Sample records for doe security research

  1. Public key infrastructure for DOE security research

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aiken, R.; Foster, I.; Johnston, W.E.

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-keymore » infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.« less

  2. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pruski, Marek; Sadow, Aaron D.; Slowing, Igor I.

    Here the catalysis research at the U.S. Department of Energy's (DOE's) National Laboratories covers a wide range of research topics in heterogeneous catalysis, homogeneous/molecular catalysis, biocatalysis, electrocatalysis, and surface science. Since much of the work at National Laboratories is funded by DOE, the research is largely focused on addressing DOE's mission to ensure America's security and prosperity by addressing its energy, environmental, and nuclear challenges through transformative science and technology solutions.

  3. Laboratory Directed Research and Development Program FY2011

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    none, none

    2012-04-27

    Berkeley Lab's research and the Laboratory Directed Research and Development (LDRD) program support DOE's Strategic Themes that are codified in DOE's 2006 Strategic Plan (DOE/CF-0010), with a primary focus on Scientific Discovery and Innovation. For that strategic theme, the Fiscal Year (FY) 2011 LDRD projects support each one of the three goals through multiple strategies described in the plan. In addition, LDRD efforts support the four goals of Energy Security, the two goals of Environmental Responsibility, and Nuclear Security (unclassified fundamental research that supports stockpile safety and nonproliferation programs). Going forward in FY 2012, the LDRD program also supports themore » Goals codified in the new DOE Strategic Plan of May, 2011. The LDRD program also supports Office of Science strategic plans, including the 20-year Scientific Facilities Plan and the Office of Science Strategic Plan. The research also supports the strategic directions periodically under consideration and review by the Office of Science Program Offices, such as LDRD projects germane to new research facility concepts and new fundamental science directions. Brief summares of projects and accomplishments for the period for each division are included.« less

  4. Laboratory Directed Research and Development LDRD-FY-2011

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dena Tomchak

    2012-03-01

    This report provides a summary of the research conducted at the Idaho National Laboratory (INL) during Fiscal Year (FY) 2011. This report demonstrates the types of cutting edge research the INL is performing to help ensure the nation's energy security. The research conducted under this program is aligned with our strategic direction, benefits the Department of Energy (DOE) and is in compliance with DOE order 413.2B. This report summarizes the diverse research and development portfolio with emphasis on the DOE Office of Nuclear Energy (DOE-NE) mission, encompassing both advanced nuclear science and technology and underlying technologies.

  5. Virtual special issue on catalysis at the U.S. Department of Energy's National Laboratories

    DOE PAGES

    Pruski, Marek; Sadow, Aaron D.; Slowing, Igor I.; ...

    2016-04-21

    Here the catalysis research at the U.S. Department of Energy's (DOE's) National Laboratories covers a wide range of research topics in heterogeneous catalysis, homogeneous/molecular catalysis, biocatalysis, electrocatalysis, and surface science. Since much of the work at National Laboratories is funded by DOE, the research is largely focused on addressing DOE's mission to ensure America's security and prosperity by addressing its energy, environmental, and nuclear challenges through transformative science and technology solutions.

  6. Laboratory Directed Research and Development FY2001 Annual Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Al-Ayat, R

    2002-06-20

    Established by Congress in 1991, the Laboratory Directed Research and Development (LDRD) Program provides the Department of Energy (DOE)/National Nuclear Security Administration (NNSA) laboratories, like Lawrence Livermore National Laboratory (LLNL or the Laboratory), with the flexibility to invest up to 6% of their budget in long-term, high-risk, and potentially high payoff research and development (R&D) activities to support the DOE/NNSA's national security missions. By funding innovative R&D, the LDRD Program at LLNL develops and extends the Laboratory's intellectual foundations and maintains its vitality as a premier research institution. As proof of the Program's success, many of the research thrusts thatmore » started many years ago under LDRD sponsorship are at the core of today's programs. The LDRD Program, which serves as a proving ground for innovative ideas, is the Laboratory's most important single resource for fostering excellent science and technology for today's needs and tomorrow's challenges. Basic and applied research activities funded by LDRD enhance the Laboratory's core strengths, driving its technical vitality to create new capabilities that enable LLNL to meet DOE/NNSA's national security missions. The Program also plays a key role in building a world-class multidisciplinary workforce by engaging the Laboratory's best researchers, recruiting its future scientists and engineers, and promoting collaborations with all sectors of the larger scientific community.« less

  7. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pruski, Marek; Sadow, Aaron D.; Slowing, Igor I.

    Catalysis research at the U.S. Department of Energy's (DOE's) National Laboratories covers a wide range of research topics in heterogeneous catalysis, homogeneous/molecular catalysis, biocatalysis, electrocatalysis, and surface science. Since much of the work at National Laboratories is funded by DOE, the research is largely focused on addressing DOE's mission to ensure America's security and prosperity by addressing its energy, environmental, and nuclear challenges through transformative science and technology solutions. The catalysis research carried out at the DOE National Laboratories ranges from very fundamental catalysis science, funded by DOE's Office of Basic Energy Sciences (BES), to applied research and development (R&D)more » in areas such as biomass conversion to fuels and chemicals, fuel cells, and vehicle emission control with primary funding from DOE's Office of Energy Efficiency and Renewable Energy.« less

  8. Nuclear Security: Action May Be Needed to Reassess the Security of NRC-Licensed Research Reactors. Report to the Ranking Member, Subcommittee on National Security and Foreign Affairs, Committee on Oversight and Government Reform, House of Representatives. GAO-08-403

    ERIC Educational Resources Information Center

    Aloise, Gene

    2008-01-01

    There are 37 research reactors in the United States, mostly located on college campuses. Of these, 33 reactors are licensed and regulated by the Nuclear Regulatory Commission (NRC). Four are operated by the Department of Energy (DOE) and are located at three national laboratories. Although less powerful than commercial nuclear power reactors,…

  9. Laboratory-Directed Research and Development 2016 Summary Annual Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pillai, Rekha Sukamar; Jacobson, Julie Ann

    The Laboratory-Directed Research and Development (LDRD) Program at Idaho National Laboratory (INL) reports its status to the U.S. Department of Energy (DOE) by March of each year. The program operates under the authority of DOE Order 413.2C, “Laboratory Directed Research and Development” (April 19, 2006), which establishes DOE’s requirements for the program while providing the laboratory director broad flexibility for program implementation. LDRD funds are obtained through a charge to all INL programs. This report includes summaries of all INL LDRD research activities supported during Fiscal Year (FY) 2016. INL is the lead laboratory for the DOE Office of Nuclearmore » Energy (DOE-NE). The INL mission is to discover, demonstrate, and secure innovative nuclear energy solutions, other clean energy options, and critical infrastructure with a vision to change the world’s energy future and secure our critical infrastructure. Operating since 1949, INL is the nation’s leading research, development, and demonstration center for nuclear energy, including nuclear nonproliferation and physical and cyber-based protection of energy systems and critical infrastructure, as well as integrated energy systems research, development, demonstration, and deployment. INL has been managed and operated by Battelle Energy Alliance, LLC (a wholly owned company of Battelle) for DOE since 2005. Battelle Energy Alliance, LLC, is a partnership between Battelle, BWX Technologies, Inc., AECOM, the Electric Power Research Institute, the National University Consortium (Massachusetts Institute of Technology, Ohio State University, North Carolina State University, University of New Mexico, and Oregon State University), and the Idaho university collaborators (i.e., University of Idaho, Idaho State University, and Boise State University). Since its creation, INL’s research and development (R&D) portfolio has broadened with targeted programs supporting national missions to advance nuclear energy, enable clean energy deployment, and secure and modernize critical infrastructure. INL’s research, development, and demonstration capabilities, its resources, and its unique geography enable integration of scientific discovery, innovation, engineering, operations, and controls into complex large-scale testbeds for discovery, innovation, and demonstration of transformational clean energy and security concepts. These attributes strengthen INL’s leadership as a demonstration laboratory. As a national resource, INL also applies its capabilities and skills to the specific needs of other federal agencies and customers through DOE’s Strategic Partnership Program.« less

  10. Calendar Year 2001 Annual Site Environmental Report, Sandia National Laboratories, Albuquerque, New Mexico

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    VIGIL, FRANCINE S.; SANCHEZ, REBECCA D.; WAGNER, KATRINA

    2002-09-01

    Sandia National Laboratories, New Mexico (SNL/NM) is a government-owned, contractor-operated facility overseen by the U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA) through the Albuquerque Operations Office (AL), Office of Kirtland Site Operations (OKSO). Sandia Corporation, a wholly-owned subsidiary of Lockheed Martin Corporation, operates SNL/NM. Work performed at SNL/NM is in support of the DOE and Sandia Corporation's mission to provide weapon component technology and hardware for the needs of the nation's security. Sandia Corporation also conducts fundamental research and development (R&D) to advance technology in energy research, computer science, waste management, microelectronics, materials science, and transportation safetymore » for hazardous and nuclear components. In support of Sandia Corporation's mission, the Integrated Safety and Security (ISS) Center and the Environmental Restoration (ER) Project at SNL/NM have established extensive environmental programs to assist Sandia Corporation's line organizations in meeting all applicable local, state, and federal environmental regulations and DOE requirements. This annual report summarizes data and the compliance status of Sandia Corporation's environmental protection and monitoring programs through December 31, 2001. Major environmental programs include air quality, water quality, groundwater protection, terrestrial surveillance, waste management, pollution prevention (P2), environmental remediation, oil and chemical spill prevention, and the National Environmental Policy Act (NEPA). Environmental monitoring and surveillance programs are required by DOE Order 5400.1, General Environmental Protection Program (DOE 1990) and DOE Order 231.1, Environment, Safety, and Health Reporting (DOE 1996).« less

  11. Marketing Strategy Research

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    This report documents the research that has been undertaken as background for preparation of a marketing campaign for middle and high school students to increase interest in national security careers at the National Nuclear Security Administration. This work is a part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. Previous research on the development of a properly trained and skilled national security workforce has identified a lack of interest by k-12 students in the STEM (Science, Technology, Engineering, and Mathematics) fields. Further, participation in these careers by womenmore » and minority populations is limited and is not increasing. Added to this are low educational achievement levels in New Mexico, where the marketing campaign will be deployed.« less

  12. Second Annual Systems Engineering Lessons Learned Conference (2nd) Held in Seaside, California on September 20-21, 2011

    DTIC Science & Technology

    2011-09-01

    unknown • Assumed to be bigger than Legitimate Market • Security firms pay for security flaws • Example: Netragard (a cybersecurity firm) pays between... RESEARCE Does this research involve Human Subject Research? Y fl N X If yes, list protocol number(s) here and in blook l1 of Form 298, in thesis If yes, have

  13. Descriptive Model of Generic WAMS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hauer, John F.; DeSteese, John G.

    The Department of Energy’s (DOE) Transmission Reliability Program is supporting the research, deployment, and demonstration of various wide area measurement system (WAMS) technologies to enhance the reliability of the Nation’s electrical power grid. Pacific Northwest National Laboratory (PNNL) was tasked by the DOE National SCADA Test Bed Program to conduct a study of WAMS security. This report represents achievement of the milestone to develop a generic WAMS model description that will provide a basis for the security analysis planned in the next phase of this study.

  14. Israel security in the 21st century: Risks and opportunities. Research report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Eisenkot, G.

    Unlike the United States which publicizes its national security strategy and national military strategy in official public documents, Israel, does not produce such documents for the general public. This may appear paradoxical in that the State of Israel, from its very inception, has invested enormous energy in its security. Nevertheless, Israel has no detailed security doctrine approved and updated by the Cabinet, the Knesset (Israel`s parliament) or the General Staff. The lack of an official, published, security doctrine does not imply that Israel lacks a coherent political and military strategy based on doctrine-like concepts. Israel`s political and military successes aremore » proof to the contrary. Our purpose, then, is to identify a number of the critical Security Principles that have shaped Israeli strategy. This will provide us the foundation for our main discussion which is the risks and challenges to Israeli security in the 21st century and possible responses to those challenges.« less

  15. Human Security in the Asia-Pacific: In Australia’s National Interests?

    DTIC Science & Technology

    2011-12-16

    Australian doctrine does not clearly define instruments of national power, this research uses the U.S. military definition. In accordance with U.S. 9...military doctrine , the instruments of national power are diplomatic, informational, military, and economic.16 Australia has been a very secure...

  16. A Primer on Developing Measures of Effectiveness

    DTIC Science & Technology

    2010-08-01

    does not tell us how to secure the general populace, so we have to continue our research. In The Quest for Viable Peace, Ben Lovelock reports that...Resolution, ed. Robert C. Orr (Washington, DC: The CSIS Press, 2004), 40. 17. Ibid., 42. 18. Ben Lovelock , “Securing a Viable Peace: Defeating Militant

  17. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Halbgewachs, Ronald D.; Chavez, Adrian R.

    Process Control System (PCS) and Industrial Control System (ICS) security is critical to our national security. But there are a number of technological, economic, and educational impediments to PCS owners implementing effective security on their systems. Sandia National Laboratories has performed the research and development of the OPSAID (Open PCS Security Architecture for Interoperable Design), a project sponsored by the US Department of Energy Office of Electricity Delivery and Energy Reliability (DOE/OE), to address this issue. OPSAID is an open-source architecture for PCS/ICS security that provides a design basis for vendors to build add-on security devices for legacy systems, whilemore » providing a path forward for the development of inherently-secure PCS elements in the future. Using standardized hardware, a proof-of-concept prototype system was also developed. This report describes the improvements and capabilities that have been added to OPSAID since an initial report was released. Testing and validation of this architecture has been conducted in another project, Lemnos Interoperable Security Project, sponsored by DOE/OE and managed by the National Energy Technology Laboratory (NETL).« less

  18. Research Staff | Energy Systems Integration Facility | NREL

    Science.gov Websites

    Research Staff Research Staff NREL's Energy Systems Integration directorate includes the Power investments in advanced energy research, and the security and resilience team under the DOE's multi-lab effort to modernize the nation's electrical grid. juan.torres@nrel.gov | 303-275-3094 ESI Research

  19. Laboratory directed research and development fy1999 annual report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Al-Ayat, R A

    2000-04-11

    The Lawrence Livermore National Laboratory (LLNL) was founded in 1952 and has been managed since its inception by the University of California (UC) for the U.S. Department of Energy (DOE). Because of this long association with UC, the Laboratory has been able to recruit a world-class workforce, establish an atmosphere of intellectual freedom and innovation, and achieve recognition in relevant fields of knowledge as a scientific and technological leader. This environment and reputation are essential for sustained scientific and technical excellence. As a DOE national laboratory with about 7,000 employees, LLNL has an essential and compelling primary mission to ensuremore » that the nation's nuclear weapons remain safe, secure, and reliable and to prevent the spread and use of nuclear weapons worldwide. The Laboratory receives funding from the DOE Assistant Secretary for Defense Programs, whose focus is stewardship of our nuclear weapons stockpile. Funding is also provided by the Deputy Administrator for Defense Nuclear Nonproliferation, many Department of Defense sponsors, other federal agencies, and the private sector. As a multidisciplinary laboratory, LLNL has applied its considerable skills in high-performance computing, advanced engineering, and the management of large research and development projects to become the science and technology leader in those areas of its mission responsibility. The Laboratory Directed Research and Development (LDRD) Program was authorized by the U.S. Congress in 1984. The Program allows the Director of each DOE laboratory to fund advanced, creative, and innovative research and development (R&D) activities that will ensure scientific and technical vitality in the continually evolving mission areas at DOE and the Laboratory. In addition, the LDRD Program provides LLNL with the flexibility to nurture and enrich essential scientific and technical competencies, which attract the most qualified scientists and engineers. The LDRD Program also enables many collaborations with the scientific community in academia, national and international laboratories, and industry. The projects in the FY1999 LDRD portfolio were carefully selected to continue vigorous support of the strategic vision and the long-term goals of DOE and the Laboratory. Projects chosen for LDRD funding undergo stringent selection processes, which look for high-potential scientific return, emphasize strategic relevance, and feature technical peer reviews by external and internal experts. The FY1999 projects described in this annual report focus on supporting the Laboratory's national security needs: stewardship of the U.S. nuclear weapons stockpile, responsibility for the counter- and nonproliferation of weapons of mass destruction, development of high-performance computing, and support of DOE environmental research and waste management programs. In the past, LDRD investments have significantly enhanced LLNL scientific capabilities and greatly contributed to the Laboratory's ability to meet its national security programmatic requirements. Examples of past investments include technical precursors to the Accelerated Strategic Computing Initiative (ASCI), special-materials processing and characterization, and biodefense. Our analysis of the FY1999 portfolio shows that it strongly supports the Laboratory's national security mission. About 95% of the LDRD dollars have directly supported LLNL's national security activities in FY1999, which far exceeds the portion of LLNL's overall budget supported by National Security Programs, which is 63% for FY1999.« less

  20. Secure Embedded Systems

    DTIC Science & Technology

    2016-02-26

    UAS) to illustrate how we use cryptography to ensure confidentiality and integrity. Using this example, we demonstrate the identification of...potential attack targets by considering the CONOPS, the development of countermeasures to these attacks, and the design and implementation of a cryptography ...based security architecture. Because cryptography does not directly enable availability, we also provide insight into the ongoing research that

  1. Idaho National Laboratory Mission Accomplishments, Fiscal Year 2015

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Allen, Todd Randall; Wright, Virginia Latta

    A summary of mission accomplishments for the research organizations at the Idaho National Laboratory for FY 2015. Areas include Nuclear Energy, National and Homeland Security, Science and Technology Addressing Broad DOE Missions; Collaborations; and Stewardship and Operation of Research Facilities.

