Science.gov

Sample records for act communications security

  1. 78 FR 15722 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-12

    ... Accuracy, Network Security Best Practices, DNSSEC Implementation Practices for ISPs, Secure BGP Deployment... COMMISSION Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council... that the Federal Communications Commission's (FCC) Communications Security, Reliability,...

  2. 78 FR 46582 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-01

    ... COMMISSION Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council... Communications Commission's (FCC or Commission) Communications Security, Reliability, and Interoperability... to ensure the security, reliability, and interoperability of communications systems. On March...

  3. Department of Homeland Security Interoperable Communications Act

    THOMAS, 113th Congress

    Rep. Payne, Donald M., Jr. [D-NJ-10

    2014-03-24

    07/09/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  4. 77 FR 48153 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-13

    ... COMMISSION Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council... Communications Commission's (FCC or Commission) Communications Security, Reliability, and Interoperability... practices and actions the FCC can take to ensure the security, reliability, and interoperability...

  5. 76 FR 72922 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-28

    ... location accuracy, and network security. The FCC will attempt to accommodate as many attendees as possible... COMMISSION Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council... Communications Commission's (FCC) third Communications Security, Reliability, and Interoperability Council...

  6. 77 FR 67815 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-14

    ... COMMISSION Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council... Communications Commission's (FCC) Communications Security, Reliability, and Interoperability Council (CSRIC) will..., reliability, and interoperability of communications systems. On March 19, 2011, the FCC, pursuant to...

  7. 77 FR 28387 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-14

    ... COMMISSION Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council... Communications Commission's (FCC) Communications Security, Reliability, and Interoperability Council (CSRIC) will... emergency alerting systems such as promoting E9-1-1 reliability and alerting platforms--Emergency...

  8. 78 FR 10169 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-13

    ... COMMISSION Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council... Communications Commission's (FCC) Communications Security, Reliability, and Interoperability Council (CSRIC) will hold its final meeting. Working groups Next Generation Alerting, E9-1-1 Location Accuracy,...

  9. 75 FR 74050 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-30

    ... include: Cybersecurity best practices, ISP network protection practices, transition to NG9-1-1, technical..., Associate Chief for Cybersecurity and Communications Reliability Public Safety and Homeland Security...

  10. 78 FR 69851 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-21

    ... including emergency warning systems, 9-1-1 location accuracy, distributed denial-of-service (DDoS), and... security, reliability, and interoperability of communications systems. On March 19, 2013, the FCC,...

  11. 76 FR 10362 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-24

    ... Security, Reliability, and Interoperability Council AGENCY: Federal Communications Commission. ACTION..., Reliability, and Interoperability Council (CSRIC) will hold its final meeting on March 14, 2011, at 9 a.m. in... and actions the FCC can take to ensure optimal security, reliability, and interoperability...

  12. 77 FR 12054 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-28

    ... p.m. in the Commission Meeting Room of the Federal Communications Commission, Room TW-C305, 445 12th..., Room TW-C305 (Commission Meeting Room), 445 12th Street SW., Washington, DC 20554. FOR FURTHER... Safety and Homeland Security Bureau, Federal Communications Commission, 445 12th Street SW., Room 7-...

  13. National Security/Emergency Preparedness and Disaster Recovery Communications Via ACTS

    NASA Technical Reports Server (NTRS)

    Pasqualino, Christopher R.; Abbe, Brian S.; Dixon, Frank

    1996-01-01

    During the period from early 1993 through 1994, the U.S. National Communication System, a government agency, sponsored the development and execution of several fixed and mobile experiments using the Advanced Communications Technology Satellite (ACTS)...The results of these experiments are described in this paper.

  14. Secure video communications system

    DOEpatents

    Smith, Robert L.

    1991-01-01

    A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

  15. 76 FR 54234 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-31

    ..., 2011, from 9 a.m. to 1 p.m. in the Commission Meeting Room of the Federal Communications Commission, Room TW-C305, 445 12th Street, SW., Washington, DC 20554. DATES: September 23, 2011. ADDRESSES: Federal Communications Commission, Room TW-C305 ] (Commission Meeting Room), 445 12th Street, SW., Washington, DC...

  16. 75 FR 56533 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-16

    ... the Commission Meeting Room of the Federal Communications Commission, Room TW-C305, 445 12th Street, SW., Washington, DC 20554. DATES: October 7, 2010 ADDRESSES: Federal Communications Commission, Room TW-C305 (Commission Meeting Room), 445 12th Street, SW., Washington, DC 20554. FOR...

  17. 75 FR 9899 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-04

    ... Commission Meeting Room of the Federal Communications Commission, Room 59184 TW-C305, 445 12th Street, SW., Washington, DC 20554. DATES: March 22, 2010. ADDRESSES: Federal Communications Commission, Room TW-C305 (Commission Meeting Room), 445 12th Street, SW., Washington, DC 20554. FOR FURTHER INFORMATION...

  18. Practical secure quantum communications

    NASA Astrophysics Data System (ADS)

    Diamanti, Eleni

    2015-05-01

    We review recent advances in the field of quantum cryptography, focusing in particular on practical implementations of two central protocols for quantum network applications, namely key distribution and coin flipping. The former allows two parties to share secret messages with information-theoretic security, even in the presence of a malicious eavesdropper in the communication channel, which is impossible with classical resources alone. The latter enables two distrustful parties to agree on a random bit, again with information-theoretic security, and with a cheating probability lower than the one that can be reached in a classical scenario. Our implementations rely on continuous-variable technology for quantum key distribution and on a plug and play discrete-variable system for coin flipping, and necessitate a rigorous security analysis adapted to the experimental schemes and their imperfections. In both cases, we demonstrate the protocols with provable security over record long distances in optical fibers and assess the performance of our systems as well as their limitations. The reported advances offer a powerful toolbox for practical applications of secure communications within future quantum networks.

  19. Secure Chemical Facilities Act

    THOMAS, 111th Congress

    Sen. Lautenberg, Frank R. [D-NJ

    2010-07-15

    07/15/2010 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  20. Secure Chemical Facilities Act

    THOMAS, 112th Congress

    Sen. Lautenberg, Frank R. [D-NJ

    2011-03-31

    03/31/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. Secure Chemical Facilities Act

    THOMAS, 113th Congress

    Sen. Lautenberg, Frank R. [D-NJ

    2013-01-23

    01/23/2013 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  2. Air Cargo Security Act

    THOMAS, 111th Congress

    Rep. Markey, Edward J. [D-MA-7

    2010-11-16

    11/23/2010 Referred to the Subcommittee on Transportation Security and Infrastructure Protection. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  3. Securing Cabin Baggage Act

    THOMAS, 111th Congress

    Rep. Lipinski, Daniel [D-IL-3

    2009-06-15

    06/17/2009 Referred to the Subcommittee on Transportation Security and Infrastructure Protection. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  4. Secure Visas Act

    THOMAS, 111th Congress

    Rep. Smith, Lamar [R-TX-21

    2010-03-04

    04/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  5. Keep America Secure Act

    THOMAS, 112th Congress

    Rep. Slaughter, Louise McIntosh [D-NY-28

    2012-08-02

    09/05/2012 Referred to the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  6. Save Social Security Act

    THOMAS, 112th Congress

    Rep. McCotter, Thaddeus G. [R-MI-11

    2011-09-12

    09/19/2011 Referred for a period ending not later than September 19, 2011, (or for a later time if the Chairman so designates) to the Subcommittee on Social Security, in each case for consideration of such provisions as fall within the jurisdiction of the subcommittee concerned. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  7. 77 FR 42175 - Securities Act Industry Guides

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-18

    ... / Wednesday, July 18, 2012 / Rules and Regulations#0;#0; ] SECURITIES AND EXCHANGE COMMISSION 17 CFR Part 229 Securities Act Industry Guides AGENCY: Securities and Exchange Commission. ACTION: Technical amendments... Engaged or to be Engaged in Significant Mining Operations (``Industry Guide 7''), of the Securities Act...

  8. Advanced Communications Technology Satellite (ACTS)

    NASA Technical Reports Server (NTRS)

    Gedney, Richard T.; Schertler, Ronald J.

    1989-01-01

    The NASA Advanced Communications Technology Satellite (ACTS) was conceived to help maintain U.S. leadership in the world's communications-satellite market. This experimental satellite is expected to be launched by NASA in 1992 and to furnish the technology necessary for establishing very small aperture terminal digital networks which provide on-demand full-mesh connectivity, and 1.544-MBPS services with only a single hop. Utilizing on-board switching and processing, each individual voice or data circuit can be separately routed to any location in the network. This paper provides an overview of the ACTS and discusses the value of the technology for future communications systems.

  9. 49 CFR 193.2909 - Security communications.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 3 2011-10-01 2011-10-01 false Security communications. 193.2909 Section 193.2909...: FEDERAL SAFETY STANDARDS Security § 193.2909 Security communications. A means must be provided for: (a) Prompt communications between personnel having supervisory security duties and law enforcement...

  10. 49 CFR 193.2909 - Security communications.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Security communications. 193.2909 Section 193.2909...: FEDERAL SAFETY STANDARDS Security § 193.2909 Security communications. A means must be provided for: (a) Prompt communications between personnel having supervisory security duties and law enforcement...

  11. 49 CFR 193.2909 - Security communications.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 3 2012-10-01 2012-10-01 false Security communications. 193.2909 Section 193.2909...: FEDERAL SAFETY STANDARDS Security § 193.2909 Security communications. A means must be provided for: (a) Prompt communications between personnel having supervisory security duties and law enforcement...

  12. Energy Independence and Security Act of 2007

    EPA Pesticide Factsheets

    This page provides an overview of the Energy Independence and Security Act (EISA) of 2007, which aims to increase U.S. energy security, develop renewable energy production, and improve vehicle fuel economy.

  13. Secure communications using quantum cryptography

    SciTech Connect

    Hughes, R.J.; Buttler, W.T.; Kwiat, P.G.

    1997-08-01

    The secure distribution of the secret random bit sequences known as {open_quotes}key{close_quotes} material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is an emerging technology for secure key distribution with single-photon transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). We have developed experimental quantum cryptography systems based on the transmission of non-orthogonal single-photon states to generate shared key material over multi-kilometer optical fiber paths and over line-of-sight links. In both cases, key material is built up using the transmission of a single-photon per bit of an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. In our optical fiber experiment we have performed quantum key distribution over 24-km of underground optical fiber using single-photon interference states, demonstrating that secure, real-time key generation over {open_quotes}open{close_quotes} multi-km node-to-node optical fiber communications links is possible. We have also constructed a quantum key distribution system for free-space, line-of-sight transmission using single-photon polarization states, which is currently undergoing laboratory testing. 7 figs.

  14. Secure Firearms Act of 2013

    THOMAS, 113th Congress

    Rep. Carter, John R. [R-TX-31

    2013-05-08

    06/14/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  15. Secure Data Act of 2014

    THOMAS, 113th Congress

    Rep. Lofgren, Zoe [D-CA-19

    2014-12-04

    12/18/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  16. Airport Security Act of 2013

    THOMAS, 113th Congress

    Rep. Johnson, Henry C. "Hank," Jr. [D-GA-4

    2013-11-14

    01/09/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  17. National Security Agency Accountability Act

    THOMAS, 113th Congress

    Rep. Carney, John C., Jr. [D-DE-At Large

    2014-01-15

    03/20/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  18. Secure Federal File Sharing Act

    THOMAS, 111th Congress

    Sen. McCaskill, Claire [D-MO

    2010-06-14

    06/14/2010 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  19. Student Visa Security Improvement Act

    THOMAS, 111th Congress

    Rep. Bilirakis, Gus M. [R-FL-9

    2010-05-05

    06/15/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  20. Data Security Act of 2014

    THOMAS, 113th Congress

    Sen. Carper, Thomas R. [D-DE

    2014-01-15

    02/03/2014 Committee on Banking, Housing, and Urban Affairs Subcommittee on National Security and International Trade and Finance. Hearings held. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. Aerospace Communications Security Technologies Demonstrated

    NASA Technical Reports Server (NTRS)

    Griner, James H.; Martzaklis, Konstantinos S.

    2003-01-01

    In light of the events of September 11, 2001, NASA senior management requested an investigation of technologies and concepts to enhance aviation security. The investigation was to focus on near-term technologies that could be demonstrated within 90 days and implemented in less than 2 years. In response to this request, an internal NASA Glenn Research Center Communications, Navigation, and Surveillance Aviation Security Tiger Team was assembled. The 2-year plan developed by the team included an investigation of multiple aviation security concepts, multiple aircraft platforms, and extensively leveraged datalink communications technologies. It incorporated industry partners from NASA's Graphical Weather-in-the-Cockpit research, which is within NASA's Aviation Safety Program. Two concepts from the plan were selected for demonstration: remote "black box," and cockpit/cabin surveillance. The remote "black box" concept involves real-time downlinking of aircraft parameters for remote monitoring and archiving of aircraft data, which would assure access to the data following the loss or inaccessibility of an aircraft. The cockpit/cabin surveillance concept involves remote audio and/or visual surveillance of cockpit and cabin activity, which would allow immediate response to any security breach and would serve as a possible deterrent to such breaches. The datalink selected for the demonstrations was VDL Mode 2 (VHF digital link), the first digital datalink for air-ground communications designed for aircraft use. VDL Mode 2 is beginning to be implemented through the deployment of ground stations and aircraft avionics installations, with the goal of being operational in 2 years. The first demonstration was performed December 3, 2001, onboard the LearJet 25 at Glenn. NASA worked with Honeywell, Inc., for the broadcast VDL Mode 2 datalink capability and with actual Boeing 757 aircraft data. This demonstration used a cockpitmounted camera for video surveillance and a coupling to

  2. Increasing security in inter-chip communication

    DOEpatents

    Edwards, Nathan J; Hamlet, Jason; Bauer, Todd; Helinski, Ryan

    2014-10-28

    An apparatus for increasing security in inter-chip communication includes a sending control module, a communication bus, and a receiving control module. The communication bus is coupled between the sending control module and the receiving control module. The sending control module operates to send data on the communication bus, disable the communication bus when threats are detected, or both.

  3. Cyber Security Domestic Preparedness Act

    THOMAS, 111th Congress

    Rep. Rodriguez, Ciro D. [D-TX-23

    2010-01-26

    01/28/2010 Referred to the Subcommittee on Emergency Communications, Preparedness, and Response. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  4. Homeland Security Grant Review Act

    THOMAS, 111th Congress

    Rep. Carney, Christopher P. [D-PA-10

    2010-06-22

    06/28/2010 Referred to the Subcommittee on Emergency Communications, Preparedness, and Response. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  5. Secure Border Act of 2012

    THOMAS, 112th Congress

    Rep. Miller, Candice S. [R-MI-10

    2011-03-31

    06/04/2012 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  6. Secure Federal File Sharing Act

    THOMAS, 111th Congress

    Rep. Towns, Edolphus [D-NY-10

    2009-11-17

    03/25/2010 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  7. Classical noise, quantum noise and secure communication

    NASA Astrophysics Data System (ADS)

    Tannous, C.; Langlois, J.

    2016-01-01

    Secure communication based on message encryption might be performed by combining the message with controlled noise (called pseudo-noise) as performed in spread-spectrum communication used presently in Wi-Fi and smartphone telecommunication systems. Quantum communication based on entanglement is another route for securing communications as demonstrated by several important experiments described in this work. The central role played by the photon in unifying the description of classical and quantum noise as major ingredients of secure communication systems is highlighted and described on the basis of the classical and quantum fluctuation dissipation theorems.

  8. Secure communication via quantum illumination

    NASA Astrophysics Data System (ADS)

    Shapiro, Jeffrey H.; Zhang, Zheshen; Wong, Franco N. C.

    2014-10-01

    In the quantum illumination protocol for secure communication, Alice prepares entangled signal and idler beams via spontaneous parametric downconversion. She sends the signal beam to Bob, while retaining the idler. Bob imposes message modulation on the beam he receives from Alice, amplifies it, and sends it back to her. Alice then decodes Bob's information by making a joint quantum measurement on the light she has retained and the light she has received from him. The basic performance analysis for this protocol—which demonstrates its immunity to passive eavesdropping, in which Eve can only listen to Alice and Bob's transmissions—is reviewed, along with the results of its first proof-of-principle experiment. Further analysis is then presented, showing that secure data rates in excess of 1 Gbps may be possible over 20-km-long fiber links with technology that is available or under development. Finally, an initial scheme for thwarting active eavesdropping, in which Eve injects her own light into Bob's terminal, is proposed and analyzed.

  9. 47 CFR 32.4 - Communications Act.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Communications Act. 32.4 Section 32.4 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES UNIFORM SYSTEM OF ACCOUNTS FOR TELECOMMUNICATIONS COMPANIES Preface § 32.4 Communications Act. Attention is directed to...

  10. Framework for Flexible Security in Group Communications

    NASA Technical Reports Server (NTRS)

    McDaniel, Patrick; Prakash, Atul

    2006-01-01

    The Antigone software system defines a framework for the flexible definition and implementation of security policies in group communication systems. Antigone does not dictate the available security policies, but provides high-level mechanisms for implementing them. A central element of the Antigone architecture is a suite of such mechanisms comprising micro-protocols that provide the basic services needed by secure groups.

  11. Energy Independence and Security Act of 2007

    SciTech Connect

    2011-12-30

    An Act passed in 2007 to move the United States toward greater energy independence and security, to increase the production of clean renewable fuels, to protect consumers, to increase the efficiency of products, buildings, and vehicles, to promote research on and deploy greenhouse gas capture and storage options, and to improve the energy performance of the Federal Government, and for other purposes.

  12. Campus Security Act & Students' Right To Know.

    ERIC Educational Resources Information Center

    Ramirez, Gus

    In November 1990, the Students' Right to Know and Campus Security Act became law, requiring all postsecondary institutions that receive federal student aid to collect campus crime statistics and make timely reports to the campus community on crimes that are considered a threat to other students and other employees. The law also requires that…

  13. NASA's Advanced Communications Technology Satellite (ACTS)

    NASA Technical Reports Server (NTRS)

    Gedney, R. T.

    1983-01-01

    NASA recently restructured its Space Communications Program to emphasize the development of high risk communication technology useable in multiple frequency bands and to support a wide range of future communication needs. As part of this restructuring, the Advanced Communications Technology Satellite (ACTS) Project will develop and experimentally verify the technology associated with multiple fixed and scanning beam systems which will enable growth in communication satellite capacities and more effective utilization of the radio frequency spectrum. The ACTS requirements and operations as well as the technology significance for future systems are described.

  14. Secure communication using mesoscopic coherent states.

    PubMed

    Barbosa, Geraldo A; Corndorf, Eric; Kumar, Prem; Yuen, Horace P

    2003-06-06

    We demonstrate theoretically and experimentally that secure communication using intermediate-energy (mesoscopic) coherent states is possible. Our scheme is different from previous quantum cryptographic schemes in that a short secret key is explicitly used and in which quantum noise hides both the bit and the key. This encryption scheme allows optical amplification. New avenues are open to secure communications at high speeds in fiber-optic or free-space channels.

  15. Antigone: Implementing Policy in Secure Group Communication

    DTIC Science & Technology

    2000-01-01

    identification of a highly fault-tolerant key distribution scheme . Process group semantics are used to facilitate secure communication. A single session key...the group views1 constructed through membership protocols. The security context is not changed through shared session keys, but through the secure...is a secret key shared shared between the session leader and a single member. Once the group has been established, each member knows all the keys

  16. 17 CFR 229.801 - Securities Act industry guides.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Securities Act industry guides... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry guides. (a)-(b) (c) Guide 3. Statistical disclosure by bank holding companies. (d) Guide 4....

  17. 17 CFR 229.801 - Securities Act industry guides.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Securities Act industry guides... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry... and claim adjustment expenses of property-casualty insurance underwriters. (g) Guide 7. Description...

  18. 17 CFR 229.801 - Securities Act industry guides.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Securities Act industry guides... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry... and claim adjustment expenses of property-casualty insurance underwriters. (g) Guide 7. Description...

  19. 17 CFR 229.801 - Securities Act industry guides.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Securities Act industry guides... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry... and claim adjustment expenses of property-casualty insurance underwriters. (g) Guide 7. Description...

  20. Secure direct communication based on secret transmitting order of particles

    SciTech Connect

    Zhu Aidong; Zhang Shou; Xia Yan; Fan Qiubo

    2006-02-15

    We propose the schemes of quantum secure direct communication based on a secret transmitting order of particles. In these protocols, the secret transmitting order of particles ensures the security of communication, and no secret messages are leaked even if the communication is interrupted for security. This strategy of security for communication is also generalized to a quantum dialogue. It not only ensures the unconditional security but also improves the efficiency of communication.

  1. 75 FR 28046 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-002...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-19

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security Transportation Security Administration--002 Transportation Security Threat Assessment System System of Records AGENCY... accordance with the Privacy Act of 1974 the Department of Homeland Security proposes to update and...

  2. 78 FR 73868 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-09

    ... SECURITY Privacy Act of 1974; Department of Homeland Security Transportation Security Administration--DHS/TSA-001 Transportation Security Enforcement Record System System of Records AGENCY: Privacy Office, Department of Homeland Security. ACTION: Notice of Privacy Act System of Records Update. SUMMARY:...

  3. Secure quantum communication using classical correlated channel

    NASA Astrophysics Data System (ADS)

    Costa, D.; de Almeida, N. G.; Villas-Boas, C. J.

    2016-10-01

    We propose a secure protocol to send quantum information from one part to another without a quantum channel. In our protocol, which resembles quantum teleportation, a sender (Alice) and a receiver (Bob) share classical correlated states instead of EPR ones, with Alice performing measurements in two different bases and then communicating her results to Bob through a classical channel. Our secure quantum communication protocol requires the same amount of classical bits as the standard quantum teleportation protocol. In our scheme, as in the usual quantum teleportation protocol, once the classical channel is established in a secure way, a spy (Eve) will never be able to recover the information of the unknown quantum state, even if she is aware of Alice's measurement results. Security, advantages, and limitations of our protocol are discussed and compared with the standard quantum teleportation protocol.

  4. 17 CFR 230.167 - Communications in connection with certain registered offerings of asset-backed securities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Communications in connection with certain registered offerings of asset-backed securities. 230.167 Section 230.167 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF...

  5. 17 CFR 230.167 - Communications in connection with certain registered offerings of asset-backed securities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Communications in connection with certain registered offerings of asset-backed securities. 230.167 Section 230.167 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF...

  6. On the novel chaotic secure communication scheme design

    NASA Astrophysics Data System (ADS)

    Wang, B.; Zhong, S. M.; Dong, X. C.

    2016-10-01

    In this paper, the problem on the chaotic secure communication is discussed. First a new dual channel transmission mechanism is presented and used in secure communication scheme design, then the channel-switching techniques are adopted to further improve the security of information transmission. Finally some typical numerical simulations are carried out to demonstrate the effectiveness of the proposed secure communication scheme.

  7. Maximizing the security of chaotic optical communications.

    PubMed

    Hou, T T; Yi, L L; Yang, X L; Ke, J X; Hu, Y; Yang, Q; Zhou, P; Hu, W S

    2016-10-03

    The practical application of chaotic optical communications has been limited by two aspects: the difficulty in concealing the time delay - a critical security parameter in feedback chaotic systems, and the difficulty of significantly enlarging the key space without complicating the implementation. Here we propose an architecture to break the above limits. By introducing a frequency-dependent group delay module with frequency tuning resolution of 1 MHz into the chaotic feedback loop, we demonstrate excellent time delay concealment effect, and an additional huge key space of 1048 can be achieved at the same time. The effectiveness is proved by both numerical simulation and experiment. Besides, the proposed scheme is compatible with the existing commercial optical communication systems, thus pave the way for high-speed secure optical communications.

  8. 75 FR 18863 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-006...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-13

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security Transportation Security Administration--006 Correspondence and Matters Tracking Records AGENCY: Privacy Office, DHS. ] ACTION: Notice to alter an existing Privacy Act system of records. SUMMARY: In accordance with...

  9. 3 CFR - The Energy Independence and Security Act of 2007

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 3 The President 1 2010-01-01 2010-01-01 false The Energy Independence and Security Act of 2007 Presidential Documents Other Presidential Documents Memorandum of January 26, 2009 The Energy Independence and Security Act of 2007 Memorandum for the Secretary of Transportation the Administrator of the National Highway Traffic Safety Administration...

  10. Security model for picture archiving and communication systems.

    PubMed

    Harding, D B; Gac, R J; Reynolds, C T; Romlein, J; Chacko, A K

    2000-05-01

    The modern information revolution has facilitated a metamorphosis of health care delivery wrought with the challenges of securing patient sensitive data. To accommodate this reality, Congress passed the Health Insurance Portability and Accountability Act (HIPAA). While final guidance has not fully been resolved at this time, it is up to the health care community to develop and implement comprehensive security strategies founded on procedural, hardware and software solutions in preparation for future controls. The Virtual Radiology Environment (VRE) Project, a landmark US Army picture archiving and communications system (PACS) implemented across 10 geographically dispersed medical facilities, has addressed that challenge by planning for the secure transmission of medical images and reports over their local (LAN) and wide area network (WAN) infrastructure. Their model, which is transferable to general PACS implementations, encompasses a strategy of application risk and dataflow identification, data auditing, security policy definition, and procedural controls. When combined with hardware and software solutions that are both non-performance limiting and scalable, the comprehensive approach will not only sufficiently address the current security requirements, but also accommodate the natural evolution of the enterprise security model.

  11. Entanglement enhances security in quantum communication

    SciTech Connect

    Demkowicz-Dobrzanski, Rafal; Sen, Aditi; Sen, Ujjwal; Lewenstein, Maciej

    2009-07-15

    Secret sharing is a protocol in which a 'boss' wants to send a classical message secretly to two 'subordinates', such that none of the subordinates is able to know the message alone, while they can find it if they cooperate. Quantum mechanics is known to allow for such a possibility. We analyze tolerable quantum bit error rates in such secret sharing protocols in the physically relevant case when the eavesdropping is local with respect to the two channels of information transfer from the boss to the two subordinates. We find that using entangled encoding states is advantageous to legitimate users of the protocol. We therefore find that entanglement is useful for secure quantum communication. We also find that bound entangled states with positive partial transpose are not useful as a local eavesdropping resource. Moreover, we provide a criterion for security in secret sharing--a parallel of the Csiszar-Koerner criterion in single-receiver classical cryptography.

  12. Security aspects of RFID communication systems

    NASA Astrophysics Data System (ADS)

    Bîndar, Valericǎ; Popescu, Mircea; Bǎrtuşicǎ, Rǎzvan; Craciunescu, Razvan; Halunga, Simona

    2015-02-01

    The objective of this study is to provide an overview of basic technical elements and security risks of RFID communication systems and to analyze the possible threats arising from the use of RFID systems. A number of measurements are performed on a communication system including RFID transponder and the tag reader, and it has been determined that the uplink signal level is 62 dB larger than the average value of the noise at the distance of 1m from the tag, therefore the shielding effectiveness has to exceed this threshold. Next, the card has been covered with several shielding materials and measurements were carried, under similar conditions to test the recovery of compromising signals. A very simple protection measure to prevent unauthorized reading of the data stored on the card has been proposed, and some electromagnetic shielding materials have been proposed and tested.

  13. A new optical secure communication system

    NASA Astrophysics Data System (ADS)

    Luo, Fan; Fang, Nian; Huang, Zhaoming; Wang, Chunhua

    2007-11-01

    An optical secure communication system based on digital chaos and Polarization Shift Keying (PolSK) technology is proposed. In several selected PolSK schemes, states of polarization are partially or totally uniform on Poincare sphere. Different PolSK schemes are chosen according to the real-time chaos-based pseudo-random sequences to modulate original information in different periods of clock of the transmitter. In the receiver, according to the synchronous chaotic sequences, corresponding PolSK schemes are used to demodulate the information. Simulation is carried out by using the softwares of OptiSystem and Matlab. Some analysis results are presented. In the conclusion, this system works well in communication and has strong anti-attack capacity.

  14. Border Security, Cooperation, and Act Now Drug War Prevention Act

    THOMAS, 111th Congress

    Rep. Jackson-Lee, Sheila [D-TX-18

    2009-04-02

    05/26/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  15. Wireless sensor systems for sense/decide/act/communicate.

    SciTech Connect

    Berry, Nina M.; Cushner, Adam; Baker, James A.; Davis, Jesse Zehring; Stark, Douglas P.; Ko, Teresa H.; Kyker, Ronald D.; Stinnett, Regan White; Pate, Ronald C.; Van Dyke, Colin; Kyckelhahn, Brian

    2003-12-01

    After 9/11, the United States (U.S.) was suddenly pushed into challenging situations they could no longer ignore as simple spectators. The War on Terrorism (WoT) was suddenly ignited and no one knows when this war will end. While the government is exploring many existing and potential technologies, the area of wireless Sensor networks (WSN) has emerged as a foundation for establish future national security. Unlike other technologies, WSN could provide virtual presence capabilities needed for precision awareness and response in military, intelligence, and homeland security applications. The Advance Concept Group (ACG) vision of Sense/Decide/Act/Communicate (SDAC) sensor system is an instantiation of the WSN concept that takes a 'systems of systems' view. Each sensing nodes will exhibit the ability to: Sense the environment around them, Decide as a collective what the situation of their environment is, Act in an intelligent and coordinated manner in response to this situational determination, and Communicate their actions amongst each other and to a human command. This LDRD report provides a review of the research and development done to bring the SDAC vision closer to reality.

  16. Chemical Facility Security Improvement Act of 2013

    THOMAS, 113th Congress

    Rep. Jackson Lee, Sheila [D-TX-18

    2013-01-03

    02/12/2013 Referred to the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  17. Chemical Facility Security Improvement Act of 2009

    THOMAS, 111th Congress

    Rep. Jackson-Lee, Sheila [D-TX-18

    2009-01-07

    02/05/2009 Referred to the Subcommittee on Transportation Security and Infrastructure Protection. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  18. Security Clearance Reform Act of 2014

    THOMAS, 113th Congress

    Rep. Lynch, Stephen F. [D-MA-8

    2014-02-10

    03/20/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  19. Air Cargo Security Act of 2010

    THOMAS, 111th Congress

    Rep. Markey, Edward J. [D-MA-7

    2010-09-29

    11/01/2010 Referred to the Subcommittee on Transportation Security and Infrastructure Protection. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  20. Expansion of National Security Agency Oversight Act

    THOMAS, 113th Congress

    Rep. Carney, John C., Jr. [D-DE-At Large

    2014-01-15

    03/20/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. Maritime Infrastructure Security and Counterterrorism Act

    THOMAS, 111th Congress

    Rep. Cao, Anh "Joseph" [R-LA-2

    2010-07-01

    07/14/2010 Referred to the Subcommittee on Transportation Security and Infrastructure Protection. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  2. General Aviation Security Enhancement Act of 2009

    THOMAS, 111th Congress

    Rep. Dent, Charles W. [R-PA-15

    2009-06-26

    07/13/2009 Referred to the Subcommittee on Transportation Security and Infrastructure Protection. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  3. Border Security Results Act of 2013

    THOMAS, 113th Congress

    Sen. Cornyn, John [R-TX

    2013-04-09

    04/09/2013 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  4. Border Security Enforcement Act of 2010

    THOMAS, 111th Congress

    Sen. McCain, John [R-AZ

    2010-05-07

    05/07/2010 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  5. Border Security Enforcement Act of 2011

    THOMAS, 112th Congress

    Sen. McCain, John [R-AZ

    2011-04-13

    04/13/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  6. Textile Enforcement and Security Act of 2010

    THOMAS, 111th Congress

    Rep. Kissell, Larry [D-NC-8

    2010-05-25

    09/20/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  7. Secure electronic commerce communication system based on CA

    NASA Astrophysics Data System (ADS)

    Chen, Deyun; Zhang, Junfeng; Pei, Shujun

    2001-07-01

    In this paper, we introduce the situation of electronic commercial security, then we analyze the working process and security for SSL protocol. At last, we propose a secure electronic commerce communication system based on CA. The system provide secure services such as encryption, integer, peer authentication and non-repudiation for application layer communication software of browser clients' and web server. The system can implement automatic allocation and united management of key through setting up the CA in the network.

  8. Report: Fiscal Year 2010 Federal Information Security Management Act Report

    EPA Pesticide Factsheets

    Report #11-P-0017, November 16, 2010. Attached is the Office of Inspector General’s (OIG’s) Fiscal Year 2010 Federal Information Security Management Act (FISMA) Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  9. Lightweight and scalable secure communication in VANET

    NASA Astrophysics Data System (ADS)

    Zhu, Xiaoling; Lu, Yang; Zhu, Xiaojuan; Qiu, Shuwei

    2015-05-01

    To avoid a message to be tempered and forged in vehicular ad hoc network (VANET), the digital signature method is adopted by IEEE1609.2. However, the costs of the method are excessively high for large-scale networks. The paper efficiently copes with the issue with a secure communication framework by introducing some lightweight cryptography primitives. In our framework, point-to-point and broadcast communications for vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V) are studied, mainly based on symmetric cryptography. A new issue incurred is symmetric key management. Thus, we develop key distribution and agreement protocols for two-party key and group key under different environments, whether a road side unit (RSU) is deployed or not. The analysis shows that our protocols provide confidentiality, authentication, perfect forward secrecy, forward secrecy and backward secrecy. The proposed group key agreement protocol especially solves the key leak problem caused by members joining or leaving in existing key agreement protocols. Due to aggregated signature and substitution of XOR for point addition, the average computation and communication costs do not significantly increase with the increase in the number of vehicles; hence, our framework provides good scalability.

  10. Homeland Security Transparency Act of 2009

    THOMAS, 111th Congress

    Rep. Weiner, Anthony D. [D-NY-9

    2009-01-21

    02/05/2009 Referred to the Subcommittee on Emergency Communications, Preparedness, and Response. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  11. Security in Bonding Act of 2012

    THOMAS, 112th Congress

    Rep. Hanna, Richard L. [R-NY-24

    2011-12-01

    05/16/2012 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  12. Safe and Secure America Act of 2009

    THOMAS, 111th Congress

    Rep. Smith, Lamar [R-TX-21

    2009-03-12

    04/27/2009 Referred to the Subcommittee on Crime, Terrorism, and Homeland Security. (All Actions) Notes: For further action, see H.R.3961, which became Public Law 111-141 on 2/27/2010. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  13. Federal Information Security Amendments Act of 2012

    THOMAS, 112th Congress

    Rep. Issa, Darrell E. [R-CA-49

    2012-03-26

    05/07/2012 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  14. Gerardo Hernandez Airport Security Act of 2014

    THOMAS, 113th Congress

    Rep. Hudson, Richard [R-NC-8

    2014-06-05

    07/23/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  15. Federal Information Security Amendments Act of 2013

    THOMAS, 113th Congress

    Rep. Issa, Darrell E. [R-CA-49

    2013-03-14

    04/17/2013 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Notes: For further action, see S.2521, which became Public Law 113-283 on 12/18/2014. Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  16. Strengthening Domestic Nuclear Security Act of 2014

    THOMAS, 113th Congress

    Rep. Meehan, Patrick [R-PA-7

    2014-09-18

    12/03/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  17. Random digital encryption secure communication system

    NASA Technical Reports Server (NTRS)

    Doland, G. D. (Inventor)

    1982-01-01

    The design of a secure communication system is described. A product code, formed from two pseudorandom sequences of digital bits, is used to encipher or scramble data prior to transmission. The two pseudorandom sequences are periodically changed at intervals before they have had time to repeat. One of the two sequences is transmitted continuously with the scrambled data for synchronization. In the receiver portion of the system, the incoming signal is compared with one of two locally generated pseudorandom sequences until correspondence between the sequences is obtained. At this time, the two locally generated sequences are formed into a product code which deciphers the data from the incoming signal. Provision is made to ensure synchronization of the transmitting and receiving portions of the system.

