Science.gov

Sample records for state security

  1. Multipartite secure state distribution

    SciTech Connect

    Duer, W.; Briegel, H.-J.; Calsamiglia, J.

    2005-04-01

    We introduce the distribution of a secret multipartite entangled state in a real-world scenario as a quantum primitive. We show that in the presence of noisy quantum channels (and noisy control operations), any state chosen from the set of two-colorable graph states (Calderbank-Shor-Steane codewords) can be created with high fidelity while it remains unknown to all parties. This is accomplished by either blind multipartite entanglement purification, which we introduce in this paper, or by multipartite entanglement purification of enlarged states, which offers advantages over an alternative scheme based on standard channel purification and teleportation. The parties are thus provided with a secret resource of their choice for distributed secure applications.

  2. Bioethics and the national security state.

    PubMed

    Moreno, Jonathan D

    2004-01-01

    In previous work, I have described the history and ethics of human experiments for national security purposes during he cold war and developed the bioethical issues that will be apparent in the "war on terror". This paper is an attempt to bring these two previous lines of work together under the rubric of the "national security state," a concept familiar to Cold War historians and political scientists. The founding of the national security state was associated with the first articulations of informed consent requirements by national security agencies. My analysis indicates that strengthened consent standards, though conventionally thought to be antithetical crisis, can be seen as an attempt by the postwar national security state to protect itself from critics of expanded governmental power. During the coming years the renewed mission of the national security state in the war on terror should impel students of bioethics to consider its implications for the field. PMID:15301184

  3. The Association between State Attachment Security and State Mindfulness

    PubMed Central

    Pepping, Christopher A.; Davis, Penelope J.; O’Donovan, Analise

    2015-01-01

    Recent research suggests that attachment and mindfulness are related, though the nature of this association is unclear. Here we present two studies examining whether there is a causal relationship between state attachment and state mindfulness. Study 1 investigated the effects of experimentally increasing state mindfulness on state attachment security. State mindfulness was successfully enhanced, but this led to no change in state attachment security. Study 2 investigated the effects of experimentally enhancing state attachment security on state mindfulness. State attachment security was successfully enhanced, but this did not lead to any change in state mindfulness. These findings suggest that there is not a direct, immediate causal relationship between state attachment and state mindfulness as a result of brief experimental manipulations. Future research should examine these associations in longer term interventions. PMID:25786134

  4. Water security - Nation state and international security implications

    USGS Publications Warehouse

    Tindall, James A.; Andrew A. Campbell

    2009-01-01

    A terrorist attack such as poisoning and sabotage of the national water supply and water-quality infrastructure of the continental United States or any country, could disrupt the delivery of vital human services, threaten both public health and the environment, potentially cause mass casualties and pose grave public concern for homeland security. Most significantly, an attack on water resources would weaken social cohesion and trust in government. A threat to continuity of services is a potential threat to continuity of government since both are necessary for continuity of operations. Water infrastructure is difficult to protect, as it extends over vast areas across the U.S. and for which ownership is overwhelmingly nonfederal (approximately 85 percent). Since the 9111 attacks, federal dam operators and water and wastewater utilities have established counter measures. Similar measures have been taken in countries around the world. These include enhanced physical security, improved coordination between corporate ownership, Department of Homeland Security, and local law enforcement, and research into risk assessment and vulnerability analysis to ensure greater system safety. A key issue is the proportionate additional resources directed at public and private sector specific priorities. Agencies that have the scientific and technological ability to leverage resources, exploit integrated science approaches, focus on interdisciplinary practices, utilize informatics expertise and employ a wide use of evolving technologies should play a key role in water security and related issues.

  5. Secure quantum key distribution using squeezed states

    SciTech Connect

    Gottesman, Daniel; Preskill, John

    2001-02-01

    We prove the security of a quantum key distribution scheme based on transmission of squeezed quantum states of a harmonic oscillator. Our proof employs quantum error-correcting codes that encode a finite-dimensional quantum system in the infinite-dimensional Hilbert space of an oscillator, and protect against errors that shift the canonical variables p and q. If the noise in the quantum channel is weak, squeezing signal states by 2.51 dB (a squeeze factor e{sup r}=1.34) is sufficient in principle to ensure the security of a protocol that is suitably enhanced by classical error correction and privacy amplification. Secure key distribution can be achieved over distances comparable to the attenuation length of the quantum channel.

  6. Realities and Choices: Helping States Enhance Family Economic Security.

    ERIC Educational Resources Information Center

    Venner, Sandra

    This document, which is designed to help state administrators and legislators formulate policies enhancing family economic security, summarizes research findings regarding barriers to economic self-sufficiency and policies used by various states to improve poor family's available work opportunities and economic security. Discussed in the…

  7. State Security Breach Response Laws: State-by-State Summary Table. Using Data to Improve Education: A Legal Reference Guide to Protecting Student Privacy and Data Security

    ERIC Educational Resources Information Center

    Data Quality Campaign, 2011

    2011-01-01

    Under security breach response laws, businesses--and sometimes state and governmental agencies--are required to inform individuals when the security, confidentiality or integrity of their personal information has been compromised. This resource provides a state-by-state analysis of security breach response laws. [The Data Quality Campaign has…

  8. Securing the United States' power infrastructure

    SciTech Connect

    Happenny, Sean F.

    2015-08-01

    The United States’ power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power distribution networks utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Demonstrating security in embedded systems is another research area PNNL is tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the networks protecting them are becoming easier to breach. Providing a virtual power substation network to each student team at the National Collegiate Cyber Defense Competition, thereby supporting the education of future cyber security professionals, is another way PNNL is helping to strengthen the security of the nation’s power infrastructure.

  9. Neuroscience, Ethics, and National Security: The State of the Art

    PubMed Central

    Tennison, Michael N.; Moreno, Jonathan D.

    2012-01-01

    National security organizations in the United States, including the armed services and the intelligence community, have developed a close relationship with the scientific establishment. The latest technology often fuels warfighting and counter-intelligence capacities, providing the tactical advantages thought necessary to maintain geopolitical dominance and national security. Neuroscience has emerged as a prominent focus within this milieu, annually receiving hundreds of millions of Department of Defense dollars. Its role in national security operations raises ethical issues that need to be addressed to ensure the pragmatic synthesis of ethical accountability and national security. PMID:22448146

  10. Attachment and culture. Security in the United States and Japan.

    PubMed

    Rothbaum, F; Weisz, J; Pott, M; Miyake, K; Morelli, G

    2000-10-01

    Attachment theorists maintain that cultural differences are relatively minor, and they focus on universals. Here the authors highlight evidence of cultural variations and note ways in which attachment theory is laden with Western values and meaning. Comparisons of the United States and Japan highlight the cultural relativity of 3 core hypotheses of attachment theory: that caregiver sensitivity leads to secure attachment, that secure attachment leads to later social competence, and that children who are securely attached use the primary caregiver as a secure base for exploring the external world. Attachment theorists use measures of sensitivity, competence, and secure base that are biased toward Western ways of thinking: The measures emphasize the child's autonomy, individuation, and exploration. In Japan, sensitivity, competence, and secure base are viewed very differently, calling into question the universality of fundamental tenets of attachment theory. The authors call for an indigenous approach to the psychology of attachment. PMID:11080829

  11. A secure quantum group signature scheme based on Bell states

    NASA Astrophysics Data System (ADS)

    Zhang, Kejia; Song, Tingting; Zuo, Huijuan; Zhang, Weiwei

    2013-04-01

    In this paper, we propose a new secure quantum group signature with Bell states, which may have applications in e-payment system, e-government, e-business, etc. Compared with the recent quantum group signature protocols, our scheme is focused on the most general situation in practice, i.e. only the arbitrator is trusted and no intermediate information needs to be stored in the signing phase to ensure the security. Furthermore, our scheme has achieved all the characteristics of group signature—anonymity, verifiability, traceability, unforgetability and undeniability, by using some current developed quantum and classical technologies. Finally, a feasible security analysis model for quantum group signature is presented.

  12. Controlled Secure Direct Communication with Six-Qubit Entangled States

    NASA Astrophysics Data System (ADS)

    Li, Yuan-hua; Li, Xiao-lan; Nie, Li-ping; Sang, Ming-huang

    2016-02-01

    We propose an experimentally feasible scheme for implementing controlled quantum secure direct communication by using six-qubit entangled states. According to the results measured by the sender and the controller, the receiver can obtain different secret messages in a deterministic way with unit successful probability. In our scheme, the information-carrying qubits do not need to be transmitted over the public channel. Therefore, the scheme is determinate and secure.

  13. 77 FR 76076 - Information Security Oversight Office; State, Local, Tribal, and Private Sector Policy Advisory...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-26

    ... RECORDS ADMINISTRATION Information Security Oversight Office; State, Local, Tribal, and Private Sector... matters relating to the Classified National Security Information Program for State, Local, Tribal, and... number of individuals planning to attend must be submitted to the Information Security Oversight...

  14. Social Security Number Protection Laws: State-by-State Summary Table

    ERIC Educational Resources Information Center

    Data Quality Campaign, 2011

    2011-01-01

    As state policymakers implement statewide longitudinal data systems that collect, store, link and share student-level data, it is critical that they understand applicable privacy and data security standards and laws designed to ensure the privacy, security, and confidentiality of that data. To help state policymakers navigate this complex legal…

  15. (Preliminary field evaluation of solid state cameras for security applications)

    SciTech Connect

    Not Available

    1987-01-01

    Recent developments in solid state imager technology have resulted in a series of compact, lightweight, all-solid-state closed circuit television (CCTV) cameras. Although it is widely known that the various solid state cameras have less light sensitivity and lower resolution than their vacuum tube counterparts, the potential for having a much longer Mean Time Between Failure (MTBF) for the all-solid-state cameras is generating considerable interest within the security community. Questions have been raised as to whether the newest and best of the solid state cameras are a viable alternative to the high maintenance vacuum tube cameras in exterior security applications. To help answer these questions, a series of tests were performed by Sandia National Laboratories at various test sites and under several lighting conditions. In general, all-solid-state cameras need to be improved in four areas before they can be used as wholesale replacements for tube cameras in exterior security applications: resolution, sensitivity, contrast, and smear. However, with careful design some of the higher performance cameras can be used for perimeter security systems, and all of the cameras have applications where they are uniquely qualified. Many of the cameras are well suited for interior assessment and surveillance uses, and several of the cameras are well designed as robotics and machine vision devices.

  16. Preliminary field evaluation of solid state cameras for security applications

    SciTech Connect

    Murray, D.W.

    1987-07-01

    Recent developments in solid state imager technology have resulted in a series of compact, lightweight, all-solid-state closed circuit television (CCTV) cameras. Although it is widely known that the various solid state cameras have less light sensitivity and lower resolution than their vacuum tube counterparts, the potential for having a much longer Mean Time Between Failure (MTBF) for the all-solid-state cameras is generating considerable interest within the security community. Questions have been raised as to whether the newest and best of the solid state cameras are a viable alternative to the high maintenance vacuum tube cameras in exterior security applications. To help answer these questions, a series of tests were performed by Sandia National Laboratories at various test sites and under several lighting conditions. The results of these tests as well as a description of the test equipment, test sites, and procedures are presented in this report.

  17. Engage States on Energy Assurance and Energy Security

    SciTech Connect

    Kara Colton; John Ratliff; Sue Gander; Darren Springer; Greg Dierkers

    2008-09-30

    The NGA Center's 'Engaging States on Energy Security and Energy Assurance' has been successful in achieving the stated project purposes and objectives both in the initial proposal as well as in subsequent revisions to it. Our activities, which involve the NGA Center for Best Practices (The NGA Center) Homeland Security and Technology Division, included conducting tabletop exercises to help federal and state homeland security and energy officials determine roles and actions for various emergency scenarios. This included efforts to education state official on developing an energy assurance plan, harmonizing approaches to controlling price volatility, implementing reliability standards, understanding short and long-term energy outlooks and fuel diversification, and capitalizing on DOE's research and development activities. Regarding our work on energy efficiency and renewable energy, the NGA Center's Environment, Energy and Natural Resources Division hosted three workshops which engaged states on the clean energy and alternative transportation fuel and also produced several reports on related topics. In addition, we convened 18 meetings, via conference call, of the Energy Working Group. Finally, through the NGA Center's Front and Center newsletter articles, the NGA Center disseminated promising practices to a wide audience of state policymakers. The NGA Center also hosted a number of workshops and web conferences designed to directly engage states on the deliverables under this Cooperative Agreement. Through the NGA Center's written products and newsletter articles, the NGA Center was able to disseminate promising practices to a wide audience of state policymakers.

  18. Oil market power and United States national security

    PubMed Central

    Stern, Roger

    2006-01-01

    It is widely believed that an oil weapon could impose scarcity upon the United States. Impending resource exhaustion is thought to exacerbate this threat. However, threat seems implausible when we consider strategic deficits of prospective weapon users and the improbability of impending resource exhaustion. Here, we explore a hypothesis relating oil to national security under a different assumption, abundance. We suggest that an oil cartel exerts market power to keep abundance at bay, commanding monopoly rents [or wealth transfers (wt)] that underwrite security threats. We then compare security threats attributed to the oil weapon to those that may arise from market power. We first reexamine whether oil is abundant or scarce by reviewing current development data, then we estimate a competitive price for oil. From this, we derive wt2004 collections by Persian Gulf states ≈ $132-178 × 109. We find that wt and the behavior of states collecting it interact to actuate security threats. Threats underwritten by wt are (i) the potential for emergence of a Persian Gulf superpower and (ii) terrorism. It is therefore oil market power, not oil per se, that actuates threats. We also describe a paradox in the relation of market power to the United States' defense doctrine of force projection to preempt a Gulf superpower. Because the superpower threat derives from wt, force alone cannot preempt it. A further paradox is that because foreign policy is premised on oil weapon fear, market power is appeased. Threats thereby grow unimpeded. PMID:16428291

  19. Oil market power and United States national security.

    PubMed

    Stern, Roger

    2006-01-31

    It is widely believed that an oil weapon could impose scarcity upon the United States. Impending resource exhaustion is thought to exacerbate this threat. However, threat seems implausible when we consider strategic deficits of prospective weapon users and the improbability of impending resource exhaustion. Here, we explore a hypothesis relating oil to national security under a different assumption, abundance. We suggest that an oil cartel exerts market power to keep abundance at bay, commanding monopoly rents [or wealth transfers (wt)] that underwrite security threats. We then compare security threats attributed to the oil weapon to those that may arise from market power. We first reexamine whether oil is abundant or scarce by reviewing current development data, then we estimate a competitive price for oil. From this, we derive wt(2004) collections by Persian Gulf states approximately USD $132-178 x 10(9). We find that wt and the behavior of states collecting it interact to actuate security threats. Threats underwritten by wt are (i) the potential for emergence of a Persian Gulf superpower and (ii) terrorism. It is therefore oil market power, not oil per se, that actuates threats. We also describe a paradox in the relation of market power to the United States' defense doctrine of force projection to preempt a Gulf superpower. Because the superpower threat derives from wt, force alone cannot preempt it. A further paradox is that because foreign policy is premised on oil weapon fear, market power is appeased. Threats thereby grow unimpeded. PMID:16428291

  20. United States security strategy for Europe and NATO

    SciTech Connect

    1995-06-01

    The United States National Security Strategy, published in February 1995, is designed to meet this European challenge. Our global strategy seeks to enlarge the community of market democracies while deterring and containing a range of threats to our nation and our interests through engagement with our allies. Focusing on new threats and new opportunities, its central goals are to enhance security by maintaining a strong defense capability and promoting cooperative security measures; to promote democracy abroad; and to open foreign markets and spur global economic growth. This document explains how U.S. defense policy is furthering these goals in Europe. As will be seen, we are pursuing our security strategy not only through NATO, but also through other multilateral institutions, such as the Organization for Security and Cooperation in Europe (OSCE), supporting separate yet complementary efforts by our allies and friends in the European Union, and through the bilateral relationships that have played such a valuable role in U.S.-European cooperation for more than forty years.

  1. Deterministic secure communications using two-mode squeezed states

    SciTech Connect

    Marino, Alberto M.; Stroud, C. R. Jr.

    2006-08-15

    We propose a scheme for quantum cryptography that uses the squeezing phase of a two-mode squeezed state to transmit information securely between two parties. The basic principle behind this scheme is the fact that each mode of the squeezed field by itself does not contain any information regarding the squeezing phase. The squeezing phase can only be obtained through a joint measurement of the two modes. This, combined with the fact that it is possible to perform remote squeezing measurements, makes it possible to implement a secure quantum communication scheme in which a deterministic signal can be transmitted directly between two parties while the encryption is done automatically by the quantum correlations present in the two-mode squeezed state.

  2. Unconditionally Secure Key Distribution Based on Two Nonorthogonal States

    NASA Astrophysics Data System (ADS)

    Tamaki, Kiyoshi; Koashi, Masato; Imoto, Nobuyuki

    2003-04-01

    We prove the unconditional security of the Bennett 1992 protocol, by using a reduction to an entanglement distillation protocol initiated by a local filtering process. The bit errors and the phase errors are correlated after the filtering, and we can bound the amount of phase errors from the observed bit errors by an estimation method involving nonorthogonal measurements. The angle between the two states shows a trade-off between accuracy of the estimation and robustness to noises.

  3. United States national security policy making and Vietnam

    SciTech Connect

    Davidson, M.W.

    1985-01-01

    The United States failed to achieve its goals in waging a war in Vietnam. This thesis endeavors to show that this failure was due to errors in the formulation of American national security policy regarding Vietnam. The policy making process went astray, at least in part, due to a narrowing of the role of senior military officers as national security policy makers. The restricted role of senior officers as national security policy makers adversely affected American policy formulation regarding Vietnam. The United States response to the coup against Diem in 1963 and the deployment of conventional American forces to ground combat in Vietnam, in 1965 were undertaken without a clear recognition of the considerable costs of the commitments being assumed. Senior military officers had prompted such a recognition in similar previous crises but were not in a policy making position to do so concerning Vietnam. The policymaking input that was absent was ethical counsel of a fundamental nature. Clausewitz viewed the mortality of a war as being embodied in the national will to fight that war. The absence of an accurate appreciation of the costs of a military solution in Vietnam denied civilian officials a critical policy making factor and contributed significantly to the defeat of the American purpose there.

  4. 22 CFR 92.74 - Services in connection with United States securities or interests therein.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ..., Foreign Service of the United States of America (§ 22.1 of this chapter) applies in cases of this nature. ... securities or interests therein. 92.74 Section 92.74 Foreign Relations DEPARTMENT OF STATE LEGAL AND RELATED... for payment of United States securities, or securities for which the Treasury Department acts...

  5. Steady state security assessment in deregulated power systems

    NASA Astrophysics Data System (ADS)

    Manjure, Durgesh Padmakar

    Power system operations are undergoing changes, brought about primarily due to deregulation and subsequent restructuring of the power industry. The primary intention of the introduction of deregulation in power systems was to bring about competition and improved customer focus. The underlying motive was increased economic benefit. Present day power system analysis is much different than what it was earlier, essentially due to the transformation of the power industry from being cost-based to one that is price-based and due to open access of transmission networks to the various market participants. Power is now treated as a commodity and is traded in an open market. The resultant interdependence of the technical criteria and the economic considerations has only accentuated the need for accurate analysis in power systems. The main impetus in security analysis studies is on efficient assessment of the post-contingency status of the system, accuracy being of secondary consideration. In most cases, given the time frame involved, it is not feasible to run a complete AC load flow for determining the post-contingency state of the system. Quite often, it is not warranted as well, as an indication of the state of the system is desired rather than the exact quantification of the various state variables. With the inception of deregulation, transmission networks are subjected to a host of multilateral transactions, which would influence physical system quantities like real power flows, security margins and voltage levels. For efficient asset utilization and maximization of the revenue, more often than not, transmission networks are operated under stressed conditions, close to security limits. Therefore, a quantitative assessment of the extent to which each transaction adversely affects the transmission network is required. This needs to be done accurately as the feasibility of the power transactions and subsequent decisions (execution, curtailment, pricing) would depend upon the

  6. 31 CFR 601.4 - Use of paper; interest-bearing securities of the United States.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 3 2011-07-01 2011-07-01 false Use of paper; interest-bearing... PAPER FOR UNITED STATES CURRENCY AND OTHER SECURITIES § 601.4 Use of paper; interest-bearing securities...-bearing securities of the United States, and for any other printing where the use of distinctive paper...

