Science.gov

Sample records for airport security access

  1. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ...: RTCA Special Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation... 224, Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-second meeting of the RTCA Special Committee 224, Airport Security Access...

  2. 75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-23

    ... Federal Aviation Administration Third Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  3. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-22

    ... Federal Aviation Administration Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20,...

  4. 76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-26

    ... TRANSPORTATION Federal Aviation Administration Ninth Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control...

  5. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-23

    ... Federal Aviation Administration Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held November 15,...

  6. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... Federal Aviation Administration Twentieth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 4, 2013 from...

  7. 77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-15

    ... Federal Aviation Administration Twelfth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Notice of meeting RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... 224, Airport Security Access Control Systems DATES: The meeting will be held April 5, 2012, from 10...

  8. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-12

    ... Federal Aviation Administration Twenty First Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 9-10,...

  9. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-30

    ... Federal Aviation Administration Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held December 13,...

  10. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-11

    ... Federal Aviation Administration Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held September 27-28,...

  11. 77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-17

    ... Federal Aviation Administration Eleventh Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY: The FAA..., Airport Security Access Control Systems. DATES: The meeting will be held February 9, 2012, from 10...

  12. 76 FR 67019 - Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-28

    ... Federal Aviation Administration Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224, Airport Security Access Control. DATES:...

  13. 76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-23

    ... Federal Aviation Administration Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  14. 76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-18

    ... Federal Aviation Administration Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  15. 76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-16

    ... TRANSPORTATION Federal Aviation Administration Eighth Meeting: RTCA Special Committee 224: Airport Security... Committee 224 meeting: Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control...

  16. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-30

    ... TRANSPORTATION Federal Aviation Administration Thirteenth Meeting: RTCA Special Committee 224, Airport Security... (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held May 30, 2012, from...

  17. 75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-24

    ... Federal Aviation Administration Second Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport...

  18. 76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-21

    ... Federal Aviation Administration Fourth Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 Meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport...

  19. 76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-01

    ... Federal Aviation Administration Seventh Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport...

  20. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-04

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held February 21,...

  1. 75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this... Control Systems (Update to DO-230B): November 2, 2010 Welcome/Introductions/Administrative Remarks Agenda... Federal Aviation Administration First Meeting: RTCA Special Committee 224: Airport Security Access...

  2. 78 FR 51810 - Twenty-Fourth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-21

    ... Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on... TRANSPORTATION Federal Aviation Administration Twenty-Fourth Meeting: RTCA Special Committee 224,...

  3. Economic Aspects of Airport Security Measures

    DTIC Science & Technology

    1999-06-01

    Airport security measures use very expensive equipment, and may keep passengers in line for several minutes. The time passengers spend in those lines...can add up, and must be understood as time opportunity cost. In the 1970s, several airport security measures were adopted to help stop aircraft...associated with airport security measures. He concluded that the costs of the adopted measures were very high. While Landes concentrated on the

  4. 77 FR 51948 - Airport Improvement Program (AIP): Policy Regarding Access to Airports From Residential Property...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-28

    ... Federal Aviation Administration 14 CFR Chapter 1 Airport Improvement Program (AIP): Policy Regarding Access to Airports From Residential Property; Correction AGENCY: Federal Aviation Administration (FAA... paragraph in the Proposed Policy Regarding Access to Airports From Residential Property that was...

  5. Giving radioiodine? Think about airport security alarms.

    PubMed

    Kaniuka-Jakubowska, S; Lewczuk, A; Mizan-Gross, K; Obołończyk, L; Lass, P; Sworczak, K

    2012-01-01

    An increased sensitivity of airport detectors, a growing number of isotopic tests, and globalization of the society have raised a number of false positive radioactive alarms at airports and public places. This paper presents two new cases of patients who triggered airport security alarms after receiving 740MBq of (131)I for non-toxic goitre and attempts to compare surprisingly limited literature concerning this problem. A 57-year-old man triggered a security alarm at three different airports on the 17th, 28th, and 31st day after radioiodine exposure. Interestingly enough, in the meantime, on the 18th and 22nd day, no radiation was detected in him at the airport where he was twice detained as a source of radiation later on. The second case presents a 45-year-old woman who activated security alarm detectors while crossing a border on her coach trip 28 days after radioiodine administration.

  6. 75 FR 57829 - Airport Improvement Program (AIP): Policy Regarding Access to Airports From Residential Property

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-22

    ... Federal Aviation Administration Airport Improvement Program (AIP): Policy Regarding Access to Airports... Proposed Policy Regarding Access to Airports From Residential Property that was published in the Federal... and clarify FAA policy concerning through-the-fence access to a Federally obligated airport from...

  7. Airport Viz - a 3D Tool to Enhance Security Operations

    SciTech Connect

    Koch, Daniel B

    2006-01-01

    In the summer of 2000, the National Safe Skies Alliance (NSSA) awarded a project to the Applied Visualization Center (AVC) at the University of Tennessee, Knoxville (UTK) to develop a 3D computer tool to assist the Federal Aviation Administration security group, now the Transportation Security Administration (TSA), in evaluating new equipment and procedures to improve airport checkpoint security. A preliminary tool was demonstrated at the 2001 International Aviation Security Technology Symposium. Since then, the AVC went on to construct numerous detection equipment models as well as models of several airports. Airport Viz has been distributed by the NSSA to a number of airports around the country which are able to incorporate their own CAD models into the software due to its unique open architecture. It provides a checkpoint design and passenger flow simulation function, a layout design and simulation tool for checked baggage and cargo screening, and a means to assist in the vulnerability assessment of airport access points for pedestrians and vehicles.

  8. 49 CFR 1542.3 - Airport security coordinator.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Airport security coordinator. 1542.3 Section 1542.3 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY General § 1542.3...

  9. 49 CFR 1542.3 - Airport security coordinator.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Airport security coordinator. 1542.3 Section 1542.3 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY General § 1542.3...

  10. 49 CFR 1542.3 - Airport security coordinator.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Airport security coordinator. 1542.3 Section 1542.3 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY General § 1542.3...

  11. 49 CFR 1542.3 - Airport security coordinator.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Airport security coordinator. 1542.3 Section 1542.3 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY General § 1542.3...

  12. 49 CFR 1542.3 - Airport security coordinator.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Airport security coordinator. 1542.3 Section 1542.3 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY General § 1542.3...

  13. 49 CFR 1542.113 - Airport tenant security programs.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Airport tenant security programs. 1542.113 Section 1542.113 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY...

  14. 49 CFR 1542.113 - Airport tenant security programs.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Airport tenant security programs. 1542.113 Section 1542.113 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY...

  15. 77 FR 44515 - Airport Improvement Program (AIP): Policy Regarding Access to Airports From Residential Property

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-30

    ... Federal Aviation Administration 14 CFR Chapter I Airport Improvement Program (AIP): Policy Regarding Access to Airports From Residential Property AGENCY: Federal Aviation Administration (FAA), DOT. ACTION... policy, based on Federal law, concerning through-the-fence access to a federally obligated airport...

  16. 76 FR 15028 - Airport Improvement Program (AIP): Interim Policy Regarding Access to Airports From Residential...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-18

    ... Federal Aviation Administration Airport Improvement Program (AIP): Interim Policy Regarding Access to Airports From Residential Property AGENCY: Federal Aviation Administration (FAA). ACTION: Interim policy; amendment to sponsor grant assurance 5. SUMMARY: This action adopts an interim policy amending...

  17. Airport Security Act of 2013

    THOMAS, 113th Congress

    Rep. Johnson, Henry C. "Hank," Jr. [D-GA-4

    2013-11-14

    01/09/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  18. Airport Ground Access Planning Guide.

    DTIC Science & Technology

    1980-07-01

    herein solely because they are con- sidered essential to the object of this report. 4! I Technical Report Documentation Pago 1 0. o . n m n c c s i . 3...INFORMATION SERVICE. SPRINGFIELD. VIRGINIA 22161 19. Security Clossif. (of this report) 20. Security Cleesil. (of this pagoe ) 21. Ne. of Peg 22. Pri te...passenger totals, and the sheer number of employees contributes heavily to surface con- gestion in terminal areas. For example, some 6,000 vehicles can be

  19. 14 CFR 153.5 - Aviation safety inspector airport access.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 3 2014-01-01 2014-01-01 false Aviation safety inspector airport access. 153.5 Section 153.5 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT OPERATIONS Aviation Safety Inspector Access § 153.5 Aviation...

  20. 14 CFR 153.5 - Aviation safety inspector airport access.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Aviation safety inspector airport access. 153.5 Section 153.5 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT OPERATIONS Aviation Safety Inspector Access § 153.5 Aviation...

  1. 14 CFR 153.5 - Aviation safety inspector airport access.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Aviation safety inspector airport access. 153.5 Section 153.5 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT OPERATIONS Aviation Safety Inspector Access § 153.5 Aviation...

  2. 14 CFR 153.5 - Aviation safety inspector airport access.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 3 2013-01-01 2013-01-01 false Aviation safety inspector airport access. 153.5 Section 153.5 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT OPERATIONS Aviation Safety Inspector Access § 153.5 Aviation...

  3. 14 CFR 153.5 - Aviation safety inspector airport access.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 3 2012-01-01 2012-01-01 false Aviation safety inspector airport access. 153.5 Section 153.5 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT OPERATIONS Aviation Safety Inspector Access § 153.5 Aviation...

  4. An Analysis of Federal Airport and Air Carrier Employee Access Control, Screening. and Training Regulations

    DTIC Science & Technology

    1998-03-01

    traveling public, air carriers, and persons employed by or conducting business at public airports. 14. SUBJECT TERMS Airport Security , Federal...26 4. Sterile Area 28 5. Exclusive Area 28 E. SECURITY ALERT LEVELS 29 F. AIRPORT SECURITY TOOLS 30 1. Electronic Detection System 31 a... Security Coordinator ASP Airport Security Program BIS Biometrie Identification System CCTV Closed Circuit Television CJIS Criminal Justice Information

  5. Detection of total knee prostheses at airport security checkpoints.

    PubMed

    Naziri, Qais; Johnson, Aaron J; Hooper, Hasan A; Sana, Said H; Mont, Michael A

    2012-06-01

    Airport security screening measures have changed substantially during the past decade, but few reports have examined how this affects patients who have undergone knee arthroplasties. The purpose of this study was to characterize the efficacy of airport metal detection of total knee prostheses, the delays faced, any inconvenience this may have caused, and the role of implant identification cards. Ninety-seven total knee arthroplasty recipients reported passing through an airport metal detector, with 70 triggering the alarm a mean of 3 times (range, 1-36). The presence of a single-knee prosthesis triggered airport security alarms more than 83% of the time and increased patient inconvenience. Patients should be informed about this chance and be prepared to present documentation of their prosthesis.

  6. AVIATION SECURITY: FAA’s Actions to Study Responsibilities and Funding for Airport Security and to Certify Screening Companies

    DTIC Science & Technology

    1999-02-01

    Actions to Study Responsibilities and Funding for Airport Security and to Certify Screening Companies DISTRIBUTION STATEMENT A Approved for...local law enforcement support relating to air carrier and airport security measures. The funding of the security operations is divided among FAA, the...generally agreed with the current division of airport security responsibilities. These officials stated that the continuity of screening would be

  7. 19 CFR Appendix A to Part 113 - Airport Customs Security Area Bond

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Airport Customs Security Area Bond A Appendix A to... OF THE TREASURY CUSTOMS BONDS Pt. 113, App. A Appendix A to Part 113—Airport Customs Security Area Bond Airport Customs Security Area Bond (name of principal) of and (name of surety) of are held...

  8. The systems approach to airport security: The FAA (Federal Aviation Administration)/BWI (Baltimore-Washington International) Airport demonstration project

    SciTech Connect

    Caskey, D.L.; Olascoaga, M.T.

    1990-01-01

    Sandia National Laboratories has been involved in designing, installing and evaluating security systems for various applications during the past 15 years. A systems approach to security that evolved from this experience was applied to aviation security for the Federal Aviation Administration. A general systems study of aviation security in the United States was concluded in 1987. One result of the study was a recommendation that an enhanced security system concept designed to meet specified objectives be demonstrated at an operational airport. Baltimore-Washington International Airport was selected as the site for the demonstration project which began in 1988 and will be completed in 1992. This article introduced the systems approach to airport security and discussed its application at Baltimore-Washington International Airport. Examples of design features that could be included in an enhanced security concept also were presented, including details of the proposed Ramps Area Intrusion Detection System (RAIDS).

  9. What Practices in Airport Security Should the United States Implement at Commercial Airports in Light of the Events of September 11, 2001?

    DTIC Science & Technology

    2002-06-01

    NAVAL POSTGRADUATE SCHOOL Monterey, California THESIS WHAT PRACTICES IN AIRPORT SECURITY SHOULD THE UNITED STATES IMPLEMENT AT...COVERED Master’s Thesis 4. TITLE AND SUBTITLE What Practices in Airport Security Should the United States Implement at Commercial...complacency and conflicts of interest. 14. SUBJECT TERMS Airport Security , Aviation Security Systems, Terrorism, Hijacking

  10. CAS. Controlled Access Security

    SciTech Connect

    Martinez, B.; Pomeroy, G.

    1989-12-01

    The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.

  11. EPICS: Channel Access security design

    SciTech Connect

    Kraimer, M.; Hill, J.

    1994-05-01

    This document presents the design for implementing the requirements specified in: EPICS -- Channel Access Security -- functional requirements, Ned. D. Arnold, 03/09/92. Use of the access security system is described along with a summary of the functional requirements. The programmer`s interface is given. Security protocol is described and finally aids for reading the access security code are provided.

  12. 33 CFR 165.1192 - Security Zones; Waters surrounding San Francisco International Airport and Oakland International...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Waters surrounding San Francisco International Airport and Oakland International Airport, San Francisco Bay... Security Zones; Waters surrounding San Francisco International Airport and Oakland International...

  13. 33 CFR 165.1192 - Security Zones; Waters surrounding San Francisco International Airport and Oakland International...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Security Zones; Waters surrounding San Francisco International Airport and Oakland International Airport, San Francisco Bay... Security Zones; Waters surrounding San Francisco International Airport and Oakland International...

  14. 33 CFR 165.1192 - Security Zones; Waters surrounding San Francisco International Airport and Oakland International...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Security Zones; Waters surrounding San Francisco International Airport and Oakland International Airport, San Francisco Bay... Security Zones; Waters surrounding San Francisco International Airport and Oakland International...

  15. 33 CFR 165.1192 - Security Zones; Waters surrounding San Francisco International Airport and Oakland International...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Security Zones; Waters surrounding San Francisco International Airport and Oakland International Airport, San Francisco Bay... Security Zones; Waters surrounding San Francisco International Airport and Oakland International...

  16. 33 CFR 165.1192 - Security Zones; Waters surrounding San Francisco International Airport and Oakland International...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Security Zones; Waters surrounding San Francisco International Airport and Oakland International Airport, San Francisco Bay... Security Zones; Waters surrounding San Francisco International Airport and Oakland International...

  17. Gerardo Hernandez Airport Security Act of 2014

    THOMAS, 113th Congress

    Rep. Hudson, Richard [R-NC-8

    2014-06-05

    07/23/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  18. 19 CFR Appendix A to Part 113 - Airport Customs Security Area Bond

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Airport Customs Security Area Bond A Appendix A to Part 113 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS BONDS Pt. 113, App. A Appendix A to Part 113—Airport Customs Security...

  19. Detection of Total Knee Arthroplasties at Airport Security Checkpoints: How Do Updated Security Measures Affect Patients?

    PubMed

    Issa, Kimona; Pierce, Todd P; Gwam, Chukwuweieke; Goljan, Peter; Festa, Anthony; Scillia, Anthony J; Mont, Michael A

    2016-10-24

    Airport security measures continue to be updated with the incorporation of the new body scanners and automatic target recognition software. The purpose of this study was analyze the incidence of: (1) triggering the security alarm; (2) extra security searches; (3) perceived inconvenience; and (4) presence of other surgical hardware in those who underwent total knee arthroplasty (TKA) and passed through airport security. A questionnaire was given to 125 consecutive patients with a TKA. Those who passed through airport security after January 2014 were considered for inclusion. A questionnaire was administered that addressed the number of encounters with airport security, metal detector activation, additional screening procedures, and perceived inconvenience. Out of the 125 patients, 53 met inclusion criteria. Out of the 53 patients, 20 (38%) reported that their prosthesis triggered a metal detector. Out of the 20 patients, 8 (40%) who reported triggering of metal detectors also reported the presence of surgical hardware elsewhere in the body. Eighteen of the 53 patients (34%) believed having a TKA was inconvenient for airplane travel. Compared with the historical cohort, alarms were triggered in 70 of 97 patients (p = 0.0001) and 50 of 97 reported inconvenience when traveling (n = 50 of 97 patients; p = 0.04). The incidences of those who underwent TKA triggering alarms and perceiving inconvenience when passing through airport security have decreased from previously published studies. This is most likely due to the recent updates and modifications to screening. As these security measures are modified and implant designs continue to evolve, this is an area of investigation that should continue.

  20. Los Alamos Shows Airport Security Technology at Work

    ScienceCinema

    Espy, Michelle; Schultz, Larry; Hunter, James

    2016-07-12

    Los Alamos scientists have advanced a Magnetic Resonance Imaging (MRI) technology that may provide a breakthrough for screening liquids at airport security. They've added low-power X-ray data to the mix, and as a result have unlocked a new detection technology. Funded in part by the Department of Homeland Security's Science and Technology Directorate, the new system is named MagRay. The goal is to quickly and accurately distinguish between liquids that visually appear identical. For example, what appears to be a bottle of white wine could potentially be nitromethane, a liquid that could be used to make an explosive. Both are clear liquids, one would be perfectly safe on a commercial aircraft, the other would be strictly prohibited. How to tell them apart quickly without error at an airport security area is the focus of Michelle Espy, Larry Schultz and their team. In this video, Espy and the MagRay team explain how the new technology works, how they've developed an easy operator interface, and what the next steps might be in transitioning this technology to the private sector.

  1. Los Alamos Shows Airport Security Technology at Work

    SciTech Connect

    Espy, Michelle; Schultz, Larry; Hunter, James

    2013-11-25

    Los Alamos scientists have advanced a Magnetic Resonance Imaging (MRI) technology that may provide a breakthrough for screening liquids at airport security. They've added low-power X-ray data to the mix, and as a result have unlocked a new detection technology. Funded in part by the Department of Homeland Security's Science and Technology Directorate, the new system is named MagRay. The goal is to quickly and accurately distinguish between liquids that visually appear identical. For example, what appears to be a bottle of white wine could potentially be nitromethane, a liquid that could be used to make an explosive. Both are clear liquids, one would be perfectly safe on a commercial aircraft, the other would be strictly prohibited. How to tell them apart quickly without error at an airport security area is the focus of Michelle Espy, Larry Schultz and their team. In this video, Espy and the MagRay team explain how the new technology works, how they've developed an easy operator interface, and what the next steps might be in transitioning this technology to the private sector.

  2. Measuring Security Effectiveness and Efficiency at U.S. Commercial Airports

    DTIC Science & Technology

    2013-03-01

    formative program evaluation and policy analysis to investigate current airport security programs. It identifies innovative public administration and...policy-analysis tools that could provide potential benefits to airport security . These tools will complement the System Based Risk Management framework if

  3. 14 CFR 382.51 - What requirements must carriers meet concerning the accessibility of airport facilities?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false What requirements must carriers meet concerning the accessibility of airport facilities? 382.51 Section 382.51 Aeronautics and Space OFFICE OF THE... BASIS OF DISABILITY IN AIR TRAVEL Accessibility of Airport Facilities § 382.51 What requirements...

  4. 75 FR 54946 - Airport Improvement Program (AIP): Policy Regarding Access to Airports From Residential Property

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-09

    ..., such as the proximity of children and pets, to normal airport operations. In addition, not all..., and resistance to the sponsor's accommodation of those changes. At airports where the nearby residents... accommodation of new aircraft types. While the FAA supports these mitigation measures where available,...

  5. Agency Problems and Airport Security: Quantitative and Qualitative Evidence on the Impact of Security Training.

    PubMed

    de Gramatica, Martina; Massacci, Fabio; Shim, Woohyun; Turhan, Uğur; Williams, Julian

    2017-02-01

    We analyze the issue of agency costs in aviation security by combining results from a quantitative economic model with a qualitative study based on semi-structured interviews. Our model extends previous principal-agent models by combining the traditional fixed and varying monetary responses to physical and cognitive effort with nonmonetary welfare and potentially transferable value of employees' own human capital. To provide empirical evidence for the tradeoffs identified in the quantitative model, we have undertaken an extensive interview process with regulators, airport managers, security personnel, and those tasked with training security personnel from an airport operating in a relatively high-risk state, Turkey. Our results indicate that the effectiveness of additional training depends on the mix of "transferable skills" and "emotional" buy-in of the security agents. Principals need to identify on which side of a critical tipping point their agents are to ensure that additional training, with attached expectations of the burden of work, aligns the incentives of employees with the principals' own objectives.

  6. Interacting forms of expertise in security governance: the example of CCTV surveillance at Geneva International Airport.

    PubMed

    Klauser, Francisco

    2009-06-01

    The paper investigates the multiple public-private exchanges and cooperation involved in the installation and development of CCTV surveillance at Geneva International Airport. Emphasis is placed on the interacting forms of authority and expertise of five parties: the user(s), owner and supplier of the camera system, as well as the technical managers of the airport and the Swiss regulatory bodies in airport security. While placing the issues of airport surveillance in the particular context of a specific range of projects and transformations relating to the developments of CCTV at Geneva Airport, the paper not only provides important insights into the micro-politics of surveillance at Geneva Airport, but aims to re-institute these as part of a broader 'problematic': the mediating role of expertise and the growing functional fragmentation of authority in contemporary security governance. On this basis, the paper also exemplifies the growing mutual interdependences between security and business interests in the ever growing 'surveillant assemblage' in contemporary security governance.

  7. Computer access security code system

    NASA Technical Reports Server (NTRS)

    Collins, Earl R., Jr. (Inventor)

    1990-01-01

    A security code system for controlling access to computer and computer-controlled entry situations comprises a plurality of subsets of alpha-numeric characters disposed in random order in matrices of at least two dimensions forming theoretical rectangles, cubes, etc., such that when access is desired, at least one pair of previously unused character subsets not found in the same row or column of the matrix is chosen at random and transmitted by the computer. The proper response to gain access is transmittal of subsets which complete the rectangle, and/or a parallelepiped whose opposite corners were defined by first groups of code. Once used, subsets are not used again to absolutely defeat unauthorized access by eavesdropping, and the like.

  8. On determining specifications and selections of alternative technologies for airport checked-baggage security screening.

    PubMed

    Feng, Qianmei

    2007-10-01

    Federal law mandates that every checked bag at all commercial airports be screened by explosive detection systems (EDS), explosive trace detection systems (ETD), or alternative technologies. These technologies serve as critical components of airport security systems that strive to reduce security risks at both national and global levels. To improve the operational efficiency and airport security, emerging image-based technologies have been developed, such as dual-energy X-ray (DX), backscatter X-ray (BX), and multiview tomography (MVT). These technologies differ widely in purchasing cost, maintenance cost, operating cost, processing rate, and accuracy. Based on a mathematical framework that takes into account all these factors, this article investigates two critical issues for operating screening devices: setting specifications for continuous security responses by different technologies; and selecting technology or combination of technologies for efficient 100% baggage screening. For continuous security responses, specifications or thresholds are used for classifying threat items from nonthreat items. By investigating the setting of specifications on system security responses, this article assesses the risk and cost effectiveness of various technologies for both single-device and two-device systems. The findings provide the best selection of image-based technologies for both single-device and two-device systems. Our study suggests that two-device systems outperform single-device systems in terms of both cost effectiveness and accuracy. The model can be readily extended to evaluate risk and cost effectiveness of multiple-device systems for airport checked-baggage security screening.

  9. An RFID-based luggage and passenger tracking system for airport security control applications

    NASA Astrophysics Data System (ADS)

    Vastianos, George E.; Kyriazanos, Dimitris M.; Kountouriotis, Vassilios I.; Thomopoulos, Stelios C. A.

    2014-06-01

    Market analysis studies of recent years have shown a steady and significant increase in the usage of RFID technology. Key factors for this growth were the decreased costs of passive RFIDs and their improved performance compared to the other identification technologies. Besides the benefits of RFID technologies into the supply chains, warehousing, traditional inventory and asset management applications, RFID has proven itself worth exploiting on experimental, as well as on commercial level in other sectors, such as healthcare, transport and security. In security sector, airport security is one of the biggest challenges. Airports are extremely busy public places and thus prime targets for terrorism, with aircraft, passengers, crew and airport infrastructure all subject to terrorist attacks. Inside this labyrinth of security challenges, the long range detection capability of the UHF passive RFID technology can be turned into a very important tracking tool that may outperform all the limitations of the barcode tracking inside the current airport security control chain. The Integrated Systems Lab of NCSR Demokritos has developed an RFID based Luggage and Passenger tracking system within the TASS (FP7-SEC-2010-241905) EU research project. This paper describes application scenarios of the system categorized according to the structured nature of the environment, the system architecture and presents evaluation results extracted from measurements with a group of different massive production GEN2 UHF RFID tags that are widely available in the world market.

  10. Securing America's access to space

    SciTech Connect

    Rendine, M.; Wood, L.

    1990-05-23

    We review pertinent aspects of the history of the space launch capabilities of the United States and survey its present status and near-term outlook. Steps which must be taken, pitfalls which much be avoided, and a core set of National options for re-acquiring in the near term the capability to access the space environment with large payloads are discussed. We devote considerable attention to the prospect of creating an interim heavy-lift space launch vehicle of at least 100,000 pound payload-orbiting capacity to serve National needs during the next dozen years, suggesting that such a capability can be demonstrated within 5 years for less than $1 B. Such capability will apparently be essential for meeting the first-phase goals of the President's Space Exploration Initiative. Some other high-leverage aspects of securing American access to space are also noted briefly, emphasizing unconventional technological approaches of presently high promise.

  11. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a)...

  12. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a)...

  13. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a)...

  14. Securing the Aviation Transportation System

    DTIC Science & Technology

    2007-12-01

    accessed 27 May 2007) 13 Robert W. Poole, Jr., “ Airport Security : Time for a New Model,” Reason Foundation online article, January 2006, Available from...15 Robert W. Poole, Jr., “ Airport Security : Time for a New Model,” Reason Foundation online article, January 2006...commercial jetliners. 24 Peter St. John, Air Piracy, Airport Security , and International Terrorism

  15. Radiation and Airport Security Scanning | RadTown USA | US ...

    EPA Pesticide Factsheets

    2016-05-16

    To help keep travelers safe, airports may use different kinds of screening equipment such as backscatter x-ray machines, cabinet x-ray machines, millimeter wave machines and metal detectors. People may be screened with backscatter x-ray machines. They use very low levels of ionizing radiation. They may be screened with millimeter wave scanners. They use radiofrequency (non-ionizing) radiation. Metal detectors use no radiation. Luggage is screened with cabinet x-ray machines. No radiation leaves the machine.

  16. Sensor fusion-based security concept on airports with a rotating millimetre wave person scanner

    NASA Astrophysics Data System (ADS)

    Hantscher, Sebastian; Lang, Stefan; Hägelen, Manfred; Essen, Helmut; Tessmann, Axel

    2010-10-01

    This paper gives an overview about a new security concept on airports. Because single systems have not often the desired reliability, the concept is based on the fusion of different sensors. Moreover, first measurements of a 94 GHz person scanner with circular synthetic aperture are presented showing the capability to detect metallic as well as nonmetallic objects without violating the personal privacy.

  17. Authoritarianism among border police officers, career soldiers, and airport security guards at the Israeli border.

    PubMed

    Rubinstein, Gidi

    2006-12-01

    Several personality theories focusing on specific personality variables involved in career choice and job satisfaction are based on the assumption that individuals choose certain career choices because they believe that they may be able to meet their emotional needs (J. L. Holland, 1977). The author of this study investigated the personality traits of border police officers, career soldiers, and airport security guards in Israel. The participants were 160 men--40 border policemen, 40 career soldiers, 40 airport security guards, and 40 control participants--who filled out a demographic questionnaire and a Hebrew version of the right-wing authoritarianism (RWA) shortened scale (B. Altemeyer, personal communication, February 2000). The present hypothesis predicted that the RWA scores of border police officers would be the highest, followed by those of career soldiers, airport security guards, and control participants, in that order. Statistically significant differences in RWA scores occurred between these groups in the predicted order, with the exception of the career soldiers' RWA scores, which did not significantly differ from those of the airport security guards.

  18. 14 CFR 382.51 - What requirements must carriers meet concerning the accessibility of airport facilities?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 4 2013-01-01 2013-01-01 false What requirements must carriers meet concerning the accessibility of airport facilities? 382.51 Section 382.51 Aeronautics and Space OFFICE OF THE..., including, but not limited to, moving sidewalks, shuttle vehicles and people movers, comply with...

  19. 14 CFR 382.51 - What requirements must carriers meet concerning the accessibility of airport facilities?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 4 2012-01-01 2012-01-01 false What requirements must carriers meet concerning the accessibility of airport facilities? 382.51 Section 382.51 Aeronautics and Space OFFICE OF THE..., including, but not limited to, moving sidewalks, shuttle vehicles and people movers, comply with...

  20. 14 CFR 382.51 - What requirements must carriers meet concerning the accessibility of airport facilities?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 4 2011-01-01 2011-01-01 false What requirements must carriers meet concerning the accessibility of airport facilities? 382.51 Section 382.51 Aeronautics and Space OFFICE OF THE..., including, but not limited to, moving sidewalks, shuttle vehicles and people movers, comply with...