  18. Secure communication based on spatiotemporal chaos

    NASA Astrophysics Data System (ADS)

    Ren, Hai-Peng; Bai, Chao

    2015-08-01

    In this paper, we propose a novel approach to secure communication based on spatiotemporal chaos. At the transmitter end, the state variables of the coupled map lattice system are divided into two groups: one is used as the key to encrypt the plaintext in the N-shift encryption function, and the other is used to mix with the output of the N-shift function to further confuse the information to transmit. At the receiver end, the receiver lattices are driven by the received signal to synchronize with the transmitter lattices and an inverse procedure of the encoding is conducted to decode the information. Numerical simulation and experiment based on the TI TMS320C6713 Digital Signal Processor (DSP) show the feasibility and the validity of the proposed scheme. Project supported by the National Natural Science Foundation of China (Grant No. 61172070) and the Funds from the Science and Technology Innovation Team of Shaanxi Province, China (Grant No. 2013CKT-04).

  19. Advanced Shipboard Communications Demonstrations with ACTS

    NASA Technical Reports Server (NTRS)

    Axford, Roy A.; Jedrey, Thomas C.; Rupar, Michael A.

    2000-01-01

    For ships at sea. satellites provide the only option for high data rate (HDR), long haul communications. Furthermore the demand for HDR satellite communications (SATCOM) for military and commercial ships. and other offshore platforms is increasing. Presently the bulk of this maritime HDR SATCOM connectivity is provided via C-band and X-band. However, the shipboard antenna sizes required to achieve a data rate of, say T 1 (1.544 Mbps) with present C-/X-band SATCOM systems range from seven to ten feet in diameter. This limits the classes of ships to which HDR services can be provided to those which are large enough to accommodate the massive antennas. With its high powered K/Ka-band spot beams, the National Aeronautics and Space Administration's (NASA) Advanced Communications Technology Satellite (ACTS) was able to provide T I and higher rate services to ships at sea using much smaller shipboard antennas. This paper discusses three shipboard HDR SATCOM demonstrations that were conducted with ACTS between 1996 and 1998. The first demonstration involved a 2 Mbps link provided to the seismic survey ship MN Geco Diamond equipped with a 16-inch wide, 4.5-inch tall, mechanically steered slotted waveguide array antenna developed by the Jet Propulsion Laboratory. In this February 1996 demonstration ACTS allowed supercomputers ashore to process Geco Diamond's voluminous oceanographic seismic data in near real time. This capability allowed the ship to adjust its search parameters on a daily basis based on feedback from the processed data, thereby greatly increasing survey efficiency. The second demonstration was conducted on the US Navy cruiser USS Princeton (CG 59) with the same antenna used on Geco Diamond. Princeton conducted a six-month (January-July 1997) Western Hemisphere solo deployment during which time T1 connectivity via ACTS provided the ship with a range of valuable tools for operational, administrative and quality-of-life tasks. In one instance, video

  20. Secure wireless communications via cooperative transmitting.

    PubMed

    Stojanovski, Toni Draganov; Marina, Ninoslav

    2014-01-01

    Information-theoretic secrecy is combined with cryptographic secrecy to create a secret-key exchange protocol for wireless networks. A network of transmitters, which already have cryptographically secured channels between them, cooperate to exchange a secret key with a new receiver at a random location, in the presence of passive eavesdroppers at unknown locations. Two spatial point processes, homogeneous Poisson process and independent uniformly distributed points, are used for the spatial distributions of transmitters and eavesdroppers. We analyse the impact of the number of cooperating transmitters and the number of eavesdroppers on the area fraction where secure communication is possible. Upper bounds on the probability of existence of positive secrecy between the cooperating transmitters and the receiver are derived. The closeness of the upper bounds to the real value is then estimated by means of numerical simulations. Simulations also indicate that a deterministic spatial distribution for the transmitters, for example, hexagonal and square lattices, increases the probability of existence of positive secrecy capacity compared to the random spatial distributions. For the same number of friendly nodes, cooperative transmitting provides a dramatically larger secrecy region than cooperative jamming and cooperative relaying.

  1. Social Security Child Protection Act of 2011

    THOMAS, 112th Congress

    Rep. Marchant, Kenny [R-TX-24

    2011-09-22

    09/28/2011 Referred for a period ending not later than September 28, 2011, (or for a later time if the Chairman so designates) to the Subcommittee on Social Security, in each case for consideration of such provisions as fall within the jurisdiction of the subcommittee concerned. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  2. Controlled Bidirectional Quantum Secure Direct Communication

    PubMed Central

    Chou, Yao-Hsin; Lin, Yu-Ting; Zeng, Guo-Jyun; Lin, Fang-Jhu; Chen, Chi-Yuan

    2014-01-01

    We propose a novel protocol for controlled bidirectional quantum secure communication based on a nonlocal swap gate scheme. Our proposed protocol would be applied to a system in which a controller (supervisor/Charlie) controls the bidirectional communication with quantum information or secret messages between legitimate users (Alice and Bob). In this system, the legitimate users must obtain permission from the controller in order to exchange their respective quantum information or secret messages simultaneously; the controller is unable to obtain any quantum information or secret messages from the decoding process. Moreover, the presence of the controller also avoids the problem of one legitimate user receiving the quantum information or secret message before the other, and then refusing to help the other user decode the quantum information or secret message. Our proposed protocol is aimed at protecting against external and participant attacks on such a system, and the cost of transmitting quantum bits using our protocol is less than that achieved in other studies. Based on the nonlocal swap gate scheme, the legitimate users exchange their quantum information or secret messages without transmission in a public channel, thus protecting against eavesdroppers stealing the secret messages. PMID:25006596

  3. 49 CFR 236.1033 - Communications and security requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Communications and security requirements. 236.1033... Train Control Systems § 236.1033 Communications and security requirements. (a) All wireless... electing to also provide cryptographic message confidentiality shall: (1) Comply with the same...

  4. Secure direct communication with a quantum one-time pad

    SciTech Connect

    Deng Fuguo; Long Guilu

    2004-05-01

    Quantum secure direct communication is the direct communication of secret messages without first producing a shared secret key. It may be used in some urgent circumstances. Here we propose a quantum secure direct communication protocol using single photons. The protocol uses batches of single photons prepared randomly in one of four different states. These single photons serve as a one-time pad which is used directly to encode the secret messages in one communication process. We also show that it is unconditionally secure. The protocol is feasible with present-day technique.

  5. New Opportunities with the Advanced Communications Technology Satellite (ACTS)

    NASA Technical Reports Server (NTRS)

    Bauer, Robert

    1998-01-01

    Various issues associated with the Advanced Communications Technology Satellite (ACTS) are presented in viewgraph form. Specific topics include: 1) ACTS program review; 2) Spot beam locations; 3) Key ACTS technologies; 4) ACTS accomplishments; 5) Experiments operations; 6) Inclined orbit opportunity, mission and impact; 7) Modifications summary; 8) Experiment opportunity, categories, processes; and 9) Recent and ongoing activity.

  6. 75 FR 11627 - Order Granting Temporary Exemptions From Certain Government Securities Act Provisions and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-11

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF THE TREASURY... Provisions of the Government Securities Act and Treasury's Government Securities Act Regulations in... customer CDS transactions that reference government securities. Treasury is also granting a...

  7. ACTS Multibeam Communications Package - Technology for the 1990S

    NASA Technical Reports Server (NTRS)

    Graebner, John C.; Cashman, William F.

    1990-01-01

    To maintain its competitive position in the 1990s, satellite communications must evolve to provide new services and to reduce the costs of supplying existing services. NASA's Advanced Communications Technology Satellite (ACTS) program is directed toward developing the technology base that will support this evolution. The ACTS communications payload is optimized for digital communications using a time-division multiple access format. Scanning spot-beam antennas provide high-performance on-demand service to the earth communication stations. On-board processing and switching allow full connectivity in a single-hop network architecture. ACTS employs Ka-band (30/20 GHz) links for communications traffic and includes techniques for mitigating rain fades. Scheduled to be launched by a Space Shuttle in 1992, ACTS will provide in-orbit technology verification and support experimental communications networks for up to four years.

  8. A secure communications infrastructure for high-performance distributed computing

    SciTech Connect

    Foster, I.; Koenig, G.; Tuecke, S.

    1997-08-01

    Applications that use high-speed networks to connect geographically distributed supercomputers, databases, and scientific instruments may operate over open networks and access valuable resources. Hence, they can require mechanisms for ensuring integrity and confidentially of communications and for authenticating both users and resources. Security solutions developed for traditional client-server applications do not provide direct support for the program structures, programming tools, and performance requirements encountered in these applications. The authors address these requirements via a security-enhanced version of the Nexus communication library; which they use to provide secure versions of parallel libraries and languages, including the Message Passing Interface. These tools permit a fine degree of control over what, where, and when security mechanisms are applied. In particular, a single application can mix secure and nonsecure communication, allowing the programmer to make fine-grained security/performance tradeoffs. The authors present performance results that quantify the performance of their infrastructure.

  9. The Indian National Food Security Act, 2013: a commentary.

    PubMed

    Varadharajan, Kiruba Sankar; Thomas, Tinku; Kurpad, Anura

    2014-06-01

    The National Food Security Act (NFSA) 2013, passed recently by the Indian Parliament, aims to ensure food security in India, chiefly by providing cereals at subsidized prices through the Targeted Public Distribution System (TPDS) for about two-thirds of households. The predominant line of criticism of the NFSA has been the costs of such an ambitious rights-based approach in the context of decelerating economic growth and growing fiscal deficits. We argue that the food subsidy has been increasing through the last few decades and is set to climb even higher with this act but that the incremental costs, at about 0.2% of gross domestic product, are not as high as claimed. Further, recent evidence of increasing utilization of the TPDS and decreasing corruption add credence to the act's premise that significant income transfers to poor households can be achieved, thereby promoting food security as well as dietary diversity. Several concerns remain to be addressed in the design and implementation of the act, including its proposed coverage, a cereal-centric approach, the identification of beneficiaries, and its adaptability at the state level. If these are resolved effectively, the act can prove to be a significant step forward in India's long-drawn-out battle against undernutrition and food insecurity. Finally, the NFSA also provides a fresh opportunity to reform and strengthen the TPDS, which has been an integral component of India's strategy to achieve food security at the national level.

  10. Electronic Communications Privacy Act Amendments Act of 2013

    THOMAS, 113th Congress

    Rep. Salmon, Matt [R-AZ-5

    2013-05-07

    06/14/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  11. Secure communications in the presence of pervasive deceit

    SciTech Connect

    Simmons, G.J.

    1980-01-01

    The functions of secrecy, identification of the transmitter and of authentication of messages, and combinations of these, are in principle all achievable with either symmetric or asymmetric cryptosystems. Since secure communications depend on authenticated data exchanges between and/or authenticated actions by some of the parties to the communication, the fundamentals of authentication using symmetric or asymmetric techniques are developed. The surprising conclusion is that they differ only in the secure exchanges required to achieve further secure communications. The problem of authenticating a public-key directory is discussed in the light of these findings.

  12. Mothers' Ability To Identify Infants' Communicative Acts Consistently.

    ERIC Educational Resources Information Center

    Meadows, Denis; Elias, Gordon; Bain, John

    2000-01-01

    Investigated the ability of 35 mothers to identify consistently what they perceived to be communicative acts by infants at three ages (6 months, 9 months, and 1 year). Comparisons of the mothers coded records indicated that they were able to identify infants' communicative acts consistently at each age. (Author/VWL)

  13. Cryptanalysis and improvement of quantum secure communication network protocol with entangled photons for mobile communications

    NASA Astrophysics Data System (ADS)

    Gao, Gan

    2014-12-01

    Recently, a communication protocol called controlled bidirectional quantum secret direct communication for mobile networks was proposed by Chou et al (2014 Mobile Netw. Appl. 19 121). We study the security of the proposed communication protocol and find that it is not secure. The controller, Telecom Company, may eavesdrop secret messages from mobile devices without being detected. Finally, we give a possible improvement of the communication protocol.

  14. 17 CFR 230.157 - Small entities under the Securities Act for purposes of the Regulatory Flexibility Act.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Small entities under the Securities Act for purposes of the Regulatory Flexibility Act. 230.157 Section 230.157 Commodity and... General § 230.157 Small entities under the Securities Act for purposes of the Regulatory Flexibility...

  15. 17 CFR 230.157 - Small entities under the Securities Act for purposes of the Regulatory Flexibility Act.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Small entities under the Securities Act for purposes of the Regulatory Flexibility Act. 230.157 Section 230.157 Commodity and... General § 230.157 Small entities under the Securities Act for purposes of the Regulatory Flexibility...

  16. 17 CFR 230.157 - Small entities under the Securities Act for purposes of the Regulatory Flexibility Act.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Small entities under the Securities Act for purposes of the Regulatory Flexibility Act. 230.157 Section 230.157 Commodity and... General § 230.157 Small entities under the Securities Act for purposes of the Regulatory Flexibility...

  17. 17 CFR 230.157 - Small entities under the Securities Act for purposes of the Regulatory Flexibility Act.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Small entities under the Securities Act for purposes of the Regulatory Flexibility Act. 230.157 Section 230.157 Commodity and... General § 230.157 Small entities under the Securities Act for purposes of the Regulatory Flexibility...

  18. 17 CFR 230.157 - Small entities under the Securities Act for purposes of the Regulatory Flexibility Act.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Small entities under the Securities Act for purposes of the Regulatory Flexibility Act. 230.157 Section 230.157 Commodity and... General § 230.157 Small entities under the Securities Act for purposes of the Regulatory Flexibility...

  19. A primer: Social Security Act programs to assist the disabled.

    PubMed

    This summary is designed for those who are unfamiliar with the many current features of federally sponsored disability and health programs under the Social Security Act, including the Social Security Disability Insurance (DI) program, the Supplemental Security Income (SSI) program, Medicare, and Medicaid. It provides an overview of the provisions and operations of the programs. Several SSA resources were consulted in compiling the material: Social Security Handbook (available at http://www.socialsecurity.gov/ OP_Home/handbook/handbook.html); Annual Statistical Supplement to the Social Security Bulletin, 2005 (available at http://www.socialsecurity.gov/policy/docs/statcomps/supplement/2005); Trends in the Social Security and Supplemental Security Income Disability Programs, by John Kearney and L. Scott Muller (available at http://www.socialsecurity.gov/policy/docs/chartbooks/disability trends); and Disability program sections of the Social Security Online Web pages (available at http://www.socialsecurity.gov/disability). This summary is intended to assist in understanding the features of these federal disability and health programs. The descriptions are intended for explanatory purposes and do not provide guidance in administrative or claimant actions.

  20. 77 FR 72814 - Information Collection; Secure Rural Schools Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-06

    ... Forest Service Information Collection; Secure Rural Schools Act AGENCY: Forest Service, USDA. ACTION... announces the intention of the Forest Service to seek approval to renew and revise a currently approved... Forest Service is seeking comments from all interested individuals and organizations on renewal...

  1. Public Law 96-294: Energy Security Act. [Annotated text

    SciTech Connect

    Not Available

    1980-01-01

    An annotated text of the Energy Security Act (P.L. 96-294) is presented. The Act is intended to reduce US dependence on imported energy and protect against both economic and energy-supply disruptions by developing commercial-scale synthetic and alternative fuels. Major divisions of the Act are: Title I - Synthetic Fuel; Title II - Biomass Energy Alcohol Fuels; Title III - Energy Targets; Title IV - Renewable Energy Initiatives; Title V - Solar Energy and Energy Conservation; Title VI - Geothermal Energy; and title VII - Acid Precipitation Program and Carbon Dioxide Study. (DCK)

  2. Speech acts, communication problems, and fighter pilot team performance.

    PubMed

    Svensson, Jonathan; Andersson, Jan

    Two aspects of team communication, speech acts and communication problems, and their relation to team performance in a team air combat simulator were studied. The purpose was to enhance the understanding of how team performance is related to team communication. Ten Swedish fighter pilots and four fighter controllers of varying experience participated. Data were collected during fighter simulator training involving four pilots and one fighter controller in each of two teams. Speech acts were collapsed over seven categories and communication problems over five categories. Communication was studied from two perspectives: critical situation outcome and mission outcome. Some problems were closely related to particular speech acts. Speech act frequency, especially meta-communications and tactics, was highest when winning. However, the timing of tactics in critical situations needs further research. Communication problem frequency was highest for runs which ended equally. The most common problem was simultaneous speech, possibly because of the simulator radio system. The number of speech acts was related to enhanced performance but in a complex manner. Thus in order to work efficiently team members need to communicate, but to communicate sufficiently and at appropriate times. This work has applications for fighter pilot and controller team training and the development of communication standards.

  3. Sensor based framework for secure multimedia communication in VANET.

    PubMed

    Rahim, Aneel; Khan, Zeeshan Shafi; Bin Muhaya, Fahad T; Sher, Muhammad; Kim, Tai-Hoon

    2010-01-01

    Secure multimedia communication enhances the safety of passengers by providing visual pictures of accidents and danger situations. In this paper we proposed a framework for secure multimedia communication in Vehicular Ad-Hoc Networks (VANETs). Our proposed framework is mainly divided into four components: redundant information, priority assignment, malicious data verification and malicious node verification. The proposed scheme jhas been validated with the help of the NS-2 network simulator and the Evalvid tool.

  4. Sensor Based Framework for Secure Multimedia Communication in VANET

    PubMed Central

    Rahim, Aneel; Khan, Zeeshan Shafi; Bin Muhaya, Fahad T.; Sher, Muhammad; Kim, Tai-Hoon

    2010-01-01

    Secure multimedia communication enhances the safety of passengers by providing visual pictures of accidents and danger situations. In this paper we proposed a framework for secure multimedia communication in Vehicular Ad-Hoc Networks (VANETs). Our proposed framework is mainly divided into four components: redundant information, priority assignment, malicious data verification and malicious node verification. The proposed scheme jhas been validated with the help of the NS-2 network simulator and the Evalvid tool. PMID:22163462

  5. Security Analysis of Accountable Anonymous Group Communication in Dissent

    DTIC Science & Technology

    2013-01-31

    Yale University Department of Computer Science Security Analysis of Accountable Anonymous Group Communication in Dissent Ewa Syta Aaron Johnson Henry...00-00-2013 4. TITLE AND SUBTITLE Security Analysis of Accountable Anonymous Group Communication in Dissent 5a. CONTRACT NUMBER 5b. GRANT NUMBER...are difficult to protect against traffic analysis, and accountable voting protocols are unsuited to general anonymous messaging. DISSENT, originally

  6. 75 FR 8088 - Privacy Act of 1974; Department of Homeland Security/ALL-023 Personnel Security Management System...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL--023 Personnel... to update and reissue Department of Homeland Security/ALL--023 Personnel Security Management System... separate from Department of Homeland Security/ALL 026--Personal Identity Verification Management System...

  7. Security guard at Smithsonian not protected by Rehab Act.

    PubMed

    1998-01-23

    [Name removed], an HIV-positive security guard at the Smithsonian Institution, sued the institution and two supervisors, alleging they violated the Rehabilitation Act, Title VII of the Civil Rights act, State and city human rights laws, and the Federal Tort Claims Act. [Name removed] claims he was harassed by supervisors because of his HIV status and ethnicity, was refused time off for medical care, retaliated against due to prior complaints, and denied training opportunities because he is HIV-positive. U.S. District Judge Peter K. Leisure ruled that [name removed] could not prevail under Section 791 of the Rehabilitation Act because the Smithsonian does not qualify as an executive agency. Leisure also found that [name removed] could neither claim retaliation under Title VII nor invasion of privacy under the Federal Tort Claims Act.

  8. 49 CFR 236.1033 - Communications and security requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., INSPECTION, MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Positive Train Control Systems § 236.1033 Communications and security requirements. (a) All wireless... exceeding the security strength required to protect the data as defined in the railroad's PTCSP and...

  9. 49 CFR 236.1033 - Communications and security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., INSPECTION, MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Positive Train Control Systems § 236.1033 Communications and security requirements. (a) All wireless... exceeding the security strength required to protect the data as defined in the railroad's PTCSP and...

  10. 78 FR 10623 - Privacy Act of 1974; Department of Homeland Security Immigration and Customs Enforcement-007...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-14

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security Immigration and... Office, Department of Homeland Security. ACTION: Notice of modification to existing Privacy Act System of Records. SUMMARY: In accordance with the Privacy Act of 1974, the Department of Homeland Security,...

  11. 17 CFR 230.167 - Communications in connection with certain registered offerings of asset-backed securities.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... § 230.415, ABS informational and computational material regarding such securities used after the... number for the related registration statement; (iii) A statement that such communication is ABS informational and computational material used in reliance on Securities Act Rule 167 (§ 230.167); and (iv)...

  12. 17 CFR 230.167 - Communications in connection with certain registered offerings of asset-backed securities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... § 230.415, ABS informational and computational material regarding such securities used after the... number for the related registration statement; (iii) A statement that such communication is ABS informational and computational material used in reliance on Securities Act Rule 167 (§ 230.167); and (iv)...

  13. 17 CFR 230.167 - Communications in connection with certain registered offerings of asset-backed securities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... § 230.415, ABS informational and computational material regarding such securities used after the... number for the related registration statement; (iii) A statement that such communication is ABS informational and computational material used in reliance on Securities Act Rule 167 (§ 230.167); and (iv)...

  14. Online Communications and Geolocation Protection Act

    THOMAS, 113th Congress

    Rep. Lofgren, Zoe [D-CA-19

    2013-03-06

    04/08/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, And Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  15. Novel technology for enhanced security and trust in communication networks

    NASA Astrophysics Data System (ADS)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit; Jannson, Tomasz

    2011-06-01

    A novel technology that significantly enhances security and trust in wireless and wired communication networks has been developed. It is based on integration of a novel encryption mechanism and novel data packet structure with enhanced security tools. This novel data packet structure results in an unprecedented level of security and trust, while at the same time reducing power consumption and computing/communication overhead in networks. As a result, networks are provided with protection against intrusion, exploitation, and cyber attacks and posses self-building, self-awareness, self-configuring, self-healing, and self-protecting intelligence.

  16. A Secure Communication Suite for Underwater Acoustic Sensor Networks

    PubMed Central

    Dini, Gianluca; Duca, Angelica Lo

    2012-01-01

    In this paper we describe a security suite for Underwater Acoustic Sensor Networks comprising both fixed and mobile nodes. The security suite is composed of a secure routing protocol and a set of cryptographic primitives aimed at protecting the confidentiality and the integrity of underwater communication while taking into account the unique characteristics and constraints of the acoustic channel. By means of experiments and simulations based on real data, we show that the suite is suitable for an underwater networking environment as it introduces limited, and sometimes negligible, communication and power consumption overhead. PMID:23202204

  17. Secure Communication via a Recycling of Attenuated Classical Signals

    NASA Astrophysics Data System (ADS)

    Smith, A. Matthew

    2017-01-01

    We describe a simple method of interleaving a classical and quantum signal in a secure communication system at a single wavelength. The system transmits data encrypted via a one-time pad on a classical signal and produces a single-photon reflection of the encrypted signal. This attenuated signal can be used to observe eavesdroppers and produce fresh secret bits. The system can be secured against eavesdroppers, detect simple tampering or classical bit errors, produces more secret bits than it consumes, and does not require any entanglement or complex wavelength division multiplexing, thus, making continuous secure two-way communication via one-time pads practical.

  18. Secure Communication via a Recycling of Attenuated Classical Signals

    DOE PAGES

    Smith, IV, Amos M.

    2017-01-12

    We describe a simple method of interleaving a classical and quantum signal in a secure communication system at a single wavelength. The system transmits data encrypted via a one-time pad on a classical signal and produces a single-photon reflection of the encrypted signal. This attenuated signal can be used to observe eavesdroppers and produce fresh secret bits. The system can be secured against eavesdroppers, detect simple tampering or classical bit errors, produces more secret bits than it consumes, and does not require any entanglement or complex wavelength division multiplexing, thus, making continuous secure two-way communication via one-time pads practical.

  19. Communicative Competence, Speech Acts and Discourse Analysis.

    ERIC Educational Resources Information Center

    McCoy, Terry; And Others

    Three papers intended as preliminary studies to bilingual professional curriculum development are included. "Speech Acts and Discourse Analysis," by Terry McCoy, represents an introduction to discourse analysis as a tool for the language teacher. The notion of a typology of speech acts is set forth, and models of discourse analysis by…

  20. The Advanced Communications Technology Satellite (ACTS) capabilities for serving science

    NASA Technical Reports Server (NTRS)

    Meyer, Thomas R.

    1990-01-01

    Results of research on potential science applications of the NASA Advanced Communications Technology Satellite (ACTS) are presented. Discussed here are: (1) general research on communications related issues; (2) a survey of science-related activities and programs in the local area; (3) interviews of selected scientists and associated telecommunications support personnel whose projects have communications requirements; (4) analysis of linkages between ACTS functionality and science user communications activities and modes of operation; and (5) an analysis of survey results and the projection of conclusions to a national scale.

  1. Three-step semiquantum secure direct communication protocol

    NASA Astrophysics Data System (ADS)

    Zou, XiangFu; Qiu, DaoWen

    2014-09-01

    Quantum secure direct communication is the direct communication of secret messages without need for establishing a shared secret key first. In the existing schemes, quantum secure direct communication is possible only when both parties are quantum. In this paper, we construct a three-step semiquantum secure direct communication (SQSDC) protocol based on single photon sources in which the sender Alice is classical. In a semiquantum protocol, a person is termed classical if he (she) can measure, prepare and send quantum states only with the fixed orthogonal quantum basis {|0>, |1>}. The security of the proposed SQSDC protocol is guaranteed by the complete robustness of semiquantum key distribution protocols and the unconditional security of classical one-time pad encryption. Therefore, the proposed SQSDC protocol is also completely robust. Complete robustness indicates that nonzero information acquired by an eavesdropper Eve on the secret message implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. In the proposed protocol, we suggest a method to check Eves disturbing in the doves returning phase such that Alice does not need to announce publicly any position or their coded bits value after the photons transmission is completed. Moreover, the proposed SQSDC protocol can be implemented with the existing techniques. Compared with many quantum secure direct communication protocols, the proposed SQSDC protocol has two merits: firstly the sender only needs classical capabilities; secondly to check Eves disturbing after the transmission of quantum states, no additional classical information is needed.

  2. Security Policy for a Generic Space Exploration Communication Network Architecture

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Sheehe, Charles J.; Vaden, Karl R.

    2016-01-01

    This document is one of three. It describes various security mechanisms and a security policy profile for a generic space-based communication architecture. Two other documents accompany this document- an Operations Concept (OpsCon) and a communication architecture document. The OpsCon should be read first followed by the security policy profile described by this document and then the architecture document. The overall goal is to design a generic space exploration communication network architecture that is affordable, deployable, maintainable, securable, evolvable, reliable, and adaptable. The architecture should also require limited reconfiguration throughout system development and deployment. System deployment includes subsystem development in a factory setting, system integration in a laboratory setting, launch preparation, launch, and deployment and operation in space.

  3. A protocol for secure communication in large distributed systems

    NASA Astrophysics Data System (ADS)

    Anderson, D. P.; Ferrari, D.; Rangan, P. V.; Sartirana, B.

    1987-01-01

    A mechanism for secure communication in large distributed systems is proposed. The mechanism, called Authenticated Datagram Protocol (ADP), provides message authentication and, optionally, privacy of data. ADP is a host-to-host datagram protocol, positioned below the transport layer; it uses public-key encryption to establish secure channels between hosts and to authenticate owners, and single-key encryption for communication over a channel and to ensure privacy of the messages. ADP is shown to satisfy the main security requirements of large distributed systems, to provide end-to-end security in spite of its relatively low level, and to exhibit several advantages over schemes in which security mechanisms are at a higher level. The results of a trace-driven measurement study of ADP performance show that its throughput and latency are acceptable even within the limitations of today's technology, provided single-key encryption/decryption can be done in hardware.

  4. Securing a biomedical communications future: thinking strategically.

    PubMed

    Stein, D

    1985-11-01

    Ensuring continued growth and viability of the biomedical communication function has become a critical task of the biomedical communications director. Thinking strategically is a cognitive process which assists a director in visualizing programs and tactics which meet clients needs, creates competitive advantages for the biomedical communications unit and builds on existing unit strengths. Thinking strategically can be divided into five phases: strategic vision, strategy development, strategic plan implementation, strategic plan dissemination, and strategic plan evaluation. Each sequence leads the biomedical communications director through a process designed to increase the effectiveness of the biomedical unit and to meet the challenges posed by an environment characterized by diminished financial, material, and human resources as well as respond to threats and opportunities posed by increased competition in the biomedical communications product and marketplace.

  5. Review of the 2015 Drug Supply Chain Security Act.

    PubMed

    Brechtelsbauer, Erich D; Pennell, Benjamin; Durham, Mary; Hertig, John B; Weber, Robert J

    2016-06-01

    The integrity of the pharmaceutical supply chain is threatened by medication counterfeiting, importation of unapproved and substandard drugs, and grey markets - all of which have the potential to distribute drug products with the potential for serious harm. On November 27, 2013, President Obama signed into law Title II of the Drug Quality and Security Act, now known as the Drug Supply Chain Security Act (DSCSA). Over the next 10 years, the DSCSA will require the pharmaceutical supply chain to implement medication tracking and tracing; serialization, verification, and detection of suspicious products; and strict guidelines for wholesaler licensing and reporting. This article reviews the important aspects of the DSCSA and outlines the role of health-system pharmacy leaders in ensuring compliance to the DSCSA. By verifying that medication supplies are free from adulteration and tampering, the DSCSA serves as a foundational law to ensure quality in providing patient-centered pharmacy services.

  6. Advanced Communication Technology Satellite (ACTS) multibeam antenna technology verification experiments

    NASA Technical Reports Server (NTRS)

    Acosta, Roberto J.; Larko, Jeffrey M.; Lagin, Alan R.

    1992-01-01

    The Advanced Communication Technology Satellite (ACTS) is a key to reaching NASA's goal of developing high-risk, advanced communications technology using multiple frequency bands to support the nation's future communication needs. Using the multiple, dynamic hopping spot beams, and advanced on board switching and processing systems, ACTS will open a new era in communications satellite technology. One of the key technologies to be validated as part of the ACTS program is the multibeam antenna with rapidly reconfigurable hopping and fixed spot beam to serve users equipped with small-aperature terminals within the coverage areas. The proposed antenna technology experiments are designed to evaluate in-orbit ACTS multibeam antenna performance (radiation pattern, gain, cross pol levels, etc.).

  7. Speech Acts, Communicative Competence and the Paradox of Authority

    ERIC Educational Resources Information Center

    McGuire, R. R.

    1977-01-01

    Attempts to resolve the paradox of authority through an expansion of the theory of speech acts by means of Habermas' theory of communicative competence. Cites the works of Robert Wolff and P.H. Nowell-Smith. (MH)

  8. Advanced Communications Technology Satellite (ACTS): Four-Year System Performance

    NASA Technical Reports Server (NTRS)

    Acosta, Roberto J.; Bauer, Robert; Krawczyk, Richard J.; Reinhart, Richard C.; Zernic, Michael J.; Gargione, Frank

    1999-01-01

    The Advanced Communications Technology Satellite (ACTS) was conceived at the National Aeronautics and Space Administration (NASA) in the late 1970's as a follow-on program to ATS and CTS to continue NASA's long history of satellite communications projects. The ACTS project set the stage for the C-band satellites that started the industry, and later the ACTS project established the use of Ku-band for video distribution and direct-to-home broadcasting. ACTS, launched in September 1993 from the space shuttle, created a revolution in satellite system architecture by using digital communications techniques employing key technologies such as a fast hopping multibeam antenna, an on-board baseband processor, a wide-band microwave switch matrix, adaptive rain fade compensation, and the use of 900 MHz transponders operating at Ka-band frequencies. This paper describes the lessons learned in each of the key ACTS technology areas, as well as in the propagation investigations.

  9. Camouflaging in Digital Image for Secure Communication

    NASA Astrophysics Data System (ADS)

    Jindal, B.; Singh, A. P.

    2013-06-01

    The present paper reports on a new type of camouflaging in digital image for hiding crypto-data using moderate bit alteration in the pixel. In the proposed method, cryptography is combined with steganography to provide a two layer security to the hidden data. The novelty of the algorithm proposed in the present work lies in the fact that the information about hidden bit is reflected by parity condition in one part of the image pixel. The remaining part of the image pixel is used to perform local pixel adjustment to improve the visual perception of the cover image. In order to examine the effectiveness of the proposed method, image quality measuring parameters are computed. In addition to this, security analysis is also carried by comparing the histograms of cover and stego images. This scheme provides a higher security as well as robustness to intentional as well as unintentional attacks.

  10. 17 CFR 239.18 - Form S-11, for registration under the Securities Act of 1933 of securities of certain real estate...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... under the Securities Act of 1933 of securities of certain real estate companies. 239.18 Section 239.18... Securities Act of 1933 of securities of certain real estate companies. This form shall be used for registration under the Securities Act of 1933 of (a) securities issued by real estate investment trusts,...

  11. 17 CFR 240.0-10 - Small entities under the Securities Exchange Act for purposes of the Regulatory Flexibility Act.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Small entities under the Securities Exchange Act for purposes of the Regulatory Flexibility Act. 240.0-10 Section 240.0-10 Commodity... Regulatory Flexibility Act. For purposes of Commission rulemaking in accordance with the provisions...

  12. 17 CFR 240.0-10 - Small entities under the Securities Exchange Act for purposes of the Regulatory Flexibility Act.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Small entities under the Securities Exchange Act for purposes of the Regulatory Flexibility Act. 240.0-10 Section 240.0-10 Commodity... Regulatory Flexibility Act. For purposes of Commission rulemaking in accordance with the provisions...

  13. 17 CFR 240.0-10 - Small entities under the Securities Exchange Act for purposes of the Regulatory Flexibility Act.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Small entities under the Securities Exchange Act for purposes of the Regulatory Flexibility Act. 240.0-10 Section 240.0-10 Commodity... Regulatory Flexibility Act. For purposes of Commission rulemaking in accordance with the provisions...

  14. 17 CFR 240.0-10 - Small entities under the Securities Exchange Act for purposes of the Regulatory Flexibility Act.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Small entities under the Securities Exchange Act for purposes of the Regulatory Flexibility Act. 240.0-10 Section 240.0-10 Commodity... Regulatory Flexibility Act. For purposes of Commission rulemaking in accordance with the provisions...

