device and media extensibility, promotes object reuseability, and supports interoperability and network independence. This model enables application developers to easily develop distributed multimedia applications and create reusable multimedia toolkits. DAVE was designed for developing applications such as video conferencing, media archival, remote process control, and distance learning.

Mines, R.F.; Friesen, J.A.; Yang, C.L.

1994-07-01

474

Communicating Uncertainty about Climate Change for Application to Security Risk Management  

NASA Astrophysics Data System (ADS)

The science of climate change has convincingly demonstrated that human activities, including the release of greenhouse gases, land-surface changes, particle emissions, and redistribution of water, are changing global and regional climates. Consequently, key institutions are now concerned about the potential social impacts of climate change. For example, the 2010 Quadrennial Defense Review Report from the U.S. Department of Defense states that "climate change, energy security, and economic stability are inextricably linked." Meanwhile, insured losses from climate and weather-related natural disasters have risen dramatically over the past thirty years. Although these losses stem largely from socioeconomic trends, insurers are concerned that climate change could exacerbate this trend and render certain types of climate risk non-diversifiable. Meanwhile, the climate science community-broadly defined as physical, biological, and social scientists focused on some aspect of climate change-remains largely focused scholarly activities that are valued in the academy but not especially useful to decision makers. On the other hand, climate scientists who engage in policy discussions have generally permitted vested interests who support or oppose climate policies to frame the discussion of climate science within the policy arena. Such discussions focus on whether scientific uncertainties are sufficiently resolved to justify policy and the vested interests overstate or understate key uncertainties to support their own agendas. Consequently, the scientific community has become absorbed defending scientific findings to the near exclusion of developing novel tools to aid in risk-based decision-making. For example, the Intergovernmental Panel on Climate Change (IPCC), established expressly for the purpose of informing governments, has largely been engaged in attempts to reduce unavoidable uncertainties rather than helping the world's governments define a science-based risk-management framework for climate security. The IPCC's Fourth Assessment Report concluded that "Responding to climate change involves an iterative risk management process that includes both adaptation and mitigation and takes into account climate change damages, co-benefits, sustainability, equity and attitudes to risk." In risk management, key uncertainties guide action aimed at reducing risk and cannot be ignored or used to justify inaction. Security policies such as arms control and counter-terrorism demonstrate that high-impact outcomes matter to decision makers even if they are likely to be rare events. In spite of this fact, the long tail on the probability distribution of climate sensitivity was largely ignored by the climate science community until recently and its implications for decision making are still not receiving adequate attention. Informing risk management requires scientists to shift from a singular aversion to type I statistical error (i.e. false positive) to a balanced presentation of both type I error and type II error (i.e. false negative) when the latter may have serious consequences. Examples from national security, extreme weather, and economics illustrate these concepts.

Gulledge, J. M.

2011-12-01

475

Research into a distributed fault diagnosis system and its application  

NASA Astrophysics Data System (ADS)

CORBA (Common Object Request Broker Architecture) is a solution to distributed computing methods over heterogeneity systems, which establishes a communication protocol between distributed objects. It takes great emphasis on realizing the interoperation between distributed objects. However, only after developing some application approaches and some practical technology in monitoring and diagnosis, can the customers share the monitoring and diagnosis information, so that the purpose of realizing remote multi-expert cooperation diagnosis online can be achieved. This paper aims at building an open fault monitoring and diagnosis platform combining CORBA, Web and agent. Heterogeneity diagnosis object interoperate in independent thread through the CORBA (soft-bus), realizing sharing resource and multi-expert cooperation diagnosis online, solving the disadvantage such as lack of diagnosis knowledge, oneness of diagnosis technique and imperfectness of analysis function, so that more complicated and further diagnosis can be carried on. Take high-speed centrifugal air compressor set for example, we demonstrate a distributed diagnosis based on CORBA. It proves that we can find out more efficient approaches to settle the problems such as real-time monitoring and diagnosis on the net and the break-up of complicated tasks, inosculating CORBA, Web technique and agent frame model to carry on complemental research. In this system, Multi-diagnosis Intelligent Agent helps improve diagnosis efficiency. Besides, this system offers an open circumstances, which is easy for the diagnosis objects to upgrade and for new diagnosis server objects to join in.