  1. 14 CFR 382.51 - What requirements must carriers meet concerning the accessibility of airport facilities?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 4 2014-01-01 2014-01-01 false What requirements must carriers meet concerning the accessibility of airport facilities? 382.51 Section 382.51 Aeronautics and Space OFFICE OF THE..., including, but not limited to, moving sidewalks, shuttle vehicles and people movers, comply with...

  2. 49 CFR 1542.113 - Airport tenant security programs.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... security program as follows: (1) The tenant must assume responsibility for specified security measures of... not assume responsibility for law enforcement support under § 1542.215. (3) The tenant must assume the responsibility within the tenant's leased areas or areas designated for the tenant's exclusive use. A tenant...

  3. 49 CFR 1542.113 - Airport tenant security programs.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... security program as follows: (1) The tenant must assume responsibility for specified security measures of... not assume responsibility for law enforcement support under § 1542.215. (3) The tenant must assume the responsibility within the tenant's leased areas or areas designated for the tenant's exclusive use. A tenant...

  4. 49 CFR 1542.113 - Airport tenant security programs.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... security program as follows: (1) The tenant must assume responsibility for specified security measures of... not assume responsibility for law enforcement support under § 1542.215. (3) The tenant must assume the responsibility within the tenant's leased areas or areas designated for the tenant's exclusive use. A tenant...

  5. 78 FR 42419 - Airport Improvement Program (AIP): Policy Regarding Access to Airports From Residential Property

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-16

    ... interpretations regarding self-fueling and aeronautical commercial activities, but offered a series of... FAA believes this is appropriate. The FAA's acceptance of a new residential through-the-fence access... (NATA) offered comments which generally concurred with FAA's interpretation of section 136 of Public...

  6. FlySec: a risk-based airport security management system based on security as a service concept

    NASA Astrophysics Data System (ADS)

    Kyriazanos, Dimitris M.; Segou, Olga E.; Zalonis, Andreas; Thomopoulos, Stelios C. A.

    2016-05-01

    Complementing the ACI/IATA efforts, the FLYSEC European H2020 Research and Innovation project (http://www.fly-sec.eu/) aims to develop and demonstrate an innovative, integrated and end-to-end airport security process for passengers, enabling a guided and streamlined procedure from the landside to airside and into the boarding gates, and offering for an operationally validated innovative concept for end-to-end aviation security. FLYSEC ambition turns through a well-structured work plan into: (i) innovative processes facilitating risk-based screening; (ii) deployment and integration of new technologies and repurposing existing solutions towards a risk-based Security paradigm shift; (iii) improvement of passenger facilitation and customer service, bringing security as a real service in the airport of tomorrow;(iv) achievement of measurable throughput improvement and a whole new level of Quality of Service; and (v) validation of the results through advanced "in-vitro" simulation and "in-vivo" pilots. On the technical side, FLYSEC achieves its ambitious goals by integrating new technologies on video surveillance, intelligent remote image processing and biometrics combined with big data analysis, open-source intelligence and crowdsourcing. Repurposing existing technologies is also in the FLYSEC objectives, such as mobile application technologies for improved passenger experience and positive boarding applications (i.e. services to facilitate boarding and landside/airside way finding) as well as RFID for carry-on luggage tracking and quick unattended luggage handling. In this paper, the authors will describe the risk based airport security management system which powers FLYSEC intelligence and serves as the backend on top of which FLYSEC's front end technologies reside for security services management, behaviour and risk analysis.

  7. From sniffer dogs to emerging sniffer devices for airport security: an opportunity to rethink privacy implications?

    PubMed

    Bonfanti, Matteo E

    2014-09-01

    Dogs are known for their incredible ability to detect odours, extracting them from a "complex" environment and recognising them. This makes sniffer dogs precious assets in a broad variety of security applications. However, their use is subject to some intrinsic restrictions. Dogs can only be trained to a limited set of applications, get tired after a relatively short period, and thus require a high turnover. This has sparked a drive over the past decade to develop artificial sniffer devices-generally known as "chemical sniffers" or "electronic noses"-able to complement and possibly replace dogs for some security applications. Such devices have been already deployed, or are intended to be deployed, at borders, airports and other critical installation security checkpoints. Similarly to dogs, they are adopted for detecting residual traces that indicate either the presence of, or recent contact with, substances like drugs and explosives. It goes without saying that, as with sniffer dogs, the use of artificial sniffer devices raises many sensitive issues. Adopting an ethical and legal perspective, the present paper discusses the privacy and data protection implications of the possible deployment of a hand-held body scanning sniffer for screening passengers at EU airport security checkpoints.

  8. Effect of total shoulder replacements on airport security screening in the post-9/11 era.

    PubMed

    Dines, Joshua S; Elkousy, Hussein; Edwards, T Bradley; Gartsman, Gary M; Dines, David M

    2007-01-01

    There are few reports in the literature on the effect of orthopaedic implants on airport security devices and none on shoulder arthroplasty implants after September 11, 2001. Since 9/11, airport security screening devices have become more sensitive in response to the increasing threat of terrorism. Often, patients with joint implants activate the metal detectors and are subsequently subjected to more intensive screening. We assess the effects of shoulder joint implants on different airport security devices and what effect the results had on passenger travel. In this study, 154 patients who had previously undergone shoulder replacement responded to a questionnaire regarding their travel experiences after 9/11. Of these, 85 had flown during the time period studied (47 men and 38 women; mean age, 67.8 years); 79 had traveled domestically (mean, 7 flights), and 22 had taken international flights (mean, 6.1 flights). The questionnaire addressed each patient's height/weight, the number of flight segments flown (domestic and international), the number of times that a patient activated the doorway alarm/wand alarm, and the effect of a card stating that the patient had joint replacement (when applicable). On average, patients with shoulder replacement traveling domestically activated the security gate 52% of the time. The average for international travel was 42%. Of the patients who flew both domestically and internationally, there was a high correlation of activation (R = 0.54). Twenty-six patients had multiple joint implants (mean, 2.8). Multiple joint implants caused increased alarm activation (P < .001). All patients reported that their travel was delayed during the instances of security activation. There was no statistically significant effect of body mass index, height, weight, age, or sex on security device activation. Of the patients, 71% were told by their doctor that the shoulder replacement may activate security devices. Of these, 46 were given a card by their

  9. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.265 Security... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for access... security measures to: (1) Deter the unauthorized introduction of dangerous substances and...

  10. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.265 Security... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Security measures for access... security measures to: (1) Deter the unauthorized introduction of dangerous substances and...

  11. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.265 Security... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Security measures for access... security measures to: (1) Deter the unauthorized introduction of dangerous substances and...

  12. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.255 Security... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for access... security measures to: (1) Deter the unauthorized introduction of dangerous substances and...

  13. A voice password system for access security

    SciTech Connect

    Birnbaum, M.; Cohen, L.A.; Welsh, F.X.

    1986-09-01

    A voice password system for access security using speaker verification technology has been designed for use over dial-up telephone lines. The voice password system (VPS) can provide secure access to telephone networks, computers, rooms, and buildings. It also has application in office automation systems, electric funds transfer, and ''smart cards'' (interactive computers embedded in credit-card-sized packages). As increasing attention is focused on access security in the public, private, and government sectors, the voice password system can provide a timely solution to the security dilemma. The VPS uses modes of communication available to almost everyone (the human voice and the telephone). A user calls the VPS, enters his or her identification number (ID) by touch-tone telephone, and then speaks a password. This is usually a phrase or a sentence of about seven syllables. On initial calls, the VPS creates a model of the user's voice, called a reference template, and labels it with the caller's unique user ID. To gain access later, the user calls the system, enters the proper user ID, and speaks the password phrase. The VPS compares the user's stored reference template with the spoken password and produces a distance score.

  14. AVIATION SECURITY: Terrorist Acts Demonstrate Urgent Need to Improve Security at the Nation’s Airports

    DTIC Science & Technology

    2007-11-02

    what actually occurred or what all the weaknesses in the nation’s aviation security apparatus are that contributed to the horrendous events of last week...it is clear that serious weaknesses exist in our aviation security system and that their impact can be far more devastating than previously imagined...offer some observations about improving aviation security in these various areas.

  15. Airport technology international 1993

    NASA Astrophysics Data System (ADS)

    Papagiorcopulo, George

    The present survey of developments in airport technologies and their management discusses airport extensions and upgradings, airport developments in China, polluter penalization, airport effects on environments, European ground-handling methods, ATC in Europe, EC duty-free sales at airports, and the privatization of airport security. Also discussed are airport advertising, new alternatives in air-cargo handling, ATC training, taxi-guidance systems, and the reduction of fuel consumption and emissions on the ground. (No individual items are abstracted in this volume)

  16. Aviation Security: Weaknesses in Airport Security and Options for Assigning Screening Responsibilities

    DTIC Science & Technology

    2007-11-02

    actually occurred or which of the weaknesses in the nations aviation security apparatus contributed to the horrendous events of last week, it is...clear that serious weaknesses exist in our aviation security system and that their impact can be far more devastating than previously imagined.

  17. Airport Remote Tower Sensor Systems

    NASA Technical Reports Server (NTRS)

    Maluf, David A.; Gawdiak, Yuri; Leidichj, Christopher; Papasin, Richard; Tran, Peter B.; Bass, Kevin

    2006-01-01

    Networks of video cameras, meteorological sensors, and ancillary electronic equipment are under development in collaboration among NASA Ames Research Center, the Federal Aviation Administration (FAA), and the National Oceanic Atmospheric Administration (NOAA). These networks are to be established at and near airports to provide real-time information on local weather conditions that affect aircraft approaches and landings. The prototype network is an airport-approach-zone camera system (AAZCS), which has been deployed at San Francisco International Airport (SFO) and San Carlos Airport (SQL). The AAZCS includes remotely controlled color video cameras located on top of SFO and SQL air-traffic control towers. The cameras are controlled by the NOAA Center Weather Service Unit located at the Oakland Air Route Traffic Control Center and are accessible via a secure Web site. The AAZCS cameras can be zoomed and can be panned and tilted to cover a field of view 220 wide. The NOAA observer can see the sky condition as it is changing, thereby making possible a real-time evaluation of the conditions along the approach zones of SFO and SQL. The next-generation network, denoted a remote tower sensor system (RTSS), will soon be deployed at the Half Moon Bay Airport and a version of it will eventually be deployed at Los Angeles International Airport. In addition to remote control of video cameras via secure Web links, the RTSS offers realtime weather observations, remote sensing, portability, and a capability for deployment at remote and uninhabited sites. The RTSS can be used at airports that lack control towers, as well as at major airport hubs, to provide synthetic augmentation of vision for both local and remote operations under what would otherwise be conditions of low or even zero visibility.

  18. 14 CFR 1203a.103 - Access to security areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Access to security areas. 1203a.103 Section 1203a.103 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION NASA SECURITY AREAS § 1203a.103 Access to security areas. (a) Only those NASA employees, NASA contractor employees,...

  19. 14 CFR 1203a.103 - Access to security areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false Access to security areas. 1203a.103 Section 1203a.103 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION NASA SECURITY AREAS § 1203a.103 Access to security areas. (a) Only those NASA employees, NASA contractor employees,...

  20. 14 CFR § 1203a.103 - Access to security areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false Access to security areas. § 1203a.103 Section § 1203a.103 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION NASA SECURITY AREAS § 1203a.103 Access to security areas. (a) Only those NASA employees, NASA contractor...

  1. 14 CFR 1203a.103 - Access to security areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Access to security areas. 1203a.103 Section 1203a.103 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION NASA SECURITY AREAS § 1203a.103 Access to security areas. (a) Only those NASA employees, NASA contractor employees,...

  2. 14 CFR 1203a.103 - Access to security areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 5 2012-01-01 2012-01-01 false Access to security areas. 1203a.103 Section 1203a.103 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION NASA SECURITY AREAS § 1203a.103 Access to security areas. (a) Only those NASA employees, NASA contractor employees,...

  3. Privacy, security and access with sensitive health information.

    PubMed

    Croll, Peter

    2010-01-01

    This chapter gives an educational overview of: * Confidentiality issues and the challenges faced; * The fundamental differences between privacy and security; * The different access control mechanisms; * The challenges of Internet security; * How 'safety and quality' relate to all the above.

  4. Identity and Access Management and Security in Higher Education.

    ERIC Educational Resources Information Center

    Bruhn, Mark; Gettes, Michael; West, Ann

    2003-01-01

    Discusses the drivers for an identity management system (IdM), components of this system, and its role within a school security strategy, focusing on: basic access management; requirements for access management; middleware support for an access management system; IdM implementation considerations (e.g., access eligibilities, authentication…

  5. Emotional Exhaustion and Job Satisfaction in Airport Security Officers - Work-Family Conflict as Mediator in the Job Demands-Resources Model.

    PubMed

    Baeriswyl, Sophie; Krause, Andreas; Schwaninger, Adrian

    2016-01-01

    The growing threat of terrorism has increased the importance of aviation security and the work of airport security officers (screeners). Nonetheless, airport security research has yet to focus on emotional exhaustion and job satisfaction as major determinants of screeners' job performance. The present study bridges this research gap by applying the job demands-resources (JD-R) model and using work-family conflict (WFC) as an intervening variable to study relationships between work characteristics (workload and supervisor support), emotional exhaustion, and job satisfaction in 1,127 screeners at a European airport. Results of structural equation modeling revealed that (a) supervisor support as a major job resource predicted job satisfaction among screeners; (b) workload as a major job demand predicted their emotional exhaustion; and (c) WFC proved to be a promising extension to the JD-R model that partially mediated the impact of supervisor support and workload on job satisfaction and emotional exhaustion. Theoretical and practical implications are discussed.

  6. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Access to restricted data and national security... Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a) Access to restricted data and national security...

  7. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Access to restricted data and national security... Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a) Access to restricted data and national security...

  8. 14 CFR 382.57 - What accessibility requirements apply to automated airport kiosks?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... TRANSPORTATION (AVIATION PROCEEDINGS) SPECIAL REGULATIONS NONDISCRIMINATION ON THE BASIS OF DISABILITY IN AIR... provided in a location at the airport perform more than one function (e.g., print boarding passes/bag tags... than one function (e.g., print boarding passes/bag tags, accept payment for flight amenities such...

  9. Modeling mandatory access control in role-based security systems

    SciTech Connect

    Nyanchama, M.; Osborn, S.

    1996-12-31

    This paper discusses the realization of mandatory access control in role-based protection systems. Starting from the basic definitions of roles, their application in security and the basics of the concept of mandatory access control, we develop a scheme of role-based protection that realizes mandatory access control. The basis of this formulation develops from the recognition that roles can be seen as facilitating access to some given information context. By handling each of the role contexts as independent security levels of information, we simulate mandatory access by imposing the requirements of mandatory access control. Among the key considerations, we propose a means of taming Trojan horses by imposing acyclic information flow among contexts in role-based protection systems. The acyclic information flows and suitable access rules incorporate secrecy which is an essential component of mandatory access control.

  10. A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data.

    PubMed

    Gope, Prosanta; Amin, Ruhul

    2016-11-01

    Electronic Patient Health Record (EPHR) systems may facilitate a patient not only to share his/her health records securely with healthcare professional but also to control his/her health privacy, in a convenient and easy way even in case of emergency. In order to fulfill these requirements, it is greatly desirable to have the access control mechanism which can efficiently handle every circumstance without negotiating security. However, the existing access control mechanisms used in healthcare to regulate and restrict the disclosure of patient data are often bypassed in case of emergencies. In this article, we propose a way to securely share EPHR data under any situation including break-the-glass (BtG) without compromising its security. In this regard, we design a reference security model, which consists of a multi-level data flow hierarchy, and an efficient access control framework based on the conventional Role-Based Access Control (RBAC) and Mandatory Access Control (MAC) policies.

  11. A Delicate Balance: National Security vs. Public Access

    DTIC Science & Technology

    2005-03-01

    AVAILABILITY STATEMENT Approved for Public Release; Distribution Unlimited 13. SUPPLEMENTARY NOTES: Published in Computers in Libraries , Vol.25 No. 3...security; in January 2004, is a how-to guide on gathering useful <, MARCH 2005 17 I COMPUTERS IN LIBRARIES feature: national security vs. public access

  12. The Battle to Secure Our Public Access Computers

    ERIC Educational Resources Information Center

    Sendze, Monique

    2006-01-01

    Securing public access workstations should be a significant part of any library's network and information-security strategy because of the sensitive information patrons enter on these workstations. As the IT manager for the Johnson County Library in Kansas City, Kan., this author is challenged to make sure that thousands of patrons get the access…

  13. A secure network access system for mobile IPv6

    NASA Astrophysics Data System (ADS)

    Zhang, Hong; Yuan, Man; He, Rui; Jiang, Luliang; Ma, Jian; Qian, Hualin

    2004-03-01

    With the fast development of Internet and wireless and mobile communication technology, the Mobile Internet Age is upcoming. For those providing Mobile Internet services, especially from the view of ISP (Internet Service Provider), current mobile IP protocol is insufficient. Since the Mobile IPv6 protocol will be popular in near future, how to provide a secure mobile IPv6 service is important. A secure mobile IPv6 network access system is highly needed for mobile IPv6 deployment. Current methods and systems are still inadequate, including EAP, PANA, 802.1X, RADIUS, Diameter, etc. In this paper, we describe main security goals for a secure mobile IPv6 access system, and propose a secure network access system to achieve them. This access system consists of access router, attendant and authentication servers. The access procedure is divided into three phases, which are initial phase, authentication and registration phase and termination phase. This system has many advantages, including layer two independent, flexible and extensible, no need to modify current IPv6 address autoconfiguration protocols, binding update optimization, etc. Finally, the security of the protocol in this system is analyzed and proved with Extended BAN logic method, and a brief introduction of system implementation is given.

  14. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...) All persons seeking unescorted access to secure areas must present their TWIC for inspection before being allowed unescorted access, in accordance with § 101.514 of this subchapter. Inspection must... screening or inspection; and (ii) Failure to consent or submit to screening or inspection will result...

  15. Small accessible quantum information does not imply security.

    PubMed

    König, Robert; Renner, Renato; Bariska, Andor; Maurer, Ueli

    2007-04-06

    The security of quantum key distribution is typically defined in terms of the mutual information between the distributed key S and the outcome of an optimal measurement applied to the adversary's system. We show that even if this so-called accessible information is small, the key S might not be secure enough to be used in applications such as one-time pad encryption. This flaw is due to a locking property of the accessible information: one additional (physical) bit of information can increase the accessible information by more than one bit.

  16. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access...

  17. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access...

  18. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access...

  19. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access...

  20. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access...

  1. Secure Dynamic access control scheme of PHR in cloud computing.

    PubMed

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  2. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Access to restricted data and national security... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a)...

  3. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Access to restricted data and national security... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a)...

  4. Quantum secured gigabit optical access networks

    PubMed Central

    Fröhlich, Bernd; Dynes, James F.; Lucamarini, Marco; Sharpe, Andrew W.; Tam, Simon W.-B.; Yuan, Zhiliang; Shields, Andrew J.

    2015-01-01

    Optical access networks connect multiple endpoints to a common network node via shared fibre infrastructure. They will play a vital role to scale up the number of users in quantum key distribution (QKD) networks. However, the presence of power splitters in the commonly used passive network architecture makes successful transmission of weak quantum signals challenging. This is especially true if QKD and data signals are multiplexed in the passive network. The splitter introduces an imbalance between quantum signal and Raman noise, which can prevent the recovery of the quantum signal completely. Here we introduce a method to overcome this limitation and demonstrate coexistence of multi-user QKD and full power data traffic from a gigabit passive optical network (GPON) for the first time. The dual feeder implementation is compatible with standard GPON architectures and can support up to 128 users, highlighting that quantum protected GPON networks could be commonplace in the future. PMID:26656307

  5. Emotional Exhaustion and Job Satisfaction in Airport Security Officers – Work–Family Conflict as Mediator in the Job Demands–Resources Model

    PubMed Central

    Baeriswyl, Sophie; Krause, Andreas; Schwaninger, Adrian

    2016-01-01

    The growing threat of terrorism has increased the importance of aviation security and the work of airport security officers (screeners). Nonetheless, airport security research has yet to focus on emotional exhaustion and job satisfaction as major determinants of screeners’ job performance. The present study bridges this research gap by applying the job demands–resources (JD–R) model and using work–family conflict (WFC) as an intervening variable to study relationships between work characteristics (workload and supervisor support), emotional exhaustion, and job satisfaction in 1,127 screeners at a European airport. Results of structural equation modeling revealed that (a) supervisor support as a major job resource predicted job satisfaction among screeners; (b) workload as a major job demand predicted their emotional exhaustion; and (c) WFC proved to be a promising extension to the JD–R model that partially mediated the impact of supervisor support and workload on job satisfaction and emotional exhaustion. Theoretical and practical implications are discussed. PMID:27242581

  6. Airport noise

    NASA Technical Reports Server (NTRS)

    Pendley, R. E.

    1982-01-01

    The problem of airport noise at several airports and air bases is detailed. Community reactions to the noise, steps taken to reduce jet engine noise, and the effect of airport use restrictions and curfews on air transportation are discussed. The adverse effect of changes in allowable operational noise on airport safety and altenative means for reducing noise pollution are considered. Community-airport relations and public relations are discussed.

  7. Integration of EGA secure data access into Galaxy

    PubMed Central

    Hoogstrate, Youri; Zhang, Chao; Senf, Alexander; Bijlard, Jochem; Hiltemann, Saskia; van Enckevort, David; Repo, Susanna; Heringa, Jaap; Jenster, Guido; J.A. Fijneman, Remond; Boiten, Jan-Willem; A. Meijer, Gerrit; Stubbs, Andrew; Rambla, Jordi; Spalding, Dylan; Abeln, Sanne

    2016-01-01

    High-throughput molecular profiling techniques are routinely generating vast amounts of data for translational medicine studies. Secure access controlled systems are needed to manage, store, transfer and distribute these data due to its personally identifiable nature. The European Genome-phenome Archive (EGA) was created to facilitate access and management to long-term archival of bio-molecular data. Each data provider is responsible for ensuring a Data Access Committee is in place to grant access to data stored in the EGA. Moreover, the transfer of data during upload and download is encrypted. ELIXIR, a European research infrastructure for life-science data, initiated a project (2016 Human Data Implementation Study) to understand and document the ELIXIR requirements for secure management of controlled-access data. As part of this project, a full ecosystem was designed to connect archived raw experimental molecular profiling data with interpreted data and the computational workflows, using the CTMM Translational Research IT (CTMM-TraIT) infrastructure http://www.ctmm-trait.nl as an example. Here we present the first outcomes of this project, a framework to enable the download of EGA data to a Galaxy server in a secure way. Galaxy provides an intuitive user interface for molecular biologists and bioinformaticians to run and design data analysis workflows. More specifically, we developed a tool -- ega_download_streamer - that can download data securely from EGA into a Galaxy server, which can subsequently be further processed. This tool will allow a user within the browser to run an entire analysis containing sensitive data from EGA, and to make this analysis available for other researchers in a reproducible manner, as shown with a proof of concept study.  The tool ega_download_streamer is available in the Galaxy tool shed: https://toolshed.g2.bx.psu.edu/view/yhoogstrate/ega_download_streamer. PMID:28232859

  8. Integration of EGA secure data access into Galaxy.

    PubMed

    Hoogstrate, Youri; Zhang, Chao; Senf, Alexander; Bijlard, Jochem; Hiltemann, Saskia; van Enckevort, David; Repo, Susanna; Heringa, Jaap; Jenster, Guido; J A Fijneman, Remond; Boiten, Jan-Willem; A Meijer, Gerrit; Stubbs, Andrew; Rambla, Jordi; Spalding, Dylan; Abeln, Sanne

    2016-01-01

    High-throughput molecular profiling techniques are routinely generating vast amounts of data for translational medicine studies. Secure access controlled systems are needed to manage, store, transfer and distribute these data due to its personally identifiable nature. The European Genome-phenome Archive (EGA) was created to facilitate access and management to long-term archival of bio-molecular data. Each data provider is responsible for ensuring a Data Access Committee is in place to grant access to data stored in the EGA. Moreover, the transfer of data during upload and download is encrypted. ELIXIR, a European research infrastructure for life-science data, initiated a project (2016 Human Data Implementation Study) to understand and document the ELIXIR requirements for secure management of controlled-access data. As part of this project, a full ecosystem was designed to connect archived raw experimental molecular profiling data with interpreted data and the computational workflows, using the CTMM Translational Research IT (CTMM-TraIT) infrastructure http://www.ctmm-trait.nl as an example. Here we present the first outcomes of this project, a framework to enable the download of EGA data to a Galaxy server in a secure way. Galaxy provides an intuitive user interface for molecular biologists and bioinformaticians to run and design data analysis workflows. More specifically, we developed a tool -- ega_download_streamer - that can download data securely from EGA into a Galaxy server, which can subsequently be further processed. This tool will allow a user within the browser to run an entire analysis containing sensitive data from EGA, and to make this analysis available for other researchers in a reproducible manner, as shown with a proof of concept study.  The tool ega_download_streamer is available in the Galaxy tool shed: https://toolshed.g2.bx.psu.edu/view/yhoogstrate/ega_download_streamer.

  9. High-Performance Secure Database Access Technologies for HEP Grids

    SciTech Connect

    Matthew Vranicar; John Weicher

    2006-04-17

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist’s computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that "Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications.” There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the

  10. Secure Remote Access Issues in a Control Center Environment

    NASA Technical Reports Server (NTRS)

    Pitts, Lee; McNair, Ann R. (Technical Monitor)

    2002-01-01

    The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.

  11. Secure Payload Access to the International Space Station

    NASA Technical Reports Server (NTRS)

    Pitts, R. Lee; Reid, Chris

    2002-01-01

    The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.

  12. Web Security for Access of Private Information via the Internet

    PubMed Central

    Anderson, Lynn; Rauscher, Richard; Lee, H.

    2001-01-01

    Authentication, authorization, accounting, and encryption are goals of security strategies for web information being accessed that is private. The definition of these terms is as follows: • Authentication - validation that the individual (or system) is who they say they are • Authorization - validation that the individual (or system) accessing information is authorized to do so • Accounting - records are kept of what is accessed • Encryption - use of a ‘scrambling’ algorithm such that the information can pass securely across the public Internet without being intelligible; information is specifically ‘unscrambled’ or deencrypted at the receiving end Many tools can be used to meet these goals. The degree to which the goals are met is determined by how we use these tools. Methodologies similar to TSEC[1] and ITSEC[2] can be used to determine the appropriate level of protection for a particular web application. This poster describes a set of effective strategies for web application security and the level of protection each strategy provides.

  13. Hand geometry biometric device for secure access control

    SciTech Connect

    Colbert, C.; Moles, D.R. )

    1991-01-01

    This paper reports that the authors developed for the Air Force the Mark VI Personal Identity Verifier (PIV) for controlling access to a fixed or mobile ICBM site, a computer terminal, or mainframe. The Mark VI records the digitized silhouettes of four fingers of each hand on an AT and T smart card. Like fingerprints, finger shapes, lengths, and widths constitute an unguessable biometric password. A Security Officer enrolls an authorized person who places each hand, in turn, on a backlighted panel. An overhead scanning camera records the right and left hand reference templates on the smart card. The Security Officer adds to the card: name, personal identification number (PIN), and access restrictions such as permitted days of the week, times of day, and doors. To gain access, cardowner inserts card into a reader slot and places either hand on the panel. Resulting access template is matched to the reference template by three sameness algorithms. The final match score is an average of 12 scores (each of the four fingers, matched for shape, length, and width), expressing the degree of sameness. (A perfect match would score 100.00.) The final match score is compared to a predetermined score (threshold), generating an accept or reject decision.

  14. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Access to matter classified as National Security... SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data....

  15. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Access to matter classified as National Security... SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data....

  16. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Access to matter classified as National Security... SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data....

  17. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Access to matter classified as National Security... SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data....

  18. An authentication scheme for secure access to healthcare services.

    PubMed

    Khan, Muhammad Khurram; Kumari, Saru

    2013-08-01

    Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS.

  19. Structuring Homeland Security

    DTIC Science & Technology

    2002-04-09

    20 AIRPORT SECURITY .............................................................................................. 20...using an existing command and control structure. Since September 11, 2001 airport security has been of heightened importance to the American public...In order to use Reserves to provide airport security the airports themselves should be made federal property. This would allow greater flexibility for

  20. Conservation science in a terrorist age: the impact of airport security screening on the viability and DNA integrity of frozen felid spermatozoa.

    PubMed

    Gloor, Kayleen T; Winget, Doug; Swanson, William F

    2006-09-01

    In response to growing terrorism concerns, the Transportation Security Administration now requires that all checked baggage at U.S. airports be scanned through a cabinet x-ray system, which may increase risk of radiation damage to transported biologic samples and other sensitive genetic material. The objective of this study was to investigate the effect of these new airport security regulations on the viability and DNA integrity of frozen felid spermatozoa. Semen was collected from two domestic cats (Felis silvestris catus) and one fishing cat (Prionailurus viverrinus), cryopreserved in plastic freezing straws, and transferred into liquid nitrogen dry shippers for security screening. Treatment groups included frozen samples from each male scanned once or three times using a Transportation Security Administration-operated cabinet x-ray system, in addition to non-scanned samples (i.e., negative control) and samples previously scanned three times and exposed to five additional high-intensity x-ray bursts (i.e., positive control). Dosimeters placed in empty dry shippers were used to quantify radiation exposure. Following treatment, straws were thawed and spermatozoa analyzed for post-thaw motility (percentage motile and rate of progressive movement), acrosome status, and DNA integrity using single-cell gel electrophoresis (i.e., the comet assay). Dosimeter measurements determined that each airport screening procedure produced approximately 16 mrem of radiation exposure. Our results indicated that all levels of radiation exposure adversely affected (P < 0.05) post-thaw sperm motility, but the percentage of acrosome-intact spermatozoa did not differ (P > 0.05) among treatment groups. Results also showed that the amount of double-stranded DNA damage was greater (P < 0.05) in sperm samples from both cat species scanned three times compared to samples scanned once or negative controls. Findings suggest that new airport security measures may cause radiation-induced damage to

  1. Establishing a Secure Data Center with Remote Access: Preprint

    SciTech Connect

    Gonder, J.; Burton, E.; Murakami, E.