  15. 75 FR 75722 - Order Extending Temporary Exemptions From Certain Government Securities Act Provisions and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-06

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF THE TREASURY Order Extending Temporary Exemptions From Certain Government Securities Act Provisions and Regulations... Temporary Exemptions from Certain Provisions of the Government Securities Act and Treasury's...

  16. The Health Insurance Portability and Accountability Act: security and privacy requirements.

    PubMed

    Tribble, D A

    2001-05-01

    The security and privacy requirements of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and their implications for pharmacy are discussed. HIPAA was enacted to improve the portability of health care insurance for persons leaving jobs. A section of the act encourages the use of electronic communications for health care claims adjudication, mandates the use of new standard code sets and transaction sets, and establishes the need for regulations to protect the security and privacy of individually identifiable health care information. Creating these regulations became the task of the Department of Health and Human Services. Regulations on security have been published for comment. Regulations on privacy and the definition of standard transaction sets and code sets are complete. National identifiers for patients, providers, and payers have not yet been established. The HIPAA regulations on security and privacy will require that pharmacies adopt policies and procedures that limit access to health care information. Existing pharmacy information systems may require upgrading or replacement. Costs of implementation nationwide are estimated to exceed $8 billion. The health care community has two years from the finalization of each regulation to comply with that regulation. The security and privacy requirements of HIPAA will require pharmacies to review their practices regarding the storage, use, and disclosure of protected health care information.

  17. 77 FR 74913 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-18

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Office of Personnel Management (OPM))--Match Number 1307 AGENCY: Social Security Administration....

  18. 76 FR 5603 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-01

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security Office of Operations... System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY: In accordance with the Privacy Act of 1974, the Department of Homeland Security is giving notice...

  19. Quantum authencryption: one-step authenticated quantum secure direct communications for off-line communicants

    NASA Astrophysics Data System (ADS)

    Hwang, Tzonelih; Luo, Yi-Ping; Yang, Chun-Wei; Lin, Tzu-Han

    2014-04-01

    This work proposes a new direction in quantum cryptography called quantum authencryption. Quantum authencryption (QA), a new term to distinguish from authenticated quantum secure direct communications, is used to describe the technique of combining quantum encryption and quantum authentication into one process for off-line communicants. QA provides a new way of quantum communications without the presence of a receiver on line, and thus makes many applications depending on secure one-way quantum communications, such as quantum E-mail systems, possible. An example protocol using single photons and one-way hash functions is presented to realize the requirements on QA.

  20. ACTS Multibeam Communications Package - Description and Performance Characterization

    NASA Technical Reports Server (NTRS)

    Cashman, William F.

    1992-01-01

    To maintain its competitive position in the 1990s, satellite communications must evolve to provide new services and to reduce the costs of supplying existing services. NASA's Advanced Communications Technology Satellite (ACTS) program is directed toward developing the technology base that will support this evolution. The ACTS communications payload is optimized for digital communications using a time-division multiple-access format. Scanning spot-beam antennas provide high-performance, on-demand service to communications earth stations. On-board processing and switching allow full connectivity in a single-hop network architecture. ACTS employs Ka-Band (30/20 GHz) links for communications traffic and includes techniques for mitigating rain fades. The prelaunch test program has verified that all critical payload performance requirements have been realized, including G/T, EIRP, beam coverage, AM/AM, AM/PM, and BER vs. E(b)/N(o). Scheduled to be launched by a Space Shuttle in 1993, ACTS will provide in-orbit technology verification and support experimental communications networks for up to four years.

  1. 17 CFR 229.510 - (Item 510) Disclosure of Commission position on indemnification for Securities Act liabilities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... opinion of the Securities and Exchange Commission such indemnification is against public policy as... SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF...

  2. 17 CFR 229.510 - (Item 510) Disclosure of Commission position on indemnification for Securities Act liabilities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... opinion of the Securities and Exchange Commission such indemnification is against public policy as... SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF...

  3. Communications and Information: Communications Security (COMSEC) User Requirements

    DTIC Science & Technology

    2007-11-02

    CRO ) and COMSEC users to properly secure COMSEC material the local COMSEC manager issued to them. Refer technical comments to Headquarters Air Force...Introduction. This AFI sets procedures for CROs and COMSEC users. It describes their COMSEC duties and the minimum requirements for safeguarding...Secret COMSEC key and Top Secret key-generating equipment. It contains general COMSEC information of interest to all CROs and COMSEC users who receive

  4. Chaos Based Secure IP Communications over Satellite DVB

    NASA Astrophysics Data System (ADS)

    Caragata, Daniel; El Assad, Safwan; Tutanescu, Ion; Sofron, Emil

    2010-06-01

    The Digital Video Broadcasting—Satellite (DVB-S) standard was originally conceived for TV and radio broadcasting. Later, it became possible to send IP packets using encapsulation methods such as Multi Protocol Encapsulation, MPE, or Unidirectional Lightweight Encapsulation, ULE. This paper proposes a chaos based security system for IP communications over DVB-S with ULE encapsulation. The proposed security system satisfies all the security requirements while respecting the characteristics of satellite links, such as the importance of efficient bandwidth utilization and high latency time. It uses chaotic functions to generate the keys and to encrypt the data. The key management is realized using a multi-layer architecture. A theoretical analysis of the system and a simulation of FTP and HTTP traffic are presented and discussed to show the cost of the security enhancement and to provide the necessary tools for security parameters setup.

  5. 76 FR 9034 - Privacy Act of 1974; Department of Homeland Security United States Citizenship and Immigration...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-16

    ... Security (DHS) United States Citizenship and Immigration Services (USCIS) proposes to establish a new DHS... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security United States... Security system of records titled, ``Department of Homeland Security/ United States Citizenship...

  6. Personal communications via ACTS satellite HBR transponders

    NASA Technical Reports Server (NTRS)

    Fang, Russell J. F.

    1991-01-01

    The concept of a fully meshed network of briefcase-sized terminals is presented for personal communications over Ka-band satellite transponders. In this concept, undesirable double-hop delays are avoided for voice communications. The bandwidth and power resources of the transponder are efficiently shared by users in a simple demand-assigned manner via code-division multiple access (CDMA). Voice, data, and facsimile are statistically multiplexed at each terminal. In order to minimize terminal costs, frequency-precorrected, and level-preadjusted continuous-wave tones are sent from the central network control station in each beam so that the terminals in each down-link beam can use these pilots as references for antenna acquisition and tracking, as reliable frequency sources, and as indicators of signal fade for up-link power control (ULPC). The potential CDMA 'near-far' problem due to up-link fades is mitigated by using ULPC. Quasi-burst mode transmission is employed to minimize the potential clock and pseudorandom number code synchronization.

  7. Transitioning from analog to digital communications: An information security perspective

    NASA Technical Reports Server (NTRS)

    Dean, Richard A.

    1990-01-01

    A summary is given of the government's perspective on evolving digital communications as they affect secure voice users and approaches for operating during a transition period to an all digital world. An integrated architecture and a mobile satellite interface are discussed.

  8. Secure and Authenticated Data Communication in Wireless Sensor Networks

    PubMed Central

    Alfandi, Omar; Bochem, Arne; Kellner, Ansgar; Göge, Christian; Hogrefe, Dieter

    2015-01-01

    Securing communications in wireless sensor networks is increasingly important as the diversity of applications increases. However, even today, it is equally important for the measures employed to be energy efficient. For this reason, this publication analyzes the suitability of various cryptographic primitives for use in WSNs according to various criteria and, finally, describes a modular, PKI-based framework for confidential, authenticated, secure communications in which most suitable primitives can be employed. Due to the limited capabilities of common WSN motes, criteria for the selection of primitives are security, power efficiency and memory requirements. The implementation of the framework and the singular components have been tested and benchmarked in our testbed of IRISmotes. PMID:26266413

  9. Secure SCADA communication by using a modified key management scheme.

    PubMed

    Rezai, Abdalhossein; Keshavarzi, Parviz; Moravej, Zahra

    2013-07-01

    This paper presents and evaluates a new cryptographic key management scheme which increases the efficiency and security of the Supervisory Control And Data Acquisition (SCADA) communication. In the proposed key management scheme, two key update phases are used: session key update and master key update. In the session key update phase, session keys are generated in the master station. In the master key update phase, the Elliptic Curve Diffie-Hellman (ECDH) protocol is used. The Poisson process is also used to model the Security Index (SI) and Quality of Service (QoS). Our analysis shows that the proposed key management not only supports the required speed in the MODBUS implementation but also has several advantages compared to other key management schemes for secure communication in SCADA networks.

  10. Security infrastructure requirements for electronic health cards communication.

    PubMed

    Pharow, Peter; Blobel, Bernd

    2005-01-01

    Communication and co-operation processes in the healthcare and welfare domain require a security infrastructure based on services describing status and relation of communicating principals as well as corresponding keys and attributes. Additional services provide trustworthy information on dynamic issues of communication and co-operation such as time and location of processes, workflow relations, integrity of archives and record systems, and system behaviour. To provide this communication and co-operation in a shared care environment, smart cards are widely used. Serving as storage media and portable application systems, patient data cards enable patient-controlled exchange and use of personal health data bound to specific purposes such as prescription and disease management. Additionally, patient status data such as the emergency data set or immunization may be stored in, and communicated by, patient data cards. Another deployment field of smart cards is their token functionality within a security framework, supporting basic security services such as identification, authentication, integrity, confidentiality, or accountability using cryptographic algorithms. In that context, keys, certificates, and card holder's attributes might be stored in the card as well. As an example, the German activity of introducing patient health cards and health professional cards is presented. Specification and enrolment aspects are on-going processes.

  11. Security Encryption Scheme for Communication of Web Based Control Systems

    NASA Astrophysics Data System (ADS)

    Robles, Rosslin John; Kim, Tai-Hoon

    A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network Since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Control Systems through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.

  12. Two-Year College Compliance with the Notice Requirements of the Campus Security Act.

    ERIC Educational Resources Information Center

    Callaway, Robert L.; Gehring, Donald D.; Douthett, Tracy J.

    2000-01-01

    Investigates if two-year colleges are complying with the notice requirement of the Campus Security Act by providing everyone requesting admission information a summary of the contents of their security report. Finds that only slightly more than 6% of the two-year colleges surveyed met the notice requirement of the Campus Security Act. (VWC)

  13. 76 FR 31350 - Cruise Vessel Safety and Security Act of 2010, Available Technology

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-31

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Coast Guard Cruise Vessel Safety and Security Act of 2010, Available Technology AGENCY: Coast... technology to meet certain provisions of the Cruise Vessel Security and Safety Act of...

  14. 76 FR 72495 - Alabama Metal Coil Securement Act; Petition for Determination of Preemption

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-23

    ... Administration [Docket No. FMCSA-2011-0318] Alabama Metal Coil Securement Act; Petition for Determination of... that the State of Alabama's Metal Coil Securement Act is preempted by Federal law. FMCSA requests comments on what effect, if any, Alabama's metal coil load securement certification requirements may...

  15. Secure and interoperable communication infrastructures for PPDR organisations

    NASA Astrophysics Data System (ADS)

    Müller, Wilmuth; Marques, Hugo; Pereira, Luis; Rodriguez, Jonathan; Brouwer, Frank; Bouwers, Bert; Politis, Ilias; Lykourgiotis, Asimakis; Ladas, Alexandros; Adigun, Olayinka; Jelenc, David

    2016-05-01

    The growing number of events affecting public safety and security (PS&S) on a regional scale with potential to grow up to large scale cross border disasters puts an increased pressure on agencies and organisation responsible for PS&S. In order to respond timely and in an adequate manner to such events, Public Protection and Disaster Relief (PPDR) organisations need to cooperate, align their procedures and activities, share the needed information and be interoperable. Existing PPDR/PMR technologies such as TETRA, TETRAPOL or P25, do not currently provide broadband capability nor is expected such technologies to be upgraded in the future. This presents a major limitation in supporting new services and information flows. Furthermore, there is no known standard that addresses interoperability of these technologies. In this contribution the design of a next generation communication infrastructure for PPDR organisations which fulfills the requirements of secure and seamless end-to-end communication and interoperable information exchange within the deployed communication networks is presented. Based on Enterprise Architecture of PPDR organisations, a next generation PPDR network that is backward compatible with legacy communication technologies is designed and implemented, capable of providing security, privacy, seamless mobility, QoS and reliability support for mission-critical Private Mobile Radio (PMR) voice and broadband data services. The designed solution provides a robust, reliable, and secure mobile broadband communications system for a wide variety of PMR applications and services on PPDR broadband networks, including the ability of inter-system, interagency and cross-border operations with emphasis on interoperability between users in PMR and LTE.

  16. A chaos secure communication scheme based on multiplication modulation

    NASA Astrophysics Data System (ADS)

    Fallahi, Kia; Leung, Henry

    2010-02-01

    A secure spread spectrum communication scheme using multiplication modulation is proposed. The proposed system multiplies the message by chaotic signal. The scheme does not need to know the initial condition of the chaotic signals and the receiver is based on an extended Kalman filter (EKF). This signal encryption scheme lends itself to cheap implementation and can therefore be used effectively for ensuring security and privacy in commercial consumer electronics products. To illustrate the effectiveness of the proposed scheme, a numerical example based on Genesio-Tesi system and also Chen dynamical system is presented and the results are compared.

  17. 75 FR 9085 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Immigration...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-01

    ... Federal Regulations, which is published #0;under 50 titles pursuant to 44 U.S.C. 1510. #0; #0;The Code of... Visa Security Program Tracking System (VSPTS-Net) in support of Section 428 of the Homeland Security Act of 2002. Under the Visa Security Program, ICE conducts security reviews of visa applicants....

  18. Quantum-secure covert communication on bosonic channels.

    PubMed

    Bash, Boulat A; Gheorghe, Andrei H; Patel, Monika; Habif, Jonathan L; Goeckel, Dennis; Towsley, Don; Guha, Saikat

    2015-10-19

    Computational encryption, information-theoretic secrecy and quantum cryptography offer progressively stronger security against unauthorized decoding of messages contained in communication transmissions. However, these approaches do not ensure stealth--that the mere presence of message-bearing transmissions be undetectable. We characterize the ultimate limit of how much data can be reliably and covertly communicated over the lossy thermal-noise bosonic channel (which models various practical communication channels). We show that whenever there is some channel noise that cannot in principle be controlled by an otherwise arbitrarily powerful adversary--for example, thermal noise from blackbody radiation--the number of reliably transmissible covert bits is at most proportional to the square root of the number of orthogonal modes (the time-bandwidth product) available in the transmission interval. We demonstrate this in a proof-of-principle experiment. Our result paves the way to realizing communications that are kept covert from an all-powerful quantum adversary.

  19. Quantum-secure covert communication on bosonic channels

    NASA Astrophysics Data System (ADS)

    Bash, Boulat A.; Gheorghe, Andrei H.; Patel, Monika; Habif, Jonathan L.; Goeckel, Dennis; Towsley, Don; Guha, Saikat

    2015-10-01

    Computational encryption, information-theoretic secrecy and quantum cryptography offer progressively stronger security against unauthorized decoding of messages contained in communication transmissions. However, these approaches do not ensure stealth--that the mere presence of message-bearing transmissions be undetectable. We characterize the ultimate limit of how much data can be reliably and covertly communicated over the lossy thermal-noise bosonic channel (which models various practical communication channels). We show that whenever there is some channel noise that cannot in principle be controlled by an otherwise arbitrarily powerful adversary--for example, thermal noise from blackbody radiation--the number of reliably transmissible covert bits is at most proportional to the square root of the number of orthogonal modes (the time-bandwidth product) available in the transmission interval. We demonstrate this in a proof-of-principle experiment. Our result paves the way to realizing communications that are kept covert from an all-powerful quantum adversary.

  20. Quantum-secure covert communication on bosonic channels

    PubMed Central

    Bash, Boulat A.; Gheorghe, Andrei H.; Patel, Monika; Habif, Jonathan L.; Goeckel, Dennis; Towsley, Don; Guha, Saikat

    2015-01-01

    Computational encryption, information-theoretic secrecy and quantum cryptography offer progressively stronger security against unauthorized decoding of messages contained in communication transmissions. However, these approaches do not ensure stealth—that the mere presence of message-bearing transmissions be undetectable. We characterize the ultimate limit of how much data can be reliably and covertly communicated over the lossy thermal-noise bosonic channel (which models various practical communication channels). We show that whenever there is some channel noise that cannot in principle be controlled by an otherwise arbitrarily powerful adversary—for example, thermal noise from blackbody radiation—the number of reliably transmissible covert bits is at most proportional to the square root of the number of orthogonal modes (the time-bandwidth product) available in the transmission interval. We demonstrate this in a proof-of-principle experiment. Our result paves the way to realizing communications that are kept covert from an all-powerful quantum adversary. PMID:26478089

  1. 78 FR 14403 - Alabama Metal Coil Securement Act; Petition for Determination of Preemption

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-05

    ... Federal Motor Carrier Safety Administration Alabama Metal Coil Securement Act; Petition for Determination... Alabama's Metal Coil Securement Act (the Act) is preempted by Federal law. Federal law provides for... System (FDMS) published in the Federal Register on December 29, 2010 (75 FR 82132). Background The...

  2. 77 FR 70795 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... Transportation Security Administration System of Records AGENCY: Privacy Office, Department of Homeland Security... Security Administration-002 Transportation Security Threat Assessment System System of Records (May 19... Transportation Worker Identification Credentialing and other Transportation Security......

  3. Quantum secure direct communication with frequency coding scheme

    NASA Astrophysics Data System (ADS)

    Zhao, Xue-Liang; Ruan, Dong

    2016-11-01

    Quantum secure direct communication (QSDC) is an important branch of quantum cryptography. It can transmit secret information directly without establishing a key first, unlike quantum key distribution which requires this precursive event. One of the most highlighted QSDC protocol is the Two-step protocol. This paper will focus on proposing a frequency coding scheme in the Two-step protocol, while retaining other contents of the QSDC protocol. This new coding scheme will significantly increase the protocol's ability against channel noise and loss, and provides an efficient protocol for secure direct quantum communication in a noisy environment. Besides, the frequency coding technology is also easy to understand and highly practical. After numerically simulating the performance of the protocol in a noisy channel, the results showed that the scheme was robust against channel noise and loss.

  4. Secure communications with low-orbit spacecraft using quantum cryptography

    DOEpatents

    Hughes, Richard J.; Buttler, William T.; Kwiat, Paul G.; Luther, Gabriel G.; Morgan, George L; Nordholt, Jane E.; Peterson, Charles G.; Simmons, Charles M.

    1999-01-01

    Apparatus and method for secure communication between an earth station and spacecraft. A laser outputs single pulses that are split into preceding bright pulses and delayed attenuated pulses, and polarized. A Pockels cell changes the polarization of the polarized delayed attenuated pulses according to a string of random numbers, a first polarization representing a "1," and a second polarization representing a "0." At the receiving station, a beamsplitter randomly directs the preceding bright pulses and the polarized delayed attenuated pulses onto longer and shorter paths, both terminating in a beamsplitter which directs the preceding bright pulses and a first portion of the polarized delayed attenuated pulses to a first detector, and a second portion of the polarized delayed attenuated pulses to a second detector to generate a key for secure communication between the earth station and the spacecraft.

  5. Constellation-masked secure communication technique for OFDM-PON.

    PubMed

    Liu, Bo; Zhang, Lijia; Xin, Xiangjun; Yu, Jianjun

    2012-10-22

    This paper proposes a novel secure communication technique using constellation masking for applications in orthogonal frequency division multiplexing passive optical network (OFDM-PON). The constellation masking is applied both on each subcarrier and among different subcarriers. The Arnold mapping is utilized as the parameter function for the mask factors. A interleave length is employed to provide a scalable masking granularity for different ONUs. A 15.54 Gb/s constellation-masked 32QAM-OFDM signal has been successfully transmitted over 25-km single mode fiber in the experiment. Experimental results show that the proposed scheme can effectively protect the system from illegal ONU without wasting the bandwidth. The constellation-masked technique suggests an effective solution for the physical secure communication in future OFDM access network.

  6. Experimental demonstration of audio secure communication with Rossler chaotic circuits

    NASA Astrophysics Data System (ADS)

    Jaimes-Reátegui, R.; García-López, J. H.; Pisarchik, A. N.; Medina-Gutiérrez, C.; Jimenez-Godinez, J. C.; Valdivia-Hernandez, R.; Murguía-Hernandez, A.; Frausto-Reyes, C.

    2006-02-01

    The possibility of secure communication with chaos is demonstrated experimentally with two simple unidirectionally coupled electronic circuits. A traditional approach has been used to synchronize the two chaotic systems. We also study, both numerically and experimentally, the dynamic of the systems in a wide range of the control parameter. The bifurcation diagrams represent a complex behaviour whish varied from periodic orbits to chaos of the Rossler and Shilnikov types. The results of numerical simulations are in a good agreement with experiments.

  7. Clearinghouse: a teleradiology platform emphasizing security of data and communication.

    PubMed

    Spitzer, Michael; Brinkmann, Lars; Ueckert, Frank

    2007-01-01

    The Clearinghouse application platform is a web based solution for secure digital exchange of radiological images and other clinical documents among authorized researchers and physicians. It implements a sophisticated security and role model to protect privacy and to minimize the risk of eavesdropping of patient data. The Clearinghouse serves as a centralized platform for distributed, distantly located medical research and health care. It is based on Open-Source software, thus ensuring continued support, maintenance, security and last but not least continuity of the platform. The use of the Clearinghouse minimizes turnaround times by superseding comparably slow and insecure conventional communication methods otherwise used for the exchange of radiological images and clinical documents, such as standard mail and courier services. Furthermore, it alleviates the integration of distantly located expert knowledge into diagnostic routines, culminating in an increased health care quality regardless of location of patients or physicians.

  8. Communicating Health Risks under Pressure: Homeland Security Applications

    SciTech Connect

    Garrahan, K.G.; Collie, S.L.

    2006-07-01

    The U.S. Environmental Protection Agency's (EPA) Office of Research and Development (ORD) Threat and Consequence Assessment Division (TCAD) within the National Homeland Security Research Center (NHSRC) has developed a tool for rapid communication of health risks and likelihood of exposure in preparation for terrorist incidents. The Emergency Consequence Assessment Tool (ECAT) is a secure web-based tool designed to make risk assessment and consequence management faster and easier for high priority terrorist threat scenarios. ECAT has been designed to function as 'defensive play-book' for health advisors, first responders, and decision-makers by presenting a series of evaluation templates for priority scenarios that can be modified for site-specific applications. Perhaps most importantly, the risk communication aspect is considered prior to an actual release event, so that management or legal advisors can concur on general risk communication content in preparation for press releases that can be anticipated in case of an actual emergency. ECAT serves as a one-stop source of information for retrieving toxicological properties for agents of concern, estimating exposure to these agents, characterizing health risks, and determining what actions need to be undertaken to mitigate the risks. ECAT has the capability to be used at a command post where inputs can be checked and communicated while the response continues in real time. This front-end planning is intended to fill the gap most commonly identified during tabletop exercises: a need for concise, timely, and informative risk communication to all parties. Training and customization of existing chemical and biological release scenarios with modeling of exposure to air and water, along with custom risk communication 'messages' intended for public, press, shareholders, and other partners enable more effective communication during times of crisis. For DOE, the ECAT could serve as a prototype that would be amenable to

  9. Inherent secure communications using lattice based waveform design.

    SciTech Connect

    Pugh, Matthew Owen

    2013-12-01

    The wireless communications channel is innately insecure due to the broadcast nature of the electromagnetic medium. Many techniques have been developed and implemented in order to combat insecurities and ensure the privacy of transmitted messages. Traditional methods include encrypting the data via cryptographic methods, hiding the data in the noise floor as in wideband communications, or nulling the signal in the spatial direction of the adversary using array processing techniques. This work analyzes the design of signaling constellations, i.e. modulation formats, to combat eavesdroppers from correctly decoding transmitted messages. It has been shown that in certain channel models the ability of an adversary to decode the transmitted messages can be degraded by a clever signaling constellation based on lattice theory. This work attempts to optimize certain lattice parameters in order to maximize the security of the data transmission. These techniques are of interest because they are orthogonal to, and can be used in conjunction with, traditional security techniques to create a more secure communication channel.

  10. On the design of chaos-based secure communication systems

    NASA Astrophysics Data System (ADS)

    Zaher, Ashraf A.; Abu-Rezq, Abdulnasser

    2011-09-01

    This paper discusses the topic of using chaotic models for constructing secure communication systems. It investigates three different case studies that use encryption/decryption functions with varying degrees of complexity and performance. The first case study explores synchronization of identical chaotic systems, which is considered the most crucial step when developing chaos-based secure communication systems. It proposes a fast mechanism for synchronizing the transmitter and the receiver that is based on the drive-response approach. The superiority and causality of this mechanism is demonstrated via contrasting its performance and practical implementation against that of the traditional method of Pecora and Carroll. The second case study explores the use of an improved cryptography method for improving the scrambling of the transmitted signals. The improvement is based on using both the transmitter states and parameters for performing the encryption. The security analysis of this method is analyzed, highlighting its advantages and limitation, via simulating intruder attacks to the communication channel. Finally, the third case study augments a parameter update law to the previous two designs such that the encryption method is more robust. It uses a decoupling technique for which the synchronization process is completely isolated from the parameter identification algorithm. The Lorenz system was used to exemplify all the suggested techniques, and the transmission of both analog and digital signals was explored, while investigating various techniques to optimize the performance of the proposed systems.

  11. Secure thermal infrared communications using engineered blackbody radiation

    PubMed Central

    Liang, Xiaoxin; Hu, Fangjing; Yan, Yuepeng; Lucyszyn, Stepan

    2014-01-01

    The thermal (emitted) infrared frequency bands, from 20–40 THz and 60–100 THz, are best known for applications in thermography. This underused and unregulated part of the spectral range offers opportunities for the development of secure communications. The ‘THz Torch' concept was recently presented by the authors. This technology fundamentally exploits engineered blackbody radiation, by partitioning thermally-generated spectral noise power into pre-defined frequency channels; the energy in each channel is then independently pulsed modulated and multiplexing schemes are introduced to create a robust form of short-range secure communications in the far/mid infrared. To date, octave bandwidth (25–50 THz) single-channel links have been demonstrated with 380 bps speeds. Multi-channel ‘THz Torch' frequency division multiplexing (FDM) and frequency-hopping spread-spectrum (FHSS) schemes have been proposed, but only a slow 40 bps FDM scheme has been demonstrated experimentally. Here, we report a much faster 1,280 bps FDM implementation. In addition, an experimental proof-of-concept FHSS scheme is demonstrated for the first time, having a 320 bps data rate. With both 4-channel multiplexing schemes, measured bit error rates (BERs) of < 10−6 are achieved over a distance of 2.5 cm. Our approach represents a new paradigm in the way niche secure communications can be established over short links. PMID:24912871

  12. Improving the security of secure direct communication based on the secret transmitting order of particles

    SciTech Connect

    Li Xihan; Deng Fuguo; Zhou Hongyu

    2006-11-15

    We analyzed the security of the secure direct communication protocol based on the secret transmitting order of particles recently proposed by Zhu, Xia, Fan, and Zhang[Phys. Rev. A 73, 022338 (2006)] and found that this scheme is insecure if an eavesdropper, say Eve, wants to steal the secret message with Trojan horse attack strategies. The vital loophole in this scheme is that the two authorized users check the security of their quantum channel only once. Eve can insert another spy photon, an invisible photon, or a delay one in each photon which the sender Alice sends to the receiver Bob, and capture the spy photon when it returns from Bob to Alice. After the authorized users check the security, Eve can obtain the secret message according to the information about the transmitting order published by Bob. Finally, we present a possible improvement of this protocol.

  13. Enhancing Nutrition Security via India's National Food Security Act: Using an Axe instead of a Scalpel?

    PubMed

    Desai, Sonalde; Vanneman, Reeve

    2015-08-05

    In September 2013, India passed a historic National Food Security Act. This paper examines the potential impact of the two central pillars of this act - expansion of the Public Distribution System and strengthening of the Integrated Child Development Schemes - on child nutrition. Using new data from the India Human Development Survey of 2011-12, this paper shows that access to subsidized grains via PDS is not related to improved child nutrition, and while ICDS seems to be related to lower child undernutrition, it has a limited reach in spite of the universalization of the program. The paper suggests that a tiered strategy in dealing with child undernutrition that starts with the identification of undernourished children and districts and follows through with different strategies for dealing with severe, acute malnutrition, followed by a focus on moderate malnutrition, could be more effective than the existing focus on cereal distribution rooted in the NFSA.

  14. Ultra Wideband (UWB) communication vulnerability for security applications.

    SciTech Connect

    Cooley, H. Timothy

    2010-07-01

    RF toxicity and Information Warfare (IW) are becoming omnipresent posing threats to the protection of nuclear assets, and within theatres of hostility or combat where tactical operation of wireless communication without detection and interception is important and sometimes critical for survival. As a result, a requirement for deployment of many security systems is a highly secure wireless technology manifesting stealth or covert operation suitable for either permanent or tactical deployment where operation without detection or interruption is important The possible use of ultra wideband (UWB) spectrum technology as an alternative physical medium for wireless network communication offers many advantages over conventional narrowband and spread spectrum wireless communication. UWB also known as fast-frequency chirp is nonsinusoidal and sends information directly by transmitting sub-nanosecond pulses without the use of mixing baseband information upon a sinusoidal carrier. Thus UWB sends information using radar-like impulses by spreading its energy thinly over a vast spectrum and can operate at extremely low-power transmission within the noise floor where other forms of RF find it difficult or impossible to operate. As a result UWB offers low probability of detection (LPD), low probability of interception (LPI) as well as anti-jamming (AJ) properties in signal space. This paper analyzes and compares the vulnerability of UWB to narrowband and spread spectrum wireless network communication.

  15. A secure and robust information hiding technique for covert communication

    NASA Astrophysics Data System (ADS)

    Parah, S. A.; Sheikh, J. A.; Hafiz, A. M.; Bhat, G. M.

    2015-08-01

    The unprecedented advancement of multimedia and growth of the internet has made it possible to reproduce and distribute digital media easier and faster. This has given birth to information security issues, especially when the information pertains to national security, e-banking transactions, etc. The disguised form of encrypted data makes an adversary suspicious and increases the chance of attack. Information hiding overcomes this inherent problem of cryptographic systems and is emerging as an effective means of securing sensitive data being transmitted over insecure channels. In this paper, a secure and robust information hiding technique referred to as Intermediate Significant Bit Plane Embedding (ISBPE) is presented. The data to be embedded is scrambled and embedding is carried out using the concept of Pseudorandom Address Vector (PAV) and Complementary Address Vector (CAV) to enhance the security of the embedded data. The proposed ISBPE technique is fully immune to Least Significant Bit (LSB) removal/replacement attack. Experimental investigations reveal that the proposed technique is more robust to various image processing attacks like JPEG compression, Additive White Gaussian Noise (AWGN), low pass filtering, etc. compared to conventional LSB techniques. The various advantages offered by ISBPE technique make it a good candidate for covert communication.

  16. 75 FR 18867 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-011...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-13

    ... Security Administration--011, Transportation Security Intelligence Service Operations Files Systems of... Administration--011 Transportation Security Intelligence Service Operations Files previously published on... Transportation Security Intelligence Service Operations Filing System contains records on individuals...

  17. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... Transportation Security Administration System of Records AGENCY: Privacy Office, Department of Homeland Security.... The program is no longer in operation within the Transportation Security Administration and associated..., Privacy Policy and Compliance, TSA-36, Transportation Security Administration, 601 South 12th......

  18. Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid

    DTIC Science & Technology

    2010-10-01

    Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid Zhuo Lu Xiang Lu Wenye Wang Department of Electrical and...relies on robust communication networks to provide efficient, secure , and reliable information delivery. Thus, the network security is of critical...importance in the smart grid. In this paper, we aim at classifying and evaluating the security threats on the communication networks in the smart grid. Based

  19. Design and Implementation of Secure and Reliable Communication using Optical Wireless Communication

    NASA Astrophysics Data System (ADS)

    Saadi, Muhammad; Bajpai, Ambar; Zhao, Yan; Sangwongngam, Paramin; Wuttisittikulkij, Lunchakorn

    2014-11-01

    Wireless networking intensify the tractability in the home and office environment to connect the internet without wires but at the cost of risks associated with stealing the data or threat of loading malicious code with the intention of harming the network. In this paper, we proposed a novel method of establishing a secure and reliable communication link using optical wireless communication (OWC). For security, spatial diversity based transmission using two optical transmitters is used and the reliability in the link is achieved by a newly proposed method for the construction of structured parity check matrix for binary Low Density Parity Check (LDPC) codes. Experimental results show that a successful secure and reliable link between the transmitter and the receiver can be achieved by using the proposed novel technique.

  20. Quantum cryptography for secure free-space communications

    SciTech Connect

    Hughes, R.J.; Buttler, W.T.; Kwiat, P.G.; Lamoreaux, S.K.; Luther, G.G.; Morgan, G.L.; Nordholt, J.E.; Peterson, C.G.

    1999-03-01

    The secure distribution of the secret random bit sequences known as key material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is a new technique for secure key distribution with single-photon transmissions: Heisenberg`s uncertainty principle ensures that an adversary can neither successfully tap the key transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). The authors have developed experimental quantum cryptography systems based on the transmission of non-orthogonal photon polarization states to generate shared key material over line-of-sight optical links. Key material is built up using the transmission of a single-photon per bit of an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. The authors have developed and tested a free-space quantum key distribution (QKD) system over an outdoor optical path of {approximately}1 km at Los Alamos National Laboratory under nighttime conditions. Results show that free-space QKD can provide secure real-time key distribution between parties who have a need to communicate secretly. Finally, they examine the feasibility of surface to satellite QKD.

  1. All-optical signal processing technique for secure optical communication

    NASA Astrophysics Data System (ADS)

    Qian, Feng-chen; Su, Bing; Ye, Ya-lin; Zhang, Qian; Lin, Shao-feng; Duan, Tao; Duan, Jie

    2015-10-01

    Secure optical communication technologies are important means to solve the physical layer security for optical network. We present a scheme of secure optical communication system by all-optical signal processing technique. The scheme consists of three parts, as all-optical signal processing unit, optical key sequence generator, and synchronous control unit. In the paper, all-optical signal processing method is key technology using all-optical exclusive disjunction (XOR) gate based on optical cross-gain modulation effect, has advantages of wide dynamic range of input optical signal, simple structure and so on. All-optical XOR gate composed of two semiconductor optical amplifiers (SOA) is a symmetrical structure. By controlling injection current, input signal power, delay and filter bandwidth, the extinction ratio of XOR can be greater than 8dB. Finally, some performance parameters are calculated and the results are analyzed. The simulation and experimental results show that the proposed method can be achieved over 10Gbps optical signal encryption and decryption, which is simple, easy to implement, and error-free diffusion.