  7. 31 CFR 601.4 - Use of paper; interest-bearing securities of the United States.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance:Treasury 3 2014-07-01 2014-07-01 false Use of paper; interest-bearing... PAPER FOR UNITED STATES CURRENCY AND OTHER SECURITIES § 601.4 Use of paper; interest-bearing securities...-bearing securities of the United States, and for any other printing where the use of distinctive paper...

  8. 31 CFR 601.4 - Use of paper; interest-bearing securities of the United States.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Use of paper; interest-bearing... PAPER FOR UNITED STATES CURRENCY AND OTHER SECURITIES § 601.4 Use of paper; interest-bearing securities...-bearing securities of the United States, and for any other printing where the use of distinctive paper...

  9. 31 CFR 601.4 - Use of paper; interest-bearing securities of the United States.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 3 2013-07-01 2013-07-01 false Use of paper; interest-bearing... PAPER FOR UNITED STATES CURRENCY AND OTHER SECURITIES § 601.4 Use of paper; interest-bearing securities...-bearing securities of the United States, and for any other printing where the use of distinctive paper...

  10. 31 CFR 601.4 - Use of paper; interest-bearing securities of the United States.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 3 2012-07-01 2012-07-01 false Use of paper; interest-bearing... PAPER FOR UNITED STATES CURRENCY AND OTHER SECURITIES § 601.4 Use of paper; interest-bearing securities...-bearing securities of the United States, and for any other printing where the use of distinctive paper...

  11. 78 FR 14629 - 10th Anniversary of the United States Department of Homeland Security

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-06

    ... Homeland Security By the President of the United States of America A Proclamation Ten years ago, when the... world, the United States Department of Homeland Security (DHS) opened its doors with a single task... challenges the future holds. Homeland security cannot begin and end with the Federal Government; it...

  12. A scheme for secure quantum communication network with authentication using GHZ-like states and cluster states controlled teleportation

    NASA Astrophysics Data System (ADS)

    Naseri, Mosayeb; Raji, Mehrdad Ahmadzadeh; Hantehzadeh, Mohamad Reza; Farouk, Ahmed; Boochani, Arash; Solaymani, Shahram

    2015-11-01

    We propose a scheme for a secure message communication network with authentication following the idea in controlled teleportation. In this scheme, the servers of the network provide the service to prepare the entangled states as quantum channels. For preventing the eavesdropping, a security checking method is suggested. After the security check, any two users in the network may communicate securely and directly under the control of the servers on the network.

  13. Architectural design of a secure forensic state psychiatric hospital.

    PubMed

    Dvoskin, Joel A; Radomski, Steven J; Bennett, Charles; Olin, Jonathan A; Hawkins, Robert L; Dotson, Linda A; Drewnicky, Irene N

    2002-01-01

    This article describes the architectural design of a secure forensic state psychiatric hospital. The project combined input from staff at all levels of the client organization, outside consultants, and a team of experienced architects. The design team was able to create a design that maximized patient dignity and privacy on one hand, and the ability of staff to observe all patient activity on the other. The design centers around 24-bed units, broken into smaller living wings of eight beds each. Each eight-bed living wing has its own private bathrooms (two) and showers (two), as well as a small living area solely reserved for these eight patients and their guests. An indoor-outdoor dayroom allows patients to go outside whenever they choose, while allowing staff to continue observing them. The heart of the facility is a large treatment mall, designed to foster the acquisition of social, emotional, cognitive, and behavioral skills that will help patients to safely return to their communities. PMID:12239707

  14. United States security strategy for the Middle East

    SciTech Connect

    1995-05-01

    One of the most controversial questions the United States faces in the aftermath of the Cold War is when to use military force in this complex world. But there is little dispute that we must be prepared to use force to defend our vital interests: when the survival of the United States or its key allies is in danger, when our critical economic interests are threatened, or when dealing with the emergence of a future nuclear threat. Nowhere are these criteria met more clearly than in the Middle East. This report is the second in a series of regional reports undertaken by the Assistant Secretary of Defense for International Security Affairs with the aim of defining U.S. interests and commitments in critical parts of the world. It outlines a strategy for promoting stability and peaceful change through a combination of diplomacy, peacetime engagement, forward presence, and rapid response capabilities. It also explains how we can carry out this strategy without formal alliances or permanent basing arrangements that are familiar elsewhere in the world. The prospects for stability in the Middle East in the coming decades are mixed. On the positive side, unprecedented progress has recently been made in the Middle East peace process, holding forth the hope that Israelis and Palestinians alike can finally be integrated fully into the political and economic life of the Middle East. Furthermore, U.S. capabilities to defend its vital interests in the Middle East are at an all-time high, in stark contrast to the situation less than two decades ago.

  15. 75 FR 39437 - Optimizing the Security of Biological Select Agents and Toxins in the United States

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-08

    ..., 2010. [FR Doc. 2010-16864 Filed 7-7-10; 11:15 am] Billing code 3195-W0-P ... Executive Order 13546--Optimizing the Security of Biological Select Agents and Toxins in the United States... July 2, 2010 Optimizing the Security of Biological Select Agents and Toxins in the United States By...

  16. 59 FR- Agreement on Social Security Between the United States and Greece; Entry Into Force

    Federal Register 2010, 2011, 2012, 2013, 2014

    1994-11-25

    ... HUMAN SERVICES Agreement on Social Security Between the United States and Greece; Entry Into Force The... social security systems is effective beginning September 1, 1994. The agreement with Greece, which was... United States to work in Greece for 5 years or less remains covered only by the U.S. system....

  17. 48 CFR 25.302 - Contractors performing private security functions outside the United States.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Contractors performing private security functions outside the United States. 25.302 Section 25.302 Federal Acquisition... Performed Outside the United States 25.302 Contractors performing private security functions outside...

  18. 48 CFR 25.302 - Contractors performing private security functions outside the United States.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Contractors performing private security functions outside the United States. 25.302 Section 25.302 Federal Acquisition... Performed Outside the United States 25.302 Contractors performing private security functions outside...

  19. Security improvement by using a modified coherent state for quantum cryptography

    SciTech Connect

    Lu, Y.J.; Zhu, Luobei; Ou, Z.Y.

    2005-03-01

    Weak coherent states as a photon source for quantum cryptography have a limit in secure data rate and transmission distance because of the presence of multiphoton events and loss in transmission line. Two-photon events in a coherent state can be taken out by a two-photon interference scheme. We investigate the security issue of utilizing this modified coherent state in quantum cryptography. A 4-dB improvement in the secure data rate or a nearly twofold increase in transmission distance over the coherent state are found. With a recently proposed and improved encoding strategy, further improvement is possible.

  20. United States security strategy for the east Asia-Pacific region

    SciTech Connect

    1995-02-01

    The United States National Security Strategy published in July 1994 is based on enlarging the community of market democracies while deterring and containing a range of threats to our nation, our allies and our interests. Focusing on new threats and new opportunities, its central goals are: to enhance security by maintaining a strong defense capability and promoting cooperative security measures; to open foreign markets and spur global economic growth; and to promote democracy abroad. In accordance with the National Security Strategy, this document explains United States defense policy toward furthering these goals in the Asia-Pacific region. It builds upon the Strategy`s emphasis on maintaining a strong defense capability to enhance U.S. security and to provide a foundation for regional stability through mutually beneficial security partnerships. As the Strategy states, East Asia is a region of growing importance to American goals: nowhere are the strands of our three-part strategy more intertwined; nowhere is the need for continued engagement more evident. In thinking about the Asia-Pacific region, security comes first, and a committed United States military presence will continue to serve as a bedrock for America`s security role in this dynamic area of the world. The regional security strategy for the Asia-Pacific region emphasizes strengthening the bilateral alliances that have been at the heart of United States strategy for more than forty years. The United States is also committed to contribute to regional security through active participation in new multi-lateral fora like the ASEAN Regional Forum. Through such multi-lateral mechanisms the countries of the region seek to develop new cooperative approaches to achieve greater stability and security. Additionally, the Pacific Command sponsors multi-national military activities.

  1. Security of six-state quantum key distribution protocol with threshold detectors

    PubMed Central

    Kato, Go; Tamaki, Kiyoshi

    2016-01-01

    The security of quantum key distribution (QKD) is established by a security proof, and the security proof puts some assumptions on the devices consisting of a QKD system. Among such assumptions, security proofs of the six-state protocol assume the use of photon number resolving (PNR) detector, and as a result the bit error rate threshold for secure key generation for the six-state protocol is higher than that for the BB84 protocol. Unfortunately, however, this type of detector is demanding in terms of technological level compared to the standard threshold detector, and removing the necessity of such a detector enhances the feasibility of the implementation of the six-state protocol. Here, we develop the security proof for the six-state protocol and show that we can use the threshold detector for the six-state protocol. Importantly, the bit error rate threshold for the key generation for the six-state protocol (12.611%) remains almost the same as the one (12.619%) that is derived from the existing security proofs assuming the use of PNR detectors. This clearly demonstrates feasibility of the six-state protocol with practical devices. PMID:27443610

  2. Security of six-state quantum key distribution protocol with threshold detectors.

    PubMed

    Kato, Go; Tamaki, Kiyoshi

    2016-01-01

    The security of quantum key distribution (QKD) is established by a security proof, and the security proof puts some assumptions on the devices consisting of a QKD system. Among such assumptions, security proofs of the six-state protocol assume the use of photon number resolving (PNR) detector, and as a result the bit error rate threshold for secure key generation for the six-state protocol is higher than that for the BB84 protocol. Unfortunately, however, this type of detector is demanding in terms of technological level compared to the standard threshold detector, and removing the necessity of such a detector enhances the feasibility of the implementation of the six-state protocol. Here, we develop the security proof for the six-state protocol and show that we can use the threshold detector for the six-state protocol. Importantly, the bit error rate threshold for the key generation for the six-state protocol (12.611%) remains almost the same as the one (12.619%) that is derived from the existing security proofs assuming the use of PNR detectors. This clearly demonstrates feasibility of the six-state protocol with practical devices. PMID:27443610

  3. Security of six-state quantum key distribution protocol with threshold detectors

    NASA Astrophysics Data System (ADS)

    Kato, Go; Tamaki, Kiyoshi

    2016-07-01

    The security of quantum key distribution (QKD) is established by a security proof, and the security proof puts some assumptions on the devices consisting of a QKD system. Among such assumptions, security proofs of the six-state protocol assume the use of photon number resolving (PNR) detector, and as a result the bit error rate threshold for secure key generation for the six-state protocol is higher than that for the BB84 protocol. Unfortunately, however, this type of detector is demanding in terms of technological level compared to the standard threshold detector, and removing the necessity of such a detector enhances the feasibility of the implementation of the six-state protocol. Here, we develop the security proof for the six-state protocol and show that we can use the threshold detector for the six-state protocol. Importantly, the bit error rate threshold for the key generation for the six-state protocol (12.611%) remains almost the same as the one (12.619%) that is derived from the existing security proofs assuming the use of PNR detectors. This clearly demonstrates feasibility of the six-state protocol with practical devices.

  4. A Review of State Test Security Laws in 2013. ACT Research Report Series, 2014 (1)

    ERIC Educational Resources Information Center

    Croft, Michelle

    2014-01-01

    Test security has increased in importance in the last few years given high-profile cases of educator misconduct. This paper provides a review of state test security statutes and regulations related to statewide achievement testing using as a framework recent best practices reports by the U.S. Department of Education's National Center for Education…

  5. A revised controlled deterministic secure quantum communication with five-photon entangled state

    NASA Astrophysics Data System (ADS)

    Xiu, Xiao-Ming; Dong, Li; Gao, Ya-Jun; Chi, Feng; Ren, Yuan-Peng; Liu, Hui-Wei

    2010-01-01

    A revised controlled deterministic secure quantum communication protocol using five-photon entangled state is proposed. It amends the security loopholes pointed by Qin et al. in [S.J. Qin, Q.Y. Wen, L.M. Meng, F.C. Zhu, Opt. Commun. 282 (2009) 2656] in the original protocol proposed by Xiu et al. in [X.M. Xiu, L. Dong, Y.J. Gao, F. Chi, Opt. Commun. 282 (2009) 333]. The security loopholes are solved by using order rearrangement of transmission photons and two-step security test.

  6. 28 CFR 20.24 - State laws on privacy and security.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Section 20.24 Judicial Administration DEPARTMENT OF JUSTICE CRIMINAL JUSTICE INFORMATION SYSTEMS State and Local Criminal History Record Information Systems § 20.24 State laws on privacy and security. Where a State originating criminal history record information provides for sealing or purging thereof,...

  7. 28 CFR 20.24 - State laws on privacy and security.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Section 20.24 Judicial Administration DEPARTMENT OF JUSTICE CRIMINAL JUSTICE INFORMATION SYSTEMS State and Local Criminal History Record Information Systems § 20.24 State laws on privacy and security. Where a State originating criminal history record information provides for sealing or purging thereof,...

  8. 28 CFR 20.24 - State laws on privacy and security.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Section 20.24 Judicial Administration DEPARTMENT OF JUSTICE CRIMINAL JUSTICE INFORMATION SYSTEMS State and Local Criminal History Record Information Systems § 20.24 State laws on privacy and security. Where a State originating criminal history record information provides for sealing or purging thereof,...

  9. 28 CFR 20.24 - State laws on privacy and security.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Section 20.24 Judicial Administration DEPARTMENT OF JUSTICE CRIMINAL JUSTICE INFORMATION SYSTEMS State and Local Criminal History Record Information Systems § 20.24 State laws on privacy and security. Where a State originating criminal history record information provides for sealing or purging thereof,...

  10. 28 CFR 20.24 - State laws on privacy and security.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Section 20.24 Judicial Administration DEPARTMENT OF JUSTICE CRIMINAL JUSTICE INFORMATION SYSTEMS State and Local Criminal History Record Information Systems § 20.24 State laws on privacy and security. Where a State originating criminal history record information provides for sealing or purging thereof,...

  11. 22 CFR 92.74 - Services in connection with United States securities or interests therein.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Services in connection with United States securities or interests therein. 92.74 Section 92.74 Foreign Relations DEPARTMENT OF STATE LEGAL AND RELATED..., Foreign Service of the United States of America (§ 22.1 of this chapter) applies in cases of this nature....

  12. Quantum secure direct communication against the collective noise with polarization-entangled Bell states

    NASA Astrophysics Data System (ADS)

    Dong, Li; Wang, Jun-Xi; Li, Qing-Yang; Shen, Hong-Zhi; Dong, Hai-Kuan; Xiu, Xiao-Ming; Ren, Yuan-Peng; Gao, Ya-Jun

    2015-12-01

    We propose a quantum secure direct communication protocol via a collective noise channel, exploiting polarization-entangled Bell states and the nondemolition parity analysis based on weak cross-Kerr nonlinearities. The participant Bob, who will receive the secret information, sends one of two photons in a polarization-entangled Bell state exploiting the transmission circuit against the collective noise to the participant Alice, who will send the secret information, by the means of photon block transmission. If the first security check employing the nondemolition parity analysis is passed, the task of securely distributing the quantum channel is fulfilled. Encoding secret information on the photons sent from Bob by performing single-photon unitary transformation operations, Alice resends these photons to Bob through the transmission circuit against the collective noise. Exploiting the nondemolition parity analysis to distinguish Bell states, Bob can obtain the secret information from Alice after the second security check is passed, and the resulting Bell states can be applied to other tasks of quantum information processing. Under the condition of the secure quantum channel being confirmed, the photons that are utilized in the role of the security check can be applied to the function of secure direct communication, thus enhancing the efficiency of transmitting secret information and saving a lot of resources.

  13. 49 CFR 1546.213 - Access to cargo: Security threat assessments for cargo personnel in the United States.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Access to cargo: Security threat assessments for cargo personnel in the United States. 1546.213 Section 1546.213 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR...

  14. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  15. Increasing the resilience and security of the United States' power infrastructure

    SciTech Connect

    Happenny, Sean F.

    2015-08-01

    The United States' power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power infrastructure control and distribution paradigms by utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Understanding how these systems behave in real-world conditions will lead to new ways to make our power infrastructure more resilient and secure. Demonstrating security in embedded systems is another research area PNNL is tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the aging networks protecting them are becoming easier to attack.

  16. Wireless Sensor Network Security Enhancement Using Directional Antennas: State of the Art and Research Challenges

    PubMed Central

    Curiac, Daniel-Ioan

    2016-01-01

    Being often deployed in remote or hostile environments, wireless sensor networks are vulnerable to various types of security attacks. A possible solution to reduce the security risks is to use directional antennas instead of omnidirectional ones or in conjunction with them. Due to their increased complexity, higher costs and larger sizes, directional antennas are not traditionally used in wireless sensor networks, but recent technology trends may support this method. This paper surveys existing state of the art approaches in the field, offering a broad perspective of the future use of directional antennas in mitigating security risks, together with new challenges and open research issues. PMID:27070601

  17. Wireless Sensor Network Security Enhancement Using Directional Antennas: State of the Art and Research Challenges.

    PubMed

    Curiac, Daniel-Ioan

    2016-01-01

    Being often deployed in remote or hostile environments, wireless sensor networks are vulnerable to various types of security attacks. A possible solution to reduce the security risks is to use directional antennas instead of omnidirectional ones or in conjunction with them. Due to their increased complexity, higher costs and larger sizes, directional antennas are not traditionally used in wireless sensor networks, but recent technology trends may support this method. This paper surveys existing state of the art approaches in the field, offering a broad perspective of the future use of directional antennas in mitigating security risks, together with new challenges and open research issues. PMID:27070601

  18. 78 FR 27276 - Privacy Act; System of Records: Security Records, State-36

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-09

    ... published as 72 FR 73057). The records maintained in State-36, Security Records, capture data related to... Programs and Services, A/GIS/IPS; Department of State, SA-2; 515 22nd Street NW., Washington, DC 20522-8001. FOR FURTHER INFORMATION CONTACT: Director; Office of Information Programs and Services,...

  19. Cryptanalysis of Quantum Secure Direct Communication and Authentication Scheme via Bell States

    NASA Astrophysics Data System (ADS)

    Gao, Fei; Qin, Su-Juan; Guo, Fen-Zhuo; Wen, Qiao-Yan

    2011-02-01

    The security of the quantum secure direct communication (QSDC) and authentication protocol based on Bell states is analyzed. It is shown that an eavesdropper can invalidate the authentication function, and implement a successful man-in-the-middle attack, where he/she can obtain or even modify the transmitted secret without introducing any error. The particular attack strategy is demonstrated and an improved protocol is presented.

  20. 'Known Secure Sensor Measurements' for Critical Infrastructure Systems: Detecting Falsification of System State

    SciTech Connect

    Miles McQueen; Annarita Giani

    2011-09-01

    This paper describes a first investigation on a low cost and low false alarm, reliable mechanism for detecting manipulation of critical physical processes and falsification of system state. We call this novel mechanism Known Secure Sensor Measurements (KSSM). The method moves beyond analysis of network traffic and host based state information, in fact it uses physical measurements of the process being controlled to detect falsification of state. KSSM is intended to be incorporated into the design of new, resilient, cost effective critical infrastructure control systems. It can also be included in incremental upgrades of already in- stalled systems for enhanced resilience. KSSM is based on known secure physical measurements for assessing the likelihood of an attack and will demonstrate a practical approach to creating, transmitting, and using the known secure measurements for detection.

  1. Orthogonal-state-based deterministic secure quantum communication without actual transmission of the message qubits

    NASA Astrophysics Data System (ADS)

    Shukla, Chitra; Pathak, Anirban

    2014-09-01

    Recently, an orthogonal-state-based protocol of direct quantum communication without actual transmission of particles is proposed by Salih et al. (Phys Rev Lett 110:170502, 2013) using chained quantum Zeno effect. The counterfactual condition (claim) of Salih et al. is weakened here to the extent that transmission of particles is allowed, but transmission of the message qubits (the qubits on which the secret information is encoded) is not allowed. Remaining within this weaker (non-counterfactual) condition, an orthogonal-state-based protocol of deterministic secure quantum communication is proposed using entanglement swapping, where actual transmission of the message qubits is not required. Further, it is shown that there exists a large class of quantum states that can be used to implement the proposed protocol. The security of the proposed protocol originates from monogamy of entanglement. As the protocol can be implemented without using conjugate coding, its security is independent of non-commutativity.