  2. Rank Advancement in Academia: What Are the Roles of Postdoctoral Training?

    ERIC Educational Resources Information Center

    Su, Xuhong

    2014-01-01

    This article reports on a study that investigated whether postdoctoral training contributes to scientists' and engineers' attainment of tenure and full professorship in research-extensive universities. It was found that training does not assist scientists in climbing the career ladder faster nor does it help them to secure more…

  3. Laboratory Directed Research and Development Program FY 2008 Annual Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    editor, Todd C Hansen

    2009-02-23

    The Ernest Orlando Lawrence Berkeley National Laboratory (Berkeley Lab or LBNL) is a multi-program national research facility operated by the University of California for the Department of Energy (DOE). As an integral element of DOE's National Laboratory System, Berkeley Lab supports DOE's missions in fundamental science, energy resources, and environmental quality. Berkeley Lab programs advance four distinct goals for DOE and the nation: (1) To perform leading multidisciplinary research in the computing sciences, physical sciences, energy sciences, biosciences, and general sciences in a manner that ensures employee and public safety and protection of the environment. (2) To develop and operatemore » unique national experimental facilities for qualified investigators. (3) To educate and train future generations of scientists and engineers to promote national science and education goals. (4) To transfer knowledge and technological innovations and to foster productive relationships among Berkeley Lab's research programs, universities, and industry in order to promote national economic competitiveness. Berkeley Lab's research and the Laboratory Directed Research and Development (LDRD) program support DOE's Strategic Themes that are codified in DOE's 2006 Strategic Plan (DOE/CF-0010), with a primary focus on Scientific Discovery and Innovation. For that strategic theme, the Fiscal Year (FY) 2008 LDRD projects support each one of the three goals through multiple strategies described in the plan. In addition, LDRD efforts support the four goals of Energy Security, the two goals of Environmental Responsibility, and Nuclear Security (unclassified fundamental research that supports stockpile safety and nonproliferation programs). The LDRD program supports Office of Science strategic plans, including the 20-year Scientific Facilities Plan and the Office of Science Strategic Plan. The research also supports the strategic directions periodically under consideration and review by the Office of Science Program Offices, such as LDRD projects germane to new research facility concepts and new fundamental science directions. Berkeley Lab LDRD program also play an important role in leveraging DOE capabilities for national needs. The fundamental scientific research and development conducted in the program advances the skills and technologies of importance to our Work For Others (WFO) sponsors. Among many directions, these include a broad range of health-related science and technology of interest to the National Institutes of Health, breast cancer and accelerator research supported by the Department of Defense, detector technologies that should be useful to the Department of Homeland Security, and particle detection that will be valuable to the Environmental Protection Agency. The Berkeley Lab Laboratory Directed Research and Development Program FY2008 report is compiled from annual reports submitted by principal investigators following the close of the fiscal year. This report describes the supported projects and summarizes their accomplishments. It constitutes a part of the LDRD program planning and documentation process that includes an annual planning cycle, project selection, implementation, and review.« less

  4. Brookhaven National Laboratory Institutional Plan FY2001--FY2005

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Davis, S.

    Brookhaven National Laboratory is a multidisciplinary laboratory in the Department of Energy National Laboratory system and plays a lead role in the DOE Science and Technology mission. The Laboratory also contributes to the DOE missions in Energy Resources, Environmental Quality, and National Security. Brookhaven strives for excellence in its science research and in facility operations and manages its activities with particular sensitivity to environmental and community issues. The Laboratory's programs are aligned continuously with the goals and objectives of the DOE through an Integrated Planning Process. This Institutional Plan summarizes the portfolio of research and capabilities that will assure successmore » in the Laboratory's mission in the future. It also sets forth BNL strategies for our programs and for management of the Laboratory. The Department of Energy national laboratory system provides extensive capabilities in both world class research expertise and unique facilities that cannot exist without federal support. Through these national resources, which are available to researchers from industry, universities, other government agencies and other nations, the Department advances the energy, environmental, economic and national security well being of the US, provides for the international advancement of science, and educates future scientists and engineers.« less

  5. [Atomic Energy Control Board] annual report 1997--1998. Research report number INFO-9999-1 (in English;French)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1998-11-01

    The Board`s mission is to ensure that the use of nuclear energy in Canada does not pose undue risk to health, safety, security and the environment. The annual report of the Board presents information on regulatory requirements; nuclear facilities, from uranium mines to nuclear power plants and related operations; regulation of nuclear materials; radioactive waste management; compliance monitoring; research; non-proliferation, safeguards and security; international activities, and public information. A financial statement is also included.

  6. Training and Mentoring the Next Generation of Scientists and Engineers to Secure Continuity and Successes of the US DOE's Environmental Remediation Efforts - 13387

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lagos, L.

    The DOE Office of Environmental Management (DOE-EM) oversees one of the largest and most technically challenging cleanup programs in the world. The mission of DOE-EM is to complete the safe cleanup of the environmental legacy from five decades of nuclear weapons development and government-sponsored nuclear energy research. Since 1995, Florida International University's Applied Research Center (FIU-ARC) has supported the DOE-EM mission and provided unique research capabilities to address some of these highly technical and difficult challenges. This partnership has allowed FIU-ARC to create a unique infrastructure that is critical for the training and mentoring of science, technology, engineering, and mathmore » (STEM) students and has exposed many STEM students to 'hands-on' DOE-EM applied research, supervised by the scientists and engineers at ARC. As a result of this successful partnership between DOE and FIU, DOE requested FIU-ARC to create the DOE-FIU Science and Technology Workforce Development Initiative in 2007. This innovative program was established to create a 'pipeline' of minority STEM students trained and mentored to enter DOE's environmental cleanup workforce. The program was designed to help address DOE's future workforce needs by partnering with academic, government and private companies (DOE contractors) to mentor future minority scientists and engineers in the research, development, and deployment of new technologies and processes addressing DOE's environmental cleanup challenges. Since its inception in 2007, the program has trained and mentored 78 FIU STEM minority students. Although, the program has been in existence for only five years, a total of 75 internships have been conducted at DOE National Laboratories, DOE sites, DOE Headquarters and field offices, and DOE contractors. Over 85 DOE Fellows have participated in the Waste Management Symposia since 2008 with a total of 68 student posters and 7 oral presentations given at WM. The DOE Fellows participation at WM has resulted in three Best Student Poster Awards (WM09, WM10, and WM11) and one Best Professional Poster Award (WM09). DOE Fellows have also presented their research at ANS DD and R and ANS Robotics Topical meetings. Moreover, several of our DOE Fellows have already obtained employment with DOE-EM, other federal agencies, DOE contractors. This paper will discuss how DOE Fellows program is training and mentoring FIU STEM students in Department of Energy's Office of Environmental Management technical challenges and research. This training and mentoring has resulted in the development of well trained and polished young scientists and engineers that will become the future workforce in charge of carrying on DOE-EM's environmental cleanup mission. The paper will showcase FIU's DOE Fellows model and highlight some of the applied research the DOE Fellows have conducted at FIU's Applied Research Center and across the Complex by participating in summer internship assignments. This paper will also present and highlight other Fellowships and internships programs sponsored by National Nuclear Security Agency (NNSA), DOE-EM, NRC, Energy (NE), and other federal agencies targeting workforce development. (authors)« less

  7. Potential roles of research in enhancing the performance of management in securing high quality visitor experiences in wilderness

    Treesearch

    Stephen F. McCool

    2012-01-01

    Does research help managers provide opportunities for visitors to have high quality experiences in wilderness? Difficulties in applying visitor experience research result from several factors: the nature of wilderness itself, the character of the wilderness visitor experience challenge as a research and management topic, and the paradigm of research applications...

  8. DOE DISS/ET pilot system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Strait, R.S.; Wagner, E.E.

    1994-07-01

    The US Department of Energy (DOE) Office of Safeguards and Security initiated the DOE Integrated Security System / Electronic Transfer (DISS/ET) for the purpose of reducing the time required to process security clearance requests. DISS/ET will be an integrated system using electronic commerce technologies for the collection and processing of personnel security clearance data, and its transfer between DOE local security clearance offices, DOE Operations Offices, and the Office of Personnel Management. The system will use electronic forms to collect clearance applicant data. The forms data will be combined with electronic fingerprint images and packaged in a secure encrypted electronicmore » mail envelope for transmission across the Internet. Information provided by the applicant will be authenticated using digital signatures. All processing will be done electronically.« less

  9. Research and Energy Efficiency: Selected Success Stories

    DOE R&D Accomplishments Database

    Garland, P. W.; Garland, R. W.

    1997-06-26

    Energy use and energy technology play critical roles in the U.S. economy and modern society. The Department of Energy (DOE) conducts civilian energy research and development (R&D) programs for the purpose of identifying promising technologies that promote energy security, energy efficiency, and renewable energy use. DOE-sponsored research ranges from basic investigation of phenomena all the way through development of applied technology in partnership with industry. DOE`s research programs are conducted in support of national strategic energy objectives, however austere financial times have dictated that R&D programs be measured in terms of cost vs. benefit. In some cases it is difficult to measure the return on investment for the basic "curiosity-driven" research, however many applied technology development programs have resulted in measurable commercial successes. The DOE has published summaries of their most successful applied technology energy R&D programs. In this paper, we will discuss five examples from the Building Technologies area of the DOE Energy Efficiency program. Each story will describe the technology, discuss the level of federal funding, and discuss the returns in terms of energy savings, cost savings, or national economic impacts.

  10. Nuclear security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dingell, J.D.

    1991-02-01

    The Department of Energy's (DOE) Lawrence Livermore National Laboratory, located in Livermore, California, generates and controls large numbers of classified documents associated with the research and testing of nuclear weapons. Concern has been raised about the potential for espionage at the laboratory and the national security implications of classified documents being stolen. This paper determines the extent of missing classified documents at the laboratory and assesses the adequacy of accountability over classified documents in the laboratory's custody. Audit coverage was limited to the approximately 600,000 secret documents in the laboratory's custody. The adequacy of DOE's oversight of the laboratory's secretmore » document control program was also assessed.« less

  11. Role of environmental geology in US Department of Energy's advanced research and development programs to promote energy security in the United States

    NASA Astrophysics Data System (ADS)

    Brown, C. E.

    1995-12-01

    The purpose of this report is to describe the research programs and program activities of the US Department of Energy (DOE) that most directly relate to topics in the field of environmental geology. In this light, the mission of the DOE and the definition of environmental geology will be discussed. In a broad sense, environmental geology is that branch of earth science that emphasizes the entire spectrum of human interactions with the physical environment that include environmental health, mineral exploration and exploitation, waste management, energy use and conservation, global change, environmental law, natural and man-made hazard assessment, and land-use planning. A large number of research, development, and demonstration programs are under DOE's administration and guidance that directly or indirectly relate to topics in environmental geology. The primary mission of the DOE is to contribute to the welfare of the nation by providing the scientific foundation, technology, policy, and institutional leadership necessary to achieve efficiency in energy use, diversity in energy sources, a more productive and competitive economy, improved environmental quality, and a secure national defense. The research and development funding effort has most recently been redirected toward greater utilization of clean fossil fuels, especially natural gas, weatherization, renewable energy, energy efficiency, fusion energy, and high-energy physics. This paper will summarize the role that environmental geology has played and will continue to play in the execution of DOE's mission and the energy options that DOE has investigated closely. The specific options are those that center around energy choices, such as alternative-fueled transportation, building technologies, energy-efficient lighting, and clean energy.

  12. 12 CFR 1204.9 - Does FHFA collect and use Social Security numbers?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 7 2011-01-01 2011-01-01 false Does FHFA collect and use Social Security... OPERATIONS PRIVACY ACT IMPLEMENTATION § 1204.9 Does FHFA collect and use Social Security numbers? FHFA collects Social Security numbers only when it is necessary and authorized. At least annually, the Privacy...

  13. 12 CFR 1204.9 - Does FHFA collect and use Social Security numbers?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Does FHFA collect and use Social Security... OPERATIONS PRIVACY ACT IMPLEMENTATION § 1204.9 Does FHFA collect and use Social Security numbers? FHFA collects Social Security numbers only when it is necessary and authorized. At least annually, the Privacy...

  14. Diffractive optics in industry and research: novel components for optical security systems

    NASA Astrophysics Data System (ADS)

    Laakkonen, Pasi; Turunen, Jari; Pietarinen, Juha; Siitonen, Samuli; Laukkanen, Janne; Jefimovs, Konstantins; Orava, Joni; Ritala, Mikko; Pilvi, Tero; Tuovinen, Hemmo; Ventola, Kalle; Vallius, Tuomas; Kaipiainen, Matti; Kuittinen, Markku

    2005-09-01

    Design and manufacturing of diffractive optical elements (DOEs) are presented. Mass replication methods for DOEs are explained including UV-replication, micro-injection moulding and reel-to-reel production. Novel applications of diffractive optics including spectroscopic surface relief gratings, antireflection surfaces, infrared light rejection gratings, light incoupling into thin waveguides, and additive diffractive colour mixing are presented.

  15. AFCOMS (Air Force Commissary Service): Does this SOA Need an Executive Development Program?

    DTIC Science & Technology

    1985-03-01

    ll)NALHuKAU U STADARS 19,l liii I0 󈧽 AAfR WAR COLLG RESEARCH REPORT LZ? e lNo. AU-AWC-35-011 - N4 AFCOMS: DOES THIS SQA NEED AN EXECUTIVE cm...high incidence of safety and physical security violations. Serious deficiencies existed in the financial management area. Accounting errors were not

  16. DOE`s nation-wide system for access control can solve problems for the federal government

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Callahan, S.; Tomes, D.; Davis, G.

    1996-07-01

    The U.S. Department of Energy`s (DOE`s) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by manymore » different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location`s level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals.« less

  17. Secured web-based video repository for multicenter studies

    PubMed Central

    Yan, Ling; Hicks, Matt; Winslow, Korey; Comella, Cynthia; Ludlow, Christy; Jinnah, H. A; Rosen, Ami R; Wright, Laura; Galpern, Wendy R; Perlmutter, Joel S

    2015-01-01

    Background We developed a novel secured web-based dystonia video repository for the Dystonia Coalition, part of the Rare Disease Clinical Research network funded by the Office of Rare Diseases Research and the National Institute of Neurological Disorders and Stroke. A critical component of phenotypic data collection for all projects of the Dystonia Coalition includes a standardized video of each participant. We now describe our method for collecting, serving and securing these videos that is widely applicable to other studies. Methods Each recruiting site uploads standardized videos to a centralized secured server for processing to permit website posting. The streaming technology used to view the videos from the website does not allow downloading of video files. With appropriate institutional review board approval and agreement with the hosting institution, users can search and view selected videos on the website using customizable, permissions-based access that maintains security yet facilitates research and quality control. Results This approach provides a convenient platform for researchers across institutions to evaluate and analyze shared video data. We have applied this methodology for quality control, confirmation of diagnoses, validation of rating scales, and implementation of new research projects. Conclusions We believe our system can be a model for similar projects that require access to common video resources. PMID:25630890

  18. Nuclear Weapons Security Crisis: What Does History Teach?

    DTIC Science & Technology

    2013-07-01

    Department of Defense. Much of the work to prepare the book for publi- cation was done by NPEC’s research associate, Kate Harrison, and the staff...of the Strategic Studies Insti- tute, especially Dr. James Pierce and Rita Rummel. This book would not have been possible without their help...nuclear security crises detailed in this book gone differently—had the rebel faction of the French military seized the nuclear device that was to

  19. 2013 SRNL LDRD Annual Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McWhorter, S.

    2014-03-07

    This report demonstrates the execution of our LDRD program within the objectives and guidelines outlined by the Department of Energy (DOE) through the DOE Order 413.2b. The projects described within the report align purposefully with SRNL’s strategic vision and provide great value to the DOE. The diversity exhibited in the research and development projects underscores the DOE Office of Environmental Management (DOE-EM) mission and enhances that mission by developing the technical capabilities and human capital necessary to support future DOE-EM national needs. As a multiprogram national laboratory, SRNL is applying those capabilities to achieve tangible results for the nation inmore » National Security, Environmental Stewardship, Clean Energy and Nuclear Materials Management.« less

  20. Report on July 2015 Additional Protocol Coordinators Best Practices Workshop

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gitau, Ernest T.N.; Burbank, Roberta L.; Finch, Valerie A.

    After 10 years of implementation experience, the Office of Nonproliferation and Arms Control (NPAC) within the Department of Energy/National Nuclear Security Administration (DOE/NNSA) conducted the Additional Protocol (AP) Coordinators Best Practices Workshop at Oak Ridge National Laboratory from July 29-30, 2015. The goal of this workshop was to identify implementation best practices, lessons learned, and compliance challenges from the various Additional Protocol Coordinators (APCs) at each laboratory in the DOE/NNSA complex and associated sites. The workshop provided the opportunity for participants to share their insights and establish networks that APCs can utilize to continue to discuss challenges (new and old),more » identify best practices, and enhance communication and coordination for reporting multi-lab research projects during review activities. Workshop participants included DOE/NNSA HQ, laboratory and site APCs, seasoned experts, members of the original implementation outreach team, and Field Element and site security representatives.« less

  1. 33 CFR 120.100 - Does this part apply to me?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Does this part apply to me? 120.100 Section 120.100 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY SECURITY OF VESSELS SECURITY OF PASSENGER VESSELS General § 120.100 Does this part apply to me? This part...

  2. 33 CFR 120.100 - Does this part apply to me?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Does this part apply to me? 120.100 Section 120.100 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY SECURITY OF VESSELS SECURITY OF PASSENGER VESSELS General § 120.100 Does this part apply to me? This part...

  3. 33 CFR 120.100 - Does this part apply to me?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Does this part apply to me? 120.100 Section 120.100 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY SECURITY OF VESSELS SECURITY OF PASSENGER VESSELS General § 120.100 Does this part apply to me? This part...

  4. 33 CFR 120.100 - Does this part apply to me?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Does this part apply to me? 120.100 Section 120.100 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY SECURITY OF VESSELS SECURITY OF PASSENGER VESSELS General § 120.100 Does this part apply to me? This part...

  5. Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2009-01-01

    A Delay-Tolerant Network (DTN) Architecture (Request for Comment, RFC-4838) and Bundle Protocol Specification, RFC-5050, have been proposed for space and terrestrial networks. Additional security specifications have been provided via the Bundle Security Specification (currently a work in progress as an Internet Research Task Force internet-draft) and, for link-layer protocols applicable to Space networks, the Licklider Transport Protocol Security Extensions. This document provides a security analysis of the current DTN RFCs and proposed security related internet drafts with a focus on space-based communication networks, which is a rather restricted subset of DTN networks. Note, the original focus and motivation of DTN work was for the Interplanetary Internet . This document does not address general store-and-forward network overlays, just the current work being done by the Internet Research Task Force (IRTF) and the Consultative Committee for Space Data Systems (CCSDS) Space Internetworking Services Area (SIS) - DTN working group under the DTN and Bundle umbrellas. However, much of the analysis is relevant to general store-and-forward overlays.

  6. 17 CFR 240.15a-6 - Exemption of certain foreign brokers or dealers.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... or dealer; or (2) Furnishes research reports to major U.S. institutional investors, and effects... those major U.S. institutional investors to follow up on the research reports, and does not otherwise...) Induces or attempts to induce the purchase or sale of any security by a U.S. institutional investor or a...

  7. 17 CFR 240.15a-6 - Exemption of certain foreign brokers or dealers.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... or dealer; or (2) Furnishes research reports to major U.S. institutional investors, and effects... those major U.S. institutional investors to follow up on the research reports, and does not otherwise...) Induces or attempts to induce the purchase or sale of any security by a U.S. institutional investor or a...

  8. 17 CFR 240.15a-6 - Exemption of certain foreign brokers or dealers.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... or dealer; or (2) Furnishes research reports to major U.S. institutional investors, and effects... those major U.S. institutional investors to follow up on the research reports, and does not otherwise...) Induces or attempts to induce the purchase or sale of any security by a U.S. institutional investor or a...

