Science.gov

Sample records for act communications security

  1. Department of Homeland Security Interoperable Communications Act

    THOMAS, 113th Congress

    Rep. Payne, Donald M., Jr. [D-NJ-10

    2014-03-24

    07/09/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  2. 78 FR 10169 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-13

    ... to ensure the security, reliability, and interoperability of communications systems. On March 19... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability...

  3. 78 FR 15722 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-12

    ... security, reliability, and interoperability of communications systems. On March 19, 2011, the FCC, pursuant... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability...

  4. 78 FR 46582 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-01

    ... to ensure the security, reliability, and interoperability of communications systems. On March 19... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability...

  5. 77 FR 48153 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-13

    ... communications systems. On March 19, 2011, the FCC, pursuant to the Federal Advisory Committee Act, renewed the... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability...

  6. 77 FR 12054 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-28

    ... the security, reliability, and interoperability of communications systems. On March 19, 2011, the FCC... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act;...

  7. 76 FR 10362 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-24

    ... communications systems. On March 19, 2009, the FCC, pursuant to the Federal Advisory Committee Act, renewed the... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act;...

  8. 75 FR 74050 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-30

    ... communications systems. On March 19, 2009, the FCC, pursuant to the Federal Advisory Committee Act, renewed the... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act;...

  9. 75 FR 56533 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-16

    ... communications systems. On March 19, 2009, the FCC, pursuant to the Federal Advisory Committee Act, renewed the... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act;...

  10. 77 FR 67815 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-14

    ..., reliability, and interoperability of communications systems. On March 19, 2011, the FCC, pursuant to the... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability...

  11. 76 FR 72922 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-28

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal Communications Commission. ACTION: Notice of public meeting. SUMMARY: In accordance...

  12. 78 FR 70551 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-26

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal Communications Commission. ACTION: Notice. SUMMARY: In accordance with the...

  13. 78 FR 69851 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-21

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal Communications Commission. ACTION: Notice. SUMMARY: In accordance with the...

  14. 76 FR 54234 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-31

    ... interoperability of communications systems. On March 19, 2011, the FCC, pursuant to the Federal Advisory Committee... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act;...

  15. 75 FR 9899 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-04

    ....goldthorp@fcc.gov or U.S. Postal Service Mail to Jeffery Goldthorp, Chief, Communications Systems Analysis... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act;...

  16. 77 FR 28387 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-14

    ... System and Common Alerting Protocol. DATES: June 6, 2012. ADDRESSES: Federal Communications Commission... to ensure the security, reliability, and interoperability of communications systems. On March 19... From the Federal Register Online via the Government Publishing Office FEDERAL...

  17. Secure video communications system

    DOEpatents

    Smith, Robert L.

    1991-01-01

    A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

  18. Secure video communications systems

    SciTech Connect

    Smith, R.L.

    1991-10-08

    This patent describes a secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

  19. Practical secure quantum communications

    NASA Astrophysics Data System (ADS)

    Diamanti, Eleni

    2015-05-01

    We review recent advances in the field of quantum cryptography, focusing in particular on practical implementations of two central protocols for quantum network applications, namely key distribution and coin flipping. The former allows two parties to share secret messages with information-theoretic security, even in the presence of a malicious eavesdropper in the communication channel, which is impossible with classical resources alone. The latter enables two distrustful parties to agree on a random bit, again with information-theoretic security, and with a cheating probability lower than the one that can be reached in a classical scenario. Our implementations rely on continuous-variable technology for quantum key distribution and on a plug and play discrete-variable system for coin flipping, and necessitate a rigorous security analysis adapted to the experimental schemes and their imperfections. In both cases, we demonstrate the protocols with provable security over record long distances in optical fibers and assess the performance of our systems as well as their limitations. The reported advances offer a powerful toolbox for practical applications of secure communications within future quantum networks.

  20. Secure Chemical Facilities Act

    THOMAS, 113th Congress

    Sen. Lautenberg, Frank R. [D-NJ

    2013-01-23

    01/23/2013 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. Secure Chemical Facilities Act

    THOMAS, 112th Congress

    Sen. Lautenberg, Frank R. [D-NJ

    2011-03-31

    03/31/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  2. Secure Visas Act

    THOMAS, 111th Congress

    Rep. Smith, Lamar [R-TX-21

    2010-03-04

    04/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  3. Securing Cabin Baggage Act

    THOMAS, 111th Congress

    Rep. Lipinski, Daniel [D-IL-3

    2009-06-15

    06/17/2009 Referred to the Subcommittee on Transportation Security and Infrastructure Protection. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  4. Secure Chemical Facilities Act

    THOMAS, 111th Congress

    Sen. Lautenberg, Frank R. [D-NJ

    2010-07-15

    07/15/2010 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  5. Keep America Secure Act

    THOMAS, 112th Congress

    Rep. Slaughter, Louise McIntosh [D-NY-28

    2012-08-02

    09/05/2012 Referred to the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  6. Save Social Security Act

    THOMAS, 112th Congress

    Rep. McCotter, Thaddeus G. [R-MI-11

    2011-09-12

    09/19/2011 Referred for a period ending not later than September 19, 2011, (or for a later time if the Chairman so designates) to the Subcommittee on Social Security, in each case for consideration of such provisions as fall within the jurisdiction of the subcommittee concerned. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  7. Advanced Communications Technology Satellite (ACTS)

    NASA Technical Reports Server (NTRS)

    Gedney, Richard T.; Schertler, Ronald J.

    1989-01-01

    The NASA Advanced Communications Technology Satellite (ACTS) was conceived to help maintain U.S. leadership in the world's communications-satellite market. This experimental satellite is expected to be launched by NASA in 1992 and to furnish the technology necessary for establishing very small aperture terminal digital networks which provide on-demand full-mesh connectivity, and 1.544-MBPS services with only a single hop. Utilizing on-board switching and processing, each individual voice or data circuit can be separately routed to any location in the network. This paper provides an overview of the ACTS and discusses the value of the technology for future communications systems.

  8. 49 CFR 193.2909 - Security communications.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 3 2011-10-01 2011-10-01 false Security communications. 193.2909 Section 193.2909...: FEDERAL SAFETY STANDARDS Security § 193.2909 Security communications. A means must be provided for: (a) Prompt communications between personnel having supervisory security duties and law enforcement...

  9. 49 CFR 193.2909 - Security communications.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Security communications. 193.2909 Section 193.2909...: FEDERAL SAFETY STANDARDS Security § 193.2909 Security communications. A means must be provided for: (a) Prompt communications between personnel having supervisory security duties and law enforcement...

  10. Coupling Functions Enable Secure Communications

    NASA Astrophysics Data System (ADS)

    Stankovski, Tomislav; McClintock, Peter V. E.; Stefanovska, Aneta

    2014-01-01

    Secure encryption is an essential feature of modern communications, but rapid progress in illicit decryption brings a continuing need for new schemes that are harder and harder to break. Inspired by the time-varying nature of the cardiorespiratory interaction, here we introduce a new class of secure communications that is highly resistant to conventional attacks. Unlike all earlier encryption procedures, this cipher makes use of the coupling functions between interacting dynamical systems. It results in an unbounded number of encryption key possibilities, allows the transmission or reception of more than one signal simultaneously, and is robust against external noise. Thus, the information signals are encrypted as the time variations of linearly independent coupling functions. Using predetermined forms of coupling function, we apply Bayesian inference on the receiver side to detect and separate the information signals while simultaneously eliminating the effect of external noise. The scheme is highly modular and is readily extendable to support different communications applications within the same general framework.

  11. Advanced Communications Technology Satellite (ACTS)

    NASA Technical Reports Server (NTRS)

    Plecity, Mark S.; Nall, Mark E.

    1991-01-01

    The NASA Advanced Communications Technology Satellite (ACTS) provides high risk technologies having the potential to dramatically enhance the capabilities of the satellite communications industry. This experimental satellite, which will be launched by NASA in 1993, will furnish the technology necessary for providing a range of services. Utilizing the ACTS very-high-gain-hopping spot-beam antennas with on-board routing and processing, Very Small Aperture Terminal (VSAT) digital networks which provide on-demand, full-mesh-convectivity 1.544-MBPS services with only a single hop can be established. The high-gain spot-beam antenna at Ka-band permits wide area, flexible networks providing high data rate services between modest-size earth terminals.

  12. Multiparty-controlled quantum secure direct communication

    SciTech Connect

    Xiu, X.-M. Dong, L.; Gao, Y.-J.; Chi, F.

    2007-12-15

    A theoretical scheme of a multiparty-controlled quantum secure direct communication is proposed. The supervisor prepares a communication network with Einstein-Podolsky-Rosen pairs and auxiliary particles. After passing a security test of the communication network, a supervisor tells the users the network is secure and they can communicate. If the controllers allow the communicators to communicate, the controllers should perform measurements and inform the communicators of the outcomes. The communicators then begin to communicate after they perform a security test of the quantum channel and verify that it is secure. The recipient can decrypt the secret message in a classical message from the sender depending on the protocol. Any two users in the network can communicate through the above processes under the control of the supervisor and the controllers.

  13. Secure communications using quantum cryptography

    SciTech Connect

    Hughes, R.J.; Buttler, W.T.; Kwiat, P.G.

    1997-08-01

    The secure distribution of the secret random bit sequences known as {open_quotes}key{close_quotes} material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is an emerging technology for secure key distribution with single-photon transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). We have developed experimental quantum cryptography systems based on the transmission of non-orthogonal single-photon states to generate shared key material over multi-kilometer optical fiber paths and over line-of-sight links. In both cases, key material is built up using the transmission of a single-photon per bit of an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. In our optical fiber experiment we have performed quantum key distribution over 24-km of underground optical fiber using single-photon interference states, demonstrating that secure, real-time key generation over {open_quotes}open{close_quotes} multi-km node-to-node optical fiber communications links is possible. We have also constructed a quantum key distribution system for free-space, line-of-sight transmission using single-photon polarization states, which is currently undergoing laboratory testing. 7 figs.

  14. Transportation Security Administration Authorization Act

    THOMAS, 111th Congress

    Rep. King, Peter T. [R-NY-3

    2010-06-24

    07/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  15. Secure Firearms Act of 2013

    THOMAS, 113th Congress

    Rep. Carter, John R. [R-TX-31

    2013-05-08

    06/14/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  16. Secure Data Act of 2014

    THOMAS, 113th Congress

    Rep. Lofgren, Zoe [D-CA-19

    2014-12-04

    12/18/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  17. Secure Federal File Sharing Act

    THOMAS, 111th Congress

    Sen. McCaskill, Claire [D-MO

    2010-06-14

    06/14/2010 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  18. National Security Agency Accountability Act

    THOMAS, 113th Congress

    Rep. Carney, John C., Jr. [D-DE-At Large

    2014-01-15

    03/20/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  19. Airport Security Act of 2013

    THOMAS, 113th Congress

    Rep. Johnson, Henry C. "Hank," Jr. [D-GA-4

    2013-11-14

    01/09/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  20. Data Security Act of 2014

    THOMAS, 113th Congress

    Sen. Carper, Thomas R. [D-DE

    2014-01-15

    02/03/2014 Committee on Banking, Housing, and Urban Affairs Subcommittee on National Security and International Trade and Finance. Hearings held. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. Aerospace Communications Security Technologies Demonstrated

    NASA Technical Reports Server (NTRS)

    Griner, James H.; Martzaklis, Konstantinos S.

    2003-01-01

    In light of the events of September 11, 2001, NASA senior management requested an investigation of technologies and concepts to enhance aviation security. The investigation was to focus on near-term technologies that could be demonstrated within 90 days and implemented in less than 2 years. In response to this request, an internal NASA Glenn Research Center Communications, Navigation, and Surveillance Aviation Security Tiger Team was assembled. The 2-year plan developed by the team included an investigation of multiple aviation security concepts, multiple aircraft platforms, and extensively leveraged datalink communications technologies. It incorporated industry partners from NASA's Graphical Weather-in-the-Cockpit research, which is within NASA's Aviation Safety Program. Two concepts from the plan were selected for demonstration: remote "black box," and cockpit/cabin surveillance. The remote "black box" concept involves real-time downlinking of aircraft parameters for remote monitoring and archiving of aircraft data, which would assure access to the data following the loss or inaccessibility of an aircraft. The cockpit/cabin surveillance concept involves remote audio and/or visual surveillance of cockpit and cabin activity, which would allow immediate response to any security breach and would serve as a possible deterrent to such breaches. The datalink selected for the demonstrations was VDL Mode 2 (VHF digital link), the first digital datalink for air-ground communications designed for aircraft use. VDL Mode 2 is beginning to be implemented through the deployment of ground stations and aircraft avionics installations, with the goal of being operational in 2 years. The first demonstration was performed December 3, 2001, onboard the LearJet 25 at Glenn. NASA worked with Honeywell, Inc., for the broadcast VDL Mode 2 datalink capability and with actual Boeing 757 aircraft data. This demonstration used a cockpitmounted camera for video surveillance and a coupling to

  2. Increasing security in inter-chip communication

    DOEpatents

    Edwards, Nathan J; Hamlet, Jason; Bauer, Todd; Helinski, Ryan

    2014-10-28

    An apparatus for increasing security in inter-chip communication includes a sending control module, a communication bus, and a receiving control module. The communication bus is coupled between the sending control module and the receiving control module. The sending control module operates to send data on the communication bus, disable the communication bus when threats are detected, or both.

  3. Cyber Security Domestic Preparedness Act

    THOMAS, 111th Congress

    Rep. Rodriguez, Ciro D. [D-TX-23

    2010-01-26

    01/28/2010 Referred to the Subcommittee on Emergency Communications, Preparedness, and Response. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  4. Secure Federal File Sharing Act

    THOMAS, 111th Congress

    Rep. Towns, Edolphus [D-NY-10

    2009-11-17

    03/25/2010 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  5. Secure Border Act of 2012

    THOMAS, 112th Congress

    Rep. Miller, Candice S. [R-MI-10

    2011-03-31

    06/04/2012 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  6. 49 CFR 193.2909 - Security communications.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) PIPELINE SAFETY LIQUEFIED NATURAL GAS FACILITIES...) Prompt communications between personnel having supervisory security duties and law enforcement...

  7. 47 CFR 32.4 - Communications Act.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Communications Act. 32.4 Section 32.4 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES UNIFORM SYSTEM OF ACCOUNTS FOR TELECOMMUNICATIONS COMPANIES Preface § 32.4 Communications Act. Attention is directed to...

  8. Framework for Flexible Security in Group Communications

    NASA Technical Reports Server (NTRS)

    McDaniel, Patrick; Prakash, Atul

    2006-01-01

    The Antigone software system defines a framework for the flexible definition and implementation of security policies in group communication systems. Antigone does not dictate the available security policies, but provides high-level mechanisms for implementing them. A central element of the Antigone architecture is a suite of such mechanisms comprising micro-protocols that provide the basic services needed by secure groups.

  9. 17 CFR 229.801 - Securities Act industry guides.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Securities Act industry guides. 229.801 Section 229.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act...

  10. 17 CFR 229.801 - Securities Act industry guides.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Securities Act industry guides. 229.801 Section 229.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act...

  11. 17 CFR 229.801 - Securities Act industry guides.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Securities Act industry guides. 229.801 Section 229.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act...

  12. 17 CFR 229.801 - Securities Act industry guides.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Securities Act industry guides. 229.801 Section 229.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act...

  13. 17 CFR 229.801 - Securities Act industry guides.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Securities Act industry guides. 229.801 Section 229.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act...

  14. Energy Independence and Security Act of 2007

    SciTech Connect

    2011-12-30

    An Act passed in 2007 to move the United States toward greater energy independence and security, to increase the production of clean renewable fuels, to protect consumers, to increase the efficiency of products, buildings, and vehicles, to promote research on and deploy greenhouse gas capture and storage options, and to improve the energy performance of the Federal Government, and for other purposes.

  15. Advanced Communications Technology Satellite (ACTS)

    NASA Technical Reports Server (NTRS)

    Schertler, Ronald J.; Gedney, Richard T.

    1992-01-01

    An overview of the NASA ACTS program is presented. The key technologies of ACTS include spot beams, on-board baseband processing and routing, wide bandwidth (900 MHz), and Ka-band transponders. The discussion covers system description, current status of the spacecraft development, ACTS earth stations, NGS traffic terminal, USAT, land and aeronautical mobiles, high data rate and propagation receive only terminals, and ACTS experiments program.

  16. Communication security in open health care networks.

    PubMed

    Blobel, B; Pharow, P; Engel, K; Spiegel, V; Krohn, R

    1999-01-01

    Fulfilling the shared care paradigm, health care networks providing open systems' interoperability in health care are needed. Such communicating and co-operating health information systems, dealing with sensitive personal medical information across organisational, regional, national or even international boundaries, require appropriate security solutions. Based on the generic security model, within the European MEDSEC project an open approach for secure EDI like HL7, EDIFACT, XDT or XML has been developed. The consideration includes both securing the message in an unsecure network and the transport of the unprotected information via secure channels (SSL, TLS etc.). Regarding EDI, an open and widely usable security solution has been specified and practically implemented for the examples of secure mailing and secure file transfer (FTP) via wrapping the sensitive information expressed by the corresponding protocols. The results are currently prepared for standardisation. PMID:10724890

  17. Secure quantum communication with orthogonal states

    NASA Astrophysics Data System (ADS)

    Shukla, Chitra; Banerjee, Anindita; Pathak, Anirban; Srikanth, R.

    2016-08-01

    In majority of protocols of secure quantum communication (such as, BB84, B92, etc.), the unconditional security of the protocols are obtained by using conjugate coding (two or more mutually unbiased bases (MUBs)). Initially, all the conjugate-coding-based protocols of secure quantum communication were restricted to quantum key distribution (QKD), but later on they were extended to other cryptographic tasks (such as, secure direct quantum communication and quantum key agreement). In contrast to the conjugate-coding-based protocols, a few completely orthogonal-state-based protocols of unconditionally secure QKD (such as, Goldenberg-Vaidman and N09) were also proposed. However, till the recent past, orthogonal-state-based protocols were only a theoretical concept and were limited to QKD. Only recently, orthogonal-state-based protocols of QKD are experimentally realized and extended to cryptographic tasks beyond QKD. This paper aims to briefly review the orthogonal-state-based protocols of secure quantum communication that are recently introduced by our group and other researchers.

  18. 77 FR 70792 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy Office, Department of Homeland Security... Privacy Act of 1974, the Department of Homeland Security is giving notice that it will retire...

  19. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy Office, Department of Homeland Security... Privacy Act of 1974, the Department of Homeland Security is giving notice that it will retire...

  20. 77 FR 70795 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy Office, Department of Homeland Security... Privacy Act of 1974, the Department of Homeland Security is giving notice that it will retire...

  1. Secure quantum communication using classical correlated channel

    NASA Astrophysics Data System (ADS)

    Costa, D.; de Almeida, N. G.; Villas-Boas, C. J.

    2016-07-01

    We propose a secure protocol to send quantum information from one part to another without a quantum channel. In our protocol, which resembles quantum teleportation, a sender (Alice) and a receiver (Bob) share classical correlated states instead of EPR ones, with Alice performing measurements in two different bases and then communicating her results to Bob through a classical channel. Our secure quantum communication protocol requires the same amount of classical bits as the standard quantum teleportation protocol. In our scheme, as in the usual quantum teleportation protocol, once the classical channel is established in a secure way, a spy (Eve) will never be able to recover the information of the unknown quantum state, even if she is aware of Alice's measurement results. Security, advantages, and limitations of our protocol are discussed and compared with the standard quantum teleportation protocol.

  2. Secure quantum communication using classical correlated channel

    NASA Astrophysics Data System (ADS)

    Costa, D.; de Almeida, N. G.; Villas-Boas, C. J.

    2016-10-01

    We propose a secure protocol to send quantum information from one part to another without a quantum channel. In our protocol, which resembles quantum teleportation, a sender (Alice) and a receiver (Bob) share classical correlated states instead of EPR ones, with Alice performing measurements in two different bases and then communicating her results to Bob through a classical channel. Our secure quantum communication protocol requires the same amount of classical bits as the standard quantum teleportation protocol. In our scheme, as in the usual quantum teleportation protocol, once the classical channel is established in a secure way, a spy (Eve) will never be able to recover the information of the unknown quantum state, even if she is aware of Alice's measurement results. Security, advantages, and limitations of our protocol are discussed and compared with the standard quantum teleportation protocol.

  3. On the novel chaotic secure communication scheme design

    NASA Astrophysics Data System (ADS)

    Wang, B.; Zhong, S. M.; Dong, X. C.

    2016-10-01

    In this paper, the problem on the chaotic secure communication is discussed. First a new dual channel transmission mechanism is presented and used in secure communication scheme design, then the channel-switching techniques are adopted to further improve the security of information transmission. Finally some typical numerical simulations are carried out to demonstrate the effectiveness of the proposed secure communication scheme.

  4. Efficient Controlled Quantum Secure Direct Communication Protocols

    NASA Astrophysics Data System (ADS)

    Patwardhan, Siddharth; Moulick, Subhayan Roy; Panigrahi, Prasanta K.

    2016-07-01

    We study controlled quantum secure direct communication (CQSDC), a cryptographic scheme where a sender can send a secret bit-string to an intended recipient, without any secure classical channel, who can obtain the complete bit-string only with the permission of a controller. We report an efficient protocol to realize CQSDC using Cluster state and then go on to construct a (2-3)-CQSDC using Brown state, where a coalition of any two of the three controllers is required to retrieve the complete message. We argue both protocols to be unconditionally secure and analyze the efficiency of the protocols to show it to outperform the existing schemes while maintaining the same security specifications.

  5. 75 FR 28042 - Privacy Act of 1974: System of Records; Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-19

    ... SECURITY Office of the Secretary Privacy Act of 1974: System of Records; Department of Homeland Security...: In accordance with the Privacy Act of 1974 the Department of Homeland Security proposes to update and reissue an existing Department of Homeland Security system of records notice titled,...

  6. 78 FR 73868 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-09

    .... Electronic access is limited by computer security measures that are strictly enforced. TSA file areas are... SECURITY Privacy Act of 1974; Department of Homeland Security Transportation Security Administration--DHS/TSA-001 Transportation Security Enforcement Record System System of Records AGENCY: Privacy...

  7. 77 FR 72814 - Information Collection; Secure Rural Schools Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-06

    ... Secure Rural Schools and Community Self-Determination Act of 2000 (the Act) (16 U.S.C. 7101 et seq.), as... information may be submitted by hard copy and/or electronically scanned and included as an attachment...

  8. 3 CFR - The Energy Independence and Security Act of 2007

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 3 The President 1 2010-01-01 2010-01-01 false The Energy Independence and Security Act of 2007 Presidential Documents Other Presidential Documents Memorandum of January 26, 2009 The Energy Independence and Security Act of 2007 Memorandum for the Secretary of Transportation the Administrator of the National Highway Traffic Safety Administration...

  9. Security model for picture archiving and communication systems.

    PubMed

    Harding, D B; Gac, R J; Reynolds, C T; Romlein, J; Chacko, A K

    2000-05-01

    The modern information revolution has facilitated a metamorphosis of health care delivery wrought with the challenges of securing patient sensitive data. To accommodate this reality, Congress passed the Health Insurance Portability and Accountability Act (HIPAA). While final guidance has not fully been resolved at this time, it is up to the health care community to develop and implement comprehensive security strategies founded on procedural, hardware and software solutions in preparation for future controls. The Virtual Radiology Environment (VRE) Project, a landmark US Army picture archiving and communications system (PACS) implemented across 10 geographically dispersed medical facilities, has addressed that challenge by planning for the secure transmission of medical images and reports over their local (LAN) and wide area network (WAN) infrastructure. Their model, which is transferable to general PACS implementations, encompasses a strategy of application risk and dataflow identification, data auditing, security policy definition, and procedural controls. When combined with hardware and software solutions that are both non-performance limiting and scalable, the comprehensive approach will not only sufficiently address the current security requirements, but also accommodate the natural evolution of the enterprise security model. PMID:10847401

  10. 76 FR 49698 - Covered Securities Pursuant to Section 18 of the Securities Act of 1933

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-11

    ... Exchange Act Release No. 58673 (September 29, 2008), 73 FR 57707 (October 3, 2008) (SR-NYSE- 2008-60 and SR... NYSE Amex LLC (``NYSE Amex''). See Securities Exchange Act Release No. 59575 (March 13, 2009), 74 FR... Securities Exchange Act Release Nos. 53799 (May 12, 2006), 71 FR 29195 (May 19, 2006) and 54071 (June...

  11. Entanglement enhances security in quantum communication

    SciTech Connect

    Demkowicz-Dobrzanski, Rafal; Sen, Aditi; Sen, Ujjwal; Lewenstein, Maciej

    2009-07-15

    Secret sharing is a protocol in which a 'boss' wants to send a classical message secretly to two 'subordinates', such that none of the subordinates is able to know the message alone, while they can find it if they cooperate. Quantum mechanics is known to allow for such a possibility. We analyze tolerable quantum bit error rates in such secret sharing protocols in the physically relevant case when the eavesdropping is local with respect to the two channels of information transfer from the boss to the two subordinates. We find that using entangled encoding states is advantageous to legitimate users of the protocol. We therefore find that entanglement is useful for secure quantum communication. We also find that bound entangled states with positive partial transpose are not useful as a local eavesdropping resource. Moreover, we provide a criterion for security in secret sharing--a parallel of the Csiszar-Koerner criterion in single-receiver classical cryptography.

  12. Security aspects of RFID communication systems

    NASA Astrophysics Data System (ADS)

    Bîndar, Valericǎ; Popescu, Mircea; Bǎrtuşicǎ, Rǎzvan; Craciunescu, Razvan; Halunga, Simona

    2015-02-01

    The objective of this study is to provide an overview of basic technical elements and security risks of RFID communication systems and to analyze the possible threats arising from the use of RFID systems. A number of measurements are performed on a communication system including RFID transponder and the tag reader, and it has been determined that the uplink signal level is 62 dB larger than the average value of the noise at the distance of 1m from the tag, therefore the shielding effectiveness has to exceed this threshold. Next, the card has been covered with several shielding materials and measurements were carried, under similar conditions to test the recovery of compromising signals. A very simple protection measure to prevent unauthorized reading of the data stored on the card has been proposed, and some electromagnetic shielding materials have been proposed and tested.

  13. Wireless sensor systems for sense/decide/act/communicate.

    SciTech Connect

    Berry, Nina M.; Cushner, Adam; Baker, James A.; Davis, Jesse Zehring; Stark, Douglas P.; Ko, Teresa H.; Kyker, Ronald D.; Stinnett, Regan White; Pate, Ronald C.; Van Dyke, Colin; Kyckelhahn, Brian

    2003-12-01

    After 9/11, the United States (U.S.) was suddenly pushed into challenging situations they could no longer ignore as simple spectators. The War on Terrorism (WoT) was suddenly ignited and no one knows when this war will end. While the government is exploring many existing and potential technologies, the area of wireless Sensor networks (WSN) has emerged as a foundation for establish future national security. Unlike other technologies, WSN could provide virtual presence capabilities needed for precision awareness and response in military, intelligence, and homeland security applications. The Advance Concept Group (ACG) vision of Sense/Decide/Act/Communicate (SDAC) sensor system is an instantiation of the WSN concept that takes a 'systems of systems' view. Each sensing nodes will exhibit the ability to: Sense the environment around them, Decide as a collective what the situation of their environment is, Act in an intelligent and coordinated manner in response to this situational determination, and Communicate their actions amongst each other and to a human command. This LDRD report provides a review of the research and development done to bring the SDAC vision closer to reality.

  14. Border Security Results Act of 2013

    THOMAS, 113th Congress

    Sen. Cornyn, John [R-TX

    2013-04-09

    04/09/2013 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  15. Security Clearance Reform Act of 2014

    THOMAS, 113th Congress

    Rep. Lynch, Stephen F. [D-MA-8

    2014-02-10

    03/20/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  16. Expansion of National Security Agency Oversight Act

    THOMAS, 113th Congress

    Rep. Carney, John C., Jr. [D-DE-At Large

    2014-01-15

    03/20/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  17. Border Security Enforcement Act of 2011

    THOMAS, 112th Congress

    Sen. McCain, John [R-AZ

    2011-04-13

    04/13/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  18. Chemical Facility Security Improvement Act of 2013

    THOMAS, 113th Congress

    Rep. Jackson Lee, Sheila [D-TX-18

    2013-01-03

    02/12/2013 Referred to the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  19. Secure electronic commerce communication system based on CA

    NASA Astrophysics Data System (ADS)

    Chen, Deyun; Zhang, Junfeng; Pei, Shujun

    2001-07-01

    In this paper, we introduce the situation of electronic commercial security, then we analyze the working process and security for SSL protocol. At last, we propose a secure electronic commerce communication system based on CA. The system provide secure services such as encryption, integer, peer authentication and non-repudiation for application layer communication software of browser clients' and web server. The system can implement automatic allocation and united management of key through setting up the CA in the network.

  20. Synchronization and a secure communication scheme using optical star network

    NASA Astrophysics Data System (ADS)

    Jeeva Sathya Theesar, S.; Ariffin, M. R. K.; Banerjee, Santo

    2013-12-01

    This work aims to show the effect of synchronization phenomena in multi-nodal star optical network topology as well as to develop an efficient symmetric cryptosystem utilizing available parameters. The optical network is based on chaotic semiconductor laser (SL) systems described by dimensionless modified Lang-Kobayashi's (L-K) delay differential equations. The network nodes are mutually connected with a central semiconductor laser hub with bidirectional linear optical feedback. It has been observed that the laser output can be modulated using a star network setup. The laser intensity increases with the number of nodes and its much more higher than the same for solitary laser, keeping all other inputs as constant. So the network topology is an effective way to optimize the output power. The process by each nodes into the network is illustrated graphically for three, five and seven SLs, respectively. Also the whole network can be implemented as an optical communication system for transmission of signals. Each SL can act as a transceiver during communication. The communication process is examined using a chaotic signal as a plaintext connected with the SL hub and successfully provided a symmetrically secure mechanism upon the communication protocol. The result shows the optimization of output power with the increment of the number of nodes. Also the communication scheme can successfully decode the encrypted signal from SL Hub, at each other nodes.

  1. Strengthening the Department of Homeland Security Secure Mail Initiative Act

    THOMAS, 112th Congress

    Rep. Speier, Jackie [D-CA-14

    2016-03-03

    09/22/2016 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  2. Advanced Shipboard Communications Demonstrations with ACTS

    NASA Technical Reports Server (NTRS)

    Axford, Roy A.; Jedrey, Thomas C.; Rupar, Michael A.

    2000-01-01

    For ships at sea. satellites provide the only option for high data rate (HDR), long haul communications. Furthermore the demand for HDR satellite communications (SATCOM) for military and commercial ships. and other offshore platforms is increasing. Presently the bulk of this maritime HDR SATCOM connectivity is provided via C-band and X-band. However, the shipboard antenna sizes required to achieve a data rate of, say T 1 (1.544 Mbps) with present C-/X-band SATCOM systems range from seven to ten feet in diameter. This limits the classes of ships to which HDR services can be provided to those which are large enough to accommodate the massive antennas. With its high powered K/Ka-band spot beams, the National Aeronautics and Space Administration's (NASA) Advanced Communications Technology Satellite (ACTS) was able to provide T I and higher rate services to ships at sea using much smaller shipboard antennas. This paper discusses three shipboard HDR SATCOM demonstrations that were conducted with ACTS between 1996 and 1998. The first demonstration involved a 2 Mbps link provided to the seismic survey ship MN Geco Diamond equipped with a 16-inch wide, 4.5-inch tall, mechanically steered slotted waveguide array antenna developed by the Jet Propulsion Laboratory. In this February 1996 demonstration ACTS allowed supercomputers ashore to process Geco Diamond's voluminous oceanographic seismic data in near real time. This capability allowed the ship to adjust its search parameters on a daily basis based on feedback from the processed data, thereby greatly increasing survey efficiency. The second demonstration was conducted on the US Navy cruiser USS Princeton (CG 59) with the same antenna used on Geco Diamond. Princeton conducted a six-month (January-July 1997) Western Hemisphere solo deployment during which time T1 connectivity via ACTS provided the ship with a range of valuable tools for operational, administrative and quality-of-life tasks. In one instance, video

  3. Random digital encryption secure communication system

    NASA Technical Reports Server (NTRS)

    Doland, G. D. (Inventor)

    1982-01-01

    The design of a secure communication system is described. A product code, formed from two pseudorandom sequences of digital bits, is used to encipher or scramble data prior to transmission. The two pseudorandom sequences are periodically changed at intervals before they have had time to repeat. One of the two sequences is transmitted continuously with the scrambled data for synchronization. In the receiver portion of the system, the incoming signal is compared with one of two locally generated pseudorandom sequences until correspondence between the sequences is obtained. At this time, the two locally generated sequences are formed into a product code which deciphers the data from the incoming signal. Provision is made to ensure synchronization of the transmitting and receiving portions of the system.

  4. Gerardo Hernandez Airport Security Act of 2014

    THOMAS, 113th Congress

    Rep. Hudson, Richard [R-NC-8

    2014-06-05

    07/23/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  5. Federal Information Security Amendments Act of 2013

    THOMAS, 113th Congress

    Rep. Issa, Darrell E. [R-CA-49

    2013-03-14

    04/17/2013 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Notes: For further action, see S.2521, which became Public Law 113-283 on 12/18/2014. Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  6. Federal Information Security Amendments Act of 2012

    THOMAS, 112th Congress

    Rep. Issa, Darrell E. [R-CA-49

    2012-03-26

    05/07/2012 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  7. Securing our Agriculture and Food Act

    THOMAS, 112th Congress

    Rep. Young, David [R-IA-3

    2016-05-26

    09/27/2016 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  8. Safe and Secure America Act of 2009

    THOMAS, 111th Congress

    Rep. Smith, Lamar [R-TX-21

    2009-03-12

    04/27/2009 Referred to the Subcommittee on Crime, Terrorism, and Homeland Security. (All Actions) Notes: For further action, see H.R.3961, which became Public Law 111-141 on 2/27/2010. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  9. Strengthening Domestic Nuclear Security Act of 2014

    THOMAS, 113th Congress

    Rep. Meehan, Patrick [R-PA-7

    2014-09-18

    12/03/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  10. Security in Bonding Act of 2012

    THOMAS, 112th Congress

    Rep. Hanna, Richard L. [R-NY-24

    2011-12-01

    05/16/2012 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  11. 75 FR 4626 - Order Granting a Temporary Exemption From Certain Government Securities Act Provisions and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-28

    ...) is issuing a temporary exemption from certain Government Securities Act of 1986 provisions and... amended by the Government Securities Act of 1986 (GSA). These regulations impose obligations concerning... Order Granting a Temporary Exemption From Certain Government Securities Act Provisions and...

  12. Controlled bidirectional quantum secure direct communication.

    PubMed

    Chou, Yao-Hsin; Lin, Yu-Ting; Zeng, Guo-Jyun; Lin, Fang-Jhu; Chen, Chi-Yuan

    2014-01-01

    We propose a novel protocol for controlled bidirectional quantum secure communication based on a nonlocal swap gate scheme. Our proposed protocol would be applied to a system in which a controller (supervisor/Charlie) controls the bidirectional communication with quantum information or secret messages between legitimate users (Alice and Bob). In this system, the legitimate users must obtain permission from the controller in order to exchange their respective quantum information or secret messages simultaneously; the controller is unable to obtain any quantum information or secret messages from the decoding process. Moreover, the presence of the controller also avoids the problem of one legitimate user receiving the quantum information or secret message before the other, and then refusing to help the other user decode the quantum information or secret message. Our proposed protocol is aimed at protecting against external and participant attacks on such a system, and the cost of transmitting quantum bits using our protocol is less than that achieved in other studies. Based on the nonlocal swap gate scheme, the legitimate users exchange their quantum information or secret messages without transmission in a public channel, thus protecting against eavesdroppers stealing the secret messages.

  13. Controlled Bidirectional Quantum Secure Direct Communication

    PubMed Central

    Chou, Yao-Hsin; Lin, Yu-Ting; Zeng, Guo-Jyun; Lin, Fang-Jhu; Chen, Chi-Yuan

    2014-01-01

    We propose a novel protocol for controlled bidirectional quantum secure communication based on a nonlocal swap gate scheme. Our proposed protocol would be applied to a system in which a controller (supervisor/Charlie) controls the bidirectional communication with quantum information or secret messages between legitimate users (Alice and Bob). In this system, the legitimate users must obtain permission from the controller in order to exchange their respective quantum information or secret messages simultaneously; the controller is unable to obtain any quantum information or secret messages from the decoding process. Moreover, the presence of the controller also avoids the problem of one legitimate user receiving the quantum information or secret message before the other, and then refusing to help the other user decode the quantum information or secret message. Our proposed protocol is aimed at protecting against external and participant attacks on such a system, and the cost of transmitting quantum bits using our protocol is less than that achieved in other studies. Based on the nonlocal swap gate scheme, the legitimate users exchange their quantum information or secret messages without transmission in a public channel, thus protecting against eavesdroppers stealing the secret messages. PMID:25006596

  14. Social Security Child Protection Act of 2011

    THOMAS, 112th Congress

    Rep. Marchant, Kenny [R-TX-24

    2011-09-22

    09/28/2011 Referred for a period ending not later than September 28, 2011, (or for a later time if the Chairman so designates) to the Subcommittee on Social Security, in each case for consideration of such provisions as fall within the jurisdiction of the subcommittee concerned. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  15. New Opportunities with the Advanced Communications Technology Satellite (ACTS)

    NASA Technical Reports Server (NTRS)

    Bauer, Robert

    1998-01-01

    Various issues associated with the Advanced Communications Technology Satellite (ACTS) are presented in viewgraph form. Specific topics include: 1) ACTS program review; 2) Spot beam locations; 3) Key ACTS technologies; 4) ACTS accomplishments; 5) Experiments operations; 6) Inclined orbit opportunity, mission and impact; 7) Modifications summary; 8) Experiment opportunity, categories, processes; and 9) Recent and ongoing activity.