  2. The Effect of Secure Attachment State and Infant Facial Expressions on Childless Adults' Parental Motivation.

    PubMed

    Ding, Fangyuan; Zhang, Dajun; Cheng, Gang

    2016-01-01

    This study examined the association between infant facial expressions and parental motivation as well as the interaction between attachment state and expressions. Two-hundred eighteen childless adults (M age = 19.22, 118 males, 100 females) were recruited. Participants completed the Chinese version of the State Adult Attachment Measure and the E-prime test, which comprised three components (a) liking, the specific hedonic experience in reaction to laughing, neutral, and crying infant faces; (b) representational responding, actively seeking infant faces with specific expressions; and (c) evoked responding, actively retaining images of three different infant facial expressions. While the first component refers to the "liking" of infants, the second and third components entail the "wanting" of an infant. Random intercepts multilevel models with emotion nested within participants revealed a significant interaction between secure attachment state and emotion on both liking and representational response. A hierarchical regression analysis was conducted to examine the unique contributions of secure attachment state. Findings demonstrated that, after controlling for sex, anxious, and avoidant, secure attachment state positively predicted parental motivations (liking and wanting) in the neutral and crying conditions, but not the laughing condition. These findings demonstrate the significant role of secure attachment state in parental motivation, specifically when infants display uncertain and negative emotions. PMID:27582724

  3. The Effect of Secure Attachment State and Infant Facial Expressions on Childless Adults’ Parental Motivation

    PubMed Central

    Ding, Fangyuan; Zhang, Dajun; Cheng, Gang

    2016-01-01

    This study examined the association between infant facial expressions and parental motivation as well as the interaction between attachment state and expressions. Two-hundred eighteen childless adults (Mage = 19.22, 118 males, 100 females) were recruited. Participants completed the Chinese version of the State Adult Attachment Measure and the E-prime test, which comprised three components (a) liking, the specific hedonic experience in reaction to laughing, neutral, and crying infant faces; (b) representational responding, actively seeking infant faces with specific expressions; and (c) evoked responding, actively retaining images of three different infant facial expressions. While the first component refers to the “liking” of infants, the second and third components entail the “wanting” of an infant. Random intercepts multilevel models with emotion nested within participants revealed a significant interaction between secure attachment state and emotion on both liking and representational response. A hierarchical regression analysis was conducted to examine the unique contributions of secure attachment state. Findings demonstrated that, after controlling for sex, anxious, and avoidant, secure attachment state positively predicted parental motivations (liking and wanting) in the neutral and crying conditions, but not the laughing condition. These findings demonstrate the significant role of secure attachment state in parental motivation, specifically when infants display uncertain and negative emotions. PMID:27582724

  4. Novel Multiparty Controlled Bidirectional Quantum Secure Direct Communication Based on Continuous-variable States

    NASA Astrophysics Data System (ADS)

    Yu, Zhen-Bo; Gong, Li-Hua; Wen, Ru-Hong

    2016-03-01

    A novel multiparty controlled bidirectional quantum secure direct communication protocol combining continuous-variable states with qubit block transmission is proposed. Two legitimate communication parties encode their own secret information into entangled optical modes with translation operations, and the secret information of each counterpart can only be recovered under the permission of all controllers. Due to continuous-variable states and block transmission strategy, the proposed protocol is easy to realize with perfect qubit efficiency. Security analyses show that the proposed protocol is free from common attacks, including the man-in-the-middle attack.

  5. Information complementarity in multipartite quantum states and security in cryptography

    NASA Astrophysics Data System (ADS)

    Bera, Anindita; Kumar, Asutosh; Rakshit, Debraj; Prabhu, R.; SenDe, Aditi; Sen, Ujjwal

    2016-03-01

    We derive complementarity relations for arbitrary quantum states of multiparty systems of any number of parties and dimensions between the purity of a part of the system and several correlation quantities, including entanglement and other quantum correlations as well as classical and total correlations, of that part with the remainder of the system. We subsequently use such a complementarity relation between purity and quantum mutual information in the tripartite scenario to provide a bound on the secret key rate for individual attacks on a quantum key distribution protocol.

  6. 76 FR 49494 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard DHS/USCG-027...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-10

    ... records titled, ``Department of Homeland Security/United States Coast Guard-027 Recruiting Files System of Records.'' This system of records allows the Department of Homeland Security/United States Coast Guard to...: Marilyn Scott-Perez (202-475-3515), Privacy Officer, United States Coast Guard, 2100 2nd Street, SW.,...

  7. 49 CFR 1546.213 - Access to cargo: Security threat assessments for cargo personnel in the United States.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Access to cargo: Security threat assessments for...: Security threat assessments for cargo personnel in the United States. This section applies in the United...— (1) Each individual must successfully complete a security threat assessment or comparable...

  8. The Iranian petroleum crisis and United States national security

    PubMed Central

    Stern, Roger

    2007-01-01

    The U.S. case against Iran is based on Iran's deceptions regarding nuclear weapons development. This case is buttressed by assertions that a state so petroleum-rich cannot need nuclear power to preserve exports, as Iran claims. The U.S. infers, therefore, that Iran's entire nuclear technology program must pertain to weapons development. However, some industry analysts project an Irani oil export decline [e.g., Clark JR (2005) Oil Gas J 103(18):34–39]. If such a decline is occurring, Iran's claim to need nuclear power could be genuine. Because Iran's government relies on monopoly proceeds from oil exports for most revenue, it could become politically vulnerable if exports decline. Here, we survey the political economy of Irani petroleum for evidence of this decline. We define Iran's export decline rate (edr) as its summed rates of depletion and domestic demand growth, which we find equals 10–12%. We estimate marginal cost per barrel for additions to Irani production capacity, from which we derive the “standstill” investment required to offset edr. We then compare the standstill investment to actual investment, which has been inadequate to offset edr. Even if a relatively optimistic schedule of future capacity addition is met, the ratio of 2011 to 2006 exports will be only 0.40–0.52. A more probable scenario is that, absent some change in Irani policy, this ratio will be 0.33–0.46 with exports declining to zero by 2014–2015. Energy subsidies, hostility to foreign investment, and inefficiencies of its state-planned economy underlie Iran's problem, which has no relation to “peak oil.” PMID:17190820

  9. The Iranian petroleum crisis and United States national security.

    PubMed

    Stern, Roger

    2007-01-01

    The U.S. case against Iran is based on Iran's deceptions regarding nuclear weapons development. This case is buttressed by assertions that a state so petroleum-rich cannot need nuclear power to preserve exports, as Iran claims. The U.S. infers, therefore, that Iran's entire nuclear technology program must pertain to weapons development. However, some industry analysts project an Irani oil export decline [e.g., Clark JR (2005) Oil Gas J 103(18):34-39]. If such a decline is occurring, Iran's claim to need nuclear power could be genuine. Because Iran's government relies on monopoly proceeds from oil exports for most revenue, it could become politically vulnerable if exports decline. Here, we survey the political economy of Irani petroleum for evidence of this decline. We define Iran's export decline rate (edr) as its summed rates of depletion and domestic demand growth, which we find equals 10-12%. We estimate marginal cost per barrel for additions to Irani production capacity, from which we derive the "standstill" investment required to offset edr. We then compare the standstill investment to actual investment, which has been inadequate to offset edr. Even if a relatively optimistic schedule of future capacity addition is met, the ratio of 2011 to 2006 exports will be only 0.40-0.52. A more probable scenario is that, absent some change in Irani policy, this ratio will be 0.33-0.46 with exports declining to zero by 2014-2015. Energy subsidies, hostility to foreign investment, and inefficiencies of its state-planned economy underlie Iran's problem, which has no relation to "peak oil." PMID:17190820

  10. An assessment of the cyber security legislation and its impact on the United States electrical sector

    NASA Astrophysics Data System (ADS)

    Born, Joshua

    The purpose of this research was to examine the cyber-security posture for the United States' electrical grid, which comprises a major component of critical infrastructure for the country. The United States electrical sector is so vast, that the Department of Homeland Security (DHS) estimates, it contains more than 6,413 power plants (this includes 3,273 traditional electric utilities and 1,738 nonutility power producers) with approximately 1,075 gigawatts of energy produced on a daily basis. A targeted cyber-security attack against the electric grid would likely have catastrophic results and could even serve as a precursor to a physical attack against the United States. A recent report by the consulting firm Black and Veatch found that one of the top five greatest concerns for United States electric utilities is the risk that cybersecurity poses to their industry and yet, only one-third state they are currently prepared to meet the increasingly likely threat. The report goes on to state, "only 32% of electric utilities surveyed had integrated security systems with the proper segmentation, monitoring and redundancies needed for cyber threat protection. Another 48 % said they did not" Recent estimates indicate that a large-scale cyber-attack against this sector could cost the United States economy as much as a trillion dollars within a weeks' time. Legislative efforts in the past have primarily been focused on creating mandates that encourage public and private partnership, which have been not been adopted as quickly as desired. With 85 % of all electric utilities being privately owned, it is key that the public and private sector partner in order to mitigate risks and respond as a cohesive unit in the event of a major attack. Keywords: Cybersecurity, Professor Riddell, cyber security, energy, intelligence, outlook, electrical, compliance, legislation, partnerships, critical infrastructure.

  11. Composable Security Proof for Continuous-Variable Quantum Key Distribution with Coherent States

    NASA Astrophysics Data System (ADS)

    Leverrier, Anthony

    2015-02-01

    We give the first composable security proof for continuous-variable quantum key distribution with coherent states against collective attacks. Crucially, in the limit of large blocks the secret key rate converges to the usual value computed from the Holevo bound. Combining our proof with either the de Finetti theorem or the postselection technique then shows the security of the protocol against general attacks, thereby confirming the long-standing conjecture that Gaussian attacks are optimal asymptotically in the composable security framework. We expect that our parameter estimation procedure, which does not rely on any assumption about the quantum state being measured, will find applications elsewhere, for instance, for the reliable quantification of continuous-variable entanglement in finite-size settings.

  12. Robust Anti-Collective Noise Quantum Secure Direct Dialogue Using Logical Bell States

    NASA Astrophysics Data System (ADS)

    Wu, Di; Lv, Hong-Jun; Xie, Guang-Jun

    2016-01-01

    In this paper we propose two quantum secure direct dialogue (QSDD) schemes with logical Bell states which can resist collective noise. The two users Alice and Bob encode their secret messages with the help of unitary operations. Compared with many quantum secure direct communication (QSDC), there is no strict information sender and receiver in these schemes, one logical Bell state can be operated twice by Alice and Bob based on what messages they prefer to encode. As a result, the two users are able to share their messages mutually, so the efficiency of communication is improved. By rearranging the order of particles and inserting decoy photons, our protocols are able to avoid the information leakage and detect eavesdropping, and they can be proved to have unconditional security.

  13. 48 CFR 52.225-26 - Contractors Performing Private Security Functions Outside the United States.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 2 2014-10-01 2014-10-01 false Contractors Performing Private Security Functions Outside the United States. 52.225-26 Section 52.225-26 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION (CONTINUED) CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions...

  14. Can Social Security Explain Trends in Labor Force Participation of Older Men in the United States?

    ERIC Educational Resources Information Center

    Blau, David M.; Goodstein, Ryan M.

    2010-01-01

    After a long decline, the Labor Force Participation Rate (LFPR) of older men in the United States leveled off in the 1980s, and began to increase in the late 1990s. We examine how changes in Social Security rules affected these trends. We attribute only a small portion of the decline from the 1960s-80s to the increasing generosity of Social…

  15. 75 FR 38595 - Guidance to States Regarding Driver History Record Information Security, Continuity of Operation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-02

    ... Federal Motor Carrier Safety Administration Guidance to States Regarding Driver History Record Information... maintaining the security of information contained in the driver history record of commercial driver's license... and disaster recovery planning to ensure the permanence of information contained in the driver...

  16. Practical security analysis of two-way quantum-key-distribution protocols based on nonorthogonal states

    NASA Astrophysics Data System (ADS)

    Henao, C. Ivan; Serra, Roberto M.

    2015-11-01

    Within the broad research scenario of quantum secure communication, two-way quantum key distribution (TWQKD) is a relatively new proposal for sharing secret keys that is not yet fully explored. We analyze the security of TWQKD schemes that use qubits prepared in nonorthogonal states to transmit the key. Investigating protocols that employ an arbitrary number of bases for the channel preparation, we show, in particular, that the security of the LM05 protocol cannot be improved by the use of more than two preparation bases. We also provide an alternative proof of unconditional security for a deterministic TWQKD protocol recently proposed in Beaudry et al., Phys. Rev. A 88, 062302 (2013), 10.1103/PhysRevA.88.062302. In addition, we introduce a deterministic protocol named "TWQKD six-state" and compute an analytical lower bound (which can be tightened) for the maximum amount of information that an eavesdropper could extract in this case. An interesting advantage of our approach to the security analysis of TWQKD is the great simplicity and transparency of the derivations.

  17. Does Secure Password-Based Authenticated Key Exchange against Leakage of Internal States Exist?

    NASA Astrophysics Data System (ADS)

    Yoneyama, Kazuki

    In this paper, we raise a question about existence of secure password-based authenticated key exchange against leakage of internal states (i.e., the passwords and session-specific private information). Toward this question, first, we classify six models of adversary's capabilities about leakage. Next, as a result of considerations for 2-party PAKE, we find two negative answers, but also find a positive answer. More specifically, we show that there exists no scheme which is secure in strong leakage models, but we also show that there exists a scheme which is secure in weak leakage models. Also, we consider the case of 3-party setting which is a special setting of password-based authenticated key exchange, and we find similar impossibilities as 2-party setting.

  18. Social security reform in the twenty-first century: the United States.

    PubMed

    Gramlich, Edward M

    2002-01-01

    The paper reviews the history of the Social Security system in the United States in the twentieth century and discusses options for the twenty-first. Because of the steady aging of the U.S. population and the impending retirement of the large baby boom cohort, the Social Security program now is in long-term actuarial deficit. The standard twentieth century approach to this actuarial deficit would be to raise payroll taxes enough to pay for anticipated future benefit increases, but for several reasons that approach may not be so popular this time around. The author's preferred approach is a gradual trimming of long-term benefit growth, plus "add on" individual accounts to provide new saving, for the economy and for the retirement system. The paper also criticizes proposals for Social Security reform made by President Clinton and a committee appointed by President Bush, generally because these proposals do not provide enough new saving. PMID:12503330

  19. Bidirectional controlled quantum teleportation and secure direct communication using five-qubit entangled state

    NASA Astrophysics Data System (ADS)

    Li, Yuan-hua; Li, Xiao-lan; Sang, Ming-huang; Nie, Yi-you; Wang, Zi-sheng

    2013-12-01

    A scheme is presented to implement bidirectional controlled quantum teleportation (QT) by using a five-qubit entangled state as a quantum channel, where Alice may transmit an arbitrary single qubit state called qubit A to Bob and at the same time, Bob may also transmit an arbitrary single qubit state called qubit B to Alice via the control of the supervisor Charlie. Based on our channel, we explicitly show how the bidirectional controlled QT protocol works. By using this bidirectional controlled teleportation, espcially, a bidirectional controlled quantum secure direct communication (QSDC) protocol, i.e., the so-called controlled quantum dialogue, is further investigated. Under the situation of insuring the security of the quantum channel, Alice (Bob) encodes a secret message directly on a sequence of qubit states and transmits them to Bob (Alice) supervised by Charlie. Especially, the qubits carrying the secret message do not need to be transmitted in quantum channel. At last, we show this QSDC scheme may be determinate and secure.

  20. Comprehensive Test Ban Treaty and its security implications for the United Kingdom and the United States

    SciTech Connect

    Sironi, L.

    1998-12-01

    The United Kingdom has signed and ratified the Comprehensive Test Ban Treaty. The United States signed the treaty in September 1996, and currently the decision on whether to ratify it is pending in the Senate. Key differences reside in the political and objective strategic situations of the United States and the United Kingdom. In the United Kingdom`s parliamentary system a single party (or a coalition) makes decisions. The United States, however, was designed to have a separation of powers, and this insures that the legislative and executive branches have opportunities for discord as well as cooperation. Currently the United Kingdom has operational weapons production facilities, whereas the United States does not. The United Kingdom has only one nuclear weapons program (the Trident missile) to maintain, whereas the United States has multiple delivery systems and warhead types to maintain. The United Kingdom`s nuclear deterrent provides for the country`s security needs, yet the United Kingdom is also covered by US nuclear commitments. Indeed, the United States provides extended deterrence protection for allies and security partners around the world. These responsibilities imply that the implications of the CTBT could be more momentous for the United States than for the United Kingdom.

  1. Countries at Risk: Heightened Human Security Risk to States With Transboundary Water Resources and Instability

    NASA Astrophysics Data System (ADS)

    Veilleux, J. C.; Sullivan, G. S.; Paola, C.; Starget, A.; Watson, J. E.; Hwang, Y. J.; Picucci, J. A.; Choi, C. S.

    2014-12-01

    The Countries at Risk project is a global assessment of countries with transboundary water resources that are at risk for conflict because of high human security instability. Building upon Basins at Risk (BAR) research, our team used updated Transboundary Freshwater Dispute Database georeferenced social and environmental data, quantitative data from global indices, and qualitative data from news media sources. Our assessment considered a combination of analyzing 15 global indices related to water or human security to identify which countries scored as highest risk in each index. From this information, we were able to assess the highest risk countries' human security risk by using a new human security measurement tool, as well as comparing this analysis to the World Bank's Fragile States Index and the experimental Human Security Index. In addition, we identified which countries have the highest number of shared basins, the highest percentage of territory covered by a transboundary basin, and the highest dependency of withdrawal from transboundary waters from outside their country boundaries. By synthesizing these social and environmental data assessments, we identified five countries to analyze as case studies. These five countries are Afghanistan, China, Iraq, Moldova, and Sudan. We created a series of 30 maps to spatial analyze the relationship between the transboundary basins and social and environmental parameters to include population, institutional capacity, and physical geography by country. Finally, we synthesized our spatial analysis, Human Security Key scores, and current events scored by using the BAR scale to determine what aspects and which basins are most at risk with each country in our case studies and how this concerns future global water resources.

  2. United States and environmental security: Deforestation and conflict in southeast Asia. Master's thesis

    SciTech Connect

    Greenwald, P.T.

    1992-06-01

    In the post Cold War era, the East-West conflict may be succeeded by a new confrontation which pits an industrialized North against a developing South. In June 1992, world attention was fixed on the Earth Summit in Rio de Janeiro. This event marked a milestone in global environmental awareness; but just as the end of the Cold War has provided new opportunities for the US, the world is now faced with new sources of conflict which have advanced to the forefront of the national security debate. Among the new sources of conflict, environmental problems are rapidly becoming preeminent. Within national security debates, those environmental problems which respect no international boundary are of particular concern. Worldwide deforestation, and the related issues of global warming and the loss of biodiversity, represent a clear threat to national security. Two percent of the Earth's rainforests are lost each year; one 'football field' is lost each second. Deforestation has already led to conflict and instability within several regions of the world including Southeast Asia. The United States must recognize the character and dynamics of these new sources of conflict in order to successfully realize its policy aims in national security. The US should preempt conflict through cooperation and develop a shared concern for the environment throughout the world. The US military may play a key role in this effort. Rainforest, Deforestation, Tropical timber, Logging, Southeast Asia, Philippines, Malaysia, Indonesia, Thailand, Burma, Laos, Japan Cambodia, Vietnam, Human rights, Plywood, Pulp, Paper, World Bank, U.S. Agency for International Development.

  3. Sun-Burned: Space Weather's Impact on United States National Security

    NASA Astrophysics Data System (ADS)

    Stebbins, B.

    2014-12-01

    The heightened media attention surrounding the 2013-14 solar maximum presented an excellent opportunity to examine the ever-increasing vulnerability of US national security and its Department of Defense to space weather. This vulnerability exists for three principal reasons: 1) a massive US space-based infrastructure; 2) an almost exclusive reliance on an aging and stressed continental US power grid; and 3) a direct dependence upon a US economy adapted to the conveniences of space and uninterrupted power. I tailored my research and work for the national security policy maker and military strategists in an endeavor to initiate and inform a substantive dialogue on America's preparation for, and response to, a major solar event that would severely degrade core national security capabilities, such as military operations. Significant risk to the Department of Defense exists from powerful events that could impact its space-based infrastructure and even the terrestrial power grid. Given this ever-present and increasing risk to the United States, my work advocates raising the issue of space weather and its impacts to the level of a national security threat. With the current solar cycle having already peaked and the next projected solar maximum just a decade away, the government has a relatively small window to make policy decisions that prepare the nation and its Defense Department to mitigate impacts from these potentially catastrophic phenomena.