    2012-04-01

    Access to existing travel data is critical for many analysis efforts that lack the time or resources to support detailed data collection. High-resolution data sets provide particular value, but also present a challenge for preserving the anonymity of the original survey participants. To address this dilemma of providing data access while preserving privacy, the National Renewable Energy Laboratory and the U.S. Department of Transportation have launched the Transportation Secure Data Center (TSDC). TSDC data sets include those from regional travel surveys and studies that increasingly use global positioning system devices. Data provided by different collecting agencies varies with respect to formatting, elements included and level of processing conducted in support of the original purpose. The TSDC relies on a number of geospatial and other analysis tools to ensure data quality and to generate useful information outputs. TSDC users can access the processed data in two different ways. The first is by downloading summary results and second-by-second vehicle speed profiles (with latitude/longitude information removed) from a publicly-accessible website. The second method involves applying for a remote connection account to a controlled-access environment where spatial analysis can be conducted, but raw data cannot be removed.

  2. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1980-05-22

    SECURITY. - CONTINUED TRAINING OF LAW ENFORCEMENT OFFICERS SUPPORTING AIRPORT SECURITY ACTIVITIES. - SECURITY PROGRAMS IMPLEMENTED BY AIR FREIGHT...cooperation by all concerned. (See Exhibit 14) Airport Security - Ongoing activities which contributed significantly to airport security included full...implementation of the revised Federal Aviation Regulations (FAR) Part 107 governing airport security , training of law enforcement officers supporting

  3. 49 CFR 1548.15 - Access to cargo: Security threat assessments for individuals having unescorted access to cargo.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND... 49 Transportation 9 2013-10-01 2013-10-01 false Access to cargo: Security threat assessments for... transportation, dispatch or security of cargo for transport on a passenger aircraft or all-cargo aircraft,...

  4. 49 CFR 1548.15 - Access to cargo: Security threat assessments for individuals having unescorted access to cargo.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND... 49 Transportation 9 2012-10-01 2012-10-01 false Access to cargo: Security threat assessments for... transportation, dispatch or security of cargo for transport on a passenger aircraft or all-cargo aircraft,...

  5. 49 CFR 1548.15 - Access to cargo: Security threat assessments for individuals having unescorted access to cargo.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND... 49 Transportation 9 2010-10-01 2010-10-01 false Access to cargo: Security threat assessments for... transportation, dispatch or security of cargo for transport on a passenger aircraft or all-cargo aircraft,...

  6. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Access to matter classified as National Security Information and Restricted Data. 95.35 Section 95.35 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter...

  7. 36 CFR 1256.70 - What controls access to national security-classified information?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public...

  8. 36 CFR 1256.70 - What controls access to national security-classified information?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public...

  9. 36 CFR 1256.70 - What controls access to national security-classified information?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public...

  10. 10 CFR 1016.8 - Approval for processing access permittees for security facility approval.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... RESTRICTED DATA Physical Security § 1016.8 Approval for processing access permittees for security facility... Restricted Data at any location in connection with its permit shall promptly request a DOE security facility... proposed security procedures and controls for the protection of Restricted Data, including a floor plan...

  11. Aeronautical Mobile Airport Communications System (AeroMACS)

    NASA Technical Reports Server (NTRS)

    Budinger, James M.; Hall, Edward

    2011-01-01

    To help increase the capacity and efficiency of the nation s airports, a secure wideband wireless communications system is proposed for use on the airport surface. This paper provides an overview of the research and development process for the Aeronautical Mobile Airport Communications System (AeroMACS). AeroMACS is based on a specific commercial profile of the Institute of Electrical and Electronics Engineers (IEEE) 802.16 standard known as Wireless Worldwide Interoperability for Microwave Access or WiMAX (WiMax Forum). The paper includes background on the need for global interoperability in air/ground data communications, describes potential AeroMACS applications, addresses allocated frequency spectrum constraints, summarizes the international standardization process, and provides findings and recommendations from the world s first AeroMACS prototype implemented in Cleveland, Ohio, USA.

  12. Intelligent building system for airport

    SciTech Connect

    Ancevic, M.

    1997-11-01

    The Munich airport uses a state-of-the-art intelligent building management system to control systems such as HVAC, runway lights, baggage handling, etc. Planning the new Munich II international airport provided a unique opportunity to use the latest state-of-the-art technical systems, while integrating their control through a single intelligent building management system. Opened in 1992, the airport is Germany`s second-largest airport after Frankfurt. The airport is staffed by 16,000 employees and can handle 17 million passengers a year. The sprawling site encompasses more than 120 buildings. The airport`s distributed control system is specifically designed to optimize the complex`s unique range of functions, while providing a high degree of comfort, convenience and safety for airport visitors. With the capacity to control 200,000 points, this system controls more than 112,000 points and integrates 13 major subsystems from nine different vendors. It provides convenient, accessible control of everything including the complex`s power plant, HVAC Control, the terminal`s people-moving functions, interior lighting controls, runway lights, baggage forwarding systems, elevators, and boarding bridges. The airport was named 1993 intelligent building of the year by the Intelligent Buildings Institute Foundation. Its building management system is a striking example of the degree to which a building complex`s functions can be integrated for greater operational control and efficiency.

  13. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Access to restricted data and national security information for parties; security clearances. 2.905 Section 2.905 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR DOMESTIC LICENSING PROCEEDINGS AND ISSUANCE OF ORDERS Special Procedures Applicable to Adjudicatory Proceedings Involving...

  14. 36 CFR 1256.70 - What controls access to national security-classified information?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 36 Parks, Forests, and Public Property 3 2013-07-01 2012-07-01 true What controls access to national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... controls access to national security-classified information? (a) The declassification of and public...

  15. 36 CFR 1256.70 - What controls access to national security-classified information?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false What controls access to national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70...

  16. 10 CFR 110.121 - Security clearances and access to classified information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security clearances and access to classified information. 110.121 Section 110.121 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) EXPORT AND IMPORT OF NUCLEAR EQUIPMENT AND MATERIAL Special Procedures for Classified Information in Hearings § 110.121 Security clearances and access to classified...

  17. 48 CFR 3004.470 - Security requirements for access to unclassified facilities, Information Technology resources...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Security requirements for access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Within Industry 3004.470 Security requirements for access to unclassified facilities,...

  18. 9 CFR 121.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... and toxins; security risk assessments. 121.10 Section 121.10 Animals and Animal Products ANIMAL AND... Restricting access to select agents and toxins; security risk assessments. (a) An individual or entity... Administrator or the HHS Secretary following a security risk assessment by the Attorney General. (b)...

  19. 9 CFR 121.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... and toxins; security risk assessments. 121.10 Section 121.10 Animals and Animal Products ANIMAL AND... Restricting access to select agents and toxins; security risk assessments. (a) An individual or entity... Administrator or the HHS Secretary following a security risk assessment by the Attorney General. (b)...

  20. 9 CFR 121.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... and toxins; security risk assessments. 121.10 Section 121.10 Animals and Animal Products ANIMAL AND... Restricting access to select agents and toxins; security risk assessments. (a) An individual or entity... Administrator or the HHS Secretary following a security risk assessment by the Attorney General. (b)...

  1. 42 CFR 73.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...; security risk assessments. 73.10 Section 73.10 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH... access to select agents and toxins; security risk assessments. (a) An individual or entity required to... Administrator, following a security risk assessment by the Attorney General. (b) An individual will be deemed...

  2. 42 CFR 73.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...; security risk assessments. 73.10 Section 73.10 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH... access to select agents and toxins; security risk assessments. (a) An individual or entity required to... Administrator, following a security risk assessment by the Attorney General. (b) An individual will be deemed...

  3. 42 CFR 73.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...; security risk assessments. 73.10 Section 73.10 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH... access to select agents and toxins; security risk assessments. (a) An individual or entity required to... Administrator, following a security risk assessment by the Attorney General. (b) An individual will be deemed...

  4. 9 CFR 121.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... and toxins; security risk assessments. 121.10 Section 121.10 Animals and Animal Products ANIMAL AND... Restricting access to select agents and toxins; security risk assessments. (a) An individual or entity... Administrator or the HHS Secretary following a security risk assessment by the Attorney General. (b)...

  5. 42 CFR 73.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...; security risk assessments. 73.10 Section 73.10 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH... access to select agents and toxins; security risk assessments. (a) An individual or entity required to... Administrator, following a security risk assessment by the Attorney General. (b) An individual will be deemed...

  6. 42 CFR 73.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...; security risk assessments. 73.10 Section 73.10 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH... access to select agents and toxins; security risk assessments. (a) An individual or entity required to... Administrator, following a security risk assessment by the Attorney General. (b) An individual will be deemed...

  7. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1980-10-14

    CEASE FUNDING OF TRAINING"OF LAW ENFORCEMENT OFFICERS SUPPORTING AIRPORT SECURITY ACTIVITIES. F. FEDERAL AIR MARSHALS PROVIDE LAW ENFORCEMENT SUPPORT...enforcement officer authority through special deputations by the U.S. Marshals Service on an annual basis. Airport Security - Continuing activities...which contributed signifi- cantly to airport security include the training of local law enforcement officers supporting airport security programs, the

  8. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1979-12-05

    The airline and airport security measures currently in effect continue to provide increased safety for airline passengers and crews as well as...107 governing airport security . other ongoing programs which contributed significantly to airport security included the training of law enforce- ment...officers supporting airport security programs and the explosives detection K(9 team program. Highlights of these actions and programs are summarized

  9. Perception of health risks of electromagnetic fields by MRI radiographers and airport security officers compared to the general Dutch working population: a cross sectional analysis

    PubMed Central

    2011-01-01

    Background The amount of exposure to electromagnetic fields (EMF) at work is mainly determined by an individual's occupation and may differ from exposure at home. It is, however, unknown how different occupational groups perceive possible adverse health effects of EMF. Methods Three occupational groups, the general Dutch working population (n = 567), airport security officers who work with metal detectors (n = 106), and MRI radiographers who work with MRI (n = 193), were compared on perceived risk of and positive and negative feelings towards EMF in general and of different EMF sources, and health concerns by using analyses of variances. Data were collected via an internet survey. Results Overall, MRI radiographers had a lower perceived risk, felt less negative, and more positive towards EMF and different sources of EMF than the general working population and the security officers. For security officers, feeling more positive about EMF was not significantly related to perceived risk of EMF in general or EMF of domestic sources. Feeling positive about a source did not generalize to a lower perceived risk, while negative feelings were stronger related to perceived risk. MRI radiographers had fewer health concerns regarding EMF than the other two groups, although they considered it more likely that EMF could cause physical complaints. Conclusions These data show that although differences in occupation appear to be reflected in different perceptions of EMF, the level of occupational exposure to EMF as such does not predict the perceived health risk of EMF. PMID:22070906

  10. Restricted access processor - An application of computer security technology

    NASA Technical Reports Server (NTRS)

    Mcmahon, E. M.

    1985-01-01

    This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.

  11. 49 CFR 1560.111 - Covered airport operators.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Covered airport operators. 1560.111 Section 1560... Transmission of Secure Flight Passenger Data for Watch List Matching § 1560.111 Covered airport operators. (a) Applicability. This section applies to a covered airport operator that has a program approved by TSA...

  12. 49 CFR 1560.111 - Covered airport operators.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Covered airport operators. 1560.111 Section 1560... Transmission of Secure Flight Passenger Data for Watch List Matching § 1560.111 Covered airport operators. (a) Applicability. This section applies to a covered airport operator that has a program approved by TSA...

  13. 77 FR 17492 - Expansion of Global Entry to Additional Airports

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-26

    ... SECURITY U.S. Customs and Border Protection Expansion of Global Entry to Additional Airports AGENCY: U.S.... This document announces the expansion of the program to include four additional airports. DATES: Global... site, http://www.globalentry.gov . Expansion of Global Entry Program to Additional Airports CBP...

  14. “We Are Not Being Heard”: Aboriginal Perspectives on Traditional Foods Access and Food Security

    PubMed Central

    Elliott, Bethany; Jayatilaka, Deepthi; Brown, Contessa; Varley, Leslie; Corbett, Kitty K.

    2012-01-01

    Aboriginal peoples are among the most food insecure groups in Canada, yet their perspectives and knowledge are often sidelined in mainstream food security debates. In order to create food security for all, Aboriginal perspectives must be included in food security research and discourse. This project demonstrates a process in which Aboriginal and non-Aboriginal partners engaged in a culturally appropriate and respectful collaboration, assessing the challenges and barriers to traditional foods access in the urban environment of Vancouver, BC, Canada. The findings highlight local, national, and international actions required to increase access to traditional foods as a means of achieving food security for all people. The paper underscores the interconnectedness of local and global food security issues and highlights challenges as well as solutions with potential to improve food security of both Aboriginal and non-Aboriginal peoples alike. PMID:23346118

  15. A threat intelligence framework for access control security in the oil industry

    NASA Astrophysics Data System (ADS)

    Alaskandrani, Faisal T.

    The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.

  16. "We are not being heard": Aboriginal perspectives on traditional foods access and food security.

    PubMed

    Elliott, Bethany; Jayatilaka, Deepthi; Brown, Contessa; Varley, Leslie; Corbett, Kitty K

    2012-01-01

    Aboriginal peoples are among the most food insecure groups in Canada, yet their perspectives and knowledge are often sidelined in mainstream food security debates. In order to create food security for all, Aboriginal perspectives must be included in food security research and discourse. This project demonstrates a process in which Aboriginal and non-Aboriginal partners engaged in a culturally appropriate and respectful collaboration, assessing the challenges and barriers to traditional foods access in the urban environment of Vancouver, BC, Canada. The findings highlight local, national, and international actions required to increase access to traditional foods as a means of achieving food security for all people. The paper underscores the interconnectedness of local and global food security issues and highlights challenges as well as solutions with potential to improve food security of both Aboriginal and non-Aboriginal peoples alike.

  17. 14 CFR 161.505 - Notice of proposed termination of airport grant funds and passenger facility charges.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... impose a noise or access restriction in violation of the Airport Noise and Capacity Act of 1990 or this... that the airport operator has imposed a noise or access restriction in violation of the Airport Noise... that the airport operator has taken action to impose a noise or access restriction in violation of...

  18. 14 CFR 161.505 - Notice of proposed termination of airport grant funds and passenger facility charges.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... impose a noise or access restriction in violation of the Airport Noise and Capacity Act of 1990 or this... that the airport operator has imposed a noise or access restriction in violation of the Airport Noise... that the airport operator has taken action to impose a noise or access restriction in violation of...

  19. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... each MARSEC Level, including those points where TWIC access control provisions will be applied. Each... escorting them; (4) Procedures for identifying authorized and unauthorized persons at any MARSEC level; and... access controls, particularly if they are to be applied on a random or occasional basis. (f) MARSEC...

  20. Guidelines to improve airport preparedness against chemical and biological terrorism.

    SciTech Connect

    Edwards, Donna M.; Price, Phillip N.; Gordon, Susanna P.; Gadgil, Ashok

    2005-05-01

    Guidelines to Improve Airport Preparedness Against Chemical and Biological Terrorism is a 100-page document that makes concrete recommendations on improving security and assessing vulnerable areas and helps its readers understand the nature of chemical and biological attacks. The report has been turned over to Airports Council International (ACI) and the American Association of Airport Executives (AAAE), two organizations that together represent the interests of thousands of airport personnel and facilities in the U.S. and around the world.

  1. Transportation Security: Issues for the 111th Congress

    DTIC Science & Technology

    2009-05-15

    results of covert testing of airport security checkpoints demonstrating deficiencies in detecting improvised explosives and incendiary devices...34 A key issue in the debate over aviation security immediately following September 11, 2001, was whether airport security screeners should be...intentional wrongdoing on the part of airport security screeners, whether they be federal or private. Nonetheless, while the pilot program airports

  2. A Delicate Balance: National Security vs. Public Access

    ERIC Educational Resources Information Center

    Klein, Bonnie; Schwalb, Sandy

    2005-01-01

    Sometimes people want to see data that the government thinks should be kept under wraps. How does the Department of Defense balance the scales of justice while still ensuring information security? In the aftermath of September 11, 2001, the Defense Technical Information Center (DTIC) found itself in the spotlight as journalists, academics, and…

  3. Effect of security threats on primary care access in Logar province, Afghanistan.

    PubMed

    Morikawa, Masahiro J

    2008-01-01

    Security threats are a major concern for access to health care in many war-torn communities; however, there is little quantified data on actual access to care in rural communities during war. Kinderberg International e.V. provided primary care in rural Logar province, Afghanistan, for these three years in eight districts until they were integrated into the new health care structure led by the Ministry of Health in early 2005. We examined the number of patients visiting our clinic before and during the security threats related to the parliamentary election and subsequent national assembly in 2004. The number of patients declined in remote clinics while the number increased in central locations. This finding has an important practical implication: the monitoring of access to care should include remote clinics, otherwise it may potentially underestimate compromised access to health care due to security threats.

  4. English for Airport Ground Staff

    ERIC Educational Resources Information Center

    Cutting, Joan

    2012-01-01

    This article describes part of a European Commission Leonardo project that aimed to design a multimedia course for English language learners seeking work as ground staff in European airports. The structural-functional analysis of the dialogues written from the course showed that, across the four trades explored (security guards, ground handlers,…

  5. Airport Surface Network Architecture Definition

    NASA Technical Reports Server (NTRS)

    Nguyen, Thanh C.; Eddy, Wesley M.; Bretmersky, Steven C.; Lawas-Grodek, Fran; Ellis, Brenda L.

    2006-01-01

    Currently, airport surface communications are fragmented across multiple types of systems. These communication systems for airport operations at most airports today are based dedicated and separate architectures that cannot support system-wide interoperability and information sharing. The requirements placed upon the Communications, Navigation, and Surveillance (CNS) systems in airports are rapidly growing and integration is urgently needed if the future vision of the National Airspace System (NAS) and the Next Generation Air Transportation System (NGATS) 2025 concept are to be realized. To address this and other problems such as airport surface congestion, the Space Based Technologies Project s Surface ICNS Network Architecture team at NASA Glenn Research Center has assessed airport surface communications requirements, analyzed existing and future surface applications, and defined a set of architecture functions that will help design a scalable, reliable and flexible surface network architecture to meet the current and future needs of airport operations. This paper describes the systems approach or methodology to networking that was employed to assess airport surface communications requirements, analyze applications, and to define the surface network architecture functions as the building blocks or components of the network. The systems approach used for defining these functions is relatively new to networking. It is viewing the surface network, along with its environment (everything that the surface network interacts with or impacts), as a system. Associated with this system are sets of services that are offered by the network to the rest of the system. Therefore, the surface network is considered as part of the larger system (such as the NAS), with interactions and dependencies between the surface network and its users, applications, and devices. The surface network architecture includes components such as addressing/routing, network management, network

  6. Secure Web-Site Access with Tickets and Message-Dependent Digests

    USGS Publications Warehouse

    Donato, David I.

    2008-01-01

    Although there are various methods for restricting access to documents stored on a World Wide Web (WWW) site (a Web site), none of the widely used methods is completely suitable for restricting access to Web applications hosted on an otherwise publicly accessible Web site. A new technique, however, provides a mix of features well suited for restricting Web-site or Web-application access to authorized users, including the following: secure user authentication, tamper-resistant sessions, simple access to user state variables by server-side applications, and clean session terminations. This technique, called message-dependent digests with tickets, or MDDT, maintains secure user sessions by passing single-use nonces (tickets) and message-dependent digests of user credentials back and forth between client and server. Appendix 2 provides a working implementation of MDDT with PHP server-side code and JavaScript client-side code.

  7. Implementing Solar Technologies at Airports

    SciTech Connect

    Kandt, A.; Romero, R.

    2014-07-01

    Federal agencies, such as the Department of Defense and Department of Homeland Security, as well as numerous private entities are actively pursuing the installation of solar technologies to help reduce fossil fuel energy use and associated emissions, meet sustainability goals, and create more robust or reliable operations. One potential approach identified for siting solar technologies is the installation of solar energy technologies at airports and airfields, which present a significant opportunity for hosting solar technologies due to large amounts of open land. This report focuses largely on the Federal Aviation Administration's (FAA's) policies toward siting solar technologies at airports.

  8. 25 CFR 170.132 - When can a tribe use IRR Program funds for airport facilities?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false When can a tribe use IRR Program funds for airport..., Ferry and Airport Facilities § 170.132 When can a tribe use IRR Program funds for airport facilities? (a) A tribe can use IRR Program funds for construction of airport and heliport access roads, if...

  9. 25 CFR 170.132 - When can a tribe use IRR Program funds for airport facilities?

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 25 Indians 1 2011-04-01 2011-04-01 false When can a tribe use IRR Program funds for airport..., Ferry and Airport Facilities § 170.132 When can a tribe use IRR Program funds for airport facilities? (a) A tribe can use IRR Program funds for construction of airport and heliport access roads, if...

  10. 14 CFR 161.11 - Identification of land uses in airport noise study area.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Identification of land uses in airport..., DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRPORTS NOTICE AND APPROVAL OF AIRPORT NOISE AND ACCESS RESTRICTIONS General Provisions § 161.11 Identification of land uses in airport noise study area. For...

  11. Necessary security mechanisms in a PACS DICOM access system with web technology.

    PubMed

    Vázquez-Naya, José; Loureiro, Javier; Calle, Julián; Vidal, Jorge; Sierra, Alejandro

    2002-01-01

    The evolution in information and telecommunication technologies has allowed the development of systems that use the Internet infrastructure and Web technology to remotely access a hospital's picture archiving and communication system (PACS). However, one of the main problems in the construction of this type of system is the development of mechanisms that guarantee the security of the medical data that are being consulted. Most countries have specific norms for the protection of such medical data. This work describes security mechanisms that are developed in an access system to PACS DICOM with Web technology and comply with the Spanish legislation concerning the protection of medical data. The proposed security mechanisms are flexible, they leave room for the definition of security policies adjusted to the needs of each particular organization and they can be adapted to comply with new or foreign norms.

  12. Climate Change and Global Food Security: Food Access, Utilization, and the US Food System

    NASA Astrophysics Data System (ADS)

    Brown, M. E.; Antle, J. M.; Backlund, P. W.; Carr, E. R.; Easterling, W. E.; Walsh, M.; Ammann, C. M.; Attavanich, W.; Barrett, C. B.; Bellemare, M. F.; Dancheck, V.; Funk, C.; Grace, K.; Ingram, J. S. I.; Jiang, H.; Maletta, H.; Mata, T.; Murray, A.; Ngugi, M.; Ojima, D. S.; O'Neill, B. C.; Tebaldi, C.

    2015-12-01

    This paper will summarize results from the USDA report entitled 'Climate change, Global Food Security and the U.S. Food system'. The report focuses on the impact of climate change on global food security, defined as "when all people at all times have physical, social, and economic access to sufficient, safe, and nutritious food to meet their dietary needs and food preferences for an active and healthy life". The assessment brought together authors and contributors from twenty federal, academic, nongovernmental, intergovernmental, and private organizations in four countries to identify climate change effects on food security through 2100, and analyze the U.S.'s likely connections with that world. This talk will describe how climate change will likely affect food access and food utilization, and summarize how the U.S. food system contributes to global food security, and will be affected by climate change.

  13. AVIATION SECURITY: Transportation Security Administration Faces Immediate and Long-Term Challenges

    DTIC Science & Technology

    2007-11-02

    circumvent airport security , and provide whistleblower protection for air carrier and airport security workers. (See app. III for a summary of pending...GAO-01-1171T. Washington, D.C.: September 25, 2001. Aviation Security: Weaknesses in Airport Security and Options for Assigning Screening...125. Washington, D.C.: March 16, 2000. Aviation Security: FAA’s Actions to Study Responsibilities and Funding for Airport Security and to Certify

  14. Conducting Airport Anti-Terrorism Operations and Contingency Planning for Risk Reduction of the Terrorist Threat.

    DTIC Science & Technology

    1986-08-01

    victims of some of the most vicious terrorist acts occurring in the past year, airport security has come under increasing scrutiny by television...operations and contingency planning can be the weapons which airport security managers use to successfully battle the increasing trend of terrorist acts on airports today. (Author)

  15. A human engineering and ergonomic evaluation of the security access panel interface

    SciTech Connect

    Hartney, C.; Banks, W.W.

    1995-02-01

    The purpose of this study was to empirically determine which of several security hardware interface designs produced the highest levels of end-user performance and acceptance. The FESSP Security Alarms and Monitoring Systems program area commissioned the authors study as decision support for upgrading the Argus security system`s primary user interface so that Argus equipment will support the new DOE and DoD security access badges. Twenty-two test subjects were repeatedly tested using six remote access panel (RAP) designs. Lawrence Livermore National Laboratory (LLNL) uses one of these interface designs in its security access booths. Along with the RAP B insert-style reader, the authors tested five prototype RAP variants, each with a different style of swipe badge reader, through which a badge is moved or swiped. The authors asked the untrained test subjects to use each RAP while they described how they thought they should respond so that the system would operate correctly in reading the magnetic strip on a security badge. With each RAP variant, subjects were required to make four successful card reads (swipes) in which the card reader correctly read and logged the transaction. After each trial, a subject completed a 10-item interface acceptance evaluation before approaching the next RAP. After interacting with the RAP interfaces (for a total of the six RAP trials), each subject completed a 7-item overview evaluation that compared and ranked the five experimental RAPs, using the original (RAP B) insert style as a standard.

  16. Experimental realization of an entanglement access network and secure multi-party computation

    PubMed Central

    Chang, X.-Y.; Deng, D.-L.; Yuan, X.-X.; Hou, P.-Y.; Huang, Y.-Y.; Duan, L.-M.

    2016-01-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography. PMID:27404561

  17. Experimental realization of an entanglement access network and secure multi-party computation

    NASA Astrophysics Data System (ADS)

    Chang, X.-Y.; Deng, D.-L.; Yuan, X.-X.; Hou, P.-Y.; Huang, Y.-Y.; Duan, L.-M.

    2016-07-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography.

  18. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1981-11-09

    which have been prevented or deterred by airline and airport security procedures cannot be determined with certainty. The Federal Aviation Administration...finalized and issued. The new FAR Part 108, Air Carrier Security and complementary changes to FAR Part 107, Airport Security , and FAR Part 129, Operations...initiated audit of the claims and, if verified, action will be taken to seek funding for payment. Airport Security . Airport security measures continue to be

  19. Sensitive Security Information (SSI) and Transportation Security: Background and Controversies

    DTIC Science & Technology

    2004-02-05

    with airport security procedures, employee accountability, passenger screening, and airport secrecy agreements. In January 2003, the Dallas/Fort... Airport Security Flaws Bring Criticism,” Los Angeles Times, July 2, 2002, p. A8. 16 Charles Piller and Ricardo Alonso-Zaldivar, “A Suspect Computer...Secrecy in Airport Security Contract Criticized,” Des Moines Register, Sept. 27, 2003, p. 1A; James Andrews, “Here in Tristate, Security’s Tighter

  20. Security Concerns in Accessing Naval e-Learning with Personal Mobile Devices

    DTIC Science & Technology

    2014-12-01

    IN ACCESSING NAVAL e - LEARNING WITH PERSONAL MOBILE DEVICES by Keystella R. Mitchell December 2014 Thesis Co-Advisors: Man-Tak Shing...December 2014 3. REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE SECURITY CONCERNS IN ACCESSING NAVAL e - LEARNING WITH PERSONAL...was to investigate the feasibility of using personal mobile devices for Naval e - Learning (NeL). Another objective was to find out which mobile device

  1. Whiffing the Airport Interview

    ERIC Educational Resources Information Center

    Williamson, David

    2008-01-01

    An airport interview is an initial interview for a senior administrative position conducted at an airport hotel not too far from the campus in question. Meeting at an airport enables a search committee to interview a large number of candidates in a short period of time with a degree of confidentiality. At the conclusion of the airport interviews,…

  2. Food Security and Women's Access to Natural Resources workshop; a brief report.

    PubMed

    1997-01-01

    This article describes the workshop on Food Security and Women's Access to Natural Resources, held in January 1997 in Mumbai, India. The workshop was organized jointly by the Tata Institute of Social Sciences and the Indian Association of Women's Studies. The aim was to examine the food security situation in Maharashtra and Gujarat states in the west, the initiative to build alternative institutions, legal changes augmenting industrialization, and how traditional rights to common property resources can be legalized and how the poor can have access to new resources. The workshop organizers were unable to obtain experts on some topics. Core discussion centered on changes in industrialization, natural resources, gender and food security; access to natural resources and poverty alleviation programs; initiatives to create food security; and laws related to access to land and water. Discussions revealed the alienation of small and marginal farmers, landless laborers, and artisans from their livelihoods and survival strategies for these disenfranchised groups. The design of drought eradication and water conservation programs did not permit women and men working at construction sites to have access to the program assets. Case studies revealed situations in which women won the right of access to community water and then negotiated for land in lease. The women used landowners to negotiate credit and access development program assets, but normal channels of the National Bank of Agricultural Research and Development could have provided these benefits. Participants discussed how governments can be held accountable and how public funds could be used to revamp poverty alleviation and asset creation programs. All agreed that macrolevel development should give priority to agricultural development and legal constraints or problems. Five follow-up activities are identified.

  3. High security chaotic multiple access scheme for visible light communication systems with advanced encryption standard interleaving

    NASA Astrophysics Data System (ADS)

    Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng

    2016-06-01

    Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.

  4. 9 CFR 121.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Restricting access to select agents and toxins; security risk assessments. 121.10 Section 121.10 Animals and Animal Products ANIMAL AND... intelligence agency of committing a crime set forth in 18 U.S.C. 2332b(g)(5); knowing involvement with...