Qian, Suxiang; Jiao, Weidong; Lou, Yongjian; Shen, Xiaomei

2005-12-01

476

An expert system for on-line security - economic load allocation on distribution systems  

SciTech Connect

This paper describes the development of a knowledge-based (KB) on-line consultant which assists power-system operators in a distribution SCADA environment. In particular, the allocation of loads to out-going feeders during the normal state is performed as a preventive measure for minimizing overloads of apparatus following a fault on a sub-station. By performing this, load distribution to the four main busbars of a typical 132/11kV zone-substation is distributed to a pre-determined nominal ratio. After the contingency tripping of one 132/11kV transformer, switching of busbar interconnectors and bus-sectioning switches (busbar re-configuration) could then be carried out at relative ease, without exceeding the sub-station's firm capacity for interrupting supply to consumers. It is essential in this policy to maintain this pre-fault load distribution on busbars in order to prevent overload of any apparatus during and after switching. This is achieved during the planning state by appropriate load allocation to feeders and distribution of firm-capacity to zone substations; and during operation by load transfers between out-going feeders and zone substations.

Chang, C.S.; Chung, T.S. (Dept. of Electrical Engineering, Hong Kong Polytechnic (CN))

1990-01-01

477

New distributed radar technology based on UAV or UGV application  

NASA Astrophysics Data System (ADS)

Regular micro and nano radars cannot provide reliable tracking of low altitude low profile aerial targets in urban and mountain areas because of reflection and re-reflections from buildings and terrain. They become visible and vulnerable to guided missiles if positioned on a tower or blimp. Doppler radar cannot distinguish moving cars and small low altitude aerial targets in an urban area. A new concept of pocket size distributed radar technology based on the application of UAV (Unmanned Air Vehicles), UGV (Unmanned Ground Vehicles) is proposed for tracking of low altitude low profile aerial targets at short and medium distances for protection of stadium, camp, military facility in urban or mountain areas.

Molchanov, Pavlo A.; Contarino, Vincent M.

2013-05-01

478

Mapper: A distributed object-oriented database application  

NASA Technical Reports Server (NTRS)

This paper discusses the results of a Small Business Innovation Research (SBIR) project. The initial application involved decomposition of a large database across multiple processors to improve the speed of processing compound queries. The commercial outcome was a tourist information system with a point-to-point driving direction program called MAPPER. A distributed, object-oriented approach was used for the general design, while a spatial decomposition was used to divide the database into computationally manageable pieces. The resulting system is highly flexible with respect to both modifications and reuse.

Younger, Herbert; O'Reilly, John; Frogner, Bjorn

1995-01-01

479

75 FR 37455 - Mortgage Insurance Termination; Application for Premium Refund or Distributive Share Payment  

Federal Register 2010, 2011, 2012, 2013, 2014

...Application for Premium Refund or Distributive Share Payment AGENCY: Office of the Chief Information...Application for Premium Refund or Distributive Share Payment to the homeowner to be completed...Application for Premium Refund or Distributive Share Payment. OMB Approval Number:...

2010-06-29

480

Security tasks are highly interdependent.  

E-print Network

· Academic freedom · Distribution of IT management · Tight schedules · Security not part of the core businessMotivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context

481

Ponder: A Language for Specifying Security and Management Policies for Distributed Systems  

Microsoft Academic Search

This document defines a declarative, object-oriented language for specifying policies for the securityand management of distributed systems. The language includes constructs for specifying thefollowing basic policy types: authorisation policies that define permitted actions; event-triggeredobligation policies that define actions to be performed by manager agents; refrain policies that defineactions that subjects must refrain from performing; and delegation policies that define what...

Nicodemos Damianou; Naranker Dulay; Emil Lupu; Morris Sloman

2000-01-01

482

26 CFR 1.1081-5 - Distribution solely of stock or securities.  

Code of Federal Regulations, 2010 CFR

...surrender by the shareholder of any stock in the distributing corporation...corporation disposes of all the common stock in the second corporation which...income tax return and supporting data was filed (see paragraph...receipt of such rights to acquire stock, shall include one year...

2010-04-01

483

26 CFR 1.1081-5 - Distribution solely of stock or securities.  

Code of Federal Regulations, 2011 CFR

...surrender by the shareholder of any stock in the distributing corporation...corporation disposes of all the common stock in the second corporation which...income tax return and supporting data was filed (see paragraph...receipt of such rights to acquire stock, shall include one year...

2011-04-01

484

26 CFR 1.1081-5 - Distribution solely of stock or securities.  

Code of Federal Regulations, 2012 CFR

...surrender by the shareholder of any stock in the distributing corporation...corporation disposes of all the common stock in the second corporation which...income tax return and supporting data was filed (see paragraph...receipt of such rights to acquire stock, shall include one year...

2012-04-01

485

26 CFR 1.1081-5 - Distribution solely of stock or securities.  

Code of Federal Regulations, 2013 CFR

...surrender by the shareholder of any stock in the distributing corporation...corporation disposes of all the common stock in the second corporation which...income tax return and supporting data was filed (see paragraph...receipt of such rights to acquire stock, shall include one year...