  4. Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements

    SciTech Connect

    Ondrej Linda; Milos Manic; Miles McQueen

    2012-09-01

    Abstract—This paper presents design and simulation of a low cost and low false alarm rate method for improved cyber-state awareness of critical control systems - the Known Secure Sensor Measurements (KSSM) method. The KSSM concept relies on physical measurements to detect malicious falsification of the control systems state. The KSSM method can be incrementally integrated with already installed control systems for enhanced resilience. This paper reviews the previously developed theoretical KSSM concept and then describes a simulation of the KSSM system. A simulated control system network is integrated with the KSSM components. The effectiveness of detection of various intrusion scenarios is demonstrated on several control system network topologies.

  5. Chaotic synchronization based on nonlinear state-observer and its application in secure communication

    NASA Astrophysics Data System (ADS)

    Chen, Ming-Jie; Li, Dian-Pu; Zhang, Ai-Jun

    2004-06-01

    Chaotic synchronization is a branch of chaotic control. Nowadays, the research and application of chaotic synchronization have become a hot topic and one of the development directions is for the research on chaos. In this paper, a universal nonlinear state-observer is presented for a class of universal chaotic systems to realize the chaotic synchronization, according to the theory of state-observer in the modern control theory. And theoretic analysis and simulation results have illustrated the validity of the approach. Moreover, the approach of synchronization proposed in this paper is very easy, flexible and universal with high synchronization precision. When the approach is applied to secure communication, the results are satisfying.

  6. State Education Department: Security over Pupil Evaluation Program and Program Evaluation Test Materials Needs Improvement. Report 91-S-2.

    ERIC Educational Resources Information Center

    New York State Office of the Comptroller, Albany.

    Findings of an audit of the New York State Education Department's procedures to maintain security over Pupil Evaluation Program (PEP) and Program Evaluation Test (PET) examination materials are presented in this report. The audit sought to determine whether the department's security procedures adequately prevented unauthorized access to exam…

  7. 12 CFR 208.34 - Recordkeeping and confirmation of certain securities transactions effected by State member banks.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... securities exchanges, or for which quotations are disseminated though an automated quotation system operated..., automated, or electronic form provided the records are easily retrievable, readily available for inspection... States unless otherwise agreed to by the parties at the time of the transaction. (g) Securities...

  8. 12 CFR 208.34 - Recordkeeping and confirmation of certain securities transactions effected by State member banks.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... securities exchanges, or for which quotations are disseminated though an automated quotation system operated..., automated, or electronic form provided the records are easily retrievable, readily available for inspection... States unless otherwise agreed to by the parties at the time of the transaction. (g) Securities...

  9. 12 CFR 362.8 - Restrictions on activities of insured state nonmember banks affiliated with certain securities...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... with any securities underwriting affiliate company that directly engages in the public sale... permissible for a national bank directly, unless the company is controlled by an entity that is supervised by... chapter, or the state nonmember bank and the securities underwriting affiliate company comply with...

  10. Science and the Energy Security Challenge: The Example of Solid-State Lighting

    ScienceCinema

    Philips, Julia [Sandia

    2010-01-08

    Securing a viable, carbon neutral energy future for humankind will require an effort of gargantuan proportions. As outlined clearly in a series of workshops sponsored by the DOE Office of Basic Energy Sciences (http://www.sc.doe.gov/bes/reports/list.html), fundamental advances in scientific understanding are needed to broadly implement many of the technologies that are held out as promising options to meet future energy needs, ranging from solar energy, to nuclear energy, to approaches to clean combustion. Using solid state lighting based on inorganic materials as an example, I will discuss some recent results and new directions, emphasizing the multidisciplinary, team nature of the endeavor. I will also offer some thoughts about how to encourage translation of the science into attractive, widely available products ? a significant challenge that cannot be ignored. This case study offers insight into approaches that are likely to be beneficial for addressing other aspects of the energy security challenge.

  11. Secure Quantum Private Comparison of Equality Based on Asymmetric W State

    NASA Astrophysics Data System (ADS)

    Liu, Wen-Jie; Liu, Chao; Wang, Hai-bin; Liu, Jing-Fa; Wang, Fang; Yuan, Xiao-Min

    2014-06-01

    Recently, Liu et al. (Opt. Commun. 284:3160, 2011) proposed a protocol for quantum private comparison of equality (QPCE) based on symmetric W state. However, Li et al. (Eur. Phys. J. D 66:110, 2012) pointed out that there is a flaw of information leak, and they proposed a new protocol based on EPR pairs. While examining these two protocols, we find that there exists a same flaw: the third party (TP) can know the comparison result. In this paper, through introducing and constructing a special class of asymmetric W state, a secure QPCE protocol based on this asymmetric W state is presented. Analysis shows the present protocol can not only effectively avoid the information leak found by Li et al., but also ensure TP would not get any information about the comparison result.

  12. A Secure Key Distribution System of Quantum Cryptography Based on the Coherent State

    NASA Technical Reports Server (NTRS)

    Guo, Guang-Can; Zhang, Xiao-Yu

    1996-01-01

    The cryptographic communication has a lot of important applications, particularly in the magnificent prospects of private communication. As one knows, the security of cryptographic channel depends crucially on the secrecy of the key. The Vernam cipher is the only cipher system which has guaranteed security. In that system the key must be as long as the message and most be used only once. Quantum cryptography is a method whereby key secrecy can be guaranteed by a physical law. So it is impossible, even in principle, to eavesdrop on such channels. Quantum cryptography has been developed in recent years. Up to now, many schemes of quantum cryptography have been proposed. Now one of the main problems in this field is how to increase transmission distance. In order to use quantum nature of light, up to now proposed schemes all use very dim light pulses. The average photon number is about 0.1. Because of the loss of the optical fiber, it is difficult for the quantum cryptography based on one photon level or on dim light to realize quantum key-distribution over long distance. A quantum key distribution based on coherent state is introduced in this paper. Here we discuss the feasibility and security of this scheme.

  13. Field test of a practical secure communication network with decoy-state quantum cryptography.

    PubMed

    Chen, Teng-Yun; Liang, Hao; Liu, Yang; Cai, Wen-Qi; Ju, Lei; Liu, Wei-Yue; Wang, Jian; Yin, Hao; Chen, Kai; Chen, Zeng-Bing; Peng, Cheng-Zhi; Pan, Jian-Wei

    2009-04-13

    We present a secure network communication system that operated with decoy-state quantum cryptography in a real-world application scenario. The full key exchange and application protocols were performed in real time among three nodes, in which two adjacent nodes were connected by approximate 20 km of commercial telecom optical fiber. The generated quantum keys were immediately employed and demonstrated for communication applications, including unbreakable real-time voice telephone between any two of the three communication nodes, or a broadcast from one node to the other two nodes by using one-time pad encryption. PMID:19365479

  14. State Regulatory Authority (SRA) Coordination of Safety, Security, and Safeguards of Nuclear Facilities: A Framework for Analysis

    SciTech Connect

    Mladineo, Stephen V.; Frazar, Sarah L.; Kurzrok, Andrew J.; Martikka, Elina; Hack, Tapani; Wiander, Timo

    2013-05-30

    This paper will explore the development of a framework for conducting an assessment of safety-security-safeguards integration within a State. The goal is to examine State regulatory structures to identify conflicts and gaps that hinder management of the three disciplines at nuclear facilities. Such an analysis could be performed by a State Regulatory Authority (SRA) to provide a self-assessment or as part of technical cooperation with either a newcomer State, or to a State with a fully developed SRA.

  15. Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources

    PubMed Central

    Song, Ting-Ting; Qin, Su-Juan; Wen, Qiao-Yan; Wang, Yu-Kun; Jia, Heng-Yue

    2015-01-01

    In quantum communication, passive decoy-state QKD protocols can eliminate many side channels, but the protocols without any finite-key analyses are not suitable for in practice. The finite-key securities of passive decoy-state (PDS) QKD protocols with two different unstable sources, type-II parametric down-convention (PDC) and phase randomized weak coherent pulses (WCPs), are analyzed in our paper. According to the PDS QKD protocols, we establish an optimizing programming respectively and obtain the lower bounds of finite-key rates. Under some reasonable values of quantum setup parameters, the lower bounds of finite-key rates are simulated. The simulation results show that at different transmission distances, the affections of different fluctuations on key rates are different. Moreover, the PDS QKD protocol with an unstable PDC source can resist more intensity fluctuations and more statistical fluctuation. PMID:26471947

  16. Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources.

    PubMed

    Song, Ting-Ting; Qin, Su-Juan; Wen, Qiao-Yan; Wang, Yu-Kun; Jia, Heng-Yue

    2015-01-01

    In quantum communication, passive decoy-state QKD protocols can eliminate many side channels, but the protocols without any finite-key analyses are not suitable for in practice. The finite-key securities of passive decoy-state (PDS) QKD protocols with two different unstable sources, type-II parametric down-convention (PDC) and phase randomized weak coherent pulses (WCPs), are analyzed in our paper. According to the PDS QKD protocols, we establish an optimizing programming respectively and obtain the lower bounds of finite-key rates. Under some reasonable values of quantum setup parameters, the lower bounds of finite-key rates are simulated. The simulation results show that at different transmission distances, the affections of different fluctuations on key rates are different. Moreover, the PDS QKD protocol with an unstable PDC source can resist more intensity fluctuations and more statistical fluctuation. PMID:26471947

  17. 22 CFR 41.2 - Exemption or waiver by Secretary of State and Secretary of Homeland Security of passport and/or...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Secretary of Homeland Security of passport and/or visa requirements for certain categories of nonimmigrants... Nonimmigrants § 41.2 Exemption or waiver by Secretary of State and Secretary of Homeland Security of passport... Secretary of State and the Secretary of Homeland Security under the INA, as amended, a passport and/or...

  18. 76 FR 28795 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-024 Auxiliary...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-18

    ... titled, ``Department of Homeland Security/United States Coast Guard-024 Auxiliary Database (AUXDATA... Coast Guard to track and report contact, activity, performance, and achievement information about the members of its volunteer workforce element, the United States Coast Guard Auxiliary. As a result of...

  19. 12 CFR 208.34 - Recordkeeping and confirmation of certain securities transactions effected by State member banks.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 2 2011-01-01 2011-01-01 false Recordkeeping and confirmation of certain securities transactions effected by State member banks. 208.34 Section 208.34 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM MEMBERSHIP OF STATE BANKING INSTITUTIONS IN THE FEDERAL RESERVE SYSTEM (REGULATION...

  20. 78 FR 13931 - Delegation by the Secretary of State to the Assistant Secretary for International Security and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-01

    ... From the Federal Register Online via the Government Publishing Office ] DEPARTMENT OF STATE Delegation by the Secretary of State to the Assistant Secretary for International Security and Nonproliferation of Authority To Submit Certain Matters to Congress Regarding Implementation of the Additional Protocol By virtue of the authority vested in...

  1. Household Food Security in the United States, 1999. Measuring Food Security in the United States. Food Assistance and Nutrition Research Report No. 8.

    ERIC Educational Resources Information Center

    Andrews, Margaret; Nord, Mark; Bickel, Gary; Carlson, Steven

    This report provides the most recent data on the food security of U.S. households. Preliminary estimates indicate that 89.9% of U.S. households were food secure in 1999, up 0.6 percentage points from 1995. Some 31 million Americans were food insecure: they did not have assured access at all times to enough food for an active, healthy life. In 3%…

  2. Security Analysis of an Arbitrated Quantum Signature Scheme with Bell States

    NASA Astrophysics Data System (ADS)

    Xu, Guoliang; Zou, Xiangfu

    2016-05-01

    Recently, to resist attacks using the anticommutativity of nontrivial Pauli operators, an arbitrated quantum signature scheme with Bell states (Int. J. Theor. Phys. 53(5), 1569-1579 2014) was proposed. The scheme randomly adds Hadamard operations to strengthen the quantum one-time pad encryption. Based on this, it claimed that the scheme could resist the receiver's existential forgery and no party had chances to change the message without being discovered. This paper introduces two security issues of the scheme: It can't resist the signer's disavowal and the receiver's existential forgery. Furthermore, we show that the scheme is still vulnerable to the receiver's existential forgery even if the Hadamard operation in the encryption algorithm is replaced with any 2nd-order unitary operation.

  3. Security Analysis of an Arbitrated Quantum Signature Scheme with Bell States

    NASA Astrophysics Data System (ADS)

    Xu, Guoliang; Zou, Xiangfu

    2016-09-01

    Recently, to resist attacks using the anticommutativity of nontrivial Pauli operators, an arbitrated quantum signature scheme with Bell states (Int. J. Theor. Phys. 53(5), 1569-1579 2014) was proposed. The scheme randomly adds Hadamard operations to strengthen the quantum one-time pad encryption. Based on this, it claimed that the scheme could resist the receiver's existential forgery and no party had chances to change the message without being discovered. This paper introduces two security issues of the scheme: It can't resist the signer's disavowal and the receiver's existential forgery. Furthermore, we show that the scheme is still vulnerable to the receiver's existential forgery even if the Hadamard operation in the encryption algorithm is replaced with any 2nd-order unitary operation.

  4. Midwives as drivers of reproductive health commodity security in Kaduna State, Nigeria

    PubMed Central

    Alayande, Audu; Mamman-Daura, Fatima; Adedeji, Olanike; Muhammad, Ado Zakari

    2016-01-01

    Abstract Objectives: The significant improvement in the contraceptive prevalence rate in Kaduna State, Nigeria, from 8.4% in 2008 to 18.5% in 2013 is a notable achievement. This article analyses the role of midwives as drivers of reproductive health commodity security (RHCS) and their impact on contraceptive use in Kaduna State. Methods: The United Nations Population Fund (UNFPA) supported the bimonthly review resupply meetings facilitated by midwives at State and local government area (LGA) levels. The midwives deliver contraception to the LGAs for onward distribution to 6974 of the 25,000 health facilities across the country according to usage data from the previous 2 months. They also collect requisition, issue and resupply form data from the previous 2 months. Results: The active participation of midwives at the bimonthly meetings improved data timeliness by 23% and data completeness by 50% in 1 year. Only one health facility ran out of intrauterine devices and only 17% reported running out of female condoms. The total number of contraceptives issued increased from 31,866 in 2012 to 177,828 in 2013, resulting in a couple–year protection increase from 3408 in 2012 to 102,207 in 2013. Conclusions: Creation of increased demand and engagement of midwives in providing family planning services, especially long-acting contraceptive methods, coupled with the removal of cost to the user and the strengthening of the supply chain have been major factors in more than doubling the contraceptive prevalence rate. PMID:26909871

  5. State-society relations and electricity infrastructure: Negotiating national energy security in Sri Lanka

    NASA Astrophysics Data System (ADS)

    Caron, Cynthia Marie

    In this dissertation, I use electricity production and distribution and grid expansion as a lens to view and understand state-society relations. After discussing how electricity has resource-like characteristics and institutional characteristics as a field of organization, I examine how groups in society interact with state officials and their corresponding institutions over electricity production and distribution and the pursuit of national energy security. Taking Sri Lanka as the focus of my inquiry, I conducted a qualitative research project to: (1) identify how class, ethnicity, and locality (urban or rural location) are constitutive of and constituted by electricity-infrastructure development and grid expansion initiatives; (2) identify how grid expansion contributes to processes of social inclusion and exclusion by reconstituting on-grid and off-grid populations, and; (3) determine the effects of privatization and environmental regulation on relationships between the state and groups in society. The methodological approaches include analyses of open-ended interviews, participant observation, surveys of government documents, and speeches and sermons delivered at protests against power-plant sitings to examine how groups in society engage the state as a social force. The study finds that privatization occurring in Sri Lanka's energy sector may have the effect of maintaining exclusion from electricity access rather than increasing access to electricity as the neoliberal paradigm asserts. Environmental regulations enable groups in society to include their concerns into the development process and to challenge state decision making that have been made on their behalf by the Ceylon Electricity Board (CEB). The research suggests that class, ethnic, and rural-urban relations are constitutive factors in electricity production and distribution that complement foci on the technical and economic dimensions of electricity-infrastructure planning.

  6. Deterministic Secure Quantum Communication and Authentication Protocol based on Extended GHZ-W State and Quantum One-time Pad

    NASA Astrophysics Data System (ADS)

    Li, Na; Li, Jian; Li, Lei-Lei; Wang, Zheng; Wang, Tao

    2016-04-01

    A deterministic secure quantum communication and authentication protocol based on extended GHZ-W state and quantum one-time pad is proposed. In the protocol, state |φ -> is used as the carrier. One photon of |φ -> state is sent to Alice, and Alice obtains a random key by measuring photons with bases determined by ID. The information of bases is secret to others except Alice and Bob. Extended GHZ-W states are used as decoy photons, the positions of which in information sequence are encoded with identity string ID of the legal user, and the eavesdropping detection rate reaches 81%. The eavesdropping detection based on extended GHZ-W state combines with authentication and the secret ID ensures the security of the protocol.

  7. Deterministic Secure Quantum Communication and Authentication Protocol based on Extended GHZ-W State and Quantum One-time Pad

    NASA Astrophysics Data System (ADS)

    Li, Na; Li, Jian; Li, Lei-Lei; Wang, Zheng; Wang, Tao

    2016-08-01

    A deterministic secure quantum communication and authentication protocol based on extended GHZ-W state and quantum one-time pad is proposed. In the protocol, state | φ -> is used as the carrier. One photon of | φ -> state is sent to Alice, and Alice obtains a random key by measuring photons with bases determined by ID. The information of bases is secret to others except Alice and Bob. Extended GHZ-W states are used as decoy photons, the positions of which in information sequence are encoded with identity string ID of the legal user, and the eavesdropping detection rate reaches 81%. The eavesdropping detection based on extended GHZ-W state combines with authentication and the secret ID ensures the security of the protocol.

  8. Compact, diode-pumped, solid-state lasers for next generation defence and security sensors

    NASA Astrophysics Data System (ADS)

    Silver, M.; Lee, S. T.; Borthwick, A.; McRae, I.; Jackson, D.; Alexander, W.

    2015-06-01

    Low-cost semiconductor laser diode pump sources have made a dramatic impact in sectors such as advanced manufacturing. They are now disrupting other sectors, such as defence and security (D&S), where Thales UK is a manufacturer of sensor systems for application on land, sea, air and man portable. In this talk, we will first give an overview of the market trends and challenges in the D&S sector. Then we will illustrate how low cost pump diodes are enabling new directions in D&S sensors, by describing two diode pumped, solid- state laser products currently under development at Thales UK. The first is a new generation of Laser Target Designators (LTD) that are used to identify targets for the secure guiding of munitions. Current systems are bulky, expensive and require large battery packs to operate. The advent of low cost diode technology, merged with our novel solid-state laser design, has created a designator that will be the smallest, lowest cost, STANAG compatible laser designator on the market. The LTD delivers greater that 50mJ per pulse up to 20Hz, and has compact dimensions of 125×70×55mm. Secondly, we describe an ultra-compact, eye-safe, solid-state laser rangefinder (LRF) with reduced size, weight and power consumption compared to existing products. The LRF measures 100×55×34mm, weighs 200g, and can range to greater than 10km with a single laser shot and at a reprate of 1Hz. This also leverages off advances in laser pump diodes, but also utilises low cost, high reliability, packaging technology commonly found in the telecoms sector. As is common in the D&S sector, the products are designed to work in extreme environments, such as wide temperature range (-40 to +71°C) and high levels of shock and vibration. These disruptive products enable next- generation laser sensors such as rangefinders, target designators and active illuminated imagers.

  9. Security of two quantum cryptography protocols using the same four qubit states

    SciTech Connect

    Branciard, Cyril; Gisin, Nicolas; Kraus, Barbara; Scarani, Valerio

    2005-09-15

    The first quantum cryptography protocol, proposed by Bennett and Brassard in 1984 (BB84), has been widely studied in recent years. This protocol uses four states (more precisely, two complementary bases) for the encoding of the classical bit. Recently, it has been noticed that by using the same four states, but a different encoding of information, one can define a protocol which is more robust in practical implementations, specifically when attenuated laser pulses are used instead of single-photon sources [V. Scarani et al., Phys. Rev. Lett. 92, 057901 (2004), referred to as the SARG04 protocol]. We present a detailed study of SARG04 in two different regimes. In the first part, we consider an implementation with a single-photon source: we derive bounds on the error rate Q for security against all possible attacks by the eavesdropper. The lower and the upper bound obtained for SARG04 (Q < or approx. 10.95% and Q > or approx. 14.9%, respectively) are close to those obtained for BB84 (Q < or approx. 12.4% and Q > or approx. 14.6%, respectively). In the second part, we consider a realistic source consisting of an attenuated laser and improve on previous analysis by allowing Alice to optimize the mean number of photons as a function of the distance. The SARG04 protocol is found to perform better than BB84, both in secret-key rate and in maximal achievable distance, for a wide class of Eve's attacks.