  16. ACTS Multibeam Communications Package - Technology for the 1990S

    NASA Technical Reports Server (NTRS)

    Graebner, John C.; Cashman, William F.

    1990-01-01

    To maintain its competitive position in the 1990s, satellite communications must evolve to provide new services and to reduce the costs of supplying existing services. NASA's Advanced Communications Technology Satellite (ACTS) program is directed toward developing the technology base that will support this evolution. The ACTS communications payload is optimized for digital communications using a time-division multiple access format. Scanning spot-beam antennas provide high-performance on-demand service to the earth communication stations. On-board processing and switching allow full connectivity in a single-hop network architecture. ACTS employs Ka-band (30/20 GHz) links for communications traffic and includes techniques for mitigating rain fades. Scheduled to be launched by a Space Shuttle in 1992, ACTS will provide in-orbit technology verification and support experimental communications networks for up to four years.

  17. Electronic Communications Privacy Act Amendments Act of 2013

    THOMAS, 113th Congress

    Rep. Salmon, Matt [R-AZ-5

    2013-05-07

    06/14/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  18. A secure communications infrastructure for high-performance distributed computing

    SciTech Connect

    Foster, I.; Koenig, G.; Tuecke, S.

    1997-08-01

    Applications that use high-speed networks to connect geographically distributed supercomputers, databases, and scientific instruments may operate over open networks and access valuable resources. Hence, they can require mechanisms for ensuring integrity and confidentially of communications and for authenticating both users and resources. Security solutions developed for traditional client-server applications do not provide direct support for the program structures, programming tools, and performance requirements encountered in these applications. The authors address these requirements via a security-enhanced version of the Nexus communication library; which they use to provide secure versions of parallel libraries and languages, including the Message Passing Interface. These tools permit a fine degree of control over what, where, and when security mechanisms are applied. In particular, a single application can mix secure and nonsecure communication, allowing the programmer to make fine-grained security/performance tradeoffs. The authors present performance results that quantify the performance of their infrastructure.

  19. 76 FR 70164 - Certain Devices With Secure Communication Capabilities, Components Thereof, and Products...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-10

    ... COMMISSION Certain Devices With Secure Communication Capabilities, Components Thereof, and Products.... International Trade Commission has received a complaint entitled In Re Certain Devices with Secure Communication... certain devices with secure communication capabilities, components thereof, and products containing...

  20. The Indian National Food Security Act, 2013: a commentary.

    PubMed

    Varadharajan, Kiruba Sankar; Thomas, Tinku; Kurpad, Anura

    2014-06-01

    The National Food Security Act (NFSA) 2013, passed recently by the Indian Parliament, aims to ensure food security in India, chiefly by providing cereals at subsidized prices through the Targeted Public Distribution System (TPDS) for about two-thirds of households. The predominant line of criticism of the NFSA has been the costs of such an ambitious rights-based approach in the context of decelerating economic growth and growing fiscal deficits. We argue that the food subsidy has been increasing through the last few decades and is set to climb even higher with this act but that the incremental costs, at about 0.2% of gross domestic product, are not as high as claimed. Further, recent evidence of increasing utilization of the TPDS and decreasing corruption add credence to the act's premise that significant income transfers to poor households can be achieved, thereby promoting food security as well as dietary diversity. Several concerns remain to be addressed in the design and implementation of the act, including its proposed coverage, a cereal-centric approach, the identification of beneficiaries, and its adaptability at the state level. If these are resolved effectively, the act can prove to be a significant step forward in India's long-drawn-out battle against undernutrition and food insecurity. Finally, the NFSA also provides a fresh opportunity to reform and strengthen the TPDS, which has been an integral component of India's strategy to achieve food security at the national level. PMID:25076773

  1. The Indian National Food Security Act, 2013: a commentary.

    PubMed

    Varadharajan, Kiruba Sankar; Thomas, Tinku; Kurpad, Anura

    2014-06-01

    The National Food Security Act (NFSA) 2013, passed recently by the Indian Parliament, aims to ensure food security in India, chiefly by providing cereals at subsidized prices through the Targeted Public Distribution System (TPDS) for about two-thirds of households. The predominant line of criticism of the NFSA has been the costs of such an ambitious rights-based approach in the context of decelerating economic growth and growing fiscal deficits. We argue that the food subsidy has been increasing through the last few decades and is set to climb even higher with this act but that the incremental costs, at about 0.2% of gross domestic product, are not as high as claimed. Further, recent evidence of increasing utilization of the TPDS and decreasing corruption add credence to the act's premise that significant income transfers to poor households can be achieved, thereby promoting food security as well as dietary diversity. Several concerns remain to be addressed in the design and implementation of the act, including its proposed coverage, a cereal-centric approach, the identification of beneficiaries, and its adaptability at the state level. If these are resolved effectively, the act can prove to be a significant step forward in India's long-drawn-out battle against undernutrition and food insecurity. Finally, the NFSA also provides a fresh opportunity to reform and strengthen the TPDS, which has been an integral component of India's strategy to achieve food security at the national level.

  2. Secure communications in the presence of pervasive deceit

    SciTech Connect

    Simmons, G.J.

    1980-01-01

    The functions of secrecy, identification of the transmitter and of authentication of messages, and combinations of these, are in principle all achievable with either symmetric or asymmetric cryptosystems. Since secure communications depend on authenticated data exchanges between and/or authenticated actions by some of the parties to the communication, the fundamentals of authentication using symmetric or asymmetric techniques are developed. The surprising conclusion is that they differ only in the secure exchanges required to achieve further secure communications. The problem of authenticating a public-key directory is discussed in the light of these findings.

  3. 17 CFR 230.157 - Small entities under the Securities Act for purposes of the Regulatory Flexibility Act.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Small entities under the Securities Act for purposes of the Regulatory Flexibility Act. 230.157 Section 230.157 Commodity and... General § 230.157 Small entities under the Securities Act for purposes of the Regulatory Flexibility...

  4. 17 CFR 230.157 - Small entities under the Securities Act for purposes of the Regulatory Flexibility Act.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Small entities under the Securities Act for purposes of the Regulatory Flexibility Act. 230.157 Section 230.157 Commodity and... General § 230.157 Small entities under the Securities Act for purposes of the Regulatory Flexibility...

  5. 17 CFR 230.157 - Small entities under the Securities Act for purposes of the Regulatory Flexibility Act.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Small entities under the Securities Act for purposes of the Regulatory Flexibility Act. 230.157 Section 230.157 Commodity and... General § 230.157 Small entities under the Securities Act for purposes of the Regulatory Flexibility...

  6. 17 CFR 230.157 - Small entities under the Securities Act for purposes of the Regulatory Flexibility Act.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Small entities under the Securities Act for purposes of the Regulatory Flexibility Act. 230.157 Section 230.157 Commodity and... General § 230.157 Small entities under the Securities Act for purposes of the Regulatory Flexibility...

  7. 17 CFR 230.157 - Small entities under the Securities Act for purposes of the Regulatory Flexibility Act.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Small entities under the Securities Act for purposes of the Regulatory Flexibility Act. 230.157 Section 230.157 Commodity and... General § 230.157 Small entities under the Securities Act for purposes of the Regulatory Flexibility...

  8. Commercialization of Advanced Communications Technology Satellite (ACTS) technology

    NASA Astrophysics Data System (ADS)

    Plecity, Mark S.; Strickler, Walter M.; Bauer, Robert A.

    1996-03-01

    In an on-going effort to maintain United States leadership in communication satellite technology, the National Aeronautics and Space Administration (NASA), led the development of the Advanced Communications Technology Satellite (ACTS). NASA's ACTS program provides industry, academia, and government agencies the opportunity to perform both technology and telecommunication service experiments with a leading-edge communication satellite system. Over 80 organizations are using ACTS as a multi server test bed to establish communication technologies and services of the future. ACTS was designed to provide demand assigned multiple access (DAMA) digital communications with a minimum switchable circuit bandwidth of 64 Kbps, and a maximum channel bandwidth of 900 MHZ. It can, therefore, provide service to thin routes as well as connect fiber backbones in supercomputer networks, across oceans, or restore full communications in the event of national or manmade disaster. Service can also be provided to terrestrial and airborne mobile users. Commercial applications of ACTS technologies include: telemedicine; distance education; Department of Defense operations; mobile communications, aeronautical applications, terrestrial applications, and disaster recovery. This paper briefly describes the ACTS system and the enabling technologies employed by ACTS including Ka-band hopping spot beams, on-board routing and switching, and rain fade compensation. When used in conjunction with a time division multiple access (TDMA) architecture, these technologies provide a higher capacity, lower cost satellite system. Furthermore, examples of completed user experiments, future experiments, and plans of organizations to commercialize ACTS technology in their own future offerings will be discussed.

  9. Quantum Secure Direct Communication with Authentication Expansion Using Single Photons

    NASA Astrophysics Data System (ADS)

    Yang, Jing; Wang, Chuan; Zhang, Ru

    2010-11-01

    In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication. The authentication key expansion method is introduced to improve the life of the keys with security. In the first scheme, the third party, called Trent is introduced to authenticate the users that participate in the communication. He sends the polarized photons in blocks to authenticate communication parties Alice and Bob using the authentication keys. In the communication process, polarized single photons are used to serve as the carriers, which transmit the secret messages directly. The second QSDC process with authentication between two parties is also discussed.

  10. Education for Economic Security Act. Public Law 98-377.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC.

    This document is the complete text of Public Law 98-377 ("Education for Economic Security Act") which is designed to: (1) provide assistance to improve elementary, secondary, and postsecondary education in mathematics and science; (2) provide a national policy for engineering, technical, and scientific personnel; (3) provide cost sharing by the…

  11. Online Communications and Geolocation Protection Act

    THOMAS, 113th Congress

    Rep. Lofgren, Zoe [D-CA-19

    2013-03-06

    04/08/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, And Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  12. Comment on: Supervisory Asymmetric Deterministic Secure Quantum Communication

    NASA Astrophysics Data System (ADS)

    Kao, Shih-Hung; Tsai, Chia-Wei; Hwang, Tzonelih

    2012-12-01

    In 2010, Xiu et al. (Optics Communications 284:2065-2069, 2011) proposed several applications based on a new secure four-site distribution scheme using χ-type entangled states. This paper points out that one of these applications, namely, supervisory asymmetric deterministic secure quantum communication, is subject to an information leakage problem, in which the receiver can extract two bits of a three-bit secret message without the supervisor's permission. An enhanced protocol is proposed to resolve this problem.

  13. Sensor based framework for secure multimedia communication in VANET.

    PubMed

    Rahim, Aneel; Khan, Zeeshan Shafi; Bin Muhaya, Fahad T; Sher, Muhammad; Kim, Tai-Hoon

    2010-01-01

    Secure multimedia communication enhances the safety of passengers by providing visual pictures of accidents and danger situations. In this paper we proposed a framework for secure multimedia communication in Vehicular Ad-Hoc Networks (VANETs). Our proposed framework is mainly divided into four components: redundant information, priority assignment, malicious data verification and malicious node verification. The proposed scheme jhas been validated with the help of the NS-2 network simulator and the Evalvid tool. PMID:22163462

  14. Security guard at Smithsonian not protected by Rehab Act.

    PubMed

    1998-01-23

    [Name removed], an HIV-positive security guard at the Smithsonian Institution, sued the institution and two supervisors, alleging they violated the Rehabilitation Act, Title VII of the Civil Rights act, State and city human rights laws, and the Federal Tort Claims Act. [Name removed] claims he was harassed by supervisors because of his HIV status and ethnicity, was refused time off for medical care, retaliated against due to prior complaints, and denied training opportunities because he is HIV-positive. U.S. District Judge Peter K. Leisure ruled that [name removed] could not prevail under Section 791 of the Rehabilitation Act because the Smithsonian does not qualify as an executive agency. Leisure also found that [name removed] could neither claim retaliation under Title VII nor invasion of privacy under the Federal Tort Claims Act.

  15. The Advanced Communications Technology Satellite (ACTS) capabilities for serving science

    NASA Technical Reports Server (NTRS)

    Meyer, Thomas R.

    1990-01-01

    Results of research on potential science applications of the NASA Advanced Communications Technology Satellite (ACTS) are presented. Discussed here are: (1) general research on communications related issues; (2) a survey of science-related activities and programs in the local area; (3) interviews of selected scientists and associated telecommunications support personnel whose projects have communications requirements; (4) analysis of linkages between ACTS functionality and science user communications activities and modes of operation; and (5) an analysis of survey results and the projection of conclusions to a national scale.

  16. A secure communication suite for underwater acoustic sensor networks.

    PubMed

    Dini, Gianluca; Lo Duca, Angelica

    2012-01-01

    In this paper we describe a security suite for Underwater Acoustic Sensor Networks comprising both fixed and mobile nodes. The security suite is composed of a secure routing protocol and a set of cryptographic primitives aimed at protecting the confidentiality and the integrity of underwater communication while taking into account the unique characteristics and constraints of the acoustic channel. By means of experiments and simulations based on real data, we show that the suite is suitable for an underwater networking environment as it introduces limited, and sometimes negligible, communication and power consumption overhead.

  17. A Secure Communication Suite for Underwater Acoustic Sensor Networks

    PubMed Central

    Dini, Gianluca; Duca, Angelica Lo

    2012-01-01

    In this paper we describe a security suite for Underwater Acoustic Sensor Networks comprising both fixed and mobile nodes. The security suite is composed of a secure routing protocol and a set of cryptographic primitives aimed at protecting the confidentiality and the integrity of underwater communication while taking into account the unique characteristics and constraints of the acoustic channel. By means of experiments and simulations based on real data, we show that the suite is suitable for an underwater networking environment as it introduces limited, and sometimes negligible, communication and power consumption overhead. PMID:23202204

  18. Secure and Authenticated Data Communication in Wireless Sensor Networks.

    PubMed

    Alfandi, Omar; Bochem, Arne; Kellner, Ansgar; Göge, Christian; Hogrefe, Dieter

    2015-01-01

    Securing communications in wireless sensor networks is increasingly important as the diversity of applications increases. However, even today, it is equally important for the measures employed to be energy efficient. For this reason, this publication analyzes the suitability of various cryptographic primitives for use in WSNs according to various criteria and, finally, describes a modular, PKI-based framework for confidential, authenticated, secure communications in which most suitable primitives can be employed. Due to the limited capabilities of common WSN motes, criteria for the selection of primitives are security, power efficiency and memory requirements. The implementation of the framework and the singular components have been tested and benchmarked in our testbed of IRISmotes.

  19. Novel technology for enhanced security and trust in communication networks

    NASA Astrophysics Data System (ADS)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit; Jannson, Tomasz

    2011-06-01

    A novel technology that significantly enhances security and trust in wireless and wired communication networks has been developed. It is based on integration of a novel encryption mechanism and novel data packet structure with enhanced security tools. This novel data packet structure results in an unprecedented level of security and trust, while at the same time reducing power consumption and computing/communication overhead in networks. As a result, networks are provided with protection against intrusion, exploitation, and cyber attacks and posses self-building, self-awareness, self-configuring, self-healing, and self-protecting intelligence.

  20. Secure satellite communication using multi-photon tolerant quantum communication protocol

    NASA Astrophysics Data System (ADS)

    Darunkar, Bhagyashri; Punekar, Nikhil; Verma, Pramode K.

    2015-09-01

    This paper proposes and analyzes the potential of a multi-photon tolerant quantum communication protocol to secure satellite communication. For securing satellite communication, quantum cryptography is the only known unconditionally secure method. A number of recent experiments have shown feasibility of satellite-aided global quantum key distribution (QKD) using different methods such as: Use of entangled photon pairs, decoy state methods, and entanglement swapping. The use of single photon in these methods restricts the distance and speed over which quantum cryptography can be applied. Contemporary quantum cryptography protocols like the BB84 and its variants suffer from the limitation of reaching the distances of only Low Earth Orbit (LEO) at the data rates of few kilobits per second. This makes it impossible to develop a general satellite-based secure global communication network using the existing protocols. The method proposed in this paper allows secure communication at the heights of the Medium Earth Orbit (MEO) and Geosynchronous Earth Orbit (GEO) satellites. The benefits of the proposed method are two-fold: First it enables the realization of a secure global communication network based on satellites and second it provides unconditional security for satellite networks at GEO heights. The multi-photon approach discussed in this paper ameliorates the distance and speed issues associated with quantum cryptography through the use of contemporary laser communication (lasercom) devices. This approach can be seen as a step ahead towards global quantum communication.

  1. Advanced Communication Technology Satellite (ACTS) multibeam antenna technology verification experiments

    NASA Technical Reports Server (NTRS)

    Acosta, Roberto J.; Larko, Jeffrey M.; Lagin, Alan R.

    1992-01-01

    The Advanced Communication Technology Satellite (ACTS) is a key to reaching NASA's goal of developing high-risk, advanced communications technology using multiple frequency bands to support the nation's future communication needs. Using the multiple, dynamic hopping spot beams, and advanced on board switching and processing systems, ACTS will open a new era in communications satellite technology. One of the key technologies to be validated as part of the ACTS program is the multibeam antenna with rapidly reconfigurable hopping and fixed spot beam to serve users equipped with small-aperature terminals within the coverage areas. The proposed antenna technology experiments are designed to evaluate in-orbit ACTS multibeam antenna performance (radiation pattern, gain, cross pol levels, etc.).

  2. Quantum Secure Direct Communication Based on Chaos with Authentication

    NASA Astrophysics Data System (ADS)

    Huang, Dazu; Chen, Zhigang; Guo, Ying; Lee, Moon Ho

    2007-12-01

    A quantum secure direct communication protocol based on chaos is proposed with authentication. It has an advantage over distributing the secret message directly and verifying the communicators’ identities with the assistance of a trusted center. To ensure the security of the secret message and the process of verification, the initial order of the travel particles is disturbed according to a chaotic sequence generated secretly via the general Arnold map. Security analysis demonstrates that the present scheme is secure against several attack strategies, such as the man-in-the-middle attack and Trojan horse attack.

  3. Review of the 2015 Drug Supply Chain Security Act.

    PubMed

    Brechtelsbauer, Erich D; Pennell, Benjamin; Durham, Mary; Hertig, John B; Weber, Robert J

    2016-06-01

    The integrity of the pharmaceutical supply chain is threatened by medication counterfeiting, importation of unapproved and substandard drugs, and grey markets - all of which have the potential to distribute drug products with the potential for serious harm. On November 27, 2013, President Obama signed into law Title II of the Drug Quality and Security Act, now known as the Drug Supply Chain Security Act (DSCSA). Over the next 10 years, the DSCSA will require the pharmaceutical supply chain to implement medication tracking and tracing; serialization, verification, and detection of suspicious products; and strict guidelines for wholesaler licensing and reporting. This article reviews the important aspects of the DSCSA and outlines the role of health-system pharmacy leaders in ensuring compliance to the DSCSA. By verifying that medication supplies are free from adulteration and tampering, the DSCSA serves as a foundational law to ensure quality in providing patient-centered pharmacy services. PMID:27354753

  4. Advanced Communications Technology Satellite (ACTS): Four-Year System Performance

    NASA Technical Reports Server (NTRS)

    Acosta, Roberto J.; Bauer, Robert; Krawczyk, Richard J.; Reinhart, Richard C.; Zernic, Michael J.; Gargione, Frank

    1999-01-01

    The Advanced Communications Technology Satellite (ACTS) was conceived at the National Aeronautics and Space Administration (NASA) in the late 1970's as a follow-on program to ATS and CTS to continue NASA's long history of satellite communications projects. The ACTS project set the stage for the C-band satellites that started the industry, and later the ACTS project established the use of Ku-band for video distribution and direct-to-home broadcasting. ACTS, launched in September 1993 from the space shuttle, created a revolution in satellite system architecture by using digital communications techniques employing key technologies such as a fast hopping multibeam antenna, an on-board baseband processor, a wide-band microwave switch matrix, adaptive rain fade compensation, and the use of 900 MHz transponders operating at Ka-band frequencies. This paper describes the lessons learned in each of the key ACTS technology areas, as well as in the propagation investigations.

  5. A Multiparty Controlled Bidirectional Quantum Secure Direct Communication and Authentication Protocol Based on EPR Pairs

    NASA Astrophysics Data System (ADS)

    Chang, Yan; Zhang, Shi-Bin; Yan, Li-Li; Sheng, Zhi-Wei

    2013-06-01

    A multiparty controlled bidirectional quantum secure direct communication and authentication protocol is proposed based on EPR pair and entanglement swapping. The legitimate identities of communicating parties are encoded to Bell states which act as a detection sequence. Secret messages are transmitted by using the classical XOR operation, which serves as a one-time-pad. No photon with secret information transmits in the quantum channel. Compared with the protocols proposed by Wang et al. [Acta Phys. Sin. 56 (2007) 673; Opt. Commun. 266 (2006) 732], the protocol in this study implements bidirectional communication and authentication, which defends most attacks including the ‘man-in-the-middle’ attack efficiently.

  6. Quantum Communication for the Ultimate Capacity and Security

    NASA Astrophysics Data System (ADS)

    Sasaki, Masahide; Fujiwara, Mikio; Takeoka, Masahiro

    Quantum info-communication technologies (Q-ICT) will be able to realize quantum communication which attains higher capacity than that of conventional optical communications, and the unconditionally secure communication, known as quantum key distribution (QKD), that cannot be broken by any future technologies. In this article we first review a brief history of Q-ICT, and introduce basic notions and results so far. We then present our recent results on these two technologies, addressing current limitations of the known schemes, and finally discuss future perspectives, especially a challenge to merge the merits of the two.

  7. 75 FR 18860 - Privacy Act of 1974, Department of Homeland Security Transportation Security Administration-013...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-13

    ... Officer Record System (FDORS), previously published on August 18, 2003 (68 FR 49496). TSA's mission is to... reflected in the final rule published on June 25, 2004, 69 FR 35536. Consistent with the Privacy Act... Security Administration--013 Federal Flight Deck Officer Record System AGENCY: Privacy Office, DHS....

  8. 17 CFR 239.18 - Form S-11, for registration under the Securities Act of 1933 of securities of certain real estate...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... under the Securities Act of 1933 of securities of certain real estate companies. 239.18 Section 239.18... Securities Act of 1933 of securities of certain real estate companies. This form shall be used for registration under the Securities Act of 1933 of (a) securities issued by real estate investment trusts,...

  9. ACTS Multibeam Communications Package - Description and Performance Characterization

    NASA Technical Reports Server (NTRS)

    Cashman, William F.

    1992-01-01

    To maintain its competitive position in the 1990s, satellite communications must evolve to provide new services and to reduce the costs of supplying existing services. NASA's Advanced Communications Technology Satellite (ACTS) program is directed toward developing the technology base that will support this evolution. The ACTS communications payload is optimized for digital communications using a time-division multiple-access format. Scanning spot-beam antennas provide high-performance, on-demand service to communications earth stations. On-board processing and switching allow full connectivity in a single-hop network architecture. ACTS employs Ka-Band (30/20 GHz) links for communications traffic and includes techniques for mitigating rain fades. The prelaunch test program has verified that all critical payload performance requirements have been realized, including G/T, EIRP, beam coverage, AM/AM, AM/PM, and BER vs. E(b)/N(o). Scheduled to be launched by a Space Shuttle in 1993, ACTS will provide in-orbit technology verification and support experimental communications networks for up to four years.

  10. 75 FR 8088 - Privacy Act of 1974; Department of Homeland Security/ALL-023 Personnel Security Management System...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... Management System of Records (74 FR 3084, January 16, 2009) for the collection and maintenance of records... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL--023 Personnel... to update and reissue Department of Homeland Security/ALL--023 Personnel Security Management...

  11. 75 FR 5166 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-01

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration/Railroad Retirement Board (SSA/RRB))-- Match Number 1308 AGENCY: Social Security Administration...

  12. Quantum authencryption: one-step authenticated quantum secure direct communications for off-line communicants

    NASA Astrophysics Data System (ADS)

    Hwang, Tzonelih; Luo, Yi-Ping; Yang, Chun-Wei; Lin, Tzu-Han

    2014-04-01

    This work proposes a new direction in quantum cryptography called quantum authencryption. Quantum authencryption (QA), a new term to distinguish from authenticated quantum secure direct communications, is used to describe the technique of combining quantum encryption and quantum authentication into one process for off-line communicants. QA provides a new way of quantum communications without the presence of a receiver on line, and thus makes many applications depending on secure one-way quantum communications, such as quantum E-mail systems, possible. An example protocol using single photons and one-way hash functions is presented to realize the requirements on QA.

  13. Personal communications via ACTS satellite HBR transponders

    NASA Technical Reports Server (NTRS)

    Fang, Russell J. F.

    1991-01-01

    The concept of a fully meshed network of briefcase-sized terminals is presented for personal communications over Ka-band satellite transponders. In this concept, undesirable double-hop delays are avoided for voice communications. The bandwidth and power resources of the transponder are efficiently shared by users in a simple demand-assigned manner via code-division multiple access (CDMA). Voice, data, and facsimile are statistically multiplexed at each terminal. In order to minimize terminal costs, frequency-precorrected, and level-preadjusted continuous-wave tones are sent from the central network control station in each beam so that the terminals in each down-link beam can use these pilots as references for antenna acquisition and tracking, as reliable frequency sources, and as indicators of signal fade for up-link power control (ULPC). The potential CDMA 'near-far' problem due to up-link fades is mitigated by using ULPC. Quasi-burst mode transmission is employed to minimize the potential clock and pseudorandom number code synchronization.

  14. Secure steganographic communication algorithm based on self-organizing patterns

    NASA Astrophysics Data System (ADS)

    Saunoriene, Loreta; Ragulskis, Minvydas

    2011-11-01

    A secure steganographic communication algorithm based on patterns evolving in a Beddington-de Angelis-type predator-prey model with self- and cross-diffusion is proposed in this paper. Small perturbations of initial states of the system around the state of equilibrium result in the evolution of self-organizing patterns. Small differences between initial perturbations result in slight differences also in the evolving patterns. It is shown that the generation of interpretable target patterns cannot be considered as a secure mean of communication because contours of the secret image can be retrieved from the cover image using statistical techniques if only it represents small perturbations of the initial states of the system. An alternative approach when the cover image represents the self-organizing pattern that has evolved from initial states perturbed using the dot-skeleton representation of the secret image can be considered as a safe visual communication technique protecting both the secret image and communicating parties.

  15. 18-month-olds comprehend indirect communicative acts.

    PubMed

    Schulze, Cornelia; Tomasello, Michael

    2015-03-01

    From soon after their first birthdays young children are able to make inferences from a communicator's referential act (e.g., pointing to a container) to her overall social goal for communication (e.g., to inform that a searched-for toy is inside; see Behne, Carpenter, & Tomasello, 2005; Behne, Liszkowski, Carpenter, & Tomasello, 2012). But in such cases the inferential distance between referential act and communicative intention is still fairly close, as both container and searched-for toy lie in the direction of the pointing gesture. In the current study we tested 18- and 26-month-old children in a situation in which referential act and communicative goal were more distant: In the midst of a game, the child needed a certain toy. The experimenter then held up a key (that they knew in common ground could be used to open a container) to the child ostensively. In two control conditions the experimenter either inadvertently moved the key and so drew the child's attention to it non-ostensively or else held up the key for her own inspection intentionally but non-communicatively. Children of both ages took only the ostensive showing of the key, not the accidental moving or the non-ostensive but intentional inspection of the key, as an indirect request to take the key and open the container to retrieve the toy inside. From soon after they start acquiring language young children thus are able to infer a communicator's social goal for communication not only from directly-referential acts, but from more indirect communicative acts as well.

  16. Secure OFDM communications based on hashing algorithms

    NASA Astrophysics Data System (ADS)

    Neri, Alessandro; Campisi, Patrizio; Blasi, Daniele

    2007-10-01

    In this paper we propose an OFDM (Orthogonal Frequency Division Multiplexing) wireless communication system that introduces mutual authentication and encryption at the physical layer, without impairing spectral efficiency, exploiting some freedom degrees of the base-band signal, and using encrypted-hash algorithms. FEC (Forward Error Correction) is instead performed through variable-rate Turbo Codes. To avoid false rejections, i.e. rejections of enrolled (authorized) users, we designed and tested a robust hash algorithm. This robustness is obtained both by a segmentation of the hash domain (based on BCH codes) and by the FEC capabilities of Turbo Codes.

  17. 17 CFR 229.510 - (Item 510) Disclosure of Commission position on indemnification for Securities Act liabilities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... opinion of the Securities and Exchange Commission such indemnification is against public policy as... SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF...

  18. 17 CFR 229.510 - (Item 510) Disclosure of Commission position on indemnification for Securities Act liabilities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... opinion of the Securities and Exchange Commission such indemnification is against public policy as... SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF...

  19. 17 CFR 229.510 - (Item 510) Disclosure of Commission position on indemnification for Securities Act liabilities.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... opinion of the Securities and Exchange Commission such indemnification is against public policy as... SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF...

  20. 17 CFR 229.510 - (Item 510) Disclosure of Commission position on indemnification for Securities Act liabilities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... opinion of the Securities and Exchange Commission such indemnification is against public policy as... SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF...

  1. 17 CFR 229.510 - (Item 510) Disclosure of Commission position on indemnification for Securities Act liabilities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... opinion of the Securities and Exchange Commission such indemnification is against public policy as... SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF...

  2. 75 FR 11191 - Privacy Act of 1974; Retirement of Department of Homeland Security Federal Emergency Management...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-10

    ... SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Federal... of Homeland Security is giving notice that it proposes to retire Department of Homeland Security..., Department of Homeland Security, Washington, DC 20472. For privacy issues please contact: Mary......

  3. Transitioning from analog to digital communications: An information security perspective

    NASA Technical Reports Server (NTRS)

    Dean, Richard A.

    1990-01-01

    A summary is given of the government's perspective on evolving digital communications as they affect secure voice users and approaches for operating during a transition period to an all digital world. An integrated architecture and a mobile satellite interface are discussed.

  4. 49 CFR 236.1033 - Communications and security requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., INSPECTION, MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Positive Train Control Systems § 236.1033 Communications and security requirements. (a) All wireless... shall: (1) Use an algorithm approved by the National Institute of Standards (NIST) or a...

  5. 49 CFR 236.1033 - Communications and security requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., INSPECTION, MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Positive Train Control Systems § 236.1033 Communications and security requirements. (a) All wireless... shall: (1) Use an algorithm approved by the National Institute of Standards (NIST) or a...

  6. Secure SCADA communication by using a modified key management scheme.

    PubMed

    Rezai, Abdalhossein; Keshavarzi, Parviz; Moravej, Zahra

    2013-07-01

    This paper presents and evaluates a new cryptographic key management scheme which increases the efficiency and security of the Supervisory Control And Data Acquisition (SCADA) communication. In the proposed key management scheme, two key update phases are used: session key update and master key update. In the session key update phase, session keys are generated in the master station. In the master key update phase, the Elliptic Curve Diffie-Hellman (ECDH) protocol is used. The Poisson process is also used to model the Security Index (SI) and Quality of Service (QoS). Our analysis shows that the proposed key management not only supports the required speed in the MODBUS implementation but also has several advantages compared to other key management schemes for secure communication in SCADA networks.

  7. Secure SCADA communication by using a modified key management scheme.

    PubMed

    Rezai, Abdalhossein; Keshavarzi, Parviz; Moravej, Zahra

    2013-07-01

    This paper presents and evaluates a new cryptographic key management scheme which increases the efficiency and security of the Supervisory Control And Data Acquisition (SCADA) communication. In the proposed key management scheme, two key update phases are used: session key update and master key update. In the session key update phase, session keys are generated in the master station. In the master key update phase, the Elliptic Curve Diffie-Hellman (ECDH) protocol is used. The Poisson process is also used to model the Security Index (SI) and Quality of Service (QoS). Our analysis shows that the proposed key management not only supports the required speed in the MODBUS implementation but also has several advantages compared to other key management schemes for secure communication in SCADA networks. PMID:23528753

  8. Secure and Authenticated Data Communication in Wireless Sensor Networks

    PubMed Central

    Alfandi, Omar; Bochem, Arne; Kellner, Ansgar; Göge, Christian; Hogrefe, Dieter

    2015-01-01

    Securing communications in wireless sensor networks is increasingly important as the diversity of applications increases. However, even today, it is equally important for the measures employed to be energy efficient. For this reason, this publication analyzes the suitability of various cryptographic primitives for use in WSNs according to various criteria and, finally, describes a modular, PKI-based framework for confidential, authenticated, secure communications in which most suitable primitives can be employed. Due to the limited capabilities of common WSN motes, criteria for the selection of primitives are security, power efficiency and memory requirements. The implementation of the framework and the singular components have been tested and benchmarked in our testbed of IRISmotes. PMID:26266413

  9. Secure and Authenticated Data Communication in Wireless Sensor Networks.

    PubMed

    Alfandi, Omar; Bochem, Arne; Kellner, Ansgar; Göge, Christian; Hogrefe, Dieter

    2015-01-01

    Securing communications in wireless sensor networks is increasingly important as the diversity of applications increases. However, even today, it is equally important for the measures employed to be energy efficient. For this reason, this publication analyzes the suitability of various cryptographic primitives for use in WSNs according to various criteria and, finally, describes a modular, PKI-based framework for confidential, authenticated, secure communications in which most suitable primitives can be employed. Due to the limited capabilities of common WSN motes, criteria for the selection of primitives are security, power efficiency and memory requirements. The implementation of the framework and the singular components have been tested and benchmarked in our testbed of IRISmotes. PMID:26266413

  10. Security Encryption Scheme for Communication of Web Based Control Systems

    NASA Astrophysics Data System (ADS)

    Robles, Rosslin John; Kim, Tai-Hoon

    A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network Since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Control Systems through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.

  11. Secure and interoperable communication infrastructures for PPDR organisations

    NASA Astrophysics Data System (ADS)

    Müller, Wilmuth; Marques, Hugo; Pereira, Luis; Rodriguez, Jonathan; Brouwer, Frank; Bouwers, Bert; Politis, Ilias; Lykourgiotis, Asimakis; Ladas, Alexandros; Adigun, Olayinka; Jelenc, David

    2016-05-01

    The growing number of events affecting public safety and security (PS&S) on a regional scale with potential to grow up to large scale cross border disasters puts an increased pressure on agencies and organisation responsible for PS&S. In order to respond timely and in an adequate manner to such events, Public Protection and Disaster Relief (PPDR) organisations need to cooperate, align their procedures and activities, share the needed information and be interoperable. Existing PPDR/PMR technologies such as TETRA, TETRAPOL or P25, do not currently provide broadband capability nor is expected such technologies to be upgraded in the future. This presents a major limitation in supporting new services and information flows. Furthermore, there is no known standard that addresses interoperability of these technologies. In this contribution the design of a next generation communication infrastructure for PPDR organisations which fulfills the requirements of secure and seamless end-to-end communication and interoperable information exchange within the deployed communication networks is presented. Based on Enterprise Architecture of PPDR organisations, a next generation PPDR network that is backward compatible with legacy communication technologies is designed and implemented, capable of providing security, privacy, seamless mobility, QoS and reliability support for mission-critical Private Mobile Radio (PMR) voice and broadband data services. The designed solution provides a robust, reliable, and secure mobile broadband communications system for a wide variety of PMR applications and services on PPDR broadband networks, including the ability of inter-system, interagency and cross-border operations with emphasis on interoperability between users in PMR and LTE.

  12. 76 FR 30374 - Cruise Vessel Safety and Security Act of 2010, Available Technology

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-25

    ... SECURITY Coast Guard Cruise Vessel Safety and Security Act of 2010, Available Technology AGENCY: Coast... public comment on the availability of technology to meet certain provisions of the Cruise Vessel Security and Safety Act of 2010(CVSSA), specifically related to video recording and overboard...

  13. 76 FR 31350 - Cruise Vessel Safety and Security Act of 2010, Available Technology

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-31

    ... SECURITY Coast Guard Cruise Vessel Safety and Security Act of 2010, Available Technology AGENCY: Coast... technology to meet certain provisions of the Cruise Vessel Security and Safety Act of 2010(CVSSA), specifically related to video recording and overboard detection technologies. The Notice of request...

  14. 76 FR 72495 - Alabama Metal Coil Securement Act; Petition for Determination of Preemption

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-23

    ... TRANSPORTATION Federal Motor Carrier Safety Administration Alabama Metal Coil Securement Act; Petition for... determination that the State of Alabama's Metal Coil Securement Act is preempted by Federal law. FMCSA requests comments on what effect, if any, Alabama's metal coil load securement certification requirements may...

  15. Hard ACTS to follow. [NASA Advanced Communications Technology Satellite

    NASA Technical Reports Server (NTRS)

    Moy, L.

