Sample records for computer security division

  1. 76 FR 7817 - Announcing Draft Federal Information Processing Standard 180-4, Secure Hash Standard, and Request...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-11

    ... before May 12, 2011. ADDRESSES: Written comments may be sent to: Chief, Computer Security Division... FURTHER INFORMATION CONTACT: Elaine Barker, Computer Security Division, National Institute of Standards... Quynh Dang, Computer Security Division, National Institute of Standards and Technology, Gaithersburg, MD...

  2. 15 CFR 30.5 - Electronic Export Information filing application and certification processes and standards.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Census Bureau's Foreign Trade Division Computer Security Officer and refrain from using AESDirect until... Bureau's Foreign Trade Division Computer Security Officer that the company's computer systems accessing... threat to national security interests such that its participation in postdeparture filing should be...

  3. 15 CFR 30.5 - Electronic Export Information filing application and certification processes and standards.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Census Bureau's Foreign Trade Division Computer Security Officer and refrain from using AESDirect until... Bureau's Foreign Trade Division Computer Security Officer that the company's computer systems accessing... threat to national security interests such that its participation in postdeparture filing should be...

  4. 15 CFR 30.5 - Electronic Export Information filing application and certification processes and standards.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Census Bureau's Foreign Trade Division Computer Security Officer and refrain from using AESDirect until... Bureau's Foreign Trade Division Computer Security Officer that the company's computer systems accessing... threat to national security interests such that its participation in postdeparture filing should be...

  5. 21 CFR 1311.08 - Incorporation by reference.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... of Standards and Technology, Computer Security Division, Information Technology Laboratory, National... standards are available from the National Institute of Standards and Technology, Computer Security Division... 140-2, Security Requirements for Cryptographic Modules, May 25, 2001, as amended by Change Notices 2...

  6. FORESEE: Fully Outsourced secuRe gEnome Study basEd on homomorphic Encryption

    PubMed Central

    2015-01-01

    Background The increasing availability of genome data motivates massive research studies in personalized treatment and precision medicine. Public cloud services provide a flexible way to mitigate the storage and computation burden in conducting genome-wide association studies (GWAS). However, data privacy has been widely concerned when sharing the sensitive information in a cloud environment. Methods We presented a novel framework (FORESEE: Fully Outsourced secuRe gEnome Study basEd on homomorphic Encryption) to fully outsource GWAS (i.e., chi-square statistic computation) using homomorphic encryption. The proposed framework enables secure divisions over encrypted data. We introduced two division protocols (i.e., secure errorless division and secure approximation division) with a trade-off between complexity and accuracy in computing chi-square statistics. Results The proposed framework was evaluated for the task of chi-square statistic computation with two case-control datasets from the 2015 iDASH genome privacy protection challenge. Experimental results show that the performance of FORESEE can be significantly improved through algorithmic optimization and parallel computation. Remarkably, the secure approximation division provides significant performance gain, but without missing any significance SNPs in the chi-square association test using the aforementioned datasets. Conclusions Unlike many existing HME based studies, in which final results need to be computed by the data owner due to the lack of the secure division operation, the proposed FORESEE framework support complete outsourcing to the cloud and output the final encrypted chi-square statistics. PMID:26733391

  7. FORESEE: Fully Outsourced secuRe gEnome Study basEd on homomorphic Encryption.

    PubMed

    Zhang, Yuchen; Dai, Wenrui; Jiang, Xiaoqian; Xiong, Hongkai; Wang, Shuang

    2015-01-01

    The increasing availability of genome data motivates massive research studies in personalized treatment and precision medicine. Public cloud services provide a flexible way to mitigate the storage and computation burden in conducting genome-wide association studies (GWAS). However, data privacy has been widely concerned when sharing the sensitive information in a cloud environment. We presented a novel framework (FORESEE: Fully Outsourced secuRe gEnome Study basEd on homomorphic Encryption) to fully outsource GWAS (i.e., chi-square statistic computation) using homomorphic encryption. The proposed framework enables secure divisions over encrypted data. We introduced two division protocols (i.e., secure errorless division and secure approximation division) with a trade-off between complexity and accuracy in computing chi-square statistics. The proposed framework was evaluated for the task of chi-square statistic computation with two case-control datasets from the 2015 iDASH genome privacy protection challenge. Experimental results show that the performance of FORESEE can be significantly improved through algorithmic optimization and parallel computation. Remarkably, the secure approximation division provides significant performance gain, but without missing any significance SNPs in the chi-square association test using the aforementioned datasets. Unlike many existing HME based studies, in which final results need to be computed by the data owner due to the lack of the secure division operation, the proposed FORESEE framework support complete outsourcing to the cloud and output the final encrypted chi-square statistics.

  8. 75 FR 38595 - Guidance to States Regarding Driver History Record Information Security, Continuity of Operation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-02

    ... Standards and Technology's (NIST) Computer Security Division maintains a Computer Security Resource Center... Regarding Driver History Record Information Security, Continuity of Operation Planning, and Disaster... (SDLAs) to support their efforts at maintaining the security of information contained in the driver...

  9. Design Principles and Guidelines for Security

    DTIC Science & Technology

    2007-11-21

    Padula , Secure Computer Systems: Unified Exposition and Multics Interpretation. Electronic Systems Division, USAF. ESD-TR-75-306, MTR-2997 Rev.1...Hanscom AFB, MA. March 1976 [7] David Elliott Bell. “Looking Back at the Bell-La Padula Model,” Proc. Annual Computer Security Applications Conference

  10. 78 FR 89 - Announcing an Open Meeting of the Information Security and Privacy Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-02

    ... Management and Budget, and the Director of NIST on security and privacy issues pertaining to federal computer... Computer Security Division. Note that agenda items may change without notice because of possible unexpected... of the Information Security and Privacy Advisory Board AGENCY: National Institute of Standards and...

  11. 75 FR 57904 - Announcing a Meeting of the Information Security and Privacy Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-23

    ... Office, --Update of NIST Computer Security Division, and --Information Security and Privacy Advisory... Information Security and Privacy Advisory Board AGENCY: National Institute of Standards and Technology, Commerce. ACTION: Notice. SUMMARY: The Information Security and Privacy Advisory Board (ISPAB) will meet...

  12. Guidelines for computer security in general practice.

    PubMed

    Schattner, Peter; Pleteshner, Catherine; Bhend, Heinz; Brouns, Johan

    2007-01-01

    As general practice becomes increasingly computerised, data security becomes increasingly important for both patient health and the efficient operation of the practice. To develop guidelines for computer security in general practice based on a literature review, an analysis of available information on current practice and a series of key stakeholder interviews. While the guideline was produced in the context of Australian general practice, we have developed a template that is also relevant for other countries. Current data on computer security measures was sought from Australian divisions of general practice. Semi-structured interviews were conducted with general practitioners (GPs), the medical software industry, senior managers within government responsible for health IT (information technology) initiatives, technical IT experts, divisions of general practice and a member of a health information consumer group. The respondents were asked to assess both the likelihood and the consequences of potential risks in computer security being breached. The study suggested that the most important computer security issues in general practice were: the need for a nominated IT security coordinator; having written IT policies, including a practice disaster recovery plan; controlling access to different levels of electronic data; doing and testing backups; protecting against viruses and other malicious codes; installing firewalls; undertaking routine maintenance of hardware and software; and securing electronic communication, for example via encryption. This information led to the production of computer security guidelines, including a one-page summary checklist, which were subsequently distributed to all GPs in Australia. This paper maps out a process for developing computer security guidelines for general practice. The specific content will vary in different countries according to their levels of adoption of IT, and cultural, technical and other health service factors. Making these guidelines relevant to local contexts should help maximise their uptake.

  13. 75 FR 68849 - Privacy Act of 1974: System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-09

    ... processing of personal information is conducted within established FAA computer security regulations. A risk... SECURITY CLASSIFICATION: Sensitive, unclassified SYSTEM LOCATION: Federal Aviation Administration (FAA... Enforcement Centers of the Drug Abatement Division; Office of Security and Hazardous Materials; Flight...

  14. 77 FR 25686 - Announcing an Open Meeting of the Information Security and Privacy Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-01

    ... NIST Computer Security Division. Note that agenda items may change without notice because of possible... of the Information Security and Privacy Advisory Board AGENCY: National Institute of Standards and Technology, Commerce. ACTION: Notice. SUMMARY: The Information Security and Privacy Advisory Board (ISPAB...

  15. 21 CFR 1311.08 - Incorporation by reference.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... the National Institute of Standards and Technology, Computer Security Division, Information Technology... Publication (FIPS PUB) 140-2, Change Notices (12-03-2002), Security Requirements for Cryptographic Modules... §§ 1311.30(b), 1311.55(b), 1311.115(b), 1311.120(b), 1311.205(b). (i) Annex A: Approved Security Functions...

  16. 28 CFR 0.64-5 - Policy with regard to bringing charges under the Economic Espionage Act of 1996, Pub. L. 104-294...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... of the National Security Division, which will consult, as necessary, with the Computer Crime and... Attorney General, the Deputy Attorney General, the Assistant Attorney General for National Security, or the...

  17. 78 FR 48170 - Privacy Act of 1974; CMS Computer Match No. 2013-12; HHS Computer Match No. 1307; SSA Computer...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-07

    ... Wesolowski, Director, Verifications Policy & Operations Branch, Division of Eligibility and Enrollment Policy..., electronic interfaces and an on-line system for the verification of eligibility. PURPOSE(S) OF THE MATCHING... Security number (SSN) verifications, (2) a death indicator, (3) an indicator of a finding of disability by...

  18. 75 FR 45153 - National Security Division; Agency Information Collection Activities: Proposed Collection...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-02

    ... DEPARTMENT OF JUSTICE [OMB Number 1124-0001] National Security Division; Agency Information..., 10th & Constitution Avenue, NW., National Security Division, Counterespionage Section/Registration Unit... Justice sponsoring the collection: Form Number: NSD- 1. National Security Division, U.S. Department of...

  19. 75 FR 45151 - National Security Division; Agency Information Collection Activities: Proposed Collection...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-02

    ... DEPARTMENT OF JUSTICE [OMB Number 1124-0006] National Security Division; Agency Information...), National Security Division (NSD), will be submitting the following information collection request to the..., 10th & Constitution Avenue, NW., National Security Division, Counterespionage Section/Registration Unit...

  20. 75 FR 45152 - National Security Division: Agency Information Collection Activities: Proposed Collection...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-02

    ... DEPARTMENT OF JUSTICE [OMB Number 1124-0004] National Security Division: Agency Information...), National Security Division (NSD), will be submitting the following information collection request to the... write to U.S. Department of Justice, 10th & Constitution Avenue, NW., National Security Division...

  1. 77 FR 38306 - GFIRST Conference Stakeholder Evaluation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-27

    ...), National Cyber Security Division (NCSD), United States Computer Emergency Readiness Team (US-CERT) will...- CERT, [email protected] . SUPPLEMENTARY INFORMATION: GFIRST is DHS's premier cyber conference and continually seeks to enhance collaborative efforts among cyber constituencies, partners, and stakeholders. The...

  2. 77 FR 12320 - Information Collection Request: GFIRST Conference Stakeholder Evaluation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-29

    ... Communications (CS&C), National Cyber Security Division (NCSD), United States Computer Emergency Readiness Team... personal information provided. SUPPLEMENTARY INFORMATION: The purpose of DHS's premier cyber conference is to continually seek to enhance collaborative efforts between cyber constituencies, partners and...

  3. X-ray ptychography, fluorescence microscopy combo sheds new light on trace

    Science.gov Websites

    Research Divisions Computing, Environment and Life Sciences BIOBiosciences CPSComputational Science DSLData CEESCenter for Electrochemical Energy Science CTRCenter for Transportation Research CRIChain Reaction Navigation Toggle Search Energy Environment National Security User Facilities Science Work with Us About

  4. 75 FR 45154 - National Security Division; Agency Information Collection Activities:

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-02

    ... DEPARTMENT OF JUSTICE [OMB Number 1124-0003] National Security Division; Agency Information Collection Activities: Proposed Collection; Comments Requested ACTION: 60-Day Notice of Information...), National Security Division (NSD), will be submitting the following information collection request to the...

  5. High End Computer Network Testbedding at NASA Goddard Space Flight Center

    NASA Technical Reports Server (NTRS)

    Gary, James Patrick

    1998-01-01

    The Earth & Space Data Computing (ESDC) Division, at the Goddard Space Flight Center, is involved in development and demonstrating various high end computer networking capabilities. The ESDC has several high end super computers. These are used to run: (1) computer simulation of the climate systems; (2) to support the Earth and Space Sciences (ESS) project; (3) to support the Grand Challenge (GC) Science, which is aimed at understanding the turbulent convection and dynamos in stars. GC research occurs in many sites throughout the country, and this research is enabled by, in part, the multiple high performance network interconnections. The application drivers for High End Computer Networking use distributed supercomputing to support virtual reality applications, such as TerraVision, (i.e., three dimensional browser of remotely accessed data), and Cave Automatic Virtual Environments (CAVE). Workstations can access and display data from multiple CAVE's with video servers, which allows for group/project collaborations using a combination of video, data, voice and shared white boarding. The ESDC is also developing and demonstrating the high degree of interoperability between satellite and terrestrial-based networks. To this end, the ESDC is conducting research and evaluations of new computer networking protocols and related technologies which improve the interoperability of satellite and terrestrial networks. The ESDC is also involved in the Security Proof of Concept Keystone (SPOCK) program sponsored by National Security Agency (NSA). The SPOCK activity provides a forum for government users and security technology providers to share information on security requirements, emerging technologies and new product developments. Also, the ESDC is involved in the Trans-Pacific Digital Library Experiment, which aims to demonstrate and evaluate the use of high performance satellite communications and advanced data communications protocols to enable interactive digital library data access between the U. S. Library of Congress, the National Library of Japan and other digital library sites at 155 MegaBytes Per Second. The ESDC participation in this program is the Trans-Pacific access to GLOBE visualizations in real time. ESDC is participating in the Department of Defense's ATDNet with Multiwavelength Optical Network (MONET) a fully switched Wavelength Division Networking testbed. This presentation is in viewgraph format.

  6. 75 FR 45153 - Agency Information Collection Activities: Proposed Collection; Comments Requested

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-02

    ... DEPARTMENT OF JUSTICE National Security Division [OMB Number 1124-0005] Agency Information...), National Security Division (NSD), will be submitting the following information collection request to the... write to U.S. Department of Justice, 10th & Constitution Avenue, NW., National Security Division...

  7. Annual Historical Report Calendar Year 1993

    DTIC Science & Technology

    1994-04-01

    Physical Training, 16. PRICE CODE Military Performance, Military Nutrition , Military Psychology. 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19... Nutrition Division . . . . . . . . . . 97 Military Performance & Neuroscience Division . 115 Occupational Medicine Division ........ .130 Occupational...Directorate, Dr. James A. Vogel, Director. The Directorate incorporates the Military Nutrition Division, the Military Performance and Neuroscience Division

  8. A Chaos MIMO-OFDM Scheme for Mobile Communication with Physical-Layer Security

    NASA Astrophysics Data System (ADS)

    Okamoto, Eiji

    Chaos communications enable a physical-layer security, which can enhance the transmission security in combining with upper-layer encryption techniques, or can omit the upper-layer secure protocol and enlarges the transmission efficiency. However, the chaos communication usually degrades the error rate performance compared to unencrypted digital modulations. To achieve both physical-layer security and channel coding gain, we have proposed a chaos multiple-input multiple-output (MIMO) scheme in which a rate-one chaos convolution is applied to MIMO multiplexing. However, in the conventional study only flat fading is considered. To apply this scheme to practical mobile environments, i.e., multipath fading channels, we propose a chaos MIMO-orthogonal frequency division multi-plexing (OFDM) scheme and show its effectiveness through computer simulations.

  9. Fighting blind: why US Army Divisions Need a Dedicated Reconnaissance and Security Force

    DTIC Science & Technology

    2017-05-25

    dedicated reconnaissance and security force. By the 2003 invasion of Iraq, 3d Infantry Division employed a division cavalry squadron that integrated...26 1 Introduction 3-7 Cavalry conducted reconnaissance and security tasks ahead of and on the flank of 3d Infantry Division as the...division led Vth Corp’s attack from Kuwait to Baghdad in 2003. 3-7 Cavalry’s movements confused the enemy about 3d Infantry Division’s location and intent

  10. 77 FR 40338 - Announcing Revised Draft Federal Information Processing Standard (FIPS) 201-2, Personal Identity...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-09

    ... may be sent to: Chief, Computer Security Division, Information Technology Laboratory, ATTN: Comments... introduces the concept of a virtual contact interface, over which all functionality of the PIV Card is... Laboratory Programs. [FR Doc. 2012-16725 Filed 7-6-12; 8:45 am] BILLING CODE 3510-13-P ...

  11. 28 CFR 16.74 - Exemption of National Security Division Systems-limited access.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... National Security Division Systems—limited access. (a) The following system of records is exempted from... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of National Security Division Systems-limited access. 16.74 Section 16.74 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR...

  12. 28 CFR 17.13 - National Security Division; interpretation of Executive Orders.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... for National Security, who shall refer such questions to the Office of Legal Counsel, as appropriate... 28 Judicial Administration 1 2010-07-01 2010-07-01 false National Security Division... NATIONAL SECURITY INFORMATION AND ACCESS TO CLASSIFIED INFORMATION Administration § 17.13 National Security...

  13. Big Data, Big Solutions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pike, Bill

    Data—lots of data—generated in seconds and piling up on the internet, streaming and stored in countless databases. Big data is important for commerce, society and our nation’s security. Yet the volume, velocity, variety and veracity of data is simply too great for any single analyst to make sense of alone. It requires advanced, data-intensive computing. Simply put, data-intensive computing is the use of sophisticated computers to sort through mounds of information and present analysts with solutions in the form of graphics, scenarios, formulas, new hypotheses and more. This scientific capability is foundational to PNNL’s energy, environment and security missions. Seniormore » Scientist and Division Director Bill Pike and his team are developing analytic tools that are used to solve important national challenges, including cyber systems defense, power grid control systems, intelligence analysis, climate change and scientific exploration.« less

  14. 75 FR 73947 - Securities of Nonmember Insured Banks

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-30

    ..., DC, and should be addressed as follows: Accounting and Securities Disclosure Section, Division of..., Accounting and Securities Disclosure Section, Division of Supervision and Consumer Protection, 550 17th... comment. SUMMARY: The FDIC is revising its securities disclosure regulations applicable to state nonmember...

  15. 12 CFR 19.122 - Newspaper notice.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Securities and Corporate Practices Division, Office of the Comptroller of the Currency, Washington, DC 20219... to the Securities and Corporate Practices Division, and to bank shareholders. ... Exemption Hearings Under Section 12(h) of the Securities Exchange Act of 1934 § 19.122 Newspaper notice...

  16. 12 CFR 19.122 - Newspaper notice.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Securities and Corporate Practices Division, Office of the Comptroller of the Currency, Washington, DC 20219... to the Securities and Corporate Practices Division, and to bank shareholders. ... Exemption Hearings Under Section 12(h) of the Securities Exchange Act of 1934 § 19.122 Newspaper notice...

  17. 12 CFR 19.122 - Newspaper notice.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Securities and Corporate Practices Division, Office of the Comptroller of the Currency, Washington, DC 20219... to the Securities and Corporate Practices Division, and to bank shareholders. ... Exemption Hearings Under Section 12(h) of the Securities Exchange Act of 1934 § 19.122 Newspaper notice...

  18. 12 CFR 19.122 - Newspaper notice.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Securities and Corporate Practices Division, Office of the Comptroller of the Currency, Washington, DC 20219... to the Securities and Corporate Practices Division, and to bank shareholders. ... Exemption Hearings Under Section 12(h) of the Securities Exchange Act of 1934 § 19.122 Newspaper notice...

  19. 12 CFR 19.122 - Newspaper notice.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Securities and Corporate Practices Division, Office of the Comptroller of the Currency, Washington, DC 20219... to the Securities and Corporate Practices Division, and to bank shareholders. ... Exemption Hearings Under Section 12(h) of the Securities Exchange Act of 1934 § 19.122 Newspaper notice...

  20. 17 CFR 200.18 - Director of Division of Corporation Finance.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Corporation Finance. 200.18 Section 200.18 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... General Organization § 200.18 Director of Division of Corporation Finance. The Director of the Division of Corporation Finance is responsible to the Commission for the administration of all matters (except those...

  1. 17 CFR 200.20b - Director of Division of Investment Management.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Investment Management. 200.20b Section 200.20b Commodity and Securities Exchanges SECURITIES AND EXCHANGE... General Organization § 200.20b Director of Division of Investment Management. The Director of the Division of Investment Management is responsible to the Commission for the administration of the Commission's...

  2. 17 CFR 200.18 - Director of Division of Corporation Finance.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Corporation Finance. 200.18 Section 200.18 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... General Organization § 200.18 Director of Division of Corporation Finance. The Director of the Division of Corporation Finance is responsible to the Commission for the administration of all matters (except those...

  3. 17 CFR 200.18 - Director of Division of Corporation Finance.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Corporation Finance. 200.18 Section 200.18 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... General Organization § 200.18 Director of Division of Corporation Finance. The Director of the Division of Corporation Finance is responsible to the Commission for the administration of all matters (except those...

  4. 17 CFR 200.18 - Director of Division of Corporation Finance.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Corporation Finance. 200.18 Section 200.18 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... General Organization § 200.18 Director of Division of Corporation Finance. The Director of the Division of Corporation Finance is responsible to the Commission for the administration of all matters (except those...

  5. 2012 SARA Students Technical Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Briccetti, Angelo; Lorei, Nathan; Yonkings, David

    The Service Academy Research Associates (SARA) program provides an opportunity for Midshipmen and Cadets from US Service Academies to participate in research at Los Alamos National Laboratory (LANL), Lawrence Livermore National Laboratory (LLNL), and Sandia National Laboratory for several weeks during the summer as part of their summer training assignments. During the summer of 2012, three Midshipmen were assigned to work with the XCP Division at LANL for approximately 5-6 weeks. As one of the nation's top national security science laboratories, LANL stretches across 36 square miles, has over 2,100 facilities, and employs over 9,000 individuals including a significant numbermore » of students and postdocs. LANL's mission is to 'apply science and technology to: ensure the safety, security, and reliability of the US nuclear deterrent, reduce global threats, and solve other emerging national security challenges.' While LANL officially operates under the US Department of Energy (DoE), fulfilling this mission requires mutual cooperation with the US Department of Defense (DoD) as well. LANL's high concentration of knowledge and experience provides interns a chance to perform research in many disciplines, and its connection with the DoD in both operation and personnel gives SARA students insight to career possibilities both during and after military service. SARA students have plenty of opportunity to enjoy hiking, camping, the Los Alamos YMCA, and many other outdoor activities in New Mexico while staying at the Buffalo Thunder Resort, located 20 miles east of the lab. XCP Division is the Computational Physics division of LANL's Weapons Department. Working with XCP Division requires individuals to be Q cleared by the DoE. This means it is significantly more convenient for SARA students to be assigned to XCP Division than their civilian counterparts as the DoD CNWDI clearance held by SARA students is easily transferred to the lab prior to the students arriving at the start of the summer. SARA students working with XCP Division were given a comprehensive introduction into nuclear engineering and physics, nuclear weapons, and radiation transport and detection via texts and lectures at various classification levels. Students also attended tours of several prominent facilities at LANL including TA-41 Ice House, TA-55 PF-4 plutonium facility, the Nicholas C. Metropolis Center for Modeling and Simulation, also known as the Secure Computing Center (SCC), and the Dual-Axis Radiological Hydro Test (DARHT) facility; in addition, SARA students accompanied by LANL staff traveled to Minot AFB in North Dakota for tours of the 5th Bomb Wing and 91st Missile Wing facilities. Students participated in a week long class on the Monte Carlo N Particle (MCNP) code to supplement their understanding of radiation transport simulations. SARA students were then tasked with using this knowledge to model radiation detectors and use MCNP to compare their models to experimental data and previously accepted models.« less

  6. 12 CFR 19.121 - Application for exemption.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... application for an exemption order to the Securities and Corporate Practices Division, Office of the... the public interest or the protection of investors. The Securities and Corporate Practices Division... PROCEDURE Exemption Hearings Under Section 12(h) of the Securities Exchange Act of 1934 § 19.121 Application...

  7. 12 CFR 19.121 - Application for exemption.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... application for an exemption order to the Securities and Corporate Practices Division, Office of the... the public interest or the protection of investors. The Securities and Corporate Practices Division... PROCEDURE Exemption Hearings Under Section 12(h) of the Securities Exchange Act of 1934 § 19.121 Application...

  8. 12 CFR 19.121 - Application for exemption.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... application for an exemption order to the Securities and Corporate Practices Division, Office of the... the public interest or the protection of investors. The Securities and Corporate Practices Division... PROCEDURE Exemption Hearings Under Section 12(h) of the Securities Exchange Act of 1934 § 19.121 Application...

  9. 12 CFR 19.121 - Application for exemption.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... application for an exemption order to the Securities and Corporate Practices Division, Office of the... the public interest or the protection of investors. The Securities and Corporate Practices Division... PROCEDURE Exemption Hearings Under Section 12(h) of the Securities Exchange Act of 1934 § 19.121 Application...

  10. 12 CFR 19.121 - Application for exemption.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... application for an exemption order to the Securities and Corporate Practices Division, Office of the... the public interest or the protection of investors. The Securities and Corporate Practices Division... PROCEDURE Exemption Hearings Under Section 12(h) of the Securities Exchange Act of 1934 § 19.121 Application...

  11. Environmental Impact Statement for Proposed Closure of Los Angeles Air Force Base, California and Relocation of Space Systems Division

    DTIC Science & Technology

    1990-05-01

    FFRDC); and the Systems Engineering Technical Assistance (SETA) contractor to selected Air Force bases including: Vandenberg AFB California; March AFB...05/21/90 comptroller, acquisition civil engineering , legal, security, communications-computer systems, product assurance, and safety, among others...housing units were constructed in 1983. The Fort MacArthur Housing Area also includes administrative offices, several warehouses, and civil engineering

  12. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bennett, C. V.; Mendez, A. J.

    This was a collaborative effort between Lawrence Livermore National Security, LLC (formerly The Regents of the University of California)/Lawrence Livermore National Laboratory (LLNL) and Mendez R & D Associates (MRDA) to develop and demonstrate a reconfigurable and cost effective design for optical code division multiplexing (O-CDM) with high spectral efficiency and throughput, as applied to the field of distributed computing, including multiple accessing (sharing of communication resources) and bidirectional data distribution in fiber-to-the-premise (FTTx) networks.

  13. 17 CFR 200.19a - Director of the Division of Trading and Markets.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Trading and Markets. 200.19a Section 200.19a Commodity and Securities Exchanges SECURITIES AND EXCHANGE... General Organization § 200.19a Director of the Division of Trading and Markets. The Director of the Division of Trading and Markets is responsible to the Commission for the administration and execution of...

  14. 17 CFR 200.19a - Director of the Division of Trading and Markets.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Trading and Markets. 200.19a Section 200.19a Commodity and Securities Exchanges SECURITIES AND EXCHANGE... General Organization § 200.19a Director of the Division of Trading and Markets. The Director of the Division of Trading and Markets is responsible to the Commission for the administration and execution of...

  15. 17 CFR 200.19a - Director of the Division of Trading and Markets.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Trading and Markets. 200.19a Section 200.19a Commodity and Securities Exchanges SECURITIES AND EXCHANGE... General Organization § 200.19a Director of the Division of Trading and Markets. The Director of the Division of Trading and Markets is responsible to the Commission for the administration and execution of...

  16. MAGMA: A Liquid Software Approach to Fault Tolerance, Computer Network Security, and Survivable Networking

    DTIC Science & Technology

    2001-12-01

    and Lieutenant Namik Kaplan , Turkish Navy. Maj Tiefert’s thesis, “Modeling Control Channel Dynamics of SAAM using NS Network Simulation”, helped lay...DEC99] Deconinck , Dr. ir. Geert, Fault Tolerant Systems, ESAT / Division ACCA , Katholieke Universiteit Leuven, October 1999. [FRE00] Freed...Systems”, Addison-Wesley, 1989. [KAP99] Kaplan , Namik, “Prototyping of an Active and Lightweight Router,” March 1999 [KAT99] Kati, Effraim

  17. Requirements for the Military Message System (MMS) Family: Data Types and User Commands.

    DTIC Science & Technology

    1986-04-11

    AD-A167 126 REQUIREMENTS FOR THE MILITARY MESSASE SYSTEM (NHS) i FRILY: DATA TYPES AND USER CONNNDS(U) NAVAL RESEARCH LAB WASHINGTON DC C L HEITHEVER... System (MMS) Family: Data Types and User Commands CONSTANCE L. HEITMEYER Computer Science and Systems Branch I Information Technology Division April 11...Security Classification) Requirements for the Military Message System (MMS) Family: Data Types and User Commands 12. PERSONAL AUTHOR(S) Heitmeer, Constance

  18. Aero/fluids database system

    NASA Technical Reports Server (NTRS)

    Reardon, John E.; Violett, Duane L., Jr.

    1991-01-01

    The AFAS Database System was developed to provide the basic structure of a comprehensive database system for the Marshall Space Flight Center (MSFC) Structures and Dynamics Laboratory Aerophysics Division. The system is intended to handle all of the Aerophysics Division Test Facilities as well as data from other sources. The system was written for the DEC VAX family of computers in FORTRAN-77 and utilizes the VMS indexed file system and screen management routines. Various aspects of the system are covered, including a description of the user interface, lists of all code structure elements, descriptions of the file structures, a description of the security system operation, a detailed description of the data retrieval tasks, a description of the session log, and a description of the archival system.

  19. The Influence of Enterprise Diversification on Household Food Security among Small-Scale Sugarcane Farmers: A Case Study of Muhoroni Division, Nyando District, Kenya

    ERIC Educational Resources Information Center

    Muthoni Thuo, Caroline

    2011-01-01

    This paper examines the levels of household food security and the influence of enterprise diversification on household food security among small-scale sugarcane farmers in Muhoroni division, Nyando District, Kenya. A cross-sectional research design was used in this study. The population consisted of small-scale sugarcane farmers who grow sugarcane…

  20. Chemistry Division: Annual progress report for period ending March 31, 1987

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1987-08-01

    This report is divided into the following sections: coal chemistry; aqueous chemistry at high temperatures and pressures; geochemistry of crustal processes to high temperatures and pressures; chemistry of advanced inorganic materials; structure and dynamics of advanced polymeric materials; chemistry of transuranium elements and compounds; separations chemistry; reactions and catalysis in molten salts; surface science related to heterogeneous catalysis; electron spectroscopy; chemistry related to nuclear waste disposal; computational modeling of security document printing; and special topics. (DLC)

  1. 17 CFR 200.735-5 - Securities transactions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Service position in the Division of Investment Management or the Office of Compliance Inspections and... the Division of Investment Management and the Office of Compliance Inspections and Examinations, in... cause to be effected any transaction in a security except for bona fide investment purposes. Therefore...