  5. Securing TCP/IP and Dial-up Access to Administrative Data.

    ERIC Educational Resources Information Center

    Conrad, L. Dean

    1992-01-01

    This article describes Arizona State University's solution to security risk inherent in general access systems such as TCP/IP (Transmission Control Protocol/INTERNET Protocol). Advantages and disadvantages of various options are compared, and the process of selecting a log-on authentication approach involving generation of a different password at…

  6. 47 CFR 76.1204 - Availability of equipment performing conditional access or security functions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... security functions. (a)(1) A multichannel video programming distributor that utilizes navigation devices to... access functions of such devices. Commencing on July 1, 2007, no multichannel video programming... requirement shall not apply to a multichannel video programming distributor that supports the active use...

  7. Secure wide area network access to CMS analysis data using the Lustre filesystem

    NASA Astrophysics Data System (ADS)

    Bourilkov, D.; Avery, P.; Cheng, M.; Fu, Y.; Kim, B.; Palencia, J.; Budden, R.; Benninger, K.; Rodriquez, J. L.; Dilascio, J.; Dykstra, D.; Seenu, N.

    2012-12-01

    This paper reports the design and implementation of a secure, wide area network (WAN), distributed filesystem by the ExTENCI project (Extending Science Through Enhanced National CyberInfrastructure), based on the Lustre filesystem. The system is used for remote access to analysis data from the Compact Muon Solenoid (CMS) experiment at the Large Hadron Collider (LHC), and from the Lattice Quantum ChromoDynamics (LQCD) project. Security is provided by Kerberos authentication and authorization with additional fine grained control based on Lustre ACLs (Access Control List) and quotas. We investigate the impact of using various Kerberos security flavors on the I/O rates of CMS applications on client nodes reading and writing data to the Lustre filesystem, and on LQCD benchmarks. The clients can be real or virtual nodes. We are investigating additional options for user authentication based on user certificates.

  8. Productivity Analysis of Public and Private Airports: A Causal Investigation

    NASA Technical Reports Server (NTRS)

    Vasigh, Bijan; Gorjidooz, Javad

    2007-01-01

    Around the world, airports are being viewed as enterprises, rather than public services, which are expected to be managed efficiently and provide passengers with courteous customer services. Governments are, increasingly, turning to the private sectors for their efficiency in managing the operation, financing, and development, as well as providing security for airports. Operational and financial performance evaluation has become increasingly important to airport operators due to recent trends in airport privatization. Assessing performance allows the airport operators to plan for human resources and capital investment as efficiently as possible. Productivity measurements may be used as comparisons and guidelines in strategic planning, in the internal analysis of operational efficiency and effectiveness, and in assessing the competitive position of an airport in transportation industry. The primary purpose of this paper is to investigate the operational and financial efficiencies of 22 major airports in the United States and Europe. These airports are divided into three groups based on private ownership (7 British Airport Authority airports), public ownership (8 major United States airports), and a mix of private and public ownership (7 major European Union airports. The detail ownership structures of these airports are presented in Appendix A. Total factor productivity (TFP) model was utilized to measure airport performance in terms of financial and operational efficiencies and to develop a benchmarking tool to identify the areas of strength and weakness. A regression model was then employed to measure the relationship between TFP and ownership structure. Finally a Granger causality test was performed to determine whether ownership structure is a Granger cause of TFP. The results of the analysis presented in this paper demonstrate that there is not a significant relationship between airport TFP and ownership structure. Airport productivity and efficiency is

  9. 49 CFR 1546.213 - Access to cargo: Security threat assessments for cargo personnel in the United States.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND... 49 Transportation 9 2010-10-01 2010-10-01 false Access to cargo: Security threat assessments for... certain functions related to the transportation, dispatch or security of cargo for transport on...

  10. 49 CFR 1544.228 - Access to cargo and cargo screening: Security threat assessments for cargo personnel in the...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION... 49 Transportation 9 2010-10-01 2010-10-01 false Access to cargo and cargo screening: Security... aircraft; or who performs certain functions related to the transportation, dispatch, or security of...

  11. 49 CFR 1544.228 - Access to cargo and cargo screening: Security threat assessments for cargo personnel in the...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION... 49 Transportation 9 2011-10-01 2011-10-01 false Access to cargo and cargo screening: Security... aircraft; or who performs certain functions related to the transportation, dispatch, or security of...

  12. 49 CFR 1546.213 - Access to cargo: Security threat assessments for cargo personnel in the United States.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND... 49 Transportation 9 2013-10-01 2013-10-01 false Access to cargo: Security threat assessments for... certain functions related to the transportation, dispatch or security of cargo for transport on...

  13. 49 CFR 1544.228 - Access to cargo and cargo screening: Security threat assessments for cargo personnel in the...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION... 49 Transportation 9 2014-10-01 2014-10-01 false Access to cargo and cargo screening: Security... aircraft; or who performs certain functions related to the transportation, dispatch, or security of...

  14. 49 CFR 1544.228 - Access to cargo and cargo screening: Security threat assessments for cargo personnel in the...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION... 49 Transportation 9 2013-10-01 2013-10-01 false Access to cargo and cargo screening: Security... aircraft; or who performs certain functions related to the transportation, dispatch, or security of...

  15. 49 CFR 1546.213 - Access to cargo: Security threat assessments for cargo personnel in the United States.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND... 49 Transportation 9 2011-10-01 2011-10-01 false Access to cargo: Security threat assessments for... certain functions related to the transportation, dispatch or security of cargo for transport on...

  16. 49 CFR 1544.228 - Access to cargo and cargo screening: Security threat assessments for cargo personnel in the...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION... 49 Transportation 9 2012-10-01 2012-10-01 false Access to cargo and cargo screening: Security... aircraft; or who performs certain functions related to the transportation, dispatch, or security of...

  17. 49 CFR 1546.213 - Access to cargo: Security threat assessments for cargo personnel in the United States.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND... 49 Transportation 9 2012-10-01 2012-10-01 false Access to cargo: Security threat assessments for... certain functions related to the transportation, dispatch or security of cargo for transport on...

  18. 49 CFR 1546.213 - Access to cargo: Security threat assessments for cargo personnel in the United States.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND... 49 Transportation 9 2014-10-01 2014-10-01 false Access to cargo: Security threat assessments for... certain functions related to the transportation, dispatch or security of cargo for transport on...

  19. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1977-04-05

    diversions. Perhaps the best evidence of the effectiveness of airline and airport security measures is the number of hijackings and related crimes prevented...airports. Consideration is being given to include a provision in the airport security regulation which would prohibit the introduction of...Security Program. A complete revision of the regulation that established basic airport security requirements is currently underway. One of the more

  20. Catheter Securement Systems for Peripherally Inserted and Nontunneled Central Vascular Access Devices

    PubMed Central

    Krenik, Karen M.; Smith, Graham E.

    2016-01-01

    Sutureless catheter securement systems are intended to eliminate risks associated with sutures. The clinical acceptability of a novel system was investigated compared with the current method of securement for peripherally inserted central catheters (19 facilities using StatLock or sutures) or nontunneled central vascular access devices (3 facilities using StatLock or sutures or HubGuard + Sorbaview Shield). More than 94% of respondents rated the novel system as same, better, or much better than their current product. More than 82% of respondents were willing to replace their current system with the new one. PMID:27379679

  1. An efficient and secure attribute based signcryption scheme with LSSS access structure.

    PubMed

    Hong, Hanshu; Sun, Zhixin

    2016-01-01

    Attribute based encryption (ABE) and attribute based signature (ABS) provide flexible access control with authentication for data sharing between users, but realizing both functions will bring about too much computation burden. In this paper, we combine the advantages of CP-ABE with ABS and propose a ciphertext policy attribute based signcryption scheme. In our scheme, only legal receivers can decrypt the ciphertext and verify the signature signed by data owner. Furthermore, we use linear secret sharing scheme instead of tree structure to avoid the frequent calls of recursive algorithm. By security and performance analysis, we prove that our scheme is secure as well as gains higher efficiency.

  2. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1977-10-31

    searches. Perhaps the best evidence of the effectiveness of airline and airport security measures is the number of hijackings and related crimes...revision of the regulation that established basic airport security requirements is currently underway. One of the more significant revisions under study... airport security procedures cannot be determined with certainty. Nowever, the number of firearms detected at passenger screening points under suspicious

  3. The climate sensitivity of food security in Mali - a historical perspective on availability and access dimensions

    NASA Astrophysics Data System (ADS)

    Giannini, A.; Krishnamurthy, P. K.; Cousin, R.; Choularton, R. J.

    2011-12-01

    We present results based on an analysis of a 2005 livelihood survey of ~2000 rural households in ~200 villages scattered across Mali, a sparsely populated, large land-locked country in West Africa, to elucidate the role of climate variability and change in shaping availability and access dimensions of food security. The Comprehensive Food Security Vulnerability Analysis is a recurrent survey carried out by the World Food Programme and in-country partners to map out nutritional and socio-economic status during normal (~food secure) conditions in the hope of understanding underlying cause(s) and prevent the next food security crisis. We set the spatial characterization of food security that emerges from the CFSVA against the background of a varying climate, on intra-seasonal, interannual and multi-decadal time scales: through elucidation of the influence of climate on agricultural production we arrive at an interpretation of structural and conjunctural events affecting food security. We conclude with a discussion of possible interventions to reduce vulnerability.

  4. Security analysis and improvements of authentication and access control in the Internet of Things.

    PubMed

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-08-13

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  5. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

    PubMed Central

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  6. Efforts to secure universal access to HIV/AIDS treatment: a comparison of BRICS countries.

    PubMed

    Sun, Jing; Boing, Alexandra Crispim; Silveira, Marysabel P T; Bertoldi, Andréa D; Ziganshina, Liliya E; Khaziakhmetova, Veronica N; Khamidulina, Rashida M; Chokshi, Maulik R; McGee, Shelley; Suleman, Fatima

    2014-02-01

    This article illustrates how the BRICS countries have been building their focused leadership, making important high level commitment and national policy changes, and improving their health systems, in addressing the HIV/AIDS epidemics in respective settings. Specific aspects are focused on efforts of creating public provisions to secure universal access to ARVs from the aspects of active responsive system and national program, health system strengthening, fostering local production of ARVs, supply chain management, and information system strengthening. Challenges in each BRICS country are analyzed respectively. The most important contributors to the success of response to HIV/AIDS include: creating legal basis for healthcare as a fundamental human right; political commitment to necessary funding for universal access and concrete actions to secure equal quality care; comprehensive system to secure demands that all people in need are capable of accessing prevention, treatment and care; active community involvement; decentralization of the management system considering the local settings; integration of treatment and prevention; taking horizontal approach to strengthen health systems; fully use of the TRIPS flexibility; and regular monitoring and evaluation to serve evidence based decision making.

  7. Security of social network credentials for accessing course portal: Users' experience

    NASA Astrophysics Data System (ADS)

    Katuk, Norliza; Fong, Choo Sok; Chun, Koo Lee

    2015-12-01

    Social login (SL) has recently emerged as a solution for single sign-on (SSO) within the web and mobile environments. It allows users to use their existing social network credentials (SNC) to login to third party web applications without the need to create a new identity in the intended applications' database. Although it has been used by many web application providers, its' applicability in accessing learning materials is not yet fully investigated. Hence, this research aims to explore users' (i.e., instructors' and students') perception and experience on the security of SL for accessing learning contents. A course portal was developed for students at a higher learning institution and it provides two types of user authentications (i) traditional user authentication, and (ii) SL facility. Users comprised instructors and students evaluated the login facility of the course portal through a controlled lab experimental study following the within-subject design. The participants provided their feedback in terms of the security of SL for accessing learning contents. The study revealed that users preferred to use SL over the traditional authentication, however, they concerned on the security of SL and their privacy.

  8. 78 FR 38069 - Expansion of Global Entry to Additional Airports

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-25

    ... SECURITY U.S. Customs and Border Protection Expansion of Global Entry to Additional Airports AGENCY: U.S... airports. This document announces the expansion of the program to include eight additional designated... the Federal Register and post the information on the Web site http://www.globalentry.gov ....

  9. 17 CFR 256.310 - Aircraft and airport equipment.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Aircraft and airport equipment... UTILITY HOLDING COMPANY ACT OF 1935 Service Company Property Accounts § 256.310 Aircraft and airport equipment. This account shall include the delivered cost of all service company owned aircraft...

  10. 17 CFR 256.310 - Aircraft and airport equipment.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Aircraft and airport equipment... UTILITY HOLDING COMPANY ACT OF 1935 Service Company Property Accounts § 256.310 Aircraft and airport equipment. This account shall include the delivered cost of all service company owned aircraft...

  11. Inguinal Hernia and Airport Scanners: An Emerging Indication for Repair?

    PubMed Central

    Cawich, Shamir O.; Maharaj, Ravi; Dan, Dilip

    2013-01-01

    The use of advanced imaging technology at international airports is increasing in popularity as a corollary to heightened security concerns across the globe. Operators of airport scanners should be educated about common medical disorders such as inguinal herniae in order to avoid unnecessary harassment of travelers since they will encounter these with increasing frequency. PMID:24368923

  12. Airport Choice in Sao Paulo Metropolitan Area: An Application of the Conditional Logit Model

    NASA Technical Reports Server (NTRS)

    Moreno, Marcelo Baena; Muller, Carlos

    2003-01-01

    Using the conditional LOGIT model, this paper addresses the airport choice in the Sao Paulo Metropolitan Area. In this region, Guarulhos International Airport (GRU) and Congonhas Airport (CGH) compete for passengers flying to several domestic destinations. The airport choice is believed to be a result of the tradeoff passengers perform considering airport access characteristics, airline level of service characteristics and passenger experience with the analyzed airports. It was found that access time to the airports better explain the airport choice than access distance, whereas direct flight frequencies gives better explanation to the airport choice than the indirect (connections and stops) and total (direct plus indirect) flight frequencies. Out of 15 tested variables, passenger experience with the analyzed airports was the variable that best explained the airport choice in the region. Model specifications considering 1, 2 or 3 variables were tested. The model specification most adjusted to the observed data considered access time, direct flight frequencies in the travel period (morning or afternoon peak) and passenger experience with the analyzed airports. The influence of these variables was therefore analyzed across market segments according to departure airport and flight duration criteria. The choice of GRU (located neighboring Sao Paulo city) is not well explained by the rationality of access time economy and the increase of the supply of direct flight frequencies, while the choice of CGH (located inside Sao Paulo city) is. Access time was found to be more important to passengers flying shorter distances while direct flight frequencies in the travel period were more significant to those flying longer distances. Keywords: Airport choice, Multiple airport region, Conditional LOGIT model, Access time, Flight frequencies, Passenger experience with the analyzed airports, Transportation planning

  13. New Advanced Technologies to Provide Decentralised and Secure Access to Medical Records: Case Studies in Oncology

    PubMed Central

    Quantin, Catherine; Coatrieux, Gouenou; Allaert, François André; Fassa, Maniane; Bourquard, Karima; Boire, Jean-Yves; de Vlieger, Paul; Maigne, Lydia; Breton, Vincent

    2009-01-01

    The main problem for health professionals and patients in accessing information is that this information is very often distributed over many medical records and locations. This problem is particularly acute in cancerology because patients may be treated for many years and undergo a variety of examinations. Recent advances in technology make it feasible to gain access to medical records anywhere and anytime, allowing the physician or the patient to gather information from an “ephemeral electronic patient record”. However, this easy access to data is accompanied by the requirement for improved security (confidentiality, traceability, integrity, ...) and this issue needs to be addressed. In this paper we propose and discuss a decentralised approach based on recent advances in information sharing and protection: Grid technologies and watermarking methodologies. The potential impact of these technologies for oncology is illustrated by the examples of two experimental cases: a cancer surveillance network and a radiotherapy treatment plan. It is expected that the proposed approach will constitute the basis of a future secure “google-like” access to medical records. PMID:19718446

  14. An end-to-end secure patient information access card system.

    PubMed

    Alkhateeb, A; Singer, H; Yakami, M; Takahashi, T

    2000-03-01

    The rapid development of the Internet and the increasing interest in Internet-based solutions has promoted the idea of creating Internet-based health information applications. This will force a change in the role of IC cards in healthcare card systems from a data carrier to an access key medium. At the Medical Informatics Department of Kyoto University Hospital we are developing a smart card patient information project where patient databases are accessed via the Internet. Strong end-to-end data encryption is performed via Secure Socket Layers, transparent to transmit patient information. The smart card is playing the crucial role of access key to the database: user authentication is performed internally without ever revealing the actual key. For easy acceptance by healthcare professionals, the user interface is integrated as a plug-in for two familiar Web browsers, Netscape Navigator and MS Internet Explorer.

  15. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1981-04-15

    on item were processed through the screening system daily. The airline and airport security measures developed continue to provide increased safety...United States or Puerto Rico. None of these 16 hijackings resulted from insufficient airport security measures or a breakdown in the FAA-approved airport ... airport security programs is conducted at the Transportation Safety Institute in Oklahoma City, Oklahoma. The course provides in-depth coverage of civil

  16. To amend title 49, United States Code, to direct the Assistant Secretary of Homeland Security (Transportation Security Administration) to transfer unclaimed money recovered at airport security checkpoints to United Service Organizations, Incorporated, and for other purposes.

    THOMAS, 111th Congress

    Rep. Miller, Jeff [R-FL-1

    2009-04-30

    05/26/2009 Referred to the Subcommittee on Transportation Security and Infrastructure Protection. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  17. A secure WDM ring access network employing silicon micro-ring based remote node

    NASA Astrophysics Data System (ADS)

    Sung, Jiun-Yu; Chow, Chi-Wai; Yeh, Chien-Hung; Xu, Ke; Hsu, Chin-Wei; Su, Hong-Quan; Tsang, Hon-Ki

    2014-08-01

    A secure and scalable wavelength-division-multiplexing (WDM) ring-based access network is proposed and demonstrated using proof-of-concept experiments. In the remote node (RN), wavelength hopping for specific optical networking unit (ONU) is deployed by using silicon micro-ring resonators (SMR). Using silicon-based devices could be cost-effective for the cost-sensitive access network. Hence the optical physical layer security is introduced. The issues of denial of service (DOS) attacks, eavesdropping and masquerading can be made more difficult in the proposed WDM ring-based access network. Besides, the SMRs with different dropped wavelengths can be cascaded, such that the signals pass through the preceding SMRs can be dropped by a succeeding SMR. This can increase the scalability of the RN for supporting more ONUs for future upgrade. Here, error-free 10 Gb/s downlink and 1.25 Gb/s uplink transmission are demonstrated to show the feasibility of the proposed network.

  18. 47 CFR Appendix B to Part 64 - Priority Access Service (PAS) for National Security and Emergency Preparedness (NSEP)

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Security and Emergency Preparedness (NSEP) B Appendix B to Part 64 Telecommunication FEDERAL COMMUNICATIONS.... 64, App. B Appendix B to Part 64—Priority Access Service (PAS) for National Security and Emergency... service (CMRS) networks. Under section 706 of the Communications Act, this authority may be superseded...

  19. 47 CFR Appendix B to Part 64 - Priority Access Service (PAS) for National Security and Emergency Preparedness (NSEP)

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Security and Emergency Preparedness (NSEP) B Appendix B to Part 64 Telecommunication FEDERAL COMMUNICATIONS.... 64, App. B Appendix B to Part 64—Priority Access Service (PAS) for National Security and Emergency... service (CMRS) networks. Under section 706 of the Communications Act, this authority may be superseded...

  20. 47 CFR Appendix B to Part 64 - Priority Access Service (PAS) for National Security and Emergency Preparedness (NSEP)

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Security and Emergency Preparedness (NSEP) B Appendix B to Part 64 Telecommunication FEDERAL COMMUNICATIONS.... 64, App. B Appendix B to Part 64—Priority Access Service (PAS) for National Security and Emergency... service (CMRS) networks. Under section 706 of the Communications Act, this authority may be superseded...

  1. 47 CFR Appendix B to Part 64 - Priority Access Service (PAS) for National Security and Emergency Preparedness (NSEP)

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Security and Emergency Preparedness (NSEP) B Appendix B to Part 64 Telecommunication FEDERAL COMMUNICATIONS.... 64, App. B Appendix B to Part 64—Priority Access Service (PAS) for National Security and Emergency... service (CMRS) networks. Under section 706 of the Communications Act, this authority may be superseded...

  2. New MagViz Airport Liquid Analysis System Undergoes Testing

    SciTech Connect

    2008-12-18

    LOS ALAMOS, New Mexico, December 16, 2008—An innovative application of a technology first used for medical imaging may enhance airport security if Los Alamos National Laboratory scientists are successful. Los Alamos technologists have adapted Magnetic Res

  3. Building secure wireless access point based on certificate authentication and firewall captive portal

    NASA Astrophysics Data System (ADS)

    Soewito, B.; Hirzi

    2014-03-01

    Wireless local area network or WLAN more vulnerability than wired network even though WLAN has many advantages over wired. Wireless networks use radio transmissions to carry data between end users and access point. Therefore, it is possible for someone to sit in your office building's lobby or parking lot or parking lot to eavesdrop on the wireless network communication. This paper discussed securing wires local area network used WPA2 Enterprise based PEAP MS-CHAP and Captive portal firewall. We also divided the network for employer and visitor to increase the level of security. Our experiment showed that the WLAN could be broken using the attacker tool such as airodump, aireply, and aircrack.

  4. Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program

    DTIC Science & Technology

    1991-02-01

    enforcement support for airline and airport security measures. Airline passengers, as the ultimate beneficiaries of the security program. pay for the...environment for these air carriers. Airport security programs are designed to meet the threat to the specific airport. Of the 4(02 airports. 18...essential to many passengers. " FAA is currently reviewing Parts 107 and 108 of the Federal Aviation Regulations, covering airport security and airplane

  5. Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program

    DTIC Science & Technology

    1988-11-01

    secure Zround environment and for providing local law enforcement support for airline and airport security measures. Finally, the passengers, the...operating environment for these air carriers. Airport security programs are designed to meet the threat to the specific airport. Of the 402 airports...assistance during this project. Responding to urgent requests from the Government of Liberia for onsite training of its airport security forces, FAA

  6. Novel secure and bandwidth efficient optical code division multiplexed system for future access networks

    NASA Astrophysics Data System (ADS)

    Singh, Simranjit

    2016-12-01

    In this paper, a spectrally coded optical code division multiple access (OCDMA) system using a hybrid modulation scheme has been investigated. The idea is to propose an effective approach for simultaneous improvement of the system capacity and security. Data formats, NRZ (non-return to zero), DQPSK (differential quadrature phase shift keying), and PoISk (polarisation shift keying) are used to get the orthogonal modulated signal. It is observed that the proposed hybrid modulation provides efficient utilisation of bandwidth, increases the data capacity and enhances the data confidentiality over existing OCDMA systems. Further, the proposed system performance is compared with the current state-of-the-art OCDMA schemes.

  7. The experience of living with sensory hyperreactivity-accessibility, financial security, and social relationships.

    PubMed

    Söderholm, Anna; Söderberg, Anna; Nordin, Steven

    2011-08-01

    Odor intolerance is a frequently reported problem, predominantly among women. Our purpose was to illuminate how individuals living with sensory hyperreactivity (SHR; a form of odor intolerance) experience its impact on accessibility, financial security, and social relationships. Data were collected by having 12 women with SHR write descriptive texts. These texts were analyzed with qualitative content analysis. Six themes were identified: Being limited in participating in society, being forced to behave incompatibly with one's personality, experiencing lack of understanding and respect from others, experiencing insecurity, being dependent on others, and being forced to choose between the plague and cholera.

  8. 14 CFR 161.11 - Identification of land uses in airport noise study area.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... noise study area. 161.11 Section 161.11 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRPORTS NOTICE AND APPROVAL OF AIRPORT NOISE AND ACCESS RESTRICTIONS General Provisions § 161.11 Identification of land uses in airport noise study area. For...

  9. 14 CFR 161.11 - Identification of land uses in airport noise study area.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... noise study area. 161.11 Section 161.11 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRPORTS NOTICE AND APPROVAL OF AIRPORT NOISE AND ACCESS RESTRICTIONS General Provisions § 161.11 Identification of land uses in airport noise study area. For...

  10. 14 CFR 161.11 - Identification of land uses in airport noise study area.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... noise study area. 161.11 Section 161.11 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRPORTS NOTICE AND APPROVAL OF AIRPORT NOISE AND ACCESS RESTRICTIONS General Provisions § 161.11 Identification of land uses in airport noise study area. For...

  11. 76 FR 20570 - Safety Enhancements, Certification of Airports; Reopening of Comment Period

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-13

    ... Airports; Reopening of Comment Period AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of... February 1, 2011, to establish minimum standards for training of personnel who access the airport non...: Kenneth Langert, AAS-300, Office of Airports, Federal Aviation Administration, 800 Independence Avenue,...

  12. Application of a multilevel access model in the development of a security infrastructure for a clinical information system.

    PubMed Central

    Henkind, S. J.; Orlowski, J. M.; Skarulis, P. C.

    1993-01-01

    A number of security models including the military model, the Institute of Medicine model, and the matrix model have been utilized, or proposed, for protecting clinical information systems. These models have a number of limitations, however, and of particular concern, they focus on security as opposed to access. In this paper we describe a multilevel access model which can overcome some of these limitations. This model is currently being utilized in the development of an improved security infrastructure for a clinical information system. PMID:8130553

  13. Access and privacy rights using web security standards to increase patient empowerment.

    PubMed

    Falcão-Reis, Filipa; Costa-Pereira, Altamiro; Correia, Manuel E

    2008-01-01

    Electronic Health Record (EHR) systems are becoming more and more sophisticated and include nowadays numerous applications, which are not only accessed by medical professionals, but also by accounting and administrative personnel. This could represent a problem concerning basic rights such as privacy and confidentiality. The principles, guidelines and recommendations compiled by the OECD protection of privacy and trans-border flow of personal data are described and considered within health information system development. Granting access to an EHR should be dependent upon the owner of the record; the patient: he must be entitled to define who is allowed to access his EHRs, besides the access control scheme each health organization may have implemented. In this way, it's not only up to health professionals to decide who have access to what, but the patient himself. Implementing such a policy is walking towards patient empowerment which society should encourage and governments should promote. The paper then introduces a technical solution based on web security standards. This would give patients the ability to monitor and control which entities have access to their personal EHRs, thus empowering them with the knowledge of how much of his medical history is known and by whom. It is necessary to create standard data access protocols, mechanisms and policies to protect the privacy rights and furthermore, to enable patients, to automatically track the movement (flow) of their personal data and information in the context of health information systems. This solution must be functional and, above all, user-friendly and the interface should take in consideration some heuristics of usability in order to provide the user with the best tools. The current official standards on confidentiality and privacy in health care, currently being developed within the EU, are explained, in order to achieve a consensual idea of the guidelines that all member states should follow to transfer

  14. Security Annex Concept of Operations for the Next Generation Air Transportation System, Version 2.0

    DTIC Science & Technology

    2007-06-13

    Beverage Security .......................................... 24 4.5 AIRPORT SECURITY CONTROL CENTER... security protection plan based on sound practice and pertinent airport security design. Assessments and priorities as to probabilities of attack...with various measures. Selected prioritization strategies to enhance the robustness of Airport security include an appropriate mix of people

  15. Resource reliability, accessibility and governance: pillars for managing water resources to achieve water security in Nepal

    NASA Astrophysics Data System (ADS)

    Biggs, E. M.; Duncan, J.; Atkinson, P.; Dash, J.

    2013-12-01

    As one of the world's most water-abundant countries, Nepal has plenty of water yet resources are both spatially and temporally unevenly distributed. With a population heavily engaged in subsistence farming, whereby livelihoods are entirely dependent on rain-fed agriculture, changes in freshwater resources can substantially impact upon survival. The two main sources of water in Nepal come from monsoon precipitation and glacial runoff. The former is essential for sustaining livelihoods where communities have little or no access to perennial water resources. Much of Nepal's population live in the southern Mid-Hills and Terai regions where dependency on the monsoon system is high and climate-environment interactions are intricate. Any fluctuations in precipitation can severely affect essential potable resources and food security. As the population continues to expand in Nepal, and pressures build on access to adequate and clean water resources, there is a need for institutions to cooperate and increase the effectiveness of water management policies. This research presents a framework detailing three fundamental pillars for managing water resources to achieve sustainable water security in Nepal. These are (i) resource reliability; (ii) adequate accessibility; and (iii) effective governance. Evidence is presented which indicates that water resources are adequate in Nepal to sustain the population. In addition, aspects of climate change are having less impact than previously perceived e.g. results from trend analysis of precipitation time-series indicate a decrease in monsoon extremes and interannual variation over the last half-century. However, accessibility to clean water resources and the potential for water storage is limiting the use of these resources. This issue is particularly prevalent given the heterogeneity in spatial and temporal distributions of water. Water governance is also ineffective due to government instability and a lack of continuity in policy

  16. Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection

    PubMed Central

    Liu, Changyu; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches. PMID:25147840

  17. A Framework for Federated Two-Factor Authentication Enabling Cost-Effective Secure Access to Distributed Cyberinfrastructure

    SciTech Connect

    Ezell, Matthew A; Rogers, Gary L; Peterson, Gregory D.

    2012-01-01

    As cyber attacks become increasingly sophisticated, the security measures used to mitigate the risks must also increase in sophistication. One time password (OTP) systems provide strong authentication because security credentials are not reusable, thus thwarting credential replay attacks. The credential changes regularly, making brute-force attacks significantly more difficult. In high performance computing, end users may require access to resources housed at several different service provider locations. The ability to share a strong token between multiple computing resources reduces cost and complexity. The National Science Foundation (NSF) Extreme Science and Engineering Discovery Environment (XSEDE) provides access to digital resources, including supercomputers, data resources, and software tools. XSEDE will offer centralized strong authentication for services amongst service providers that leverage their own user databases and security profiles. This work implements a scalable framework built on standards to provide federated secure access to distributed cyberinfrastructure.