    1986-01-01

    The Advanced Communications Technology Satellite (ACTS), the third phase of NASA's 30/20 GHz satellite communications program, is praised for its frugal usage of both the geosynchronous orbital arch and the frequency spectrum resources necessary for communications satellites. Its objective is to verify Ka-band satellite communications concepts and to develop a flight and ground system for validation of the multibeam communications proof-of-concept technologies. The ACTS ground segment (comprised of four types of terminals) is designed to compliment the spacecraft for the SS launch in 1989. Precise coordination between the ground and spacecraft segments is performed by the baseband processor (BBP), which is an in-orbit switchboard, and the tracking error word, which enables the ground terminals to remain synchronized with onboard timing. Fixed spot beams and scan beams, comprising the two types of spot beams used, both operate at the same frequency and hence, conserve frequency resources. In addition, the time division multiple access serves to enhance system efficiency. It is concluded that Ka-band satellites are a practical approach to the better usage of those resources potentially threatened by communications satellites. Comprehensive graphs and block diagrams of the system are included.

  16. Quantum-secure covert communication on bosonic channels

    NASA Astrophysics Data System (ADS)

    Bash, Boulat A.; Gheorghe, Andrei H.; Patel, Monika; Habif, Jonathan L.; Goeckel, Dennis; Towsley, Don; Guha, Saikat

    2015-10-01

    Computational encryption, information-theoretic secrecy and quantum cryptography offer progressively stronger security against unauthorized decoding of messages contained in communication transmissions. However, these approaches do not ensure stealth--that the mere presence of message-bearing transmissions be undetectable. We characterize the ultimate limit of how much data can be reliably and covertly communicated over the lossy thermal-noise bosonic channel (which models various practical communication channels). We show that whenever there is some channel noise that cannot in principle be controlled by an otherwise arbitrarily powerful adversary--for example, thermal noise from blackbody radiation--the number of reliably transmissible covert bits is at most proportional to the square root of the number of orthogonal modes (the time-bandwidth product) available in the transmission interval. We demonstrate this in a proof-of-principle experiment. Our result paves the way to realizing communications that are kept covert from an all-powerful quantum adversary.

  17. Quantum-secure covert communication on bosonic channels.

    PubMed

    Bash, Boulat A; Gheorghe, Andrei H; Patel, Monika; Habif, Jonathan L; Goeckel, Dennis; Towsley, Don; Guha, Saikat

    2015-01-01

    Computational encryption, information-theoretic secrecy and quantum cryptography offer progressively stronger security against unauthorized decoding of messages contained in communication transmissions. However, these approaches do not ensure stealth--that the mere presence of message-bearing transmissions be undetectable. We characterize the ultimate limit of how much data can be reliably and covertly communicated over the lossy thermal-noise bosonic channel (which models various practical communication channels). We show that whenever there is some channel noise that cannot in principle be controlled by an otherwise arbitrarily powerful adversary--for example, thermal noise from blackbody radiation--the number of reliably transmissible covert bits is at most proportional to the square root of the number of orthogonal modes (the time-bandwidth product) available in the transmission interval. We demonstrate this in a proof-of-principle experiment. Our result paves the way to realizing communications that are kept covert from an all-powerful quantum adversary. PMID:26478089

  18. Quantum-secure covert communication on bosonic channels

    PubMed Central

    Bash, Boulat A.; Gheorghe, Andrei H.; Patel, Monika; Habif, Jonathan L.; Goeckel, Dennis; Towsley, Don; Guha, Saikat

    2015-01-01

    Computational encryption, information-theoretic secrecy and quantum cryptography offer progressively stronger security against unauthorized decoding of messages contained in communication transmissions. However, these approaches do not ensure stealth—that the mere presence of message-bearing transmissions be undetectable. We characterize the ultimate limit of how much data can be reliably and covertly communicated over the lossy thermal-noise bosonic channel (which models various practical communication channels). We show that whenever there is some channel noise that cannot in principle be controlled by an otherwise arbitrarily powerful adversary—for example, thermal noise from blackbody radiation—the number of reliably transmissible covert bits is at most proportional to the square root of the number of orthogonal modes (the time-bandwidth product) available in the transmission interval. We demonstrate this in a proof-of-principle experiment. Our result paves the way to realizing communications that are kept covert from an all-powerful quantum adversary. PMID:26478089

  19. Quantum-secure covert communication on bosonic channels.

    PubMed

    Bash, Boulat A; Gheorghe, Andrei H; Patel, Monika; Habif, Jonathan L; Goeckel, Dennis; Towsley, Don; Guha, Saikat

    2015-01-01

    Computational encryption, information-theoretic secrecy and quantum cryptography offer progressively stronger security against unauthorized decoding of messages contained in communication transmissions. However, these approaches do not ensure stealth--that the mere presence of message-bearing transmissions be undetectable. We characterize the ultimate limit of how much data can be reliably and covertly communicated over the lossy thermal-noise bosonic channel (which models various practical communication channels). We show that whenever there is some channel noise that cannot in principle be controlled by an otherwise arbitrarily powerful adversary--for example, thermal noise from blackbody radiation--the number of reliably transmissible covert bits is at most proportional to the square root of the number of orthogonal modes (the time-bandwidth product) available in the transmission interval. We demonstrate this in a proof-of-principle experiment. Our result paves the way to realizing communications that are kept covert from an all-powerful quantum adversary.

  20. GENERAL: Efficient quantum secure communication with a publicly known key

    NASA Astrophysics Data System (ADS)

    Li, Chun-Yan; Li, Xi-Han; Deng, Fu-Guo; Zhou, Hong-Yu

    2008-07-01

    This paper presents a simple way for an eavesdropper to eavesdrop freely the secret message in the experimental realization of quantum communication protocol proposed by Beige et al (2002 Acta Phys. Pol. A 101 357). Moreover, it introduces an efficient quantum secure communication protocol based on a publicly known key with decoy photons and two biased bases by modifying the original protocol. The total efficiency of this new protocol is double that of the original one. With a low noise quantum channel, this protocol can be used for transmitting a secret message. At present, this protocol is good for generating a private key efficiently.

  1. 76 FR 60067 - Privacy Act of 1974; Department of Homeland Security Federal Emergency Management Agency-012...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-28

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security Federal Emergency... Department of Homeland Security proposes to establish a new system of records titled, ``Department of....'' This system of records allows the Department of Homeland Security/Federal Emergency Management...

  2. 75 FR 22641 - Order Extending and Modifying Temporary Conditional Exemptions Under the Securities Exchange Act...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-29

    ... (Jul. 23, 2009), 74 FR 37748 (Jul. 29, 2009) and Securities Exchange Act Release No. 61973 (Apr. 23... Exchange Act Release No. 60373 (Jul. 23, 2009), 74 FR 37740 (Jul. 29, 2009) (temporary exemptions in... Exchange Act Release No. 59578 (Mar. 13, 2009), 74 FR 11781 (Mar. 19, 2009), Securities Exchange...

  3. Secure communications with low-orbit spacecraft using quantum cryptography

    DOEpatents

    Hughes, Richard J.; Buttler, William T.; Kwiat, Paul G.; Luther, Gabriel G.; Morgan, George L; Nordholt, Jane E.; Peterson, Charles G.; Simmons, Charles M.

    1999-01-01

    Apparatus and method for secure communication between an earth station and spacecraft. A laser outputs single pulses that are split into preceding bright pulses and delayed attenuated pulses, and polarized. A Pockels cell changes the polarization of the polarized delayed attenuated pulses according to a string of random numbers, a first polarization representing a "1," and a second polarization representing a "0." At the receiving station, a beamsplitter randomly directs the preceding bright pulses and the polarized delayed attenuated pulses onto longer and shorter paths, both terminating in a beamsplitter which directs the preceding bright pulses and a first portion of the polarized delayed attenuated pulses to a first detector, and a second portion of the polarized delayed attenuated pulses to a second detector to generate a key for secure communication between the earth station and the spacecraft.

  4. Constellation-masked secure communication technique for OFDM-PON.

    PubMed

    Liu, Bo; Zhang, Lijia; Xin, Xiangjun; Yu, Jianjun

    2012-10-22

    This paper proposes a novel secure communication technique using constellation masking for applications in orthogonal frequency division multiplexing passive optical network (OFDM-PON). The constellation masking is applied both on each subcarrier and among different subcarriers. The Arnold mapping is utilized as the parameter function for the mask factors. A interleave length is employed to provide a scalable masking granularity for different ONUs. A 15.54 Gb/s constellation-masked 32QAM-OFDM signal has been successfully transmitted over 25-km single mode fiber in the experiment. Experimental results show that the proposed scheme can effectively protect the system from illegal ONU without wasting the bandwidth. The constellation-masked technique suggests an effective solution for the physical secure communication in future OFDM access network.

  5. Communication Security for Control Systems in Smart Grid

    NASA Astrophysics Data System (ADS)

    Robles, Rosslin John; Kim, Tai-Hoon

    As an example of Control System, Supervisory Control and Data Acquisition systems can be relatively simple, such as one that monitors environmental conditions of a small office building, or incredibly complex, such as a system that monitors all the activity in a nuclear power plant or the activity of a municipal water system. SCADA systems are basically Process Control Systems, designed to automate systems such as traffic control, power grid management, waste processing etc. Connecting SCADA to the Internet can provide a lot of advantages in terms of control, data viewing and generation. SCADA infrastructures like electricity can also be a part of a Smart Grid. Connecting SCADA to a public network can bring a lot of security issues. To answer the security issues, a SCADA communication security solution is proposed.

  6. Communicating Health Risks under Pressure: Homeland Security Applications

    SciTech Connect

    Garrahan, K.G.; Collie, S.L.

    2006-07-01

    The U.S. Environmental Protection Agency's (EPA) Office of Research and Development (ORD) Threat and Consequence Assessment Division (TCAD) within the National Homeland Security Research Center (NHSRC) has developed a tool for rapid communication of health risks and likelihood of exposure in preparation for terrorist incidents. The Emergency Consequence Assessment Tool (ECAT) is a secure web-based tool designed to make risk assessment and consequence management faster and easier for high priority terrorist threat scenarios. ECAT has been designed to function as 'defensive play-book' for health advisors, first responders, and decision-makers by presenting a series of evaluation templates for priority scenarios that can be modified for site-specific applications. Perhaps most importantly, the risk communication aspect is considered prior to an actual release event, so that management or legal advisors can concur on general risk communication content in preparation for press releases that can be anticipated in case of an actual emergency. ECAT serves as a one-stop source of information for retrieving toxicological properties for agents of concern, estimating exposure to these agents, characterizing health risks, and determining what actions need to be undertaken to mitigate the risks. ECAT has the capability to be used at a command post where inputs can be checked and communicated while the response continues in real time. This front-end planning is intended to fill the gap most commonly identified during tabletop exercises: a need for concise, timely, and informative risk communication to all parties. Training and customization of existing chemical and biological release scenarios with modeling of exposure to air and water, along with custom risk communication 'messages' intended for public, press, shareholders, and other partners enable more effective communication during times of crisis. For DOE, the ECAT could serve as a prototype that would be amenable to

  7. Secure thermal infrared communications using engineered blackbody radiation

    PubMed Central

    Liang, Xiaoxin; Hu, Fangjing; Yan, Yuepeng; Lucyszyn, Stepan

    2014-01-01

    The thermal (emitted) infrared frequency bands, from 20–40 THz and 60–100 THz, are best known for applications in thermography. This underused and unregulated part of the spectral range offers opportunities for the development of secure communications. The ‘THz Torch' concept was recently presented by the authors. This technology fundamentally exploits engineered blackbody radiation, by partitioning thermally-generated spectral noise power into pre-defined frequency channels; the energy in each channel is then independently pulsed modulated and multiplexing schemes are introduced to create a robust form of short-range secure communications in the far/mid infrared. To date, octave bandwidth (25–50 THz) single-channel links have been demonstrated with 380 bps speeds. Multi-channel ‘THz Torch' frequency division multiplexing (FDM) and frequency-hopping spread-spectrum (FHSS) schemes have been proposed, but only a slow 40 bps FDM scheme has been demonstrated experimentally. Here, we report a much faster 1,280 bps FDM implementation. In addition, an experimental proof-of-concept FHSS scheme is demonstrated for the first time, having a 320 bps data rate. With both 4-channel multiplexing schemes, measured bit error rates (BERs) of < 10−6 are achieved over a distance of 2.5 cm. Our approach represents a new paradigm in the way niche secure communications can be established over short links. PMID:24912871

  8. Secure thermal infrared communications using engineered blackbody radiation

    NASA Astrophysics Data System (ADS)

    Liang, Xiaoxin; Hu, Fangjing; Yan, Yuepeng; Lucyszyn, Stepan

    2014-06-01

    The thermal (emitted) infrared frequency bands, from 20-40 THz and 60-100 THz, are best known for applications in thermography. This underused and unregulated part of the spectral range offers opportunities for the development of secure communications. The `THz Torch' concept was recently presented by the authors. This technology fundamentally exploits engineered blackbody radiation, by partitioning thermally-generated spectral noise power into pre-defined frequency channels; the energy in each channel is then independently pulsed modulated and multiplexing schemes are introduced to create a robust form of short-range secure communications in the far/mid infrared. To date, octave bandwidth (25-50 THz) single-channel links have been demonstrated with 380 bps speeds. Multi-channel `THz Torch' frequency division multiplexing (FDM) and frequency-hopping spread-spectrum (FHSS) schemes have been proposed, but only a slow 40 bps FDM scheme has been demonstrated experimentally. Here, we report a much faster 1,280 bps FDM implementation. In addition, an experimental proof-of-concept FHSS scheme is demonstrated for the first time, having a 320 bps data rate. With both 4-channel multiplexing schemes, measured bit error rates (BERs) of < 10-6 are achieved over a distance of 2.5 cm. Our approach represents a new paradigm in the way niche secure communications can be established over short links.

  9. Secure thermal infrared communications using engineered blackbody radiation.

    PubMed

    Liang, Xiaoxin; Hu, Fangjing; Yan, Yuepeng; Lucyszyn, Stepan

    2014-01-01

    The thermal (emitted) infrared frequency bands, from 20-40 THz and 60-100 THz, are best known for applications in thermography. This underused and unregulated part of the spectral range offers opportunities for the development of secure communications. The 'THz Torch' concept was recently presented by the authors. This technology fundamentally exploits engineered blackbody radiation, by partitioning thermally-generated spectral noise power into pre-defined frequency channels; the energy in each channel is then independently pulsed modulated and multiplexing schemes are introduced to create a robust form of short-range secure communications in the far/mid infrared. To date, octave bandwidth (25-50 THz) single-channel links have been demonstrated with 380 bps speeds. Multi-channel 'THz Torch' frequency division multiplexing (FDM) and frequency-hopping spread-spectrum (FHSS) schemes have been proposed, but only a slow 40 bps FDM scheme has been demonstrated experimentally. Here, we report a much faster 1,280 bps FDM implementation. In addition, an experimental proof-of-concept FHSS scheme is demonstrated for the first time, having a 320 bps data rate. With both 4-channel multiplexing schemes, measured bit error rates (BERs) of < 10(-6) are achieved over a distance of 2.5 cm. Our approach represents a new paradigm in the way niche secure communications can be established over short links. PMID:24912871

  10. Inherent secure communications using lattice based waveform design.

    SciTech Connect

    Pugh, Matthew Owen

    2013-12-01

    The wireless communications channel is innately insecure due to the broadcast nature of the electromagnetic medium. Many techniques have been developed and implemented in order to combat insecurities and ensure the privacy of transmitted messages. Traditional methods include encrypting the data via cryptographic methods, hiding the data in the noise floor as in wideband communications, or nulling the signal in the spatial direction of the adversary using array processing techniques. This work analyzes the design of signaling constellations, i.e. modulation formats, to combat eavesdroppers from correctly decoding transmitted messages. It has been shown that in certain channel models the ability of an adversary to decode the transmitted messages can be degraded by a clever signaling constellation based on lattice theory. This work attempts to optimize certain lattice parameters in order to maximize the security of the data transmission. These techniques are of interest because they are orthogonal to, and can be used in conjunction with, traditional security techniques to create a more secure communication channel.

  11. Improving the security of secure direct communication based on the secret transmitting order of particles

    SciTech Connect

    Li Xihan; Deng Fuguo; Zhou Hongyu

    2006-11-15

    We analyzed the security of the secure direct communication protocol based on the secret transmitting order of particles recently proposed by Zhu, Xia, Fan, and Zhang[Phys. Rev. A 73, 022338 (2006)] and found that this scheme is insecure if an eavesdropper, say Eve, wants to steal the secret message with Trojan horse attack strategies. The vital loophole in this scheme is that the two authorized users check the security of their quantum channel only once. Eve can insert another spy photon, an invisible photon, or a delay one in each photon which the sender Alice sends to the receiver Bob, and capture the spy photon when it returns from Bob to Alice. After the authorized users check the security, Eve can obtain the secret message according to the information about the transmitting order published by Bob. Finally, we present a possible improvement of this protocol.

  12. Ultra Wideband (UWB) communication vulnerability for security applications.

    SciTech Connect

    Cooley, H. Timothy

    2010-07-01

    RF toxicity and Information Warfare (IW) are becoming omnipresent posing threats to the protection of nuclear assets, and within theatres of hostility or combat where tactical operation of wireless communication without detection and interception is important and sometimes critical for survival. As a result, a requirement for deployment of many security systems is a highly secure wireless technology manifesting stealth or covert operation suitable for either permanent or tactical deployment where operation without detection or interruption is important The possible use of ultra wideband (UWB) spectrum technology as an alternative physical medium for wireless network communication offers many advantages over conventional narrowband and spread spectrum wireless communication. UWB also known as fast-frequency chirp is nonsinusoidal and sends information directly by transmitting sub-nanosecond pulses without the use of mixing baseband information upon a sinusoidal carrier. Thus UWB sends information using radar-like impulses by spreading its energy thinly over a vast spectrum and can operate at extremely low-power transmission within the noise floor where other forms of RF find it difficult or impossible to operate. As a result UWB offers low probability of detection (LPD), low probability of interception (LPI) as well as anti-jamming (AJ) properties in signal space. This paper analyzes and compares the vulnerability of UWB to narrowband and spread spectrum wireless network communication.

  13. Multi-Antenna Secure Communications via Selective Diversity

    NASA Astrophysics Data System (ADS)

    Tang, Ling; Chen, Hao; Wu, Jianhui

    We consider secure wireless communications, where a source is communicating to a destination in the presence of K (K>1) eavesdroppers. The source and destination both are equipped with multiple antennas, while each eavesdropper has a single antenna. The source aims to maximize the communication rate to the destination, while concealing the message from all the eavesdroppers. Combined with selective diversity, we propose a heuristic secrecy transmission scheme where the multiple-input-multiple-output (MIMO) secrecy channel is simplified into a multiple-input-single-output (MISO) one with the highest orthogonality to the eavesdropper channels. Then convex optimization is applied to obtain the optimal transmit covariance matrix for this selected MISO secrecy channel. Numerical results are provided to illustrate the efficacy of the proposed scheme.

  14. A secure and robust information hiding technique for covert communication

    NASA Astrophysics Data System (ADS)

    Parah, S. A.; Sheikh, J. A.; Hafiz, A. M.; Bhat, G. M.

    2015-08-01

    The unprecedented advancement of multimedia and growth of the internet has made it possible to reproduce and distribute digital media easier and faster. This has given birth to information security issues, especially when the information pertains to national security, e-banking transactions, etc. The disguised form of encrypted data makes an adversary suspicious and increases the chance of attack. Information hiding overcomes this inherent problem of cryptographic systems and is emerging as an effective means of securing sensitive data being transmitted over insecure channels. In this paper, a secure and robust information hiding technique referred to as Intermediate Significant Bit Plane Embedding (ISBPE) is presented. The data to be embedded is scrambled and embedding is carried out using the concept of Pseudorandom Address Vector (PAV) and Complementary Address Vector (CAV) to enhance the security of the embedded data. The proposed ISBPE technique is fully immune to Least Significant Bit (LSB) removal/replacement attack. Experimental investigations reveal that the proposed technique is more robust to various image processing attacks like JPEG compression, Additive White Gaussian Noise (AWGN), low pass filtering, etc. compared to conventional LSB techniques. The various advantages offered by ISBPE technique make it a good candidate for covert communication.

  15. Quantum secure communication using a multi-photon tolerant protocol

    NASA Astrophysics Data System (ADS)

    El Rifai, Mayssaa; Verma, Pramode K.

    2015-03-01

    This paper proposes a quantum secure communication protocol using multiple photons to represent each bit of a message to be shared. The multi-photon tolerant approach to quantum cryptography provides a quantum level security while using more than a single photon per transmission. The protocol proposed is a multi-stage protocol; an explanation of its operation and implementation are provided. The multi-stage protocol is based on the use of unitary transformations known only to Alice and Bob. This paper studies the security aspects of the multi-stage protocol by assessing its vulnerability to different attacks. It is well known that as the number of photons increases, the level of vulnerability of the multi-stage protocol increases. This paper sets a limit on the number of photons that can be used while keeping the multi-stage protocol a multi-photon tolerant quantum secure method for communication. The analysis of the number of photons to be used is based on the probability of success of a Helstrom discrimination done by an eavesdropper on the channel. Limiting the number of photons up to certain threshold per stage makes it impossible for an eavesdropper to decipher the message sent over the channel. The proposed protocol obviates the disadvantages associated with single photon implementations, such as limited data rates and distances along with the need to have no more than a single photon per time slot. The multi-stage protocol is a step toward direct quantum communication rather than quantum key distribution associated with single photon approaches.

  16. The ACTS Flight System - Cost-Effective Advanced Communications Technology. [Advanced Communication Technology Satellite

    NASA Technical Reports Server (NTRS)

    Holmes, W. M., Jr.; Beck, G. A.

    1984-01-01

    The multibeam communications package (MCP) for the Advanced Communications Technology Satellite (ACTS) to be STS-launched by NASA in 1988 for experimental demonstration of satellite-switched TDMA (at 220 Mbit/sec) and baseband-processor signal routing (at 110 or 27.5 Mbit/sec) is characterized. The developmental history of the ACTS, the program definition, and the spacecraft-bus and MCP parameters are reviewed and illustrated with drawings, block diagrams, and maps of the coverage plan. Advanced features of the MPC include 4.5-dB-noise-figure 30-GHz FET amplifiers and 20-GHz TWTA transmitters which provide either 40-W or 8-W RF output, depending on rain conditions. The technologies being tested in ACTS can give frequency-reuse factors as high as 20, thus greatly expanding the orbit/spectrum resources available for U.S. communications use.

  17. Reexamining the Security of Controlled Quantum Secure Direct Communication by Using Four Particle Cluster States

    NASA Astrophysics Data System (ADS)

    Qin, Su-Juan

    2012-09-01

    A controlled quantum secure direct communication protocol (Zhang et al. in Int. J. Theor. Phys. 48:2971-2976, 2009) by using four particle cluster states was proposed recently. Yang et al. presented an attack with fake entangled particles (FEP attack) and gave an improvement (Yang et al. in Int. J. Theor. Phys. 50:395-400, 2010). In this paper, we reexamine the protocol's security and discover that, Bob can also take a different attack, disentanglement attack, to obtain Alice's secret message without controller's permission. Moreover, our attack strategy also works for Yang's improvement.

  18. Design and Implementation of Secure and Reliable Communication using Optical Wireless Communication

    NASA Astrophysics Data System (ADS)

    Saadi, Muhammad; Bajpai, Ambar; Zhao, Yan; Sangwongngam, Paramin; Wuttisittikulkij, Lunchakorn

    2014-11-01

    Wireless networking intensify the tractability in the home and office environment to connect the internet without wires but at the cost of risks associated with stealing the data or threat of loading malicious code with the intention of harming the network. In this paper, we proposed a novel method of establishing a secure and reliable communication link using optical wireless communication (OWC). For security, spatial diversity based transmission using two optical transmitters is used and the reliability in the link is achieved by a newly proposed method for the construction of structured parity check matrix for binary Low Density Parity Check (LDPC) codes. Experimental results show that a successful secure and reliable link between the transmitter and the receiver can be achieved by using the proposed novel technique.

  19. Proceedings of the Advanced Communications Technology Satellite (ACTS) Conference 2000

    NASA Technical Reports Server (NTRS)

    Bauer, Robert (Editor); Derwae, Robert (Editor)

    2000-01-01

    The ACTS experiments program, which began in December 1993 and consisted of 103 different experiments, has made significant contributions to minimizing the risk of advanced satellite communications technology. The ACTS Conference 2000 (AC2000) was held to report the results of the program since the last ACTS conference was held in 1995 and to celebrate the end of a very successful satellite program. The conference was held on May 31, 2000, as part of the 6th Ka-band Utilization Conference in Cleveland, Ohio. Approximately 280 representatives of industry, academia, and government attended. The conference was organized into two parts: a technical session during the day and an evening reception. During the day, a series of five technical sessions included presentations of 17 papers covering the results of the experiment activity and technical performance of the satellite. In the evening, a reception was held to celebrate the end of the ACTS Experiments Program on one of NASA's most successful experimental communications satellite. These proceedings were developed to capture the entire event, including the evening reception.

  20. Experiments applications guide: Advanced Communications Technology Satellite (ACTS)

    NASA Technical Reports Server (NTRS)

    1988-01-01

    This applications guide first surveys the capabilities of the Advanced Communication Technology Satellite (ACTS) system (both the flight and ground segments). This overview is followed by a description of the baseband processor (BBP) and microwave switch matrix (MSM) operating modes. Terminals operating with the baseband processor are referred to as low burst rate (LBR); and those operating with the microwave switch matrix, as high burst rate (HBR). Three very small-aperture terminals (VSATs), LBR-1, LBR-2, and HBR, are described for various ACTS operating modes. Also described is the NASA Lewis link evaluation terminal. A section on ACTS experiment opportunities introduces a wide spectrum of network control, telecommunications, system, and scientific experiments. The performance of the VSATs is discussed in detail. This guide is intended as a catalyst to encourage participation by the telecommunications, business, and science communities in a broad spectrum of experiments.

  1. Quantum cryptography for secure free-space communications

    SciTech Connect

    Hughes, R.J.; Buttler, W.T.; Kwiat, P.G.; Lamoreaux, S.K.; Luther, G.G.; Morgan, G.L.; Nordholt, J.E.; Peterson, C.G.

    1999-03-01

    The secure distribution of the secret random bit sequences known as key material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is a new technique for secure key distribution with single-photon transmissions: Heisenberg`s uncertainty principle ensures that an adversary can neither successfully tap the key transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). The authors have developed experimental quantum cryptography systems based on the transmission of non-orthogonal photon polarization states to generate shared key material over line-of-sight optical links. Key material is built up using the transmission of a single-photon per bit of an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. The authors have developed and tested a free-space quantum key distribution (QKD) system over an outdoor optical path of {approximately}1 km at Los Alamos National Laboratory under nighttime conditions. Results show that free-space QKD can provide secure real-time key distribution between parties who have a need to communicate secretly. Finally, they examine the feasibility of surface to satellite QKD.

  2. Fast massive preventive security and information communication systems

    NASA Astrophysics Data System (ADS)

    Akopian, David; Chen, Philip; Miryakar, Susheel; Kumar, Abhinav

    2008-04-01

    We present a fast massive information communication system for data collection from distributive sources such as cell phone users. As a very important application one can mention preventive notification systems when timely notification and evidence communication may help to improve safety and security through wide public involvement by ensuring easy-to-access and easy-to-communicate information systems. The technology significantly simplifies the response to the events and will help e.g. special agencies to gather crucial information in time and respond as quickly as possible. Cellular phones are nowadays affordable for most of the residents and became a common personal accessory. The paper describes several ways to design such systems including existing internet access capabilities of cell phones or downloadable specialized software. We provide examples of such designs. The main idea is in structuring information in predetermined way and communicating data through a centralized gate-server which will automatically process information and forward it to a proper destination. The gate-server eliminates a need in knowing contact data and specific local community infrastructure. All the cell phones will have self-localizing capability according to FCC E911 mandate, thus the communicated information can be further tagged automatically by location and time information.

  3. SPECS: Secure and Privacy Enhancing Communications Schemes for VANETs

    NASA Astrophysics Data System (ADS)

    Chim, T. W.; Yiu, S. M.; Hui, L. C. K.; Jiang, Zoe L.; Li, Victor O. K.

    Vehicular ad hoc network (VANET) is an emerging type of networks which facilitates vehicles on roads to communicate for driving safety. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages (e.g. traffic accidents) to other vehicles. However, this raises the concern of security and privacy. Messages should be signed and verified before they are trusted while the real identity of vehicles should not be revealed, but traceable by authorized party. Existing solutions either rely heavily on a tamper-proof hardware device, or cannot satisfy the privacy requirement and do not have an effective message verification scheme. In this paper, we provide a software-based solution which makes use of only two shared secrets to satisfy the privacy requirement and gives lower message overhead and at least 45% higher successful rate than previous solutions in the message verification phase using the bloom filter and the binary search techniques. We also provide the first group communication protocol to allow vehicles to authenticate and securely communicate with others in a group of known vehicles.

  4. Glucoweb: a case study of secure, remote biomonitoring and communication.

    PubMed Central

    Nigrin, D. J.; Kohane, I. S.

    2000-01-01

    As the Internet begins to play a greater role in many healthcare processes, it is inevitable that remote monitoring of patients' physiological parameters over the Internet will become increasingly commonplace. Internet-based communication between patients and their healthcare providers has already become prevalent, and has gained significant attention in terms of confidentiality issues. However, transmission of data directly from patients' physiological biomonitoring devices over the Web has garnered significantly less focus, especially in the area of authentication and security. In this paper, we describe a prototype system called Glucoweb, which allows patients with diabetes mellitus to transmit their self-monitored blood glucose data directly from their personal glucometer device to their diabetes care provider over the Internet. No customized software is necessary on the patient's computer, only a Web browser and active Internet connection. We use this example to highlight key authentication and security measures that should be considered for devices that transmit healthcare data to remote locations. PMID:11079956

  5. Deterministic secure communications using two-mode squeezed states

    SciTech Connect

    Marino, Alberto M.; Stroud, C. R. Jr.

    2006-08-15

    We propose a scheme for quantum cryptography that uses the squeezing phase of a two-mode squeezed state to transmit information securely between two parties. The basic principle behind this scheme is the fact that each mode of the squeezed field by itself does not contain any information regarding the squeezing phase. The squeezing phase can only be obtained through a joint measurement of the two modes. This, combined with the fact that it is possible to perform remote squeezing measurements, makes it possible to implement a secure quantum communication scheme in which a deterministic signal can be transmitted directly between two parties while the encryption is done automatically by the quantum correlations present in the two-mode squeezed state.

  6. The braided single-stage protocol for quantum secure communication

    NASA Astrophysics Data System (ADS)

    Darunkar, Bhagyashri; Verma, Pramode K.

    2014-05-01

    This paper presents the concept and implementation of a Braided Single-stage Protocol for quantum secure communication. The braided single-stage protocol is a multi-photon tolerant secure protocol. This multi-photon tolerant protocol has been implemented in the laboratory using free-space optics technology. The proposed protocol capitalizes on strengths of the three-stage protocol and extends it with a new concept of braiding. This protocol overcomes the limitations associated with the three-stage protocol in the following ways: It uses the transmission channel only once as opposed to three times in the three-stage protocol, and it is invulnerable to man-in-the-middle attack. This paper also presents the error analysis resulting from the misalignment of the devices in the implementation. The experimental results validate the efficient use of transmission resources and improvement in the data transfer rate.

  7. Chaos-based secure communication system using logistic map

    NASA Astrophysics Data System (ADS)

    Singh, Narendra; Sinha, Aloka

    2010-03-01

    We propose a new opto-electronic secure communication system using logistic map and pulse position modulation. A modified version of the electronic circuit of the logistic map is used to generate the chaotic signal. Pulse position modulation scheme together with the logistic map has been used to encrypt the signal. Optical fiber has been used to demonstrate the proposed scheme. Eye pattern has been used to verify the noise-like nature of the encrypted signal. Opto-electronic implementation of the technique has been carried out. Experimental results are presented to verify the validity of the proposed technique.

  8. 76 FR 60387 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-29

    ...); Executive Orders 12333 and 13388; 40 U.S.C. 1315(b)(2)(F); 6 U.S.C. 314; The Homeland Security Act of 2002, as amended; the Intelligence Reform and Terrorism Prevention Act of 2004, as amended; the National... know the information to carry out national security, law enforcement, immigration, intelligence,...

  9. 45 CFR 287.105 - What provisions of the Social Security Act govern the NEW Program?

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 2 2013-10-01 2012-10-01 true What provisions of the Social Security Act govern the NEW Program? 287.105 Section 287.105 Public Welfare Regulations Relating to Public Welfare OFFICE....105 What provisions of the Social Security Act govern the NEW Program? NEW Programs are subject...

  10. First Annual Report to Congress on Title XX of the Social Security Act.

    ERIC Educational Resources Information Center

    Department of Health, Education, and Welfare, Washington, DC.

    This annual report to Congress on Title XX of the Social Security Act reports on the operation of the 1976 fiscal year program. Preceding the report are descriptive highlights of the program. Title XX of the Social Security Act changes the role and relationships of the Department of Health, Education, and Welfare; the individual states; and…

  11. 45 CFR 287.105 - What provisions of the Social Security Act govern the NEW Program?

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 2 2011-10-01 2011-10-01 false What provisions of the Social Security Act govern the NEW Program? 287.105 Section 287.105 Public Welfare Regulations Relating to Public Welfare OFFICE....105 What provisions of the Social Security Act govern the NEW Program? NEW Programs are subject...

  12. 76 FR 9034 - Privacy Act of 1974; Department of Homeland Security United States Citizenship and Immigration...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-16

    ... authorization in the United States. I. To a third party commercial identity assurance provider (IdP) under... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security United States... Security (DHS) United States Citizenship and Immigration Services (USCIS) proposes to establish a new...

  13. 75 FR 7978 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... Exemptions; Department of Homeland Security Transportation Security Administration-023 Workplace Violence... Security Administration-023 Workplace Violence Prevention Program System of Records and this proposed... a new system of records under the Privacy Act (5 U.S.C. 552a) titled, DHS/TSA-023 Workplace...

  14. 47 CFR 0.414 - The Communications Act and other statutory materials.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Act; the Communications Satellite Act of 1962; and selected sections of the Criminal Code pertaining... 47 Telecommunication 1 2012-10-01 2012-10-01 false The Communications Act and other statutory materials. 0.414 Section 0.414 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL...

  15. 47 CFR 0.414 - The Communications Act and other statutory materials.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Act; the Communications Satellite Act of 1962; and selected sections of the Criminal Code pertaining... 47 Telecommunication 1 2013-10-01 2013-10-01 false The Communications Act and other statutory materials. 0.414 Section 0.414 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL...

  16. 47 CFR 0.414 - The Communications Act and other statutory materials.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Act; the Communications Satellite Act of 1962; and selected sections of the Criminal Code pertaining... 47 Telecommunication 1 2010-10-01 2010-10-01 false The Communications Act and other statutory materials. 0.414 Section 0.414 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL...

  17. 47 CFR 0.414 - The Communications Act and other statutory materials.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Act; the Communications Satellite Act of 1962; and selected sections of the Criminal Code pertaining... 47 Telecommunication 1 2011-10-01 2011-10-01 false The Communications Act and other statutory materials. 0.414 Section 0.414 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL...

  18. 47 CFR 0.414 - The Communications Act and other statutory materials.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Act; the Communications Satellite Act of 1962; and selected sections of the Criminal Code pertaining... 47 Telecommunication 1 2014-10-01 2014-10-01 false The Communications Act and other statutory materials. 0.414 Section 0.414 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL...

  19. 17 CFR 239.40 - Form F-10, for registration under the Securities Act of 1933 of securities of certain Canadian...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    .... Editorial Note: For Federal Register citations affecting Form F-10, see the List of CFR Sections Affected... under the Securities Act of 1933 of securities of certain Canadian issuers. 239.40 Section 239.40... Securities Act of 1933 of securities of certain Canadian issuers. (a) Form F-10 may be used for...

  20. 17 CFR 239.41 - Form F-80, for registration under the Securities Act of 1933 of securities of certain Canadian...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... List of CFR Sections Affected, which appears in the Finding Aids section of the printed volume and at... under the Securities Act of 1933 of securities of certain Canadian issuers to be issued in exchange... § 239.41 Form F-80, for registration under the Securities Act of 1933 of securities of certain...

  1. 17 CFR 239.38 - Form F-8, for registration under the Securities Act of 1933 of securities of certain Canadian...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... List of CFR Sections Affected, which appears in the Finding Aids section of the printed volume and at... under the Securities Act of 1933 of securities of certain Canadian issuers to be issued in exchange... § 239.38 Form F-8, for registration under the Securities Act of 1933 of securities of certain...

  2. 75 FR 8096 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-023...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... Security Administration--023 Workplace Violence Prevention Program System of Records AGENCY: Privacy Office..., ``Department of Homeland Security/Transportation Security Administration--023 Workplace Violence Prevention... and maintain records on their Workplace Violence Prevention Program. Additionally, the Department...

  3. Text Messaging to Communicate With Public Health Audiences: How the HIPAA Security Rule Affects Practice

    PubMed Central

    Karasz, Hilary N.; Eiden, Amy; Bogan, Sharon

    2013-01-01

    Text messaging is a powerful communication tool for public health purposes, particularly because of the potential to customize messages to meet individuals’ needs. However, using text messaging to send personal health information requires analysis of laws addressing the protection of electronic health information. The Health Insurance Portability and Accountability Act (HIPAA) Security Rule is written with flexibility to account for changing technologies. In practice, however, the rule leads to uncertainty about how to make text messaging policy decisions. Text messaging to send health information can be implemented in a public health setting through 2 possible approaches: restructuring text messages to remove personal health information and retaining limited personal health information in the message but conducting a risk analysis and satisfying other requirements to meet the HIPAA Security Rule. PMID:23409902

  4. 77 FR 75211 - Order Granting Conditional Exemptions Under the Securities Exchange Act of 1934 in Connection...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-19

    ..., Exchange Act Release No. 67453 (Jul. 18, 2012), 77 FR 48207 (Aug. 13, 2012) (Joint Final Rule with the CFTC... FR 25224 (Nov. 29, 1972). \\27\\ In addition to the Exchange Act provisions specific to security-based... Requirements Adopting Release''), Exchange Act Release No. 68071 (Oct. 18, 2012), 77 FR 70213 (Nov. 23,...