  2. Dense wavelength division multiplexing devices for metropolitan-area datacom and telecom networks

    NASA Astrophysics Data System (ADS)

    DeCusatis, Casimer M.; Priest, David G.

    2000-12-01

    Large data processing environments in use today can require multi-gigabyte or terabyte capacity in the data communication infrastructure; these requirements are being driven by storage area networks with access to petabyte data bases, new architecture for parallel processing which require high bandwidth optical links, and rapidly growing network applications such as electronic commerce over the Internet or virtual private networks. These datacom applications require high availability, fault tolerance, security, and the capacity to recover from any single point of failure without relying on traditional SONET-based networking. These requirements, coupled with fiber exhaust in metropolitan areas, are driving the introduction of dense optical wavelength division multiplexing (DWDM) in data communication systems, particularly for large enterprise servers or mainframes. In this paper, we examine the technical requirements for emerging nextgeneration DWDM systems. Protocols for storage area networks and computer architectures such as Parallel Sysplex are presented, including their fiber bandwidth requirements. We then describe two commercially available DWDM solutions, a first generation 10 channel system and a recently announced next generation 32 channel system. Technical requirements, network management and security, fault tolerant network designs, new network topologies enabled by DWDM, and the role of time division multiplexing in the network are all discussed. Finally, we present a description of testing conducted on these networks and future directions for this technology.

  3. Annual Historical Report Calendar Year 1992

    DTIC Science & Technology

    1993-04-01

    Environmental Stress, Exercise Physiology, Physical Training, 16. PRICE CODE Military Performance, Military Nutrition , Military Psychology. 17. SECURITY...63 Occupational Health & Performance Directorate . . . 84 Military Nutrition Division ........ ........... 87 Military Performance...Military Nutrition Division, the Military Performance and Neuroscience Division, the Occupational Medicine Division, and the Occupational Physiology

  4. 78 FR 25115 - Self-Regulatory Organizations; Fixed Income Clearing Corporation; Notice of Filing of Proposed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-29

    ... Amending the Mortgage-Backed Securities Division Fails Charge Rule To Reflect Recommendation of the... change is to amend the existing fails charge rule in FICC's Mortgage-Backed Securities Division (``MBSD... (``TMPG'') relating to the removal of the resolution period for fails charges.\\3\\ \\3\\ The text of the...

  5. 14 CFR 1203.409 - Exceptional cases.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ....409 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM... Information Security Program Committee, Security Division, Washington, DC 20546 for a classification..., to the Director, Information Security Oversight Office, GSA, for a determination. ...

  6. Analysis of secured Optical Orthogonal Frequency Division Multiplexed System

    NASA Astrophysics Data System (ADS)

    Gill, Harsimranjit Singh; Bhatia, Kamaljit Singh; Gill, Sandeep Singh

    2017-05-01

    In this paper, security issues for optical orthogonal frequency division multiplexed (OFDM) systems are emphasized. The encryption has been done on the data of coded OFDM symbols using data encryption standard (DES) algorithm before transmitting through the fiber. The results obtained justify that the DES provides better security to the input data without further bandwidth requirement. The data is transmitted to a distance of 1,000 km in a single-mode fiber with 16-quadrature amplitude modulation. The peak-to-average power ratio and optical signal-to-noise ratio of secure coded OFDM signal is fairly better than the conventional OFDM signal.

  7. 77 FR 60165 - Self-Regulatory Organizations; Fixed Income Clearing Corporation; Order Approving Proposed Rule...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-02

    ... Time at Which the Mortgage-Backed Securities Division Runs Its Daily Morning Pass September 26, 2012. I... FICC proposes to move the time at which its Mortgage-Backed Securities Division (``MBSD'') runs its... processing passes. MBSD currently runs its first processing pass of the day (historically referred to as the...

  8. High security chaotic multiple access scheme for visible light communication systems with advanced encryption standard interleaving

    NASA Astrophysics Data System (ADS)

    Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng

    2016-06-01

    Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.

  9. 76 FR 22409 - Nationwide Cyber Security Review (NCSR) Assessment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-21

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0012] Nationwide Cyber Security Review (NCSR...), National Cyber Security Division (NCSD), Cyber Security Evaluation Program (CSEP), will submit the... for all levels of government to complete a cyber network security assessment so that a full measure of...

  10. 76 FR 43696 - Nationwide Cyber Security Review (NCSR) Assessment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-21

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0012] Nationwide Cyber Security Review (NCSR... Protection and Programs Directorate (NPPD), Office of Cybersecurity and Communications (CS&C), National Cyber Security Division (NCSD), Cyber Security Evaluation Program (CSEP), will submit the following Information...

  11. Engineering physics and mathematics division

    NASA Astrophysics Data System (ADS)

    Sincovec, R. F.

    1995-07-01

    This report provides a record of the research activities of the Engineering Physics and Mathematics Division for the period 1 Jan. 1993 - 31 Dec. 1994. This report is the final archival record of the EPM Division. On 1 Oct. 1994, ORELA was transferred to Physics Division and on 1 Jan. 1995, the Engineering Physics and Mathematics Division and the Computer Applications Division reorganized to form the Computer Science and Mathematics Division and the Computational Physics and Engineering Division. Earlier reports in this series are identified on the previous pages, along with the progress reports describing ORNL's research in the mathematical sciences prior to 1984 when those activities moved into the Engineering Physics and Mathematics Division.

  12. A Study of Venezuela’s Internal and External Threat and the United States Security Assistance Program in the Build-Up and Modernization of Her Forces

    DTIC Science & Technology

    1984-09-01

    records/documents in the division *- are quantitative in nature and are contained in computer printouts. Other documents include daily transactions docu...1498-1830). Venezuela was discovered by Christopher Columbus during his third voyage to the new world in 1498 (25:2). He was intrigued by pearl...maintain control, trade with other countries was forbidden and resulted in the colony’s isolation for most of *O its early existence. News of the new

  13. 5 CFR 1312.31 - Security violations.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... States Secret Service when an office/division fails to properly secure classified information. Upon... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Security violations. 1312.31 Section 1312..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of...

  14. Combating terrorism : linking threats to strategies and resources testimony

    DOT National Transportation Integrated Search

    2000-07-26

    This is the statement of Norman J. Rabkin, Director, National Security Preparedness Issues, National Security and International Affairs division before the Subcommittee on National Security, Veterans Affairs, and International Relations, Committee on...

  15. A code inspection process for security reviews

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Garzoglio, Gabriele; /Fermilab

    2009-05-01

    In recent years, it has become more and more evident that software threat communities are taking an increasing interest in Grid infrastructures. To mitigate the security risk associated with the increased numbers of attacks, the Grid software development community needs to scale up effort to reduce software vulnerabilities. This can be achieved by introducing security review processes as a standard project management practice. The Grid Facilities Department of the Fermilab Computing Division has developed a code inspection process, tailored to reviewing security properties of software. The goal of the process is to identify technical risks associated with an application andmore » their impact. This is achieved by focusing on the business needs of the application (what it does and protects), on understanding threats and exploit communities (what an exploiter gains), and on uncovering potential vulnerabilities (what defects can be exploited). The desired outcome of the process is an improvement of the quality of the software artifact and an enhanced understanding of possible mitigation strategies for residual risks. This paper describes the inspection process and lessons learned on applying it to Grid middleware.« less

  16. A code inspection process for security reviews

    NASA Astrophysics Data System (ADS)

    Garzoglio, Gabriele

    2010-04-01

    In recent years, it has become more and more evident that software threat communities are taking an increasing interest in Grid infrastructures. To mitigate the security risk associated with the increased numbers of attacks, the Grid software development community needs to scale up effort to reduce software vulnerabilities. This can be achieved by introducing security review processes as a standard project management practice. The Grid Facilities Department of the Fermilab Computing Division has developed a code inspection process, tailored to reviewing security properties of software. The goal of the process is to identify technical risks associated with an application and their impact. This is achieved by focusing on the business needs of the application (what it does and protects), on understanding threats and exploit communities (what an exploiter gains), and on uncovering potential vulnerabilities (what defects can be exploited). The desired outcome of the process is an improvement of the quality of the software artifact and an enhanced understanding of possible mitigation strategies for residual risks. This paper describes the inspection process and lessons learned on applying it to Grid middleware.

  17. 17 CFR 200.30-1 - Delegation of authority to Director of Division of Corporation Finance.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Director of Division of Corporation Finance. 200.30-1 Section 200.30-1 Commodity and Securities Exchanges... Division of Corporation Finance. Pursuant to the provisions of Pub. L., No. 87-592, 76 Stat. 394 (15 U.S.C... otherwise, the following functions to the Director of the Division of Corporation Finance, to be performed...

  18. 17 CFR 200.30-1 - Delegation of authority to Director of Division of Corporation Finance.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Director of Division of Corporation Finance. 200.30-1 Section 200.30-1 Commodity and Securities Exchanges... Division of Corporation Finance. Pursuant to the provisions of Pub. L., No. 87-592, 76 Stat. 394 (15 U.S.C... otherwise, the following functions to the Director of the Division of Corporation Finance, to be performed...

  19. 17 CFR 200.30-1 - Delegation of authority to Director of Division of Corporation Finance.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Director of Division of Corporation Finance. 200.30-1 Section 200.30-1 Commodity and Securities Exchanges... Division of Corporation Finance. Pursuant to the provisions of Pub. L., No. 87-592, 76 Stat. 394 (15 U.S.C... otherwise, the following functions to the Director of the Division of Corporation Finance, to be performed...

  20. 17 CFR 200.30-1 - Delegation of authority to Director of Division of Corporation Finance.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Director of Division of Corporation Finance. 200.30-1 Section 200.30-1 Commodity and Securities Exchanges... Division of Corporation Finance. Pursuant to the provisions of Pub. L., No. 87-592, 76 Stat. 394 (15 U.S.C... otherwise, the following functions to the Director of the Division of Corporation Finance, to be performed...

  1. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chan, A.; Tsiounis, Y.; Frankel, Y.

    Recently, there has been an interest in making electronic cash protocols more practical for electronic commerce by developing e-cash which is divisible (e.g., a coin which can be spent incrementally but total purchases are limited to the monetary value of the coin). In Crypto`95, T. Okamoto presented the first practical divisible, untraceable, off-line e-cash scheme, which requires only O(log N) computations for each of the withdrawal, payment and deposit procedures, where N = (total coin value)/(smallest divisible unit). However, Okamoto`s set-up procedure is quite inefficient (on the order of 4,000 multi-exponentiations and depending on the size of the RSA modulus).more » The authors formalize the notion of range-bounded commitment, originally used in Okamoto`s account establishment protocol, and present a very efficient instantiation which allows one to construct the first truly efficient divisible e-cash system. The scheme only requires the equivalent of one (1) exponentiation for set-up, less than 2 exponentiations for withdrawal and around 20 for payment, while the size of the coin remains about 300 Bytes. Hence, the withdrawal protocol is 3 orders of magnitude faster than Okamoto`s, while the rest of the system remains equally efficient, allowing for implementation in smart-cards. Similar to Okamoto`s, the scheme is based on proofs whose cryptographic security assumptions are theoretically clarified.« less

  2. 45 CFR 601.3 - Security program.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of... employees concerned with classified information or material. (b) Encouraging Foundation personnel to...

  3. 45 CFR 601.3 - Security program.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of... employees concerned with classified information or material. (b) Encouraging Foundation personnel to...

  4. 45 CFR 601.3 - Security program.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of... employees concerned with classified information or material. (b) Encouraging Foundation personnel to...

  5. 45 CFR 601.3 - Security program.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of... employees concerned with classified information or material. (b) Encouraging Foundation personnel to...

  6. 45 CFR 601.3 - Security program.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of... employees concerned with classified information or material. (b) Encouraging Foundation personnel to...

  7. Security Station and Front Entrance to hospital property, looking northeast ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Security Station and Front Entrance to hospital property, looking northeast - U.S. Veterans Hospital, Jefferson Barracks, Security Station & Front Gate, VA Medical Center, Jefferson Barracks Division 1 Jefferson Barracks Drive, Saint Louis, Independent City, MO

  8. NRL Fact Book

    DTIC Science & Technology

    1983-03-01

    Mr. W.S. Kratz BMC M.R. Fishe Mr. R.G. Trott Administrative Officer Security Officer r Operations Officer Facilities Manager and Head, Maintenance and...Division 20 Financial Management Division 22 Management Information Division 24 Civilian Personnel Division 26 THE TECHNICAL SERVICES DIRECTORATE 29 Office...the neighborhood of 3200. The overall management of the Laboratory is under the direction of a Naval Commanding Officer -nd a civilian Director of

  9. 17 CFR 200.30-3 - Delegation of authority to Director of Division of Trading and Markets.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Director of Division of Trading and Markets. 200.30-3 Section 200.30-3 Commodity and Securities Exchanges... Division of Trading and Markets. Pursuant to the provisions of Pub. L. 87-592, 76 Stat. 394, 15 U.S.C. 78d... otherwise, the following functions to the Director of the Division of Trading and Markets to be performed by...

  10. 44 CFR 8.4 - Mandatory declassification review procedures.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL NATIONAL SECURITY INFORMATION § 8.4 Mandatory... information is inadequate, the Office of Security shall notify him or her that no further action will be taken...) to the Security Division. Information no longer requiring protection under E.O. 12356 shall be...

  11. 76 FR 6111 - Disclosure of Payments by Resource Extraction Issuers

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-03

    ... Counsel, Division of Corporation Finance, or Elliot Staffin, Special Counsel in the Office of International Corporate Finance, Division of Corporation Finance, at (202) 551-3290, U.S. Securities and...

  12. 44 CFR 8.3 - Senior FEMA official responsible for the information security program.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Senior FEMA official... Senior FEMA official responsible for the information security program. The Director of the Security Division, has been designated as the senior official to direct and administer the FEMA information security...

  13. 12 CFR 11.3 - Filing requirements and inspection of documents.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Securities and Corporate Practices Division, Office of the Comptroller of the Currency, 250 E Street, SW... exhibits) are available from the Disclosure Officer, Communications Division, Office of the Comptroller of...

  14. 20 CFR 422.130 - Claim procedure.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES General Procedures § 422.130 Claim procedure. (a) General. The Social Security Administration provides facilities for the public to... station of the Social Security Administration, from the Division of Foreign Claims, Post Office Box 1756...

  15. Cyber Security--Are You Prepared?

    ERIC Educational Resources Information Center

    Newman, Scott

    2007-01-01

    During the summer 2002 term, Oklahoma State University-Okmulgee's Information Technologies Division offered a one credit-hour network security course--which barely had adequate student interest to meet the institution's enrollment requirements. Today, OSU-Okmulgee boasts one of the nation's premier cyber security programs. Many prospective…

  16. 17 CFR 140.91 - Delegation of authority to the Director of the Division of Trading and Markets.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Director of the Division of Trading and Markets. 140.91 Section 140.91 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION ORGANIZATION, FUNCTIONS, AND PROCEDURES OF THE COMMISSION Functions § 140.91 Delegation of authority to the Director of the Division of Trading and Markets. (a) The...

  17. Annual Report: Alaska Division of Vocational Rehabilitation--Fiscal Year 1989.

    ERIC Educational Resources Information Center

    Alaska State Dept. of Education, Juneau. Div. of Vocational Rehabilitation.

    This annual report states the goal of the Alaska Division of Vocational Rehabilitation, which is to provide assistance to those who are vocationally disabled so they can secure and maintain suitable employment. The Director of the Division of Vocational Rehabilitation of the Alaska Department of Education offers an overview of fiscal year 1989…

  18. 17 CFR 140.91 - Delegation of authority to the Director of the Division of Trading and Markets.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Director of the Division of Trading and Markets. 140.91 Section 140.91 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION ORGANIZATION, FUNCTIONS, AND PROCEDURES OF THE COMMISSION Functions § 140.91 Delegation of authority to the Director of the Division of Trading and Markets. (a) The...

  19. 17 CFR 140.91 - Delegation of authority to the Director of the Division of Trading and Markets.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Director of the Division of Trading and Markets. 140.91 Section 140.91 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION ORGANIZATION, FUNCTIONS, AND PROCEDURES OF THE COMMISSION Functions § 140.91 Delegation of authority to the Director of the Division of Trading and Markets. (a) The...

  20. Functional requirements of computer systems for the U.S. Geological Survey, Water Resources Division, 1988-97

    USGS Publications Warehouse

    Hathaway, R.M.; McNellis, J.M.

    1989-01-01

    Investigating the occurrence, quantity, quality, distribution, and movement of the Nation 's water resources is the principal mission of the U.S. Geological Survey 's Water Resources Division. Reports of these investigations are published and available to the public. To accomplish this mission, the Division requires substantial computer technology to process, store, and analyze data from more than 57,000 hydrologic sites. The Division 's computer resources are organized through the Distributed Information System Program Office that manages the nationwide network of computers. The contract that provides the major computer components for the Water Resources Division 's Distributed information System expires in 1991. Five work groups were organized to collect the information needed to procure a new generation of computer systems for the U. S. Geological Survey, Water Resources Division. Each group was assigned a major Division activity and asked to describe its functional requirements of computer systems for the next decade. The work groups and major activities are: (1) hydrologic information; (2) hydrologic applications; (3) geographic information systems; (4) reports and electronic publishing; and (5) administrative. The work groups identified 42 functions and described their functional requirements for 1988, 1992, and 1997. A few new functions such as Decision Support Systems and Executive Information Systems, were identified, but most are the same as performed today. Although the number of functions will remain about the same, steady growth in the size, complexity, and frequency of many functions is predicted for the next decade. No compensating increase in the Division 's staff is anticipated during this period. To handle the increased workload and perform these functions, new approaches will be developed that use advanced computer technology. The advanced technology is required in a unified, tightly coupled system that will support all functions simultaneously. The new approaches and expanded use of computers will require substantial increases in the quantity and sophistication of the Division 's computer resources. The requirements presented in this report will be used to develop technical specifications that describe the computer resources needed during the 1990's. (USGS)

  1. 75 FR 60771 - Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-01

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0080] Critical Infrastructure Partnership..., Section Chief Partnership Programs, Partnership and Outreach Division, Office of Infrastructure Protection... Outreach Division, Office of Infrastructure Protection, National Protection and Programs Directorate...

  2. 78 FR 29147 - 30-Day Notice and Request for Comments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-17

    ... DEPARTMENT OF HOMELAND SECURITY United States Secret Service 30-Day Notice and Request for... Management and Budget, Attn: Desk Officer for United States Secret Service, Department of Homeland Security... directed to: United States Secret Service, Security Clearance Division, Attn: ASAIC Michael Smith...

  3. 77 FR 6573 - Agency Information Collection Activities: Proposed Collection; Comment Request; Collection of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-08

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Citizenship and Immigration Services Agency Information... service delivery, the Department of Homeland Security, U.S. Citizenship and Immigration Services (USCIS... Homeland Security (DHS), USCIS, Sunday Aigbe, Chief, Regulatory Products Division, Office of the Executive...

  4. ADP Analysis project for the Human Resources Management Division

    NASA Technical Reports Server (NTRS)

    Tureman, Robert L., Jr.

    1993-01-01

    The ADP (Automated Data Processing) Analysis Project was conducted for the Human Resources Management Division (HRMD) of NASA's Langley Research Center. The three major areas of work in the project were computer support, automated inventory analysis, and an ADP study for the Division. The goal of the computer support work was to determine automation needs of Division personnel and help them solve computing problems. The goal of automated inventory analysis was to find a way to analyze installed software and usage on a Macintosh. Finally, the ADP functional systems study for the Division was designed to assess future HRMD needs concerning ADP organization and activities.

  5. OVERVIEW OF USEPA'S WATER SUPPLY & WATER RESOURCES DIVISION PROGRAM

    EPA Science Inventory

    The United States Environmental Protection Agency's (USEPA) Water Supply and Water Resources Division (WSWRD) conducts a wide range of research on regulated and unregulated contaminants in drinking water, water distribution systems, homeland security, source water protection, and...

  6. 77 FR 18255 - Agency Information Collection Activities: Form N-565; Extension of an Existing Information...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-27

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Citizenship and Immigration Services Agency Information... Naturalization/Citizenship Document; OMB Control No. 1615-0091. The Department of Homeland Security, U.S... Security (DHS), USCIS, Chief, Regulatory Coordination Division, 20 Massachusetts Avenue NW., Washington, DC...

  7. 75 FR 80835 - Agency Information Collection Activities: Form N-565; Extension of an Existing Information...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-23

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Citizenship and Immigration Services Agency Information... Naturalization/Citizenship Document; OMB Control No. 1615-0091. The Department of Homeland Security, U.S... Security (DHS), USCIS, Chief, Regulatory Products Division, 20 Massachusetts Avenue, NW., Washington, DC...

  8. 17 CFR 256.01-13 - Submission of questions.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Submission of questions. 256.01-13 Section 256.01-13 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... interpretation of the prescribed accounting to the Division of Corporate Regulation or its successor for...

  9. Combating terrorism : observations on growth in federal programs

    DOT National Transportation Integrated Search

    1999-01-01

    This is the statement of Mark E. Gebicke, Director, National Security Preparedness Issues, National Security and International Affairs Division before the Subcommittee on Oversight, Investigations, and Emergency Management, Committee on Transportatio...

  10. AVIATION SECURITY: FAA’s Actions to Study Responsibilities and Funding for Airport Security and to Certify Screening Companies

    DTIC Science & Technology

    1999-02-01

    Actions to Study Responsibilities and Funding for Airport Security and to Certify Screening Companies DISTRIBUTION STATEMENT A Approved for...local law enforcement support relating to air carrier and airport security measures. The funding of the security operations is divided among FAA, the...generally agreed with the current division of airport security responsibilities. These officials stated that the continuity of screening would be

  11. AFB Directory of Services Listings

    MedlinePlus

    ... 520) 770-3268 (TDD/TTY) Arizona Department of Economic Security: Rehabilitation Services Administration 1789 West Jefferson Street, ... Arizona Division Aging and Adult Services Department of Economic Security 1789 W. Jefferson, Site Code 950A-2SW ...

  12. 76 FR 21912 - Agency Information Collection Activities: Form I-363; Extension of an Existing Information...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-19

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Citizenship and Immigration Services Agency Information...-0022. The Department of Homeland Security, U.S. Citizenship and Immigration Services (USCIS) will be... directed to the Department of Homeland Security (DHS), USCIS, Chief, Regulatory Products Division, Office...

  13. 78 FR 77511 - Self-Regulatory Organizations; Fixed Income Clearing Corporation; Order Approving Proposed Rule...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-23

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71091; File No. SR-FICC-2013-09] Self...[supreg] at FICC's Government Securities Division December 17, 2013. I. Introduction On October 28, 2013, the Fixed Income Clearing Corporation (``FICC'') filed with the Securities and Exchange Commission...

  14. Aviation Security: Immediate Action Needed to Improve Security

    DOT National Transportation Integrated Search

    1996-08-01

    This is the statement of Keith O. Fultz, Assistant Comptroller General, Resources, Community, and Economic Development Division, General Accounting Office (GAO), before the Committee on Commerce, Science, and Transportation, U.S. Senate, on the threa...

  15. Design and implementation of a Windows NT network to support CNC activities

    NASA Technical Reports Server (NTRS)

    Shearrow, C. A.

    1996-01-01

    The Manufacturing, Materials, & Processes Technology Division is undergoing dramatic changes to bring it's manufacturing practices current with today's technological revolution. The Division is developing Computer Automated Design and Computer Automated Manufacturing (CAD/CAM) abilities. The development of resource tracking is underway in the form of an accounting software package called Infisy. These two efforts will bring the division into the 1980's in relationship to manufacturing processes. Computer Integrated Manufacturing (CIM) is the final phase of change to be implemented. This document is a qualitative study and application of a CIM application capable of finishing the changes necessary to bring the manufacturing practices into the 1990's. The documentation provided in this qualitative research effort includes discovery of the current status of manufacturing in the Manufacturing, Materials, & Processes Technology Division including the software, hardware, network and mode of operation. The proposed direction of research included a network design, computers to be used, software to be used, machine to computer connections, estimate a timeline for implementation, and a cost estimate. Recommendation for the division's improvement include action to be taken, software to utilize, and computer configurations.

  16. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Petru, Ernest Frank

    The Human Resources (HR) Division is a critical part of Los Alamos National Laboratory, an internationally recognized science and R&D facility with a specialized workforce of more than 10,000. The Laboratory’s mission is to solve national security challenges through scientific excellence. The HR Division partners with employees and managers to support the Laboratory in hiring, retaining, and motivating an exceptional workforce. The Laboratory is owned by the U.S. Department of Energy (DOE), with oversight by the DOE’s National Nuclear Security Administration (NNSA). In 2006, NNSA awarded the contract for managing and operating the Laboratory to Los Alamos National Security, LLCmore » (LANS), and a for-profit consortium. This report expounds on performance excellence efforts, presenting a strategic plan and operations.« less

  17. Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1984-04-13

    AD-fl143 023 SEMIANNUAL REPORT TO CONGRESS ON THEUEFFECTIVENESS OF i/i THE CIVIL AVIATION SECURITY PROGRAM(U) FEDERAL AVIATION ADMINISTRATION...Semiannual Report to O Congress on the US Deportmnent of TrasEffectiveness ofi of TransportationFedewl Avkffim Avao The Civil Aviation - Security Program... Aviation Security Program 8. Performing OrgniaetioNi RePwt Us. Aviation Security Division 9. Performing Organistion Name and Address 10. Work Unit No

  18. 12 CFR 563g.15 - Requests for interpretive advice or waiver.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ..., Corporate and Securities Division; (b) The provisions of this part to which the request relates, the... SECURITIES OFFERINGS § 563g.15 Requests for interpretive advice or waiver. Any requests to the Office for...

  19. 12 CFR 563g.15 - Requests for interpretive advice or waiver.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ..., Corporate and Securities Division; (b) The provisions of this part to which the request relates, the... SECURITIES OFFERINGS § 563g.15 Requests for interpretive advice or waiver. Any requests to the Office for...

  20. 12 CFR 563g.15 - Requests for interpretive advice or waiver.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ..., Corporate and Securities Division; (b) The provisions of this part to which the request relates, the... SECURITIES OFFERINGS § 563g.15 Requests for interpretive advice or waiver. Any requests to the Office for...

  1. 12 CFR 563g.15 - Requests for interpretive advice or waiver.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ..., Corporate and Securities Division; (b) The provisions of this part to which the request relates, the... SECURITIES OFFERINGS § 563g.15 Requests for interpretive advice or waiver. Any requests to the Office for...

  2. 12 CFR 563g.15 - Requests for interpretive advice or waiver.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ..., Corporate and Securities Division; (b) The provisions of this part to which the request relates, the... SECURITIES OFFERINGS § 563g.15 Requests for interpretive advice or waiver. Any requests to the Office for...

  3. 75 FR 21011 - Critical Infrastructure Partnership Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-22

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0032] Critical Infrastructure Partnership... Infrastructure Partnership Advisory Council (CIPAC) charter renewal. SUMMARY: The Department of Homeland Security... and Outreach Division, Office of Infrastructure Protection, National Protection and Programs...

  4. Physically secured orthogonal frequency division multiplexing-passive optical network employing noise-based encryption and signal recovery process

    NASA Astrophysics Data System (ADS)

    Jin, Wei; Zhang, Chongfu; Yuan, Weicheng

    2016-02-01

    We propose a physically enhanced secure scheme for direct detection-orthogonal frequency division multiplexing-passive optical network (DD-OFDM-PON) and long reach coherent detection-orthogonal frequency division multiplexing-passive optical network (LRCO-OFDM-PON), by employing noise-based encryption and channel/phase estimation. The noise data generated by chaos mapping are used to substitute training sequences in preamble to realize channel estimation and frame synchronization, and also to be embedded on variable number of key-selected randomly spaced pilot subcarriers to implement phase estimation. Consequently, the information used for signal recovery is totally hidden as unpredictable noise information in OFDM frames to mask useful information and to prevent illegal users from correctly realizing OFDM demodulation, and thereby enhancing resistance to attackers. The levels of illegal-decryption complexity and implementation complexity are theoretically discussed. Through extensive simulations, the performances of the proposed channel/phase estimation and the security introduced by encrypted pilot carriers have been investigated in both DD-OFDM and LRCO-OFDM systems. In addition, in the proposed secure DD-OFDM/LRCO-OFDM PON models, both legal and illegal receiving scenarios have been considered. These results show that, by utilizing the proposed scheme, the resistance to attackers can be significantly enhanced in DD-OFDM-PON and LRCO-OFDM-PON systems without performance degradations.

  5. 76 FR 5267 - Professional Conduct for Practitioners: Rules, Procedures, Representation, and Appearances...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-31

    ... provide the public with optimum opportunity to comment on the interim rule, DHS will reopen the comment... Aigbe, Chief, Regulatory Products Division, U.S. Citizenship and Immigration Services, Department of... Products Division, U.S. Citizenship and Immigration Services, Department of Homeland Security, 20...

  6. 78 FR 4881 - Excepted Service

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-23

    ....... DB130004 11/15/2012 Secretary. Office of Elementary Special Assistant.... DB120099 11/20/2012 and Secondary... Rights Division Senior Counselor..... DJ130013 11/20/2012 SECURITIES AND EXCHANGE Division of Risk... Education. Office of Elementary Deputy Assistant DB120003 11/20/2012 and Secondary Secretary for Policy...

  7. 40 CFR 11.5 - Procedures.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Procedures. 11.5 Section 11.5 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS...” shall be directed to: Director, Security and Inspection Division, Environmental Protection Agency...

  8. Volpe engineers use biometrics to help ease border crush

    DOT National Transportation Integrated Search

    1997-01-01

    Using technology previously reserved for military and other high security applications, engineers from the Safety and Security Systems Division of the Volpe Center have developed a number of automated biometric systems to speed the processing of freq...

  9. Desktop Computing Integration Project

    NASA Technical Reports Server (NTRS)

    Tureman, Robert L., Jr.

    1992-01-01

    The Desktop Computing Integration Project for the Human Resources Management Division (HRMD) of LaRC was designed to help division personnel use personal computing resources to perform job tasks. The three goals of the project were to involve HRMD personnel in desktop computing, link mainframe data to desktop capabilities, and to estimate training needs for the division. The project resulted in increased usage of personal computers by Awards specialists, an increased awareness of LaRC resources to help perform tasks, and personal computer output that was used in presentation of information to center personnel. In addition, the necessary skills for HRMD personal computer users were identified. The Awards Office was chosen for the project because of the consistency of their data requests and the desire of employees in that area to use the personal computer.