  2. Proceedings of the Advanced Communications Technology Satellite (ACTS) Conference 2000

    NASA Technical Reports Server (NTRS)

    Bauer, Robert (Editor); Derwae, Robert (Editor)

    2000-01-01

    The ACTS experiments program, which began in December 1993 and consisted of 103 different experiments, has made significant contributions to minimizing the risk of advanced satellite communications technology. The ACTS Conference 2000 (AC2000) was held to report the results of the program since the last ACTS conference was held in 1995 and to celebrate the end of a very successful satellite program. The conference was held on May 31, 2000, as part of the 6th Ka-band Utilization Conference in Cleveland, Ohio. Approximately 280 representatives of industry, academia, and government attended. The conference was organized into two parts: a technical session during the day and an evening reception. During the day, a series of five technical sessions included presentations of 17 papers covering the results of the experiment activity and technical performance of the satellite. In the evening, a reception was held to celebrate the end of the ACTS Experiments Program on one of NASA's most successful experimental communications satellite. These proceedings were developed to capture the entire event, including the evening reception.

  3. Experiments applications guide: Advanced Communications Technology Satellite (ACTS)

    NASA Technical Reports Server (NTRS)

    1988-01-01

    This applications guide first surveys the capabilities of the Advanced Communication Technology Satellite (ACTS) system (both the flight and ground segments). This overview is followed by a description of the baseband processor (BBP) and microwave switch matrix (MSM) operating modes. Terminals operating with the baseband processor are referred to as low burst rate (LBR); and those operating with the microwave switch matrix, as high burst rate (HBR). Three very small-aperture terminals (VSATs), LBR-1, LBR-2, and HBR, are described for various ACTS operating modes. Also described is the NASA Lewis link evaluation terminal. A section on ACTS experiment opportunities introduces a wide spectrum of network control, telecommunications, system, and scientific experiments. The performance of the VSATs is discussed in detail. This guide is intended as a catalyst to encourage participation by the telecommunications, business, and science communities in a broad spectrum of experiments.

  4. SPECS: Secure and Privacy Enhancing Communications Schemes for VANETs

    NASA Astrophysics Data System (ADS)

    Chim, T. W.; Yiu, S. M.; Hui, L. C. K.; Jiang, Zoe L.; Li, Victor O. K.

    Vehicular ad hoc network (VANET) is an emerging type of networks which facilitates vehicles on roads to communicate for driving safety. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages (e.g. traffic accidents) to other vehicles. However, this raises the concern of security and privacy. Messages should be signed and verified before they are trusted while the real identity of vehicles should not be revealed, but traceable by authorized party. Existing solutions either rely heavily on a tamper-proof hardware device, or cannot satisfy the privacy requirement and do not have an effective message verification scheme. In this paper, we provide a software-based solution which makes use of only two shared secrets to satisfy the privacy requirement and gives lower message overhead and at least 45% higher successful rate than previous solutions in the message verification phase using the bloom filter and the binary search techniques. We also provide the first group communication protocol to allow vehicles to authenticate and securely communicate with others in a group of known vehicles.

  5. 78 FR 69858 - Privacy Act of 1974; Department of Homeland Security/Federal Emergency Management Agency-001...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-21

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/Federal Emergency... AGENCY: Department of Homeland Security, Privacy Office. ACTION: Notice of Privacy Act System of Records. SUMMARY: In accordance with the Privacy Act of 1974, the Department of Homeland Security proposes...

  6. 45 CFR 287.105 - What provisions of the Social Security Act govern the NEW Program?

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 2 2010-10-01 2010-10-01 false What provisions of the Social Security Act govern the NEW Program? 287.105 Section 287.105 Public Welfare Regulations Relating to Public Welfare OFFICE....105 What provisions of the Social Security Act govern the NEW Program? NEW Programs are subject...

  7. 76 FR 30374 - Cruise Vessel Safety and Security Act of 2010, Available Technology

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-25

    ... Act include: Updated ship design; providing public access to information regarding crime aboard cruise...] [FR Doc No: 2011-12988] DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2011-0357] Cruise... availability of technology to meet certain provisions of the Cruise Vessel Security and Safety Act of...

  8. 48 CFR 636.104-71 - Omnibus Diplomatic Security and Antiterrorism Act.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false Omnibus Diplomatic... contractors. The Omnibus Diplomatic Security and Antiterrorism Act of 1986 (Public Law 99-399; 22 U.S.C. 4852... venture persons. The Omnibus Diplomatic Security and Antiterrorism Act of 1986 applies to the...

  9. First Annual Report to Congress on Title XX of the Social Security Act.

    ERIC Educational Resources Information Center

    Department of Health, Education, and Welfare, Washington, DC.

    This annual report to Congress on Title XX of the Social Security Act reports on the operation of the 1976 fiscal year program. Preceding the report are descriptive highlights of the program. Title XX of the Social Security Act changes the role and relationships of the Department of Health, Education, and Welfare; the individual states; and…

  10. 45 CFR 287.105 - What provisions of the Social Security Act govern the NEW Program?

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 2 2012-10-01 2012-10-01 false What provisions of the Social Security Act govern the NEW Program? 287.105 Section 287.105 Public Welfare Regulations Relating to Public Welfare OFFICE....105 What provisions of the Social Security Act govern the NEW Program? NEW Programs are subject...

  11. 45 CFR 287.105 - What provisions of the Social Security Act govern the NEW Program?

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 2 2013-10-01 2012-10-01 true What provisions of the Social Security Act govern the NEW Program? 287.105 Section 287.105 Public Welfare Regulations Relating to Public Welfare OFFICE....105 What provisions of the Social Security Act govern the NEW Program? NEW Programs are subject...

  12. 45 CFR 287.105 - What provisions of the Social Security Act govern the NEW Program?

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 2 2014-10-01 2012-10-01 true What provisions of the Social Security Act govern the NEW Program? 287.105 Section 287.105 Public Welfare Regulations Relating to Public Welfare OFFICE....105 What provisions of the Social Security Act govern the NEW Program? NEW Programs are subject...

  13. 45 CFR 287.105 - What provisions of the Social Security Act govern the NEW Program?

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 2 2011-10-01 2011-10-01 false What provisions of the Social Security Act govern the NEW Program? 287.105 Section 287.105 Public Welfare Regulations Relating to Public Welfare OFFICE....105 What provisions of the Social Security Act govern the NEW Program? NEW Programs are subject...

  14. 75 FR 7978 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... Exemptions; Department of Homeland Security Transportation Security Administration-023 Workplace Violence... Security Administration-023 Workplace Violence Prevention Program System of Records and this proposed... a new system of records under the Privacy Act (5 U.S.C. 552a) titled, DHS/TSA-023 Workplace...

  15. The 1983 Amendments to the Social Security Act: The Issue of Intergenerational Equity.

    ERIC Educational Resources Information Center

    Ozawa, Martha N.

    1984-01-01

    Reviews the conditions that prevailed before the passage of the 1983 amendments to the Social Security Act, the probable effects of the amendments, and the future direction of social security. Questions whether the amendments have in reality rescued social security from financial insolvency and discusses the concept of intergenerational equity.…

  16. 78 FR 27276 - Privacy Act; System of Records: Security Records, State-36

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-09

    ... Act; System of Records: Security Records, State-36 SUMMARY: Notice is hereby given that the Department of State proposes to amend an existing system of records, Security Records, State-36, pursuant to the... Department of State proposes that the current system retain the name ``Security Records''...

  17. Deterministic secure communications using two-mode squeezed states

    SciTech Connect

    Marino, Alberto M.; Stroud, C. R. Jr.

    2006-08-15

    We propose a scheme for quantum cryptography that uses the squeezing phase of a two-mode squeezed state to transmit information securely between two parties. The basic principle behind this scheme is the fact that each mode of the squeezed field by itself does not contain any information regarding the squeezing phase. The squeezing phase can only be obtained through a joint measurement of the two modes. This, combined with the fact that it is possible to perform remote squeezing measurements, makes it possible to implement a secure quantum communication scheme in which a deterministic signal can be transmitted directly between two parties while the encryption is done automatically by the quantum correlations present in the two-mode squeezed state.

  18. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... Transportation Security Administration System of Records AGENCY: Privacy Office, Department of Homeland Security.../Transportation Security Administration- 019, Secure Flight Records (November 9, 2007, 72 FR 63711) to cover the..., Director, Privacy Policy and Compliance, TSA-36, Transportation Security Administration, 601......

  19. 76 FR 49698 - Covered Securities Pursuant to Section 18 of the Securities Act of 1933

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-11

    ... designate certain securities on BATS Exchange, Inc. (``BATS'' or ``Exchange'') as covered securities for... the Named Markets and thus securities listed on such exchanges are deemed Covered Securities.\\7\\ BATS has filed a proposed rule change for the listing of securities on BATS \\8\\ and has petitioned...

  20. 47 CFR 0.414 - The Communications Act and other statutory materials.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Act; the Communications Satellite Act of 1962; and selected sections of the Criminal Code pertaining... 47 Telecommunication 1 2012-10-01 2012-10-01 false The Communications Act and other statutory materials. 0.414 Section 0.414 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL...

  1. 47 CFR 0.414 - The Communications Act and other statutory materials.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Act; the Communications Satellite Act of 1962; and selected sections of the Criminal Code pertaining... 47 Telecommunication 1 2014-10-01 2014-10-01 false The Communications Act and other statutory materials. 0.414 Section 0.414 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL...

  2. 47 CFR 0.414 - The Communications Act and other statutory materials.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Act; the Communications Satellite Act of 1962; and selected sections of the Criminal Code pertaining... 47 Telecommunication 1 2010-10-01 2010-10-01 false The Communications Act and other statutory materials. 0.414 Section 0.414 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL...

  3. 47 CFR 0.414 - The Communications Act and other statutory materials.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Act; the Communications Satellite Act of 1962; and selected sections of the Criminal Code pertaining... 47 Telecommunication 1 2011-10-01 2011-10-01 false The Communications Act and other statutory materials. 0.414 Section 0.414 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL...

  4. 47 CFR 0.414 - The Communications Act and other statutory materials.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Act; the Communications Satellite Act of 1962; and selected sections of the Criminal Code pertaining... 47 Telecommunication 1 2013-10-01 2013-10-01 false The Communications Act and other statutory materials. 0.414 Section 0.414 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL...

  5. 75 FR 8096 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-023...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... Security Administration--023 Workplace Violence Prevention Program System of Records AGENCY: Privacy Office..., ``Department of Homeland Security/Transportation Security Administration--023 Workplace Violence Prevention... and maintain records on their Workplace Violence Prevention Program. Additionally, the Department...

  6. 77 FR 57085 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ... COMMISSION Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital... Communications Commission's (FCC) Advisory Committee on Diversity for Communications in the Digital Age (``Diversity Committee''). The Committee's mission is to provide recommendations to the Commission...

  7. 76 FR 64348 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-18

    ... COMMISSION Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital... Communications Commission's (FCC) Advisory Committee on Diversity for Communications in the Digital Age (``Diversity Committee''). The Committee's mission is to provide recommendations to the Commission...

  8. 78 FR 21354 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-10

    ... COMMISSION Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital... Communications Commission's (FCC) Advisory Committee on Diversity for Communications in the Digital Age (``Diversity Committee''). The Committee's mission is to provide recommendations to the Commission...

  9. 77 FR 6113 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-07

    ... COMMISSION Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital... Communications Commission's (FCC's) Advisory Committee on Diversity for Communications in the Digital Age (``Diversity Committee''). The Committee's mission is to provide recommendations to the Commission...

  10. 78 FR 75563 - Commission Policies and Procedures Under the Communications Act, Foreign Investment in Broadcast...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-12

    ... Policies for Common Carrier and Aeronautical Radio Licensees under Section 310(b)(4) of the Communications... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION Commission Policies and Procedures Under the Communications Act, Foreign Investment in...

  11. GSM-PKI solution enabling secure mobile communications.

    PubMed

    Jelekäinen, Pekka

    2004-03-31

    Because of its wide distribution and ease of use, the mobile phone, as a reliable personal communications channel, offers an excellent basis for the provision of reliable electronic communications services. In Finland, ca. 75% of the citizens have a mobile phone and, at present and most likely also in the future, it is the most widely spread service channel allowing reliable electronic communications. Despite the restricted functions of the mobile phone, the citizens can use the phone also as a communications medium. In 2001, the Finns sent over 1 billion SMS messages. In Finland, TeliaSonera Finland Oyi and the Population Register Centre (PRC) have closed a co-operation agreement with the aim of creating a mobile phone service for the electronic identification of a person. The co-operation launched is a significant development project from the perspective of the citizens. As a result, the consumers will have a new alternative for reliable electronic communications and commerce in data networks in addition to the electronic identification card. In the future, it will be possible to use the services of both public administration and the private sector by means of a mobile phone more reliably than before, without a physical visit, e.g. to a health centre or to another provider of healthcare services. The possibility of identification and signature by a mobile phone allows an easier provision of versatile services irrespective of time and place, because, in addition to voice, text message, and WAP functions, the service can be utilised also in communications services through the Internet, in which case, the mobile phone acts like a card reader. From the perspective of reliable personal mobile communications, the healthcare sector is one of the most significant and challenging application areas.

  12. Text messaging to communicate with public health audiences: how the HIPAA Security Rule affects practice.

    PubMed

    Karasz, Hilary N; Eiden, Amy; Bogan, Sharon

    2013-04-01

    Text messaging is a powerful communication tool for public health purposes, particularly because of the potential to customize messages to meet individuals' needs. However, using text messaging to send personal health information requires analysis of laws addressing the protection of electronic health information. The Health Insurance Portability and Accountability Act (HIPAA) Security Rule is written with flexibility to account for changing technologies. In practice, however, the rule leads to uncertainty about how to make text messaging policy decisions. Text messaging to send health information can be implemented in a public health setting through 2 possible approaches: restructuring text messages to remove personal health information and retaining limited personal health information in the message but conducting a risk analysis and satisfying other requirements to meet the HIPAA Security Rule.

  13. Text Messaging to Communicate With Public Health Audiences: How the HIPAA Security Rule Affects Practice

    PubMed Central

    Karasz, Hilary N.; Eiden, Amy; Bogan, Sharon

    2013-01-01

    Text messaging is a powerful communication tool for public health purposes, particularly because of the potential to customize messages to meet individuals’ needs. However, using text messaging to send personal health information requires analysis of laws addressing the protection of electronic health information. The Health Insurance Portability and Accountability Act (HIPAA) Security Rule is written with flexibility to account for changing technologies. In practice, however, the rule leads to uncertainty about how to make text messaging policy decisions. Text messaging to send health information can be implemented in a public health setting through 2 possible approaches: restructuring text messages to remove personal health information and retaining limited personal health information in the message but conducting a risk analysis and satisfying other requirements to meet the HIPAA Security Rule. PMID:23409902

  14. 17 CFR 239.13 - Form S-3, for registration under the Securities Act of 1933 of securities of certain issuers...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form S-3, for registration under the Securities Act of 1933 of securities of certain issuers offered pursuant to certain types of transactions. 239.13 Section 239.13 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION...

  15. 17 CFR 239.33 - Form F-3, for registration under the Securities Act of 1933 of securities of certain foreign...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Form F-3, for registration under the Securities Act of 1933 of securities of certain foreign private issuers offered pursuant to certain types of transactions. 239.33 Section 239.33 Commodity and Securities Exchanges SECURITIES...

  16. 17 CFR 239.13 - Form S-3, for registration under the Securities Act of 1933 of securities of certain issuers...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Form S-3, for registration under the Securities Act of 1933 of securities of certain issuers offered pursuant to certain types of transactions. 239.13 Section 239.13 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION...

  17. 17 CFR 239.16b - Form S-8, for registration under the Securities Act of 1933 of securities to be offered to...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Form S-8, for registration under the Securities Act of 1933 of securities to be offered to employees pursuant to employee benefit plans. 239.16b Section 239.16b Commodity and Securities Exchanges SECURITIES AND EXCHANGE...

  18. 17 CFR 239.16b - Form S-8, for registration under the Securities Act of 1933 of securities to be offered to...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form S-8, for registration under the Securities Act of 1933 of securities to be offered to employees pursuant to employee benefit plans. 239.16b Section 239.16b Commodity and Securities Exchanges SECURITIES AND EXCHANGE...

  19. 75 FR 5166 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-01

    ... ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration... regarding protections for such persons. The Privacy Act, as amended, regulates the use of computer matching... denying a person's benefits or payments. B. SSA Computer Matches Subject to the Privacy Act We have...

  20. 77 FR 70792 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... Transportation Security Administration System of Records AGENCY: Privacy Office, Department of Homeland Security... and programs. The Transportation Security Administration will rely upon Department of Homeland.../Transportation Security Administration (TSA)-009 General Legal Records (August 18, 2003, 68 FR 49496), which......

  1. Security and Fairness Enhancement for America Act of 2009

    THOMAS, 111th Congress

    Rep. Goodlatte, Bob [R-VA-6

    2009-05-07

    06/12/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  2. Continuing Chemical Facilities Antiterrorism Security Act of 2010

    THOMAS, 111th Congress

    Rep. Dent, Charles W. [R-PA-15

    2010-04-29

    05/05/2010 Referred to the Subcommittee on Transportation Security and Infrastructure Protection. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  3. National Security Agency Data Collection Review Act of 2014

    THOMAS, 113th Congress

    Rep. Carney, John C., Jr. [D-DE-At Large

    2014-01-15

    03/20/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  4. Protecting the Privacy of Social Security Numbers Act of 2013

    THOMAS, 113th Congress

    Rep. Frelinghuysen, Rodney P. [R-NJ-11

    2013-05-22

    06/14/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  5. Securing our Borders and our Data Act of 2009

    THOMAS, 111th Congress

    Rep. Engel, Eliot L. [D-NY-17

    2009-01-07

    02/09/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  6. Transportation Security Administration Efficiency and Flexibility Act of 2011

    THOMAS, 112th Congress

    Sen. Wicker, Roger F. [R-MS

    2011-07-13

    07/13/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  7. Commission on Measures of Household Economic Security Act of 2010

    THOMAS, 111th Congress

    Sen. Feingold, Russell D. [D-WI

    2009-12-11

    12/11/2009 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  8. Personal Data Privacy and Security Act of 2014

    THOMAS, 113th Congress

    Rep. Shea-Porter, Carol [D-NH-1

    2014-02-04

    03/20/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  9. Social Security Number Fraud and Identity Theft Prevention Act

    THOMAS, 111th Congress

    Rep. Coffman, Mike [R-CO-6

    2009-05-19

    06/12/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  10. Security through Termination Of Proliferation Act of 2009

    THOMAS, 111th Congress

    Rep. Ros-Lehtinen, Ileana [R-FL-18

    2009-01-13

    03/16/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  11. Gigabit Satellite Network for NASA's Advanced Communication Technology Satellite (ACTS)

    NASA Technical Reports Server (NTRS)

    Hoder, Douglas; Bergamo, Marcos

    1996-01-01

    The advanced communication technology satellite (ACTS) gigabit satellite network provides long-haul point-to-point and point-to-multipoint full-duplex SONET services over NASA's ACTS. at rates up to 622 Mbit/s (SONET OC-12), with signal quality comparable to that obtained with terrestrial fiber networks. Data multiplexing over the satellite is accomplished using time-division multiple access (TDMA) techniques coordinated with the switching and beam hopping facilities provided by ACTS. Transmissions through the satellite are protected with Reed-Solomon encoding. providing virtually error-free transmission under most weather conditions. Unique to the system are a TDMA frame structure and satellite synchronization mechanism that allow: (a) very efficient utilization of the satellite capacity: (b) over-the-satellite dosed-loop synchronization of the network in configurations with up to 64 ground stations: and (c) ground station initial acquisition without collisions with existing signalling or data traffic. The user interfaces are compatible with SONET standards, performing the function of conventional SONET multiplexers and. as such. can be: readily integrated with standard SONET fiber-based terrestrial networks. Management of the network is based upon the simple network management protocol (SNMP). and includes an over-the-satellite signalling network and backup terrestrial internet (IP-based) connectivity. A description of the ground stations is also included.

  12. 48 CFR 652.236-72 - Statement of Qualifications for the Omnibus Diplomatic Security and Antiterrorism Act.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Qualifications for the Omnibus Diplomatic Security and Antiterrorism Act. 652.236-72 Section 652.236-72 Federal... Security and Antiterrorism Act. As prescribed in 636.570(b), insert the following provision: Statement of Qualifications for the Omnibus Diplomatic Security and Antiterrorism Act (APR 2004) (a) This solicitation...

  13. Supplemental Analysis of the American Clean Energy and Security Act of 2009 (June 2009)

    EPA Pesticide Factsheets

    View EPA's Supplemental Analysis of the American Clean Energy and Security Act of 2009, along with its accompanying appendix and a cover letter to Senator George Voinovich regarding the Supplemental Analysis.

  14. AVIATION SECURITY: Terrorist Acts Demonstrate Urgent Need to Improve Security at the Nation’s Airports

    DTIC Science & Technology

    2007-11-02

    what actually occurred or what all the weaknesses in the nation’s aviation security apparatus are that contributed to the horrendous events of last week...it is clear that serious weaknesses exist in our aviation security system and that their impact can be far more devastating than previously imagined...offer some observations about improving aviation security in these various areas.

  15. A Sensor and Communications System for Containerized-Cargo Security

    SciTech Connect

    Leach Jr., R R

    2005-02-10

    A public/private collaboration between federal, state, provincial, and local U.S. and Canadian governmental organizations, called the Canada - United States Cargo Security Project has been formed, with the goal to improve security of containerized cargo moving from overseas locations into eastern Canadian provinces and the Northeastern United States. The current phase of this project has two technical objectives. These are: (1) to build and test a prototype in-container sensor system able to detect unauthorized entry into the container and the presence of radioactive material, to record geographical location and environmental data, and to transmit this information via satellite communications to a remote monitoring facility, and (2) to develop a secure website where data from the in-container sensors and other information will be displayed in real or near-real time and can be made available to law enforcement and emergency response organizations as appropriate. This paper will describe these activities, currently being undertaken by the Lawrence Livermore National Laboratory. An additional goal of the project's current phase is to integrate multi-jurisdictional training and first-responder exercises while monitoring and tracking container shipments from overseas to the US via Canadian ports-of-entry into North America. This activity is being undertaken by other project partners, which include the National Infrastructure Institute--Center for Infrastructure Expertise (NI2CIE), Transport Canada, Canadian Provinces of Quebec and Nova Scotia, Ports of Halifax and Montreal, U.S. Coast Guard (First Coast Guard District), States of New Hampshire, Maine, Vermont, and New York and the Port of Portland.

  16. 32 CFR Appendix A to Part 1292 - Section 21 of the Internal Security Act of 1950

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Section 21 of the Internal Security Act of 1950 A Appendix A to Part 1292 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES Pt. 1292, App. A Appendix A to...

  17. P.L. 110-140, "Energy Independence and Security Act of 2007", 2007

    SciTech Connect

    2007-12-19

    The Energy Independence and Security Act of 2007 (EISA), signed into law on December 19, 2007, set forth an agenda for improving U.S. energy security across the entire economy. While industrial energy efficiency is specifically called out in Title IV, Subtitle D, other EISA provisions also apply to AMO activities.

  18. The Employee Retirement Income Security Act of 1974: Policies and Problems

    ERIC Educational Resources Information Center

    Alperin, Stuart N.; And Others

    1975-01-01

    Congress enacted the Employment Retirement Income Security Act of 1974 (ERISA) to help assure economic security in retirement. This analysis includes description of the growth, operation, and inequities within the private pension system and analysis of ERISA: (1) participation, vesting and joint and survivor annuities; (2) funding and plan…

  19. 76 FR 26738 - Privacy Act of 1974; Department of Homeland Security/United States Citizenship and Immigration...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-09

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/United States... 1974, the Department of Homeland Security proposes to update and reissue a current Department of Homeland Security system of records titled ``Department of Homeland Security/United States Citizenship...

  20. Targeting Homeland Security Resources Effectively Against Terrorism Act of 2009

    THOMAS, 111th Congress

    Rep. Weiner, Anthony D. [D-NY-9

    2009-01-27

    02/05/2009 Referred to the Subcommittee on Emergency Communications, Preparedness, and Response. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. Civil Air Patrol Homeland Security Support Act of 2009

    THOMAS, 111th Congress

    Rep. Dent, Charles W. [R-PA-15

    2009-03-19

    03/24/2009 Referred to the Subcommittee on Emergency Communications, Preparedness, and Response. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  2. Advanced Communications Technology Satellite (ACTS) Used for Inclined Orbit Operations

    NASA Technical Reports Server (NTRS)

    Bauer, Robert A.

    2000-01-01

    The Advanced Communications Technology Satellite (ACTS) is operated by the NASA Glenn Research Center at Lewis Field 24 hours a day, 7 days a week. ACTS, which was launched in September 1993, is in its 7th year of operations, far exceeding the system s planned 2 years of operations and 4 years of designed mission life. After 5 successful years of operating as a geostationary satellite, the spacecraft s North-South stationkeeping was discontinued in August 1998. The system is now operating in an inclined orbit that increases at a rate of 0.8 /yr. With only scarce fuel remaining, operating in this mode extends the usage of the still totally functional payload. Although tracking systems are now needed on the experimenter Earth stations, experiment operations have continued with very little disruption. This is the only known geosynchronous Ka-band (30/20 GHz) spot-beam satellite operating in an inclined orbit. The project began its transition from geostationary operations to inclined operations in August 1998. This did not interrupt operations and was transparent to the experimenters on the system. For the space segment, new daily procedures were implemented to maintain the pointing of the system s narrow 0.3 spot beams while the spacecraft drifts in the North-South direction. For the ground segment, modifications were designed, developed, and fielded for the three classes of experimenter Earth stations. With the next generation of commercial satellite systems still being developed, ACTS remains the only operational testbed for Ka-band geosynchronous satellite communications over the Western hemisphere. Since inclined orbit operations began, the ACTS experiments program has supported 43 investigations by industry, Government, and academic organizations, as well as four demonstrations. The project s goals for inclined-orbit operations now reflect a narrower focus in the types of experiments that will be done. In these days of "faster, better, cheaper," NASA is seeking

  3. 77 FR 35336 - Privacy and Security of Information Stored on Mobile Communications Devices

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-13

    ... COMMISSION 47 CFR Part 64 Privacy and Security of Information Stored on Mobile Communications Devices AGENCY... privacy and data security practices of mobile wireless services providers with respect to customer information stored on their users' mobile communications devices. In addition, the document seeks comment...

  4. Quantum secure direct communication protocol with blind polarization bases and particles' transmitting order

    NASA Astrophysics Data System (ADS)

    Song, Jie; Zhu, Ai-Dong; Zhang, Shou

    2007-03-01

    This paper presents a modified secure direct communication protocol by using the blind polarization bases and particles' random transmitting order. In our protocol, a sender (Alice) encodes secret messages by rotating a random polarization angle of particle and then the receiver (Bob) sends back these particles as a random sequence. This ensures the security of communication.

  5. The Computer Fraud and Abuse Act of 1986 and the Computer Security Act of 1987: Impact on incident response efforts

    SciTech Connect

    Schultz, E.E.

    1991-10-11

    The purpose of this paper is to evaluate two Federal statutes, the Computer Fraud and Abuse Act of 1986 and the Computer Security Act of 1987, from the perspective of computer security incident response efforts. First, the major relevant provisions of each statute are presented. Next, revisions to each statute are proposed, and additional areas needing to be addressed in future legislation are presented. The major conclusion is that these statutes represent a start in the legislative process to deter and prevent computer offenses such as unauthorized access to systems. However, many revisions and additions are needed before such legislation will significantly impact incident response efforts. In addition, legislation alone cannot bring about the degree of change necessary to address the range of computer security threats that presently exist.

  6. An integrated solution for secure group communication in wide-area networks

    SciTech Connect

    Agarwal, Deborah A.; Chevassut, Olivier; Thompson, Mary; Tsudik, Gene

    2001-04-01

    Many distributed applications require a secure reliable group communication system to provide coordination among the application components. This paper describes a secure group layer (SGL) which bundles a reliable group communication system, a group authorization and access control mechanism, and a group key agreement protocol to provide a comprehensive and practical secure group communication platform. SGL also encapsulates the standard message security services (i.e, confidentiality, authenticity and integrity). A number of challenging issues encountered in the design of SGL are brought to light and experimental results obtained with a prototype implementation are discussed.

  7. Border Enforcement Security Task Force Act of 2011

    THOMAS, 112th Congress

    Rep. Cuellar, Henry [D-TX-28

    2011-02-17

    02/24/2011 Referred to the Subcommittee on Border and Maritime Security. (All Actions) Notes: For further action, see H.R.915, which became Public Law 112-205 on 12/7/2012. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  8. Protecting the Privacy of Social Security Numbers Act of 2009

    THOMAS, 111th Congress

    Rep. Frelinghuysen, Rodney P. [R-NJ-11

    2009-01-06

    02/09/2009 Referred to the Subcommittee on Crime, Terrorism, and Homeland Security. (All Actions) Notes: For further action, see S.3789, which became Public Law 111-318 on 12/18/2010. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  9. Homeland Security Cybersecurity Boots-on-the-Ground Act

    THOMAS, 113th Congress

    Rep. Clarke, Yvette D. [D-NY-9

    2013-09-17

    07/29/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  10. Public Transit Security and Local Law Enforcement Support Act

    THOMAS, 112th Congress

    Rep. Turner, Robert L. [R-NY-9

    2012-01-31

    09/13/2012 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  11. Continuing Chemical Facilities Antiterrorism Security Act of 2011

    THOMAS, 112th Congress

    Sen. Collins, Susan M. [R-ME

    2011-03-03

    10/20/2011 By Senator Lieberman from Committee on Homeland Security and Governmental Affairs filed written report. Report No. 112-90. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  12. Secure and Responsible Drug Disposal Act of 2009

    THOMAS, 111th Congress

    Rep. Stupak, Bart [D-MI-1

    2009-03-05

    04/27/2009 Referred to the Subcommittee on Crime, Terrorism, and Homeland Security. (All Actions) Notes: For further action, see S.3397, which became Public Law 111-273 on 10/12/2010. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  13. Department of Homeland Security Component Privacy Officer Act of 2009

    THOMAS, 111th Congress

    Rep. Carney, Christopher P. [D-PA-10

    2009-03-19

    03/26/2009 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  14. Domestic Fuel for Enhancing National Security Act of 2011

    THOMAS, 112th Congress

    Sen. Murray, Patty [D-WA

    2011-05-25

    05/25/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (text of measure as introduced: CR S3345) (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  15. Safe and Secure Federal Websites Act of 2014

    THOMAS, 113th Congress

    Rep. Bentivolio, Kerry L. [R-MI-11

    2013-12-03

    07/29/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  16. Cyber Security and American Cyber Competitiveness Act of 2011

    THOMAS, 112th Congress

    Sen. Reid, Harry [D-NV

    2011-01-25

    01/25/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (text of measure as introduced: CR S130) (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  17. Homeland Security Science and Technology Authorization Act of 2010

    THOMAS, 111th Congress

    Rep. Clarke, Yvette D. [D-NY-11

    2010-03-15

    07/21/2010 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  18. National Security Letters, the USA PATRIOT Act, and the Constitution: The Tensions between National Security and Civil Rights

    ERIC Educational Resources Information Center

    Gorham-Oscilowski, Ursula; Jaeger, Paul T.

    2008-01-01

    In response to the terrorist attacks of 9/11, the USA PATRIOT Act greatly expanded the ability of the Federal Bureau of Investigation to use National Security Letters (NSLs) in investigations and the contexts in which they could be used by relaxing the standards under which NSLs could be employed. NSLs allow investigators to acquire a significant…

  19. P.L. 96-294, "Energy Security Act" (1980)

    SciTech Connect

    2011-12-13

    Declares it to be the purpose of this title to reduce dependence on foreign energy resources by producing synthetic fuel. Part A: Development of Synthetic Fuel Under the Defense Production Act of 1950 - Defense Production Act Amendments of 1980 - Amends the Defense Production Act of 1950 to include within the policy objectives of such Act Government preparedness to contend with foreign actions which could reduce or terminate the availability of material, including energy, which is crucial to national defense. States that greater independence in domestic energy supplies is necessary to national defense preparedness. Designates "energy" as a "strategic and critical material." States that such designation shall not give the President any authority: (1) for the mandatory allocation or pricing of any fuel or feedstock; or (2) to engage in the production of energy in any manner whatsoever, except for synthetic fuel production.

  20. Advanced Communication Technology Satellite (ACTS) multibeam antenna analysis and experiment

    NASA Technical Reports Server (NTRS)

    Acosta, Roberto J.; Lagin, Alan R.; Larko, Jeffrey M.; Narvaez, Adabelle

    1992-01-01

    One of the most important aspects of a satellite communication system design is the accurate estimation of antenna performance degradation. Pointing error, end coverage gain, peak gain degradation, etc. are the main concerns. The thermal or dynamic distortions of a reflector antenna structural system can affect the far-field antenna power distribution in a least four ways. (1) The antenna gain is reduced; (2) the main lobe of the antenna can be mispointed thus shifting the destination of the delivered power away from the desired locations; (3) the main lobe of the antenna pattern can be broadened, thus spreading the RF power over a larger area than desired; and (4) the antenna pattern sidelobes can increase, thus increasing the chances of interference among adjacent beams of multiple beam antenna system or with antenna beams of other satellites. The in-house developed NASA Lewis Research Center thermal/structural/RF analysis program was designed to accurately simulate the ACTS in-orbit thermal environment and predict the RF antenna performance. The program combines well establish computer programs (TRASYS, SINDA and NASTAN) with a dual reflector-physical optics RF analysis program. The ACTS multibeam antenna configuration is analyzed and several thermal cases are presented and compared with measurements (pre-flight).

  1. Information Data Security Specialists' and Business Leaders' Experiences Regarding Communication Challenges

    ERIC Educational Resources Information Center

    Lopez, Robert H.

    2012-01-01

    The problem addressed was the need to maintain data security in the field of information technology. Specifically, the breakdown of communication between business leaders and data security specialists create risks to data security. The purpose of this qualitative phenomenological study was to determine which factors would improve communication…

  2. Quantum secure direct communication of digital and analog signals using continuum coherent states

    NASA Astrophysics Data System (ADS)

    Guerra, Antônio Geovan de Araújo Holanda; Rios, Francisco Franklin Sousa; Ramos, Rubens Viana

    2016-11-01

    In this work, we present optical schemes for secure direct quantum communication of digital and analog signals using continuum coherent states and frequency-dependent phase modulation. The main advantages of the proposed schemes are that they do not use entangled states and they can be implemented with today technology. The theory of quantum interference of continuum coherent state is described, and the optical setups for secure direct communication are presented and their securities are discussed.

  3. 77 FR 43639 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-25

    ... ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA..., SSA, as shown above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy... persons. The Privacy Act, as amended, regulates the use of computer matching by Federal agencies...

  4. 77 FR 54943 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-06

    ... ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA..., SSA, as shown above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy... persons. The Privacy Act, as amended, regulates the use of computer matching by Federal agencies...