  5. Gigabit Satellite Network for NASA's Advanced Communication Technology Satellite (ACTS)

    NASA Technical Reports Server (NTRS)

    Hoder, Douglas; Bergamo, Marcos

    1996-01-01

    The advanced communication technology satellite (ACTS) gigabit satellite network provides long-haul point-to-point and point-to-multipoint full-duplex SONET services over NASA's ACTS. at rates up to 622 Mbit/s (SONET OC-12), with signal quality comparable to that obtained with terrestrial fiber networks. Data multiplexing over the satellite is accomplished using time-division multiple access (TDMA) techniques coordinated with the switching and beam hopping facilities provided by ACTS. Transmissions through the satellite are protected with Reed-Solomon encoding. providing virtually error-free transmission under most weather conditions. Unique to the system are a TDMA frame structure and satellite synchronization mechanism that allow: (a) very efficient utilization of the satellite capacity: (b) over-the-satellite dosed-loop synchronization of the network in configurations with up to 64 ground stations: and (c) ground station initial acquisition without collisions with existing signalling or data traffic. The user interfaces are compatible with SONET standards, performing the function of conventional SONET multiplexers and. as such. can be: readily integrated with standard SONET fiber-based terrestrial networks. Management of the network is based upon the simple network management protocol (SNMP). and includes an over-the-satellite signalling network and backup terrestrial internet (IP-based) connectivity. A description of the ground stations is also included.

  6. Transportation Security Administration Efficiency and Flexibility Act of 2011

    THOMAS, 112th Congress

    Sen. Wicker, Roger F. [R-MS

    2011-07-13

    07/13/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  7. National Security Agency Data Collection Review Act of 2014

    THOMAS, 113th Congress

    Rep. Carney, John C., Jr. [D-DE-At Large

    2014-01-15

    03/20/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  8. Protecting the Privacy of Social Security Numbers Act of 2013

    THOMAS, 113th Congress

    Rep. Frelinghuysen, Rodney P. [R-NJ-11

    2013-05-22

    06/14/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  9. Personal Data Privacy and Security Act of 2014

    THOMAS, 113th Congress

    Rep. Shea-Porter, Carol [D-NH-1

    2014-02-04

    03/20/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  10. Secure ultrafast communication with spatial-temporal converters.

    PubMed

    Matoba, O; Javidi, B

    2000-06-10

    An encrypted database interfaced with an ultrafast secure data communication system using spatial-temporal converters is proposed. The original spatial signal is optically encrypted, and the encrypted signal is holographically stored in a storage medium such as photorefractive materials. The spatially encrypted signal is sampled to avoid the overlap of each datum at the receiver. The sampled data are converted into a temporal signal to transmit the information through an optical fiber. At the receiver the temporal signal is converted back into the spatially encrypted signal. Retrieval of the original data can be achieved when the correct phase key is used in the decryption system. We developed an expression for encrypted output and decrypted data. We numerically evaluate the effect of sampling the spatially encrypted signal on the quality of the decrypted data.

  11. A Sensor and Communications System for Containerized-Cargo Security

    SciTech Connect

    Leach Jr., R R

    2005-02-10

    A public/private collaboration between federal, state, provincial, and local U.S. and Canadian governmental organizations, called the Canada - United States Cargo Security Project has been formed, with the goal to improve security of containerized cargo moving from overseas locations into eastern Canadian provinces and the Northeastern United States. The current phase of this project has two technical objectives. These are: (1) to build and test a prototype in-container sensor system able to detect unauthorized entry into the container and the presence of radioactive material, to record geographical location and environmental data, and to transmit this information via satellite communications to a remote monitoring facility, and (2) to develop a secure website where data from the in-container sensors and other information will be displayed in real or near-real time and can be made available to law enforcement and emergency response organizations as appropriate. This paper will describe these activities, currently being undertaken by the Lawrence Livermore National Laboratory. An additional goal of the project's current phase is to integrate multi-jurisdictional training and first-responder exercises while monitoring and tracking container shipments from overseas to the US via Canadian ports-of-entry into North America. This activity is being undertaken by other project partners, which include the National Infrastructure Institute--Center for Infrastructure Expertise (NI2CIE), Transport Canada, Canadian Provinces of Quebec and Nova Scotia, Ports of Halifax and Montreal, U.S. Coast Guard (First Coast Guard District), States of New Hampshire, Maine, Vermont, and New York and the Port of Portland.

  12. 3 CFR 8546 - Proclamation 8546 of August 13, 2010. 75th Anniversary of the Social Security Act

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Anniversary of the Social Security Act 8546 Proclamation 8546 Presidential Documents Proclamations Proclamation 8546 of August 13, 2010 Proc. 8546 75th Anniversary of the Social Security ActBy the President of... into law the Social Security Act to protect ordinary Americans “against the loss of a job and...

  13. 75 FR 17181 - Order Extending Temporary Exemptions Under the Securities Exchange Act of 1934 in Connection With...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-05

    ... interest.\\3\\ \\1\\ See generally Securities Exchange Act Release No. 60372 (Jul. 23, 2009), 74 FR 37748 (Jul...); Securities Exchange Act Release No. 60373 (Jul. 23, 2009), 74 FR 37740 (Jul. 29, 2009) (temporary exemptions.... 13, 2009), 74 FR 11781 (Mar. 19, 2009) (``March 2009 CME order'') and Securities Exchange Act...

  14. 76 FR 26549 - Removal of Certain References to Credit Ratings Under the Securities Exchange Act of 1934

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-06

    ..., Securities Act of 1933 (``Securities Act'') Release No. 9193 (Mar. 3, 2011), 76 FR 12896 (Mar. 9, 2011) and Security Ratings, Exchange Act Release No. 63874 (Feb. 9, 2011), 76 FR 8946 (Feb. 16, 2011). As is... Release No. 11497 (Jun. 26, 1975), 40 FR 29795 (Jul. 16, 1975) and 17 CFR 240.15c3-1. \\12\\ See...

  15. 78 FR 55270 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-10

    ... for expedited screening at participating airport security checkpoints. This updated system will be... identification of passengers who are eligible for expedited screening at participating airport security... participating airport security checkpoints. \\10\\ ``Sterile area'' means a portion of an airport defined in...

  16. P.L. 110-140, "Energy Independence and Security Act of 2007", 2007

    SciTech Connect

    2007-12-19

    The Energy Independence and Security Act of 2007 (EISA), signed into law on December 19, 2007, set forth an agenda for improving U.S. energy security across the entire economy. While industrial energy efficiency is specifically called out in Title IV, Subtitle D, other EISA provisions also apply to AMO activities.

  17. 32 CFR Appendix A to Part 1292 - Section 21 of the Internal Security Act of 1950

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Section 21 of the Internal Security Act of 1950 A Appendix A to Part 1292 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES Pt. 1292, App. A Appendix A to...

  18. 32 CFR Appendix A to Part 1292 - Section 21 of the Internal Security Act of 1950

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Section 21 of the Internal Security Act of 1950 A Appendix A to Part 1292 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES Pt. 1292, App. A Appendix A to...

  19. 32 CFR Appendix A to Part 1292 - Section 21 of the Internal Security Act of 1950

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Section 21 of the Internal Security Act of 1950 A Appendix A to Part 1292 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES Pt. 1292, App. A Appendix A to...

  20. 32 CFR Appendix A to Part 1292 - Section 21 of the Internal Security Act of 1950

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Section 21 of the Internal Security Act of 1950 A Appendix A to Part 1292 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES Pt. 1292, App. A Appendix A to...

  1. The Employee Retirement Income Security Act of 1974: Policies and Problems

    ERIC Educational Resources Information Center

    Alperin, Stuart N.; And Others

    1975-01-01

    Congress enacted the Employment Retirement Income Security Act of 1974 (ERISA) to help assure economic security in retirement. This analysis includes description of the growth, operation, and inequities within the private pension system and analysis of ERISA: (1) participation, vesting and joint and survivor annuities; (2) funding and plan…

  2. 32 CFR Appendix A to Part 1292 - Section 21 of the Internal Security Act of 1950

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Section 21 of the Internal Security Act of 1950 A Appendix A to Part 1292 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES Pt. 1292, App. A Appendix A to...

  3. 77 FR 43639 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-25

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA.... ACTION: Notice of a renewal of an existing computer matching program that expired on May 10,...

  4. Domestic Fuel for Enhancing National Security Act of 2011

    THOMAS, 112th Congress

    Sen. Murray, Patty [D-WA

    2011-05-25

    05/25/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (text of measure as introduced: CR S3345) (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  5. Continuing Chemical Facilities Antiterrorism Security Act of 2011

    THOMAS, 112th Congress

    Sen. Collins, Susan M. [R-ME

    2011-03-03

    10/20/2011 By Senator Lieberman from Committee on Homeland Security and Governmental Affairs filed written report. Report No. 112-90. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  6. Safe and Secure Federal Websites Act of 2014

    THOMAS, 113th Congress

    Rep. Bentivolio, Kerry L. [R-MI-11

    2013-12-03

    07/29/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  7. Cyber Security and American Cyber Competitiveness Act of 2011

    THOMAS, 112th Congress

    Sen. Reid, Harry [D-NV

    2011-01-25

    01/25/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (text of measure as introduced: CR S130) (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  8. Public Transit Security and Local Law Enforcement Support Act

    THOMAS, 112th Congress

    Rep. Turner, Robert L. [R-NY-9

    2012-01-31

    09/13/2012 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  9. Secure and Responsible Drug Disposal Act of 2009

    THOMAS, 111th Congress

    Rep. Stupak, Bart [D-MI-1

    2009-03-05

    04/27/2009 Referred to the Subcommittee on Crime, Terrorism, and Homeland Security. (All Actions) Notes: For further action, see S.3397, which became Public Law 111-273 on 10/12/2010. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  10. Border Enforcement Security Task Force Act of 2011

    THOMAS, 112th Congress

    Rep. Cuellar, Henry [D-TX-28

    2011-02-17

    02/24/2011 Referred to the Subcommittee on Border and Maritime Security. (All Actions) Notes: For further action, see H.R.915, which became Public Law 112-205 on 12/7/2012. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  11. Homeland Security Science and Technology Authorization Act of 2010

    THOMAS, 111th Congress

    Rep. Clarke, Yvette D. [D-NY-11

    2010-03-15

    07/21/2010 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  12. Homeland Security Cybersecurity Boots-on-the-Ground Act

    THOMAS, 113th Congress

    Rep. Clarke, Yvette D. [D-NY-9

    2013-09-17

    07/29/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  13. P.L. 96-294, "Energy Security Act" (1980)

    SciTech Connect

    2011-12-13

    Declares it to be the purpose of this title to reduce dependence on foreign energy resources by producing synthetic fuel. Part A: Development of Synthetic Fuel Under the Defense Production Act of 1950 - Defense Production Act Amendments of 1980 - Amends the Defense Production Act of 1950 to include within the policy objectives of such Act Government preparedness to contend with foreign actions which could reduce or terminate the availability of material, including energy, which is crucial to national defense. States that greater independence in domestic energy supplies is necessary to national defense preparedness. Designates "energy" as a "strategic and critical material." States that such designation shall not give the President any authority: (1) for the mandatory allocation or pricing of any fuel or feedstock; or (2) to engage in the production of energy in any manner whatsoever, except for synthetic fuel production.

  14. 76 FR 8755 - Privacy Act of 1974; Department of Homeland Security/ALL-032 Official Passport Application and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-15

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL--032 Official... of Homeland Security proposes to establish a new Department of Homeland Security system of records titled, ``Department of Homeland Security/ ALL--032 Official Passport Application and Maintenance......

  15. An integrated solution for secure group communication in wide-area networks

    SciTech Connect

    Agarwal, Deborah A.; Chevassut, Olivier; Thompson, Mary; Tsudik, Gene

    2001-04-01

    Many distributed applications require a secure reliable group communication system to provide coordination among the application components. This paper describes a secure group layer (SGL) which bundles a reliable group communication system, a group authorization and access control mechanism, and a group key agreement protocol to provide a comprehensive and practical secure group communication platform. SGL also encapsulates the standard message security services (i.e, confidentiality, authenticity and integrity). A number of challenging issues encountered in the design of SGL are brought to light and experimental results obtained with a prototype implementation are discussed.

  16. The Computer Fraud and Abuse Act of 1986 and the Computer Security Act of 1987: Impact on incident response efforts

    SciTech Connect

    Schultz, E.E.

    1991-10-11

    The purpose of this paper is to evaluate two Federal statutes, the Computer Fraud and Abuse Act of 1986 and the Computer Security Act of 1987, from the perspective of computer security incident response efforts. First, the major relevant provisions of each statute are presented. Next, revisions to each statute are proposed, and additional areas needing to be addressed in future legislation are presented. The major conclusion is that these statutes represent a start in the legislative process to deter and prevent computer offenses such as unauthorized access to systems. However, many revisions and additions are needed before such legislation will significantly impact incident response efforts. In addition, legislation alone cannot bring about the degree of change necessary to address the range of computer security threats that presently exist.

  17. National Security Letters, the USA PATRIOT Act, and the Constitution: The Tensions between National Security and Civil Rights

    ERIC Educational Resources Information Center

    Gorham-Oscilowski, Ursula; Jaeger, Paul T.

    2008-01-01

    In response to the terrorist attacks of 9/11, the USA PATRIOT Act greatly expanded the ability of the Federal Bureau of Investigation to use National Security Letters (NSLs) in investigations and the contexts in which they could be used by relaxing the standards under which NSLs could be employed. NSLs allow investigators to acquire a significant…

  18. A cross-platform model for secure Electronic Health Record communication.

    PubMed

    Ruotsalainen, Pekka

    2004-03-31

    During the past decade, there have been many regional, national and European projects focused on the development of platforms for secure access and sharing of distributed patient information. A platform is needed because present local or enterprise-wide information systems are typically not intended for cross-organisational secure access of patient data. Most of the present secure platforms are local or regional. Commonly used platform types in the health care environment vary from secure point-to-point communication systems to internet-based portals. This paper defines an enhanced cross-security platform which makes it possible for different kinds of local, regional, and national health information systems to communicate in a secure way. The proposed evolutionary way interconnects regional or national security domains with the help of a cross-platform zone. A more revolutionary model based on peer-to-peer Grid like networks and dynamic security credentials is also discussed. The proposed evolutionary model uses cross-domain security and interoperability services to ensure secure communication and interoperability between different security domains. The platform supports both communication defined beforehand and adhoc dynamic access to distributed electronic health records (EHRs). The internet is proposed as the "glue" between different regional or national security domains.

  19. Information Data Security Specialists' and Business Leaders' Experiences Regarding Communication Challenges

    ERIC Educational Resources Information Center

    Lopez, Robert H.

    2012-01-01

    The problem addressed was the need to maintain data security in the field of information technology. Specifically, the breakdown of communication between business leaders and data security specialists create risks to data security. The purpose of this qualitative phenomenological study was to determine which factors would improve communication…

  20. Quantum secure direct communication of digital and analog signals using continuum coherent states

    NASA Astrophysics Data System (ADS)

    Guerra, Antônio Geovan de Araújo Holanda; Rios, Francisco Franklin Sousa; Ramos, Rubens Viana

    2016-08-01

    In this work, we present optical schemes for secure direct quantum communication of digital and analog signals using continuum coherent states and frequency-dependent phase modulation. The main advantages of the proposed schemes are that they do not use entangled states and they can be implemented with today technology. The theory of quantum interference of continuum coherent state is described, and the optical setups for secure direct communication are presented and their securities are discussed.

  1. Border Security, Economic Opportunity, and Immigration Modernization Act

    THOMAS, 113th Congress

    Rep. Garcia, Joe [D-FL-26

    2013-10-02

    03/26/2014 Motion to Discharge Committee filed by Mr. Garcia. Petition No: 113-9. (Discharge petition text with signatures.) (All Actions) Notes: On 3/26/2014, a motion was filed to discharge the Committees on the Judiciary, Foreign Affairs, Homeland Security, Ways and Means, Armed Services, Natural Resources, Agriculture, Education and the Workforce, Energy and Commerce, Oversight and Government Reform, the Budget, Science... Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  2. 78 FR 46256 - Security Program, Report of Suspected Crimes, Suspicious Transactions, Catastrophic Acts and Bank...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-31

    ... From the Federal Register Online via the Government Publishing Office NATIONAL CREDIT UNION ADMINISTRATION 12 CFR Part 748 Security Program, Report of Suspected Crimes, Suspicious Transactions, Catastrophic Acts and Bank Secrecy Act Compliance CFR Correction In Title 12 of the Code of Federal...

  3. How Has Vesting Changed Since Passage of Employee Retirement Income Security Act?

    ERIC Educational Resources Information Center

    Graham, Avy D.

    1988-01-01

    Provisions of employer-financed retirement plans have been changed to reflect statutory requirements of the Employee Retirement Income Security Act and other laws. The author discusses the vesting provisions of two types of plans--defined benefit pension plans and defined contribution plans. Future revisions, due to the 1986 Tax Reform Act, are…

  4. Provisions of the Food Security Act of 1985. Agricultural Information Bulletin Number 498.

    ERIC Educational Resources Information Center

    Glaser, Lewrene K.

    This report summarizes the 18 titles of the Food Security Act of 1985 and compares it with previous legislation where applicable. It describes the act's provisions for dairy; wool and mohair; wheat; feed grains; cotton; rice; peanuts; soybeans; sugar; other general commodity provisions; trade; conservation; credit; agricultural research,…

  5. 78 FR 14403 - Alabama Metal Coil Securement Act; Petition for Determination of Preemption

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-05

    ... System (FDMS) published in the Federal Register on December 29, 2010 (75 FR 82132). Background The Metal Coil Securement Act The Act, adopted in 2009, prohibits a motor carrier from transporting metal coils... accidents in Alabama involving the transport of metal coils. Governor Riley took the position that...

  6. Speech Acts across Cultures: Challenges to Communication in a Second Language. Studies on Language Acquisition, 11.

    ERIC Educational Resources Information Center

    Gass, Susan M., Ed.; Neu, Joyce, Ed.

    Articles on speech acts and intercultural communication include: "Investigating the Production of Speech Act Sets" (Andrew Cohen); "Non-Native Refusals: A Methodological Perspective" (Noel Houck, Susan M. Gass); "Natural Speech Act Data versus Written Questionnaire Data: How Data Collection Method Affects Speech Act Performance" (Leslie M. Beebe,…

  7. 76 FR 21741 - Twenty-First Century Communications and Video Programming Accessibility Act; Announcement of Town...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-18

    ... COMMISSION Twenty-First Century Communications and Video Programming Accessibility Act; Announcement of Town... Programming Accessibility Act (the Act or CVAA) hosted by the California State University at Northridge (CSUN... and video programming changes required by the Act. DATES: The Town Hall meeting was held on...

  8. A new image representation for compact and secure communication

    SciTech Connect

    Prasad, Lakshman; Skourikhine, A. N.

    2004-01-01

    In many areas of nuclear materials management there is a need for communication, archival, and retrieval of annotated image data between heterogeneous platforms and devices to effectively implement safety, security, and safeguards of nuclear materials. Current image formats such as JPEG are not ideally suited in such scenarios as they are not scalable to different viewing formats, and do not provide a high-level representation of images that facilitate automatic object/change detection or annotation. The new Scalable Vector Graphics (SVG) open standard for representing graphical information, recommended by the World Wide Web Consortium (W3C) is designed to address issues of image scalability, portability, and annotation. However, until now there has been no viable technology to efficiently field images of high visual quality under this standard. Recently, LANL has developed a vectorized image representation that is compatible with the SVG standard and preserves visual quality. This is based on a new geometric framework for characterizing complex features in real-world imagery that incorporates perceptual principles of processing visual information known from cognitive psychology and vision science, to obtain a polygonal image representation of high fidelity. This representation can take advantage of all textual compression and encryption routines unavailable to other image formats. Moreover, this vectorized image representation can be exploited to facilitate automated object recognition that can reduce time required for data review. The objects/features of interest in these vectorized images can be annotated via animated graphics to facilitate quick and easy display and comprehension of processed image content.

  9. DICOM image secure communications with Internet protocols IPv6 and IPv4.

    PubMed

    Zhang, Jianguo; Yu, Fenghai; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen

    2007-01-01

    Image-data transmission from one site to another through public network is usually characterized in term of privacy, authenticity, and integrity. In this paper, we first describe a general scenario about how image is delivered from one site to another through a wide-area network (WAN) with security features of data privacy, integrity, and authenticity. Second, we give the common implementation method of the digital imaging and communication in medicine (DICOM) image communication software library with IPv6/IPv4 for high-speed broadband Internet by using open-source software. Third, we discuss two major security-transmission methods, the IP security (IPSec) and the secure-socket layer (SSL) or transport-layer security (TLS), being used currently in medical-image-data communication with privacy support. Fourth, we describe a test schema of multiple-modality DICOM-image communications through TCP/IPv4 and TCP/IPv6 with different security methods, different security algorithms, and operating systems, and evaluate the test results. We found that there are tradeoff factors between choosing the IPsec and the SSL/TLS-based security implementation of IPv6/IPv4 protocols. If the WAN networks only use IPv6 such as in high-speed broadband Internet, the choice is IPsec-based security. If the networks are IPv4 or the combination of IPv6 and IPv4, it is better to use SSL/TLS security. The Linux platform has more security algorithms implemented than the Windows (XP) platform, and can achieve better performance in most experiments of IPv6 and IPv4-based DICOM-image communications. In teleradiology or enterprise-PACS applications, the Linux operating system may be the better choice as peer security gateways for both the IPsec and the SSL/TLS-based secure DICOM communications cross public networks.

  10. DICOM image secure communications with Internet protocols IPv6 and IPv4.

    PubMed

    Zhang, Jianguo; Yu, Fenghai; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen

    2007-01-01

    Image-data transmission from one site to another through public network is usually characterized in term of privacy, authenticity, and integrity. In this paper, we first describe a general scenario about how image is delivered from one site to another through a wide-area network (WAN) with security features of data privacy, integrity, and authenticity. Second, we give the common implementation method of the digital imaging and communication in medicine (DICOM) image communication software library with IPv6/IPv4 for high-speed broadband Internet by using open-source software. Third, we discuss two major security-transmission methods, the IP security (IPSec) and the secure-socket layer (SSL) or transport-layer security (TLS), being used currently in medical-image-data communication with privacy support. Fourth, we describe a test schema of multiple-modality DICOM-image communications through TCP/IPv4 and TCP/IPv6 with different security methods, different security algorithms, and operating systems, and evaluate the test results. We found that there are tradeoff factors between choosing the IPsec and the SSL/TLS-based security implementation of IPv6/IPv4 protocols. If the WAN networks only use IPv6 such as in high-speed broadband Internet, the choice is IPsec-based security. If the networks are IPv4 or the combination of IPv6 and IPv4, it is better to use SSL/TLS security. The Linux platform has more security algorithms implemented than the Windows (XP) platform, and can achieve better performance in most experiments of IPv6 and IPv4-based DICOM-image communications. In teleradiology or enterprise-PACS applications, the Linux operating system may be the better choice as peer security gateways for both the IPsec and the SSL/TLS-based secure DICOM communications cross public networks. PMID:17249405

  11. 77 FR 40779 - Assignment of National Security and Emergency Preparedness Communications Functions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-11

    ... Directive-1 of February 13, 2009 (Organization of the National Security Council System) (PPD-1). Sec. 2.2... President, Vice President, and senior national leadership, including: communications with or among ] the... leadership; Continuity of Government communications; and communications among the executive, judicial,...

  12. Secured Optical Communications Using Quantum Entangled Two-Photon Transparency Modulation

    NASA Technical Reports Server (NTRS)

    Kojima, Jun (Inventor); Nguyen, Quang-Viet (Inventor); Lekki, John (Inventor)

    2015-01-01

    A system and method is disclosed wherein optical signals are coded in a transmitter by tuning or modulating the interbeam delay time (which modulates the fourth-order coherence) between pairs of entangled photons. The photon pairs are either absorbed or not absorbed (transparent) by an atomic or molecular fluorescer in a receiver, depending on the inter-beam delay that is introduced in the entangled photon pairs. Upon the absorption, corresponding fluorescent optical emissions follow at a certain wavelength, which are then detected by a photon detector. The advantage of the disclosed system is that it eliminates a need of a coincidence counter to realize the entanglement-based secure optical communications because the absorber acts as a coincidence counter for entangled photon pairs.

  13. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOEpatents

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    2015-01-06

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  14. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOEpatents

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  15. 75 FR 6231 - Securities Act of 1933; Securities Exchange Act of 1934; Order Regarding Review of FASB...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-08

    ... ``generally accepted'' under Section 108 of the Act.\\1\\ As a consequence of that recognition, the Commission... have additional sources of revenue for its activities, such as earnings from sales of publications, provided that each additional source of revenue shall not jeopardize, in the judgment of the...

  16. 78 FR 20705 - Securities Act of 1933; Securities Exchange Act of 1934; Order Regarding Review of FASB...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-05

    ... have additional sources of revenue for its activities, such as earnings from sales of publications, provided that each additional source of revenue shall not jeopardize, in the judgment of the Commission... ``generally accepted'' under Section 108 of the Act.\\1\\ As a consequence of that recognition, the...

  17. Thermal noise informatics: totally secure communication via a wire, zero-power communication, and thermal noise driven computing

    NASA Astrophysics Data System (ADS)

    Kish, Laszlo B.; Mingesz, Robert; Gingl, Zoltan

    2007-06-01

    Very recently, it has been shown that Gaussian thermal noise and its artificial versions (Johnson-like noises) can be utilized as an information carrier with peculiar properties therefore it may be proper to call this topic Thermal Noise Informatics. Zero Power (Stealth) Communication, Thermal Noise Driven Computing, and Totally Secure Classical Communication are relevant examples. In this paper, while we will briefly describe the first and the second subjects, we shall focus on the third subject, the secure classical communication via wire. This way of secure telecommunication utilizes the properties of Johnson(-like) noise and those of a simple Kirchhoff's loop. The communicator is unconditionally secure at the conceptual (circuit theoretical) level and this property is (so far) unique in communication systems based on classical physics. The communicator is superior to quantum alternatives in all known aspects, except the need of using a wire. In the idealized system, the eavesdropper can extract zero bit of information without getting uncovered. The scheme is naturally protected against the man-in-the-middle attack. The communication can take place also via currently used power lines or phone (wire) lines and it is not only a point-to-point communication like quantum channels but network-ready. We report that a pair of Kirchhoff-Loop-Johnson(-like)-Noise communicators, which is able to work over variable ranges, was designed and built. Tests have been carried out on a model-line with ranges beyond the ranges of any known direct quantum communication channel and they indicate unrivalled signal fidelity and security performance. This simple device has single-wire secure key generation/sharing rates of 0.1, 1, 10, and 100 bit/second for copper wires with diameters/ranges of 21 mm / 2000 km, 7 mm / 200 km, 2.3 mm / 20 km, and 0.7 mm / 2 km, respectively and it performs with 0.02% raw-bit error rate (99.98 % fidelity). The raw-bit security of this practical system

  18. 47 CFR 80.305 - Watch requirements of the Communications Act and the Safety Convention.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Watch requirements of the Communications Act... (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES STATIONS IN THE MARITIME SERVICES Safety Watch Requirements and Procedures Ship Station Safety Watches § 80.305 Watch requirements of the Communications Act and the...

  19. 47 CFR 80.305 - Watch requirements of the Communications Act and the Safety Convention.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Watch requirements of the Communications Act... (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES STATIONS IN THE MARITIME SERVICES Safety Watch Requirements and Procedures Ship Station Safety Watches § 80.305 Watch requirements of the Communications Act and the...

  20. 47 CFR 80.305 - Watch requirements of the Communications Act and the Safety Convention.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Watch requirements of the Communications Act... (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES STATIONS IN THE MARITIME SERVICES Safety Watch Requirements and Procedures Ship Station Safety Watches § 80.305 Watch requirements of the Communications Act and the...

  1. 47 CFR 80.305 - Watch requirements of the Communications Act and the Safety Convention.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Watch requirements of the Communications Act... (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES STATIONS IN THE MARITIME SERVICES Safety Watch Requirements and Procedures Ship Station Safety Watches § 80.305 Watch requirements of the Communications Act and the...

  2. 78 FR 10218 - Order Extending Temporary Exemptions Under the Securities Exchange Act of 1934 in Connection With...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-13

    .... 1, 2011), 76 FR 39927 (Jul. 7, 2011). \\2\\ Id. See also Further Definition of ``Swap,'' ``Security... COMMISSION Order Extending Temporary Exemptions Under the Securities Exchange Act of 1934 in Connection With the Revision of the Definition of ``Security'' to Encompass Security-Based Swaps, and Request...

  3. 76 FR 72428 - Privacy Act of 1974; Department of Homeland Security/ALL-017 General Legal Records System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-23

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL--017 General... Security/ ALL--017 General Legal Records System of Records.'' This system will assist attorneys in..., Department of Homeland Security, Washington, DC 20528. Instructions: All submissions received must...

  4. 77 FR 70792 - Privacy Act of 1974; Department of Homeland Security/ALL-004 General Information Technology...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... DHS/ALL-004 General Information Technology Access Account Records System of Records (73 FR 28139, May... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL-004 General... Homeland Security system of records notice titled, Department of Homeland Security/ALL-004...

  5. 75 FR 7979 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-027 The...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ...: The History of the Department of Homeland Security System of Records (69 FR 56781, September 22, 2004... of Homeland Security/ALL-027 The History of the Department of Homeland Security System of Records... Act of 1974 for the Department of Homeland Security/ALL-027 The History of the Department of......

  6. 75 FR 8092 - Privacy Act of 1974; Department of Homeland Security/ALL-027 The History of the Department of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL--027 The History..., Department of Homeland Security-2004- 0004 Oral History Program: The History of the Department of Homeland.../ALL-027 The History of the Department of Homeland Security System of Records and will consist...

  7. Security of electronic mental health communication and record-keeping in the digital age.

    PubMed

    Elhai, Jon D; Frueh, B Christopher

    2016-02-01

    The mental health field has seen a trend in recent years of the increased use of information technology, including mobile phones, tablets, and laptop computers, to facilitate clinical treatment delivery to individual patients and for record keeping. However, little attention has been paid to ensuring that electronic communication with patients is private and secure. This is despite potentially deleterious consequences of a data breach, which are reported in the news media very frequently in modern times. In this article, we present typical security concerns associated with using technology in clinical services or research. We also discuss enhancing the privacy and security of electronic communication with clinical patients and research participants. We offer practical, easy-to-use software application solutions for clinicians and researchers to secure patient communication and records. We discuss such issues as using encrypted wireless networks, secure e-mail, encrypted messaging and videoconferencing, privacy on social networks, and others.

  8. Security of electronic mental health communication and record-keeping in the digital age.

    PubMed

    Elhai, Jon D; Frueh, B Christopher

    2016-02-01

    The mental health field has seen a trend in recent years of the increased use of information technology, including mobile phones, tablets, and laptop computers, to facilitate clinical treatment delivery to individual patients and for record keeping. However, little attention has been paid to ensuring that electronic communication with patients is private and secure. This is despite potentially deleterious consequences of a data breach, which are reported in the news media very frequently in modern times. In this article, we present typical security concerns associated with using technology in clinical services or research. We also discuss enhancing the privacy and security of electronic communication with clinical patients and research participants. We offer practical, easy-to-use software application solutions for clinicians and researchers to secure patient communication and records. We discuss such issues as using encrypted wireless networks, secure e-mail, encrypted messaging and videoconferencing, privacy on social networks, and others. PMID:26301860

  9. Secure communication of medical information using mobile agents.

    PubMed

    Nikooghadam, Morteza; Zakerolhosseini, Ali

    2012-12-01

    Recently several efficient schemes are proposed to provide security of e-medicine systems. Almost all of these schemes have tried to achieve the highest security level in transmission of patients' medical information to medical institutions through a heterogeneous network like Internet. In this paper, we explain the insecurity of these schemes against "man-in-the-middle" attack. Furthermore, a dynamic mobile agent system based on hybrid cryptosystem is proposed that is both secure and also efficient in computation cost. Analyzing the security criteria confirms suitability of the proposed scheme for e-medicine systems. PMID:22569875

  10. 75 FR 18863 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-006...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-13

    ... records notice titled, DHS/TSA-006 Correspondence Matters Tracking System Records (CMTR) (68 FR 49496... purposes of investigating any matter before DHS/TSA. These changes will allow DHS/TSA to thoroughly and... Security Administration--006 Correspondence and Matters Tracking Records AGENCY: Privacy Office,...

  11. 75 FR 28046 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-002...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-19

    ... Transportation Security Threat Assessment System of Records (70 FR 33383, November 8, 2005). TSA's mission is to... systems as reflected in the final rule published on June 25, 2004 in 69 FR 35536. The information is..., intelligence, or other functions consistent with the routine uses set forth in this system of records...

  12. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... Administration-015 Registered Traveler Operations Files (November 8, 2005, 69 FR 67735), which was written to...)-015 Registered Traveler (RT) Operations File Files (November 8, 2005, 69 FR 67735), which was written... Transportation Security Administration System of Records AGENCY: Privacy Office, Department of Homeland...

  13. 75 FR 18867 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-011...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-13

    ... Security Intelligence Service (TSIS) Operations Files System of Records (69 FR 71828, December 10, 2004...(j)(2), (k)(1), (k)(2) and (k)(5) as reflected in the final rule published on August 4, 2006 in 71 FR...)(2), and (k)(5) as reflected in the final rule published on August 4, 2006, in 71 FR 44223....

  14. Emergency Responder Radio Communications Protection Act of 2014

    THOMAS, 113th Congress

    Rep. Israel, Steve [D-NY-3

    2014-03-11

    04/16/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  15. A secure communication using cascade chaotic computing systems on clinical decision support.

    PubMed

    Koksal, Ahmet Sertol; Er, Orhan; Evirgen, Hayrettin; Yumusak, Nejat

    2016-06-01

    Clinical decision support systems (C-DSS) provide supportive tools to the expert for the determination of the disease. Today, many of the support systems, which have been developed for a better and more accurate diagnosis, have reached a dynamic structure due to artificial intelligence techniques. However, in cases when important diagnosis studies should be performed in secret, a secure communication system is required. In this study, secure communication of a DSS is examined through a developed double layer chaotic communication system. The developed communication system consists of four main parts: random number generator, cascade chaotic calculation layer, PCM, and logical mixer layers. Thanks to this system, important patient data created by DSS will be conveyed to the center through a secure communication line.

  16. Telecommunications Policy Research Conference. Computer and Communications Security Section. Papers.

    ERIC Educational Resources Information Center

    Telecommunications Policy Research Conference, Inc., Washington, DC.

    In his paper, "European Needs and Attitudes towards Information Security," Richard I. Polis notes that the needs for security in computer systems, telecommunications, and media are rather uniform throughout Western Europe, and are seen as being significantly different from the needs in the United States. Recognition of these needs is, however,…

  17. Method of Performance-Aware Security of Unicast Communication in Hybrid Satellite Networks

    NASA Technical Reports Server (NTRS)

    Roy-Chowdhury, Ayan (Inventor); Baras, John S. (Inventor)

    2014-01-01

    A method and apparatus utilizes Layered IPSEC (LES) protocol as an alternative to IPSEC for network-layer security including a modification to the Internet Key Exchange protocol. For application-level security of web browsing with acceptable end-to-end delay, the Dual-mode SSL protocol (DSSL) is used instead of SSL. The LES and DSSL protocols achieve desired end-to-end communication security while allowing the TCP and HTTP proxy servers to function correctly.

  18. Building a gateway with open source software for secure-DICOM communication over insecure networks

    NASA Astrophysics Data System (ADS)

    Emmel, Dirk; Ricke, Jens; Stohlmann, Lutz; Haderer, Alexander; Felix, Roland

    2002-05-01

    For Teleradiology the exchange of DICOM-images is needed for several purposes. Existing solutions often don't consider about the needs for data security and data privacy. Communication is done without any encryption over insecure networks or with encryption using proprietary solutions, which reduces the data communication possibilities to partners with the same equipment. Our goal was to build a gateway, which offers a transparent solution for secure DICOM-communication in a heterogeneous environment We developed a PC-based gateway system with DICOM-communication to the in-house network and secure DICOM communication for the communication over the insecure network. One gateway installed at each location is responsible for encryption/decryption. The sender just transfers the image data over the DICOM protocol to the local gateway. The gateway forwards the data to the gateway on the destination site using the secure DICOM protocol, which is part of the DICOM standard. The receiving gateway forwards the image data to the final destination again using the DICOM-Protocol. The gateway is based on Open Source software and runs under several operating systems. Our experience shows a reliable solution, which solves security issues for DICOM communication of image data and integrates seamless into a heterogeneous DICOM environment.

  19. 76 FR 12609 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-08

    ... Security Operations Center Database (April 18, 2005, 70 FR 20061). The Privacy Act embodies fair... Operations Center Tracker and Senior Watch Officer Logs System of Records AGENCY: Privacy Office, DHS. ACTION... and Senior Watch Officer Logs System of Records and this proposed rulemaking. The National...