  10. Division of Computer Research Summary of Awards. Fiscal Year 1984.

    ERIC Educational Resources Information Center

    National Science Foundation, Washington, DC. Directorate for Mathematical and Physical Sciences.

    Provided in this report are summaries of grants awarded by the National Science Foundation Division of Computer Research in fiscal year 1984. Similar areas of research are grouped (for the purposes of this report only) into these major categories: (1) computational mathematics; (2) computer systems design; (3) intelligent systems; (4) software…

  11. 78 FR 37631 - Self-Regulatory Organizations; Fixed Income Clearing Corporation; Notice of Filing of Request To...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-21

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69774; File No. SR-FICC-2013-06] Self... Program for Certain Government Securities Division Rules Relating to the GCF Repo[supreg] Service June 17, 2013. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act''),\\1\\ notice is...

  12. 78 FR 68496 - Self-Regulatory Organizations; Fixed Income Clearing Corporation; Notice of Filing of Proposed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-14

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70831; File No. SR-FICC-2013-09] Self...[supreg] at FICC's Government Securities Division November 7, 2013. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that, on...

  13. 46 CFR 54.01-2 - Adoption of division 1 of section VIII of the ASME Boiler and Pressure Vessel Code.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 2 2013-10-01 2013-10-01 false Adoption of division 1 of section VIII of the ASME Boiler and Pressure Vessel Code. 54.01-2 Section 54.01-2 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING PRESSURE VESSELS General Requirements § 54.01-2 Adoption of division 1 of section VIII of the ASME Boiler and...

  14. 46 CFR 54.01-2 - Adoption of division 1 of section VIII of the ASME Boiler and Pressure Vessel Code.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 2 2011-10-01 2011-10-01 false Adoption of division 1 of section VIII of the ASME Boiler and Pressure Vessel Code. 54.01-2 Section 54.01-2 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING PRESSURE VESSELS General Requirements § 54.01-2 Adoption of division 1 of section VIII of the ASME Boiler and...

  15. 46 CFR 54.01-2 - Adoption of division 1 of section VIII of the ASME Boiler and Pressure Vessel Code.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 2 2012-10-01 2012-10-01 false Adoption of division 1 of section VIII of the ASME Boiler and Pressure Vessel Code. 54.01-2 Section 54.01-2 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING PRESSURE VESSELS General Requirements § 54.01-2 Adoption of division 1 of section VIII of the ASME Boiler and...

  16. 46 CFR 54.01-2 - Adoption of division 1 of section VIII of the ASME Boiler and Pressure Vessel Code.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 2 2010-10-01 2010-10-01 false Adoption of division 1 of section VIII of the ASME Boiler and Pressure Vessel Code. 54.01-2 Section 54.01-2 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING PRESSURE VESSELS General Requirements § 54.01-2 Adoption of division 1 of section VIII of the ASME Boiler and...

  17. 46 CFR 54.01-2 - Adoption of division 1 of section VIII of the ASME Boiler and Pressure Vessel Code.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 2 2014-10-01 2014-10-01 false Adoption of division 1 of section VIII of the ASME Boiler and Pressure Vessel Code. 54.01-2 Section 54.01-2 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING PRESSURE VESSELS General Requirements § 54.01-2 Adoption of division 1 of section VIII of the ASME Boiler and...

  18. Operationalising United Nations Security Council Resolution 1325 within the Australian Defence Force

    DTIC Science & Technology

    2016-01-01

    Hutchinson Joint & Operations Analysis Division Defence Science and Technology Group DST- Group -GD-0909 ABSTRACT This literature...LIMITATION UNCLASSIFIED UNCLASSIFIED Published by Joint & Operations Analysis Division Defence Science and Technology Group 506 Lorimer St...This page intentionally blank UNCLASSIFIED DST- Group -GD-0909 UNCLASSIFIED Contents 1. INTRODUCTION

  19. Securities and Exchange Commission Semiannual Regulatory Agenda

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-26

    ... Insurance Contracts 3235-AK49 DIVISION OF INVESTMENT MANAGEMENT--Final Rule Stage Regulation Sequence Title Identifier Number Number 425 Amendments to Form ADV 3235-AI17 DIVISION OF INVESTMENT MANAGEMENT--Completed... 15c2-2: Confirmation of Transactions in Open-End Management Investment Company 3235-AJ11 Shares, Unit...

  20. 77 FR 40626 - RP9580.210, Personal Assistance Services in Shelters Fact Sheet

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-10

    ... Affairs Division, Office of Chief Counsel, Federal Emergency Management Agency, Room 835, 500 C Street SW... by mail Federal Emergency Management Agency, Public Assistance Division, Room 408-67, 500 C Street SW... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID FEMA-2012-0014...

  1. 19 CFR 113.26 - Effective dates of bonds and riders.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Section 113.26 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY... of principal, address change, and addition of trade names and unincorporated divisions of a corporate... unincorporated divisions of a corporate principal are effective on the effective date identified on the rider. (e...

  2. 19 CFR 113.26 - Effective dates of bonds and riders.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Section 113.26 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY... of principal, address change, and addition of trade names and unincorporated divisions of a corporate... unincorporated divisions of a corporate principal are effective on the effective date identified on the rider. (e...

  3. 19 CFR 113.26 - Effective dates of bonds and riders.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Section 113.26 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY... of principal, address change, and addition of trade names and unincorporated divisions of a corporate... unincorporated divisions of a corporate principal are effective on the effective date identified on the rider. (e...

  4. 19 CFR 113.26 - Effective dates of bonds and riders.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Section 113.26 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY... of principal, address change, and addition of trade names and unincorporated divisions of a corporate... unincorporated divisions of a corporate principal are effective on the effective date identified on the rider. (e...

  5. 19 CFR 113.26 - Effective dates of bonds and riders.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Section 113.26 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY... of principal, address change, and addition of trade names and unincorporated divisions of a corporate... unincorporated divisions of a corporate principal are effective on the effective date identified on the rider. (e...

  6. 78 FR 7654 - Extension of Exemptions for Security-Based Swaps

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-04

    ..., Special Counsel, Office of Capital Markets Trends, Division of Corporation Finance, at (202) 551-3860, U.S... loans and indexes only of loans. The Division of Corporation Finance issued a no-action letter that...; commodity pools; business entities, such as corporations, partnerships, and trusts; employee benefit plans...

  7. 12 CFR 1777.10 - Developments prompting supervisory response.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...: (a) OFHEO's national House Price Index (HPI) for the most recent quarter is more than two percent... securities guaranteed by an enterprise, the HPI for the most recent quarter for such Division or Divisions is...) An Enterprise's publicly reported net income for the most recent calendar quarter is less than one...

  8. 12 CFR 1777.10 - Developments prompting supervisory response.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...: (a) OFHEO's national House Price Index (HPI) for the most recent quarter is more than two percent... securities guaranteed by an enterprise, the HPI for the most recent quarter for such Division or Divisions is...) An Enterprise's publicly reported net income for the most recent calendar quarter is less than one...

  9. 12 CFR 1777.10 - Developments prompting supervisory response.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...: (a) OFHEO's national House Price Index (HPI) for the most recent quarter is more than two percent... securities guaranteed by an enterprise, the HPI for the most recent quarter for such Division or Divisions is...) An Enterprise's publicly reported net income for the most recent calendar quarter is less than one...

  10. 77 FR 36292 - Notice Pursuant to the National Cooperative Research and Production Act of 1993-Border Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-18

    ... research, development, engineering and production of border security-related systems; and (iii) to insert.... Patricia A. Brink, Director of Civil Enforcement, Antitrust Division. [FR Doc. 2012-14766 Filed 6-15-12; 8...

  11. US-CERT Control System Center Input/Output (I/O) Conceputal Design

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    2005-02-01

    This document was prepared for the US-CERT Control Systems Center of the National Cyber Security Division (NCSD) of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs the federal departments to identify and prioritize critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the NCSD to address the control system security component addressed in the National Strategy to Secure Cyberspace andmore » the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems; the I/O upgrade described in this document supports these goals. The vulnerability assessment Test Bed, located in the Information Operations Research Center (IORC) facility at Idaho National Laboratory (INL), consists of a cyber test facility integrated with multiple test beds that simulate the nation's critical infrastructure. The fundamental mission of the Test Bed is to provide industry owner/operators, system vendors, and multi-agency partners of the INL National Security Division a platform for vulnerability assessments of control systems. The Input/Output (I/O) upgrade to the Test Bed (see Work Package 3.1 of the FY-05 Annual Work Plan) will provide for the expansion of assessment capabilities within the IORC facility. It will also provide capabilities to connect test beds within the Test Range and other Laboratory resources. This will allow real time I/O data input and communication channels for full replications of control systems (Process Control Systems [PCS], Supervisory Control and Data Acquisition Systems [SCADA], and components). This will be accomplished through the design and implementation of a modular infrastructure of control system, communications, networking, computing and associated equipment, and measurement/control devices. The architecture upgrade will provide a flexible patching system providing a quick ''plug and play''configuration through various communication paths to gain access to live I/O running over specific protocols. This will allow for in-depth assessments of control systems in a true-to-life environment. The full I/O upgrade will be completed through a two-phased approach. Phase I, funded by DHS, expands the capabilities of the Test Bed by developing an operational control system in two functional areas, the Science & Technology Applications Research (STAR) Facility and the expansion of various portions of the Test Bed. Phase II (see Appendix A), funded by other programs, will complete the full I/O upgrade to the facility.« less

  12. A novel quantum scheme for secure two-party distance computation

    NASA Astrophysics Data System (ADS)

    Peng, Zhen-wan; Shi, Run-hua; Zhong, Hong; Cui, Jie; Zhang, Shun

    2017-12-01

    Secure multiparty computational geometry is an essential field of secure multiparty computation, which computes a computation geometric problem without revealing any private information of each party. Secure two-party distance computation is a primitive of secure multiparty computational geometry, which computes the distance between two points without revealing each point's location information (i.e., coordinate). Secure two-party distance computation has potential applications with high secure requirements in military, business, engineering and so on. In this paper, we present a quantum solution to secure two-party distance computation by subtly using quantum private query. Compared to the classical related protocols, our quantum protocol can ensure higher security and better privacy protection because of the physical principle of quantum mechanics.

  13. Guidelines for development of NASA (National Aeronautics and Space Administration) computer security training programs

    NASA Technical Reports Server (NTRS)

    Tompkins, F. G.

    1983-01-01

    The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.

  14. 10 CFR 37.7 - Communications.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... regulations in this part may be sent as follows: (a) By mail addressed to: ATTN: Document Control Desk... Management Programs; or Director, Division of Security Policy, Office of Nuclear Security and Incident... electronic submission, for example, Electronic Information Exchange, or CD-ROM. Electronic submissions must...

  15. 28 CFR 16.91 - Exemption of Criminal Division Systems-limited access, as indicated.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...: (1) Central Criminal Division, Index File and Associated Records System of Records (JUSTICE/CRM-001... System of Records (JUSTICE/CRM-004)—Limited Access. These exemptions apply to the extent that information... Security File System of Records(JUSTICE/CRM-002). These exemptions apply to the extent that information in...

  16. Military Family Housing in the United States

    DTIC Science & Technology

    1993-09-01

    Deborah Clay- Mendez of CBO’s National Security Division and Lisa Siegel of CBO’s Budget Analysis Division prepared the study under the general...Aging of DoD’s Housing Beaufort Marine Corps Air Station in South Caro - Stock hna. (Photo courtesy of the General Accounting Office) DoD uses the

  17. 75 FR 54464 - Delegation of Authority to the Director of Its Division of Enforcement

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-08

    ... Division of Enforcement, in connection with the collection of delinquent debts arising from actions to enforce the federal securities laws, to terminate collection activity or discharge debts, to accept or reject offers to compromise debts, and to accept or reject offers to enter into payment plans. This...

  18. 78 FR 25128 - Self-Regulatory Organizations; Fixed Income Clearing Corporation; Notice of Filing of Amended...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-29

    ...: The Securities and Exchange Commission published a document in the Federal Register of April 17, 2013... contained an incorrect citation regarding the Director of the Division of Trading and Markets' delegated authority to publish notice of such an application. FOR FURTHER INFORMATION CONTACT: Neil Lombardo, Division...

  19. 15 CFR 745.1 - Advance notification and annual report of all exports of Schedule 1 chemicals to other States...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... address: Information Technology Team, Treaty Compliance Division, Bureau of Industry and Security, U.S... courier delivery to the following address: Information Technology Team, Treaty Compliance Division, Bureau... Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND...

  20. 50 CFR 253.12 - Guaranteed note, U.S. note, and security documents.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... substantial pledged assets other than the project property, and all major limited partners. The Division may... credit judgment, be less. (2) Maturity. This may not exceed 25 years, but shall not exceed the project... pledge of all project property (or adequate substitute collateral). The Division will require such other...

  1. 28 CFR 16.98 - Exemption of the Drug Enforcement Administration (DEA) Systems-limited access.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...) Planning and Inspection Division Records (Justice/DEA-010). (4) Operation Files (Justice/DEA-011). (5...); Planning and Inspection Division Records (Justice/DEA-010); and Security Files (Justice/DEA-013..., fabrication of testimony, and/or flight of the subject; reveal the details of a sensitive investigative or...

  2. 28 CFR 16.98 - Exemption of the Drug Enforcement Administration (DEA) Systems-limited access.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...) Planning and Inspection Division Records (Justice/DEA-010). (4) Operation Files (Justice/DEA-011). (5...); Planning and Inspection Division Records (Justice/DEA-010); and Security Files (Justice/DEA-013..., fabrication of testimony, and/or flight of the subject; reveal the details of a sensitive investigative or...

  3. 12 CFR 335.701 - Filing requirements, public reference, and confidentiality.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... filing any statement, report, or document under the Act may make a written objection to the public... FDIC's office in Washington, DC should be addressed as follows: Attention: Accounting and Securities... Insurance Corporation, Accounting and Securities Disclosure Section, Division of Supervision and Consumer...

  4. 28 CFR 0.72 - National Security Division.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... relating to terrorism; (6) Prosecute matters involving torture, genocide, and war crimes to the extent such... the Foreign Intelligence Surveillance Act; (7) Prosecute Federal crimes involving national security... offenses (49 U.S.C. 46501-07); aircraft sabotage (18 U.S.C. 32); crimes against internationally protected...

  5. 28 CFR 0.72 - National Security Division.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... relating to terrorism; (6) Prosecute matters involving torture, genocide, and war crimes to the extent such... the Foreign Intelligence Surveillance Act; (7) Prosecute Federal crimes involving national security... offenses (49 U.S.C. 46501-07); aircraft sabotage (18 U.S.C. 32); crimes against internationally protected...

  6. 28 CFR 0.72 - National Security Division.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... relating to terrorism; (6) Prosecute matters involving torture, genocide, and war crimes to the extent such... the Foreign Intelligence Surveillance Act; (7) Prosecute Federal crimes involving national security... offenses (49 U.S.C. 46501-07); aircraft sabotage (18 U.S.C. 32); crimes against internationally protected...

  7. 28 CFR 0.72 - National Security Division.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... relating to terrorism; (6) Prosecute matters involving torture, genocide, and war crimes to the extent such... the Foreign Intelligence Surveillance Act; (7) Prosecute Federal crimes involving national security... offenses (49 U.S.C. 46501-07); aircraft sabotage (18 U.S.C. 32); crimes against internationally protected...

  8. 28 CFR 0.72 - National Security Division.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... relating to terrorism; (6) Prosecute matters involving torture, genocide, and war crimes to the extent such... the Foreign Intelligence Surveillance Act; (7) Prosecute Federal crimes involving national security... offenses (49 U.S.C. 46501-07); aircraft sabotage (18 U.S.C. 32); crimes against internationally protected...

  9. Laboratory directed research and development program FY 1997

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1998-03-01

    This report compiles the annual reports of Laboratory Directed Research and Development projects supported by the Berkeley Lab. Projects are arranged under the following topical sections: (1) Accelerator and fusion research division; (2) Chemical sciences division; (3) Computing Sciences; (4) Earth sciences division; (5) Environmental energy technologies division; (6) life sciences division; (7) Materials sciences division; (8) Nuclear science division; (9) Physics division; (10) Structural biology division; and (11) Cross-divisional. A total of 66 projects are summarized.

  10. Marine Security of Hazardous Chemical Cargo

    DTIC Science & Technology

    2005-08-26

    Division 6.1 Poisonous liquids (by inhalation) Liquid pesticide 6 Division 4.2 Spont. combustible ( pyrophoric ) Barium alloys 7 Division 4.1 Flammable...25167-67-3 10,000 Fire 2.1 Carbon disulfide 75-15-0 20,000 Toxic 3 Carbon oxysulfide [Carbon oxide sulfide (COS)] 463-58-1 10,000 Fire 2.3 Chlorine...acid (conc 50% or greater) [Hydrofluoric acid] 7664-39-3 1,000 Toxic 8 Hydrogen selenide 7/5/7783 500 Toxic 2.3 Hydrogen sulfide 6/4/7783 10,000 Toxic

  11. 77 FR 34068 - Notice Pursuant to the National Cooperative Research and Production Act of 1993-Secure Content...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-08

    ... DEPARTMENT OF JUSTICE Antitrust Division Notice Pursuant to the National Cooperative Research and Production Act of 1993--Secure Content Storage Association, LLC Notice is hereby given that, on May 3, 2012, pursuant to Section 6(a) of the National Cooperative Research and Production Act of 1993, 15 U.S.C. 4301 et seq. (``the Act''), the Secure...

  12. 10 CFR 70.5 - Communications.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... milling, the Agreement States of Colorado, Utah, Texas and Washington should be contacted. [48 FR 16032... 10 Energy 2 2012-01-01 2012-01-01 false Communications. 70.5 Section 70.5 Energy NUCLEAR... Director, Division of Security Policy, Office of Nuclear Security and Incident Response, U.S. Nuclear...

  13. 75 FR 8355 - Agency Information Collection Activities: Announcement of Board Approval Under Delegated...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-24

    ...: Federal Reserve Board Clearance Officer--Michelle Shore--Division of Research and Statistics, Board of... delinquency and nonaccrual status of trading securities is not particularly meaningful given that these... proposed disclosure requirements regarding the delinquency and nonaccrual status of trading securities. The...

  14. Aviation Safety and Security: Challenges to Implementing the Recommendations of the White House Commission on Aviation Safety and Security -- GAO/T-RCED-97-90

    DOT National Transportation Integrated Search

    1997-03-05

    This statement before Congress by Gerald L. Dillingham, Associate Director, : Transportation Issues, Resources, Community, and Economic Development Division, : General Accounting Office (GAO) assesses the recommendations contained in the : recently r...

  15. 17 CFR 11.7 - Rights of witnesses.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Rights of witnesses. 11.7 Section 11.7 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES RELATING TO... Counsel, an Associate Director, or a Regional Counsel of the Division of Enforcement, or a Regional...

  16. 10 CFR 10.21 - Suspension of access authorization and/or employment clearance.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... ELIGIBILITY FOR ACCESS TO RESTRICTED DATA OR NATIONAL SECURITY INFORMATION OR AN EMPLOYMENT CLEARANCE... access authorization and/or an employment clearance, the Director, Division of Facilities and Security... Corporate Management and Chief Information Officer or other Deputy Executive Director, his or her...

  17. 10 CFR 10.21 - Suspension of access authorization and/or employment clearance.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... ELIGIBILITY FOR ACCESS TO RESTRICTED DATA OR NATIONAL SECURITY INFORMATION OR AN EMPLOYMENT CLEARANCE... access authorization and/or an employment clearance, the Director, Division of Facilities and Security... Corporate Management and Chief Information Officer or other Deputy Executive Director, his or her...

  18. 75 FR 10973 - Hazardous Materials: Risk-Based Adjustment of Transportation Security Plan Requirements

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-09

    ... fertilizers) in solids. quantities >3,000 L (793 gallons) in a single packaging. 5.2 Any quantity of Organic Any quantity of Organic None. peroxide, Type B, liquid peroxide, Type B, liquid or solid, temperature... ammonium nitrate fertilizers; (13) Division 6.1 Packing Group I toxic materials; (14) Division 6.2...

  19. An Analysis of Characteristics of Selected Unemployment Insurance Claimants with Implications for Vocational Education.

    ERIC Educational Resources Information Center

    Arkansas State Employment Security Div., Little Rock.

    In 1975, the Arkansas Employment Security Division conducted a telephone survey of 15,675 unemployed insurance claimants at the request of the Division of Vocational Education of the State Department of Education. The purpose of the survey was threefold: (1) to obtain detailed social and economic characteristics of the claimants, (2) to determine…

  20. 28 CFR 16.91 - Exemption of Criminal Division Systems-limited access, as indicated.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...: (1) Central Criminal Division, Index File and Associated Records System of Records (JUSTICE/CRM-001... Security File System of Records(JUSTICE/CRM-002). These exemptions apply to the extent that information in.... The records in these systems contain the names of the subjects of the files in question and the system...

  1. 28 CFR 16.91 - Exemption of Criminal Division Systems-limited access, as indicated.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...: (1) Central Criminal Division, Index File and Associated Records System of Records (JUSTICE/CRM-001... Security File System of Records(JUSTICE/CRM-002). These exemptions apply to the extent that information in.... The records in these systems contain the names of the subjects of the files in question and the system...

  2. 28 CFR 16.91 - Exemption of Criminal Division Systems-limited access, as indicated.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...: (1) Central Criminal Division, Index File and Associated Records System of Records (JUSTICE/CRM-001... Security File System of Records(JUSTICE/CRM-002). These exemptions apply to the extent that information in.... The records in these systems contain the names of the subjects of the files in question and the system...

  3. 28 CFR 16.91 - Exemption of Criminal Division Systems-limited access, as indicated.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...: (1) Central Criminal Division, Index File and Associated Records System of Records (JUSTICE/CRM-001... Security File System of Records(JUSTICE/CRM-002). These exemptions apply to the extent that information in.... The records in these systems contain the names of the subjects of the files in question and the system...

  4. Lawrence Livermore National Laboratory`s Computer Security Short Subjects Videos: Hidden Password, The Incident, Dangerous Games and The Mess; Computer Security Awareness Guide

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    A video on computer security is described. Lonnie Moore, the Computer Security Manager, CSSM/CPPM at Lawrence Livermore National Laboratory (LLNL) and Gale Warshawsky, the Coordinator for Computer Security Education and Awareness at LLNL, wanted to share topics such as computer ethics, software piracy, privacy issues, and protecting information in a format that would capture and hold an audience`s attention. Four Computer Security Short Subject videos were produced which ranged from 1--3 minutes each. These videos are very effective education and awareness tools that can be used to generate discussions about computer security concerns and good computing practices.

  5. Final Report for Bio-Inspired Approaches to Moving-Target Defense Strategies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fink, Glenn A.; Oehmen, Christopher S.

    This report records the work and contributions of the NITRD-funded Bio-Inspired Approaches to Moving-Target Defense Strategies project performed by Pacific Northwest National Laboratory under the technical guidance of the National Security Agency’s R6 division. The project has incorporated a number of bio-inspired cyber defensive technologies within an elastic framework provided by the Digital Ants. This project has created the first scalable, real-world prototype of the Digital Ants Framework (DAF)[11] and integrated five technologies into this flexible, decentralized framework: (1) Ant-Based Cyber Defense (ABCD), (2) Behavioral Indicators, (3) Bioinformatic Clas- sification, (4) Moving-Target Reconfiguration, and (5) Ambient Collaboration. The DAF canmore » be used operationally to decentralize many such data intensive applications that normally rely on collection of large amounts of data in a central repository. In this work, we have shown how these component applications may be decentralized and may perform analysis at the edge. Operationally, this will enable analytics to scale far beyond current limitations while not suffering from the bandwidth or computational limitations of centralized analysis. This effort has advanced the R6 Cyber Security research program to secure digital infrastructures by developing a dynamic means to adaptively defend complex cyber systems. We hope that this work will benefit both our client’s efforts in system behavior modeling and cyber security to the overall benefit of the nation.« less

  6. A Portable Computer Security Workshop

    ERIC Educational Resources Information Center

    Wagner, Paul J.; Phillips, Andrew T.

    2006-01-01

    We have developed a computer security workshop designed to instruct post-secondary instructors who want to start a course or laboratory exercise sequence in computer security. This workshop has also been used to provide computer security education to IT professionals and students. It is effective in communicating basic computer security principles…

  7. 75 FR 52325 - Agency Information Collection Activities; Proposed Collection; Comment Request: Title IV of the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-25

    ... the Public Health Security and Bioterrorism Preparedness and Response Act of 2002: Drinking Water... submitting comments. E-mail: [email protected] . Mail: EPA Water Docket, Environmental Protection Agency... . FOR FURTHER INFORMATION CONTACT: Karen Edwards, Water Security Division, Office of Ground Water and...

  8. 15 CFR 782.5 - Where to obtain APR report forms.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL REGULATIONS GENERAL... forms required by the APR may be downloaded from the Internet at http://www.ap.gov. You also may obtain these forms by contacting: Treaty Compliance Division, Bureau of Industry and Security, U.S. Department...

  9. 15 CFR 782.5 - Where to obtain APR report forms.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL REGULATIONS GENERAL... forms required by the APR may be downloaded from the Internet at http://www.ap.gov. You also may obtain these forms by contacting: Treaty Compliance Division, Bureau of Industry and Security, U.S. Department...

  10. 15 CFR 782.5 - Where to obtain APR report forms.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL REGULATIONS GENERAL... forms required by the APR may be downloaded from the Internet at http://www.ap.gov. You also may obtain these forms by contacting: Treaty Compliance Division, Bureau of Industry and Security, U.S. Department...

  11. 15 CFR 782.5 - Where to obtain APR report forms.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL REGULATIONS GENERAL... forms required by the APR may be downloaded from the Internet at http://www.ap.gov. You also may obtain these forms by contacting: Treaty Compliance Division, Bureau of Industry and Security, U.S. Department...

  12. 15 CFR 782.5 - Where to obtain APR report forms.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL REGULATIONS GENERAL... forms required by the APR may be downloaded from the Internet at http://www.ap.gov. You also may obtain these forms by contacting: Treaty Compliance Division, Bureau of Industry and Security, U.S. Department...

  13. 75 FR 31807 - Federal Property Suitable as Facilities To Assist the Homeless; Republication

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-04

    .... Albert Johnson, Department of the Navy, Asset Management Division, Naval Facilities Engineering Command..., and 75A Reasons: Secured Area Bldgs. 3550, 3551 Naval Base San Diego CA Landholding Agency: Navy... Reasons: Secured Area Maine Bldgs. B496 and 497 Bangor Internatl Airport Bangor ME 04401 Landholding...

  14. 77 FR 73669 - Response to Comments Received for the “The Menlo Report: Ethical Principles Guiding Information...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-11

    ... Technology Research'' (``The Menlo Report'') for the Department of Homeland Security (DHS), Science and Technology, Cyber Security Division (CSD), Protected Repository for the Defense of Infrastructure Against Cyber Threats (PREDICT) Project AGENCY: Science and Technology Directorate, DHS. ACTION: Response...

  15. 77 FR 2103 - Self-Regulatory Organizations; Fixed Income Clearing Corporation; Notice of Designation of Longer...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-13

    ...-Regulatory Organizations; Fixed Income Clearing Corporation; Notice of Designation of Longer Period for Commission Action on Proposed Rule Change To Allow the Mortgage-Backed Securities Division To Provide...''), and on November 21, 2011, amended a proposed rule change to allow the Mortgage-Backed Securities...

  16. 77 FR 64120 - Agency Information Collection Activities: Petition for CNMI-Only Nonimmigrant Transition Worker...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-18

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Citizenship and Immigration Services [OMB Control Number 1615.... SUMMARY: The Department of Homeland Security (DHS), U.S. Citizenship and Immigration Services (USCIS) will... Coordination Division, Office of Policy and Strategy, U.S. Citizenship and Immigration Services, Department of...

  17. 77 FR 55484 - Agency Information Collection Activities: Request to Enforce Affidavit of Financial Support and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-10

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Citizenship and Immigration Services [OMB Control Number 1615... Security (DHS), U.S. Citizenship and Immigration Services (USCIS) will be submitting the following... Coordination Division, Office of Policy and Strategy, U.S. Citizenship and Immigration Services, Department of...

  18. Reflections from a Computer Simulations Program on Cell Division in Selected Kenyan Secondary Schools

    ERIC Educational Resources Information Center

    Ndirangu, Mwangi; Kiboss, Joel K.; Wekesa, Eric W.

    2005-01-01

    The application of computer technology in education is a relatively new approach that is trying to justify inclusion in the Kenyan school curriculum. Being abstract, with a dynamic nature that does not manifest itself visibly, the process of cell division has posed difficulties for teachers. Consequently, a computer simulation program, using…

  19. Image secure transmission for optical orthogonal frequency-division multiplexing visible light communication systems using chaotic discrete cosine transform

    NASA Astrophysics Data System (ADS)

    Wang, Zhongpeng; Zhang, Shaozhong; Chen, Fangni; Wu, Ming-Wei; Qiu, Weiwei

    2017-11-01

    A physical encryption scheme for orthogonal frequency-division multiplexing (OFDM) visible light communication (VLC) systems using chaotic discrete cosine transform (DCT) is proposed. In the scheme, the row of the DCT matrix is permutated by a scrambling sequence generated by a three-dimensional (3-D) Arnold chaos map. Furthermore, two scrambling sequences, which are also generated from a 3-D Arnold map, are employed to encrypt the real and imaginary parts of the transmitted OFDM signal before the chaotic DCT operation. The proposed scheme enhances the physical layer security and improves the bit error rate (BER) performance for OFDM-based VLC. The simulation results prove the efficiency of the proposed encryption method. The experimental results show that the proposed security scheme not only protects image data from eavesdroppers but also keeps the good BER and peak-to-average power ratio performances for image-based OFDM-VLC systems.

  20. Job-related motivational factors among Malaysian employees.

    PubMed

    Manshor, Amat Taap; Abdullah, Adilah

    2002-12-01

    This study identified job-related motivational factors among Malaysian employees in several telecommunication companies. Responses were obtained from 1,179 employees at all levels up to senior managers and six different functional divisions, sales and marketing, human resources, finance, technical, information, technology, and support division. All employees were asked to rate the importance of Kovach's 10 job-motivational factors. These factors were good wages, job security, opportunity for career growth in the organization, good working conditions, interesting work, company loyalty to employees, tactful discipline, full appreciation of work done, sympathetic help with personal problems, and feeling of being involved in the organization. The top five factors employees identified as motivating them in their jobs were good wages, job security, company loyalty to employees, good working conditions, and full appreciation for work done. Findings were in accordance with Kovach for U.S. employees, in which the top motivational factors were good wages and job security.