  10. Technical cooperation on nuclear security between the United States and China : review of the past and opportunities for the future.

    SciTech Connect

    Pregenzer, Arian Leigh

    2011-12-01

    The United States and China are committed to cooperation to address the challenges of the next century. Technical cooperation, building on a long tradition of technical exchange between the two countries, can play an important role. This paper focuses on technical cooperation between the United States and China in the areas of nonproliferation, arms control and other nuclear security topics. It reviews cooperation during the 1990s on nonproliferation and arms control under the U.S.-China Arms Control Exchange, discusses examples of ongoing activities under the Peaceful Uses of Technology Agreement to enhance security of nuclear and radiological material, and suggests opportunities for expanding technical cooperation between the defense nuclear laboratories of both countries to address a broader range of nuclear security topics.

  11. Robust quantum secure direct communication and authentication protocol against decoherence noise based on six-qubit DF state

    NASA Astrophysics Data System (ADS)

    Chang, Yan; Zhang, Shi-Bin; Yan, Li-Li; Han, Gui-Hua

    2015-05-01

    By using six-qubit decoherence-free (DF) states as quantum carriers and decoy states, a robust quantum secure direct communication and authentication (QSDCA) protocol against decoherence noise is proposed. Four six-qubit DF states are used in the process of secret transmission, however only the |0‧⟩ state is prepared. The other three six-qubit DF states can be obtained by permuting the outputs of the setup for |0‧⟩. By using the |0‧⟩ state as the decoy state, the detection rate and the qubit error rate reach 81.3%, and they will not change with the noise level. The stability and security are much higher than those of the ping-pong protocol both in an ideal scenario and a decoherence noise scenario. Even if the eavesdropper measures several qubits, exploiting the coherent relationship between these qubits, she can gain one bit of secret information with probability 0.042. Project supported by the National Natural Science Foundation of China (Grant No. 61402058), the Science and Technology Support Project of Sichuan Province of China (Grant No. 2013GZX0137), the Fund for Young Persons Project of Sichuan Province of China (Grant No. 12ZB017), and the Foundation of Cyberspace Security Key Laboratory of Sichuan Higher Education Institutions, China (Grant No. szjj2014-074).

  12. Development and Validation of Mechanical Engineering Trade Skills Assessment Instrument for Sustainable Job Security in Yobe State

    ERIC Educational Resources Information Center

    Adamu, Gishua Garba; Dawha, Josphine Musa; Kamar, Tiamiyu Salihu

    2015-01-01

    Mechanical Engineering Trade Skills Assessment Instrument (METSAI) is aimed at determining the extent to which students have acquired practical skills before graduation that will enable them get employment for sustainable job security in Yobe state. The study employed instrumentation research design. The populations of the study were 23 mechanical…

  13. Manufacturing Accomplices: ICT Use in Securing the Safety State at Airports

    NASA Astrophysics Data System (ADS)

    Østerlie, Thomas; Asak, Ole Martin; Pettersen, Ole Georg; Tronhus, Håvard

    Based on a study of ICT use at an airport security checkpoint, this paper explores a possible explanation to the paradox that travelers find existing airport security measures inadequate while at the same time believing air travel to be sufficiently secure. We pursue this explanation by showing that, for the security checkpoint to function properly in relation to the overall function of the airport, travelers have to be enrolled in a particular program of action. They are then locked into this program through sanctions. Travelers are forced into participating in a system many of them find ethically and morally objectionable. Yet, active participation makes it difficult for them to object to the moral and ethical issues of their actions without damning themselves. Our explanation of the security paradox is, therefore, that while travelers remain critical of airport security, they avoid damning themselves by criticizing the system in terms of its own logic. They have been made accomplices.

  14. Hydrometeorological Extremes and Food Security: Lessons from the 2011 and 2012 harvests in the United States

    NASA Astrophysics Data System (ADS)

    Lobell, D. B.; Roberts, M.; Schlenker, W.

    2012-12-01

    The United States is both a major global producer of grain and a relatively variable production region. As such, it is an important driver of volatility in global food supply and food prices, which in turn affects food security in many regions. This fact was underscored by the 2012 season, in which a major drought caused production losses, which in turn led to international price increases. However, 2011 also was unusually hot and thus a good illustration of many of the issues surrounding climate change. This paper will discuss progress in modeling the impacts of extreme heat and drought on U.S. corn production, which comes from a combination of empirical and process-based approaches. One important lesson is that drought from the perspective of corn is different than traditional measures of drought, and in particular extreme heat plays a more direct role via effects on vapor pressure deficit. Implications for future impacts, interactions with carbon dioxide, and potential adaptation strategies will be discussed.

  15. Graph oriented algorithm for the steady-state security enhancement in distribution networks

    SciTech Connect

    Stankovic, A.M.; Calovic, M.S.

    1989-01-01

    This paper considers the problem of the steady-state security enhancement of radial distribution networks after structural disturbances causing violations of imposed operating limits. Corrective actions used for relief of violations are of switching operations type. The paper describes the development of a graph-oriented control algorithm, based on the linearized system model, where the synthesis of corrective controls is formulated as a combinatorial problem of mixed-integer programming. A heuristic algorithm is suggested as a solution of the problem. The fact that all disturbances, as well as corrective control actions are topological in this case, makes the application of graph representation the natural way of describing the system, having both algorithmic (backtracking logic) and computer implementation consequences (CPU time and memory requirements). The feasibility of the algorithm is tested on the examples of real medium-voltage distribution networks; one of them is of urban, underground-cable type, the other is of suburban, overhead-line type. Results have shown good properties of the proposed approach and its suitability for the solution of practical corrective control problems.

  16. Sliding Mode Approaches for Robust Control, State Estimation, Secure Communication, and Fault Diagnosis in Nuclear Systems

    NASA Astrophysics Data System (ADS)

    Ablay, Gunyaz

    Using traditional control methods for controller design, parameter estimation and fault diagnosis may lead to poor results with nuclear systems in practice because of approximations and uncertainties in the system models used, possibly resulting in unexpected plant unavailability. This experience has led to an interest in development of robust control, estimation and fault diagnosis methods. One particularly robust approach is the sliding mode control methodology. Sliding mode approaches have been of great interest and importance in industry and engineering in the recent decades due to their potential for producing economic, safe and reliable designs. In order to utilize these advantages, sliding mode approaches are implemented for robust control, state estimation, secure communication and fault diagnosis in nuclear plant systems. In addition, a sliding mode output observer is developed for fault diagnosis in dynamical systems. To validate the effectiveness of the methodologies, several nuclear plant system models are considered for applications, including point reactor kinetics, xenon concentration dynamics, an uncertain pressurizer model, a U-tube steam generator model and a coupled nonlinear nuclear reactor model.

  17. Household food security and hunger in rural and urban communities in the Free State Province, South Africa.

    PubMed

    Walsh, Corinna M; van Rooyen, Francois C

    2015-01-01

    Household food security impacts heavily on quality of life. We determined factors associated with food insecurity in 886 households in rural and urban Free State Province, South Africa. Significantly more urban than rural households reported current food shortage (81% and 47%, respectively). Predictors of food security included vegetable production in rural areas and keeping food for future use in urban households. Microwave oven ownership was negatively associated with food insecurity in urban households and using a primus or paraffin stove positively associated with food insecurity in rural households. Interventions to improve food availability and access should be emphasized. PMID:25551521

  18. Comment on “Controlled DSQC using five-qubit entangled states and two-step security test”

    NASA Astrophysics Data System (ADS)

    Qin, Su-Juan; Wen, Qiao-Yan; Meng, Luo-Ming; Zhu, Fu-Chen

    2009-07-01

    A controlled deterministic secure quantum communication protocol [X.M. Xiu, L. Dong, Y.J. Cao, F. Chi, Opt. Commun. 282 (2009) 333] with five-qubit entangled states was proposed recently. The aim of Xiu et al. was that the successful realization of communication between Alice and Bob needed the cooperation of a controller, Charlie. However, we show that the controller Charlie's role could be excluded unknowingly. Moreover, an eavesdropper can entangle an ancilla without introducing any error in the first security test and then she can distill a quarter of the secret messages from her entangled ancilla.

  19. 48 CFR 52.225-26 - Contractors Performing Private Security Functions Outside the United States.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... background checks), and security requirements established by 32 CFR part 159, Private Security Contractors... contract comply with 32 CFR part 159, and with any orders, directives, and instructions to Contractors... CFR part 159. Such action may be taken at the Government's discretion without prejudice to its...

  20. 76 FR 78085 - Permissible Investments for Federal and State Savings Associations: Corporate Debt Securities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-15

    ...The FDIC is seeking public comment to amend the FDIC's regulations in accordance with the requirements of Federal Deposit Insurance Act (FDI Act). Specifically, to prohibit any insured savings association from acquiring and retaining a corporate debt security unless it determines, prior to acquiring such security and periodically thereafter, that the issuer has adequate capacity to meet all......

  1. Security of a two-parameter quantum cryptography system using time-shifted states against photon-number splitting attacks

    NASA Astrophysics Data System (ADS)

    Kronberg, D. A.; Molotkov, S. N.

    2009-10-01

    A new family of two-parameter quantum key distribution protocols is discussed where eavesdropping is detected by using two parameters: bit error rate Q and photon count rate q in control time slots. When a single-photon source is used and mutually orthogonal states are prepared in each basis, the protocol’s maximum tolerable error rate for secure key distribution is the highest, reaching a theoretical upper limit of 50%. When the signal states emitted by the source of attenuated laser light include multiphoton coherent states, the protocol also guarantees secure key distribution over the longest distance as compared to other quantum cryptography systems, up to the channel length for which the channel losses are sufficiently high that all five-photon pulses can be blocked by an eavesdropper.

  2. Secure Quantum Private Comparison Protocol Based on the Entanglement Swapping Between Three-Particle W-Class State and Bell State

    NASA Astrophysics Data System (ADS)

    Li, Jian; Jia, Lu; Zhou, Hong-Fu; Zhang, Ting-Ting

    2016-03-01

    We propose a new quantum private comparison protocol with the help of a semi-honest third party (TP), enabling two participants to compare the equality of their private inputs without exposing any information about their respective private inputs. Different from previous protocols, our protocol utilizes the properties of entanglement swapping between three-particle W-Class state and Bell state. The presented protocol can ensure correctness, fairness and security. Meanwhile, all the quantum particles undergo a one-way transmission, and all the participants including TP are just required having the ability to perform Bell-state measurement and exclusive-or operation which make our protocol more feasible and efficient. At last, the security of this protocol with respect to various kinds of attacks is analyzed in detail.

  3. Upper bounds for the security of differential-phase-shift quantum key distribution with weak coherent states

    NASA Astrophysics Data System (ADS)

    Curty, Marcos; Tamaki, Kiyoshi; Moroder, Tobias; Gómez-Sousa, Hipólito

    2009-04-01

    In this paper we present limitations imposed by sequential attacks on the maximal distance achievable by a differential-phase-shift (DPS) quantum key distribution (QKD) protocol with weak coherent pulses. Specifically, we compare the performance of two possible sequential attacks against DPS QKD where Eve realizes, respectively, optimal unambiguous state discrimination of Alice's signal states, and optimal unambiguous discrimination of the relative phases between consecutive signal states. We show that the second eavesdropping strategy provides tighter upper bounds for the security of a DPS QKD scheme than the former one.

  4. Geothermal heating retrofit at the Utah State Prison Minimum Security Facility. Final report, March 1979-January 1986

    SciTech Connect

    Not Available

    1986-01-01

    This report is a summary of progress and results of the Utah State Prison Geothermal Space Heating Project. Initiated in 1978 by the Utah State Energy Office and developed with assistance from DOE's Division of Geothermal and Hydropower Technologies PON program, final construction was completed in 1984. The completed system provides space and water heating for the State Prison's Minimum Security Facility. It consists of an artesian flowing geothermal well, plate heat exchangers, and underground distribution pipeline that connects to the existing hydronic heating system in the State Prison's Minimum Security Facility. Geothermal water disposal consists of a gravity drain line carrying spent geothermal water to a cooling pond which discharges into the Jordan River, approximately one mile from the well site. The system has been in operation for two years with mixed results. Continuing operation and maintenance problems have reduced the expected seasonal operation from 9 months per year to 3 months. Problems with the Minimum Security heating system have reduced the expected energy contribution by approximately 60%. To date the system has saved the prison approximately $18,060. The total expenditure including resource assessment and development, design, construction, performance verification, and reporting is approximately $827,558.

  5. Security for grids

    SciTech Connect

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  6. Secure and robust transmission and verification of unknown quantum states in Minkowski space.

    PubMed

    Kent, Adrian; Massar, Serge; Silman, Jonathan

    2014-01-01

    An important class of cryptographic applications of relativistic quantum information work as follows. B generates a random qudit and supplies it to A at point P. A is supposed to transmit it at near light speed c to to one of a number of possible pairwise spacelike separated points Q1, …, Qn. A's transmission is supposed to be secure, in the sense that B cannot tell in advance which Qj will be chosen. This poses significant practical challenges, since secure reliable long-range transmission of quantum data at speeds near to c is presently not easy. Here we propose different techniques to overcome these diffculties. We introduce protocols that allow secure long-range implementations even when both parties control only widely separated laboratories of small size. In particular we introduce a protocol in which A needs send the qudit only over a short distance, and securely transmits classical information (for instance using a one time pad) over the remaining distance. We further show that by using parallel implementations of the protocols security can be maintained in the presence of moderate amounts of losses and errors. PMID:24469425

  7. Secure and Robust Transmission and Verification of Unknown Quantum States in Minkowski Space

    PubMed Central

    Kent, Adrian; Massar, Serge; Silman, Jonathan

    2014-01-01

    An important class of cryptographic applications of relativistic quantum information work as follows. B generates a random qudit and supplies it to A at point P. A is supposed to transmit it at near light speed c to to one of a number of possible pairwise spacelike separated points Q1, …, Qn. A's transmission is supposed to be secure, in the sense that B cannot tell in advance which Qj will be chosen. This poses significant practical challenges, since secure reliable long-range transmission of quantum data at speeds near to c is presently not easy. Here we propose different techniques to overcome these diffculties. We introduce protocols that allow secure long-range implementations even when both parties control only widely separated laboratories of small size. In particular we introduce a protocol in which A needs send the qudit only over a short distance, and securely transmits classical information (for instance using a one time pad) over the remaining distance. We further show that by using parallel implementations of the protocols security can be maintained in the presence of moderate amounts of losses and errors. PMID:24469425

  8. United States security strategy for the East Asia-Pacific region

    SciTech Connect

    1998-12-31

    The three years since release of the last East Asia Strategy Report (EASR) have produced important development in the security environment of the Asia-Pacific region. The 1998 EASR outlines a multifaceted regional security strategy, including: maintenance of comprehensive US engagement, including not only the presence of approximately 100,000 US military personnel in Asia but also a variety of other public and private interaction with the region; continued enhancement of the alliance relationships with Japan, Korea, Australia, Thailand and the Philippines; comprehensive engagement with China to build the foundation for a long-term relationship based on cooperation and mutual interest; broadening of cooperation with the nations of Southeast Asia on security and confidence building; expansion of regional cooperation with Russia; support for the development of security pluralism, including expansion of multilateral, minilateral and bilateral dialogue in the region; promotion of democracy; stemming and countering proliferation of weapons of mass destruction (WMD): and increased attention to terrorism, environmental degradation, emerging infectious diseases, drug trafficking and other transnational challenges as critical elements of `comprehensive security.`

  9. An evaluation of security measures implemented to address physical threats to water infrastructure in the state of Mississippi.

    PubMed

    Barrett, Jason R; French, P Edward

    2013-01-01

    The events of September 11, 2001, increased and intensified domestic preparedness efforts in the United States against terrorism and other threats. The heightened focus on protecting this nation's critical infrastructure included legislation requiring implementation of extensive new security measures to better defend water supply systems against physical, chemical/biological, and cyber attacks. In response, municipal officials have implemented numerous safeguards to reduce the vulnerability of these systems to purposeful intrusions including ongoing vulnerability assessments, extensive personnel training, and highly detailed emergency response and communication plans. This study evaluates fiscal year 2010 annual compliance assessments of public water systems with security measures that were implemented by Mississippi's Department of Health as a response to federal requirements to address these potential terrorist threats to water distribution systems. The results show that 20 percent of the water systems in this state had at least one security violation on their 2010 Capacity Development Assessment, and continued perseverance from local governments is needed to enhance the resiliency and robustness of these systems against physical threats. PMID:24187744

  10. Controlled Deterministic Secure Quantum Communication Protocol Based on Three-Particle GHZ States in X-Basis

    NASA Astrophysics Data System (ADS)

    Chang, Yan; Zhang, Shi-Bin; Yan, Li-Li; Han, Gui-Hua

    2015-03-01

    A controlled deterministic secure quantum communication (CDSQC) protocol is proposed based on three-particle GHZ state in X-basis. Only X-basis and Z1Z2X3-basis (composed of Z-basis and X-basis) measurement are required, which makes the scheme more convenient than others in practical applications. By distributing a random key between both sides of the communication and performing classical XOR operation, we realize a one-time-pad scheme, therefore our protocol achieves unconditional secure. Because only user with legitimate identity string can decrypt the secret, our protocol can resist man-in-the middle attack. The three-particle GHZ state in X-basis is used as decoy photons to detect eavesdropping. The detection rate reaches 75% per qubit. Supported by the National Natural Science Foundation of China under Grant No. 61402058, Science and Technology, Sichuan Province of China under Grant No. 2013GZX0137, Fund for Young Persons Project of Sichuan Province of China under Grant No. 12ZB017, and the Foundation of Cyberspace Security Key Laboratory of Sichuan Higher Education Institutions under Grant No. szjj2014-074

  11. 75 FR 23274 - Privacy Act of 1974; Department of Homeland Security United States Immigration Customs and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-03

    ... who, due to a condition such as mental illness, may pose a health or safety risk to himself/herself or... remain on certain medication for a serious mental health condition). Y. To the DOJ Federal Bureau of... security classification; 8. Limited health information relevant to an individual's placement in an...

  12. 77 FR 43151 - Permissible Investments for Federal and State Savings Associations: Corporate Debt Securities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-24

    ... adopted by the OCC regarding permissible investments for national banks.\\2\\ \\1\\ 77 FR 35253. (June 13... credit risk of a security through its maturity or projected maturity date. \\11\\ 77 FR 35253, 35257. II... language in the Office of the Comptroller of the Currency's (``OCC'') final rule.\\1\\ The...

  13. 75 FR 10633 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security United States...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-09

    ... Security (DHS) published a notice of proposed rulemaking in the Federal Register, 74 FR 30240, June 25... concurrently in the Federal Register, 74 FR 5665, January 30, 2009, and later updated in the Federal Register to add two new routine uses, 74 FR 20719, May 5, 2009. The system is being renamed...

  14. United States Security and Salt Two. Report of a Wingspread Conference (Racine, Wisconsin, February 9, 1979).

    ERIC Educational Resources Information Center

    McLain, Douglas, Jr.

    Eugene Rostow (Yale University) and David Tarr (University of Wisconsin) present their views concerning the wisdom and validity of U.S. security policies, including SALT, and the adequacy of the country's political/military planning. Rostow, representing the views of the Committee on the Present Danger, believes that America is losing the…

  15. The Treatment of Peace and Security Issues in Social Studies Textbooks in the United States.

    ERIC Educational Resources Information Center

    Fleming, Dan B.

    This examination of the treatment given to peace and security issues in American social studies textbooks begins by summarizing the National Council for the Social Studies (NCSS) Curriculum Guidelines and a 1983 study of high school social studies topic priorities. Following a review of past textbook studies and a brief discussion of textbook…

  16. 75 FR 51609 - Classified National Security Information Program for State, Local, Tribal, and Private Sector...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-23

    ..., August 18, 2010. [FR Doc. 2010-21016 Filed 8-20-10; 8:45 am] Billing code 3195-W0-P ... Documents#0;#0; #0; #0;Title 3-- #0;The President ] Executive Order 13549 of August 18, 2010 Classified... with Executive Order 13526 of December 29, 2009 (``Classified National Security...