  20. 76 FR 15841 - General Rules and Regulations, Securities Act of 1933

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-22

    ... COMMISSION 17 CFR Part 230 General Rules and Regulations, Securities Act of 1933 CFR Correction In Title 17 of the Code of Federal Regulations, Parts 200 to 239, revised as of April 1, 2010, on page 686, in.... 230.501 Definitions and terms used in Regulation D. * * * * * (e) * * * NOTE: The issuer must...

  1. 75 FR 75520 - Order Extending Temporary Conditional Exemptions Under The Securities Exchange Act of 1934 in...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-03

    ... Release No. 60372 (Jul. 23, 2009), 74 FR 37748 (Jul. 29, 2009) (``July 2009 ICE Clear Europe Exemptive... Release Nos. 60372 (Jul. 23, 2009), 74 FR 37748 (Jul. 29, 2009) and 61973 (Apr. 23, 2010), 75 FR 22656...); Securities Exchange Act Release Nos. 60373 (Jul. 23, 2009), 74 FR 37740 (Jul. 29, 2009) and 61975 (Apr....

  2. P.L. 110-140, "Energy Independence and Security Act of 2007" (2007)

    SciTech Connect

    2007-12-13

    An act to move the United States toward greater energy independence and security, to increase the production of clean renewable fuels, to protect consumers, to increase the efficiency of products, buildings, and vehicles, to promote research on and deploy greenhouse gas capture and storage options, and to improve the energy performance of the Federal Government, and for other purposes.

  3. 75 FR 22656 - Order Extending Temporary Conditional Exemptions Under the Securities Exchange Act of 1934 in...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-29

    ... ICE Clear Europe order''); Securities Exchange Act Release No. 60373 (Jul. 23, 2009), 74 FR 37740 (Jul.... A. ICE Clear Europe's CDS Clearing Activities to Date ICE Clear Europe has cleared proprietary CDS... exemption from section 5 with respect to such trading activity. The temporary exemption for ICE Clear...

  4. Education Issues Raised by S.744: The Border Security, Economic Opportunity, and Immigration Modernization Act

    ERIC Educational Resources Information Center

    Murphy, Garrett

    2014-01-01

    This brief report summarizes the requirements for undocumented immigrants set forth by the Border Security, Economic Opportunity, and Immigration Modernization Act (S.744). Assuming that S.744 will move forward in Congress, the report also examines issues having to do with certain language, civics and government, and education/training provisions…

  5. 75 FR 75518 - Order Extending Temporary Conditional Exemptions Under the Securities Exchange Act of 1934 in...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-03

    ... Release Nos. 60372 (Jul. 23, 2009), 74 FR 37748 (Jul. 29, 2009) and 61973 (Apr. 23, 2010), 75 FR 22656...); Securities Exchange Act Release Nos. 60373 (Jul. 23, 2009), 74 FR 37740 (Jul. 29, 2009) and 61975 (Apr. 23, 2010), 75 FR 22641 (Apr. 29, 2010) (temporary exemptions in connection with CDS clearing by...

  6. Advanced Communications Technology Satellite (ACTS): Design and on-orbit performance measurements

    NASA Technical Reports Server (NTRS)

    Gargione, F.; Acosta, R.; Coney, T.; Krawczyk, R.

    1995-01-01

    The Advanced Communications Technology Satellite (ACTS), developed and built by Lockheed Martin Astro space for the NASA Lewis Research Center, was launched in September 1993 on the shuttle STS 51 mission. ACTS is a digital experimental communications test bed that incorporates gigahertz bandwidth transponders operating at Ka band, hopping spot beams, on-board storage and switching, and dynamic rain fade compensation. This paper describes the ACTS enabling technologies, the design of the communications payload, the constraints imposed on the spacecraft bus, and the measurements conducted to verify the performance of the system in orbit.

  7. Robust Networking Architecture and Secure Communication Scheme for Heterogeneous Wireless Sensor Networks

    ERIC Educational Resources Information Center

    McNeal, McKenzie, III.

    2012-01-01

    Current networking architectures and communication protocols used for Wireless Sensor Networks (WSNs) have been designed to be energy efficient, low latency, and long network lifetime. One major issue that must be addressed is the security in data communication. Due to the limited capabilities of low cost and small sized sensor nodes, designing…

  8. Public key suppression and recovery using a PANDA ring resonator for high security communication

    NASA Astrophysics Data System (ADS)

    Juleang, Pakorn; Phongsanam, Prapas; Mitatha, Somsak; Yupapin, Preecha P.

    2011-03-01

    An interesting security technique that uses the dark-bright soliton conversion control within the microring resonator is proposed. The obtained outputs for a dark-bright soliton dynamic state can be controlled and used to form the public key suppression for communication security application. However, a good design should be possible to be fabricated; therefore, by using the parameters based on the practical device parameters, the simulation results obtained have shown that the proposed system can indeed be achieved. The public key suppression and public key recovery can be used in a highly secure communication system and has potential applications in optical cryptography.

  9. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  10. A revised controlled deterministic secure quantum communication with five-photon entangled state

    NASA Astrophysics Data System (ADS)

    Xiu, Xiao-Ming; Dong, Li; Gao, Ya-Jun; Chi, Feng; Ren, Yuan-Peng; Liu, Hui-Wei

    2010-01-01

    A revised controlled deterministic secure quantum communication protocol using five-photon entangled state is proposed. It amends the security loopholes pointed by Qin et al. in [S.J. Qin, Q.Y. Wen, L.M. Meng, F.C. Zhu, Opt. Commun. 282 (2009) 2656] in the original protocol proposed by Xiu et al. in [X.M. Xiu, L. Dong, Y.J. Gao, F. Chi, Opt. Commun. 282 (2009) 333]. The security loopholes are solved by using order rearrangement of transmission photons and two-step security test.

  11. Quantum Secure Direct Communication in a noisy environment: Theory and Experiment

    NASA Astrophysics Data System (ADS)

    Long, Gui Lu

    Quantum communication holds promise for absolutely security in secret message transmission. Quantum secure direct communication (QSDC) is an important branch of the quantum communication in which secret messages are sent directly over a quantum channel with security[Phys. Rev. A 65 , 032302 (2002)]. QSDC offers higher security and is instantaneous in communication, and is a great improvement to the classical communication mode. It is also a powerful basic quantum communication primitive for constructing many other quantum communication tasks such as quantum bidding, quantum signature and quantum dialogue and so on. Since the first QSDC protocol proposed in 2000, it has become one of the extensive research focuses. In this talk, the basic ideas of QSDC will be reviewed, and major QSDC protocols will be described, such as the efficient-QSDC protocol, the two-step QSDC protocol, the one-time-pad QSDC protocol, the high-dimensional QSDC protocol and so on. Experimental progress is also developing steadily, and will also be reviewed. In particular, the quantum one-time-pad QSDC protocol has recently been successfully demonstrated experimentally[arXiv:1503.00451]. Work supported by China National Natural Science Foundation, the Ministry of Science and Technology of China.

  12. Enhancing Nutrition Security via India's National Food Security Act: Using an Axe instead of a Scalpel?§

    PubMed Central

    Desai, Sonalde; Vanneman, Reeve

    2016-01-01

    In September 2013, India passed a historic National Food Security Act. This paper examines the potential impact of the two central pillars of this act - expansion of the Public Distribution System and strengthening of the Integrated Child Development Schemes – on child nutrition. Using new data from the India Human Development Survey of 2011-12, this paper shows that access to subsidized grains via PDS is not related to improved child nutrition, and while ICDS seems to be related to lower child undernutrition, it has a limited reach in spite of the universalization of the program. The paper suggests that a tiered strategy in dealing with child undernutrition that starts with the identification of undernourished children and districts and follows through with different strategies for dealing with severe, acute malnutrition, followed by a focus on moderate malnutrition, could be more effective than the existing focus on cereal distribution rooted in the NFSA. PMID:27034596

  13. 75 FR 11589 - Order Extending Temporary Exemptions Under the Securities Exchange Act of 1934 in Connection with...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-11

    ... Securities Exchange Act Release No. 60372 (Jul. 23, 2009), 74 FR 37748 (Jul. 29, 2009) (temporary exemptions.... 60373 (Jul. 23, 2009), 74 FR 37740 (Jul. 29, 2009) (temporary exemptions in connection with CDS clearing by Eurex Clearing AG); Securities Exchange Act Release No. 59578 (Mar. 13, 2009), 74 FR 11781...

  14. 17 CFR 230.167 - Communications in connection with certain registered offerings of asset-backed securities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Communications in connection... General § 230.167 Communications in connection with certain registered offerings of asset-backed securities. Preliminary Note: This section is available only to communications in connection with...

  15. 15 CFR 744.11 - License requirements that apply to entities acting contrary to the national security or foreign...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... entities acting contrary to the national security or foreign policy interests of the United States. 744.11...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY... national security or foreign policy interests of the United States. BIS may impose foreign policy...

  16. 15 CFR 744.11 - License requirements that apply to entities acting contrary to the national security or foreign...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... entities acting contrary to the national security or foreign policy interests of the United States. 744.11...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY... national security or foreign policy interests of the United States. BIS may impose foreign policy...

  17. 15 CFR 744.11 - License requirements that apply to entities acting contrary to the national security or foreign...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... entities acting contrary to the national security or foreign policy interests of the United States. 744.11...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY... national security or foreign policy interests of the United States. BIS may impose foreign policy...

  18. 76 FR 41274 - Privacy Act of 1974; Department of Homeland Security/ALL-033 Reasonable Accommodations Records...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-13

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL-033 Reasonable... to ] establish a new system of records titled, ``Department of Homeland Security/ALL-033 Reasonable..., Washington, DC 20528. Instructions: All submissions received must include the agency name and docket...

  19. 75 FR 28035 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-19

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and... titled, ``Department of Homeland Security/U.S. Citizenship and Immigration Services--011 E-Verify Program System of Records.'' The U.S. Citizenship and Immigration Services E-Verify Program allows employers...

  20. High speed fault tolerant secure communication for muon chamber using FPGA based GBTx emulator

    NASA Astrophysics Data System (ADS)

    Sau, Suman; Mandal, Swagata; Saini, Jogender; Chakrabarti, Amlan; Chattopadhyay, Subhasis

    2015-12-01

    The Compressed Baryonic Matter (CBM) experiment is a part of the Facility for Antiproton and Ion Research (FAIR) in Darmstadt at the GSI. The CBM experiment will investigate the highly compressed nuclear matter using nucleus-nucleus collisions. This experiment will examine lieavy-ion collisions in fixed target geometry and will be able to measure hadrons, electrons and muons. CBM requires precise time synchronization, compact hardware, radiation tolerance, self-triggered front-end electronics, efficient data aggregation schemes and capability to handle high data rate (up to several TB/s). As a part of the implementation of read out chain of Muon Cliamber(MUCH) [1] in India, we have tried to implement FPGA based emulator of GBTx in India. GBTx is a radiation tolerant ASIC that can be used to implement multipurpose high speed bidirectional optical links for high-energy physics (HEP) experiments and is developed by CERN. GBTx will be used in highly irradiated area and more prone to be affected by multi bit error. To mitigate this effect instead of single bit error correcting RS code we have used two bit error correcting (15, 7) BCH code. It will increase the redundancy which in turn increases the reliability of the coded data. So the coded data will be less prone to be affected by noise due to radiation. The data will go from detector to PC through multiple nodes through the communication channel. The computing resources are connected to a network which can be accessed by authorized person to prevent unauthorized data access which might happen by compromising the network security. Thus data encryption is essential. In order to make the data communication secure, advanced encryption standard [2] (AES - a symmetric key cryptography) and RSA [3], [4] (asymmetric key cryptography) are used after the channel coding. We have implemented GBTx emulator on two Xilinx Kintex-7 boards (KC705). One will act as transmitter and other will act as receiver and they are connected

  1. Toward a semantics for an agent communications language based on speech-acts

    SciTech Connect

    Smith, I.A.; Cohen, P.R.

    1996-12-31

    Systems based on distributed agent architectures require an agent communications language having a clearly defined semantics. This paper demonstrates that a semantics for an agent communications language can be founded on the premise that agents are building, maintaining, and disbanding teams through their performance of communicative acts. This view requires that definitions of basic communicative acts, such as requesting, be recast in terms of the formation of a joint intention - a mental state that has been suggested underlies team behavior. To illustrate these points, a semantics is developed for a number of communication actions that can form and dissolve teams. It is then demonstrated how much of the structure of popular finite-state dialogue models, such as Winograd and Flores` basic conversation for action, follows as a consequence of the logical relationships that are created by the redefined communicative actions.

  2. Performance evaluation of secured DICOM image communication with next generation internet protocol IPv6

    NASA Astrophysics Data System (ADS)

    Yu, Fenghai; Zhang, Jianguo; Chen, Xiaomeng; Huang, H. K.

    2005-04-01

    Next Generation Internet (NGI) technology with new communication protocol IPv6 emerges as a potential solution for low-cost and high-speed networks for image data transmission. IPv6 is designed to solve many of the problems of the current version of IP (known as IPv4) with regard to address depletion, security, autoconfiguration, extensibility, and more. We choose CTN (Central Test Node) DICOM software developed by The Mallinckrodt Institute of Radiology to implement IPv6/IPv4 enabled DICOM communication software on different operating systems (Windows/Linux), and used this DICOM software to evaluate the performance of the IPv6/IPv4 enabled DICOM image communication with different security setting and environments. We compared the security communications of IPsec with SSL/TLS on different TCP/IP protocols (IPv6/IPv4), and find that there are some trade-offs to choose security solution between IPsec and SSL/TLS in the security implementation of IPv6/IPv4 communication networks.

  3. Patients' rights to care under Clinton's Health Security Act: the structure of reform.

    PubMed Central

    Mariner, W K

    1994-01-01

    Like most reform proposals, President Clinton's proposed Health Security Act offers universal access to care but does not significantly alter the nature of patients' legal rights to services. The act would create a system of delegated federal regulation in which the states would act like federal administrative agencies to carry out reform. To achieve uniform, universal coverage, the act would establish a form of mandatory health insurance, with federal law controlling the minimum services to which everyone would be entitled. Because there is no constitutionally protected right to health care and no independent constitutional standard for judging what insurance benefits are appropriate, the federal government would retain considerable freedom to decide what services would and would not be covered. If specific benefits are necessary for patients, they will have to be stated in the legislation that produces reform. PMID:8059899

  4. Tools and Methods for Hardening Communication Security of Energy Delivery Systems

    SciTech Connect

    Gadgil, Shrirang; Lin, Yow-Jian; Ghosh, Abhrajit; Samtani, Sunil; Kang, Jaewon; Siegell, Bruce; Kaul, Vikram; Unger, John; De Bruet, Andre; Martinez, Catherine; Vermeulen, Gerald; Rasche, Galen; Sternfeld, Scott; Berthier, Robin; Bobba, Rakesh; Campbell, Roy; Sanders, Williams; Lin, Yow-Jian

    2014-06-30

    This document summarizes the research and development work the TT Government Solutions (TTGS), d.b.a. Applied Communication Sciences (ACS), team performed for the Department of Energy Cybersecurity for Energy Delivery Systems (CEDS) program. It addresses the challenges in protecting critical grid control and data communication, including the identification of vulnerabilities and deficiencies of communication protocols commonly used in energy delivery systems (e.g., ICCP, DNP3, C37.118, C12.22), as well as the development of effective means to detect and prevent the exploitation of such vulnerabilities and deficiencies. The team consists of • TT Government Solutions (TTGS), a leading provider of communications solutions that has extensive experience in commercializing communications solutions. TTGS also has deep cyber security research and development expertise supporting a variety of customers. • University of Illinois at Urbana-Champaign (UIUC), a leader in the cyber security research for the power grid. UIUC brings unique experience in designing secure communication protocols to this project. • Electric Power Research Institute (EPRI), an independent nonprofit that conducts research and development relating to the generation, delivery and use of electricity for the benefit of the public. EPRI brings to this effort its extensive technical expertise and its utility connections, with members representing more than 90 percent of the electricity generated and delivered in the United States. • DTE Energy, the 10th largest electric utility in the US, which helps ensure that this project focuses on the needs of utilities and is rightly positioned to address the needs of the market place. We designed, developed, and demonstrated a modular and extensible ADEC-G (Agent-based, Distributed, Extensible Cybersecurity for the Grid) system for monitoring/detecting abnormal energy delivery systems (EDS) protocol usage and ensuring security coverage. Our approach consists

  5. Practical Quantum Cryptography for Secure Free-Space Communications

    SciTech Connect

    Buttler, W.T.; Hughes, R.J.; Kwiat, P.G.; Lamoreaux, S.K.; Morgan, G.L.; Nordholt, J.E.; Peterson, C.G.

    1999-02-01

    Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics and information-theoretically secure post-processing methods. An adversary can neither successfully tap the quantum transmissions, nor evade detection, owing to Heisenberg's uncertainty principle. In this paper we describe the theory of quantum cryptography, and the most recent results from our experimental free-space system with which we have demonstrated for the first time the feasibility of quantum key generation over a point-to-point outdoor atmospheric path in daylight. We achieved a transmission distance of 0.5 km, which was limited only by the length of the test range. Our results provide strong evidence that cryptographic key material could be generated on demand between a ground station and a satellite (or between two satellites), allowing a satellite to be securely re-keyed on orbit. We present a feasibility analysis of surface-to-satellite quantum key generation.

  6. Toddlers' Complex Communication: Playfulness from a Secure Base

    ERIC Educational Resources Information Center

    Alcock, Sophie

    2013-01-01

    Attachment theory is presented in this article as involving embodied relational processes within complex relational systems. Two narrative-like "events" are represented to illustrate very young children playfully relating -- connecting and communicating inter- and intrasubjectively. The ethnographic-inspired research methods included…

  7. The role of the Employee Retirement Income Security Act of 1974.

    PubMed

    Ryland, Barbara K

    2004-10-01

    On June 21, 2004, the Supreme Court ruled on Aetna Health Inc. v. Davila, the latest in a long line of decisions regarding the scope of Employee Retirement Income Security Act of 1974 (ERISA) preemption and the remedies available to participants of ERISA plans. After taking what many observers perceived to be a detour over the last few years, the Davila decision returned the Court to a more expansive interpretation of ERISA's preemption clause.

  8. 17 CFR 239.37 - Form F-7, for registration under the Securities Act of 1933 of securities of certain Canadian...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... affecting Form F-7, see the List of CFR Sections Affected, which appears in the Finding Aids section of the... under the Securities Act of 1933 of securities of certain Canadian issuers offered for cash upon the... certain Canadian issuers offered for cash upon the exercise of rights granted to existing...

  9. Comment on "Quantum Secure Direct Communication with Authentication Expansion Using Single Photons"

    NASA Astrophysics Data System (ADS)

    Yang, Yu-Guang; Jia, Xin; Xia, Juan; Shi, Lei; Zhang, Hua

    2012-12-01

    The security of the quantum secure direct communication protocol with authentication expansion using single photons is analyzed. It is shown that an eavesdropper can obtain or even modify the transmitted secret without introducing any error by implementing a simple man-in-the-middle attack after the authentication is successfully carried out. Furthermore, a denial-of-service attack is also discussed. The particular attack strategy is demonstrated and an improved protocol is presented.

  10. Cryptanalysis of Quantum Secure Direct Communication and Authentication Scheme via Bell States

    NASA Astrophysics Data System (ADS)

    Gao, Fei; Qin, Su-Juan; Guo, Fen-Zhuo; Wen, Qiao-Yan

    2011-02-01

    The security of the quantum secure direct communication (QSDC) and authentication protocol based on Bell states is analyzed. It is shown that an eavesdropper can invalidate the authentication function, and implement a successful man-in-the-middle attack, where he/she can obtain or even modify the transmitted secret without introducing any error. The particular attack strategy is demonstrated and an improved protocol is presented.

  11. Novel Multiparty Controlled Bidirectional Quantum Secure Direct Communication Based on Continuous-variable States

    NASA Astrophysics Data System (ADS)

    Yu, Zhen-Bo; Gong, Li-Hua; Wen, Ru-Hong

    2016-03-01

    A novel multiparty controlled bidirectional quantum secure direct communication protocol combining continuous-variable states with qubit block transmission is proposed. Two legitimate communication parties encode their own secret information into entangled optical modes with translation operations, and the secret information of each counterpart can only be recovered under the permission of all controllers. Due to continuous-variable states and block transmission strategy, the proposed protocol is easy to realize with perfect qubit efficiency. Security analyses show that the proposed protocol is free from common attacks, including the man-in-the-middle attack.

  12. L-Band Digital Aeronautical Communications System Engineering - Initial Safety and Security Risk Assessment and Mitigation

    NASA Technical Reports Server (NTRS)

    Zelkin, Natalie; Henriksen, Stephen

    2011-01-01

    This document is being provided as part of ITT's NASA Glenn Research Center Aerospace Communication Systems Technical Support (ACSTS) contract NNC05CA85C, Task 7: "New ATM Requirements--Future Communications, C-Band and L-Band Communications Standard Development." ITT has completed a safety hazard analysis providing a preliminary safety assessment for the proposed L-band (960 to 1164 MHz) terrestrial en route communications system. The assessment was performed following the guidelines outlined in the Federal Aviation Administration Safety Risk Management Guidance for System Acquisitions document. The safety analysis did not identify any hazards with an unacceptable risk, though a number of hazards with a medium risk were documented. This effort represents a preliminary safety hazard analysis and notes the triggers for risk reassessment. A detailed safety hazards analysis is recommended as a follow-on activity to assess particular components of the L-band communication system after the technology is chosen and system rollout timing is determined. The security risk analysis resulted in identifying main security threats to the proposed system as well as noting additional threats recommended for a future security analysis conducted at a later stage in the system development process. The document discusses various security controls, including those suggested in the COCR Version 2.0.

  13. Developing a Standard Method for Link-Layer Security of CCSDS Space Communications

    NASA Technical Reports Server (NTRS)

    Biggerstaff, Craig

    2009-01-01

    Communications security for space systems has been a specialized field generally far removed from considerations of mission interoperability and cross-support in fact, these considerations often have been viewed as intrinsically opposed to security objectives. The space communications protocols defined by the Consultative Committee for Space Data Systems (CCSDS) have a twenty-five year history of successful use in over 400 missions. While the CCSDS Telemetry, Telecommand, and Advancing Orbiting Systems protocols for use at OSI Layer 2 are operationally mature, there has been no direct support within these protocols for communications security techniques. Link-layer communications security has been successfully implemented in the past using mission-unique methods, but never before with an objective of facilitating cross-support and interoperability. This paper discusses the design of a standard method for cryptographic authentication, encryption, and replay protection at the data link layer that can be integrated into existing CCSDS protocols without disruption to legacy communications services. Integrating cryptographic operations into existing data structures and processing sequences requires a careful assessment of the potential impediments within spacecraft, ground stations, and operations centers. The objective of this work is to provide a sound method for cryptographic encapsulation of frame data that also facilitates Layer 2 virtual channel switching, such that a mission may procure data transport services as needed without involving third parties in the cryptographic processing, or split independent data streams for separate cryptographic processing.

  14. NASA ACTS Multibeam Antenna (MBA) System. [Advanced Communications Technology Satellite

    NASA Technical Reports Server (NTRS)

    Choung, Youn H.; Stiles, W. Herschel; Wu, Joseph; Wong, William C.; Chen, C. Harry

    1986-01-01

    The design of the Advanced Communications Technology Satellite MBA system, which provides both spot beam and scanning beam coverage to both high and low burst rates data-users is examined. The MBA consists of receive and transmit antennas installed on a common precision mounting platform that is integrated to the bus through three flexures; a lightweight system with low thermal distortion is obtained by using composite materials for the MBA structures. The RF design, which is a Cassegrain reflector with a large equivalent focal length/aperture size, is described. Consideration is given to the position of the feed in order to minimize scan loss and sidelobe levels, the size of the subreflector in order to minimize feed spillover, and antenna performance degradation caused by reflector surface distortion. Breadbroad model test result reveal that the maximum sidelobe level outside the 2.5 HPBW region is -30 dB or lower relative to the power.

  15. PCASSO: a design for secure communication of personal health information via the internet.

    PubMed

    Baker, D B; Masys, D R

    1999-05-01

    The Internet holds both promise and peril for the communications of person-identifiable health information. Because of technical features designed to promote accessibility and interoperability rather than security, Internet addressing conventions and transport protocols are vulnerable to compromise by malicious persons and programs. In addition, most commonly used personal computer (PC) operating systems currently lack the hardware-based system software protection and process isolation that are essential for ensuring the integrity of trusted applications. Security approaches designed for electronic commerce, that trade known security weaknesses for limited financial liability, are not sufficient for personal health data, where the personal damage caused by unintentional disclosure may be far more serious. To overcome these obstacles, we are developing and evaluating an Internet-based communications system called PCASSO (Patient-centered access to secure systems online) that applies state of the art security to health information. PCASSO includes role-based access control, multi-level security, strong device and user authentication, session-specific encryption and audit trails. Unlike Internet-based electronic commerce 'solutions,' PCASSO secures data end-to-end: in the server; in the data repository; across the network; and on the client. PCASSO is designed to give patients as well as providers access to personal health records via the Internet. PMID:10219949

  16. PCASSO: a design for secure communication of personal health information via the internet.

    PubMed

    Baker, D B; Masys, D R

    1999-05-01

    The Internet holds both promise and peril for the communications of person-identifiable health information. Because of technical features designed to promote accessibility and interoperability rather than security, Internet addressing conventions and transport protocols are vulnerable to compromise by malicious persons and programs. In addition, most commonly used personal computer (PC) operating systems currently lack the hardware-based system software protection and process isolation that are essential for ensuring the integrity of trusted applications. Security approaches designed for electronic commerce, that trade known security weaknesses for limited financial liability, are not sufficient for personal health data, where the personal damage caused by unintentional disclosure may be far more serious. To overcome these obstacles, we are developing and evaluating an Internet-based communications system called PCASSO (Patient-centered access to secure systems online) that applies state of the art security to health information. PCASSO includes role-based access control, multi-level security, strong device and user authentication, session-specific encryption and audit trails. Unlike Internet-based electronic commerce 'solutions,' PCASSO secures data end-to-end: in the server; in the data repository; across the network; and on the client. PCASSO is designed to give patients as well as providers access to personal health records via the Internet.

  17. Secure communication of static information by electronic means

    DOEpatents

    Gritton, Dale G.

    1994-01-01

    A method and apparatus (10) for the secure transmission of static data (16) from a tag (11) to a remote reader (12). Each time the static data (16) is to be transmitted to the reader (12), the 10 bits of static data (16) are combined with 54 bits of binary data (21), which constantly change from one transmission to the next, into a 64-bit number (22). This number is then encrypted and transmitted to the remote reader (12) where it is decrypted (26) to produce the same 64 bit number that was encrypted in the tag (11). With a continual change in the value of the 64 bit number (22) in the tag, the encrypted numbers transmitted to the reader (12) will appear to be dynamic in character rather than being static.

  18. Field test of a practical secure communication network with decoy-state quantum cryptography.

    PubMed

    Chen, Teng-Yun; Liang, Hao; Liu, Yang; Cai, Wen-Qi; Ju, Lei; Liu, Wei-Yue; Wang, Jian; Yin, Hao; Chen, Kai; Chen, Zeng-Bing; Peng, Cheng-Zhi; Pan, Jian-Wei

    2009-04-13

    We present a secure network communication system that operated with decoy-state quantum cryptography in a real-world application scenario. The full key exchange and application protocols were performed in real time among three nodes, in which two adjacent nodes were connected by approximate 20 km of commercial telecom optical fiber. The generated quantum keys were immediately employed and demonstrated for communication applications, including unbreakable real-time voice telephone between any two of the three communication nodes, or a broadcast from one node to the other two nodes by using one-time pad encryption.

  19. Field test of a practical secure communication network with decoy-state quantum cryptography.

    PubMed

    Chen, Teng-Yun; Liang, Hao; Liu, Yang; Cai, Wen-Qi; Ju, Lei; Liu, Wei-Yue; Wang, Jian; Yin, Hao; Chen, Kai; Chen, Zeng-Bing; Peng, Cheng-Zhi; Pan, Jian-Wei

    2009-04-13

    We present a secure network communication system that operated with decoy-state quantum cryptography in a real-world application scenario. The full key exchange and application protocols were performed in real time among three nodes, in which two adjacent nodes were connected by approximate 20 km of commercial telecom optical fiber. The generated quantum keys were immediately employed and demonstrated for communication applications, including unbreakable real-time voice telephone between any two of the three communication nodes, or a broadcast from one node to the other two nodes by using one-time pad encryption. PMID:19365479

  20. Methods for developing jam-resistant security communications networks at fixed-site facilities

    NASA Astrophysics Data System (ADS)

    Gangel, D. J.; Heustess, J. E.; Snell, M. K.

    Considerable work has been done identifying and developing equipment and procedures that can be used to improve the survivability of a security communications network during a jamming assault. Insight is given into alternate communications methods that can be used to develop resistance to jamming by supplementing existing radio communications. The spatial properties of jamming are then discussed and examples of how these properties can be exploited are examined. Also discussed are spread-spectrum radios that are highly resistant to jamming and the importance of jamming exercises.

  1. Methods for developing jam-resistant security communications networks at fixed-site facilities

    NASA Astrophysics Data System (ADS)

    Gangel, D. J.; Heustess, J. E.; Snell, M. K.

    Considerable work has been done identifying and developing equipment and procedures that can be used to improve the survivability of a security communications network during a jamming assault. Insight is given into alternate communications methods that can be used to develop resistance to jamming by supplementing existing radio communications. The spatial properties of jamming are then discussed and examples of how these properties can be explocited are examined. Also discussed are spread-spectrum radios that are highly resistant to jamming and the importance of jamming exercises.

  2. Coding techniques for secure digital communications for unit protection of distribution feeders

    SciTech Connect

    Redfern, M.A.; McGuinness, D.P.; Ormondroyd, R.F.

    1996-04-01

    The dramatic growth in new designs of microprocessor relays has led to a growth in the use digital communications for protection. Unfortunately in any communication system there will always be some corruption of the received data. Part of the art and science of relay design is therefore to take this into account. This paper examines coding techniques designed to minimize the probability of corrupted data being declared as healthy. Message size, coding techniques and interleaving are examined with respect to the choice of a coding strategy for a secure data communication system for unit protection.

  3. Methods for developing jam-resistant security communications networks at fixed-site facilities

    SciTech Connect

    Gangel, D.J.; Heustess, J.E.; Snell, M.K.

    1985-01-01

    Considerable work has been done identifying and developing equipment and procedures that can be used to improve the survivability of a security communications network during a jamming assault. Insight is given into alternate communications methods that can be used to develop resistance to jamming by supplementing existing radio communications. The spatial properties of jamming are then discussed and examples of how these properties can be exploited are examined. Also discussed are spread-spectrum radios that are highly resistant to jamming and the importance of jamming exercises.

  4. Methods for developing jam-resistant security communications networks at fixed-site facilities

    SciTech Connect

    Gangel, D.J.; Heustess, J.E.; Snell, M.K.

    1986-01-01

    Considerable work has been done identifying and developing equipment and procedures that can be used to improve the survivability of a security communications network during a jamming assault. Insight is given into alternate communications methods that can be used to develop resistance to jamming by supplementing existing radio communications. The spatial properties of jamming are then discussed and examples of how these properties can be exploited are examined. Also discussed are spread-spectrum radios that are highly resistant to jamming and the importance of jamming exercises.

  5. 76 FR 82353 - Implementing the Provisions of the Communications Act of 1934, as Enacted by the Twenty-First...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-30

    ...In this document, the Commission adopts rules that implement provisions of section 104 of the Twenty-First Century Communications and Video Accessibility Act of 2010 (CVAA), Public Law 111-260, the most significant accessibility legislation since the passage of the Americans with Disabilities Act (ADA) in 1990. A Proposed Rule relating to implementation of section 718 of the Communications Act......

  6. The Nature, Function, and Impact of Inmate Communication Patterns in a Maximum Security Prison.

    ERIC Educational Resources Information Center

    Van Voorhis, Patricia

    To determine the areas in which communication affects prison environments and prison inmates, interviews were conducted with 21 adult male inmates shortly after their admission into a federal maximum security institution. The interviews were semistructured, addressing such issues as (1) perceptions of fellow inmates and staff; (2) additional…

  7. Man-in-the-middle attack on quantum secure communications with authentication

    NASA Astrophysics Data System (ADS)

    Lin, Tzu Han; Hwang, Tzonelish

    2014-04-01

    This study points out a man-in-the-middle (MIM) attack on many of quantum secure communication with authentication protocols. The MIM attack is due to a design carelessness on performing public discussions on a nonauthenticated classical channel. A possible solution is proposed to solve the problem.

  8. Children's Security in the Context of Family Instability and Maternal Communications

    ERIC Educational Resources Information Center

    Winter, Marcia A.; Davies, Patrick T.; Cummings, E. Mark

    2010-01-01

    This multimethod study examined the association between family instability and children's internal representations of security in the family system within the context of maternal communications about disruptive family events. Participants included 224 kindergarten children (100 boys and 124 girls) and their parents. Parents reported on the…

  9. CSRQ: Communication-Efficient Secure Range Queries in Two-Tiered Sensor Networks.

    PubMed

    Dai, Hua; Ye, Qingqun; Yang, Geng; Xu, Jia; He, Ruiliang

    2016-01-01

    In recent years, we have seen many applications of secure query in two-tiered wireless sensor networks. Storage nodes are responsible for storing data from nearby sensor nodes and answering queries from Sink. It is critical to protect data security from a compromised storage node. In this paper, the Communication-efficient Secure Range Query (CSRQ)-a privacy and integrity preserving range query protocol-is proposed to prevent attackers from gaining information of both data collected by sensor nodes and queries issued by Sink. To preserve privacy and integrity, in addition to employing the encoding mechanisms, a novel data structure called encrypted constraint chain is proposed, which embeds the information of integrity verification. Sink can use this encrypted constraint chain to verify the query result. The performance evaluation shows that CSRQ has lower communication cost than the current range query protocols. PMID:26907293

  10. Installation of secure, always available wireless LAN systems as a component of the hospital communication infrastructure.

    PubMed

    Hanada, Eisuke; Kudou, Takato; Tsumoto, Shusaku

    2013-06-01

    Wireless technologies as part of the data communication infrastructure of modern hospitals are being rapidly introduced. Even though there are concerns about problems associated with wireless communication security, the demand is remarkably large. In addition, insuring that the network is always available is important. Herein, we discuss security countermeasures and points to insure availability that must be taken to insure safe hospital/business use of wireless LAN systems, referring to the procedures introduced at Shimane University Hospital. Security countermeasures differ according to their purpose, such as for preventing illegal use or insuring availability, both of which are discussed. It is our hope that this information will assist others in their efforts to insure safe implementation of wireless LAN systems, especially in hospitals where they have the potential to greatly improve information sharing and patient safety. PMID:23519703

  11. CSRQ: Communication-Efficient Secure Range Queries in Two-Tiered Sensor Networks

    PubMed Central

    Dai, Hua; Ye, Qingqun; Yang, Geng; Xu, Jia; He, Ruiliang

    2016-01-01

    In recent years, we have seen many applications of secure query in two-tiered wireless sensor networks. Storage nodes are responsible for storing data from nearby sensor nodes and answering queries from Sink. It is critical to protect data security from a compromised storage node. In this paper, the Communication-efficient Secure Range Query (CSRQ)—a privacy and integrity preserving range query protocol—is proposed to prevent attackers from gaining information of both data collected by sensor nodes and queries issued by Sink. To preserve privacy and integrity, in addition to employing the encoding mechanisms, a novel data structure called encrypted constraint chain is proposed, which embeds the information of integrity verification. Sink can use this encrypted constraint chain to verify the query result. The performance evaluation shows that CSRQ has lower communication cost than the current range query protocols. PMID:26907293

  12. Controlled quantum secure direct communication by entanglement distillation or generalized measurement

    NASA Astrophysics Data System (ADS)

    Tan, Xiaoqing; Zhang, Xiaoqian

    2016-05-01

    We propose two controlled quantum secure communication schemes by entanglement distillation or generalized measurement. The sender Alice, the receiver Bob and the controllers David and Cliff take part in the whole schemes. The supervisors David and Cliff can control the information transmitted from Alice to Bob by adjusting the local measurement angles θ _4 and θ _3. Bob can verify his secret information by classical one-way function after communication. The average amount of information is analyzed and compared for these two methods by MATLAB. The generalized measurement is a better scheme. Our schemes are secure against some well-known attacks because classical encryption and decoy states are used to ensure the security of the classical channel and the quantum channel.

  13. Installation of secure, always available wireless LAN systems as a component of the hospital communication infrastructure.

    PubMed

    Hanada, Eisuke; Kudou, Takato; Tsumoto, Shusaku

    2013-06-01

    Wireless technologies as part of the data communication infrastructure of modern hospitals are being rapidly introduced. Even though there are concerns about problems associated with wireless communication security, the demand is remarkably large. In addition, insuring that the network is always available is important. Herein, we discuss security countermeasures and points to insure availability that must be taken to insure safe hospital/business use of wireless LAN systems, referring to the procedures introduced at Shimane University Hospital. Security countermeasures differ according to their purpose, such as for preventing illegal use or insuring availability, both of which are discussed. It is our hope that this information will assist others in their efforts to insure safe implementation of wireless LAN systems, especially in hospitals where they have the potential to greatly improve information sharing and patient safety.