  1. Econophysics and evolutionary economics (Scientific session of the Physical Sciences Division of the Russian Academy of Sciences, 2 November 2010)

    NASA Astrophysics Data System (ADS)

    2011-07-01

    The scientific session "Econophysics and evolutionary economics" of the Division of Physical Sciences of the Russian Academy of Sciences (RAS) took place on 2 November 2010 in the conference hall of the Lebedev Physical Institute, Russian Academy of Sciences. The session agenda announced on the website www.gpad.ac.ru of the RAS Physical Sciences Division listed the following reports: (1) Maevsky V I (Institute of Economics, RAS, Moscow) "The transition from simple reproduction to economic growth"; (2) Yudanov A Yu (Financial University of the Government of the Russian Federation, Moscow) "Experimental data on the development of fast-growing innovative companies in Russia"; (3) Pospelov I G (Dorodnitsyn Computation Center, RAS, Moscow) "Why is it sometimes possible to successfully model an economy? (4) Chernyavskii D S (Lebedev Physical Institute, RAS, Moscow) "Theoretical economics"; (5) Romanovskii M Yu (Prokhorov Institute of General Physics, RAS, Moscow) "Nonclassical random walks and the phenomenology of fluctuations of the yield of securities in the securities market"; (6) Dubovikov M M, Starchenko N V (INTRAST Management Company, Moscow Engineering Physics Institute, Moscow) "Fractal analysis of financial time series and the prediction problem"; Papers written on the basis of these reports are published below. • The transition from simple reproduction to economic growth, V I Maevsky, S Yu Malkov Physics-Uspekhi, 2011, Volume 54, Number 7, Pages 729-733 • High-growth firms in Russia: experimental data and prospects for the econophysical simulation of economic modernization, A Yu Yudanov Physics-Uspekhi, 2011, Volume 54, Number 7, Pages 733-737 • Equilibrium models of economics in the period of a global financial crisis, I G Pospelov Physics-Uspekhi, 2011, Volume 54, Number 7, Pages 738-742 • On econophysics and its place in modern theoretical economics, D S Chernavskii, N I Starkov, S Yu Malkov, Yu V Kosse, A V Shcherbakov Physics-Uspekhi, 2011, Volume 54, Number 7, Pages 742-749 • Nonclassical random walks and the phenomenology of fluctuations of securities returns in the stock market, P V Vidov, M Yu Romanovsky Physics-Uspekhi, 2011, Volume 54, Number 7, Pages 749-753 • Econophysics and the fractal analysis of financial time series, M M Dubovikov, N V Starchenko Physics-Uspekhi, 2011, Volume 54, Number 7, Pages 754-761

  2. Bayesian Research at the NASA Ames Research Center,Computational Sciences Division

    NASA Technical Reports Server (NTRS)

    Morris, Robin D.

    2003-01-01

    NASA Ames Research Center is one of NASA s oldest centers, having started out as part of the National Advisory Committee on Aeronautics, (NACA). The site, about 40 miles south of San Francisco, still houses many wind tunnels and other aviation related departments. In recent years, with the growing realization that space exploration is heavily dependent on computing and data analysis, its focus has turned more towards Information Technology. The Computational Sciences Division has expanded rapidly as a result. In this article, I will give a brief overview of some of the past and present projects with a Bayesian content. Much more than is described here goes on with the Division. The web pages at http://ic.arc. nasa.gov give more information on these, and the other Division projects.

  3. Podcast: The Electronic Crimes Division

    EPA Pesticide Factsheets

    Sept 26, 2016. Chris Lukas, the Special Agent in Charge of the Electronic Crimes Division within the OIG's Office of Investigations talks about computer forensics, cybercrime in the EPA and his division's role in criminal investigations.

  4. Overview of the CERT Resilience Management Model (CERT-RMM)

    DTIC Science & Technology

    2014-01-23

    Management Model (CERT®-RMM) Jim Cebula Technical Manager - Cyber Risk Management , CERT® Division Jim Cebula is the Technical Manager of the...Cyber Risk Management team in the Cyber Security Solutions Directorate of the CERT Division at the Software Engineering Institute (SEI), a unit of...Carnegie Mellon University. Cebula’s current activities include risk management methods along with assessment and management of operational

  5. 77 FR 50198 - Self-Regulatory Organizations; The Fixed Income Clearing Corporation; Notice of Filing Proposed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-20

    ... Time at Which the Mortgage-Backed Securities Division Runs Its Daily Morning Pass August 14, 2012... Division (``MBSD'') runs its first processing pass of the day from 2 p.m. to 4 p.m. Eastern Standard Time... MBSD intends to move the time at which it runs its first processing pass of the day (historically...

  6. Does the Acquisition of Mathematical Knowledge Make Students Better Problem Solvers? An Examination of Third Graders' Solutions of Division-with-Remainder (DWR) Problems.

    ERIC Educational Resources Information Center

    Guerrero, Lourdes; Rivera, Antonio

    Fourteen third graders were given numerical computation and division-with-remainder (DWR) problems both before and after they were taught the division algorithm in classrooms. Their solutions were examined. The results show that students' initial acquisition of the division algorithm did improve their performance in numerical division computations…

  7. 75 FR 65881 - Ownership Limitations and Governance Requirements for Security-Based Swap Clearing Agencies...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-26

    ... or make available for trading security-based swaps: Nancy Burke-Sanow, Assistant Director, at (202... Cong. (2008) (Statement of Erik Sirri, Director of the Division of Trading and Markets, Commission..., 2009, and letter from Ann K. Shuman, Managing Director and Deputy General Counsel, CME, to Elizabeth...

  8. 75 FR 54675 - Self-Regulatory Organizations; Fixed Income Clearing Corporation; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-08

    ... waive FICC's rules, procedures, and regulations of the Mortgage-Backed Securities Division. II. Self... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62796; File No. SR-FICC-2010-06] Self... Proposed Rule Change To Amend Rules Relating to Authority To Waive Rules, Procedures, and Regulations of...

  9. 75 FR 18887 - Division of Longshore and Harbor Workers' Compensation; Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-13

    ... covered employers to secure the payment of compensation under the Act and its extensions by purchasing... becoming authorized self-insured employers (33 U.S.C. 932 et seq). Each authorized insurance carrier (or... authorized self-insurer (or employer seeking authorization) is required to fully secure its Longshore Act...

  10. Emergency Management Standards for NCAA Division I-A Football Stadia

    ERIC Educational Resources Information Center

    Hoogstra, Joshua R.

    2012-01-01

    In the best of times, emergency managers of athletic event venues struggle with the responsibilities of venue security. The possibility of terrorist threats exacerbates the situation, especially when security threats can involve a critical mass of spectators at an event. Emergency managers at the National Collegiate Athletic Association (NCAA)…

  11. 15 CFR 745.2 - End-Use Certificate reporting requirements under the Chemical Weapons Convention.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... by mail or courier delivery to the following address: Information Technology Team, Treaty Compliance Division, Bureau of Industry and Security, U.S. Department of Commerce, Room 4515, 14th Street and... Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE...

  12. 77 FR 74249 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-13

    ... System (``FINRA ADDS'') is a secure Web site that provides a firm, by market participant identifier... generates a separate report for each data archive (Asset-Backed Securities or Corporate/Agency Debt..., 2013. For the Commission, by the Division of Trading and Markets, pursuant to delegated authority.\\11...

  13. 77 FR 20536 - Exemptions for Security-Based Swaps Issued by Certain Clearing Agencies

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-05

    ... Markets Trends, Division of Corporation Finance, at (202) 551-3860, U.S. Securities and Exchange... exchange trading due to individual business needs of certain users. Those users should retain the ability... Corporation Finance issued a no-action letter that addressed the availability of these interim exemptions to...

  14. 75 FR 82581 - Federal Acquisition Regulation; Federal Acquisition Circular 2005-48; Small Entity Compliance Guide

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-30

    ..., Payrolls and Basic Records to delete the requirement for submission of full social security numbers and... requires contractors and subcontractors to maintain the full social security number and current address of... Wage and Hour Division of the Department of Labor for purposes of an investigation or audit of...

  15. 77 FR 50521 - Agency Information Collection Activities: Under Section 245A of the INA, Form I-687; Extension...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-21

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Citizenship and Immigration Services [OMB Control Number 1615... Homeland Security (DHS), U.S. Citizenship and Immigration Services (USCIS) will be submitting the following... Coordination Division, Office of Policy and Strategy, U.S. Citizenship and Immigration Services, Department of...

  16. Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1983-10-21

    Aviation Security Program -s fro January 1 -June 30, 1983 c> CD C_3 LU DTIC ELECTE NOV 1 8 1983 D <sS^ B Washington, O.C. 20691 October...Effectiveness of the Civil Aviation Security Program 7. A-.W.) Aviation Security Division V. P»tf»m..»» 0>|fi •« Nam» «n4 Aa^rai» DOT/Federal...Aviation Administration Office of Civil Aviation Security 800 Independence Avenue, SW. Washington, P.C. 20591 1. ••€•*.»•<•’• Caiala*. Na. S.

  17. Who’s on First: Unraveling the Complexity of the United States’ Food and Agricultural Regulatory System in the Realm of Homeland Security

    DTIC Science & Technology

    2009-12-01

    a weapon in food and water. The case involved the radiological poisoning of former Russian spy Alexander Litvinenko with Polonium 210 . An article...SECURITY Gary Wayne Elliott Emergency Management Coordinator for Environmental Health and Division of Food Protection Supervisor, South Carolina...31 c. Bioterrorism, Biodefense, and Health Security .....................31 9. Other Barriers to Comprehensible Food Safety/Defense

  18. Implementation and evaluation of an efficient secure computation system using ‘R’ for healthcare statistics

    PubMed Central

    Chida, Koji; Morohashi, Gembu; Fuji, Hitoshi; Magata, Fumihiko; Fujimura, Akiko; Hamada, Koki; Ikarashi, Dai; Yamamoto, Ryuichi

    2014-01-01

    Background and objective While the secondary use of medical data has gained attention, its adoption has been constrained due to protection of patient privacy. Making medical data secure by de-identification can be problematic, especially when the data concerns rare diseases. We require rigorous security management measures. Materials and methods Using secure computation, an approach from cryptography, our system can compute various statistics over encrypted medical records without decrypting them. An issue of secure computation is that the amount of processing time required is immense. We implemented a system that securely computes healthcare statistics from the statistical computing software ‘R’ by effectively combining secret-sharing-based secure computation with original computation. Results Testing confirmed that our system could correctly complete computation of average and unbiased variance of approximately 50 000 records of dummy insurance claim data in a little over a second. Computation including conditional expressions and/or comparison of values, for example, t test and median, could also be correctly completed in several tens of seconds to a few minutes. Discussion If medical records are simply encrypted, the risk of leaks exists because decryption is usually required during statistical analysis. Our system possesses high-level security because medical records remain in encrypted state even during statistical analysis. Also, our system can securely compute some basic statistics with conditional expressions using ‘R’ that works interactively while secure computation protocols generally require a significant amount of processing time. Conclusions We propose a secure statistical analysis system using ‘R’ for medical data that effectively integrates secret-sharing-based secure computation and original computation. PMID:24763677

  19. Implementation and evaluation of an efficient secure computation system using 'R' for healthcare statistics.

    PubMed

    Chida, Koji; Morohashi, Gembu; Fuji, Hitoshi; Magata, Fumihiko; Fujimura, Akiko; Hamada, Koki; Ikarashi, Dai; Yamamoto, Ryuichi

    2014-10-01

    While the secondary use of medical data has gained attention, its adoption has been constrained due to protection of patient privacy. Making medical data secure by de-identification can be problematic, especially when the data concerns rare diseases. We require rigorous security management measures. Using secure computation, an approach from cryptography, our system can compute various statistics over encrypted medical records without decrypting them. An issue of secure computation is that the amount of processing time required is immense. We implemented a system that securely computes healthcare statistics from the statistical computing software 'R' by effectively combining secret-sharing-based secure computation with original computation. Testing confirmed that our system could correctly complete computation of average and unbiased variance of approximately 50,000 records of dummy insurance claim data in a little over a second. Computation including conditional expressions and/or comparison of values, for example, t test and median, could also be correctly completed in several tens of seconds to a few minutes. If medical records are simply encrypted, the risk of leaks exists because decryption is usually required during statistical analysis. Our system possesses high-level security because medical records remain in encrypted state even during statistical analysis. Also, our system can securely compute some basic statistics with conditional expressions using 'R' that works interactively while secure computation protocols generally require a significant amount of processing time. We propose a secure statistical analysis system using 'R' for medical data that effectively integrates secret-sharing-based secure computation and original computation. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  20. U.S. Geological Survey National Computer Technology Meeting; Program and abstracts, May 7-11, 1990

    USGS Publications Warehouse

    Balthrop, B. H.; Baker, E.G.

    1990-01-01

    Computer-related information from all Divisions of the U.S. Geological Survey are discussed in this compilation of abstracts. Some of the topics addressed are system administration; distributed information systems and data bases, both current (1990) and proposed; hydrologic applications; national water information systems; geographic information systems applications and techniques. The report contains some of the abstracts that were presented at the National Computer Technology Meeting that was held in May 1990. The meeting was sponsored by the Water Resources Division and was attended by more than 200 technical and managerial personnel representing all the Divisions of the U.S. Geological Survey. (USGS)

  1. Exploring Factors That Affect Adoption of Computer Security Practices among College Students

    ERIC Educational Resources Information Center

    Alqarni, Amani

    2017-01-01

    Cyber-attacks threaten the security of computer users' information, networks, machines, and privacy. Studies of computer security education, awareness, and training among ordinary computer users, college students, non-IT-oriented user groups, and non-technically trained citizens are limited. Most research has focused on computer security standards…

  2. Human errors and violations in computer and information security: the viewpoint of network administrators and security specialists.

    PubMed

    Kraemer, Sara; Carayon, Pascale

    2007-03-01

    This paper describes human errors and violations of end users and network administration in computer and information security. This information is summarized in a conceptual framework for examining the human and organizational factors contributing to computer and information security. This framework includes human error taxonomies to describe the work conditions that contribute adversely to computer and information security, i.e. to security vulnerabilities and breaches. The issue of human error and violation in computer and information security was explored through a series of 16 interviews with network administrators and security specialists. The interviews were audio taped, transcribed, and analyzed by coding specific themes in a node structure. The result is an expanded framework that classifies types of human error and identifies specific human and organizational factors that contribute to computer and information security. Network administrators tended to view errors created by end users as more intentional than unintentional, while errors created by network administrators as more unintentional than intentional. Organizational factors, such as communication, security culture, policy, and organizational structure, were the most frequently cited factors associated with computer and information security.

  3. A novel quantum solution to secure two-party distance computation

    NASA Astrophysics Data System (ADS)

    Peng, Zhen-wan; Shi, Run-hua; Wang, Pan-hong; Zhang, Shun

    2018-06-01

    Secure Two-Party Distance Computation is an important primitive of Secure Multiparty Computational Geometry that it involves two parties, where each party has a private point, and the two parties want to jointly compute the distance between their points without revealing anything about their respective private information. Secure Two-Party Distance Computation has very important and potential applications in settings of high secure requirements, such as privacy-preserving Determination of Spatial Location-Relation, Determination of Polygons Similarity, and so on. In this paper, we present a quantum protocol for Secure Two-Party Distance Computation by using QKD-based Quantum Private Query. The security of the protocol is based on the physical principles of quantum mechanics, instead of difficulty assumptions, and therefore, it can ensure higher security than the classical related protocols.

  4. Emboldened Cooperative Security: Globalization and 21st Century U.S. Security

    DTIC Science & Technology

    2007-03-26

    be reaped from the international division of labor.”1 Globalization has been described as the worldwide integration of the flow of trade , capital...security can be considered as prerequisites for the success of the globalization of free markets. His conception of state autonomy, free trade , and anti...is “The right of every business man, large and small, to trade in an atmosphere of freedom from unfair competition and domination by monopolies at

  5. Arrangement on the Recognition of Common Criteria Certificates In the Field of Information Technology Security

    DTIC Science & Technology

    2000-05-01

    Security Establishment from Canada and Ministry of Finance from Finland and Service Central de la Sécurité des Systèmes d’Information from France and...Nazionale per la Sicurezza CESIS III Reparto - UCSi from Italy and Ministry of the Interior and Kingdom Relations from The Netherlands and Page 3 of...39 HQ Defence Command Norway/Security Division from Norway and Ministerio de Administraciones Públicas from Spain and Communications-Electronics

  6. China’s Holdings of U.S. Securities: Implications for the U.S. Economy

    DTIC Science & Technology

    2008-05-19

    billion as of June 2007) and Macao ($2.0 billion). These entities , though part of China, are reported separately by Treasury. 11 In comparison, Japan’s...term U.S. Treasury securities (excluding nonmarketable Treasury bonds), as reported by banks, securities brokers and dealers, and other entities in the...Division Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour

  7. Cost Comparative Analysis of Blast Mitigation Technologies with Regard to Explosive Remnants of War (ERW)

    DTIC Science & Technology

    2011-12-01

    Division, 1998) ............................................................................13  Figure 7:  Papercrete Block with Mortar (From The Center for...40.5 inches x 10 1/8 inch wide): 2 X $71.25 = $142.50 - 55-gallon industrial plastic trash cans: $55.00 20 - 5-gallon 3M Fastbond insulation...off in physical security with regard to the access of a plastic container, compared to a steel box with a high-security hasp lock. Added security

  8. 78 FR 35326 - Division of Longshore and Harbor Workers' Compensation; Proposed Extension of Existing Collection...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-12

    ...' Compensation Act (LHWCA) requires covered employers to secure the payment of compensation under the Act and its... Insurance, or by becoming authorized self-insured employers (33 U.S.C. 932 et seq). Each authorized.... Similarly, each authorized self-insurer (or employer seeking authorization) is required to fully secure its...

  9. 10 CFR 10.12 - Interview and other investigation.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Interview and other investigation. 10.12 Section 10.12... Eligibility for Access to Restricted Data or National Security Information or an Employment Clearance § 10.12... pursuant to § 10.11(a) (5) and (12). (c) If the Director, Division of Facilities and Security, cannot make...

  10. 10 CFR 10.12 - Interview and other investigation.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Interview and other investigation. 10.12 Section 10.12... Eligibility for Access to Restricted Data or National Security Information or an Employment Clearance § 10.12... pursuant to § 10.11(a) (5) and (12). (c) If the Director, Division of Facilities and Security, cannot make...

  11. 10 CFR 10.12 - Interview and other investigation.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Interview and other investigation. 10.12 Section 10.12... Eligibility for Access to Restricted Data or National Security Information or an Employment Clearance § 10.12... pursuant to § 10.11(a) (5) and (12). (c) If the Director, Division of Facilities and Security, cannot make...

  12. 76 FR 81517 - Submission for Review and Comment: “The Menlo Report: Ethical Principles Guiding Information and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-28

    ...'' (``Menlo Report'') for the Department of Homeland Security (DHS), Science and Technology, Cyber Security Division (CSD), Protected Repository for the Defense of Infrastructure Against Cyber Threats (PREDICT... be found at: http://www.cyber.st.dhs.gov/wp-content/uploads/2011/12/MenloPrinciplesCORE-20110915-r560...

  13. 17 CFR 200.20b - Director of Division of Investment Management.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... registered under the Investment Company Act of 1940 (15 U.S.C. 80a-1 et seq.) and pooled investment funds or... registered under the Investment Company Act of 1940 and pooled investment funds or accounts in connection... Investment Management. 200.20b Section 200.20b Commodity and Securities Exchanges SECURITIES AND EXCHANGE...

  14. Secure Multiparty Quantum Computation for Summation and Multiplication.

    PubMed

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2016-01-21

    As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics.

  15. Secure Multiparty Quantum Computation for Summation and Multiplication

    PubMed Central

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2016-01-01

    As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics. PMID:26792197

  16. A Computer Security Course in the Undergraduate Computer Science Curriculum.

    ERIC Educational Resources Information Center

    Spillman, Richard

    1992-01-01

    Discusses the importance of computer security and considers criminal, national security, and personal privacy threats posed by security breakdown. Several examples are given, including incidents involving computer viruses. Objectives, content, instructional strategies, resources, and a sample examination for an experimental undergraduate computer…

  17. Information Security: Governmentwide Guidance Needed to Assist Agencies in Implementing Cloud Computing

    DTIC Science & Technology

    2010-07-01

    Cloud computing , an emerging form of computing in which users have access to scalable, on-demand capabilities that are provided through Internet... cloud computing , (2) the information security implications of using cloud computing services in the Federal Government, and (3) federal guidance and...efforts to address information security when using cloud computing . The complete report is titled Information Security: Federal Guidance Needed to

  18. 76 FR 7818 - Announcing a Meeting of the Information Security and Privacy Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-11

    ... will be open to the public. The ISPAB was established by the Computer Security Act of 1987 (Pub. L. 100..., --Presentation on Science of Security relating to computer security research, --Presentation on Access of..., --A panel of Inspector Generals regarding privacy and security, and --Update on NIST Computer Security...

  19. Barriers and Potential Improvements for Needle and Syringe Exchange Programs (NSPs) in China: A Qualitative Study from Perspectives of Both Health and Public Security Sectors

    PubMed Central

    Chow, Eric P. F.; Jing, Jun; Zheng, Jun; Zhao, Junshi; Zhang, Lei

    2015-01-01

    This study explores the acceptability, the barriers to the implementation of needle and syringe exchange programs (NSPs) and the potential improvement strategies in China from the perspectives of governmental health and public security officials. Purposive sampling was used for recruitment of participants who had been involved in NSPs implementation. Semi-Structured individual interviews were conducted in Mandarin to address three aspects of NSPs: (1) participants’ attitudes towards NSPs, (2) participants’ opinions on the effectiveness and barriers of NSPs, and (3) suggestions for improving the program. Content analysis was used to analyse the translated interview data. A total of 68 participants from 12 Hunan counties were interviewed (34 from each of the Bureau of Health and the Narcotic Division). Both groups recognised the importance and effectiveness of NSPs in HIV prevention, but public security officials regarded NSPs as a temporary intervention in place of punitive measures. Most health officials (32/34) regarded the main barriers to its implementation as administrative and structural, whereas participants from Narcotics Division (n=24) questioned the legitimacy of NSPs and concerned about the poor management of drug users’ risk behaviours. Close cooperation between the health and public security sectors, engagement of the drug user community and an enabling policy environment were reportedly to be critical for potential improvements of NSPs in China. Misconceptions about NSPs encourage drug users’ addictive behaviour, and an unclear leadership and insufficient support de-motivate the participants from the Bureau of Health and the Narcotics Division to actively support the program implementation. PMID:26114556

  20. Lightning Talks 2015: Theoretical Division

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shlachter, Jack S.

    2015-11-25

    This document is a compilation of slides from a number of student presentations given to LANL Theoretical Division members. The subjects cover the range of activities of the Division, including plasma physics, environmental issues, materials research, bacterial resistance to antibiotics, and computational methods.

  1. Computational and Experimental Evaluation of a Complex Inlet Swirl Pattern Generation System (POSTPRINT)

    DTIC Science & Technology

    2016-08-01

    Sanders, Chase A. Nessler, William W. Copenhaver, Michael G. List, and Timothy J. Janczewski Turbomachinery Branch Turbine Engine Division AUGUST...Branch Turbine Engine Division Turbine Engine Division Aerospace Systems Directorate //Signature// ROBERT D. HANCOCK Principal Scientist Turbine ...ORGANIZATION Turbomachinery Branch Turbine Engine Division Air Force Research Laboratory, Aerospace Systems Directorate Wright-Patterson Air Force

  2. Antiterrorist Software

    NASA Technical Reports Server (NTRS)

    Clark, David A.

    1998-01-01

    In light of the escalation of terrorism, the Department of Defense spearheaded the development of new antiterrorist software for all Government agencies by issuing a Broad Agency Announcement to solicit proposals. This Government-wide competition resulted in a team that includes NASA Lewis Research Center's Computer Services Division, who will develop the graphical user interface (GUI) and test it in their usability lab. The team launched a program entitled Joint Sphere of Security (JSOS), crafted a design architecture (see the following figure), and is testing the interface. This software system has a state-ofthe- art, object-oriented architecture, with a main kernel composed of the Dynamic Information Architecture System (DIAS) developed by Argonne National Laboratory. DIAS will be used as the software "breadboard" for assembling the components of explosions, such as blast and collapse simulations.

  3. U.S. Geological Survey national computer technology meeting; program and abstracts, New Orleans, Louisiana, April 10-15, 1994

    USGS Publications Warehouse

    Balthrop, B. H.; Baker, E.G.

    1994-01-01

    This report contains some of the abstracts of papers that were presented at the National Computer Technology Meeting that was held in April 1994. This meeting was sponsored by the Water Resources Division of the U.S. Geological Survey, and was attended by more than 200 technical and managerial personnel representing all the Divisions of the U.S. Geological Survey. Computer-related information from all Divisions of the U.S. Geological Survey are discussed in this compilation of abstracts. Some of the topics addressed are data transfer, data-base management, hydrologic applications, national water information systems, and geographic information systems applications and techniques.

  4. SEED: A Suite of Instructional Laboratories for Computer Security Education

    ERIC Educational Resources Information Center

    Du, Wenliang; Wang, Ronghua

    2008-01-01

    The security and assurance of our computing infrastructure has become a national priority. To address this priority, higher education has gradually incorporated the principles of computer and information security into the mainstream undergraduate and graduate computer science curricula. To achieve effective education, learning security principles…

  5. Can Peer Instruction Be Effective in Upper-Division Computer Science Courses?

    ERIC Educational Resources Information Center

    Bailey Lee, Cynthia; Garcia, Saturnino; Porter, Leo

    2013-01-01

    Peer Instruction (PI) is an active learning pedagogical technique. PI lectures present students with a series of multiple-choice questions, which they respond to both individually and in groups. PI has been widely successful in the physical sciences and, recently, has been successfully adopted by computer science instructors in lower-division,…

  6. 48 CFR 952.204-77 - Computer security.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 5 2012-10-01 2012-10-01 false Computer security. 952.204... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 952.204-77 Computer security. As prescribed in 904.404(d)(7), the following clause shall be included: Computer Security (AUG 2006) (a...

  7. 48 CFR 952.204-77 - Computer security.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 5 2013-10-01 2013-10-01 false Computer security. 952.204... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 952.204-77 Computer security. As prescribed in 904.404(d)(7), the following clause shall be included: Computer Security (AUG 2006) (a...

  8. 48 CFR 952.204-77 - Computer security.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Computer security. 952.204... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 952.204-77 Computer security. As prescribed in 904.404(d)(7), the following clause shall be included: Computer Security (AUG 2006) (a...

  9. 48 CFR 952.204-77 - Computer security.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Computer security. 952.204... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 952.204-77 Computer security. As prescribed in 904.404(d)(7), the following clause shall be included: Computer Security (AUG 2006) (a...

  10. 48 CFR 952.204-77 - Computer security.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Computer security. 952.204... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 952.204-77 Computer security. As prescribed in 904.404(d)(7), the following clause shall be included: Computer Security (AUG 2006) (a...

  11. Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation

    DTIC Science & Technology

    2016-07-14

    of the important properties of secure computation . In particular, it is known that full fairness cannot be achieved in the case of two-party com...Jakobsen, J. Nielsen, and C. Orlandi. A framework for outsourcing of secure computation . In ACM Workshop on Cloud Computing Security (CCSW), pages...Function Evaluation with Applications to Genomic Computation Abstract: Computation based on genomic data is becoming increasingly popular today, be it

  12. Method for transferring data from an unsecured computer to a secured computer

    DOEpatents

    Nilsen, Curt A.

    1997-01-01

    A method is described for transferring data from an unsecured computer to a secured computer. The method includes transmitting the data and then receiving the data. Next, the data is retransmitted and rereceived. Then, it is determined if errors were introduced when the data was transmitted by the unsecured computer or received by the secured computer. Similarly, it is determined if errors were introduced when the data was retransmitted by the unsecured computer or rereceived by the secured computer. A warning signal is emitted from a warning device coupled to the secured computer if (i) an error was introduced when the data was transmitted or received, and (ii) an error was introduced when the data was retransmitted or rereceived.

  13. Computer Security Models

    DTIC Science & Technology

    1984-09-01

    Verification Technique for a Class of Security Kernels," International Symposium on Programming , Lecture Notes in Computer Science 137, Springer-Verlag, New York...September 1984 MTR9S31 " J. K. Millen Computer Security C. M. Cerniglia Models * 0 Ne c - ¢- C. S• ~CONTRACT SPONSOR OUSDRE/C31 & ESO/ALEE...ABSTRACT The purpose of this report is to provide a basis for evaluating security models in the context of secure computer system development

  14. Home Computer and Internet User Security

    DTIC Science & Technology

    2005-01-01

    Information Security Model © 2005 Carnegie Mellon University (Lawrence R. Rogers, Author) Home Computer and Internet User Security...Carnegie Mellon University (Lawrence R. Rogers, Author) Home Computer and Internet User Security Version 1.0.4 – slide 50 Contact Information Lawrence R. Rogers • Email: cert@cert.org CERT website: http://www.cert.org/ ...U.S. Patent and Trademark Office Home Computer and Internet User Security Report Documentation Page Form ApprovedOMB

  15. 76 FR 36438 - Special Local Regulations; Safety and Security Zones; Recurring Events in Captain of the Port...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-22

    ... Events in Captain of the Port Long Island Sound Zone AGENCY: Coast Guard, DHS. ACTION: Notice of proposed... security zone in the Coast Guard Sector Long Island Sound Captain of the Port (COTP) Zone. When these..., call or e-mail Petty Officer Joseph Graun, Waterways Management Division at Coast Guard Sector Long...

  16. Computer Security and the Data Encryption Standard. Proceedings of the Conference on Computer Security and the Data Encryption Standard.

    ERIC Educational Resources Information Center

    Branstad, Dennis K., Ed.