  5. A Leadership Imperative: Complying with the Student Right To Know and the Campus Security Act.

    ERIC Educational Resources Information Center

    Woolley, Rosemary; Odo, Tina; Keener, Barbara

    Focusing on the Student Right to Know and Campus Security Act of 1990, this document presents the text of the Act and an implementation plan developed by Missouri's St. Louis Community College (SLCC). The first section provides a general overview of legal issues and student affairs in community colleges, while the second presents the text of the…

  6. 78 FR 46256 - Security Program, Report of Suspected Crimes, Suspicious Transactions, Catastrophic Acts and Bank...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-31

    ... From the Federal Register Online via the Government Publishing Office NATIONAL CREDIT UNION ADMINISTRATION 12 CFR Part 748 Security Program, Report of Suspected Crimes, Suspicious Transactions, Catastrophic Acts and Bank Secrecy Act Compliance CFR Correction In Title 12 of the Code of Federal...

  7. How Has Vesting Changed Since Passage of Employee Retirement Income Security Act?

    ERIC Educational Resources Information Center

    Graham, Avy D.

    1988-01-01

    Provisions of employer-financed retirement plans have been changed to reflect statutory requirements of the Employee Retirement Income Security Act and other laws. The author discusses the vesting provisions of two types of plans--defined benefit pension plans and defined contribution plans. Future revisions, due to the 1986 Tax Reform Act, are…

  8. Provisions of the Food Security Act of 1985. Agricultural Information Bulletin Number 498.

    ERIC Educational Resources Information Center

    Glaser, Lewrene K.

    This report summarizes the 18 titles of the Food Security Act of 1985 and compares it with previous legislation where applicable. It describes the act's provisions for dairy; wool and mohair; wheat; feed grains; cotton; rice; peanuts; soybeans; sugar; other general commodity provisions; trade; conservation; credit; agricultural research,…

  9. Border Security, Economic Opportunity, and Immigration Modernization Act

    THOMAS, 113th Congress

    Rep. Garcia, Joe [D-FL-26

    2013-10-02

    03/26/2014 Motion to Discharge Committee filed by Mr. Garcia. Petition No: 113-9. (Discharge petition text with signatures.) (All Actions) Notes: On 3/26/2014, a motion was filed to discharge the Committees on the Judiciary, Foreign Affairs, Homeland Security, Ways and Means, Armed Services, Natural Resources, Agriculture, Education and the Workforce, Energy and Commerce, Oversight and Government Reform, the Budget, Science... Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  10. DICOM image secure communications with Internet protocols IPv6 and IPv4.

    PubMed

    Zhang, Jianguo; Yu, Fenghai; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen

    2007-01-01

    Image-data transmission from one site to another through public network is usually characterized in term of privacy, authenticity, and integrity. In this paper, we first describe a general scenario about how image is delivered from one site to another through a wide-area network (WAN) with security features of data privacy, integrity, and authenticity. Second, we give the common implementation method of the digital imaging and communication in medicine (DICOM) image communication software library with IPv6/IPv4 for high-speed broadband Internet by using open-source software. Third, we discuss two major security-transmission methods, the IP security (IPSec) and the secure-socket layer (SSL) or transport-layer security (TLS), being used currently in medical-image-data communication with privacy support. Fourth, we describe a test schema of multiple-modality DICOM-image communications through TCP/IPv4 and TCP/IPv6 with different security methods, different security algorithms, and operating systems, and evaluate the test results. We found that there are tradeoff factors between choosing the IPsec and the SSL/TLS-based security implementation of IPv6/IPv4 protocols. If the WAN networks only use IPv6 such as in high-speed broadband Internet, the choice is IPsec-based security. If the networks are IPv4 or the combination of IPv6 and IPv4, it is better to use SSL/TLS security. The Linux platform has more security algorithms implemented than the Windows (XP) platform, and can achieve better performance in most experiments of IPv6 and IPv4-based DICOM-image communications. In teleradiology or enterprise-PACS applications, the Linux operating system may be the better choice as peer security gateways for both the IPsec and the SSL/TLS-based secure DICOM communications cross public networks.

  11. 75 FR 18860 - Privacy Act of 1974, Department of Homeland Security Transportation Security Administration-013...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-13

    ... designed to defend aircraft flight decks against acts of criminal violence or air piracy. As a result of... Deck Officer Program designed to defend aircraft flight decks against acts of criminal violence or air... law enforcement to defend the flight decks of aircraft of such air carriers against acts of...

  12. Secured Optical Communications Using Quantum Entangled Two-Photon Transparency Modulation

    NASA Technical Reports Server (NTRS)

    Kojima, Jun (Inventor); Nguyen, Quang-Viet (Inventor); Lekki, John (Inventor)

    2015-01-01

    A system and method is disclosed wherein optical signals are coded in a transmitter by tuning or modulating the interbeam delay time (which modulates the fourth-order coherence) between pairs of entangled photons. The photon pairs are either absorbed or not absorbed (transparent) by an atomic or molecular fluorescer in a receiver, depending on the inter-beam delay that is introduced in the entangled photon pairs. Upon the absorption, corresponding fluorescent optical emissions follow at a certain wavelength, which are then detected by a photon detector. The advantage of the disclosed system is that it eliminates a need of a coincidence counter to realize the entanglement-based secure optical communications because the absorber acts as a coincidence counter for entangled photon pairs.

  13. A new image representation for compact and secure communication

    SciTech Connect

    Prasad, Lakshman; Skourikhine, A. N.

    2004-01-01

    In many areas of nuclear materials management there is a need for communication, archival, and retrieval of annotated image data between heterogeneous platforms and devices to effectively implement safety, security, and safeguards of nuclear materials. Current image formats such as JPEG are not ideally suited in such scenarios as they are not scalable to different viewing formats, and do not provide a high-level representation of images that facilitate automatic object/change detection or annotation. The new Scalable Vector Graphics (SVG) open standard for representing graphical information, recommended by the World Wide Web Consortium (W3C) is designed to address issues of image scalability, portability, and annotation. However, until now there has been no viable technology to efficiently field images of high visual quality under this standard. Recently, LANL has developed a vectorized image representation that is compatible with the SVG standard and preserves visual quality. This is based on a new geometric framework for characterizing complex features in real-world imagery that incorporates perceptual principles of processing visual information known from cognitive psychology and vision science, to obtain a polygonal image representation of high fidelity. This representation can take advantage of all textual compression and encryption routines unavailable to other image formats. Moreover, this vectorized image representation can be exploited to facilitate automated object recognition that can reduce time required for data review. The objects/features of interest in these vectorized images can be annotated via animated graphics to facilitate quick and easy display and comprehension of processed image content.

  14. 17 CFR 270.14a-1 - Use of notification pursuant to regulation E under the Securities Act of 1933.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... of 1933 by a small business investment company operating under the Small Business Investment Act of... to regulation E under the Securities Act of 1933. 270.14a-1 Section 270.14a-1 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) RULES AND REGULATIONS, INVESTMENT...

  15. 78 FR 43893 - Privacy Act of 1974; Department of Homeland Security U.S. Citizenship and Immigration Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-22

    ... Immigration Services--011 E-Verify Program System of Records AGENCY: Privacy Office, Department of Homeland Security. ACTION: Notice of Privacy Act system of records. SUMMARY: In accordance with the Privacy Act of... Homeland Security system of records titled ``Department of Homeland Security/United States Citizenship...

  16. 78 FR 31958 - Privacy Act of 1974; Department of Homeland Security U.S. Customs and Border Protection-007...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-28

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security U.S. Customs and Border Protection-007-Border Crossing Information System of Records AGENCY: Privacy Office, Department of Homeland Security. ACTION: Notice of Privacy Act System of Records. SUMMARY: In accordance with the...

  17. The Affordable Care Act: A Prescription for Homeland Security Preparedness?

    DTIC Science & Technology

    2014-09-01

    purchase health insurance  Correct the inequity of Medicaid preventive coverage for new beneficiaries vs. existing beneficiaries  Design and...might incentivize choosing health insurance over penalties. D. ADDRESS MEDICAID PREVENTIVE COVERAGE INEQUITY As noted in Chapter V, § 1001 of the...Affordable Care Act (ACA), tens of millions of U.S. citizens were without health insurance coverage. Without health insurance, health care can be

  18. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOEpatents

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    2015-01-06

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  19. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOEpatents

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  20. 78 FR 20705 - Securities Act of 1933; Securities Exchange Act of 1934; Order Regarding Review of FASB...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-05

    ... ``generally accepted'' under Section 108 of the Act.\\1\\ As a consequence of that recognition, the Commission... have additional sources of revenue for its activities, such as earnings from sales of publications, provided that each additional source of revenue shall not jeopardize, in the judgment of the...

  1. 75 FR 6231 - Securities Act of 1933; Securities Exchange Act of 1934; Order Regarding Review of FASB...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-08

    ... ``generally accepted'' under Section 108 of the Act.\\1\\ As a consequence of that recognition, the Commission... have additional sources of revenue for its activities, such as earnings from sales of publications, provided that each additional source of revenue shall not jeopardize, in the judgment of the...

  2. 76 FR 8755 - Privacy Act of 1974; Department of Homeland Security/ALL-032 Official Passport Application and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-15

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL--032 Official... titled, ``Department of Homeland Security/ ALL--032 Official Passport Application and Maintenance Records..., Privacy Office, Department of Homeland Security, Washington, DC 20528. Instructions: All...

  3. 76 FR 53921 - Privacy Act of 1974; Department of Homeland Security ALL-034 Emergency Care Medical Records...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-30

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security ALL--034 Emergency... of Homeland Security/ ALL--034 Emergency Care Medical Records System of Records Notice.'' This system... of Homeland Security, Washington, DC 20528. Instructions: All submissions received must include...

  4. 76 FR 39408 - Privacy Act of 1974; Department of Homeland Security/ALL-030 Use of the Terrorist Screening...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-06

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL-030 Use of the... Homeland Security/ALL-030 Use of the Terrorist Screening Database System of Records.'' The Department of... of Homeland Security, Washington, DC 20528. Instructions: All submissions received must include...

  5. 77 FR 70792 - Privacy Act of 1974; Department of Homeland Security/ALL-004 General Information Technology...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL-004 General... Homeland Security system of records notice titled, Department of Homeland Security/ALL-004 General..., Washington, DC 20528. Instructions: All submissions received must include the agency name and docket...

  6. Security for Telecommuting and Broadband Communications: Recommendations of the National Institute of Standards and Technology

    NASA Astrophysics Data System (ADS)

    Kuhn, D. R.; Tracy, Miles C.; Frankel, Sheila E.

    2002-08-01

    This document is intended to assist those responsible - users, system administrators, and management - for telecommuting security, by providing introductory information about broadband communication security and policy, security of home office systems, and considerations for system administrators in the central office. It addresses concepts relating to the selection, deployment, and management of broadband communications for a telecommuting user. This document is not intended to provide a mandatory framework for telecommuting or home office broadband communication environments, but rather to present suggested approaches to the topic.

  7. Lossless quantum data compression and secure direct communication

    NASA Astrophysics Data System (ADS)

    Boström, Kim

    2004-07-01

    This thesis deals with the encoding and transmission of information through a quantum channel. A quantum channel is a quantum mechanical system whose state is manipulated by a sender and read out by a receiver. The individual state of the channel represents the message. The two topics of the thesis comprise 1) the possibility of compressing a message stored in a quantum channel without loss of information and 2) the possibility to communicate a message directly from one party to another in a secure manner, that is, a third party is not able to eavesdrop the message without being detected. The main results of the thesis are the following. A general framework for variable-length quantum codes is worked out. These codes are necessary to make lossless compression possible. Due to the quantum nature of the channel, the encoded messages are in general in a superposition of different lengths. It is found to be impossible to compress a quantum message without loss of information if the message is not apriori known to the sender. In the other case it is shown that lossless quantum data compression is possible and a lower bound on the compression rate is derived. Furthermore, an explicit compression scheme is constructed that works for arbitrarily given source message ensembles. A quantum cryptographic protocol - the “ping-pong protocol” - is presented that realizes the secure direct communication of classical messages through a quantum channel. The security of the protocol against arbitrary eavesdropping attacks is proven for the case of an ideal quantum channel. In contrast to other quantum cryptographic protocols, the ping-pong protocol is deterministic and can thus be used to transmit a random key as well as a composed message. The protocol is perfectly secure for the transmission of a key, and it is quasi-secure for the direct transmission of a message. The latter means that the probability of successful eavesdropping exponentially decreases with the length

  8. 6 CFR Appendix A to Part 5 - FOIA/Privacy Act Offices of the Department of Homeland Security

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false FOIA/Privacy Act Offices of the Department of... SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Pt. 5, App. A Appendix A to Part 5—FOIA/Privacy Act Offices... of Homeland Security, FOIA and Privacy Act requests should be sent to the Departmental...

  9. 76 FR 24905 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-DHS/USCG-007...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-03

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security United States Coast Guard--DHS/USCG-007 Special Needs Program System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY: In accordance with the Privacy Act of 1974, the...

  10. 47 CFR 80.305 - Watch requirements of the Communications Act and the Safety Convention.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Watch requirements of the Communications Act... (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES STATIONS IN THE MARITIME SERVICES Safety Watch Requirements and Procedures Ship Station Safety Watches § 80.305 Watch requirements of the Communications Act and the...

  11. 47 CFR 80.305 - Watch requirements of the Communications Act and the Safety Convention.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Watch requirements of the Communications Act... (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES STATIONS IN THE MARITIME SERVICES Safety Watch Requirements and Procedures Ship Station Safety Watches § 80.305 Watch requirements of the Communications Act and the...

  12. 47 CFR 80.305 - Watch requirements of the Communications Act and the Safety Convention.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Watch requirements of the Communications Act... (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES STATIONS IN THE MARITIME SERVICES Safety Watch Requirements and Procedures Ship Station Safety Watches § 80.305 Watch requirements of the Communications Act and the...

  13. Security of electronic mental health communication and record-keeping in the digital age.

    PubMed

    Elhai, Jon D; Frueh, B Christopher

    2016-02-01

    The mental health field has seen a trend in recent years of the increased use of information technology, including mobile phones, tablets, and laptop computers, to facilitate clinical treatment delivery to individual patients and for record keeping. However, little attention has been paid to ensuring that electronic communication with patients is private and secure. This is despite potentially deleterious consequences of a data breach, which are reported in the news media very frequently in modern times. In this article, we present typical security concerns associated with using technology in clinical services or research. We also discuss enhancing the privacy and security of electronic communication with clinical patients and research participants. We offer practical, easy-to-use software application solutions for clinicians and researchers to secure patient communication and records. We discuss such issues as using encrypted wireless networks, secure e-mail, encrypted messaging and videoconferencing, privacy on social networks, and others.

  14. 75 FR 60458 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-30

    ... COMMISSION Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital... Communications Commission's (FCC) Advisory Committee on Diversity for Communications in the Digital Age (``Diversity Committee'') will hold a meeting on Thursday, October 14, 2010 at 2 p.m. at the...

  15. 75 FR 20844 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-21

    ... COMMISSION Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital... Communications Commission's (FCC) Advisory Committee on Diversity for Communications in the Digital Age (``Diversity Committee'') will hold a meeting on Tuesday, June 15, 2010 at 2:00 p.m. in the Commission...

  16. 75 FR 6031 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-05

    ... COMMISSION Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital... Communications Commission's (FCC) Advisory Committee on Diversity for Communications in the Digital Age (``Diversity Committee'') will hold a meeting on Wednesday, March 24, 2010 at 2 p.m. in the Commission...

  17. 75 FR 70004 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-16

    ... COMMISSION Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital... Communications Commission's (FCC) Advisory Committee on Diversity for Communications in the Digital Age (``Diversity Committee'') will hold a meeting on Thursday, December 2, 2010 at 2 p.m. in the Commission...

  18. 76 FR 5160 - Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-28

    ... COMMISSION Federal Advisory Committee Act; Advisory Committee on Diversity for Communications in the Digital... Communications Commission (FCC) has renewed the charter of the Advisory Committee on Diversity for Communications in the Digital Age (``Diversity Committee''). ADDRESSES: A copy of the charter is available at...

  19. 75 FR 28042 - Privacy Act of 1974: System of Records; Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-19

    ... or prosecutions of violations of criminal law are exempt under 5 U.S.C. 552a(j)(2). These exemptions..., and persons when DHS/TSA suspects or has confirmed that the security or confidentiality of an... entities where it would assist in the enforcement of civil or criminal laws. Additionally, DHS/TSA...

  20. 78 FR 55270 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-10

    ... records containing the results from TSA's intelligence-driven risk- based analysis of Secure Flight... CFR Sec. 1560. \\1\\ 77 FR 69491 (Nov. 19, 2012). Under sec. 4012(a)(1)-(2) of the Intelligence Reform... Intelligence Agency, the Secretary of the Treasury, and the Secretary of Defense. The Attorney General,...

  1. Reply to 'Comment on 'Secure direct communication with a quantum one-time-pad''

    SciTech Connect

    Deng Fuguo; Long Guilu

    2005-07-15

    We reply to the preceding comment which focused on whether there exists a quantum privacy amplification technique for purifying the unknown single-photon states transmitted. In this Reply, we will show that quantum privacy amplification is principally possible, and a specific scheme for direct communication protocol based on single photons has been constructed and will be published elsewhere. Then the secure direct quantum communication is secure against the attack strategy in the preceding comment by using quantum privacy amplification directly.

  2. From Fault-Diagnosis and Performance Recovery of a Controlled System to Chaotic Secure Communication

    NASA Astrophysics Data System (ADS)

    Hsu, Wen-Teng; Tsai, Jason Sheng-Hong; Guo, Fang-Cheng; Guo, Shu-Mei; Shieh, Leang-San

    Chaotic systems are often applied to encryption on secure communication, but they may not provide high-degree security. In order to improve the security of communication, chaotic systems may need to add other secure signals, but this may cause the system to diverge. In this paper, we redesign a communication scheme that could create secure communication with additional secure signals, and the proposed scheme could keep system convergence. First, we introduce the universal state-space adaptive observer-based fault diagnosis/estimator and the high-performance tracker for the sampled-data linear time-varying system with unanticipated decay factors in actuators/system states. Besides, robustness, convergence in the mean, and tracking ability are given in this paper. A residual generation scheme and a mechanism for auto-tuning switched gain is also presented, so that the introduced methodology is applicable for the fault detection and diagnosis (FDD) for actuator and state faults to yield a high tracking performance recovery. The evolutionary programming-based adaptive observer is then applied to the problem of secure communication. Whenever the tracker induces a large control input which might not conform to the input constraint of some physical systems, the proposed modified linear quadratic optimal tracker (LQT) can effectively restrict the control input within the specified constraint interval, under the acceptable tracking performance. The effectiveness of the proposed design methodology is illustrated through tracking control simulation examples.

  3. Speech Acts across Cultures: Challenges to Communication in a Second Language. Studies on Language Acquisition, 11.

    ERIC Educational Resources Information Center

    Gass, Susan M., Ed.; Neu, Joyce, Ed.

    Articles on speech acts and intercultural communication include: "Investigating the Production of Speech Act Sets" (Andrew Cohen); "Non-Native Refusals: A Methodological Perspective" (Noel Houck, Susan M. Gass); "Natural Speech Act Data versus Written Questionnaire Data: How Data Collection Method Affects Speech Act…

  4. Method of Performance-Aware Security of Unicast Communication in Hybrid Satellite Networks

    NASA Technical Reports Server (NTRS)

    Roy-Chowdhury, Ayan (Inventor); Baras, John S. (Inventor)

    2014-01-01

    A method and apparatus utilizes Layered IPSEC (LES) protocol as an alternative to IPSEC for network-layer security including a modification to the Internet Key Exchange protocol. For application-level security of web browsing with acceptable end-to-end delay, the Dual-mode SSL protocol (DSSL) is used instead of SSL. The LES and DSSL protocols achieve desired end-to-end communication security while allowing the TCP and HTTP proxy servers to function correctly.

  5. Measuring communication and social skills in a high security forensic setting using the behavioural status index.

    PubMed

    Woods, P; Reed, V; Collins, M

    2001-06-01

    Assessing patient functioning in the areas of communication and social skills is a core area of practice within psychiatric nursing. Difficulties within these areas can often represent the root of a number of presenting problems. Objective assessment can be difficult without a validated assessment schema. The Behavioural Status Index (BSI) offers such a system of baseline assessment and longitudinal monitoring as a basis for treatment, further specialised assessment, or measurement of outcome during and after interventions. This paper introduces some basic theory and describes the function and purpose of the BSI. This is followed by data analysis for the BSI communications and social skills sub-scale. Data were collected, using a repeated measures method by primary nurses, from a sample of 503 individual patients in two high security mental health hospitals. Results are reported for descriptive statistics, and factor analysis; and differences between the independent groups of Mental Health Act 1983 classification, ward dependency and gender. Data trends are indicative of clinically interesting relationships. A distinct factorial structure emerged suggesting groupings of assertive-interpersonal, non-verbal, social-perceptive and para-linguistic behaviours. Results are reported to be underpinning current European studies.

  6. Emergency Responder Radio Communications Protection Act of 2014

    THOMAS, 113th Congress

    Rep. Israel, Steve [D-NY-3

    2014-03-11

    04/16/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  7. Education Issues Raised by S.744: The Border Security, Economic Opportunity, and Immigration Modernization Act

    ERIC Educational Resources Information Center

    Murphy, Garrett

    2014-01-01

    This brief report summarizes the requirements for undocumented immigrants set forth by the Border Security, Economic Opportunity, and Immigration Modernization Act (S.744). Assuming that S.744 will move forward in Congress, the report also examines issues having to do with certain language, civics and government, and education/training provisions…

  8. 76 FR 75799 - General Administrative Regulations; Mutual Consent Cancellation; Food Security Act of 1985...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-05

    ... Consent Cancellation; Food Security Act of 1985, Implementation; Denial of Benefits; and Ineligibility for... remove Subpart C--General Administrative Regulations; Mutual Consent Cancellation and Subpart F--Food... quality of the human environment, health, or safety. Therefore, neither an Environmental Assessment nor...

  9. 75 FR 22656 - Order Extending Temporary Conditional Exemptions Under the Securities Exchange Act of 1934 in...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-29

    ... Connection With Request on Behalf of ICE Clear Europe, Limited Related to Central Clearing of Credit Default.... 29, 2009) (temporary exemptions in connection with CDS clearing by ICE Clear Europe Limited) (``2009 ICE Clear Europe order''); Securities Exchange Act Release No. 60373 (Jul. 23, 2009), 74 FR 37740...

  10. 76 FR 42004 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-18

    ... of Homeland Security Federal Emergency Management Agency--011 Training and Exercise Program Records... Training and Exercise Program Records System of Records'' from certain provisions of the Privacy Act... Management Agency--011 Training and Exercise Program Records System of Records'' from one or more...

  11. P.L. 110-140, "Energy Independence and Security Act of 2007" (2007)

    SciTech Connect

    2007-12-13

    An act to move the United States toward greater energy independence and security, to increase the production of clean renewable fuels, to protect consumers, to increase the efficiency of products, buildings, and vehicles, to promote research on and deploy greenhouse gas capture and storage options, and to improve the energy performance of the Federal Government, and for other purposes.

  12. Robust Networking Architecture and Secure Communication Scheme for Heterogeneous Wireless Sensor Networks

    ERIC Educational Resources Information Center

    McNeal, McKenzie, III.

    2012-01-01

    Current networking architectures and communication protocols used for Wireless Sensor Networks (WSNs) have been designed to be energy efficient, low latency, and long network lifetime. One major issue that must be addressed is the security in data communication. Due to the limited capabilities of low cost and small sized sensor nodes, designing…

  13. Public key suppression and recovery using a PANDA ring resonator for high security communication

    NASA Astrophysics Data System (ADS)

    Juleang, Pakorn; Phongsanam, Prapas; Mitatha, Somsak; Yupapin, Preecha P.

    2011-03-01

    An interesting security technique that uses the dark-bright soliton conversion control within the microring resonator is proposed. The obtained outputs for a dark-bright soliton dynamic state can be controlled and used to form the public key suppression for communication security application. However, a good design should be possible to be fabricated; therefore, by using the parameters based on the practical device parameters, the simulation results obtained have shown that the proposed system can indeed be achieved. The public key suppression and public key recovery can be used in a highly secure communication system and has potential applications in optical cryptography.

  14. Advanced Communications Technology Satellite (ACTS): Design and on-orbit performance measurements

    NASA Technical Reports Server (NTRS)

    Gargione, F.; Acosta, R.; Coney, T.; Krawczyk, R.

    1995-01-01

    The Advanced Communications Technology Satellite (ACTS), developed and built by Lockheed Martin Astro space for the NASA Lewis Research Center, was launched in September 1993 on the shuttle STS 51 mission. ACTS is a digital experimental communications test bed that incorporates gigahertz bandwidth transponders operating at Ka band, hopping spot beams, on-board storage and switching, and dynamic rain fade compensation. This paper describes the ACTS enabling technologies, the design of the communications payload, the constraints imposed on the spacecraft bus, and the measurements conducted to verify the performance of the system in orbit.

  15. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  16. Underground Test Area Activity Communication/Interface Plan, Nevada National Security Site, Nevada, Revision 0

    SciTech Connect

    Farnham, Irene; Rehfeldt, Kenneth

    2016-10-01

    The purpose of this plan is to provide guidelines for effective communication and interfacing between Underground Test Area (UGTA) Activity participants, including the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) and its contractors. This plan specifically establishes the following: • UGTA mission, vision, and core values • Roles and responsibilities for key personnel • Communication with stakeholders • Guidance in key interface areas • Communication matrix

  17. National Test Bed Security and Communications Architecture Working Group Report

    DTIC Science & Technology

    1992-04-01

    PtKMITS NETWOItK CONSOl II )A I ION • IMPROVES SIIRVIVAHIIITY lirOIICLS MANAGEMENT OVERHEAD NOW MID-TERM FUTURE CFE SDNS OVERLAY NETWORK SECURITY...Architecture 2. This approach employs the Government-developed BLACKER Front End (BFE) or CANEWARE Front End ( CFE ) devices as the interface between single-level...LANs (or hosts) and a packet switched network. BFE and CFE systems provide Type 1 encryption as well as computer security features.. (3

  18. Asynchronous error-correcting secure communication scheme based on fractional-order shifting chaotic system

    NASA Astrophysics Data System (ADS)

    Chao, Luo

    2015-11-01

    In this paper, a novel digital secure communication scheme is firstly proposed. Different from the usual secure communication schemes based on chaotic synchronization, the proposed scheme employs asynchronous communication which avoids the weakness of synchronous systems and is susceptible to environmental interference. Moreover, as to the transmission errors and data loss in the process of communication, the proposed scheme has the ability to be error-checking and error-correcting in real time. In order to guarantee security, the fractional-order complex chaotic system with the shifting of order is utilized to modulate the transmitted signal, which has high nonlinearity and complexity in both frequency and time domains. The corresponding numerical simulations demonstrate the effectiveness and feasibility of the scheme.

  19. Chaos and Cryptography: A new dimension in secure communications

    NASA Astrophysics Data System (ADS)

    Banerjee, Santo; Kurths, J.

    2014-06-01

    This issue is a collection of contributions on recent developments and achievements of cryptography and communications using chaos. The various contributions report important and promising results such as synchronization of networks and data transmissions; image cipher; optical and TDMA communications, quantum keys etc. Various experiments and applications such as FPGA, smartphone cipher, semiconductor lasers etc, are also included.

  20. 76 FR 53918 - Privacy Act of 1974; Department of Homeland Security/Federal Emergency Management Agency-001...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-30

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/Federal Emergency Management Agency--001 National Emergency Family Registry and Locator System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY: In accordance with the Privacy...

  1. 76 FR 41274 - Privacy Act of 1974; Department of Homeland Security/ALL-033 Reasonable Accommodations Records...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-13

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL-033 Reasonable... to ] establish a new system of records titled, ``Department of Homeland Security/ALL-033 Reasonable..., Washington, DC 20528. Instructions: All submissions received must include the agency name and docket...

  2. 75 FR 39266 - Privacy Act of 1974; Department of Homeland Security/ALL-029 Civil Rights and Civil Liberties...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-08

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL-029 Civil Rights...,'' January 6, 2004. The system name is being changed to, ``Department of Homeland Security/ALL-029 Civil... Department Office for Civil Rights and Civil Liberties, as well as all component offices that perform...

  3. 78 FR 52553 - Privacy Act of 1974; Department of Homeland Security/ALL-035 Common Entity Index Prototype System...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-23

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL-035 Common Entity... titled, ``Department of Homeland Security/ ALL--035 Common Entity Index Prototype System of Records.... Instructions: All submissions received must include the agency name and docket number for this rulemaking....

  4. 15 CFR 744.11 - License requirements that apply to entities acting contrary to the national security or foreign...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... entities acting contrary to the national security or foreign policy interests of the United States. 744.11... national security or foreign policy interests of the United States. BIS may impose foreign policy export... of being or becoming involved in activities that are contrary to the national security or...

  5. 15 CFR 744.11 - License requirements that apply to entities acting contrary to the national security or foreign...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... entities acting contrary to the national security or foreign policy interests of the United States. 744.11... national security or foreign policy interests of the United States. BIS may impose foreign policy export... of being or becoming involved in activities that are contrary to the national security or...

  6. 75 FR 50845 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-027 The...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-18

    .../ALL--027 The History of the Department of Homeland Security System of Records AGENCY: Privacy Office... Act of 1974 for the ``Department of Homeland Security/ALL--027 The History of the Department of... Department exempts portions of the ``Department of Homeland Security/ALL--027 The History of the...

  7. Enhancing Nutrition Security via India's National Food Security Act: Using an Axe instead of a Scalpel?§

    PubMed Central

    Desai, Sonalde; Vanneman, Reeve

    2016-01-01

    In September 2013, India passed a historic National Food Security Act. This paper examines the potential impact of the two central pillars of this act - expansion of the Public Distribution System and strengthening of the Integrated Child Development Schemes – on child nutrition. Using new data from the India Human Development Survey of 2011-12, this paper shows that access to subsidized grains via PDS is not related to improved child nutrition, and while ICDS seems to be related to lower child undernutrition, it has a limited reach in spite of the universalization of the program. The paper suggests that a tiered strategy in dealing with child undernutrition that starts with the identification of undernourished children and districts and follows through with different strategies for dealing with severe, acute malnutrition, followed by a focus on moderate malnutrition, could be more effective than the existing focus on cereal distribution rooted in the NFSA. PMID:27034596

  8. Quantum Secure Direct Communication in a noisy environment: Theory and Experiment

    NASA Astrophysics Data System (ADS)

    Long, Gui Lu

    Quantum communication holds promise for absolutely security in secret message transmission. Quantum secure direct communication (QSDC) is an important branch of the quantum communication in which secret messages are sent directly over a quantum channel with security[Phys. Rev. A 65 , 032302 (2002)]. QSDC offers higher security and is instantaneous in communication, and is a great improvement to the classical communication mode. It is also a powerful basic quantum communication primitive for constructing many other quantum communication tasks such as quantum bidding, quantum signature and quantum dialogue and so on. Since the first QSDC protocol proposed in 2000, it has become one of the extensive research focuses. In this talk, the basic ideas of QSDC will be reviewed, and major QSDC protocols will be described, such as the efficient-QSDC protocol, the two-step QSDC protocol, the one-time-pad QSDC protocol, the high-dimensional QSDC protocol and so on. Experimental progress is also developing steadily, and will also be reviewed. In particular, the quantum one-time-pad QSDC protocol has recently been successfully demonstrated experimentally[arXiv:1503.00451]. Work supported by China National Natural Science Foundation, the Ministry of Science and Technology of China.

  9. High speed fault tolerant secure communication for muon chamber using FPGA based GBTx emulator

    NASA Astrophysics Data System (ADS)

    Sau, Suman; Mandal, Swagata; Saini, Jogender; Chakrabarti, Amlan; Chattopadhyay, Subhasis

    2015-12-01

    The Compressed Baryonic Matter (CBM) experiment is a part of the Facility for Antiproton and Ion Research (FAIR) in Darmstadt at the GSI. The CBM experiment will investigate the highly compressed nuclear matter using nucleus-nucleus collisions. This experiment will examine lieavy-ion collisions in fixed target geometry and will be able to measure hadrons, electrons and muons. CBM requires precise time synchronization, compact hardware, radiation tolerance, self-triggered front-end electronics, efficient data aggregation schemes and capability to handle high data rate (up to several TB/s). As a part of the implementation of read out chain of Muon Cliamber(MUCH) [1] in India, we have tried to implement FPGA based emulator of GBTx in India. GBTx is a radiation tolerant ASIC that can be used to implement multipurpose high speed bidirectional optical links for high-energy physics (HEP) experiments and is developed by CERN. GBTx will be used in highly irradiated area and more prone to be affected by multi bit error. To mitigate this effect instead of single bit error correcting RS code we have used two bit error correcting (15, 7) BCH code. It will increase the redundancy which in turn increases the reliability of the coded data. So the coded data will be less prone to be affected by noise due to radiation. The data will go from detector to PC through multiple nodes through the communication channel. The computing resources are connected to a network which can be accessed by authorized person to prevent unauthorized data access which might happen by compromising the network security. Thus data encryption is essential. In order to make the data communication secure, advanced encryption standard [2] (AES - a symmetric key cryptography) and RSA [3], [4] (asymmetric key cryptography) are used after the channel coding. We have implemented GBTx emulator on two Xilinx Kintex-7 boards (KC705). One will act as transmitter and other will act as receiver and they are connected

  10. Performance evaluation of secured DICOM image communication with next generation internet protocol IPv6

    NASA Astrophysics Data System (ADS)

    Yu, Fenghai; Zhang, Jianguo; Chen, Xiaomeng; Huang, H. K.

    2005-04-01

    Next Generation Internet (NGI) technology with new communication protocol IPv6 emerges as a potential solution for low-cost and high-speed networks for image data transmission. IPv6 is designed to solve many of the problems of the current version of IP (known as IPv4) with regard to address depletion, security, autoconfiguration, extensibility, and more. We choose CTN (Central Test Node) DICOM software developed by The Mallinckrodt Institute of Radiology to implement IPv6/IPv4 enabled DICOM communication software on different operating systems (Windows/Linux), and used this DICOM software to evaluate the performance of the IPv6/IPv4 enabled DICOM image communication with different security setting and environments. We compared the security communications of IPsec with SSL/TLS on different TCP/IP protocols (IPv6/IPv4), and find that there are some trade-offs to choose security solution between IPsec and SSL/TLS in the security implementation of IPv6/IPv4 communication networks.