  17. Strategies for Improving Polio Surveillance Performance in the Security-Challenged Nigerian States of Adamawa, Borno, and Yobe During 2009–2014

    PubMed Central

    Hamisu, Abdullahi Walla; Johnson, Ticha Muluh; Craig, Kehinde; Mkanda, Pascal; Banda, Richard; Tegegne, Sisay G.; Oyetunji, Ajiboye; Ningi, Nuhu; Mohammed, Said M.; Adamu, Mohammed Isa; Abdulrahim, Khalid; Nsubuga, Peter; Vaz, Rui G.; Muhammed, Ado J. G.

    2016-01-01

    Background. The security-challenged states of Adamawa, Borno, and Yobe bear most of the brunt of the Boko Haram insurgency in Nigeria. The security challenge has led to the killing of health workers, destruction of health facilities, and displacement of huge populations. To identify areas of polio transmission and promptly detect possible cases of importation in these states, polio surveillance must be very sensitive. Methods. We conducted a retrospective review of acute flaccid paralysis surveillance in the security-compromised states between 2009 and 2014, using the acute flaccid paralysis database at the World Health Organization Nigeria Country Office. We also reviewed the reports of surveillance activities conducted in these security-challenged states, to identify strategies that were implemented to improve polio surveillance. Results. Environmental surveillance was implemented in Borno in 2013 and in Yobe in 2014. All disease surveillance and notification officers in the 3 security-challenged states now receive annual training, and the number of community informants in these states has dramatically increased. Media-based messaging (via radio and television) is now used to sensitize the public to the importance of surveillance, and contact samples have been regularly collected in both states since 2014. Conclusions. The strategies implemented in the security-challenged states improved the quality of polio surveillance during the review period. PMID:26655842

  18. United States Responses to Japanese Wartime Inhuman Experimentation after World War II: National Security and Wartime Exigency

    PubMed Central

    Brody, Howard; Leonard, Sarah E.; Nie, Jing-Bao; Weindling, Paul

    2015-01-01

    In 1945-46, representatives of the United States government made similar discoveries in both Germany and Japan, unearthing evidence of unethical experiments on human beings that could be viewed as war crimes. The outcomes in the two defeated nations, however, were strikingly different. In Germany, the U.S., influenced by the Canadian physician John Thompson, played a key role in bringing Nazi physicians to trial and publicizing their misdeeds. In Japan, the U.S. played an equally key role in concealing information about the biological warfare experiments and securing immunity from prosecution for the perpetrators. The greater force of appeals to national security and wartime exigency help to explain these different outcomes. PMID:24534743

  19. The politics of African energy development: Ethiopia's hydro-agricultural state-building strategy and clashing paradigms of water security.

    PubMed

    Verhoeven, Harry

    2013-11-13

    As key economic, ecological and demographic trends converge to reshape Africa and its relationship with the outside world, a new politics is emerging in the twenty-first century around the water-food-energy nexus, which is central to the continent's relevance in the global economy. On the one hand, Malthusian anxieties are proliferating; pessimists link population growth and growing water scarcity to state failure and 'water wars'. On the other hand, entrepreneurs, sovereign wealth funds and speculators consider Africa's potential in water resources, energy production and food output as one of the last great untapped opportunities for the global economy: Africa is on the brink of an agro-industrial transformation. This article examines how African actors are not merely responding to economic and environmental changes but also thinking politically about water, food and energy security. Many of them are seizing the new opportunities to redefine their national politics, their relationship with local communities and their ties with external players, regionally and globally. Ethiopia's project of hydro-agricultural state-building helps to identify the most important fault lines of this new politics at the national, local and international level. The politics of water security and energy development simultaneously puts African states and their populations on the defensive, as they grapple with huge challenges, but also provides them with unique opportunities to take advantage of a more favourable global configuration of forces. PMID:24080620

  20. Do biofuel blending mandates reduce gasoline consumption? Implications of state-level renewable fuel standards for energy security

    NASA Astrophysics Data System (ADS)

    Lim, Shinling

    In an effort to keep America's addiction to oil under control, federal and state governments have implemented a variety of policy measures including those that determine the composition of motor gasoline sold at the pump. Biofuel blending mandates known as Renewable Fuel Standards (RFS) are designed to reduce the amount of foreign crude oil needed to be imported as well as to boost the local ethanol and corn industry. Yet beyond looking at changes in gasoline prices associated with increased ethanol production, there have been no empirical studies that examine effects of state-level RFS implementation on gasoline consumption. I estimate a Generalized Least Squares model for the gasoline demand for the 1993 to 2010 period with state and time fixed effects controlling for RFS. States with active RFS are Minnesota, Hawaii, Missouri, Florida, Washington, and Oregon. I find that, despite the onset of federal biofuel mandates across states in 2007 and the lower energy content of blended gasoline, being in a state that has implemented RFS is associated with 1.5% decrease in gasoline consumption (including blended gasoline). This is encouraging evidence for efforts to lessen dependence on gasoline and has positive implications for energy security.

  1. State of the Art of Network Security Perspectives in Cloud Computing

    NASA Astrophysics Data System (ADS)

    Oh, Tae Hwan; Lim, Shinyoung; Choi, Young B.; Park, Kwang-Roh; Lee, Heejo; Choi, Hyunsang

    Cloud computing is now regarded as one of social phenomenon that satisfy customers' needs. It is possible that the customers' needs and the primary principle of economy - gain maximum benefits from minimum investment - reflects realization of cloud computing. We are living in the connected society with flood of information and without connected computers to the Internet, our activities and work of daily living will be impossible. Cloud computing is able to provide customers with custom-tailored features of application software and user's environment based on the customer's needs by adopting on-demand outsourcing of computing resources through the Internet. It also provides cloud computing users with high-end computing power and expensive application software package, and accordingly the users will access their data and the application software where they are located at the remote system. As the cloud computing system is connected to the Internet, network security issues of cloud computing are considered as mandatory prior to real world service. In this paper, survey and issues on the network security in cloud computing are discussed from the perspective of real world service environments.

  2. Security of quantum key distribution with a laser reference coherent state, resistant to loss in the communication channel

    NASA Astrophysics Data System (ADS)

    Molotkov, S. N.; Potapova, T. A.

    2015-06-01

    The problem of quantum key distribution security in channels with large losses is still open. Quasi-single-photon sources of quantum states with losses in the quantum communication channel open up the possibility of attacking with unambiguous state discrimination (USD) measurements, resulting in a loss of privacy. In this letter, the problem is solved by counting the classic reference pulses. Conservation of the number of counts of intense coherent pulses makes it impossible to conduct USD measurements. Moreover, the losses in the communication channel are considered to be unknown in advance and are subject to change throughout the series parcels. Unlike other protocols, differential phase shift (Inoue et al 2002 Phys. Rev. Lett. 89 037902, Inoue et al 2003 Phys. Rev. A 68 022317, Takesue et al 2007 Nat. Photon. 1 343, Wen et al 2009 Phys. Rev. Lett. 103 170503) and coherent one way (Stucki et al 2005 Appl. Phys. Lett. 87 194108, Branciard et al 2005 Appl. Phys. Lett. 87 194108, Branciard et al 2008 New J. Phys. 10 013031, Stucki et al 2008 Opt. Express 17 13326), the simplicity of the protocol makes it possible to carry out a complete analysis of its security.

  3. Friends without Benefits: How States Systematically Shortchange Teachers' Retirement and Threaten Their Retirement Security

    ERIC Educational Resources Information Center

    Aldeman, Chad; Rotherham, Andrew J.

    2014-01-01

    To shore up the $46 billion pension debt the state has accrued over the past several decades, Illinois has been using its teachers as a piggy bank. New legislation adopted in December 2013 will raise the retirement age for mid-career workers and limit the amount retiree pensions can increase with inflation over time. State and national union…

  4. Multi-state Markov model for disability: A case of Malaysia Social Security (SOCSO)

    NASA Astrophysics Data System (ADS)

    Samsuddin, Shamshimah; Ismail, Noriszura

    2016-06-01

    Studies of SOCSO's contributor outcomes like disability are usually restricted to a single outcome. In this respect, the study has focused on the approach of multi-state Markov model for estimating the transition probabilities among SOCSO's contributor in Malaysia between states: work, temporary disability, permanent disability and death at yearly intervals on age, gender, year and disability category; ignoring duration and past disability experience which is not consider of how or when someone arrived in that category. These outcomes represent different states which depend on health status among the workers.

  5. 22 CFR 41.2 - Exemption or waiver by Secretary of State and Secretary of Homeland Security of passport and/or...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Exemption or waiver by Secretary of State and Secretary of Homeland Security of passport and/or visa requirements for certain categories of nonimmigrants. 41.2 Section 41.2 Foreign Relations DEPARTMENT OF STATE VISAS VISAS: DOCUMENTATION OF NONIMMIGRANTS UNDER THE IMMIGRATION AND NATIONALITY...

  6. Agreed Framework and KEDO: The role of the United States in Korean security

    SciTech Connect

    Gamble, A.J.

    1999-06-01

    The US is moving from a leading security guarantor of the ROK to a mediator of the Korean dispute. The US should understand this fundamental change and adjust its relationship with the ROK and the DPRK to maintain the possibility of Korean reunification. The Agreed Framework is a deal between the US and the DPRK to stop the DPRK`s nuclear program in exchange for energy resources. The Agreed Framework forces the US to go beyond its traditional ROK supportive policy to deal with the DPRK`s nuclear ambition. The US should assess the goals of the PRC, ROK, DPRK, and Japan on the Korean peninsula to determine if a change in policy will enhance the probability of a soft landing by the DPRK. To conduct this assessment, the goals of all nations and the DPRK`s nuclear ambition have been developed. A graphical summary of the subjective analysis was used to pick the US policy option that shows the best credible and clear logic, and mitigates most effectively any international criticism that may dilute the sound reasoning of future policy. The US should change its current policy to mediate the Korean dispute and increase the probability that all concerned actors meet their goals on the Korean peninsula.

  7. The Strategic Petroleum Reserve: United States energy security, oil politics, and petroleum reserves policies in the twentieth century

    NASA Astrophysics Data System (ADS)

    Beaubouef, Bruce Andre

    The history of U.S. petroleum reserves policies in the twentieth century, including the Strategic Petroleum Reserve (SPR) program, provides a case study of the economic and political aspects of national security, and shows the ways in which the American political economy influences national security. One key problem plagued federal petroleum reserve programs and proposals throughout the twentieth century. In a political economy which traditionally placed strong emphasis upon the sanctity of private property and free markets, could the government develop an emergency petroleum reserve policy despite opposition from the private sector? Previous literature on the SPR and oil-stockpiling programs has largely disregarded the historical perspective, focusing instead upon econometric models, suggesting future oil-stockpiling policy options. This study will also make conclusions about the future of governmental oil-stockpiling policies, particularly with regard to the SPR program, but it will do so informed by a systematic history of the emergency petroleum reserve impulse in the twentieth century. Through a study of the emergency petroleum reserve impulse, one can see how the American political economy of oil and energy changed over the twentieth century. As petroleum became crucial to the military and then economic security of the United States, the federal government sought to develop emergency petroleum reserves first for the military, then for the civilian economy. But while the American petroleum industry could deliver the energy "goods" to American energy consumers at a reasonable price, the companies reigned supreme in the political equation. While that was true, federal petroleum reserve programs and proposals conflicted with and were overwhelmed by the historic American tradition of individual economic and private property rights. The depletion of American petroleum reserves changed that political equation, and the ensuing energy crises of the 1970s not only

  8. Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers

    SciTech Connect

    Bagherinezhad, Saber; Karimipour, Vahid

    2003-04-01

    We introduce a protocol for quantum secret sharing based on reusable entangled states. The entangled state between the sender and the receiver acts only as a carrier to which data bits are entangled by the sender and disentangled from it by the receivers, all by local actions of simple gates. We also show that the interception by Eve or the cheating of one of the receivers introduces a quantum bit error rate larger than 25% which can be detected by comparing a subsequence of the bits.

  9. PROCESS OF SECURING PLUTONIUM IN NITRIC ACID SOLUTIONS IN ITS TRIVALENT OXIDATION STATE

    DOEpatents

    Thomas, J.R.

    1958-08-26

    >Various processes for the recovery of plutonium require that the plutonium be obtalned and maintained in the reduced or trivalent state in solution. Ferrous ions are commonly used as the reducing agent for this purpose, but it is difficult to maintain the plutonium in a reduced state in nitric acid solutions due to the oxidizing effects of the acid. It has been found that the addition of a stabilizing or holding reductant to such solution prevents reoxidation of the plutonium. Sulfamate ions have been found to be ideally suitable as such a stabilizer even in the presence of nitric acid.

  10. Comment on 'Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers'

    SciTech Connect

    Gao Fei; Guo Fenzhuo; Wen Qiaoyan; Zhu Fuchen

    2005-09-15

    In a recent paper [S. Bagherinezhad and V. Karimipour, Phys. Rev. A 67, 044302 (2003)], a quantum secret sharing protocol based on reusable Greenberger-Horne-Zeilinger states was proposed. However, in this Comment, it is shown that this protocol is insecure if Eve employs a special strategy to attack.

  11. Comment on ``Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers''

    NASA Astrophysics Data System (ADS)

    Gao, Fei; Guo, Fen-Zhuo; Wen, Qiao-Yan; Zhu, Fu-Chen

    2005-09-01

    In a recent paper [S. Bagherinezhad and V. Karimipour, Phys. Rev. A 67, 044302 (2003)], a quantum secret sharing protocol based on reusable Greenberger-Horne-Zeilinger states was proposed. However, in this Comment, it is shown that this protocol is insecure if Eve employs a special strategy to attack.

  12. Secure coherent-state quantum key distribution protocols with efficient reconciliation

    SciTech Connect

    Assche, G. van; Cerf, N.J.

    2005-05-15

    We study the equivalence of a realistic quantum key distribution protocol using coherent states and homodyne detection with a formal entanglement purification protocol. Maximally entangled qubit pairs that one can extract in the formal protocol correspond to secret key bits in the realistic protocol. More specifically, we define a qubit encoding scheme that allows the formal protocol to produce more than one entangled qubit pair per entangled oscillator pair or, equivalently for the realistic protocol, more than one secret key bit per coherent state. The entanglement parameters are estimated using quantum tomography. We analyze the properties of the encoding scheme and investigate the resulting secret key rate in the important case of the attenuation channel.

  13. Secure portal.

    SciTech Connect

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing the secure portal

  14. CALIFORNIA STATE UNIVERSITY CATASTROPHIC (CAT) LEAVE DONATION PROGRAM: DEMOGRAPHICS, ECONOMIC SECURITY, AND SOCIAL EQUITY.

    PubMed

    Muller, Christina

    2015-01-01

    The California State University (CSU) Chancellor's Office reached an agreement with all CSU collective bargaining units and Employee Relations on a uniform Catastrophic (CAT) Leave Donation Program in 1992. The CAT Leave Donation Program allows employees to donate sick and/or vacation leave credits to employees who are incapacitated due to a catastrophic illness or injury and have exhausted all of their own leave credits. This also extends to employees with whom family illnesses are deemed catastrophic, thus requiring the employee to care for an immediate family member. Stakeholders include union represented employees who accrue leave credits as well as any employee who receives or donates hours of leave credits in the program. Other stakeholders include the family members and program administrators. PMID:26369237

  15. Climate change adaptation: a panacea for food security in Ondo State, Nigeria

    NASA Astrophysics Data System (ADS)

    Fatuase, A. I.

    2016-05-01

    This paper examines the likely perceived causes of climate change, adaptation strategies employed and technical inefficiency of arable crop farmers in Ondo State, Nigeria. Data were obtained from primary sources using a set of structured questionnaire assisted with interview schedule. Multistage sampling technique was used. Data were analyzed using the following: descriptive statistics and the stochastic frontier production function. The findings showed that majority of the respondents (59.1 %) still believed that climate change is a natural phenomenon that is beyond man's power to abate while industrial release, improper sewage disposal, fossil fuel use, deforestation and bush burning were perceived as the most human factors that influence climate change by the category that chose human activities (40.9 %) as the main causes of climate change. The main employed adaptation strategies by the farmers were mixed cropping, planting early matured crop, planting of resistant crops and use of agrochemicals. The arable crop farmers were relatively technically efficient with about 53 % of them having technical efficiency above the average of 0.784 for the study area. The study observed that education, adaptation, perception, climate information and farming experience were statistically significant in decreasing inefficiency of arable crop production. Therefore, advocacy on climate change and its adaptation strategies should be intensified in the study area.

  16. Integrated Resources Management Approach to Ensuring Sustainable Food Security in Nigeria-The Nexus of Rice Production in Niger State

    NASA Astrophysics Data System (ADS)

    Omotoso, T.

    2015-12-01

    By 2050, the world will need to feed 9 billion people. This will require a 60% increase in agricultural production and subsequently a 6% increase in water use by the agricultural sector alone. By 2030, global water demand is expected to increase by 40%, mostly in developing countries like Nigeria (Addams, Boccaletti, Kerlin, & Stuchtey, 2009) and global energy demand is expected to increase by 33% in 2035, also, mostly in emerging economies (IEA, 2013). These resources have to be managed efficiently in preparation for these future demands. Population growth leads to increased demand for water, energy and food. More food production will lead to more water-for-food and energy-for-food usage; and more demand for energy will lead to more water-for-energy needs. This nexus between water, energy and food is poorly understood and furthermore, complicated by external drivers such as climate change. Niger State Nigeria, which is blessed with abundant water and arable land resources, houses the three hydropower dams in Nigeria and one of the governments' proposed Staple Crops Processing Zones (SCPZ) for rice production. Both of these capital intensive investments depend heavily on water resources and are all highly vulnerable to changes in climate. Thus, it is essential to know how the local climate in this state will likely change and its impacts on water, energy and food security, so that policy makers can make informed mitigation/adaptation plans; operational and investment decisions. The objective of this project is to provide information, using an integrated resources management approach, on the effects of future climate changes on water, energy (hydropower) and food resources in Niger State, Nigeria and improve knowledge on the interlinkages between water, energy and food at a local scale.

  17. Making Schools More Secure.

    ERIC Educational Resources Information Center

    Grealy, Joseph I.

    The president of the National Association of School Security Directors, citing many specific incidents of school vandalism and personal assault and battery, states that the safety and security of school personnel and facilities are necessary requirements for effective education. The author's approach to a school security program is to determine…

  18. Social Security: Implementation of New Mental Impairment Criteria for Disability Benefits. Briefing Report to the Chairman, Special Committee on Aging, United States Senate.

    ERIC Educational Resources Information Center

    General Accounting Office, Washington, DC. Div. of Human Resources.

    This document is a report on the implementation of changes to methods formerly used by the Social Security Administration (SSA) to evaluate claims relating to mental impairment for disability benefits. The introductory letter states several conclusions reached by the General Accounting Office's (GAO) review of the criteria used by the SSA to…

  19. Securing Fatherhood through Kin Work: A Comparison of Black Low-Income Fathers and Families in South Africa and the United States

    ERIC Educational Resources Information Center

    Madhavan, Sangeetha; Roy, Kevin

    2012-01-01

    In this article, the authors examine how low-income Black men in South Africa and the United States work with their kin to secure fathering and ensure the well-being of children. They use ethnographic and life history data on men who fathered children from 1992 to 2005 to demonstrate how fathers' roles as kin workers enable them to meet culturally…

  20. The Health Insurance Portability & Accountability Act and the practice of dentistry in the United States: system security.

    PubMed

    Chasteen, Joseph E; Murphy, Gretchen; Forrey, Arden; Heid, David

    2004-08-15

    This article reviews the issues related to the Health Insurance Portability & Accountability Act (HIPAA) security rule that apply to dental practice. The security rule specifically addresses individually identifiable health information that is transmitted or maintained in electronic media. System security must be applied to the entire technical infrastructure for the practice environment as well as to the work culture on a daily basis and must be thought of as an enterprise asset. Security refers to all of the policies, procedures, tools, and techniques used to assure that privacy and confidentiality are adequately addressed in a healthcare system. HIPAA requires all covered entities that transmit or maintain electronic health information perform, and document, a risk assessment for security and develop a security plan to address major areas of concern. A self-assessment tool is provided in this article. PMID:15318267

  1. Alternative security

    SciTech Connect

    Weston, B.H. )

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview.