    The 15 papers and summaries of presentations in this collection provide technical information and guidance offered by representatives from federal agencies and private industry. Topics discussed include physical security, risk assessment, software security, computer network security, and applications and implementation of the Data Encryption…

  17. A New Random Walk for Replica Detection in WSNs.

    PubMed

    Aalsalem, Mohammed Y; Khan, Wazir Zada; Saad, N M; Hossain, Md Shohrab; Atiquzzaman, Mohammed; Khan, Muhammad Khurram

    2016-01-01

    Wireless Sensor Networks (WSNs) are vulnerable to Node Replication attacks or Clone attacks. Among all the existing clone detection protocols in WSNs, RAWL shows the most promising results by employing Simple Random Walk (SRW). More recently, RAND outperforms RAWL by incorporating Network Division with SRW. Both RAND and RAWL have used SRW for random selection of witness nodes which is problematic because of frequently revisiting the previously passed nodes that leads to longer delays, high expenditures of energy with lower probability that witness nodes intersect. To circumvent this problem, we propose to employ a new kind of constrained random walk, namely Single Stage Memory Random Walk and present a distributed technique called SSRWND (Single Stage Memory Random Walk with Network Division). In SSRWND, single stage memory random walk is combined with network division aiming to decrease the communication and memory costs while keeping the detection probability higher. Through intensive simulations it is verified that SSRWND guarantees higher witness node security with moderate communication and memory overheads. SSRWND is expedient for security oriented application fields of WSNs like military and medical.

  18. A New Random Walk for Replica Detection in WSNs

    PubMed Central

    Aalsalem, Mohammed Y.; Saad, N. M.; Hossain, Md. Shohrab; Atiquzzaman, Mohammed; Khan, Muhammad Khurram

    2016-01-01

    Wireless Sensor Networks (WSNs) are vulnerable to Node Replication attacks or Clone attacks. Among all the existing clone detection protocols in WSNs, RAWL shows the most promising results by employing Simple Random Walk (SRW). More recently, RAND outperforms RAWL by incorporating Network Division with SRW. Both RAND and RAWL have used SRW for random selection of witness nodes which is problematic because of frequently revisiting the previously passed nodes that leads to longer delays, high expenditures of energy with lower probability that witness nodes intersect. To circumvent this problem, we propose to employ a new kind of constrained random walk, namely Single Stage Memory Random Walk and present a distributed technique called SSRWND (Single Stage Memory Random Walk with Network Division). In SSRWND, single stage memory random walk is combined with network division aiming to decrease the communication and memory costs while keeping the detection probability higher. Through intensive simulations it is verified that SSRWND guarantees higher witness node security with moderate communication and memory overheads. SSRWND is expedient for security oriented application fields of WSNs like military and medical. PMID:27409082

  19. 78 FR 71629 - Technical Resource for Incident Prevention (TRIPwire) User Registration

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-29

    ...), Office of Infrastructure Protection (IP), Protective Security Coordination Division (PSCD), Office for... INFORMATION CONTACT: William Cooper, DHS/NPPD/IP/PSCD/OBP, [email protected] . SUPPLEMENTARY...

  20. Wavelength division multiplexing of chaotic secure and fiber-optic communications.

    PubMed

    Zhang, Jian-Zhong; Wang, An-Bang; Wang, Juan-Fen; Wang, Yun-Cai

    2009-04-13

    Wavelength division multiplexing (WDM) transmission of chaotic optical communication (COC) and conventional fiber-optic communication (CFOC) is numerically confirmed and analyzed. For an 80-km-long two-channel communication system, a 1-Gb/s secure message in COC channel and 10-Gb/s digital signal in CFOC channel are simultaneously achieved with 100 GHz channel spacing. Our numerical simulations demonstrate that the COC and CFOC can realize no-crosstalk transmission of 80 km when the peak power of CFOC channel is less than 8dBm. We also find that the crosstalk between COC and CFOC does not depend on channel spacing when the channel spacing exceeds 100GHz. Moreover, the crosstalk does not limit channel number by comparing the synchronization performance of COC in four- and six-channel WDM systems.

  1. Information Security: Computer Hacker Information Available on the Internet

    DTIC Science & Technology

    1996-06-05

    INFORMATION SECURITY Computer Hacker Information Available on the Internet Statement for the Record of...Report Type N/A Dates Covered (from... to) - Title and Subtitle INFORMATION SECURITY Computer Hacker Information Available on the Internet Contract...1996 4. TITLE AND SUBTITLE Information Security: Computer Hacker Information Available on the Internet 5. FUNDING NUMBERS 6. AUTHOR(S) Jack L.

  2. Indirection and computer security.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Berg, Michael J.

    2011-09-01

    The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyzemore » common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.« less

  3. Computer Security Awareness Guide for Department of Energy Laboratories, Government Agencies, and others for use with Lawrence Livermore National Laboratory`s (LLNL): Computer security short subjects videos

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    Lonnie Moore, the Computer Security Manager, CSSM/CPPM at Lawrence Livermore National Laboratory (LLNL) and Gale Warshawsky, the Coordinator for Computer Security Education & Awareness at LLNL, wanted to share topics such as computer ethics, software piracy, privacy issues, and protecting information in a format that would capture and hold an audience`s attention. Four Computer Security Short Subject videos were produced which ranged from 1-3 minutes each. These videos are very effective education and awareness tools that can be used to generate discussions about computer security concerns and good computing practices. Leaders may incorporate the Short Subjects into presentations. After talkingmore » about a subject area, one of the Short Subjects may be shown to highlight that subject matter. Another method for sharing them could be to show a Short Subject first and then lead a discussion about its topic. The cast of characters and a bit of information about their personalities in the LLNL Computer Security Short Subjects is included in this report.« less

  4. Preventing infant abductions: an infant security program transitioned into an interdisciplinary model.

    PubMed

    Hiner, Jacqueline; Pyka, Jeanine; Burks, Colleen; Pisegna, Lily; Gador, Rachel Ann

    2012-01-01

    Ensuring the safety of infants born in a hospital is a top priority and, therefore, requires a solid infant security plan. Using an interdisciplinary approach and a systematic change process, nursing leadership in collaboration with clinical nurses and security personnel analyzed the infant security program at this community hospital to identify vulnerabilities. By establishing an interdisciplinary approach to infant security, participants were able to unravel a complicated concept, systematically analyze the gaps, and agree to a plan of action. This resulted in improved communication and clarification of roles between the nursing and security divisions. Supply costs decreased by 17.4% after the first year of implementation. Most importantly, this project enhanced and strengthened the existing infant abduction prevention measures, hard wired the importance of infant security, and minimized vulnerabilities.

  5. Latin American Special Economic Zones and Their Impacts on Regional Security

    DTIC Science & Technology

    2011-06-01

    25 Emile Durkheim and W. D. Halls, The Division of Labor in Society [De la division du travail social], (New York: Free Press, 1984), 352...Rio/ISER.” Agenda de Seguridad en el MERCOSUR: Triple Frontera como espacio de inseguridad regional.” Rio de Janeiro, 2005. Durkheim , Emile and W...for global economic prosperity. French sociologist Émile Durkheim further developed Condorcet’s concept by stressing the connectedness of

  6. Hyperthyroidism Due to a Thyrotropin Secreting Pituitary Adenoma: Studies of Thyrotropin and Subunit Secretion

    DTIC Science & Technology

    1982-03-10

    ADDRESS 10. PROGRAM ELEMENT. PROJECT. TASK Division of Medicine , Walter Reed Army Institute o7 AREA & WORK UNIT NUMBERS Research, Endocrine Metabolic...Service, Walter Reed C Army Medical Center, Washington, D.C. 20012 I. CONTROLLING OFFICE NAME AND ADDRESS 12. REPORT DATE Division of Medicine Walter...THIS PAGE (When Date Entered) * .1 Unclassified SECURITY CLASSIFICATION OF THIS PAGIE(When "ea Entmuod)- antithyroid drug therapy. Estrogens produced a

  7. Fires Readiness: The State of US Army Fires in Support of Combined Arms Maneuver at the Division Level

    DTIC Science & Technology

    2016-06-10

    proficiency in their core competencies. 15. SUBJECT TERMS Fires, Fire Support, DIVARTY, FAB , Combined Arms Maneuver, DOTMLPF 16. SECURITY...FAA Functional Area Analysis FAB Field Artillery Brigade FER Final Exercise Report FFA HQ Force Field Artillery Headquarters FM Field Manual FNA...function. This provided me the opportunity to work with several Division Artillerys (DIVARTYs) and Field Artillery Brigades ( FABs ). During this time

  8. Fighting Divisions

    DTIC Science & Technology

    1945-12-01

    secure several passes in the Vosges Mountains. It hadn’t been committed to battle long before it learned a severe lesson in what war can be like at its...for the first time enough material on every one of our divisions to give the average citizen a brief idea of where each has been and what each has...considered both the advisability and desirability of immediately releasing accounts of impressive battle achievements to Ameri- can citizens at home so

  9. Research on Quantum Authentication Methods for the Secure Access Control Among Three Elements of Cloud Computing

    NASA Astrophysics Data System (ADS)

    Dong, Yumin; Xiao, Shufen; Ma, Hongyang; Chen, Libo

    2016-12-01

    Cloud computing and big data have become the developing engine of current information technology (IT) as a result of the rapid development of IT. However, security protection has become increasingly important for cloud computing and big data, and has become a problem that must be solved to develop cloud computing. The theft of identity authentication information remains a serious threat to the security of cloud computing. In this process, attackers intrude into cloud computing services through identity authentication information, thereby threatening the security of data from multiple perspectives. Therefore, this study proposes a model for cloud computing protection and management based on quantum authentication, introduces the principle of quantum authentication, and deduces the quantum authentication process. In theory, quantum authentication technology can be applied in cloud computing for security protection. This technology cannot be cloned; thus, it is more secure and reliable than classical methods.

  10. Phishing

    MedlinePlus

    ... Money & Credit Homes & Mortgages Health & Fitness Jobs & Making Money Privacy, Identity & Online Security Limiting Unwanted Calls and Emails Online Security "Free" Security Scans Computer Security Disposing of Old Computers ...

  11. Examining the Security Awareness, Information Privacy, and the Security Behaviors of Home Computer Users

    ERIC Educational Resources Information Center

    Edwards, Keith

    2015-01-01

    Attacks on computer systems continue to be a problem. The majority of the attacks target home computer users. To help mitigate the attacks some companies provide security awareness training to their employees. However, not all people work for a company that provides security awareness training and typically, home computer users do not have the…

  12. An Overview of the Computational Physics and Methods Group at Los Alamos National Laboratory

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Baker, Randal Scott

    CCS Division was formed to strengthen the visibility and impact of computer science and computational physics research on strategic directions for the Laboratory. Both computer science and computational science are now central to scientific discovery and innovation. They have become indispensable tools for all other scientific missions at the Laboratory. CCS Division forms a bridge between external partners and Laboratory programs, bringing new ideas and technologies to bear on today’s important problems and attracting high-quality technical staff members to the Laboratory. The Computational Physics and Methods Group CCS-2 conducts methods research and develops scientific software aimed at the latest andmore » emerging HPC systems.« less

  13. Rand National Security Division Annual Report 2006

    DTIC Science & Technology

    2007-01-01

    collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources...gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any...this opportunity, they need to control enough personnel and material resources to secure and supply at least the capital. Marshaling Resources to Meet

  14. 78 FR 16692 - Chemical Facility Anti-Terrorism Standards (CFATS)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... Protection (IP), Infrastructure Security Compliance Division (ISCD) will submit the following Information... submissions of responses. FOR FURTHER INFORMATION CONTACT: CFATS Program Manager, DHS/NPPD/IP/ ISCD, [email protected

  15. 10 CFR 95.9 - Communications.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...: (a) By mail addressed to: ATTN: Document Control Desk, Director, Division of Security Operations....gov/site-help/e-submittals.html; by e-mail to [email protected]; or by writing the Office of...

  16. 10 CFR 1049.9 - Firearms and firearms incidents.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... immediately, and to the SPR Project Management Office Security Division within 24 hours. The Strategic... FORCE OFFICERS OF THE STRATEGIC PETROLEUM RESERVE § 1049.9 Firearms and firearms incidents. (a...

  17. 10 CFR 1049.9 - Firearms and firearms incidents.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... immediately, and to the SPR Project Management Office Security Division within 24 hours. The Strategic... FORCE OFFICERS OF THE STRATEGIC PETROLEUM RESERVE § 1049.9 Firearms and firearms incidents. (a...

  18. Acoustic Source Bearing Estimation (ASBE) computer program development

    NASA Technical Reports Server (NTRS)

    Wiese, Michael R.

    1987-01-01

    A new bearing estimation algorithm (Acoustic Source Analysis Technique - ASAT) and an acoustic analysis computer program (Acoustic Source Bearing Estimation - ASBE) are described, which were developed by Computer Sciences Corporation for NASA Langley Research Center. The ASBE program is used by the Acoustics Division/Applied Acoustics Branch and the Instrument Research Division/Electro-Mechanical Instrumentation Branch to analyze acoustic data and estimate the azimuths from which the source signals radiated. Included are the input and output from a benchmark test case.

  19. Personnel Data Analysis and Retrieval of Phase 1 Move To LC-39 Area

    NASA Technical Reports Server (NTRS)

    Davis, Derrick D.

    2013-01-01

    As a technology major from Jackson State University (JSU) I was called in as a summer intern at Kennedy Space Center (KSC) to work in the NASA Engineering, Control and Data Systems (NE-C) Division supporting the Spaceport Command and Control System (SCCS) at the Space Station Processing Facility (SSPF). I was given a two-part project; the first consisted of lending support relocating SCCS Computer Equipment and Project Personnel to the Launch Control Center (LCC). This task involved me using a Microsoft Office data processing tool to assist with the analysis and information management of logistics worth millions of dollars. With the assistance of two other interns, I was responsible for collecting data on equipment used, on a daily basis, by over 200 KSC employees. The many network servers, enterprise switches, desktop computers, and fiber optics had to be handled in an equally prompt and precise manner in order to ensure a minimal amount of equipment down time; which is critical in ensuring a properly secured networking environment. The second part of my project was to assist KSC in developing a more cost effective way of maintaining and taking full advantage of the functionality of some new kiosk units. Since KSC currently has no expert on the servicing and maintenance of the units, I, as a computer technology major, was given the opportunity to assess the hardware and software of the machines. The goal was to learn to establish a secure and remote environment for the kiosks; a goal highly valuing convenience by preserving valuable man-hours saved by not having to travel to each individual kiosk location. In addition, I was to leave a clear and precise plan for future users and administrators of the devices to follow.

  20. Science and Technology Resources on the Internet: Computer Security.

    ERIC Educational Resources Information Center

    Kinkus, Jane F.

    2002-01-01

    Discusses issues related to computer security, including confidentiality, integrity, and authentication or availability; and presents a selected list of Web sites that cover the basic issues of computer security under subject headings that include ethics, privacy, kids, antivirus, policies, cryptography, operating system security, and biometrics.…

  1. Hacked E-mail

    MedlinePlus

    ... Money & Credit Homes & Mortgages Health & Fitness Jobs & Making Money Privacy, Identity & Online Security Limiting Unwanted Calls and Emails Online Security "Free" Security Scans Computer Security Disposing of Old Computers ...

  2. Computer Security Systems Enable Access.

    ERIC Educational Resources Information Center

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  3. The research of computer network security and protection strategy

    NASA Astrophysics Data System (ADS)

    He, Jian

    2017-05-01

    With the widespread popularity of computer network applications, its security is also received a high degree of attention. Factors affecting the safety of network is complex, for to do a good job of network security is a systematic work, has the high challenge. For safety and reliability problems of computer network system, this paper combined with practical work experience, from the threat of network security, security technology, network some Suggestions and measures for the system design principle, in order to make the masses of users in computer networks to enhance safety awareness and master certain network security technology.

  4. Accessing Wind Tunnels From NASA's Information Power Grid

    NASA Technical Reports Server (NTRS)

    Becker, Jeff; Biegel, Bryan (Technical Monitor)

    2002-01-01

    The NASA Ames wind tunnel customers are one of the first users of the Information Power Grid (IPG) storage system at the NASA Advanced Supercomputing Division. We wanted to be able to store their data on the IPG so that it could be accessed remotely in a secure but timely fashion. In addition, incorporation into the IPG allows future use of grid computational resources, e.g., for post-processing of data, or to do side-by-side CFD validation. In this paper, we describe the integration of grid data access mechanisms with the existing DARWIN web-based system that is used to access wind tunnel test data. We also show that the combined system has reasonable performance: wind tunnel data may be retrieved at 50Mbits/s over a 100 base T network connected to the IPG storage server.

  5. Crown-root morphology of lower incisors in patients with class III malocclusion.

    PubMed

    Wang, Bo; Shen, Guofang; Fang, Bing; Zhang, Li

    2012-07-01

    The purpose of this study was to investigate the crown-root morphology of lower incisors in patients with class III malocclusion using cone-beam computed tomography. Cone-beam computed tomography images were analyzed from 53 adult class I patients (group 1), 37 preadolescent class III patients (group 2), and 66 adult class III patients (group 3) comprising 3 divisions (divisions 1, 2, and 3 corresponded to mild, moderate, and severe class III malocclusions). The size and crown-root angulations of lower incisors in different groups and divisions were statistically appraised with group 1 used as the control group. No significant differences were found for the size of lower incisors among different groups and divisions (P > 0.05). Compared with group 1, the crown-root angulations of lower incisors in groups 2 and 3 were significantly larger (P < 0.01), and among 3 divisions, the lower incisors of division 3 rather than divisions 2 and 3 exhibited larger crown-root angulations (P < 0.01). Attention should be paid to the enlarged crown-root angulations of lower incisors in class III patients during orthodontic and orthognathic treatment, especially in severe ones.

  6. A New Division of Labor: Meeting America’s Security Challenges Beyond Iraq

    DTIC Science & Technology

    2007-01-01

    on North Korea’s nuclear capabilities, see Graham and Kessler (2005). 20 A New Division of Labor most populous country, China has over the past... Seth Jones, Rollie Lal, Andrew Rathmell, and Anga Timilsina, America’s Role in Nation-Building: From Germany to Iraq, Santa Monica, Calif.: RAND...Graham, Bradley, and Glenn Kessler , “N. Korea Nuclear Advance is Cited,” Washington Post, April 29, 2005, p. 1. Bibliography 107 Headquarters

  7. The Broken Machine: The US Army Division in the Age of Brigade Modularity

    DTIC Science & Technology

    2017-05-15

    Doctrine, Division Training, General Staff Officer Education , Fires, Field Artillery, World War II 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF...age of Napoleon. This amazing transformation in the interwar period was the result of a focused effort by a cadre of leaders in the US Army to build...Reardon, Victory at Mortain, 265. 6 Peter J. Schifferle, America’s School for War: Fort Leavenworth, Officer Education , and Victory in World War II

  8. Secure Communication via a Recycling of Attenuated Classical Signals

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Smith, IV, Amos M.

    We describe a simple method of interleaving a classical and quantum signal in a secure communication system at a single wavelength. The system transmits data encrypted via a one-time pad on a classical signal and produces a single-photon reflection of the encrypted signal. This attenuated signal can be used to observe eavesdroppers and produce fresh secret bits. The system can be secured against eavesdroppers, detect simple tampering or classical bit errors, produces more secret bits than it consumes, and does not require any entanglement or complex wavelength division multiplexing, thus, making continuous secure two-way communication via one-time pads practical.

  9. Secure Communication via a Recycling of Attenuated Classical Signals

    DOE PAGES

    Smith, IV, Amos M.

    2017-01-12

    We describe a simple method of interleaving a classical and quantum signal in a secure communication system at a single wavelength. The system transmits data encrypted via a one-time pad on a classical signal and produces a single-photon reflection of the encrypted signal. This attenuated signal can be used to observe eavesdroppers and produce fresh secret bits. The system can be secured against eavesdroppers, detect simple tampering or classical bit errors, produces more secret bits than it consumes, and does not require any entanglement or complex wavelength division multiplexing, thus, making continuous secure two-way communication via one-time pads practical.

  10. Chaos-based CAZAC scheme for secure transmission in OFDM-PON

    NASA Astrophysics Data System (ADS)

    Fu, Xiaosong; Bi, Meihua; Zhou, Xuefang; Yang, Guowei; Lu, Yang; Hu, Miao

    2018-01-01

    To effectively resist malicious eavesdropping and performance deterioration, a novel chaos-based secure transmission scheme is proposed to enhance the physical layer security and reduce peak-to-average power ratio (PAPR) in orthogonal frequency division multiplexing passive optical network (OFDM-PON). By the randomly extracting operation of common CAZAC values, the specially-designed constant amplitude zero autocorrelation (CAZAC) is created for system encryption and PAPR reduction enhancing the transmission security. This method is verified in {10-Gb/s encrypted OFDM-PON with 20-km fiber transmission. Results show that, compared to common OFDM-PON, our scheme achieves {3-dB PAPR reduction and {1-dB receiver sensitivity improvement.

  11. Oranges, Posters, Ribbons, and Lemonade: Concrete Computational Strategies for Dividing Fractions

    ERIC Educational Resources Information Center

    Kribs-Zaleta, Christopher M.

    2008-01-01

    This article describes how sixth-grade students developed concrete models to solve division of fractions story problems. Students developed separate two-step procedures to solve measurement and partitive problems, drawing on invented procedures for division of whole numbers. Errors also tended to be specific to the type of division problem…

  12. Secure key storage and distribution

    DOEpatents

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  13. Monitor and Control of the Deep-Space network via Secure Web

    NASA Technical Reports Server (NTRS)

    Lamarra, N.

    1997-01-01

    (view graph) NASA lead center for robotic space exploration. Operating division of Caltech/Jet Propulsion Laboratory. Current missions, Voyagers, Galileo, Pathfinder, Global Surveyor. Upcoming missions, Cassini, Mars and New Millennium.

  14. Aviation Security: Technology's Role in Addressing Vulnerabilities

    DOT National Transportation Integrated Search

    1996-09-19

    This is the statement of Keith O. Fultz, Assistant Comptroller General, Resources, Community, and Economic Development Division, General Accounting Office (GAO), before the Committee on Science, House of Representatives, on the serious vulnerabilitie...

  15. Aviation Security: Urgent Issues Need to Be Addressed

    DOT National Transportation Integrated Search

    1996-09-11

    This is the statement of Keith O. Fultz, Assistant Comptroller General, Resources, Community, and Economic Development Division, General Accounting Office (GAO), before the Subcommittee on Aviation, Committee on Transportation and Infrastructure, Hou...

  16. 78 FR 70046 - Agency Information Collection Activities; Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-22

    ... Gans, Attorney, Division of Marketing Practices, Bureau of Consumer Protection, Federal Trade... that your comment does not include any sensitive personal information, such as anyone's Social Security...

  17. 78 FR 38041 - Agency Information Collection Activities; Submission for OMB review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-25

    ...: Craig Tregillus, Attorney, Division of Marketing Practices, Bureau of Consumer Protection, Federal Trade... Social Security number, date of birth, driver's license number or other state identification number or...

  18. Financing Disaster Recovery and Resilience Mitigation for Water and Wastewater Utilities

    EPA Pesticide Factsheets

    Free webinar series on Financing for Disaster Recovery and Resilience Mitigation for Water and Wastewater Utilities, hosted by EPA's Water Infrastructure and Resiliency Finance Center and Water Security Division.

  19. Quantum-Enhanced Cyber Security: Experimental Computation on Quantum-Encrypted Data

    DTIC Science & Technology

    2017-03-02

    AFRL-AFOSR-UK-TR-2017-0020 Quantum-Enhanced Cyber Security: Experimental Computation on Quantum-Encrypted Data Philip Walther UNIVERSITT WIEN Final...REPORT TYPE Final 3. DATES COVERED (From - To) 15 Oct 2015 to 31 Dec 2016 4. TITLE AND SUBTITLE Quantum-Enhanced Cyber Security: Experimental Computation...FORM SF 298 Final Report for FA9550-1-6-1-0004 Quantum-enhanced cyber security: Experimental quantum computation with quantum-encrypted data

  20. 78 FR 1275 - Privacy Act of 1974; Computer Matching Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-08

    ... Social Security Administration (Computer Matching Agreement 1071). SUMMARY: In accordance with the... of its new computer matching program with the Social Security Administration (SSA). DATES: OPM will... conditions under which SSA will disclose Social Security benefit data to OPM via direct computer link. OPM...

  1. Combined peak-to-average power ratio reduction and physical layer security enhancement in optical orthogonal frequency division multiplexing visible-light communication systems

    NASA Astrophysics Data System (ADS)

    Wang, Zhongpeng; Chen, Shoufa

    2016-07-01

    A physical encryption scheme for discrete Hartley transform (DHT) precoded orthogonal frequency division multiplexing (OFDM) visible-light communication (VLC) systems using frequency domain chaos scrambling is proposed. In the scheme, the chaos scrambling, which is generated by a modified logistic mapping, is utilized to enhance the physical layer of security, and the DHT precoding is employed to reduce of OFDM signal for OFDM-based VLC. The influence of chaos scrambling on peak-to-average power ratio (PAPR) and bit error rate (BER) of systems is studied. The experimental simulation results prove the efficiency of the proposed encryption method for DHT-precoded, OFDM-based VLC systems. Furthermore, the influence of the proposed encryption to the PAPR and BER of systems is evaluated. The experimental results show that the proposed security scheme can protect the DHT-precoded, OFDM-based VLC from eavesdroppers, while keeping the good BER performance of DHT-precoded systems. The BER performance of the encrypted and DHT-precoded system is almost the same as that of the conventional DHT-precoded system without encryption.

  2. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mann, Reinhold C.

    This is the first formal progress report issued by the ORNL Life Sciences Division. It covers the period from February 1997 through December 1998, which has been critical in the formation of our new division. The legacy of 50 years of excellence in biological research at ORNL has been an important driver for everyone in the division to do their part so that this new research division can realize the potential it has to make seminal contributions to the life sciences for years to come. This reporting period is characterized by intense assessment and planning efforts. They included thorough scrutinymore » of our strengths and weaknesses, analyses of our situation with respect to comparative research organizations, and identification of major thrust areas leading to core research efforts that take advantage of our special facilities and expertise. Our goal is to develop significant research and development (R&D) programs in selected important areas to which we can make significant contributions by combining our distinctive expertise and resources in the biological sciences with those in the physical, engineering, and computational sciences. Significant facilities in mouse genomics, mass spectrometry, neutron science, bioanalytical technologies, and high performance computing are critical to the success of our programs. Research and development efforts in the division are organized in six sections. These cluster into two broad areas of R&D: systems biology and technology applications. The systems biology part of the division encompasses our core biological research programs. It includes the Mammalian Genetics and Development Section, the Biochemistry and Biophysics Section, and the Computational Biosciences Section. The technology applications part of the division encompasses the Assessment Technology Section, the Environmental Technology Section, and the Toxicology and Risk Analysis Section. These sections are the stewards of the division's core competencies. The common mission of the division is to advance science and technology to understand complex biological systems and their relationship with human health and the environment.« less

  3. 77 FR 32709 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Homeland Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-01

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0089] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Homeland Security (DHS))--Match Number 1010 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching program that...

  4. FAA computer security : recommendations to address continuing weaknesses

    DOT National Transportation Integrated Search

    2000-12-01

    In September, testimony before the Committee on Science, House of Representatives, focused on the Federal Aviation Administration's (FAA) computer security program. In brief, we reported that FAA's agency-wide computer security program has serious, p...

  5. US Geological Survey National Computer Technology Meeting; Proceedings, Phoenix, Arizona, November 14-18, 1988

    USGS Publications Warehouse

    Balthrop, Barbara H.; Terry, J.E.

    1991-01-01

    The U.S. Geological Survey National Computer Technology Meetings (NCTM) are sponsored by the Water Resources Division and provide a forum for the presentation of technical papers and the sharing of ideas or experiences related to computer technology. This report serves as a proceedings of the meeting held in November, 1988 at the Crescent Hotel in Phoenix, Arizona. The meeting was attended by more than 200 technical and managerial people representing all Divisions of the U.S. Geological Survey.Scientists in every Division of the U.S. Geological Survey rely heavily upon state-of-the-art computer technology (both hardware and sofnuare). Today the goals of each Division are pursued in an environment where high speed computers, distributed communications, distributed data bases, high technology input/output devices, and very sophisticated simulation tools are used regularly. Therefore, information transfer and the sharing of advances in technology are very important issues that must be addressed regularly.This report contains complete papers and abstracts of papers that were presented at the 1988 NCTM. The report is divided into topical sections that reflect common areas of interest and application. In each section, papers are presented first followed by abstracts. For these proceedings, the publication of a complete paper or only an abstract was at the discretion of the author, although complete papers were encouraged.Some papers presented at the 1988 NCTM are not published in these proceedings.

  6. Improving the Automated Detection and Analysis of Secure Coding Violations

    DTIC Science & Technology

    2014-06-01

    eliminating software vulnerabilities and other flaws. The CERT Division produces books and courses that foster a security mindset in developers, and...website also provides a virtual machine containing a complete build of the Rosecheckers project on Linux . The Rosecheckers project leverages the...Compass/ROSE6 project developed at Law- rence Livermore National Laboratory. This project provides a high-level API for accessing the abstract syntax tree

  7. U.S. National Security: A Selected Bibliography

    DTIC Science & Technology

    2013-12-01

    and Access Services Division, U.S. Army War College Library, by sending an e -mail message to USAWC.LibraryR@us.army.mil, or by phoning (717) 245...ProQuest May, Peter J., Ashley E . Jochim, and Joshua Sapotichne. "Constructing Homeland Security: An Anemic Policy Regime." Policy Studies Journal 39... Layton G., Jr. Reposturing the Force: Implications of Budget Reductions and Regional Rebalancing. Strategy Research Project. Carlisle Barracks: U.S

  8. Controlling Infrastructure Costs: Right-Sizing the Mission Control Facility

    NASA Technical Reports Server (NTRS)

    Martin, Keith; Sen-Roy, Michael; Heiman, Jennifer

    2009-01-01

    Johnson Space Center's Mission Control Center is a space vehicle, space program agnostic facility. The current operational design is essentially identical to the original facility architecture that was developed and deployed in the mid-90's. In an effort to streamline the support costs of the mission critical facility, the Mission Operations Division (MOD) of Johnson Space Center (JSC) has sponsored an exploratory project to evaluate and inject current state-of-the-practice Information Technology (IT) tools, processes and technology into legacy operations. The general push in the IT industry has been trending towards a data-centric computer infrastructure for the past several years. Organizations facing challenges with facility operations costs are turning to creative solutions combining hardware consolidation, virtualization and remote access to meet and exceed performance, security, and availability requirements. The Operations Technology Facility (OTF) organization at the Johnson Space Center has been chartered to build and evaluate a parallel Mission Control infrastructure, replacing the existing, thick-client distributed computing model and network architecture with a data center model utilizing virtualization to provide the MCC Infrastructure as a Service. The OTF will design a replacement architecture for the Mission Control Facility, leveraging hardware consolidation through the use of blade servers, increasing utilization rates for compute platforms through virtualization while expanding connectivity options through the deployment of secure remote access. The architecture demonstrates the maturity of the technologies generally available in industry today and the ability to successfully abstract the tightly coupled relationship between thick-client software and legacy hardware into a hardware agnostic "Infrastructure as a Service" capability that can scale to meet future requirements of new space programs and spacecraft. This paper discusses the benefits and difficulties that a migration to cloud-based computing philosophies has uncovered when compared to the legacy Mission Control Center architecture. The team consists of system and software engineers with extensive experience with the MCC infrastructure and software currently used to support the International Space Station (ISS) and Space Shuttle program (SSP).