  9. The Rise of China: Redefining War in the 21st Century

    DTIC Science & Technology

    2012-03-22

    Hegemony, Africa, Cold War, Cyber Attack, Deficit 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF...FORMAT: Strategy Research Project DATE: 22 March 2012 WORD COUNT: 5,825 PAGES: 30 KEY TERMS: Debt, Security, Hegemony, Africa, Cold War, Cyber ...significantly increasing economic aid. But it’s hard to buy affection; such ‘ friendship ’ does not stand the test of difficult times.”42 The United

  10. Insurgency in Sarawak: Myth or Real.

    DTIC Science & Technology

    Does the present insurgency in the Eastern Malaysian province of Sarawak constitute a serious threat to the security of Malaysia. To properly...address the subject, data was gathered by literature research, and personal interview. The number of guerrillas estimated to be operating in the Sarawak

  11. Sandia National Laboratories: Working with Sandia: What Does Sandia Buy?

    Science.gov Websites

    Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Technology Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios

  12. 12 CFR 1204.9 - Does FHFA or FHFA-OIG collect and use Social Security numbers?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 9 2013-01-01 2013-01-01 false Does FHFA or FHFA-OIG collect and use Social... OPERATIONS PRIVACY ACT IMPLEMENTATION § 1204.9 Does FHFA or FHFA-OIG collect and use Social Security numbers? FHFA and FHFA-OIG collect Social Security numbers only when it is necessary and authorized. At least...

  13. Transferring diffractive optics from research to commercial applications: Part II - size estimations for selected markets

    NASA Astrophysics Data System (ADS)

    Brunner, Robert

    2014-04-01

    In a series of two contributions, decisive business-related aspects of the current process status to transfer research results on diffractive optical elements (DOEs) into commercial solutions are discussed. In part I, the focus was on the patent landscape. Here, in part II, market estimations concerning DOEs for selected applications are presented, comprising classical spectroscopic gratings, security features on banknotes, DOEs for high-end applications, e.g., for the semiconductor manufacturing market and diffractive intra-ocular lenses. The derived market sizes are referred to the optical elements, itself, rather than to the enabled instruments. The estimated market volumes are mainly addressed to scientifically and technologically oriented optical engineers to serve as a rough classification of the commercial dimensions of DOEs in the different market segments and do not claim to be exhaustive.

  14. Industrial Sites - An Approach to Closure

    ScienceCinema

    None

    2018-01-16

    The Environmental Management (EM) Program at the Nevada Site Office was created by the U.S. Department of Energy (DOE) to address the environmental legacy of contamination resulting from more than 50 years of nuclear weapons research, production and testing. The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NSO) is responsible for remediating portions of the Nevada National Security Site (formerly the Nevada Test Site) and the Tonopah Test Range, which is within the Nevada Test and Training Range.

  15. Nevada National Security Site-Directed Research and Development FY 2011 Annual Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Howard Bender, comp.

    2012-04-25

    This fiscal year 2011 annual report of the Site-Directed Research and Development program, the 10th anniversary edition, recognizes a full decade of innovative R&D accomplishments in support of the Nevada National Security Site (NNSS). Last year the NNSS itself was renamed to reflect a diversifying mission, and our R&D program has contributed significantly to shape emerging missions that will continue to evolve. New initiatives in stockpile stewardship science, nonproliferation, and treaty verification and monitoring have had substantial successes in FY 2011, and many more accomplishments are expected. SDRD is the cornerstone on which many of these initiatives rest. Historically supportingmore » our main focus areas, SDRD is also building a solid foundation for new, and non-traditional, emerging national security missions. The program continues its charter to advance science and technology for a broad base of agencies including the U.S. Department of Energy (DOE), U.S. Department of Defense (DoD), U.S. Department of Homeland Security (DHS), and many others.« less

  16. DOE Office of Scientific and Technical Information (OSTI.GOV)

    French, T

    The Laboratory Director is pleased to have the opportunity to present the 2008 Laboratory Directed Research and Development (LDRD) annual report. This is my first opportunity to do so, and only the second such report that has been issued. As will be obvious, SRNL has built upon the excellent start that was made with the LDRD program last year, and researchers have broken new ground in some important areas. In reviewing the output of this program this year, it is clear that the researchers implemented their ideas with creativity, skill and enthusiasm. It is gratifying to see this level ofmore » participation, because the LDRD program remains a key part of meeting SRNL's and DOE's strategic goals, and helps lay a solid scientific foundation for SRNL as the premier applied science laboratory. I also believe that the LDRD program's results this year have demonstrated SRNL's value as the EM Corporate Laboratory, having advanced knowledge in a spectrum of areas, including reduction of the technical risks of cleanup, separations science, packaging and transportation of nuclear materials, and many others. The research in support of Energy Security and National and Homeland Security has been no less notable. SRNL' s researchers have shown again that the nascent LDRD program is a sound investment for DOE that will pay off handsomely for the nation as time goes on.« less

  17. 76 FR 34965 - Cybersecurity, Innovation, and the Internet Economy

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-15

    ... disrupt computing systems. These threats are exacerbated by the interconnected and interdependent architecture of today's computing environment. Theoretically, security deficiencies in one area may provide... does the move to cloud-based services have on education and research efforts in the I3S? 45. What is...

  18. 26 CFR 1.46-5 - Qualified progress expenditures.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 26 Internal Revenue 1 2011-04-01 2009-04-01 true Qualified progress expenditures. 1.46-5 Section 1... planning, designing, preparing blueprints, exploring, or securing financing. (ii) The determination of the... construction also does not include research and development activities in a laboratory or experimental setting...

  19. 26 CFR 1.46-5 - Qualified progress expenditures.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 26 Internal Revenue 1 2010-04-01 2010-04-01 true Qualified progress expenditures. 1.46-5 Section 1... planning, designing, preparing blueprints, exploring, or securing financing. (ii) The determination of the... construction also does not include research and development activities in a laboratory or experimental setting...

  20. 26 CFR 1.46-5 - Qualified progress expenditures.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 26 Internal Revenue 1 2014-04-01 2013-04-01 true Qualified progress expenditures. 1.46-5 Section 1... planning, designing, preparing blueprints, exploring, or securing financing. (ii) The determination of the... construction also does not include research and development activities in a laboratory or experimental setting...

  1. 77 FR 38275 - Secretary of Energy Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-27

    ... DEPARTMENT OF ENERGY Secretary of Energy Advisory Board AGENCY: Department of Energy, DoE. ACTION: Notice of open meeting. SUMMARY: This notice announces an open meeting of the Secretary of Energy [[Page... Secretary on the Department's basic and applied research, economic and national security policy, educational...

  2. Report of the Task Group on the Department of Energy Aviation Program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1992-02-01

    The Department of Energy (DOE) owns or leases approximately 43 aircraft of which 17 are airplanes and 26 are helicopters. About two-thirds of these aircraft are used for activities related to defense programs; these are all government owned and contractor operated. The other third of DOE`s aircraft is used by Bonneville Power Administration (BPA) and Western Area Power Administration (WAPA). These aircraft are primarily government owned and operated. In addition to transporting passengers, DOE aircraft are used for security operations, powerline and pipeline patrols, research and development activities, and aerial measurement and for the transport of hazardous materials. These operationsmore » are conducted at nine Field Offices under the organizational authority of eight DOE Program Secretarial Officers (PSOs). On July 24, 1991, a DOE-owned helicopter crashed at the Nevada Test Site resulting in the deaths of the five contractor employees on board. A DOE accident investigation board was convened, and an investigation into the causes of the crash was conducted. On November 19, 1991, a briefing of the preliminary results of the investigation was provided to the Assistant Secretary for Environment, Safety and Health (EH), the Assistant Secretary for Defense Programs (DP), and the Director, Office of Security Affairs (SA). On November 27, 1991, the Secretary of Energy directed the Assistant Secretary, EH, to convene and chair a Task Group with the PSOs to define the roles and responsibilities of DOE`s aviation program. Task group recommendations are presented.« less

  3. A DOE Perspective

    NASA Astrophysics Data System (ADS)

    Bennett, Kristin

    2004-03-01

    As one of the lead agencies for nanotechnology research and development, the Department of Energy (DOE) is revolutionizing the way we understand and manipulate materials at the nanoscale. As the Federal government's single largest supporter of basic research in the physical sciences in the United States, and overseeing the Nation's cross-cutting research programs in high-energy physics, nuclear physics, and fusion energy sciences, the DOE guides the grand challenges in nanomaterials research that will have an impact on everything from medicine, to energy production, to manufacturing. Within the DOE's Office of Science, the Office of Basic Energy Sciences (BES) leads research and development at the nanoscale, which supports the Department's missions of national security, energy, science, and the environment. The cornerstone of the program in nanoscience is the establishment and operation of five new Nanoscale Science Research Centers (NSRCs), which are under development at six DOE Laboratories. Throughout its history, DOE's Office of Science has designed, constructed and operated many of the nation's most advanced, large-scale research and development user facilities, of importance to all areas of science. These state-of-the art facilities are shared with the science community worldwide and contain technologies and instruments that are available nowhere else. Like all DOE national user facilities, the new NSRCs are designed to make novel state-of-the-art research tools available to the world, and to accelerate a broad scale national effort in basic nanoscience and nanotechnology. The NSRCs will be sited adjacent to or near existing DOE/BES major user facilities, and are designed to enable national user access to world-class capabilities for the synthesis, processing, fabrication, and analysis of materials at the nanoscale, and to transform the nation's approach to nanomaterials.

  4. DOE's Geothermal Program still in game

    NASA Astrophysics Data System (ADS)

    Bush, Susan

    In the ongoing search to find cost-effective, renewable forms of energy that neither contribute to global warming nor threaten national security, geothermal energy remains a player. Although Department of Energy funding for geothermal research has declined over the past decade, from its peak in 1979 of $160 million, there is still tremendous potential in terms of geothermal development, said Gladys Hooper, program manager of DOE's Hot Dry Rock and Brine Chemistry divisions. Technology for harnessing geothermal power is by and large there, she said. What is needed is more awareness and publicity regarding the merits of geothermal energy.For fiscal year 1993, proposed DOE funding for geothermal research was $24 million, down from $27 million in fiscal 1992 and nearly $30 million in fiscal 1991. DOE's Geothermal Division oversees the network of national laboratories and universities involved in developing the nation's geothermal resources and bringing them into commercial competitiveness.

  5. 10 CFR 712.16 - DOE security review.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false DOE security review. 712.16 Section 712.16 Energy DEPARTMENT OF ENERGY HUMAN RELIABILITY PROGRAM Establishment of and Procedures for the Human Reliability... part. (c) Any mental/personality disorder or behavioral issues found in a personnel security file...

  6. Laboratory Directed Research and Development FY2011 Annual Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Craig, W; Sketchley, J; Kotta, P

    2012-03-22

    A premier applied-science laboratory, Lawrence Livermore National Laboratory (LLNL) has earned the reputation as a leader in providing science and technology solutions to the most pressing national and global security problems. The LDRD Program, established by Congress at all DOE national laboratories in 1991, is LLNL's most important single resource for fostering excellent science and technology for today's needs and tomorrow's challenges. The LDRD internally directed research and development funding at LLNL enables high-risk, potentially high-payoff projects at the forefront of science and technology. The LDRD Program at Livermore serves to: (1) Support the Laboratory's missions, strategic plan, and foundationalmore » science; (2) Maintain the Laboratory's science and technology vitality; (3) Promote recruiting and retention; (4) Pursue collaborations; (5) Generate intellectual property; and (6) Strengthen the U.S. economy. Myriad LDRD projects over the years have made important contributions to every facet of the Laboratory's mission and strategic plan, including its commitment to nuclear, global, and energy and environmental security, as well as cutting-edge science and technology and engineering in high-energy-density matter, high-performance computing and simulation, materials and chemistry at the extremes, information systems, measurements and experimental science, and energy manipulation. A summary of each project was submitted by the principal investigator. Project summaries include the scope, motivation, goals, relevance to DOE/NNSA and LLNL mission areas, the technical progress achieved in FY11, and a list of publications that resulted from the research. The projects are: (1) Nuclear Threat Reduction; (2) Biosecurity; (3) High-Performance Computing and Simulation; (4) Intelligence; (5) Cybersecurity; (6) Energy Security; (7) Carbon Capture; (8) Material Properties, Theory, and Design; (9) Radiochemistry; (10) High-Energy-Density Science; (11) Laser Inertial-Fusion Energy; (12) Advanced Laser Optical Systems and Applications; (12) Space Security; (13) Stockpile Stewardship Science; (14) National Security; (15) Alternative Energy; and (16) Climatic Change.« less

  7. Future Workforce Strategy

    ERIC Educational Resources Information Center

    US Department of Energy, 2007

    2007-01-01

    The Department of Energy's (DOE) Office of Science is among the world's premier supporters of basic research. The Office of Science enables the U.S. to maintain its competitive edge by funding science that can transform its energy future, supports its national security and seeks to understand the fundamentals of matter and energy itself. To do…

  8. Where Does Good Evidence Come from?

    ERIC Educational Resources Information Center

    Gorard, Stephen; Cook, Thomas

    2007-01-01

    This article started as a debate between the two authors. Both authors present a series of propositions about quality standards in education research. Cook's propositions, as might be expected, not only concern the importance of experimental trials for establishing the security of causal evidence, but also include some important practical and…

  9. From Ions to Wires to the Grid: The Transformational Science of LANL Research in High-Tc Superconducting Tapes and Electric Power Applications

    ScienceCinema

    Marken, Ken

    2018-01-09

    The Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability (OE) has been tasked to lead national efforts to modernize the electric grid, enhance security and reliability of the energy infrastructure, and facilitate recovery from disruptions to energy supplies. LANL has pioneered the development of coated conductors – high-temperature superconducting (HTS) tapes – which permit dramatically greater current densities than conventional copper cable, and enable new technologies to secure the national electric grid. Sustained world-class research from concept, demonstration, transfer, and ongoing industrial support has moved this idea from the laboratory to the commercial marketplace.

  10. Evaluating Realized Impacts of DOE/EERE R&D Programs. Standard impact evaluation method

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ruegg, Rosalie; O'Connor, Alan C.; Loomis, Ross J.

    2014-08-01

    This document provides guidance for evaluators who conduct impact assessments of research and development (R&D) programs for the U.S. Department of Energy’s (DOE) Office of Energy Efficiency and Renewable Energy (EERE). It is also targeted at EERE program staff responsible for initiating and managing commissioned impact studies. The guide specifies how to estimate economic benefits and costs, energy saved and installed or generated, environmental impacts, energy security impacts, and knowledge impacts of R&D investments in advanced energy technologies.

  11. 48 CFR 904.404 - Solicitation provision and contract clause.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... provision and contract clause. (d) The security clauses to be used in DOE contracts are found at 952.204. They are: (1) Security, 952.204-2. This clause is required in contracts and subcontracts, the... materials or the provision of protective services. DOE utilizes the National Industrial Security Program but...

  12. 48 CFR 904.404 - Solicitation provision and contract clause.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... provision and contract clause. (d) The security clauses to be used in DOE contracts are found at 952.204. They are: (1) Security, 952.204-2. This clause is required in contracts and subcontracts, the... materials or the provision of protective services. DOE utilizes the National Industrial Security Program but...

  13. 48 CFR 904.404 - Solicitation provision and contract clause.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... provision and contract clause. (d) The security clauses to be used in DOE contracts are found at 952.204. They are: (1) Security, 952.204-2. This clause is required in contracts and subcontracts, the... materials or the provision of protective services. DOE utilizes the National Industrial Security Program but...

  14. 48 CFR 904.404 - Solicitation provision and contract clause.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... provision and contract clause. (d) The security clauses to be used in DOE contracts are found at 952.204. They are: (1) Security, 952.204-2. This clause is required in contracts and subcontracts, the... materials or the provision of protective services. DOE utilizes the National Industrial Security Program but...

  15. The Strategic Lessons Unlearned from Vietnam, Iraq, and Afghanistan: Why the Afghan National Security Forces Will Not Hold, and the Implications for the U.S. Army in Afghanistan

    DTIC Science & Technology

    2015-06-01

    information is estimated to average 1 hour per response, including the time for reviewing instructions , searching existing data sources, gathering and...provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid...publishes a monthly email newsletter to update the national security community on the research of our analysts, recent and forthcoming publications

  16. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hughes, Joan F.

    The US Department of Energy’s (DOE’s) Oak Ridge Reservation (ORR) is located in Roane and Anderson counties in East Tennessee, about 40 km (25 miles) from Knoxville. ORR is one of DOE’s most unique and complex sites. It encompasses three major facilities and thousands of employees that perform every mission in the DOE portfolio—energy research, environmental restoration, national security, nuclear fuel supply, reindustrialization, science education, basic and applied research in areas important to US security, and technology transfer. ORR was established in the early 1940s as part of the Manhattan Project for the purposes of enriching uranium and pioneering methodsmore » for producing and separating plutonium. Today, scientists at the Oak Ridge National Laboratory (ORNL), DOE’s largest multipurpose national laboratory, conduct world-leading research in advanced materials, alternative fuels, climate change, and supercomputing. The Y-12 National Security Complex (Y-12 or Y-12 Complex) is vital to maintaining the safety, security, and effectiveness of the US nuclear weapons stockpile and reducing the global threat posed by nuclear proliferation and terrorism. The East Tennessee Technology Park (ETTP), a former uranium enrichment complex, is being transitioned to a clean, revitalized industrial park.« less

  17. Synthesis and Characterization of Ionically Crosslinked Elastomers

    DTIC Science & Technology

    2015-05-12

    SECURITY CLASSIFICATION OF: In this research poly(n-butyl acrylate) (PBA) elastomers were investigated as model systems to study the thermomechanical...subject to any oenalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO...Ionically Crosslinked Elastomers Report Title In this research poly(n-butyl acrylate) (PBA) elastomers were investigated as model systems to study the

  18. 31 CFR 370.0 - What does this part cover?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... RELATING TO UNITED STATES SECURITIES General Information § 370.0 What does this part cover? (a) Scope. This... does not apply to transactions for the sale of United States Savings Bonds accomplished through savings... connection with United States securities. This part also provides regulations for the electronic submission...

  19. 31 CFR 375.23 - How does the securities delivery process work?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false How does the securities delivery process work? 375.23 Section 375.23 Money and Finance: Treasury Regulations Relating to Money and Finance... transfer the correct book-entry Treasury securities in the correct par amount against the correct...

  20. 31 CFR 375.23 - How does the securities delivery process work?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false How does the securities delivery process work? 375.23 Section 375.23 Money and Finance: Treasury Regulations Relating to Money and Finance... transfer the correct book-entry Treasury securities in the correct par amount against the correct...

  1. 31 CFR 375.23 - How does the securities delivery process work?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false How does the securities delivery process work? 375.23 Section 375.23 Money and Finance: Treasury Regulations Relating to Money and Finance... transfer the correct book-entry Treasury securities in the correct par amount against the correct...

  2. 31 CFR 375.23 - How does the securities delivery process work?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false How does the securities delivery process work? 375.23 Section 375.23 Money and Finance: Treasury Regulations Relating to Money and Finance... transfer the correct book-entry Treasury securities in the correct par amount against the correct...