  18. Improving the Security of the U.S. Aeronautical Domain: Adopting an Intelligence-Led, Risk-Based Strategy and Partnership

    DTIC Science & Technology

    2010-12-01

    democratically governed countries have achieved success in the same areas. 15. NUMBER OF PAGES 149 14. SUBJECT TERMS airport security , aviation...66 3. Commonwealth of Australia Aviation Security: Major Themes...66 a. Airport Security Command...Commercial Airports by Airport Security Category as of April 2006 (From GAO, 2007

  19. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  20. Volcanic hazards to airports

    USGS Publications Warehouse

    Guffanti, M.; Mayberry, G.C.; Casadevall, T.J.; Wunderman, R.

    2009-01-01

    Volcanic activity has caused significant hazards to numerous airports worldwide, with local to far-ranging effects on travelers and commerce. Analysis of a new compilation of incidents of airports impacted by volcanic activity from 1944 through 2006 reveals that, at a minimum, 101 airports in 28 countries were affected on 171 occasions by eruptions at 46 volcanoes. Since 1980, five airports per year on average have been affected by volcanic activity, which indicates that volcanic hazards to airports are not rare on a worldwide basis. The main hazard to airports is ashfall, with accumulations of only a few millimeters sufficient to force temporary closures of some airports. A substantial portion of incidents has been caused by ash in airspace in the vicinity of airports, without accumulation of ash on the ground. On a few occasions, airports have been impacted by hazards other than ash (pyroclastic flow, lava flow, gas emission, and phreatic explosion). Several airports have been affected repeatedly by volcanic hazards. Four airports have been affected the most often and likely will continue to be among the most vulnerable owing to continued nearby volcanic activity: Fontanarossa International Airport in Catania, Italy; Ted Stevens Anchorage International Airport in Alaska, USA; Mariscal Sucre International Airport in Quito, Ecuador; and Tokua Airport in Kokopo, Papua New Guinea. The USA has the most airports affected by volcanic activity (17) on the most occasions (33) and hosts the second highest number of volcanoes that have caused the disruptions (5, after Indonesia with 7). One-fifth of the affected airports are within 30 km of the source volcanoes, approximately half are located within 150 km of the source volcanoes, and about three-quarters are within 300 km; nearly one-fifth are located more than 500 km away from the source volcanoes. The volcanoes that have caused the most impacts are Soufriere Hills on the island of Montserrat in the British West Indies

  1. Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1987-12-31

    This report also provides data on the initiatives being implemented as a result of the review of domestic airport security by the Secretary’s Safety...enforcement support for airline and airport security measures. Finally, the passengers-the ultimate beneficiaries of the security program--pay for...of these airports is required to implement a security program which provides a secure operating environment for these air carriers. Airport security programs

  2. [National pharmaceutical policy in Colombia and social security reform: access and rational use of medicines].

    PubMed

    Mejia Restrepo, Samuel; Velez Arango, Alba Lucía; Buritica Arboleda, Olga Clemencia; Arango Mejia, María Cristina; Rio Gomez, Jaime Alberto del

    2002-01-01

    Based on the new social security system in Colombia (1993), which establishes equity and mandatory care as the basis for public health care provision, the authors analyze whether the formulation and implementation of pharmaceutical policy promote accessibility, availability, and rational use of medicines, thereby contributing to equity in health. Two approaches were used: a macro approach centered on the legal framework and various actors in the reform process and a micro approach related to the processes and results in the drug supply system. The authors studied the legal instruments backing the country's pharmaceutical policy and evaluated their application, using indicators and a specific disease (diabetes mellitus) as a marker. Although there is a legal framework providing the people's right to access health care services and essential medicines, the country lacks a comprehensive pharmaceuticals policy. Most of the institutions experience problems in distributing the medicines listed under the Mandatory Health Plan, a low percentage of medicines is dispensed at zero cost, and a major portion of patients purchase medicines through associations of diabetics or rely on alternative medicine. The study unveiled several obstacles to equity in health care coverage and access to essential medicines.

  3. Benchmark Airport Charges

    NASA Technical Reports Server (NTRS)

    de Wit, A.; Cohn, N.

    1999-01-01

    The Netherlands Directorate General of Civil Aviation (DGCA) commissioned Hague Consulting Group (HCG) to complete a benchmark study of airport charges at twenty eight airports in Europe and around the world, based on 1996 charges. This study followed previous DGCA research on the topic but included more airports in much more detail. The main purpose of this new benchmark study was to provide insight into the levels and types of airport charges worldwide and into recent changes in airport charge policy and structure. This paper describes the 1996 analysis. It is intended that this work be repeated every year in order to follow developing trends and provide the most up-to-date information possible.

  4. Airline Security and a Strategy for Change

    DTIC Science & Technology

    2006-01-15

    profit. As a result, today’s airport security systems are not as technologically advanced as needed. In short, terrorists managed to defeat the...efficient method of securing the skies. The desired end state is known. Americans want an airport security system that allows the safe conduct of air...issue 34 p 3. 35 Ibid., 4. 36 Sara Goo, “Registered Traveler Test Ends Inconclusively; Airport Security Scheme Lacks Broad Support,” The Washington

  5. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1978-03-31

    regulation that established basic airport security requirements is nearing final rulemaking action. One of the most significant revisions proposed would...prevented or deterred by airline and airport security procedures cannot be determined with certainty. However, the number of firearms detected at passenger...support for airline and airport security measures. And finally, with the inclusion of security costs in the operating expenses of U.S. air

  6. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1985-04-12

    other crimes against civil aviation prevented or deterred by airline and airport security procedures cannot be determined with certainty. However...were prevented from doing so by airline and airport security measures. As noted elsewhere in this report, 1,632 firearms were detected at screening...enforcement sQp:)t’ for airline and airport security measures. Finally, with the inc.asoDr of security costs in airline ticket prices, the passengers

  7. Aviation Security-Related Findings and Recommendations of the 9/11 Commission

    DTIC Science & Technology

    2005-03-30

    appropriations bill (H.R. 4567) as reported included language to limit the federal share for airport security projects to 75% at large and medium hubs and 90...participation and industry involvement. At airports, the local role is defined in the airport security program which is tailored for each airport...carry out this pilot program. The act also authorizes $200 million each year through FY2007 for improved air cargo and airport security related to the

  8. PKI-based secure mobile access to electronic health services and data.

    PubMed

    Kambourakis, G; Maglogiannis, I; Rouskas, A

    2005-01-01

    Recent research works examine the potential employment of public-key cryptography schemes in e-health environments. In such systems, where a Public Key Infrastructure (PKI) is established beforehand, Attribute Certificates (ACs) and public key enabled protocols like TLS, can provide the appropriate mechanisms to effectively support authentication, authorization and confidentiality services. In other words, mutual trust and secure communications between all the stakeholders, namely physicians, patients and e-health service providers, can be successfully established and maintained. Furthermore, as the recently introduced mobile devices with access to computer-based patient record systems are expanding, the need of physicians and nurses to interact increasingly with such systems arises. Considering public key infrastructure requirements for mobile online health networks, this paper discusses the potential use of Attribute Certificates (ACs) in an anticipated trust model. Typical trust interactions among doctors, patients and e-health providers are presented, indicating that resourceful security mechanisms and trust control can be obtained and implemented. The application of attribute certificates to support medical mobile service provision along with the utilization of the de-facto TLS protocol to offer competent confidentiality and authorization services is also presented and evaluated through experimentation, using both the 802.11 WLAN and General Packet Radio Service (GPRS) networks.

  9. Health insurance and access to care among Social Security Disability Insurance beneficiaries during the Medicare waiting period.

    PubMed

    Riley, Gerald F

    2006-01-01

    For most Social Security Disability Insurance (SSDI) beneficiaries, Medicare entitlement begins 24 months after the date of SSDI entitlement. Many may experience poor access to health care during the 24-month waiting period because of a lack of insurance. National Health Interview Survey data for the period 1994-1996 were linked to Social Security and Medicare administrative records to examine health insurance status and access to care during the Medicare waiting period. Twenty-six percent of SSDI beneficiaries reported having no health insurance, with the uninsured reporting many more problems with access to care than insured individuals. Access to health insurance is especially important for people during the waiting period because of their low incomes, poor health, and weak ties to the workforce.

  10. The politics of universal access: the Massachusetts Health Security Act of 1988.

    PubMed

    Goldberger, S A

    1990-01-01

    This article analyzes the passage of an unprecedented state law, promising every resident access to affordable health insurance. The Massachusetts Health Security Act of 1988 was the product of a set of political and financial pressures that had been developing for nearly a decade. Hospital, insurance, and business interests were unable to reach a new accommodation on hospital payment. This logjam created the opportunity for a policy breakthrough, but did not inherently lend itself to progressive reform. It was consumer activism that forced the traditional powers in health policy to address the interests of the uninsured. By imposing a more public-interest agenda on the process, consumers were able to change the configuration of the stalemate, but could not resolve it. The particular terms of the stalemate, however, made possible a new, more aggressive role for state government in health policy. Unable to satisfy their competing interests within a policy framework that had universal access as a goal, traditionally powerful interest groups found themselves increasingly dependent on the state to broker a new agreement. While the many concessions made to these groups are likely to prove to be the bill's undoing, the unraveling of the agreement will not end the story. The same pressures which led to passage of the Massachusetts law and which are now causing other states to act will continue to exert their effect until a more durable solution is found.

  11. Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program

    DTIC Science & Technology

    1989-05-01

    and airport security measures. Finally, the passengers, the ultimate beneficiaries of the security program, pay for the costs of the program through...required to adopt and use a security program which provides a secure operating environment for these air carriers. Airport security programs are designed to...special security requirements. This additional level of security precaution has been effected through changes to the F4A-approved airport security programs

  12. Secure Communications in High Speed Fiber Optical Networks Using Code Division Multiple Access (CDMA) Transmission

    SciTech Connect

    Han, I; Bond, S; Welty, R; Du, Y; Yoo, S; Reinhardt, C; Behymer, E; Sperry, V; Kobayashi, N

    2004-02-12

    This project is focused on the development of advanced components and system technologies for secure data transmission on high-speed fiber optic data systems. This work capitalizes on (1) a strong relationship with outstanding faculty at the University of California-Davis who are experts in high speed fiber-optic networks, (2) the realization that code division multiple access (CDMA) is emerging as a bandwidth enhancing technique for fiber optic networks, (3) the realization that CDMA of sufficient complexity forms the basis for almost unbreakable one-time key transmissions, (4) our concepts for superior components for implementing CDMA, (5) our expertise in semiconductor device processing and (6) our Center for Nano and Microtechnology, which is where the majority of the experimental work was done. Here we present a novel device concept, which will push the limits of current technology, and will simultaneously solve system implementation issues by investigating new state-of-the-art fiber technologies. This will enable the development of secure communication systems for the transmission and reception of messages on deployed commercial fiber optic networks, through the CDMA phase encoding of broad bandwidth pulses. CDMA technology has been developed as a multiplexing technology, much like wavelength division multiplexing (WDM) or time division multiplexing (TDM), to increase the potential number of users on a given communication link. A novel application of the techniques created for CDMA is to generate secure communication through physical layer encoding. Physical layer encoding devices are developed which utilize semiconductor waveguides with fast carrier response times to phase encode spectral components of a secure signal. Current commercial technology, most commonly a spatial light modulator, allows phase codes to be changed at rates of only 10's of Hertz ({approx}25ms response). The use of fast (picosecond to nanosecond) carrier dynamics of semiconductors, as

  13. 76 FR 30822 - Technical Amendment to List of User Fee Airports: Addition of Naples Municipal Airport, Naples, FL

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-27

    ... SECURITY U.S. Customs and Border Protection 19 CFR Part 122 Technical Amendment to List of User Fee..., Department of Homeland Security. ACTION: Final rule; technical amendment. SUMMARY: This document amends the... international or landing rights airports, have been approved by the Commissioner of CBP to receive, for a...

  14. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1978-10-12

    passengers and over one million pieces of carry-on baggage daily. A major revision of the regulation that established basic airport security requirements...Crimes- Prevented - The number of hijacking attempts or other crimes against civil aviation prevented or deterred by airline and airport security procedures...from doing so by airline and airport security procedures. This makes a total of 74 possible hijackings or related crimes that may have been prevented

  15. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1979-04-25

    the airline and airport security measures in effect. Moreover, of the 25 U.S. airline hijackings that occurred over this 6-year period, none was caused...Furthermore, it is estimated that 75 hijackings or related crimes may have been prevented by the airline and airport security measures in effect...system. Moreover, it is estimated that at least 75 hijackings or related crimes may have been prevented by U.S. airline and airport security measures

  16. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1976-09-20

    commerce--a pr per balance appears to exist. Moreover, airline and airport security programs appear to be capable of responding to changes in the nature...Moreover, airline and airport security programs appear to be capable of responding to changes in the nature and level of current and future threats. The...delays and diversions were experienced. Airline and airport security measures continued to afford the necessary level of protection to U.S. air

  17. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1975-10-06

    Results of the passenger screening procedures continue to reflect the success and effec- tiveness of airline and airport security programs. During the...airline and airport security programs. While it is impossible to estimate accurately just how many hijackings and related crimes were prevented, the...attempts might have occurred during 1974 and as many as 25 during the first 6 months of 1975, if current airline and airport security programs had not

  18. Consequences of Slot Transactions on Airport Congestion and Environmental Protection

    NASA Technical Reports Server (NTRS)

    Abeyratne, Ruwantissa I.R.

    2000-01-01

    Recent trends in the liberalization of market access by many commercial airlines have opened the skies to virtually unlimited flights between many countries. However, this liberalization is stultified by the lack of airport capacity to accommodate the many flights that are generated by demand for capacity. Accordingly, the allocation of slots for open skies airlines remain dependent on the expansion and effective management of airport capacity. This article examines the ramifications of slot allocation on traffic peaking at airports and environmental concerns, which may emerge with this activity.

  19. Investigative Operations: Use of Covert Testing to Identify Security Vulnerabilities and Fraud, Waste, and Abuse

    DTIC Science & Technology

    2007-11-14

    including evaluations of controls over radioactive materials and security at America’s borders, airport security , sales of sensitive and surplus...officers. The details of this March 2006 report are classified; however, TSA has authorized this limited discussion. Airport Security Testing Sale of...of covert security vulnerability testing of numerous airports across the country. During these covert tests, our investigators passed through airport

  20. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  1. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  2. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  3. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  4. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  5. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    PubMed

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.

  6. Secure access to patient's health records using SpeechXRays a mutli-channel biometrics platform for user authentication.

    PubMed

    Spanakis, Emmanouil G; Spanakis, Marios; Karantanas, Apostolos; Marias, Kostas

    2016-08-01

    The most commonly used method for user authentication in ICT services or systems is the application of identification tools such as passwords or personal identification numbers (PINs). The rapid development in ICT technology regarding smart devices (laptops, tablets and smartphones) has allowed also the advance of hardware components that capture several biometric traits such as fingerprints and voice. These components are aiming among others to overcome weaknesses and flaws of password usage under the prism of improved user authentication with higher level of security, privacy and usability. To this respect, the potential application of biometrics for secure user authentication regarding access in systems with sensitive data (i.e. patient's data from electronic health records) shows great potentials. SpeechXRays aims to provide a user recognition platform based on biometrics of voice acoustics analysis and audio-visual identity verification. Among others, the platform aims to be applied as an authentication tool for medical personnel in order to gain specific access to patient's electronic health records. In this work a short description of SpeechXrays implementation tool regarding eHealth is provided and analyzed. This study explores security and privacy issues, and offers a comprehensive overview of biometrics technology applications in addressing the e-Health security challenges. We present and describe the necessary requirement for an eHealth platform concerning biometric security.

  7. 7 CFR 331.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...; security risk assessments. 331.10 Section 331.10 Agriculture Regulations of the Department of Agriculture... individual is approved by the Administrator or the HHS Secretary following a security risk assessment by the... risk assessment to the Attorney General. (e) An individual's security risk assessment may be...

  8. 7 CFR 331.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...; security risk assessments. 331.10 Section 331.10 Agriculture Regulations of the Department of Agriculture... individual is approved by the Administrator or the HHS Secretary following a security risk assessment by the... risk assessment to the Attorney General. (e) An individual's security risk assessment may be...

  9. A Cross-Sectional Study of Tobacco Advertising, Promotion, and Sponsorship in Airports across Europe and the United States.

    PubMed

    Soong, Andrea; Navas-Acien, Ana; Pang, Yuanjie; Lopez, Maria Jose; Garcia-Esquinas, Esther; Stillman, Frances A

    2016-09-28

    Tobacco advertising, promotion, and sponsorship (TAPS) bans are effective and are increasingly being implemented in a number of venues and countries, yet the state of TAPS in airports and their effect on airport smoking behavior is unknown. The objective of this study was to evaluate the presence of TAPS in airports across Europe and the US, and to begin to examine the relationship between TAPS and smoking behaviors in airports. We used a cross-sectional study design to observe 21 airports in Europe (11) and the US (10). Data collectors observed points of sale for tobacco products, types of products sold, advertisements and promotions, and branding or logos that appeared in the airport. Tobacco products were sold in 95% of all airports, with significantly more sales in Europe than the US. Advertisements appeared mostly in post-security areas; however, airports with advertisements in pre-security areas had significantly more smokers observed outdoors than airports without advertisements in pre-security areas. Tobacco branding appeared in designated smoking rooms as well as on non-tobacco products in duty free shops. TAPS are widespread in airports in Europe and the US and might be associated with outdoor smoking, though further research is needed to better understand any relationship between the two. This study adds to a growing body of research on tobacco control in air transit and related issues. As smoke-free policies advance, they should include comprehensive TAPS bans that extend to airport facilities.

  10. A Cross-Sectional Study of Tobacco Advertising, Promotion, and Sponsorship in Airports across Europe and the United States

    PubMed Central

    Soong, Andrea; Navas-Acien, Ana; Pang, Yuanjie; Lopez, Maria Jose; Garcia-Esquinas, Esther; Stillman, Frances A.

    2016-01-01

    Tobacco advertising, promotion, and sponsorship (TAPS) bans are effective and are increasingly being implemented in a number of venues and countries, yet the state of TAPS in airports and their effect on airport smoking behavior is unknown. The objective of this study was to evaluate the presence of TAPS in airports across Europe and the US, and to begin to examine the relationship between TAPS and smoking behaviors in airports. We used a cross-sectional study design to observe 21 airports in Europe (11) and the US (10). Data collectors observed points of sale for tobacco products, types of products sold, advertisements and promotions, and branding or logos that appeared in the airport. Tobacco products were sold in 95% of all airports, with significantly more sales in Europe than the US. Advertisements appeared mostly in post-security areas; however, airports with advertisements in pre-security areas had significantly more smokers observed outdoors than airports without advertisements in pre-security areas. Tobacco branding appeared in designated smoking rooms as well as on non-tobacco products in duty free shops. TAPS are widespread in airports in Europe and the US and might be associated with outdoor smoking, though further research is needed to better understand any relationship between the two. This study adds to a growing body of research on tobacco control in air transit and related issues. As smoke-free policies advance, they should include comprehensive TAPS bans that extend to airport facilities. PMID:27690072

  11. Convenient Airports: Point of View of the Passengers

    NASA Technical Reports Server (NTRS)

    Magri, Adival Aparecido, Jr.; Alves, Claudio Jorge Pinto

    2003-01-01

    The competition among airlines or among airports aiming at to increase the demand for its services has been more and more incited. Knowledge the perception of the users for the offered services means to meet the customer's needs and expectations in order either to keep the customer, and therefore keep a significant advantage over competitors. The passenger of the air transportation wants rapidity, security and convenience. Convenience can be translated by comfort that the passenger wants for the price that he can pay. In this paper had been identified. as a result of a survey achieved in six Brazilian airports during 2002, the best indicators in the passenger's perception. These indicators among any others were listed m the handbook of Airports Council International (ACI). Distinctive perceptions were observed among passengers with different travel motivations. This survey had been carried through in the airports of Brasilia, Porto Alegre, Salvador. Fortaleza, Curitiba and Bel6m. Considering this survey we can identified the most attractive airport among them. This work is a way to help improve quality of service, in particular, m these six airports of the Brazilian network. The results should be published and made available to all the parties concerned (airport authority, airlines and service providers) and should lead to corrective action when the passenger is not satisfied with the service.

  12. Integrated Airport Surface Operations

    NASA Technical Reports Server (NTRS)

    Koczo, S.

    1998-01-01

    The current air traffic environment in airport terminal areas experiences substantial delays when weather conditions deteriorate to Instrument Meteorological Conditions (IMC). Research activity at NASA has culminated in the development, flight test and demonstration of a prototype Low Visibility Landing and Surface Operations (LVLASO) system. A NASA led industry team and the FAA developed the system which integrated airport surface surveillance systems, aeronautical data links, DGPS navigation, automation systems, and controller and flight deck displays. The LVLASO system was demonstrated at the Hartsfield-Atlanta International Airport using a Boeing 757-200 aircraft during August, 1997. This report documents the contractors role in this testing particularly in the area of data link and DGPS navigation.

  13. Central venous Access device SeCurement And Dressing Effectiveness (CASCADE) in paediatrics: protocol for pilot randomised controlled trials

    PubMed Central

    Gibson, Victoria; Long, Debbie A; Williams, Tara; Hallahan, Andrew; Mihala, Gabor; Cooke, Marie; Rickard, Claire M

    2016-01-01

    Introduction Paediatric central venous access devices (CVADs) are associated with a 25% incidence of failure. Securement and dressing are strategies used to reduce failure and complication; however, innovative technologies have not been evaluated for their effectiveness across device types. The primary aim of this research is to evaluate the feasibility of launching a full-scale randomised controlled efficacy trial across three CVAD types regarding CVAD securement and dressing, using predefined feasibility criteria. Methods and analysis Three feasibility randomised, controlled trials are to be undertaken at the Royal Children's Hospital and the Lady Cilento Children's Hospital, Brisbane, Australia. CVAD securement and dressing interventions under examination compare current practice with sutureless securement devices, integrated securement dressings and tissue adhesive. In total, 328 paediatric patients requiring a peripherally inserted central catheter (n=100); non-tunnelled CVAD (n=180) and tunnelled CVAD (n=48) to be inserted will be recruited and randomly allocated to CVAD securement and dressing products. Primary outcomes will be study feasibility measured by eligibility, recruitment, retention, attrition, missing data, parent/staff satisfaction and effect size. CVAD failure and complication (catheter-associated bloodstream infection, local infection, venous thrombosis, occlusion, dislodgement and breakage) will be compared between groups. Ethics and dissemination Ethical approval to conduct the research has been obtained. All dissemination will be undertaken using the CONSORT Statement recommendations. Additionally, the results will be sent to the relevant organisations which lead CVAD focused clinical practice guidelines development. Trial registration numbers ACTRN12614001327673; ACTRN12615000977572; ACTRN12614000280606. PMID:27259529

  14. Aviation Security: Vulnerabilities in, and Alternatives for, Preboard Screening Security Operations

    DTIC Science & Technology

    2001-09-25

    establishing the certification program. This regulation is particularly significant because it is to include requirements mandated by the Airport Security Improvement...Assessment of Airport Security Screener Performance and Retention, Sept. 15, 2000. Page 8 GAO-01-1171T Criteria for Assessing Shifting responsibility for...airline and airport security officials to assess each option for reassigning screening responsibility against the key criteria- Specifically, we asked

  15. 77 FR 23598 - Technical Amendment to Cuba Airport List: Addition of Recently Approved Airports

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-20

    ... Dallas/Fort Worth International Airport Fort Lauderdale-Hollywood International Airport Southwest Florida.../Fort Worth International Airport. Fort Lauderdale, Florida Fort Lauderdale-Hollywood...

  16. 8 CFR 234.4 - International airports for entry of aliens.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 8 Aliens and Nationality 1 2013-01-01 2013-01-01 false International airports for entry of aliens. 234.4 Section 234.4 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS DESIGNATION OF PORTS OF ENTRY FOR ALIENS ARRIVING BY CIVIL AIRCRAFT § 234.4 International airports for...

  17. 8 CFR 234.4 - International airports for entry of aliens.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 8 Aliens and Nationality 1 2011-01-01 2011-01-01 false International airports for entry of aliens. 234.4 Section 234.4 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS DESIGNATION OF PORTS OF ENTRY FOR ALIENS ARRIVING BY CIVIL AIRCRAFT § 234.4 International airports for...

  18. 8 CFR 234.4 - International airports for entry of aliens.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false International airports for entry of aliens. 234.4 Section 234.4 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS DESIGNATION OF PORTS OF ENTRY FOR ALIENS ARRIVING BY CIVIL AIRCRAFT § 234.4 International airports for...

  19. 8 CFR 234.4 - International airports for entry of aliens.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 8 Aliens and Nationality 1 2014-01-01 2014-01-01 false International airports for entry of aliens. 234.4 Section 234.4 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS DESIGNATION OF PORTS OF ENTRY FOR ALIENS ARRIVING BY CIVIL AIRCRAFT § 234.4 International airports for...

  20. 8 CFR 234.4 - International airports for entry of aliens.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 8 Aliens and Nationality 1 2012-01-01 2012-01-01 false International airports for entry of aliens. 234.4 Section 234.4 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS DESIGNATION OF PORTS OF ENTRY FOR ALIENS ARRIVING BY CIVIL AIRCRAFT § 234.4 International airports for...

  1. Development of Earthquake Emergency Response Plan for Tribhuvan International Airport, Kathmandu, Nepal

    DTIC Science & Technology

    2013-02-01

    Visual Assessment 37. SME Subject Matter Experts 38. SOP Standard Operating Procedure 39. TIACAO Tribhuvan International Airport Civil Aviation...CAAN, TIA and others. The plan incorporated information, results, and recommendations from Subject Matter Experts ( SME ) from the Federal Highway...Flight Rules (VFR) in daylight and Instrument Flight Rule ( IFR ). A. Restore Airport Perimeter Security B. Restore Flight Operations a

  2. Airport Land Banking.

    DTIC Science & Technology

    1977-08-01

    the Secretary of Transportation to conduct a study with respect to the feasibility, practicability, and cost of land bank planning and development...1977. Airport land banking was studied and analyzed from several different perspectives, including legal, economic, and financial, and the results of this study are reported in this document. (Author)

  3. 7 CFR 331.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...; security risk assessments. 331.10 Section 331.10 Agriculture Regulations of the Department of Agriculture... individual is approved by the Administrator or the HHS Secretary following a security risk assessment by the... risk assessment to the Attorney General. (e) A person with valid approval from the HHS Secretary...

  4. 7 CFR 331.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...; security risk assessments. 331.10 Section 331.10 Agriculture Regulations of the Department of Agriculture... individual is approved by the Administrator or the HHS Secretary following a security risk assessment by the... risk assessment to the Attorney General. (e) A person with valid approval from the HHS Secretary...

  5. Software Tools to Support Research on Airport Departure Planning

    NASA Technical Reports Server (NTRS)

    Carr, Francis; Evans, Antony; Feron, Eric; Clarke, John-Paul

    2003-01-01

    A simple, portable and useful collection of software tools has been developed for the analysis of airport surface traffic. The tools are based on a flexible and robust traffic-flow model, and include calibration, validation and simulation functionality for this model. Several different interfaces have been developed to help promote usage of these tools, including a portable Matlab(TM) implementation of the basic algorithms; a web-based interface which provides online access to automated analyses of airport traffic based on a database of real-world operations data which covers over 250 U.S. airports over a 5-year period; and an interactive simulation-based tool currently in use as part of a college-level educational module. More advanced applications for airport departure traffic include taxi-time prediction and evaluation of "windowing" congestion control.

  6. Research on Quantum Authentication Methods for the Secure Access Control Among Three Elements of Cloud Computing

    NASA Astrophysics Data System (ADS)

    Dong, Yumin; Xiao, Shufen; Ma, Hongyang; Chen, Libo

    2016-12-01

    Cloud computing and big data have become the developing engine of current information technology (IT) as a result of the rapid development of IT. However, security protection has become increasingly important for cloud computing and big data, and has become a problem that must be solved to develop cloud computing. The theft of identity authentication information remains a serious threat to the security of cloud computing. In this process, attackers intrude into cloud computing services through identity authentication information, thereby threatening the security of data from multiple perspectives. Therefore, this study proposes a model for cloud computing protection and management based on quantum authentication, introduces the principle of quantum authentication, and deduces the quantum authentication process. In theory, quantum authentication technology can be applied in cloud computing for security protection. This technology cannot be cloned; thus, it is more secure and reliable than classical methods.

  7. 48 CFR 3004.470 - Security requirements for access to unclassified facilities, Information Technology resources...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Technology resources, and sensitive information. ... ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Safeguarding Classified and Sensitive...

  8. 48 CFR 3004.470 - Security requirements for access to unclassified facilities, Information Technology resources...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Technology resources, and sensitive information. ... ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Safeguarding Classified and Sensitive...

  9. 48 CFR 3004.470 - Security requirements for access to unclassified facilities, Information Technology resources...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Technology resources, and sensitive information. ... ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Safeguarding Classified and Sensitive...

  10. 48 CFR 3004.470 - Security requirements for access to unclassified facilities, Information Technology resources...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Technology resources, and sensitive information. ... ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Safeguarding Classified and Sensitive...

  11. 14 CFR 221.52 - Airport to airport application, accessorial services.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 4 2011-01-01 2011-01-01 false Airport to airport application, accessorial... Charges § 221.52 Airport to airport application, accessorial services. Tariffs shall specify whether or not the fares therein include services in addition to airport-to-airport transportation....

  12. 14 CFR 221.52 - Airport to airport application, accessorial services.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Airport to airport application, accessorial... Charges § 221.52 Airport to airport application, accessorial services. Tariffs shall specify whether or not the fares therein include services in addition to airport-to-airport transportation....

  13. New MagViz Airport Liquid Analysis System Undergoes Testing

    ScienceCinema

    None

    2016-07-12

    LOS ALAMOS, New Mexico, December 16, 2008—An innovative application of a technology first used for medical imaging may enhance airport security if Los Alamos National Laboratory scientists are successful. Los Alamos technologists have adapted Magnetic Res

  14. 47 CFR 76.1204 - Availability of equipment performing conditional access or security functions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 4 2011-10-01 2011-10-01 false Availability of equipment performing... Availability of Navigation Devices § 76.1204 Availability of equipment performing conditional access or... perform conditional access functions shall make available equipment that incorporates only the...

  15. Supersonics--Airport Noise

    NASA Technical Reports Server (NTRS)

    Bridges, James

    2007-01-01

    At this, the first year-end meeting of the Fundamental Aeronautics Program, an overview of the Airport Noise discipline of the Supersonics Project leads the presentation of technical plans and achievements in this area of the Project. The overview starts by defining the Technical Challenges targeted by Airport Noise efforts, and the Approaches planned to meet these challenges. These are fleshed out in Elements, namely Prediction, Diagnostics, and Engineering, and broken down into Tasks. The Tasks level is where individual researchers' work is defined and from whence the technical presentations to follow this presentation come. This overview also presents the Milestones accomplished to date and to be completed in the next year. Finally, the NASA Research Announcement cooperative agreement activities are covered and tied to the Tasks and Milestones.

  16. 75 FR 39090 - Airport Privatization Pilot Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-07

    ... Federal Aviation Administration Airport Privatization Pilot Program AGENCY: Federal Aviation... Gwinnett County Airport Briscoe Field (LZU), Lawrenceville, Georgia. SUMMARY: The Federal Aviation Administration (FAA) has completed its review of the Gwinnett County Airport Briscoe Field (LZU)...

  17. 78 FR 7476 - Airport Improvement Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-01

    ... Federal Aviation Administration Airport Improvement Program AGENCY: Department of Transportation, Federal Aviation Administration. ACTION: Invitation to comment on draft FAA Order 5100-38, Airport Improvement...-38D, Airport Improvement Program Handbook. When finalized, this Order will replace Order...

  18. Equity in access to health care provision under the medicare security for small scale entrepreneurs in Dar es Salaam.

    PubMed

    Urassa, J A E

    2012-03-01

    The main objective of this study was to assess equity in access to health care provision under the Medicare Security for Small Scale Entrepreneurs (SSE). Methodological triangulation was used to an exploratory and randomized cross- sectional study in order to supplement information on the topic under investigation. Questionnaires were administered to 281 respondents and 6 Focus Group Discussions (FGDs) were held with males and females. Documentary review was also used. For quantitative aspect of the study, significant associations were measured using confidence intervals (95% CI) testing. Qualitative data were analyzed with assistance of Open code software. The results show that inequalities in access to health care services were found in respect to affordability of medical care costs, distance from home to health facilities, availability of drugs as well as medical equipments and supplies. As the result of existing inequalities some of clients were not satisfied with the provided health services. The study concludes by drawing policy and research implications of the findings.

  19. Transportation Security Administration in Defense of the National Aviation Infrastructure

    DTIC Science & Technology

    2009-02-12

    evidence suggests a hole exists within our airport security process. That hole may be caused by an over-reliance on technology and a blatant disregard of...environment enables BDOs to operate with increased effectiveness.11 Technology. Three major tools sit at the airport security technology forefront...Through Covert Testing of TSA’s Passenger Screening Process, GAO‐08‐48T, 15 Nov 07, 2. 16 Orlando News, “TSA Workers Skipping Orlando Airport Security Causes

  20. Aviation Security: A Case for Risk-Based Passenger Screening

    DTIC Science & Technology

    2011-12-01

    cost-effective way. Kean et al., 2004, p. 391 A. BACKGROUND The overall effectiveness of airport security screening at passenger checkpoints, and...profiling, the public views airport security screening and the TSA with derision. The TSA states that, beginning in 2005, the agency has shifted the...focus of airport security away from concentration on finding prohibited objects and toward a focus on intent and people, primarily through the

  1. Accessibility

    EPA Pesticide Factsheets

    Federal laws, including Section 508 of the Rehabilitation Act, mandate that people with disabilities have access to the same information that someone without a disability would have. 508 standards cover electronic and information technology (EIT) products.

  2. Securing General Aviation

    DTIC Science & Technology

    2009-03-03

    ajor vulnerabilities still exist in ... general aviation security ,”3 the commission did not further elaborate on the nature of those vulnerabilities...commercial operations may make them an attractive alternative to terrorists seeking to identify and exploit vulnerabilities in aviation security . In this...3, 2003, p. A7. 2 See Report of the Aviation Security Advisory Committee Working Group on General Aviation Airport Security (October 1, 2003); and

  3. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  4. 78 FR 7334 - Port Authority Access to Facility Vulnerability Assessments and the Integration of Security Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-01

    ... ] systems operated or maintained by certain law enforcement agencies and the Coast Guard. DATES: Comments... the maximum extent practical,'' the facility's security systems ``with compatible systems operated or... systems operated or maintained by the appropriate State and local law enforcement agencies and the...

  5. Race Differences in Mental Health Service Access in a Secure Male Juvenile Justice Facility

    ERIC Educational Resources Information Center

    Dalton, Richard F.; Evans, Lisa J.; Cruise, Keith R.; Feinstein, Ronald A.; Kendrick, Rhonda F.

    2009-01-01

    This study examined whether African American and Caucasian male youths had similar rates of referral to mental health services in a juvenile justice secure facility when controlling for differences obtained in the initial screening and assessment process. Data from the Massachusetts Youth Screening Instrument-2 (MAYSI-2), Initial Health Care…

  6. 28 CFR 16.74 - Exemption of National Security Division Systems-limited access.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... provide the target of a surveillance or collection activity with the disclosure accounting records... activity and compromise national security. For example, a target could, once made aware that collection... avoid detection. (9) Subsections (e)(4)(G), (H) and (I), and (f). These subsections are inapplicable...

  7. Against All Odds: Latinas Activate Agency to Secure Access to College

    ERIC Educational Resources Information Center

    Sapp, Vicki T.; Kiyama, Judy Marquez; Dache-Gerbino, Amalia

    2016-01-01

    This qualitative study seeks to understand Latinas' college-going behaviors by examining their agency and role in securing opportunity for college. The authors examine the activation of agency among 16 urban Latinas when navigating the structures influencing college opportunity through a cultural ecological model. Examples of agency are…

  8. Wireless digital-ultrasonic sensors for proximity ID, access control, firearm control, and C3I in homeland security and law enforcement applications

    NASA Astrophysics Data System (ADS)

    Forcier, Bob

    2003-09-01

    This paper describes a new patent-pending digital-ultrasonic sensor network technology, which provides a "security protection sphere" around the authorized user(s) and the infrastructure system or system(s) to achieve C3I in Homeland Security and Law Enforcement Applications. If the system device, such as a firearm, a secure computer, PDA, or vehicle is misplaced, stolen or removed from the security protective sphere, an alarm is activated. A digital-ultrasonic sensor/tag utilizes the system"s physical structure to form a 2 to 20 Meter programmable protection sphere around the device and the authorized user. In addition, the system allows only authorized users to utilize the system, thereby creating personalized weapons, secure vehicle access or secure computer hardware. If an unauthorized individual accesses the system device, the system becomes inoperative and an alarm is activated. As the command and control, the authorized individual is provided a secure wristwatch/PDA. Access control is provided by "touch" and is controlled through the wristwatch/PDA/smartcard with a unique digital-ultrasonic coding and matching protocol that provides a very high level of security for each wireless sensor.

  9. A case study of the Secure Anonymous Information Linkage (SAIL) Gateway: a privacy-protecting remote access system for health-related research and evaluation.

    PubMed

    Jones, Kerina H; Ford, David V; Jones, Chris; Dsilva, Rohan; Thompson, Simon; Brooks, Caroline J; Heaven, Martin L; Thayer, Daniel S; McNerney, Cynthia L; Lyons, Ronan A

    2014-08-01

    With the current expansion of data linkage research, the challenge is to find the balance between preserving the privacy of person-level data whilst making these data accessible for use to their full potential. We describe a privacy-protecting safe haven and secure remote access system, referred to as the Secure Anonymised Information Linkage (SAIL) Gateway. The Gateway provides data users with a familiar Windows interface and their usual toolsets to access approved anonymously-linked datasets for research and evaluation. We outline the principles and operating model of the Gateway, the features provided to users within the secure environment, and how we are approaching the challenges of making data safely accessible to increasing numbers of research users. The Gateway represents a powerful analytical environment and has been designed to be scalable and adaptable to meet the needs of the rapidly growing data linkage community.

  10. Access to Network Login by Three-Factor Authentication for Effective Information Security.

    PubMed

    Vaithyasubramanian, S; Christy, A; Saravanan, D

    2016-01-01

    Today's technology development in the field of computer along with internet of things made huge difference in the transformation of our lives. Basic computer framework and web client need to make significant login signify getting to mail, long range interpersonal communication, internet keeping money, booking tickets, perusing online daily papers, and so forth. The login user name and secret key mapping validate if the logging user is the intended client. Secret key is assumed an indispensable part in security. The objective of MFA is to make a layered safeguard and make it more troublesome for an unauthenticated entity to get to an objective, for example, a physical area, processing gadget, system, or database. In the event that one element is bargained or broken, the assailant still has two more boundaries to rupture before effectively breaking into the objective. An endeavor has been made by utilizing three variable types of authentication. In this way managing additional secret key includes an additional layer of security.

  11. 75 FR 47891 - Notice of Intent to Rule on Request to Release Airport Property at the Dubois Regional Airport...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-09

    ...-aeronautical airport property to Joseph and Rosemary Barber. Also, Joseph and Rosemary Barber desire to... Rosemary Barber. The ROW continues to be needed by Joseph and Rosemary Barber to access SR 830 from their property. Therefore, the Authority desires to convey their half of the former ROW to Joseph and...

  12. Methods for Determining Aircraft Surface State at Lesser-Equipped Airports

    NASA Technical Reports Server (NTRS)

    Roach, Keenan; Null, Jody

    2016-01-01

    Tactical departure scheduling within a terminal airspace must accommodate a wide spectrum of surveillance and communication capabilities at multiple airports. The success of such a scheduler is highly dependent upon the knowledge of a departure's state while it is still on the surface. Airports within a common Terminal RAdar CONtrol (TRACON) airspace possess varying levels of surface surveillance infrastructure which directly impacts uncertainties in wheels-off times. Large airports have access to surface surveillance data, which is shared with the TRACON, while lesser-equipped airports still rely solely on controllers in Air Traffic Control Towers (Towers). Coordination between TRACON and Towers can be greatly enhanced when the TRACON controller has access to the surface surveillance and the associated decision-support tools at well-equipped airports. Similar coordination at lesser-equipped airports is still based on verbal communications. This paper investigates possible methods to reduce the uncertainty in wheels-off time predictions at the lesser-equipped airports through the novel use of Over-the-Air (OTA) data transmissions. We also discuss the methods and equipment used to collect sample data at lesser-equipped airports within a large US TRACON, as well as the data evaluation to determine if meaningful information can be extracted from it.

  13. Prosthetic metal implants and airport metal detectors

    PubMed Central

    Dancey, A; Titley, OG

    2013-01-01

    Introduction Metal detectors have been present in airports and points of departure for some time. With the introduction of heightened security measures in response to fears of an increased threat of terrorism, they may become more prevalent in other public locations. The aim of this study was to ascertain which prosthetic devices activated metal detector devices used for security purposes. Methods A range of prosthetic devices used commonly in orthopaedic and plastic surgery procedures were passed through an arch metal detector at Birmingham Airport in the UK. Additionally, each item was passed under a wand detector. Items tested included expandable breast prostheses, plates used in wrist and hand surgery, screws, K-wires, Autosuture™ ligation clips and staples. Results No prostheses were detected by the arch detector. The expandable implants and wrist plates were the only devices detected by passing the wand directly over them. No device was detected by the wand when it was under cover of the axillary soft tissue. Screws, K-wires, Autosuture™ clips and staples were not detected under any of the study conditions. Conclusions Although unlikely to trigger a detector, it is possible that an expandable breast prosthesis or larger plate may do so. It is therefore best to warn patients of this so they can anticipate detection and further examination. PMID:23827294

  14. Airport Pricing Strategies

    NASA Technical Reports Server (NTRS)

    Pels, Eric; Verhoef, Erik T.

    2003-01-01

    Conventional economic wisdom suggests that congestion pricing would be an appropriate response to cope with the growing congestion levels currently experienced at many airports. Several characteristics of aviation markets, however, may make naive congestion prices equal to the value of marginal travel delays a non-optimal response. This paper has developed a model of airport pricing that captures a number of these features. The model in particular reflects that airlines typically have market power and are engaged in oligopolistic competition at different sub-markets; that part of external travel delays that aircraft impose are internal to an operator and hence should not be accounted for in congestion tolls. We presented an analytical treatment for a simple bi-nodal symmetric network, which through the use of 'hyper-networks' would be readily applicable to dynamic problems (in discrete time) such as peak - off-peak differences, and some numerical exercises for the same symmetric network, which was only designed to illustrate the possible comparative static impacts of tolling, in addition to marginal equilibrium conditions as could be derived for the general model specification. Some main conclusions are that second-best optimal tolls are typically lower than what would be suggested by congestion costs alone and may even be negative, and that the toll as derived by Brueckner (2002) may not lead to an increase in total welfare. While Brueckner (2002) has made clear that congestion tolls on airports may be smaller than expected when congestion costs among aircraft are internal for a firm, our analysis adds to this that a further downward adjustment may be in order due to market power. The presence of market power (which causes prices to exceed marginal costs) may cause the pure congestion toll to be suboptimal, because the resulting decrease in demand is too high (the pure congestion tall does not take into account the decrease in consumer surplus). The various

  15. 77 FR 4394 - Release of Airport Property: Orlando Executive Airport, Orlando, FL

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-27

    ... Federal Aviation Administration Release of Airport Property: Orlando Executive Airport, Orlando, FL AGENCY... provides notice of intent to release certain airport properties 12.4 acres at the Orlando Executive Airport... restrictions of a Quitclaim Deed agreement, dated August 9, 1961, between the subject airport and the...

  16. Secure remote access to a clinical data repository using a wireless personal digital assistant (PDA).

    PubMed Central

    Duncan, R. G.; Shabot, M. M.

    2000-01-01

    TCP/IP and World-Wide-Web (WWW) technology have become the universal standards for networking and delivery of information. Personal digital assistants (PDAs), cellular telephones, and alphanumeric pagers are rapidly converging on a single pocket device that will leverage wireless TCP/IP networks and WWW protocols and can be used to deliver clinical information and alerts anytime, anywhere. We describe a wireless interface to clinical information for physicians based on Palm Corp.'s Palm VII pocket computer, a wireless digital network, encrypted data transmission, secure web servers, and a clinical data repository (CDR). PMID:11079875

  17. Design and Implementation of A DICOM PACS With Secure Access Via Internet

    DTIC Science & Technology

    2007-11-02

    system, integrating them with the medical history data. Restricted access based on privileges were design to to make reports or only to consult data...like medium, a concept of exchange of information based on images and data between doctors, services and hospitals. It is a concept of integration...alfonso/pacs.html [2] SL. Lou, Hoogstrate, HK Huang. “Automated PACS image adquisition and recovery scheme for image integrity based on the DICOM

  18. Aviation security: A system's perspective

    SciTech Connect

    Martin, J.P.

    1988-01-01

    For many years the aviation industry and airports operated with security methods and equipment common to most other large industrial complexes. At that time, the security systems primarily provided asset and property protection. However, soon after the first aircraft hijacking the focus of security shifted to emphasize the security requirements necessary for protecting the traveling public and the one feature of the aviation industry that makes it unique---the airplane. The airplane and its operation offered attractive opportunities for the homesick refugee, the mentally unstable person and the terrorist wanting to make a political statement. The airport and its aircraft were the prime targets requiring enhanced security against this escalated threat. In response, the FAA, airport operators and air carriers began to develop plans for increasing security and assigning responsibilities for implementation.

  19. Final Report to President Clinton: White House Commission on Aviation Safety and Security

    DTIC Science & Technology

    2007-11-02

    nationwide non-profit security corporation, funded by the airlines, to handle airport security . This concept, under consideration by the major...Canines are used to detect explosives in many important areas, but only sparingly in airport security . The Commission is convinced that an increase in...testing should also be increased by the FAA, and incorporated as a regular part of airport security action plans. Frequent, sophisticated attempts by

  20. HOMELAND SECURITY: Challenges and Strategies in Addressing Short- and Long-Term National Needs

    DTIC Science & Technology

    2007-11-02

    air travel has already prompted attention to chronic problems with airport security that we and others have been pointing to for years. Moreover, the...capital for certain areas such as intelligence, public health and airport security will also be necessary as well to foster and maintain the skill...Weaknesses in Airport Security and Options for Assigning Screening Responsibilities, (GAO-01-1165T, Sept. 21, 2001). Aviation Security: Terrorist Acts

  1. 19 CFR 122.84 - Intermediate airport.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Intermediate airport. 122.84 Section 122.84... Intermediate airport. (a) Application. The provisions of this section apply at any U.S. airport to which an... aircraft arrives at the next airport, the aircraft commander or agent shall make entry by filing the:...

  2. 14 CFR 125.49 - Airport requirements.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Airport requirements. 125.49 Section 125.49... Requirements § 125.49 Airport requirements. (a) No certificate holder may use any airport unless it is adequate...) No pilot of an airplane carrying passengers at night may take off from, or land on, an airport...

  3. 49 CFR 27.71 - Airport facilities.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 1 2011-10-01 2011-10-01 false Airport facilities. 27.71 Section 27.71... Administration Programs: Airports, Railroads, and Highways § 27.71 Airport facilities. (a) This section applies... financial assistance at a commercial service airport, including parking and ground transportation...

  4. 14 CFR 141.38 - Airports.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Airports. 141.38 Section 141.38 Aeronautics... CERTIFICATED AGENCIES PILOT SCHOOLS Personnel, Aircraft, and Facilities Requirements § 141.38 Airports. (a) An... has continuous use of each airport at which training flights originate. (b) Each airport used...

  5. 49 CFR 27.71 - Airport facilities.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Airport facilities. 27.71 Section 27.71... Administration Programs: Airports, Railroads, and Highways § 27.71 Airport facilities. (a) This section applies... financial assistance at a commercial service airport, including parking and ground transportation...

  6. 19 CFR 122.84 - Intermediate airport.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Intermediate airport. 122.84 Section 122.84... Intermediate airport. (a) Application. The provisions of this section apply at any U.S. airport to which an... aircraft arrives at the next airport, the aircraft commander or agent shall make entry by filing the:...

  7. 14 CFR 125.49 - Airport requirements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Airport requirements. 125.49 Section 125.49... Requirements § 125.49 Airport requirements. (a) No certificate holder may use any airport unless it is adequate...) No pilot of an airplane carrying passengers at night may take off from, or land on, an airport...

  8. 14 CFR 141.38 - Airports.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Airports. 141.38 Section 141.38 Aeronautics... CERTIFICATED AGENCIES PILOT SCHOOLS Personnel, Aircraft, and Facilities Requirements § 141.38 Airports. (a) An... has continuous use of each airport at which training flights originate. (b) Each airport used...

  9. Airport Careers. Aviation Careers Series. Revised.

    ERIC Educational Resources Information Center

    Zaharevitz, Walter

    This booklet, one in a series on aviation careers, outlines the variety of careers available in airports. The first part of the booklet provides general information about careers at airports, while the main part of the booklet outlines the following nine job categories: airport director, assistant airport director, engineers, support personnel,…

  10. 75 FR 39091 - Airport Privatization Pilot Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-07

    ... Mu oz Mar n International Airport (SJU), San Juan, Puerto Rico. SUMMARY: The Federal Aviation Administration (FAA) has completed its review of the Luis Mu oz Mar n International Airport International Airport... submitted a preliminary application to the Airport Privatization Pilot Program for Luis Mu oz Mar...

  11. Access to Network Login by Three-Factor Authentication for Effective Information Security

    PubMed Central

    Vaithyasubramanian, S.; Christy, A.; Saravanan, D.

    2016-01-01

    Today's technology development in the field of computer along with internet of things made huge difference in the transformation of our lives. Basic computer framework and web client need to make significant login signify getting to mail, long range interpersonal communication, internet keeping money, booking tickets, perusing online daily papers, and so forth. The login user name and secret key mapping validate if the logging user is the intended client. Secret key is assumed an indispensable part in security. The objective of MFA is to make a layered safeguard and make it more troublesome for an unauthenticated entity to get to an objective, for example, a physical area, processing gadget, system, or database. In the event that one element is bargained or broken, the assailant still has two more boundaries to rupture before effectively breaking into the objective. An endeavor has been made by utilizing three variable types of authentication. In this way managing additional secret key includes an additional layer of security. PMID:27006976

  12. Investigation Into The Needs of Part 135 Operators to Access Airports Restricted Under FAR Part 135 Sections 135.213, 135.219 and/or 135.225

    NASA Technical Reports Server (NTRS)

    Eckert, Clifford A.; Stough, H. P. (Technical Monitor)

    2002-01-01

    NASA and the FAA have joint interests and responsibilities for developing guidelines and standards for cockpit displays of Flight Information Services (FIS) information and for developing enhancements to the planned FAA Data Link (FISDL) services. NASA and the FAA have established responsibilities in connection with development tasks for enhancements to the FISDL project. This report is the result of NASA Task 2, "Weather Support Concept- Part 135 Operations." The objective of the task was to determine the needs of Part 135 operators as they relate to FAA Part 135 Sections 135.213, 135.219 and 135.225, which pertain to weather reporting requirements at destination airports. This report discusses the results of two questionnaires completed by volunteer Part 135 operators that questioned their operations, their needs for flying to airports without weather reporting compatibilities, and suggestions for modifying FARs 135.213, 135.219 and 135.225. The operators pointed out airports in areas of the CONUS that were needed for IFR operations but lacked weather reporting capabilities and they offered practical suggestions for changes to the FARs. Related to operators's needs, and discussed in this report, were the Fractional Ownership NPRM and the possible impact of GPS WAAS and LAAS approaches.

  13. 78 FR 63562 - Notice of Request To Release Airport Property at Charleston International Airport, Charleston...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-24

    ... Federal Aviation Administration Notice of Request To Release Airport Property at Charleston International Airport, Charleston, South Carolina AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice... sale of three parcels totaling 266.954-acres of airport property located at the...

  14. Auctioning Airport Slots?

    NASA Technical Reports Server (NTRS)

    Gruyer, Nicolas; Lenoir, Nathalie

    2003-01-01

    The current allocation of slots on congested European airports constitutes an obstacle to the effective liberalisation of air transportation undertaken in Europe. With a view to favouring effluent slot utilisation and competition, as is the goal of the Euopean commission, we propose to use a market mechanism, based on temporary" utilisation licences. In order to allocate those licences, we propose and describe an iterated combinatorial auction mechanism where a percentage of licences would be reallocated each season. A secondary market would also be set up in order to reallocate slots during a season. Since a combinatorial auction involve a complex optimisation procedure, we describe how it can be made to work in the case of auctions.

  15. Accomplishments under the Airport Improvement Program: Fiscal Year 1990 (Ninth Annual Report)

    DTIC Science & Technology

    1990-01-01

    preserving and enhancing capacity, safety, and security and carrying out noise compatibility planning and programs at primary and reliever airports...GENERAL AVIATION) FOREST 01 $341,537 RECONSTRUCT RUNWAY, TAXIWAY AND APRON FOREST MUNICIPAL (GENERAL AVIATION) 58 TABLE II AIRPORTS GRANT-IN-AID PROGRAM...ASSISTANCE WYOMING 0 S7 $34,784 CONDUCT STATE SYSTEM PLAN UPDATE el STATE OF WYOMING (CONTINUOUS) (SYSTEM PLAN) AFTON 05 $27,000 CONDUCT MASTER PLAN

  16. 14 CFR 382.53 - What information must carriers give individuals with a vision or hearing impairment at airports?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false What information must carriers give individuals with a vision or hearing impairment at airports? 382.53 Section 382.53 Aeronautics and Space... NONDISCRIMINATION ON THE BASIS OF DISABILITY IN AIR TRAVEL Accessibility of Airport Facilities § 382.53...

  17. Airport surface operations requirements analysis

    NASA Technical Reports Server (NTRS)

    Groce, John L.; Vonbokern, Greg J.; Wray, Rick L.

    1993-01-01

    This report documents the results of the Airport Surface Operations Requirements Analysis (ASORA) study. This study was conducted in response to task 24 of NASA Contract NAS1-18027. This study is part of NASA LaRC's Low Visibility Surface Operations program, which is designed to eliminate the constraints on all-weather arrival/departure operations due to the airport/aircraft ground system. The goal of this program is to provide the capability for safe and efficient aircraft operations on the airport surface during low visibility conditions down to zero. The ASORA study objectives were to (1) develop requirements for operation on the airport surface in visibilities down to zero; (2) survey and evaluate likely technologies; (3) develop candidate concepts to meet the requirements; and (4) select the most suitable concept based on cost/benefit factors.

  18. 49 CFR 1544.231 - Airport-approved and exclusive area personnel identification systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Airport-approved and exclusive area personnel identification systems. 1544.231 Section 1544.231 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...

  19. 49 CFR 1544.231 - Airport-approved and exclusive area personnel identification systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Airport-approved and exclusive area personnel identification systems. 1544.231 Section 1544.231 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...

  20. 49 CFR 1544.231 - Airport-approved and exclusive area personnel identification systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Airport-approved and exclusive area personnel identification systems. 1544.231 Section 1544.231 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...

  1. 49 CFR 1544.231 - Airport-approved and exclusive area personnel identification systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Airport-approved and exclusive area personnel identification systems. 1544.231 Section 1544.231 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...

  2. 49 CFR 1544.231 - Airport-approved and exclusive area personnel identification systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Airport-approved and exclusive area personnel identification systems. 1544.231 Section 1544.231 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...

  3. Wireless Channel Characterization in the Airport Surface Environment

    NASA Technical Reports Server (NTRS)

    Neville, Joshua T.

    2004-01-01

    Given the anticipated increase in air traffic in the coming years, modernization of the National Airspace System (NAS) is a necessity. Part of this modernization effort will include updating current communication, navigation, and surveillance (CNS) systems to deal with the increased traffic as well as developing advanced CNS technologies for the systems. An example of such technology is the integrated CNS (ICNS) network being developed by the Advanced CNS Architecture and Systems Technology (ACAST) group for use in the airport surface environment. The ICNS network would be used to convey voice/data between users in a secure and reliable manner. The current surface system only supports voice and does so through an obsolete physical infrastructure. The old system is vulnerable to outages and costly to maintain. The proposed ICNS network will include a wireless radio link. To ensure optimal performance, a thorough and accurate characterization of the channel across which the link would operate is necessary. The channel is the path the signal takes from the transmitter to the receiver and is prone to various forms of interference. Channel characterization involves a combination of analysis, simulation, and measurement. My work this summer was divided into four tasks. The first task required compiling and reviewing reference material that dealt with the characterization and modeling of aeronautical channels. The second task involved developing a systematic approach that could be used to group airports into classes, e.g. small airfields, medium airports, large open airports, large cluttered airports, etc. The third task consisted of implementing computer simulations of existing channel models. The fourth task entailed measuring possible interference sources in the airport surface environment via a spectrum analyzer.

  4. The choice of disease control strategies to secure international market access for aquaculture products.

    PubMed

    Chinabut, S; Puttinaowarat, S

    2005-01-01

    Since production from capture fisheries cannot meet the demands of exports, aquaculture has subsequently played a major role in securing the raw materials for the world's food industries. Aquaculture has rapidly developed from extensive systems to semi-intensive, intensive and super-intensive systems. This has introduced the use of chemicals and drugs into the systems, which cause residual problems in the products. In the developed world, food safety has become a major issue of concern. The world market now demands healthy aquaculture products from farm to table. To achieve these requirements and to keep their markets, countries involved in aquaculture have implemented control measures such as farm licensing, code of conduct for sustainable aquaculture, hazard analysis and critical control point (HACCP) and good aquaculture practice. However, infectious diseases in aquaculture are of major concern to the industry and are typically controlled by eradication of the pathogen, treatment with antibiotic or chemotherapeutics, and/or by preventative measures such as the use of probiotics or vaccines. To limit the use of chemicals and antibiotics, good farm management is highly recommended. In terms of treatment, chemicals and antibiotics should be evaluated to establish recommended doses and withdrawal periods, otherwise alternative treatments should be developed. Environmentally-friendly probiotics have been introduced to aquaculture practice in the last decade to replace pathogenic bacteria with beneficial bacteria transient in the gut. Micro-organisms have also been prepared for the purpose of biocontrol and bioremediation. The application of probiotic, biocontrol and bioremediation seem promising; however considerable efforts of further research in terms of food and environmental safety are needed. Vaccination has proved highly effective in controlling diseases in the salmon industry mainly in Europe, America and Japan. In other Asian countries, this practice seem to

  5. 76 FR 18618 - Operating Limitations at Newark Liberty International Airport

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-04

    ... Federal Aviation Administration Operating Limitations at Newark Liberty International Airport AGENCY... amends the Order Limiting Operations at Newark Liberty International Airport (EWR) that published on May... Management Rule for LaGuardia Airport, John F. Kennedy International Airport, and Newark...

  6. Accomplishments under the Airport Improvement Program: Fiscal Year 1991

    DTIC Science & Technology

    1991-01-01

    Airport Program. Of the remaining discretionary funds, 75 percent is to be used for preserving and enhancing capacity, safety, and security and carrying...EQUIPMENT ACQUIRE LAND FOR APPROACHES FOREST CITY 02 S531.450 REHABILITATE AND OVERLAY RUNWAY FOREST CITY MUNICIPAL (GENERAL AVIATION) FORT DODGE 08...IMPROVE RUNWAY SAFETY GENERAL AVIATION) AREA; RECONSTRUICT. EXTEND AMD LIGHT TAXIWAYS W YOM I NOa AFTON 06 S210.000 OVERLAY RUNWlAY. IMPROVE RUNWAY

  7. Survey of Technologies for the Airport Border of the Future

    DTIC Science & Technology

    2014-04-01

    decisions based upon the information presented. Airport Border of the Future March 2014 Page 2 of 74 Table of Contents 1 Executive Summary...Contractor and the contents do not necessarily have the approval or endorsement of the Department of National Defence of Canada. DRDC-RDDC-2014-C...the Canadian Safety and Security Program (CSSP), an outcomes- based program of S&T projects with the mission to strengthen Canada’s ability to

  8. Privacy algorithm for airport passenger screening portal

    NASA Astrophysics Data System (ADS)

    Keller, Paul E.; McMakin, Douglas L.; Sheen, David M.; McKinnon, A. D.; Summet, Jay W.

    2000-03-01

    A novel personnel surveillance system has been developed for airport security to detect and identify threatening objects, which are concealed ont he human body. The main advantage of this system over conventional metal detectors is that non- metallic objects such as plastic explosives and plastic guns are detectable. This system is based on millimeter-wave array technology and a holographic imaging algorithm to provide surveillance images of objects hidden beneath clothing in near real-time. The privacy algorithm is based on image processing filters and artificial neural networks. The algorithm examines the millimeter-wave surveillance images to locate and segment the threats and place them on either a silhouette of the person or a wire-frame humanoid representation. In this way, all human features are removed from the final image and personal privacy is maintained. This system is ideally suited for mass transportation centers such as airport checkpoints that require high throughput rates. The system is currently under going evaluation. This paper reports on results from an earlier initial test of portions of the privacy algorithm that detect hidden plastic objects.

  9. Poverty, food security and universal access to sexual and reproductive health services: a call for cross-movement advocacy against neoliberal globalisation.

    PubMed

    Sundari Ravindran, T K

    2014-05-01

    Universal access to sexual and reproductive health services is one of the goals of the International Conference on Population and Development of 1994. The Millennium Development Goals were intended above all to end poverty. Universal access to health and health services are among the goals being considered for the post-2015 agenda, replacing or augmenting the MDGs. Yet we are not only far from reaching any of these goals but also appear to have lost our way somewhere along the line. Poverty and lack of food security have, through their multiple linkages to health and access to health care, deterred progress towards universal access to health services, including for sexual and reproductive health needs. A more insidious influence is neoliberal globalisation. This paper describes neoliberal globalisation and the economic policies it has engendered, the ways in which it influences poverty and food security, and the often unequal impact it has had on women as compared to men. It explores the effects of neoliberal economic policies on health, health systems, and universal access to health care services, and the implications for access to sexual and reproductive health. To be an advocate for universal access to health and health care is to become an advocate against neoliberal globalisation.

  10. Protecting America: Reorganizing the Nation’s Security Forces to Ensure the Protection of Our Critical Infrastructure

    DTIC Science & Technology

    2004-03-19

    As an example, before the terrorist hijackings of September 11, 2001, airport security was the responsibility of private carriers, state and local...mobilized for airport security , critical site protection, and weapons of mass destruction (WMD) detection, and more than 91,000 HOMELAND SECURITY...Preemptive and Retaliatory Strikes Counter Drugs Missile Defense Military Civil Law Enforcement Airport Security Local and State Consequence Management

  11. Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1986-05-30

    and airport security measures in effect. Section V of this report provides a smry of firearms which were detected at screening points under suspicious...with the Secretary of State concerning threats, and (3) the inclusion of a sumnmary on foreign airport security in the Semiannual Report to Congress on...International Civil Aviation Organization (ICAO) to embark inediately upon an intensified program aimed at responding to the need for enhanced airport security . As

  12. 14 CFR 139.205 - Amendment of Airport Certification Manual.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Amendment of Airport Certification Manual... CERTIFICATION OF AIRPORTS Airport Certification Manual § 139.205 Amendment of Airport Certification Manual. (a) Under § 139.3, the Regional Airports Division Manager may amend any Airport Certification...

  13. 14 CFR 139.205 - Amendment of Airport Certification Manual.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Amendment of Airport Certification Manual... CERTIFICATION OF AIRPORTS Airport Certification Manual § 139.205 Amendment of Airport Certification Manual. (a) Under § 139.3, the Regional Airports Division Manager may amend any Airport Certification...

  14. 14 CFR 156.4 - Airport and project eligibility.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... participating State shall administer the airport development and airport planning projects for airports within... grant agreement for integrated airport system planning, projects related to any primary airport, or any... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Airport and project eligibility....

  15. 14 CFR 156.4 - Airport and project eligibility.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... participating State shall administer the airport development and airport planning projects for airports within... grant agreement for integrated airport system planning, projects related to any primary airport, or any... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Airport and project eligibility....

  16. 19 CFR 122.15 - User fee airports.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ..., Massachusetts L.G. Hanscom Field. Broomfield, Colorado Jefferson County Airport. Carlsbad, California McClellan... International Airport. Englewood, Colorado Centennial Airport. Fort Worth, Texas Fort Worth Alliance Airport... Airport. Mascoutah, Illinois MidAmerica St. Louis Airport. McKinney, Texas Collin County Regional...

  17. 19 CFR 122.15 - User fee airports.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ..., Colorado Jefferson County Airport. Carlsbad, California McClellan-Palomar Airport. Dallas, Texas Dallas..., Colorado Centennial Airport. Fort Worth, Texas Fort Worth Alliance Airport. Fresno, California Fresno... MidAmerica St. Louis Airport. McKinney, Texas Collin County Regional Airport. Melbourne,...

  18. 19 CFR 122.15 - User fee airports.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ..., Colorado Jefferson County Airport. Carlsbad, California McClellan-Palomar Airport. Dallas, Texas Dallas..., Colorado Centennial Airport. Fort Worth, Texas Fort Worth Alliance Airport. Fresno, California Fresno... MidAmerica St. Louis Airport. McKinney, Texas Collin County Regional Airport. Melbourne,...

  19. Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1985-11-07

    hijackings since 1973 during any comparable 6-month period. (See Exhibits 1, 2, and 3) Air carrier and airport security measures required by the FAA have...enforcement support for airline passenger boarding and airport security measures. The passengers, who are the principal beneficiaries of the security program

  20. 78 FR 22024 - Request To Release Airport Property at the Oakley Municipal Airport (OEL), Oakley, Kansas

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-12

    ... Federal Aviation Administration Request To Release Airport Property at the Oakley Municipal Airport (OEL... proposes to rule and invites public comment on the release of land at the Oakley Municipal Airport (OEL... following address: Lynn D. Martin, Airports Compliance Specialist, Federal Aviation Administration,...

  1. 14 CFR 121.445 - Pilot in command airport qualification: Special areas and airports.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Pilot in command airport qualification: Special areas and airports. 121.445 Section 121.445 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION... Qualifications § 121.445 Pilot in command airport qualification: Special areas and airports. (a)...

  2. 77 FR 3031 - Release of Airport Property: Tampa International Airport, Tampa, FL

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-20

    ... Federal Aviation Administration Release of Airport Property: Tampa International Airport, Tampa, FL AGENCY... FAA hereby provides notice of intent to release certain airport properties, approximately 3.407 acres, at the Tampa International Airport, Tampa, FL from the conditions, reservations, and restrictions...

  3. 14 CFR 121.445 - Pilot in command airport qualification: Special areas and airports.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Pilot in command airport qualification: Special areas and airports. 121.445 Section 121.445 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION... Qualifications § 121.445 Pilot in command airport qualification: Special areas and airports. (a)...

  4. Examining Passenger Flow Choke Points at Airports Using Discrete Event Simulation

    NASA Technical Reports Server (NTRS)

    Brown, Jeremy R.; Madhavan, Poomima

    2011-01-01

    The movement of passengers through an airport quickly, safely, and efficiently is the main function of the various checkpoints (check-in, security. etc) found in airports. Human error combined with other breakdowns in the complex system of the airport can disrupt passenger flow through the airport leading to lengthy waiting times, missing luggage and missed flights. In this paper we present a model of passenger flow through an airport using discrete event simulation that will provide a closer look into the possible reasons for breakdowns and their implications for passenger flow. The simulation is based on data collected at Norfolk International Airport (ORF). The primary goal of this simulation is to present ways to optimize the work force to keep passenger flow smooth even during peak travel times and for emergency preparedness at ORF in case of adverse events. In this simulation we ran three different scenarios: real world, increased check-in stations, and multiple waiting lines. Increased check-in stations increased waiting time and instantaneous utilization. while the multiple waiting lines decreased both the waiting time and instantaneous utilization. This simulation was able to show how different changes affected the passenger flow through the airport.

  5. Apparatus and method supporting wireless access to multiple security layers in an industrial control and automation system or other system

    SciTech Connect

    Chen, Yu-Gene T.

    2013-04-16

    A method includes receiving a message at a first wireless node. The first wireless node is associated with a first wired network, and the first wired network is associated with a first security layer. The method also includes transmitting the message over the first wired network when at least one destination of the message is located in the first security layer. The method further includes wirelessly transmitting the message for delivery to a second wireless node when at least one destination of the message is located in a second security layer. The second wireless node is associated with a second wired network, and the second wired network is associated with the second security layer. The first and second security layers may be associated with different security paradigms and/or different security domains. Also, the message could be associated with destinations in the first and second security layers.

  6. 49 CFR 1542.107 - Changed conditions affecting security.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Changed conditions affecting security. 1542.107 Section 1542.107 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY...

  7. 49 CFR 1542.107 - Changed conditions affecting security.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Changed conditions affecting security. 1542.107 Section 1542.107 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY...

  8. 49 CFR 1542.107 - Changed conditions affecting security.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Changed conditions affecting security. 1542.107 Section 1542.107 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY...

  9. 49 CFR 1542.107 - Changed conditions affecting security.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Changed conditions affecting security. 1542.107 Section 1542.107 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY...

  10. 49 CFR 1542.107 - Changed conditions affecting security.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Changed conditions affecting security. 1542.107 Section 1542.107 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY...

  11. 19 CFR 122.85 - Final airport.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Final airport. 122.85 Section 122.85 Customs... AIR COMMERCE REGULATIONS Procedures for Residue Cargo and Stopover Passengers § 122.85 Final airport. When an aircraft enters at the last domestic airport of discharge, the traveling general...

  12. 19 CFR 122.85 - Final airport.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Final airport. 122.85 Section 122.85 Customs... AIR COMMERCE REGULATIONS Procedures for Residue Cargo and Stopover Passengers § 122.85 Final airport. When an aircraft enters at the last domestic airport of discharge, the traveling general...

  13. 14 CFR 135.229 - Airport requirements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Airport requirements. 135.229 Section 135... Operating Limitations and Weather Requirements § 135.229 Airport requirements. (a) No certificate holder may use any airport unless it is adequate for the proposed operation, considering such items as...

  14. 32 CFR 644.423 - Airport development.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Airport development. 644.423 Section 644.423... ESTATE HANDBOOK Disposal Disposal of Fee-Owned Real Property and Easement Interests § 644.423 Airport... carrying out a project for airport development under this subchapter, or for the operation of any...

  15. 14 CFR 135.229 - Airport requirements.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Airport requirements. 135.229 Section 135... Operating Limitations and Weather Requirements § 135.229 Airport requirements. (a) No certificate holder may use any airport unless it is adequate for the proposed operation, considering such items as...

  16. 40 CFR 258.10 - Airport safety.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 26 2012-07-01 2011-07-01 true Airport safety. 258.10 Section 258.10... SOLID WASTE LANDFILLS Location Restrictions § 258.10 Airport safety. (a) Owners or operators of new... used by turbojet or piston-type aircraft must notify the affected airport and the Federal...

  17. 40 CFR 258.10 - Airport safety.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 26 2013-07-01 2013-07-01 false Airport safety. 258.10 Section 258.10... SOLID WASTE LANDFILLS Location Restrictions § 258.10 Airport safety. (a) Owners or operators of new... used by turbojet or piston-type aircraft must notify the affected airport and the Federal...

  18. 40 CFR 258.10 - Airport safety.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 25 2014-07-01 2014-07-01 false Airport safety. 258.10 Section 258.10... SOLID WASTE LANDFILLS Location Restrictions § 258.10 Airport safety. (a) Owners or operators of new... used by turbojet or piston-type aircraft must notify the affected airport and the Federal...

  19. Implementation of noise budgets for civil airports

    SciTech Connect

    Bishop, D.E.

    1982-01-01

    An increasing number of airports are faced with the need for establishing a lid on the noise from aircraft operations and for developing programs for reducing airport noise on a year-to-year basis. As an example, the California Airport Noise Standard acts to impose such programs on a number of airports in California. Any airport faced with the need to establish a quantitative reduction of noise obviously wants to achieve this reduction with the least impact on numbers of operations and reduction in air transportation services to the community. A reduction in noise and an increase in operations usually can be achieved only by encouraging use of the quietest aircraft available and, further adding incentives for operating procedures that minimize noise. One approach in administering airport noise reduction is to adopt an airport noise budget. As used in this paper, the noise budget concept implies that quantitative limits on the noise environment and on the noise contributions by major airport users will be established. Having methods for enforcing compliance with the airport budget for those airport users that exceed their budget will be established. Thus, the noise budget provides airport management, and major airport users, with quantitative measures for defining noise goals, and actual progress in achieving such goals.

  20. Planning, Management, and Economics of Airport Operation

    NASA Technical Reports Server (NTRS)

    Wiley, J.

    1972-01-01

    An overview of the role of the airport in the transportation complex and in the community is presented. The establishment of the airport including its requirements in regional planning and the operation of the airport as a social and economic force are discussed.

  1. Teaching Ideas Notebook: Student Airport Tours

    ERIC Educational Resources Information Center

    Journal of Aerospace Education, 1977

    1977-01-01

    Outlines, as recommended by the Aviation Distributors and Manufacturers Association, a cooperative program between schools and local airports. The Student Airport Tours Program for class and career study groups includes a field trip to an airport, free rides, and follow-up activities. (CS)

  2. Technology and politics: The regional airport experience

    NASA Technical Reports Server (NTRS)

    Starling, J. D.; Brown, J.; Gerhardt, J. M.; Dominus, M. I.

    1976-01-01

    The findings of a comparative study of the following six regional airports were presented: Dallas/Fort Worth, Kansas City, Washington, D.C., Montreal, Tampa, and St. Louis. Each case was approached as a unique historical entity, in order to investigate common elements such as: the use of predictive models in planning, the role of symbolism to heighten dramatic effects, the roles of community and professional elites, and design flexibility. Some of the factors considered were: site selection, consolidation of airline service, accessibility, land availability and cost, safety, nuisance, and pollution constraints, economic growth, expectation of regional growth, the demand forecasting conundrum, and design decisions. The hypotheses developed include the following: the effect of political, social, and economic conflicts, the stress on large capacity and dramatic, high-technology design, projections of rapid growth to explain the need for large capital outlays.

  3. Determination and Applications of Environmental Costs at Different Sized Airports: Aircraft Noise and Engine Emissions

    NASA Technical Reports Server (NTRS)

    Lu, Cherie; Lierens, Abigail

    2003-01-01

    With the increasing trend of charging for externalities and the aim of encouraging the sustainable development of the air transport industry, there is a need to evaluate the social costs of these undesirable side effects, mainly aircraft noise and engine emissions, for different airports. The aircraft noise and engine emissions social costs are calculated in monetary terms for five different airports, ranging from hub airports to small regional airports. The number of residences within different levels of airport noise contours and the aircraft noise classifications are the main determinants for accessing aircraft noise social costs. Whist, based on the damages of different engine pollutants on the human health, vegetation, materials, aquatic ecosystem and climate, the aircraft engine emissions social costs vary from engine types to aircraft categories. The results indicate that the relationship appears to be curvilinear between environmental costs and the traffic volume of an airport. The results and methodology of environmental cost calculation could input for to the proposed European wide harmonized noise charges as well as the social cost benefit analysis of airports.

  4. Teaching at Logan International Airport

    ERIC Educational Resources Information Center

    Schmidt, Steffen

    2005-01-01

    Although Terminal C at Logan airport does not look like a classroom, for about fifty minutes on this author's way back from Boston it was for him. Like many public spaces, Logan now has a very robust Wi-Fi wireless network and this enabled him to take advantage of a departure delay to "teach" his class. In 1970 when the author started…

  5. The President Has No Clothes: The Case for Broader Application of Red Teaming within Homeland Security

    DTIC Science & Technology

    2010-06-01

    November 9, 2006). 130 Ibid. 131 Homeland Security News Wire, “Billions spent on airport security , but major security gaps remain.” 132 Arvind Gupta...security initiatives to improve airport security since 9/11.173 It also faces the challenge of managing almost 60,000 employees, 80 percent of whom work...perimeter at the airport security checkpoint.180 A Red Team might ask if we are building the equivalent of a modern-day Maginot line. What are the implied

  6. Assessing coastal flood risk and sea level rise impacts at New York City area airports

    NASA Astrophysics Data System (ADS)

    Ohman, K. A.; Kimball, N.; Osler, M.; Eberbach, S.

    2014-12-01

    's understanding of the effects of sea level rise on coastal flooding at the airports and guiding decision-making in the selection of effective adaptation actions. Given the importance of these airports to transportation, this project is advancing security and continuity of national and international commerce well into the 21st century.

  7. Security guide for subcontractors

    SciTech Connect

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  8. 14 CFR 152.109 - Project eligibility: Airport planning.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Project eligibility: Airport planning. 152....109 Project eligibility: Airport planning. (a) Airport master planning. A proposed project for airport master planning is not approved unless— (1) The location of the existing or proposed airport is...

  9. 14 CFR 152.325 - Financial status report: Airport planning.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Financial status report: Airport planning... TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT AID PROGRAM Accounting and Reporting Requirements § 152.325 Financial status report: Airport planning. Each sponsor of a project for airport master planning and each...

  10. 14 CFR 152.103 - Sponsors: Airport development.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Sponsors: Airport development. 152.103... (CONTINUED) AIRPORTS AIRPORT AID PROGRAM Eligibility Requirements and Application Procedures § 152.103 Sponsors: Airport development. (a) To be eligible to apply for a project for airport development...

  11. 14 CFR 152.103 - Sponsors: Airport development.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Sponsors: Airport development. 152.103... (CONTINUED) AIRPORTS AIRPORT AID PROGRAM Eligibility Requirements and Application Procedures § 152.103 Sponsors: Airport development. (a) To be eligible to apply for a project for airport development...

  12. 19 CFR 122.15 - User fee airports.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ..., Massachusetts L.G. Hanscom Field. Broomfield, Colorado Jefferson County Airport. Carlsbad, California McClellan... Centennial Airport. Fort Worth, Texas Fort Worth Alliance Airport. Fresno, California Fresno Yosemite... St. Louis Airport. McKinney, Texas Collin County Regional Airport. Melbourne, Florida...

  13. Palmdale International Airport, Palmdale, California. Airport Development Program

    DTIC Science & Technology

    1982-01-01

    Valley as a whole, to almost 17 persons per acre for all of Los Angeles County. If the airport is not built, the North County region will continue to...four- and six-lane freeway runs from the northeastern corner of the San Fernando Valley , past Palmdale and Lancaster, to just beyond Rosamond where...fanning centered in Lancaster <i<*l consists largely of t.rkey growers. The construction industry is also prominent in the Valley , adding

  14. Integrating repositories with fuel cycles: The airport authority model

    SciTech Connect

    Forsberg, C.

    2012-07-01

    The organization of the fuel cycle is a legacy of World War II and the cold war. Fuel cycle facilities were developed and deployed without consideration of the waste management implications. This led to the fuel cycle model of a geological repository site with a single owner, a single function (disposal), and no other facilities on site. Recent studies indicate large economic, safety, repository performance, nonproliferation, and institutional incentives to collocate and integrate all back-end facilities. Site functions could include geological disposal of spent nuclear fuel (SNF) with the option for future retrievability, disposal of other wastes, reprocessing with fuel fabrication, radioisotope production, other facilities that generate significant radioactive wastes, SNF inspection (navy and commercial), and related services such as SNF safeguards equipment testing and training. This implies a site with multiple facilities with different owners sharing some facilities and using common facilities - the repository and SNF receiving. This requires a different repository site institutional structure. We propose development of repository site authorities modeled after airport authorities. Airport authorities manage airports with government-owned runways, collocated or shared public and private airline terminals, commercial and federal military facilities, aircraft maintenance bases, and related operations - all enabled and benefiting the high-value runway asset and access to it via taxi ways. With a repository site authority the high value asset is the repository. The SNF and HLW receiving and storage facilities (equivalent to the airport terminal) serve the repository, any future reprocessing plants, and others with needs for access to SNF and other wastes. Non-public special-built roadways and on-site rail lines (equivalent to taxi ways) connect facilities. Airport authorities are typically chartered by state governments and managed by commissions with members

  15. Emergency Preparedness for Catastrophic Events at Small and Medium Sized Airports: Lacking or Not?

    NASA Technical Reports Server (NTRS)

    Sweet, Kathleen M.

    2007-01-01

    The implementation of security methods and processes in general has had a decisive impact on the aviation industry. However, efforts to effectively coordinate varied aspects of security protocols between agencies and general aviation components have not been adequately addressed. Whether or not overall security issues, especially with regard to planning for catastrophic terrorist events, have been neglected at the nation's smaller airports is the main topic of this paper. For perspective, the term general aviation is generally accepted to include all flying except for military and scheduled airline operations. Genera aviation makes up more than 1 percent of the U.S. Gross Domestic Product and supports almost 1.3 mission high-skilled jobs in professional services and manufacturing and hence is an important component of the aviation industry (AOPA, n.d.). In both conceptual and practical terms, this paper argues for the proactive management of security planning and repeated security awareness training from both an individual and an organizational perspective within the general aviation venue. The results of a research project incorporating survey data from general aviation and small commercial airport managers as well as Transportation Security Administration (TSA) employees are reported. Survey findings suggest that miscommunication does take place on different organizational levels and that between TSA employees and airport management interaction can be contentious and cooperation diminished. The importance of organizational training for decreasing conflict and increasing security and preparedness is discussed as a primary implication.

  16. Airport and superficial femoral artery obstruction due to a wandering coronary stent: the possibility of airport detection of modern implant metals.

    PubMed

    Teijink, J A W; van Herwaarden, J A; van den Berg, J C; Overtoom, T C; Moll, F L

    2004-06-01

    In the treatment of coronary artery disease, peripheral loss of a coronary stent is an unusual complication. We present the case of a patient who suggested that his right leg claudication was caused by a slipped coronary stent 2 years previously. The patient was convinced about this unusual finding based on an airport security check. Examination proved him to be right. However, the ability to detect an object using eddy currents is dependent on the object's permeability and its conductivity. Ferrous (iron) content is not the critical factor. Modern implant materials and processing techniques result in implants that are difficult to magnetize i.e. their permeability is very low. In addition their conductivity is very low. This enables modern implants to escape detection at airports. For this reason the event at the airport, as described by our patient, is considered coincidental.

  17. 76 FR 31823 - Technical Amendment to List of User Fee Airports: Addition of Dallas Love Field Municipal Airport...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-02

    ... Airports: Addition of Dallas Love Field Municipal Airport, Dallas, TX AGENCY: U.S. Customs and Border... revising the list of user fee airports to reflect the recent user fee airport designation for Dallas Love... of user fee status for Dallas Love Field Municipal Airport. This document updates the list of...

  18. Airport noise complaint patterns and interviews of frequent complainers at two major air carrier airports

    NASA Astrophysics Data System (ADS)

    Jaggers, Nicholas; Eiff, Gary

    2005-09-01

    The complex and highly sensitive topic of aircraft noise and population annoyance continues to be a major inhibitor to airport development plans. The projected growth of air travel necessitates expanded capacity at many existing airports and the development and construction of new airports in order to accommodate burgeoning traveler needs. Concerns by citizens near major airports about their economic, health, and social welfare continue to generate community and individual declarations of annoyance and concern which threaten timely solutions to airport expansion plans. A deeper understanding of the nature of these concerns is important to more effectively cope with airport expansion concerns among adjacent communities and surrounding neighbors. This study analyzed existing noise complaints registered at Denver International Airport (DEN) and Fort Lauderdale/Hollywood International Airport (FLL) in an attempt to gain greater understanding of noise complaint drivers and public annoyance. Interviews of frequent complainers were utilized in order to gain richer data concerning individual annoyance issues.

  19. LH2 airport requirements study

    NASA Technical Reports Server (NTRS)

    Brewer, G. D. (Editor)

    1976-01-01

    A preliminary assessment of the facilities and equipment which will be required at a representative airport is provided so liquid hydrogen LH2 can be used as fuel in long range transport aircraft in 1995-2000. A complete facility was conceptually designed, sized to meet the projected air traffic requirement. The facility includes the liquefaction plant, LH2, storage capability, and LH2 fuel handling system. The requirements for ground support and maintenance for the LH2 fueled aircraft were analyzed. An estimate was made of capital and operating costs which might be expected for the facility. Recommendations were made for design modifications to the reference aircraft, reflecting results of the analysis of airport fuel handling requirements, and for a program of additional technology development for air terminal related items.

  20. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Security Directives and Information Circulars. 1542.303 Section 1542.303 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  1. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Security Directives and Information Circulars. 1542.303 Section 1542.303 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  2. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Security Directives and Information Circulars. 1542.303 Section 1542.303 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  3. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Security Directives and Information Circulars. 1542.303 Section 1542.303 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  4. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars. 1542.303 Section 1542.303 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  5. Security during the Construction of New Nuclear Power Plants: Technical Basis for Access Authorization and Fitness-For-Duty Requirements

    SciTech Connect

    Branch, Kristi M.; Baker, Kathryn A.

    2009-09-01

    A technical letter report to the NRC summarizing the findings of a benchmarking study, literature review, and workshop with experts on current industry standards and expert judgments about needs for security during the construction phase of critical infrastructure facilities in the post-September 11 U.S. context, with a special focus on the construction phase of nuclear power plants and personnel security measures.

  6. Security for grids

    SciTech Connect

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  7. School Security.

    ERIC Educational Resources Information Center

    Bete, Tim, Ed.

    1998-01-01

    Presents the opinions of four security experts on the issue of guns in schools. The experts respond to the following questions: will schools ever be free of weapons; will card access systems become common in public schools; will metal detectors solve school security problems; and will students ever be issued bullet-proof vests along with…

  8. Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1984-10-11

    deterred by airline and airport security procedures cannot be determined with certainty. However, the number of firearms detected at passenger screening... airport security measures continue to provide increased safety and protection to air travelers, aircraft crewmembers, air carrier aircraft, and air

  9. 76 FR 54287 - Notice of Intent To Release Federally-Obligated Airport Properties, Tampa International Airport...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-31

    ... Federal Aviation Administration Notice of Intent To Release Federally-Obligated Airport Properties, Tampa International Airport, Tampa, FL AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Request for public comment. SUMMARY: The FAA hereby provides notice of intent to release certain airport properties,...

  10. 76 FR 74843 - Release of Airport Property, Martin County Airport, Stuart, FL

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-01

    ... Federal Aviation Administration Release of Airport Property, Martin County Airport, Stuart, FL AGENCY... properties, namely approximately 200 acres at the Martin County Airport, Stuart, FL, from the conditions, reservations, and restrictions as contained in a Surplus Property Agreement between the FAA and the...

  11. Airport-related air pollution and noise.

    PubMed

    Cohen, Beverly S; Bronzaft, Arline L; Heikkinen, Maire; Goodman, Jerome; Nádas, Arthur

    2008-02-01

    To provide quantitative evidence of the impact on people of a neighboring metropolitan airport, La Guardia Airport (LGA) in New York City, (1) airborne particulate matter (PM) was measured to determine whether concentration differences could be detected between homes that are upwind and downwind of the airport; (2) 24-hr noise measurements were made in 12 homes near the airport; and (3) the impact of noise was assessed by a Community Wellness and Health Promotion Survey. Particulate matter concentrations were higher during active airport operating hours than during nonoperating hours, and the percent increase varied inversely with distance from the airport. Hourly differences between paired upwind and downwind sites were not remarkable. Residents living near the airport were exposed to noise levels as much as four times greater than those experienced by residents in a quiet, comparison home. Impulse noise events were detected from both aircraft and vehicular traffic. More than 55% of the people living within the flight path were bothered by aircraft noise, and 63% by highway noise; these were significantly higher percentages than for residents in the nonflight area. The change in PM concentrations with distance during operating compared with nonoperating hours; traffic-related impulse noise events; and the elevated annoyance with highway noise, as well as aircraft noise among residents in the flight path area, show airport-related motor vehicle traffic to be a major contributor to the negative impact of airports on people in the surrounding communities.

  12. FAA Airport Design Competition for Universities

    NASA Technical Reports Server (NTRS)

    Sandy, Mary

    2008-01-01

    Raise awareness of the importance of airports to the National Airspace System infrastructure. Increase the involvement of the academic community in addressing airport operations and infrastructure issues and needs. Engage U.S. students in the conceptualization of applications, systems and equipment capable of addressing related challenges in a robust, reliable and comprehensive manner. Encourage U.S. undergraduate and graduate students to contribute innovative ideas and solutions to airport and runway safety issues. Provide the framework and incentives for quality educational experiences for university students. d Develop an awareness of and an interest in airports as a vital and interesting area for engineering and technology careers.

  13. Characteristic of Modal Choice Preference between Bus and Train from Medan to Kuala Namu Airport

    NASA Astrophysics Data System (ADS)

    Surbakti, M.; Bombongan, C.

    2017-03-01

    Kuala Namu International Airport started operating on July 25, 2013 to replace Polonia International Airport followed by the operation of airport train and bus as a public transport service mode. The purpose of the study was to define the characteristic of airport train and bus users how they choose both of the transportation modes and to test the sensitivity, if one of the transportation attribute are changes. The data obtained through stated preference method was modelled by using binary logit and probit models. From these two models, the probability of using airport train and bus transportation can be known. The result of analysis showed the equations of the function of utility difference of airport train and bus: UKAB-BB = 2,606 ‑ 0,028X1 ‑ 0,007X2 ‑ 0,014X3 ‑ 0,016X4 + 0,044X5, where X1, (cost attribute), X2 (time attribute), X3 (headway attribute), X4 (access attribute) and X5 (service attribute)..

  14. Creating a Clinical Video-Conferencing Facility in a Security-Constrained Environment Using Open-Source AccessGrid Software and Consumer Hardware

    PubMed Central

    Terrazas, Enrique; Hamill, Timothy R.; Wang, Ye; Channing Rodgers, R. P.

    2007-01-01

    The Department of Laboratory Medicine at the University of California, San Francisco (UCSF) has been split into widely separated facilities, leading to much time being spent traveling between facilities for meetings. We installed an open-source AccessGrid multi-media-conferencing system using (largely) consumer-grade equipment, connecting 6 sites at 5 separate facilities. The system was accepted rapidly and enthusiastically, and was inexpensive compared to alternative approaches. Security was addressed by aspects of the AG software and by local network administrative practices. The chief obstacles to deployment arose from security restrictions imposed by multiple independent network administration regimes, requiring a drastically reduced list of network ports employed by AG components. PMID:18693930

  15. Creating a clinical video-conferencing facility in a security-constrained environment using open-source AccessGrid software and consumer hardware.

    PubMed

    Terrazas, Enrique; Hamill, Timothy R; Wang, Ye; Channing Rodgers, R P

    2007-10-11

    The Department of Laboratory Medicine at the University of California, San Francisco (UCSF) has been split into widely separated facilities, leading to much time being spent traveling between facilities for meetings. We installed an open-source AccessGrid multi-media-conferencing system using (largely) consumer-grade equipment, connecting 6 sites at 5 separate facilities. The system was accepted rapidly and enthusiastically, and was inexpensive compared to alternative approaches. Security was addressed by aspects of the AG software and by local network administrative practices. The chief obstacles to deployment arose from security restrictions imposed by multiple independent network administration regimes, requiring a drastically reduced list of network ports employed by AG components.

  16. Compilation of Disruptions to Airports by Volcanic Activity (Version 1.0, 1944-2006)

    USGS Publications Warehouse

    Guffanti, Marianne; Mayberry, Gari C.; Casadevall, Thomas J.; Wunderman, Richard

    2008-01-01

    Volcanic activity has caused significant hazards to numerous airports worldwide, with local to far-ranging effects on travelers and commerce. To more fully characterize the nature and scope of volcanic hazards to airports, we collected data on incidents of airports throughout the world that have been affected by volcanic activity, beginning in 1944 with the first documented instance of damage to modern aircraft and facilities in Naples, Italy, and extending through 2006. Information was gleaned from various sources, including news outlets, volcanological reports (particularly the Smithsonian Institution's Bulletin of the Global Volcanism Network), and previous publications on the topic. This report presents the full compilation of the data collected. For each incident, information about the affected airport and the volcanic source has been compiled as a record in a Microsoft Access database. The database is incomplete in so far as incidents may not have not been reported or documented, but it does present a good sample from diverse parts of the world. Not included are en-route diversions to avoid airborne ash clouds at cruise altitudes. The database has been converted to a Microsoft Excel spreadsheet. To make the PDF version of table 1 in this open-file report resemble the spreadsheet, order the PDF pages as 12, 17, 22; 13, 18, 23; 14, 19, 24; 15, 20, 25; and 16, 21, 26. Analysis of the database reveals that, at a minimum, 101 airports in 28 countries were impacted on 171 occasions from 1944 through 2006 by eruptions at 46 volcanoes. The number of affected airports (101) probably is better constrained than the number of incidents (171) because recurring disruptions at a given airport may have been lumped together or not reported by news agencies, whereas the initial disruption likely is noticed and reported and thus the airport correctly counted.

  17. 76 FR 19517 - Orders Limiting Scheduled Operations at John F. Kennedy International Airport, LaGuardia Airport...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-07

    ... Airport, LaGuardia Airport, and Newark Liberty International Airport; High Density Rule at Reagan National.... FAA Analysis Under the FAA's High Density Rule and Orders limiting scheduled operations at LGA,...

  18. Career Unit. Careers at an Airport.

    ERIC Educational Resources Information Center

    Booker, Billie

    This career exploration instructional unit on airport careers is one of several resulting from the rural southwestern Colorado CEPAC Project (Career Education Process of Attitude Change). This unit is designed to help students become aware of the different types of jobs connected with running an airport (e.g., ticket agent, pilot, skycap, traffic…

  19. 14 CFR 398.3 - Specific airports.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Specific airports. 398.3 Section 398.3... STATEMENTS GUIDELINES FOR INDIVIDUAL DETERMINATIONS OF BASIC ESSENTIAL AIR SERVICE § 398.3 Specific airports. (a) At an eligible place, essential air service may be specified as service to a particular...

  20. 14 CFR 398.3 - Specific airports.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 4 2011-01-01 2011-01-01 false Specific airports. 398.3 Section 398.3... STATEMENTS GUIDELINES FOR INDIVIDUAL DETERMINATIONS OF BASIC ESSENTIAL AIR SERVICE § 398.3 Specific airports. (a) At an eligible place, essential air service may be specified as service to a particular...

  1. 40 CFR 258.10 - Airport safety.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Airport safety. 258.10 Section 258.10 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES CRITERIA FOR MUNICIPAL SOLID WASTE LANDFILLS Location Restrictions § 258.10 Airport safety. (a) Owners or operators of...

  2. Airport Economics: Management Control Financial Reporting Systems

    NASA Technical Reports Server (NTRS)

    Buchbinder, A.

    1972-01-01

    The development of management control financial reporting systems for airport operation is discussed. The operation of the system to provide the reports required for determining the specific revenue producing facilities of airports is described. The organization of the cost reporting centers to show the types of information provided by the system is analyzed.

  3. False security or greater social inclusion? Exploring perceptions of CCTV use in public and private spaces accessed by the homeless.

    PubMed

    Huey, Laura

    2010-03-01

    It has been well documented that owing to the vulnerability inherent in their situation and status, the homeless experience high rates of harassment and criminal victimization. And yet, the question of whether CCTV surveillance of public and private spaces - so frequently viewed by the middle classes as a positive source of potential security - might also be viewed by the homeless in similar ways. Within the present paper, I address this issue by considering the possibility that CCTV might be seen by some homeless men and women as offering: a) a measure of enhanced security for those living in the streets and in shelters, and; b) to the extent that security is conceived of as a social good, the receipt of which marks one as a citizen of the state, a means by which they can be reconstituted as something more than 'lesser citizens'. To test these ideas, I rely on data from interviews conducted with homeless service users, service providers for the homeless, and police personnel in three cities. What is revealed is a mixed set of beliefs as to the relative security and meaning of CCTV.

  4. 41 CFR 105-64.209 - What special conditions apply to accessing law enforcement and security records?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... and Property Management Federal Property Management Regulations System (Continued) GENERAL SERVICES... enforcement and security records are generally exempt from disclosure to individuals except when the system.... If so, the system manager will notify you of the existence of the record and disclose the...

  5. Siting Solar Photovoltaics at Airports: Preprint

    SciTech Connect

    Kandt, A.; Romero, R.

    2014-06-01

    Airports present a significant opportunity for hosting solar technologies due to their open land; based on a 2010 Federal Aviation Administration study, the US Department of Agriculture, and the US Fish and Wildlife Service, there's potential for 116,704 MW of solar photovoltaics (PV) on idle lands at US airports. PV has a low profile and likely low to no impact on flight operations. This paper outlines guidance for implementing solar technologies at airports and airfields, focusing largely on the Federal Aviation Administration's policies. The paper also details best practices for siting solar at airports, provides information on the Solar Glare Hazard Analysis Tool, and highlights a case study example where solar has been installed at an airport.

  6. Airport noise impact reduction through operations

    NASA Technical Reports Server (NTRS)

    Deloach, R.

    1981-01-01

    The airport-noise levels and annoyance model (ALAMO) developed at NASA Langley Research Center is comprised of a system of computer programs which is capable of quantifying airport community noise impact in terms of noise level, population distribution, and human subjective response to noise. The ALAMO can be used to compare the noise impact of an airport's current operating scenario with the noise impact which would result from some proposed change in airport operations. The relative effectiveness of number of noise-impact reduction alternatives is assessed for a major midwest airport. Significant reductions in noise impact are predicted for certain noise abatement strategies while others are shown to result in relatively little noise relief.

  7. Airport Delay and Improvement Study, John F. Kennedy International Airport and LaGuardia Airport.

    DTIC Science & Technology

    1981-10-01

    LaGuardia Airport fb Current System Operation Aircraft delat has been ar integral part of the operationr or out presen s %tem of major huh airpnort,. Ru ri...iuardia %%henl Kcnnecd% is usingt thre Ruiiwa% 131 11 S. I it, pioposal riral. with the departure delav increasing h,, 3.5 minutes. Oserall. a delat ...genieral iatrioii actIisits. adds 5.7󈧥 additiontal I%TF;RIM AK k ORTErX %S rFEM mntes o t delat , at a Co st of S95.5-8 annual[%. Because of he os

  8. 19 CFR 122.15 - User fee airports.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... AIR COMMERCE REGULATIONS Classes of Airports § 122.15 User fee airports. (a) Permission to land. The procedures for obtaining permission to land at a user fee airport are the same procedures as those set forth... is subject to change without notice. Information concerning service at any user fee airport can...

  9. 14 CFR 139.203 - Contents of Airport Certification Manual.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 3 2014-01-01 2014-01-01 false Contents of Airport Certification Manual... CERTIFICATION OF AIRPORTS Airport Certification Manual § 139.203 Contents of Airport Certification Manual. (a... serving facilities or NAVAIDS that support air carrier operations X X X 8. A description of the system...

  10. 14 CFR 139.203 - Contents of Airport Certification Manual.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Contents of Airport Certification Manual... CERTIFICATION OF AIRPORTS Airport Certification Manual § 139.203 Contents of Airport Certification Manual. (a) Except as otherwise authorized by the Administrator, each certificate holder must include in the...

  11. 19 CFR 122.13 - List of international airports.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false List of international airports. 122.13 Section 122... THE TREASURY AIR COMMERCE REGULATIONS Classes of Airports § 122.13 List of international airports. The following is a list of international airports of entry designated by the Secretary of the Treasury....

  12. 19 CFR 122.13 - List of international airports.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false List of international airports. 122.13 Section 122... THE TREASURY AIR COMMERCE REGULATIONS Classes of Airports § 122.13 List of international airports. The following is a list of international airports of entry designated by the Secretary of the Treasury....

  13. 19 CFR 122.11 - Designation as international airport.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Designation as international airport. 122.11...; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Classes of Airports § 122.11 Designation as international airport. (a) Procedure. International airports, as defined in § 122.1(e), will be designated after...

  14. 14 CFR 121.617 - Alternate airport for departure.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Alternate airport for departure. 121.617... Alternate airport for departure. (a) If the weather conditions at the airport of takeoff are below the landing minimums in the certificate holder's operations specifications for that airport, no person...

  15. 14 CFR 135.223 - IFR: Alternate airport requirements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false IFR: Alternate airport requirements. 135... VFR/IFR Operating Limitations and Weather Requirements § 135.223 IFR: Alternate airport requirements...) to— (1) Complete the flight to the first airport of intended landing; (2) Fly from that airport...

  16. 14 CFR 151.3 - National Airport Plan.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false National Airport Plan. 151.3 Section 151.3 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRPORTS FEDERAL AID TO AIRPORTS General Requirements § 151.3 National Airport Plan. (a) Under the Federal...

  17. 14 CFR 121.617 - Alternate airport for departure.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Alternate airport for departure. 121.617... Alternate airport for departure. (a) If the weather conditions at the airport of takeoff are below the landing minimums in the certificate holder's operations specifications for that airport, no person...

  18. 14 CFR 135.223 - IFR: Alternate airport requirements.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false IFR: Alternate airport requirements. 135... VFR/IFR Operating Limitations and Weather Requirements § 135.223 IFR: Alternate airport requirements...) to— (1) Complete the flight to the first airport of intended landing; (2) Fly from that airport...

  19. 14 CFR 152.107 - Project eligibility: Airport development.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Project eligibility: Airport development... TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT AID PROGRAM Eligibility Requirements and Application Procedures § 152.107 Project eligibility: Airport development. (a) Except in the case of approved stage...

  20. 14 CFR 93.123 - High density traffic airports.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 2 2011-01-01 2011-01-01 false High density traffic airports. 93.123... (CONTINUED) AIR TRAFFIC AND GENERAL OPERATING RULES SPECIAL AIR TRAFFIC RULES High Density Traffic Airports § 93.123 High density traffic airports. (a) Each of the following airports is designated as a...

  1. 14 CFR 152.323 - Budget revision: Airport development.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Budget revision: Airport development. 152... TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT AID PROGRAM Accounting and Reporting Requirements § 152.323 Budget revision: Airport development. (a) If any performance review conducted by the sponsor discloses a need...

  2. 19 CFR 122.14 - Landing rights airport.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Landing rights airport. 122.14 Section 122.14... TREASURY AIR COMMERCE REGULATIONS Classes of Airports § 122.14 Landing rights airport. (a) Permission to land. Permission to land at a landing rights airport may be given as follows: (1) Scheduled flight....

  3. 14 CFR 152.107 - Project eligibility: Airport development.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Project eligibility: Airport development... TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT AID PROGRAM Eligibility Requirements and Application Procedures § 152.107 Project eligibility: Airport development. (a) Except in the case of approved stage...

  4. 14 CFR 139.203 - Contents of Airport Certification Manual.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Contents of Airport Certification Manual... CERTIFICATION OF AIRPORTS Airport Certification Manual § 139.203 Contents of Airport Certification Manual. (a) Except as otherwise authorized by the Administrator, each certificate holder must include in the...

  5. 14 CFR 152.111 - Application requirements: Airport development.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Application requirements: Airport... TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT AID PROGRAM Eligibility Requirements and Application Procedures § 152.111 Application requirements: Airport development. (a) An eligible sponsor that desires to...

  6. 14 CFR 152.323 - Budget revision: Airport development.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Budget revision: Airport development. 152... TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT AID PROGRAM Accounting and Reporting Requirements § 152.323 Budget revision: Airport development. (a) If any performance review conducted by the sponsor discloses a need...

  7. 19 CFR 122.11 - Designation as international airport.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Designation as international airport. 122.11...; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Classes of Airports § 122.11 Designation as international airport. (a) Procedure. International airports, as defined in § 122.1(e), will be designated after...

  8. 14 CFR 151.3 - National Airport Plan.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false National Airport Plan. 151.3 Section 151.3 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRPORTS FEDERAL AID TO AIRPORTS General Requirements § 151.3 National Airport Plan. (a) Under the Federal...

  9. 14 CFR 152.111 - Application requirements: Airport development.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Application requirements: Airport... TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT AID PROGRAM Eligibility Requirements and Application Procedures § 152.111 Application requirements: Airport development. (a) An eligible sponsor that desires to...

  10. 14 CFR 152.109 - Project eligibility: Airport planning.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Project eligibility: Airport planning. 152....109 Project eligibility: Airport planning. (a) Airport master planning. A proposed project for airport... master planning as defined in § 152.3; (4) If the project has been determined to have...

  11. 14 CFR 152.325 - Financial status report: Airport planning.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... status report: Airport planning. Each sponsor of a project for airport master planning and each planning agency conducting a project for airport system planning shall submit a financial status report on a form... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Financial status report: Airport...

  12. 14 CFR 121.625 - Alternate Airport weather minima.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 3 2011-01-01 2011-01-01 false Alternate Airport weather minima. 121.625... Alternate Airport weather minima. Except as provided in § 121.624 for ETOPS Alternate Airports, no person may list an airport as an alternate in the dispatch or flight release unless the appropriate...

  13. 14 CFR 121.625 - Alternate Airport weather minima.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 3 2013-01-01 2013-01-01 false Alternate Airport weather minima. 121.625... Alternate Airport weather minima. Except as provided in § 121.624 for ETOPS Alternate Airports, no person may list an airport as an alternate in the dispatch or flight release unless the appropriate...

  14. 14 CFR 121.625 - Alternate Airport weather minima.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 3 2014-01-01 2014-01-01 false Alternate Airport weather minima. 121.625... Alternate Airport weather minima. Except as provided in § 121.624 for ETOPS Alternate Airports, no person may list an airport as an alternate in the dispatch or flight release unless the appropriate...

  15. 14 CFR 121.625 - Alternate Airport weather minima.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Alternate Airport weather minima. 121.625... Alternate Airport weather minima. Except as provided in § 121.624 for ETOPS Alternate Airports, no person may list an airport as an alternate in the dispatch or flight release unless the appropriate...

  16. 14 CFR 121.625 - Alternate Airport weather minima.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 3 2012-01-01 2012-01-01 false Alternate Airport weather minima. 121.625... Alternate Airport weather minima. Except as provided in § 121.624 for ETOPS Alternate Airports, no person may list an airport as an alternate in the dispatch or flight release unless the appropriate...

  17. 14 CFR 93.123 - High density traffic airports.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 2 2014-01-01 2014-01-01 false High density traffic airports. 93.123... (CONTINUED) AIR TRAFFIC AND GENERAL OPERATING RULES SPECIAL AIR TRAFFIC RULES High Density Traffic Airports § 93.123 High density traffic airports. (a) Each of the following airports is designated as a...

  18. 14 CFR 93.123 - High density traffic airports.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 2 2013-01-01 2013-01-01 false High density traffic airports. 93.123... (CONTINUED) AIR TRAFFIC AND GENERAL OPERATING RULES SPECIAL AIR TRAFFIC RULES High Density Traffic Airports § 93.123 High density traffic airports. (a) Each of the following airports is designated as a...

  19. 14 CFR 93.123 - High density traffic airports.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 2 2012-01-01 2012-01-01 false High density traffic airports. 93.123... (CONTINUED) AIR TRAFFIC AND GENERAL OPERATING RULES SPECIAL AIR TRAFFIC RULES High Density Traffic Airports § 93.123 High density traffic airports. (a) Each of the following airports is designated as a...

  20. 43 CFR 2651.6 - Airport and air navigation facilities.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 43 Public Lands: Interior 2 2011-10-01 2011-10-01 false Airport and air navigation facilities... Village Selections § 2651.6 Airport and air navigation facilities. (a) Every airport and air navigation.... (b) The surface of all other lands of existing airport sites, airway beacons, or other...

  1. 43 CFR 2651.6 - Airport and air navigation facilities.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 43 Public Lands: Interior 2 2012-10-01 2012-10-01 false Airport and air navigation facilities... Village Selections § 2651.6 Airport and air navigation facilities. (a) Every airport and air navigation.... (b) The surface of all other lands of existing airport sites, airway beacons, or other...

  2. 43 CFR 2651.6 - Airport and air navigation facilities.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 43 Public Lands: Interior 2 2014-10-01 2014-10-01 false Airport and air navigation facilities... Village Selections § 2651.6 Airport and air navigation facilities. (a) Every airport and air navigation.... (b) The surface of all other lands of existing airport sites, airway beacons, or other...

  3. 43 CFR 2651.6 - Airport and air navigation facilities.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 43 Public Lands: Interior 2 2013-10-01 2013-10-01 false Airport and air navigation facilities... Village Selections § 2651.6 Airport and air navigation facilities. (a) Every airport and air navigation.... (b) The surface of all other lands of existing airport sites, airway beacons, or other...

  4. 78 FR 65417 - Notice of Request To Release Airport Property

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-31

    ... Regional Airport (EAR), Kearney, Nebraska. SUMMARY: The FAA proposes to rule and invites public comment on... request to release approximately 67.72 acres of airport property at the Kearney Regional Airport (EAR... property at the Kearney Regional Airport (EAR) submitted by the Sponsor meets the procedural...

  5. 77 FR 73310 - Technical Amendment to List of User Fee Airports: Addition of Bozeman Yellowstone International...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-10

    ... Airports: Addition of Bozeman Yellowstone International Airport, Belgrade, MT AGENCY: U.S. Customs and... user fee airports to reflect the recent user fee airport designation for Bozeman Yellowstone International Airport in Belgrade, Montana. User fee airports are those airports which, while not qualifying...

  6. 76 FR 21420 - Policy and Procedures Concerning the Use of Airport Revenue; Policy Regarding Airport Rates and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-15

    ... Federal Aviation Administration Policy and Procedures Concerning the Use of Airport Revenue; Policy Regarding Airport Rates and Charges: Petition of the Clark County Department of Aviation To Use a Weight... consistent with Federal law and policies on the use of airport revenue and on airport rates and charges....

  7. 76 FR 30422 - Notice of Intent To Rule on Request To Release Airport Property at the Helena Regional Airport...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-25

    ... on Request To Release Airport Property at the Helena Regional Airport, Helena, Montana AGENCY... Release Airport Property. SUMMARY: The FAA proposes to rule and invite public comment on the release of land at Helena Regional Airport (HLN) under the provisions of Section 125 of the Wendell H....

  8. Reusable Security Requirements

    DTIC Science & Technology

    2016-06-13

    terms of subfactor of security quality factor, asset, threat, attacker, and situation • Standard measures for security subfactors • Parameterized...2003 by Carnegie Mellon University page 5 Carnegie Mellon Software Engineering Institute Types of Security Requirements Use Quality Model of factors...subfactors, criteria, and measures. Small number of Security Quality Subfactors: • Access Control (Identification, Authentication, and Authorization

  9. Technical and Operational Analysis of the Fortress Secure Wireless Access Bridge (ES-520) in Support of Tactical Military Coalition Operations

    DTIC Science & Technology

    2008-03-01

    Media Access Control MANET Mobile Ad Hoc Networking Mbps Megabit per second MCA Multi-Channel Architecture MIL-STD Military Standard MIMO ...RESEARCH EFFORTS A. BACKGROUND The world of military communications is on the verge of massive and revolutionary change, from new generations of...and custom radio designs. This radio technology roadmap includes 802.11n Multiple-input multiple-output ( MIMO ), 4.9GHz WI-FI, etc [3]. 2. Mesh

  10. Collision Avoidance for Airport Traffic Simulation Evaluation

    NASA Technical Reports Server (NTRS)

    Jones, Denise R.; Prinzel, Lawrence J., III; Shelton, Kevin J.; Bailey, Randall E.; Otero, Sharon D.; Barker, Glover D.

    2010-01-01

    A Collision Avoidance for Airport Traffic (CAAT) concept for the airport Terminal Maneuvering Area (TMA) was evaluated in a simulation study at the National Aeronautics and Space Administration (NASA) Langley Research Center. CAAT is being designed to enhance surface situation awareness and provide cockpit alerts of potential conflicts during runway, taxi, and low altitude air-to-air operations. The purpose of the study was to evaluate pilot reaction to conflict events in the TMA near the airport, different alert timings for various scenarios, alerting display concepts, and directive alerting concepts. This paper gives an overview of the conflict detection and resolution (CD&R) concept, simulation study, and test results

  11. Surface Operations Systems Improve Airport Efficiency

    NASA Technical Reports Server (NTRS)

    2009-01-01

    With Small Business Innovation Research (SBIR) contracts from Ames Research Center, Mosaic ATM of Leesburg, Virginia created software to analyze surface operations at airports. Surface surveillance systems, which report locations every second for thousands of air and ground vehicles, generate massive amounts of data, making gathering and analyzing this information difficult. Mosaic?s Surface Operations Data Analysis and Adaptation (SODAA) tool is an off-line support tool that can analyze how well the airport surface operation is working and can help redesign procedures to improve operations. SODAA helps researchers pinpoint trends and correlations in vast amounts of recorded airport operations data.

  12. Secure portal.

    SciTech Connect

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing the secure portal

  13. Public health impact of large airports.

    PubMed

    Passchier, W; Knottnerus, A; Albering, H; Walda, I

    2000-01-01

    Large airports with the related infrastructure, businesses and industrial activities affect the health of the population living, travelling and working in the surroundings of or at the airport. The employment and contributions to economy from the airport and related operations are expected to have a beneficial effect, which, however, is difficult to quantify. More pertinent data are available on the, largely negative, health effects of environmental factors, such as air and soil pollution, noise, accident risk, and landscape changes. Information on the concurrent and cumulative impact of these factors is lacking, but is of primary relevance for public health policy. A committee of the Health Council of The Netherlands recently reviewed the data on the health impact of large airports. It was concluded that, generally, integrated health assessments are not available. Such assessments, as part of sustainable mobility policy, should accompany the further development of the global aviation system.

  14. Aircraft and airport noise control prospective outlook

    SciTech Connect

    Shapiro, N.

    1982-01-01

    In a perspective look at aircraft and airport noise control over the past ten years or more - or more is added here because the Federal Aviation Regulation Part 36 of 1969 is a more significant milestone for the air transportation system than is the Noise Control Act of 1972 - we see an appreciable reduction in the noise emitted by newly designed and newly produced airplanes, particularly those powered by the new high bypass engines, but only, at best, a moderate alleviation of airport noise. The change in airport noise exposure was the consequence of the introduction of some new, quieter airplanes into the airlines fleets and some operational modifications or restrictions at the airports.

  15. Behavioral Indicators of Drug Couriers in Airports

    DTIC Science & Technology

    2015-04-30

    Naval Research Laboratory Washington, DC 20375-5320 NRL/MR/5508--15-9595 Behavioral Indicators of Drug Couriers in Airports April 30, 2015 Approved...identify behaviors typical of drug couriers. Based on this training and the roundtable, AMX researchers cataloged 69 distinct behaviors in 7...in the case of the illegal narcotics trade, where drug couriers use airports to transport drugs and money throughout the United States. While

  16. The Joint Airport Weather Studies (JAWS) project

    NASA Technical Reports Server (NTRS)

    Mccarthy, J.; Wilson, J.; Fujita, T. T.

    1983-01-01

    A block diagram of the joint airport weather studies program is presented. Background leading to the development of the program is reviewed. Basic studies, aircraft performance, and detection and warning techniques used to develop fine scale structure of thunderstorm dynamics and kinematics in the vicinity of a major airport; effect of thunderstorm low level wind shear on aircraft performance; and development of real time testing of flow level wind shear detection and warning techniques and displays are described.

  17. Prediction of Weather Impacted Airport Capacity using Ensemble Learning

    NASA Technical Reports Server (NTRS)

    Wang, Yao Xun

    2011-01-01

    Ensemble learning with the Bagging Decision Tree (BDT) model was used to assess the impact of weather on airport capacities at selected high-demand airports in the United States. The ensemble bagging decision tree models were developed and validated using the Federal Aviation Administration (FAA) Aviation System Performance Metrics (ASPM) data and weather forecast at these airports. The study examines the performance of BDT, along with traditional single Support Vector Machines (SVM), for airport runway configuration selection and airport arrival rates (AAR) prediction during weather impacts. Testing of these models was accomplished using observed weather, weather forecast, and airport operation information at the chosen airports. The experimental results show that ensemble methods are more accurate than a single SVM classifier. The airport capacity ensemble method presented here can be used as a decision support model that supports air traffic flow management to meet the weather impacted airport capacity in order to reduce costs and increase safety.

  18. LigoDV-web: Providing easy, secure and universal access to a large distributed scientific data store for the LIGO scientific collaboration

    NASA Astrophysics Data System (ADS)

    Areeda, J. S.; Smith, J. R.; Lundgren, A. P.; Maros, E.; Macleod, D. M.; Zweizig, J.

    2017-01-01

    Gravitational-wave observatories around the world, including the Laser Interferometer Gravitational-Wave Observatory (LIGO), record a large volume of gravitational-wave output data and auxiliary data about the instruments and their environments. These data are stored at the observatory sites and distributed to computing clusters for data analysis. LigoDV-web is a web-based data viewer that provides access to data recorded at the LIGO Hanford, LIGO Livingston and GEO600 observatories, and the 40 m prototype interferometer at Caltech. The challenge addressed by this project is to provide meaningful visualizations of small data sets to anyone in the collaboration in a fast, secure and reliable manner with minimal software, hardware and training required of the end users. LigoDV-web is implemented as a Java Enterprise Application, with Shibboleth Single Sign On for authentication and authorization, and a proprietary network protocol used for data access on the back end. Collaboration members with proper credentials can request data be displayed in any of several general formats from any Internet appliance that supports a modern browser with Javascript and minimal HTML5 support, including personal computers, smartphones, and tablets. Since its inception in 2012, 634 unique users have visited the LigoDV-web website in a total of 33 , 861 sessions and generated a total of 139 , 875 plots. This infrastructure has been helpful in many analyses within the collaboration including follow-up of the data surrounding the first gravitational-wave events observed by LIGO in 2015.

  19. 33 CFR 162.20 - Flushing Bay near La Guardia Airport, Flushing, N.Y.; restricted area.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Flushing Bay near La Guardia Airport, Flushing, N.Y.; restricted area. 162.20 Section 162.20 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY INLAND...

  20. 77 FR 3324 - Release of Airport Property: Fort Myers International Airport, Fort Myers, FL

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-23

    ... [Federal Register Volume 77, Number 14 (Monday, January 23, 2012)] [Notices] [Page 3324] [FR Doc No: 2012-1064] DEPARTMENT OF TRANSPORTATION Federal Aviation Administration Release of Airport... Airports District Office Southern Region. R [FR Doc. 2012-1064 Filed 1-20-12; 8:45 am] BILLING CODE...