  9. Security model for VM in cloud

    NASA Astrophysics Data System (ADS)

    Kanaparti, Venkataramana; Naveen K., R.; Rajani, S.; Padmvathamma, M.; Anitha, C.

    2013-03-01

    Cloud computing is a new approach emerged to meet ever-increasing demand for computing resources and to reduce operational costs and Capital Expenditure for IT services. As this new way of computation allows data and applications to be stored away from own corporate server, it brings more issues in security such as virtualization security, distributed computing, application security, identity management, access control and authentication. Even though Virtualization forms the basis for cloud computing it poses many threats in securing cloud. As most of Security threats lies at Virtualization layer in cloud we proposed this new Security Model for Virtual Machine in Cloud (SMVC) in which every process is authenticated by Trusted-Agent (TA) in Hypervisor as well as in VM. Our proposed model is designed to with-stand attacks by unauthorized process that pose threat to applications related to Data Mining, OLAP systems, Image processing which requires huge resources in cloud deployed on one or more VM's.

  10. MANTECH project book

    NASA Astrophysics Data System (ADS)

    The effective integration of processes, systems, and procedures used in the production of aerospace systems using computer technology is managed by the Integration Technology Division (MTI). Under its auspices are the Information Management Branch, which is actively involved with information management, information sciences and integration, and the Implementation Branch, whose technology areas include computer integrated manufacturing, engineering design, operations research, and material handling and assembly. The Integration Technology Division combines design, manufacturing, and supportability functions within the same organization. The Processing and Fabrication Division manages programs to improve structural and nonstructural materials processing and fabrication. Within this division, the Metals Branch directs the manufacturing methods program for metals and metal matrix composites processing and fabrication. The Nonmetals Branch directs the manufacturing methods programs, which include all manufacturing processes for producing and utilizing propellants, plastics, resins, fibers, composites, fluid elastomers, ceramics, glasses, and coatings. The objective of the Industrial Base Analysis Division is to act as focal point for the USAF industrial base program for productivity, responsiveness, and preparedness planning.

  11. Influence of Organizational Culture on the Acquisition of the M16 Rifle

    DTIC Science & Technology

    2006-12-15

    plan was developed named “ Broiler ” which began to integrate atomic weapons into the nation’s security strategy. By 1948 the emphasis continued to...38 Ibid., 37. 39 Ibid., 37-38. 40 Patrick Sweeney, The Gun Digest Book of the AR-15 (Iola, WI: KP Books, A Division of F+W Publicaitons, 2005), 10...Patrick. 2005. The Gun Digest Book of the AR-15. Iola, WI: KP Books, A Division of F+W Publicaitons. Whetten, David A., and Kim S. Cameron. 2002

  12. Close the Gate, Lock the Windows, Bolt the Doors: Securing Library Computers. Online Treasures

    ERIC Educational Resources Information Center

    Balas, Janet

    2005-01-01

    This article, written by a systems librarian at the Monroeville Public Library, discusses a major issue affecting all computer users, security. It indicates that while, staying up-to-date on the latest security issues has become essential for all computer users, it's more critical for network managers who are responsible for securing computer…

  13. Aviation security : slow progress in addressing long-standing screener performance problems

    DOT National Transportation Integrated Search

    2000-03-16

    This is the statement of Gerald L. Dillingham, Associate Director, Transportation Issues, Resources, Community, and Economic Development Division, before the Subcommittee on Aviation, Committee on Transportation and Infrastructure, House of Represent...

  14. Aviation Security: Progress Being Made, but Long-Term Attention is Needed

    DOT National Transportation Integrated Search

    1998-05-14

    This is the statement of Keith O. Fultz, Assistant Comptroller General, Resources, Community, and Economic Development Division before the Subcommittee on Aviation, Committee on Transportation and Infrastructure, House of Representatives. Currently t...

  15. 5 CFR 1312.2 - Responsibilities.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ..., and Confidential original classification authority. (b) Heads of divisions or offices. The head of... Administrative Personnel OFFICE OF MANAGEMENT AND BUDGET OMB DIRECTIVES CLASSIFICATION, DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National...

  16. 5 CFR 1312.2 - Responsibilities.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ..., and Confidential original classification authority. (b) Heads of divisions or offices. The head of... Administrative Personnel OFFICE OF MANAGEMENT AND BUDGET OMB DIRECTIVES CLASSIFICATION, DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National...

  17. 5 CFR 1312.2 - Responsibilities.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ..., and Confidential original classification authority. (b) Heads of divisions or offices. The head of... Administrative Personnel OFFICE OF MANAGEMENT AND BUDGET OMB DIRECTIVES CLASSIFICATION, DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National...

  18. Developing a computer security training program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1990-01-01

    We all know that training can empower the computer protection program. However, pushing computer security information outside the computer security organization into the rest of the company is often labeled as an easy project or a dungeon full of dragons. Used in part or whole, the strategy offered in this paper may help the developer of a computer security training program ward off dragons and create products and services. The strategy includes GOALS (what the result of training will be), POINTERS (tips to ensure survival), and STEPS (products and services as a means to accomplish the goals).

  19. 6 CFR 13.27 - Computation of time.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Computation of time. 13.27 Section 13.27 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.27 Computation of time. (a) In computing any period of time under this part or in an order issued...

  20. Reviews on Security Issues and Challenges in Cloud Computing

    NASA Astrophysics Data System (ADS)

    An, Y. Z.; Zaaba, Z. F.; Samsudin, N. F.

    2016-11-01

    Cloud computing is an Internet-based computing service provided by the third party allowing share of resources and data among devices. It is widely used in many organizations nowadays and becoming more popular because it changes the way of how the Information Technology (IT) of an organization is organized and managed. It provides lots of benefits such as simplicity and lower costs, almost unlimited storage, least maintenance, easy utilization, backup and recovery, continuous availability, quality of service, automated software integration, scalability, flexibility and reliability, easy access to information, elasticity, quick deployment and lower barrier to entry. While there is increasing use of cloud computing service in this new era, the security issues of the cloud computing become a challenges. Cloud computing must be safe and secure enough to ensure the privacy of the users. This paper firstly lists out the architecture of the cloud computing, then discuss the most common security issues of using cloud and some solutions to the security issues since security is one of the most critical aspect in cloud computing due to the sensitivity of user's data.

  1. Information Systems, Security, and Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    1984-01-01

    Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)

  2. Intelligent cloud computing security using genetic algorithm as a computational tools

    NASA Astrophysics Data System (ADS)

    Razuky AL-Shaikhly, Mazin H.

    2018-05-01

    An essential change had occurred in the field of Information Technology which represented with cloud computing, cloud giving virtual assets by means of web yet awesome difficulties in the field of information security and security assurance. Currently main problem with cloud computing is how to improve privacy and security for cloud “cloud is critical security”. This paper attempts to solve cloud security by using intelligent system with genetic algorithm as wall to provide cloud data secure, all services provided by cloud must detect who receive and register it to create list of users (trusted or un-trusted) depend on behavior. The execution of present proposal has shown great outcome.

  3. Restricted access processor - An application of computer security technology

    NASA Technical Reports Server (NTRS)

    Mcmahon, E. M.

    1985-01-01

    This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.

  4. The Rule of Law Effort in Afghanistan: A Success Story in the Making

    DTIC Science & Technology

    2016-06-10

    14415/ justice -deferred-rule-of-law-in- central-america (accessed February 14, 2016). American Bar Association, Division for Public Education . “Part I...accountability for police and other security forces. Using El Salvador as a prognostic outlook on rule of law development and justice sector reform...security and complete justice sector reforms. Afghanistan is making progress after the fall of the Taliban in 2001 with a democratic republic, laws

  5. Food Security (CSL Issue Paper, Volume 14-09, September 2009)

    DTIC Science & Technology

    2009-09-01

    Security Analyst in the Operations and Gaming Division of CSL. Cadet Jason Delousa is a senior at the United State Military Academy. This paper is...cotton, oil palm, beef, dairy, poultry and fisheries products as strategic commodities at the continental level.”32 Sustainability of these cash...Increased incomes, such as in Asia, generally lead to higher consumption of meat and hence, increased demand for cereal as livestock feed. (Source

  6. Network Centric Warfare Case Study: U.S. V Corps and 3rd Infantry Division (Mechanized) During Operation Iraqi Freedom Combat Operations (Mar-Apr 2003). Volume 3. Network Centric Warfare Insights

    DTIC Science & Technology

    2003-01-01

    OPSEC), military deception, psychological operations (PSYOPS), special information operations (IO), information assurance, physical security...nonlethal effects, such as operational 8 Network Centric Warfare Case Study security (OPSEC), military deception, psychological operations (PSYOP...Support Operations Group ASR Alternate Supply Route; or, Ammunition Supply Rate ATACMS Army Tactical Missile System ATARS Advanced

  7. Proposal for a Security Management in Cloud Computing for Health Care

    PubMed Central

    Dzombeta, Srdan; Brandis, Knud

    2014-01-01

    Cloud computing is actually one of the most popular themes of information systems research. Considering the nature of the processed information especially health care organizations need to assess and treat specific risks according to cloud computing in their information security management system. Therefore, in this paper we propose a framework that includes the most important security processes regarding cloud computing in the health care sector. Starting with a framework of general information security management processes derived from standards of the ISO 27000 family the most important information security processes for health care organizations using cloud computing will be identified considering the main risks regarding cloud computing and the type of information processed. The identified processes will help a health care organization using cloud computing to focus on the most important ISMS processes and establish and operate them at an appropriate level of maturity considering limited resources. PMID:24701137

  8. Proposal for a security management in cloud computing for health care.

    PubMed

    Haufe, Knut; Dzombeta, Srdan; Brandis, Knud

    2014-01-01

    Cloud computing is actually one of the most popular themes of information systems research. Considering the nature of the processed information especially health care organizations need to assess and treat specific risks according to cloud computing in their information security management system. Therefore, in this paper we propose a framework that includes the most important security processes regarding cloud computing in the health care sector. Starting with a framework of general information security management processes derived from standards of the ISO 27000 family the most important information security processes for health care organizations using cloud computing will be identified considering the main risks regarding cloud computing and the type of information processed. The identified processes will help a health care organization using cloud computing to focus on the most important ISMS processes and establish and operate them at an appropriate level of maturity considering limited resources.

  9. Overview of Computer Security Certification and Accreditation. Final Report.

    ERIC Educational Resources Information Center

    Ruthberg, Zella G.; Neugent, William

    Primarily intended to familiarize ADP (automatic data processing) policy and information resource managers with the approach to computer security certification and accreditation found in "Guideline to Computer Security Certification and Accreditation," Federal Information Processing Standards Publications (FIPS-PUB) 102, this overview…

  10. Visualization Tools for Teaching Computer Security

    ERIC Educational Resources Information Center

    Yuan, Xiaohong; Vega, Percy; Qadah, Yaseen; Archer, Ricky; Yu, Huiming; Xu, Jinsheng

    2010-01-01

    Using animated visualization tools has been an important teaching approach in computer science education. We have developed three visualization and animation tools that demonstrate various information security concepts and actively engage learners. The information security concepts illustrated include: packet sniffer and related computer network…

  11. A computational perspective on autism

    PubMed Central

    Rosenberg, Ari; Patterson, Jaclyn Sky; Angelaki, Dora E.

    2015-01-01

    Autism is a neurodevelopmental disorder that manifests as a heterogeneous set of social, cognitive, motor, and perceptual symptoms. This system-wide pervasiveness suggests that, rather than narrowly impacting individual systems such as affection or vision, autism may broadly alter neural computation. Here, we propose that alterations in nonlinear, canonical computations occurring throughout the brain may underlie the behavioral characteristics of autism. One such computation, called divisive normalization, balances a neuron’s net excitation with inhibition reflecting the overall activity of the neuronal population. Through neural network simulations, we investigate how alterations in divisive normalization may give rise to autism symptomatology. Our findings show that a reduction in the amount of inhibition that occurs through divisive normalization can account for perceptual consequences of autism, consistent with the hypothesis of an increased ratio of neural excitation to inhibition (E/I) in the disorder. These results thus establish a bridge between an E/I imbalance and behavioral data on autism that is currently absent. Interestingly, our findings implicate the context-dependent, neuronal milieu as a key factor in autism symptomatology, with autism reflecting a less “social” neuronal population. Through a broader discussion of perceptual data, we further examine how altered divisive normalization may contribute to a wide array of the disorder’s behavioral consequences. These analyses show how a computational framework can provide insights into the neural basis of autism and facilitate the generation of falsifiable hypotheses. A computational perspective on autism may help resolve debates within the field and aid in identifying physiological pathways to target in the treatment of the disorder. PMID:26170299

  12. EPA EMERGENCY PLANNING TOOLBOX

    EPA Science Inventory

    EPA's Office of Research and Development and Office of Water/Water Security Division have jointly developed a Response Protocol Toolbox (RPTB) to address the complex, multi-faceted challenges of a water utility's planning and response to intentional contamination of drinking wate...

  13. 77 FR 24230 - Excepted Service

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-23

    ... Congressional and Relations Officer. Legislative Affairs. Office of Communications PM120009 12/21/2011 Communications and Specialist. Public Liaison. Securities and Exchange Division of Confidential SE120001 12/21.../2011 Development. Congressional and and Public Intergovernmental Engagement Liaison. Relations...

  14. Security analysis of orthogonal-frequency-division-multiplexing-based continuous-variable quantum key distribution with imperfect modulation

    NASA Astrophysics Data System (ADS)

    Zhang, Hang; Mao, Yu; Huang, Duan; Li, Jiawei; Zhang, Ling; Guo, Ying

    2018-05-01

    We introduce a reliable scheme for continuous-variable quantum key distribution (CV-QKD) by using orthogonal frequency division multiplexing (OFDM). As a spectrally efficient multiplexing technique, OFDM allows a large number of closely spaced orthogonal subcarrier signals used to carry data on several parallel data streams or channels. We place emphasis on modulator impairments which would inevitably arise in the OFDM system and analyze how these impairments affect the OFDM-based CV-QKD system. Moreover, we also evaluate the security in the asymptotic limit and the Pirandola-Laurenza-Ottaviani-Banchi upper bound. Results indicate that although the emergence of imperfect modulation would bring about a slight decrease in the secret key bit rate of each subcarrier, the multiplexing technique combined with CV-QKD results in a desirable improvement on the total secret key bit rate which can raise the numerical value about an order of magnitude.

  15. Research on Separation of Three Powers Architecture for Trusted OS

    NASA Astrophysics Data System (ADS)

    Li, Yu; Zhao, Yong; Xin, Siyuan

    The privilege in the operating system (OS) often results in the break of confidentiality and integrity of the system. To solve this problem, several security mechanisms are proposed, such as Role-based Access Control, Separation of Duty. However, these mechanisms can not eliminate the privilege in OS kernel layer. This paper proposes a Separation of Three Powers Architecture (STPA). The authorizations in OS are divided into three parts: System Management Subsystem (SMS), Security Management Subsystem (SEMS) and Audit Subsystem (AS). Mutual support and mutual checks and balances which are the design principles of STPA eliminate the administrator in the kernel layer. Furthermore, the paper gives the formal description for authorization division using the graph theory. Finally, the implementation of STPA is given. Proved by experiments, the Separation of Three Powers Architecture we proposed can provide reliable protection for the OS through authorization division.

  16. Physical layer security in fiber-optic MIMO-SDM systems: An overview

    NASA Astrophysics Data System (ADS)

    Guan, Kyle; Cho, Junho; Winzer, Peter J.

    2018-02-01

    Fiber-optic transmission systems provide large capacities over enormous distances but are vulnerable to simple eavesdropping attacks at the physical layer. We classify key-based and keyless encryption and physical layer security techniques and discuss them in the context of optical multiple-input-multiple-output space-division multiplexed (MIMO-SDM) fiber-optic communication systems. We show that MIMO-SDM not only increases system capacity, but also ensures the confidentiality of information transmission. Based on recent numerical and experimental results, we review how the unique channel characteristics of MIMO-SDM can be exploited to provide various levels of physical layer security.

  17. Computer Network Security: Best Practices for Alberta School Jurisdictions.

    ERIC Educational Resources Information Center

    Alberta Dept. of Education, Edmonton.

    This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…

  18. Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems

    PubMed Central

    Wu, Jun; Su, Zhou; Li, Jianhua

    2017-01-01

    Fog computing, shifting intelligence and resources from the remote cloud to edge networks, has the potential of providing low-latency for the communication from sensing data sources to users. For the objects from the Internet of Things (IoT) to the cloud, it is a new trend that the objects establish social-like relationships with each other, which efficiently brings the benefits of developed sociality to a complex environment. As fog service become more sophisticated, it will become more convenient for fog users to share their own services, resources, and data via social networks. Meanwhile, the efficient social organization can enable more flexible, secure, and collaborative networking. Aforementioned advantages make the social network a potential architecture for fog computing systems. In this paper, we design an architecture for social fog computing, in which the services of fog are provisioned based on “friend” relationships. To the best of our knowledge, this is the first attempt at an organized fog computing system-based social model. Meanwhile, social networking enhances the complexity and security risks of fog computing services, creating difficulties of security service recommendations in social fog computing. To address this, we propose a novel crowd sensing-enabling security service provisioning method to recommend security services accurately in social fog computing systems. Simulation results show the feasibilities and efficiency of the crowd sensing-enabling security service recommendation method for social fog computing systems. PMID:28758943

  19. Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems.

    PubMed

    Wu, Jun; Su, Zhou; Wang, Shen; Li, Jianhua

    2017-07-30

    Fog computing, shifting intelligence and resources from the remote cloud to edge networks, has the potential of providing low-latency for the communication from sensing data sources to users. For the objects from the Internet of Things (IoT) to the cloud, it is a new trend that the objects establish social-like relationships with each other, which efficiently brings the benefits of developed sociality to a complex environment. As fog service become more sophisticated, it will become more convenient for fog users to share their own services, resources, and data via social networks. Meanwhile, the efficient social organization can enable more flexible, secure, and collaborative networking. Aforementioned advantages make the social network a potential architecture for fog computing systems. In this paper, we design an architecture for social fog computing, in which the services of fog are provisioned based on "friend" relationships. To the best of our knowledge, this is the first attempt at an organized fog computing system-based social model. Meanwhile, social networking enhances the complexity and security risks of fog computing services, creating difficulties of security service recommendations in social fog computing. To address this, we propose a novel crowd sensing-enabling security service provisioning method to recommend security services accurately in social fog computing systems. Simulation results show the feasibilities and efficiency of the crowd sensing-enabling security service recommendation method for social fog computing systems.

  20. CFD Data Sets on the WWW for Education and Testing

    NASA Technical Reports Server (NTRS)

    Globus, Al; Lasinski, T. A. (Technical Monitor)

    1995-01-01

    The Numerical Aerodynamic Simulation (NAS) Systems Division at NASA Ames Research Center has begun the development of a Computational Fluid Dynamics (CFD) data set archive on the World Wide Web (WWW) at URL http://www.nas.nasa.gov/NAS/DataSets/. Data sets are integrated with related information such as research papers, metadata, visualizations, etc. In this paper, four classes of users are identified and discussed: students, visualization developers, CFD practitioners, and management. Bandwidth and security issues are briefly reviewed and the status of the archive as of May 1995 is examined. Routine network distribution of data sets is likely to have profound implications for the conduct of science. The exact nature of these changes is subject to speculation, but the ability for anyone to examine the data, in addition to the investigator's analysis, may well play an important role in the future.

  1. Additional Security Considerations for Grid Management

    NASA Technical Reports Server (NTRS)

    Eidson, Thomas M.

    2003-01-01

    The use of Grid computing environments is growing in popularity. A Grid computing environment is primarily a wide area network that encompasses multiple local area networks, where some of the local area networks are managed by different organizations. A Grid computing environment also includes common interfaces for distributed computing software so that the heterogeneous set of machines that make up the Grid can be used more easily. The other key feature of a Grid is that the distributed computing software includes appropriate security technology. The focus of most Grid software is on the security involved with application execution, file transfers, and other remote computing procedures. However, there are other important security issues related to the management of a Grid and the users who use that Grid. This note discusses these additional security issues and makes several suggestions as how they can be managed.

  2. Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals

    NASA Astrophysics Data System (ADS)

    Fleischmann, Kenneth R.

    The biggest challenge facing computer security researchers and professionals is not learning how to make ethical decisions; rather it is learning how to recognize ethical decisions. All too often, technology development suffers from what Langdon Winner terms technological somnambulism - we sleepwalk through our technology design, following past precedents without a second thought, and fail to consider the perspectives of other stakeholders [1]. Computer security research and practice involves a number of opportunities for ethical decisions. For example, decisions about whether or not to automatically provide security updates involve tradeoffs related to caring versus user autonomy. Decisions about online voting include tradeoffs between convenience and security. Finally, decisions about routinely screening e-mails for spam involve tradeoffs of efficiency and privacy. It is critical that these and other decisions facing computer security researchers and professionals are confronted head on as value-laden design decisions, and that computer security researchers and professionals consider the perspectives of various stakeholders in making these decisions.

  3. Quality and security - They work together

    NASA Technical Reports Server (NTRS)

    Carr, Richard; Tynan, Marie; Davis, Russell

    1991-01-01

    This paper describes the importance of considering computer security as part of software quality assurance practice. The intended audience is primarily those professionals involved in the design, development, and quality assurance of software. Many issues are raised which point to the need ultimately for integration of quality assurance and computer security disciplines. To address some of the issues raised, the NASA Automated Information Security program is presented as a model which may be used for improving interactions between the quality assurance and computer security community of professionals.

  4. 78 FR 15734 - Privacy Act of 1974; Computer Matching Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-12

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0010] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... computer matching program between the Department of Homeland Security/U.S. Citizenship and Immigration...

  5. 78 FR 15733 - Privacy Act of 1974; Computer Matching Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-12

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0008] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... computer matching program between the Department of Homeland Security/U.S. Citizenship and Immigration...

  6. Report on the FY17 Development of Computer Program for ASME Section III, Division 5, Subsection HB, Subpart B Rules

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Swindeman, M. J.; Jetter, R. I.; Sham, T. -L.

    One of the objectives of the high temperature design methodology activities is to develop and validate both improvements and the basic features of ASME Boiler and Pressure Vessel Code, Section III, Rules for Construction of Nuclear Facility Components, Division 5, High Temperature Reactors, Subsection HB, Subpart B (HBB). The overall scope of this task is to develop a computer program to aid assessment procedures of components under specified loading conditions in accordance with the elevated temperature design requirements for Division 5 Class A components. There are many features and alternative paths of varying complexity in HBB. The initial focus ofmore » this computer program is a basic path through the various options for a single reference material, 316H stainless steel. However, the computer program is being structured for eventual incorporation all of the features and permitted materials of HBB. This report will first provide a description of the overall computer program, particular challenges in developing numerical procedures for the assessment, and an overall approach to computer program development. This is followed by a more comprehensive appendix, which is the draft computer program manual for the program development. The strain limits rules have been implemented in the computer program. The evaluation of creep-fatigue damage will be implemented in future work scope.« less

  7. The complexity of divisibility.

    PubMed

    Bausch, Johannes; Cubitt, Toby

    2016-09-01

    We address two sets of long-standing open questions in linear algebra and probability theory, from a computational complexity perspective: stochastic matrix divisibility, and divisibility and decomposability of probability distributions. We prove that finite divisibility of stochastic matrices is an NP-complete problem, and extend this result to nonnegative matrices, and completely-positive trace-preserving maps, i.e. the quantum analogue of stochastic matrices. We further prove a complexity hierarchy for the divisibility and decomposability of probability distributions, showing that finite distribution divisibility is in P, but decomposability is NP-hard. For the former, we give an explicit polynomial-time algorithm. All results on distributions extend to weak-membership formulations, proving that the complexity of these problems is robust to perturbations.

  8. FAA computer security : concerns remain due to personnel and other continuing weaknesses

    DOT National Transportation Integrated Search

    2000-08-01

    FAA has a history of computer security weaknesses in a number of areas, including its physical security management at facilities that house air traffic control (ATC) systems, systems security for both operational and future systems, management struct...

  9. 78 FR 38724 - Privacy Act of 1974; Computer Matching Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-27

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0006] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... Agreement that establishes a computer matching program between the Department of Homeland Security/U.S...

  10. 75 FR 18841 - Office for Civil Rights; Privacy Act of 1974, Amended System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-13

    ... Privacy Act of 1974, Federal Information Security Management Act of 2002, Computer Security Act of 1987... 1974, Federal Information Security Management Act of 2002, Computer Security Act of 1987, the Paperwork... Oversight, the Chair of the Senate Committee on Homeland Security and Governmental Affairs, and the...

  11. Cloud Computing Security Issue: Survey

    NASA Astrophysics Data System (ADS)

    Kamal, Shailza; Kaur, Rajpreet

    2011-12-01

    Cloud computing is the growing field in IT industry since 2007 proposed by IBM. Another company like Google, Amazon, and Microsoft provides further products to cloud computing. The cloud computing is the internet based computing that shared recourses, information on demand. It provides the services like SaaS, IaaS and PaaS. The services and recourses are shared by virtualization that run multiple operation applications on cloud computing. This discussion gives the survey on the challenges on security issues during cloud computing and describes some standards and protocols that presents how security can be managed.

  12. Challenges and Security in Cloud Computing

    NASA Astrophysics Data System (ADS)

    Chang, Hyokyung; Choi, Euiin

    People who live in this world want to solve any problems as they happen then. An IT technology called Ubiquitous computing should help the situations easier and we call a technology which makes it even better and powerful cloud computing. Cloud computing, however, is at the stage of the beginning to implement and use and it faces a lot of challenges in technical matters and security issues. This paper looks at the cloud computing security.

  13. Method for implementation of recursive hierarchical segmentation on parallel computers

    NASA Technical Reports Server (NTRS)

    Tilton, James C. (Inventor)

    2005-01-01

    A method, computer readable storage, and apparatus for implementing a recursive hierarchical segmentation algorithm on a parallel computing platform. The method includes setting a bottom level of recursion that defines where a recursive division of an image into sections stops dividing, and setting an intermediate level of recursion where the recursive division changes from a parallel implementation into a serial implementation. The segmentation algorithm is implemented according to the set levels. The method can also include setting a convergence check level of recursion with which the first level of recursion communicates with when performing a convergence check.

  14. Annual Report 2005

    DTIC Science & Technology

    2005-01-01

    Program Integration PROJECT LEADERS: Bernard Rostker and Laura Miller 20 RAND National Security Research Division The more intensive use of the...Lim, Laura Werber Castaneda, Daniela Golinelli. MG-196-OSD. NOTE: MG stands for monograph; CF for confer- ence proceedings; CT for congressional

  15. 5 CFR 1303.3 - Organization.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Budget Review Divisions. (4) Resource Management Offices. These offices develop and support the President's management and budget agenda in the areas of Natural Resources, Energy and Science, National Security and International Affairs, Health and Personnel, Human Resources, and General Government and...

  16. 5 CFR 1303.3 - Organization.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Budget Review Divisions. (4) Resource Management Offices. These offices develop and support the President's management and budget agenda in the areas of Natural Resources, Energy and Science, National Security and International Affairs, Health and Personnel, Human Resources, and General Government and...

  17. 20 CFR 229.65 - Initial reduction.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... wage (see § 225.2 of this chapter) used to compute the DIB O/M under the Social Security Act rules... that exceed the maximum used in computing social security benefits) for the 5 consecutive years after... earnings that exceed the maximum used in computing social security benefits) for the year of highest...

  18. A Computational Model and Multi-Agent Simulation for Information Assurance

    DTIC Science & Technology

    2002-06-01

    Podell , Information Security: an Integrated Collection of Essays, IEEE Computer Society Press, Los Alamitos, CA, 1994. Brinkley, D. L. and Schell, R...R., “What is There to Worry About? An Introduction to the Computer Security Problem,” ed. Abrams and Jajodia and Podell , Information Security: an

  19. Distributed intrusion detection system based on grid security model

    NASA Astrophysics Data System (ADS)

    Su, Jie; Liu, Yahui

    2008-03-01

    Grid computing has developed rapidly with the development of network technology and it can solve the problem of large-scale complex computing by sharing large-scale computing resource. In grid environment, we can realize a distributed and load balance intrusion detection system. This paper first discusses the security mechanism in grid computing and the function of PKI/CA in the grid security system, then gives the application of grid computing character in the distributed intrusion detection system (IDS) based on Artificial Immune System. Finally, it gives a distributed intrusion detection system based on grid security system that can reduce the processing delay and assure the detection rates.

  20. Potential impact of HITECH security regulations on medical imaging.

    PubMed

    Prior, Fred; Ingeholm, Mary Lou; Levine, Betty A; Tarbox, Lawrence

    2009-01-01

    Title XIII of Division A and Title IV of Division B of the American Recovery and Reinvestment Act (ARRA) of 2009 [1] include a provision commonly referred to as the "Health Information Technology for Economic and Clinical Health Act" or "HITECH Act" that is intended to promote the electronic exchange of health information to improve the quality of health care. Subtitle D of the HITECH Act includes key amendments to strengthen the privacy and security regulations issued under the Health Insurance Portability and Accountability Act (HIPAA). The HITECH act also states that "the National Coordinator" must consult with the National Institute of Standards and Technology (NIST) in determining what standards are to be applied and enforced for compliance with HIPAA. This has led to speculation that NIST will recommend that the government impose the Federal Information Security Management Act (FISMA) [2], which was created by NIST for application within the federal government, as requirements to the public Electronic Health Records (EHR) community in the USA. In this paper we will describe potential impacts of FISMA on medical image sharing strategies such as teleradiology and outline how a strict application of FISMA or FISMA-based regulations could have significant negative impacts on information sharing between care providers.