  3. 14 CFR 11.35 - Does FAA include sensitive security information and proprietary information in the Federal Docket...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... information and proprietary information in the Federal Docket Management System (FDMS)? 11.35 Section 11.35... RULEMAKING PROCEDURES Rulemaking Procedures General § 11.35 Does FAA include sensitive security information and proprietary information in the Federal Docket Management System (FDMS)? (a) Sensitive security...

  4. 14 CFR 11.35 - Does FAA include sensitive security information and proprietary information in the Federal Docket...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... information and proprietary information in the Federal Docket Management System (FDMS)? 11.35 Section 11.35... RULEMAKING PROCEDURES Rulemaking Procedures General § 11.35 Does FAA include sensitive security information and proprietary information in the Federal Docket Management System (FDMS)? (a) Sensitive security...

  5. 14 CFR 11.35 - Does FAA include sensitive security information and proprietary information in the Federal Docket...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... information and proprietary information in the Federal Docket Management System (FDMS)? 11.35 Section 11.35... RULEMAKING PROCEDURES Rulemaking Procedures General § 11.35 Does FAA include sensitive security information and proprietary information in the Federal Docket Management System (FDMS)? (a) Sensitive security...

  6. 14 CFR 11.35 - Does FAA include sensitive security information and proprietary information in the Federal Docket...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... information and proprietary information in the Federal Docket Management System (FDMS)? 11.35 Section 11.35... RULEMAKING PROCEDURES Rulemaking Procedures General § 11.35 Does FAA include sensitive security information and proprietary information in the Federal Docket Management System (FDMS)? (a) Sensitive security...

  7. 14 CFR 11.35 - Does FAA include sensitive security information and proprietary information in the Federal Docket...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... information and proprietary information in the Federal Docket Management System (FDMS)? 11.35 Section 11.35... RULEMAKING PROCEDURES Rulemaking Procedures General § 11.35 Does FAA include sensitive security information and proprietary information in the Federal Docket Management System (FDMS)? (a) Sensitive security...

  8. Addressing Information Security Risk

    ERIC Educational Resources Information Center

    Qayoumi, Mohammad H.; Woody, Carol

    2005-01-01

    Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…

  9. 31 CFR 344.0 - What does this part cover?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... GOVERNMENT SERIES General Information § 344.0 What does this part cover? (a) What is the purpose of the SLGS... Local Government Series (SLGS) securities to provide issuers of tax-exempt securities with investments... governed by this part? This part governs the following SLGS securities: (1) Time Deposit securities—may be...

  10. 31 CFR 344.0 - What does this part cover?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... GOVERNMENT SERIES General Information § 344.0 What does this part cover? (a) What is the purpose of the SLGS... Local Government Series (SLGS) securities to provide issuers of tax-exempt securities with investments... governed by this part? This part governs the following SLGS securities: (1) Time Deposit securities—may be...

  11. 31 CFR 344.0 - What does this part cover?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... GOVERNMENT SERIES General Information § 344.0 What does this part cover? (a) What is the purpose of the SLGS... Local Government Series (SLGS) securities to provide issuers of tax-exempt securities with investments... governed by this part? This part governs the following SLGS securities: (1) Time Deposit securities—may be...

  12. 31 CFR 344.0 - What does this part cover?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... GOVERNMENT SERIES General Information § 344.0 What does this part cover? (a) What is the purpose of the SLGS... Local Government Series (SLGS) securities to provide issuers of tax-exempt securities with investments... governed by this part? This part governs the following SLGS securities: (1) Time Deposit securities—may be...

  13. 31 CFR 375.23 - How does the securities delivery process work?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false How does the securities delivery process work? 375.23 Section 375.23 Money and Finance: Treasury Regulations Relating to Money and Finance... the securities delivery process work? If any of the offers you submitted are accepted, you must...

  14. How Does the Economic Crisis Affect the Psychological Well-Being? Comparing College Students and Employees

    ERIC Educational Resources Information Center

    Wetzel, Kathrin; Mertens, Anne; Röbken, Heinke

    2012-01-01

    Little is known about differences in the impact of economic stress on students as compared to persons holding secure job positions. Besides the macroeconomic effects, an economic downturn can also affect individual's physical health and psychological well-being (Aytaç & Rankin, 2009). Prior research showed that socio-demographic…

  15. LANL continuity of operations plan

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Senutovitch, Diane M

    2010-12-22

    The Los Alamos National Laboratory (LANL) is a premier national security research institution, delivering scientific and engineering solutions for the nation's most crucial and complex problems. Our primary responsibility is to ensure the safety, security, and reliability of the nation's nuclear stockpile. LANL emphasizes worker safety, effective operational safeguards and security, and environmental stewardship, outstanding science remains the foundation of work at the Laboratory. In addition to supporting the Laboratory's core national security mission, our work advances bioscience, chemistry, computer science, earth and environmental sciences, materials science, and physics disciplines. To accomplish LANL's mission, we must ensure that the Laboratorymore » EFs continue to be performed during a continuity event, including localized acts of nature, accidents, technological or attack-related emergencies, and pandemic or epidemic events. The LANL Continuity of Operations (COOP) Plan documents the overall LANL COOP Program and provides the operational framework to implement continuity policies, requirements, and responsibilities at LANL, as required by DOE 0 150.1, Continuity Programs, May 2008. LANL must maintain its ability to perform the nation's PMEFs, which are: (1) maintain the safety and security of nuclear materials in the DOE Complex at fixed sites and in transit; (2) respond to a nuclear incident, both domestically and internationally, caused by terrorist activity, natural disaster, or accident, including mobilizing the resources to support these efforts; and (3) support the nation's energy infrastructure. This plan supports Continuity of Operations for Los Alamos National Laboratory (LANL). This plan issues LANL policy as directed by the DOE 0 150.1, Continuity Programs, and provides direction for the orderly continuation of LANL EFs for 30 days of closure or 60 days for a pandemic/epidemic event. Initiation of COOP operations may be required to support an allhazards event, including a national security emergency, major fire, catastrophic natural disaster, man-made disaster, terrorism event, or technological disaster by rendering LANL buildings, infrastructure, or Technical Areas unsafe, temporarily unusable, or inaccessible.« less

  16. DOE Office of Scientific and Technical Information (OSTI.GOV)

    No, author

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors inmore » Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.« less

  17. Report of the Task Group on the Department of Energy Aviation Program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1992-02-01

    The Department of Energy (DOE) owns or leases approximately 43 aircraft of which 17 are airplanes and 26 are helicopters. About two-thirds of these aircraft are used for activities related to defense programs; these are all government owned and contractor operated. The other third of DOE's aircraft is used by Bonneville Power Administration (BPA) and Western Area Power Administration (WAPA). These aircraft are primarily government owned and operated. In addition to transporting passengers, DOE aircraft are used for security operations, powerline and pipeline patrols, research and development activities, and aerial measurement and for the transport of hazardous materials. These operationsmore » are conducted at nine Field Offices under the organizational authority of eight DOE Program Secretarial Officers (PSOs). On July 24, 1991, a DOE-owned helicopter crashed at the Nevada Test Site resulting in the deaths of the five contractor employees on board. A DOE accident investigation board was convened, and an investigation into the causes of the crash was conducted. On November 19, 1991, a briefing of the preliminary results of the investigation was provided to the Assistant Secretary for Environment, Safety and Health (EH), the Assistant Secretary for Defense Programs (DP), and the Director, Office of Security Affairs (SA). On November 27, 1991, the Secretary of Energy directed the Assistant Secretary, EH, to convene and chair a Task Group with the PSOs to define the roles and responsibilities of DOE's aviation program. Task group recommendations are presented.« less

  18. The Role of the DOE Weapons Laboratories in a Changing National Security Environment: CNSS Papers No. 8, April 1988

    DOE R&D Accomplishments Database

    Hecker, S. S.

    1988-04-01

    The contributions of the Department of Energy (DOE) nuclear weapons laboratories to the nation's security are reviewed in testimony before the Subcommittee on Procurement and Military Nuclear Systems of the House Armed Services Committee. Also presented are contributions that technology will make in maintaining the strategic balance through deterrence, treaty verification, and a sound nuclear weapons complex as the nation prepares for significant arms control initiatives. The DOE nuclear weapons laboratories can contribute to the broader context of national security, one that recognizes that military strength can be maintained over the long term only if it is built upon the foundations of economic strength and energy security.

  19. Underground Test Area Fiscal Year 2013 Annual Quality Assurance Report Nevada National Security Site, Nevada, Revision 0

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Krenzien, Susan; Marutzky, Sam

    This report is required by the Underground Test Area (UGTA) Quality Assurance Plan (QAP) and identifies the UGTA quality assurance (QA) activities for fiscal year (FY) 2013. All UGTA organizations—U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO); Desert Research Institute (DRI); Lawrence Livermore National Laboratory (LLNL); Los Alamos National Laboratory (LANL); Navarro-Intera, LLC (N-I); National Security Technologies, LLC (NSTec); and the U.S. Geological Survey (USGS)—conducted QA activities in FY 2013. The activities included conducting assessments, identifying findings and completing corrective actions, evaluating laboratory performance, and publishing documents. In addition, integrated UGTA required reading and correctivemore » action tracking was instituted.« less

  20. Outreach and Education in the Life Sciences A Case Study of the U.S. Department of Energy National Laboratories

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Weller, Richard E.; Burbank, Roberta L.; Mahy, Heidi A.

    This project was intended to assess the impact of the U.S. Department of Energy’s National Nuclear Security Agency (DOE/NNSA) -sponsored education and outreach activities on the Biological Weapons Convention (BWC) in DOE national laboratories. Key activities focused on a series of pilot education and outreach workshops conducted at ten national laboratories. These workshops were designed to increase awareness of the BWC, familiarize scientists with dual-use concerns related to biological research, and promote the concept of individual responsibility and accountability

  1. 2016 Annual Progress Report: DOE Hydrogen and Fuel Cells Program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Satyapal, Sunita

    In the past year, the DOE Hydrogen Program (the Program) made substantial progress toward its goals and objectives. The Program has conducted comprehensive and focused efforts to enable the widespread commercialization of hydrogen and fuel cell technologies in diverse sectors of the economy. With emphasis on applications that will effectively strengthen our nation's energy security and improve our stewardship of the environment, the Program engages in research, development, and demonstration of critical improvements in the technologies. Highlights of the Program's accomplishments can be found in the sub-program chapters of this report.

  2. 2010 Annual Progress Report: DOE Hydrogen Program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    In the past year, the DOE Hydrogen Program (the Program) made substantial progress toward its goals and objectives. The Program has conducted comprehensive and focused efforts to enable the widespread commercialization of hydrogen and fuel cell technologies in diverse sectors of the economy. With emphasis on applications that will effectively strengthen our nation's energy security and improve our stewardship of the environment, the Program engages in research, development, and demonstration of critical improvements in the technologies. Highlights of the Program's accomplishments can be found in the sub-program chapters of this report.

  3. 2015 Annual Progress Report: DOE Hydrogen and Fuel Cells Program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Popovich, Neil

    In the past year, the DOE Hydrogen Program (the Program) made substantial progress toward its goals and objectives. The Program has conducted comprehensive and focused efforts to enable the widespread commercialization of hydrogen and fuel cell technologies in diverse sectors of the economy. With emphasis on applications that will effectively strengthen our nation's energy security and improve our stewardship of the environment, the Program engages in research, development, and demonstration of critical improvements in the technologies. Highlights of the Program's accomplishments can be found in the sub-program chapters of this report.

  4. 2012 Annual Progress Report: DOE Hydrogen and Fuel Cells Program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    In the past year, the DOE Hydrogen Program (the Program) made substantial progress toward its goals and objectives. The Program has conducted comprehensive and focused efforts to enable the widespread commercialization of hydrogen and fuel cell technologies in diverse sectors of the economy. With emphasis on applications that will effectively strengthen our nation's energy security and improve our stewardship of the environment, the Program engages in research, development, and demonstration of critical improvements in the technologies. Highlights of the Program's accomplishments can be found in the sub-program chapters of this report.

  5. 31 CFR 356.5 - What types of securities does the Treasury auction?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... securities. (a) Treasury bills. (1) Are issued at a discount or at par, depending upon the auction results; (2) Are redeemed at their par amount at maturity; and (3) Have maturities of not more than one year... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false What types of securities does the...

  6. 31 CFR 356.5 - What types of securities does the Treasury auction?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... securities. (a) Treasury bills. (1) Are issued at a discount or at par, depending upon the auction results; (2) Are redeemed at their par amount at maturity; and (3) Have maturities of not more than one year... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false What types of securities does the...

  7. 31 CFR 356.5 - What types of securities does the Treasury auction?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... securities. (a) Treasury bills. (1) Are issued at a discount or at par, depending upon the auction results; (2) Are redeemed at their par amount at maturity; and (3) Have maturities of not more than one year... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false What types of securities does the...

  8. 31 CFR 356.5 - What types of securities does the Treasury auction?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... securities. (a) Treasury bills. (1) Are issued at a discount or at par, depending upon the auction results; (2) Are redeemed at their par amount at maturity; and (3) Have maturities of not more than one year... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false What types of securities does the...

  9. Privacy and Data Security under Cloud Computing Arrangements: The Legal Framework and Practical Do's and Don'ts

    ERIC Educational Resources Information Center

    Buckman, Joel; Gold, Stephanie

    2012-01-01

    This article outlines privacy and data security compliance issues facing postsecondary education institutions when they utilize cloud computing and concludes with a practical list of do's and dont's. Cloud computing does not change an institution's privacy and data security obligations. It does involve reliance on a third party, which requires an…

  10. 75 FR 38156 - Notice of Applications for Deregistration Under Section 8(f) of the Investment Company Act of 1940

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-01

    ... securities and does not propose to make a public offering or engage in business of any kind. Filing Dates... public offering of its securities and does not propose to make a public offering or engage in business of... SECURITIES AND EXCHANGE COMMISSION [Release No. IC-29333] Notice of Applications for...

  11. National Security Science and Technology Initiative: Air Cargo Screening, Final Report for CRADA Number NFE-07-01081

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bingham, Philip; Bush, John; Bowerman, Biays

    The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security’s Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with fourmore » of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009.« less

  12. Metrics for the National SCADA Test Bed Program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Craig, Philip A.; Mortensen, J.; Dagle, Jeffery E.

    2008-12-05

    The U.S. Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) National SCADA Test Bed (NSTB) Program is providing valuable inputs into the electric industry by performing topical research and development (R&D) to secure next generation and legacy control systems. In addition, the program conducts vulnerability and risk analysis, develops tools, and performs industry liaison, outreach and awareness activities. These activities will enhance the secure and reliable delivery of energy for the United States. This report will describe metrics that could be utilized to provide feedback to help enhance the effectiveness of the NSTB Program.

  13. NETL's Energy Data Exchange (EDX) - a coordination, collaboration, and data resource discovery platform for energy science

    NASA Astrophysics Data System (ADS)

    Rose, K.; Rowan, C.; Rager, D.; Dehlin, M.; Baker, D. V.; McIntyre, D.

    2015-12-01

    Multi-organizational research teams working jointly on projects often encounter problems with discovery, access to relevant existing resources, and data sharing due to large file sizes, inappropriate file formats, or other inefficient options that make collaboration difficult. The Energy Data eXchange (EDX) from Department of Energy's (DOE) National Energy Technology Laboratory (NETL) is an evolving online research environment designed to overcome these challenges in support of DOE's fossil energy goals while offering improved access to data driven products of fossil energy R&D such as datasets, tools, and web applications. In 2011, development of NETL's Energy Data eXchange (EDX) was initiated and offers i) a means for better preserving of NETL's research and development products for future access and re-use, ii) efficient, discoverable access to authoritative, relevant, external resources, and iii) an improved approach and tools to support secure, private collaboration and coordination between multi-organizational teams to meet DOE mission and goals. EDX presently supports fossil energy and SubTER Crosscut research activities, with an ever-growing user base. EDX is built on a heavily customized instance of the open source platform, Comprehensive Knowledge Archive Network (CKAN). EDX connects users to externally relevant data and tools through connecting to external data repositories built on different platforms and other CKAN platforms (e.g. Data.gov). EDX does not download and repost data or tools that already have an online presence. This leads to redundancy and even error. If a relevant resource already has an online instance, is hosted by another online entity, EDX will point users to that external host either using web services, inventorying URLs and other methods. EDX offers users the ability to leverage private-secure capabilities custom built into the system. The team is presently working on version 3 of EDX which will incorporate big data analytical capabilities amongst other advanced features.

  14. Magnetic Resonance Determinations of Structure and Reaction Kinetics of Epoxy/Amine Systems.

    DTIC Science & Technology

    1981-12-31

    AD- AISA 542 MCDONNELL DOUGLAS RESEARCH LABS ST LOUIS MO FIG 7/4 MAGNETIC RESONANCE DETERMINATIONS OF STRUCTURE AND REACTION KIN--ETC (U) DEC Al I M...solvent content (methylene chloride). DD I JAN73 1473 EDITION OF I NOV 65 IS OBSOLETE UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE (When Doe Fntered

  15. 12 CFR 218.760 - Exemption from definition of “broker” for banks accepting orders to effect transactions in...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 218.760 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM... services provided by the bank to the account; and (6) Investment advice and recommendations. The bank does not provide investment advice or research concerning securities to the account, make recommendations...

  16. Virtual Special Issue on Catalysis at the U.S. Department of Energy’s National Laboratories

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pruski, Marek; Sadow, Aaron; Slowing, Igor

    Catalysis research at the U.S. Department of Energy's (DOE's) National Laboratories covers a wide range of research topics in heterogeneous catalysis, homogeneous/ molecular catalysis, electrocatalysis, and surface science. Since much of the work at National Laboratories is funded by DOE, the research is largely focused on addressing DOE’s mission to ensure America’s security and prosperity by addressing its energy, environmental, and nuclear challenges through trans-formative science and technology solutions. The catalysis research carried out at the DOE National Laboratories ranges from very fundamental catalysis science, funded by DOE’s Office of Basic Energy Sciences (BES), to applied research and development (R&D)more » in areas such as biomass conversion to fuels and chemicals, fuel cells, and vehicle emission control with primary funding from DOE’s Office of Energy Efficiency and Renewable Energy. National Laboratories are home to many DOE Office of Science national scientific user facilities that provide researchers with the most advanced tools of modern science, including accelerators, colliders, supercomputers, light sources, and neutron sources, as well as facilities for studying the nanoworld and the terrestrial environment. National Laboratory research programs typically feature teams of researchers working closely together, often joining scientists from different disciplines to attack scientific and technical problems using a variety of tools and techniques available at the DOE national scientific user facilities. Along with collaboration between National Laboratory scientists, interactions with university colleagues are common in National Laboratory catalysis R&D. In some cases, scientists have joint appoint-ments at a university and a National Laboratory.« less

  17. Select Generic Dry-Storage Pilot Plant Design for Safeguards and Security by Design (SSBD) per Used Fuel Campaign

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Demuth, Scott Francis; Sprinkle, James K.