  2. A Qualitative Meta-Analysis of the Diffusion of Mandated and Subsidized Technology: United States Energy Security and Independence

    ERIC Educational Resources Information Center

    Noah, Philip D., Jr.

    2013-01-01

    The purpose of this research project was to explore what the core factors are that play a role in the development of the smart-grid. This research study examined The Energy Independence and Security Act (EISA) of 2007 as it pertains to the smart-grid, the economic and security effects of the smart grid, and key factors for its success. The…

  3. Obesity as a Determinant of Staphylococcus aureus Colonization Among Inmates in Maximum-Security Prisons in New York State.

    PubMed

    Befus, Montina; Lowy, Franklin D; Miko, Benjamin A; Mukherjee, Dhritiman V; Herzig, Carolyn T A; Larson, Elaine L

    2015-09-15

    Obesity increases a person's susceptibility to a variety of infections, including Staphylococcus aureus infections, which is an important cause of morbidity in correctional settings. Using a cross-sectional design, we assessed the association between obesity and S. aureus colonization, a risk factor for subsequent infection, in New York State maximum-security prisons (2011-2013). Anterior nares and oropharyngeal cultures were collected. Structured interviews and medical records were used to collect demographic, behavioral, and medical data. Body mass index (BMI; weight (kg)/height (m(2))) was categorized as 18.5-24.9, 25-29.9, 30-34.9, or ≥35. The association between BMI and S. aureus colonization was assessed using log-binomial regression. Thirty-eight percent of 638 female inmates and 26% of 794 male inmates had a BMI of 30 or higher. More than 40% of inmates were colonized. Female inmates with a BMI of 25-29.9 (prevalence ratio (PR) = 1.37, 95% confidence interval (CI): 1.06, 1.76), 30-34.9 (PR = 1.52, 95% CI: 1.17, 1.98), or ≥35 (PR = 1.49, 95% CI: 1.13, 1.96) had a higher likelihood of colonization than did those with a BMI of 18.5-24.9 after we controlled for age, educational level, smoking status, diabetes status, and presence of human immunodeficiency virus. Colonization was higher among male inmates with a BMI of 30-34.9 (PR = 1.27, 95% CI: 1.01, 1.61). Our findings demonstrate an association between BMI and S. aureus colonization among female prisoners. Potential contributory biologic and behavioral factors should be explored. PMID:26292691

  4. Collection Security.

    ERIC Educational Resources Information Center

    Boss, Richard W.

    1984-01-01

    Presents a systematic approach to the problem of security of library collections and facilities from theft and vandalism. Highlights include responses to losses, defining security needs, typical weaknesses of facilities, policies and procedures that weaken a library's security, conducting a security audit, cost of security, cost-effectiveness, and…

  5. Security Evolution.

    ERIC Educational Resources Information Center

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  6. A comparative study of protocols for secure quantum communication under noisy environment: single-qubit-based protocols versus entangled-state-based protocols

    NASA Astrophysics Data System (ADS)

    Sharma, Vishal; Thapliyal, Kishore; Pathak, Anirban; Banerjee, Subhashish

    2016-07-01

    The effect of noise on various protocols of secure quantum communication has been studied. Specifically, we have investigated the effect of amplitude damping, phase damping, squeezed generalized amplitude damping, Pauli type as well as various collective noise models on the protocols of quantum key distribution, quantum key agreement, quantum secure direct quantum communication and quantum dialogue. From each type of protocol of secure quantum communication, we have chosen two protocols for our comparative study: one based on single-qubit states and the other one on entangled states. The comparative study reported here has revealed that single-qubit-based schemes are generally found to perform better in the presence of amplitude damping, phase damping, squeezed generalized amplitude damping noises, while entanglement-based protocols turn out to be preferable in the presence of collective noises. It is also observed that the effect of noise depends upon the number of rounds of quantum communication involved in a scheme of quantum communication. Further, it is observed that squeezing, a completely quantum mechanical resource present in the squeezed generalized amplitude channel, can be used in a beneficial way as it may yield higher fidelity compared to the corresponding zero squeezing case.

  7. Reply to 'Comment on 'Quantum secret sharing based on reusable Greenberger-Horne- Zeilinger states as secure carriers''

    SciTech Connect

    Karimipour, V.

    2005-11-15

    We show that the criticism of a recent Comment by Gao et al. on the insecurity of the quantum secret sharing protocol [proposed in S. Bagherinezhad and V. Karimipour, Phys. Rev. A 67, 044302 (2003)] is based on a misconception about the meaning of security and hence is invalid.

  8. 12 CFR 208.34 - Recordkeeping and confirmation of certain securities transactions effected by State member banks.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... investment fund, interests in a variable amount (master) note of a borrower of prime credit, or U.S. Savings... that may be extended by the issuer with a variable interest payable thereon, or is an asset-backed... issuer with a variable interest rate payable thereon, or is an asset-backed security that represents...

  9. 12 CFR 208.34 - Recordkeeping and confirmation of certain securities transactions effected by State member banks.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... of records and controls regarding its customer securities transactions that clearly and accurately... when the customer pays the bank any part of the purchase price (or the time when the bank makes the book-entry for any part of the purchase price if applicable); however, if the customer pays for...

  10. A Golden Age of Security and Education? Adult Education for Civil Defence in the United States 1950-1970

    ERIC Educational Resources Information Center

    Preston, John

    2015-01-01

    A number of authors consider that the early period of US security and education (1950-1970) was in some way a "golden age" where there was a prevailing societal orientation towards civil defence. This is supported, to some extent, through "Duck and Cover" type activities in schools and in community preparedness efforts. This…

  11. Securing the State through the Production of "Global" Citizens: Analyzing Neo-Liberal Educational Reforms in Jordan and the USA

    ERIC Educational Resources Information Center

    Hantzopoulos, Maria; Shirazi, Roozbeh

    2014-01-01

    From a human capital perspective, schooling has long represented an engine of economic growth, individual advancement, and competitiveness in the global market. In recent years, this theorization of schooling has become linked with articulations of national security in both the Global North and South, as policymakers, private sector actors, and…

  12. 75 FR 51619 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/United States...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-23

    ... cases, the same type of SAVE query is conducted using the same information and documentation regardless... INFORMATION CONTACT: For general questions please contact Monitoring and Compliance Branch Chief (202-358-7777..., DC 20528. SUPPLEMENTARY INFORMATION: Background The Department of Homeland Security (DHS) published...

  13. Addressing Software Security

    NASA Technical Reports Server (NTRS)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  14. Cryptanalysis of Controlled Quantum Secure Direct Communication and Authentication Protocol Based on Five-Particle Cluster State and Quantum One-Time Pad

    NASA Astrophysics Data System (ADS)

    Liu, Zhihao; Chen, Hanwu; Liu, Wenjie

    2016-06-01

    A new attack strategy, the so-called intercept-selectively-measure-resend attack is put forward. It shows that there are some security issues in the controlled quantum secure direct communication (CQSDC) and authentication protocol based on five-particle cluster states and quantum one-time pad. Firstly, an eavesdropper (Eve) can use this attack to eavesdrop on 0.656 bit of every bit of the identity string of the receiver and 1.406 bits of every couple of the corresponding bits of the secret message without being detected. Also, she can eavesdrop on 0.311 bit of every bit of the identity string of the controller. Secondly, the receiver can also take this attack to obtain 1.311 bits of every couple of the corresponding bits of the secret message without the permission of the controller, which is not allowed in the CQSDC protocols. In fact, there is another security issue in this protocol, that is, one half of the information about the secret is leaked out unconsciously. In addition, an alternative attack strategy which is called as the selective-CNOT-operation attack strategy to attack this protocol is discussed.

  15. United States Department of Energy National Nuclear Security Administration Sandia Field Office NESHAP Annual Report CY2014 for Sandia National Laboratories New Mexico

    SciTech Connect

    evelo, stacie; Miller, Mark L.

    2015-05-01

    This report provides a summary of the radionuclide releases from the United States (U.S.) Department of Energy (DOE) National Nuclear Security Administration facilities at Sandia National Laboratories, New Mexico (SNL/NM) during Calendar Year (CY) 2014, including the data, calculations, and supporting documentation for demonstrating compliance with 40 Code of Federal Regulation (CFR) 61, Subpart H--NATIONAL EMISSION STANDARDS FOR EMISSIONS OF RADIONUCLIDES OTHER THAN RADON FROM DEPARTMENT OF ENERGY FACILITIES. A description is given of the sources and their contributions to the overall dose assessment. In addition, the maximally exposed individual (MEI) radiological dose calculation and the population dose to local and regional residents are discussed.

  16. Hydrological extremes and security

    NASA Astrophysics Data System (ADS)

    Kundzewicz, Z. W.; Matczak, P.

    2015-04-01

    Economic losses caused by hydrological extremes - floods and droughts - have been on the rise. Hydrological extremes jeopardize human security and impact on societal livelihood and welfare. Security can be generally understood as freedom from threat and the ability of societies to maintain their independent identity and their functional integrity against forces of change. Several dimensions of security are reviewed in the context of hydrological extremes. The traditional interpretation of security, focused on the state military capabilities, has been replaced by a wider understanding, including economic, societal and environmental aspects that get increasing attention. Floods and droughts pose a burden and serious challenges to the state that is responsible for sustaining economic development, and societal and environmental security. The latter can be regarded as the maintenance of ecosystem services, on which a society depends. An important part of it is water security, which can be defined as the availability of an adequate quantity and quality of water for health, livelihoods, ecosystems and production, coupled with an acceptable level of water-related risks to people, environments and economies. Security concerns arise because, over large areas, hydrological extremes - floods and droughts - are becoming more frequent and more severe. In terms of dealing with water-related risks, climate change can increase uncertainties, which makes the state's task to deliver security more difficult and more expensive. However, changes in population size and development, and level of protection, drive exposure to hydrological hazards.

  17. Supporting Data Use While Protecting the Privacy, Security and Confidentiality of Student Information: A Primer for State Policymakers

    ERIC Educational Resources Information Center

    Data Quality Campaign, 2011

    2011-01-01

    The education sector is beginning to embrace a culture that values, demands and uses data to support improved decisionmaking at every level--in classrooms, at kitchen tables and in state capitols. This shift is due in large part to state policymakers' leadership over the last six years in building statewide longitudinal data systems that collect…

  18. United States - Republic of Korea security relations: Policy/strategy for the future. Executive summary report, March-June 1990

    SciTech Connect

    Kristick, D.M.

    1990-06-01

    US domestic budget difficulties, and growing East Asian economics might now require the US to change its relationship with South Korea. The ROK's growing global stature, its economic vitality, and military strength indicate it is ready to take a more pronounced role in its own self-defense. US-ROK relations must become more reciprocal, giving the ROK more decision-sharing opportunities. The Nunn-Warner report does not go far enough in prescribing a US strategy toward East Asia in the next century. US must take a more active role in diplomatic initiatives aimed at reducing tensions in East Asia, specifically the Korean peninsula. The US and the ROK should be developing combined strategies to deal with an eventual Korean unification. These two allies should also begin developing arms control strategies for the Korean peninsula. US should facilitate better ROK-Japan security relations. US should maintain diligence in Korea until North Korea opens.

  19. The information security needs in radiological information systems-an insight on state hospitals of Iran, 2012.

    PubMed

    Farhadi, Akram; Ahmadi, Maryam

    2013-12-01

    Picture Archiving and Communications System (PACS) was originally developed for radiology services over 20 years ago to capture medical images electronically. Medical diagnosis methods are based on images such as clinical radiographs, ultrasounds, CT scans, MRIs, or other imaging modalities. Information obtained from these images is correlated with patient information. So with regards to the important role of PACS in hospitals, we aimed to evaluate the PACS and survey the information security needed in the Radiological Information system. First, we surveyed the different aspects of PACS that should be in any health organizations based on Department of Health standards and prepared checklists for assessing the PACS in different hospitals. Second, we surveyed the security controls that should be implemented in PACS. Checklists reliability is affirmed by professors of Tehran Science University. Then, the final data are inputted in SPSS software and analyzed. The results indicate that PACS in hospitals can transfer patient demographic information but they do not show route of information. These systems are not open source. They don't use XML-based standard and HL7 standard for exchanging the data. They do not use DS digital signature. They use passwords and the user can correct or change the medical information. PACS can detect alternation rendered. The survey of results demonstrates that PACS in all hospitals has the same features. These systems have the patient demographic data but they do not have suitable flexibility to interface network or taking reports. For the privacy of PACS in all hospitals, there were passwords for users and the system could show the changes that have been made; but there was no water making or digital signature for the users. PMID:23852637

  20. Security Locks

    ERIC Educational Resources Information Center

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions affected--perhaps the…

  1. Climate change in the federated states of Micronesia: Food and water security, climate risk management, and adaptive strategies

    USGS Publications Warehouse

    Fletcher, Charles H.; Richmond, Bruce M.

    2010-01-01

    This is a report of findings following research and a three-week field assessment (April 2009) of the Federated States of Micronesia (FSM) in response to nation-wide marine inundation by extreme tides (December 2007, September 2008, December 2008).3 The study was conducted at the request of the US Department of Agriculture Forest Service and the state and federal governments of FSM.

  2. Policy based network management : state of the industry and desired functionality for the enterprise network: security policy / testing technology evaluation.

    SciTech Connect

    Morgan, Christine A.; Ernest, Martha J.; Tolendino, Lawrence F.; Klaus, Edward J.; MacAlpine, Timothy L.; Rios, Michael A.; Keliiaa, Curtis M.; Taylor, Jeffrey L.

    2005-02-01

    Policy-based network management (PBNM) uses policy-driven automation to manage complex enterprise and service provider networks. Such management is strongly supported by industry standards, state of the art technologies and vendor product offerings. We present a case for the use of PBNM and related technologies for end-to-end service delivery. We provide a definition of PBNM terms, a discussion of how such management should function and the current state of the industry. We include recommendations for continued work that would allow for PBNM to be put in place over the next five years in the unclassified environment.

  3. 76 FR 49500 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-020 Substance...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-10

    ... authorities to report, under State law, incidents of suspected child abuse or neglect to the extent described... Guard--020 Substance Abuse Prevention and Treatment Program System of Records AGENCY: Privacy Office...--020 Substance Abuse Prevention and Treatment Program System of Records.'' This system of...

  4. 76 FR 66937 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-003 Non...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-28

    ... interest in, or have engaged in prior activity regarding child pornography, the touching of a child for sexual gratification, or child abuse. N. To the news media and the public, with the approval of the Chief.... To state and local school boards, private and public schools, daycare facilities, children's...

  5. 76 FR 26738 - Privacy Act of 1974; Department of Homeland Security/United States Citizenship and Immigration...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-09

    ..., SSN, and DOB against the SSA NUMIDENT System (71 FR 1796), followed by the name, DOB, and Form I-9... against the United States Customs and Border Protection (CBP) Non Immigrant Information System (73 FR 77739) and Border Crossing Information System (73 FR 43457). If the employee provides a driver's...

  6. 75 FR 81371 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/United States...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-28

    ... rulemaking in the Federal Register, 75 FR 54528, September 8, 2010, proposing to exempt portions of the... concurrently in the Federal Register, 75 FR 54642, September 8, 2010. Comments were invited on both the Notice.../United States Citizenship and Immigration Services- 012 Citizenship and Immigration Data...

  7. Air Quality Impacts of Increased Use of Ethanol under the United States' Energy Independence and Security Act

    EPA Science Inventory

    Increased use of ethanol in the United States fuel supply will impact emissions and ambient concentrations of greenhouse gases, “criteria” pollutants for which the U. S. EPA sets ambient air quality standards, and a variety of air toxic compounds. This paper focuses on impacts of...

  8. Secure quantum key distribution

    NASA Astrophysics Data System (ADS)

    Lo, Hoi-Kwong; Curty, Marcos; Tamaki, Kiyoshi

    2014-08-01

    Secure communication is crucial in the Internet Age, and quantum mechanics stands poised to revolutionize cryptography as we know it today. In this Review, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After briefly introducing recent experimental progress and challenges, we survey the latest developments in quantum hacking and countermeasures against it.

  9. Entangled-state cryptographic protocol that remains secure even if nonlocal hidden variables exist and can be measured with arbitrary precision

    SciTech Connect

    Aerts, Diederik; Czachor, Marek; Pawlowski, Marcin

    2006-03-15

    Standard quantum cryptographic protocols are not secure if one assumes that nonlocal hidden variables exist and can be measured with arbitrary precision. The security can be restored if one of the communicating parties randomly switches between two standard protocols.

  10. 6 CFR 37.41 - Security plan.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Information (SSI) and must be handled and protected in accordance with 49 CFR part 1520. ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Security plan. 37.41 Section 37.41 Domestic... Security plan. (a) In General. States must have a security plan that addresses the provisions in...

  11. 6 CFR 37.41 - Security plan.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Information (SSI) and must be handled and protected in accordance with 49 CFR part 1520. ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Security plan. 37.41 Section 37.41 Domestic... Security plan. (a) In General. States must have a security plan that addresses the provisions in...

  12. 22 CFR 8.7 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Security. 8.7 Section 8.7 Foreign Relations DEPARTMENT OF STATE GENERAL ADVISORY COMMITTEE MANAGEMENT § 8.7 Security. (a) All officers and members of a committee must have a security clearance for the subject matter level of security at which the...

  13. A Security Checklist for ERP Implementations

    ERIC Educational Resources Information Center

    Hughes, Joy R.; Beer, Robert

    2007-01-01

    The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…

  14. 22 CFR 8.7 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Security. 8.7 Section 8.7 Foreign Relations DEPARTMENT OF STATE GENERAL ADVISORY COMMITTEE MANAGEMENT § 8.7 Security. (a) All officers and members of a committee must have a security clearance for the subject matter level of security at which the...

  15. Comment II on 'Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers'

    SciTech Connect

    Du Jianzhong; Qin Sujuan; Wen Qiaoyan; Zhu Fuchen

    2006-07-15

    In a recent paper [S. Bagherinezhad and V. Karimipour, Phys. Rev. A 67, 044302 (2003)], a quantum secret sharing protocol based on reusable GHZ states was proposed. However, in this comment, it is shown that this protocol is insecure because a cheater can gain all the secret bits before sharing, while introducing one data bit error at most in the whole communication, which makes the cheater avoid the detection by the communication parities.

  16. Assessing the Need for an On-Line Educational Module for Volunteer Leaders on Bio-Security in Washington State 4-H Livestock Projects

    ERIC Educational Resources Information Center

    Stevenson, Jill L.; Moore, Dale A.; Newman, Jerry; Schmidt, Janet L.; Smith, Sarah M.; Smith, Jean; Kerr, Susan; Wallace, Michael; BoyEs, Pat

    2011-01-01

    4-H livestock projects present disease transmission risks that can be reduced by the use of bio-security practices. The responsibility of teaching bio-security to youth belongs primarily to volunteer leaders, who may not be aware of the importance of these practices. A needs assessment for an online educational module about bio-security revealed…

  17. The cost of IT security.

    PubMed

    McMillan, Mac

    2015-04-01

    Breaches in data security have become commonplace in health care, making IT security a necessary cost for healthcare organizations. Organizations that do not invest proactively in IT security face a significant risk of incurring much greater costs from incidents involving compromised data security. Direct costs of security breaches include the costs of discovery, response, investigation, and notification and also can include state or federal penalties and costs of compliance with corrective action plans and resolution agreements. Hidden costs can include damage to brand, loss of consumer confidence, reduced HCAHPS scores, and--by extension--reduced value-based purchasing payments. PMID:26665523

  18. School Security.

    ERIC Educational Resources Information Center

    Bete, Tim, Ed.

    1998-01-01

    Presents the opinions of four security experts on the issue of guns in schools. The experts respond to the following questions: will schools ever be free of weapons; will card access systems become common in public schools; will metal detectors solve school security problems; and will students ever be issued bullet-proof vests along with…

  19. Physical Security

    SciTech Connect

    2008-01-01

    The future of physical security at government facilities and national laboratories is rapidly progressing beyond the cliché of gates, guns and guards, and is quickly being replaced by radars, sensors and cameras. Learn more about INL's security research at http://www.facebook.com/idahonationallaboratory.

  20. 25 CFR 101.13 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... mortgaged as security for a loan in accordance with 25 CFR 152.34 and the Act of March 29, 1956 (70 Stat. 62... 25 Indians 1 2011-04-01 2011-04-01 false Security. 101.13 Section 101.13 Indians BUREAU OF INDIAN... § 101.13 Security. (a) United States direct loans shall be secured by such security as the...