  1. A Lightweight Protocol for Secure Video Streaming

    PubMed Central

    Morkevicius, Nerijus; Bagdonas, Kazimieras

    2018-01-01

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard. PMID:29757988

  2. A Lightweight Protocol for Secure Video Streaming.

    PubMed

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  3. A novel wireless local positioning system for airport (indoor) security

    NASA Astrophysics Data System (ADS)

    Zekavat, Seyed A.; Tong, Hui; Tan, Jindong

    2004-09-01

    A novel wireless local positioning system (WLPS) for airport (or indoor) security is introduced. This system is used by airport (indoor) security guards to locate all of, or a group of airport employees or passengers within the airport area. WLPS consists of two main parts: (1) a base station that is carried by security personnel; hence, introducing dynamic base station (DBS), and (2) a transponder (TRX) that is mounted on all people (including security personnel) present at the airport; thus, introducing them as active targets. In this paper, we (a) draw a futuristic view of the airport security systems, and the flow of information at the airports, (b) investigate the techniques of extending WLPS coverage area beyond the line-of-sight (LoS), and (c) study the performance of this system via standard transceivers, and direct sequence code division multiple access (DS-CDMA) systems with and without antenna arrays and conventional beamforming (BF).

  4. Harry Mergler with His Modified Differential Analyzer

    NASA Image and Video Library

    1951-06-21

    Harry Mergler stands at the control board of a differential analyzer in the new Instrument Research Laboratory at the National Advisory Committee for Aeronautics (NACA) Lewis Flight Propulsion Laboratory. The differential analyzer was a multi-variable analog computation machine devised in 1931 by Massachusetts Institute of Technology researcher and future NACA Committee member Vannevar Bush. The mechanical device could solve computations up to the sixth order, but had to be rewired before each new computation. Mergler modified Bush’s differential analyzer in the late 1940s to calculate droplet trajectories for Lewis’ icing research program. In four days Mergler’s machine could calculate what previously required weeks. NACA Lewis built the Instrument Research Laboratory in 1950 and 1951 to house the large analog computer equipment. The two-story structure also provided offices for the Mechanical Computational Analysis, and Flow Physics sections of the Physics Division. The division had previously operated from the lab’s hangar because of its icing research and flight operations activities. Mergler joined the Instrument Research Section of the Physics Division in 1948 after earning an undergraduate degree in Physics from the Case Institute of Technology. Mergler’s focus was on the synthesis of analog computers with the machine tools used to create compressor and turbine blades for jet engines.

  5. 76 FR 81477 - Announcing an Open Meeting of the Information Security and Privacy Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-28

    ... sessions will be open to the public. The ISPAB was established by the Computer Security Act of 1987 (Pub. L... Secure Mobile Devices, --Panel Discussion on cyber R&D Strategy, and --Update of NIST Computer Security... of the Information Security and Privacy Advisory Board AGENCY: National Institute of Standards and...

  6. Analyzing the security of an existing computer system

    NASA Technical Reports Server (NTRS)

    Bishop, M.

    1986-01-01

    Most work concerning secure computer systems has dealt with the design, verification, and implementation of provably secure computer systems, or has explored ways of making existing computer systems more secure. The problem of locating security holes in existing systems has received considerably less attention; methods generally rely on thought experiments as a critical step in the procedure. The difficulty is that such experiments require that a large amount of information be available in a format that makes correlating the details of various programs straightforward. This paper describes a method of providing such a basis for the thought experiment by writing a special manual for parts of the operating system, system programs, and library subroutines.

  7. Discussion on the Technology and Method of Computer Network Security Management

    NASA Astrophysics Data System (ADS)

    Zhou, Jianlei

    2017-09-01

    With the rapid development of information technology, the application of computer network technology has penetrated all aspects of society, changed people's way of life work to a certain extent, brought great convenience to people. But computer network technology is not a panacea, it can promote the function of social development, but also can cause damage to the community and the country. Due to computer network’ openness, easiness of sharing and other characteristics, it had a very negative impact on the computer network security, especially the loopholes in the technical aspects can cause damage on the network information. Based on this, this paper will do a brief analysis on the computer network security management problems and security measures.

  8. Personal computer security: part 1. Firewalls, antivirus software, and Internet security suites.

    PubMed

    Caruso, Ronald D

    2003-01-01

    Personal computer (PC) security in the era of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) involves two interrelated elements: safeguarding the basic computer system itself and protecting the information it contains and transmits, including personal files. HIPAA regulations have toughened the requirements for securing patient information, requiring every radiologist with such data to take further precautions. Security starts with physically securing the computer. Account passwords and a password-protected screen saver should also be set up. A modern antivirus program can easily be installed and configured. File scanning and updating of virus definitions are simple processes that can largely be automated and should be performed at least weekly. A software firewall is also essential for protection from outside intrusion, and an inexpensive hardware firewall can provide yet another layer of protection. An Internet security suite yields additional safety. Regular updating of the security features of installed programs is important. Obtaining a moderate degree of PC safety and security is somewhat inconvenient but is necessary and well worth the effort. Copyright RSNA, 2003

  9. 17 CFR 39.18 - System safeguards.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... physical infrastructure or personnel necessary for it to conduct activities necessary to the clearing and... transportation, telecommunications, power, water, or other critical infrastructure components in a relevant area... Division of Clearing and Risk promptly of: (1) Any hardware or software malfunction, cyber security...

  10. 17 CFR 39.18 - System safeguards.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... physical infrastructure or personnel necessary for it to conduct activities necessary to the clearing and... transportation, telecommunications, power, water, or other critical infrastructure components in a relevant area... Division of Clearing and Risk promptly of: (1) Any hardware or software malfunction, cyber security...

  11. 17 CFR 39.18 - System safeguards.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... physical infrastructure or personnel necessary for it to conduct activities necessary to the clearing and... transportation, telecommunications, power, water, or other critical infrastructure components in a relevant area... Division of Clearing and Risk promptly of: (1) Any hardware or software malfunction, cyber security...

  12. 75 FR 41912 - Self-Regulatory Organizations; Notice of Filing and Immediate Effectiveness of Proposed Rule...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-19

    ..., Division of Trading and Markets, Commission, dated July 12, 2010. v. SLP Credits The Exchange proposes different credits for SLP transactions in Nasdaq Securities contingent upon SLPs meeting their quoting requirements in [[Page 41913

  13. 78 FR 72955 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of Proposed Rule Change, as...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-04

    ... industry, as defined by the Standard Industrial Classification Codes utilized by the Division of Corporate Finance of the Commission.\\26\\ This limitation does not apply to investments in securities issued or...

  14. 77 FR 71176 - Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-29

    ...; Comment Request AGENCY: TRICARE Management Activity, Office of Administration, Personnel Security Division... techniques or other forms of information technology. DATES: Consideration will be given to all comments... any of the following methods: Federal eRulemaking Portal: http://www.regulations.gov . Follow the...

  15. 75 FR 5166 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-01

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2009-0043] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration/Railroad Retirement Board (SSA/RRB))-- Match Number 1308 AGENCY: Social Security Administration (SSA). ACTION: Notice of renewal of an existing...

  16. A Semantic Based Policy Management Framework for Cloud Computing Environments

    ERIC Educational Resources Information Center

    Takabi, Hassan

    2013-01-01

    Cloud computing paradigm has gained tremendous momentum and generated intensive interest. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this dissertation, we mainly focus on issues related to policy management and access…

  17. Computer Security: the Achilles’ Heel of the Electronic Air Force?

    DTIC Science & Technology

    2013-02-01

    commercials not enough. In the Pentagon a General Electric system called “GCOS” provided classified (secret) com- putation for the Air Staff and others...necessary computer function. January–February 2013 Air & Space Power Journal | 169 Historical Highlight Government designers not perfect. After the Pentagon ...laboratory computer to evaluate Multics as a potential multilevel secure computer for the Pentagon . Although it had the best security design of any system

  18. Change Detection Algorithms for Information Assurance of Computer Networks

    DTIC Science & Technology

    2002-01-01

    original document contains color images. 14. ABSTRACT see report 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18...number of computer attacks increases steadily per year. At the time of this writing the Internet Security Systems’ baseline assessment is that a new...across a network by exploiting security flaws in widely-used services offered by vulnerable computers. In order to locate the vulnerable computers, the

  19. Computer Security: The Human Element.

    ERIC Educational Resources Information Center

    Guynes, Carl S.; Vanacek, Michael T.

    1981-01-01

    The security and effectiveness of a computer system are dependent on the personnel involved. Improved personnel and organizational procedures can significantly reduce the potential for computer fraud. (Author/MLF)

  20. 75 FR 13258 - Announcing a Meeting of the Information Security and Privacy Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-19

    .../index.html/ . Agenda: --Cloud Computing Implementations --Health IT --OpenID --Pending Cyber Security... will be available for the public and media. --OpenID --Cloud Computing Implementations --Security...

  1. NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 2

    ScienceCinema

    Thomas D'Agostino

    2017-12-09

    Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.

  2. NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 1

    ScienceCinema

    Thomas D'Agostino

    2017-12-09

    Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.

  3. Embedding Secure Coding Instruction into the IDE: Complementing Early and Intermediate CS Courses with ESIDE

    ERIC Educational Resources Information Center

    Whitney, Michael; Lipford, Heather Richter; Chu, Bill; Thomas, Tyler

    2018-01-01

    Many of the software security vulnerabilities that people face today can be remediated through secure coding practices. A critical step toward the practice of secure coding is ensuring that our computing students are educated on these practices. We argue that secure coding education needs to be included across a computing curriculum. We are…

  4. Climate change and security.

    PubMed

    Rogers, Paul

    2009-04-01

    Climate change was originally expected to have its main impact on countries in temperate latitudes which, because of their relative wealth, would be best able to cope. It is now far more likely that much poorer states in the tropics and sub-tropics will experience severe impacts. This is compounded by the widening socioeconomic divide and the combination of these divisions, with environmental constraints, will have a profound impact on human security. The dangerous response to the prospects of mass migration and radical social movements is to attempt to maintain control without addressing underlying problems. Instead, there is an urgent need to embrace new concepts of sustainable security.

  5. 32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...

  6. 77 FR 74913 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-18

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0055] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Office of Personnel Management (OPM))--Match Number 1307 AGENCY: Social Security Administration. ACTION: Notice of a renewal of an existing...

  7. 32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...

  8. 32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...

  9. 32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...

  10. 32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...

  11. Computer-Based Testing: Test Site Security.

    ERIC Educational Resources Information Center

    Rosen, Gerald A.

    Computer-based testing places great burdens on all involved parties to ensure test security. A task analysis of test site security might identify the areas of protecting the test, protecting the data, and protecting the environment as essential issues in test security. Protecting the test involves transmission of the examinations, identifying the…

  12. A Formal Specification and Verification Method for the Prevention of Denial of Service in Ada Services

    DTIC Science & Technology

    1988-03-01

    Mechanism; Computer Security. 16. PRICE CODE 17. SECURITY CLASSIFICATION IS. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. UMrrATION OF ABSTRACT...denial of service. This paper assumes that the reader is a computer science or engineering professional working in the area of formal specification and...recovery from such events as deadlocks and crashes can be accounted for in the computation of the waiting time for each service in the service hierarchy

  13. Attribute based encryption for secure sharing of E-health data

    NASA Astrophysics Data System (ADS)

    Charanya, R.; Nithya, S.; Manikandan, N.

    2017-11-01

    Distributed computing is one of the developing innovations in IT part and information security assumes a real part. It includes sending gathering of remote server and programming that permit the unified information and online access to PC administrations. Distributed computing depends on offering of asset among different clients are additionally progressively reallocated on interest. Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. The reasons for security and protection issues, which rise on the grounds that the health information possessed by distinctive clients are put away in some cloud servers rather than under their own particular control”z. To deal with security problems, various schemes based on the Attribute-Based Encryption have been proposed. In this paper, in order to make ehealth data’s more secure we use multi party in cloud computing system. Where the health data is encrypted using attributes and key policy. And the user with a particular attribute and key policy alone will be able to decrypt the health data after it is verified by “key distribution centre” and the “secure data distributor”. This technique can be used in medical field for secure storage of patient details and limiting to particular doctor access. To make data’s scalable secure we need to encrypt the health data before outsourcing.

  14. Cognitive Computing for Security.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Debenedictis, Erik; Rothganger, Fredrick; Aimone, James Bradley

    Final report for Cognitive Computing for Security LDRD 165613. It reports on the development of hybrid of general purpose/ne uromorphic computer architecture, with an emphasis on potential implementation with memristors.

  15. Analysis on the security of cloud computing

    NASA Astrophysics Data System (ADS)

    He, Zhonglin; He, Yuhua

    2011-02-01

    Cloud computing is a new technology, which is the fusion of computer technology and Internet development. It will lead the revolution of IT and information field. However, in cloud computing data and application software is stored at large data centers, and the management of data and service is not completely trustable, resulting in safety problems, which is the difficult point to improve the quality of cloud service. This paper briefly introduces the concept of cloud computing. Considering the characteristics of cloud computing, it constructs the security architecture of cloud computing. At the same time, with an eye toward the security threats cloud computing faces, several corresponding strategies are provided from the aspect of cloud computing users and service providers.

  16. U.S. and Korea in Vietnam and the Japan-Korea Treaty: Search for Security, Prosperity and Influence

    DTIC Science & Technology

    1991-05-01

    never became the divisive social issue it became in the United States. There is even today an unspoken understanding that it helped the security and...effort made an immediate return untenable, but the U.S. was aware that it was a critical bilateral issue, because Japan had become important to the war...National Reconstruction (SCNR), and recommended that the emphasis of a new Korea policy should be on long-term economic, political, and social

  17. Enhancing Security by System-Level Virtualization in Cloud Computing Environments

    NASA Astrophysics Data System (ADS)

    Sun, Dawei; Chang, Guiran; Tan, Chunguang; Wang, Xingwei

    Many trends are opening up the era of cloud computing, which will reshape the IT industry. Virtualization techniques have become an indispensable ingredient for almost all cloud computing system. By the virtual environments, cloud provider is able to run varieties of operating systems as needed by each cloud user. Virtualization can improve reliability, security, and availability of applications by using consolidation, isolation, and fault tolerance. In addition, it is possible to balance the workloads by using live migration techniques. In this paper, the definition of cloud computing is given; and then the service and deployment models are introduced. An analysis of security issues and challenges in implementation of cloud computing is identified. Moreover, a system-level virtualization case is established to enhance the security of cloud computing environments.

  18. Computer Network Security- The Challenges of Securing a Computer Network

    NASA Technical Reports Server (NTRS)

    Scotti, Vincent, Jr.

    2011-01-01

    This article is intended to give the reader an overall perspective on what it takes to design, implement, enforce and secure a computer network in the federal and corporate world to insure the confidentiality, integrity and availability of information. While we will be giving you an overview of network design and security, this article will concentrate on the technology and human factors of securing a network and the challenges faced by those doing so. It will cover the large number of policies and the limits of technology and physical efforts to enforce such policies.

  19. 75 FR 52770 - Agency Information Collection Activities: Proposed Collection; Comment Request, 1660-0047...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-27

    ... Muriel Glover, Emergency Management Specialist, Response Directorate, Business Management Division... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID: FEMA-2010-0047... Emergency Management Agency, DHS. ACTION: Notice; 60-day notice and request for comments; extension, without...

  20. 28 CFR 65.70 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...; (3) Criminal Division of the Department of Justice; (4) Internal Revenue Service; (5) Customs Service; (6) Department of Homeland Security; (7) U.S. Marshals Service; (8) National Park Service; (9) U.S... Act to mean funds, equipment, training, intelligence information, and personnel. (c) Federal law...

  1. - Oklahoma Water Resources Center

    Science.gov Websites

    INTERDISCIPLINARY PROGRAMS Environmental Sciences Master of International Agriculture Degree Program OSU Home Professional Development Training (Baton Rouge, LA; 8/5-10) Global Water Security for Agriculture and Natural Oklahoma City Center for Health Sciences Division of Agriculture Institute of Technology Veterinary

  2. 76 FR 11533 - Securities Exchange Act of 1934; In the Matter of Chicago Board Options Exchange, Incorporated...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-02

    ... memorandum by its Division of Risk, Strategy, and Financial Innovation (``RiskFin'') analyzing certain data... Commission Rule of Practice 431(a), which permits us to ``affirm, reverse, modify, set aside or remand for...

  3. 75 FR 51429 - Definitions Contained in Title VII of Dodd-Frank Wall Street Reform and Consumer Protection Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-20

    ... Michael J. Reedich, Special Counsel, at 202-551-3279, Office of Chief Counsel, Division of Corporate Finance, Securities and Exchange Commission, 100 F Street, NE., Washington, DC 20549-7010; CFTC: Terry S...

  4. 31 CFR 409.2 - Procedures.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... and Finance: Treasury Regulations Relating to Money and Finance (Continued) SECRET SERVICE, DEPARTMENT... Charge of the Secret Service, Technical Security Division, in applying the standard set forth in § 409.1... denial by contacting the Assistant Director—Protective Operations, United States Secret Service, 1800 “G...

  5. 31 CFR 409.2 - Procedures.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... and Finance: Treasury Regulations Relating to Money and Finance (Continued) SECRET SERVICE, DEPARTMENT... Charge of the Secret Service, Technical Security Division, in applying the standard set forth in § 409.1... denial by contacting the Assistant Director—Protective Operations, United States Secret Service, 1800 “G...

  6. 31 CFR 409.2 - Procedures.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... and Finance: Treasury Regulations Relating to Money and Finance (Continued) SECRET SERVICE, DEPARTMENT... Charge of the Secret Service, Technical Security Division, in applying the standard set forth in § 409.1... denial by contacting the Assistant Director—Protective Operations, United States Secret Service, 1800 “G...

  7. 31 CFR 409.2 - Procedures.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... and Finance: Treasury Regulations Relating to Money and Finance (Continued) SECRET SERVICE, DEPARTMENT... Charge of the Secret Service, Technical Security Division, in applying the standard set forth in § 409.1... denial by contacting the Assistant Director—Protective Operations, United States Secret Service, 1800 “G...

  8. 10 CFR 73.4 - Communications.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...: Document Control Desk, Director, Office of Nuclear Reactor Regulation, Director, Office of New Reactors, Director, Office of Nuclear Material Safety and Safeguards, or Director, Division of Security Policy... 10 Energy 2 2012-01-01 2012-01-01 false Communications. 73.4 Section 73.4 Energy NUCLEAR...

  9. Secured Communication for Business Process Outsourcing Using Optimized Arithmetic Cryptography Protocol Based on Virtual Parties

    NASA Astrophysics Data System (ADS)

    Pathak, Rohit; Joshi, Satyadhar

    Within a span of over a decade, India has become one of the most favored destinations across the world for Business Process Outsourcing (BPO) operations. India has rapidly achieved the status of being the most preferred destination for BPO for companies located in the US and Europe. Security and privacy are the two major issues needed to be addressed by the Indian software industry to have an increased and long-term outsourcing contract from the US. Another important issue is about sharing employee’s information to ensure that data and vital information of an outsourcing company is secured and protected. To ensure that the confidentiality of a client’s information is maintained, BPOs need to implement some data security measures. In this paper, we propose a new protocol for specifically for BPO Secure Multi-Party Computation (SMC). As there are many computations and surveys which involve confidential data from many parties or organizations and the concerned data is property of the organization, preservation and security of this data is of prime importance for such type of computations. Although the computation requires data from all the parties, but none of the associated parties would want to reveal their data to the other parties. We have proposed a new efficient and scalable protocol to perform computation on encrypted information. The information is encrypted in a manner that it does not affect the result of the computation. It uses modifier tokens which are distributed among virtual parties, and finally used in the computation. The computation function uses the acquired data and modifier tokens to compute right result from the encrypted data. Thus without revealing the data, right result can be computed and privacy of the parties is maintained. We have given a probabilistic security analysis of hacking the protocol and shown how zero hacking security can be achieved. Also we have analyzed the specific case of Indian BPO.

  10. EMRlog method for computer security for electronic medical records with logic and data mining.

    PubMed

    Martínez Monterrubio, Sergio Mauricio; Frausto Solis, Juan; Monroy Borja, Raúl

    2015-01-01

    The proper functioning of a hospital computer system is an arduous work for managers and staff. However, inconsistent policies are frequent and can produce enormous problems, such as stolen information, frequent failures, and loss of the entire or part of the hospital data. This paper presents a new method named EMRlog for computer security systems in hospitals. EMRlog is focused on two kinds of security policies: directive and implemented policies. Security policies are applied to computer systems that handle huge amounts of information such as databases, applications, and medical records. Firstly, a syntactic verification step is applied by using predicate logic. Then data mining techniques are used to detect which security policies have really been implemented by the computer systems staff. Subsequently, consistency is verified in both kinds of policies; in addition these subsets are contrasted and validated. This is performed by an automatic theorem prover. Thus, many kinds of vulnerabilities can be removed for achieving a safer computer system.

  11. EMRlog Method for Computer Security for Electronic Medical Records with Logic and Data Mining

    PubMed Central

    Frausto Solis, Juan; Monroy Borja, Raúl

    2015-01-01

    The proper functioning of a hospital computer system is an arduous work for managers and staff. However, inconsistent policies are frequent and can produce enormous problems, such as stolen information, frequent failures, and loss of the entire or part of the hospital data. This paper presents a new method named EMRlog for computer security systems in hospitals. EMRlog is focused on two kinds of security policies: directive and implemented policies. Security policies are applied to computer systems that handle huge amounts of information such as databases, applications, and medical records. Firstly, a syntactic verification step is applied by using predicate logic. Then data mining techniques are used to detect which security policies have really been implemented by the computer systems staff. Subsequently, consistency is verified in both kinds of policies; in addition these subsets are contrasted and validated. This is performed by an automatic theorem prover. Thus, many kinds of vulnerabilities can be removed for achieving a safer computer system. PMID:26495300

  12. The Naval Postgraduate School SECURE ARCHIVAL STORAGE SYSTEM. Part II. Segment and Process Management Implementation.

    DTIC Science & Technology

    1981-03-01

    Research Instructor of Computer Scienr-. Reviewed by: Released by: WILLIAM M. TOLLES Department puter Science Dean of Research 4c t SECURITY...Lyle A. Cox, Roger R. Schell, and Sonja L. Perdue 9. PERFORMING ORGANIZATION NAME ANO ADDRESS 10. PROGRAM ELEMENT. PROJECT. TASK AREA A WORK UNIT... Computer Networks, Operating Systems, Computer Security 20. AftUrCT (Cnthm, w v re eae old* It n..*p and idm 0 F W blk ..m.m.o’) ",A_;he security

  13. Private quantum computation: an introduction to blind quantum computing and related protocols

    NASA Astrophysics Data System (ADS)

    Fitzsimons, Joseph F.

    2017-06-01

    Quantum technologies hold the promise of not only faster algorithmic processing of data, via quantum computation, but also of more secure communications, in the form of quantum cryptography. In recent years, a number of protocols have emerged which seek to marry these concepts for the purpose of securing computation rather than communication. These protocols address the task of securely delegating quantum computation to an untrusted device while maintaining the privacy, and in some instances the integrity, of the computation. We present a review of the progress to date in this emerging area.

  14. Secure or Insure: An Economic Analysis of Security Interdependencies and Investment Types

    ERIC Educational Resources Information Center

    Grossklags, Jens

    2009-01-01

    Computer users express a strong desire to prevent attacks, and to reduce the losses from computer and information security breaches. However, despite the widespread availability of various technologies, actual investments in security remain highly variable across the Internet population. As a result, attacks such as distributed denial-of-service…

  15. 77 FR 65215 - In the Matter of Licensee Identified in Attachment 1 and all Other Persons Who Obtain Safeguards...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-25

    ... a computing environment that has adequate computer security controls in place to prevent... NRC intends to issue a security Order to this Licensee in the near future. The Order will require compliance with specific Additional Security Measures to enhance the security for certain radioactive...

  16. Computer applications for the hospital security department--buying or developing a shift log reporting system.

    PubMed

    Gruber, T

    1996-01-01

    The author presents guidelines to help a security department select a computer system to track security activities--whether it's a commercial software product, an in-house developed program, or a do-it-yourself designed system. Computerized security activity reporting, he believes, is effective and beneficial.

  17. Aviation security : vulnerabilities still exist in the aviation security system

    DOT National Transportation Integrated Search

    2000-04-06

    The testimony today discusses the Federal Aviation Administration's (FAA) efforts to implement and improve security in two key areas: air traffic control computer systems and airport passenger screening checkpoints. Computer systems-and the informati...

  18. Air Traffic Control: Weak Computer Security Practices Jeopardize Flight Safety

    DOT National Transportation Integrated Search

    1998-05-01

    Given the paramount importance of computer security of Air Traffic Control (ATC) systems, Congress asked the General Accounting Office to determine (1) whether the Fedcral Aviation Administration (FAA) is effectively managing physical security at ATC...

  19. Motivating Contributions for Home Computer Security

    ERIC Educational Resources Information Center

    Wash, Richard L.

    2009-01-01

    Recently, malicious computer users have been compromising computers en masse and combining them to form coordinated botnets. The rise of botnets has brought the problem of home computers to the forefront of security. Home computer users commonly have insecure systems; these users do not have the knowledge, experience, and skills necessary to…

  20. Proposal for founding mistrustful quantum cryptography on coin tossing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kent, Adrian; Hewlett-Packard Laboratories, Filton Road, Stoke Gifford, Bristol BS34 8QZ,

    2003-07-01

    A significant branch of classical cryptography deals with the problems which arise when mistrustful parties need to generate, process, or exchange information. As Kilian showed a while ago, mistrustful classical cryptography can be founded on a single protocol, oblivious transfer, from which general secure multiparty computations can be built. The scope of mistrustful quantum cryptography is limited by no-go theorems, which rule out, inter alia, unconditionally secure quantum protocols for oblivious transfer or general secure two-party computations. These theorems apply even to protocols which take relativistic signaling constraints into account. The best that can be hoped for, in general, aremore » quantum protocols which are computationally secure against quantum attack. Here a method is described for building a classically certified bit commitment, and hence every other mistrustful cryptographic task, from a secure coin-tossing protocol. No security proof is attempted, but reasons are sketched why these protocols might resist quantum computational attack.« less

  1. High Energy Physics

    Science.gov Websites

    Untitled Document [Argonne Logo] [DOE Logo] High Energy Physics Home Division ES&H Personnel Collider Physics Cosmic Frontier Cosmic Frontier Theory & Computing Detector R&D Electronic Design Mechanical Design Neutrino Physics Theoretical Physics Seminars HEP Division Seminar HEP Lunch Seminar HEP

  2. Marginalization in neural circuits with divisive normalization

    PubMed Central

    Beck, J.M.; Latham, P.E.; Pouget, A.

    2011-01-01

    A wide range of computations performed by the nervous system involves a type of probabilistic inference known as marginalization. This computation comes up in seemingly unrelated tasks, including causal reasoning, odor recognition, motor control, visual tracking, coordinate transformations, visual search, decision making, and object recognition, to name just a few. The question we address here is: how could neural circuits implement such marginalizations? We show that when spike trains exhibit a particular type of statistics – associated with constant Fano factors and gain-invariant tuning curves, as is often reported in vivo – some of the more common marginalizations can be achieved with networks that implement a quadratic nonlinearity and divisive normalization, the latter being a type of nonlinear lateral inhibition that has been widely reported in neural circuits. Previous studies have implicated divisive normalization in contrast gain control and attentional modulation. Our results raise the possibility that it is involved in yet another, highly critical, computation: near optimal marginalization in a remarkably wide range of tasks. PMID:22031877

  3. OS friendly microprocessor architecture: Hardware level computer security

    NASA Astrophysics Data System (ADS)

    Jungwirth, Patrick; La Fratta, Patrick

    2016-05-01

    We present an introduction to the patented OS Friendly Microprocessor Architecture (OSFA) and hardware level computer security. Conventional microprocessors have not tried to balance hardware performance and OS performance at the same time. Conventional microprocessors have depended on the Operating System for computer security and information assurance. The goal of the OS Friendly Architecture is to provide a high performance and secure microprocessor and OS system. We are interested in cyber security, information technology (IT), and SCADA control professionals reviewing the hardware level security features. The OS Friendly Architecture is a switched set of cache memory banks in a pipeline configuration. For light-weight threads, the memory pipeline configuration provides near instantaneous context switching times. The pipelining and parallelism provided by the cache memory pipeline provides for background cache read and write operations while the microprocessor's execution pipeline is running instructions. The cache bank selection controllers provide arbitration to prevent the memory pipeline and microprocessor's execution pipeline from accessing the same cache bank at the same time. This separation allows the cache memory pages to transfer to and from level 1 (L1) caching while the microprocessor pipeline is executing instructions. Computer security operations are implemented in hardware. By extending Unix file permissions bits to each cache memory bank and memory address, the OSFA provides hardware level computer security.

  4. Network gateway security method for enterprise Grid: a literature review

    NASA Astrophysics Data System (ADS)

    Sujarwo, A.; Tan, J.

    2017-03-01

    The computational Grid has brought big computational resources closer to scientists. It enables people to do a large computational job anytime and anywhere without any physical border anymore. However, the massive and spread of computer participants either as user or computational provider arise problems in security. The challenge is on how the security system, especially the one which filters data in the gateway could works in flexibility depends on the registered Grid participants. This paper surveys what people have done to approach this challenge, in order to find the better and new method for enterprise Grid. The findings of this paper is the dynamically controlled enterprise firewall to secure the Grid resources from unwanted connections with a new firewall controlling method and components.

  5. A Test-Bed of Secure Mobile Cloud Computing for Military Applications

    DTIC Science & Technology

    2016-09-13

    searching databases. This kind of applications is a typical example of mobile cloud computing (MCC). MCC has lots of applications in the military...Release; Distribution Unlimited UU UU UU UU 13-09-2016 1-Aug-2014 31-Jul-2016 Final Report: A Test-bed of Secure Mobile Cloud Computing for Military...Army Research Office P.O. Box 12211 Research Triangle Park, NC 27709-2211 Test-bed, Mobile Cloud Computing , Security, Military Applications REPORT

  6. Computer network security for the radiology enterprise.

    PubMed

    Eng, J

    2001-08-01

    As computer networks become an integral part of the radiology practice, it is appropriate to raise concerns regarding their security. The purpose of this article is to present an overview of computer network security risks and preventive strategies as they pertain to the radiology enterprise. A number of technologies are available that provide strong deterrence against attacks on networks and networked computer systems in the radiology enterprise. While effective, these technologies must be supplemented with vigilant user and system management.

  7. Privacy and Data Security under Cloud Computing Arrangements: The Legal Framework and Practical Do's and Don'ts

    ERIC Educational Resources Information Center

    Buckman, Joel; Gold, Stephanie

    2012-01-01

    This article outlines privacy and data security compliance issues facing postsecondary education institutions when they utilize cloud computing and concludes with a practical list of do's and dont's. Cloud computing does not change an institution's privacy and data security obligations. It does involve reliance on a third party, which requires an…

  8. Case Study: Creation of a Degree Program in Computer Security. White Paper.

    ERIC Educational Resources Information Center

    Belon, Barbara; Wright, Marie

    This paper reports on research into the field of computer security, and undergraduate degrees offered in that field. Research described in the paper reveals only one computer security program at the associate's degree level in the entire country. That program, at Texas State Technical College in Waco, is a 71-credit-hour program leading to an…

  9. Understanding Mobile Apps

    MedlinePlus

    ... share personal information let your kids spend real money — even if the app is free include ads link to social media What’s more, ... Money & Credit Homes & Mortgages Health & Fitness Jobs & Making ... Security "Free" Security Scans Computer Security Disposing of Old Computers ...