  11. Deformable MEMS mirrors in secure optical communication system

    NASA Astrophysics Data System (ADS)

    Ziph-Schatzberg, Leah; Bifano, Thomas; Cornelissen, Steven; Stewart, Jason; Bleier, Zvi

    2009-05-01

    An optical communication system suitable for voice communication, data retrieval from remote sensors and identification had been designed, built and tested. The system design allows operation at ranges of several hundred meters. The heart of the system is a modulated MEMS mirror that is electrostatically actuated and changes between a flat reflective state and a corrugated diffractive state. A process for mass producing these mirrors at low cost was developed and implemented. The mirror was incorporated as a facet in a hollow retro-reflector, allowing temporal modulation of an interrogating beam and the return of the modulated beam to the interrogator. This modulator unit thus consists of a low power, small and light communication node with large (about 60°) angular extent. The system's range and pointing are determined by the interrogator /detector / demodulator unit (the transceiver), whereas the communicating node remains small, low power and low cost. This transceiver is comprised of a magnified optical channel to establish line of sight communication, an interrogating laser at 1550nm, an avalanche photo diode to detect the return signal and electronics to drive the laser and demodulate the returned signal and convert it to an audio signal. Voice communication in free space was demonstrated at ranges larger than 200 meters. A new retro-reflector design, incorporating more modulated mirrors had been constructed. This configuration was built and tested. Its performance and advantages as compared to the single mirror retro-reflector are discussed. An alternative system design that allows higher bandwidth data transmission is described

  12. Patients' rights to care under Clinton's Health Security Act: the structure of reform.

    PubMed Central

    Mariner, W K

    1994-01-01

    Like most reform proposals, President Clinton's proposed Health Security Act offers universal access to care but does not significantly alter the nature of patients' legal rights to services. The act would create a system of delegated federal regulation in which the states would act like federal administrative agencies to carry out reform. To achieve uniform, universal coverage, the act would establish a form of mandatory health insurance, with federal law controlling the minimum services to which everyone would be entitled. Because there is no constitutionally protected right to health care and no independent constitutional standard for judging what insurance benefits are appropriate, the federal government would retain considerable freedom to decide what services would and would not be covered. If specific benefits are necessary for patients, they will have to be stated in the legislation that produces reform. PMID:8059899

  13. Secure Communications Processor STOP Release 2.1.

    DTIC Science & Technology

    1985-09-23

    obtained through descriptors. Descriptors contain the logical access permissions (e.g., read, write, execute) and the necessary data to map a virtual ... reference to a physical reference. The logical access permissions are those that are allowed based on the security attributes of the subject and the

  14. Communications Security: A Timeless Requirement While Conducting Warfare

    DTIC Science & Technology

    2012-04-10

    the European theater, such as the events surrounding the capturing of the German Engima machine and how the Allies exploited this information. I...8 As technology improved, imaginative solutions, such as the Engima and the Navajo code, came along to assist people with securing information

  15. Energy Security Requires Diversity: An Argument for The Defense Production Act Title III Biofuel Initiative

    DTIC Science & Technology

    2013-06-19

    the United States . 125 The President is further authorized to ensure that critical components, critical technology items, essential materials , and...plant mass that is not part of human diet and is not cultivated or is a byproduct of cultivated (for example forest woody biomass , corn stover...security. The United States Navy has taken the lead in this charge by proposing the Defense Production Act (DPA) Title III Biofuel Initiative to

  16. The role of the Employee Retirement Income Security Act of 1974.

    PubMed

    Ryland, Barbara K

    2004-10-01

    On June 21, 2004, the Supreme Court ruled on Aetna Health Inc. v. Davila, the latest in a long line of decisions regarding the scope of Employee Retirement Income Security Act of 1974 (ERISA) preemption and the remedies available to participants of ERISA plans. After taking what many observers perceived to be a detour over the last few years, the Davila decision returned the Court to a more expansive interpretation of ERISA's preemption clause.

  17. REVIEWS OF TOPICAL PROBLEMS: On the use of chaotic synchronization for secure communication

    NASA Astrophysics Data System (ADS)

    Koronovskii, Aleksei A.; Moskalenko, Olga I.; Hramov, Aleksandr E.

    2009-12-01

    Research on the secure communication applications of chaotic synchronization is reviewed. A number of secure communication methods and devices using different types of synchronous behavior are examined. For the purpose of comparing existing methods, quantitative characteristics of operating capacity of various schemes are introduced and estimated. An extremely noise-stable secure information transmission method, based on the phenomenon of generalized chaos synchronization, is proposed. All of the methods considered are systematically checked for efficiency for the first time by numerically simulating unidirectionally coupled chaotic Rössler systems selected for transmitting and receiving oscillators. The key advantages and disadvantages of secure information transmission schemes using synchronized chaotic oscillations are discussed. The experimental data gathered in this field are also reviewed.

  18. Quantum secure communication using continuous variable Einstein-Podolsky-Rosen correlations

    SciTech Connect

    He Guangqiang; Zhu Jun; Zeng Guihua

    2006-01-15

    A quantum secure communication protocol using correlations of continuous variable Einstein-Podolsky-Rosen (EPR) pairs is proposed. The proposed protocol may implement both quantum key distribution and quantum message encryption by using a nondegenerate optical parametric amplifier (NOPA). The general Gaussian-cloner attack strategy is investigated in detail by employing Shannon information theory. Results show that the proposed scheme is secure, which is guaranteed physically by the correlations of the continuous variable EPR entanglement pairs generated by the NOPA.

  19. 77 FR 32709 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Homeland Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-01

    ... ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Homeland Security... the provisions of the Privacy Act, as amended, this notice announces a renewal of an existing computer.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law...

  20. 75 FR 39184 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-029 Civil...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-08

    ... provisions of Title VI of the Civil Rights Act of 1964. The Department's civil rights and civil liberties... Privacy Act of 1974 for the Department of Homeland Security/ALL--029 Civil Rights and Civil Liberties... Privacy Act for DHS/ALL--029 Civil Rights and Civil Liberties Records System......

  1. Communicating Homeland Security Threats: Government and Public Efforts

    DTIC Science & Technology

    2010-12-01

    further analyze public perception and involvement in homeland security, this research will continue beyond the evolution of the National Exercise Program...information continues to undermine the importance of threats to the homeland. Current research identifies a growing perception disparity relative to...localities, loss to tourism , and the indirect cost on the economy during a period of heightened threat level.”15 Yim also presents a perspective

  2. Practical Quantum Cryptography for Secure Free-Space Communications

    SciTech Connect

    Buttler, W.T.; Hughes, R.J.; Kwiat, P.G.; Lamoreaux, S.K.; Morgan, G.L.; Nordholt, J.E.; Peterson, C.G.

    1999-02-01

    Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics and information-theoretically secure post-processing methods. An adversary can neither successfully tap the quantum transmissions, nor evade detection, owing to Heisenberg's uncertainty principle. In this paper we describe the theory of quantum cryptography, and the most recent results from our experimental free-space system with which we have demonstrated for the first time the feasibility of quantum key generation over a point-to-point outdoor atmospheric path in daylight. We achieved a transmission distance of 0.5 km, which was limited only by the length of the test range. Our results provide strong evidence that cryptographic key material could be generated on demand between a ground station and a satellite (or between two satellites), allowing a satellite to be securely re-keyed on orbit. We present a feasibility analysis of surface-to-satellite quantum key generation.

  3. Secure digital voice communications in the Defense Data Network (DDN)

    NASA Astrophysics Data System (ADS)

    Bernet, M.; Gan, D.; Oesterreicher, C.

    1985-03-01

    This final report has investigated and validated one of the fourteen key features of the future, all-digital World-wide Digital Systems Architecture (WWDSA), namely the enhanced 2.4 Kbps secure voice survivability through the use of packetized voice and the use of packetized voice and the interconnection between the voice survivability through the use of packetized voice and the interconnection between the voice (DSN) phase implementation plan in the report, Secure Voice, as provided by the STU-IIs, can be implemented in the DDN in the late 1980s time-frame with no technical and minimum schedule risk. VIUs are proposed to interconnect, the family of secure voice terminals, called STU-IIs, to the DDN. VIUs contain modan, signalling and supervision (S/S), and processor modules and are supported by the implementation model of the protocol architecture that (with the TAC as processor module) was proposed in the report. An optimum system-level architecture employing the VIUs and the proposed in the implementation plan based on an extensive evaluation.

  4. Secure Data Aggregation Protocol for M2M Communications

    DTIC Science & Technology

    2015-03-24

    smart grid communications, which precisely meets the requirement of periodically collecting users’ electricity consumption while preserving privacy...address: rxlu@ntu.edu.sg - Institution: School of Electrical and Electronics Engineering, Nanyang Technological University - Mailing Address: 50...surveillance, smart metering, environmental monitoring, industrial automation and military scenarios [1][2]. Despite various M2M applications, the basic M2M

  5. Secure optical communication system utilizing deformable MEMS mirrors

    NASA Astrophysics Data System (ADS)

    Ziph-Schatzberg, Leah; Bifano, Thomas; Cornelissen, Steven; Stewart, Jason; Bleier, Zvi

    2009-02-01

    An optical communication system suitable for voice, data retrieval from remote sensors and identification is described. The system design allows operation at ranges of several hundred meters. The heart of the system is a modulated MEMS mirror that is electrostatically actuated and changes between a flat reflective state and a corrugated diffractive state. A process for mass producing these mirrors at low cost was developed and is described. The mirror was incorporated as a facet in a hollow retro-reflector, allowing temporal modulation of an interrogating beam and the return of the modulated beam to the interrogator. This system thus consists of a low power, small and light communication node with large (about 60°) angular extent. The system's range and pointing are determined by the interrogator /detector/demodulator (Transceiver) unit. The transceiver is comprised of an optical channel to establish line of sight communication, an interrogating laser at 1550nm, an avalanche photo diode to detect the return signal and electronics to drive the laser and demodulate the detected signal and convert it to an audio signal. A functional prototype system was built using a modified compact optical sight as the transceiver. Voice communication in free space was demonstrated. The design and test of major components and the complete system are discussed.

  6. Toddlers' Complex Communication: Playfulness from a Secure Base

    ERIC Educational Resources Information Center

    Alcock, Sophie

    2013-01-01

    Attachment theory is presented in this article as involving embodied relational processes within complex relational systems. Two narrative-like "events" are represented to illustrate very young children playfully relating -- connecting and communicating inter- and intrasubjectively. The ethnographic-inspired research methods included…

  7. 49 CFR 236.1033 - Communications and security requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... communications between the office, wayside, and onboard components in a PTC system shall provide cryptographic message integrity and authentication. (b) Cryptographic keys required under paragraph (a) of this section... approval of the algorithm. (c) The cleartext form of the cryptographic keys shall be protected...

  8. A laser communication experiment utilizing the ACT satellite and an airborne laser transceiver

    NASA Technical Reports Server (NTRS)

    Provencher, Charles E., Jr.; Spence, Rodney L.

    1988-01-01

    The launch of a laser communication transmitter package into geosynchronous Earth orbit onboard the Advanced Communications Technology Satellite (ACTS) will present an excellent opportunity for the experimental reception of laser communication signals transmitted from a space orbit. The ACTS laser package includes both a heterodyne transmitter (Lincoln Labs design) and a direct detection transmitter (Goddard Space Flight Center design) with both sharing some common optical components. NASA Lewis Research Center's Space Electronics Division is planning to perform a space communication experiment utilizing the GSFC direct detection laser transceiver. The laser receiver will be installed within an aircraft provided with a glass port for the reception of the signal. This paper describes the experiment and the approach to performing such an experiment. Described are the constraints placed on the NASA Lewis experiment by the performance parameters of the laser transmitter and by the ACTS spacecraft operations. The conceptual design of the receiving terminal is given; also included is the anticipated capability of the detector.

  9. Developing a Standard Method for Link-Layer Security of CCSDS Space Communications

    NASA Technical Reports Server (NTRS)

    Biggerstaff, Craig

    2009-01-01

    Communications security for space systems has been a specialized field generally far removed from considerations of mission interoperability and cross-support in fact, these considerations often have been viewed as intrinsically opposed to security objectives. The space communications protocols defined by the Consultative Committee for Space Data Systems (CCSDS) have a twenty-five year history of successful use in over 400 missions. While the CCSDS Telemetry, Telecommand, and Advancing Orbiting Systems protocols for use at OSI Layer 2 are operationally mature, there has been no direct support within these protocols for communications security techniques. Link-layer communications security has been successfully implemented in the past using mission-unique methods, but never before with an objective of facilitating cross-support and interoperability. This paper discusses the design of a standard method for cryptographic authentication, encryption, and replay protection at the data link layer that can be integrated into existing CCSDS protocols without disruption to legacy communications services. Integrating cryptographic operations into existing data structures and processing sequences requires a careful assessment of the potential impediments within spacecraft, ground stations, and operations centers. The objective of this work is to provide a sound method for cryptographic encapsulation of frame data that also facilitates Layer 2 virtual channel switching, such that a mission may procure data transport services as needed without involving third parties in the cryptographic processing, or split independent data streams for separate cryptographic processing.

  10. L-Band Digital Aeronautical Communications System Engineering - Initial Safety and Security Risk Assessment and Mitigation

    NASA Technical Reports Server (NTRS)

    Zelkin, Natalie; Henriksen, Stephen

    2011-01-01

    This document is being provided as part of ITT's NASA Glenn Research Center Aerospace Communication Systems Technical Support (ACSTS) contract NNC05CA85C, Task 7: "New ATM Requirements--Future Communications, C-Band and L-Band Communications Standard Development." ITT has completed a safety hazard analysis providing a preliminary safety assessment for the proposed L-band (960 to 1164 MHz) terrestrial en route communications system. The assessment was performed following the guidelines outlined in the Federal Aviation Administration Safety Risk Management Guidance for System Acquisitions document. The safety analysis did not identify any hazards with an unacceptable risk, though a number of hazards with a medium risk were documented. This effort represents a preliminary safety hazard analysis and notes the triggers for risk reassessment. A detailed safety hazards analysis is recommended as a follow-on activity to assess particular components of the L-band communication system after the technology is chosen and system rollout timing is determined. The security risk analysis resulted in identifying main security threats to the proposed system as well as noting additional threats recommended for a future security analysis conducted at a later stage in the system development process. The document discusses various security controls, including those suggested in the COCR Version 2.0.

  11. Sincere, Deceitful, and Ironic Communicative Acts and the Role of the Theory of Mind in Childhood

    PubMed Central

    Bosco, Francesca M.; Gabbatore, Ilaria

    2017-01-01

    The aim of the study is to investigate the relationship among age, first- and second-order Theory of Mind and the increasing ability of children to understand and produce different kinds of communicative acts – sincere, ironic, and deceitful communicative acts – expressed through linguistic and extralinguistic expressive means. To communicate means to modify an interlocutor’s mental states (Grice, 1989), and pragmatics studies the inferential processes that are necessary to fill the gap, which often exists in human communication, between the literal meaning of a speaker’s utterance and what the speaker intends to communicate to the interlocutor. We administered brief video-clip stories showing different kinds of pragmatic phenomena – sincere, ironic, and deceitful communicative acts - and first- and second-order ToM tasks, to 120 children, ranging in age from 3 to 8 years. The results showed the existence of a trend of difficulty in children’s ability to deal with both linguistic and extralinguistic pragmatic tasks, from the simplest to the most difficult: sincere, deceitful, and ironic communicative acts. A hierarchical regression analysis indicated that age plays a significant role in explaining children’s performance on each pragmatic task. Furthermore, the hierarchical regression analysis revealed that first-order ToM has a causal role in explaining children’s performance in handling sincere and deceitful speech acts, but not irony. We did not detect any specific role for second-order ToM. Finally, ToM only partially explains the observed increasing trend of difficulty in children’s pragmatic performance: the variance in pragmatic performance explained by ToM increases between sincere and deceitful communicative acts, but not between deceit and irony. The role of inferential ability in explaining the improvement in children’s performance across the pragmatic tasks investigated is discussed. PMID:28194120

  12. PCASSO: a design for secure communication of personal health information via the internet.

    PubMed

    Baker, D B; Masys, D R

    1999-05-01

    The Internet holds both promise and peril for the communications of person-identifiable health information. Because of technical features designed to promote accessibility and interoperability rather than security, Internet addressing conventions and transport protocols are vulnerable to compromise by malicious persons and programs. In addition, most commonly used personal computer (PC) operating systems currently lack the hardware-based system software protection and process isolation that are essential for ensuring the integrity of trusted applications. Security approaches designed for electronic commerce, that trade known security weaknesses for limited financial liability, are not sufficient for personal health data, where the personal damage caused by unintentional disclosure may be far more serious. To overcome these obstacles, we are developing and evaluating an Internet-based communications system called PCASSO (Patient-centered access to secure systems online) that applies state of the art security to health information. PCASSO includes role-based access control, multi-level security, strong device and user authentication, session-specific encryption and audit trails. Unlike Internet-based electronic commerce 'solutions,' PCASSO secures data end-to-end: in the server; in the data repository; across the network; and on the client. PCASSO is designed to give patients as well as providers access to personal health records via the Internet.

  13. 17 CFR 240.15b5-1 - Extension of registration for purposes of the Securities Investor Protection Act of 1970 after...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... purposes of the Securities Investor Protection Act of 1970 after cancellation or revocation. 240.15b5-1... purposes of the Securities Investor Protection Act of 1970 after cancellation or revocation. Commission... member within the meaning of Section 3(a)(2) of the Securities Investor Protection Act of 1970...

  14. 17 CFR 240.15b5-1 - Extension of registration for purposes of the Securities Investor Protection Act of 1970 after...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... purposes of the Securities Investor Protection Act of 1970 after cancellation or revocation. 240.15b5-1... purposes of the Securities Investor Protection Act of 1970 after cancellation or revocation. Commission... member within the meaning of Section 3(a)(2) of the Securities Investor Protection Act of 1970...

  15. 17 CFR 240.15b5-1 - Extension of registration for purposes of the Securities Investor Protection Act of 1970 after...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... purposes of the Securities Investor Protection Act of 1970 after cancellation or revocation. 240.15b5-1... purposes of the Securities Investor Protection Act of 1970 after cancellation or revocation. Commission... member within the meaning of Section 3(a)(2) of the Securities Investor Protection Act of 1970...

  16. 17 CFR 240.15b5-1 - Extension of registration for purposes of the Securities Investor Protection Act of 1970 after...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... purposes of the Securities Investor Protection Act of 1970 after cancellation or revocation. 240.15b5-1... purposes of the Securities Investor Protection Act of 1970 after cancellation or revocation. Commission... member within the meaning of Section 3(a)(2) of the Securities Investor Protection Act of 1970...

  17. 17 CFR 240.15b5-1 - Extension of registration for purposes of the Securities Investor Protection Act of 1970 after...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... purposes of the Securities Investor Protection Act of 1970 after cancellation or revocation. 240.15b5-1... purposes of the Securities Investor Protection Act of 1970 after cancellation or revocation. Commission... member within the meaning of Section 3(a)(2) of the Securities Investor Protection Act of 1970...

  18. 77 FR 33753 - Privacy Act of 1974; Department of Homeland Security, U.S. Customs and Border Protection, DHS/CBP...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-07

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security, U.S. Customs and...: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY: In accordance with the Privacy Act of 1974, the Department of Homeland Security proposes to establish a new Department...

  19. NASA ACTS Multibeam Antenna (MBA) System. [Advanced Communications Technology Satellite

    NASA Technical Reports Server (NTRS)

    Choung, Youn H.; Stiles, W. Herschel; Wu, Joseph; Wong, William C.; Chen, C. Harry

    1986-01-01

    The design of the Advanced Communications Technology Satellite MBA system, which provides both spot beam and scanning beam coverage to both high and low burst rates data-users is examined. The MBA consists of receive and transmit antennas installed on a common precision mounting platform that is integrated to the bus through three flexures; a lightweight system with low thermal distortion is obtained by using composite materials for the MBA structures. The RF design, which is a Cassegrain reflector with a large equivalent focal length/aperture size, is described. Consideration is given to the position of the feed in order to minimize scan loss and sidelobe levels, the size of the subreflector in order to minimize feed spillover, and antenna performance degradation caused by reflector surface distortion. Breadbroad model test result reveal that the maximum sidelobe level outside the 2.5 HPBW region is -30 dB or lower relative to the power.

  20. A legislative history of the Social Security Protection Act of 2004.

    PubMed

    Hansen, Erik

    2008-01-01

    Passage of the original Social Security Act in 1935, Public Law (P.L.) 74-271, represented one of the watershed achievements of social welfare reform in American history. For the first time, workers were guaranteed a basic floor of protection against the hardships of poverty. In the ensuing decades, more than 100 million beneficiaries have realized the value of this protection through the receipt of monthly Social Security payments. As this guarantee has endured and progressed, the policies and administration of such a vast and complex program have required ongoing modifications-more than 150 such revisions over the past 73 years. To some extent, these amendments can be seen as an ongoing refinement process, with the Social Security Protection Act of 2004 (SSPA) being another incremental step in the development of a social insurance program that best meets the evolving needs of American society. This article discusses the legislative history of the SSPA in detail. It includes summaries of the provisions and a chronology of the modification of these proposals as they passed through the House and Senate, and ultimately to the president's desk.

  1. Field test of a practical secure communication network with decoy-state quantum cryptography.

    PubMed

    Chen, Teng-Yun; Liang, Hao; Liu, Yang; Cai, Wen-Qi; Ju, Lei; Liu, Wei-Yue; Wang, Jian; Yin, Hao; Chen, Kai; Chen, Zeng-Bing; Peng, Cheng-Zhi; Pan, Jian-Wei

    2009-04-13

    We present a secure network communication system that operated with decoy-state quantum cryptography in a real-world application scenario. The full key exchange and application protocols were performed in real time among three nodes, in which two adjacent nodes were connected by approximate 20 km of commercial telecom optical fiber. The generated quantum keys were immediately employed and demonstrated for communication applications, including unbreakable real-time voice telephone between any two of the three communication nodes, or a broadcast from one node to the other two nodes by using one-time pad encryption.

  2. Secure communication of static information by electronic means

    DOEpatents

    Gritton, Dale G.

    1994-01-01

    A method and apparatus (10) for the secure transmission of static data (16) from a tag (11) to a remote reader (12). Each time the static data (16) is to be transmitted to the reader (12), the 10 bits of static data (16) are combined with 54 bits of binary data (21), which constantly change from one transmission to the next, into a 64-bit number (22). This number is then encrypted and transmitted to the remote reader (12) where it is decrypted (26) to produce the same 64 bit number that was encrypted in the tag (11). With a continual change in the value of the 64 bit number (22) in the tag, the encrypted numbers transmitted to the reader (12) will appear to be dynamic in character rather than being static.

  3. Secure communication of static information by electronic means

    SciTech Connect

    Gritton, D.G.

    1991-12-31

    This invention is comprised of a method and apparatus for the secure transmission of static data from a tag to a remote reader. Each time the static data is to be transmitted to the reader, the 10 bits of static data are combined with 54 bits of binary data, which constantly change from one transmission to the next, into a 64-bit number. This number is then encrypted and transmitted to the remote reader where it is decrypted to produce the same 64 bit number that was encrypted in the tag. With a continual change in the value of the 64 bit number in the tag, the encrypted numbers transmitted to the reader will appear to be dynamic in character rather than being static.

  4. Notification: Audit of the U.S. EPA's Compliance with the Federal Information Security Management Act (FISMA)

    EPA Pesticide Factsheets

    Project #OA-FY13-0280, May 9, 2013. The Office of Inspector General plans to begin fieldwork for an audit of the U.S. Environmental Protection Agency’s compliance with the Federal Information Security Management Act.

  5. 76 FR 34732 - Privacy Act of 1974; Department of Homeland Security/National Protection and Programs Directorate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-14

    ... the Privacy Act because of criminal, civil, and administrative enforcement requirements. This newly... security, law enforcement, immigration, intelligence, or other functions consistent with the routine uses... criminal, civil, and administrative enforcement requirements. This newly established system of records...

  6. 76 FR 39927 - Order Granting Temporary Exemptions Under the Securities Exchange Act of 1934 in Connection With...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-07

    ..., President Barack Obama signed the Dodd-Frank Wall Street Reform and Consumer Protection Act (``Dodd-Frank..., Financial Services Roundtable, Futures Industry Association, Institute of International Bankers, International Swaps and Derivatives Association, Investment Company Institute, Securities Industry and...

  7. Application of Ica-Eemd to Secure Communications in Chaotic Systems

    NASA Astrophysics Data System (ADS)

    Lin, Shih-Lin; Tung, Pi-Cheng; Huang, Norden E.

    2012-04-01

    We propose the application of ICA-EEMD to secure communication systems. ICA-EEMD is employed to retrieve the message data encrypted by a mixture of Gaussian white noise and chaotic noise. The results showed that ICA-EEMD can effectively extract the two original message data.

  8. Children's Security in the Context of Family Instability and Maternal Communications

    ERIC Educational Resources Information Center

    Winter, Marcia A.; Davies, Patrick T.; Cummings, E. Mark

    2010-01-01

    This multimethod study examined the association between family instability and children's internal representations of security in the family system within the context of maternal communications about disruptive family events. Participants included 224 kindergarten children (100 boys and 124 girls) and their parents. Parents reported on the…

  9. Controlled quantum secure direct communication by entanglement distillation or generalized measurement

    NASA Astrophysics Data System (ADS)

    Tan, Xiaoqing; Zhang, Xiaoqian

    2016-05-01

    We propose two controlled quantum secure communication schemes by entanglement distillation or generalized measurement. The sender Alice, the receiver Bob and the controllers David and Cliff take part in the whole schemes. The supervisors David and Cliff can control the information transmitted from Alice to Bob by adjusting the local measurement angles θ _4 and θ _3. Bob can verify his secret information by classical one-way function after communication. The average amount of information is analyzed and compared for these two methods by MATLAB. The generalized measurement is a better scheme. Our schemes are secure against some well-known attacks because classical encryption and decoy states are used to ensure the security of the classical channel and the quantum channel.

  10. Deterministic secure quantum communication using a single d-level system

    PubMed Central

    Jiang, Dong; Chen, Yuanyuan; Gu, Xuemei; Xie, Ling; Chen, Lijun

    2017-01-01

    Deterministic secure quantum communication (DSQC) can transmit secret messages between two parties without first generating a shared secret key. Compared with quantum key distribution (QKD), DSQC avoids the waste of qubits arising from basis reconciliation and thus reaches higher efficiency. In this paper, based on data block transmission and order rearrangement technologies, we propose a DSQC protocol. It utilizes a set of single d-level systems as message carriers, which are used to directly encode the secret message in one communication process. Theoretical analysis shows that these employed technologies guarantee the security, and the use of a higher dimensional quantum system makes our protocol achieve higher security and efficiency. Since only quantum memory is required for implementation, our protocol is feasible with current technologies. Furthermore, Trojan horse attack (THA) is taken into account in our protocol. We give a THA model and show that THA significantly increases the multi-photon rate and can thus be detected. PMID:28327557

  11. Installation of secure, always available wireless LAN systems as a component of the hospital communication infrastructure.

    PubMed

    Hanada, Eisuke; Kudou, Takato; Tsumoto, Shusaku

    2013-06-01

    Wireless technologies as part of the data communication infrastructure of modern hospitals are being rapidly introduced. Even though there are concerns about problems associated with wireless communication security, the demand is remarkably large. In addition, insuring that the network is always available is important. Herein, we discuss security countermeasures and points to insure availability that must be taken to insure safe hospital/business use of wireless LAN systems, referring to the procedures introduced at Shimane University Hospital. Security countermeasures differ according to their purpose, such as for preventing illegal use or insuring availability, both of which are discussed. It is our hope that this information will assist others in their efforts to insure safe implementation of wireless LAN systems, especially in hospitals where they have the potential to greatly improve information sharing and patient safety.

  12. Deterministic secure quantum communication using a single d-level system

    NASA Astrophysics Data System (ADS)

    Jiang, Dong; Chen, Yuanyuan; Gu, Xuemei; Xie, Ling; Chen, Lijun

    2017-03-01

    Deterministic secure quantum communication (DSQC) can transmit secret messages between two parties without first generating a shared secret key. Compared with quantum key distribution (QKD), DSQC avoids the waste of qubits arising from basis reconciliation and thus reaches higher efficiency. In this paper, based on data block transmission and order rearrangement technologies, we propose a DSQC protocol. It utilizes a set of single d-level systems as message carriers, which are used to directly encode the secret message in one communication process. Theoretical analysis shows that these employed technologies guarantee the security, and the use of a higher dimensional quantum system makes our protocol achieve higher security and efficiency. Since only quantum memory is required for implementation, our protocol is feasible with current technologies. Furthermore, Trojan horse attack (THA) is taken into account in our protocol. We give a THA model and show that THA significantly increases the multi-photon rate and can thus be detected.

  13. Deterministic secure quantum communication using a single d-level system.

    PubMed

    Jiang, Dong; Chen, Yuanyuan; Gu, Xuemei; Xie, Ling; Chen, Lijun

    2017-03-22

    Deterministic secure quantum communication (DSQC) can transmit secret messages between two parties without first generating a shared secret key. Compared with quantum key distribution (QKD), DSQC avoids the waste of qubits arising from basis reconciliation and thus reaches higher efficiency. In this paper, based on data block transmission and order rearrangement technologies, we propose a DSQC protocol. It utilizes a set of single d-level systems as message carriers, which are used to directly encode the secret message in one communication process. Theoretical analysis shows that these employed technologies guarantee the security, and the use of a higher dimensional quantum system makes our protocol achieve higher security and efficiency. Since only quantum memory is required for implementation, our protocol is feasible with current technologies. Furthermore, Trojan horse attack (THA) is taken into account in our protocol. We give a THA model and show that THA significantly increases the multi-photon rate and can thus be detected.

  14. An efficient controlled quantum secure direct communication and authentication by using four particle cluster states

    NASA Astrophysics Data System (ADS)

    Nanvakenari, Milad; Houshmand, Monireh

    In this paper, a three-party controlled quantum secure direct communication and authentication (QSDCA) protocol is proposed by using four particle cluster states via a quantum one-time pad and local unitary operations. In the present scheme, only under the permission of the controller, the sender and the receiver can implement secure direct communication successfully. But under any circumstances, Charlie cannot obtain the secret message. Eavesdropping detection and identity authentication are achieved with the help of the previously shared reusable base identity strings of users. This protocol is unconditionally secure in both ideal and practical noisy cases. In one transmission, a qubit of each four particle cluster state is used as controller’s permission and the same qubit with another qubit are used to recover two classical bits of information. In the proposed scheme, the efficiency is improved compared with the previous works.

  15. The Physical Layer Security Experiments of Cooperative Communication System with Different Relay Behaviors.

    PubMed

    Su, Yishan; Han, Guangyao; Fu, Xiaomei; Xu, Naishen; Jin, Zhigang

    2017-04-06

    Physical layer security is an attractive security mechanism, which exploits the randomness characteristics of wireless transmission channel to achieve security. However, it is hampered by the limitation of the channel condition that the main channel must be better than the eavesdropper channel. To alleviate the limitation, cooperative communication is introduced. Few studies have investigated the physical layer security of the relay transmission model. In this paper, we performed some experiments to evaluate the physical layer security of a cooperative communication system, with a relay operating in decode-and-forward (DF) cooperative mode, selfish and malicious behavior in real non-ideal transmission environment. Security performance is evaluated in terms of the probability of non-zero secrecy capacity. Experiments showed some different results compared to theoretical simulation: (1) to achieve the maximum secrecy capacity, the optimal relay power according to the experiments result is larger than that of ideal theoretical results under both cooperative and selfish behavior relay; (2) the relay in malicious behavior who forwards noise to deteriorate the main channel may deteriorate the eavesdropper channel more seriously than the main channel; (3) the optimal relay positions under cooperative and selfish behavior relay cases are both located near the destination because of non-ideal transmission.

  16. Control and Non-Payload Communications (CNPC) Prototype Radio - Generation 2 Security Architecture Lab Test Report

    NASA Technical Reports Server (NTRS)

    Iannicca, Dennis C.; McKim, James H.; Stewart, David H.; Thadhani, Suresh K.; Young, Daniel P.

    2015-01-01

    NASA Glenn Research Center, in cooperation with Rockwell Collins, is working to develop a prototype Control and Non-Payload Communications (CNPC) radio platform as part of NASA Integrated Systems Research Program's (ISRP) Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) project. A primary focus of the project is to work with the FAA and industry standards bodies to build and demonstrate a safe, secure, and efficient CNPC architecture that can be used by industry to evaluate the feasibility of deploying a system using these technologies in an operational capacity. GRC has been working in conjunction with these groups to assess threats, identify security requirements, and to develop a system of standards-based security controls that can be applied to the current GRC prototype CNPC architecture as a demonstration platform. The security controls were integrated into a lab test bed mock-up of the Mobile IPv6 architecture currently being used for NASA flight testing, and a series of network tests were conducted to evaluate the security overhead of the controls compared to the baseline CNPC link without any security. The aim of testing was to evaluate the performance impact of the additional security control overhead when added to the Mobile IPv6 architecture in various modes of operation. The statistics collected included packet captures at points along the path to gauge packet size as the sample data traversed the CNPC network, round trip latency, jitter, and throughput. The effort involved a series of tests of the baseline link, a link with Robust Header Compression (ROHC) and without security controls, a link with security controls and without ROHC, and finally a link with both ROHC and security controls enabled. The effort demonstrated that ROHC is both desirable and necessary to offset the additional expected overhead of applying security controls to the CNPC link.

  17. The decision to exclude agricultural and domestic workers from the 1935 Social Security Act.

    PubMed

    DeWitt, Larry

    2010-01-01

    The Social Security Act of 1935 excluded from coverage about half the workers in the American economy. Among the excluded groups were agricultural and domestic workers-a large percentage of whom were African Americans. This has led some scholars to conclude that policymakers in 1935 deliberately excluded African Americans from the Social Security system because of prevailing racial biases during that period. This article examines both the logic of this thesis and the available empirical evidence on the origins of the coverage exclusions. The author concludes that the racial-bias thesis is both conceptually flawed and unsupported by the existing empirical evidence. The exclusion of agricultural and domestic workers from the early program was due to considerations of administrative feasibility involving tax-collection procedures. The author finds no evidence of any other policy motive involving racial bias.

  18. 75 FR 38824 - Privacy Act of 1974; Department of Homeland Security/ALL-029 Civil Rights and Civil Liberties...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-06

    ...] Privacy Act of 1974; Department of Homeland Security/ALL--029 Civil Rights and Civil Liberties Records... system name is being changed to, ``Department of Homeland Security/ALL--029 Civil Rights and Civil... Rights and Civil Liberties, as well as all component offices that perform civil rights and...

  19. 76 FR 72428 - Privacy Act of 1974; Department of Homeland Security/ALL-017 General Legal Records System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-23

    ... [Docket No. DHS-2011-0094] Privacy Act of 1974; Department of Homeland Security/ALL--017 General Legal.../ ALL--017 General Legal Records System of Records.'' This system will assist attorneys in providing..., Department of Homeland Security, Washington, DC 20528. Instructions: All submissions received must...

  20. 75 FR 5614 - Privacy Act of 1974; Department of Homeland Security/ALL-025 Law Enforcement Authority in Support...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-03

    ... secured by DHS. The results are also used to pursue criminal prosecutions or civil penalty actions against... carry out national security, law enforcement, immigration, intelligence, or other functions consistent... person or entity involved in, or suspected of being involved in, criminal acts against the...

  1. 78 FR 4347 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security; U.S. Customs...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-22

    ..., Acting Chief Privacy Officer, Privacy Office, Department of Homeland Security, Washington, DC 20528... Rulings, U.S. Customs and Border Protection, Mint Annex, 799 9th Street NW., Washington, DC 20229-1177..., Privacy Office, Department of Homeland Security, Washington, DC 20528. SUPPLEMENTARY INFORMATION:...