  1. 25 CFR 101.13 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... mortgaged as security for a loan in accordance with 25 CFR 152.34 and the Act of March 29, 1956 (70 Stat. 62... 25 Indians 1 2013-04-01 2013-04-01 false Security. 101.13 Section 101.13 Indians BUREAU OF INDIAN... § 101.13 Security. (a) United States direct loans shall be secured by such security as the...

  2. 25 CFR 101.13 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... mortgaged as security for a loan in accordance with 25 CFR 152.34 and the Act of March 29, 1956 (70 Stat. 62... 25 Indians 1 2014-04-01 2014-04-01 false Security. 101.13 Section 101.13 Indians BUREAU OF INDIAN... § 101.13 Security. (a) United States direct loans shall be secured by such security as the...

  3. 25 CFR 101.13 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... mortgaged as security for a loan in accordance with 25 CFR 152.34 and the Act of March 29, 1956 (70 Stat. 62... 25 Indians 1 2010-04-01 2010-04-01 false Security. 101.13 Section 101.13 Indians BUREAU OF INDIAN... § 101.13 Security. (a) United States direct loans shall be secured by such security as the...

  4. 25 CFR 101.13 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... mortgaged as security for a loan in accordance with 25 CFR 152.34 and the Act of March 29, 1956 (70 Stat. 62... 25 Indians 1 2012-04-01 2011-04-01 true Security. 101.13 Section 101.13 Indians BUREAU OF INDIAN... § 101.13 Security. (a) United States direct loans shall be secured by such security as the...

  5. Secure Objectives for School Security

    ERIC Educational Resources Information Center

    Dalton-Noblitt, April

    2012-01-01

    In a study conducted among more than 980 American four-year and two-year colleges and universities, including institutions such as the University of Michigan, MIT, UCLA and Columbia, security staff and other administrators identified the five leading goals for their security systems: (1) Preventing unauthorized people from entering their…

  6. The Agricultural Job Opportunity Benefits and Security Act of 1999. Hearing before the Subcommittee on Immigration of the Committee on the Judiciary. United States Senate, One Hundred Sixth Congress, Second Session (May 4, 2000).

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. Senate Committee on the Judiciary.

    This publication documents a congressional hearing on the Agricultural Job Opportunity Benefits and Security Act of 1999, which focuses on these three major concerns: the United States (US) is the home of a large and growing number of undocumented agricultural workers; the current H-2A Program is administratively burdensome, does not work well for…

  7. Secure PVM

    SciTech Connect

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  8. The Shaping of Managers' Security Objectives through Information Security Awareness Training

    ERIC Educational Resources Information Center

    Harris, Mark A.

    2010-01-01

    Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition,…

  9. Security Detail.

    ERIC Educational Resources Information Center

    Epstein, Marc A.

    2003-01-01

    Describes problems of maintaining discipline and security at Jamaica High School in Queens, New York. Argues that court decisions and school regulations have allowed minority of aggressive and disruptive students to destabilize the learning environment. (PKP)

  10. [Food security in Mexico].

    PubMed

    Urquía-Fernández, Nuria

    2014-01-01

    An overview of food security and nutrition in Mexico is presented, based on the analysis of the four pillars of food security: availability, access, utilization of food, and stability of the food supply. In addition, the two faces of malnutrition in Mexico were analyzed: obesity and undernourishment. Data were gathered from the food security indicators of the United Nations's Food and Agriculture Organization, from the Mexican Scale of Food Security, and from the National Health and Nutrition Survey. Mexico presents an index of availability of 3 145 kilocalories per person per day, one of the highest indexes in the world, including both food production and imports. In contrast, Mexico is affected by a double burden of malnutrition: whereas children under five present 14% of stunt, 30% of the adult population is obese. Also, more than 18% of the population cannot afford the basic food basket (food poverty). Using perception surveys, people reports important levels of food insecurity, which concentrates in seven states of the Mexican Federation. The production structure underlying these indicators shows a very heterogeneous landscape, which translates in to a low productivity growth across the last years. Food security being a multidimensional concept, to ensure food security for the Mexican population requires a revision and redesign of public productive and social policies, placing a particular focus on strengthening the mechanisms of institutional governance. PMID:25649459

  11. Market Reactions to Publicly Announced Privacy and Security Breaches Suffered by Companies Listed on the United States Stock Exchanges: A Comparative Empirical Investigation

    ERIC Educational Resources Information Center

    Coronado, Adolfo S.

    2012-01-01

    Using a sample of security and privacy breaches the present research examines the comparative announcement impact between the two types of events. The first part of the dissertation analyzes the impact of publicly announced security and privacy breaches on abnormal stock returns, the change in firm risk, and abnormal trading volume are measured.…

  12. Security in the Schools.

    ERIC Educational Resources Information Center

    Nelson, Jesse

    1997-01-01

    Discusses the benefits of school library security, software security, and computer security systems. Describes specific products for each type of security system. A sidebar lists names and addresses of security manufacturers and distributors. (AEF)

  13. 78 FR 4393 - Applications for New Awards; Minorities and Retirement Security Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-22

    ... SOCIAL SECURITY ADMINISTRATION Applications for New Awards; Minorities and Retirement Security Program... Policy, Social Security Administration. ACTION: Notice. Overview Information: Minorities and Retirement... Education (ED or the Department) and the United States Social Security Administration (SSA). The MRS...

  14. Data security.

    PubMed

    2016-09-01

    A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal confidential data is only accessible to staff who need it for their current role, and that access is removed as soon as it is no longer required. The consent/opt-out model is outlined under 8 statements, and includes certain circumstances where it will not apply, for example, where there is an overriding public interest, or mandatory legal requirement. PMID:27581899

  15. Making the Grade with School Security.

    ERIC Educational Resources Information Center

    Fickes, Michael

    2000-01-01

    Shows how technology is helping school security directors prevent violence and protect students. One school's use of a state-of-the-art security system involving closed-circuit television, access control for doors, vehicles equipped with global positioning technology, and hand-held computers for security officers is discussed. (GR)

  16. School Security Assessment Programme in Australia

    ERIC Educational Resources Information Center

    Marrapodi, John

    2007-01-01

    This article describes a successful security risk management programme in Australia. The state-wide programme follows a structured risk management approach focusing on the safety and security of people, information, provision, and assets in the school environment. To assist school principals, a Security Risk Assessment Programme was developed on a…

  17. 22 CFR 16.6 - Security clearances.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Security clearances. 16.6 Section 16.6 Foreign Relations DEPARTMENT OF STATE PERSONNEL FOREIGN SERVICE GRIEVANCE SYSTEM § 16.6 Security clearances. The agencies shall use their best endeavors to expedite security clearances whenever necessary to ensure a...

  18. 22 CFR 16.6 - Security clearances.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Security clearances. 16.6 Section 16.6 Foreign Relations DEPARTMENT OF STATE PERSONNEL FOREIGN SERVICE GRIEVANCE SYSTEM § 16.6 Security clearances. The agencies shall use their best endeavors to expedite security clearances whenever necessary to ensure a...

  19. 22 CFR 16.6 - Security clearances.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 22 Foreign Relations 1 2014-04-01 2014-04-01 false Security clearances. 16.6 Section 16.6 Foreign Relations DEPARTMENT OF STATE PERSONNEL FOREIGN SERVICE GRIEVANCE SYSTEM § 16.6 Security clearances. The agencies shall use their best endeavors to expedite security clearances whenever necessary to ensure a...

  20. 22 CFR 16.6 - Security clearances.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Security clearances. 16.6 Section 16.6 Foreign Relations DEPARTMENT OF STATE PERSONNEL FOREIGN SERVICE GRIEVANCE SYSTEM § 16.6 Security clearances. The agencies shall use their best endeavors to expedite security clearances whenever necessary to ensure a...

  1. 15 CFR 742.4 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 2 2014-01-01 2014-01-01 false National security. 742.4 Section 742.4... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY-CCL BASED CONTROLS § 742.4 National security. (a) License requirements. It is the policy of the United States...

  2. 15 CFR 742.4 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false National security. 742.4 Section 742.4... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY-CCL BASED CONTROLS § 742.4 National security. (a) License requirements. It is the policy of the United States...

  3. Status of the National Security Workforce

    SciTech Connect

    2008-03-31

    This report documents the status of the national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. This report includes an assessment of the current workforce situation. The national security workforce is an important component of national security for our country. With the increase of global threats of terrorism, this workforce is being called upon more frequently. This has resulted in the need for an increasing number of national security personnel. It is imperative to attract and retain a skilled and competitive national security workforce.

  4. Security Systems Consideration: A Total Security Approach

    NASA Astrophysics Data System (ADS)

    Margariti, S. V.; Meletiou, G.; Stergiou, E.; Vasiliadis, D. C.; Rizos, G. E.

    2007-12-01

    The "safety" problem for protection systems is to determine in a given situation whether a subject can acquire a particular right to an object. Security and audit operation face the process of securing the application on computing and network environment; however, storage security has been somewhat overlooked due to other security solutions. This paper identifies issues for data security, threats and attacks, summarizes security concepts and relationships, and also describes storage security strategies. It concludes with recommended storage security plan for a total security solution.

  5. Unconditional security at a low cost

    SciTech Connect

    Ma Xiongfeng

    2006-11-15

    By simulating four quantum key distribution (QKD) experiments and analyzing one decoy-state QKD experiment, we compare two data postprocessing schemes based on security against individual attack by Luetkenhaus, and unconditional security analysis by Gottesman-Lo-Luetkenhaus-Preskill. Our results show that these two schemes yield close performances. In QKD, since unconditional security is highly sought after, we conclude that one is better off considering unconditional security, rather than restricting to individual attacks.

  6. Health data security: a new priority.

    PubMed

    Siwicki, B

    1997-09-01

    As more health care information is computerized, concerns about the security of on-line data are growing. Some well-publicized health data security breaches illustrate the potentially devastating impact of confidentiality violations. This package of stories offers and in-depth look at the state of health data security. It includes a "roundtable discussion" by five prominent chief security officers, as well as articles on data encryption, biometrics, legislation and other topics. PMID:10169997

  7. Nuclear security

    SciTech Connect

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  8. Less reality, more security

    NASA Astrophysics Data System (ADS)

    Ekert, Artur; Kay, Alastair; Pope, James

    2012-09-01

    The concept of nonlocality, whereby a local operation on one state can instantaneously affect the properties of another spatially-separated state, has been investigated through the violation of Bell inequalities. Realisations of such violations in the laboratory paved the way for not only experimental justification of quantum theory, but also one of the subject's first significant applications in cryptography. The violation of Bell inequalities can be used as an indicator for security in the task of key distribution. Furthermore, it has more recently been shown that such security is guaranteed by the violations alone, regardless of assumptions about the workings and trustworthiness of the devices provided for the task. We provide a brief history of Bell inequalities and their use in the development of device-independent key distribution, which is less reliant on the validity of quantum theory than previously thought.

  9. Security system

    DOEpatents

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  10. Security seal

    DOEpatents

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  11. Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.

    PubMed

    Dunn Cavelty, Myriam

    2014-09-01

    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and "its" security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings. PMID:24781874

  12. A coastal perspective on security.

    PubMed

    Emerson, Steven D; Nadeau, John

    2003-11-14

    This paper examines security issues from the unique perspective of our nation's coastlines and associated infrastructure. It surveys ongoing efforts to secure offshore shipping lanes, as well as the transportation systems and huge capital investments on the narrow strip of land intersecting with coastal waters. The paper recounts the extraordinary demands recently placed on the Coast Guard, port authorities and other agencies charged with offshore security. New federal requirements such as port assessments continue to be mandated, while solutions to finding are still unfolding. An up-to-date summary of maritime security functions is provided. Those requirements are compared and contrasted with security guidelines and regulatory demands placed upon mobile and fixed assets of the Chemical Process Industry (CPI) in coastal environs. These span the gamut from recommendations by industry groups and professional organizations, to federal and state requirements, to insurance demands, to general duty obligations. PMID:14602395

  13. Extreme hydrological events and security

    NASA Astrophysics Data System (ADS)

    Kundzewicz, Z. W.; Matczak, P.

    2015-06-01

    Economic losses caused by hydrological extremes - floods and droughts - have been on the rise, worldwide. Hydrological extremes jeopardize human security and cause serious threats to human life and welfare and societal livelihood. Floods and droughts can undermine societies' security, understood as freedom from threat and the ability of societies to maintain their independent identity and their functional integrity against forces of change. Several dimensions of security are reviewed in the context of hydrological extremes. Floods and droughts pose a burden and serious challenges to the state, responsible to sustain economic development, societal and environmental security - the maintenance of ecosystem services, on which a society depends. It is shown that reduction of risk of hydrological disasters improves human security.

  14. Transportation Security Administration

    MedlinePlus

    ... content Official website of the Department of Homeland Security Transportation Security Administration When I fly can I bring my... ... to know if you could bring through the security checkpoint. Main menu Administrator Travel Security Screening Special ...

  15. Social Security Disability Reviews: The Human Costs. Hearing before the Special Committee on Aging. United States Senate, Ninety-Eighth Congress, Second Session (Part 1 - Chicago, Illinois).

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. Senate Special Committee on Aging.

    This document provides transcripts of witness testimony and prepared statements from the first of three Congressional hearings called to examine at the local level the administration of the social security disability review program. Following the opening statements of Senators John Heinz and Charles H. Percy, testimonies are presented from three…

  16. Development and Evaluation of an On-Line Educational Module for Volunteer Leaders on Bio-Security in Washington State 4-H Livestock Projects

    ERIC Educational Resources Information Center

    Stevenson, Jill L.; Moore, Dale A.; Newman, Jerry; Schmidt, Janet L.; Smith, Sarah M.; Smith, Jean; Kerr, Susan; Wallace, Michael; BoyEs, Pat

    2011-01-01

    An on-line module on disease prevention was created for 4-H volunteer leaders who work with livestock projects in Washington to better prepare them to teach youth about bio-security and its importance in 4-H livestock projects. Evaluation of the module and usage statistics since the module's debut were collected and evaluated. The module increases…

  17. Development and Evaluation of an On-Line Educational Module for Volunteer Leaders on Bio-Security in Washington State 4-H Livestock Projects

    ERIC Educational Resources Information Center

    Stevenson, Jill L.; Moore, Dale A.; Newman, Jerry; Schmidt, Janet L.; Smith, Sarah M.; Smith, Jean; Kerr, Susan; Wallace, Michael; BoyEs, Pat

    2011-01-01

    A module on disease prevention was created for 4-H volunteer leaders who work with livestock projects in Washington to better prepare them to teach youth about bio-security and its importance in 4-H livestock projects. Evaluation of the module and usage statistics since the module's debut were collected and evaluated. The module increases…

  18. Statistical security for Social Security.

    PubMed

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts. PMID:22592944

  19. Securing smart grid technology

    NASA Astrophysics Data System (ADS)

    Chaitanya Krishna, E.; Kosaleswara Reddy, T.; Reddy, M. YogaTeja; Reddy G. M., Sreerama; Madhusudhan, E.; AlMuhteb, Sulaiman

    2013-03-01

    In the developing countries electrical energy is very important for its all-round improvement by saving thousands of dollars and investing them in other sector for development. For Growing needs of power existing hierarchical, centrally controlled grid of the 20th Century is not sufficient. To produce and utilize effective power supply for industries or people we should have Smarter Electrical grids that address the challenges of the existing power grid. The Smart grid can be considered as a modern electric power grid infrastructure for enhanced efficiency and reliability through automated control, high-power converters, modern communications infrastructure along with modern IT services, sensing and metering technologies, and modern energy management techniques based on the optimization of demand, energy and network availability and so on. The main objective of this paper is to provide a contemporary look at the current state of the art in smart grid communications as well as critical issues on smart grid technologies primarily in terms of information and communication technology (ICT) issues like security, efficiency to communications layer field. In this paper we propose new model for security in Smart Grid Technology that contains Security Module(SM) along with DEM which will enhance security in Grid. It is expected that this paper will provide a better understanding of the technologies, potential advantages and research challenges of the smart grid and provoke interest among the research community to further explore this promising research area.

  20. Nuclear security

    SciTech Connect

    Dingell, J.D.

    1991-02-01

    The Department of Energy's (DOE) Lawrence Livermore National Laboratory, located in Livermore, California, generates and controls large numbers of classified documents associated with the research and testing of nuclear weapons. Concern has been raised about the potential for espionage at the laboratory and the national security implications of classified documents being stolen. This paper determines the extent of missing classified documents at the laboratory and assesses the adequacy of accountability over classified documents in the laboratory's custody. Audit coverage was limited to the approximately 600,000 secret documents in the laboratory's custody. The adequacy of DOE's oversight of the laboratory's secret document control program was also assessed.

  1. Household Food Security Study Summaries. 2001 Edition.

    ERIC Educational Resources Information Center

    Seavey, Dorie; Sullivan, Ashley F.

    This report provides the most recent data on the food security of United States households. Based on studies using the Food Security Core Module (FSCM), a tool facilitating direct documentation of the extent of food insecurity and hunger caused by income limitations, this report summarizes 35 studies representing 20 states and Canada. The report…

  2. 76 FR 70350 - West Oahu Offshore Security Zone

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-14

    ... SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA87 West Oahu Offshore Security Zone AGENCY: Coast Guard, DHS. ACTION: Temporary final rule. SUMMARY: The Coast Guard is establishing a temporary security zone... of the United States and his official party. Entry into the temporary security zone established...

  3. The Cyber Security Crisis

    SciTech Connect

    Spafford, Eugene

    2006-05-10

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  4. The Cyber Security Crisis

    ScienceCinema

    Spafford, Eugene [Purdue University, West Lafayette, Indiana, United States

    2009-09-01

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  5. Osirak and international security

    SciTech Connect

    Fainberg, A.

    1981-10-01

    Mr. Fainberg states that no factual justification can be made for Israel's bombing of an Iraqi reactor under construction on the grounds that Iraq was diverting nuclear materials for weapons. Despite limitations to the International Atomic Energy Agency (IAEA) safeguards inspection procedure, he feels the raid was premature even if Iraq's long-range goal is to develop a nuclear capability and renounce the non-proliferation treaty it signed. The effect of the raid has not enhanced Israel's security, but a precedent has been set that weakens the safeguards structure and threatens world security. Steps need to be taken to strengthen international safeguards and make them more acceptable to developing countries since there is no way to ban nuclear-produced electricity. (DCK)

  6. Perimeter security for Minnesota correctional facilities

    SciTech Connect

    Crist, D.; Spencer, D.D.

    1996-12-31

    For the past few years, the Minnesota Department of Corrections, assisted by Sandia National Laboratories, has developed a set of standards for perimeter security at medium, close, and maximum custody correctional facilities in the state. During this process, the threat to perimeter security was examined and concepts about correctional perimeter security were developed. This presentation and paper will review the outcomes of this effort, some of the lessons learned, and the concepts developed during this process and in the course of working with architects, engineers and construction firms as the state upgraded perimeter security at some facilities and planned new construction at other facilities.

  7. 76 FR 4987 - Overseas Security Advisory Council (OSAC) Meeting Notice

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-27

    ... Security Advisory Council (OSAC) Meeting Notice Closed Meeting The Department of State announces a meeting of the U.S. State Department--Overseas Security Advisory Council on February 23 and 24. Pursuant to... focus on an examination of corporate security policies and procedures and will involve...

  8. 78 FR 25521 - Overseas Security Advisory Council (Osac) Meeting Notice

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-01

    ... Security Advisory Council (Osac) Meeting Notice Closed Meeting The Department of State announces a meeting of the U.S. State Department--Overseas Security Advisory Council on June 4 and 5, 2013. Pursuant to... focus on an examination of corporate security policies and procedures and will involve...

  9. 75 FR 65550 - Overseas Security Advisory Council (OSAC) Meeting Notice

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-25

    ... Security Advisory Council (OSAC) Meeting Notice Closed Meeting The Department of State announces a meeting of the U.S. State Department--Overseas Security Advisory Council on November 16, 17, and 18 at the U... security policies and procedures and will involve extensive discussion of trade secrets and...

  10. 78 FR 64260 - Overseas Security Advisory Council (OSAC) Meeting Notice

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-28

    ... Security Advisory Council (OSAC) Meeting Notice Closed Meeting The Department of State announces a meeting of the U.S. State Department--Overseas Security Advisory Council on November 19, 20, and 21, 2013... meeting will focus on an examination of corporate security policies and procedures and will...