  10. 17 CFR 230.167 - Communications in connection with certain registered offerings of asset-backed securities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... § 230.415, ABS informational and computational material regarding such securities used after the... informational and computational material used in reliance on Securities Act Rule 167 (§ 230.167); and (iv) A...

  11. 17 CFR 230.167 - Communications in connection with certain registered offerings of asset-backed securities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... § 230.415, ABS informational and computational material regarding such securities used after the... informational and computational material used in reliance on Securities Act Rule 167 (§ 230.167); and (iv) A...

  12. 17 CFR 230.167 - Communications in connection with certain registered offerings of asset-backed securities.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... § 230.415, ABS informational and computational material regarding such securities used after the... informational and computational material used in reliance on Securities Act Rule 167 (§ 230.167); and (iv) A...

  13. 17 CFR 230.167 - Communications in connection with certain registered offerings of asset-backed securities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... § 230.415, ABS informational and computational material regarding such securities used after the... informational and computational material used in reliance on Securities Act Rule 167 (§ 230.167); and (iv) A...

  14. A Trusted Portable Computing Device

    NASA Astrophysics Data System (ADS)

    Ming-wei, Fang; Jun-jun, Wu; Peng-fei, Yu; Xin-fang, Zhang

    A trusted portable computing device and its security mechanism were presented to solve the security issues, such as the attack of virus and Trojan horse, the lost and stolen of storage device, in mobile office. It used smart card to build a trusted portable security base, virtualization to create a secure virtual execution environment, two-factor authentication mechanism to identify legitimate users, and dynamic encryption to protect data privacy. The security environment described in this paper is characteristic of portability, security and reliability. It can meet the security requirement of mobile office.

  15. Human Security: Relevance and Implications

    DTIC Science & Technology

    2005-01-01

    Other deprivations that can motivate conflict include an in- tolerable loss of honor. Emile Durkheim , an early sociologist, called attention in late...Anderson. 49. Emile Durkheim , Suicide, trans. J. A. Spaulding and G. Simpson (New York: The Free Press, 1951); Emile Durkheim , The Division of Labor in

  16. 77 FR 28476 - Political Contributions by Certain Investment Advisers

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-15

    ...] Political Contributions by Certain Investment Advisers AGENCY: Securities and Exchange Commission. ACTION... Investment Advisers Act of 1940 (``Advisers Act'') to correct an inadvertent error in the rule as published...-6787 or [email protected] , Office of Investment Adviser Regulation, Division of Investment Management, U...

  17. Alaska Department of Natural Resources

    Science.gov Websites

    Asked Questions Public Information Center Contacts/Office Directory Jobs/Volunteer Opportunities Boards Recreation Support Services Division Offices Commissioner's Office Public Information Center Alaska State the collection, use and security of and access to information that may be obtained through use of the

  18. NOAA's National Geodetic Survey Utilization of Aerial Sensors for Emergency Response Efforts

    NASA Technical Reports Server (NTRS)

    White, Stephen

    2007-01-01

    Remote Sensing Division has a Coastal Mapping program and a Airport Survey program and research and development that support both programs. NOAA/NGS/RSD plans to acquire remotely sensed data to support the agency's homeland security and emergency response requirements.

  19. 17 CFR 171.28 - Participation by Commission staff.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... staff. 171.28 Section 171.28 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION..., Membership Denial and Registration Actions § 171.28 Participation by Commission staff. The Division of.... The Commission shall by order establish a supplementary briefing schedule for the Commission staff and...

  20. 17 CFR 171.28 - Participation by Commission staff.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... staff. 171.28 Section 171.28 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION..., Membership Denial and Registration Actions § 171.28 Participation by Commission staff. The Division of.... The Commission shall by order establish a supplementary briefing schedule for the Commission staff and...

  1. 17 CFR 171.28 - Participation by Commission staff.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... staff. 171.28 Section 171.28 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION..., Membership Denial and Registration Actions § 171.28 Participation by Commission staff. The Division of.... The Commission shall by order establish a supplementary briefing schedule for the Commission staff and...

  2. 17 CFR 171.28 - Participation by Commission staff.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... staff. 171.28 Section 171.28 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION..., Membership Denial and Registration Actions § 171.28 Participation by Commission staff. The Division of.... The Commission shall by order establish a supplementary briefing schedule for the Commission staff and...

  3. Engage States on Energy Assurance and Energy Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kara Colton; John Ratliff; Sue Gander

    2008-09-30

    The NGA Center's 'Engaging States on Energy Security and Energy Assurance' has been successful in achieving the stated project purposes and objectives both in the initial proposal as well as in subsequent revisions to it. Our activities, which involve the NGA Center for Best Practices (The NGA Center) Homeland Security and Technology Division, included conducting tabletop exercises to help federal and state homeland security and energy officials determine roles and actions for various emergency scenarios. This included efforts to education state official on developing an energy assurance plan, harmonizing approaches to controlling price volatility, implementing reliability standards, understanding short andmore » long-term energy outlooks and fuel diversification, and capitalizing on DOE's research and development activities. Regarding our work on energy efficiency and renewable energy, the NGA Center's Environment, Energy and Natural Resources Division hosted three workshops which engaged states on the clean energy and alternative transportation fuel and also produced several reports on related topics. In addition, we convened 18 meetings, via conference call, of the Energy Working Group. Finally, through the NGA Center's Front and Center newsletter articles, the NGA Center disseminated promising practices to a wide audience of state policymakers. The NGA Center also hosted a number of workshops and web conferences designed to directly engage states on the deliverables under this Cooperative Agreement. Through the NGA Center's written products and newsletter articles, the NGA Center was able to disseminate promising practices to a wide audience of state policymakers.« less

  4. The Role of Self-Efficacy in Computer Security Behavior: Developing the Construct of Computer Security Self-Efficacy (CSSE)

    ERIC Educational Resources Information Center

    Clarke, Marlon

    2011-01-01

    As organizations have become more dependent on networked information systems (IS) to conduct their business operations, their susceptibility to various threats to information security has also increased. Research has consistently identified the inappropriate security behavior of the users as the most significant of these threats. Various factors…

  5. Space division multiplexing chip-to-chip quantum key distribution.

    PubMed

    Bacco, Davide; Ding, Yunhong; Dalgaard, Kjeld; Rottwitt, Karsten; Oxenløwe, Leif Katsuo

    2017-09-29

    Quantum cryptography is set to become a key technology for future secure communications. However, to get maximum benefit in communication networks, transmission links will need to be shared among several quantum keys for several independent users. Such links will enable switching in quantum network nodes of the quantum keys to their respective destinations. In this paper we present an experimental demonstration of a photonic integrated silicon chip quantum key distribution protocols based on space division multiplexing (SDM), through multicore fiber technology. Parallel and independent quantum keys are obtained, which are useful in crypto-systems and future quantum network.

  6. Interactive Synthesis of Code Level Security Rules

    DTIC Science & Technology

    2017-04-01

    Interactive Synthesis of Code-Level Security Rules A Thesis Presented by Leo St. Amour to The Department of Computer Science in partial fulfillment...of the requirements for the degree of Master of Science in Computer Science Northeastern University Boston, Massachusetts April 2017 DISTRIBUTION...Abstract of the Thesis Interactive Synthesis of Code-Level Security Rules by Leo St. Amour Master of Science in Computer Science Northeastern University

  7. Cartographic applications software

    USGS Publications Warehouse

    ,

    1992-01-01

    The Office of the Assistant Division Chief for Research, National Mapping Division, develops computer software for the solution of geometronic problems in the fields of surveying, geodesy, remote sensing, and photogrammetry. Software that has been developed using public funds is available on request for a nominal charge to recover the cost of duplication.

  8. 17 CFR 200.11 - Headquarters Office-Regional Office relationships.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Headquarters Office-Regional... General Organization § 200.11 Headquarters Office—Regional Office relationships. (a)(1) Division and... responsibility to the Commission for the overall development, policy and technical guidance, and policy direction...

  9. Hanford Works monthly report, December 1950

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Prout, G.R.

    1951-01-22

    This is a progress report of the production reactors on the Hanford Reservation for the month of December 1950. This report takes each division (e.g., manufacturing, medical, accounting, occupational safety, security, reactor operations, etc.) of the site and summarizes its accomplishments and employee relations for that month.

  10. Hanford Works monthly report, April 1952

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Prout, G.R.

    1952-05-20

    This is a progress report of the production reactors on the Hanford Reservation for the month of April 1952. This report takes each division (e.g., manufacturing, medical, accounting, occupational safety, security, reactor operations, etc.) of the site and summarizes its accomplishments and employee relations for that month.

  11. 75 FR 742 - Temporary Rule Regarding Principal Trades With Certain Advisory Clients

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-06

    ... , Office of Investment Adviser Regulation, Division of Investment Management, Securities and Exchange... the Investment Advisers Act of 1940, the interim final temporary rule that establishes an alternative means for investment advisers who are registered with the Commission as broker-dealers to meet the...

  12. 76 FR 3909 - Agency Information Collection Activities: Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-21

    ... Annual Reporting; Use: Section 1923(j)(i) of the Social Security Act requires States to submit an annual...); Frequency: Yearly; Affected Public: Business or other for-profit, not-for-profit institutions; Number of... Strategic Operations and Regulatory Affairs, Division of Regulations Development, Attention: Document...

  13. RESPONSE PROTOCOL TOOLBOX: PLANNING FOR AND RESPONDING TO CONTAMINATION THREATS TO DRINKING WATER SYSTEMS

    EPA Science Inventory

    EPA's Office of Research and Development and Office of Water/Water Security Division have jointly developed a Response Protocol Toolbox (RPTB) to address the complex, multi-faceted challenges of a water utility's planning and response to intentional contamination of drinking wate...

  14. A CBO Paper: Educational Attainment and Compensation of Enlisted Personnel

    DTIC Science & Technology

    2004-02-01

    of CBO’s National Security Division wrote the paper under the supervision of Deborah Clay- Mendez and J. Michael Gilmore. At CBO, Daniel Frisk...and Carol Frost provided programming assis- tance for the statistical analyses. Nabeel Alsalam, Robert Dennis, Cary Elliot, Seth Giertz, Roger

  15. Hanford Works monthly report, August 1950

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Prout, G.R.

    1950-09-18

    This is a progress report of the production reactors on the Hanford Reservation for the month of August 1950. This report takes each division (e.g. manufacturing, medical, accounting, occupational safety, security, reactor operations, etc.) of the site and summarizes its accomplishments and employee relations for that month.

  16. 14 CFR 380.25 - Prospectus filing and related requirements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ..., origin city or destination city; and (3) A change in or addition of any direct air carrier, securer, or... Analysis, Special Authorities Division shall be advised of this fact within 2 business days. (Approved by the Office of Management and Budget under Control Number 2106-0005) ...

  17. 77 FR 33227 - Assessment Questionnaire-IP Sector Specific Agency Risk Self Assessment Tool (IP-SSARSAT)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-05

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0069] Assessment Questionnaire--IP Sector Specific Agency Risk Self Assessment Tool (IP-SSARSAT) AGENCY: National Protection and Programs Directorate...), Office of Infrastructure Protection (IP), Sector Outreach and Programs Division (SOPD), previously named...

  18. Hanford Works monthly report, May 1951

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Prout, G.R.

    1951-06-21

    This is a progress report of the production reactors on the Hanford Reservation for the month of May 1951. This report takes each division (e.g., manufacturing, medical, accounting, occupational safety, security, reactor operations, etc.) of the site and summarizes its accomplishments and employee relations for that month.

  19. 31 CFR 306.1 - Official agencies.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... securities and requests for appropriate forms may be addressed to the Division of Customer Service... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Official agencies. 306.1 Section 306.1 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL SERVICE...

  20. 78 FR 69100 - Agency Information Collection Activities: Proposed Collection; Comment Request; Request for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-18

    ... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID: FEMA-2013-0045... AGENCY: Federal Emergency Management Agency, DHS. ACTION: Notice. SUMMARY: The Federal Emergency... written comments to Regulatory Affairs Division, Office of Chief Counsel, DHS/FEMA, 500 C Street SW., Room...

  1. 17 CFR 200.19a - Director of the Division of Trading and Markets.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Organization and Program Management... responsibilities include oversight of the national market system, the national clearance and settlement system, and... and dealers, transfer agents, and securities information processors. The functions involved in the...

  2. Hanford Works monthly report, December 1951

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Prout, G.R.

    1952-01-22

    This is a progress report of the production reactors on the Hanford Reservation for the month of December 1951. This report takes each division (e.g., manufacturing, medical, accounting, occupational safety, security, reactor operations, etc.) of the site and summarizes its accomplishments and employee relations for that month.

  3. OSTP FY 2014 Budget Briefing

    NASA Image and Video Library

    2013-04-10

    Patricia Falcone, Associate Director, National Security and International Affairs Division, White House Office of Science and Technology Policy, is seen during a Fiscal Year 2014 budget briefing held at the American Association for the Advancement of Science (AAAS) on Wednesday, April 10, 2013 in Washington. Photo Credit: (NASA/Bill Ingalls)

  4. OSTP FY 2014 Budget Briefing

    NASA Image and Video Library

    2013-04-10

    Patricia Falcone, Associate Director, National Security and International Affairs Division, White House Office of Science and Technology Policy, delivers remarks during a Fiscal Year 2014 budget briefing held at the American Association for the Advancement of Science (AAAS) on Wednesday, April 10, 2013 in Washington. Photo Credit: (NASA/Bill Ingalls)

  5. Hanford Works monthly report, March 1951

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Prout, G.R.

    1951-04-20

    This is a progress report of the production reactors on the Hanford Reservation for the month of March 1951. This report takes each division (e.g., manufacturing, medical, accounting, occupational safety, security, reactor operations, etc.) of the site and summarizes its accomplishments and employee relations for that month.

  6. Hanford Works monthly report, July 1951

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Prout, G.R.

    This is a progress report of the production reactors on the Hanford Reservation for the month of July 1951. This report takes each division (e.g., manufacturing, medical, accounting, occupational safety, security, reactor operations, etc.) of the site and summarizes its accomplishments and employee relations for that month.

  7. Hanford Works monthly report, March 1952

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Prout, G.R.

    1952-04-18

    This is a progress report of the production reactors on the Hanford Reservation for the month of April 1952. This report takes each division (e.g., manufacturing, medical, accounting, occupational safety, security, reactor operations, etc.) of the site and summarizes its accomplishments and employee relations for that month.

  8. Hanford Works monthly report, July 1952

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Prout, G.R.

    1952-08-15

    This is a progress report of the production reactors on the Hanford Reservation for the month of July 1952. This report takes each division (e.g., manufacturing, medical, accounting, occupational safety, security, reactor operations, etc.) of the site and summarizes its accomplishments and employee relations for that month.

  9. Hanford works monthly report, September 1951

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Prout, G.R.

    This is a progress report of the production reactors on the Hanford Reservation for the month of September 1951. This report takes each division (e.g., manufacturing, medical, accounting, occupational safety, security, reactor operations, etc.) of the site and summarizes its accomplishments and employee relations for that month.

  10. Hanford Works monthly report, January 1952

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Prout, G.R.

    This is a progress report of the production reactors on the Hanford Reservation for the month of January 1952. This report takes each division (e.g., manufacturing, medical, accounting, occupational safety, security, reactor operations, etc.) of the site and summarizes its accomplishments and employee relations for that month.

  11. Hanford Works monthly report, August 1951

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1951-09-24

    This is a progress report of the production reactors on the Hanford Reservation for the month of August 1951. This report takes each division (e.g., manufacturing, medical, accounting, occupational safety, security, reactor operations, etc.) of the site and summarizes its accomplishments and employee relations for that month.

  12. Hanford Works monthly report, July 1950

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Prout, G.R.

    1950-08-18

    This is a progress report of the production reactors on the Hanford Reservation for the month of July 1950. This report takes each division (e.g., manufacturing, medical, accounting, occupational safety, security, reactor operations, etc.) of the site and summarizes its accomplishments and employee relations for that month.

  13. Hanford Works monthly report, November 1951

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Prout, G.R.

    1951-12-21

    This is a progress report of the production reactors on the Hanford Reservation for the month of November 1951. This report takes each division (e.g., manufacturing, medical, accounting, occupational safety, security, reactor operations, etc.) of the site and summarizes its accomplishments and employee relations for that month.

  14. Hanford Works monthly report, October 1950

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Prout, G.R.

    1950-11-20

    This is a progress report of the production reactors on the Hanford Reservation for the month of October 1950. This report takes each division (e.g., manufacturing, medical, accounting, occupational safety, security, reactor operations, etc.) of the site and summarizes its accomplishments and employee relations for that month.

  15. Hanford Works monthly report, September 1950

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Prout, G.R.

    1950-10-20

    This is a progress report of the production reactors on the Hanford Reservation for the month of September 1950. This report takes each division (e.g., manufacturing, medical, accounting, occupational safety, security, reactor operations, etc.) of the site and summarizes its accomplishments and employee relations for that month.

  16. Hanford Works monthly report, November 1950

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Prout, G.R.

    1950-12-20

    This is a progress report of the production reactors on the Hanford Reservation for the month of November 1950. This report takes each division (e.g. manufacturing, medical, accounting, occupational safety, security, reactor operations, etc.) of the site and summarizes its accomplishments and employee relations for that month.

  17. Time Division Multiplexing of Semiconductor Qubits

    NASA Astrophysics Data System (ADS)

    Jarratt, Marie Claire; Hornibrook, John; Croot, Xanthe; Watson, John; Gardner, Geoff; Fallahi, Saeed; Manfra, Michael; Reilly, David

    Readout chains, comprising resonators, amplifiers, and demodulators, are likely to be precious resources in quantum computing architectures. The potential to share readout resources is contingent on realising efficient means of time-division multiplexing (TDM) schemes that are compatible with quantum computing. Here, we demonstrate TDM using a GaAs quantum dot device with multiple charge sensors. Our device incorporates chip-level switches that do not load the impedance matching network. When used in conjunction with frequency multiplexing, each frequency tone addresses multiple time-multiplexed qubits, vastly increasing the capacity of a single readout line.

  18. Secure distributed genome analysis for GWAS and sequence comparison computation.

    PubMed

    Zhang, Yihua; Blanton, Marina; Almashaqbeh, Ghada

    2015-01-01

    The rapid increase in the availability and volume of genomic data makes significant advances in biomedical research possible, but sharing of genomic data poses challenges due to the highly sensitive nature of such data. To address the challenges, a competition for secure distributed processing of genomic data was organized by the iDASH research center. In this work we propose techniques for securing computation with real-life genomic data for minor allele frequency and chi-squared statistics computation, as well as distance computation between two genomic sequences, as specified by the iDASH competition tasks. We put forward novel optimizations, including a generalization of a version of mergesort, which might be of independent interest. We provide implementation results of our techniques based on secret sharing that demonstrate practicality of the suggested protocols and also report on performance improvements due to our optimization techniques. This work describes our techniques, findings, and experimental results developed and obtained as part of iDASH 2015 research competition to secure real-life genomic computations and shows feasibility of securely computing with genomic data in practice.

  19. Secure distributed genome analysis for GWAS and sequence comparison computation

    PubMed Central

    2015-01-01

    Background The rapid increase in the availability and volume of genomic data makes significant advances in biomedical research possible, but sharing of genomic data poses challenges due to the highly sensitive nature of such data. To address the challenges, a competition for secure distributed processing of genomic data was organized by the iDASH research center. Methods In this work we propose techniques for securing computation with real-life genomic data for minor allele frequency and chi-squared statistics computation, as well as distance computation between two genomic sequences, as specified by the iDASH competition tasks. We put forward novel optimizations, including a generalization of a version of mergesort, which might be of independent interest. Results We provide implementation results of our techniques based on secret sharing that demonstrate practicality of the suggested protocols and also report on performance improvements due to our optimization techniques. Conclusions This work describes our techniques, findings, and experimental results developed and obtained as part of iDASH 2015 research competition to secure real-life genomic computations and shows feasibility of securely computing with genomic data in practice. PMID:26733307

  20. Students Enrolled in Selected Upper-Division Agriculture Courses: An Examination of Computer Experiences, Self-Efficacy and Knowledge.

    ERIC Educational Resources Information Center

    Johnson, Donald M.; Ferguson, James A.; Lester, Melissa L.

    2000-01-01

    Of 169 agriculture students surveyed, 79% had computer training, 66% owned computers; they had slightly above average computer self-efficacy, especially in word processing, electronic mail, and Internet use. However, 72.7% scored 60% or less on a test of computer knowledge. There was little correlation between self-efficacy and computer knowledge.…

  1. The mechanisms of labor division from the perspective of individual optimization

    NASA Astrophysics Data System (ADS)

    Zhu, Lirong; Chen, Jiawei; Di, Zengru; Chen, Liujun; Liu, Yan; Stanley, H. Eugene

    2017-12-01

    Although the tools of complexity research have been applied to the phenomenon of labor division, its underlying mechanisms are still unclear. Researchers have used evolutionary models to study labor division in terms of global optimization, but focusing on individual optimization is a more realistic, real-world approach. We do this by first developing a multi-agent model that takes into account information-sharing and learning-by-doing and by using simulations to demonstrate the emergence of labor division. We then use a master equation method and find that the computational results are consistent with the results of the simulation. Finally we find that the core underlying mechanisms that cause labor division are learning-by-doing, information cost, and random fluctuation.

  2. Non-developmental item computer systems and the malicious software threat

    NASA Technical Reports Server (NTRS)

    Bown, Rodney L.

    1991-01-01

    The following subject areas are covered: a DOD development system - the Army Secure Operating System; non-development commercial computer systems; security, integrity, and assurance of service (SI and A); post delivery SI and A and malicious software; computer system unique attributes; positive feedback to commercial computer systems vendors; and NDI (Non-Development Item) computers and software safety.

  3. Versatile analog pulse height computer performs real-time arithmetic operations

    NASA Technical Reports Server (NTRS)

    Brenner, R.; Strauss, M. G.

    1967-01-01

    Multipurpose analog pulse height computer performs real-time arithmetic operations on relatively fast pulses. This computer can be used for identification of charged particles, pulse shape discrimination, division of signals from position sensitive detectors, and other on-line data reduction techniques.

  4. The University of South Carolina: College and University Computing Environment.

    ERIC Educational Resources Information Center

    CAUSE/EFFECT, 1987

    1987-01-01

    Both academic and administrative computing as well as network and communications services for the university are provided and supported by the Computer Services Division. Academic services, administrative services, systems engineering and database administration, communications, networking services, operations, and library technologies are…

  5. Securing the Data Storage and Processing in Cloud Computing Environment

    ERIC Educational Resources Information Center

    Owens, Rodney

    2013-01-01

    Organizations increasingly utilize cloud computing architectures to reduce costs and energy consumption both in the data warehouse and on mobile devices by better utilizing the computing resources available. However, the security and privacy issues with publicly available cloud computing infrastructures have not been studied to a sufficient depth…

  6. Computer Virus Bibliography, 1988-1989.

    ERIC Educational Resources Information Center

    Bologna, Jack, Comp.

    This bibliography lists 14 books, 154 journal articles, 34 newspaper articles, and 3 research papers published during 1988-1989 on the subject of computer viruses, software protection and 'cures', virus hackers, and other related issues. Some of the sources listed include Computers and Security, Computer Security Digest, PC Week, Time, the New…

  7. Instrumentation and Controls Division Progress Report for the Period of July 1, 1994 to December 31, 1997: Publications, Presentations, Activities, and Awards

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McDonald, D.W.

    This report contains a record of publishing and other activities in the Oak Ridge National Laboratory (ORNL) Instrumentation and Controls (I&C) Division for the period of July 1, 1994, to December31, 1997. It is a companion volume to Working Together on New Horizons: Instrumentation and Controls Division Progress Report for the Period of July 1, 1994, to December 31, 1997 (OR.NLA4-6530). Working Together on New Horizons contains illustrated summaries of some of the projects under way in I&C Division. Both books can be obtained by contacting C. R. Brittain (brittain@ornl. gov), P.O. Box 2008, Oak Ridge, TN 37831-6005. l&C Divisionmore » Mission and Vision I&C Division develops and maintains techniques, instruments, and systems that lead to a better understanding of nature and harnessing of natural phenomena for the benefit of humankind. We have dedicated ourselves to accelerating the advancement of science and the transfer of those advancements into products and processes that benefit U.S. industry and enhance the security of our citizens.« less

  8. Report: EPA’s Office of Environmental Information Should Improve Ariel Rios and Potomac Yard Computer Room Security Controls

    EPA Pesticide Factsheets

    Report #12-P-0879, September 26, 2012. The security posture and in-place environmental control review of the computer rooms in the Ariel Rios and Potomac Yard buildings revealed numerous security and environmental control deficiencies.

  9. 20 CFR 225.15 - Overall Minimum PIA.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Security Act based on combined railroad and social security earnings. The Overall Minimum PIA is used in computing the social security overall minimum guaranty amount. The overall minimum guaranty rate annuity... INSURANCE AMOUNT DETERMINATIONS PIA's Used in Computing Employee, Spouse and Divorced Spouse Annuities § 225...

  10. National Computer Security Conference Proceedings (11th): A Postscript: Computer Security--Into the Future, 17-20 October 1988

    DTIC Science & Technology

    1988-10-20

    The LOCK project , from its very beginnings as an implementation study for the Provably Secure Operating System in 1979...to the security field, can study to gain insight into the evaluation process. The project has developed an innovative format for the DTLS and FTLS...management tern becomes available, the Al Secure DBMS will be system (DBMS) that is currently being developed un- ported to it . der the Advanced

  11. A History of the Chemistry Division, Naval Research Laboratory, Washington, D.C., 1927-1982.

    DTIC Science & Technology

    1983-04-22

    APR 83 NRL-MR-5064 UNCLASSIFIED F/G 14/2 NL BEhhhhhhEBEE mhhhhhEEmllI Illsommommommom IImllllllmlllI o /lommommommo - ..... *1 4 , 11111 .08 J&5 iii0...ADDRESS(II differet from Con rollll Office) 15. SECURITY CLASS. (at thi soperl) UNCLASSIFIED(Sa. DECL ASSI FICA TION/DOWNGRADING SCHEDULE 16. DISTRIBUTION...it. DO , o 1473 EDITION OF I NOV 1S IS OBSOLETE S/N 0102-014-6601 SECURITY CLASSIFICATION OF THIS PAGE (When Date &imed) U " 1 ’ " ’ L I L i ’ i

  12. A brief history of Sandia's National security missions.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Drewien, Celeste A.; O'Canna, Myra Lynn; Stikar, John Anthony.

    2014-09-01

    To help members of the workforce understand what factors contribute to Sandia National Laboratories national security mission, the authors describe the evolution of Sandias core mission and its other mission components. The mission of Sandia first as a division of Los Alamos and later as Sandia Corporation underlies our core nuclear weapon mission of today. Sandias mission changed in 1963 and twice more in the 1970s. This report should help staff and management appreciate the need for mission evolution. A clear definition and communication of a consistent corporate mission statement is still needed.

  13. Analysis of the Proposed Use of Minuteman Missile Combat Crew Members as Maintenance Extenders.

    DTIC Science & Technology

    1984-09-01

    which was actually closed and secured after duty hours by a large bank vault-type door. D022. Acronym for the Plans and Intelligence Division, a DO...was secured with a bank vault-type door. 12 p I I I Maintenance I I----lt --u ----ty I -- -- I Training I I Mantenance I I I OHMS I FMMS...adding more duties? Are you crazy? -. OHMS Shop Chiefs .. every time I go down to the LCC the MCCMs are sitting around in their pajamas reading dirty

  14. Application of Computational Toxicology to Prospective and Diagnostic Ecological Risk Assessment

    EPA Pesticide Factsheets

    Application of Computational Toxicology to Prospective and Diagnostic Ecological Risk Assessment (Presented by: Dan Villeneuve, Ph.D., Research Toxicologist, US-EPA Mid-Continent Ecology Division) (1/24/2013)

  15. Enterprise virtual private network (VPN) with dense wavelength division multiplexing (DWDM) design

    NASA Astrophysics Data System (ADS)

    Carranza, Aparicio

    An innovative computer simulation and modeling tool for metropolitan area optical data communication networks is presented. These models address the unique requirements of Virtual Private Networks for enterprise data centers, which may comprise a mixture of protocols including ESCON, FICON, Fibre Channel, Sysplex protocols (ETR, CLO, ISC); and other links interconnected over dark fiber using Dense Wavelength Division Multiplexing (DWDM). Our models have the capability of designing a network with minimal inputs; to compute optical link budgets; suggest alternative configurations; and also optimize the design based on user-defined performance metrics. The models make use of Time Division Multiplexing (TDM) wherever possible for lower data rate traffics. Simulation results for several configurations are presented and they have been validated by means of experiments conducted on the IBM enterprise network testbed in Poughkeepsie, N.Y.

  16. Comprehensive Computer-Based Instructional Programs: What Works for Educationally Disadvantaged Students?

    ERIC Educational Resources Information Center

    Swan, Karen; And Others

    The Computer Pilot Program of the Division of Computer Information Services of the New York City Board of Education was designed to investigate the claim that comprehensive computer-based instruction (CBI) might best be used to improve the basic skills of educationally disadvantaged students. This ongoing project is designed to identify…

  17. Report: EPA’s Radiation and Indoor Environments National Laboratory Should Improve Its Computer Room Security Controls

    EPA Pesticide Factsheets

    Report #12-P-0847, September 21, 2012.Our review of the security posture and in-place environmental controls of EPA’s Radiation and Indoor Environments National Laboratory computer room disclosed an array of security and environmental control deficiencies.

  18. 17 CFR 200.27 - The Regional Directors.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false The Regional Directors. 200.27... § 200.27 The Regional Directors. Each Regional Director is responsible for executing the Commission's... matters, by the Deputy Director of the Division of Enforcement who is responsible for Regional Office...

  19. 17 CFR 201.57 - Commission review.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Commission review. 201.57... Regulations Pertaining to the Equal Access to Justice Act § 201.57 Commission review. In accordance with the... Division of the Commission may seek review of the initial decision on the fee application, or the...

  20. 17 CFR 201.54 - Settlement.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Settlement. 201.54 Section 201... Regulations Pertaining to the Equal Access to Justice Act § 201.54 Settlement. The applicant and counsel for the Office or Division of the Commission may agree on a proposed settlement of the award before final...

Top