    As preparation to the year-end deliverable (Provide SSBD Best Practices for Generic Dry-Storage Pilot Scale Plant) for the Work Package (FT-15LA040501–Safeguards and Security by Design for Extended Dry Storage), the initial step was to select a generic dry-storage pilot plant design for SSBD. To be consistent with other DOE-NE Fuel Cycle Research and Development (FCR&D) activities, the Used Fuel Campaign was engaged for the selection of a design for this deliverable. For the work Package FT-15LA040501–“Safeguards and Security by Design for Extended Dry Storage”, SSBD will be initiated for the Generic Dry-Storage Pilot Scale Plant described by the layout ofmore » Reference 2. SSBD will consider aspects of the design that are impacted by domestic material control and accounting (MC&A), domestic security, and international safeguards.« less

  18. A secure file manager for UNIX

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    DeVries, R.G.

    1990-12-31

    The development of a secure file management system for a UNIX-based computer facility with supercomputers and workstations is described. Specifically, UNIX in its usual form does not address: (1) Operation which would satisfy rigorous security requirements. (2) Online space management in an environment where total data demands would be many times the actual online capacity. (3) Making the file management system part of a computer network in which users of any computer in the local network could retrieve data generated on any other computer in the network. The characteristics of UNIX can be exploited to develop a portable, secure filemore » manager which would operate on computer systems ranging from workstations to supercomputers. Implementation considerations making unusual use of UNIX features, rather than requiring extensive internal system changes, are described, and implementation using the Cray Research Inc. UNICOS operating system is outlined.« less

  19. The Forensic Confirmation Bias: A Comparison Between Experts and Novices.

    PubMed

    van den Eeden, Claire A J; de Poot, Christianne J; van Koppen, Peter J

    2018-05-17

    A large body of research has described the influence of context information on forensic decision-making. In this study, we examined the effect of context information on the search for and selection of traces by students (N = 36) and crime scene investigators (N = 58). Participants investigated an ambiguous mock crime scene and received prior information indicating suicide, a violent death or no information. Participants described their impression of the scene and wrote down which traces they wanted to secure. Results showed that context information impacted first impression of the scene and crime scene behavior, namely number of traces secured. Participants in the murder condition secured most traces. Furthermore, the students secured more crime-related traces. Students were more confident in their first impression. This study does not indicate that experts outperform novices. We therefore argue for proper training on cognitive processes as an integral part of all forensic education. © 2018 American Academy of Forensic Sciences.

  20. Health care data security: one size does not fit all.

    PubMed

    Krohn, R

    2001-11-01

    In the wake of the Internet, E-commerce, and particularly the Health Insurance Portability and Accountability Act, data security has risen to the top of health care information technology priorities. What is the correct mix of data security tools, policies, and technologies for the doctor, the hospital, the insurer, the vendor, and everyone else who does business in the health care industry?

  1. Will you accept the government's friend request? Social networks and privacy concerns.

    PubMed

    Siegel, David A

    2013-01-01

    Participating in social network websites entails voluntarily sharing private information, and the explosive growth of social network websites over the last decade suggests shifting views on privacy. Concurrently, new anti-terrorism laws, such as the USA Patriot Act, ask citizens to surrender substantial claim to privacy in the name of greater security. I address two important questions regarding individuals' views on privacy raised by these trends. First, how does prompting individuals to consider security concerns affect their views on government actions that jeopardize privacy? Second, does the use of social network websites alter the effect of prompted security concerns? I posit that prompting individuals to consider security concerns does lead to an increased willingness to accept government actions that jeopardize privacy, but that frequent users of websites like Facebook are less likely to be swayed by prompted security concerns. An embedded survey experiment provides support for both parts of my claim.

  2. Will You Accept the Government's Friend Request? Social Networks and Privacy Concerns

    PubMed Central

    Siegel, David A.

    2013-01-01

    Participating in social network websites entails voluntarily sharing private information, and the explosive growth of social network websites over the last decade suggests shifting views on privacy. Concurrently, new anti-terrorism laws, such as the USA Patriot Act, ask citizens to surrender substantial claim to privacy in the name of greater security. I address two important questions regarding individuals' views on privacy raised by these trends. First, how does prompting individuals to consider security concerns affect their views on government actions that jeopardize privacy? Second, does the use of social network websites alter the effect of prompted security concerns? I posit that prompting individuals to consider security concerns does lead to an increased willingness to accept government actions that jeopardize privacy, but that frequent users of websites like Facebook are less likely to be swayed by prompted security concerns. An embedded survey experiment provides support for both parts of my claim. PMID:24312236

  3. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sjoreen, Terrence P

    The Oak Ridge National Laboratory (ORNL) Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) in March of each year. The program operates under the authority of DOE Order 413.2A, 'Laboratory Directed Research and Development' (January 8, 2001), which establishes DOE's requirements for the program while providing the Laboratory Director broad flexibility for program implementation. LDRD funds are obtained through a charge to all Laboratory programs. This report describes all ORNL LDRD research activities supported during FY 2005 and includes final reports for completed projects and shorter progress reports for projects thatmore » were active, but not completed, during this period. The FY 2005 ORNL LDRD Self-Assessment (ORNL/PPA-2006/2) provides financial data about the FY 2005 projects and an internal evaluation of the program's management process. ORNL is a DOE multiprogram science, technology, and energy laboratory with distinctive capabilities in materials science and engineering, neutron science and technology, energy production and end-use technologies, biological and environmental science, and scientific computing. With these capabilities ORNL conducts basic and applied research and development (R&D) to support DOE's overarching national security mission, which encompasses science, energy resources, environmental quality, and national nuclear security. As a national resource, the Laboratory also applies its capabilities and skills to the specific needs of other federal agencies and customers through the DOE Work For Others (WFO) program. Information about the Laboratory and its programs is available on the Internet at . LDRD is a relatively small but vital DOE program that allows ORNL, as well as other multiprogram DOE laboratories, to select a limited number of R&D projects for the purpose of: (1) maintaining the scientific and technical vitality of the Laboratory; (2) enhancing the Laboratory's ability to address future DOE missions; (3) fostering creativity and stimulating exploration of forefront science and technology; (4) serving as a proving ground for new research; and (5) supporting high-risk, potentially high-value R&D. Through LDRD the Laboratory is able to improve its distinctive capabilities and enhance its ability to conduct cutting-edge R&D for its DOE and WFO sponsors. To meet the LDRD objectives and fulfill the particular needs of the Laboratory, ORNL has established a program with two components: the Director's R&D Fund and the Seed Money Fund. As outlined in Table 1, these two funds are complementary. The Director's R&D Fund develops new capabilities in support of the Laboratory initiatives, while the Seed Money Fund is open to all innovative ideas that have the potential for enhancing the Laboratory's core scientific and technical competencies. Provision for multiple routes of access to ORNL LDRD funds maximizes the likelihood that novel and seminal ideas with scientific and technological merit will be recognized and supported.« less

  4. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sjoreen, Terrence P

    The Oak Ridge National Laboratory (ORNL) Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) in March of each year. The program operates under the authority of DOE Order 413.2A, 'Laboratory Directed Research and Development' (January 8, 2001), which establishes DOE's requirements for the program while providing the Laboratory Director broad flexibility for program implementation. LDRD funds are obtained through a charge to all Laboratory programs. This report describes all ORNL LDRD research activities supported during FY 2004 and includes final reports for completed projects and shorter progress reports for projects thatmore » were active, but not completed, during this period. The FY 2004 ORNL LDRD Self-Assessment (ORNL/PPA-2005/2) provides financial data about the FY 2004 projects and an internal evaluation of the program's management process. ORNL is a DOE multiprogram science, technology, and energy laboratory with distinctive capabilities in materials science and engineering, neutron science and technology, energy production and end-use technologies, biological and environmental science, and scientific computing. With these capabilities ORNL conducts basic and applied research and development (R&D) to support DOE's overarching national security mission, which encompasses science, energy resources, environmental quality, and national nuclear security. As a national resource, the Laboratory also applies its capabilities and skills to the specific needs of other federal agencies and customers through the DOE Work For Others (WFO) program. Information about the Laboratory and its programs is available on the Internet at . LDRD is a relatively small but vital DOE program that allows ORNL, as well as other multiprogram DOE laboratories, to select a limited number of R&D projects for the purpose of: (1) maintaining the scientific and technical vitality of the Laboratory; (2) enhancing the Laboratory's ability to address future DOE missions; (3) fostering creativity and stimulating exploration of forefront science and technology; (4) serving as a proving ground for new research; and (5) supporting high-risk, potentially high-value R&D. Through LDRD the Laboratory is able to improve its distinctive capabilities and enhance its ability to conduct cutting-edge R&D for its DOE and WFO sponsors. To meet the LDRD objectives and fulfill the particular needs of the Laboratory, ORNL has established a program with two components: the Director's R&D Fund and the Seed Money Fund. As outlined in Table 1, these two funds are complementary. The Director's R&D Fund develops new capabilities in support of the Laboratory initiatives, while the Seed Money Fund is open to all innovative ideas that have the potential for enhancing the Laboratory's core scientific and technical competencies. Provision for multiple routes of access to ORNL LDRD funds maximizes the likelihood that novel and seminal ideas with scientific and technological merit will be recognized and supported.« less

  5. 10 CFR 706.10 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies and Procedures in... within the scope of the Labor Management Relations Act at the various DOE installations should be... published decisions. This policy does not preclude adoption of special arrangements which may be required...

  6. LABORATORY DIRECTED RESEARCH AND DEVELOPMENT ANNUAL REPORT TO THE DEPARTMENT OF ENERGY - DECEMBER 2006

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    FOX, K.J.

    Brookhaven National Laboratory (BNL) is a multidisciplinary laboratory that carries out basic and applied research in the physical, biomedical, and environmental sciences, and in selected energy technologies. It is managed by Brookhaven Science Associates, LLC, (BSA) under contract with the U. S. Department of Energy (DOE). BNL's total annual budget has averaged about $460 million. There are about 2,500 employees, and another 4,500 guest scientists and students who come each year to use the Laboratory's facilities and work with the staff. The BNL Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE)more » annually in March, as required by DOE Order 413.2B, ''Laboratory Directed Research and Development,'' April 19, 2006, and the Roles, Responsibilities, and Guidelines for Laboratory Directed Research and Development at the Department of Energy National Nuclear Security Administration Laboratories dated June 13, 2006. In accordance this is our Annual Report in which we describe the Purpose, Approach, Technical Progress and Results, and Specific Accomplishments of all LDRD projects that received funding during Fiscal Year 2006.« less

  7. Correlation Analysis of Cultural Development and Social Security in Iran

    NASA Astrophysics Data System (ADS)

    Habibi, K.; Alizadeh, H.; Meshkini, A.; Kohsari, M. J.

    In recent years, politicians have paid more attention to planning methods considering environmental, economical, social and cultural potentials of place. According to general principles and experiences has been achieved by the developed countries, there is a direct link between social security and cultural development. Where the society and region is culturally more developed, social security level is higher and vice versa. Considering this leading point, this research aims to establish a rational correlation between the provinces of Iran considering cultural development ranking and social security levels using planning models and analysis. To reach this goal, different variables in various sectors such as physical, social, economical, etc. were classified leading to developmental indicators of the provinces in the related sectors. In addition to this, many variables concerning the social security levels in provinces such as homicide, robbery, suicide, etc. were also classified to identify the social security level in each province. According to the results, more culturally developed and wealthier provinces, like Tehran, Khorasan, Fars, have lower social security degree and less culturally developed provinces, like Sistan va Baloochestan, Kurdistan, Elam have higher social security level. In other words, the mentioned principle, the correlation between social security and cultural development, does not work in the same direction in Iranian context.

  8. DOE's Computer Incident Advisory Capability (CIAC)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schultz, E.

    1990-09-01

    Computer security is essential in maintaining quality in the computing environment. Computer security incidents, however, are becoming more sophisticated. The DOE Computer Incident Advisory Capability (CIAC) team was formed primarily to assist DOE sites in responding to computer security incidents. Among CIAC's other responsibilities are gathering and distributing information to DOE sites, providing training workshops, coordinating with other agencies, response teams, and vendors, creating guidelines for incident handling, and developing software tools. CIAC has already provided considerable assistance to DOE sites faced with virus infections and worm and hacker attacks, has issued over 40 information bulletins, and has developed andmore » presented a workshop on incident handling. CIAC's experience in helping sites has produced several lessons learned, including the need to follow effective procedures to avoid virus infections in small systems and the need for sound password management and system administration in networked systems. CIAC's activity and scope will expand in the future. 4 refs.« less

  9. 2011 Annual Progress Report: DOE Hydrogen and Fuel Cells Program (Book)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    In the past year, the DOE Hydrogen and Fuel Cells Program (the Program) made substantial progress toward its goals and objectives. The Program has conducted comprehensive and focused efforts to enable the widespread commercialization of hydrogen and fuel cell technologies in diverse sectors of the economy. With emphasis on applications that will effectively strengthen our nation's energy security and improve our stewardship of the environment, the Program engages in research, development, and demonstration of critical improvements in the technologies. Highlights of the Program's accomplishments can be found in the sub-program chapters of this report.

  10. U.S. Department of Energy Office of Nuclear Technology Research and Eevelopment ((NTRD) comprehensive summary of QA assessments for FY17

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Trost, Alan L.

    The U.S. Department of Energy (DOE) Office of Nuclear Energy (NE) has developed a research and development (R&D) roadmap for its research, development, and demonstration (RD&D) activities to ensure nuclear energy remains a compelling and viable energy option for the U.S. The roadmap defines NE RD&D activities and objectives that address the challenges to research, develop and demonstrate options to the current U.S commercial fuel cycle to enable the safe, secure, economic, and sustainable expansion of nuclear energy, while minimizing proliferation and terrorism risks expanding the use of nuclear power. The roadmap enables the development of technologies and other solutionsmore » that can improve the reliability, sustain the safety, and extend the life of current reactors. In addition, it will help to develop improvements in the affordability of the new reactors to enable nuclear energy to help meet the Administration’s energy security and climate change goals.« less

  11. 2016 National Algal Biofuels Technology Review

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Barry, Amanda; Wolfe, Alexis; English, Christine

    The Bioenergy Technologies Office (BETO) of the U.S. Department of Energy (DOE), Office of Energy Efficiency and Renewable Energy, is committed to advancing the vision of a viable, sustainable domestic biomass industry that produces renewable biofuels, bioproducts, and biopower; enhances U.S. energy security; reduces our dependence on fossil fuels; provides environmental benefits; and creates economic opportunities across the nation. BETO’s goals are driven by various federal policies and laws, including the Energy Independence and Security Act of 2007 (EISA). To accomplish its goals, BETO has undertaken a diverse portfolio of research, development, and demonstration (RD&D) activities, in partnership with nationalmore » laboratories, academia, and industry.« less

  12. Cooperative monitoring and its role in regional security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Biringer, K.; Olsen, J.; Lincoln, R.

    1997-03-01

    Cooperative monitoring systems can play an important part in promoting the implementation of regional cooperative security agreements. These agreements advance the national security interests of the United States in a post Cold War environment. Regional issues as widely varying as nuclear nonproliferation, trade and environmental pollution can be the source of tensions which may escalate to armed conflict which could have global implications. The Office of National Security Policy Analysis at the US Department of Energy (DOE) has an interest in seeking ways to promote regional cooperation that can reduce the threats posed by regional conflict. DOE technologies and technicalmore » expertise can contribute to developing solutions to a wide variety of these international problems. Much of this DOE expertise has been developed in support of the US nuclear weapons and arms control missions. It is now being made available to other agencies and foreign governments in their search for regional security and cooperation. This report presents two examples of interest to DOE in which monitoring technologies could be employed to promote cooperation through experimentation. The two scenarios include nuclear transparency in Northeast Asia and environmental restoration in the Black Sea. Both offer the potential for the use of technology to promote regional cooperation. The issues associated with both of these monitoring applications are presented along with examples of appropriate monitoring technologies, potential experiments and potential DOE contributions to the scenarios.« less

  13. DOE Office of Scientific and Technical Information (OSTI.GOV)

    French, T

    I am pleased to present the fiscal year 2007 Laboratory Directed Research and Development (LDRD) annual report. This represents the first year that SRNL has been eligible for LDRD participation and our results to date demonstrate we are off to an excellent start. SRNL became a National Laboratory in 2004, and was designated the 'Corporate Laboratory' for the DOE Office of Environmental Management (EM) in 2006. As you will see, we have made great progress since these designations. The LDRD program is one of the tools SRNL is using to enable achievement of our strategic goals for the DOE. Themore » LDRD program allows the laboratory to blend a strong basic science component into our applied technical portfolio. This blending of science with applied technology provides opportunities for our scientists to strengthen our capabilities and delivery. The LDRD program is vital to help SRNL attract and retain leading scientists and engineers who will help build SRNL's future and achieve DOE mission objectives. This program has stimulated our research staff creativity, while realizing benefits from their participation. This investment will yield long term dividends to the DOE in its Environmental Management, Energy, and National Security missions.« less

  14. 20 CFR 416.264 - When does the special SSI eligibility status apply.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false When does the special SSI eligibility status apply. 416.264 Section 416.264 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Eligibility Special Provisions for People Who Work Despite A...

  15. 10 CFR 1046.15 - Training and qualification for security skills and knowledge.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... knowledge. 1046.15 Section 1046.15 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) PHYSICAL PROTECTION OF... knowledge. (a) DOE contractors shall only employ as protective force personnel individuals who successfully... and Qualification for Security Skills and Knowledge,” to this subpart. The DOE contractor shall...

  16. 20 CFR 416.264 - When does the special SSI eligibility status apply.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false When does the special SSI eligibility status apply. 416.264 Section 416.264 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Eligibility Special Provisions for People Who Work Despite A...

  17. 20 CFR 416.264 - When does the special SSI eligibility status apply.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false When does the special SSI eligibility status apply. 416.264 Section 416.264 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Eligibility Special Provisions for People Who Work Despite A...

  18. 20 CFR 416.264 - When does the special SSI eligibility status apply.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false When does the special SSI eligibility status apply. 416.264 Section 416.264 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Eligibility Special Provisions for People Who Work Despite A...

  19. 10 CFR 1046.15 - Training and qualification for security skills and knowledge.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Training and qualification for security skills and... SECURITY INTERESTS Protective Force Personnel § 1046.15 Training and qualification for security skills and... and Qualification for Security Skills and Knowledge,” to this subpart. The DOE contractor shall...

  20. School Security: For Whom and with What Results?

    ERIC Educational Resources Information Center

    Servoss, Timothy J.; Finn, Jeremy D.

    2014-01-01

    This study utilized school-level data from several combined national databases to address two questions regarding school security policy: (1) What are the school characteristics related to levels of security? (2) How does security relate to school suspension, dropout, and college attendance rates? Among the predictors of school security, having a…

  1. Post-Cold War Science and Technology at Los Alamos

    NASA Astrophysics Data System (ADS)

    Browne, John C.