2013-04-01

486

26 CFR 1.1081-5 - Distribution solely of stock or securities.  

Code of Federal Regulations, 2014 CFR

...surrender by the shareholder of any stock in the distributing corporation...corporation disposes of all the common stock in the second corporation which...income tax return and supporting data was filed (see paragraph...receipt of such rights to acquire stock, shall include one year...

2014-04-01

487

Secure media content distribution based on the improved set-top box in IPTV  

Microsoft Academic Search

In this paper, some means are proposed to improve the performances of the set-top box (STB) based media distribution schemes for IPTV. Firstly, the lightweight packet encryption is used to replace traditional complete encryption in order to reduce the time cost. Secondly, a method is introduced to form a unique customer code and generates a unique media copy for each

Shiguo Lian; Zhongxuan Liu

2008-01-01

488

Distributed beamforming designs to improve physical layer security in wireless relay networks  

NASA Astrophysics Data System (ADS)

This paper investigates security-oriented beamforming designs in a relay network composed of a source-destination pair, multiple relays, and a passive eavesdropper. Unlike most of the earlier works, we assume that only statistical information of the relay-eavesdropper channels is known to the relays. We propose beamforming solutions for amplify-and-forward (AF) and decode-and-forward (DF) relay networks to improve secrecy capacity. In an AF network, the beamforming design is obtained by approximating a product of two correlated Rayleigh quotients to a single Rayleigh quotient using the Taylor series expansion. Our study reveals that in an AF network, the secrecy capacity does not always grow as the eavesdropper moves away from the relays or as total relay transmit power increases. Moreover, if the destination is nearer to the relays than the eavesdropper is, a suboptimal power is derived in closed form through monotonicity analysis of secrecy capacity. While in a DF network, secrecy capacity is a single Rayleigh quotient problem which can be easily solved. We also found that if the relay-eavesdropper distances are about the same, it is unnecessary to consider the eavesdropper in a DF network. Numerical results show that for either AF or DF relaying protocol, the proposed beamforming scheme provides higher secrecy capacity than traditional approaches.

Qian, Mujun; Liu, Chen; Fu, Youhua

2014-12-01

489

26 CFR 1.355-6 - Recognition of gain on certain distributions of stock or securities in controlled corporation.  

Code of Federal Regulations, 2010 CFR

...stock or securities in controlled corporation. 1.355-6 Section 1.355-6 Internal Revenue INTERNAL REVENUE SERVICE...Effects on Shareholders and Security Holders § 1.355-6 Recognition of gain on certain...

2010-04-01

490

Compact Dielectric Wall Accelerator Development For Intensity Modulated Proton Therapy And Homeland Security Applications  

SciTech Connect

Compact dielectric wall (DWA) accelerator technology is being developed at the Lawrence Livermore National Laboratory. The DWA accelerator uses fast switched high voltage transmission lines to generate pulsed electric fields on the inside of a high gradient insulating (HGI) acceleration tube. Its high electric field gradients are achieved by the use of alternating insulators and conductors and short pulse times. The DWA concept can be applied to accelerate charge particle beams with any charge to mass ratio and energy. Based on the DWA system, a novel compact proton therapy accelerator is being developed. This proton therapy system will produce individual pulses that can be varied in intensity, energy and spot width. The system will be capable of being sited in a conventional linac vault and provide intensity modulated rotational therapy. The status of the developmental new technologies that make the compact system possible will be reviewed. These include, high gradient vacuum insulators, solid dielectric materials, SiC photoconductive switches and compact proton sources. Applications of the DWA accelerator to problems in homeland security will also be discussed.

Chen, Y -; Caporaso, G J; Guethlein, G; Sampayan, S; Akana, G; Anaya, R; Blackfield, D; Cook, E; Falabella, S; Gower, E; Harris, J; Hawkins, S; Hickman, B; Holmes, C; Horner, A; Nelson, S; Paul, A; Pearson, D; Poole, B; Richardson, R; Sanders, D; Stanley, J; Sullivan, J; Wang, L; Watson, J; Weir, J

2009-06-17

491

AlGaInN laser diode technology for defence, security and sensing applications  

NASA Astrophysics Data System (ADS)