  14. CSRQ: Communication-Efficient Secure Range Queries in Two-Tiered Sensor Networks.

    PubMed

    Dai, Hua; Ye, Qingqun; Yang, Geng; Xu, Jia; He, Ruiliang

    2016-01-01

    In recent years, we have seen many applications of secure query in two-tiered wireless sensor networks. Storage nodes are responsible for storing data from nearby sensor nodes and answering queries from Sink. It is critical to protect data security from a compromised storage node. In this paper, the Communication-efficient Secure Range Query (CSRQ)-a privacy and integrity preserving range query protocol-is proposed to prevent attackers from gaining information of both data collected by sensor nodes and queries issued by Sink. To preserve privacy and integrity, in addition to employing the encoding mechanisms, a novel data structure called encrypted constraint chain is proposed, which embeds the information of integrity verification. Sink can use this encrypted constraint chain to verify the query result. The performance evaluation shows that CSRQ has lower communication cost than the current range query protocols.

  15. 77 FR 47415 - Privacy Act of 1974; Department of Homeland Security U.S. Citizenship and Immigration Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-08

    ..., ``Department of Homeland Security/United States Citizenship and Immigration Services--004-- Systematic Alien Verification for Entitlements Program System of Records.'' The United States Citizenship and Immigration... provisions of the Immigration and Nationality Act of the United States, including individuals......

  16. New secure communication-layer standard for medical image management (ISCL)

    NASA Astrophysics Data System (ADS)

    Kita, Kouichi; Nohara, Takashi; Hosoba, Minoru; Yachida, Masuyoshi; Yamaguchi, Masahiro; Ohyama, Nagaaki

    1999-07-01

    This paper introduces a summary of the standard draft of ISCL 1.00 which will be published by MEDIS-DC officially. ISCL is abbreviation of Integrated Secure Communication Layer Protocols for Secure Medical Image Management Systems. ISCL is a security layer which manages security function between presentation layer and TCP/IP layer. ISCL mechanism depends on basic function of a smart IC card and symmetric secret key mechanism. A symmetry key for each session is made by internal authentication function of a smart IC card with a random number. ISCL has three functions which assure authentication, confidently and integrity. Entity authentication process is done through 3 path 4 way method using functions of internal authentication and external authentication of a smart iC card. Confidentially algorithm and MAC algorithm for integrity are able to be selected. ISCL protocols are communicating through Message Block which consists of Message Header and Message Data. ISCL protocols are evaluating by applying to regional collaboration system for image diagnosis, and On-line Secure Electronic Storage system for medical images. These projects are supported by Medical Information System Development Center. These project shows ISCL is useful to keep security.

  17. Security and privacy in molecular communication and networking: opportunities and challenges.

    PubMed

    Loscrí, Valeria; Marchal, César; Mitton, Nathalie; Fortino, Giancarlo; Vasilakos, Athanasios V

    2014-09-01

    Molecular Communication (MC) is an emerging and promising communication paradigm for several multi-disciplinary domains like bio-medical, industry and military. Differently to the traditional communication paradigm, the information is encoded on the molecules, that are then used as carriers of information. Novel approaches related to this new communication paradigm have been proposed, mainly focusing on architectural aspects and categorization of potential applications. So far, security and privacy aspects related to the molecular communication systems have not been investigated at all and represent an open question that need to be addressed. The main motivation of this paper lies on providing some first insights about security and privacy aspects of MC systems, by highlighting the open issues and challenges and above all by outlining some specific directions of potential solutions. Existing cryptographic methods and security approaches are not suitable for MC systems since do not consider the pecific issues and challenges, that need ad-hoc solutions. We will discuss directions in terms of potential solutions by trying to highlight the main advantages and potential drawbacks for each direction considered. We will try to answer to the main questions: 1) why this solution can be exploited in the MC field to safeguard the system and its reliability? 2) which are the main issues related to the specific approach?

  18. A secure and easy-to-implement web-based communication framework for caregiving robot teams

    NASA Astrophysics Data System (ADS)

    Tuna, G.; Daş, R.; Tuna, A.; Örenbaş, H.; Baykara, M.; Gülez, K.

    2016-03-01

    In recent years, robots have started to become more commonplace in our lives, from factory floors to museums, festivals and shows. They have started to change how we work and play. With an increase in the population of the elderly, they have also been started to be used for caregiving services, and hence many countries have been investing in the robot development. The advancements in robotics and wireless communications has led to the emergence of autonomous caregiving robot teams which cooperate to accomplish a set of tasks assigned by human operators. Although wireless communications and devices are flexible and convenient, they are vulnerable to many risks compared to traditional wired networks. Since robots with wireless communication capability transmit all data types, including sensory, coordination, and control, through radio frequencies, they are open to intruders and attackers unless protected and their openness may lead to many security issues such as data theft, passive listening, and service interruption. In this paper, a secure web-based communication framework is proposed to address potential security threats due to wireless communication in robot-robot and human-robot interaction. The proposed framework is simple and practical, and can be used by caregiving robot teams in the exchange of sensory data as well as coordination and control data.

  19. Control and Non-Payload Communications (CNPC) Prototype Radio - Generation 2 Security Architecture Lab Test Report

    NASA Technical Reports Server (NTRS)

    Iannicca, Dennis C.; McKim, James H.; Stewart, David H.; Thadhani, Suresh K.; Young, Daniel P.

    2015-01-01

    NASA Glenn Research Center, in cooperation with Rockwell Collins, is working to develop a prototype Control and Non-Payload Communications (CNPC) radio platform as part of NASA Integrated Systems Research Program's (ISRP) Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) project. A primary focus of the project is to work with the FAA and industry standards bodies to build and demonstrate a safe, secure, and efficient CNPC architecture that can be used by industry to evaluate the feasibility of deploying a system using these technologies in an operational capacity. GRC has been working in conjunction with these groups to assess threats, identify security requirements, and to develop a system of standards-based security controls that can be applied to the current GRC prototype CNPC architecture as a demonstration platform. The security controls were integrated into a lab test bed mock-up of the Mobile IPv6 architecture currently being used for NASA flight testing, and a series of network tests were conducted to evaluate the security overhead of the controls compared to the baseline CNPC link without any security. The aim of testing was to evaluate the performance impact of the additional security control overhead when added to the Mobile IPv6 architecture in various modes of operation. The statistics collected included packet captures at points along the path to gauge packet size as the sample data traversed the CNPC network, round trip latency, jitter, and throughput. The effort involved a series of tests of the baseline link, a link with Robust Header Compression (ROHC) and without security controls, a link with security controls and without ROHC, and finally a link with both ROHC and security controls enabled. The effort demonstrated that ROHC is both desirable and necessary to offset the additional expected overhead of applying security controls to the CNPC link.

  20. The decision to exclude agricultural and domestic workers from the 1935 Social Security Act.

    PubMed

    DeWitt, Larry

    2010-01-01

    The Social Security Act of 1935 excluded from coverage about half the workers in the American economy. Among the excluded groups were agricultural and domestic workers-a large percentage of whom were African Americans. This has led some scholars to conclude that policymakers in 1935 deliberately excluded African Americans from the Social Security system because of prevailing racial biases during that period. This article examines both the logic of this thesis and the available empirical evidence on the origins of the coverage exclusions. The author concludes that the racial-bias thesis is both conceptually flawed and unsupported by the existing empirical evidence. The exclusion of agricultural and domestic workers from the early program was due to considerations of administrative feasibility involving tax-collection procedures. The author finds no evidence of any other policy motive involving racial bias.

  1. Compound synchronization of four memristor chaotic oscillator systems and secure communication.

    PubMed

    Sun, Junwei; Shen, Yi; Yin, Quan; Xu, Chengjie

    2013-03-01

    In this paper, a novel kind of compound synchronization among four chaotic systems is investigated, where the drive systems have been conceptually divided into two categories: scaling drive systems and base drive systems. Firstly, a sufficient condition is obtained to ensure compound synchronization among four memristor chaotic oscillator systems based on the adaptive technique. Secondly, a secure communication scheme via adaptive compound synchronization of four memristor chaotic oscillator systems is presented. The corresponding theoretical proofs and numerical simulations are given to demonstrate the validity and feasibility of the proposed control technique. The unpredictability of scaling drive systems can additionally enhance the security of communication. The transmitted signals can be split into several parts loaded in the drive systems to improve the reliability of communication.

  2. 77 FR 47411 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-08

    ... Office, Department of Homeland Security. ACTION: Notice of Privacy Act system of records. SUMMARY: In..., 73 FR 48231) and renaming it Fraud Detection and National Security Records. This system of records... residence), naturalization (granting United States citizenship), asylum and refugee status, and...

  3. 75 FR 39266 - Privacy Act of 1974; Department of Homeland Security/ALL-029 Civil Rights and Civil Liberties...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-08

    ...)-001 Matters System of Records (69 FR 70464, December 6, 2004) and other component specific systems of... the DHS/OIG-002 Investigative Records System of Records (74 FR 55569, October 28, 2009). The data... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL-029 Civil...

  4. 75 FR 38824 - Privacy Act of 1974; Department of Homeland Security/ALL-029 Civil Rights and Civil Liberties...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-06

    ...)-001 Matters System of Records (69 FR 70464, December 6, 2004) and other component specific systems of... the DHS/OIG-002 Investigative Records System of Records (74 FR 55569, October 28, 2009). The data... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL--029 Civil...

  5. 76 FR 53921 - Privacy Act of 1974; Department of Homeland Security ALL-034 Emergency Care Medical Records...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-30

    ... employees, their records are considered part of the OPM/GOVT-10--Employee Medical File System Records, 71 FR... considered part of the OPM/GOVT- ] 10--Employee Medical File System Records, 71 FR 35360 (Jun. 19, 2006... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security ALL--034...

  6. 6 CFR Appendix A to Part 5 - FOIA/Privacy Act Offices of the Department of Homeland Security

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false FOIA/Privacy Act Offices of the Department of... Transportation Security Directorate of Emergency Preparedness and Response Directorate of Information Analysis.... Metropolitan Medical Response System, b. National Disaster Medical System, and c. Office of...

  7. 17 CFR 14.7 - Finding of violation of Commodity Exchange Act or Federal securities laws in another proceeding.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Finding of violation of Commodity Exchange Act or Federal securities laws in another proceeding. 14.7 Section 14.7 Commodity and... another proceeding. (a) Temporary suspension. The Commission, with due regard to the public interest,...

  8. 17 CFR 14.7 - Finding of violation of Commodity Exchange Act or Federal securities laws in another proceeding.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Finding of violation of Commodity Exchange Act or Federal securities laws in another proceeding. 14.7 Section 14.7 Commodity and... another proceeding. (a) Temporary suspension. The Commission, with due regard to the public interest,...

  9. Secured optical fiber communication using polarization restoration technique and channel characterization

    NASA Astrophysics Data System (ADS)

    Punekar, Nikhil; Darunkar, Bhagyashri; Verma, Pramode

    2016-02-01

    Optical fiber channels are used as media to transfer the information globally. This paper presents an implementation of a novel procedure using which a secured communication between two parties can be carried out using polarized beam of light over an optical fiber. The paper presents the experimental results obtained of the procedure in the lab environment and a security analysis of the same. It is observed that polarization state of a light pulse cannot be retained as it travels over an optical fiber because of the birefringence phenomenon. Multiple environmental factors such as pressure, vibration, temperature, etc. also add a non-linearity to the birefringence of an optical fiber leading towards an unpredictable polarization state changes over the course of an optical fiber. The proposed procedure helps the receiving party to successfully retrieve the data in the form of a polarization state transmitted by the sending party without having any knowledge about the state of polarization at the transmitting end. The paper also explains an added layer of security the procedure provides to the communicating parties to make it difficult for an adversary to fetch the data being transferred. The proposed system does not depend on the wavelength of the light being used, nor does it depend upon the type of the optical fiber used for the communication. Using this procedure, multiple bits of secured information can be sent over an optical fiber in a single polarized pulse and retrieved at the receiving end, also known as Polarization Shift Keying.

  10. Communicative Acts of a Child with Rubinstein-Taybi Syndrome during Early Communicative Development

    ERIC Educational Resources Information Center

    Carvey, Jayme S.; Bernhardt, B. May

    2009-01-01

    Rubinstein-Taybi syndrome (RTS) is a rare genetic developmental disorder that often shows associated language delay. However, literature on language development in RTS is very limited, particularly for the period of early communicative development, when standardized testing can be minimally informative. The purpose of the current study was to…

  11. The Use of Peer Networks to Increase Communicative Acts of Students with Autism Spectrum Disorders

    ERIC Educational Resources Information Center

    Kamps, Debra; Mason, Rose; Thiemann-Bourque, Kathy; Feldmiller, Sarah; Turcotte, Amy; Miller, Todd

    2014-01-01

    Peer networks including social groups using typical peers, scripted instruction, visual text cues, and reinforcement were examined with students with autism spectrum disorders (ASD). A multiple baseline design across four participants was used to measure students' use of communication acts with peers during free play following instruction.…

  12. The Communications Competitiveness and Infrastructure Modernization Act of 1991 (S. 1200).

    ERIC Educational Resources Information Center

    Sikes, Alfred C.; Verveer, Philip L.

    1992-01-01

    Two papers present arguments for and against the Communications Competitiveness and Infrastructure Act of 1991 (S. 1200). Topics addressed include earlier policy recommendations, competition in the telecommunications industry, benefits of video dial tone availability, telephone company participation in video services, restrictions on telephone…

  13. Communicative Acts in Coach-Athlete Interactions: When Losing Competitions and when Making Mistakes in Training

    ERIC Educational Resources Information Center

    Sagar, Sam S.; Jowett, Sophia

    2012-01-01

    Athletes' perceptions of coaches' communicative acts of interaction in two key interpersonal situations were examined, and their impact on the athletes: (a) when athletes lose competitions; and, (b) when athletes make mistakes in training. Athletes (N = 324, M age = 20.11) completed an open-ended survey. Data were deductively and inductively…

  14. Communicating the Americans with Disabilities Act. Transcending Compliance: A Case Report on Sears, Roebuck and Co.

    ERIC Educational Resources Information Center

    Blanck, Peter David

    This report examines the employment practices of Sears, Roebuck and Company, before and after the implementation of the Americans with Disabilities Act (ADA). By studying the corporate behavior of Sears, which employs an estimated 20,000 people with disabilities, the report attempts to stimulate discussion of the communication issues that Sears…

  15. Awareness, Perceptions, and Communication Needs about the Affordable Care Act across the Life Span

    ERIC Educational Resources Information Center

    Bergeron, Caroline D.; Friedman, Daniela B.; Sisson, Diana C.; Tanner, Andrea; Kornegay, Vance L.; Owens, Otis L.; Weis, Megan A.; Patterson, Lee L.

    2016-01-01

    Background: By March 2014, all U.S. citizens were required to have health insurance according to the Affordable Care Act (ACA). Purpose: Study objectives were to explore individuals' opinions, perceptions, and communication sources and needs about the ACA and to assess differences by age group. Methods: In November 2013, 10 1-hour focus groups (5…

  16. 47 CFR 20.15 - Requirements under Title II of the Communications Act.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... CARRIER SERVICES COMMERCIAL MOBILE RADIO SERVICES § 20.15 Requirements under Title II of the Communications Act. (a) Commercial mobile radio services providers, to the extent applicable, must comply with... CFR part 68; and §§ 1.701-1.748, and 1.815 of this chapter, 47 CFR 1.701-1.748, 1.815. (b)...

  17. 47 CFR 20.15 - Requirements under Title II of the Communications Act.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... CARRIER SERVICES COMMERCIAL MOBILE SERVICES § 20.15 Requirements under Title II of the Communications Act. (a) Commercial mobile radio services providers, to the extent applicable, must comply with sections....C. 201, 202, 206, 207, 208, 209, 216, 217, 223, 225, 226, 227, 228; part 68 of this chapter, 47...

  18. A generalized architecture of quantum secure direct communication for N disjointed users with authentication.

    PubMed

    Farouk, Ahmed; Zakaria, Magdy; Megahed, Adel; Omara, Fatma A

    2015-01-01

    In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. So, N - 1 disjointed users u1, u2, …, uN-1 can transmit a secret message of classical bits to a remote user uN by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and the users are validated by EPR entangled pair and CNOT gate. Afterwards, the remained EPR will generate shared GHZ states which are used for directly transmitting the secret message. The partial cooperation process indicates that N - 1 users can transmit a secret message directly to a remote user uN through a quantum channel. Furthermore, N - 1 users and a remote user uN can communicate without an established quantum channel among them by a full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement.

  19. A generalized architecture of quantum secure direct communication for N disjointed users with authentication

    PubMed Central

    Farouk, Ahmed; Zakaria, Magdy; Megahed, Adel; Omara, Fatma A.

    2015-01-01

    In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. So, N − 1 disjointed users u1, u2, …, uN−1 can transmit a secret message of classical bits to a remote user uN by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and the users are validated by EPR entangled pair and CNOT gate. Afterwards, the remained EPR will generate shared GHZ states which are used for directly transmitting the secret message. The partial cooperation process indicates that N − 1 users can transmit a secret message directly to a remote user uN through a quantum channel. Furthermore, N − 1 users and a remote user uN can communicate without an established quantum channel among them by a full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement. PMID:26577473

  20. A generalized architecture of quantum secure direct communication for N disjointed users with authentication

    NASA Astrophysics Data System (ADS)

    Farouk, Ahmed; Zakaria, Magdy; Megahed, Adel; Omara, Fatma A.

    2015-11-01

    In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. So, N - 1 disjointed users u1, u2, …, uN-1 can transmit a secret message of classical bits to a remote user uN by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and the users are validated by EPR entangled pair and CNOT gate. Afterwards, the remained EPR will generate shared GHZ states which are used for directly transmitting the secret message. The partial cooperation process indicates that N - 1 users can transmit a secret message directly to a remote user uN through a quantum channel. Furthermore, N - 1 users and a remote user uN can communicate without an established quantum channel among them by a full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement.

  1. High security chaotic multiple access scheme for visible light communication systems with advanced encryption standard interleaving

    NASA Astrophysics Data System (ADS)

    Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng

    2016-06-01

    Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.

  2. Privacy vs Usability: A Qualitative Exploration of Patients' Experiences With Secure Internet Communication With Their General Practitioner

    PubMed Central

    Tran, Trung; Faxvaag, Arild

    2005-01-01

    Background Direct electronic communication between patients and physicians has the potential to empower patients and improve health care services. Communication by regular email is, however, considered a security threat in many countries and is not recommended. Systems which offer secure communication have now emerged. Unlike regular email, secure systems require that users authenticate themselves. However, the authentication steps per se may become barriers that reduce use. Objectives The objective was to study the experiences of patients who were using a secure electronic communication system. The focus of the study was the users' privacy versus the usability of the system. Methods Qualitative interviews were conducted with 15 patients who used a secure communication system (MedAxess) to exchange personal health information with their primary care physician. Results Six main themes were identified from the interviews: (1) supporting simple questions, (2) security issues, (3) aspects of written communication, (4) trust in the physician, (5) simplicity of MedAxess, and (6) trouble using the system. By using the system, about half of the patients (8/15) experienced easier access to their physician, with whom they tended to solve minor health problems and elaborate on more complex illness experiences. Two thirds of the respondents (10/15) found that their physician quickly responded to their MedAxess requests. As a result of the security barriers, the users felt that the system was secure. However, due to the same barriers, the patients considered the log-in procedure cumbersome, which had considerable negative impact on the actual use of the system. Conclusions Despite a perceived need for secure electronic patient-physician communication systems, security barriers may diminish their overall usefulness. A dual approach is necessary to improve this situation: patients need to be better informed about security issues, and, at the same time, their experiences of using

  3. 76 FR 39927 - Order Granting Temporary Exemptions Under the Securities Exchange Act of 1934 in Connection With...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-07

    .... 9204, Securities Exchange Act Release No. 64372 (Apr. 29, 2011), 76 FR 29818 (May 23, 2011); Further.... 63452 (Dec. 7, 2010), 75 FR 80174 (Dec. 21, 2010). Moreover, section 712(a)(8) of the Dodd-Frank Act.... The Commission and the CFTC have jointly proposed such regulations. See 76 FR 29818. Title VII...

  4. 48 CFR 1552.235-77 - Data Security for Federal Insecticide, Fungicide and Rodenticide Act Confidential Business...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Insecticide, Fungicide and Rodenticide Act Confidential Business Information (DEC 1997). 1552.235-77 Section... Federal Insecticide, Fungicide and Rodenticide Act Confidential Business Information (DEC 1997). As prescribed in 1535.007-70(d), insert the following clause: Data Security for Federal Insecticide,...

  5. 48 CFR 1552.235-77 - Data Security for Federal Insecticide, Fungicide and Rodenticide Act Confidential Business...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Insecticide, Fungicide and Rodenticide Act Confidential Business Information (DEC 1997). 1552.235-77 Section... Federal Insecticide, Fungicide and Rodenticide Act Confidential Business Information (DEC 1997). As prescribed in 1535.007-70(d), insert the following clause: Data Security for Federal Insecticide,...

  6. 48 CFR 1552.235-77 - Data Security for Federal Insecticide, Fungicide and Rodenticide Act Confidential Business...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Insecticide, Fungicide and Rodenticide Act Confidential Business Information (DEC 1997). 1552.235-77 Section... Federal Insecticide, Fungicide and Rodenticide Act Confidential Business Information (DEC 1997). As prescribed in 1535.007-70(d), insert the following clause: Data Security for Federal Insecticide,...

  7. 48 CFR 1552.235-77 - Data Security for Federal Insecticide, Fungicide and Rodenticide Act Confidential Business...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Insecticide, Fungicide and Rodenticide Act Confidential Business Information (DEC 1997). 1552.235-77 Section... Federal Insecticide, Fungicide and Rodenticide Act Confidential Business Information (DEC 1997). As prescribed in 1535.007-70(d), insert the following clause: Data Security for Federal Insecticide,...

  8. 48 CFR 1552.235-77 - Data Security for Federal Insecticide, Fungicide and Rodenticide Act Confidential Business...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Insecticide, Fungicide and Rodenticide Act Confidential Business Information (DEC 1997). 1552.235-77 Section... Federal Insecticide, Fungicide and Rodenticide Act Confidential Business Information (DEC 1997). As prescribed in 1535.007-70(d), insert the following clause: Data Security for Federal Insecticide,...

  9. Study and Analysis of the Internet Protocol Security and Its Impact on Interactive Communications

    NASA Astrophysics Data System (ADS)

    Khan, Arshi; Ansari, Seema

    Internet Protocol Security (IPSec) is the defacto standard, which offers secured Internet communications, providing traffic integrity, confidentiality and authentication. Besides this, it is assumed that IPSec is not suitable for the protection of realtime audio transmissions as the IPSec related enlargement of packets and the usage of the Cipher Block Chaining (CBC) mode contradict stringent requirements. IPSec overhead of at least 44 bytes for each Internet Protocol (IP)-packet cannot guarantee Quality of Service (QOS) due to a bad wireless link by which the Ethernet flow control intercepts and makes a real time transmission impossible.

  10. 78 FR 55274 - Privacy Act of 1974; Department of Homeland Security/Transportation Security Administration-DHS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-10

    ... screening at participating U.S. airport security checkpoints. Additionally, the Department of Homeland... ineligible for the program will continue to be screened at airport security checkpoints according to TSA... screening at airport security checkpoints. The Program retains a component of randomness to maintain...

  11. Chaos Synchronization of Chen System and its Application to Secure Communication

    NASA Astrophysics Data System (ADS)

    Wang, Xingyuan; Wu, Xiangjun; He, Yijie; Aniwar, Gulzila

    This paper describes the chaos synchronization of two identical Chen systems theoretically and numerically. Based on Lyapunov stability theory, the controllers for achieving synchronization of two identical Chen systems using the PC method, active control method, and feedback method are designed. Numerical simulations show the correctness of the results. Moreover, as an application, the well-known PC method is applied to chaos-synchronization-based secure communication. Simulation results verify the proposed scheme's effectiveness in the communication application and also show its well robustness.

  12. Chaos Synchronization via Unidirectional Coupling and its Application to Secure Communication

    NASA Astrophysics Data System (ADS)

    Wang, Xingyuan; Wang, Mingjun

    This paper studies chaos synchronization via unidirectional coupling. The self-synchronization of Lorenz systems, modified coupled dynamos systems and hyperchaotic Chen systems is studied by three methods: the Lyapunov function method, the global synchronization method and the numerical calculation of the largest Lyapunov exponent method. In regard to application to communication, we show that via transmitting single signal the synchronization of the drive system and the response system can be achieved. An example of applying self-synchronization of hyperchaotic Chen systems to chaotic masking secure communication is presented in this paper. Simulation results show the effectiveness of the method.

  13. Fault-tolerant controlled deterministic secure quantum communication using EPR states against collective noise

    NASA Astrophysics Data System (ADS)

    Kao, Shih-Hung; Yang, Chun-Wei; Hwang, Tzonelih

    2016-09-01

    This paper proposes two new fault-tolerant controlled deterministic secure quantum communication (CDSQC) protocols based only on Einstein-Podolsky-Rosen (EPR) entangled states. The proposed protocols are designed to be robust against the collective-dephasing noise and the collective-rotation noise, respectively. Compared to the existing fault-tolerant controlled quantum communication protocols, the proposed protocols not only can do without a quantum channel between the receiver and the controller as the state-of-the-art protocols do, but also have the advantage that the number of quantum particles required in the CDSQC protocols is reduced owing to the use of the simplest entangled states.

  14. Control and Non-Payload Communications (CNPC) Prototype Radio - Generation 2 Security Flight Test Report

    NASA Technical Reports Server (NTRS)

    Iannicca, Dennis C.; Ishac, Joseph A.; Shalkhauser, Kurt A.

    2015-01-01

    NASA Glenn Research Center (GRC), in cooperation with Rockwell Collins, is working to develop a prototype Control and Non-Payload Communications (CNPC) radio platform as part of NASA Integrated Systems Research Program's (ISRP) Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) project. A primary focus of the project is to work with the Federal Aviation Administration (FAA) and industry standards bodies to build and demonstrate a safe, secure, and efficient CNPC architecture that can be used by industry to evaluate the feasibility of deploying a system using these technologies in an operational capacity. GRC has been working in conjunction with these groups to assess threats, identify security requirements, and to develop a system of standards-based security controls that can be applied to the GRC prototype CNPC architecture as a demonstration platform. The proposed security controls were integrated into the GRC flight test system aboard our S-3B Viking surrogate aircraft and several network tests were conducted during a flight on November 15th, 2014 to determine whether the controls were working properly within the flight environment. The flight test was also the first to integrate Robust Header Compression (ROHC) as a means of reducing the additional overhead introduced by the security controls and Mobile IPv6. The effort demonstrated the complete end-to-end secure CNPC link in a relevant flight environment.

  15. Quantum secure direct communication network with superdense coding and decoy photons

    NASA Astrophysics Data System (ADS)

    Deng, Fu-Guo; Li, Xi-Han; Li, Chun-Yan; Zhou, Ping; Zhou, Hong-Yu

    2007-07-01

    A quantum secure direct communication network scheme is proposed with quantum superdense coding and decoy photons. The servers on a passive optical network prepare and measure the quantum signal, i.e. a sequence of the d-dimensional Bell states. After confirming the security of the photons received from the receiver, the sender codes his secret message on them directly. For preventing a dishonest server from eavesdropping, some decoy photons prepared by measuring one photon in the Bell states are used to replace some original photons. One of the users on the network can communicate to any other one. This scheme has the advantage of high capacity, and it is more convenient than others as only a sequence of photons is transmitted in quantum line.

  16. Design and Hardware Implementation of a New Chaotic Secure Communication Technique.

    PubMed

    Xiong, Li; Lu, Yan-Jun; Zhang, Yong-Fang; Zhang, Xin-Guo; Gupta, Parag

    2016-01-01

    In this paper, a scheme for chaotic modulation secure communication is proposed based on chaotic synchronization of an improved Lorenz system. For the first time, the intensity limit and stability of the transmitted signal, the characteristics of broadband and the requirements for accuracy of electronic components are presented by Multisim simulation. In addition, some improvements are made on the measurement method and the proposed experimental circuit in order to facilitate the experiments of chaotic synchronization, chaotic non-synchronization, experiment without signal and experiment with signal. To illustrate the effectiveness of the proposed scheme, some numerical simulations are presented. Then, the proposed chaotic secure communication circuit is implemented through analog electronic circuit, which is characterized by its high accuracy and good robustness.

  17. Design and Hardware Implementation of a New Chaotic Secure Communication Technique.

    PubMed

    Xiong, Li; Lu, Yan-Jun; Zhang, Yong-Fang; Zhang, Xin-Guo; Gupta, Parag

    2016-01-01

    In this paper, a scheme for chaotic modulation secure communication is proposed based on chaotic synchronization of an improved Lorenz system. For the first time, the intensity limit and stability of the transmitted signal, the characteristics of broadband and the requirements for accuracy of electronic components are presented by Multisim simulation. In addition, some improvements are made on the measurement method and the proposed experimental circuit in order to facilitate the experiments of chaotic synchronization, chaotic non-synchronization, experiment without signal and experiment with signal. To illustrate the effectiveness of the proposed scheme, some numerical simulations are presented. Then, the proposed chaotic secure communication circuit is implemented through analog electronic circuit, which is characterized by its high accuracy and good robustness. PMID:27548385

  18. Design and Hardware Implementation of a New Chaotic Secure Communication Technique

    PubMed Central

    Xiong, Li; Lu, Yan-Jun; Zhang, Yong-Fang; Zhang, Xin-Guo; Gupta, Parag

    2016-01-01

    In this paper, a scheme for chaotic modulation secure communication is proposed based on chaotic synchronization of an improved Lorenz system. For the first time, the intensity limit and stability of the transmitted signal, the characteristics of broadband and the requirements for accuracy of electronic components are presented by Multisim simulation. In addition, some improvements are made on the measurement method and the proposed experimental circuit in order to facilitate the experiments of chaotic synchronization, chaotic non-synchronization, experiment without signal and experiment with signal. To illustrate the effectiveness of the proposed scheme, some numerical simulations are presented. Then, the proposed chaotic secure communication circuit is implemented through analog electronic circuit, which is characterized by its high accuracy and good robustness. PMID:27548385

  19. Which verification qubits perform best for secure communication in noisy channel?

    NASA Astrophysics Data System (ADS)

    Sharma, Rishi Dutt; Thapliyal, Kishore; Pathak, Anirban; Pan, Alok Kumar; De, Asok

    2016-04-01

    In secure quantum communication protocols, a set of single qubits prepared using 2 or more mutually unbiased bases or a set of n-qubit (n≥ 2) entangled states of a particular form are usually used to form a verification string which is subsequently used to detect traces of eavesdropping. The qubits that form a verification string are referred to as decoy qubits, and there exists a large set of different quantum states that can be used as decoy qubits. In the absence of noise, any choice of decoy qubits provides equivalent security. In this paper, we examine such equivalence for noisy environment (e.g., in amplitude damping, phase damping, collective dephasing and collective rotation noise channels) by comparing the decoy-qubit-assisted schemes of secure quantum communication that use single-qubit states as decoy qubits with the schemes that use entangled states as decoy qubits. Our study reveals that the single- qubit-assisted scheme performs better in some noisy environments, while some entangled-qubit-assisted schemes perform better in other noisy environments. Specifically, single-qubit-assisted schemes perform better in amplitude damping and phase damping noisy channels, whereas a few Bell-state-based decoy schemes are found to perform better in the presence of the collective noise. Thus, if the kind of noise present in a communication channel (i.e., the characteristics of the channel) is known or measured, then the present study can provide the best choice of decoy qubits required for implementation of schemes of secure quantum communication through that channel.

  20. Secure communication in fiber optic systems via transmission of broad-band optical noise.

    PubMed

    Buskila, O; Eyal, A; Shtaif, M

    2008-03-01

    We propose a new scheme for data encryption in the physical layer. Our scheme is based on the distribution of a broadband optical noise-like signal between Alice and Bob. The broadband signal is used for the establishment of a secret key that can be used for the secure transmission of information by using the one-time-pad method. We characterize the proposed scheme and study its applicability to the existing fiber-optics communications infrastructure.

  1. Advanced Communication Technology Satellite (ACTS) Very Small Aperture Terminal (VSAT) Network Control Performance

    NASA Technical Reports Server (NTRS)

    Coney, T. A.

    1996-01-01

    This paper discusses the performance of the network control function for the Advanced Communications Technology Satellite (ACTS) very small aperture terminal (VSAT) full mesh network. This includes control of all operational activities such as acquisition, synchronization, timing and rain fade compensation as well as control of all communications activities such as on-demand integrated services (voice, video, and date) connects and disconnects Operations control is provided by an in-band orderwire carried in the baseboard processor (BBP) control burst, the orderwire burst, the reference burst, and the uplink traffic burst. Communication services are provided by demand assigned multiple access (DAMA) protocols. The ACTS implementation of DAMA protocols ensures both on-demand and integrated voice, video and data services. Communications services control is also provided by the in-band orderwire but uses only the reference burst and the uplink traffic burst. The performance of the ACTS network control functions have been successfully tested during on-orbit checkout and in various VSAT networks in day to day operations. This paper discusses the network operations and services control performance.

  2. Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices.

    PubMed

    Marin, Leandro; Pawlowski, Marcin Piotr; Jara, Antonio

    2015-01-01

    The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol. PMID:26343677

  3. Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices.

    PubMed

    Marin, Leandro; Pawlowski, Marcin Piotr; Jara, Antonio

    2015-08-28

    The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol.

  4. Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices

    PubMed Central

    Marin, Leandro; Piotr Pawlowski, Marcin; Jara, Antonio

    2015-01-01

    The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol. PMID:26343677

  5. Bit-by-bit optical code scrambling technique for secure optical communication.

    PubMed

    Wang, Xu; Gao, Zhensen; Wang, Xuhua; Kataoka, Nobuyuki; Wada, Naoya

    2011-02-14

    We propose and demonstrate a novel bit-by-bit code scrambling technique based on time domain spectral phase encoding/decoding (SPE/SPD) scheme using only a single phase modulator to simultaneously generate and decode the code hopping sequence and DPSK data for secure optical communication application. In the experiment, 2.5-Gb/s DPSK data has been generated, decoded and securely transmitted over 34 km by scrambling five 8-chip, 20-Gchip/s Gold codes with prime-hop patterns. The proposed scheme can rapidly reconfigure the optical code hopping sequence bit-by-bit with the DPSK data, and thus it is very robust to conventional data rate energy detection and DPSK demodulation attack, exhibiting the potential to provide unconditional transmission security and realize even one-time pad.

  6. Two sources of meaning in infant communication: preceding action contexts and act-accompanying characteristics.

    PubMed

    Liszkowski, Ulf

    2014-09-19

    How do infants communicate before they have acquired a language? This paper supports the hypothesis that infants possess social-cognitive skills that run deeper than language alone, enabling them to understand others and make themselves understood. I suggested that infants, like adults, use two sources of extralinguistic information to communicate meaningfully and react to and express communicative intentions appropriately. In support, a review of relevant experiments demonstrates, first, that infants use information from preceding shared activities to tailor their comprehension and production of communication. Second, a series of novel findings from our laboratory shows that in the absence of distinguishing information from preceding routines or activities, infants use accompanying characteristics (such as prosody and posture) that mark communicative intentions to extract and transmit meaning. Findings reveal that before infants begin to speak they communicate in meaningful ways by binding preceding and simultaneous multisensory information to a communicative act. These skills are not only a precursor to language, but also an outcome of social-cognitive development and social experience in the first year of life. PMID:25092662

  7. Synthesis of fuzzy model-based designs to synchronization and secure communications for chaotic systems.

    PubMed

    Lian, K Y; Chiang, T S; Chiu, C S; Liu, P

    2001-01-01

    This paper presents synthesis approaches for synchronization and secure communications of chaotic systems by using fuzzy model-based design methods. Many well-known continuous and discrete chaotic systems can be exactly represented by T-S fuzzy models with only one premise variable. According to the applications on synchronization and signal modulation, the general fuzzy models may have either i) common bias terms; or ii) the same premise variable and driving signal. Then we propose two types of driving signals, namely, fuzzy driving signal and crisp driving signal, to deal with the asymptotical synchronization and secure communication problems for cases i) and ii), respectively. Based on these driving signals, the solutions are found by solving LMI problems. It is worthy to note that many well-known chaotic systems, such as Duffing system, Chua's circuit. Rassler's system, Lorenz system, Henon map, and Lozi map can achieve their applications on asymptotical synchronization and recovering messages in secure communication by using either the fuzzy driving signal or the crisp driving signal. Finally, several numerical simulations are shown to verify the results. PMID:18244768

  8. Secure Communications

    NASA Astrophysics Data System (ADS)

    Bellac, Michel Le

    2014-11-01

    The first practical application of quantum physics examined in this book is quantum cryptography. Quantum cryptography is a relatively recent invention (it dates back from the mid 1980s) but I chose it because it allows me to illustrate the fundamental principles with a minimum number of intermediate steps. I shall begin with a short summary of classical cryptography, reviewing briefly the two systems which are currently used today: the secret key system and the public key system. Quantum cryptography is not a new method for dissimulating the meaning of a message, but it allows one to be certain that no spy has accessed it. There exist many quantum cryptography protocols and various experimental devices have been proposed for implementing them. The simplest device is based on polarization, a concept which will be introduced first in the case of of light polarization, and then in that of photon polarization. The use of photon polarization gives the simplest implementation of the protocol proposed in 1984 by Bennett and Brassard, which is known by the acronym formed with their initials, the BB84 protocol.