    2002-04-01

    Los Alamos National Laboratory serves the nation through the development and application of leading-edge science and technology in support of national security. Our mission supports national security by: ensuring the safety, security, and reliability of the U.S. nuclear stockpile; reducing the threat of weapons of mass destruction in support of counter terrorism and homeland defense; and solving national energy, environment, infrastructure, and health security problems. We require crosscutting fundamental and advanced science and technology research to accomplish our mission. The Stockpile Stewardship Program develops and applies, advanced experimental science, computational simulation, and technology to ensure the safety and reliability of U.S. nuclear weapons in the absence of nuclear testing. This effort in itself is a grand challenge. However, the terrorist attack of September 11, 2001, reminded us of the importance of robust and vibrant research and development capabilities to meet new and evolving threats to our national security. Today through rapid prototyping we are applying new, innovative, science and technology for homeland defense, to address the threats of nuclear, chemical, and biological weapons globally. Synergistically, with the capabilities that we require for our core mission, we contribute in many other areas of scientific endeavor. For example, our Laboratory has been part of the NASA effort on mapping water on the moon and NSF/DOE projects studying high-energy astrophysical phenomena, understanding fundamental scaling phenomena of life, exploring high-temperature superconductors, investigating quantum information systems, applying neutrons to condensed-matter and nuclear physics research, developing large-scale modeling and simulations to understand complex phenomena, and exploring nanoscience that bridges the atomic to macroscopic scales. In this presentation, I will highlight some of these post-cold war science and technology advances including our national security contributions, and discuss some of challenges for Los Alamos in the future.

  2. Optically-based Sensor System for Critical Nuclear Facilities Post-Event Seismic Structural Assessment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McCallen, David; Petrone, Floriana; Buckle, Ian

    The U.S. Department of Energy (DOE) has ownership and operational responsibility for a large enterprise of nuclear facilities that provide essential functions to DOE missions ranging from national security to discovery science and energy research. These facilities support a number of DOE programs and offices including the National Nuclear Security Administration, Office of Science, and Office of Environmental Management. With many unique and “one of a kind” functions, these facilities represent a tremendous national investment, and assuring their safety and integrity is fundamental to the success of a breadth of DOE programs. Many DOE critical facilities are located in regionsmore » with significant natural phenomenon hazards including major earthquakes and DOE has been a leader in developing standards for the seismic analysis of nuclear facilities. Attaining and sustaining excellence in nuclear facility design and management must be a core competency of the DOE. An important part of nuclear facility management is the ability to monitor facilities and rapidly assess the response and integrity of the facilities after any major upset event. Experience in the western U.S. has shown that understanding facility integrity after a major earthquake is a significant challenge which, lacking key data, can require extensive effort and significant time. In the work described in the attached report, a transformational approach to earthquake monitoring of facilities is described and demonstrated. An entirely new type of optically-based sensor that can directly and accurately measure the earthquake-induced deformations of a critical facility has been developed and tested. This report summarizes large-scale shake table testing of the sensor concept on a representative steel frame building structure, and provides quantitative data on the accuracy of the sensor measurements.« less

  3. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is tomore » provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.« less

  4. U.S, Department of Energy's Bioenergy Research Centers An Overview of the Science

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2009-07-01

    Alternative fuels from renewable cellulosic biomass--plant stalks, trunks, stems, and leaves--are expected to significantly reduce U.S. dependence on imported oil while enhancing national energy security and decreasing the environmental impacts of energy use. Ethanol and other advanced biofuels from cellulosic biomass are renewable alternatives that could increase domestic production of transportation fuels, revitalize rural economies, and reduce carbon dioxide and pollutant emissions. According to U.S. Secretary of Energy Steven Chu, 'Developing the next generation of biofuels is key to our effort to end our dependence on foreign oil and address the climate crisis while creating millions of new jobs thatmore » can't be outsourced'. In the United States, the Energy Independence and Security Act (EISA) of 2007 is an important driver for the sustainable development of renewable biofuels. As part of EISA, the Renewable Fuel Standard mandates that 36 billion gallons of biofuels are to be produced annually by 2022, of which 16 billion gallons are expected to come from cellulosic feedstocks. Although cellulosic ethanol production has been demonstrated on a pilot level, developing a cost-effective, commercial-scale cellulosic biofuel industry will require transformational science to significantly streamline current production processes. Woodchips, grasses, cornstalks, and other cellulosic biomass are widely abundant but more difficult to break down into sugars than corn grain--the primary source of U.S. ethanol fuel production today. Biological research is key to accelerating the deconstruction of cellulosic biomass into sugars that can be converted to biofuels. The Department of Energy (DOE) Office of Science continues to play a major role in inspiring, supporting, and guiding the biotechnology revolution over the past 25 years. The DOE Genomic Science Program is advancing a new generation of research focused on achieving whole-systems understanding for biology. This program is bringing together scientists in diverse fields to understand the complex biology underlying solutions to DOE missions in energy production, environmental remediation, and climate change science. New interdisciplinary research communities are emerging, as are knowledgebases and scientific and computational resources critical to advancing large-scale, genome-based biology. To focus the most advanced biotechnology-based resources on the biological challenges of biofuel production, DOE established three Bioenergy Research Centers (BRCs) in September 2007. Each center is pursuing the basic research underlying a range of high-risk, high-return biological solutions for bioenergy applications. Advances resulting from the BRCs will provide the knowledge needed to develop new biobased products, methods, and tools that the emerging biofuel industry can use. The scientific rationale for these centers and for other fundamental genomic research critical to the biofuel industry was established at a DOE workshop involving members of the research community (see sidebar, Biofuel Research Plan, below). The DOE BRCs have developed automated, high-throughput analysis pipelines that will accelerate scientific discovery for biology-based biofuel research. The three centers, which were selected through a scientific peer-review process, are based in geographically diverse locations--the Southeast, the Midwest, and the West Coast--with partners across the nation. DOE's Oak Ridge National Laboratory leads the BioEnergy Science Center (BESC) in Tennessee; the University of Wisconsin-Madison leads the Great Lakes Bioenergy Research Center (GLBRC); and DOE's Lawrence Berkeley National Laboratory leads the DOE Joint BioEnergy Institute (JBEI) in California. Each center represents a multidisciplinary partnership with expertise spanning the physical and biological sciences, including genomics, microbial and plant biology, analytical chemistry, computational biology and bioinformatics, and engineering. Institutional partners include DOE national laboratories, universities, private companies, and nonprofit organizations.« less

  5. Nuclear Explosion Monitoring History and Research and Development

    NASA Astrophysics Data System (ADS)

    Hawkins, W. L.; Zucca, J. J.

    2008-12-01

    Within a year after the nuclear detonations over Hiroshima and Nagasaki the Baruch Plan was presented to the newly formed United Nations Atomic Energy Commission (June 14, 1946) to establish nuclear disarmament and international control over all nuclear activities. These controls would allow only the peaceful use of atomic energy. The plan was rejected through a Security Council veto primarily because of the resistance to unlimited inspections. Since that time there have been many multilateral, and bilateral agreements, and unilateral declarations to limit or eliminate nuclear detonations. Almost all of theses agreements (i.e. treaties) call for some type of monitoring. We will review a timeline showing the history of nuclear testing and the more important treaties. We will also describe testing operations, containment, phenomenology, and observations. The Comprehensive Nuclear Test Ban Treaty (CTBT) which has been signed by 179 countries (ratified by 144) established the International Monitoring System global verification regime which employs seismic, infrasound, hydroacoustic and radionuclide monitoring techniques. The CTBT also includes on-site inspection to clarify whether a nuclear explosion has been carried out in violation of the Treaty. The US Department of Energy (DOE) through its National Nuclear Security Agency's Ground-Based Nuclear Explosion Monitoring R&D Program supports research by US National Laboratories, and universities and industry internationally to detect, locate, and identify nuclear detonations. This research program builds on the broad base of monitoring expertise developed over several decades. Annually the DOE and the US Department of Defense jointly solicit monitoring research proposals. Areas of research include: seismic regional characterization and wave propagation, seismic event detection and location, seismic identification and source characterization, hydroacoustic monitoring, radionuclide monitoring, infrasound monitoring, and data processing and analysis. Reports from the selected research projects are published in the proceedings of the annual Monitoring Research Review conference.

  6. Perceived attachment security to parents and peer victimization: Does adolescent's aggressive behaviour make a difference?

    PubMed

    Guedes, Maryse; Santos, António J; Ribeiro, Olívia; Freitas, Miguel; Rubin, Kenneth H; Veríssimo, Manuela

    2018-06-01

    Peer victimization is one of the most prominent problems during adolescence. Research has distinguished aggressive and non-aggressive victims; however, there are still significant drawbacks in understanding the social and family functioning of these different groups of victimized adolescents. This study aimed to compare social behavior and perceived attachment security to parents of Portuguese adolescents, classified as aggressive victims, non-aggressive victims and non-victims. The sample consisted of 222 adolescents (115 boys, 107 girls) who completed the Kerns Security Scale and the Extended Class Play, to assess perceived attachment security and social behavior, respectively. Controlling for age and sex, aggressive victims and non-aggressive victims differed in anxious withdrawal but shared a similar profile in peer exclusion and prosocial behavior. Only aggressive victims reported lower attachment security to mother and father when compared to non-victims. These findings underline that victimized adolescents constitute a heterogeneous group in terms of their social and family functioning. Copyright © 2018 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  7. Update: Science and security

    NASA Astrophysics Data System (ADS)

    Richman, Barbara T.

    Although ‘a substantial and serious technology transfer [to the Soviet Union] exists,’ open communication of federally funded research does not damage our national security, according to Dale R. Corson, president emeritus of Cornell University and chairman of the National Academy of Sciences' Panel on Scientific Communication and National Security. Corson characterized those technology transfers at a recent press conference on the panel's findings, which are summarized in their report, ‘Science Communications and National Security’ (Eos, October 5, p. 801).‘A net flow of products, processes, and ideas is continually moving from the United States and its allies to the Soviet Union, through both overt and covert means,’ Corson said. While some of this technology transfer has not compromised national security (‘in part because a technology in question had little or no military significance’), a ‘substantial portion of the transfer has been damaging to national security,’ Corson explained. The ‘damaging transfers’ occur through the ‘legal as well as illegal sale of products, through transfers via third countries, and through a highly organized espionage operation.’

  8. 10 CFR 712.16 - DOE security review.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... of the HRP process, the HRP certifying official must be notified and the security concern evaluated... part. (c) Any mental/personality disorder or behavioral issues found in a personnel security file...

  9. Virtual Special Issue on Catalysis at the U.S. Department of Energy’s National Laboratories

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pruski, Marek; Sadow, Aaron D.; Slowing, Igor I.

    Catalysis research at the U.S. Department of Energy’s (DOE’s) National Laboratories covers a wide range of research topics in heterogeneous catalysis, homogeneous/molecular catalysis, biocatalysis, electrocatalysis, and surface science. Since much of the work at National Laboratories is funded by DOE, the research is largely focused on addressing DOE’s mission to ensure America’s security and prosperity by addressing its energy, environmental, and nuclear challenges through transformative science and technology solutions. The catalysis research carried out at the DOE National Laboratories ranges from very fundamental catalysis science, funded by DOE’s Office of Basic Energy Sciences (BES), to applied research and development (R&D)more » in areas such as biomass conversion to fuels and chemicals, fuel cells, and vehicle emission control with primary funding from DOE’s Office of Energy Efficiency and Renewable Energy. National Laboratories are home to many DOE Office of Science national scientific user facilities that provide researchers with the most advanced tools of modern science, including accelerators, colliders, supercomputers, light sources, and neutron sources, as well as facilities for studying the nanoworld and the terrestrial environment. National Laboratory research programs typically feature teams of researchers working closely together, often joining scientists from different disciplines to tackle scientific and technical problems using a variety of tools and techniques available at the DOE national scientific user facilities. Along with collaboration between National Laboratory scientists, interactions with university colleagues are common in National Laboratory catalysis R&D. In some cases, scientists have joint appointments at a university and a National Laboratory.« less

  10. Obtaining waivers of parental consent: A strategy endorsed by gay, bisexual, and queer adolescent males for health prevention research.

    PubMed

    Flores, Dalmacio; McKinney, Ross; Arscott, Joyell; Barroso, Julie

    Requiring parental consent in studies with sexual minority youth (SMY) can sometimes be problematic as participants may have yet to disclose their sexual orientation, may not feel comfortable asking parents' permission, and may promote a self-selection bias. We discuss rationale for waiving parental consent, strategies to secure waivers from review boards, and present participants' feedback on research without parents' permission. We share our institutional review board proposal in which we made a case that excluding SMY from research violates ethical research principles, does not recognize their autonomy, and limits collection of sexuality data. Standard consent policies may inadvertently exclude youth who are at high risk for negative health outcomes or may potentially put them at risk because of forced disclosure of sexual orientation. Securing a waiver addresses these concerns and allows for rich data, which is critical for providers to have a deeper understanding of their unique sexual health needs. To properly safeguard and encourage research informed by SMY, parental consent waivers may be necessary. Copyright © 2017 Elsevier Inc. All rights reserved.

  11. HIV/AIDS, conflict and security in Africa: rethinking relationships

    PubMed Central

    2008-01-01

    The effect of conflict on HIV transmission and regional and global security has been the subject of much recent discussion and debate. Many long held assumptions regarding these relationships are being reconsidered. Conflict has long been assumed to contribute significantly to the spread of HIV infection. However, new research is casting doubt on this assumption. Studies from Africa suggest that conflict does not necessarily predispose to HIV transmission and indeed, there is evidence to suggest that recovery in the "post-conflict" state is potentially dangerous from the standpoint of HIV transmission. As well, refugee populations have been previously considered as highly infected vectors of HIV transmission. But in light of new investigation this belief is also being reconsidered. There has additionally been concern that high rates of HIV infection among many of the militaries of sub-Saharan Africa poses a threat to regional security. However, data is lacking on both dramatically elevated prevalence amongst soldiers and a possible negative effect on regional security. Nevertheless, HIV/AIDS remain a serious threat to population health and economic well being in this region. These issues are of vital importance for HIV programming and health sector development in conflict and "post-conflict" societies and will constitute formidable challenges to the international community. Further research is required to better inform the discussion of HIV, conflict, and security in sub-Saharan Africa. PMID:19014653

  12. Research on offense and defense technology for iOS kernel security mechanism

    NASA Astrophysics Data System (ADS)

    Chu, Sijun; Wu, Hao

    2018-04-01

    iOS is a strong and widely used mobile device system. It's annual profits make up about 90% of the total profits of all mobile phone brands. Though it is famous for its security, there have been many attacks on the iOS operating system, such as the Trident apt attack in 2016. So it is important to research the iOS security mechanism and understand its weaknesses and put forward targeted protection and security check framework. By studying these attacks and previous jailbreak tools, we can see that an attacker could only run a ROP code and gain kernel read and write permissions based on the ROP after exploiting kernel and user layer vulnerabilities. However, the iOS operating system is still protected by the code signing mechanism, the sandbox mechanism, and the not-writable mechanism of the system's disk area. This is far from the steady, long-lasting control that attackers expect. Before iOS 9, breaking these security mechanisms was usually done by modifying the kernel's important data structures and security mechanism code logic. However, after iOS 9, the kernel integrity protection mechanism was added to the 64-bit operating system and none of the previous methods were adapted to the new versions of iOS [1]. But this does not mean that attackers can not break through. Therefore, based on the analysis of the vulnerability of KPP security mechanism, this paper implements two possible breakthrough methods for kernel security mechanism for iOS9 and iOS10. Meanwhile, we propose a defense method based on kernel integrity detection and sensitive API call detection to defense breakthrough method mentioned above. And we make experiments to prove that this method can prevent and detect attack attempts or invaders effectively and timely.

  13. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    PubMed

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  14. Lawrence Livermore National Laboratory Safeguards and Security quarterly progress report to the US Department of Energy: Quarter ending December 31, 1993

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Davis, G.; Mansur, D.L.; Ruhter, W.D.

    1994-01-01

    The Lawrence Livermore National Laboratory (LLNL) carries out safeguards and security activities for the Department of Energy (DOE), Office of Safeguards and Security (OSS), as well as other organizations, both within and outside the DOE. This document summarizes the activities conducted for the OSS during the first quarter of fiscal year 1994 (October through December, 1993). The nature and scope of the activities carried out for OSS at LLNL require a broad base of technical expertise. To assure projects are staffed and executed effectively, projects are conducted by the organization at LLNL best able to supply the needed technical expertise.more » These projects are developed and managed by senior program managers. Institutional oversight and coordination is provided through the LLNL Deputy Director`s office. At present, the Laboratory is supporting OSS in five areas: (1) Safeguards Technology, (2) Safeguards and Decision Support, (3) Computer Security, (4) DOE Automated Physical Security, and (5) DOE Automated Visitor Access Control System. This report describes the activities in each of these five areas. The information provided includes an introduction which briefly describes the activity, summary of major accomplishments, task descriptions with quarterly progress, summaries of milestones and deliverables and publications published this quarter.« less

  15. 12 CFR 151.40 - What definitions apply to this part?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... in these debt securities. Debt security does not include securities issued by an investment company registered under the Investment Company Act of 1940, 15 U.S.C. 80a-1, et seq. Government security means: (1... traded on one or more national securities exchanges; or (ii) For which quotations are disseminated...

  16. 12 CFR 151.40 - What definitions apply to this part?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... in these debt securities. Debt security does not include securities issued by an investment company registered under the Investment Company Act of 1940, 15 U.S.C. 80a-1, et seq. Government security means: (1... traded on one or more national securities exchanges; or (ii) For which quotations are disseminated...

  17. 12 CFR 551.40 - What definitions apply to this part?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... in these debt securities. Debt security does not include securities issued by an investment company registered under the Investment Company Act of 1940, 15 U.S.C. 80a-1, et seq. Government security means: (1... traded on one or more national securities exchanges; or (ii) For which quotations are disseminated...

  18. 17 CFR 240.16b-6 - Derivative securities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Derivative securities. 240.16b... Exchange Act of 1934 Exemption of Certain Transactions from Section 16(b) § 240.16b-6 Derivative securities...). Note to paragraph (b): The exercise or conversion of a derivative security that does not satisfy the...