  2. A secure and easy-to-implement web-based communication framework for caregiving robot teams

    NASA Astrophysics Data System (ADS)

    Tuna, G.; Daş, R.; Tuna, A.; Örenbaş, H.; Baykara, M.; Gülez, K.

    2016-03-01

    In recent years, robots have started to become more commonplace in our lives, from factory floors to museums, festivals and shows. They have started to change how we work and play. With an increase in the population of the elderly, they have also been started to be used for caregiving services, and hence many countries have been investing in the robot development. The advancements in robotics and wireless communications has led to the emergence of autonomous caregiving robot teams which cooperate to accomplish a set of tasks assigned by human operators. Although wireless communications and devices are flexible and convenient, they are vulnerable to many risks compared to traditional wired networks. Since robots with wireless communication capability transmit all data types, including sensory, coordination, and control, through radio frequencies, they are open to intruders and attackers unless protected and their openness may lead to many security issues such as data theft, passive listening, and service interruption. In this paper, a secure web-based communication framework is proposed to address potential security threats due to wireless communication in robot-robot and human-robot interaction. The proposed framework is simple and practical, and can be used by caregiving robot teams in the exchange of sensory data as well as coordination and control data.

  3. Security and privacy in molecular communication and networking: opportunities and challenges.

    PubMed

    Loscrí, Valeria; Marchal, César; Mitton, Nathalie; Fortino, Giancarlo; Vasilakos, Athanasios V

    2014-09-01

    Molecular Communication (MC) is an emerging and promising communication paradigm for several multi-disciplinary domains like bio-medical, industry and military. Differently to the traditional communication paradigm, the information is encoded on the molecules, that are then used as carriers of information. Novel approaches related to this new communication paradigm have been proposed, mainly focusing on architectural aspects and categorization of potential applications. So far, security and privacy aspects related to the molecular communication systems have not been investigated at all and represent an open question that need to be addressed. The main motivation of this paper lies on providing some first insights about security and privacy aspects of MC systems, by highlighting the open issues and challenges and above all by outlining some specific directions of potential solutions. Existing cryptographic methods and security approaches are not suitable for MC systems since do not consider the pecific issues and challenges, that need ad-hoc solutions. We will discuss directions in terms of potential solutions by trying to highlight the main advantages and potential drawbacks for each direction considered. We will try to answer to the main questions: 1) why this solution can be exploited in the MC field to safeguard the system and its reliability? 2) which are the main issues related to the specific approach?

  4. Secured optical fiber communication using polarization restoration technique and channel characterization

    NASA Astrophysics Data System (ADS)

    Punekar, Nikhil; Darunkar, Bhagyashri; Verma, Pramode

    2016-02-01

    Optical fiber channels are used as media to transfer the information globally. This paper presents an implementation of a novel procedure using which a secured communication between two parties can be carried out using polarized beam of light over an optical fiber. The paper presents the experimental results obtained of the procedure in the lab environment and a security analysis of the same. It is observed that polarization state of a light pulse cannot be retained as it travels over an optical fiber because of the birefringence phenomenon. Multiple environmental factors such as pressure, vibration, temperature, etc. also add a non-linearity to the birefringence of an optical fiber leading towards an unpredictable polarization state changes over the course of an optical fiber. The proposed procedure helps the receiving party to successfully retrieve the data in the form of a polarization state transmitted by the sending party without having any knowledge about the state of polarization at the transmitting end. The paper also explains an added layer of security the procedure provides to the communicating parties to make it difficult for an adversary to fetch the data being transferred. The proposed system does not depend on the wavelength of the light being used, nor does it depend upon the type of the optical fiber used for the communication. Using this procedure, multiple bits of secured information can be sent over an optical fiber in a single polarized pulse and retrieved at the receiving end, also known as Polarization Shift Keying.

  5. 78 FR 10218 - Order Extending Temporary Exemptions Under the Securities Exchange Act of 1934 in Connection With...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-13

    ... with the CFTC) (``Product Definitions Adopting Release''), which postpones the Expiring Temporary... security-based swap and swap, respectively. See also Product Definitions Adopting Release. On July 1, 2011... Exchange Act Exemptive Order. \\6\\ See Exchange Act Exemptive Order at 39-44. \\7\\ See Product...

  6. 77 FR 36292 - Notice Pursuant to the National Cooperative Research and Production Act of 1993-Border Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-18

    ... Antitrust Division Notice Pursuant to the National Cooperative Research and Production Act of 1993--Border Security Technology Consortium Notice is hereby given that, on May 30, 2012, pursuant to Section 6(a) of the National Cooperative Research and Production Act of 1993, 15 U.S.C. 4301 et seq. (``the...

  7. Privacy vs Usability: A Qualitative Exploration of Patients' Experiences With Secure Internet Communication With Their General Practitioner

    PubMed Central

    Tran, Trung; Faxvaag, Arild

    2005-01-01

    Background Direct electronic communication between patients and physicians has the potential to empower patients and improve health care services. Communication by regular email is, however, considered a security threat in many countries and is not recommended. Systems which offer secure communication have now emerged. Unlike regular email, secure systems require that users authenticate themselves. However, the authentication steps per se may become barriers that reduce use. Objectives The objective was to study the experiences of patients who were using a secure electronic communication system. The focus of the study was the users' privacy versus the usability of the system. Methods Qualitative interviews were conducted with 15 patients who used a secure communication system (MedAxess) to exchange personal health information with their primary care physician. Results Six main themes were identified from the interviews: (1) supporting simple questions, (2) security issues, (3) aspects of written communication, (4) trust in the physician, (5) simplicity of MedAxess, and (6) trouble using the system. By using the system, about half of the patients (8/15) experienced easier access to their physician, with whom they tended to solve minor health problems and elaborate on more complex illness experiences. Two thirds of the respondents (10/15) found that their physician quickly responded to their MedAxess requests. As a result of the security barriers, the users felt that the system was secure. However, due to the same barriers, the patients considered the log-in procedure cumbersome, which had considerable negative impact on the actual use of the system. Conclusions Despite a perceived need for secure electronic patient-physician communication systems, security barriers may diminish their overall usefulness. A dual approach is necessary to improve this situation: patients need to be better informed about security issues, and, at the same time, their experiences of using

  8. High security chaotic multiple access scheme for visible light communication systems with advanced encryption standard interleaving

    NASA Astrophysics Data System (ADS)

    Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng

    2016-06-01

    Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.

  9. A generalized architecture of quantum secure direct communication for N disjointed users with authentication

    PubMed Central

    Farouk, Ahmed; Zakaria, Magdy; Megahed, Adel; Omara, Fatma A.

    2015-01-01

    In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. So, N − 1 disjointed users u1, u2, …, uN−1 can transmit a secret message of classical bits to a remote user uN by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and the users are validated by EPR entangled pair and CNOT gate. Afterwards, the remained EPR will generate shared GHZ states which are used for directly transmitting the secret message. The partial cooperation process indicates that N − 1 users can transmit a secret message directly to a remote user uN through a quantum channel. Furthermore, N − 1 users and a remote user uN can communicate without an established quantum channel among them by a full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement. PMID:26577473

  10. Study and Analysis of the Internet Protocol Security and Its Impact on Interactive Communications

    NASA Astrophysics Data System (ADS)

    Khan, Arshi; Ansari, Seema

    Internet Protocol Security (IPSec) is the defacto standard, which offers secured Internet communications, providing traffic integrity, confidentiality and authentication. Besides this, it is assumed that IPSec is not suitable for the protection of realtime audio transmissions as the IPSec related enlargement of packets and the usage of the Cipher Block Chaining (CBC) mode contradict stringent requirements. IPSec overhead of at least 44 bytes for each Internet Protocol (IP)-packet cannot guarantee Quality of Service (QOS) due to a bad wireless link by which the Ethernet flow control intercepts and makes a real time transmission impossible.

  11. 47 CFR 20.15 - Requirements under Title II of the Communications Act.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... CARRIER SERVICES COMMERCIAL MOBILE SERVICES § 20.15 Requirements under Title II of the Communications Act. (a) Commercial mobile radio services providers, to the extent applicable, must comply with sections... mobile radio service providers are not required to: (1) File with the Commission copies of...

  12. Communicative Acts in Coach-Athlete Interactions: When Losing Competitions and when Making Mistakes in Training

    ERIC Educational Resources Information Center

    Sagar, Sam S.; Jowett, Sophia

    2012-01-01

    Athletes' perceptions of coaches' communicative acts of interaction in two key interpersonal situations were examined, and their impact on the athletes: (a) when athletes lose competitions; and, (b) when athletes make mistakes in training. Athletes (N = 324, M age = 20.11) completed an open-ended survey. Data were deductively and inductively…

  13. The Communications Competitiveness and Infrastructure Modernization Act of 1991 (S. 1200).

    ERIC Educational Resources Information Center

    Sikes, Alfred C.; Verveer, Philip L.

    1992-01-01

    Two papers present arguments for and against the Communications Competitiveness and Infrastructure Act of 1991 (S. 1200). Topics addressed include earlier policy recommendations, competition in the telecommunications industry, benefits of video dial tone availability, telephone company participation in video services, restrictions on telephone…

  14. Awareness, Perceptions, and Communication Needs about the Affordable Care Act across the Life Span

    ERIC Educational Resources Information Center

    Bergeron, Caroline D.; Friedman, Daniela B.; Sisson, Diana C.; Tanner, Andrea; Kornegay, Vance L.; Owens, Otis L.; Weis, Megan A.; Patterson, Lee L.

    2016-01-01

    Background: By March 2014, all U.S. citizens were required to have health insurance according to the Affordable Care Act (ACA). Purpose: Study objectives were to explore individuals' opinions, perceptions, and communication sources and needs about the ACA and to assess differences by age group. Methods: In November 2013, 10 1-hour focus groups (5…

  15. The Use of Peer Networks to Increase Communicative Acts of Students with Autism Spectrum Disorders

    ERIC Educational Resources Information Center

    Kamps, Debra; Mason, Rose; Thiemann-Bourque, Kathy; Feldmiller, Sarah; Turcotte, Amy; Miller, Todd

    2014-01-01

    Peer networks including social groups using typical peers, scripted instruction, visual text cues, and reinforcement were examined with students with autism spectrum disorders (ASD). A multiple baseline design across four participants was used to measure students' use of communication acts with peers during free play following instruction. Peer…

  16. 47 CFR 20.15 - Requirements under Title II of the Communications Act.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... CARRIER SERVICES COMMERCIAL MOBILE RADIO SERVICES § 20.15 Requirements under Title II of the Communications Act. (a) Commercial mobile radio services providers, to the extent applicable, must comply with....814 and 43.21 of this chapter; except that commercial radio service providers that offer...

  17. Communicative Acts of a Child with Rubinstein-Taybi Syndrome during Early Communicative Development

    ERIC Educational Resources Information Center

    Carvey, Jayme S.; Bernhardt, B. May

    2009-01-01

    Rubinstein-Taybi syndrome (RTS) is a rare genetic developmental disorder that often shows associated language delay. However, literature on language development in RTS is very limited, particularly for the period of early communicative development, when standardized testing can be minimally informative. The purpose of the current study was to…

  18. The Next Frontier in Communication and the ECLIPPSE Study: Bridging the Linguistic Divide in Secure Messaging

    PubMed Central

    McNamara, Danielle; Crossley, Scott; Moffet, Howard H.; Sarkar, Urmimala; Duran, Nicholas; Oryn, Danielle; Karter, Andrew J.

    2017-01-01

    Health systems are heavily promoting patient portals. However, limited health literacy (HL) can restrict online communication via secure messaging (SM) because patients' literacy skills must be sufficient to convey and comprehend content while clinicians must encourage and elicit communication from patients and match patients' literacy level. This paper describes the Employing Computational Linguistics to Improve Patient-Provider Secure Email (ECLIPPSE) study, an interdisciplinary effort bringing together scientists in communication, computational linguistics, and health services to employ computational linguistic methods to (1) create a novel Linguistic Complexity Profile (LCP) to characterize communications of patients and clinicians and demonstrate its validity and (2) examine whether providers accommodate communication needs of patients with limited HL by tailoring their SM responses. We will study >5 million SMs generated by >150,000 ethnically diverse type 2 diabetes patients and >9000 clinicians from two settings: an integrated delivery system and a public (safety net) system. Finally, we will then create an LCP-based automated aid that delivers real-time feedback to clinicians to reduce the linguistic complexity of their SMs. This research will support health systems' journeys to become health literate healthcare organizations and reduce HL-related disparities in diabetes care. PMID:28265579

  19. Synchronized states in a ring of four mutually coupled oscillators and experimental application to secure communications

    NASA Astrophysics Data System (ADS)

    Nana, B.; Woafo, P.

    2011-04-01

    Data encryption has become increasingly important for many applications including phone, internet and satellite communications. Considering the desirable properties of ergodicity and high sensitivity to initial conditions and control parameters, chaotic signals are suitable for encryption systems. Chaotic encryption systems generally have high speed with low cost, which makes them better candidates than many traditional ciphers for multimedia data encryption. In this paper, analytical and numerical methods as well as experimental implementation are used to prove partial and complete synchronized states in a ring of four autonomous oscillators in their chaotic states. Application to secure communication is discussed.

  20. Fault-tolerant controlled deterministic secure quantum communication using EPR states against collective noise

    NASA Astrophysics Data System (ADS)

    Kao, Shih-Hung; Yang, Chun-Wei; Hwang, Tzonelih

    2016-11-01

    This paper proposes two new fault-tolerant controlled deterministic secure quantum communication (CDSQC) protocols based only on Einstein-Podolsky-Rosen (EPR) entangled states. The proposed protocols are designed to be robust against the collective-dephasing noise and the collective-rotation noise, respectively. Compared to the existing fault-tolerant controlled quantum communication protocols, the proposed protocols not only can do without a quantum channel between the receiver and the controller as the state-of-the-art protocols do, but also have the advantage that the number of quantum particles required in the CDSQC protocols is reduced owing to the use of the simplest entangled states.

  1. Control and Non-Payload Communications (CNPC) Prototype Radio - Generation 2 Security Flight Test Report

    NASA Technical Reports Server (NTRS)

    Iannicca, Dennis C.; Ishac, Joseph A.; Shalkhauser, Kurt A.

    2015-01-01

    NASA Glenn Research Center (GRC), in cooperation with Rockwell Collins, is working to develop a prototype Control and Non-Payload Communications (CNPC) radio platform as part of NASA Integrated Systems Research Program's (ISRP) Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) project. A primary focus of the project is to work with the Federal Aviation Administration (FAA) and industry standards bodies to build and demonstrate a safe, secure, and efficient CNPC architecture that can be used by industry to evaluate the feasibility of deploying a system using these technologies in an operational capacity. GRC has been working in conjunction with these groups to assess threats, identify security requirements, and to develop a system of standards-based security controls that can be applied to the GRC prototype CNPC architecture as a demonstration platform. The proposed security controls were integrated into the GRC flight test system aboard our S-3B Viking surrogate aircraft and several network tests were conducted during a flight on November 15th, 2014 to determine whether the controls were working properly within the flight environment. The flight test was also the first to integrate Robust Header Compression (ROHC) as a means of reducing the additional overhead introduced by the security controls and Mobile IPv6. The effort demonstrated the complete end-to-end secure CNPC link in a relevant flight environment.

  2. 77 FR 40779 - Assignment of National Security and Emergency Preparedness Communications Functions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-11

    ... Committee activities and develop an annual NS/EP communications strategic agenda utilizing the PPD-1 process... Executive Committee, the convening of governmental and nongovernmental groups (consistent with the Federal Advisory Committees Act, as amended (5 U.S.C. App.)), coordination of activities, and development...

  3. Design and Hardware Implementation of a New Chaotic Secure Communication Technique

    PubMed Central

    Xiong, Li; Lu, Yan-Jun; Zhang, Yong-Fang; Zhang, Xin-Guo; Gupta, Parag

    2016-01-01

    In this paper, a scheme for chaotic modulation secure communication is proposed based on chaotic synchronization of an improved Lorenz system. For the first time, the intensity limit and stability of the transmitted signal, the characteristics of broadband and the requirements for accuracy of electronic components are presented by Multisim simulation. In addition, some improvements are made on the measurement method and the proposed experimental circuit in order to facilitate the experiments of chaotic synchronization, chaotic non-synchronization, experiment without signal and experiment with signal. To illustrate the effectiveness of the proposed scheme, some numerical simulations are presented. Then, the proposed chaotic secure communication circuit is implemented through analog electronic circuit, which is characterized by its high accuracy and good robustness. PMID:27548385

  4. Secure space-to-space interferometric communications and its nexus to the physics of quantum entanglement

    NASA Astrophysics Data System (ADS)

    Duarte, F. J.

    2016-12-01

    The history of the probability amplitude equation |ψ>=(|x ,y >-|y ,x >) applicable to quanta pairs, propagating in different directions with entangled polarizations, is reviewed and traced back to the 1947-1949 period. The interferometric Dirac foundations common to |ψ>=(|x ,y >-|y ,x >) and the generalized N-slit interferometric equation, for indistinguishable quanta, are also described. The results from a series of experiments on N-slit laser interferometers, with intra interferometric propagation paths up to 527 m, are reviewed. Particular attention is given to explain the generation of interferometric characters, for secure space-to-space communications, which immediately collapse on attempts of interception. The design of a low divergence N-slit laser interferometer for low Earth orbit-low Earth orbit (LEO-LEO), and LEO-geostationary Earth orbit (LEO-GEO), secure interferometric communications is described and a weight assessment is provided.

  5. Numerical Simulation Bidirectional Chaotic Synchronization of Spiegel-Moore Circuit and Its Application for Secure Communication

    NASA Astrophysics Data System (ADS)

    Sanjaya, W. S. M.; Anggraeni, D.; Denya, R.; Ismail, N.

    2017-03-01

    Spiegel-Moore is a dynamical chaotic system which shows irregular variability in the luminosity of stars. In this paper present the performed the design and numerical simulation of the synchronization Spiegel-Moore circuit and applied to security system for communication. The initial study in this paper is to analyze the eigenvalue structures, various attractors, Bifurcation diagram, and Lyapunov exponent analysis. We have studied the dynamic behavior of the system in the case of the bidirectional coupling via a linear resistor. Both experimental and simulation results have shown that chaotic synchronization is possible. Finally, the effectiveness of the bidirectional coupling scheme between two identical Spiegel-Moore circuits in a secure communication system is presented in details. Integration of theoretical electronic circuit, the numerical simulation by using MATLAB®, as well as the implementation of circuit simulations by using Multisim® has been performed in this study.

  6. Design of acousto-optic chaos based secure free-space optical communication links

    NASA Astrophysics Data System (ADS)

    Ghosh, A. K.; Verma, P.; Cheng, S.; Huck, R. C.; Chatterjee, M. R.; Al-Saedi, M.

    2009-08-01

    We discuss the design of an acousto-optic cell based free space optical communication link where the data beam is made secure through chaos encryption. Using external signal modulation of the diffracted light from a hybrid acousto-optic cell chaos (or directly via incorporation in the sound-cell driver's bias voltage) encryption of data is possible. We have shown numerically that decryption of the encoded data is possible by using an identical acousto-optic system in the receiver.

  7. An Application of Chaotic Chua's System for Secure Chaotic Communication Based on Sliding Mode observer

    NASA Astrophysics Data System (ADS)

    Kemih, K.; Halimi, M.; Ghanes, M.; Zhang, G.

    2011-12-01

    In this paper, we study the design and implementation of analog secure communication systems via synchronized chaotic Chua's circuit with sliding mode observer. For this, we adopt an approach based on an inclusion of the message in the transmitter and in the receiver; we use a sliding mode observer with un-known input in order to recover the information. Finally, an analog electronic circuit with Multisim software is designed to physically realize the complete system (transmitter-receiver).

  8. Secure communication in fiber optic systems via transmission of broad-band optical noise.

    PubMed

    Buskila, O; Eyal, A; Shtaif, M

    2008-03-03

    We propose a new scheme for data encryption in the physical layer. Our scheme is based on the distribution of a broadband optical noise-like signal between Alice and Bob. The broadband signal is used for the establishment of a secret key that can be used for the secure transmission of information by using the one-time-pad method. We characterize the proposed scheme and study its applicability to the existing fiber-optics communications infrastructure.

  9. 17 CFR 230.134 - Communications not deemed a prospectus.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Communications not deemed a prospectus. 230.134 Section 230.134 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General § 230.134 Communications not deemed...

  10. High-capacity quantum secure direct communication using hyper-entanglement of photonic qubits

    NASA Astrophysics Data System (ADS)

    Cai, Jiarui; Pan, Ziwen; Wang, Tie-Jun; Wang, Sihai; Wang, Chuan

    2016-11-01

    Hyper-entanglement is a system constituted by photons entangled in multiple degrees of freedom (DOF), being considered as a promising way of increasing channel capacity and guaranteeing powerful eavesdropping safeguard. In this work, we propose a coding scheme based on a 3-particle hyper-entanglement of polarization and orbital angular momentum (OAM) system and its application as a quantum secure direct communication (QSDC) protocol. The OAM values are specially encoded by Fibonacci sequence and the polarization carries information by defined unitary operations. The internal relations of the secret message enhances security due to principle of quantum mechanics and Fibonacci sequence. We also discuss the coding capacity and security property along with some simulation results to show its superiority and extensibility.

  11. Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices.

    PubMed

    Marin, Leandro; Pawlowski, Marcin Piotr; Jara, Antonio

    2015-08-28

    The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol.

  12. Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices

    PubMed Central

    Marin, Leandro; Piotr Pawlowski, Marcin; Jara, Antonio

    2015-01-01

    The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol. PMID:26343677

  13. Spectral-temporal-polarization encoding of photons for multi-user secure quantum communication

    NASA Astrophysics Data System (ADS)

    Donkor, Eric

    2014-05-01

    We describe a Quantum Key Distribution protocol that combines temporal-, spectraland polarization-encoding of photons for secure communication over an interconnected network of users. Temporal encoding is used to identify a user's location or address on the network. Polarization encoding is used to generate private cryptographic key. Polarization encoded information is locally and randomly generated by users and exchanged only over a dedicated secure channel. Spectral encoding allows for the detection of eavesdropping and tampering by a malicious agent. Temporal-spectral signals sent from the network administrator (Alice) to a user are bright light source. On the other hand spectral-temporal signal from a network user (Bob) to the administrator (Alice) are single photons. Signals are sent across the network as ordered light pairs. The ordering format is randomly chosen and are revealed only at the time of key selection between the parties so that a secure one-time cryptographic pad can be generated

  14. 17 CFR 230.163 - Exemption from section 5(c) of the Act for certain communications by or on behalf of well-known...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Exemption from section 5(c) of....163 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General § 230.163 Exemption from section 5(c) of the Act for...

  15. 17 CFR 230.163 - Exemption from section 5(c) of the Act for certain communications by or on behalf of well-known...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Exemption from section 5(c) of....163 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General § 230.163 Exemption from section 5(c) of the Act for...

  16. Advanced Communication Technology Satellite (ACTS) Very Small Aperture Terminal (VSAT) Network Control Performance

    NASA Technical Reports Server (NTRS)

    Coney, T. A.

    1996-01-01

    This paper discusses the performance of the network control function for the Advanced Communications Technology Satellite (ACTS) very small aperture terminal (VSAT) full mesh network. This includes control of all operational activities such as acquisition, synchronization, timing and rain fade compensation as well as control of all communications activities such as on-demand integrated services (voice, video, and date) connects and disconnects Operations control is provided by an in-band orderwire carried in the baseboard processor (BBP) control burst, the orderwire burst, the reference burst, and the uplink traffic burst. Communication services are provided by demand assigned multiple access (DAMA) protocols. The ACTS implementation of DAMA protocols ensures both on-demand and integrated voice, video and data services. Communications services control is also provided by the in-band orderwire but uses only the reference burst and the uplink traffic burst. The performance of the ACTS network control functions have been successfully tested during on-orbit checkout and in various VSAT networks in day to day operations. This paper discusses the network operations and services control performance.

  17. To amend the Immigration and Nationality Act to improve communication between the Secretary of Homeland Security and State and local law enforcement officials regarding the treatment of aliens who have been ordered removed and also charged with an aggravated felony under State law.

    THOMAS, 111th Congress

    Rep. Frelinghuysen, Rodney P. [R-NJ-11

    2009-03-31

    04/27/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  18. 17 CFR 239.39 - Form F-9, for registration under the Securities Act of 1933 of certain investment grade debt or...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form F-9, for registration under the Securities Act of 1933 of certain investment grade debt or investment grade preferred securities of certain Canadian issuers. 239.39 Section 239.39 Commodity and Securities Exchanges...

  19. Two sources of meaning in infant communication: preceding action contexts and act-accompanying characteristics

    PubMed Central

    Liszkowski, Ulf

    2014-01-01

    How do infants communicate before they have acquired a language? This paper supports the hypothesis that infants possess social–cognitive skills that run deeper than language alone, enabling them to understand others and make themselves understood. I suggested that infants, like adults, use two sources of extralinguistic information to communicate meaningfully and react to and express communicative intentions appropriately. In support, a review of relevant experiments demonstrates, first, that infants use information from preceding shared activities to tailor their comprehension and production of communication. Second, a series of novel findings from our laboratory shows that in the absence of distinguishing information from preceding routines or activities, infants use accompanying characteristics (such as prosody and posture) that mark communicative intentions to extract and transmit meaning. Findings reveal that before infants begin to speak they communicate in meaningful ways by binding preceding and simultaneous multisensory information to a communicative act. These skills are not only a precursor to language, but also an outcome of social–cognitive development and social experience in the first year of life. PMID:25092662

  20. Older Americans Act Nutrition Program improves participants' food security in Georgia.

    PubMed

    Lee, Jung Sun; Johnson, Mary Ann; Brown, Arvine

    2011-01-01

    It is critical to use convincing research methodology to demonstrate the benefits of nutrition assistance programs targeted to vulnerable older adults. We examined the impact of Older Americans Act Nutrition Program (OAANP) participation on food security in participants and waitlisted people in Georgia using two waves of self-administered mail surveys conducted 4 months apart (n = 717, mean age 74.6 ± 9.5, 70.9% female, 33.2% black). At baseline, 54% of the sample was food insecure. Waitlisted people reported higher levels of persistent food insecurity (45.9%) or becoming food insecure (10.0%) than participants (29.3% and 7.1%, respectively) over 4 months. While considering potential confounders, the estimated odds of achieving food security were 1.65 times (95% CI: 1.10-2.48) higher in participants than in waitlisted people over 4 months. Our data suggest the feasibility of using food insecurity measures to detect the benefits of OAANP participation as well as the need to increase the capacity of OAANP.

  1. On a simulation study for reliable and secured smart grid communications

    NASA Astrophysics Data System (ADS)

    Mallapuram, Sriharsha; Moulema, Paul; Yu, Wei

    2015-05-01

    Demand response is one of key smart grid applications that aims to reduce power generation at peak hours and maintain a balance between supply and demand. With the support of communication networks, energy consumers can become active actors in the energy management process by adjusting or rescheduling their electricity usage during peak hours based on utilities pricing incentives. Nonetheless, the integration of communication networks expose the smart grid to cyber-attacks. In this paper, we developed a smart grid simulation test-bed and designed evaluation scenarios. By leveraging the capabilities of Matlab and ns-3 simulation tools, we conducted a simulation study to evaluate the impact of cyber-attacks on demand response application. Our data shows that cyber-attacks could seriously disrupt smart grid operations, thus confirming the need of secure and resilient communication networks for supporting smart grid operations.

  2. Adaptive synchronization of a switching system and its applications to secure communications.

    PubMed

    Xia, Weiguo; Cao, Jinde

    2008-06-01

    This paper studies the adaptive synchronization of a switching system with unknown parameters which switches between the Rössler system and a unified chaotic system. Using the Lyapunov stability theory and adaptive control method, the receiver system will achieve synchronization with the drive system and the unknown parameters would be estimated by the receiver. Then the proposed switching system is used for secure communications based on the communication schemes including chaotic masking, chaotic modulation, and chaotic shift key strategies. Since the system switches between two chaotic systems and the parameters are almost unknown, it is more difficult for the intruder to extract the useful message from the transmission channel. In addition, two new schemes in which the chaotic signal used to mask (or modulate) the transmitted signal switches between two components of a chaotic system are also presented. Finally, some simulation results are given to show the effectiveness of the proposed communication schemes.

  3. Secure Communications

    NASA Astrophysics Data System (ADS)

    Bellac, Michel Le

    2014-11-01

    The first practical application of quantum physics examined in this book is quantum cryptography. Quantum cryptography is a relatively recent invention (it dates back from the mid 1980s) but I chose it because it allows me to illustrate the fundamental principles with a minimum number of intermediate steps. I shall begin with a short summary of classical cryptography, reviewing briefly the two systems which are currently used today: the secret key system and the public key system. Quantum cryptography is not a new method for dissimulating the meaning of a message, but it allows one to be certain that no spy has accessed it. There exist many quantum cryptography protocols and various experimental devices have been proposed for implementing them. The simplest device is based on polarization, a concept which will be introduced first in the case of of light polarization, and then in that of photon polarization. The use of photon polarization gives the simplest implementation of the protocol proposed in 1984 by Bennett and Brassard, which is known by the acronym formed with their initials, the BB84 protocol.

  4. 76 FR 42003 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-18

    ... of Homeland Security Transportation Security Administration--023 Workplace Violence Prevention...--023 Workplace Violence Prevention Program System of Records'' from certain provisions of the Privacy.../Transportation Security Administration--023 Workplace Violence Prevention Program System of Records'' from one...

  5. The politics of universal access: the Massachusetts Health Security Act of 1988.

    PubMed

    Goldberger, S A

    1990-01-01

    This article analyzes the passage of an unprecedented state law, promising every resident access to affordable health insurance. The Massachusetts Health Security Act of 1988 was the product of a set of political and financial pressures that had been developing for nearly a decade. Hospital, insurance, and business interests were unable to reach a new accommodation on hospital payment. This logjam created the opportunity for a policy breakthrough, but did not inherently lend itself to progressive reform. It was consumer activism that forced the traditional powers in health policy to address the interests of the uninsured. By imposing a more public-interest agenda on the process, consumers were able to change the configuration of the stalemate, but could not resolve it. The particular terms of the stalemate, however, made possible a new, more aggressive role for state government in health policy. Unable to satisfy their competing interests within a policy framework that had universal access as a goal, traditionally powerful interest groups found themselves increasingly dependent on the state to broker a new agreement. While the many concessions made to these groups are likely to prove to be the bill's undoing, the unraveling of the agreement will not end the story. The same pressures which led to passage of the Massachusetts law and which are now causing other states to act will continue to exert their effect until a more durable solution is found.

  6. Control and Communication for a Secure and Reconfigurable Power Distribution System

    NASA Astrophysics Data System (ADS)

    Giacomoni, Anthony Michael

    A major transformation is taking place throughout the electric power industry to overlay existing electric infrastructure with advanced sensing, communications, and control system technologies. This transformation to a smart grid promises to enhance system efficiency, increase system reliability, support the electrification of transportation, and provide customers with greater control over their electricity consumption. Upgrading control and communication systems for the end-to-end electric power grid, however, will present many new security challenges that must be dealt with before extensive deployment and implementation of these technologies can begin. In this dissertation, a comprehensive systems approach is taken to minimize and prevent cyber-physical disturbances to electric power distribution systems using sensing, communications, and control system technologies. To accomplish this task, an intelligent distributed secure control (IDSC) architecture is presented and validated in silico for distribution systems to provide greater adaptive protection, with the ability to proactively reconfigure, and rapidly respond to disturbances. Detailed descriptions of functionalities at each layer of the architecture as well as the whole system are provided. To compare the performance of the IDSC architecture with that of other control architectures, an original simulation methodology is developed. The simulation model integrates aspects of cyber-physical security, dynamic price and demand response, sensing, communications, intermittent distributed energy resources (DERs), and dynamic optimization and reconfiguration. Applying this comprehensive systems approach, performance results for the IEEE 123 node test feeder are simulated and analyzed. The results show the trade-offs between system reliability, operational constraints, and costs for several control architectures and optimization algorithms. Additional simulation results are also provided. In particular, the

  7. Advanced communication satellites worldwide - Satellites of opportunity for the ACTS mobile terminal

    NASA Technical Reports Server (NTRS)

    Girardey, Catherine C.

    1993-01-01

    Space agencies worldwide are involved in advanced satellite communication systems. This paper presents an overview of these satellites and related technologies in the U.S., Europe, and Japan. They are geostationary satellites using high frequency bands such as K/Ka (20/30 GHz) and O-band (millimeter wave), as well as optical frequencies. The similarity of these programs demonstrate a common interest to develop large capacity satellite communication systems, and shows that closer international cooperation could be set up. The ACTS Mobile Terminal (AMT) project discussed here is such an example. The AMT's compatibility with satellites other than ACTS has been studied, and a proposed common experiment is presented here. The Japanese Engineering Test Satellite ETS-VI has been identified as the best initial 'satellite of opportunity' for AMT in this preliminary assessment.

  8. ACTS propagation experiment discussion: Ka-band propagation measurements using the ACTS propagation terminal and the CSU-CHILL and Space Communications Technology Center Florida propagation program

    NASA Technical Reports Server (NTRS)

    Bringi, V. N.; Chandrasekar, V.; Mueller, Eugene A.; Turk, Joseph; Beaver, John; Helmken, Henry F.; Henning, Rudy

    1993-01-01

    Papers on Ka-band propagation measurements using the ACTS propagation terminal and the Colorado State University CHILL multiparameter radar and on Space Communications Technology Center Florida Propagation Program are discussed. Topics covered include: microwave radiative transfer and propagation models; NASA propagation terminal status; ACTS channel characteristics; FAU receive only terminal; FAU terminal status; and propagation testbed.

  9. National Security Restraints of the Federal Government on Academic Freedom and Scientific Communication in the United States.

    ERIC Educational Resources Information Center

    Schwab, Jessica D.

    1990-01-01

    Examines the historic and continuing conflict between academic freedom and national security. Topics discussed include regulation and enforcement, restricted technologies, international committees, statutes, Executive Orders, and the Corson Report on scientific communication and national security. A list of recent events in which academic…

  10. Secure Communication Based on a Hybrid of Chaos and Ica Encryptions

    NASA Astrophysics Data System (ADS)

    Chen, Wei Ching; Yuan, John

    Chaos and independent component analysis (ICA) encryptions are two novel schemes for secure communications. In this paper, a new scheme combining chaos and ICA techniques is proposed to enhance the security level during communication. In this scheme, a master chaotic system is embedded at the transmitter. The message signal is mixed with a chaotic signal and a Gaussian white noise into two mixed signals and then transmitted to the receiver through the public channels. A signal for synchronization is transmitted through another public channel to the receiver where a slave chaotic system is embedded to reproduce the chaotic signal. A modified ICA is used to recover the message signal at the receiver. Since only two of the three transmitted signals contain the information of message signal, a hacker would not be able to retrieve the message signal by using ICA even though all the transmitted signals are intercepted. Spectrum analyses are used to prove that the message signal can be securely hidden under this scheme.