The latest developments in AlGaInN laser diode technology are reviewed for defence, security and sensing applications. The AlGaInN material system allows for laser diodes to be fabricated over a very wide range of wavelengths from u.v., i.e, 380nm, to the visible, i.e., 530nm, by tuning the indium content of the laser GaInN quantum well. Advantages of using Plasma assisted MBE (PAMBE) compared to more conventional MOCVD epitaxy to grow AlGaInN laser structures are highlighted. Ridge waveguide laser diode structures are fabricated to achieve single mode operation with optical powers of <100mW in the 400-420nm wavelength range that are suitable for telecom applications. Visible light communications at high frequency (up to 2.5 Gbit/s) using a directly modulated 422nm Gallium-nitride (GaN) blue laser diode is reported. High power operation of AlGaInN laser diodes is demonstrated with a single chip, AlGaInN laser diode `mini-array' with a common p-contact configuration at powers up to 2.5W cw at 410nm. Low defectivity and highly uniform GaN substrates allow arrays and bars of nitride lasers to be fabricated. GaN laser bars of up to 5mm with 20 emitters, mounted in a CS mount package, give optical powers up to 4W cw at ~410nm with a common contact configuration. An alternative package configuration for AlGaInN laser arrays allows for each individual laser to be individually addressable allowing complex free-space and/or fibre optic system integration within a very small form-factor.or.

Najda, Stephen P.; Perlin, Piotr; Suski, Tadek; Marona, Lucja; Bo?kowski, Mike; Leszczy?ski, Mike; Wisniewski, Przemek; Czernecki, Robert; Kucharski, Robert; Targowski, Grzegorz; Watson, Scott; Kelly, Antony E.

2014-10-01

492

Semantically Rich Application-Centric Security in Android Machigar Ongtang, Stephen McLaughlin, William Enck and Patrick McDaniel  

E-print Network

requirements of smartphone applications and augment the existing Android operating system with a framework system community. The security model of the Android system (and that of many other phone operating in current smart- phone operating systems is largely underdeveloped. In this paper, we consider the security

McDaniel, Patrick Drew

493

26 CFR 1.665(c)-1A - Special rule applicable to distributions by certain foreign trusts.  

Code of Federal Regulations, 2013 CFR

... false Special rule applicable to distributions by certain foreign trusts. 1.665...CONTINUED) Treatment of Excess Distributions of Trusts Applicable to Taxable Years...1A Special rule applicable to distributions by certain foreign trusts....

2013-04-01

494

26 CFR 1.665(c)-1A - Special rule applicable to distributions by certain foreign trusts.  

Code of Federal Regulations, 2014 CFR

... false Special rule applicable to distributions by certain foreign trusts. 1.665...CONTINUED) Treatment of Excess Distributions of Trusts Applicable to Taxable Years...1A Special rule applicable to distributions by certain foreign trusts....

2014-04-01

495

26 CFR 1.665(c)-1A - Special rule applicable to distributions by certain foreign trusts.  

Code of Federal Regulations, 2011 CFR

... false Special rule applicable to distributions by certain foreign trusts. 1.665...CONTINUED) Treatment of Excess Distributions of Trusts Applicable to Taxable Years...1A Special rule applicable to distributions by certain foreign trusts....

2011-04-01

496

26 CFR 1.665(c)-1A - Special rule applicable to distributions by certain foreign trusts.  

Code of Federal Regulations, 2012 CFR

... false Special rule applicable to distributions by certain foreign trusts. 1.665...CONTINUED) Treatment of Excess Distributions of Trusts Applicable to Taxable Years...1A Special rule applicable to distributions by certain foreign trusts....

2012-04-01

497

26 CFR 1.665(c)-1A - Special rule applicable to distributions by certain foreign trusts.  

Code of Federal Regulations, 2010 CFR

... false Special rule applicable to distributions by certain foreign trusts. 1.665... INCOME TAXES Treatment of Excess Distributions of Trusts Applicable to Taxable Years...1A Special rule applicable to distributions by certain foreign trusts....

2010-04-01

498

7 CFR 765.403 - Transfer of security to and assumption of debt by eligible applicants.  

Code of Federal Regulations, 2010 CFR

...Transfer of real estate and chattel security. The Agency may approve transfers of security with assumption of FLP debt, other than EM loans for physical or production losses, by transferees eligible for the type of loan being assumed if: (1) The...

2010-01-01

499

7 CFR 765.403 - Transfer of security to and assumption of debt by eligible applicants.  

Code of Federal Regulations, 2011 CFR

...Transfer of real estate and chattel security. The Agency may approve transfers of security with assumption of FLP debt, other than EM loans for physical or production losses, by transferees eligible for the type of loan being assumed if: (1) The...

2011-01-01

500

7 CFR 765.403 - Transfer of security to and assumption of debt by eligible applicants.  

Code of Federal Regulations, 2012 CFR

...Transfer of real estate and chattel security. The Agency may approve transfers of security with assumption of FLP debt, other than EM loans for physical or production losses, by transferees eligible for the type of loan being assumed if: (1) The...

2012-01-01