  19. Evaluating knowledge benefits of automotive lightweighting materials R&D projects.

    PubMed

    Peretz, Jean H; Das, Sujit; Tonn, Bruce E

    2009-08-01

    This paper presents a set of metrics used to evaluate short-run knowledge benefits that accrued from research and development (R&D) projects funded in fiscal years 2000-2004 by automotive lightweighting materials (ALM) of the U.S. Department of Energy (DOE). Although DOE presents to Congress energy, environmental, and security benefits and costs of its R&D efforts under the Government Performance and Results Act, DOE has yet to include knowledge benefits in that report [U.S. Department of Energy. (2007). Projected benefits of federal energy efficiency and renewable energy programs: FY2008 budget request. NREL/TP-640-41347 (March). Washington, DC: National Renewable Energy Laboratory for DOE Energy Efficiency and Renewable Energy. Retrieved February 12, 2007 from http://www1.eere.energy.gov/ba/pba/2008_benefits.html]. ALM focuses on development and validation of advanced technologies that significantly reduce automotive vehicle body and chassis weight without compromising other attributes such as safety, performance, recyclability, and cost [U.S. Department of Energy. (2005a). Automotive lightweighting materials 2004 annual progress report. Washington, DC: DOE Energy Efficiency and Renewable Energy. Retrieved March 30, 2005 from http://www.eere.energy.gov/vehiclesandfuels/resources/fcvt_alm_fy04.shtml]. The ultimate goal of ALM to have lightweighter materials in vehicles hinges on many issues, including the (1) collaborative nature of ALMs R&D with the automobile industry and (2) manufacturing knowledge gained through the R&D effort. The ALM projects evaluated in this paper yielded numerous knowledge benefits in the short run. While these knowledge benefits are impressive, there remains uncertainty about whether the research will lead to incorporation of lightweight materials by the Big Three automakers into their manufacturing process and introduction of lightweight vehicles into the marketplace. The uncertainty illustrates a difference between (1) knowledge benefits and (2) energy, environmental, and security benefits emanating from R&D.

  20. Mercury Remediation Technology Development for Lower East Fork Poplar Creek - FY 2016 Progress Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dickson, Johnbull O.; Smith, John G.; Mehlhorn, Tonia L.

    2017-07-01

    Mercury remediation is a high priority for the US Department of Energy (DOE) Oak Ridge Office of Environmental Management (OREM), especially at and near the Y-12 National Security Complex (Y-12) where historical mercury use has resulted in contaminated buildings, soils, and downstream surface waters. To address mercury contamination of East Fork Poplar Creek (EFPC), the DOE has adopted a phased, adaptive management approach to remediation, which includes mercury treatment actions at Y-12 in the short-term and research and technology development (TD) to evaluate longer-term solutions in the downstream environment (US Department of Energy 2014).

  1. Does political ideology moderate stress: the special case of soldiers conducting forced evacuation.

    PubMed

    Shechner, Tomer; Slone, Michelle; Bialik, Gadi

    2007-04-01

    This study examined the moderating role of political ideology on psychological outcomes for Israeli soldiers participating in the forced evacuation of Jewish settlements from Gaza. Change in psychopathology and well-being was assessed for 3 concurrent mission groups differing in their political ideological contentiousness--forced evacuation, Gaza security, and Northern border security. After soldiers in each mission group were classified on the basis of relatively left- or right-wing political ideological tendencies, the authors examined differential impact of each mission on soldiers of differing political ideology. Results confirmed strong moderation effects of political ideology on psychological outcomes in these extreme contexts. Implications for research, prevention, and treatment are discussed. 2007 APA, all rights reserved

  2. [The value of using administrative data in public health research: the Continuous Working Life Sample].

    PubMed

    López, María Andrée; Benavides, Fernando G; Alonso, Jordi; Espallargues, Mireia; Durán, Xavier; Martínez, José Miguel

    2014-01-01

    The use of administrative data is common practice in public health research. The present field note describes the Continuous Working Life Sample (CWLS) and its use in health research. The CWLS is built on records generated by all contacts with the social security system (work contracts, disability, etc.), plus tax data (monetary gains, income, etc.) and census data (level of education, country of birth, etc.), but does not allow individuals to be identified. The CWLS was started in 2004 with 4% (1.1 million persons) of the total population who were either contributors to or beneficiaries of the social security system. The information on the individuals in the CWLS is updated annually and lost individuals are replaced. This continuous design allows the construction of a cohort with information on working life and financial status and evaluation of their relationship with work disability. Future connection with clinical records would enable analysis of other health-related outcomes. Copyright © 2013 SESPAS. Published by Elsevier Espana. All rights reserved.

  3. 10 CFR 1046.14 - Access authorization.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... authorization for the highest level of classified matter to which they potentially have access. Security police... by the site security organization and approved by the Head of the Field Element. Security police officers shall possess a minimum of an “L” or DOE Secret access authorization. Security police officers...

  4. Learning and Olfaction: Understanding and Enhancing a Critical Information Channel

    DTIC Science & Technology

    2013-05-13

    a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. a ...REPORT Learning and Olfaction: Understanding and Enhancing a Critical Information Channel 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: This research...Prescribed by ANSI Std. Z39.18 - 14-Feb-2013 Learning and Olfaction: Understanding and Enhancing a Critical Information Channel Report Title ABSTRACT This

  5. POWERING AIRPOWER: IS THE AIR FORCES ENERGY SECURE

    DTIC Science & Technology

    2016-02-01

    needs. More on-site renewable energy generation increases AF readiness in crisis times by minimizing the AF’s dependency on fossil fuels. Financing...reducing the need for traditional fossil fuels, and the high investment cost of onsite renewable energy sources is still a serious roadblock in this...help installations better plan holistically. This research will take the form of problem/solution framework. With any complex problem, rarely does a

  6. Human Operator Interface with FLIR Displays.

    DTIC Science & Technology

    1980-03-01

    model (Ratches, et al., 1976) used to evaluate FUIR system performanmce. SECURITY CLASSIFICATION OF THIS PAOE(When Does Bntoff. PREFACE The research...the minimum resolv- able temperature (MRT) paradigm to test two modeled FLIR systems. Twelve male subjects with 20/20 uncorrected vision served as...varying iv levels of size, contrast, noise, and MTF. The test results were compared with the NVL predictive model (Ratches, et al., 1975) used to

  7. Design of a Secure Authentication and Key Agreement Scheme Preserving User Privacy Usable in Telecare Medicine Information Systems.

    PubMed

    Arshad, Hamed; Rasoolzadegan, Abbas

    2016-11-01

    Authentication and key agreement schemes play a very important role in enhancing the level of security of telecare medicine information systems (TMISs). Recently, Amin and Biswas demonstrated that the authentication scheme proposed by Giri et al. is vulnerable to off-line password guessing attacks and privileged insider attacks and also does not provide user anonymity. They also proposed an improved authentication scheme, claiming that it resists various security attacks. However, this paper demonstrates that Amin and Biswas's scheme is defenseless against off-line password guessing attacks and replay attacks and also does not provide perfect forward secrecy. This paper also shows that Giri et al.'s scheme not only suffers from the weaknesses pointed out by Amin and Biswas, but it also is vulnerable to replay attacks and does not provide perfect forward secrecy. Moreover, this paper proposes a novel authentication and key agreement scheme to overcome the mentioned weaknesses. Security and performance analyses show that the proposed scheme not only overcomes the mentioned security weaknesses, but also is more efficient than the previous schemes.

  8. 43 CFR 3602.14 - What kind of financial security does BLM require?

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... DISPOSAL Mineral Materials Sales Applications § 3602.14 What kind of financial security does BLM require? (a) For contracts of $2,000 or more, BLM will require a performance bond of an amount sufficient to meet the reclamation standards provided for in the contract, but at least $500. If you have a sales...

  9. 31 CFR 356.31 - How does the STRIPS program work?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false How does the STRIPS program work? 356... than Treasury inflation-protected securities or Treasury floating rate notes)—(1) Minimum par amounts required for STRIPS. The minimum par amount of a non-indexed security that may be stripped is $100. Any par...

  10. Critical theory as an approach to the ethics of information security.

    PubMed

    Stahl, Bernd Carsten; Doherty, Neil F; Shaw, Mark; Janicke, Helge

    2014-09-01

    Information security can be of high moral value. It can equally be used for immoral purposes and have undesirable consequences. In this paper we suggest that critical theory can facilitate a better understanding of possible ethical issues and can provide support when finding ways of addressing them. The paper argues that critical theory has intrinsic links to ethics and that it is possible to identify concepts frequently used in critical theory to pinpoint ethical concerns. Using the example of UK electronic medical records the paper demonstrates that a critical lens can highlight issues that traditional ethical theories tend to overlook. These are often linked to collective issues such as social and organisational structures, which philosophical ethics with its typical focus on the individual does not tend to emphasise. The paper suggests that this insight can help in developing ways of researching and innovating responsibly in the area of information security.

  11. Studies of Short Time Response Options for Potentially Hazardous Objects: Current and Forthcoming Results

    NASA Technical Reports Server (NTRS)

    Barbee, Brent W.; Greenaugh, Kevin C.; Seery, Bernard D.; Bambacus, Myra; Leung, Ronald Y.; Finewood, Lee; Dearborn, David S. P.; Miller, Paul L.; Weaver, Robert P.; Plesko, Catherine; hide

    2017-01-01

    NASA's Goddard Space Flight Center (GSFC) and the National Nuclear Security Administration (NNSA), Department of Energy (DOE) National Laboratories, Lawrence Livermore National Laboratory (LLNL), Los Alamos National Laboratory(LANL), and Sandia National Laboratory (SNL) are collaborating on Planetary Defense Research. The research program is organized around three case studies: 1. Deflection of the Potentially Hazardous Asteroid (PHA) 101955 Bennu (1999 RQ36)[OSIRIS-REx mission target], 2. Deflection of the secondary member of the PHA 65803 Didymos (1996 GT) [DART mission target], 3. Deflection of a scaled-down version of the comet 67PChuryumov-Gerasimenko [Rosetta mission target]. NASAGSFC is providing astrodynamics and spacecraft mission design expertise, while NNSA, DOE, LLNL, LANL and SNL are providing expertise in modeling the effects of kinetic impactor spacecraft and nuclear explosive devices on the target objects.

  12. Next Generation Waste Tracking: Linking Legacy Systems with Modern Networking Technologies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Walker, Randy M.; Resseguie, David R.; Shankar, Mallikarjun

    2010-01-01

    This report describes results from a preliminary analysis to satisfy the Department of Energy (DOE) objective to ensure the safe, secure, efficient packaging and transportation of materials both hazardous and non hazardous [1, 2]. The DOE Office of Environmental Management (OEM) through Oak Ridge National Laboratory (ORNL) has embarked on a project to further this objective. OEM and ORNL have agreed to develop, demonstrate and make available modern day cost effective technologies for characterization, identification, tracking, monitoring and disposal of radioactive waste when transported by, or between, motor, air, rail, and water modes. During the past 8 years ORNL hasmore » investigated and deployed Web 2.0 compliant sensors into the transportation segment of the supply chain. ORNL has recently demonstrated operational experience with DOE Oak Ridge Operations Office (ORO) and others in national test beds and applications within this domain of the supply chain. Furthermore, in addition to DOE, these hazardous materials supply chain partners included Federal and State enforcement agencies, international ports, and commercial sector shipping operations in a hazardous/radioactive materials tracking and monitoring program called IntelligentFreight. IntelligentFreight is an ORNL initiative encompassing 5 years of research effort associated with the supply chain. The ongoing ORNL SmartFreight programs include RadSTraM [3], GRadSTraM , Trusted Corridors, SensorPedia [4], SensorNet, Southeastern Transportation Corridor Pilot (SETCP) and Trade Data Exchange [5]. The integration of multiple technologies aimed at safer more secure conveyance has been investigated with the core research question being focused on testing distinctly different distributed supply chain information sharing systems. ORNL with support from ORO have demonstrated capabilities when transporting Environmental Management (EM) waste materials for disposal over an onsite haul road. ORNL has unified the operations of existing legacy hazardous, radioactive and related informational databases and systems using emerging Web 2.0 technologies. These capabilities were used to interoperate ORNL s waste generating, packaging, transportation and disposal with other DOE ORO waste management contractors. Importantly, the DOE EM objectives were accomplished in a cost effective manner without altering existing information systems. A path forward is to demonstrate and share these technologies with DOE EM, contractors and stakeholders. This approach will not alter existing DOE assets, i.e. Automated Traffic Management Systems (ATMS), Transportation Tracking and Communications System (TRANSCOM), the Argonne National Laboratory (ANL) demonstrated package tracking system, etc« less

  13. Globus Identity, Access, and Data Management: Platform Services for Collaborative Science

    NASA Astrophysics Data System (ADS)

    Ananthakrishnan, R.; Foster, I.; Wagner, R.

    2016-12-01

    Globus is software-as-a-service for research data management, developed at, and operated by, the University of Chicago. Globus, accessible at www.globus.org, provides high speed, secure file transfer; file sharing directly from existing storage systems; and data publication to institutional repositories. 40,000 registered users have used Globus to transfer tens of billions of files totaling hundreds of petabytes between more than 10,000 storage systems within campuses and national laboratories in the US and internationally. Web, command line, and REST interfaces support both interactive use and integration into applications and infrastructures. An important component of the Globus system is its foundational identity and access management (IAM) platform service, Globus Auth. Both Globus research data management and other applications use Globus Auth for brokering authentication and authorization interactions between end-users, identity providers, resource servers (services), and a range of clients, including web, mobile, and desktop applications, and other services. Compliant with important standards such as OAuth, OpenID, and SAML, Globus Auth provides mechanisms required for an extensible, integrated ecosystem of services and clients for the research and education community. It underpins projects such as the US National Science Foundation's XSEDE system, NCAR's Research Data Archive, and the DOE Systems Biology Knowledge Base. Current work is extending Globus services to be compliant with FEDRAMP standards for security assessment, authorization, and monitoring for cloud services. We will present Globus IAM solutions and give examples of Globus use in various projects for federated access to resources. We will also describe how Globus Auth and Globus research data management capabilities enable rapid development and low-cost operations of secure data sharing platforms that leverage Globus services and integrate them with local policy and security.

  14. 17 CFR 230.135 - Notice of proposed registered offerings.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... effect that it does not constitute an offer of any securities for sale; and (2) Limited notice content... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Notice of proposed registered offerings. 230.135 Section 230.135 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION...

  15. 7 CFR 3560.61 - Loan security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Loan security. 3560.61 Section 3560.61 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS Direct Loan and Grant Origination § 3560.61 Loan security... collateral. (2) The amount of the loan against the collateral does not exceed its estimated security value...

  16. 5 CFR 9701.527 - Savings provision.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ....527 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.527 Savings provision. This subpart does not...

  17. 5 CFR 9701.527 - Savings provision.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ....527 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.527 Savings provision. This subpart does not...

  18. Sharing Research Data and Intellectual Property Law: A Primer.

    PubMed

    Carroll, Michael W

    2015-08-01

    Sharing research data by depositing it in connection with a published article or otherwise making data publicly available sometimes raises intellectual property questions in the minds of depositing researchers, their employers, their funders, and other researchers who seek to reuse research data. In this context or in the drafting of data management plans, common questions are (1) what are the legal rights in data; (2) who has these rights; and (3) how does one with these rights use them to share data in a way that permits or encourages productive downstream uses? Leaving to the side privacy and national security laws that regulate sharing certain types of data, this Perspective explains how to work through the general intellectual property and contractual issues for all research data.

  19. NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 2

    ScienceCinema

    Thomas D'Agostino

    2017-12-09

    Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.

  20. NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 1

    ScienceCinema

    Thomas D'Agostino

    2017-12-09

    Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.

  1. 43 CFR 3602.14 - What kind of financial security does BLM require?

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 43 Public Lands: Interior 2 2014-10-01 2014-10-01 false What kind of financial security does BLM...? (a) For contracts of $2,000 or more, BLM will require a performance bond of an amount sufficient to... post a performance bond. (b) BLM may require a performance bond for contracts of less than $2,000. We...

  2. 31 CFR 356.30 - When does the Treasury pay principal and interest on securities?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false When does the Treasury pay principal... between the discounted amount paid by the investor at original issue and the par value we pay to the... more than the par amount of the security. we will pay the inflation-adjusted principal. (ii) the...

  3. 31 CFR 356.30 - When does the Treasury pay principal and interest on securities?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false When does the Treasury pay principal... between the discounted amount paid by the investor at original issue and the par value we pay to the... more than the par amount of the security. we will pay the inflation-adjusted principal. (ii) the...

  4. 31 CFR 356.30 - When does the Treasury pay principal and interest on securities?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false When does the Treasury pay principal... between the discounted amount paid by the investor at original issue and the par value we pay to the... more than the par amount of the security. we will pay the inflation-adjusted principal. (ii) the...

  5. 43 CFR 3602.14 - What kind of financial security does BLM require?

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 43 Public Lands: Interior 2 2012-10-01 2012-10-01 false What kind of financial security does BLM...? (a) For contracts of $2,000 or more, BLM will require a performance bond of an amount sufficient to... post a performance bond. (b) BLM may require a performance bond for contracts of less than $2,000. We...

  6. 43 CFR 3602.14 - What kind of financial security does BLM require?

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 43 Public Lands: Interior 2 2013-10-01 2013-10-01 false What kind of financial security does BLM...? (a) For contracts of $2,000 or more, BLM will require a performance bond of an amount sufficient to... post a performance bond. (b) BLM may require a performance bond for contracts of less than $2,000. We...

  7. 31 CFR 356.30 - When does the Treasury pay principal and interest on securities?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false When does the Treasury pay principal... between the discounted amount paid by the investor at original issue and the par value we pay to the... more than the par amount of the security. we will pay the inflation-adjusted principal. (ii) the...

  8. 25 CFR 900.10 - How does an Indian tribe or tribal organization secure a list of all Federal property currently...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false How does an Indian tribe or tribal organization secure a... activities that benefit the Indian tribe or tribal organization to assist in negotiating a contract? 900.10..., DEPARTMENT OF HEALTH AND HUMAN SERVICES CONTRACTS UNDER THE INDIAN SELF-DETERMINATION AND EDUCATION...

  9. 25 CFR 900.10 - How does an Indian tribe or tribal organization secure a list of all Federal property currently...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 25 Indians 2 2012-04-01 2012-04-01 false How does an Indian tribe or tribal organization secure a... activities that benefit the Indian tribe or tribal organization to assist in negotiating a contract? 900.10..., DEPARTMENT OF HEALTH AND HUMAN SERVICES CONTRACTS UNDER THE INDIAN SELF-DETERMINATION AND EDUCATION...

  10. 25 CFR 900.10 - How does an Indian tribe or tribal organization secure a list of all Federal property currently...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 25 Indians 2 2013-04-01 2013-04-01 false How does an Indian tribe or tribal organization secure a... activities that benefit the Indian tribe or tribal organization to assist in negotiating a contract? 900.10..., DEPARTMENT OF HEALTH AND HUMAN SERVICES CONTRACTS UNDER THE INDIAN SELF-DETERMINATION AND EDUCATION...

  11. 25 CFR 900.10 - How does an Indian tribe or tribal organization secure a list of all Federal property currently...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 25 Indians 2 2011-04-01 2011-04-01 false How does an Indian tribe or tribal organization secure a... activities that benefit the Indian tribe or tribal organization to assist in negotiating a contract? 900.10..., DEPARTMENT OF HEALTH AND HUMAN SERVICES CONTRACTS UNDER THE INDIAN SELF-DETERMINATION AND EDUCATION...