  9. A Simultaneous Quantum Secure Direct Communication Scheme between the Central Party and Other M Parties

    NASA Astrophysics Data System (ADS)

    Gao, Ting; Yan, Feng-Li; Wang, Zhi-Xi

    2005-10-01

    We propose a simultaneous quantum secure direct communication scheme between one party and other three parties via four-particle GHZ states and swapping quantum entanglement. In the scheme, three spatially separated senders, Alice, Bob and Charlie, transmit their secret messages to a remote receiver Diana by performing a series of local operations on their respective particles according to the quadripartite stipulation. From Alice, Bob, Charlie and Diana's Bell measurement results, Diana can infer the secret messages. If a perfect quantum channel is used, the secret messages are faithfully transmitted from Alice, Bob and Charlie to Diana via initially shared pairs of four-particle GHZ states without revealing any information to a potential eavesdropper. As there is no transmission of the qubits carrying the secret message in the public channel, it is completely secure for the direct secret communication. This scheme can be considered as a network of communication parties where each party wants to communicate secretly with a central party or server.

  10. On a simulation study for reliable and secured smart grid communications

    NASA Astrophysics Data System (ADS)

    Mallapuram, Sriharsha; Moulema, Paul; Yu, Wei

    2015-05-01

    Demand response is one of key smart grid applications that aims to reduce power generation at peak hours and maintain a balance between supply and demand. With the support of communication networks, energy consumers can become active actors in the energy management process by adjusting or rescheduling their electricity usage during peak hours based on utilities pricing incentives. Nonetheless, the integration of communication networks expose the smart grid to cyber-attacks. In this paper, we developed a smart grid simulation test-bed and designed evaluation scenarios. By leveraging the capabilities of Matlab and ns-3 simulation tools, we conducted a simulation study to evaluate the impact of cyber-attacks on demand response application. Our data shows that cyber-attacks could seriously disrupt smart grid operations, thus confirming the need of secure and resilient communication networks for supporting smart grid operations.

  11. Advanced communication satellites worldwide - Satellites of opportunity for the ACTS mobile terminal

    NASA Technical Reports Server (NTRS)

    Girardey, Catherine C.

    1993-01-01

    Space agencies worldwide are involved in advanced satellite communication systems. This paper presents an overview of these satellites and related technologies in the U.S., Europe, and Japan. They are geostationary satellites using high frequency bands such as K/Ka (20/30 GHz) and O-band (millimeter wave), as well as optical frequencies. The similarity of these programs demonstrate a common interest to develop large capacity satellite communication systems, and shows that closer international cooperation could be set up. The ACTS Mobile Terminal (AMT) project discussed here is such an example. The AMT's compatibility with satellites other than ACTS has been studied, and a proposed common experiment is presented here. The Japanese Engineering Test Satellite ETS-VI has been identified as the best initial 'satellite of opportunity' for AMT in this preliminary assessment.

  12. ACTS propagation experiment discussion: Ka-band propagation measurements using the ACTS propagation terminal and the CSU-CHILL and Space Communications Technology Center Florida propagation program

    NASA Technical Reports Server (NTRS)

    Bringi, V. N.; Chandrasekar, V.; Mueller, Eugene A.; Turk, Joseph; Beaver, John; Helmken, Henry F.; Henning, Rudy

    1993-01-01

    Papers on Ka-band propagation measurements using the ACTS propagation terminal and the Colorado State University CHILL multiparameter radar and on Space Communications Technology Center Florida Propagation Program are discussed. Topics covered include: microwave radiative transfer and propagation models; NASA propagation terminal status; ACTS channel characteristics; FAU receive only terminal; FAU terminal status; and propagation testbed.

  13. Control and Communication for a Secure and Reconfigurable Power Distribution System

    NASA Astrophysics Data System (ADS)

    Giacomoni, Anthony Michael

    A major transformation is taking place throughout the electric power industry to overlay existing electric infrastructure with advanced sensing, communications, and control system technologies. This transformation to a smart grid promises to enhance system efficiency, increase system reliability, support the electrification of transportation, and provide customers with greater control over their electricity consumption. Upgrading control and communication systems for the end-to-end electric power grid, however, will present many new security challenges that must be dealt with before extensive deployment and implementation of these technologies can begin. In this dissertation, a comprehensive systems approach is taken to minimize and prevent cyber-physical disturbances to electric power distribution systems using sensing, communications, and control system technologies. To accomplish this task, an intelligent distributed secure control (IDSC) architecture is presented and validated in silico for distribution systems to provide greater adaptive protection, with the ability to proactively reconfigure, and rapidly respond to disturbances. Detailed descriptions of functionalities at each layer of the architecture as well as the whole system are provided. To compare the performance of the IDSC architecture with that of other control architectures, an original simulation methodology is developed. The simulation model integrates aspects of cyber-physical security, dynamic price and demand response, sensing, communications, intermittent distributed energy resources (DERs), and dynamic optimization and reconfiguration. Applying this comprehensive systems approach, performance results for the IEEE 123 node test feeder are simulated and analyzed. The results show the trade-offs between system reliability, operational constraints, and costs for several control architectures and optimization algorithms. Additional simulation results are also provided. In particular, the

  14. Secure Communication Based on a Hybrid of Chaos and Ica Encryptions

    NASA Astrophysics Data System (ADS)

    Chen, Wei Ching; Yuan, John

    Chaos and independent component analysis (ICA) encryptions are two novel schemes for secure communications. In this paper, a new scheme combining chaos and ICA techniques is proposed to enhance the security level during communication. In this scheme, a master chaotic system is embedded at the transmitter. The message signal is mixed with a chaotic signal and a Gaussian white noise into two mixed signals and then transmitted to the receiver through the public channels. A signal for synchronization is transmitted through another public channel to the receiver where a slave chaotic system is embedded to reproduce the chaotic signal. A modified ICA is used to recover the message signal at the receiver. Since only two of the three transmitted signals contain the information of message signal, a hacker would not be able to retrieve the message signal by using ICA even though all the transmitted signals are intercepted. Spectrum analyses are used to prove that the message signal can be securely hidden under this scheme.

  15. Final Report: 03-LW-005 Space-Time Secure Communications for Hostile Environments

    SciTech Connect

    Candy, J V; Poggio, A J; Chambers, D H; Guidry, B L; Robbins, C L; Hertzog, C A; Dowla, F; Burke, G; Kane, R

    2005-10-31

    The development of communications for highly reverberative environments is a major concern for both the private and military sectors whether the application is aimed at the securing a stock order or stalking hostile in a tunnel or cave. Other such environments can range from a hostile urban setting populated with a multitude of buildings and vehicles to the simple complexity of a large number of sound sources that are common in the stock exchange, or military operations in an environment with a topographic features hills, valleys, mountains or even a maze of buried water pipes attempting to transmit information about any chemical anomalies in the water system servicing a city or town. These inherent obstructions cause transmitted signals to reflect, refract and disperse in a multitude of directions distorting both their shape and arrival times at network receiver locations. Imagine troops attempting to communicate on missions in underground caves consisting of a maze of chambers causing multiple echoes with the platoon leader trying to issue timely commands to neutralize terrorists. This is the problem with transmitting information in a complex environment. Waves are susceptible to multiple paths and distortions created by a variety of possible obstructions, which may exist in the particular propagation medium. This is precisely the communications problem we solve using the physics of wave propagation to not only mitigate the noxious effects created by the hostile medium, but also to utilize it in a constructive manner enabling a huge benefit in communications. We employ time-reversal (T/R) communications to accomplish this task. This project is concerned with the development of secure communications techniques that can operate even in the most extreme conditions while maintaining a secure link between host and client stations. We developed an approach based on the concept of time-reversal (T/R) signal processing. In fact, the development of T/R communication

  16. Security-enhanced chaos communication with time-delay signature suppression and phase encryption.

    PubMed

    Xue, Chenpeng; Jiang, Ning; Lv, Yunxin; Wang, Chao; Li, Guilan; Lin, Shuqing; Qiu, Kun

    2016-08-15

    A security-enhanced chaos communication scheme with time delay signature (TDS) suppression and phase-encrypted feedback light is proposed, in virtue of dual-loop feedback with independent high-speed phase modulation. We numerically investigate the property of TDS suppression in the intensity and phase space and quantitatively discuss security of the proposed system by calculating the bit error rate of eavesdroppers who try to crack the system by directly filtering the detected signal or by using a similar semiconductor laser to synchronize the link signal and extract the data. The results show that TDS embedded in the chaotic carrier can be well suppressed by properly setting the modulation frequency, which can keep the time delay a secret from the eavesdropper. Moreover, because the feedback light is encrypted, without the accurate time delay and key, the eavesdropper cannot reconstruct the symmetric operation conditions and decode the correct data. PMID:27519064

  17. A Bidirectional Quantum Secure Direct Communication Protocol Based on Five-Particle Cluster State

    NASA Astrophysics Data System (ADS)

    Chang, Yan; Zhang, Shi-Bin; Yan, Li-Li

    2013-09-01

    To transmit a message safely, five-particle cluster state particles are used to construct a bidirectional quantum secure direct communication protocol. Five-particle cluster state particles are used for both detecting eavesdroppers and transmitting secret messages. All of the five-particle cluster states' photons for detection are mixed to the sending sequence to detect eavesdroppers. The detection rate approaches 88% per qubit. The five-particle cluster states needed are only one fifth of the photons in the sending sequence. In this protocol, there is no photon carrying secret information transmitting in quantum channel, and the classical XOR operation which serves as a one-time-pad is used to ensure the security of the protocol. Compared with three photons of each five-particle cluster state as detection photons, the five photons in this study will decrease the five-particle cluster states needed for detection greatly.

  18. Design of 95 GHz, 2 MW Gyrotron for Communication and Security Applications

    NASA Astrophysics Data System (ADS)

    Kumar, Nitin; Singh, Udaybir; Singh, T. P.; Sinha, A. K.

    2011-02-01

    The design and the numerical simulation of the 95 GHz, 2 MW gyrotron for various kinds of communication, sensing and security applications is presented. The gyrotron is designed for the TE24,8 operating mode. Various in-house developed and commercially available computer codes are used for the design purpose. A 4.25 MW electron gun is designed for the 2 MW of output power. The mode selection, cold cavity and the beam-wave interaction analysis are discussed for the design of weakly tapered open resonator type of interaction cavity. The parametric analysis of the interaction cavity and the electron gun is also presented.

  19. 75 FR 75502 - Order Extending and Modifying Temporary Exemptions Under the Securities Exchange Act of 1934 in...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-03

    ... Nos. 60372 (Jul. 23, 2009), 74 FR 37748 (Jul. 29, 2009) and 61973 (Apr. 23, 2010), 75 FR 22656 (Apr...); Securities Exchange Act Release Nos. 60373 (Jul. 23, 2009), 74 FR 37740 (Jul. 29, 2009) and 61975 (Apr. 23, 2010), 75 FR 22641 (Apr. 29, 2010) (temporary exemptions in connection with CDS clearing by...

  20. Energy Market and Economic Impacts of S.2191, the Lieberman-Warner Climate Security Act of 2007

    EIA Publications

    2008-01-01

    This report responds to a request from Senators Lieberman and Warner for an analysis of S.2191, the Lieberman-Warner Climate Security Act of 2007. S.2191 is a complex bill regulating emissions of greenhouse gases through market- based mechanisms, energy efficiency programs, and economic incentives.

  1. Energy Market and Economic Impacts of H.R. 2454, the American Clean Energy and Security Act of 2009

    EIA Publications

    2009-01-01

    This report responds to a request from Chairman Henry Waxman and Chairman Edward Markey for an analysis of H.R. 2454, the American Clean Energy and Security Act of 2009 (ACESA). ACESA, as passed by the House of Representatives on June 26, 2009, is a complex bill that regulates emissions of greenhouse gases through market-based mechanisms, efficiency programs, and economic incentives.

  2. 76 FR 11533 - Securities Exchange Act of 1934; In the Matter of Chicago Board Options Exchange, Incorporated...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-02

    ..., 400 South LaSalle Street, Chicago, IL 60605; Order Setting Aside the Order by Delegated Authority Approving SR-ISE-2009-35 and Dismissing CBOE's Petition for Review February 24, 2011. On June 15, 2009, the.... 60147 (June 19, 2009), 74 FR 30651 (June 26, 2009). \\2\\ See Securities Exchange Act Release No....

  3. 26 CFR 1.404(a)-14 - Special rules in connection with the Employee Retirement Income Security Act of 1974.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 404(a)” means section 404(a) as in effect on September 1, 1974. Any reference to section 404 without... Security Act of 1974. (2) Ten-year amortization base. The term “10-year amortization base” means either the...-year amortization bases to reflect different plan amendments, changes in actuarial assumptions,...

  4. Impacts of a 25% Renewable Electricity Standard as Proposed in the American Clean Energy and Security Act Discussion Draft

    EIA Publications

    2009-01-01

    This report responds to requests from Chairman Edward Markey, for an analysis of a 25% federal renewable electricity standard (RES). The RES proposal analyzed in this report is included in the discussion draft of broader legislation, the American Clean Energy and Security Act (ACESA) of 2009, issued on the Energy and Commerce Committee website at the end of March 2009.

  5. Advanced Communication Technology Satellite (ACTS) Multibeam Antenna On-Orbit Performance

    NASA Technical Reports Server (NTRS)

    1995-01-01

    The NASA Lewis Research Center's Advanced Communication Technology Satellite (ACTS) was launched in September 1993. ACTS introduced several new technologies, including a multibeam antenna (MBA) operating at extremely short wavelengths never before used in communications. This antenna, which has both fixed and rapidly reconfigurable high-energy spot beams (150 miles in diameter), serves users equipped with small antenna terminals. Extensive structural and thermal analyses have been performed for simulating the ACTS MBA on-orbit performance. The results show that the reflector surfaces (mainly the front subreflector), antenna support assembly, and metallic surfaces on the spacecraft body will be distorted because of the thermal effects of varying solar heating, which degrade the ACTS MBA performance. Since ACTS was launched, a number of evaluations have been performed to assess MBA performance in the space environment. For example, the on-orbit performance measurements found systematic environmental disturbances to the MBA beam pointing. These disturbances were found to be imposed by the attitude control system, antenna and spacecraft mechanical alignments, and on-orbit thermal effects. As a result, the MBA may not always exactly cover the intended service area. In addition, the on-orbit measurements showed that antenna pointing accuracy is the performance parameter most sensitive to thermal distortions on the front subreflector surface and antenna support assemblies. Several compensation approaches were tested and evaluated to restore on-orbit pointing stability. A combination of autotrack (75 percent of the time) and Earth sensor control (25 percent of the time) was found to be the best way to compensate for antenna pointing error during orbit. This approach greatly minimizes the effects of thermal distortions on antenna beam pointing.

  6. Information Leakage Problem in Efficient Bidirectional Quantum Secure Direct Communication with Single Photons in Both Polarization and Spatial-Mode Degrees of Freedom

    NASA Astrophysics Data System (ADS)

    Liu, Zhi-Hao; Chen, Han-Wu; Liu, Wen-Jie

    2016-06-01

    The information leakage problem in the efficient bidirectional quantum secure direct communication protocol with single photons in both polarization and spatial-mode degrees of freedom is pointed out. Next, a way to revise this protocol to a truly secure one is given. We hope people pay more attention to the information leakage problem in order to design truly secure quantum communication protocols.

  7. Welfare, Liberty, and Security for All? U.S. Sex Education Policy and the 1996 Title V Section 510 of the Social Security Act.

    PubMed

    Lerner, Justin E; Hawkins, Robert L

    2016-07-01

    When adolescents delay (meaning they wait until after middle school) engaging in sexual intercourse, they use condoms at higher rates and have fewer sexual partners than those who have sex earlier, thus resulting in a lower risk for unintended pregnancies and sexually transmitted infections. The 1996 Section 510 of Title V of the Social Security Act (often referred to as A-H) is a policy that promotes abstinence-only-until-marriage education (AOE) within public schools. Using Stone's (2012) policy analysis framework, this article explores how A-H limits welfare, liberty, and security among adolescents due to the poor empirical outcomes of AOE policy. We recommend incorporating theory-informed comprehensive sex education in addition to theory-informed abstinence education that utilizes Fishbein and Ajzen's (2010) reasoned action model within schools in order to begin to address adolescent welfare, liberty, and security.

  8. Welfare, Liberty, and Security for All? U.S. Sex Education Policy and the 1996 Title V Section 510 of the Social Security Act.

    PubMed

    Lerner, Justin E; Hawkins, Robert L

    2016-07-01

    When adolescents delay (meaning they wait until after middle school) engaging in sexual intercourse, they use condoms at higher rates and have fewer sexual partners than those who have sex earlier, thus resulting in a lower risk for unintended pregnancies and sexually transmitted infections. The 1996 Section 510 of Title V of the Social Security Act (often referred to as A-H) is a policy that promotes abstinence-only-until-marriage education (AOE) within public schools. Using Stone's (2012) policy analysis framework, this article explores how A-H limits welfare, liberty, and security among adolescents due to the poor empirical outcomes of AOE policy. We recommend incorporating theory-informed comprehensive sex education in addition to theory-informed abstinence education that utilizes Fishbein and Ajzen's (2010) reasoned action model within schools in order to begin to address adolescent welfare, liberty, and security. PMID:27098762

  9. An Experimental Realization of a Chaos-Based Secure Communication Using Arduino Microcontrollers.

    PubMed

    Zapateiro De la Hoz, Mauricio; Acho, Leonardo; Vidal, Yolanda

    2015-01-01

    Security and secrecy are some of the important concerns in the communications world. In the last years, several encryption techniques have been proposed in order to improve the secrecy of the information transmitted. Chaos-based encryption techniques are being widely studied as part of the problem because of the highly unpredictable and random-look nature of the chaotic signals. In this paper we propose a digital-based communication system that uses the logistic map which is a mathematically simple model that is chaotic under certain conditions. The input message signal is modulated using a simple Delta modulator and encrypted using a logistic map. The key signal is also encrypted using the same logistic map with different initial conditions. In the receiver side, the binary-coded message is decrypted using the encrypted key signal that is sent through one of the communication channels. The proposed scheme is experimentally tested using Arduino shields which are simple yet powerful development kits that allows for the implementation of the communication system for testing purposes. PMID:26413563

  10. An Experimental Realization of a Chaos-Based Secure Communication Using Arduino Microcontrollers

    PubMed Central

    Zapateiro De la Hoz, Mauricio; Acho, Leonardo; Vidal, Yolanda

    2015-01-01

    Security and secrecy are some of the important concerns in the communications world. In the last years, several encryption techniques have been proposed in order to improve the secrecy of the information transmitted. Chaos-based encryption techniques are being widely studied as part of the problem because of the highly unpredictable and random-look nature of the chaotic signals. In this paper we propose a digital-based communication system that uses the logistic map which is a mathematically simple model that is chaotic under certain conditions. The input message signal is modulated using a simple Delta modulator and encrypted using a logistic map. The key signal is also encrypted using the same logistic map with different initial conditions. In the receiver side, the binary-coded message is decrypted using the encrypted key signal that is sent through one of the communication channels. The proposed scheme is experimentally tested using Arduino shields which are simple yet powerful development kits that allows for the implementation of the communication system for testing purposes. PMID:26413563

  11. An Experimental Realization of a Chaos-Based Secure Communication Using Arduino Microcontrollers.

    PubMed

    Zapateiro De la Hoz, Mauricio; Acho, Leonardo; Vidal, Yolanda

    2015-01-01

    Security and secrecy are some of the important concerns in the communications world. In the last years, several encryption techniques have been proposed in order to improve the secrecy of the information transmitted. Chaos-based encryption techniques are being widely studied as part of the problem because of the highly unpredictable and random-look nature of the chaotic signals. In this paper we propose a digital-based communication system that uses the logistic map which is a mathematically simple model that is chaotic under certain conditions. The input message signal is modulated using a simple Delta modulator and encrypted using a logistic map. The key signal is also encrypted using the same logistic map with different initial conditions. In the receiver side, the binary-coded message is decrypted using the encrypted key signal that is sent through one of the communication channels. The proposed scheme is experimentally tested using Arduino shields which are simple yet powerful development kits that allows for the implementation of the communication system for testing purposes.

  12. Cryptanalysis and Improvement on "Robust EPR-Pairs-Based Quantum Secure Communication with Authentication Resisting Collective Noise"

    NASA Astrophysics Data System (ADS)

    Yue, Qiu-Ling; Yu, Chao-Hua; Liu, Bin; Wang, Qing-Le

    2016-05-01

    Recently, Chang et al. [Sci Chin-Phys Mech Astron. 57(10), 1907-1912, 2014] proposed two robust quantum secure communication protocols with authentication based on Einstein-Podolsky-Rosen (EPR) pairs, which can resist collective noise. In this paper, we analyze the security of their protocols, and show that there is a kind of security flaw in their protocols. By a kind of impersonation attack, the eavesdropper can obtain half of the message on average. Furthermore, an improved method of their protocols is proposed to close the security loophole.

  13. Cryptanalysis and Improvement on "Robust EPR-Pairs-Based Quantum Secure Communication with Authentication Resisting Collective Noise"

    NASA Astrophysics Data System (ADS)

    Yue, Qiu-Ling; Yu, Chao-Hua; Liu, Bin; Wang, Qing-Le

    2016-10-01

    Recently, Chang et al. [Sci Chin-Phys Mech Astron. 57(10), 1907-1912, 2014] proposed two robust quantum secure communication protocols with authentication based on Einstein-Podolsky-Rosen (EPR) pairs, which can resist collective noise. In this paper, we analyze the security of their protocols, and show that there is a kind of security flaw in their protocols. By a kind of impersonation attack, the eavesdropper can obtain half of the message on average. Furthermore, an improved method of their protocols is proposed to close the security loophole.

  14. 17 CFR 240.0-10 - Small entities under the Securities Exchange Act for purposes of the Regulatory Flexibility Act.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... liabilities) of less than $500,000 on the date in the prior fiscal year as of which its audited financial... dealer that had total capital (net worth plus subordinated liabilities) of less than $500,000 on the last... this section; (f) When used with reference to a municipal securities dealer that is a bank...

  15. Communication

    NASA Technical Reports Server (NTRS)

    Griner, James

    2010-01-01

    NASA s communication work for the UAS Command and Control area will build upon work currently being conducted under NASA Recovery Act funds. Communication portions of UAS NextGen ConOps, Stateof- the-Art assessment, and Gap Analysis. Preliminary simulations for UAS CNPC link scalability assessment. Surrogate UAS aircraft upgrades. This work will also leverage FY10 in-guide funding for communication link model development. UAS are currently managed through exceptions and are operating using DoD frequencies for line-of-sight (LOS) and satellite-based communications links, low-power LOS links in amateur bands, or unlicensed Instrument/Scientific/Medical (ISM) frequencies. None of these frequency bands are designated for Safety and Regularity of Flight. No radio-frequency (RF) spectrum has been allocated by the International Telecommunications Union (ITU) specifically for UAS command and control links, for either LOS or Beyond LOS (BLOS) communication.

  16. Fault tolerant deterministic secure quantum communication using logical Bell states against collective noise

    NASA Astrophysics Data System (ADS)

    Wang, Chao; Liu, Jian-Wei; Chen, Xiu-Bo; Bi, Ya-Gang; Shang, Tao

    2015-04-01

    This study proposes two novel fault tolerant deterministic secure quantum communication (DSQC) schemes resistant to collective noise using logical Bell states. Either DSQC scheme is constructed based on a new coding function, which is designed by exploiting the property of the corresponding logical Bell states immune to collective-dephasing noise and collective-rotation noise, respectively. The secret message can be encoded by two simple unitary operations and decoded by merely performing Bell measurements, which can make the proposed scheme more convenient in practical applications. Moreover, the strategy of one-step quanta transmission, together with the technique of decoy logical qubits checking not only reduces the influence of other noise existing in a quantum channel, but also guarantees the security of the communication between two legitimate users. The final analysis shows that the proposed schemes are feasible and robust against various well-known attacks over the collective noise channel. Project supported by the National Natural Science Foundation of China (Grant Nos. 61272501, 61272514, 61170272, 61472048, 61402058, 61121061, and 61411146001), the Program for New Century Excellent Talents in University of China (Grant No. NCET-13-0681), the National Development Foundation for Cryptological Research (Grant No. MMJJ201401012), the Fok Ying Tong Education Foundation (Grant No. 131067), the Natural Science Foundation of Beijing (Grant Nos. 4132056 and 4152038), the Postdoctoral Science Foundation of China (Grant No. 2014M561826), and the National Key Basic Research Program, China (Grant No. 2012CB315905)

  17. ACTS (Advanced Communications Technology Satellite) Propagation Experiment: Preprocessing Software User's Manual

    NASA Technical Reports Server (NTRS)

    Crane, Robert K.; Wang, Xuhe; Westenhaver, David

    1996-01-01

    The preprocessing software manual describes the Actspp program originally developed to observe and diagnose Advanced Communications Technology Satellite (ACTS) propagation terminal/receiver problems. However, it has been quite useful for automating the preprocessing functions needed to convert the terminal output to useful attenuation estimates. Prior to having data acceptable for archival functions, the individual receiver system must be calibrated and the power level shifts caused by ranging tone modulation must be received. Actspp provides three output files: the daylog, the diurnal coefficient file, and the file that contains calibration information.

  18. High-speed image transmission via the Advanced Communication Technology Satellite (ACTS)

    NASA Astrophysics Data System (ADS)

    Bazzill, Todd M.; Huang, H. K.; Thoma, George R.; Long, L. Rodney; Gill, Michael J.

    1996-05-01

    We are developing a wide area test bed network using the Advanced Communication Technology Satellite (ACTS) from NASA for high speed medical image transmission. The two test sites are the University of California, San Francisco, and the National Library of Medicine. The first phase of the test bed runs over a T1 link (1.544 Mbits/sec) using a Very Small Aperture Terminal. The second phase involves the High Data Rate Terminal via an ATM OC 3C (155 Mbits/sec) connection. This paper describes the experimental set up and some preliminary results from phase 1.

  19. Secure Communications in High Speed Fiber Optical Networks Using Code Division Multiple Access (CDMA) Transmission

    SciTech Connect

    Han, I; Bond, S; Welty, R; Du, Y; Yoo, S; Reinhardt, C; Behymer, E; Sperry, V; Kobayashi, N

    2004-02-12

    This project is focused on the development of advanced components and system technologies for secure data transmission on high-speed fiber optic data systems. This work capitalizes on (1) a strong relationship with outstanding faculty at the University of California-Davis who are experts in high speed fiber-optic networks, (2) the realization that code division multiple access (CDMA) is emerging as a bandwidth enhancing technique for fiber optic networks, (3) the realization that CDMA of sufficient complexity forms the basis for almost unbreakable one-time key transmissions, (4) our concepts for superior components for implementing CDMA, (5) our expertise in semiconductor device processing and (6) our Center for Nano and Microtechnology, which is where the majority of the experimental work was done. Here we present a novel device concept, which will push the limits of current technology, and will simultaneously solve system implementation issues by investigating new state-of-the-art fiber technologies. This will enable the development of secure communication systems for the transmission and reception of messages on deployed commercial fiber optic networks, through the CDMA phase encoding of broad bandwidth pulses. CDMA technology has been developed as a multiplexing technology, much like wavelength division multiplexing (WDM) or time division multiplexing (TDM), to increase the potential number of users on a given communication link. A novel application of the techniques created for CDMA is to generate secure communication through physical layer encoding. Physical layer encoding devices are developed which utilize semiconductor waveguides with fast carrier response times to phase encode spectral components of a secure signal. Current commercial technology, most commonly a spatial light modulator, allows phase codes to be changed at rates of only 10's of Hertz ({approx}25ms response). The use of fast (picosecond to nanosecond) carrier dynamics of semiconductors, as

  20. 17 CFR 270.24f-2 - Registration under the Securities Act of 1933 of certain investment company securities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... year during which it has publicly offered such securities, file Form 24F-2 (17 CFR 274.24) with the... 17 CFR part 240 to end, revised as of April 1, 1997) if the Successor Issuer: (1) had no assets or liabilities, other than nominal assets or liabilities, and no operating history immediately prior to...

  1. 76 FR 8758 - Privacy Act of 1974; Department of Homeland Security Federal Emergency Management Agency-002...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-15

    ... titled, ``Department of Homeland Security Federal Emergency Management Agency--002 Quality Assurance... Homeland Security Internal Affairs system of records [November 18, 2008, 73 FR 67529]. The Department... Security Internal Affairs system of records [November 18, 2008, 73 FR 67529]. In order to provide...

  2. 76 FR 59592 - Government Securities Act Regulations; Replacement of References to Credit Ratings and Technical...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-27

    ... of ``credit risk haircuts'' and ``market risk haircuts'' calculated by each government securities... credit risk as reasonably determined by the government securities broker or dealer pursuant to written... making an assessment of credit and liquidity risk, the government securities broker or dealer...

  3. Faithful deterministic secure quantum communication and authentication protocol based on hyperentanglement against collective noise

    NASA Astrophysics Data System (ADS)

    Chang, Yan; Zhang, Shi-Bin; Yan, Li-Li; Han, Gui-Hua

    2015-08-01

    Higher channel capacity and security are difficult to reach in a noisy channel. The loss of photons and the distortion of the qubit state are caused by noise. To solve these problems, in our study, a hyperentangled Bell state is used to design faithful deterministic secure quantum communication and authentication protocol over collective-rotation and collective-dephasing noisy channel, which doubles the channel capacity compared with using an ordinary Bell state as a carrier; a logical hyperentangled Bell state immune to collective-rotation and collective-dephasing noise is constructed. The secret message is divided into several parts to transmit, however the identity strings of Alice and Bob are reused. Unitary operations are not used. Project supported by the National Natural Science Foundation of China (Grant No. 61402058), the Science and Technology Support Project of Sichuan Province, China (Grant No. 2013GZX0137), the Fund for Young Persons Project of Sichuan Province, China (Grant No. 12ZB017), and the Foundation of Cyberspace Security Key Laboratory of Sichuan Higher Education Institutions, China (Grant No. szjj2014-074).

  4. 17 CFR 239.24 - Form N-5, form for registration of small business investment company under the Securities Act of...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Register citations affecting Form N-5, see the List of CFR Sections Affected, which appears in the Finding... registration of small business investment company under the Securities Act of 1933 and the Investment Company... N-5, form for registration of small business investment company under the Securities Act of 1933...

  5. 17 CFR 239.24 - Form N-5, form for registration of small business investment company under the Securities Act of...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Register citations affecting Form N-5, see the List of CFR Sections Affected, which appears in the Finding... registration of small business investment company under the Securities Act of 1933 and the Investment Company... N-5, form for registration of small business investment company under the Securities Act of 1933...

  6. 17 CFR 239.24 - Form N-5, form for registration of small business investment company under the Securities Act of...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Register citations affecting Form N-5, see the List of CFR Sections Affected, which appears in the Finding... registration of small business investment company under the Securities Act of 1933 and the Investment Company... N-5, form for registration of small business investment company under the Securities Act of 1933...

  7. 17 CFR 239.24 - Form N-5, form for registration of small business investment company under the Securities Act of...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Register citations Form N-5, see the List of CFR Sections Affected, which appears in the Finding Aids... registration of small business investment company under the Securities Act of 1933 and the Investment Company... N-5, form for registration of small business investment company under the Securities Act of 1933...

  8. 17 CFR 239.24 - Form N-5, form for registration of small business investment company under the Securities Act of...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Register citations Form N-5, see the List of CFR Sections Affected, which appears in the Finding Aids... registration of small business investment company under the Securities Act of 1933 and the Investment Company... N-5, form for registration of small business investment company under the Securities Act of 1933...

  9. Student Conduct Administrator Knowledge of the Statistical Reporting Obligations of the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act

    ERIC Educational Resources Information Center

    DeBowes, Michael Matthew

    2014-01-01

    The "Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act" (the "Clery Act") is a consumer right-to-know law originally passed by Congress in 1900. The law requires colleges and universities receiving federal student aid to publish annually their security-related policies and crime statistics. The…

  10. 12 CFR 250.408 - Short-term negotiable notes of banks not securities under section 32, Banking Act of 1933.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Short-term negotiable notes of banks not securities under section 32, Banking Act of 1933. 250.408 Section 250.408 Banks and Banking FEDERAL RESERVE... securities under section 32, Banking Act of 1933. (a) The Board of Governors has been asked whether...

  11. 12 CFR 250.408 - Short-term negotiable notes of banks not securities under section 32, Banking Act of 1933.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 3 2011-01-01 2011-01-01 false Short-term negotiable notes of banks not securities under section 32, Banking Act of 1933. 250.408 Section 250.408 Banks and Banking FEDERAL RESERVE... securities under section 32, Banking Act of 1933. (a) The Board of Governors has been asked whether...

  12. 12 CFR 250.408 - Short-term negotiable notes of banks not securities under section 32, Banking Act of 1933.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 4 2013-01-01 2013-01-01 false Short-term negotiable notes of banks not securities under section 32, Banking Act of 1933. 250.408 Section 250.408 Banks and Banking FEDERAL RESERVE... banks not securities under section 32, Banking Act of 1933. (a) The Board of Governors has been...

  13. 12 CFR 250.408 - Short-term negotiable notes of banks not securities under section 32, Banking Act of 1933.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 4 2012-01-01 2012-01-01 false Short-term negotiable notes of banks not securities under section 32, Banking Act of 1933. 250.408 Section 250.408 Banks and Banking FEDERAL RESERVE... banks not securities under section 32, Banking Act of 1933. (a) The Board of Governors has been...

  14. 12 CFR 250.408 - Short-term negotiable notes of banks not securities under section 32, Banking Act of 1933.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 4 2014-01-01 2014-01-01 false Short-term negotiable notes of banks not securities under section 32, Banking Act of 1933. 250.408 Section 250.408 Banks and Banking FEDERAL RESERVE... banks not securities under section 32, Banking Act of 1933. (a) The Board of Governors has been...

  15. 76 FR 13799 - Implementing the Provisions of the Communications Act of 1934, as Enacted by the Twenty-First...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-14

    ...In this document, the Commission proposes to adopt rules that implement provisions in section 104 of the Twenty-First Century Communications and Video Accessibility Act of 2010 (CVAA), the most significant piece of accessibility legislation since the passage of the Americans with Disabilities Act in 1990. This proceeding would update and amend the Commission's rules to ensure that individuals......

  16. Proceedings of the Seventeenth NASA Propagation Experimenters Meeting (NAPEX 17) and the Advanced Communications Technology Satellite (ACTS) Propagation Studies Miniworkshop

    NASA Technical Reports Server (NTRS)

    Davarian, Faramaz (Editor)

    1993-01-01

    The NASA Propagation Experimenters Meeting (NAPEX) is convened annually to discuss studies made on radio wave propagation by investors from domestic and international organizations. NAPEX 17 was held on 15 June 1993. The meeting was organized into two technical sessions. The first session was dedicated to slant path propagation studies and experiments. The second session focused on propagation studies for mobile and personal communications. Preceding NAPEX 17, the Advanced Communications Technology Satellite (ACTS) Propagation Studies Miniworkshop was held on 14 June 1993 to review ACTS propagation activities with emphasis on ACTS experiments status and data collection, processing, and exchange.

  17. PREFACE: 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies

    NASA Astrophysics Data System (ADS)

    Shuja Syed, Ahmed

    2013-12-01

    The 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies (ICSICCST-2013), took place in Karachi, Pakistan, from 24-26 June 2013. It was organized by Indus University, Karachi, in collaboration with HEJ Research Institute of Chemistry, University of Karachi, Karachi. More than 80 abstracts were submitted to the conference and were double blind-reviewed by an international scientific committee. The topics of the Conference were: Video, Image & Voice Sensing Sensing for Industry, Environment, and Health Automation and Controls Laser Sensors and Systems Displays for Innovative Applications Emerging Technologies Unmanned, Robotic, and Layered Systems Sensing for Defense, Homeland Security, and Law Enforcement The title of the conference, 'Sensing for Industry, Control, Communication & Security Technologies' is very apt in capturing the main issues facing the industry of Pakistan and the world. We believe the sensing industry, particularly in Pakistan, is currently at a critical juncture of its development. The future of the industry will depend on how the industry players choose to respond to the challenge of global competition and opportunities arising from strong growth in the Asian region for which we are pleased to note that the conference covered a comprehensive spectrum of issues with an international perspective. This will certainly assist industry players to make informed decisions in shaping the future of the industry. The conference gathered qualified researchers from developed countries like USA, UK, Sweden, Saudi Arabia, China, South Korea and Malaysia etc whose expertise resulting from the research can be drawn upon to build an exploitable area of new technology that has potential Defense, Homeland Security, and Military applicability. More than 250 researchers/students attended the event and made the event great success as the turnout was 100%. An exceptional line-up of speakers spoke at the occasion. We want

  18. 78 FR 39289 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-01

    ... Age AGENCY: Federal Communications Commission. ACTION: Notice of public meeting. SUMMARY: In... Communications Commission's (FCC) Advisory Committee on Diversity for Communications in the Digital...

  19. 75 FR 20844 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-21

    ... Age AGENCY: Federal Communications Commission. ACTION: Notice of public meeting. SUMMARY: In... Communications Commission's (FCC) Advisory Committee on Diversity for Communications in the Digital...

  20. 78 FR 21354 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-10

    ... Age AGENCY: Federal Communications Commission. ACTION: Notice of public meeting. SUMMARY: In... Communications Commission's (FCC) Advisory Committee on Diversity for Communications in the Digital...

  1. 75 FR 70004 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-16

    ... Age AGENCY: Federal Communications Commission. ACTION: Notice of public meeting. SUMMARY: In... Communications Commission's (FCC) Advisory Committee on Diversity for Communications in the Digital...

  2. 75 FR 60458 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-30

    ... Age AGENCY: Federal Communications Commission. ACTION: Notice of public meeting. SUMMARY: In... Communications Commission's (FCC) Advisory Committee on Diversity for Communications in the Digital...