  11. Final Report: 03-LW-005 Space-Time Secure Communications for Hostile Environments

    SciTech Connect

    Candy, J V; Poggio, A J; Chambers, D H; Guidry, B L; Robbins, C L; Hertzog, C A; Dowla, F; Burke, G; Kane, R

    2005-10-31

    The development of communications for highly reverberative environments is a major concern for both the private and military sectors whether the application is aimed at the securing a stock order or stalking hostile in a tunnel or cave. Other such environments can range from a hostile urban setting populated with a multitude of buildings and vehicles to the simple complexity of a large number of sound sources that are common in the stock exchange, or military operations in an environment with a topographic features hills, valleys, mountains or even a maze of buried water pipes attempting to transmit information about any chemical anomalies in the water system servicing a city or town. These inherent obstructions cause transmitted signals to reflect, refract and disperse in a multitude of directions distorting both their shape and arrival times at network receiver locations. Imagine troops attempting to communicate on missions in underground caves consisting of a maze of chambers causing multiple echoes with the platoon leader trying to issue timely commands to neutralize terrorists. This is the problem with transmitting information in a complex environment. Waves are susceptible to multiple paths and distortions created by a variety of possible obstructions, which may exist in the particular propagation medium. This is precisely the communications problem we solve using the physics of wave propagation to not only mitigate the noxious effects created by the hostile medium, but also to utilize it in a constructive manner enabling a huge benefit in communications. We employ time-reversal (T/R) communications to accomplish this task. This project is concerned with the development of secure communications techniques that can operate even in the most extreme conditions while maintaining a secure link between host and client stations. We developed an approach based on the concept of time-reversal (T/R) signal processing. In fact, the development of T/R communication

  12. Report: Fiscal Year 2015 Federal Information Security Modernization Act Report: Status of CSB’s Information Security Program

    EPA Pesticide Factsheets

    Report #16-P-0086, January 27, 2016. The effectiveness of the CSB’s information security program is challenged by its lack of personal identity verification cards for logical access, complete system inventory.

  13. Security-enhanced chaos communication with time-delay signature suppression and phase encryption.

    PubMed

    Xue, Chenpeng; Jiang, Ning; Lv, Yunxin; Wang, Chao; Li, Guilan; Lin, Shuqing; Qiu, Kun

    2016-08-15

    A security-enhanced chaos communication scheme with time delay signature (TDS) suppression and phase-encrypted feedback light is proposed, in virtue of dual-loop feedback with independent high-speed phase modulation. We numerically investigate the property of TDS suppression in the intensity and phase space and quantitatively discuss security of the proposed system by calculating the bit error rate of eavesdroppers who try to crack the system by directly filtering the detected signal or by using a similar semiconductor laser to synchronize the link signal and extract the data. The results show that TDS embedded in the chaotic carrier can be well suppressed by properly setting the modulation frequency, which can keep the time delay a secret from the eavesdropper. Moreover, because the feedback light is encrypted, without the accurate time delay and key, the eavesdropper cannot reconstruct the symmetric operation conditions and decode the correct data.

  14. Experimental demonstration of security-enhanced WDM-PON based on chaotic optical communications

    NASA Astrophysics Data System (ADS)

    Yin, Hongxi; Chen, Xiaolei; Yue, Hehe; Zhao, Qingchun; Hao, Yang; Wu, Chenguang; Zhao, Nan

    2015-08-01

    The message-decryption process of subtracting chaotic synchronization carrier from receiving signal is explained by modeling and numerically solving the rate equations for semiconductor lasers. An experimental system of wavelength division multiplexing passive optical network (WDM-PON) based on chaotic-light secure communications is first built up. The bidirectional transmissions of downstream and upstream data are experimentally realized with only two lasers and a single wavelength channel in a WDM fiber-optic link. When the data rate is 1.25 Gb/s, the secure transmission distance can be up to 11 km with SSMF of G.652. After sampling and decision, the BER of the recovered messages is calculated to be approximately 1×10-4.

  15. 75 FR 17181 - Order Extending Temporary Exemptions Under the Securities Exchange Act of 1934 in Connection With...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-05

    ... Request of Chicago Mercantile Exchange Inc. Related to Central Clearing of Credit Default Swaps, and... exemptions in connection with CDS clearing by Chicago Mercantile Exchange Inc.); Securities Exchange Act... Mercantile Exchange Inc. (``CME'') and Citadel Investment Group, LLC. (``Citadel''), and certain...

  16. Energy Market and Economic Impacts of H.R. 2454, the American Clean Energy and Security Act of 2009

    EIA Publications

    2009-01-01

    This report responds to a request from Chairman Henry Waxman and Chairman Edward Markey for an analysis of H.R. 2454, the American Clean Energy and Security Act of 2009 (ACESA). ACESA, as passed by the House of Representatives on June 26, 2009, is a complex bill that regulates emissions of greenhouse gases through market-based mechanisms, efficiency programs, and economic incentives.

  17. Energy Market and Economic Impacts of S.2191, the Lieberman-Warner Climate Security Act of 2007

    EIA Publications

    2008-01-01

    This report responds to a request from Senators Lieberman and Warner for an analysis of S.2191, the Lieberman-Warner Climate Security Act of 2007. S.2191 is a complex bill regulating emissions of greenhouse gases through market- based mechanisms, energy efficiency programs, and economic incentives.

  18. Impacts of a 25% Renewable Electricity Standard as Proposed in the American Clean Energy and Security Act Discussion Draft

    EIA Publications

    2009-01-01

    This report responds to requests from Chairman Edward Markey, for an analysis of a 25% federal renewable electricity standard (RES). The RES proposal analyzed in this report is included in the discussion draft of broader legislation, the American Clean Energy and Security Act (ACESA) of 2009, issued on the Energy and Commerce Committee website at the end of March 2009.

  19. 48 CFR 1552.235-77 - Data Security for Federal Insecticide, Fungicide and Rodenticide Act Confidential Business...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Data Security for Federal Insecticide, Fungicide and Rodenticide Act Confidential Business Information (DEC 1997). 1552.235-77 Section 1552.235-77 Federal Acquisition Regulations System ENVIRONMENTAL PROTECTION AGENCY CLAUSES AND FORMS SOLICITATION PROVISIONS AND...

  20. 48 CFR 1552.235-78 - Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997).

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997). 1552.235-78 Section 1552.235-78 Federal Acquisition Regulations System ENVIRONMENTAL PROTECTION AGENCY CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts...

  1. Information Leakage Problem in Efficient Bidirectional Quantum Secure Direct Communication with Single Photons in Both Polarization and Spatial-Mode Degrees of Freedom

    NASA Astrophysics Data System (ADS)

    Liu, Zhi-Hao; Chen, Han-Wu; Liu, Wen-Jie

    2016-11-01

    The information leakage problem in the efficient bidirectional quantum secure direct communication protocol with single photons in both polarization and spatial-mode degrees of freedom is pointed out. Next, a way to revise this protocol to a truly secure one is given. We hope people pay more attention to the information leakage problem in order to design truly secure quantum communication protocols.

  2. Chaotic synchronization based on nonlinear state-observer and its application in secure communication

    NASA Astrophysics Data System (ADS)

    Chen, Ming-Jie; Li, Dian-Pu; Zhang, Ai-Jun

    2004-06-01

    Chaotic synchronization is a branch of chaotic control. Nowadays, the research and application of chaotic synchronization have become a hot topic and one of the development directions is for the research on chaos. In this paper, a universal nonlinear state-observer is presented for a class of universal chaotic systems to realize the chaotic synchronization, according to the theory of state-observer in the modern control theory. And theoretic analysis and simulation results have illustrated the validity of the approach. Moreover, the approach of synchronization proposed in this paper is very easy, flexible and universal with high synchronization precision. When the approach is applied to secure communication, the results are satisfying.

  3. Multiparty controlled quantum secure direct communication based on quantum search algorithm

    NASA Astrophysics Data System (ADS)

    Kao, Shih-Hung; Hwang, Tzonelih

    2013-12-01

    In this study, a new controlled quantum secure direct communication (CQSDC) protocol using the quantum search algorithm as the encoding function is proposed. The proposed protocol is based on the multi-particle Greenberger-Horne-Zeilinger entangled state and the one-step quantum transmission strategy. Due to the one-step transmission of qubits, the proposed protocol can be easily extended to a multi-controller environment, and is also free from the Trojan horse attacks. The analysis shows that the use of quantum search algorithm in the construction of CQSDC appears very promising.

  4. Robust EPR-pairs-based quantum secure communication with authentication resisting collective noise

    NASA Astrophysics Data System (ADS)

    Chang, Yan; Zhang, ShiBin; Li, Jian; Yan, LiLi

    2014-10-01

    This work presents two robust quantum secure communication schemes with authentication based on Einstein-Podolsky-Rosen (EPR) pairs, which can withstand collective noises. Two users previously share an identity string representing their identities. The identity string is encoded as decoherence-free states (termed logical qubits), respectively, over the two collective noisy channels, which are used as decoy photons. By using the decoy photons, both the authentication of two users and the detection of eavesdropping were implemented. The use of logical qubits not only guaranteed the high fidelity of exchanged secret message, but also prevented the eavesdroppers to eavesdrop beneath a mask of noise.

  5. Welfare, Liberty, and Security for All? U.S. Sex Education Policy and the 1996 Title V Section 510 of the Social Security Act.

    PubMed

    Lerner, Justin E; Hawkins, Robert L

    2016-07-01

    When adolescents delay (meaning they wait until after middle school) engaging in sexual intercourse, they use condoms at higher rates and have fewer sexual partners than those who have sex earlier, thus resulting in a lower risk for unintended pregnancies and sexually transmitted infections. The 1996 Section 510 of Title V of the Social Security Act (often referred to as A-H) is a policy that promotes abstinence-only-until-marriage education (AOE) within public schools. Using Stone's (2012) policy analysis framework, this article explores how A-H limits welfare, liberty, and security among adolescents due to the poor empirical outcomes of AOE policy. We recommend incorporating theory-informed comprehensive sex education in addition to theory-informed abstinence education that utilizes Fishbein and Ajzen's (2010) reasoned action model within schools in order to begin to address adolescent welfare, liberty, and security.

  6. An application of Chen system for secure chaotic communication based on extended Kalman filter and multi-shift cipher algorithm

    NASA Astrophysics Data System (ADS)

    Fallahi, Kia; Raoufi, Reza; Khoshbin, Hossein

    2008-07-01

    In recent years chaotic secure communication and chaos synchronization have received ever increasing attention. In this paper a chaotic communication method using extended Kalman filter is presented. The chaotic synchronization is implemented by EKF design in the presence of channel additive noise and processing noise. Encoding chaotic communication is used to achieve a satisfactory, typical secure communication scheme. In the proposed system, a multi-shift cipher algorithm is also used to enhance the security and the key cipher is chosen as one of the chaos states. The key estimate is employed to recover the primary data. To illustrate the effectiveness of the proposed scheme, a numerical example based on Chen dynamical system is presented and the results are compared to two other chaotic systems.

  7. Cryptanalysis and Improvement on "Robust EPR-Pairs-Based Quantum Secure Communication with Authentication Resisting Collective Noise"

    NASA Astrophysics Data System (ADS)

    Yue, Qiu-Ling; Yu, Chao-Hua; Liu, Bin; Wang, Qing-Le

    2016-10-01

    Recently, Chang et al. [Sci Chin-Phys Mech Astron. 57(10), 1907-1912, 2014] proposed two robust quantum secure communication protocols with authentication based on Einstein-Podolsky-Rosen (EPR) pairs, which can resist collective noise. In this paper, we analyze the security of their protocols, and show that there is a kind of security flaw in their protocols. By a kind of impersonation attack, the eavesdropper can obtain half of the message on average. Furthermore, an improved method of their protocols is proposed to close the security loophole.

  8. Two Years of ACTS (Advanced Communications Technology Satellite) Propagation Studies in Alaska

    NASA Technical Reports Server (NTRS)

    Mayer, Charles E.; Jaeger, Bradley E.

    1996-01-01

    The Alaska Advanced Communications Technology Satellite (ACTS) propagation terminal (APT) is located on top of the engineering building on the University of Alaska Fairbanks campus. The latitude and longitude of the site are 64 degrees 51 minutes, 28 seconds N and 147 degrees, 48 minutes, 59 seconds west. The geometrical elevation angle to ACTS is 7.97 degrees; including a normal atmospheric refractivity, the elevation angle increases to 8.10 degrees. The azimuth angle to ACTS is 129.36 degrees. The terminal is located at 580 feet above mean sea level. The site is located in ITU-R rain zone C and Crane global model zone B1. ACTS transmits vertical polarization beacons at 27.505 and 20.185 GHz. At the APT, the polarization tilt angle is 19.4 degrees rotated CCW with respect to vertical when looking towards the satellite. The beacons are transmitted in a CONUS pattern. The ACTS beacon footprint at the Alaska APT is 9 dB down from the transmission pattern peak at 27.505 GHz and 11 dB down from the pattern peak at 20.185 GHz.

  9. An Experimental Realization of a Chaos-Based Secure Communication Using Arduino Microcontrollers

    PubMed Central

    Zapateiro De la Hoz, Mauricio; Acho, Leonardo; Vidal, Yolanda

    2015-01-01

    Security and secrecy are some of the important concerns in the communications world. In the last years, several encryption techniques have been proposed in order to improve the secrecy of the information transmitted. Chaos-based encryption techniques are being widely studied as part of the problem because of the highly unpredictable and random-look nature of the chaotic signals. In this paper we propose a digital-based communication system that uses the logistic map which is a mathematically simple model that is chaotic under certain conditions. The input message signal is modulated using a simple Delta modulator and encrypted using a logistic map. The key signal is also encrypted using the same logistic map with different initial conditions. In the receiver side, the binary-coded message is decrypted using the encrypted key signal that is sent through one of the communication channels. The proposed scheme is experimentally tested using Arduino shields which are simple yet powerful development kits that allows for the implementation of the communication system for testing purposes. PMID:26413563

  10. An Experimental Realization of a Chaos-Based Secure Communication Using Arduino Microcontrollers.

    PubMed

    Zapateiro De la Hoz, Mauricio; Acho, Leonardo; Vidal, Yolanda

    2015-01-01

    Security and secrecy are some of the important concerns in the communications world. In the last years, several encryption techniques have been proposed in order to improve the secrecy of the information transmitted. Chaos-based encryption techniques are being widely studied as part of the problem because of the highly unpredictable and random-look nature of the chaotic signals. In this paper we propose a digital-based communication system that uses the logistic map which is a mathematically simple model that is chaotic under certain conditions. The input message signal is modulated using a simple Delta modulator and encrypted using a logistic map. The key signal is also encrypted using the same logistic map with different initial conditions. In the receiver side, the binary-coded message is decrypted using the encrypted key signal that is sent through one of the communication channels. The proposed scheme is experimentally tested using Arduino shields which are simple yet powerful development kits that allows for the implementation of the communication system for testing purposes.

  11. Advanced Communication Technology Satellite (ACTS) Multibeam Antenna On-Orbit Performance

    NASA Technical Reports Server (NTRS)

    1995-01-01

    The NASA Lewis Research Center's Advanced Communication Technology Satellite (ACTS) was launched in September 1993. ACTS introduced several new technologies, including a multibeam antenna (MBA) operating at extremely short wavelengths never before used in communications. This antenna, which has both fixed and rapidly reconfigurable high-energy spot beams (150 miles in diameter), serves users equipped with small antenna terminals. Extensive structural and thermal analyses have been performed for simulating the ACTS MBA on-orbit performance. The results show that the reflector surfaces (mainly the front subreflector), antenna support assembly, and metallic surfaces on the spacecraft body will be distorted because of the thermal effects of varying solar heating, which degrade the ACTS MBA performance. Since ACTS was launched, a number of evaluations have been performed to assess MBA performance in the space environment. For example, the on-orbit performance measurements found systematic environmental disturbances to the MBA beam pointing. These disturbances were found to be imposed by the attitude control system, antenna and spacecraft mechanical alignments, and on-orbit thermal effects. As a result, the MBA may not always exactly cover the intended service area. In addition, the on-orbit measurements showed that antenna pointing accuracy is the performance parameter most sensitive to thermal distortions on the front subreflector surface and antenna support assemblies. Several compensation approaches were tested and evaluated to restore on-orbit pointing stability. A combination of autotrack (75 percent of the time) and Earth sensor control (25 percent of the time) was found to be the best way to compensate for antenna pointing error during orbit. This approach greatly minimizes the effects of thermal distortions on antenna beam pointing.

  12. Understanding Title V of the Social Security Act: A Guide to the Provisions of the Federal Maternal and Child Health Block Grant.

    ERIC Educational Resources Information Center

    Health Resources and Services Administration (DHHS/PHS), Washington, DC. Maternal and Child Health Bureau.

    The Maternal and Child Health (MCH) Services Block Grant (Title V of the Social Security Act) has operated as a federal-state partnership since the Social Security Act was passed in 1935. Through Title V, the federal government pledged its support of state efforts to extend health and welfare services for mothers and children. Title V has been…

  13. Student Conduct Administrator Knowledge of the Statistical Reporting Obligations of the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act

    ERIC Educational Resources Information Center

    DeBowes, Michael Matthew

    2014-01-01

    The "Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act" (the "Clery Act") is a consumer right-to-know law originally passed by Congress in 1900. The law requires colleges and universities receiving federal student aid to publish annually their security-related policies and crime statistics. The…

  14. 78 FR 55274 - Privacy Act of 1974; Department of Homeland Security/Transportation Security Administration-DHS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-10

    ... security threat assessment of law enforcement, immigration, and intelligence databases, including a fingerprint-based criminal history records check conducted through the Federal Bureau of Investigation (FBI... misidentification or inaccurate criminal or immigration records. Consistent with 28 CFR 50.12 in cases...

  15. 17 CFR 250.14 - Exemption of acquisitions of securities of power supply companies from section 9(a)(2) of the Act.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... of securities of power supply companies from section 9(a)(2) of the Act. (a) An electric utility... securities, and any obligation by such electric utility company to provide funds to the power supply company... securities of the power supply company are owned by one or more electric utility companies to which the...

  16. Secure Communications in High Speed Fiber Optical Networks Using Code Division Multiple Access (CDMA) Transmission

    SciTech Connect

    Han, I; Bond, S; Welty, R; Du, Y; Yoo, S; Reinhardt, C; Behymer, E; Sperry, V; Kobayashi, N

    2004-02-12

    This project is focused on the development of advanced components and system technologies for secure data transmission on high-speed fiber optic data systems. This work capitalizes on (1) a strong relationship with outstanding faculty at the University of California-Davis who are experts in high speed fiber-optic networks, (2) the realization that code division multiple access (CDMA) is emerging as a bandwidth enhancing technique for fiber optic networks, (3) the realization that CDMA of sufficient complexity forms the basis for almost unbreakable one-time key transmissions, (4) our concepts for superior components for implementing CDMA, (5) our expertise in semiconductor device processing and (6) our Center for Nano and Microtechnology, which is where the majority of the experimental work was done. Here we present a novel device concept, which will push the limits of current technology, and will simultaneously solve system implementation issues by investigating new state-of-the-art fiber technologies. This will enable the development of secure communication systems for the transmission and reception of messages on deployed commercial fiber optic networks, through the CDMA phase encoding of broad bandwidth pulses. CDMA technology has been developed as a multiplexing technology, much like wavelength division multiplexing (WDM) or time division multiplexing (TDM), to increase the potential number of users on a given communication link. A novel application of the techniques created for CDMA is to generate secure communication through physical layer encoding. Physical layer encoding devices are developed which utilize semiconductor waveguides with fast carrier response times to phase encode spectral components of a secure signal. Current commercial technology, most commonly a spatial light modulator, allows phase codes to be changed at rates of only 10's of Hertz ({approx}25ms response). The use of fast (picosecond to nanosecond) carrier dynamics of semiconductors, as

  17. Communication

    NASA Technical Reports Server (NTRS)

    Griner, James

    2010-01-01

    NASA s communication work for the UAS Command and Control area will build upon work currently being conducted under NASA Recovery Act funds. Communication portions of UAS NextGen ConOps, Stateof- the-Art assessment, and Gap Analysis. Preliminary simulations for UAS CNPC link scalability assessment. Surrogate UAS aircraft upgrades. This work will also leverage FY10 in-guide funding for communication link model development. UAS are currently managed through exceptions and are operating using DoD frequencies for line-of-sight (LOS) and satellite-based communications links, low-power LOS links in amateur bands, or unlicensed Instrument/Scientific/Medical (ISM) frequencies. None of these frequency bands are designated for Safety and Regularity of Flight. No radio-frequency (RF) spectrum has been allocated by the International Telecommunications Union (ITU) specifically for UAS command and control links, for either LOS or Beyond LOS (BLOS) communication.

  18. High-speed image transmission via the Advanced Communication Technology Satellite (ACTS)

    NASA Astrophysics Data System (ADS)

    Bazzill, Todd M.; Huang, H. K.; Thoma, George R.; Long, L. Rodney; Gill, Michael J.

    1996-05-01

    We are developing a wide area test bed network using the Advanced Communication Technology Satellite (ACTS) from NASA for high speed medical image transmission. The two test sites are the University of California, San Francisco, and the National Library of Medicine. The first phase of the test bed runs over a T1 link (1.544 Mbits/sec) using a Very Small Aperture Terminal. The second phase involves the High Data Rate Terminal via an ATM OC 3C (155 Mbits/sec) connection. This paper describes the experimental set up and some preliminary results from phase 1.

  19. A bill to amend the Homeland Security Act of 2002 to authorize the Securing the Cities Initiative of the Department of Homeland Security, and for other purposes.

    THOMAS, 111th Congress

    Sen. Gillibrand, Kirsten E. [D-NY

    2010-05-05

    05/05/2010 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  20. PREFACE: 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies

    NASA Astrophysics Data System (ADS)

    Shuja Syed, Ahmed

    2013-12-01

    The 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies (ICSICCST-2013), took place in Karachi, Pakistan, from 24-26 June 2013. It was organized by Indus University, Karachi, in collaboration with HEJ Research Institute of Chemistry, University of Karachi, Karachi. More than 80 abstracts were submitted to the conference and were double blind-reviewed by an international scientific committee. The topics of the Conference were: Video, Image & Voice Sensing Sensing for Industry, Environment, and Health Automation and Controls Laser Sensors and Systems Displays for Innovative Applications Emerging Technologies Unmanned, Robotic, and Layered Systems Sensing for Defense, Homeland Security, and Law Enforcement The title of the conference, 'Sensing for Industry, Control, Communication & Security Technologies' is very apt in capturing the main issues facing the industry of Pakistan and the world. We believe the sensing industry, particularly in Pakistan, is currently at a critical juncture of its development. The future of the industry will depend on how the industry players choose to respond to the challenge of global competition and opportunities arising from strong growth in the Asian region for which we are pleased to note that the conference covered a comprehensive spectrum of issues with an international perspective. This will certainly assist industry players to make informed decisions in shaping the future of the industry. The conference gathered qualified researchers from developed countries like USA, UK, Sweden, Saudi Arabia, China, South Korea and Malaysia etc whose expertise resulting from the research can be drawn upon to build an exploitable area of new technology that has potential Defense, Homeland Security, and Military applicability. More than 250 researchers/students attended the event and made the event great success as the turnout was 100%. An exceptional line-up of speakers spoke at the occasion. We want

  1. Proceedings of the Seventeenth NASA Propagation Experimenters Meeting (NAPEX 17) and the Advanced Communications Technology Satellite (ACTS) Propagation Studies Miniworkshop

    NASA Technical Reports Server (NTRS)

    Davarian, Faramaz (Editor)

    1993-01-01

    The NASA Propagation Experimenters Meeting (NAPEX) is convened annually to discuss studies made on radio wave propagation by investors from domestic and international organizations. NAPEX 17 was held on 15 June 1993. The meeting was organized into two technical sessions. The first session was dedicated to slant path propagation studies and experiments. The second session focused on propagation studies for mobile and personal communications. Preceding NAPEX 17, the Advanced Communications Technology Satellite (ACTS) Propagation Studies Miniworkshop was held on 14 June 1993 to review ACTS propagation activities with emphasis on ACTS experiments status and data collection, processing, and exchange.

  2. Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling

    NASA Astrophysics Data System (ADS)

    Bui, Francis Minhthang; Hatzinakos, Dimitrios

    2007-12-01

    As electronic communications become more prevalent, mobile and universal, the threats of data compromises also accordingly loom larger. In the context of a body sensor network (BSN), which permits pervasive monitoring of potentially sensitive medical data, security and privacy concerns are particularly important. It is a challenge to implement traditional security infrastructures in these types of lightweight networks since they are by design limited in both computational and communication resources. A key enabling technology for secure communications in BSN's has emerged to be biometrics. In this work, we present two complementary approaches which exploit physiological signals to address security issues: (1) a resource-efficient key management system for generating and distributing cryptographic keys to constituent sensors in a BSN; (2) a novel data scrambling method, based on interpolation and random sampling, that is envisioned as a potential alternative to conventional symmetric encryption algorithms for certain types of data. The former targets the resource constraints in BSN's, while the latter addresses the fuzzy variability of biometric signals, which has largely precluded the direct application of conventional encryption. Using electrocardiogram (ECG) signals as biometrics, the resulting computer simulations demonstrate the feasibility and efficacy of these methods for delivering secure communications in BSN's.

  3. Chaotic signal detection and estimation based on attractor sets: Applications to secure communications

    NASA Astrophysics Data System (ADS)

    Rohde, G. K.; Nichols, J. M.; Bucholtz, F.

    2008-03-01

    We consider the problem of detection and estimation of chaotic signals in the presence of white Gaussian noise. Traditionally this has been a difficult problem since generalized likelihood ratio tests are difficult to implement due to the chaotic nature of the signals of interest. Based on Poincare's recurrence theorem we derive an algorithm for approximating a chaotic time series with unknown initial conditions. The algorithm approximates signals using elements carefully chosen from a dictionary constructed based on the chaotic signal's attractor. We derive a detection approach based on the signal estimation algorithm and show, with simulated data, that the new approach can outperform other methods for chaotic signal detection. Finally, we describe how the attractor based detection scheme can be used in a secure binary digital communications protocol.

  4. High-Fidelity Down-Conversion Source for Secure Communications Using On-Demand Single Photons

    NASA Technical Reports Server (NTRS)

    Roberts, Tony

    2015-01-01

    AdvR, Inc., has built an efficient, fully integrated, waveguide-based source of spectrally uncorrelated photon pairs that will accelerate research and development (R&D) in the emerging field of quantum information science. Key to the innovation is the use of submicron periodically poled waveguides to produce counter propagating photon pairs, which is enabled by AdvR's patented segmented microelectrode poling technique. This novel device will provide a high brightness source of down-conversion pairs with enhanced spectral properties and low attenuation, and it will operate in the visible to the mid-infrared spectral region. A waveguide-based source of spectrally and spatially pure heralded photons will contribute to a wide range of NASA's advanced technology development efforts, including on-demand single photon sources for high-rate spaced-based secure communications.

  5. 75 FR 10633 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security United States...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-09

    ... United States Immigration and Customs Enforcement-- 011 Immigration and Enforcement Operational Records... Security/U.S. Immigration and Customs Enforcement system of records titled, ``Department of Homeland Security/U.S. Immigration and Customs Enforcement--011 Removable Alien Records System of Records''...

  6. A Review of State Test Security Laws in 2013. ACT Research Report Series, 2014 (1)

    ERIC Educational Resources Information Center

    Croft, Michelle

    2014-01-01

    Test security has increased in importance in the last few years given high-profile cases of educator misconduct. This paper provides a review of state test security statutes and regulations related to statewide achievement testing using as a framework recent best practices reports by the U.S. Department of Education's National Center for Education…

  7. 76 FR 60387 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-29

    ..., manages this process. To reduce any risk of unauthorized access, FEMA SARs are secured in a room monitored by FEMA OCSO special agents and analysts. FEMA SARs may shared with federal, state, local, and tribal.... FEMA SARs that do not have a nexus to terrorism or hazards to homeland security, as determined by...

  8. 75 FR 50843 - 75th Anniversary of the Social Security Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-18

    ... most vulnerable citizens, giving elderly Americans income security and bringing us closer to President Roosevelt's vision of a Nation free from want or fear. As our country recovers from one of the greatest... years later, Social Security remains a safety net for seniors and a source of resilience for...

  9. Accumulate and Jam: Towards Secure Communication via A Wireless-Powered Full-Duplex Jammer

    NASA Astrophysics Data System (ADS)

    Bi, Ying; Chen, He

    2016-12-01

    This paper develops a new cooperative jamming protocol, termed accumulate-and-jam (AnJ), to improve physical layer security in wireless communications. Specifically, a full-duplex (FD) friendly jammer is deployed to secure the direct communication between source and destination in the presence of a passive eavesdropper. We consider the friendly jammer as an energy-constrained node without embedded power supply but with an energy harvesting unit and rechargeable energy storage; it can thus harvest energy from the radio frequency (RF) signals transmitted by the source, accumulate the energy in its battery, and then use this energy to perform cooperative jamming. In the proposed AnJ protocol, based on the energy status of the jammer and the channel state of source-destination link, the system operates in either dedicated energy harvesting (DEH) or opportunistic energy harvesting (OEH) mode. Thanks to the FD capability, the jammer also harvests energy from the information-bearing signal that it overhears from the source. We study the complex energy accumulation and consumption procedure at the jammer by considering a practical finite-capacity energy storage, of which the long-term stationary distribution is characterized through applying a discrete-state Markov Chain. An alternative energy storage with infinite capacity is also studied to serve as an upper bound. We further derive closed-form expressions for two secrecy metrics, i.e., secrecy outage probability and probability of positive secrecy capacity. In addition, the impact of imperfect channel state information on the performance of our proposed protocol is also investigated. Numerical results validate all theoretical analyses and reveal the merits of the proposed AnJ protocol over its half-duplex counterpart.

  10. Novel communication security scheme using dark-bright soliton conversion behaviors

    NASA Astrophysics Data System (ADS)

    Pongwongtragull, Paiboon; Teeka, Chat; Kamoldilok, Surachart; Yupapin, Preecha P.

    2011-02-01

    We propose a novel scheme of communication security using dark-bright soliton conversion behaviors in which the transmission signals can be secured by using the random codes generated by dark-bright soliton conversion within the system. The system consists of two parts, where first, an optical Mach Zhender interferometer (MZI) is used to generate the coincidence dark and bright soliton pair by using the (π/2) phase retarder (i.e., a coupler), in which |D> and |B> states represent the orthogonal dark and bright soliton pulses. The signals from through (Th) port are formed and transmitted via the transmission line to the end user. Second, the add/drop filter is used to separate(filter) the required signal form the transmission link, in which the Th and drop port signals are formed as a reference and signal, respectively. In this case, we assume that both solitons are input into the MZI ports simultaneously (coincidently), in which the binary codes are randomly formed and used to present the transmission data, in which the states ``0'' and ``1'' are represented by |DB> and |BD>, respectively. Finally, the eavesdropper and signal accuracy are also described.

  11. Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification rules under the Health Information Technology for Economic and Clinical Health Act and the Genetic Information Nondiscrimination Act; other modifications to the HIPAA rules.

    PubMed

    2013-01-25

    The Department of Health and Human Services (HHS or ``the Department'') is issuing this final rule to: Modify the Health Insurance Portability and Accountability Act (HIPAA) Privacy, Security, and Enforcement Rules to implement statutory amendments under the Health Information Technology for Economic and Clinical Health Act (``the HITECH Act'' or ``the Act'') to strengthen the privacy and security protection for individuals' health information; modify the rule for Breach Notification for Unsecured Protected Health Information (Breach Notification Rule) under the HITECH Act to address public comment received on the interim final rule; modify the HIPAA Privacy Rule to strengthen the privacy protections for genetic information by implementing section 105 of Title I of the Genetic Information Nondiscrimination Act of 2008 (GINA); and make certain other modifications to the HIPAA Privacy, Security, Breach Notification, and Enforcement Rules (the HIPAA Rules) to improve their workability and effectiveness and to increase flexibility for and decrease burden on the regulated entities.

  12. Secure Intra-Body Wireless Communications (SIWiC) System Project

    NASA Technical Reports Server (NTRS)

    Ahmad, Aftab; Doggett, Terrence P.

    2011-01-01

    SIWiC System is a project to investigate, design and implement future wireless networks of implantable sensors in the body. This futuristic project is designed to make use of the emerging and yet-to-emerge technologies, including ultra-wide band (UWB) for wireless communications, smart implantable sensors, ultra low power networking protocols, security and privacy for bandwidth and power deficient devices and quantum computing. Progress in each of these fronts is hindered by the needs of breakthrough. But, as we will see in this paper, these major challenges are being met or will be met in near future. SIWiC system is a network of in-situ wireless devices that are implanted to coordinate sensed data inside the body, such as symptoms monitoring collected internally, or biometric data collected of an outside object from within the intra-body network. One node has the capability of communicating outside the body to send data or alarm to a relevant authority, e.g., a remote physician.

  13. To amend the Homeland Security Act of 2002 to authorize the Securing the Cities Initiative of the Department of Homeland Security, and for other purposes.

    THOMAS, 111th Congress

    Rep. King, Peter T. [R-NY-3

    2009-05-21

    01/21/2010 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  14. 17 CFR 230.169 - Exemption from sections 2(a)(10) and 5(c) of the Act for certain communications of regularly...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...)(10) and 5(c) of the Act for certain communications of regularly released factual business information...) of the Act for certain communications of regularly released factual business information. Preliminary Notes to § 230.169. 1. This section is not available for any communication that, although in...

  15. 17 CFR 230.168 - Exemption from sections 2(a)(10) and 5(c) of the Act for certain communications of regularly...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...)(10) and 5(c) of the Act for certain communications of regularly released factual business information... paragraph (a)(3) of this section) of communications containing factual business information or forward... Exemption from sections 2(a)(10) and 5(c) of the Act for certain communications of regularly...

  16. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO.

    PubMed

    Celesti, Antonio; Fazio, Maria; Villari, Massimo

    2017-02-07

    Nowadays, in the panorama of Internet of Things (IoT), finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP) for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO) authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy.

  17. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO

    PubMed Central

    Celesti, Antonio; Fazio, Maria; Villari, Massimo

    2017-01-01

    Nowadays, in the panorama of Internet of Things (IoT), finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP) for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO) authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy. PMID:28178214

  18. Center to Advance, Monitor, and Preserve University Security Safety Act of 2013

    THOMAS, 113th Congress

    Rep. Scott, Robert C. "Bobby" [D-VA-3

    2013-01-23

    02/28/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, And Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  19. 75 FR 75522 - Order Extending Temporary Conditional Exemptions Under the Securities Exchange Act of 1934 in...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-03

    ... Connection With Request of Chicago Mercantile Exchange Inc. Related to Central Clearing of Credit Default...) (temporary exemptions in connection with CDS clearing by Chicago Mercantile Exchange Inc.); Securities... an order providing temporary conditional exemptions to the Chicago Mercantile Exchange Inc....

  20. Electronic Life Safety and Security Systems Federal Background Check Act of 2013

    THOMAS, 113th Congress

    Rep. Luetkemeyer, Blaine [R-MO-3

    2013-04-09

    04/30/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation: