28 CFR 105.27 - Miscellaneous provisions.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...
28 CFR 105.27 - Miscellaneous provisions.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...
28 CFR 105.27 - Miscellaneous provisions.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...
28 CFR 105.27 - Miscellaneous provisions.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...
28 CFR 105.27 - Miscellaneous provisions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...
75 FR 23196 - Exchange Visitor Program-Secondary School Students
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-03
.... diplomatic and foreign policy goals by encouraging this positive academic and social interaction. Experience... currently requires a private vendor name and social security number check of all potential host family... check or the name and social security number criminal background check. NCMEC would interpret...
28 CFR 105.23 - Procedure for requesting criminal history record check.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 28 Judicial Administration 2 2013-07-01 2013-07-01 false Procedure for requesting criminal history... HISTORY BACKGROUND CHECKS Private Security Officer Employment § 105.23 Procedure for requesting criminal history record check. These procedures only apply to participating states. An authorized employer may...
28 CFR 105.23 - Procedure for requesting criminal history record check.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 28 Judicial Administration 2 2014-07-01 2014-07-01 false Procedure for requesting criminal history... HISTORY BACKGROUND CHECKS Private Security Officer Employment § 105.23 Procedure for requesting criminal history record check. These procedures only apply to participating states. An authorized employer may...
28 CFR 105.23 - Procedure for requesting criminal history record check.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 28 Judicial Administration 2 2011-07-01 2011-07-01 false Procedure for requesting criminal history... HISTORY BACKGROUND CHECKS Private Security Officer Employment § 105.23 Procedure for requesting criminal history record check. These procedures only apply to participating states. An authorized employer may...
28 CFR 105.23 - Procedure for requesting criminal history record check.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 28 Judicial Administration 2 2012-07-01 2012-07-01 false Procedure for requesting criminal history... HISTORY BACKGROUND CHECKS Private Security Officer Employment § 105.23 Procedure for requesting criminal history record check. These procedures only apply to participating states. An authorized employer may...
28 CFR 105.23 - Procedure for requesting criminal history record check.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Procedure for requesting criminal history... HISTORY BACKGROUND CHECKS Private Security Officer Employment § 105.23 Procedure for requesting criminal history record check. These procedures only apply to participating states. An authorized employer may...
Review of Private Sector Personnel Screening Practices
2000-10-01
private sector investigative sources or methods would be useful to the DoD for conducting national security background investigations. The federal government by and large examines more sources and conducts more thorough investigations than industry. In general, private employers (1) have less access to information about applicants...outsource many elements of background checks. It is recommended that the DoD periodically evaluate private sector screening programs and data sources in order to monitor
32 CFR Appendix A to Part 86 - Criminal History Background Check Procedures
Code of Federal Regulations, 2010 CFR
2010-07-01
... responsibility in ensuring a safe and secure environment for children within DoD activities or private... installation level. An IRC will be completed on individuals with a DoD affiliation such as living or working on... checks through the SCHR to personnel offices working with law enforcement or investigative agencies. They...
NASA Astrophysics Data System (ADS)
Vijay Singh, Ran; Agilandeeswari, L.
2017-11-01
To handle the large amount of client’s data in open cloud lots of security issues need to be address. Client’s privacy should not be known to other group members without data owner’s valid permission. Sometime clients are fended to have accessing with open cloud servers due to some restrictions. To overcome the security issues and these restrictions related to storing, data sharing in an inter domain network and privacy checking, we propose a model in this paper which is based on an identity based cryptography in data transmission and intermediate entity which have client’s reference with identity that will take control handling of data transmission in an open cloud environment and an extended remote privacy checking technique which will work at admin side. On behalf of data owner’s authority this proposed model will give best options to have secure cryptography in data transmission and remote privacy checking either as private or public or instructed. The hardness of Computational Diffie-Hellman assumption algorithm for key exchange makes this proposed model more secure than existing models which are being used for public cloud environment.
Forensic patients--who is watching them?
White, John M
2012-01-01
Does your hospital security department have the right and/or responsibility for checking out the qualifications and practices of private contractors hired by law enforcement to guard forensic patients? In this article, the author explains why you should.
Code of Federal Regulations, 2011 CFR
2011-07-01
... private business or trade. Securities. Mutual funds, stocks, bonds, or any product registered with the... fund employees and special Government employees, of the Department of Defense. Financial services... banking (e.g., ATMs), in-store banking, checking, share and savings accounts, fund transfers, sale of...
Code of Federal Regulations, 2010 CFR
2010-07-01
... private business or trade. Securities. Mutual funds, stocks, bonds, or any product registered with the... fund employees and special Government employees, of the Department of Defense. Financial services... banking (e.g., ATMs), in-store banking, checking, share and savings accounts, fund transfers, sale of...
28 CFR 105.24 - Employee's rights.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 28 Judicial Administration 2 2011-07-01 2011-07-01 false Employee's rights. 105.24 Section 105.24 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Private Security Officer Employment § 105.24 Employee's rights. An employee is entitled to: (a) Obtain a copy from...
28 CFR 105.24 - Employee's rights.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 28 Judicial Administration 2 2013-07-01 2013-07-01 false Employee's rights. 105.24 Section 105.24 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Private Security Officer Employment § 105.24 Employee's rights. An employee is entitled to: (a) Obtain a copy from...
28 CFR 105.24 - Employee's rights.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 28 Judicial Administration 2 2014-07-01 2014-07-01 false Employee's rights. 105.24 Section 105.24 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Private Security Officer Employment § 105.24 Employee's rights. An employee is entitled to: (a) Obtain a copy from...
28 CFR 105.24 - Employee's rights.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 28 Judicial Administration 2 2012-07-01 2012-07-01 false Employee's rights. 105.24 Section 105.24 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Private Security Officer Employment § 105.24 Employee's rights. An employee is entitled to: (a) Obtain a copy from...
28 CFR 105.24 - Employee's rights.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Employee's rights. 105.24 Section 105.24 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Private Security Officer Employment § 105.24 Employee's rights. An employee is entitled to: (a) Obtain a copy from...
A Weakest Precondition Approach to Robustness
NASA Astrophysics Data System (ADS)
Balliu, Musard; Mastroeni, Isabella
With the increasing complexity of information management computer systems, security becomes a real concern. E-government, web-based financial transactions or military and health care information systems are only a few examples where large amount of information can reside on different hosts distributed worldwide. It is clear that any disclosure or corruption of confidential information in these contexts can result fatal. Information flow controls constitute an appealing and promising technology to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted environments still remains an open problem in the area of language-based security. Robustness asserts that an active attacker, who can modify program code in some fixed points (holes), is unable to disclose more private information than a passive attacker, who merely observes unclassified data. In this paper, we extend a method recently proposed for checking declassified non-interference in presence of passive attackers only, in order to check robustness by means of weakest precondition semantics. In particular, this semantics simulates the kind of analysis that can be performed by an attacker, i.e., from public output towards private input. The choice of semantics allows us to distinguish between different attacks models and to characterize the security of applications in different scenarios.
NASA Astrophysics Data System (ADS)
Basak, Jyotirmoy; Maitra, Subhamoy
2018-04-01
In device-independent (DI) paradigm, the trustful assumptions over the devices are removed and CHSH test is performed to check the functionality of the devices toward certifying the security of the protocol. The existing DI protocols consider infinite number of samples from theoretical point of view, though this is not practically implementable. For finite sample analysis of the existing DI protocols, we may also consider strategies for checking device independence other than the CHSH test. In this direction, here we present a comparative analysis between CHSH and three-party Pseudo-telepathy game for the quantum private query protocol in DI paradigm that appeared in Maitra et al. (Phys Rev A 95:042344, 2017) very recently.
Group Key Agreement Efficient in Communication
2003-10-14
Selected Areas in Communications, 17(9), September 1999. [13] David Chaum . Zero-knowledge undeniable signatures . In I.B. Damgard, editor, Advances in...sender with some sufficiently strong public key signature method such as DSA or RSA (and using a long-term private key).1 All receivers are required...to verify signatures on all received messages and check the aforementioned fields. Consequently, our security model is different from some recent
1990-07-01
5 H. Instructions to Offerors ..................................... V-5 VI. Evaluation Factors for Award .................................. VI- 1 A...providing capital improvements, and providing payments to the NAFI (Section VI). These factors will be weighted in the evaluation. The Contracting...maintenance of good order and discipline, security checks, control of drugs and alcohol, and building signage. g. Products and Services. All supplies
NASA Astrophysics Data System (ADS)
Gao, Xiang; Zhang, Shi-Bin; Chang, Yan; Yang, Fan; Zhang, Yan
2018-02-01
Recently, Li et al. (Int. J. Theor. Phys. 55, 1710-1718, 2016) proposed a Quantum Private Comparison (QPC) protocol based on the Entanglement Swapping Between Three-Particle W-Class State and Bell State. Two parties can check whether their secret information is equal or not with the help of the semi-honest third party (TP). However in this paper, we will point out this kind of semi-honest TP is unreasonable. If we relax the constraint of the semi-honest TP, by using the fake signal attack, TP can know the whole secret information illegally. At last, we give our improvement, which can make this protocol more secure.
NASA Astrophysics Data System (ADS)
Gao, Xiang; Zhang, Shi-Bin; Chang, Yan; Yang, Fan; Zhang, Yan
2018-06-01
Recently, Li et al. (Int. J. Theor. Phys. 55, 1710-1718, 2016) proposed a Quantum Private Comparison (QPC) protocol based on the Entanglement Swapping Between Three-Particle W-Class State and Bell State. Two parties can check whether their secret information is equal or not with the help of the semi-honest third party (TP). However in this paper, we will point out this kind of semi-honest TP is unreasonable. If we relax the constraint of the semi-honest TP, by using the fake signal attack, TP can know the whole secret information illegally. At last, we give our improvement, which can make this protocol more secure.
NASA Astrophysics Data System (ADS)
Elbaz, Reouven; Torres, Lionel; Sassatelli, Gilles; Guillemin, Pierre; Bardouillet, Michel; Martinez, Albert
The bus between the System on Chip (SoC) and the external memory is one of the weakest points of computer systems: an adversary can easily probe this bus in order to read private data (data confidentiality concern) or to inject data (data integrity concern). The conventional way to protect data against such attacks and to ensure data confidentiality and integrity is to implement two dedicated engines: one performing data encryption and another data authentication. This approach, while secure, prevents parallelizability of the underlying computations. In this paper, we introduce the concept of Block-Level Added Redundancy Explicit Authentication (BL-AREA) and we describe a Parallelized Encryption and Integrity Checking Engine (PE-ICE) based on this concept. BL-AREA and PE-ICE have been designed to provide an effective solution to ensure both security services while allowing for full parallelization on processor read and write operations and optimizing the hardware resources. Compared to standard encryption which ensures only confidentiality, we show that PE-ICE additionally guarantees code and data integrity for less than 4% of run-time performance overhead.
Firearm Acquisition Without Background Checks: Results of a National Survey.
Miller, Matthew; Hepburn, Lisa; Azrael, Deborah
2017-02-21
In 1994, 40% of U.S. gun owners who had recently acquired a firearm did so without a background check. No contemporary estimates exist. To estimate the proportion of current U.S. gun owners who acquired their most recent firearm without a background check, by time since and manner of acquisition, for the nation as a whole and separately in states with and without legislation regulating private sales. Probability-based online survey. United States, 2015. 1613 adult gun owners. Current gun owners were asked where and when they acquired their last firearm; if they purchased the firearm; and whether, as part of that acquisition, they had a background check (or were asked to show a firearm license or permit). 22% (95% CI, 16% to 27%) of gun owners who reported obtaining their most recent firearm within the previous 2 years reported doing so without a background check. For firearms purchased privately within the previous 2 years (that is, other than from a store or pawnshop, including sales between individuals in person, online, or at gun shows), 50% (CI, 35% to 65%) were obtained without a background check. This percentage was 26% (CI, 5% to 47%) for owners residing in states regulating private firearm sales and 57% (CI, 40% to 75%) for those living in states without regulations on private firearm sales. Potential inaccuracies due to recall and social desirability bias. 22% of current U.S. gun owners who acquired a firearm within the past 2 years did so without a background check. Although this represents a smaller proportion of gun owners obtaining firearms without background checks than in the past, millions of U.S. adults continue to acquire guns without background checks, especially in states that do not regulate private firearm sales. Fund for a Safer Future and the Joyce Foundation.
Secure key storage and distribution
Agrawal, Punit
2015-06-02
This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.
The method of a joint intraday security check system based on cloud computing
NASA Astrophysics Data System (ADS)
Dong, Wei; Feng, Changyou; Zhou, Caiqi; Cai, Zhi; Dan, Xu; Dai, Sai; Zhang, Chuancheng
2017-01-01
The intraday security check is the core application in the dispatching control system. The existing security check calculation only uses the dispatch center’s local model and data as the functional margin. This paper introduces the design of all-grid intraday joint security check system based on cloud computing and its implementation. To reduce the effect of subarea bad data on the all-grid security check, a new power flow algorithm basing on comparison and adjustment with inter-provincial tie-line plan is presented. And the numerical example illustrated the effectiveness and feasibility of the proposed method.
46 CFR 10.214 - Security Check.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 1 2011-10-01 2011-10-01 false Security Check. 10.214 Section 10.214 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MERCHANT MARINER CREDENTIAL General Requirements for All Merchant Mariner Credentials § 10.214 Security Check. Until April 15, 2009...
46 CFR 10.214 - Security Check.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 1 2010-10-01 2010-10-01 false Security Check. 10.214 Section 10.214 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MERCHANT MARINER CREDENTIAL General Requirements for All Merchant Mariner Credentials § 10.214 Security Check. Until April 15, 2009...
Analyzing the cost of screening selectee and non-selectee baggage.
Virta, Julie L; Jacobson, Sheldon H; Kobza, John E
2003-10-01
Determining how to effectively operate security devices is as important to overall system performance as developing more sensitive security devices. In light of recent federal mandates for 100% screening of all checked baggage, this research studies the trade-offs between screening only selectee checked baggage and screening both selectee and non-selectee checked baggage for a single baggage screening security device deployed at an airport. This trade-off is represented using a cost model that incorporates the cost of the baggage screening security device, the volume of checked baggage processed through the device, and the outcomes that occur when the device is used. The cost model captures the cost of deploying, maintaining, and operating a single baggage screening security device over a one-year period. The study concludes that as excess baggage screening capacity is used to screen non-selectee checked bags, the expected annual cost increases, the expected annual cost per checked bag screened decreases, and the expected annual cost per expected number of threats detected in the checked bags screened increases. These results indicate that the marginal increase in security per dollar spent is significantly lower when non-selectee checked bags are screened than when only selectee checked bags are screened.
48 CFR 252.225-7039 - Contractors performing private security functions.
Code of Federal Regulations, 2011 CFR
2011-10-01
... by Contractors performing private security functions; (A) All armored vehicles, helicopters, and... private security functions. 252.225-7039 Section 252.225-7039 Federal Acquisition Regulations System... security functions. As prescribed in 225.370-6, insert the following clause: CONTRACTORS PERFORMING PRIVATE...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-23
... Federal Acquisition Regulation; Contractors Performing Private Security Functions Outside the United.... 110-181, enacted January 28, 2008), section 862, entitled ``Contractors Performing Private Security... NDAA required standardization of rules for private security contractors that are performing in...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-21
...] RIN 9000-AM20 Federal Acquisition Regulation; Contractors Performing Private Security Functions...-181). Section 862, entitled ``Contractors Performing Private Security Functions in Areas of Combat...), as amended, entitled ``Contractors Performing Private Security Functions in Areas of Combat...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-19
... 0750-AH28 Defense Federal Acquisition Regulation Supplement; Contractors Performing Private Security..., entitled ``Contractors Performing Private Security Functions in Areas of Combat Operations or Other... of DoD and other Governmental private security contractors. A clause to cover the interagency...
32 CFR 552.116 - Privately owned weapons-security.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 3 2014-07-01 2014-07-01 false Privately owned weapons-security. 552.116..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition but...
32 CFR 552.116 - Privately owned weapons-security.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 3 2010-07-01 2010-07-01 true Privately owned weapons-security. 552.116 Section..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition but...
32 CFR 552.116 - Privately owned weapons-security.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 3 2011-07-01 2009-07-01 true Privately owned weapons-security. 552.116 Section..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition but...
32 CFR 552.116 - Privately owned weapons-security.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 3 2013-07-01 2013-07-01 false Privately owned weapons-security. 552.116..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition but...
32 CFR 552.116 - Privately owned weapons-security.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 3 2012-07-01 2009-07-01 true Privately owned weapons-security. 552.116 Section..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition but...
48 CFR 52.225-26 - Contractors Performing Private Security Functions Outside the United States.
Code of Federal Regulations, 2013 CFR
2013-10-01
..., helicopters, and other military vehicles operated by Contractors performing private security functions; and... Private Security Functions Outside the United States. 52.225-26 Section 52.225-26 Federal Acquisition... CONTRACT CLAUSES Text of Provisions and Clauses 52.225-26 Contractors Performing Private Security Functions...
48 CFR 52.225-26 - Contractors Performing Private Security Functions Outside the United States.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., helicopters, and other military vehicles operated by Contractors performing private security functions; and... Private Security Functions Outside the United States. 52.225-26 Section 52.225-26 Federal Acquisition... CONTRACT CLAUSES Text of Provisions and Clauses 52.225-26 Contractors Performing Private Security Functions...
Technical Efficiency of Hospitals in Tehran, Iran.
Kakeman, Edris; Rahimi Forushani, Abbas; Dargahi, Hossein
2016-04-01
Nowadays, restriction on access and optimum use of resources is the main challenge of development in all organizations. Therefore, the aim of this study was to determine the technical efficiency and its factors, influencing hospitals of Tehran. This research was a descriptive-analytical and retrospective study conducted in 2014-2015. Fifty two hospitals with public, private, and social security ownership type were selected for this study. The required data was collected by a researcher-made check list in 3 sections of background data, inputs and outputs. The data was analyzed by DEAP 1.0.2, and STATA-13 technique. Seventeen (31/48) of hospitals had the efficiency score of 1 as the highest technical efficiency. The highest average score of efficiency was related to social security hospitals as 84.32, and then the public and private hospitals with the average of 84.29 and 79.64 respectively. Tobit regression results showed that the size, type of practice, and ownership of hospitals were effective on the degree of their technical efficiency. However, there was no significant correlation between teaching / non-teaching hospitals with technical efficiency. Establishment of competition system among hospitals, constitution of medium size hospitals and allocation of budget to hospitals based on national accreditation system are recommended.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-27
...; Submission for OMB Review; Contractors Performing Private Security Functions Outside the United States... new information collection requirement concerning Contractors Performing Private Security Functions... identified by Information Collection 9000- 0184, Contractors Performing Private Security Functions Outside...
Markwick, Nicole; McNeil, Ryan; Small, Will; Kerr, Thomas
2015-12-01
Private security guards occupy an increasingly prominent role in the policing of private and public spaces. There are growing concerns regarding security guards' potential to shape violence, discrimination, and adverse health outcomes among vulnerable populations, including people who use drugs (PWUD). This is relevant in Vancouver, Canada, where private security guards have increasingly been employed by private organizations to manage public and private spaces, including those within urban drug scenes. This qualitative study sought to understand interactions between PWUD and private security guards and explore their impacts on health care access, risks, and harms among PWUD. Semi-structured interviews were conducted with 30 PWUD recruited from two ongoing prospective cohort studies. Interviews were transcribed and analyzed using a coding framework comprised of a priori and emergent categories. Study data indicate that participants experience pervasive, discriminatory profiling and surveillance by security guards, which exacerbates existing social marginalization and structural vulnerability, particularly among PWUD of Aboriginal ancestry. Participants reported that security guards restrict PWUD's access to public and private spaces, including pharmacies and hospitals. PWUD also reported that their interactions with security guards often involved interpersonal violence and aggression, experiences that served to increase their vulnerability to subsequent risks and harms. Our findings highlight that private security forces contribute significantly to the everyday violence experienced by PWUD within drug scenes and elsewhere and do so in a manner very similar to that of traditional police forces. These findings point to the urgent need for greater oversight and training of private security guards in order to protect the health and safety of PWUD.
10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...
10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...
10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...
10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...
10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...
Internet firewalls: questions and answers
NASA Astrophysics Data System (ADS)
Ker, Keith
1996-03-01
As organizations consider connecting to the Internet, the issue of internetwork security becomes more important. There are many tools and components that can be used to secure a network, one of which is a firewall. Modern firewalls offer highly flexible private network security by controlling and monitoring all communications passing into or out of the private network. Specifically designed for security, firewalls become the private network's single point of attack from Internet intruders. Application gateways (or proxies) that have been written to be secure against even the most persistent attacks ensure that only authorized users and services access the private network. One-time passwords prevent intruders from `sniffing' and replaying the usernames and passwords of authorized users to gain access to the private network. Comprehensive logging permits constant and uniform system monitoring. `Address spoofing' attacks are prevented. The private network may use registered or unregistered IP addresses behind the firewall. Firewall-to-firewall encryption establishes a `virtual private network' across the Internet, preventing intruders from eavesdropping on private communications, eliminating the need for costly dedicated lines.
Finite-Time Performance of Local Search Algorithms: Theory and Application
2010-06-10
security devices deployed at airport security checkpoints are used to detect prohibited items (e.g., guns, knives, explosives). Each security device...security devices are deployed, the practical issue of determining how to optimally use them can be difficult. For an airport security system design...checked baggage), explosive detection systems (designed to detect explosives in checked baggage), and detailed hand search by an airport security official
31 CFR 515.405 - Exportation of securities, currency, checks, drafts and promissory notes.
Code of Federal Regulations, 2010 CFR
2010-07-01
..., checks, drafts and promissory notes. 515.405 Section 515.405 Money and Finance: Treasury Regulations..., drafts and promissory notes. Section 515.201 prohibits the exportation of securities, currency, checks, drafts and promissory notes to a designated foreign country. ...
31 CFR 515.405 - Exportation of securities, currency, checks, drafts and promissory notes.
Code of Federal Regulations, 2014 CFR
2014-07-01
..., checks, drafts and promissory notes. 515.405 Section 515.405 Money and Finance: Treasury Regulations..., drafts and promissory notes. Section 515.201 prohibits the exportation of securities, currency, checks, drafts and promissory notes to a designated foreign country. ...
31 CFR 515.405 - Exportation of securities, currency, checks, drafts and promissory notes.
Code of Federal Regulations, 2012 CFR
2012-07-01
..., checks, drafts and promissory notes. 515.405 Section 515.405 Money and Finance: Treasury Regulations..., drafts and promissory notes. Section 515.201 prohibits the exportation of securities, currency, checks, drafts and promissory notes to a designated foreign country. ...
31 CFR 515.405 - Exportation of securities, currency, checks, drafts and promissory notes.
Code of Federal Regulations, 2013 CFR
2013-07-01
..., checks, drafts and promissory notes. 515.405 Section 515.405 Money and Finance: Treasury Regulations..., drafts and promissory notes. Section 515.201 prohibits the exportation of securities, currency, checks, drafts and promissory notes to a designated foreign country. ...
31 CFR 515.405 - Exportation of securities, currency, checks, drafts and promissory notes.
Code of Federal Regulations, 2011 CFR
2011-07-01
..., checks, drafts and promissory notes. 515.405 Section 515.405 Money and Finance: Treasury Regulations..., drafts and promissory notes. Section 515.201 prohibits the exportation of securities, currency, checks, drafts and promissory notes to a designated foreign country. ...
Code of Federal Regulations, 2011 CFR
2011-10-01
... private security functions; (A) All armored vehicles, helicopters, and other military vehicles must be... personnel performing private security functions in designated areas are addressed in Department of Defense... performance of private security functions or other supplies or services. (c) DoD requires contractors...
Query-Biased Preview over Outsourced and Encrypted Data
Luo, Guangchun; Qin, Ke; Chen, Aiguo
2013-01-01
For both convenience and security, more and more users encrypt their sensitive data before outsourcing it to a third party such as cloud storage service. However, searching for the desired documents becomes problematic since it is costly to download and decrypt each possibly needed document to check if it contains the desired content. An informative query-biased preview feature, as applied in modern search engine, could help the users to learn about the content without downloading the entire document. However, when the data are encrypted, securely extracting a keyword-in-context snippet from the data as a preview becomes a challenge. Based on private information retrieval protocol and the core concept of searchable encryption, we propose a single-server and two-round solution to securely obtain a query-biased snippet over the encrypted data from the server. We achieve this novel result by making a document (plaintext) previewable under any cryptosystem and constructing a secure index to support dynamic computation for a best matched snippet when queried by some keywords. For each document, the scheme has O(d) storage complexity and O(log(d/s) + s + d/s) communication complexity, where d is the document size and s is the snippet length. PMID:24078798
Query-biased preview over outsourced and encrypted data.
Peng, Ningduo; Luo, Guangchun; Qin, Ke; Chen, Aiguo
2013-01-01
For both convenience and security, more and more users encrypt their sensitive data before outsourcing it to a third party such as cloud storage service. However, searching for the desired documents becomes problematic since it is costly to download and decrypt each possibly needed document to check if it contains the desired content. An informative query-biased preview feature, as applied in modern search engine, could help the users to learn about the content without downloading the entire document. However, when the data are encrypted, securely extracting a keyword-in-context snippet from the data as a preview becomes a challenge. Based on private information retrieval protocol and the core concept of searchable encryption, we propose a single-server and two-round solution to securely obtain a query-biased snippet over the encrypted data from the server. We achieve this novel result by making a document (plaintext) previewable under any cryptosystem and constructing a secure index to support dynamic computation for a best matched snippet when queried by some keywords. For each document, the scheme has O(d) storage complexity and O(log(d/s) + s + d/s) communication complexity, where d is the document size and s is the snippet length.
Code of Federal Regulations, 2013 CFR
2013-10-01
... personnel performing private security functions in designated areas are addressed in Department of Defense... contract is for the performance of private security functions or other supplies or services. (c) DoD... of the contractor who are responsible for performing private security functions comply with orders...
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2009-04-01
This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important tomore » leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.« less
6 CFR 11.7 - Private collection agencies.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Private collection agencies. 11.7 Section 11.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CLAIMS § 11.7 Private collection agencies. DHS will transfer delinquent DHS debts to the Treasury Department's Financial Management Service...
49 CFR 1546.203 - Acceptance and screening of checked baggage.
Code of Federal Regulations, 2010 CFR
2010-10-01
... foreign air carrier must refuse to transport any individual's checked baggage or property if the...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR... deterring the carriage of any explosive or incendiary. Each foreign air carrier must use the procedures...
Private Military and Security Companies - Counterinsurgency and Nation Building Strategy
2013-04-25
cans, and bought war bonds is long gone. One advantage that the private sector brings to public wars is capacity. Companies like Kellogg and Brown...1 Anne-Marie Buzatu, and Benjamin S . Buckland, “Private Military & Security Companies : Future Challenges in...From -‐ To) September 2012 - April 2013 4. TITLE AND SUBTITLE Private Military and Security Companies - Counterinsurgency and
Addressing cargo security with strategies involving private sector.
DOT National Transportation Integrated Search
2008-12-01
The public and private sectors contributing to goods movement agree that cargo security has : not been addressed nearly as much as physical and vessel security. Addressing cargo security : will require additional operational data that is not currentl...
76 FR 23515 - Enhanced Weapons, Firearms Background Checks, and Security Event Notifications
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-27
... material and would add new event notification requirements on the theft or loss of enhanced weapons...-2011-0017] RIN 3150-AI49 Enhanced Weapons, Firearms Background Checks, and Security Event Notifications... regulations governing security event notifications. These proposed regulations are consistent with the...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-15
... 0750-AH28 Defense Federal Acquisition Regulation Supplement; Contractors Performing Private Security... Contractors (DoDI 3020.50) was revised on August 1, 2011, and the final rule to implement section 862 of the NDAA for FY 2008, as amended, 32 CFR part 159, Private Security Contractors Operating in Contingency...
17 CFR 229.1014 - (Item 1014) Fairness of the going-private transaction.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false (Item 1014) Fairness of the going-private transaction. 229.1014 Section 229.1014 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES...
Code of Federal Regulations, 2010 CFR
2010-07-01
... LOANS MADE BY THE DEFENSE SECURITY ASSISTANCE AGENCY AND FOREIGN MILITARY SALES LOANS MADE BY THE FEDERAL FINANCING BANK AND GUARANTEED BY THE DEFENSE SECURITY ASSISTANCE AGENCY Form of Private Loan § 25... Private Loan Portion or any Derivative to the extent that the Private Loan or the respective Private Loan...
QR code-based non-linear image encryption using Shearlet transform and spiral phase transform
NASA Astrophysics Data System (ADS)
Kumar, Ravi; Bhaduri, Basanta; Hennelly, Bryan
2018-02-01
In this paper, we propose a new quick response (QR) code-based non-linear technique for image encryption using Shearlet transform (ST) and spiral phase transform. The input image is first converted into a QR code and then scrambled using the Arnold transform. The scrambled image is then decomposed into five coefficients using the ST and the first Shearlet coefficient, C1 is interchanged with a security key before performing the inverse ST. The output after inverse ST is then modulated with a random phase mask and further spiral phase transformed to get the final encrypted image. The first coefficient, C1 is used as a private key for decryption. The sensitivity of the security keys is analysed in terms of correlation coefficient and peak signal-to noise ratio. The robustness of the scheme is also checked against various attacks such as noise, occlusion and special attacks. Numerical simulation results are shown in support of the proposed technique and an optoelectronic set-up for encryption is also proposed.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-16
... 1974; Department of Homeland Security United States Citizenship and Immigration Services--DHS/USCIS... of Homeland Security/ United States Citizenship and Immigration Services--SORN DHS/USCIS--013 E-Verify Self Check System of Records.'' The U.S. Citizenship and Immigration Services E-Verify Self Check...
Relativistic quantum private database queries
NASA Astrophysics Data System (ADS)
Sun, Si-Jia; Yang, Yu-Guang; Zhang, Ming-Ou
2015-04-01
Recently, Jakobi et al. (Phys Rev A 83, 022301, 2011) suggested the first practical private database query protocol (J-protocol) based on the Scarani et al. (Phys Rev Lett 92, 057901, 2004) quantum key distribution protocol. Unfortunately, the J-protocol is just a cheat-sensitive private database query protocol. In this paper, we present an idealized relativistic quantum private database query protocol based on Minkowski causality and the properties of quantum information. Also, we prove that the protocol is secure in terms of the user security and the database security.
Medicare privatization and the erosion of retirement security.
Polivka, Larry; Kwak, Jung
2008-01-01
This paper describes initiatives to privatize the Medicare program over the last 10 years and the implications of these initiatives for the future of retirement security. Our analysis focuses on the privatization provisions of the Medicare Modernization Act, which is largely designed to benefit the corporate health care sector without containing costs or significantly reducing the threat of rising health care costs to the economic security of current and future retirees. In fact, as designed, the Medicare Modernization Act is likely to increase the threat to retirement security in the years ahead. We conclude with a series of policy alternatives to the neoliberal agenda for the privatization of Medicare.
26 CFR 1.141-4 - Private security or payment test.
Code of Federal Regulations, 2010 CFR
2010-04-01
... time that proceeds are used for a private business use. Payments for a use of proceeds include payments... business use (for example, a facility that is the subject of a management contract that results in private... time that property is used by a private business user. (6) Allocation of security among issues. In...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form F-4, for registration of securities of foreign private issuers issued in certain business combination transactions. 239.34 Section 239.34 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION FORMS PRESCRIBED UNDER THE...
Preventive health care for women in Croatia: ongoing trends from 1995 to 2012.
Pavlov, Renata; Babič, Ivana; Trstenjak, Vlatka Hajdinjak; Srček, Igor; Sošić, Zvonko
2014-12-01
The privatization of gynecological services and the introduction of additional reimbursements to capitation fees are ongoing mini reforms in Croatia. In order to evaluate the outcomes of this, study was performed with the main aim of determining trends in preventive activities carried out in public and private gynecological practices from 1995 to 2012. The Croatian Health Service Yearbooks served as the basis for data collection. Data were collected on the number of general check-ups, the number of targeted check-ups, and the number of follow-up check-ups. The results indicate a trend of continuous decline in the number of general and follow-up check-ups, as well as breast examinations and Pap smears, in public gynecological practices even after the introduction of contractual obligations and additional reimbursements and fee-for-service payments. One important note is that many resources were invested in general checks-up interventions, which proved to be ineffective, while fewer resources were invested in the more effective Pap smear interventions.
Code of Federal Regulations, 2014 CFR
2014-10-01
... performing private security functions in designated areas are addressed at 32 CFR part 159, entitled “Private... for weapons; registering and identifying armored vehicles, helicopters, and other military vehicles; and reporting specified incidents in which personnel performing private security functions under a...
Securely Measuring the Overlap between Private Datasets with Cryptosets
Swamidass, S. Joshua; Matlock, Matthew; Rozenblit, Leon
2015-01-01
Many scientific questions are best approached by sharing data—collected by different groups or across large collaborative networks—into a combined analysis. Unfortunately, some of the most interesting and powerful datasets—like health records, genetic data, and drug discovery data—cannot be freely shared because they contain sensitive information. In many situations, knowing if private datasets overlap determines if it is worthwhile to navigate the institutional, ethical, and legal barriers that govern access to sensitive, private data. We report the first method of publicly measuring the overlap between private datasets that is secure under a malicious model without relying on private protocols or message passing. This method uses a publicly shareable summary of a dataset’s contents, its cryptoset, to estimate its overlap with other datasets. Cryptosets approach “information-theoretic” security, the strongest type of security possible in cryptography, which is not even crackable with infinite computing power. We empirically and theoretically assess both the accuracy of these estimates and the security of the approach, demonstrating that cryptosets are informative, with a stable accuracy, and secure. PMID:25714898
A novel quantum solution to secure two-party distance computation
NASA Astrophysics Data System (ADS)
Peng, Zhen-wan; Shi, Run-hua; Wang, Pan-hong; Zhang, Shun
2018-06-01
Secure Two-Party Distance Computation is an important primitive of Secure Multiparty Computational Geometry that it involves two parties, where each party has a private point, and the two parties want to jointly compute the distance between their points without revealing anything about their respective private information. Secure Two-Party Distance Computation has very important and potential applications in settings of high secure requirements, such as privacy-preserving Determination of Spatial Location-Relation, Determination of Polygons Similarity, and so on. In this paper, we present a quantum protocol for Secure Two-Party Distance Computation by using QKD-based Quantum Private Query. The security of the protocol is based on the physical principles of quantum mechanics, instead of difficulty assumptions, and therefore, it can ensure higher security than the classical related protocols.
Social Security Administration
... Plan Costs my Social Security Check out your Social Security Statement , change your address & manage your benefits online today. Social Security Number Your Social Security number remains your ...
Code of Federal Regulations, 2011 CFR
2011-04-01
..., alternatives, reasons and effects in a going-private transaction. 229.1013 Section 229.1013 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975...
Code of Federal Regulations, 2014 CFR
2014-04-01
..., alternatives, reasons and effects in a going-private transaction. 229.1013 Section 229.1013 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975...
Code of Federal Regulations, 2012 CFR
2012-04-01
..., alternatives, reasons and effects in a going-private transaction. 229.1013 Section 229.1013 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975...
Code of Federal Regulations, 2010 CFR
2010-04-01
..., alternatives, reasons and effects in a going-private transaction. 229.1013 Section 229.1013 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975...
Code of Federal Regulations, 2013 CFR
2013-04-01
..., alternatives, reasons and effects in a going-private transaction. 229.1013 Section 229.1013 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975...
The relationships between public and private pension schemes: an introductory overview.
Horlick, M
1987-07-01
Only recently have social insurance and private pensions, collectively, come to be thought of in terms of a total social security benefit package. The economic problems brought on by the 1974 oil crisis initially triggered consideration of a common, integrated role for the two systems. The second oil crisis reinforced the relative expansion in private pension programs, as a supplement to social security. Before these events, private and public pension programs interacted in only a limited number of ways, confined to relatively few countries. These interactions were largely confined to collective bargaining, whereby private pensions were gradually extended to nearly all employees in France and Sweden; mandating, or legally requiring private supplementation of social security, debated in several countries in the early 1970's, but postponed by the 1974 oil crisis; and contracting out, or covering a part of the social security benefit under a private plan, as in the United Kingdom. Overall, the tradition of private pensions was not very strong or broadbased. The current debate centers on which public/private pension mix is desirable from the point of view of an old-age income-maintenance program. A new element is the rising support for a "third pillar"--individual tax-encouraged savings--not only as a supplement, but as an alternative to social insurance.
76 FR 62100 - Approval of Filing Fees for Exempt Reporting Advisers and Private Fund Advisers
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-06
... fund assets, combined liquidity fund and registered money market fund assets or private equity fund... Fees for Exempt Reporting Advisers and Private Fund Advisers AGENCY: Securities and Exchange Commission... fund advisers filing Form PF. SUMMARY: The Securities and Exchange Commission (``Commission'') is...
75 FR 66822 - Study on Extraterritorial Private Rights of Action
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-29
... Extraterritorial Private Rights of Action AGENCY: Securities and Exchange Commission. ACTION: Request for Comments... and thereafter conduct a study to determine the extent to which private rights of action under the... United States to bring actions under Section 10(b) in cases involving transnational securities fraud...
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2009-02-01
This report documents the identification of strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP).There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. The leveraging of dollars serves many purposes.more » These include increasing the amount of training that can be delivered and therefore increasing the number of people reached, increasing the number and quality of public/private partnerships, and increasing the number of businesses that are involved in the training of their future workforce.« less
7 CFR 1484.34 - Must Cooperators adhere to specific standards of ethical conduct?
Code of Federal Regulations, 2011 CFR
2011-01-01
... a mutual fund. A Cooperator may collect check-off funds and membership fees that are required for... funds to promote private self interests or conduct private business, except as members of sales teams...
Code of Federal Regulations, 2011 CFR
2011-07-01
... justice purposes. To conduct a name check, users must have either the social security number/foreign...) Report Date; (3) Social Security Number; (4) Last Name; (5) First Name; (6) Protected Identity (Y/N); (7...) Provost Marshals/Directors of Emergency Services will ensure that an audit trail is established and...
Code of Federal Regulations, 2010 CFR
2010-07-01
... justice purposes. To conduct a name check, users must have either the social security number/foreign...) Report Date; (3) Social Security Number; (4) Last Name; (5) First Name; (6) Protected Identity (Y/N); (7...) Provost Marshals/Directors of Emergency Services will ensure that an audit trail is established and...
Between security and military identities: The case of Israeli security experts.
Grassiani, Erella
2018-02-01
The relationship between private security professionals and the military in Israel is complex. While there is growing attention to the fact that security and military actors and their activities are becoming increasingly blurred, the Israeli case shows something different. In this ground-up analysis of the relationship between private security practices and the military, I investigate its constant negotiation by private security professionals through their identification with and differentiation from the military, whereby they reconfigure the meaning of military capital. This identity work should be understood, I propose, within the strongly militarist context of Israeli society, where military capital is highly valued. I argue that actors who exit the military system feel the need to demonstrate the added value of their work in the private sector in order for it to gain value in the light of the symbolic capital given to the military. I analyse these processes as leading to a new kind of militarism, which includes security skills and ideas about professionalism. Such an approach sheds new light on the ways in which security actors can actively reconfigure the workings of military capital in and outside the nation-state and produce a different kind of militarism.
Between security and military identities: The case of Israeli security experts
Grassiani, Erella
2018-01-01
The relationship between private security professionals and the military in Israel is complex. While there is growing attention to the fact that security and military actors and their activities are becoming increasingly blurred, the Israeli case shows something different. In this ground-up analysis of the relationship between private security practices and the military, I investigate its constant negotiation by private security professionals through their identification with and differentiation from the military, whereby they reconfigure the meaning of military capital. This identity work should be understood, I propose, within the strongly militarist context of Israeli society, where military capital is highly valued. I argue that actors who exit the military system feel the need to demonstrate the added value of their work in the private sector in order for it to gain value in the light of the symbolic capital given to the military. I analyse these processes as leading to a new kind of militarism, which includes security skills and ideas about professionalism. Such an approach sheds new light on the ways in which security actors can actively reconfigure the workings of military capital in and outside the nation-state and produce a different kind of militarism. PMID:29416228
A global trend: privatization and reform of social security pension plans.
Poortvliet, W G; Laine, T P
1995-01-01
Ten years ago Chile successfully privatized its social security system, beginning a worldwide trend to solve the problem of an increasing burden on government-supported social security programs. Contributing factors include an aging population, fewer workers to support retirees, government budget deficits and the influence of politics.
Secure multiparty computation of a comparison problem.
Liu, Xin; Li, Shundong; Liu, Jian; Chen, Xiubo; Xu, Gang
2016-01-01
Private comparison is fundamental to secure multiparty computation. In this study, we propose novel protocols to privately determine [Formula: see text], or [Formula: see text] in one execution. First, a 0-1-vector encoding method is introduced to encode a number into a vector, and the Goldwasser-Micali encryption scheme is used to compare integers privately. Then, we propose a protocol by using a geometric method to compare rational numbers privately, and the protocol is information-theoretical secure. Using the simulation paradigm, we prove the privacy-preserving property of our protocols in the semi-honest model. The complexity analysis shows that our protocols are more efficient than previous solutions.
The Use of Private Security by the United Kingdom and the Subsequent Impacts on Operational Planning
2014-05-22
2003 and 2008.4 The UK and US dominate the global market for private military companies.5 Therefore, scholarly research on the UK should help explain...provide a certain military skill applicable to the conduct of warfare. Deborah Avant, in her 2005 work The Market for Force : The Consequences of...International Security," International Security 26, no. 3 (Winter 2001-2002): 186. 14Deborah D. Avant, The Market for Force : The Consequences of Privatizing
Public-Private Collaboration in the Department of Defense
2012-07-01
In his 2010 National Security Strategy, President Obama described partnerships between the public and private sector as critical to United States security at home and abroad. These Public-Private Collaborations (PPCs) offer potential opportunities to increase the Department s mission effectiveness by leveraging the capabilities, knowledge, processes, and infrastructure brought to bear by private sector entities. Additionally, given today s constrained budget environment, PPCs also provide opportunities for efficiency and cost reductions.
Reducing software security risk through an integrated approach
NASA Technical Reports Server (NTRS)
Gilliam, D.; Powell, J.; Kelly, J.; Bishop, M.
2001-01-01
The fourth quarter delivery, FY'01 for this RTOP is a Property-Based Testing (PBT), 'Tester's Assistant' (TA). The TA tool is to be used to check compiled and pre-compiled code for potential security weaknesses that could be exploited by hackers. The TA Instrumenter, implemented mostly in C++ (with a small part in Java), parsels two types of files: Java and TASPEC. Security properties to be checked are written in TASPEC. The Instrumenter is used in conjunction with the Tester's Assistant Specification (TASpec)execution monitor to verify the security properties of a given program.
The Social Security Program and the Private Sector Alternative: Lessons from History.
ERIC Educational Resources Information Center
Quadagno, Jill
1987-01-01
Used historical evidence to analyze how private sector benefits worked in the past in light of the debate surrounding the Social Security benefits and the federal deficit. Among conclusions reached are that the private sector failed to provide adequate protection for older citizens, and that benefits were inequitably distributed on basis of gender…
Private Security Training. Phase 1: Basic. Instructor Edition.
ERIC Educational Resources Information Center
Oklahoma State Dept. of Vocational and Technical Education, Stillwater. Curriculum and Instructional Materials Center.
This basic module on private security training was designed under the direction of the Oklahoma Council on Law Enforcement Education and Training to teach basic skills necessary for entry-level employment in this field. This module contains six instructional units that cover the following topics: (1) interpreting the Oklahoma Security Guard and…
Distributed generation of shared RSA keys in mobile ad hoc networks
NASA Astrophysics Data System (ADS)
Liu, Yi-Liang; Huang, Qin; Shen, Ying
2005-12-01
Mobile Ad Hoc Networks is a totally new concept in which mobile nodes are able to communicate together over wireless links in an independent manner, independent of fixed physical infrastructure and centralized administrative infrastructure. However, the nature of Ad Hoc Networks makes them very vulnerable to security threats. Generation and distribution of shared keys for CA (Certification Authority) is challenging for security solution based on distributed PKI(Public-Key Infrastructure)/CA. The solutions that have been proposed in the literature and some related issues are discussed in this paper. The solution of a distributed generation of shared threshold RSA keys for CA is proposed in the present paper. During the process of creating an RSA private key share, every CA node only has its own private security. Distributed arithmetic is used to create the CA's private share locally, and that the requirement of centralized management institution is eliminated. Based on fully considering the Mobile Ad Hoc network's characteristic of self-organization, it avoids the security hidden trouble that comes by holding an all private security share of CA, with which the security and robustness of system is enhanced.
49 CFR 1544.203 - Acceptance and screening of checked baggage.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Acceptance and screening of checked baggage. 1544... SECURITY: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.203 Acceptance and screening of checked... its authorized aircraft operator representative. (c) Screening of checked baggage. Except as provided...
31 CFR 240.16 - Checks issued to minor payees.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false Checks issued to minor payees. 240.16... ON THE UNITED STATES TREASURY Indorsement of Checks § 240.16 Checks issued to minor payees. (a) Checks in payment of principal and/or interest on U.S. securities that are issued to minors may be...
31 CFR 240.16 - Checks issued to minor payees.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Checks issued to minor payees. 240.16... ON THE UNITED STATES TREASURY Indorsement of Checks § 240.16 Checks issued to minor payees. (a) Checks in payment of principal and/or interest on U.S. securities that are issued to minors may be...
Assessment of private security guards by Suicide Probability Scale and Brief Symptom Inventory.
Dogan, Bulent; Canturk, Gurol; Canturk, Nergis; Guney, Sevgi; Özcan, Ebru
2016-01-01
The aim of the present study was to investigate the influence of suicide probability and relevant sociodemographic features and to provide information for preventing suicide in private security guards working under the stressful conditions and continuous exposure to the negative and traumatic life events. 200 private security guards and 200 personnels of Ankara University participated in the study. A sociodemographic information questionnaire, the Suicide Probability Scale (SPS) and the Brief Symptom Inventory (BSI) were used to collect the data. Gender, marital status, income, religious beliefs, experiencing a life-threatening situation, history of a suicide attempt, smoking and not having a chronic disease caused statistically significant differences in the scores for SPS between the private security guards group and the controls. Moreover there was a statistically significant positive correlation between the total scores of the subscales of SPS and the total scores of BSI. Like police officers and gendarmes, private security guards are at high risk of committing and attempting suicide because of being at stressful work settings and also suffering from secondary trauma. It is required that they should be aware of their tendency to commit suicide and have regular psychiatric screenings.
On the verification of intransitive noninterference in mulitlevel security.
Ben Hadj-Alouane, Nejib; Lafrance, Stéphane; Lin, Feng; Mullins, John; Yeddes, Mohamed Moez
2005-10-01
We propose an algorithmic approach to the problem of verification of the property of intransitive noninterference (INI), using tools and concepts of discrete event systems (DES). INI can be used to characterize and solve several important security problems in multilevel security systems. In a previous work, we have established the notion of iP-observability, which precisely captures the property of INI. We have also developed an algorithm for checking iP-observability by indirectly checking P-observability for systems with at most three security levels. In this paper, we generalize the results for systems with any finite number of security levels by developing a direct method for checking iP-observability, based on an insightful observation that the iP function is a left congruence in terms of relations on formal languages. To demonstrate the applicability of our approach, we propose a formal method to detect denial of service vulnerabilities in security protocols based on INI. This method is illustrated using the TCP/IP protocol. The work extends the theory of supervisory control of DES to a new application domain.
42 CFR 455.436 - Federal database checks.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 42 Public Health 4 2012-10-01 2012-10-01 false Federal database checks. 455.436 Section 455.436....436 Federal database checks. The State Medicaid agency must do all of the following: (a) Confirm the... databases. (b) Check the Social Security Administration's Death Master File, the National Plan and Provider...
42 CFR 455.436 - Federal database checks.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 42 Public Health 4 2011-10-01 2011-10-01 false Federal database checks. 455.436 Section 455.436....436 Federal database checks. The State Medicaid agency must do all of the following: (a) Confirm the... databases. (b) Check the Social Security Administration's Death Master File, the National Plan and Provider...
42 CFR 455.436 - Federal database checks.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 42 Public Health 4 2014-10-01 2014-10-01 false Federal database checks. 455.436 Section 455.436....436 Federal database checks. The State Medicaid agency must do all of the following: (a) Confirm the... databases. (b) Check the Social Security Administration's Death Master File, the National Plan and Provider...
42 CFR 455.436 - Federal database checks.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 42 Public Health 4 2013-10-01 2013-10-01 false Federal database checks. 455.436 Section 455.436....436 Federal database checks. The State Medicaid agency must do all of the following: (a) Confirm the... databases. (b) Check the Social Security Administration's Death Master File, the National Plan and Provider...
2013-09-01
SECURITY COMPANIES Huseyin Yigit Captain, Turkish Army B.S., Kara Harp Okulu, 2003 Submitted in partial fulfillment of the requirements for the...Collective Security Practice ............................................................. 34 C. PEACEKEEPING...involvement in intrastate conflicts is inevitable and will be so. Furthermore, though UN attempts aim to restore peace, military force requirement is
2017-03-01
models of software execution, for example memory access patterns, to check for security intrusions. Additional research was performed to tackle the...considered using indirect models of software execution, for example memory access patterns, to check for security intrusions. Additional research ...deterioration for example , no longer corresponds to the model used during verification time. Finally, the research looked at ways to combine hybrid systems
Comparing replacement rates under private and federal retirement systems.
Martin, Patricia P
One measure of the adequacy of retirement income is replacement rate - the percentage of pre-retirement salary that is available to a worker in retirement. This article compares salary replacement rates for private-sector employees of medium and large private establishments with those for federal employees under the Civil Service Retirement System and the Federal Employees Retirement System. Because there is no standard benefit formula to represent the variety of formulas available in the private sector, a composite defined benefit formula was developed using the characteristics of plans summarized in the Bureau of Labor Statistics Medium and Large Employer Plan Survey. The resulting "typical" private-sector defined benefit plan, with an accompanying defined contribution plan, was then compared with the two federal systems. The Civil Service Retirement System (CSRS) is a stand-alone defined benefit plan whose participants are not covered by Social Security. Until passage of the 1983 Amendments to Social Security Act, it was the only retirement plan for most federal civilian employees. Provisions of the 1983 Amendments were designed to restore long-term financial stability to the Social Security trust funds. One provision created the Federal Employees Retirement System (FERS), which covers federal employees hired after 1983. It was one of the provisions designed to restore long-term financial stability to the Social Security trust funds. FERS employees contribute to and are covered by Social Security. FERS, which is a defined benefit plan, also includes a basic benefit and a 401(k)-type plan known as the Thrift Savings Plan (TSP). To compare how retirees would fare under the three different retirement systems, benefits of employees retiring at age 65 with 35 years of service were calculated using hypothetical workers with steady earnings. Workers were classified according to a percentage of the average wage in the economy: low earners (45 percent), average earners (100 percent) high earners (160 percent), and maximum earners (earnings at the taxable maximum amount). Overall, this analysis found that: Excluding Social Security benefits and TSP and defined contribution annuities, CSRS retirees have a higher pre-retirement salary replacement rate than either FERS or private-sector retirees. Private-sector retirees, however, have higher replacement rate than their FERS counterparts. Including Social Security benefits but not TSP and defined contribution plan annuities, CSRS retirees who are maximum earners have a higher pre-retirement salary replacement rate (despite receiving no Social Security benefits) than FERS retirees with the same earnings. Private-sector retirees in all earnings categories have a higher replacement rate than federal retirees with the same earnings. Including Social Security and TSP and defined contribution plan annuities, private-sector retirees in all earnings categories have a higher replacement rate than federal retirees, but their rate is close to that of FERS retirees. The rate is higher for FERS retirees than for CSRS retirees in all earnings categories. This analysis shows that replacement creates could exceed 100 percent for FERS employees who contribute who contribute 6 percent of earnings to the TSP over full working career. Private-sector replacement rates were quite similar for those with both a defined benefit and a defined contribution pension plan. Social Security replacement rates make up the highest proportion of benefits for th private sector's lowest income quartile group. The replacement rate for 401(k) plans and the TSP account for a higher proportion of benefits than does Social Security for all other income groups, assuming the absence of a defined benefit plan.
Exploring the characteristics of nursing agencies in South Africa.
Olojede, Omolola I; Rispel, Laetitia C
2015-01-01
Nursing agencies are temporary employment service providers or labour brokers that supply nurses to health establishments. This study was conducted to determine the characteristics of nursing agencies and their relationship with clients in the health sector. During 2011, a cross-sectional national survey of 106 nursing agencies was conducted. After obtaining informed consent, telephone interviews were conducted with a representative of the selected nursing agency using a pretested structured questionnaire. Questions focused on the following: ownership, date of establishment, province of operation, distribution of clients across private and public health facilities; existence of a code of conduct; nature of the contractual relationship between nursing agencies and their clients, and numbers and cadres of nurses contracted. The survey data were analysed using STATA(®) 12. Fifty-two nursing agencies participated in the survey, representing a 49% response rate. The study found that 32 nursing agencies (62%) served private-sector clients only, which included private hospitals, homes for elderly people, patients in private homes, and private industry/company clinics, and only four (8%) of the agencies served the public sector only. Twenty-seven percent of nursing agencies provided services to homes for elderly individuals. Nursing agencies were more likely to have contracts with private-sector clients (84%) than with public-sector clients (16%) (p = 0.04). Although 98% of nursing agencies reported that they had a code of conduct, the proportion was higher for private-sector clients (73%) compared to public-sector clients (27%). In terms of quality checks and monitoring, 81% of agencies agreed with a statement that they checked the nursing council registration of nurses, 82% agreed with a statement that they requested certified copies of a nurse's qualifications. Only 21% indicated that they conducted reference checks of nurses with their past employers. Nursing agencies should enhance their quality assurance mechanisms when engaging contracted staff. Overall, the study findings suggest the need for improved governance and management of nursing agencies in South Africa.
Exploring the characteristics of nursing agencies in South Africa
Olojede, Omolola I.; Rispel, Laetitia C.
2015-01-01
Background Nursing agencies are temporary employment service providers or labour brokers that supply nurses to health establishments. Objective This study was conducted to determine the characteristics of nursing agencies and their relationship with clients in the health sector. Methods During 2011, a cross-sectional national survey of 106 nursing agencies was conducted. After obtaining informed consent, telephone interviews were conducted with a representative of the selected nursing agency using a pretested structured questionnaire. Questions focused on the following: ownership, date of establishment, province of operation, distribution of clients across private and public health facilities; existence of a code of conduct; nature of the contractual relationship between nursing agencies and their clients, and numbers and cadres of nurses contracted. The survey data were analysed using STATA® 12. Results Fifty-two nursing agencies participated in the survey, representing a 49% response rate. The study found that 32 nursing agencies (62%) served private-sector clients only, which included private hospitals, homes for elderly people, patients in private homes, and private industry/company clinics, and only four (8%) of the agencies served the public sector only. Twenty-seven percent of nursing agencies provided services to homes for elderly individuals. Nursing agencies were more likely to have contracts with private-sector clients (84%) than with public-sector clients (16%) (p = 0.04). Although 98% of nursing agencies reported that they had a code of conduct, the proportion was higher for private-sector clients (73%) compared to public-sector clients (27%). In terms of quality checks and monitoring, 81% of agencies agreed with a statement that they checked the nursing council registration of nurses, 82% agreed with a statement that they requested certified copies of a nurse's qualifications. Only 21% indicated that they conducted reference checks of nurses with their past employers. Conclusions Nursing agencies should enhance their quality assurance mechanisms when engaging contracted staff. Overall, the study findings suggest the need for improved governance and management of nursing agencies in South Africa. PMID:25971401
[The health system of Argentina].
Belló, Mariana; Becerril-Montekio, Victor M
2011-01-01
This paper describes the health system of Argentina.This system has three sectors: public, social security and private.The public sector includes the national and provincial ministries as well as the network of public hospitals and primary health care units which provide care to the poor and uninsured population. This sector is financed with taxes and payments made by social security beneficiaries that use public health care facilities. The social security sector or Obras Sociales (OS) covers all workers of the formal economy and their families. Most OS operate through contracts with private providers and are financed with payroll contributions of employers and employees. Finally, the private sector includes all those private providers offering services to individuals, OS beneficiaries and all those with private health insurance.This sector also includes private insurance agencies called Prepaid Medicine Enterprises, financed mostly through premiums paid by families and/or employers.This paper also discusses some of the recent innovations implemented in Argentina, including the program Remediar.
Performance optimization of internet firewalls
NASA Astrophysics Data System (ADS)
Chiueh, Tzi-cker; Ballman, Allen
1997-01-01
Internet firewalls control the data traffic in and out of an enterprise network by checking network packets against a set of rules that embodies an organization's security policy. Because rule checking is computationally more expensive than routing-table look-up, it could become a potential bottleneck for scaling up the performance of IP routers, which typically implement firewall functions in software. in this paper, we analyzed the performance problems associated with firewalls, particularly packet filters, propose a good connection cache to amortize the costly security check over the packets in a connection, and report the preliminary performance results of a trace-driven simulation that show the average packet check time can be reduced by a factor of 2.5 at the least.
Practical private database queries based on a quantum-key-distribution protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jakobi, Markus; Humboldt-Universitaet zu Berlin, D-10117 Berlin; Simon, Christoph
2011-02-15
Private queries allow a user, Alice, to learn an element of a database held by a provider, Bob, without revealing which element she is interested in, while limiting her information about the other elements. We propose to implement private queries based on a quantum-key-distribution protocol, with changes only in the classical postprocessing of the key. This approach makes our scheme both easy to implement and loss tolerant. While unconditionally secure private queries are known to be impossible, we argue that an interesting degree of security can be achieved by relying on fundamental physical principles instead of unverifiable security assumptions inmore » order to protect both the user and the database. We think that the scope exists for such practical private queries to become another remarkable application of quantum information in the footsteps of quantum key distribution.« less
Quantum solution to a class of two-party private summation problems
NASA Astrophysics Data System (ADS)
Shi, Run-Hua; Zhang, Shun
2017-09-01
In this paper, we define a class of special two-party private summation (S2PPS) problems and present a common quantum solution to S2PPS problems. Compared to related classical solutions, our solution has advantages of higher security and lower communication complexity, and especially it can ensure the fairness of two parties without the help of a third party. Furthermore, we investigate the practical applications of our proposed S2PPS protocol in many privacy-preserving settings with big data sets, including private similarity decision, anonymous authentication, social networks, secure trade negotiation, secure data mining.
Li, Jian; Yang, Yu-Guang; Chen, Xiu-Bo; Zhou, Yi-Hua; Shi, Wei-Min
2016-08-19
A novel quantum private database query protocol is proposed, based on passive round-robin differential phase-shift quantum key distribution. Compared with previous quantum private database query protocols, the present protocol has the following unique merits: (i) the user Alice can obtain one and only one key bit so that both the efficiency and security of the present protocol can be ensured, and (ii) it does not require to change the length difference of the two arms in a Mach-Zehnder interferometer and just chooses two pulses passively to interfere with so that it is much simpler and more practical. The present protocol is also proved to be secure in terms of the user security and database security.
Private health insurance in South Korea: an international comparison.
Shin, Jaeun
2012-11-01
The goal of this study is to present the historical and policy background of the expansion of private health insurance in South Korea in the context of the National Health Insurance (NHI) system, and to provide empirical evidence on whether the increased role of private health insurance may counterbalance government financing, social security contributions, out-of-pocket payments, and help stabilize total health care spending. Using OECD Health Data 2011, we used a fixed effects model estimation. In this model, we allow error terms to be serially correlated over time in order to capture the association of private health insurance financing with three other components of health care financing and total health care spending. The descriptive observation of the South Korean health care financing shows that social security contributions are relatively limited in South Korea, implying that high out-of-pocket payments may be alleviated through the enhancement of NHI benefit coverage and an increase in social security contributions. Estimation results confirm that private health insurance financing is unlikely to reduce government spending on health care and social security contributions. We find evidence that out-of-pocket payments may be offset by private health insurance financing, but to a limited degree. Private health insurance financing is found to have a statistically significant positive association with total spending on health care. This indicates that the duplicated coverage effect on service demand may cancel out the potential efficiency gain from market initiatives driven by the active involvement of private health insurance. This study finds little evidence for the benefit of private insurance initiatives in coping with the fiscal challenges of the South Korean NHI program. Further studies on the managerial interplay among public and private insurers and on behavioral responses of providers and patients to a given structure of private-public financing are warranted to formulate the adequate balance between private health insurance and publicly funded universal coverage. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.
A novel quantum scheme for secure two-party distance computation
NASA Astrophysics Data System (ADS)
Peng, Zhen-wan; Shi, Run-hua; Zhong, Hong; Cui, Jie; Zhang, Shun
2017-12-01
Secure multiparty computational geometry is an essential field of secure multiparty computation, which computes a computation geometric problem without revealing any private information of each party. Secure two-party distance computation is a primitive of secure multiparty computational geometry, which computes the distance between two points without revealing each point's location information (i.e., coordinate). Secure two-party distance computation has potential applications with high secure requirements in military, business, engineering and so on. In this paper, we present a quantum solution to secure two-party distance computation by subtly using quantum private query. Compared to the classical related protocols, our quantum protocol can ensure higher security and better privacy protection because of the physical principle of quantum mechanics.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-31
... Command Proficiency Check and Other Changes to the Pilot and Pilot School Certification Rules AGENCY... regulations concerning pilot, flight instructor, and pilot school certification. This rule will require pilot... and permits pilot schools and provisional pilot schools to apply for a combined private pilot...
Homeland Security and the Private Sector : a CBO Paper
2004-12-01
private sector and the nation as a whole that would underlie the expected costs of terrorist attacks and, hence, the broader benefits of security. This paper focuses on those industries for which the expected human and economic losses from a terrorist attack would be highest -- the country’s critical infrastructure. The analysis more narrowly focuses on those industries that reside largely in the private sector and for which an attack could lead to a direct loss of life. The paper also reviews the incentives for private actions to limit
Mobile Virtual Private Networking
NASA Astrophysics Data System (ADS)
Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny
Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.
Li, Jian; Yang, Yu-Guang; Chen, Xiu-Bo; Zhou, Yi-Hua; Shi, Wei-Min
2016-01-01
A novel quantum private database query protocol is proposed, based on passive round-robin differential phase-shift quantum key distribution. Compared with previous quantum private database query protocols, the present protocol has the following unique merits: (i) the user Alice can obtain one and only one key bit so that both the efficiency and security of the present protocol can be ensured, and (ii) it does not require to change the length difference of the two arms in a Mach-Zehnder interferometer and just chooses two pulses passively to interfere with so that it is much simpler and more practical. The present protocol is also proved to be secure in terms of the user security and database security. PMID:27539654
Comment on "Secure quantum private information retrieval using phase-encoded queries"
NASA Astrophysics Data System (ADS)
Shi, Run-hua; Mu, Yi; Zhong, Hong; Zhang, Shun
2016-12-01
In this Comment, we reexamine the security of phase-encoded quantum private query (QPQ). We find that the current phase-encoded QPQ protocols, including their applications, are vulnerable to a probabilistic entangle-and-measure attack performed by the owner of the database. Furthermore, we discuss how to overcome this security loophole and present an improved cheat-sensitive QPQ protocol without losing the good features of the original protocol.
Code of Federal Regulations, 2010 CFR
2010-07-01
... continuation of assignment is not clearly consistent with the national interest. (d) Completed security forms (DD Form 398, Personnel Security Questionnaire (BI/SBI), or 398-2, Personnel Security Questionnaire (National Agency Check)) shall be forwarded to the Defense Industrial Security Clearance Office (DISCO...
31 CFR 25.402 - Transferability.
Code of Federal Regulations, 2010 CFR
2010-07-01
... SALES LOANS MADE BY THE DEFENSE SECURITY ASSISTANCE AGENCY AND FOREIGN MILITARY SALES LOANS MADE BY THE FEDERAL FINANCING BANK AND GUARANTEED BY THE DEFENSE SECURITY ASSISTANCE AGENCY Form of Private Loan § 25.402 Transferability. Each Private Loan Note, with the Guaranty attached, shall be fully and freely...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-26
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC) AGENCY: National Archives and Records....m. to 12:00 noon. ADDRESSES: National Archives and Records Administration, 700 Pennsylvania Avenue...
49 CFR 1572.21 - Procedures for TWIC security threat assessment.
Code of Federal Regulations, 2012 CFR
2012-10-01
... conducts includes a fingerprint-based criminal history records check (CHRC), an intelligence-related check, and a final disposition. (b) Fingerprint-based check. The following procedures must be completed to conduct a fingerprint-based CHRC: (1) Consistent with the implementation schedule described in 49 CFR 1572...
49 CFR 1572.21 - Procedures for TWIC security threat assessment.
Code of Federal Regulations, 2013 CFR
2013-10-01
... conducts includes a fingerprint-based criminal history records check (CHRC), an intelligence-related check, and a final disposition. (b) Fingerprint-based check. The following procedures must be completed to conduct a fingerprint-based CHRC: (1) Consistent with the implementation schedule described in 49 CFR 1572...
49 CFR 1572.21 - Procedures for TWIC security threat assessment.
Code of Federal Regulations, 2010 CFR
2010-10-01
... conducts includes a fingerprint-based criminal history records check (CHRC), an intelligence-related check, and a final disposition. (b) Fingerprint-based check. The following procedures must be completed to conduct a fingerprint-based CHRC: (1) Consistent with the implementation schedule described in 49 CFR 1572...
49 CFR 1572.21 - Procedures for TWIC security threat assessment.
Code of Federal Regulations, 2011 CFR
2011-10-01
... conducts includes a fingerprint-based criminal history records check (CHRC), an intelligence-related check, and a final disposition. (b) Fingerprint-based check. The following procedures must be completed to conduct a fingerprint-based CHRC: (1) Consistent with the implementation schedule described in 49 CFR 1572...
49 CFR 1572.21 - Procedures for TWIC security threat assessment.
Code of Federal Regulations, 2014 CFR
2014-10-01
... conducts includes a fingerprint-based criminal history records check (CHRC), an intelligence-related check, and a final disposition. (b) Fingerprint-based check. The following procedures must be completed to conduct a fingerprint-based CHRC: (1) Consistent with the implementation schedule described in 49 CFR 1572...
48 CFR 25.302-3 - Applicability.
Code of Federal Regulations, 2013 CFR
2013-10-01
... functions as a primary deliverable or the provision of private security functions is ancillary to the stated... entered into on a non-DoD contract for the performance of private security functions by individual... the Secretary of State. (b) Non-DoD agencies: This section applies to acquisitions by non-DoD agencies...
48 CFR 25.302-3 - Applicability.
Code of Federal Regulations, 2014 CFR
2014-10-01
... functions as a primary deliverable or the provision of private security functions is ancillary to the stated... entered into on a non-DoD contract for the performance of private security functions by individual... the Secretary of State. (b) Non-DoD agencies: This section applies to acquisitions by non-DoD agencies...
31 CFR 1023.620 - Due diligence programs for private banking accounts.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Special Standards of Diligence; Prohibitions; and Special Measures for Brokers or Dealers in Securities § 1023.620 Due diligence programs for private banking accounts. (a) Refer to § 1010...
31 CFR 1023.620 - Due diligence programs for private banking accounts.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Special Standards of Diligence; Prohibitions; and Special Measures for Brokers or Dealers in Securities § 1023.620 Due diligence programs for private banking accounts. (a) Refer to § 1010...
31 CFR 1023.620 - Due diligence programs for private banking accounts.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Special Standards of Diligence; Prohibitions; and Special Measures for Brokers or Dealers in Securities § 1023.620 Due diligence programs for private banking accounts. (a) Refer to § 1010...
31 CFR 1023.620 - Due diligence programs for private banking accounts.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Special Standards of Diligence; Prohibitions; and Special Measures for Brokers or Dealers in Securities § 1023.620 Due diligence programs for private banking accounts. (a) Refer to § 1010...
7 CFR 1951.15 - Return of paid-in-full or satisfied notes to borrower.
Code of Federal Regulations, 2010 CFR
2010-01-01
... HOUSING SERVICE, RURAL BUSINESS-COOPERATIVE SERVICE, RURAL UTILITIES SERVICE, AND FARM SERVICE AGENCY..., cashier's check, certified check, Postal or bank money order, bank draft, or a check issued by a... making marginal releases or satisfactions or security instruments, the notes will be held until the...
31 CFR 306.37 - Interest on registered securities.
Code of Federal Regulations, 2013 CFR
2013-07-01
..., owners should promptly notify the Bureau of any change of address. (Form PD 345 may be used.) The..., they are named in the registration. (c) Collection of interest checks—(1) General. Interest checks may... PD 1461.) (d) Nonreceipt, loss, theft, or destruction of interest checks. If an interest check is not...
31 CFR 306.37 - Interest on registered securities.
Code of Federal Regulations, 2012 CFR
2012-07-01
..., owners should promptly notify the Bureau of any change of address. (Form PD 345 may be used.) The..., they are named in the registration. (c) Collection of interest checks—(1) General. Interest checks may... PD 1461.) (d) Nonreceipt, loss, theft, or destruction of interest checks. If an interest check is not...
31 CFR 306.37 - Interest on registered securities.
Code of Federal Regulations, 2011 CFR
2011-07-01
..., owners should promptly notify the Bureau of any change of address. (Form PD 345 may be used.) The..., they are named in the registration. (c) Collection of interest checks—(1) General. Interest checks may... PD 1461.) (d) Nonreceipt, loss, theft, or destruction of interest checks. If an interest check is not...
31 CFR 306.37 - Interest on registered securities.
Code of Federal Regulations, 2014 CFR
2014-07-01
..., owners should promptly notify the Bureau of any change of address. (Form PD 345 may be used.) The..., they are named in the registration. (c) Collection of interest checks—(1) General. Interest checks may... PD 1461.) (d) Nonreceipt, loss, theft, or destruction of interest checks. If an interest check is not...
31 CFR 306.37 - Interest on registered securities.
Code of Federal Regulations, 2010 CFR
2010-07-01
..., owners should promptly notify the Bureau of any change of address. (Form PD 345 may be used.) The..., they are named in the registration. (c) Collection of interest checks—(1) General. Interest checks may... PD 1461.) (d) Nonreceipt, loss, theft, or destruction of interest checks. If an interest check is not...
49 CFR 1572.15 - Procedures for HME security threat assessment.
Code of Federal Regulations, 2012 CFR
2012-10-01
... completes includes a fingerprint-based criminal history records check (CHRC), an intelligence-related background check, and a final disposition. (b) Fingerprint-based check. In order to conduct a fingerprint... before the date of the expiration of the HME. (2) Where the State elects to collect fingerprints and...
49 CFR 1572.15 - Procedures for HME security threat assessment.
Code of Federal Regulations, 2013 CFR
2013-10-01
... completes includes a fingerprint-based criminal history records check (CHRC), an intelligence-related background check, and a final disposition. (b) Fingerprint-based check. In order to conduct a fingerprint... before the date of the expiration of the HME. (2) Where the State elects to collect fingerprints and...
49 CFR 1572.15 - Procedures for HME security threat assessment.
Code of Federal Regulations, 2011 CFR
2011-10-01
... completes includes a fingerprint-based criminal history records check (CHRC), an intelligence-related background check, and a final disposition. (b) Fingerprint-based check. In order to conduct a fingerprint... before the date of the expiration of the HME. (2) Where the State elects to collect fingerprints and...
49 CFR 1572.15 - Procedures for HME security threat assessment.
Code of Federal Regulations, 2010 CFR
2010-10-01
... completes includes a fingerprint-based criminal history records check (CHRC), an intelligence-related background check, and a final disposition. (b) Fingerprint-based check. In order to conduct a fingerprint... before the date of the expiration of the HME. (2) Where the State elects to collect fingerprints and...
49 CFR 1572.15 - Procedures for HME security threat assessment.
Code of Federal Regulations, 2014 CFR
2014-10-01
... completes includes a fingerprint-based criminal history records check (CHRC), an intelligence-related background check, and a final disposition. (b) Fingerprint-based check. In order to conduct a fingerprint... before the date of the expiration of the HME. (2) Where the State elects to collect fingerprints and...
32 CFR 154.8 - Types and scope of personnel security investigations.
Code of Federal Regulations, 2011 CFR
2011-07-01
... interview, NAC, LACs, credit checks, developed character references (3), employment records checks... interview. While the kind of coverage provided for by the SBI determines eligibility for access to SCI, DoD... requiring resolution in the case concerned and generally consist of record checks and/or interviews with...
32 CFR 154.8 - Types and scope of personnel security investigations.
Code of Federal Regulations, 2010 CFR
2010-07-01
... interview, NAC, LACs, credit checks, developed character references (3), employment records checks... interview. While the kind of coverage provided for by the SBI determines eligibility for access to SCI, DoD... requiring resolution in the case concerned and generally consist of record checks and/or interviews with...
Pilot Test of IPEDS Finance Survey. Working Paper Series.
ERIC Educational Resources Information Center
Hunt, Ray C., Jr.; Budak, Susan E.
The Private Institution Pretest Finance Survey (Pretest Survey) of the Integrated Postsecondary Education Data System (IPEDS) was sent to a sample of 1,000 private colleges and universities for the fiscal year 1996. As of May 1997, the Bureau of the Census, administering the survey, had received and completed edit checks for about 50% of the…
How Does the Public and Private University Environment Affect Students' Entrepreneurial Intention?
ERIC Educational Resources Information Center
Canever, Mario Duarte; Barral, Maria Renata Martínez; Ribeiro, Felipe Garcia
2017-01-01
Purpose: The purpose of this paper is to explore the causal links between public and private university environments and the entrepreneurial intention (EI) of students. Design/methodology/approach: The impact of different university environments on the students' EI was checked using a model adapted from Krueger et al. (2000). The study comprised a…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-24
... standards. The collection also requires airport operators to comply with a security directive by maintaining... airport operators maintain records of criminal history records checks and security threat assessments in... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency...
31 CFR 597.307 - Financial institution.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Commission under 15 U.S.C. 78a et seq., securities or commodities brokers and dealers, investment bankers or investment companies, currency exchanges, issuers, redeemers, or cashiers of traveler's checks, checks, money...
Social Security: A Present Value Analysis of Old Age Survivors Insurance (OASI) Taxes and Benefits.
1995-12-01
private sector plans and provides a spreadsheet model for making this comparison of plans using different assumptions. The investigation was done by collecting data from various books, Government publications, and various Government agencies to conduct a spreadsheet analysis of three different wage-earning groups, assuming various real interest rates potentially earned in the private sector . A comparison of Social Security with alternative private sector plans is important to the DoD/DoN because less constrained budgets could
33 CFR 66.01-50 - Protection of private aids to navigation.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained under...
33 CFR 66.01-50 - Protection of private aids to navigation.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained under...
33 CFR 66.01-50 - Protection of private aids to navigation.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained under...
33 CFR 66.01-50 - Protection of private aids to navigation.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained under...
33 CFR 66.01-50 - Protection of private aids to navigation.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained under...
Feng, Qianmei
2007-10-01
Federal law mandates that every checked bag at all commercial airports be screened by explosive detection systems (EDS), explosive trace detection systems (ETD), or alternative technologies. These technologies serve as critical components of airport security systems that strive to reduce security risks at both national and global levels. To improve the operational efficiency and airport security, emerging image-based technologies have been developed, such as dual-energy X-ray (DX), backscatter X-ray (BX), and multiview tomography (MVT). These technologies differ widely in purchasing cost, maintenance cost, operating cost, processing rate, and accuracy. Based on a mathematical framework that takes into account all these factors, this article investigates two critical issues for operating screening devices: setting specifications for continuous security responses by different technologies; and selecting technology or combination of technologies for efficient 100% baggage screening. For continuous security responses, specifications or thresholds are used for classifying threat items from nonthreat items. By investigating the setting of specifications on system security responses, this article assesses the risk and cost effectiveness of various technologies for both single-device and two-device systems. The findings provide the best selection of image-based technologies for both single-device and two-device systems. Our study suggests that two-device systems outperform single-device systems in terms of both cost effectiveness and accuracy. The model can be readily extended to evaluate risk and cost effectiveness of multiple-device systems for airport checked-baggage security screening.
Fourier domain asymmetric cryptosystem for privacy protected multimodal biometric security
NASA Astrophysics Data System (ADS)
Choudhury, Debesh
2016-04-01
We propose a Fourier domain asymmetric cryptosystem for multimodal biometric security. One modality of biometrics (such as face) is used as the plaintext, which is encrypted by another modality of biometrics (such as fingerprint). A private key is synthesized from the encrypted biometric signature by complex spatial Fourier processing. The encrypted biometric signature is further encrypted by other biometric modalities, and the corresponding private keys are synthesized. The resulting biometric signature is privacy protected since the encryption keys are provided by the human, and hence those are private keys. Moreover, the decryption keys are synthesized using those private encryption keys. The encrypted signatures are decrypted using the synthesized private keys and inverse complex spatial Fourier processing. Computer simulations demonstrate the feasibility of the technique proposed.
Private Security Contractors: A Way of Combating Piracy in the Horn of Africa
2014-05-22
September 2011. 79Financial Action Task Force, “Financial Action Task Force Annual Report, 2010-2011,” FATF /OECD, 2011, 10. 80Andrew J. Shapiro...Report, 2010-2011.” FATF /OECD. Paris, 2011. Fox News. “Private Security Firms Join Battle Against Somali Pirates,” October 26, 2008. http
2011-05-13
running amok and armed Americans 45 Paul Richter , “Audit: U.S. Funds Went to Taliban, Subcontractors on... Anna Mulrine and Keith Whitelaw, “Private Security Contractors Face Incoming Political Fire,” U.S. News & World Report, October 15, 2007. 51 Charlie
Private Security Contractors: The Other Force
2011-03-22
improving PSC oversight. This paper will not address private contractors conducting Police force training , governmental use of PSCs outside of Iraq...theater entry requirements, conduct mandatory training , conduct weapons training and qualification and conduct security verification and criminal...an effective oversight program including contractor deployment tracking, limited contract oversight personnel, and untrained Contract Officer
31 CFR 25.405 - Form of guaranty.
Code of Federal Regulations, 2010 CFR
2010-07-01
... SALES LOANS MADE BY THE DEFENSE SECURITY ASSISTANCE AGENCY AND FOREIGN MILITARY SALES LOANS MADE BY THE FEDERAL FINANCING BANK AND GUARANTEED BY THE DEFENSE SECURITY ASSISTANCE AGENCY Form of Private Loan § 25.405 Form of guaranty. (a) The Guaranty that will be attached to the Private Loan Note on the Closing...
17 CFR 210.3-20 - Currency for financial statements of foreign private issuers.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Currency for financial statements of foreign private issuers. 210.3-20 Section 210.3-20 Commodity and Securities Exchanges... General Instructions As to Financial Statements § 210.3-20 Currency for financial statements of foreign...
The Effectiveness of an Electronic Security Management System in a Privately Owned Apartment Complex
ERIC Educational Resources Information Center
Greenberg, David F.; Roush, Jeffrey B.
2009-01-01
Poisson and negative binomial regression methods are used to analyze the monthly time series data to determine the effects of introducing an integrated security management system including closed-circuit television (CCTV), door alarm monitoring, proximity card access, and emergency call boxes to a large privately-owned complex of apartment…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-11
...] Private Security Contractors (PSCs) Operating in Contingency Operations, Combat Operations or Other..., ``Contractor Personnel Authorized to Accompany the U.S. Armed Forces,'' which provides guidance for all DoD contractors operating in contingency operations. This Rule was published as an Interim Final Rule on July 17...
Open source system OpenVPN in a function of Virtual Private Network
NASA Astrophysics Data System (ADS)
Skendzic, A.; Kovacic, B.
2017-05-01
Using of Virtual Private Networks (VPN) can establish high security level in network communication. VPN technology enables high security networking using distributed or public network infrastructure. VPN uses different security and managing rules inside networks. It can be set up using different communication channels like Internet or separate ISP communication infrastructure. VPN private network makes security communication channel over public network between two endpoints (computers). OpenVPN is an open source software product under GNU General Public License (GPL) that can be used to establish VPN communication between two computers inside business local network over public communication infrastructure. It uses special security protocols and 256-bit Encryption and it is capable of traversing network address translators (NATs) and firewalls. It allows computers to authenticate each other using a pre-shared secret key, certificates or username and password. This work gives review of VPN technology with a special accent on OpenVPN. This paper will also give comparison and financial benefits of using open source VPN software in business environment.
Secure Distributed Human Computation
NASA Astrophysics Data System (ADS)
Gentry, Craig; Ramzan, Zulfikar; Stubblebine, Stuart
In Peha’s Financial Cryptography 2004 invited talk, he described the Cyphermint PayCash system (see www.cyphermint.com), which allows people without bank accounts or credit cards (a sizeable segment of the U.S. population) to automatically and instantly cash checks, pay bills, or make Internet transactions through publicly-accessible kiosks. Since PayCash offers automated financial transactions and since the system uses (unprotected) kiosks, security is critical. The kiosk must decide whether a person cashing a check is really the person to whom the check was made out, so it takes a digital picture of the person cashing the check and transmits this picture electronically to a central office, where a human worker compares the kiosk’s picture to one that was taken when the person registered with Cyphermint. If both pictures are of the same person, then the human worker authorizes the transaction.
Secure Cloud-Based Solutions for Different eHealth Services in Spanish Rural Health Centers.
de la Torre-Díez, Isabel; Lopez-Coronado, Miguel; Garcia-Zapirain Soto, Begonya; Mendez-Zorrilla, Amaia
2015-07-27
The combination of eHealth applications and/or services with cloud technology provides health care staff—with sufficient mobility and accessibility for them—to be able to transparently check any data they may need without having to worry about its physical location. The main aim of this paper is to put forward secure cloud-based solutions for a range of eHealth services such as electronic health records (EHRs), telecardiology, teleconsultation, and telediagnosis. The scenario chosen for introducing the services is a set of four rural health centers located within the same Spanish region. iCanCloud software was used to perform simulations in the proposed scenario. We chose online traffic and the cost per unit in terms of time as the parameters for choosing the secure solution on the most optimum cloud for each service. We suggest that load balancers always be fitted for all solutions in communication together with several Internet service providers and that smartcards be used to maintain identity to an appropriate extent. The solutions offered via private cloud for EHRs, teleconsultation, and telediagnosis services require a volume of online traffic calculated at being able to reach 2 Gbps per consultation. This may entail an average cost of €500/month. The security solutions put forward for each eHealth service constitute an attempt to centralize all information on the cloud, thus offering greater accessibility to medical information in the case of EHRs alongside more reliable diagnoses and treatment for telecardiology, telediagnosis, and teleconsultation services. Therefore, better health care for the rural patient can be obtained at a reasonable cost.
33 CFR 106.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2013 CFR
2013-07-01
..., including computer systems and networks; (vi) Existing agreements with private security companies; (vii) Any... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental...
33 CFR 106.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2011 CFR
2011-07-01
..., including computer systems and networks; (vi) Existing agreements with private security companies; (vii) Any... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental...
33 CFR 106.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2014 CFR
2014-07-01
..., including computer systems and networks; (vi) Existing agreements with private security companies; (vii) Any... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental...
33 CFR 106.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2012 CFR
2012-07-01
..., including computer systems and networks; (vi) Existing agreements with private security companies; (vii) Any... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental...
Sub-pixel analysis to support graphic security after scanning at low resolution
NASA Astrophysics Data System (ADS)
Haas, Bertrand; Cordery, Robert; Gou, Hongmei; Decker, Steve
2006-02-01
Whether in the domain of audio, video or finance, our world tends to become increasingly digital. However, for diverse reasons, the transition from analog to digital is often much extended in time, and proceeds by long steps (and sometimes never completes). One such step is the conversion of information on analog media to digital information. We focus in this paper on the conversion (scanning) of printed documents to digital images. Analog media have the advantage over digital channels that they can harbor much imperceptible information that can be used for fraud detection and forensic purposes. But this secondary information usually fails to be retrieved during the conversion step. This is particularly relevant since the Check-21 act (Check Clearing for the 21st Century act) became effective in 2004 and allows images of checks to be handled by banks as usual paper checks. We use here this situation of check scanning as our primary benchmark for graphic security features after scanning. We will first present a quick review of the most common graphic security features currently found on checks, with their specific purpose, qualities and disadvantages, and we demonstrate their poor survivability after scanning in the average scanning conditions expected from the Check-21 Act. We will then present a novel method of measurement of distances between and rotations of line elements in a scanned image: Based on an appropriate print model, we refine direct measurements to an accuracy beyond the size of a scanning pixel, so we can then determine expected distances, periodicity, sharpness and print quality of known characters, symbols and other graphic elements in a document image. Finally we will apply our method to fraud detection of documents after gray-scale scanning at 300dpi resolution. We show in particular that alterations on legitimate checks or copies of checks can be successfully detected by measuring with sub-pixel accuracy the irregularities inherently introduced by the illegitimate process.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form 20-F, registration of securities of foreign private issuers pursuant to section 12(b) or (g), annual and transition reports pursuant to sections 13 and 15(d), and shell company reports required under Rule 13a-19 or 15d-19 (§ 240.13a-19 or § 240.15d-19 of this chapter). 24...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Form 20-F, registration of securities of foreign private issuers pursuant to section 12(b) or (g), annual and transition reports pursuant to sections 13 and 15(d), and shell company reports required under Rule 13a-19 or 15d-19 (§ 240.13a-19 or § 240.15d-19 of this chapter). 24...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Form 20-F, registration of securities of foreign private issuers pursuant to section 12(b) or (g), annual and transition reports pursuant to sections 13 and 15(d), and shell company reports required under Rule 13a-19 or 15d-19 (§ 240.13a-19 or § 240.15d-19 of this chapter). 24...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Form 20-F, registration of securities of foreign private issuers pursuant to section 12(b) or (g), annual and transition reports pursuant to sections 13 and 15(d), and shell company reports required under Rule 13a-19 or 15d-19 (§ 240.13a-19 or § 240.15d-19 of this chapter). 24...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Form 20-F, registration of securities of foreign private issuers pursuant to section 12(b) or (g), annual and transition reports pursuant to sections 13 and 15(d), and shell company reports required under Rule 13a-19 or 15d-19 (§ 240.13a-19 or § 240.15d-19 of this chapter). 24...
Retirement Trends and Public Policy: The Carrot and the Stick.
ERIC Educational Resources Information Center
Quinn, Joseph F.; Burkhauser, Richard V.
Recent trends toward earlier retirement have exacerbated the financial problems facing the Social Security system and many other public and private pension plans. The massive commitment of public and private funds to Social Security and pension funds is partly responsible for the trend to early retirement. This, in fact, was one of the early goals…
2011-07-29
SPECIAL INSPE CTOR GENE RAL FOR IRAQ RECONSTRUCTION 400 Army Navy Drive • Arlington, Virginia 22202 July 29, 2011 LETTER FOR...11-019) In September 2007, Blackwater , Inc., a private security contractor (PSC) under contract with the Department of State (DoS), was involved in
46 CFR 503.59 - Safeguarding classified information.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Information Security Program § 503.59 Safeguarding classified information. (a) All classified information... security; (2) Takes appropriate steps to protect classified information from unauthorized disclosure or... security check; (2) To protect the classified information in accordance with the provisions of Executive...
31 CFR 306.85 - Private corporations and unincorporated associations (including nominees).
Code of Federal Regulations, 2012 CFR
2012-07-01
... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false Private corporations and... Organizations § 306.85 Private corporations and unincorporated associations (including nominees). Securities registered in the name of, or assigned to, an unincorporated association, or a private corporation in its own...
75 FR 80082 - State, Local, Tribal, And Private Sector Policy Advisory Committee (SLTPS-PAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-21
..., Tribal, And Private Sector Policy Advisory Committee (SLTPS-PAC) AGENCY: Information Security Oversight... State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC). The SLTPS-PAC will..., Tribal, and Private Sector Entities, as specified in Executive Order 13549 and its implementing directive...
48 CFR 428.204-2 - Certified or cashier's checks, bank drafts, money orders, or currency.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false Certified or cashier's checks, bank drafts, money orders, or currency. 428.204-2 Section 428.204-2 Federal Acquisition... Other Security for Bonds 428.204-2 Certified or cashier's checks, bank drafts, money orders, or currency...
48 CFR 428.204-2 - Certified or cashier's checks, bank drafts, money orders, or currency.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false Certified or cashier's checks, bank drafts, money orders, or currency. 428.204-2 Section 428.204-2 Federal Acquisition... Other Security for Bonds 428.204-2 Certified or cashier's checks, bank drafts, money orders, or currency...
48 CFR 428.204-2 - Certified or cashier's checks, bank drafts, money orders, or currency.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Certified or cashier's checks, bank drafts, money orders, or currency. 428.204-2 Section 428.204-2 Federal Acquisition... Other Security for Bonds 428.204-2 Certified or cashier's checks, bank drafts, money orders, or currency...
48 CFR 428.204-2 - Certified or cashier's checks, bank drafts, money orders, or currency.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false Certified or cashier's checks, bank drafts, money orders, or currency. 428.204-2 Section 428.204-2 Federal Acquisition... Other Security for Bonds 428.204-2 Certified or cashier's checks, bank drafts, money orders, or currency...
48 CFR 428.204-2 - Certified or cashier's checks, bank drafts, money orders, or currency.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false Certified or cashier's checks, bank drafts, money orders, or currency. 428.204-2 Section 428.204-2 Federal Acquisition... Other Security for Bonds 428.204-2 Certified or cashier's checks, bank drafts, money orders, or currency...
The neoliberal political economy and erosion of retirement security.
Polivka, Larry; Luo, Baozhen
2015-04-01
The origins and trajectory of the crisis in the United States retirement security system have slowly become part of the discussion about the social, political, and economic impacts of population aging. Private sources of retirement security have weakened significantly since 1980 as employers have converted defined benefits precisions to defined contribution plans. The Center for Retirement Research (CRR) now estimates that over half of boomer generation retirees will not receive 70-80% of their wages while working. This erosion of the private retirement security system will likely increase reliance on the public system, mainly Social Security and Medicare. These programs, however, have increasingly become the targets of critics who claim that they are not financially sustainable in their current form and must be significantly modified. This article will focus on an analysis of these trends in the erosion of the United States retirement security system and their connection to changes in the United States political economy as neoliberal, promarket ideology, and policies (low taxes, reduced spending, and deregulation) have become dominant in the private and public sectors. The neoliberal priority on reducing labor costs and achieving maximum shareholder value has created an environment inimical to maintain the traditional system of pension and health care benefits in both the private and public sectors. This article explores the implications of these neoliberal trends in the United States economy for the future of retirement security. © The Author 2015. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Requirements for storing and using a private key... Digital Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for... and private key. (b) The certificate holder must provide FIPS-approved secure storage for the private...
21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 21 Food and Drugs 9 2014-04-01 2014-04-01 false Requirements for storing and using a private key... Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for digitally... private key. (b) The certificate holder must provide FIPS-approved secure storage for the private key, as...
21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Requirements for storing and using a private key... Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for digitally... private key. (b) The certificate holder must provide FIPS-approved secure storage for the private key, as...
21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Requirements for storing and using a private key... Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for digitally... private key. (b) The certificate holder must provide FIPS-approved secure storage for the private key, as...
21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Requirements for storing and using a private key... Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for digitally... private key. (b) The certificate holder must provide FIPS-approved secure storage for the private key, as...
Design and Implementation of Secure and Reliable Communication using Optical Wireless Communication
NASA Astrophysics Data System (ADS)
Saadi, Muhammad; Bajpai, Ambar; Zhao, Yan; Sangwongngam, Paramin; Wuttisittikulkij, Lunchakorn
2014-11-01
Wireless networking intensify the tractability in the home and office environment to connect the internet without wires but at the cost of risks associated with stealing the data or threat of loading malicious code with the intention of harming the network. In this paper, we proposed a novel method of establishing a secure and reliable communication link using optical wireless communication (OWC). For security, spatial diversity based transmission using two optical transmitters is used and the reliability in the link is achieved by a newly proposed method for the construction of structured parity check matrix for binary Low Density Parity Check (LDPC) codes. Experimental results show that a successful secure and reliable link between the transmitter and the receiver can be achieved by using the proposed novel technique.
2008-06-13
USE PRIVATE SECURITY CONTRACTORS TO PROTECT U.S. DIPLOMATS 5c. PROGRAM ELEMENT NUMBER 5d. PROJECT NUMBER 5e. TASK NUMBER 6. AUTHOR( S ...Special Agent Derek Dela-Cruz 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME( S ) AND ADDRESS(ES) U.S. Army Command and General Staff College...
Borrowing to Save: A Critique of Recent Proposals to Partially Privatize Social Security
ERIC Educational Resources Information Center
Dattalo, Patrick
2007-01-01
Concern over Social Security's forecasted long-run deficit is occurring at a time when the program has a short-term surplus. One proposed strategy to address this forecasted deficit is to allow the investment of a portion of payroll taxes into private savings accounts (PSAs). The author analyzes recent proposals for PSAs and concludes that PSAs…
Cyber Security Considerations for Autonomous Tactical Wheeled Vehicles
2016-04-01
extraordinarily significant (Office of the Press Secretary, 2015). The White House added that cybersecurity is a shared responsibility between the...cannot, nor would Americans want it to, provide cybersecurity for every private network. Therefore, the private sector plays a crucial role in our... Cybersecurity Initiative,” that established the procedures the Acquisition community should use to manage future of Acquisition programs. Cyber Security
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-12
...] State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC); Notice of Meeting AGENCY... Classified National Security Information Program for State, Local, Tribal, and Private Sector Entities. FOR..., announcement is made for the following committee meeting. Name of Committee: State, Local, Tribal, and Private...
Access Control of Web- and Java-Based Applications
NASA Technical Reports Server (NTRS)
Tso, Kam S.; Pajevski, Michael J.
2013-01-01
Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers
NASA Astrophysics Data System (ADS)
Vielhauer, Claus; Croce Ferri, Lucilla
2003-06-01
Our paper addresses two issues of a biometric authentication algorithm for ID cardholders previously presented namely the security of the embedded reference data and the aging process of the biometric data. We describe a protocol that allows two levels of verification, combining a biometric hash technique based on handwritten signature and hologram watermarks with cryptographic signatures in a verification infrastructure. This infrastructure consists of a Trusted Central Public Authority (TCPA), which serves numerous Enrollment Stations (ES) in a secure environment. Each individual performs an enrollment at an ES, which provides the TCPA with the full biometric reference data and a document hash. The TCPA then calculates the authentication record (AR) with the biometric hash, a validity timestamp, and a document hash provided by the ES. The AR is then signed with a cryptographic signature function, initialized with the TCPA's private key and embedded in the ID card as a watermark. Authentication is performed at Verification Stations (VS), where the ID card will be scanned and the signed AR is retrieved from the watermark. Due to the timestamp mechanism and a two level biometric verification technique based on offline and online features, the AR can deal with the aging process of the biometric feature by forcing a re-enrollment of the user after expiry, making use of the ES infrastructure. We describe some attack scenarios and we illustrate the watermarking embedding, retrieval and dispute protocols, analyzing their requisites, advantages and disadvantages in relation to security requirements.
Small Nations in Multinational Operations and Armenian Perspectives
2014-12-12
National Security Powers: Are the Checks in Balance?” In U.S. Army War College Guide to National Security Issues, Volume II: National Security Policy and...SMALL NATIONS IN MULTINATIONAL OPERATIONS AND ARMENIAN PERSPECTIVES A thesis presented to the Faculty of the U.S. Army
Vernick, Jon S; Alcorn, Ted; Horwitz, Joshua
2017-03-01
There were more than 36,000 firearm-related deaths in the U.S. in 2015. Under federal law, a background check is required only for gun purchases from licensed dealers. Research suggests that some persons prohibited from owning a gun turn to private sellers, including those identified online, to attempt to obtain a firearm. State-level approaches to make it more difficult for high-risk persons to purchase or possess firearms include universal background check (UBC) and gun violence restraining order (GVRO) laws. UBC laws, on the books in 18 states as of the end of 2016, can reduce both homicide and suicide rates. After Colorado adopted a UBC law in 2013, the number of background checks conducted by private sellers for sales occurring at places other than gun shows steadily increased. GVRO laws give law enforcement and families the authority to petition a court to temporarily remove firearms from an individual who presents a danger to himself or others during times of crisis, regardless of whether that person has been diagnosed with a mental illness. California enacted a GVRO law in 2014. Data are emerging to suggest the effectiveness of GVRO-type laws at averting suicides and providing an entryway to services.
48 CFR 28.204-2 - Certified or cashiers checks, bank drafts, money orders, or currency.
Code of Federal Regulations, 2012 CFR
2012-10-01
... checks, bank drafts, money orders, or currency. 28.204-2 Section 28.204-2 Federal Acquisition Regulations... Other Security for Bonds 28.204-2 Certified or cashiers checks, bank drafts, money orders, or currency... draft, Post Office money order, or currency, in an amount equal to the penal sum of the bond, instead of...
48 CFR 28.204-2 - Certified or cashiers checks, bank drafts, money orders, or currency.
Code of Federal Regulations, 2014 CFR
2014-10-01
... checks, bank drafts, money orders, or currency. 28.204-2 Section 28.204-2 Federal Acquisition Regulations... Other Security for Bonds 28.204-2 Certified or cashiers checks, bank drafts, money orders, or currency... draft, Post Office money order, or currency, in an amount equal to the penal sum of the bond, instead of...
48 CFR 28.204-2 - Certified or cashiers checks, bank drafts, money orders, or currency.
Code of Federal Regulations, 2011 CFR
2011-10-01
... checks, bank drafts, money orders, or currency. 28.204-2 Section 28.204-2 Federal Acquisition Regulations... Other Security for Bonds 28.204-2 Certified or cashiers checks, bank drafts, money orders, or currency... draft, Post Office money order, or currency, in an amount equal to the penal sum of the bond, instead of...
48 CFR 28.204-2 - Certified or cashiers checks, bank drafts, money orders, or currency.
Code of Federal Regulations, 2013 CFR
2013-10-01
... checks, bank drafts, money orders, or currency. 28.204-2 Section 28.204-2 Federal Acquisition Regulations... Other Security for Bonds 28.204-2 Certified or cashiers checks, bank drafts, money orders, or currency... draft, Post Office money order, or currency, in an amount equal to the penal sum of the bond, instead of...
48 CFR 28.204-2 - Certified or cashiers checks, bank drafts, money orders, or currency.
Code of Federal Regulations, 2010 CFR
2010-10-01
... checks, bank drafts, money orders, or currency. 28.204-2 Section 28.204-2 Federal Acquisition Regulations... Other Security for Bonds 28.204-2 Certified or cashiers checks, bank drafts, money orders, or currency... draft, Post Office money order, or currency, in an amount equal to the penal sum of the bond, instead of...
Analysis of an ABE Scheme with Verifiable Outsourced Decryption.
Liao, Yongjian; He, Yichuan; Li, Fagen; Jiang, Shaoquan; Zhou, Shijie
2018-01-10
Attribute-based encryption (ABE) is a popular cryptographic technology to protect the security of users' data in cloud computing. In order to reduce its decryption cost, outsourcing the decryption of ciphertexts is an available method, which enables users to outsource a large number of decryption operations to the cloud service provider. To guarantee the correctness of transformed ciphertexts computed by the cloud server via the outsourced decryption, it is necessary to check the correctness of the outsourced decryption to ensure security for the data of users. Recently, Li et al. proposed a full verifiability of the outsourced decryption of ABE scheme (ABE-VOD) for the authorized users and unauthorized users, which can simultaneously check the correctness of the transformed ciphertext for both them. However, in this paper we show that their ABE-VOD scheme cannot obtain the results which they had shown, such as finding out all invalid ciphertexts, and checking the correctness of the transformed ciphertext for the authorized user via checking it for the unauthorized user. We first construct some invalid ciphertexts which can pass the validity checking in the decryption algorithm. That means their "verify-then-decrypt" skill is unavailable. Next, we show that the method to check the validity of the outsourced decryption for the authorized users via checking it for the unauthorized users is not always correct. That is to say, there exist some invalid ciphertexts which can pass the validity checking for the unauthorized user, but cannot pass the validity checking for the authorized user.
Analysis of an ABE Scheme with Verifiable Outsourced Decryption
He, Yichuan; Li, Fagen; Jiang, Shaoquan; Zhou, Shijie
2018-01-01
Attribute-based encryption (ABE) is a popular cryptographic technology to protect the security of users’ data in cloud computing. In order to reduce its decryption cost, outsourcing the decryption of ciphertexts is an available method, which enables users to outsource a large number of decryption operations to the cloud service provider. To guarantee the correctness of transformed ciphertexts computed by the cloud server via the outsourced decryption, it is necessary to check the correctness of the outsourced decryption to ensure security for the data of users. Recently, Li et al. proposed a full verifiability of the outsourced decryption of ABE scheme (ABE-VOD) for the authorized users and unauthorized users, which can simultaneously check the correctness of the transformed ciphertext for both them. However, in this paper we show that their ABE-VOD scheme cannot obtain the results which they had shown, such as finding out all invalid ciphertexts, and checking the correctness of the transformed ciphertext for the authorized user via checking it for the unauthorized user. We first construct some invalid ciphertexts which can pass the validity checking in the decryption algorithm. That means their “verify-then-decrypt” skill is unavailable. Next, we show that the method to check the validity of the outsourced decryption for the authorized users via checking it for the unauthorized users is not always correct. That is to say, there exist some invalid ciphertexts which can pass the validity checking for the unauthorized user, but cannot pass the validity checking for the authorized user. PMID:29320418
2010-09-01
the Rise of Privatized Military Industry, 88–100. 18 Steven Brayton , "Outsourcing War: Mercenaries and the Privatization of Peacekeeping,” Journal of...220. 50 Isenberg, Shadow Force: Private Security Contractors in Iraq, 1. 51 Brayton , "Outsourcing War: Mercenaries and the Privatization of...Review of Books, April 3, 2008, 29. 71 Singer, Corporate Warriors, The Rise of the Privatized Military Industry, 113. 72 Brayton , "Outsourcing War
2008-07-01
MNC-I Multi-National Corps-Iraq MNF-I Multi-National Force-Iraq PSC private security contractor RSO Regional Security Office TOC tactical...maritime and territorial jurisdiction’ to include a housing complex leased by the U.S. military on a military base in Germany where a sexual assault...and monitored by RSO personnel in the RSO TOC . Motorcade vehicles are equipped with video cameras that record and document motorcade movements and
Student Experiential Opportunities in National Security Careers
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
2007-12-31
This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private andmore » public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.« less
17 CFR 260.11b-4 - Definition of “cash transaction” in section 311(b)(4).
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Definition of âcash transactionâ in section 311(b)(4). 260.11b-4 Section 260.11b-4 Commodity and Securities Exchanges SECURITIES... securities sold is made within 7 days after delivery of the goods or securities in currency or in checks or...
75 FR 67992 - Voluntary Private Sector Accreditation and Certification Preparedness Program
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-04
... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID FEMA-2008-0017] Voluntary Private Sector Accreditation and Certification Preparedness Program AGENCY: Federal Emergency... on an initial small business plan to address small business concerns in the Voluntary Private Sector...
ERIC Educational Resources Information Center
Benson, Helene A.
This speech focuses on women and private pension plans, such as private pension coverage and smaller benefit amounts. Pension issues affecting women as employees include participation in plans, vesting, break-in service, benefit accruals, integration with Social Security, sex-based actuarial tables, portability, inflation, and individual…
77 FR 44641 - President's National Security Telecommunications Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-30
..., interoperability, security, reliability, and resiliency; and (3) help ensure the deployment and evolution of the... how commercial off-the-shelf technologies and private sector best practices can be used to secure...
Code of Federal Regulations, 2010 CFR
2010-04-01
...' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL COAL MINE HEALTH AND SAFETY ACT OF 1969, TITLE IV-BLACK... family, the Social Security Administration may, in its discretion, certify to any two or more of such... same household and one of them dies before the check is cashed, the Social Security Administration may...
76 FR 6199 - Enhanced Weapons, Firearms Background Checks, and Security Event Notifications
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-03
... XI. Voluntary Consensus Standards XII. Finding of No Significant Environmental Impact XIII. Paperwork... potential advantages to NRC licensees and certificate holders to enhance security. The first advantage is... advantage is that security personnel of certain licensees or certificate holders will be permitted to...
NASA Astrophysics Data System (ADS)
Lohweg, Volker; Schaede, Johannes; Türke, Thomas
2006-02-01
The authenticity checking and inspection of bank notes is a high labour intensive process where traditionally every note on every sheet is inspected manually. However with the advent of more and more sophisticated security features, both visible and invisible, and the requirement of cost reduction in the printing process, it is clear that automation is required. As more and more print techniques and new security features will be established, total quality security, authenticity and bank note printing must be assured. Therefore, this factor necessitates amplification of a sensorial concept in general. We propose a concept for both authenticity checking and inspection methods for pattern recognition and classification for securities and banknotes, which is based on the concept of sensor fusion and fuzzy interpretation of data measures. In the approach different methods of authenticity analysis and print flaw detection are combined, which can be used for vending or sorting machines, as well as for printing machines. Usually only the existence or appearance of colours and their textures are checked by cameras. Our method combines the visible camera images with IR-spectral sensitive sensors, acoustical and other measurements like temperature and pressure of printing machines.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions, and...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions, and...
33 CFR 66.05-35 - Private aids to navigation other than State owned.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality not...
33 CFR 66.05-35 - Private aids to navigation other than State owned.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality not...
33 CFR 66.05-35 - Private aids to navigation other than State owned.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality not...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions, and...
33 CFR 66.05-35 - Private aids to navigation other than State owned.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality not...
77 FR 41204 - State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-12
..., Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC) AGENCY: Information Security Oversight..., announcement is made for the committee meeting of the State, Local, Tribal, and Private Sector Policy Advisory..., Local, Tribal, and Private Sector Entities. DATES: The meeting will be held on July 25, 2012, 10:00 a.m...
33 CFR 66.05-35 - Private aids to navigation other than State owned.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality not...
Private randomness expansion with untrusted devices
NASA Astrophysics Data System (ADS)
Colbeck, Roger; Kent, Adrian
2011-03-01
Randomness is an important resource for many applications, from gambling to secure communication. However, guaranteeing that the output from a candidate random source could not have been predicted by an outside party is a challenging task, and many supposedly random sources used today provide no such guarantee. Quantum solutions to this problem exist, for example a device which internally sends a photon through a beamsplitter and observes on which side it emerges, but, presently, such solutions require the user to trust the internal workings of the device. Here, we seek to go beyond this limitation by asking whether randomness can be generated using untrusted devices—even ones created by an adversarial agent—while providing a guarantee that no outside party (including the agent) can predict it. Since this is easily seen to be impossible unless the user has an initially private random string, the task we investigate here is private randomness expansion. We introduce a protocol for private randomness expansion with untrusted devices which is designed to take as input an initially private random string and produce as output a longer private random string. We point out that private randomness expansion protocols are generally vulnerable to attacks that can render the initial string partially insecure, even though that string is used only inside a secure laboratory; our protocol is designed to remove this previously unconsidered vulnerability by privacy amplification. We also discuss extensions of our protocol designed to generate an arbitrarily long random string from a finite initially private random string. The security of these protocols against the most general attacks is left as an open question.
1999-01-01
Some means currently under investigation include domain-speci c languages which are easy to check (e.g., PLAN), proof-carrying code [NL96, Nec97...domain-speci c language coupled to an extension system with heavyweight checks. In this way, the frequent (per- packet) dynamic checks are inexpensive...to CISC architectures remains problematic. Typed assembly language [MWCG98] propagates type safety information to the assembly language level, so
Connecting AAC devices to the world of information technology.
Caves, Kevin; Shane, Howard C; DeRuyter, Frank
2002-01-01
Modern day information technology (IT) is converging around wireless networks. It is now possible to check E-mail and view information from the World Wide Web from commercially available mobile phones. For individuals with disabilities, the ability to access multiple and different types of information not only promises convenience, but also can help to promote independence and facilitate access to public and private information systems. There are many barriers to access for people with disabilities, including technological hurdles, security, privacy, and access to these emerging wireless technologies. However, legislation, advocacy, standards, and research and development can ensure that users of augmentative and alternative communication (AAC) and assistive technology have access to these technologies. This article provides a historical context for the field of AAC and IT development, a review of the current state of these technologies, a glimpse of the potential of wireless information access for the lives of AAC users, and a description of some of the barriers and enablers to making access available to users of AAC and assistive technologies.
27 CFR 72.25 - Deposit of collateral.
Code of Federal Regulations, 2010 CFR
2010-04-01
... be pledged and deposited by claimants as collateral security in lieu of corporate sureties in... treasurers' checks may be furnished by claimants as collateral security in lieu of corporate sureties. (b..., Notes or Other Obligations Issued or Guaranteed by the United States as Security in Lieu of Surety or...
27 CFR 72.25 - Deposit of collateral.
Code of Federal Regulations, 2012 CFR
2012-04-01
... be pledged and deposited by claimants as collateral security in lieu of corporate sureties in... treasurers' checks may be furnished by claimants as collateral security in lieu of corporate sureties. (b..., Notes or Other Obligations Issued or Guaranteed by the United States as Security in Lieu of Surety or...
27 CFR 72.25 - Deposit of collateral.
Code of Federal Regulations, 2013 CFR
2013-04-01
... be pledged and deposited by claimants as collateral security in lieu of corporate sureties in... treasurers' checks may be furnished by claimants as collateral security in lieu of corporate sureties. (b..., Notes or Other Obligations Issued or Guaranteed by the United States as Security in Lieu of Surety or...
27 CFR 72.25 - Deposit of collateral.
Code of Federal Regulations, 2014 CFR
2014-04-01
... be pledged and deposited by claimants as collateral security in lieu of corporate sureties in... treasurers' checks may be furnished by claimants as collateral security in lieu of corporate sureties. (b..., Notes or Other Obligations Issued or Guaranteed by the United States as Security in Lieu of Surety or...
27 CFR 72.25 - Deposit of collateral.
Code of Federal Regulations, 2011 CFR
2011-04-01
... be pledged and deposited by claimants as collateral security in lieu of corporate sureties in... treasurers' checks may be furnished by claimants as collateral security in lieu of corporate sureties. (b..., Notes or Other Obligations Issued or Guaranteed by the United States as Security in Lieu of Surety or...
How to Be Safe and Secure against School Vandalism.
ERIC Educational Resources Information Center
Stover, Del
1990-01-01
During 1990-91, vandals will cost the public schools $250 million. To battle vandalism, school executives are relying on numerous security techniques that police use to foil burglaries, including locks, alarms, electronic security systems, and antivandalism programs. Tips are provided for enlisting others' aid and checking a school's security…
Code of Federal Regulations, 2014 CFR
2014-01-01
... under 27 CFR part 555; (4) Health and Human Services security risk assessments for possession and use of...; (6) State Radiation Control Program Directors and State Homeland Security Advisors or their designated State employee representatives; (7) Agreement State employees conducting security inspections on...
Secure Cloud-Based Solutions for Different eHealth Services in Spanish Rural Health Centers
2015-01-01
Background The combination of eHealth applications and/or services with cloud technology provides health care staff—with sufficient mobility and accessibility for them—to be able to transparently check any data they may need without having to worry about its physical location. Objective The main aim of this paper is to put forward secure cloud-based solutions for a range of eHealth services such as electronic health records (EHRs), telecardiology, teleconsultation, and telediagnosis. Methods The scenario chosen for introducing the services is a set of four rural health centers located within the same Spanish region. iCanCloud software was used to perform simulations in the proposed scenario. We chose online traffic and the cost per unit in terms of time as the parameters for choosing the secure solution on the most optimum cloud for each service. Results We suggest that load balancers always be fitted for all solutions in communication together with several Internet service providers and that smartcards be used to maintain identity to an appropriate extent. The solutions offered via private cloud for EHRs, teleconsultation, and telediagnosis services require a volume of online traffic calculated at being able to reach 2 Gbps per consultation. This may entail an average cost of €500/month. Conclusions The security solutions put forward for each eHealth service constitute an attempt to centralize all information on the cloud, thus offering greater accessibility to medical information in the case of EHRs alongside more reliable diagnoses and treatment for telecardiology, telediagnosis, and teleconsultation services. Therefore, better health care for the rural patient can be obtained at a reasonable cost. PMID:26215155
Hackländer, T; Kleber, K; Schneider, H; Demabre, N; Cramer, B M
2004-08-01
To build an infrastructure that enables radiologists on-call and external users a teleradiological access to the HTML-based image distribution system inside the hospital via internet. In addition, no investment costs should arise on the user side and the image data should be sent renamed using cryptographic techniques. A pure HTML-based system manages the image distribution inside the hospital, with an open source project extending this system through a secure gateway outside the firewall of the hospital. The gateway handles the communication between the external users and the HTML server within the network of the hospital. A second firewall is installed between the gateway and the external users and builds up a virtual private network (VPN). A connection between the gateway and the external user is only acknowledged if the computers involved authenticate each other via certificates and the external users authenticate via a multi-stage password system. All data are transferred encrypted. External users get only access to images that have been renamed to a pseudonym by means of automated processing before. With an ADSL internet access, external users achieve an image load frequency of 0.4 CT images per second. More than 90 % of the delay during image transfer results from security checks within the firewalls. Data passing the gateway induce no measurable delay. Project goals were realized by means of an infrastructure that works vendor independently with any HTML-based image distribution systems. The requirements of data security were realized using state-of-the-art web techniques. Adequate access and transfer speed lead to a widespread acceptance of the system on the part of external users.
31 CFR 306.90 - Nontransferable securities.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false Nontransferable securities. 306.90 Section 306.90 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL.... SECURITIES Assignments in Behalf of Private or Public Organizations § 306.90 Nontransferable securities. The...
31 CFR 306.90 - Nontransferable securities.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Nontransferable securities. 306.90 Section 306.90 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL.... SECURITIES Assignments in Behalf of Private or Public Organizations § 306.90 Nontransferable securities. The...
31 CFR 306.90 - Nontransferable securities.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false Nontransferable securities. 306.90 Section 306.90 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL.... SECURITIES Assignments in Behalf of Private or Public Organizations § 306.90 Nontransferable securities. The...
31 CFR 306.90 - Nontransferable securities.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false Nontransferable securities. 306.90 Section 306.90 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL.... SECURITIES Assignments in Behalf of Private or Public Organizations § 306.90 Nontransferable securities. The...
ERIC Educational Resources Information Center
Branstad, Dennis K., Ed.
The 15 papers and summaries of presentations in this collection provide technical information and guidance offered by representatives from federal agencies and private industry. Topics discussed include physical security, risk assessment, software security, computer network security, and applications and implementation of the Data Encryption…
Information Security Awareness On-Line Materials Design with Knowledge Maps
ERIC Educational Resources Information Center
Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan
2011-01-01
Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…
ATIP Report: Cyber Security Research in China
2015-06-05
vulnerabilities. ATIP Document ID: 150605AR CYBER SECURITY RESEARCH IN CHINA 17 Le GUAN et al. at SKLOIS of IIE, CAS proposed a solution named “ Mimosa ...that protects RSA private keys against the above software-based and physical memory attacks. When the Mimosa service is in idle, private keys are...encrypted and reside in memory as ciphertext. During the cryptographic computing, Mimosa uses hardware transactional memory (HTM) to ensure that (a
Code of Federal Regulations, 2010 CFR
2010-04-01
... certifying to the Commission on Form 15F (17 CFR 249.324) that: (1) The foreign private issuer has had... average daily trading volume of the subject class of securities in the United States for a recent 12-month period has been no greater than 5 percent of the average daily trading volume of that class of securities...
ERIC Educational Resources Information Center
Bovbjerg, Barbara D.
This report compares the Social Security Administration's Disability Insurance (DI) program and the practices of the private sector and other countries in helping people with severe disabilities return to work. Information was gathered in in-depth interviews and a review of policy documents and program data at three private sector disability…
Park, Sohyun; Kim, Kirang
2018-01-01
This study was conducted to understand food acquisition practices from social networks and its relationship with household food security. In-depth interviews and a survey on food security were conducted with twenty-nine mothers and one father in metropolitan areas of South Korea. Many families acquired food from their extended families, mainly participants’ mothers. Between low-income and non-low-income households, there was a pattern of more active sharing of food through private networks among non-low-income households. Most of the low-income households received food support from public social networks, such as government and charity institutions. Despite the assistance, most of them perceived food insecurity. We hypothesized that the lack of private social support may exacerbate the food security status of low-income households, despite formal food assistance from government and social welfare institutions. Interviews revealed that certain food items were perceived as lacking, such as animal-based protein sources and fresh produce, which are relatively expensive in this setting. Future programs should consider what would alleviate food insecurity among low-income households and determine the right instruments and mode of resolving the unmet needs. Future research could evaluate the quantitative relationship between private resources and food insecurity in households with various income statuses. PMID:29370127
The Mexican Social Security counterreform: pensions for profit.
Laurell, A C
1999-01-01
The social security counterreform, initiated in 1997, forms part of the neoliberal reorganization of Mexican society. The reform implies a profound change in the guiding principles of social security, as the public model based on integrality, solidarity, and redistribution is replaced by a model based on private administration of funds and services, individualization of entitlement, and reduction of rights. Its economic purpose is to move social services and benefits into the direct sphere of private capital accumulation. Although these changes will involve the whole social security system--old-age and disability pensions, health care, child care, and workers' compensation--they are most immediately evident in the pension scheme. The pay-as-you-go scheme is being replaced by privately managed individual retirement accounts which especially favor the big financial groups. These groups are gaining control over huge amounts of capital, are authorized to charge a high commission, and run no financial risks. The privatization of the system requires decisive state intervention with a legal change and a sizable state subsidy (1 to 1.5 percent of GNP) over five decades. The supposed positive impact on economic growth and employment is uncertain. A review of the new law and of the estimates of future annuities reveals shrinking pension coverage and inadequate incomes from pensions.
Park, Sohyun; Kim, Kirang
2018-01-25
This study was conducted to understand food acquisition practices from social networks and its relationship with household food security. In-depth interviews and a survey on food security were conducted with twenty-nine mothers and one father in metropolitan areas of South Korea. Many families acquired food from their extended families, mainly participants' mothers. Between low-income and non-low-income households, there was a pattern of more active sharing of food through private networks among non-low-income households. Most of the low-income households received food support from public social networks, such as government and charity institutions. Despite the assistance, most of them perceived food insecurity. We hypothesized that the lack of private social support may exacerbate the food security status of low-income households, despite formal food assistance from government and social welfare institutions. Interviews revealed that certain food items were perceived as lacking, such as animal-based protein sources and fresh produce, which are relatively expensive in this setting. Future programs should consider what would alleviate food insecurity among low-income households and determine the right instruments and mode of resolving the unmet needs. Future research could evaluate the quantitative relationship between private resources and food insecurity in households with various income statuses.
A Scenario-Based Protocol Checker for Public-Key Authentication Scheme
NASA Astrophysics Data System (ADS)
Saito, Takamichi
Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).
An approach for investigation of secure access processes at a combined e-learning environment
NASA Astrophysics Data System (ADS)
Romansky, Radi; Noninska, Irina
2017-12-01
The article discuses an approach to investigate processes for regulation the security and privacy control at a heterogenous e-learning environment realized as a combination of traditional and cloud means and tools. Authors' proposal for combined architecture of e-learning system is presented and main subsystems and procedures are discussed. A formalization of the processes for using different types resources (public, private internal and private external) is proposed. The apparatus of Markovian chains (MC) is used for modeling and analytical investigation of the secure access to the resources is used and some assessments are presented.
A Unified Approach to Information Security Compliance
ERIC Educational Resources Information Center
Adler, M. Peter
2006-01-01
The increased number of government-mandated and private contractual information security requirements in recent years has caused higher education security professionals to view information security as another aspect of regulatory or contractual compliance. The existence of fines, penalties, or loss (including bad publicity) has also increased the…
Sharing the Knowledge: Government-Private Sector Partnerships to Enhance Information Security
2000-05-01
private sector . However, substantial barriers threaten to block information exchanges between the government and private sector . These barriers include concerns over release of sensitive material under Freedom of Information Act requests, antitrust actions, protection of business confidential and other private material, possible liability due to shared information, disclosure of classified information, and burdens entailed with cooperating with law enforcement agencies. There is good cause to believe that the government and private
The welfare state, pensions, privatization: the case of Social Security in the United States.
Du Boff, R B
1997-01-01
In all high-income nations, the welfare state is under challenge, with particular concern voiced about the burden of retirement pensions on the public fisc and on younger workers. The strongest drive against social insurance is taking place in the United States, which has less of it than other nations and appears to be in the best position to meet future entitlement claims. In this article, the author examines the liabilities that the U.S. Social Security system is likely to incur over the next 35 years and finds that there is little danger that the system will fall into insolvency. Privatizing Social Security is not necessary to assure the integrity of future pension benefits. Furthermore, the cost-benefit ratio of privatization appears to be unfavorable, as borne out by the mandatory private pension plan in effect in Chile. Some wealthy nations will face greater demographic strains than the United States, but all need to retain the welfare state as a foundation for future changes in the world of work.
76 FR 41826 - State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-15
... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC) AGENCY: National Archives and Records... Information Program for State, Local, Tribal, and Private Sector Entities. DATES: The meeting will be held on...
Harvesting river water through small dams promote positive environmental impact.
Agoramoorthy, Govindasamy; Chaudhary, Sunita; Chinnasamy, Pennan; Hsu, Minna J
2016-11-01
While deliberations relating to negative consequences of large dams on the environment continue to dominate world attention, positive benefits provided by small dams, also known as check dams, go unobserved. Besides, little is known about the potential of check dams in mitigating global warming impacts due to less data availability. Small dams are usually commissioned to private contractors who do not have clear mandate from their employers to post their work online for public scrutiny. As a result, statistics on the design, cost, and materials used to build check dams are not available in public domain. However, this review paper presents data for the first time on the often ignored potential of check dams mitigating climate-induced hydrological threats. We hope that the scientific analysis presented in this paper will promote further research on check dams worldwide to better comprehend their eco-friendly significance serving society.
Electronic Life Safety and Security Systems Federal Background Check Act of 2013
Rep. Luetkemeyer, Blaine [R-MO-3
2013-04-09
House - 04/30/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Code of Federal Regulations, 2014 CFR
2014-10-01
... Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF..., national security, or of terrorism: (i) Relevant criminal history databases; (ii) In the case of an alien... databases to determine the status of the alien under the immigration laws of the United States; and (iii...
49 CFR 1580.105 - Reporting significant security concerns.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Reporting significant security concerns. 1580.105... Hazardous Materials Receivers, and Private Cars § 1580.105 Reporting significant security concerns. (a... threats and significant security concerns to DHS by telephoning the Freedom Center at 1-866-615-5150. (c...
Secure quantum private information retrieval using phase-encoded queries
NASA Astrophysics Data System (ADS)
Olejnik, Lukasz
2011-08-01
We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.100.230502 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.
Secure quantum private information retrieval using phase-encoded queries
DOE Office of Scientific and Technical Information (OSTI.GOV)
Olejnik, Lukasz
We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offersmore » substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.« less
17 CFR 240.3b-4 - Definition of “foreign government,” “foreign issuer” and “foreign private issuer”.
Code of Federal Regulations, 2010 CFR
2010-04-01
... voting securities beneficially owned by residents of the United States as reported on reports of... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Definition of âforeign... Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES...
Loss-tolerant measurement-device-independent quantum private queries
NASA Astrophysics Data System (ADS)
Zhao, Liang-Yuan; Yin, Zhen-Qiang; Chen, Wei; Qian, Yong-Jun; Zhang, Chun-Mei; Guo, Guang-Can; Han, Zheng-Fu
2017-01-01
Quantum private queries (QPQ) is an important cryptography protocol aiming to protect both the user’s and database’s privacy when the database is queried privately. Recently, a variety of practical QPQ protocols based on quantum key distribution (QKD) have been proposed. However, for QKD-based QPQ the user’s imperfect detectors can be subjected to some detector- side-channel attacks launched by the dishonest owner of the database. Here, we present a simple example that shows how the detector-blinding attack can damage the security of QKD-based QPQ completely. To remove all the known and unknown detector side channels, we propose a solution of measurement-device-independent QPQ (MDI-QPQ) with single- photon sources. The security of the proposed protocol has been analyzed under some typical attacks. Moreover, we prove that its security is completely loss independent. The results show that practical QPQ will remain the same degree of privacy as before even with seriously uncharacterized detectors.
Loss-tolerant measurement-device-independent quantum private queries.
Zhao, Liang-Yuan; Yin, Zhen-Qiang; Chen, Wei; Qian, Yong-Jun; Zhang, Chun-Mei; Guo, Guang-Can; Han, Zheng-Fu
2017-01-04
Quantum private queries (QPQ) is an important cryptography protocol aiming to protect both the user's and database's privacy when the database is queried privately. Recently, a variety of practical QPQ protocols based on quantum key distribution (QKD) have been proposed. However, for QKD-based QPQ the user's imperfect detectors can be subjected to some detector- side-channel attacks launched by the dishonest owner of the database. Here, we present a simple example that shows how the detector-blinding attack can damage the security of QKD-based QPQ completely. To remove all the known and unknown detector side channels, we propose a solution of measurement-device-independent QPQ (MDI-QPQ) with single- photon sources. The security of the proposed protocol has been analyzed under some typical attacks. Moreover, we prove that its security is completely loss independent. The results show that practical QPQ will remain the same degree of privacy as before even with seriously uncharacterized detectors.
12 CFR 708b.302 - Conversion of insurance (Federal Credit Union).
Code of Federal Regulations, 2012 CFR
2012-01-01
... as follows (check one box): [] Approve the conversion of charter and conversion to private insurance... the approval of the Regional Director.). The proposed conversion will result in the following one-time...
12 CFR 708b.302 - Conversion of insurance (Federal Credit Union).
Code of Federal Regulations, 2013 CFR
2013-01-01
... as follows (check one box): [] Approve the conversion of charter and conversion to private insurance... the approval of the Regional Director.). The proposed conversion will result in the following one-time...
12 CFR 708b.302 - Conversion of insurance (Federal Credit Union).
Code of Federal Regulations, 2014 CFR
2014-01-01
... as follows (check one box): [] Approve the conversion of charter and conversion to private insurance... the approval of the Regional Director.). The proposed conversion will result in the following one-time...
78 FR 2214 - Enhanced Weapons, Firearms Background Checks, and Security Event Notifications
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-10
.... Voluntary Consensus Standards XI. Finding of No Significant Environmental Impact XII. Paperwork Reduction... ML110480470 of Nuclear Energy Institute, on the proposed ``Enhanced Weapons, Firearms Background Checks and... consensus standards. XI. Finding of No Significant Environmental Impact In the proposed rule published on...
29 CFR 9.12 - Contractor requirements and prerogatives.
Code of Federal Regulations, 2014 CFR
2014-07-01
... utilize employment screening processes (i.e., drug tests, background checks, security clearance checks, and similar pre-employment screening mechanisms) only when such processes are provided for by the... example, if the contractor holds a meeting for a group of employees on the predecessor contract in order...
29 CFR 9.12 - Contractor requirements and prerogatives.
Code of Federal Regulations, 2012 CFR
2012-07-01
... utilize employment screening processes (i.e., drug tests, background checks, security clearance checks, and similar pre-employment screening mechanisms) only when such processes are provided for by the... example, if the contractor holds a meeting for a group of employees on the predecessor contract in order...
29 CFR 9.12 - Contractor requirements and prerogatives.
Code of Federal Regulations, 2013 CFR
2013-07-01
... utilize employment screening processes (i.e., drug tests, background checks, security clearance checks, and similar pre-employment screening mechanisms) only when such processes are provided for by the... example, if the contractor holds a meeting for a group of employees on the predecessor contract in order...
33 CFR 66.01-3 - Delegation of authority to District Commanders.
Code of Federal Regulations, 2012 CFR
2012-07-01
... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or... establish and maintain, discontinue, change or transfer ownership of private aids to maritime navigation...
33 CFR 66.01-3 - Delegation of authority to District Commanders.
Code of Federal Regulations, 2014 CFR
2014-07-01
... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or... establish and maintain, discontinue, change or transfer ownership of private aids to maritime navigation...
33 CFR 66.01-3 - Delegation of authority to District Commanders.
Code of Federal Regulations, 2013 CFR
2013-07-01
... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or... establish and maintain, discontinue, change or transfer ownership of private aids to maritime navigation...
33 CFR 66.01-3 - Delegation of authority to District Commanders.
Code of Federal Regulations, 2011 CFR
2011-07-01
... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or... establish and maintain, discontinue, change or transfer ownership of private aids to maritime navigation...
33 CFR 66.01-3 - Delegation of authority to District Commanders.
Code of Federal Regulations, 2010 CFR
2010-07-01
... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or... establish and maintain, discontinue, change or transfer ownership of private aids to maritime navigation...
13 CFR 107.1570 - Distributions by Licensee-optional Distribution to private investors and SBA.
Code of Federal Regulations, 2012 CFR
2012-01-01
... from Institutional Investors) below the minimum required under § 107.210, unless SBA approves the... Distribution to private investors and SBA. 107.1570 Section 107.1570 Business Credit and Assistance SMALL... private investors and SBA. If you have outstanding Participating Securities or Earmarked Assets, you may...
13 CFR 107.1570 - Distributions by Licensee-optional Distribution to private investors and SBA.
Code of Federal Regulations, 2011 CFR
2011-01-01
... from Institutional Investors) below the minimum required under § 107.210, unless SBA approves the... Distribution to private investors and SBA. 107.1570 Section 107.1570 Business Credit and Assistance SMALL... private investors and SBA. If you have outstanding Participating Securities or Earmarked Assets, you may...
13 CFR 107.1570 - Distributions by Licensee-optional Distribution to private investors and SBA.
Code of Federal Regulations, 2014 CFR
2014-01-01
... from Institutional Investors) below the minimum required under § 107.210, unless SBA approves the... Distribution to private investors and SBA. 107.1570 Section 107.1570 Business Credit and Assistance SMALL... private investors and SBA. If you have outstanding Participating Securities or Earmarked Assets, you may...
13 CFR 107.1570 - Distributions by Licensee-optional Distribution to private investors and SBA.
Code of Federal Regulations, 2013 CFR
2013-01-01
... from Institutional Investors) below the minimum required under § 107.210, unless SBA approves the... Distribution to private investors and SBA. 107.1570 Section 107.1570 Business Credit and Assistance SMALL... private investors and SBA. If you have outstanding Participating Securities or Earmarked Assets, you may...
Private Schools Put Spotlight on Safety
ERIC Educational Resources Information Center
Zehr, Mary Ann
2005-01-01
Administrators and students at private schools tend to see their schools as safer than public schools. Spurred in part by the terrorist attacks of Sept. 11, 2001, many private schools have joined the national push to revamp campus safety plans. Kenneth S. Trump, the president of the Cleveland-based National School Safety and Security Services,…
Private Schooling and Labour Market Outcomes
ERIC Educational Resources Information Center
Green, Francis; Henseke, Golo; Vignoles, Anna
2017-01-01
Though a relative small part of the school sector, private schools have an important role in British society, and there are policy concerns about their negative effect on social mobility. Other studies show that individuals who have attended a private school go on to have higher levels of educational achievement, are more likely to secure a…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-08
... Collection; Comment Request; Licensing of Private Remote-Sensing Space Systems AGENCY: National Oceanic and.... Abstract NOAA has established requirements for the licensing of private operators of remote-sensing space... Land Remote- Sensing Policy Act of 1992 and with the national security and international obligations of...
29 CFR 1918.83 - Stowed cargo; tiering and breaking down.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 1918.83 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) SAFETY AND HEALTH REGULATIONS FOR LONGSHORING Handling Cargo § 1918.83 Stowed... cargo shall be checked in and out by the job boss. Before securing any reefer compartment, a check shall...
The ALL-OUT Library; A Design for Computer-Powered, Multidimensional Services.
ERIC Educational Resources Information Center
Sleeth, Jim; LaRue, James
1983-01-01
Preliminary description of design of electronic library and home information delivery system highlights potentials of personal computer interface program (applying for service, assuring that users are valid, checking for measures, searching, locating titles) and incorporation of concepts used in other information systems (security checks,…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-30
... TSA PRA Officer, Office of Information Technology (OIT), TSA-11, Transportation Security... technological collection techniques or other forms of information technology. Information Collection Requirement... history records check (CHRC), (2) a name-based check to determine whether the individual poses or is...
31 CFR 240.8 - Reclamation of amounts of paid checks.
Code of Federal Regulations, 2014 CFR
2014-07-01
.../check_security_new.pdf. Institutions may contact the Fiscal Service Questioned Documents Branch at (202...) Reclamation debts are due to be paid upon receipt of the reclamation by the reclamation debtor. Interest, penalties, and administrative costs associated with unpaid balances will accrue as follows: (1) Interest...
A tainted trade? Moral ambivalence and legitimation work in the private security industry.
Thumala, Angélica; Goold, Benjamin; Loader, Ian
2011-06-01
The private security industry is often represented - and typically represents itself - as an expanding business, confident of its place in the world and sure of its ability to meet a rising demand for security. But closer inspection of the ways in which industry players talk about its past, present and future suggests that this self-promotion is accompanied by unease about the industry's condition and legitimacy. In this paper, we analyse the self-understandings of those who sell security - as revealed in interviews conducted with key industry players and in a range of trade materials - in order to highlight and dissect the constitutive elements of this ambivalence. This analysis begins by describing the reputational problems that are currently thought to beset the industry and the underlying fears about its status and worth that these difficulties disclose. We then examine how security players seek to legitimate the industry using various narratives of professionalization. Four such narratives are identified - regulation, education, association and borrowing - each of which seeks to justify private security and enhance the industry's social worth. What is striking about these legitimation claims is that they tend not to justify the selling of security in market terms. In conclusion we ask why this is the case and argue that market justifications are 'closed-off' by a moral ambivalence that attaches to an industry trading in products which cannot guarantee to deliver the condition that its consumers crave. © London School of Economics and Political Science 2011.
12 CFR 708b.301 - Conversion of insurance (State Chartered Credit Union).
Code of Federal Regulations, 2012 CFR
2012-01-01
... MONEY BACK. I vote on the proposal as follows (check one box): [] Approve the conversion to private... conversion will result in the following one-time cost associated with the conversion: (List the total...
12 CFR 708b.301 - Conversion of insurance (State Chartered Credit Union).
Code of Federal Regulations, 2013 CFR
2013-01-01
... MONEY BACK. I vote on the proposal as follows (check one box): [] Approve the conversion to private... conversion will result in the following one-time cost associated with the conversion: (List the total...
12 CFR 708b.301 - Conversion of insurance (State Chartered Credit Union).
Code of Federal Regulations, 2014 CFR
2014-01-01
... MONEY BACK. I vote on the proposal as follows (check one box): [] Approve the conversion to private... conversion will result in the following one-time cost associated with the conversion: (List the total...
Code of Federal Regulations, 2011 CFR
2011-07-01
... Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Private... to request a criminal history record information search of an employee through a state identification... official or the state legislature to perform centralized recordkeeping functions for criminal history...
Code of Federal Regulations, 2012 CFR
2012-07-01
... Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Private... to request a criminal history record information search of an employee through a state identification... official or the state legislature to perform centralized recordkeeping functions for criminal history...
Code of Federal Regulations, 2013 CFR
2013-07-01
... Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Private... to request a criminal history record information search of an employee through a state identification... official or the state legislature to perform centralized recordkeeping functions for criminal history...
Code of Federal Regulations, 2014 CFR
2014-07-01
... Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Private... to request a criminal history record information search of an employee through a state identification... official or the state legislature to perform centralized recordkeeping functions for criminal history...
Code of Federal Regulations, 2010 CFR
2010-07-01
... Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Private... to request a criminal history record information search of an employee through a state identification... official or the state legislature to perform centralized recordkeeping functions for criminal history...
75 FR 35444 - Safety and Security Equipment and Services Trade Mission To Brazil
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-22
... electronic security, the market is estimated at US$ 1.5 billion. Today, electronic security equipment is not... market information and to provide access to key government officials and potential business partners for... both the public sector (e.g., public security authorities and officials) and private business (e.g...
Private Security Contractors in Iraq and Afghanistan: Legal Issues
2010-01-07
involving Blackwater Worldwide private security guards on contract with the State Department, who reportedly opened fire in the crowded traffic circle in the...Background and Analysis, by Moshe Schwartz. 2 See James Risen and Mark Mazzetti, Blackwater Guards Tied to Secret C.I.A. Raids, NY TIMES, December 10...0360 (RMU), slip op. (D.D.C, .Dec. 31, 2009). 6 See Iraq: U.S. Blackwater Case Dismissal “Unacceptable,” REUTERS, Jan. 1, 2010. 7 See Iraq to
Transportation Security: Issues for the 111th Congress
2009-05-15
results of covert testing of airport security checkpoints demonstrating deficiencies in detecting improvised explosives and incendiary devices...34 A key issue in the debate over aviation security immediately following September 11, 2001, was whether airport security screeners should be...intentional wrongdoing on the part of airport security screeners, whether they be federal or private. Nonetheless, while the pilot program airports
National Strategy for Aviation Security
2007-03-26
for Aviation Security (hereafter referred to as the Strategy) to protect the Nation and its interests from threats in the Air Domain. The Secretary of... Aviation security is best achieved by integrating public and private aviation security global activities into a coordinated effort to detect, deter...might occur. The Strategy aligns Federal government aviation security programs and initiatives into a comprehensive and cohesive national effort
Nonimmigrant Overstays: Brief Synthesis of the Issue
2010-01-15
finger biometric system for immigration identification17 to the major identity management and screening... finger scans and digital photographs) to check identity. Enhanced Border Security and Visa Entry Reform Act of 2002 The Enhanced Border Security ...further provides: “A determination by the Secretary of Homeland Security that an alien who applied for authorization to travel to the United States
Code of Federal Regulations, 2011 CFR
2011-10-01
..., national security, or of terrorism: (i) Relevant criminal history databases; (ii) In the case of an alien... databases to determine the status of the alien under the immigration laws of the United States; and (iii) Other relevant information or databases, as determined by the Secretary of Homeland Security. (c...
Code of Federal Regulations, 2010 CFR
2010-10-01
..., national security, or of terrorism: (i) Relevant criminal history databases; (ii) In the case of an alien... databases to determine the status of the alien under the immigration laws of the United States; and (iii) Other relevant information or databases, as determined by the Secretary of Homeland Security. (c...
Code of Federal Regulations, 2012 CFR
2012-10-01
..., national security, or of terrorism: (i) Relevant criminal history databases; (ii) In the case of an alien... databases to determine the status of the alien under the immigration laws of the United States; and (iii) Other relevant information or databases, as determined by the Secretary of Homeland Security. (c...
Code of Federal Regulations, 2013 CFR
2013-10-01
..., national security, or of terrorism: (i) Relevant criminal history databases; (ii) In the case of an alien... databases to determine the status of the alien under the immigration laws of the United States; and (iii) Other relevant information or databases, as determined by the Secretary of Homeland Security. (c...
75 FR 26171 - Cyber Security Certification Program
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-11
...-sector auditors who will examine those provider's adherence to stringent cyber security practices that... the auditors who will conduct security assessments of communications service providers; (3) establish... whether the auditors should also be private-sector entities. If so, in order to prevent conflicts of...
20 CFR 416.1121 - Types of unearned income.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 416.1121 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED... to prior work or service. It includes, for example, private pensions, social security benefits... capital investments, such as stocks, bonds, or savings accounts. Royalties are compensation paid to the...
20 CFR 416.1121 - Types of unearned income.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 416.1121 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED... to prior work or service. It includes, for example, private pensions, social security benefits... capital investments, such as stocks, bonds, or savings accounts. Royalties are compensation paid to the...
Fernando, Juanita
2010-01-01
This case study of 9 information technology (IT) support staff in 3 Australian (Victoria) public hospitals juxtaposes their experiences at the user-level of eHealth security in the Natural Hospital Environment with that previously reported by 26 medical, nursing and allied healthcare clinicians. IT support responsibilities comprised the entire hospital, of which clinician eHealth security needs were only part. IT staff believed their support tasks were often fragmented while work responsibilities were hampered by resources shortages. They perceived clinicians as an ongoing security risk to private health information. By comparison clinicians believed IT staff would not adequately support the private and secure application of eHealth for patient care. Preliminary data analysis suggests the tension between these cohorts manifests as an eHealth environment where silos of clinical work are disconnected from silos of IT support work. The discipline-based silos hamper health privacy outcomes. Privacy and security policies, especially those influencing the audit process, will benefit by further research of this phenomenon.
... Savings Account Plans These plans are offered by insurance companies and other private companies approved by Medicare. Medicare Advantage Plans may also offer prescription drug coverage that follows the same rules ... card . Check all other insurance cards that you use. Call the phone number ...
... a hospital, an insurance company, or an employer. Electronic Health Records—Are They Secure? Many people wonder ... information is kept private and secure in an electronic health record system. In an electronic health record, ...
ERIC Educational Resources Information Center
Patterson, Kristin
1996-01-01
Property theft at schools is a problem districts are having to confront. Deterrents include inventory checks and etching equipment with inventory control numbers. In Washington, D.C., officials are installing high-security equipment such as closed-circuit television, fiber-optics lines to secure computers, and motion detectors. (MLF)
Deer hunting on Pennsylvania's public and private lands: A two-tiered system of hunters?
Stedman, R.C.; Bhandari, P.; Luloff, A.E.; Diefenbach, D.R.; Finley, J.C.
2008-01-01
Recreational hunting is crucial for controlling white-tailed deer populations. Public land is increasingly important as access to private lands declines. However, differences between public and private land hunters remain unknown. Our study of Pennsylvania hunters revealed differences between private and public land hunters that may pose problems for management. Hunters who only hunted public land had lower harvest rates, especially of antlerless deer, spent less time hunting, were less committed to hunting, were more likely to hunt alone, less likely to belong to a hunting camp, and more likely to live in urban areas. They were less likely to believe that high deer populations could damage forest ecosystems, and less willing to harvest antlerless deer. The implications of these findings, in the context of already-declining hunter capacity to keep deer populations in check, and concomitant declining access to private land, are discussed. Copyright ?? Taylor & Francis Group, LLC.
Experimental extraction of secure correlations from a noisy private state.
Dobek, K; Karpiński, M; Demkowicz-Dobrzański, R; Banaszek, K; Horodecki, P
2011-01-21
We report experimental generation of a noisy entangled four-photon state that exhibits a separation between the secure key contents and distillable entanglement, a hallmark feature of the recently established quantum theory of private states. The privacy analysis, based on the full tomographic reconstruction of the prepared state, is utilized in a proof-of-principle key generation. The inferiority of distillation-based strategies to extract the key is exposed by an implementation of an entanglement distillation protocol for the produced state.
2010-06-22
Congress has generally accepted the concept of using unarmed contractors to carry out support functions in military operations, such as providing food and...countries where stability generally is not an issue. 3 According to one report, “Not since the 17th century has there been such a reliance on private...Institution has estimated that citizens of some 30 countries have worked as security contractors in Iraq.6 PSC employees are generally divided by
2009-07-28
Incidents of Weapons Discharges by Private Security Contractors Can Be Improved 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6...for Iraq Reconstruction,400 Army Navy Drive,Arlington,VA,22202-4704 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S...Defense’s (DoD) oversight of incidents involving the firing—or discharge —of weapons reported from May 2008 through February 2009 by its PSCs
2002-03-22
may be derived from detailed inspection of the IC itself or from illicit appropriation of design information. Counterfeit smart cards can be mass...Infrastructure (PKI) as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair...interference devices (SQDIS), electrical testing, and electron beam testing. • Other attacks, such as UV or X-rays or high temperatures, could cause erasure
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-25
... Proposed Rule on Enhanced Weapons, Firearms Background Checks, and Security Event Notifications AGENCY... the proposed enhanced weapons rule, the two draft regulatory guides, and the draft weapons safety.... No formal comments on the proposed enhanced weapons rule or the draft guidance documents will be...
32 CFR Appendix A to Part 86 - Criminal History Background Check Procedures
Code of Federal Regulations, 2011 CFR
2011-07-01
... residences in an employment or security application. It is deemed unnecessary to conduct checks before 18... information exists regarding residence by the individual in the United States for 1 year or more since age 18... video equipment is acceptable provided it is monitored by an individual who has successfully completed a...
Terrorist Watchlist Checks and Air Passenger Prescreening
2009-12-30
U.S. port of entry or at airport security checkpoints prior U.S. air carrier flights. For these purposes, CBP administers the Automated Targeting...Passenger Screening at Airport Security Checkpoints ................................. 14 9/11 Commission Recommendations and CAPPS II...individuals at either international ports of entries upon arrival at a U.S. port of entry or at airport security checkpoints prior U.S. air carrier
The Graduate MIS Security Course: Objectives and Challenges
ERIC Educational Resources Information Center
Jensen, Bradley K.; Guynes, Carl S.; Nyaboga, Andrew
2009-01-01
Given the magnitude of real and potential losses, both private and public employers increasingly expect graduates of management information systems (MIS) programs to understand information security concepts. The infrastructure requirements for the course includes setting up a secure laboratory environment to accommodate the development of viruses…
Nearest private query based on quantum oblivious key distribution
NASA Astrophysics Data System (ADS)
Xu, Min; Shi, Run-hua; Luo, Zhen-yu; Peng, Zhen-wan
2017-12-01
Nearest private query is a special private query which involves two parties, a user and a data owner, where the user has a private input (e.g., an integer) and the data owner has a private data set, and the user wants to query which element in the owner's private data set is the nearest to his input without revealing their respective private information. In this paper, we first present a quantum protocol for nearest private query, which is based on quantum oblivious key distribution (QOKD). Compared to the classical related protocols, our protocol has the advantages of the higher security and the better feasibility, so it has a better prospect of applications.
Lopes, Fernanda Ferreira; Ribeiro, Tafnes Valverde; Fernandes, Daniela Braga; Calixto, Nayra Rodrigues de Vasconcelos; Alves, Cláudia Maria Coêlho; Pereira, Antônio Luiz Amaral; Pereira, Adriana de Fátima Vasconcelos
2016-01-01
to describe characteristics of oral health care during prenatal check-ups and knowledge about oral health among pregnant women using public and private health services in São Luís, Maranhão, Brazil. this is a descriptive study of 300 women interviewed in public health services and a further 300 interviewed in private health services between August 2007 and July 2008. tooth brushing frequency was similar among users of public and private services (p=0.156), while flossing (64.0% and 47.0%; p<0.001) and mouthwashing (39.7% and 27.0%; p=0.001) was more frequent among private service users in relation to public service users; most users of public services (60.3%) and private services (65.7%) were unaware of the association between oral health and pregnancy. frequency of tooth brushing was similar among pregnant women in public and private services; the effects of pregnancy on oral health were not well known.
77 FR 65393 - President's National Security Telecommunications Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-26
... evolution of NS/EP functions by or through the NPSBN. The Secure Government Communications Scoping Subcommittee is charged with examining how commercial-off-the-shelf technologies and private sector best...
31 CFR 25.406 - Savings clause.
Code of Federal Regulations, 2010 CFR
2010-07-01
... LOANS MADE BY THE DEFENSE SECURITY ASSISTANCE AGENCY AND FOREIGN MILITARY SALES LOANS MADE BY THE FEDERAL FINANCING BANK AND GUARANTEED BY THE DEFENSE SECURITY ASSISTANCE AGENCY Form of Private Loan § 25...
[Basic consideration on the security checking of sick travelers at airports].
Felkai, Péter; Mártai, István
2012-09-02
The authorities guarantee the safety of passengers during air travel by strict ground security measures. All of these measures are restrictive and can affect the health status of both healthy and ill travelers. Patients who are in critical condition or confined to a stretcher and have to be repatriated by stretcher on a regular flight, must pass the airport security check as well. But the developers of security system should take into account the medical safety of patients during the procedure. The relevant medical principles are painfully missing not only in Hungary, but unfortunately also at most international airports. On the basis of principles reviewed in the present publication, an unambiguous, professionally reconciled regulation is necessary that would serve as a guideline for airport management and authorities, as well as for the involved medical personnel. Although setting principles into practice requires a different solution at each airport, yet, passenger safety and patient safety have to be harmonized as soon as possible.
Loss-tolerant measurement-device-independent quantum private queries
Zhao, Liang-Yuan; Yin, Zhen-Qiang; Chen, Wei; Qian, Yong-Jun; Zhang, Chun-Mei; Guo, Guang-Can; Han, Zheng-Fu
2017-01-01
Quantum private queries (QPQ) is an important cryptography protocol aiming to protect both the user’s and database’s privacy when the database is queried privately. Recently, a variety of practical QPQ protocols based on quantum key distribution (QKD) have been proposed. However, for QKD-based QPQ the user’s imperfect detectors can be subjected to some detector- side-channel attacks launched by the dishonest owner of the database. Here, we present a simple example that shows how the detector-blinding attack can damage the security of QKD-based QPQ completely. To remove all the known and unknown detector side channels, we propose a solution of measurement-device-independent QPQ (MDI-QPQ) with single- photon sources. The security of the proposed protocol has been analyzed under some typical attacks. Moreover, we prove that its security is completely loss independent. The results show that practical QPQ will remain the same degree of privacy as before even with seriously uncharacterized detectors. PMID:28051101
Autonomic Recovery: HyperCheck: A Hardware-Assisted Integrity Monitor
2013-08-01
system (OS). HyperCheck leverages the CPU System Management Mode ( SMM ), present in x86 systems, to securely generate and transmit the full state of the...HyperCheck harnesses the CPU System Management Mode ( SMM ) which is present in all x86 commodity systems to create a snapshot view of the current state of the...protect the software above it. Our assumptions are that the attacker does not have physical access to the machine and that the SMM BIOS is locked and
Multi-Bit Quantum Private Query
NASA Astrophysics Data System (ADS)
Shi, Wei-Xu; Liu, Xing-Tong; Wang, Jian; Tang, Chao-Jing
2015-09-01
Most of the existing Quantum Private Queries (QPQ) protocols provide only single-bit queries service, thus have to be repeated several times when more bits are retrieved. Wei et al.'s scheme for block queries requires a high-dimension quantum key distribution system to sustain, which is still restricted in the laboratory. Here, based on Markus Jakobi et al.'s single-bit QPQ protocol, we propose a multi-bit quantum private query protocol, in which the user can get access to several bits within one single query. We also extend the proposed protocol to block queries, using a binary matrix to guard database security. Analysis in this paper shows that our protocol has better communication complexity, implementability and can achieve a considerable level of security.
48 CFR 225.7402-4 - Law of war training.
Code of Federal Regulations, 2011 CFR
2011-10-01
... provided by the Defense Acquisition University at https://acc.dau.mil/CommunityBrowser.aspx?id=18014&lang... war training include the following: (i) Private security contractors. (ii) Security guards in or near...
48 CFR 225.7402-4 - Law of war training.
Code of Federal Regulations, 2012 CFR
2012-10-01
... provided by the Defense Acquisition University at https://acc.dau.mil/CommunityBrowser.aspx?id=18014&lang... war training include the following: (i) Private security contractors. (ii) Security guards in or near...
48 CFR 225.7402-4 - Law of war training.
Code of Federal Regulations, 2013 CFR
2013-10-01
... provided by the Defense Acquisition University at https://acc.dau.mil/CommunityBrowser.aspx?id=18014&lang... war training include the following: (i) Private security contractors. (ii) Security guards in or near...
Bridging the Gap in Port Security; Network Centric Theory Applied to Public/Private Collaboration
2007-03-01
commercial_enforcement/ ctpat /security_guideline/guideline_port.xml [Accessed January 2, 2007] 16 The four core elements of CSI include:36 • Identify high...www.cbp.gov/xp/cgov/import/commercial_enforcement/ ctpat /security_guideline/guideline_port.xml [Accessed January 2, 2007]. 17 Connecting them
The Private Military Firms: Historical Evolution and Industry Analysis
2007-06-01
Company, Private Military Firm, Supply Push, Demand Pull, Future Projections, Blackwater, DynCorp, Entrepreneurship 16. PRICE CODE 17. SECURITY...Business Administration, University of California, 1995. Baumol, W. J. Entrepreneurship , Management, and the Structure of Payoffs. Cambridge, MA: The MIT...P. F. Innovation and Entrepreneurship : Practice and Principles. Toronto: Fitzhenry & Whiteside Limited, 1985. Duffy, M. When Private Armies Take to
SOCIAL SECURITY NUMBERS: Government Benefits from SSN Use but Could Provide Better Safeguards
2002-05-01
Report to Congressional Requesters United States General Accounting Office GAO May 2002 SOCIAL SECURITY NUMBERS Government Benefits from SSN Use...and Subtitle SOCIAL SECURITY NUMBERS: Government Benefits from SSN Use but Could Provide Better Safeguards Contract Number Grant Number Program...Social Security benefits . Since that time, the number has been used for myriad non-Social Security purposes. Private sector use of the SSN has grown
Physician office readiness for managing Internet security threats.
Keshavjee, K; Pairaudeau, N; Bhanji, A
2006-01-01
Internet security threats are evolving toward more targeted and focused attacks.Increasingly, organized crime is involved and they are interested in identity theft. Physicians who use Internet in their practice are at risk for being invaded. We studied 16 physician practices in Southern Ontario for their readiness to manage internet security threats. Overall, physicians have an over-inflated sense of preparedness. Security practices such as maintaining a firewall and conducting regular virus checks were not consistently done.
Physician Office Readiness for Managing Internet Security Threats
Keshavjee, K; Pairaudeau, N; Bhanji, A
2006-01-01
Internet security threats are evolving toward more targeted and focused attacks. Increasingly, organized crime is involved and they are interested in identity theft. Physicians who use Internet in their practice are at risk for being invaded. We studied 16 physician practices in Southern Ontario for their readiness to manage internet security threats. Overall, physicians have an over-inflated sense of preparedness. Security practices such as maintaining a firewall and conducting regular virus checks were not consistently done. PMID:17238600
32 CFR 299.4 - Responsibilities.
Code of Federal Regulations, 2014 CFR
2014-07-01
... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... with NSA); (2) Receiving and handling all checks or money orders remitted in payment for FOIA requests... the requester upon being notified of such overpayment by the FOIA office. (d) The Deputy Director, NSA...
32 CFR 299.4 - Responsibilities.
Code of Federal Regulations, 2011 CFR
2011-07-01
... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... with NSA); (2) Receiving and handling all checks or money orders remitted in payment for FOIA requests... the requester upon being notified of such overpayment by the FOIA office. (d) The Deputy Director, NSA...
32 CFR 299.4 - Responsibilities.
Code of Federal Regulations, 2012 CFR
2012-07-01
... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... with NSA); (2) Receiving and handling all checks or money orders remitted in payment for FOIA requests... the requester upon being notified of such overpayment by the FOIA office. (d) The Deputy Director, NSA...
32 CFR 299.4 - Responsibilities.
Code of Federal Regulations, 2013 CFR
2013-07-01
... INFORMATION ACT PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT... with NSA); (2) Receiving and handling all checks or money orders remitted in payment for FOIA requests... the requester upon being notified of such overpayment by the FOIA office. (d) The Deputy Director, NSA...
Dues Check-off and Union Security Study.
ERIC Educational Resources Information Center
National Center for the Study of Collective Bargaining in Higher Education Newsletter, 1974
1974-01-01
This document presents a review of what higher education agreements say about dues checkoff and union security. This study involved review of contracts negotiated by affiliates of the three national organizations, the American Association of University Professors (AAUP), the American Federation of Teachers (AFT), and the National Education…
17 CFR 260.11b-4 - Definition of “cash transaction” in section 311(b)(4).
Code of Federal Regulations, 2010 CFR
2010-04-01
... transaction”, as used in section 311(b)(4), means any transaction in which full payment for goods or securities sold is made within 7 days after delivery of the goods or securities in currency or in checks or...
42 CFR 408.44 - Deduction from civil service annuities.
Code of Federal Regulations, 2010 CFR
2010-10-01
... not entitled to railroad retirement benefits or social security benefits, and is receiving a civil... service annuity or to social security or railroad retirement benefits, and the annuitant gives written consent, OPM also deducts the spouse's premium from the annuitant's monthly check. (c) Withdrawal of...
Code of Federal Regulations, 2013 CFR
2013-04-01
... gifts; (iii) Furnishing records to individuals or private non-profit organizations having an official... established business custom (e.g., furnishing personal reference data to prospective employers of former.... Payment of fees shall be made by check or money order payable to the Navajo-Hopi Indian Relocation...
Ariel, Barak; Bland, Matthew; Sutherland, Alex
2017-01-01
Supplementing local police forces is a burgeoning multibillion-dollar private security industry. Millions of formal surveillance agents in public settings are tasked to act as preventative guardians, as their high visibility presence is hypothesized to create a deterrent threat to potential offenders. Yet, rigorous evidence is lacking. We randomly assigned all train stations in the South West of England that experienced crime into treatment and controls conditions over a six-month period. Treatment consisted of directed patrol by uniformed, unarmed security agents. Hand-held trackers on every agent yielded precise measurements of all patrol time in the stations. Count-based regression models, estimated marginal means and odds-ratios are used to assess the effect of these patrols on crimes reported to the police by victims, as well as new crimes detected by police officers. Outcomes are measured at both specified target locations to which security guards were instructed to attend, as well as at the entire station complexes. Analyses show that 41% more patrol visits and 29% more minutes spent by security agents at treatment compared to control stations led to a significant 16% reduction in victim-generated crimes at the entirety of the stations' complexes, with a 49% increase in police-generated detections at the target locations. The findings illustrate the efficacy of private policing for crime prevention theory.
77 FR 58208 - Airport Privatization Pilot Program
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-19
... Department of Transportation (DOT), the Federal Aviation Administration and the Transportation Security... International Airport final application; the Transportation Security Administration will also participate... employees, airlines, aviation businesses and airport tenants, elected officials and community residents...
Practices and technologies in hazardous material transportation and security.
DOT National Transportation Integrated Search
2011-11-23
"The University of Arkansas (UA) team is responsible for investigating practices of : hazardous material transportation in the private sector. The UA team is a subcontractor : to the project Petrochemical Transportation Security, Development of...
[Are the flight security measures good for the patients? The "sickurity" problem].
Felkai, Péter
2010-10-10
Due to the stiffening requirements of security measures at the airports, prevention of air-travel related illnesses have become more difficult. The backlash effects of restrictions (e.g. fluid and movement restrictions) can trigger or even improve pathophysiological processes. The most advanced security check methods, the full body scan, besides ethical and moral considerations, may induce yet unknown pathological processes. We face the similar problem with the traveller, who becomes ill or injured during the trip. In this case, repatriation is often required, which is usually accomplished by commercial airlines. If patient should be transported by stretcher, it is also available on regular flight, but in this case he/she must be accompanied by a medical professional. This solution raises much more security problem: not only the sick person and the medical team, but even their medical equipments and medicines have to be checked. Due to the lack of standardised regulations the security staff solves the problem by various attempts from emphatic approach till refusal. For these reasons, a clear and exact regulation is needed, which must be based upon medical experts' opinion, and should deal not only with the flight security but with the patient's security, as well. This regulation can cease the patients and their medical accompanied persons' to be defencelessness against local authorities and security services. The same is true for handicapped persons. Author suggests solutions for the problem, balancing between flight security and the patient's "sickurity".
Terrorism: The Challenge to the Private Sector,
private sector , security is a line management responsibility, particularly where goals and objectives, information protection, and protection of key assets are concerned. Each company in the corporate world has a different personality. The goals are pretty much the same, but once you get below that initial goal, then you go to beliefs. Some companies are very macho. Some companies won’t let a security man interview a suspect, some companies will. Companies are very hesitant to go th extremes. Companies are both image conscious and fundamentally ethical. They truly do
Agencies Need Improved Financial Data Reporting for Private Security Contractors
2008-10-30
Source DoDa DoSb USAIDc Total 1 Multiple Funds Used for Contract $712.0 $1,443.3 $493.8 $2,649.1 2 Operations and Maintenance Account 1,150.1 0.0 0.0...display a currently valid OMB control number. 1 . REPORT DATE 30 OCT 2008 2 . REPORT TYPE 3. DATES COVERED 00-00-2008 to 00-00-2008 4. TITLE AND...routinely capturing financial information for all contracts and subcontracts for private security services, citing FAR 15.403- 1 (b)( 2 ) as prohibiting it
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-21
... Aliens and Other Designated Individuals; Security Awareness Training for Flight School Employees AGENCY... checks for all aliens and other designated individuals seeking flight instruction (``candidates'') from... OMB Control Number 1652-0021, Flight Training for Aliens and Other Designated Individuals; Security...
28 CFR 105.11 - Individuals not requiring a security risk assessment.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 28 Judicial Administration 2 2011-07-01 2011-07-01 false Individuals not requiring a security risk assessment. 105.11 Section 105.11 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Aviation Training for Aliens and Other Designated Individuals § 105.11 Individuals not...
28 CFR 105.11 - Individuals not requiring a security risk assessment.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 28 Judicial Administration 2 2013-07-01 2013-07-01 false Individuals not requiring a security risk assessment. 105.11 Section 105.11 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Aviation Training for Aliens and Other Designated Individuals § 105.11 Individuals not...
28 CFR 105.11 - Individuals not requiring a security risk assessment.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 28 Judicial Administration 2 2012-07-01 2012-07-01 false Individuals not requiring a security risk assessment. 105.11 Section 105.11 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Aviation Training for Aliens and Other Designated Individuals § 105.11 Individuals not...
28 CFR 105.11 - Individuals not requiring a security risk assessment.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 28 Judicial Administration 2 2014-07-01 2014-07-01 false Individuals not requiring a security risk assessment. 105.11 Section 105.11 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Aviation Training for Aliens and Other Designated Individuals § 105.11 Individuals not...
28 CFR 105.11 - Individuals not requiring a security risk assessment.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Individuals not requiring a security risk assessment. 105.11 Section 105.11 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS Aviation Training for Aliens and Other Designated Individuals § 105.11 Individuals not...
20 CFR 403.150 - Is there a fee for our services?
Code of Federal Regulations, 2010 CFR
2010-04-01
... Section 403.150 Employees' Benefits SOCIAL SECURITY ADMINISTRATION TESTIMONY BY EMPLOYEES AND THE PRODUCTION OF RECORDS AND INFORMATION IN LEGAL PROCEEDINGS § 403.150 Is there a fee for our services? (a..., or testimony. Make fees payable to the Social Security Administration by check or money order. (b...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-26
... Act (PRA) Officer, Office of Information Technology (OIT), TSA-11, Transportation Security..., electronic, mechanical, or other technological collection techniques or other forms of information technology... criminal history records check (CHRC). As part of the CHRC process, the individual must provide identifying...
26 CFR 1.145-2 - Application of private activity bond regulations.
Code of Federal Regulations, 2010 CFR
2010-04-01
... trades or businesses under section 513(a); (2) References to “10 percent” and “proceeds” in the context of the private business use test and the private security or payment test mean “5 percent” and “net... business tests. In applying §§ 1.141-0 through 1.141-15 to section 145(a)— (1) References to governmental...
33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to...
33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to...
33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to...
33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to...
33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to...
32 CFR Table 1 to Part 855 - Purpose of Use/Verification/Approval Authority/Fees
Code of Federal Regulations, 2011 CFR
2011-07-01
... change of station, etc.) or for private, non revenue flights Social security number in block 1 on DD Form... of a uniformed service member Identification card (DD Form 1173) number or social security number... Form 1173) number or social security number, identification card expiration date, sponsor's retirement...
32 CFR Table 1 to Part 855 - Purpose of Use/Verification/Approval Authority/Fees
Code of Federal Regulations, 2013 CFR
2013-07-01
... change of station, etc.) or for private, non revenue flights Social security number in block 1 on DD Form... of a uniformed service member Identification card (DD Form 1173) number or social security number... Form 1173) number or social security number, identification card expiration date, sponsor's retirement...
The Employee Retirement Income Security Act of 1974: Policies and Problems
ERIC Educational Resources Information Center
Alperin, Stuart N.; And Others
1975-01-01
Congress enacted the Employment Retirement Income Security Act of 1974 (ERISA) to help assure economic security in retirement. This analysis includes description of the growth, operation, and inequities within the private pension system and analysis of ERISA: (1) participation, vesting and joint and survivor annuities; (2) funding and plan…
7 CFR 1717.857 - Refinancing of existing secured debt-distribution and power supply borrowers.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 11 2011-01-01 2011-01-01 false Refinancing of existing secured debt-distribution and power supply borrowers. 1717.857 Section 1717.857 Agriculture Regulations of the Department of... Private Financing § 1717.857 Refinancing of existing secured debt—distribution and power supply borrowers...
Parental Involvement in School and the Role of School Security Measures
ERIC Educational Resources Information Center
Mowen, Thomas J.
2015-01-01
Over the past three decades, the United States has experienced a significant increase in the use of security measures in public and private secondary schools. Measures including police officers, metal detectors, and security cameras are becoming more common in the hallways of American schools. Following this surge, a number of academics have…
Motivating the Private vs. Public Sector Managers.
ERIC Educational Resources Information Center
Khojasteh, Mak
1993-01-01
A questionnaire on intrinsic/extrinsic rewards received 362 responses from 380 managers. Pay and security were greater motivators for private than for public sector managers. Recognition had higher motivating potential in the public sector. Both groups were motivated by achievement and advancement. (SK)
Code of Federal Regulations, 2013 CFR
2013-01-01
... continuing basis each time a property is transferred (except for transfers specifically excepted) for a period of time or indefinitely. A private transfer fee does not include fees, charges, payments, or other... SECURITY INTERESTS IN, MORTGAGES ON PROPERTIES ENCUMBERED BY CERTAIN PRIVATE TRANSFER FEE COVENANTS AND...
Cyber Hygiene for Control System Security
Oliver, David
2015-10-08
There are many resources from government and private industry available to assist organizations in reducing their attack surface and enhancing their security posture. Furthermore, standards are being written and improved upon to make the practice of securing a network more manageable. And while the specifics of network security are complex, most system vulnerabilities can be mitigated using fairly simple cyber hygiene techniques like those offered above.
A governor's guide to emergency management. Volume two : homeland security
DOT National Transportation Integrated Search
2002-09-19
Homeland security is a complex challenge that demands significant investment; collaboration among local, state, and federal governments; and integration with the private sector. The purpose of A Governor's Guide to Emergency Management Volume Two: Ho...
Homeland Security Department: FY2009 Appropriations
2009-03-04
security fees 2,113 2,329 TWIC 64 9 Hazmat 18 18 TSA Registered Traveler 4 10 FEMA/EPR National Flood Insurance Fund 111 157 CBP Small airports 7...Border. f. Fees include TWIC, HAZMAT, Registered Traveler , and Alien Flight School Checks. Homeland Security Department: FY2009 Appropriations CRS...unauthorized travelers and immigrants; and enforcing more than 400 laws and regulations at the border on behalf of more than 60 government agencies
Security Controls in the Stockpoint Logistics Integrated Communications Environment (SPLICE).
1985-03-01
call programs as authorized after checks by the Terminal Management Subsystem on SAS databases . SAS overlays the TANDEM GUARDIAN operating system to...Security Access Profile database (SAP) and a query capability generating various security reports. SAS operates with the System Monitor (SMON) subsystem...system to DDN and other components. The first SAS component to be reviewed is the SAP database . SAP is organized into two types of files. Relational
2008 Homeland Security Symposium and Exposition
2008-09-10
Untitled Document 2008 Homeland Security Symposium and Exposition.html[5/19/2016 8:49:43 AM] 2008 Homeland Security Symposium and Exposition "New...national defenSe magazine Advertise in National Defense and increase your company exposure at this symposium! National Defense will be distributed to all...use the Internet Cafe to check their e-mail and search the Internet. Brand your name with maximum exposure at this high traffic area. Benefits
Social Security reform: implications for women.
Williamson, J B; Rix, S E
2000-01-01
Despite recent economic gains for women, a substantial gender gap in financial security during old age remains, making women more dependent than men upon Social Security. Social Security plays an important role in providing for women's economic security. The implications for women of several proposed changes in Social Security policy, including the call for the partial privatization of Social Security via the introduction of individual accounts, are analyzed. Many of the proposals would have the effect of asking women, particularly low-income women, to shoulder a disproportionate share of the risks and burdens associated with the changes.
77 FR 60607 - National Cybersecurity Awareness Month, 2012
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-04
... released the Blueprint for a Secure Cyber Future--a strategic plan to protect government, the private sector, and the public against cyber threats today and tomorrow. As we continue to improve our... infrastructure, facilitating greater cyber information sharing between government and the private sector, and...
Code of Federal Regulations, 2014 CFR
2014-01-01
... of title to real estate, and payable on a continuing basis each time a property is transferred (except for transfers specifically excepted) for a period of time or indefinitely. A private transfer fee... SECURITY INTERESTS IN, MORTGAGES ON PROPERTIES ENCUMBERED BY CERTAIN PRIVATE TRANSFER FEE COVENANTS AND...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-23
... within that agency. Sec. 2. Policy Direction. With policy guidance from the National Security Advisor and... of other agencies and representatives of SLTPS entities, as nominated by any Committee member and...
Economic Influences on Re-Enlistment. The Draft Era.
1982-10-01
for each individual in jobs covered by Social Security (over 90 percent of all private - sector jobs, plus military service and half of non-federal...disappeared as real military wages have increased significantly over cyclical swings in the private sector . Despite the Navy’s apparent success in...maintaining optimal retention rates in selective ratings is due to the wage pressures exerted in the private sector . Military wage increases must be
ERIC Educational Resources Information Center
Matthew, Ige Akindele
2015-01-01
While all children have a right to quality care and education in their early years, how to secure that right, especially in resource-limited contexts, is the subject of much debate. For some nations, private schools can seem like a good option, requiring few federal resources. However, the privatization of early education presents significant…
Architecture and Assessment: Privacy Preserving Biometrically Secured Electronic Documents
2015-01-01
very large public and private fingerprint databases comprehensive risk analysis and system security contribution to developing international ...Safety and Security Program which is led by Defence Research and Development Canada’s Centre for Security Science, in partnership with Public Safety...201 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 201 Science and Engineering
2010-03-01
6 A. M. Fitz -Gerald, Security Sector Reform in Sierra Leone. Shrivenham, GFN-SSR. 8–10. Osman Gbla...34Security Sector Reform: Bringing the Private in.", 1– 23; Peter Albrecht and Paul Jackson, eds. Security System Transformation in Sierra Leone, 1997–2007...veterans.38 33 John R. Cartwright, Political leadership in Sierra Leone (Toronto: University of
17 CFR 240.14d-1 - Scope of and definitions applicable to Regulations 14D and 14E.
Code of Federal Regulations, 2010 CFR
2010-04-01
... obtain information about the amount of securities represented by accounts of customers resident in the... report or annual information form filed or submitted by the issuer with securities regulators of Ontario... interest of investors. (c) Tier I. Any tender offer for the securities of a foreign private issuer as...
Administering a healthy dose of security.
Berry, D; Mullen, M; Murray, T
The article describes how a hospital located in a poor, crime-ridden section of a large city has made the most of in-house resources and public-private liaisons to improve security at its 113-acre campus. Details on the facility's double-pronged approach--tight internal security and strong external liaisons with businesses, law enforcement, and community groups--are provided.
Economic Analysis of Cyber Security
2006-07-01
vulnerability databases and track the number of incidents reported by U.S. organizations. Many of these are private organizations, such as the security...VULNERABILITY AND ATTACK ESTIMATES Numerous organizations compile vulnerability databases and patch information, and track the number of reported incidents... database / security focus Databases of vulnerabilities identifying the software versions that are susceptible, including information on the method of
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-18
..., in the aggregate, or by the private sector of $100,000,000 (adjusted for inflation) or more in any... Security Zone: Passenger Vessels, Sector Southeastern New England Captain of the Port Zone AGENCY: Coast... moving security zones around passenger vessels in the Sector Southeastern New England Captain of the Port...
2008 Stability, Security, Transition and Reconstruction Operations Conference
2008-09-04
Facilitator Power of Public-Private Partnerships • Health Professional Education • Greater Access to Care China Diabetes Education Program Dominican Republic...Argentina Canada Chile Colombia Ecuador Peru Uruguay Interagency, multinational, inter-institutional partnerships State Department Homeland Security...Disaster Preparedness Disaster Response Regional Response Capacity OFDA-LAC / MDROs Regional Security System (RSS) UNCLASSIFIED ECUADOR / KY PERU / WV
NASA Astrophysics Data System (ADS)
Kataoka, Haruno; Utsumi, Akira; Hirose, Yuki; Yoshiura, Hiroshi
Disclosure control of natural language information (DCNL), which we are trying to realize, is described. DCNL will be used for securing human communications over the internet, such as through blogs and social network services. Before sentences in the communications are disclosed, they are checked by DCNL and any phrases that could reveal sensitive information are transformed or omitted so that they are no longer revealing. DCNL checks not only phrases that directly represent sensitive information but also those that indirectly suggest it. Combinations of phrases are also checked. DCNL automatically learns the knowledge of sensitive phrases and the suggestive relations between phrases by using co-occurrence analysis and Web retrieval. The users' burden is therefore minimized, i.e., they do not need to define many disclosure control rules. DCNL complements the traditional access control in the fields where reliability needs to be balanced with enjoyment and objects classes for the access control cannot be predefined.
Cunningham, Charles E; Niccols, Alison; Rimas, Heather; Robicheau, Randi; Anderson, Colleen; DeVries, Bart
2017-10-01
To engage users in the design of a regional child and youth health center. The perspective of users should be an integral component of a patient-centered, evidence-based approach to the design of health facilities. We conducted a discrete choice conjoint experiment (DCE), a method from marketing research and health economics, as a component of a strategy to engage users in the preconstruction planning process. A sample of 467 participants (290 staff and 177 clients or community stakeholders) completed the DCE. Latent class analysis identified three segments with different design preferences. A group we termed an enhanced design (57%) segment preferred a fully featured facility with personal contacts at the start of visits (in-person check-in, personal waiting room notification, volunteer-assisted wayfinding, and visible security), a family resource center with a health librarian, and an outdoor playground equipped with covered heated pathways. The self-guided design segment (11%), in contrast, preferred a design allowing a more independent use of the facility (e.g., self-check-in at computer kiosks, color-coded wayfinding, and a self-guided family resource center). Designs affording privacy and personal contact with staff were important to the private design segment (32%). The theme and decor of the building was less important than interactive features and personal contacts. A DCE allowed us to engage users in the planning process by estimating the value of individual design elements, identifying segments with differing views, informing decisions regarding design trade-offs, and simulating user response to design options.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-03
... holders, and other stakeholders on a draft guidance document entitled ``Weapons Safety Assessment'' (WSA... weapons under the NRC's proposed rule titled ``Enhanced Weapons, Firearms Background Checks, and Security.... You should not include any site-specific security information in your comments. Federal rulemaking Web...
Code of Federal Regulations, 2011 CFR
2011-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS..., the Uniform State Waterway Marking System's (USWMS) aids to navigation provisions for marking channels... waters for private aids to navigation and in those internal waters that are non-navigable waters of the U...
Code of Federal Regulations, 2012 CFR
2012-07-01
....01-20 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-20 Inspection. All classes of private aids to navigation shall be maintained in proper operating condition. They are subject...
Code of Federal Regulations, 2013 CFR
2013-07-01
....01-20 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-20 Inspection. All classes of private aids to navigation shall be maintained in proper operating condition. They are subject...
Code of Federal Regulations, 2014 CFR
2014-07-01
....01-20 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-20 Inspection. All classes of private aids to navigation shall be maintained in proper operating condition. They are subject...
Code of Federal Regulations, 2011 CFR
2011-07-01
....01-20 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-20 Inspection. All classes of private aids to navigation shall be maintained in proper operating condition. They are subject...
Code of Federal Regulations, 2010 CFR
2010-07-01
....01-20 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-20 Inspection. All classes of private aids to navigation shall be maintained in proper operating condition. They are subject...
Code of Federal Regulations, 2010 CFR
2010-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS..., the Uniform State Waterway Marking System's (USWMS) aids to navigation provisions for marking channels... waters for private aids to navigation and in those internal waters that are non-navigable waters of the U...
Unlawful Combatants at the Controls: The CIA, Armed RPAS and LOAC
2011-02-16
career judge advocate, beginning military service with the Judge Advocate General’s Corps, United States Navy . After a brief stint in private...of Xe Services, formerly known as Blackwater , the private security firm that has been at the forefront of other allegations concerning civilians
Code of Federal Regulations, 2010 CFR
2010-04-01
... prescribed applications, forms, and other publications. 422.527 Section 422.527 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES Applications and Related Forms § 422.527 Private..., institution, or organization wishing to reproduce, reprint, or distribute any application, form, or...
Ngo, Anh D; Hill, Peter S
2011-09-27
With health sector reform in Vietnam moving towards greater pluralism, commune health stations (CHSs) have been subject to growing competition from private health services and increasing numbers of patients bypassing CHSs for higher-level health facilities. This study describes the pattern of reproductive health (RH) and family planning (FP) service utilization among women at CHSs and other health facilities, and explores socio-demographic determinants of RH service utilization at the CHS level. This study was based on a cross-sectional survey conducted in Thua Thien Hue and Vinh Long provinces, using a multi-stage cluster sampling technique. Questionnaire-based interviews with 978 ever-married women at reproductive age provided data on socio-demographic characteristics, current use of FP methods, history of RH service use, and the health facility attended for their most recent services. Multiple logistic regression analyses were used to identify socio-demographic determinants of their use of CHS RH services. Eighty nine percent of ever-married women reported current use of birth control with 49% choosing intra-uterine device (IUD). Eighty nine percent of pregnant women attended facility-based antenatal care (ANC) with 62% having at least 3 check-ups during their latest pregnancy. Ninety one percent of mothers had their last delivery in a health facility. Seventy-one percent of respondents used CHS for IUD insertion, 55% for antenatal check-ups, and 77% gynecological examination. District and provincial/central hospitals dominated the provision of delivery service, used by 57% of mothers for their latest delivery. The percentage of women opting for private ANC services was reported at 35%, though the use of private delivery services was low (11%). Women who were farmers, earning a lower income, having more than 2 children, and living in a rural area were more likely than others to use ANC, delivery, and/or gynecological check-up services at the CHS. Women choice of providers for FP and RH services that help them plan and protect their pregnancies is driven by socio-economic factors. While the CHS retains significant utilization rates, it is under challenge by preferences for hospital-based delivery and the growing use of private ANC services.
Bland, Matthew; Sutherland, Alex
2017-01-01
Supplementing local police forces is a burgeoning multibillion-dollar private security industry. Millions of formal surveillance agents in public settings are tasked to act as preventative guardians, as their high visibility presence is hypothesized to create a deterrent threat to potential offenders. Yet, rigorous evidence is lacking. We randomly assigned all train stations in the South West of England that experienced crime into treatment and controls conditions over a six-month period. Treatment consisted of directed patrol by uniformed, unarmed security agents. Hand-held trackers on every agent yielded precise measurements of all patrol time in the stations. Count-based regression models, estimated marginal means and odds-ratios are used to assess the effect of these patrols on crimes reported to the police by victims, as well as new crimes detected by police officers. Outcomes are measured at both specified target locations to which security guards were instructed to attend, as well as at the entire station complexes. Analyses show that 41% more patrol visits and 29% more minutes spent by security agents at treatment compared to control stations led to a significant 16% reduction in victim-generated crimes at the entirety of the stations’ complexes, with a 49% increase in police-generated detections at the target locations. The findings illustrate the efficacy of private policing for crime prevention theory. PMID:29211735
The Evolution of the Automated Continuous Evaluation System (ACES) for Personnel Security
2013-11-12
information. It applies business rules to the data, produces a report that flags issues of potential security concern, and electronically transmits...Form 86 (SF- 86) to check these data sources, verify what has been submitted, and collect more information. It applies business rules to the data...subject information. It applies business rules to analyze the data returned, produces a report that flags issues of potential security concern, and
17 CFR 210.3-20 - Currency for financial statements of foreign private issuers.
Code of Federal Regulations, 2010 CFR
2010-04-01
... in the issuer's consolidated financial statements and not located in a hyperinflationary environment..., Oct. 5, 1999] Consolidated and Combined Financial Statements ... SECURITIES AND EXCHANGE COMMISSION FORM AND CONTENT OF AND REQUIREMENTS FOR FINANCIAL STATEMENTS, SECURITIES...
Quantum Private Comparison Protocol with Linear Optics
NASA Astrophysics Data System (ADS)
Luo, Qing-bin; Yang, Guo-wu; She, Kun; Li, Xiaoyu
2016-12-01
In this paper, we propose an innovative quantum private comparison(QPC) protocol based on partial Bell-state measurement from the view of linear optics, which enabling two parties to compare the equality of their private information with the help of a semi-honest third party. Partial Bell-state measurement has been realized by using only linear optical elements in experimental measurement-device-independent quantum key distribution(MDI-QKD) schemes, which makes us believe that our protocol can be realized in the near future. The security analysis shows that the participants will not leak their private information.
Messenger, Katy; Farquharson, Lorna; Stallworthy, Pippa; Cawkill, Paul; Greenberg, Neil
2012-07-01
To explore the occupational experiences of private security contractors working in a war zone and how it impacts on their mental health. Semistructured interviews were conducted with seven contractors employed by a large UK-based private security company. Interpretative phenomenological analysis was used to analyze the interview transcripts. Participants also completed the 12-item General Health Questionnaire and the Posttraumatic Stress Disorder Checklist. Four overarching themes emerged: the appeal of the job; vulnerability; keep going; and seeking help for stress in the workplace. No clinically significant levels of distress were reported. Contractors are frequently exposed to stressors known to increase risk of psychiatric difficulty in military personnel. A number of potential protective factors were identified. Only a minority of participants were open to seeking help for mental health difficulties.
Cryptanalysis and Improvements for the Quantum Private Comparison Protocol Using EPR Pairs
NASA Astrophysics Data System (ADS)
Wang, Cong; Xu, Gang; Yang, Yi-Xian
2013-07-01
In this paper, we carry out an in-depth analysis of the quantum private comparison (QPC) protocol with the semi-honest third party (TP). The security of QPC protocol using the EPR pairs is re-examined. Unfortunately, we find that TP can use the fake EPR pairs to steal all the secret information. Furthermore, we give two simple and feasible solutions to improve the original QPC protocol. It is shown that the improved protocol is secure, which can resist various kinds of attacks from both the outside eavesdroppers and the inside participants, even the semi-honest TP.
Obsessive-compulsive disorder as a disturbance of security motivation: constraints on comorbidity.
Szechtman, H; Woody, E Z
2006-10-01
Patients with OCD often meet criteria for additional psychiatric disorders, with the incidence of comorbidity being as high as 75% in some studies. Here we examine the theoretical plausibility that in OCD much of the domain of co-morbid presentations encompasses related perturbations of the security motivation system. According to a recent proposal, the security motivation system represents a biologically primitive special motivation that is activated by potential (as opposed to imminent) danger to self or intimate others and engages a set of specialized species-typical behaviors (such as checking and washing) to handle potential danger. Because the task of security motivation is open ended, in the sense that no consummatory stimuli can exist in the real world to indicate the absence of potential danger, the shutdown of security motivation is produced by a self-generated feeling of knowing, a satiety signal termed yedasentience. In this schema, OCD results from a failure to generate or respond to the yedasentience signal: without this negative feedback the patient persists abnormally long in a strong motivational state having to do with primal, basic threats to existence, a condition that leads to prolonged engagement in security-related behaviors, such as the checking and washing, characteristic of OCD compulsions and obsessions. Considering the proposed neuronatomy of security motivation system and OCD, we discuss the likelihood that the phenomenon of "spread of allied reflexes" can produce other security-related psychiatric conditions, as well as the possibility that disturbances along different pathways of the security motivation system can lead to apparently different disorders.
[The health system of Venezuela].
Bonvecchio, Anabelle; Becerril-Montekio, Victor; Carriedo-Lutzenkirchen, Angela; Landaeta-Jiménez, Maritza
2011-01-01
This paper describes the Venezuelan health system, including its structure and coverage, financial sources, human and material resources and its stewardship functions. This system comprises a public and a private sector. The public sector includes the Ministry of Popular Power for Health (MS) and several social security institutions, salient among them the Venezuelan Institute for Social Security (IVSS). The MH is financed with federal, state and county contributions. The IVSS is financed with employer, employee and government contributions. These two agencies provide services in their own facilities. The private sector includes providers offering services on an out-of-pocket basis and private insurance companies. The Venezuelan health system is undergoing a process of reform since the adoption of the 1999 Constitution which calls for the establishment of a national public health system. The reform process is now headed by the Barrio Adentro program.
Secure Multiparty Quantum Computation for Summation and Multiplication.
Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun
2016-01-21
As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics.
Secure Multiparty Quantum Computation for Summation and Multiplication
Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun
2016-01-01
As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics. PMID:26792197
Code of Federal Regulations, 2011 CFR
2011-07-01
....05-5 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-5 Definitions. (a) The term State waters for private aids to navigation means those navigable waters of the United States which the Commandant, upon...
Code of Federal Regulations, 2013 CFR
2013-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS... Marking System's (USWMS) aids to navigation provisions for marking channels and obstructions (see § 66.10... private aids to navigation and in those internal waters that are non-navigable waters of the U.S. All...
Code of Federal Regulations, 2014 CFR
2014-07-01
....05-5 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-5 Definitions. (a) The term State waters for private aids to navigation means those navigable waters of the United States which the Commandant, upon...
Code of Federal Regulations, 2014 CFR
2014-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS... Marking System's (USWMS) aids to navigation provisions for marking channels and obstructions (see § 66.10... private aids to navigation and in those internal waters that are non-navigable waters of the U.S. All...
33 CFR 66.01-1 - Basic provisions.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 66.01-1 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-1 Basic... the purposes of this subpart, the term private aids to navigation includes all marine aids to...
33 CFR 66.01-1 - Basic provisions.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 66.01-1 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-1 Basic... the purposes of this subpart, the term private aids to navigation includes all marine aids to...
33 CFR 66.01-25 - Discontinuance and removal.
Code of Federal Regulations, 2011 CFR
2011-07-01
...-25 Section 66.01-25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-25... establishment of the aid was submitted. (c) Private aids to navigation which have been authorized pursuant to...
33 CFR 66.01-25 - Discontinuance and removal.
Code of Federal Regulations, 2012 CFR
2012-07-01
...-25 Section 66.01-25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-25... establishment of the aid was submitted. (c) Private aids to navigation which have been authorized pursuant to...
Code of Federal Regulations, 2013 CFR
2013-07-01
....05-5 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-5 Definitions. (a) The term State waters for private aids to navigation means those navigable waters of the United States which the Commandant, upon...
33 CFR 66.01-1 - Basic provisions.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 66.01-1 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-1 Basic... the purposes of this subpart, the term private aids to navigation includes all marine aids to...
Code of Federal Regulations, 2012 CFR
2012-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS... Marking System's (USWMS) aids to navigation provisions for marking channels and obstructions (see § 66.10... private aids to navigation and in those internal waters that are non-navigable waters of the U.S. All...
33 CFR 66.01-25 - Discontinuance and removal.
Code of Federal Regulations, 2013 CFR
2013-07-01
...-25 Section 66.01-25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-25... establishment of the aid was submitted. (c) Private aids to navigation which have been authorized pursuant to...
33 CFR 66.01-25 - Discontinuance and removal.
Code of Federal Regulations, 2014 CFR
2014-07-01
...-25 Section 66.01-25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-25... establishment of the aid was submitted. (c) Private aids to navigation which have been authorized pursuant to...
Code of Federal Regulations, 2012 CFR
2012-07-01
....05-5 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-5 Definitions. (a) The term State waters for private aids to navigation means those navigable waters of the United States which the Commandant, upon...
Code of Federal Regulations, 2010 CFR
2010-07-01
....05-5 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-5 Definitions. (a) The term State waters for private aids to navigation means those navigable waters of the United States which the Commandant, upon...
33 CFR 66.01-25 - Discontinuance and removal.
Code of Federal Regulations, 2010 CFR
2010-07-01
...-25 Section 66.01-25 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-25... establishment of the aid was submitted. (c) Private aids to navigation which have been authorized pursuant to...
Second Line of Defense Virtual Private Network Guidance for Deployed and New CAS Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Singh, Surya V.; Thronas, Aaron I.
2010-01-01
This paper discusses the importance of remote access via virtual private network (VPN) for the Second Line of Defense (SLD) Central Alarm System (CAS) sites, the requirements for maintaining secure channels while using VPN and implementation requirements for current and future sites.
Secure Fingerprint Identification of High Accuracy
2014-01-01
secure ) solution of complexity O(n3) based on Gaussian elimination. When it is applied to biometrics X and Y with mX and mY minutiae, respectively...collections of biometric data in use today include, for example, fingerprint, face, and iris images collected by the US Department of Homeland Security ...work we focus on fingerprint data due to popularity and good accuracy of this type of biometry. We formulate the problem of private, or secure , finger
Digital camera with apparatus for authentication of images produced from an image file
NASA Technical Reports Server (NTRS)
Friedman, Gary L. (Inventor)
1993-01-01
A digital camera equipped with a processor for authentication of images produced from an image file taken by the digital camera is provided. The digital camera processor has embedded therein a private key unique to it, and the camera housing has a public key that is so uniquely based upon the private key that digital data encrypted with the private key by the processor may be decrypted using the public key. The digital camera processor comprises means for calculating a hash of the image file using a predetermined algorithm, and second means for encrypting the image hash with the private key, thereby producing a digital signature. The image file and the digital signature are stored in suitable recording means so they will be available together. Apparatus for authenticating at any time the image file as being free of any alteration uses the public key for decrypting the digital signature, thereby deriving a secure image hash identical to the image hash produced by the digital camera and used to produce the digital signature. The apparatus calculates from the image file an image hash using the same algorithm as before. By comparing this last image hash with the secure image hash, authenticity of the image file is determined if they match, since even one bit change in the image hash will cause the image hash to be totally different from the secure hash.
Speeding decisions. Social security's information exchange program.
Winter, Kitt; Hastings, Bob
2011-05-01
The Social Security Administration has plenty of reasons to streamline its records request process-more than 15 million reasons each year, in fact. That's why it has been pioneering information exchange projects with the private sector, including use of the Nationwide Health Information Network.
42 CFR 23.33 - What security must be given for these loans?
Code of Federal Regulations, 2010 CFR
2010-10-01
... 42 Public Health 1 2010-10-01 2010-10-01 false What security must be given for these loans? 23.33... NATIONAL HEALTH SERVICE CORPS Private Practice Special Loans for Former Corps Members § 23.33 What security must be given for these loans? The Secretary may require the borrower to pledge to the Secretary a...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Solis, John Hector
In this paper, we present a modular framework for constructing a secure and efficient program obfuscation scheme. Our approach, inspired by the obfuscation with respect to oracle machines model of [4], retains an interactive online protocol with an oracle, but relaxes the original computational and storage restrictions. We argue this is reasonable given the computational resources of modern personal devices. Furthermore, we relax the information-theoretic security requirement for computational security to utilize established cryptographic primitives. With this additional flexibility we are free to explore different cryptographic buildingblocks. Our approach combines authenticated encryption with private information retrieval to construct a securemore » program obfuscation framework. We give a formal specification of our framework, based on desired functionality and security properties, and provide an example instantiation. In particular, we implement AES in Galois/Counter Mode for authenticated encryption and the Gentry-Ramzan [13]constant communication-rate private information retrieval scheme. We present our implementation results and show that non-trivial sized programs can be realized, but scalability is quickly limited by computational overhead. Finally, we include a discussion on security considerations when instantiating specific modules.« less
A review of X-ray explosives detection techniques for checked baggage.
Wells, K; Bradley, D A
2012-08-01
In recent times, the security focus for civil aviation has shifted from hijacking in the 1980s, towards deliberate sabotage. X-ray imaging provides a major tool in checked baggage inspection, with various sensitive techniques being brought to bear in determining the form, and density of items within luggage as well as other material dependent parameters. This review first examines the various challenges to X-ray technology in securing a safe system of passenger transportation. An overview is then presented of the various conventional and less conventional approaches that are available to the airline industry, leading to developments in state-of-the-art imaging technology supported by enhanced machine and observer-based decision making principles. Copyright © 2012 Elsevier Ltd. All rights reserved.
Comment on id-based remote data integrity checking with data privacy preserving
NASA Astrophysics Data System (ADS)
Zhang, Jianhong; Meng, Hongxin
2017-09-01
Recently, an ID-based remote data integrity checking protocol with perfect data privacy preserving (IEEE Transactions on Information Forensics and Security, doi: 10.1109/TIFS.2016.2615853) was proposed to achieve data privacy protection and integrity checking. Unfortunately, in this letter, we demonstrate that their protocol is insecure. An active hacker can modify the stored data without being detected by the verifier in the auditing. And we also show malicious cloud server can convince the verifier that the stored data are kept intact after the outsourced data blocks are deleted. Finally, the reasons to produce such attacks are given.
Code of Federal Regulations, 2010 CFR
2010-01-01
... securities of B, a non-publicly traded issuer. The agreed upon acquisition price is $99 million subject to... voting securities of B, a non-publicly traded issuer, but will accept up to 100 percent of the shares if... check or by electronic wire transfer (EWT). The fee must be paid in U.S. currency. (1) Fees paid by...
[Development of operation patient security detection system].
Geng, Shu-Qin; Tao, Ren-Hai; Zhao, Chao; Wei, Qun
2008-11-01
This paper describes a patient security detection system developed with two dimensional bar codes, wireless communication and removal storage technique. Based on the system, nurses and correlative personnel check code wait operation patient to prevent the defaults. The tests show the system is effective. Its objectivity and currency are more scientific and sophisticated than current traditional method in domestic hospital.
Code of Federal Regulations, 2011 CFR
2011-01-01
... activity. (4) Preventing accomplishment of an end use check conducted by or on behalf of BIS or the Directorate of Defense Trade Controls of the Department of State by: precluding access to; refusing to provide...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY...
Code of Federal Regulations, 2012 CFR
2012-01-01
... activity. (4) Preventing accomplishment of an end use check conducted by or on behalf of BIS or the Directorate of Defense Trade Controls of the Department of State by: precluding access to; refusing to provide...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY...
Code of Federal Regulations, 2014 CFR
2014-01-01
... activity. (4) Preventing accomplishment of an end use check conducted by or on behalf of BIS or the Directorate of Defense Trade Controls of the Department of State by: precluding access to; refusing to provide...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY...
Code of Federal Regulations, 2010 CFR
2010-01-01
... activity. (4) Preventing accomplishment of an end use check conducted by or on behalf of BIS or the Directorate of Defense Trade Controls of the Department of State by: precluding access to; refusing to provide...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY...
Rajagopalan, S. P.
2017-01-01
Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF) scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff) Equation using an Integration Factor (DiffEIF), minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate) against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network. PMID:29040290
Alagarsamy, Sumithra; Rajagopalan, S P
2017-01-01
Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF) scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff) Equation using an Integration Factor (DiffEIF), minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate) against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network.
Kröger, H
2016-04-01
Estimating the size of health inequalities between hierarchical levels of job status and the contribution of direct health selection to these inequalities for men and women in the private and public sector in Germany. The study uses prospective data from the Socio-Economic Panel study on 11,788 women and 11,494 men working in the public and private sector in Germany. Direct selection effects of self-rated health on job status are estimated using fixed-effects linear probability models. The contribution of health selection to overall health-related inequalities between high and low status jobs is calculated. Women in the private sector who report very good health have a 1.9 [95% CI: 0.275; 3.507] percentage point higher probability of securing a high status job than women in poor self-rated health. This direct selection effect constitutes 20.12% of total health inequalities between women in high and low status jobs. For men in the private and men and women in the public sector no relevant health selection effects were identified. The contribution of health selection to total health inequalities between high and low status jobs varies with gender and public versus private sector. Women in the private sector in Germany experience the strongest health selection. Possible explanations are general occupational disadvantages that women have to overcome to secure high status jobs. Copyright © 2015 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.
Three-step semiquantum secure direct communication protocol
NASA Astrophysics Data System (ADS)
Zou, XiangFu; Qiu, DaoWen
2014-09-01
Quantum secure direct communication is the direct communication of secret messages without need for establishing a shared secret key first. In the existing schemes, quantum secure direct communication is possible only when both parties are quantum. In this paper, we construct a three-step semiquantum secure direct communication (SQSDC) protocol based on single photon sources in which the sender Alice is classical. In a semiquantum protocol, a person is termed classical if he (she) can measure, prepare and send quantum states only with the fixed orthogonal quantum basis {|0>, |1>}. The security of the proposed SQSDC protocol is guaranteed by the complete robustness of semiquantum key distribution protocols and the unconditional security of classical one-time pad encryption. Therefore, the proposed SQSDC protocol is also completely robust. Complete robustness indicates that nonzero information acquired by an eavesdropper Eve on the secret message implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. In the proposed protocol, we suggest a method to check Eves disturbing in the doves returning phase such that Alice does not need to announce publicly any position or their coded bits value after the photons transmission is completed. Moreover, the proposed SQSDC protocol can be implemented with the existing techniques. Compared with many quantum secure direct communication protocols, the proposed SQSDC protocol has two merits: firstly the sender only needs classical capabilities; secondly to check Eves disturbing after the transmission of quantum states, no additional classical information is needed.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 1 2010-07-01 2010-07-01 false Purpose. 159.1 Section 159.1 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY PRIVATE SECURITY CONTRACTORS OPERATING IN CONTINGENCY OPERATIONS § 159.1 Purpose. This part establishes policy, assigns responsibilities and provides...
Armada, F; Muntaner, C; Navarro, V
2001-01-01
International financial institutions have played an increasing role in the formation of social policy in Latin American countries over the last two decades, particularly in health and pension programs. World Bank loans and their attached policy conditions have promoted several social security reforms within a neoliberal framework that privileges the role of the market in the provision of health and pensions. Moreover, by endorsing the privatization of health services in Latin America, the World Health Organization has converged with these policies. The privatization of social security has benefited international corporations that become partners with local business elites. Thus the World Health Organization, international financial institutions, and transnational corporations have converged in the neoliberal reforms of social security in Latin America. Overall, the process represents a mechanism of resource transfer from labor to capital and sheds light on one of the ways in which neoliberalism may affect the health of Latin American populations.
Kiuchi, T; Kaihara, S
1997-02-01
The World Wide Web-based form is a promising method for the construction of an on-line data collection system for clinical and epidemiological research. It is, however, laborious to prepare a common gateway interface (CGI) program for each project, which the World Wide Web server needs to handle the submitted data. In medicine, it is even more laborious because the CGI program must check deficits, type, ranges, and logical errors (bad combination of data) of entered data for quality assurance as well as data length and meta-characters of the entered data to enhance the security of the server. We have extended the specification of the hypertext markup language (HTML) form to accommodate information necessary for such data checking and we have developed software named AUTOFORM for this purpose. The software automatically analyzes the extended HTML form and generates the corresponding ordinary HTML form, 'Makefile', and C source of CGI programs. The resultant CGI program checks the entered data through the HTML form, records them in a computer, and returns them to the end-user. AUTOFORM drastically reduces the burden of development of the World Wide Web-based data entry system and allows the CGI programs to be more securely and reliably prepared than had they been written from scratch.
Future Warfare: Anthology Revised Edition
2001-06-01
film “ Saving Private Ryan ” are compelling and chilling. But the information age promises to make ground combat considerably less destructive that the...116 Saving Private Ryan , 80–81 Schwarzkopf, Norman, 242, 243–244 Science and technology, 191–202 Scipio, 44 Security beyond the year 2010, 128–131, 137... Private Ryan ” where the true horror of face-to-face ground combat is driven into the psyche of the movie goer. I am increasingly convinced, however
17 CFR 240.13a-16 - Reports of foreign private issuers on Form 6-K (17 CFR 249.306).
Code of Federal Regulations, 2012 CFR
2012-04-01
... issuers on Form 6-K (17 CFR 249.306). 240.13a-16 Section 240.13a-16 Commodity and Securities Exchanges... foreign private issuers on Form 6-K (17 CFR 249.306). (a) Every foreign private issuer which is subject to Rule 13a-1 (17 CFR 240.13a-1) shall make reports on Form 6-K, except that this rule shall not apply to...
17 CFR 240.13a-16 - Reports of foreign private issuers on Form 6-K (17 CFR 249.306).
Code of Federal Regulations, 2011 CFR
2011-04-01
... issuers on Form 6-K (17 CFR 249.306). 240.13a-16 Section 240.13a-16 Commodity and Securities Exchanges... foreign private issuers on Form 6-K (17 CFR 249.306). (a) Every foreign private issuer which is subject to Rule 13a-1 (17 CFR 240.13a-1) shall make reports on Form 6-K, except that this rule shall not apply to...
17 CFR 240.13a-16 - Reports of foreign private issuers on Form 6-K (17 CFR 249.306).
Code of Federal Regulations, 2014 CFR
2014-04-01
... issuers on Form 6-K (17 CFR 249.306). 240.13a-16 Section 240.13a-16 Commodity and Securities Exchanges... foreign private issuers on Form 6-K (17 CFR 249.306). (a) Every foreign private issuer which is subject to Rule 13a-1 (17 CFR 240.13a-1) shall make reports on Form 6-K, except that this rule shall not apply to...
17 CFR 240.13a-16 - Reports of foreign private issuers on Form 6-K (17 CFR 249.306).
Code of Federal Regulations, 2013 CFR
2013-04-01
... issuers on Form 6-K (17 CFR 249.306). 240.13a-16 Section 240.13a-16 Commodity and Securities Exchanges... foreign private issuers on Form 6-K (17 CFR 249.306). (a) Every foreign private issuer which is subject to Rule 13a-1 (17 CFR 240.13a-1) shall make reports on Form 6-K, except that this rule shall not apply to...
17 CFR 240.15d-16 - Reports of foreign private issuers on Form 6-K [17 CFR 249.306].
Code of Federal Regulations, 2012 CFR
2012-04-01
... issuers on Form 6-K [17 CFR 249.306]. 240.15d-16 Section 240.15d-16 Commodity and Securities Exchanges... foreign private issuers on Form 6-K [17 CFR 249.306]. (a) Every foreign private issuer which is subject to Rule 15d-1 [17 CFR 240.15d-1] shall make reports on Form 6-K, except that this rule shall not apply to...
Two management systems in a nursing private practice group.
Zahourek, R P
1979-09-01
Entry into private practice can be rewarding for nurses who are willing to risk personal, financial, and professional security. Among the problems faced by the nurse in this new role is the administration of the practice, since few, if any, adequate models exist. This article describes the struggle of nurses in one private nursing practice, Creative Health Services, to meet their needs for individual freedom within an organization that is regulated sufficiently to maintain its viability.
2016-06-10
reserve force. One of the many innovative opportunities for soldiers, leaders, and units is the USAR’s Private Public Partnership Program (P3). This...opportunities for the reserve force. One of the many innovative opportunities for soldiers, leaders, and units is the USAR’s Private Public Partnership...21 National Strategic Direction
NASA Astrophysics Data System (ADS)
Kota, Sujatha; Padmanabhuni, Venkata Nageswara Rao; Budda, Kishor; K, Sruthi
2018-05-01
Elliptic Curve Cryptography (ECC) uses two keys private key and public key and is considered as a public key cryptographic algorithm that is used for both authentication of a person and confidentiality of data. Either one of the keys is used in encryption and other in decryption depending on usage. Private key is used in encryption by the user and public key is used to identify user in the case of authentication. Similarly, the sender encrypts with the private key and the public key is used to decrypt the message in case of confidentiality. Choosing the private key is always an issue in all public key Cryptographic Algorithms such as RSA, ECC. If tiny values are chosen in random the security of the complete algorithm becomes an issue. Since the Public key is computed based on the Private Key, if they are not chosen optimally they generate infinity values. The proposed Modified Elliptic Curve Cryptography uses selection in either of the choices; the first option is by using Particle Swarm Optimization and the second option is by using Cuckoo Search Algorithm for randomly choosing the values. The proposed algorithms are developed and tested using sample database and both are found to be secured and reliable. The test results prove that the private key is chosen optimally not repetitive or tiny and the computations in public key will not reach infinity.
NASA Technical Reports Server (NTRS)
Barnett, Traci M.
2004-01-01
Safety and security is very important at NASA. The Security Management and Safeguards Office goal is ensure safety and security for all NASA Lewis and Plum Brook Station visitors and workers. The office protects against theft, sabotage, malicious damage, espionage, and other threats or acts of violence. There are three types of security at NASA: physical, IT, and personnel. IT is concerned with sensitive and classified information and computers. Physical security includes the officers who check visitors and workers in and patrol the facility. Personnel security is concerned with background checks during hiring. During my internship, I met people from and gained knowledge about all three types of security. I primarily worked with Dr. Richard Soppet in physical security. During my experience with physical security, I observed and worked with many aspects of it. I attended various security meetings at both NASA Lewis and Plum Brook. The meetings were about homeland security and other improvements that will be made to both facilities. I also spent time with a locksmith. The locksmith makes copies of keys and unlocks doors for people who need them. I rode around in a security vehicle with an officer as he patrolled. I also observed the officer make a search of a visitor s vehicle. All visitors vehicles are searched upon entering NASA. I spent time and observed in the dispatch office. The officer answers calls and sends out officers when needed. The officer also monitors the security cameras. My primary task was completing an emergency response manual. This manual would assist local law enforcement and fire agencies in case of an emergency. The manual has pictures and descriptions of the buildings. It also contains the information about hazards inside of the buildings. This information will be very helpul to law enforcement so that when called upon during an emergency, they will not create an even bigger problem with collateral damage.
A Survey of Private Ohio Academic Libraries' Physical Processing Practices for Circulating Books.
ERIC Educational Resources Information Center
Factor, Olivia Spaid
Little guidance is given in today's general technical services or cataloging textbooks to assist librarians in making decisions on procedures for the physical preparation of materials prior to placement on the shelves for public access. As small, private academic libraries face automation of circulation, addition of security systems, and debates…
7 CFR 1744.30 - Automatic lien accommodations.
Code of Federal Regulations, 2012 CFR
2012-01-01
... pro-forma basis, after taking into account the effect of the private lender notes and additional plant... execution of the private lender notes is not less than 1.6, on a pro-forma basis, after taking into account... notes secured by the borrower's existing Government mortgage; financing assets, to be owned by the...
7 CFR 1744.30 - Automatic lien accommodations.
Code of Federal Regulations, 2013 CFR
2013-01-01
... pro-forma basis, after taking into account the effect of the private lender notes and additional plant... execution of the private lender notes is not less than 1.6, on a pro-forma basis, after taking into account... notes secured by the borrower's existing Government mortgage; financing assets, to be owned by the...
7 CFR 1744.30 - Automatic lien accommodations.
Code of Federal Regulations, 2014 CFR
2014-01-01
... pro-forma basis, after taking into account the effect of the private lender notes and additional plant... execution of the private lender notes is not less than 1.6, on a pro-forma basis, after taking into account... notes secured by the borrower's existing Government mortgage; financing assets, to be owned by the...
2006-11-01
and 1648: demolition of Facility 451 (currently used as gym and Teen Center) that is adjacent to but not part of the privatization land lease...of the batteries and their relationship to the base end stations. (This marker is in place.) • The structure will be secured to prevent vandalism
21 CFR 1301.76 - Other security controls for practitioners.
Code of Federal Regulations, 2014 CFR
2014-04-01
... nonpractitioners in § 1301.74 (a), (b), and (e). (d) Central fill pharmacies must comply with § 1301.74(e) when selecting private, common or contract carriers to transport filled prescriptions to a retail pharmacy for delivery to the ultimate user. When central fill pharmacies contract with private, common or contract...
21 CFR 1301.76 - Other security controls for practitioners.
Code of Federal Regulations, 2013 CFR
2013-04-01
... nonpractitioners in § 1301.74 (a), (b), and (e). (d) Central fill pharmacies must comply with § 1301.74(e) when selecting private, common or contract carriers to transport filled prescriptions to a retail pharmacy for delivery to the ultimate user. When central fill pharmacies contract with private, common or contract...
21 CFR 1301.76 - Other security controls for practitioners.
Code of Federal Regulations, 2012 CFR
2012-04-01
... nonpractitioners in § 1301.74 (a), (b), and (e). (d) Central fill pharmacies must comply with § 1301.74(e) when selecting private, common or contract carriers to transport filled prescriptions to a retail pharmacy for delivery to the ultimate user. When central fill pharmacies contract with private, common or contract...
33 CFR 67.35-10 - Private aids to navigation.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications § 67.35-10...
33 CFR 67.35-10 - Private aids to navigation.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications § 67.35-10...
33 CFR 67.35-10 - Private aids to navigation.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications § 67.35-10...
33 CFR 67.35-10 - Private aids to navigation.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications § 67.35-10...
33 CFR 67.35-10 - Private aids to navigation.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications § 67.35-10...
Long-term care over an uncertain future: what can current retirees expect?
Kemper, Peter; Komisar, Harriet L; Alecxih, Lisa
The leading edge of the baby boom generation is nearing retirement and facing uncertainty about its need for long-term care (LTC). Using a microsimulation model, this analysis projected that people currently turning age 65 will need LTC for three years on average. An important share of needed care will be covered by public programs and some private insurance, but much of the care will be an uninsured private responsibility of individuals and their families--a responsibility that will be distributed unequally. While over a third of those now turning 65 are projected to never receive family care, three out of 10 will rely on family care for more than two years. Similarly, half of people turning 65 will have no private out-of-pocket expenditures for LTC, while more than one in 20 are projected to spend $100,000 or more of their own money (in present discounted value). Policy debate that focuses only on income security and acute care--and the corresponding Social Security and Medicare programs--misses the third, largely private, risk that retirees face: that of needing LTC.
FRR: fair remote retrieval of outsourced private medical records in electronic health networks.
Wang, Huaqun; Wu, Qianhong; Qin, Bo; Domingo-Ferrer, Josep
2014-08-01
Cloud computing is emerging as the next-generation IT architecture. However, cloud computing also raises security and privacy concerns since the users have no physical control over the outsourced data. This paper focuses on fairly retrieving encrypted private medical records outsourced to remote untrusted cloud servers in the case of medical accidents and disputes. Our goal is to enable an independent committee to fairly recover the original private medical records so that medical investigation can be carried out in a convincing way. We achieve this goal with a fair remote retrieval (FRR) model in which either t investigation committee members cooperatively retrieve the original medical data or none of them can get any information on the medical records. We realize the first FRR scheme by exploiting fair multi-member key exchange and homomorphic privately verifiable tags. Based on the standard computational Diffie-Hellman (CDH) assumption, our scheme is provably secure in the random oracle model (ROM). A detailed performance analysis and experimental results show that our scheme is efficient in terms of communication and computation. Copyright © 2014 Elsevier Inc. All rights reserved.
Nayor, David
2012-01-01
Doctors across the country who operate private medical practices are facing increasing financial obstacles, namely shrinking income as a result of rising costs and lower reimbursements. In addition, as hospitals have become overburdened many physicians have opened up private surgical centers; magnetic resonance imaging and computed tomography and positron emission tomography scanning facilities; pathology labs; colonoscopy/endoscopy suites; lithotripsy centers; and other medical businesses typically performed within the hospital. Moreover, many doctors seek loans to purchase existing practices or for their capital contribution in medical partnerships. The past decade has thus seen a significant increase in the number of doctors taking out small business loans. Indeed, banks view the healthcare industry as a large growth market. This article includes practical information, advice, and resources to help doctors to secure bank financing for their practices, ancillary services business, real estate, and equipment on the best possible market terms.
2013-01-01
tremendously dangerous and sophisticated virus that successfully attacked a SCADA system is now available for free on the Internet, where one can find...security for the public and private sectors. To develop this capability, the Nation needs to undergo a paradigm shift on how it views the cyber... for communications and trade were extraordinarily important for the security and prosperity of Britain. Today, the security and prosperity of the
Social Security and Saving: A Time-Series Econometrics Pedagogical Example (With "R" Code)
ERIC Educational Resources Information Center
Wassell, Charles S., Jr.
2018-01-01
In 1974, and then again in 1996, Martin Feldstein published studies of the impact of the Social Security system on private saving in the U.S. economy. He found that Social Security depressed personal saving by a substantial amount--up to 50 percent. The author uses the Feldstein data and empirical models in this article to illustrate the steps in…
Private sector involvement in civil space remote sensing. Volume 1: Report
NASA Technical Reports Server (NTRS)
1979-01-01
A survey of private sector developers, users, and interpreters of Earth resources data was conducted in an effort to encourage private investment and participation in remote sensing systems. Results indicate positive interest in participation beyond the current hardware contracting level, however, there is a substantial gap between current market levels and system costs. Issues identified include the selection process for an operating entity, the public/private interface, data collection and access policies, price and profit regulation in a subsidized system, international participation, and the responsibility for research and development. It was agreed that the cost, complexity, and security implications of integrated systems need not be an absolute bar to their private operation.
Noisy processing and distillation of private quantum States.
Renes, Joseph M; Smith, Graeme
2007-01-12
We provide a simple security proof for prepare and measure quantum key distribution protocols employing noisy processing and one-way postprocessing of the key. This is achieved by showing that the security of such a protocol is equivalent to that of an associated key distribution protocol in which, instead of the usual maximally entangled states, a more general private state is distilled. In addition to a more general target state, the usual entanglement distillation tools are employed (in particular, Calderbank-Shor-Steane-like codes), with the crucial difference that noisy processing allows some phase errors to be left uncorrected without compromising the privacy of the key.
Borrowing to save: a critique of recent proposals to partially privatize Social Security.
Dattalo, Patrick
2007-07-01
Concern over Social Security's forecasted long-run deficit is occurring at a time when the program has a short-term surplus. One proposed strategy to address this forecasted deficit is to allow the investment of a portion of payroll taxes into private savings accounts (PSAs). The author analyzes recent proposals for PSAs and concludes that PSAs are more likely to be a problem than a solution. Paradoxically, PSAs require the government to borrow to encourage current workers to save. The author recommends resources to help social workers remain informed about proposed program reforms and prepared to advocate for the concept of social insurance.
Quantum private query with perfect user privacy against a joint-measurement attack
NASA Astrophysics Data System (ADS)
Yang, Yu-Guang; Liu, Zhi-Chao; Li, Jian; Chen, Xiu-Bo; Zuo, Hui-Juan; Zhou, Yi-Hua; Shi, Wei-Min
2016-12-01
The joint-measurement (JM) attack is the most powerful threat to the database security for existing quantum-key-distribution (QKD)-based quantum private query (QPQ) protocols. Wei et al. (2016) [28] proposed a novel QPQ protocol against the JM attack. However, their protocol relies on two-way quantum communication thereby affecting its real implementation and communication efficiency. Moreover, it cannot ensure perfect user privacy. In this paper, we present a new one-way QPQ protocol in which the special way of classical post-processing of oblivious key ensures the security against the JM attack. Furthermore, it realizes perfect user privacy and lower complexity of communication.