  3. 77 FR 6113 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-07

    ... Age AGENCY: Federal Communications Commission. ACTION: Notice of public meeting. SUMMARY: In... Communications Commission's (FCC's) Advisory Committee on Diversity for Communications in the Digital...

  4. 77 FR 57085 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ... Age AGENCY: Federal Communications Commission. ACTION: Notice of public meeting. SUMMARY: In... Communications Commission's (FCC) Advisory Committee on Diversity for Communications in the Digital...

  5. 75 FR 53694 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-01

    ... Age AGENCY: Federal Communications Commission. ACTION: Notice of public meeting. SUMMARY: In... Communications Commission's (FCC) Advisory Committee on Diversity for Communications in the Digital...

  6. 76 FR 64348 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-18

    ... Age AGENCY: Federal Communications Commission. ACTION: Notice of public meeting. SUMMARY: In... Communications Commission's (FCC) Advisory Committee on Diversity for Communications in the Digital...

  7. 75 FR 6031 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-05

    ... Age AGENCY: Federal Communications Commission. ACTION: Notice of public meeting. SUMMARY: In... Communications Commission's (FCC) Advisory Committee on Diversity for Communications in the Digital...

  8. Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling

    NASA Astrophysics Data System (ADS)

    Bui, Francis Minhthang; Hatzinakos, Dimitrios

    2007-12-01

    As electronic communications become more prevalent, mobile and universal, the threats of data compromises also accordingly loom larger. In the context of a body sensor network (BSN), which permits pervasive monitoring of potentially sensitive medical data, security and privacy concerns are particularly important. It is a challenge to implement traditional security infrastructures in these types of lightweight networks since they are by design limited in both computational and communication resources. A key enabling technology for secure communications in BSN's has emerged to be biometrics. In this work, we present two complementary approaches which exploit physiological signals to address security issues: (1) a resource-efficient key management system for generating and distributing cryptographic keys to constituent sensors in a BSN; (2) a novel data scrambling method, based on interpolation and random sampling, that is envisioned as a potential alternative to conventional symmetric encryption algorithms for certain types of data. The former targets the resource constraints in BSN's, while the latter addresses the fuzzy variability of biometric signals, which has largely precluded the direct application of conventional encryption. Using electrocardiogram (ECG) signals as biometrics, the resulting computer simulations demonstrate the feasibility and efficacy of these methods for delivering secure communications in BSN's.

  9. High-Fidelity Down-Conversion Source for Secure Communications Using On-Demand Single Photons

    NASA Technical Reports Server (NTRS)

    Roberts, Tony

    2015-01-01

    AdvR, Inc., has built an efficient, fully integrated, waveguide-based source of spectrally uncorrelated photon pairs that will accelerate research and development (R&D) in the emerging field of quantum information science. Key to the innovation is the use of submicron periodically poled waveguides to produce counter propagating photon pairs, which is enabled by AdvR's patented segmented microelectrode poling technique. This novel device will provide a high brightness source of down-conversion pairs with enhanced spectral properties and low attenuation, and it will operate in the visible to the mid-infrared spectral region. A waveguide-based source of spectrally and spatially pure heralded photons will contribute to a wide range of NASA's advanced technology development efforts, including on-demand single photon sources for high-rate spaced-based secure communications.

  10. Synchronization of hyperchaotic harmonics in time-delay systems and its application to secure communication

    PubMed

    Yaowen; Guangming; Hong; Yinghai; Liang

    2000-12-01

    We present a predictor-feedback method for synchronizing chaotic systems in this paper. By using this method, two structurally equivalent or nonequivalent systems can be synchronized very effectively and quickly. Moreover, the feedback perturbation can be switched on even if trajectories of the two systems are far from each other. Therefore, this method is applicable to real-world experimental systems, especially to some fast experimental systems. The validity of this method is demonstrated by synchronizing hyperchaotic harmonics in a time-delay system. As an application, we introduce how messages can be encoded, transmitted, and decoded using this technique. We suggest taking use of the multistability of time-delay systems to improve the performance of the secure communication.

  11. PACS image security server

    NASA Astrophysics Data System (ADS)

    Cao, Fei; Huang, H. K.

    2004-04-01

    Medical image security in a PACS environment has become a pressing issue as communications of images increasingly extends over open networks, and hospitals are currently hard-pushed by Health Insurance Portability and Accountability Act (HIPAA) to be HIPPA complaint for ensuring health data security. Other security-related guidelines and technical standards continue bringing to the public attention in healthcare. However, there is not an infrastructure or systematic method to implement and deploy these standards in a PACS. In this paper, we first review DICOM Part15 standard for secure communications of medical images and the HIPAA impacts on PACS security, as well as our previous works on image security. Then we outline a security infrastructure in a HIPAA mandated PACS environment using a dedicated PACS image security server. The server manages its own database of all image security information. It acts as an image Authority for checking and certificating the image origin and integrity upon request by a user, as a secure DICOM gateway to the outside connections and meanwhile also as a PACS operation monitor for HIPAA supporting information.

  12. 76 FR 42003 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-18

    ... notice of proposed rulemaking (NPRM) in the Federal Register, 75 FR 7978, February 23, 2010, proposing to... published concurrently in the Federal Register, 75 FR 8096, February 23, 2010, and comments were invited on... of Homeland Security Transportation Security Administration--023 Workplace Violence...

  13. A Review of State Test Security Laws in 2013. ACT Research Report Series, 2014 (1)

    ERIC Educational Resources Information Center

    Croft, Michelle

    2014-01-01

    Test security has increased in importance in the last few years given high-profile cases of educator misconduct. This paper provides a review of state test security statutes and regulations related to statewide achievement testing using as a framework recent best practices reports by the U.S. Department of Education's National Center for Education…

  14. 78 FR 55657 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-11

    ... receive expedited screening at participating U.S. airport security checkpoints.\\2\\ TSA Pre TM is one of... always will receive expedited screening at airport security checkpoints. The Program retains a component.... Individuals whom TSA determines are ineligible for the program will continue to be screened at...

  15. Secure Intra-Body Wireless Communications (SIWiC) System Project

    NASA Technical Reports Server (NTRS)

    Ahmad, Aftab; Doggett, Terrence P.

    2011-01-01

    SIWiC System is a project to investigate, design and implement future wireless networks of implantable sensors in the body. This futuristic project is designed to make use of the emerging and yet-to-emerge technologies, including ultra-wide band (UWB) for wireless communications, smart implantable sensors, ultra low power networking protocols, security and privacy for bandwidth and power deficient devices and quantum computing. Progress in each of these fronts is hindered by the needs of breakthrough. But, as we will see in this paper, these major challenges are being met or will be met in near future. SIWiC system is a network of in-situ wireless devices that are implanted to coordinate sensed data inside the body, such as symptoms monitoring collected internally, or biometric data collected of an outside object from within the intra-body network. One node has the capability of communicating outside the body to send data or alarm to a relevant authority, e.g., a remote physician.

  16. [Confidentiality in HIV-infection/AIDS--a comment on the Communicable Disease Control Act].

    PubMed

    Frich, J C

    1995-05-10

    The new Communicable Diseases Control Act has come into force in Norway. It makes it compulsory for a physician to warn a third party if it is obvious that a HIV-positive patient, with a high degree of certainty, puts the third party at risk of being infected with HIV. Some philosophers characterize medical confidentiality as an intransigent and absolute obligation, others as a prima facie duty. This article supports the latter view, but the author still argues that strict conditions have to be fulfilled before a physician should consider breaking medical confidentiality: The doctor must try repeatedly to gain the consent or co-operation of the patient involved. Possible negative long-term consequences for the preventive HIV-work support strict medical confidentiality.

  17. 17 CFR 230.163A - Exemption from section 5(c) of the Act for certain communications made by or on behalf of issuers...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...: (1) Communications relating to business combination transactions that are subject to Rule 165 (§ 230... the Act for certain communications made by or on behalf of issuers more than 30 days before a... section 5(c) of the Act for certain communications made by or on behalf of issuers more than 30...

  18. 17 CFR 230.168 - Exemption from sections 2(a)(10) and 5(c) of the Act for certain communications of regularly...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...)(10) and 5(c) of the Act for certain communications of regularly released factual business information... paragraph (a)(3) of this section) of communications containing factual business information or forward... Exemption from sections 2(a)(10) and 5(c) of the Act for certain communications of regularly...

  19. Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification rules under the Health Information Technology for Economic and Clinical Health Act and the Genetic Information Nondiscrimination Act; other modifications to the HIPAA rules.

    PubMed

    2013-01-25

    The Department of Health and Human Services (HHS or ``the Department'') is issuing this final rule to: Modify the Health Insurance Portability and Accountability Act (HIPAA) Privacy, Security, and Enforcement Rules to implement statutory amendments under the Health Information Technology for Economic and Clinical Health Act (``the HITECH Act'' or ``the Act'') to strengthen the privacy and security protection for individuals' health information; modify the rule for Breach Notification for Unsecured Protected Health Information (Breach Notification Rule) under the HITECH Act to address public comment received on the interim final rule; modify the HIPAA Privacy Rule to strengthen the privacy protections for genetic information by implementing section 105 of Title I of the Genetic Information Nondiscrimination Act of 2008 (GINA); and make certain other modifications to the HIPAA Privacy, Security, Breach Notification, and Enforcement Rules (the HIPAA Rules) to improve their workability and effectiveness and to increase flexibility for and decrease burden on the regulated entities.

  20. The Law of Communicable Diseases Act and disclosure to sexual partners among HIV-positive youth.

    PubMed

    Christiansen, Monica; Lalos, Ann; Johansson, Eva E

    2008-12-01

    In Sweden, human immunodeficiency virus (HIV) is included among the venereal diseases covered by the Law of Communicable Diseases Act. HIV-positive (HIV(+)) people are required to inform their sexual partners about their infection and adopt safe sex behaviours. However, it is unclear how the law is perceived. This study explores how HIV(+) youth in Sweden perceive the law, handle their sexuality and disclose their HIV diagnosis to sexual partners. Ten HIV(+) women and men between 17 and 24 years of age were recruited from three different HIV infection clinics. These participants were interviewed in depth. The interviews were tape-recorded, transcribed verbatim and analysed according to a grounded theory approach. The core category-cultured to take responsibility-illuminates the informants' double-edged experiences regarding the law and how they handle disclosure to sexual partners. The legislation implies both support and burden for these HIV(+) youth; they feel that they have a great deal of responsibility, sometimes more than they can handle. 'Switch off lust', 'balancing lust, fear and obedience' and 'switch off the disease' are strategies that describe how the informants manage sexuality and disclosure. Young HIV(+) people have a difficult time informing partners of their HIV diagnosis and discussing safe sex strategies. These are challenges that health care providers need to take seriously. HIV(+) youth need better communication strategies to negotiate safer sex. Staff with extended education on sexuality should be a part of HIV health care. PMID:22639678

  1. Cryptanalysis and improvement of three-particle deterministic secure and high bit-rate direct quantum communication protocol

    NASA Astrophysics Data System (ADS)

    Liu, Zhi-Hao; Chen, Han-Wu; Wang, Dong; Li, Wen-Qian

    2014-06-01

    The three-particle deterministic secure and high bit-rate direct quantum communication protocol and its improved version are analyzed. It shows that an eavesdropper can steal the sender's secret message by the intercept-resend attack and the entanglement attack. The original version is even fragile under denial-of-service attack. As a result, some suggestions to revise them are given.

  2. 78 FR 27276 - Privacy Act; System of Records: Security Records, State-36

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-09

    ... handle PII are required to take the Foreign Service Institute (FSI) distance learning course instructing... published as 72 FR 73057). The records maintained in State-36, Security Records, capture data related...

  3. Counterterrorism Enhancement and Department of Homeland Security Authorization Act of 2010

    THOMAS, 111th Congress

    Rep. King, Peter T. [R-NY-3

    2010-06-24

    07/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  4. Center to Advance, Monitor, and Preserve University Security Safety Act of 2013

    THOMAS, 113th Congress

    Rep. Scott, Robert C. "Bobby" [D-VA-3

    2013-01-23

    02/28/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, And Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  5. Electronic Life Safety and Security Systems Federal Background Check Act of 2013

    THOMAS, 113th Congress

    Rep. Luetkemeyer, Blaine [R-MO-3

    2013-04-09

    04/30/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  6. Advanced Communications Technology Satellite (ACTS) Fade Compensation Protocol Impact on Very Small-Aperture Terminal Bit Error Rate Performance

    NASA Technical Reports Server (NTRS)

    Cox, Christina B.; Coney, Thom A.

    1999-01-01

    The Advanced Communications Technology Satellite (ACTS) communications system operates at Ka band. ACTS uses an adaptive rain fade compensation protocol to reduce the impact of signal attenuation resulting from propagation effects. The purpose of this paper is to present the results of an analysis characterizing the improvement in VSAT performance provided by this protocol. The metric for performance is VSAT bit error rate (BER) availability. The acceptable availability defined by communication system design specifications is 99.5% for a BER of 5E-7 or better. VSAT BER availabilities with and without rain fade compensation are presented. A comparison shows the improvement in BER availability realized with rain fade compensation. Results are presented for an eight-month period and for 24 months spread over a three-year period. The two time periods represent two different configurations of the fade compensation protocol. Index Terms-Adaptive coding, attenuation, propagation, rain, satellite communication, satellites.

  7. 76 FR 55693 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-08

    ... in the SORN and Notice of Proposed Rulemaking (NPRM) in the Federal Register, 75 FR 69603, on... originally published in the SORN and Notice of Proposed Rulemaking (NPRM) in the Federal Register, 75 FR... Initiative (September 10, 2010, 75 FR 55335). II. Privacy Act The Privacy Act embodies fair...

  8. Prior notice of imported food under the Public Health Security and Bioterrorism Preparedness and Response Act of 2002. Final rule.

    PubMed

    2008-11-01

    The Food and Drug Administration (FDA) is issuing a final regulation that requires the submission to FDA of prior notice of food, including animal feed, that is imported or offered for import into the United States. The final rule implements the Public Health Security and Bioterrorism Preparedness and Response Act of 2002 (the Bioterrorism Act), which required prior notification of imported food to begin on December 12, 2003. The final rule requires that the prior notice be submitted to FDA electronically via either the U.S. Customs and Border Protection (CBP or Customs) Automated Broker Interface (ABI) of the Automated Commercial System (ACS) or the FDA Prior Notice System Interface (FDA PNSI). The information must be submitted and confirmed electronically as facially complete by FDA for review no less than 8 hours (for food arriving by water), 4 hours (for food arriving by air or land/rail), and 2 hours (for food arriving by land/road) before the food arrives at the port of arrival. Food imported or offered for import without adequate prior notice is subject to refusal and, if refused, must be held. Elsewhere in this issue of the Federal Register, FDA is announcing the availability of a draft compliance policy guide (CPG) entitled "Sec. 110.310 Prior Notice of Imported Food Under the Public Health Security and Bioterrorism Preparedness and Response Act of 2002."

  9. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks

    PubMed Central

    Li, Zhen; Jing, Tao; Ma, Liran; Huo, Yan; Qian, Jin

    2016-01-01

    The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. Yet, the use of a large number of IoT devices can severely worsen the spectrum scarcity problem. The usable spectrum resources are almost entirely occupied, and thus, the increasing demands of radio access from IoT devices cannot be met. To tackle this problem, the Cognitive Internet of Things (CIoT) has been proposed. In a CIoT network, secondary users, i.e., sensors and actuators, can access the licensed spectrum bands provided by licensed primary users (such as cellular telephones). Security is a major concern in CIoT networks. However, the traditional encryption method at upper layers (such as symmetric and asymmetric ciphers) may not be suitable for CIoT networks since these networks are composed of low-profile devices. In this paper, we address the security issues in spectrum-leasing-based CIoT networks using physical layer methods. Considering that the CIoT networks are cooperative in nature, we propose to employ cooperative jamming to achieve secure transmission. In our proposed cooperative jamming scheme, a certain secondary user is employed as the helper to harvest energy transmitted by the source and then uses the harvested energy to generate an artificial noise that jams the eavesdropper without interfering with the legitimate receivers. The goal is to minimize the Signal to Interference plus Noise Ratio (SINR) at the eavesdropper subject to the Quality of Service (QoS) constraints of the primary traffic and the secondary traffic. We formulate the minimization problem into a two-stage robust optimization problem based on the worst-case Channel State Information of the Eavesdropper (ECSI). By using Semi-Definite Programming (SDP), the optimal solutions of the transmit covariance matrices can be obtained. Moreover, in order to build an incentive mechanism for the secondary users, we propose an auction framework based on the cooperative

  10. Dynamic (2, 3) Threshold Quantum Secret Sharing of Secure Direct Communication

    NASA Astrophysics Data System (ADS)

    Lai, Hong; Orgun, A. Mehmet; Xiao, Jing-Hua; Pieprzyk, Josef; Xue, Li-Yin

    2015-04-01

    In this paper, we show that a (2, 3) discrete variable threshold quantum secret sharing scheme of secure direct communication can be achieved based on recurrence using the same devices as in BB84. The scheme is devised by first placing the shares of smaller secret pieces into the shares of the largest secret piece, converting the shares of the largest secret piece into corresponding quantum state sequences, inserting nonorthogonal state particles into the quantum state sequences with the purpose of detecting eavesdropping, and finally sending the new quantum state sequences to the three participants respectively. Consequently, every particle can on average carry up to 1.5-bit messages due to the use of recurrence. The control codes are randomly prepared using the way to generate fountain codes with pre-shared source codes between Alice and Bob, making three participants can detect eavesdropping by themselves without sending classical messages to Alice. Due to the flexible encoding, our scheme is also dynamic, which means that it allows the participants to join and leave freely. Supported in part by an International Macquarie University Research Excellence Scholarship (iMQRES), Australian Research Council Grant DP0987734. This work is also supported by the National Basic Research Program of China (973 Program) under Grant No. 2010CB923200, the National Natural Science Foundation of China under No. 61377067, Fund of State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications, China, National Natural Science Foundation of China under Grant Nos. 61202362, 61262057, 61472433, and China Postdoctora Science Foundation under Grant No. 2013M542560

  11. Stackelberg Game Based Power Allocation for Physical Layer Security of Device-to-device Communication Underlaying Cellular Networks

    NASA Astrophysics Data System (ADS)

    Qu, Junyue; Cai, Yueming; Wu, Dan; Chen, Hualiang

    2014-05-01

    The problem of power allocation for device-to-device (D2D) underlay communication to improve physical layer security is addressed. Specifically, to improve the secure communication of the cellular users, we introduce a Stackelberg game for allocating the power of the D2D link under a total power constraint and a rate constraint at the D2D pair. In the introduced Stackelberg game the D2D pair works as a seller and the cellular UEs work as buyers. Firstly, because the interference signals from D2D pair are unknown to both the legitimate receiver and the illegitimate eavesdropper, it is possible that a cellular UE decline to participate in the introduced Stackelberg game. So the condition under which a legitimate user will participate in the introduced Stackelberg game is discussed. Then, based on the Stackelberg game, we propose a semi-distributed power allocation algorithm, which is proved to conclude after finite-time iterations. In the end, some simulations are presented to verify the performance improvement in the physical layer security of cellular UEs using the proposed power allocation algorithm. We can determine that with the proposed algorithm, while the D2D pair's communication demand is met, the physical layer security of cellular UEs can be improved.

  12. 75 FR 9085 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Immigration...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-01

    ... 30, 2009, DHS ICE published a system of records in the Federal Register (74 FR 50228) establishing a... in the Federal Register (74 FR 50148) to exempt this system of records from a number of provisions of... Immigration and Customs Enforcement--012 Visa Security Program Records AGENCY: Privacy Office, DHS....

  13. 75 FR 50843 - 75th Anniversary of the Social Security Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-18

    ... Great Depression. Unemployment neared 20 percent, and millions of Americans struggled to provide for... most vulnerable citizens, giving elderly Americans income security and bringing us closer to President... Independence of the United States of America the two hundred and thirty-fifth. (Presidential Sig.) [FR...

  14. 78 FR 25282 - Privacy Act of 1974; Department of Homeland Security Federal Emergency Management Agency-008...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-30

    ... records entitled, ``DHS/FEMA--008 Disaster Recovery Assistance Files System of Records,'' 74 FR 48763... reasons. Fourth, the legal authorities have been revised to include the Government Performance and Results... name; Applicant's Social Security Number, alien registration number, co-applicant's Social...

  15. 76 FR 18954 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-06

    ... of Homeland Security Federal Emergency Management Agency DHS/FEMA-011 Training and Exercise Program... Agency--011 Training and Exercise Program Records System of Records'' and this proposed rulemaking. In... DHS system of records titled, ``DHS/FEMA--011 Training and Exercise Program Records System of...

  16. 76 FR 42004 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-18

    ... the Federal Register, 76 FR 18954, April 6, 2011, proposing to exempt portions of the system of... (SORN) was published concurrently in the Federal Register, 76 FR 19107, April 6, 2011, and comments were... of Homeland Security Federal Emergency Management Agency--011 Training and Exercise Program...

  17. 75 FR 10633 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security United States...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-09

    ... Security (DHS) published a notice of proposed rulemaking in the Federal Register, 74 FR 30240, June 25... concurrently in the Federal Register, 74 FR 5665, January 30, 2009, and later updated in the Federal Register to add two new routine uses, 74 FR 20719, May 5, 2009. The system is being renamed...

  18. 77 FR 69491 - Privacy Act of 1974: System of Records; Secure Flight Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-19

    ... list, known as the TSDB. \\6\\ 73 FR 64018 (Oct. 28, 2008). TSA established the Secure Flight system of... System (TSERS), 75 FR 28042 (May 19, 2010). Consistent with its ongoing efforts to focus on passengers... records.'' A ``system of records'' is a group of any records under the control of an agency for...

  19. Security-reliability performance of cognitive AF relay-based wireless communication system with channel estimation error

    NASA Astrophysics Data System (ADS)

    Gu, Qi; Wang, Gongpu; Gao, Li; Peng, Mugen

    2014-12-01

    In this paper, both the security and the reliability performance of the cognitive amplify-and-forward (AF) relay system are analyzed in the presence of the channel estimation error. The security and the reliability performance are represented by the outage probability and the intercept probability, respectively. Instead of perfect channel state information (CSI) predominantly assumed in the literature, a certain channel estimation algorithm and the influence of the corresponding channel estimation error are considered in this study. Specifically, linear minimum mean square error estimation (LMMSE) is utilized by the destination node and the eavesdropper node to obtain the CSI, and the closed form for the outage probability and that for the intercept probability are derived with the channel estimation error. It is shown that the transmission security (reliability) can be improved by loosening the reliability (security) requirement. Moreover, we compare the security and reliability performance of this relay-based cognitive radio system with those of the direct communication system without relay. Interestingly, it is found that the AF relay-based system has less reliability performance than the direct cognitive radio system; however, it can lower the sum of the outage probability and the intercept probability than the direct communication system. It is also found that there exists an optimal training number to minimize the sum of the outage probability and the intercept probability.

  20. 12 CFR 335.601 - Requirements of section 16 of the Securities Exchange Act of 1934.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... regulations issued under section 16 of the Exchange Act (17 CFR part 240), except that the forms described in... FDICconnect at https://www2.fdicconnect.gov/index.asp. Copies of FDIC Forms 3, 4, and 5 and the...

  1. 12 CFR 335.601 - Requirements of section 16 of the Securities Exchange Act of 1934.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... regulations issued under section 16 of the Exchange Act (17 CFR part 240), except that the forms described in... FDICconnect at https://www2.fdicconnect.gov/index.asp. Copies of FDIC Forms 3, 4, and 5 and the...

  2. 12 CFR 335.601 - Requirements of section 16 of the Securities Exchange Act of 1934.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... regulations issued under section 16 of the Exchange Act (17 CFR part 240), except that the forms described in... FDICconnect at https://www2.fdicconnect.gov/index.asp. Copies of FDIC Forms 3, 4, and 5 and the...

  3. 12 CFR 335.601 - Requirements of section 16 of the Securities Exchange Act of 1934.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... regulations issued under section 16 of the Exchange Act (17 CFR part 240), except that the forms described in... FDICconnect at https://www2.fdicconnect.gov/index.asp. Copies of FDIC Forms 3, 4, and 5 and the...

  4. 76 FR 4838 - Implementation of the Twenty-First Century Communications and Video Accessibility Act of 2010...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-27

    ... FR 66356) which became effective on January 25, 2010. Privacy Act Impact Assessment: Yes. The Privacy..., deafness and blindness are experienced as a result of an illness, injury, or aging. These varying levels of...-blindness, including a strong familiarity with the communications needs of this population;...

  5. A neural-network-based exponential H∞ synchronisation for chaotic secure communication via improved genetic algorithm

    NASA Astrophysics Data System (ADS)

    Hsiao, Feng-Hsiag

    2016-10-01

    In this study, a novel approach via improved genetic algorithm (IGA)-based fuzzy observer is proposed to realise exponential optimal H∞ synchronisation and secure communication in multiple time-delay chaotic (MTDC) systems. First, an original message is inserted into the MTDC system. Then, a neural-network (NN) model is employed to approximate the MTDC system. Next, a linear differential inclusion (LDI) state-space representation is established for the dynamics of the NN model. Based on this LDI state-space representation, this study proposes a delay-dependent exponential stability criterion derived in terms of Lyapunov's direct method, thus ensuring that the trajectories of the slave system approach those of the master system. Subsequently, the stability condition of this criterion is reformulated into a linear matrix inequality (LMI). Due to GA's random global optimisation search capabilities, the lower and upper bounds of the search space can be set so that the GA will seek better fuzzy observer feedback gains, accelerating feedback gain-based synchronisation via the LMI-based approach. IGA, which exhibits better performance than traditional GA, is used to synthesise a fuzzy observer to not only realise the exponential synchronisation, but also achieve optimal H∞ performance by minimizing the disturbance attenuation level and recovering the transmitted message. Finally, a numerical example with simulations is given in order to demonstrate the effectiveness of our approach.

  6. Sense, decide, act, communicate (SDAC): next generation of smart sensor systems

    NASA Astrophysics Data System (ADS)

    Berry, Nina; Davis, Jesse; Ko, Teresa H.; Kyker, Ron; Pate, Ron; Stark, Doug; Stinnett, Regan; Baker, James; Cushner, Adam; Van Dyke, Colin; Kyckelhahn, Brian

    2004-09-01

    The recent war on terrorism and increased urban warfare has been a major catalysis for increased interest in the development of disposable unattended wireless ground sensors. While the application of these sensors to hostile domains has been generally governed by specific tasks, this research explores a unique paradigm capitalizing on the fundamental functionality related to sensor systems. This functionality includes a sensors ability to Sense - multi-modal sensing of environmental events, Decide - smart analysis of sensor data, Act - response to environmental events, and Communication - internal to system and external to humans (SDAC). The main concept behind SDAC sensor systems is to integrate the hardware, software, and networking to generate 'knowledge and not just data'. This research explores the usage of wireless SDAC units to collectively make up a sensor system capable of persistent, adaptive, and autonomous behavior. These systems are base on the evaluation of scenarios and existing systems covering various domains. This paper presents a promising view of sensor network characteristics, which will eventually yield smart (intelligent collectives) network arrays of SDAC sensing units generally applicable to multiple related domains. This paper will also discuss and evaluate the demonstration system developed to test the concepts related to SDAC systems.

  7. Synchronizing modified van der Pol Duffing oscillators with offset terms using observer design: application to secure communications

    NASA Astrophysics Data System (ADS)

    Fodjouong, G. J.; Fotsin, H. B.; Woafo, P.

    2007-05-01

    This study addresses the adaptive synchronization of the modified van der Pol-Duffing (MVDPD) oscillator with offset terms. From our investigations of the system dynamics, we obtain that the system presents a chaotic behaviour at weak values of the offset parameters. Routh-Hurwitz criteria are used to study the asymptotic stability of the steady states. An adaptive observer design method is applied to achieve synchronization of two identical MVDPD oscillators with offset. Numerical simulations are given to validate the proposed synchronization approach. Moreover, as an application, the proposed scheme is applied to secure communication. Also, simulation results verify the proposed scheme's success in the communication application.

  8. Proceedings of the Twentieth NASA Propagation Experimenters Meeting (NAPEX XX) and the Advanced Communications Technology Satellite (ACTS) Propagation Studies Miniworkshop

    NASA Technical Reports Server (NTRS)

    Golshan, Nassar (Editor)

    1996-01-01

    The NASA Propagation Experimenters (NAPEX) Meeting and associated Advanced Communications Technology Satellite (ACTS) Propagation Studies Miniworkshop convene yearly to discuss studies supported by the NASA Propagation Program. Representatives from the satellite communications (satcom)industry, academia, and government with an interest in space-ground radio wave propagation have peer discussion of work in progress, disseminate propagation results, and interact with the satcom industry. NAPEX XX, in Fairbanks, Alaska, June 4-5, 1996, had three sessions: (1) "ACTS Propagation Study: Background, Objectives, and Outcomes," covered results from thirteen station-years of Ka-band experiments; (2) "Propagation Studies for Mobile and Personal Satellite Applications," provided the latest developments in measurement, modeling, and dissemination of propagation phenomena of interest to the mobile, personal, and aeronautical satcom industry; and (3)"Propagation Research Topics," covered a range of topics including space/ground optical propagation experiments, propagation databases, the NASA Propagation Web Site, and revision plans for the NASA propagation effects handbooks. The ACTS Miniworkshop, June 6, 1996, covered ACTS status, engineering support for ACTS propagation terminals, and the ACTS Propagation Data Center. A plenary session made specific recommendations for the future direction of the program.

  9. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks.

    PubMed

    Li, Zhen; Jing, Tao; Ma, Liran; Huo, Yan; Qian, Jin

    2016-03-07

    The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. The use of a large number of IoT devices makes the spectrum scarcity problem even more serious. The usable spectrum resources are almost entirely occupied, and thus, the increasing radio access demands of IoT devices cannot be met. To tackle this problem, the Cognitive Internet of Things (CIoT) has been proposed. In a CIoT network, secondary users, i.e., sensors and actuators, can access the licensed spectrum bands provided by licensed primary users (such as telephones). Security is a major concern in CIoT networks. However, the traditional encryption method at upper layers (such as symmetric cryptography and asymmetric cryptography) may be compromised in CIoT networks, since these types of networks are heterogeneous. In this paper, we address the security issue in spectrum-leasing-based CIoT networks using physical layer methods. Considering that the CIoT networks are cooperative networks, we propose to employ cooperative jamming to achieve secrecy transmission. In the cooperative jamming scheme, a certain secondary user is employed as the helper to harvest energy transmitted by the source and then uses the harvested energy to generate an artificial noise that jams the eavesdropper without interfering with the legitimate receivers. The goal is to minimize the signal to interference plus noise ratio (SINR) at the eavesdropper subject to the quality of service (QoS) constraints of the primary traffic and the secondary traffic. We formulate the considered minimization problem into a two-stage robust optimization problem based on the worst-case Channel State Information of the Eavesdropper. By using semi-definite programming (SDP), the optimal solutions of the transmit covariance matrices can be obtained. Moreover, in order to build an incentive mechanism for the secondary users, we propose an auction framework based on the cooperative jamming scheme

  10. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks.

    PubMed

    Li, Zhen; Jing, Tao; Ma, Liran; Huo, Yan; Qian, Jin

    2016-01-01

    The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. The use of a large number of IoT devices makes the spectrum scarcity problem even more serious. The usable spectrum resources are almost entirely occupied, and thus, the increasing radio access demands of IoT devices cannot be met. To tackle this problem, the Cognitive Internet of Things (CIoT) has been proposed. In a CIoT network, secondary users, i.e., sensors and actuators, can access the licensed spectrum bands provided by licensed primary users (such as telephones). Security is a major concern in CIoT networks. However, the traditional encryption method at upper layers (such as symmetric cryptography and asymmetric cryptography) may be compromised in CIoT networks, since these types of networks are heterogeneous. In this paper, we address the security issue in spectrum-leasing-based CIoT networks using physical layer methods. Considering that the CIoT networks are cooperative networks, we propose to employ cooperative jamming to achieve secrecy transmission. In the cooperative jamming scheme, a certain secondary user is employed as the helper to harvest energy transmitted by the source and then uses the harvested energy to generate an artificial noise that jams the eavesdropper without interfering with the legitimate receivers. The goal is to minimize the signal to interference plus noise ratio (SINR) at the eavesdropper subject to the quality of service (QoS) constraints of the primary traffic and the secondary traffic. We formulate the considered minimization problem into a two-stage robust optimization problem based on the worst-case Channel State Information of the Eavesdropper. By using semi-definite programming (SDP), the optimal solutions of the transmit covariance matrices can be obtained. Moreover, in order to build an incentive mechanism for the secondary users, we propose an auction framework based on the cooperative jamming scheme

  11. 76 FR 44452 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security National...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-26

    ... Register, 75 FR 69603, on November 15, 2010, proposing to exempt portions of the system of records from one... concurrently in the Federal Register, 75 FR 69693, November 15, 2010, and comments were invited on both the... fundamental and necessary part of the Privacy Act protections and staves off mission creep. EPIC cited...

  12. 77 FR 69517 - Order Granting Exmeptions From Specified Provisions of the Securities Exchange Act and the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-19

    ... reasons why, in good faith, it could not file such report, schedule or form on a timely basis. II... furnish proxy statements, annual reports and other soliciting materials, as applicable (the ``Soliciting... statements and annual reports, as applicable (the ``Information Materials''), under Exchange Act Rules...

  13. 75 FR 69604 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-15

    ... FR 55335). The Privacy Act embodies fair information principles in a statutory framework governing..., report, analyze, and fuse information related to all-threats and all-hazards, law enforcement activities... officials; and private sector entities or individuals. The NOC collects and fuses information from a...

  14. 17 CFR 230.169 - Exemption from sections 2(a)(10) and 5(c) of the Act for certain communications of regularly...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...)(10) and 5(c) of the Act for certain communications of regularly released factual business information...) of the Act for certain communications of regularly released factual business information. Preliminary... factual business information will not be affected by another release or dissemination of a...

  15. Proceedings of the Fifteenth NASA Propagation Experimenters Meeting (NAPEX 15) and the Advanced Communications Technology Satellite (ACTS) Propagation Studies Miniworkshop

    NASA Technical Reports Server (NTRS)

    Davarian, Faramaz (Editor)

    1991-01-01

    The NASA Propagation Experimenters Meeting (NAPEX), supported by the NASA Propagation Program, is convened annually to discuss studies made on radio wave propagation by investigators from domestic and international organizations. The meeting was organized into three technical sessions. The first session was dedicated to Olympus and ACTS studies and experiments, the second session was focused on the propagation studies and measurements, and the third session covered computer-based propagation model development. In total, sixteen technical papers and some informal contributions were presented. Following NAPEX 15, the Advanced Communications Technology Satellite (ACTS) miniworkshop was held on 29 Jun. 1991, to review ACTS propagation activities, with emphasis on ACTS hardware development and experiment planning. Five papers were presented.

  16. Y-12 National Security Complex National Historic Preservation Act Historic Preservation Plan

    SciTech Connect

    2003-09-30

    The Historic Preservation Plan (HPP) recognizes that the Y-12 National Security Complex is a vital and long-term component of DOE and NNSA. In addition to NNSA missions, the Office of Science and Energy, the Office of Nuclear Energy, and the Office of Environmental Management have properties located at Y-12 that must be taken into consideration. The HPP also recognizes that the challenge for cultural resource management is incorporating the requirements of NNSA, SC, NE, and EM missions while preserving and protecting its historic resources. The HPP seeks to find an effective way to meet the obligations at Y-12 for historic and archeological protection while at the same time facilitating effective completion of ongoing site mission activities, including removal of obsolete or contaminated facilities, adaptive reuse of existing facilities whenever feasible, and construction of new facilities in order to meet site mission needs. The Y-12 Historic Preservation Plan (HPP) defines the preservation strategy for the Y-12 National Security Complex and will direct efficient compliance with the NHPA and federal archaeological protection legislation at Y-12 as DOE and NNSA continues mission activities of the site.

  17. Communication.

    ERIC Educational Resources Information Center

    Strauss, Andre

    The following essays on communication are presented: communication as a condition of survival, communication for special purposes, the means of transmission of communication, communication within social and economic structures, the teaching of communication through the press, the teaching of modern languages, communication as a point of departure,…

  18. 17 CFR 230.163 - Exemption from section 5(c) of the Act for certain communications by or on behalf of well-known...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...) of this section shall not be available to: (i) Communications relating to business combination... seq.); or (iii) Communications by an issuer that is a business development company as defined in... the Act for certain communications by or on behalf of well-known seasoned issuers. 230.163 Section...

  19. 47 CFR 1.990 - Citizenship and filing requirements under the Communications Act of 1934.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., as amended, 15 U.S.C. 78a et seq. (Exchange Act), and corresponding Exchange Act Rule 13d-1, 17 CFR... corresponding Exchange Act Rule 13d-1, 17 CFR 240.13d-1, or a substantially comparable foreign law or regulation... 47 Telecommunication 1 2013-10-01 2013-10-01 false Citizenship and filing requirements under...

  20. 47 CFR 1.990 - Citizenship and filing requirements under the Communications Act of 1934.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., as amended, 15 U.S.C. 78a et seq. (Exchange Act), and corresponding Exchange Act Rule 13d-1, 17 CFR... corresponding Exchange Act Rule 13d-1, 17 CFR 240.13d-1, or a substantially comparable foreign law or regulation... 47 Telecommunication 1 2014-10-01 2014-10-01 false Citizenship and filing requirements under...