  12. 31 CFR 359.3 - What special terms do I need to know to understand this part?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... payments be made. Beneficiary refers to the second individual named in the registration of a security held... security registered “John Doe SSN 123-45-6789 POD (payable on death to) Joseph Doe SSN 987-65-4321.” In... by Treasury solely as a computer record. Composite annual rate means an annual interest rate that...

  13. 31 CFR 359.3 - What special terms do I need to know to understand this part?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... payments be made. Beneficiary refers to the second individual named in the registration of a security held... security registered “John Doe SSN 123-45-6789 POD (payable on death to) Joseph Doe SSN 987-65-4321.” In... by Treasury solely as a computer record. Composite annual rate means an annual interest rate that...

  14. 31 CFR 359.3 - What special terms do I need to know to understand this part?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... payments be made. Beneficiary refers to the second individual named in the registration of a security held... security registered “John Doe SSN 123-45-6789 POD (payable on death to) Joseph Doe SSN 987-65-4321.” In... by Treasury solely as a computer record. Composite annual rate means an annual interest rate that...

  15. 31 CFR 359.3 - What special terms do I need to know to understand this part?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... payments be made. Beneficiary refers to the second individual named in the registration of a security held... security registered “John Doe SSN 123-45-6789 POD (payable on death to) Joseph Doe SSN 987-65-4321.” In... by Treasury solely as a computer record. Composite annual rate means an annual interest rate that...

  16. 20 CFR 411.575 - How does the EN request payment for milestones or outcome payment months achieved by a...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Section 411.575 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF-SUFFICIENCY PROGRAM Employment Network Payment Systems § 411.575 How does the EN request payment for milestones or... payment for a month if— (i)(A) Social Security disability benefits and Federal SSI cash benefits are not...

  17. 20 CFR 411.575 - How does the EN request payment for milestones or outcome payment months achieved by a...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Section 411.575 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF-SUFFICIENCY PROGRAM Employment Network Payment Systems § 411.575 How does the EN request payment for milestones or... payment for a month if— (i)(A) Social Security disability benefits and Federal SSI cash benefits are not...

  18. 20 CFR 411.575 - How does the EN request payment for milestones or outcome payment months achieved by a...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Section 411.575 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF-SUFFICIENCY PROGRAM Employment Network Payment Systems § 411.575 How does the EN request payment for milestones or... payment for a month if— (i)(A) Social Security disability benefits and Federal SSI cash benefits are not...

  19. Collaboration using roles. [in computer network security

    NASA Technical Reports Server (NTRS)

    Bishop, Matt

    1990-01-01

    Segregation of roles into alternative accounts is a model which provides not only the ability to collaborate but also enables accurate accounting of resources consumed by collaborative projects, protects the resources and objects of such a project, and does not introduce new security vulnerabilities. The implementation presented here does not require users to remember additional passwords and provides a very simple consistent interface.

  20. 5 CFR 9701.336 - Treatment of employees whose pay does not fall below the minimum adjusted rate of their band.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay...

  1. U.S.-Canadian Border Security: Lessons Learned from Denmarks Experience with the Schengen Convention

    DTIC Science & Technology

    2014-03-01

    January 1, 1994, binding the North American continent with similar economic interests and pursuits.10 NAFTA does not deal with security and laws in the...SC). The Department of Homeland Security coordinates U.S. security with representatives from law enforcement, military and civilian entities. Public...European Schengen Convention (SC). The Department of Homeland Security coordinates U.S. security with representatives from law enforcement, military

  2. DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    This Department of Energy’s (DOE) National Nuclear Security Administration (NNSA) Fiscal Year Stockpile Stewardship and Management Plan (SSMP) is a key planning document for the nuclear security enterprise.

  3. DS-ARP: a new detection scheme for ARP spoofing attacks based on routing trace for ubiquitous environments.

    PubMed

    Song, Min Su; Lee, Jae Dong; Jeong, Young-Sik; Jeong, Hwa-Young; Park, Jong Hyuk

    2014-01-01

    Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. ARP is designed to work without problems in general environments. However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. In this paper, we propose a new detection scheme for ARP spoofing attacks using a routing trace, which can be used to protect the internal network. Tracing routing can find the change of network movement path. The proposed scheme provides high constancy and compatibility because it does not alter the ARP protocol. In addition, it is simple and stable, as it does not use a complex algorithm or impose extra load on the computer system.

  4. DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments

    PubMed Central

    Song, Min Su; Lee, Jae Dong; Jeong, Hwa-Young; Park, Jong Hyuk

    2014-01-01

    Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. ARP is designed to work without problems in general environments. However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. In this paper, we propose a new detection scheme for ARP spoofing attacks using a routing trace, which can be used to protect the internal network. Tracing routing can find the change of network movement path. The proposed scheme provides high constancy and compatibility because it does not alter the ARP protocol. In addition, it is simple and stable, as it does not use a complex algorithm or impose extra load on the computer system. PMID:25243205

  5. Security training with interactive laser-video-disk technology

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wilson, D.

    1988-01-01

    DOE, through its contractor EG and G Energy Measurements, Inc., has developed a state-of-the-art interactive-video system for use at the Department of Energy's Central Training Academy. Called the Security Training and Evaluation Shooting System (STRESS), the computer-driven decision shooting system employs the latest is laservideo-disk technology. STRESS is designed to provide realistic and stressful training for security inspectors employed by the DOE and its contractors. The system uses wide-screen video projection, sophisticated scenario-branching technology, and customized video scenarios especially designed for the DOE. Firing a weapon that has been modified to shoot ''laser bullets,'' and wearing a special vest thatmore » detects ''hits'': the security inspector encounters adversaries on the wide screen who can shoot or be shot by the inspector in scenarios that demand fast decisions. Based on those decisions, the computer provides instantaneous branching to different scenes, giving the inspector confrontational training with the realism and variability of real life.« less

  6. Realizing Informed Consent in Times of Controversy: Lessons from the SUPPORT Study.

    PubMed

    Morse, Robert J; Wilson, Robin Fretwell

    2016-09-01

    This Essay examines the elegantly simple idea that consent to medical treatment or participation in human research must be "informed" to be valid. It does so by using as a case study the controversial clinical research trial known as the Surfactant, Positive Pressure, and Oxygenation Randomized Trial ("SUPPORT"). The Essay begins by charting, through case law and the adoption of the common rule, the evolution of duties to secure fully informed consent in both research and treatment. The Essay then utilizes the SUPPORT study, which sought to pinpoint the level of saturated oxygen that should be provided to extremely low birth weight infants to demonstrate modern complexities and shortcomings of the duty to secure informed consent. This Essay shows how the duty is measured by foreseeability of risks and benefits in human research and why federal regulators believed the trade-offs in risk and benefits from differing oxygen levels administered in the support study were foreseeable. It then explores the contours of the duty to secure informed consent when applied to researchers who also serve as treating physicians, highlighting how common law duties differ in jurisdictions that apply the professional standard and those that apply the patient-centered material risk standard. This Essay provides new insight into what the law must do to make real the notion that [e]very human being of adult years and sound mind has a right to determine what shall be done with his body." © 2016 American Society of Law, Medicine & Ethics.

  7. DOE Office of Scientific and Technical Information (OSTI.GOV)

    none,

    The Office of Analysis within the U.S. Department of Energy (DOE) Office of Environment, Health, Safety and Security (EHSS) publishes the annual DOE Occupational Radiation Exposure Report to provide an overview of the status of radiation protection practices at DOE (including the National Nuclear Security Administration [NNSA]). The DOE 2013 Occupational Radiation Exposure Report provides an evaluation of DOE-wide performance regarding compliance with Title 10, Code of Federal Regulations (C.F.R.), Part 835, Occupational Radiation Protection dose limits and as low as reasonably achievable (ALARA) process requirements. In addition, the report provides data to DOE organizations responsible for developing policies formore » protection of individuals from the adverse health effects of radiation. The report provides a summary and an analysis of occupational radiation exposure information from the monitoring of individuals involved in DOE activities. Over the past five-year period, the occupational radiation exposure information has been analyzed in terms of aggregate data, dose to individuals, and dose by site.« less

  8. DOE Office of Scientific and Technical Information (OSTI.GOV)

    none,

    The U.S. Department of Energy (DOE) Office of Analysis within the Office of Health, Safety and Security (HSS) publishes the annual DOE Occupational Radiation Exposure Report to provide an overview of the status of radiation protection practices at DOE (including the National Nuclear Security Administration [NNSA]). The DOE 2012 Occupational Radiation Exposure Report provides an evaluation of DOE-wide performance regarding compliance with Title 10, Code of Federal Regulations (C.F.R.), Part 835, Occupational Radiation Protection dose limits and as low as reasonably achievable (ALARA) process requirements. In addition, the report provides data to DOE organizations responsible for developing policies for protectionmore » of individuals from the adverse health effects of radiation. The report provides a summary and an analysis of occupational radiation exposure information from the monitoring of individuals involved in DOE activities. Over the past 5-year period, the occupational radiation exposure information is analyzed in terms of aggregate data, dose to individuals, and dose by site.« less

  9. Working Around the Military: Challenges to Military Spouse Employment and Education

    DTIC Science & Technology

    2004-01-01

    POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY TRANSPORTATION AND INFRASTRUCTURE The RAND...failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 2004 2. REPORT TYPE 3...RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. R® is a registered trademark. © Copyright 2004 RAND

  10. Network Interdependency Modeling for Risk Assessment on Built Infrastructure Systems

    DTIC Science & Technology

    2013-10-01

    does begin to address infrastructure decay as a source of risk comes from the Department of Homeland Security (DHS). In 2009, the DHS Science and...network of connected edges and nodes. The National Research Council (2005) reported that the study of networks as a science and applications of...principles from this science are still in its early stages. As modern infrastructures have become more interlinked, knowledge of an infrastructure’s network

  11. 5 CFR 9701.324 - Treatment of employees whose rate of basic pay does not fall below the minimum rate of their band.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and...

  12. Fuel Cycle Technologies 2014 Achievement Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hong, Bonnie C.

    2015-01-01

    The Fuel Cycle Technologies (FCT) program supports the Department of Energy’s (DOE’s) mission to: “Enhance U.S. security and economic growth through transformative science, technology innovation, and market solutions to meet our energy, nuclear security, and environmental challenges.” Goal 1 of DOE’s Strategic Plan is to innovate energy technologies that enhance U.S. economic growth and job creation, energy security, and environmental quality. FCT does this by investing in advanced technologies that could transform the nuclear fuel cycle in the decades to come. Goal 2 of DOE’s Strategic Plan is to strengthen national security by strengthening key science, technology, and engineering capabilities.more » FCT does this by working closely with the National Nuclear Security Administration and the U.S Department of State to develop advanced technologies that support the Nation’s nuclear nonproliferation goals.« less

  13. U.S. Additional Protocol Outreach Program-Tabletop Exercises to Implement the AP.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Langner, D. C.; Thomas, K. E.; Smith, M. K.

    2005-01-01

    The Office of International Regimes and Agreement (NA-243) is the lead office in the Department of Energy (DOE) to assist DOE and National Nuclear Security Administration (NNSA) sites in the preparation of providing declarations on relevant civilian, nuclear fuel cycle-related research and development activities to the International Atomic Energy Agency (IAEA). This is in accordance to the implementation of the ''Protocol Additional to the AGreement between the United STates and the International Atomic Energy Agency for the Applications of Safeguards in the United States. In preparation for entry-into-force, NA-243 conducted two tabletop exercises under the Additional Protocol Outreach Program. Themore » first one, held in May 2004 at Los Alamos National Laboratory, focused on the factors important to protect national security assets and intellectual property. The other, held in August 2004 at the Idaho National Laboratory explored the level of detail or granularity for reporting declarable activities. Both tabletops invited participants from the national laboratories and DOE/NNSA organizations. Discussions were based around the process to identify potential declarable activities relating to the nuclear fuel cycle-related R and D projects from the Advanced Fuel Cycle Initiative program. The two tabletop exercises provided recommendations and conclusions that would be helpful to other DOE/NNSA locations for preparing for and reporting relevant and concise information to the IAEA under the Additional Protocol. This paper provides details on the events, discussions, observations, and lessons learned from both the LANL and INL tabletop exercises.« less

  14. Laboratory Directed Research and Development Annual Report for 2009

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hughes, Pamela J.

    This report documents progress made on all LDRD-funded projects during fiscal year 2009. As a US Department of Energy (DOE) Office of Science (SC) national laboratory, Pacific Northwest National Laboratory (PNNL) has an enduring mission to bring molecular and environmental sciences and engineering strengths to bear on DOE missions and national needs. Their vision is to be recognized worldwide and valued nationally for leadership in accelerating the discovery and deployment of solutions to challenges in energy, national security, and the environment. To achieve this mission and vision, they provide distinctive, world-leading science and technology in: (1) the design and scalablemore » synthesis of materials and chemicals; (2) climate change science and emissions management; (3) efficient and secure electricity management from generation to end use; and (4) signature discovery and exploitation for threat detection and reduction. PNNL leadership also extends to operating EMSL: the Environmental Molecular Sciences Laboratory, a national scientific user facility dedicated to providing itnegrated experimental and computational resources for discovery and technological innovation in the environmental molecular sciences.« less

  15. Hybrid methods for cybersecurity analysis :

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Davis, Warren Leon,; Dunlavy, Daniel M.

    2014-01-01

    Early 2010 saw a signi cant change in adversarial techniques aimed at network intrusion: a shift from malware delivered via email attachments toward the use of hidden, embedded hyperlinks to initiate sequences of downloads and interactions with web sites and network servers containing malicious software. Enterprise security groups were well poised and experienced in defending the former attacks, but the new types of attacks were larger in number, more challenging to detect, dynamic in nature, and required the development of new technologies and analytic capabilities. The Hybrid LDRD project was aimed at delivering new capabilities in large-scale data modeling andmore » analysis to enterprise security operators and analysts and understanding the challenges of detection and prevention of emerging cybersecurity threats. Leveraging previous LDRD research e orts and capabilities in large-scale relational data analysis, large-scale discrete data analysis and visualization, and streaming data analysis, new modeling and analysis capabilities were quickly brought to bear on the problems in email phishing and spear phishing attacks in the Sandia enterprise security operational groups at the onset of the Hybrid project. As part of this project, a software development and deployment framework was created within the security analyst work ow tool sets to facilitate the delivery and testing of new capabilities as they became available, and machine learning algorithms were developed to address the challenge of dynamic threats. Furthermore, researchers from the Hybrid project were embedded in the security analyst groups for almost a full year, engaged in daily operational activities and routines, creating an atmosphere of trust and collaboration between the researchers and security personnel. The Hybrid project has altered the way that research ideas can be incorporated into the production environments of Sandias enterprise security groups, reducing time to deployment from months and years to hours and days for the application of new modeling and analysis capabilities to emerging threats. The development and deployment framework has been generalized into the Hybrid Framework and incor- porated into several LDRD, WFO, and DOE/CSL projects and proposals. And most importantly, the Hybrid project has provided Sandia security analysts with new, scalable, extensible analytic capabilities that have resulted in alerts not detectable using their previous work ow tool sets.« less

  16. Current Legislative Initiatives and Geophysics

    NASA Astrophysics Data System (ADS)

    Stephan, S. G.

    2002-05-01

    Geophysical research will be most effective in the fight against terrorism if it is done in cooperation with the expectations of local, state and federal policy makers. New tools to prevent, prepare for, and respond to acts of terrorism are coming from all fields, including geoscience. Globally, monitoring the land, oceans, atmosphere, and space for unusual and suspicious activities can help prevent terrorist acts. Closer to home, geoscience research is used to plan emergency transportation routes and identify infrastructure vulnerabilities. As important as it is for Congress and other policy makers to appreciate the promises and limitations of geophysical research, scientists need to be aware of legislative priorities and expectations. What does Congress expect from the geoscience community in the fight against terrorism and how well does reality meet these expectations? What tools do the 44 different federal agencies with stated Homeland Security missions need from geoscientists? I will address these questions with an overview of current legislative antiterrorism initiatives and policies that relate to the geoscience community.

  17. Usability of Security Management:Defining the Permissions of Guests

    NASA Astrophysics Data System (ADS)

    Johnson, Matthew; Stajano, Frank

    Within the scenario of a Smart Home, we discuss the issues involved in allowing limited interaction with the environment for unidentified principals, or guests. The challenges include identifying and authenticating guests on one hand and delegating authorization to them on the other. While the technical mechanisms for doing so in generic distributed systems have been around for decades, existing solutions are in general not applicable to the smart home because they are too complex to manage. We focus on providing both security and usability; we therefore seek simple and easy to understand approaches that can be used by a normal computer-illiterate home owner, not just by a trained system administrator. This position paper describes ongoing research and does not claim to have all the answers.

  18. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pestovich, Kimberly Shay

    Harnessing the power of the nuclear sciences for national security and to benefit others is one of Los Alamos National Laboratory’s missions. MST-8 focuses on manipulating and studying how the structure, processing, properties, and performance of materials interact at the atomic level under nuclear conditions. Within this group, single crystal scintillators contribute to the safety and reliability of weapons, provide global security safeguards, and build on scientific principles that carry over to medical fields for cancer detection. Improved cladding materials made of ferritic-martensitic alloys support the mission of DOE-NE’s Fuel Cycle Research and Development program to close the nuclear fuelmore » cycle, aiming to solve nuclear waste management challenges and thereby increase the performance and safety of current and future reactors.« less

  19. 32 CFR 989.4 - Initial considerations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... national security interests while at the same time considering important environmental factors. (g... Under Secretary of Defense (Environmental Security). This coordination requirement does not apply to...

  20. Marketing Strategy and Implementation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    This report documents the marketing campaign that has been designed for middle and high school students in New Mexico to increase interest in participation in national security careers at the National Nuclear Security Administration. This marketing campaign builds on the research that was previously conducted, as well as the focus groups that were conducted. This work is a part of the National Nuclear Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) / National Nuclear Security Administration (NNSA) grant. Outcome analysis was performed to determine appropriate marketing strategies. The analysis was based upon focus groups with middlemore » school and high school students, student interactions, and surveys completed by students to understand and gauge student interest in Science, Technology, Engineering, and Math (STEM) subjects, interest in careers at NNSA, future job considerations, and student desire to pursue post-secondary education. Further, through the focus groups, students were asked to attend a presentation on NNSA job opportunities and employee requirements. The feedback received from the students was utilized to develop the focus and components of the marketing campaign.« less

  1. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    PubMed Central

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme. PMID:25276847

  2. A review of physical security robotics at Sandia National Laboratories

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Roerig, S.C.

    1990-01-01

    As an outgrowth of research into physical security technologies, Sandia is investigating the role of robotics in security systems. Robotics may allow more effective utilization of guard forces, especially in scenarios where personnel would be exposed to harmful environments. Robots can provide intrusion detection and assessment functions for failed sensors or transient assets, can test existing fixed site sensors, and can gather additional intelligence and dispense delaying elements. The Robotic Security Vehicle (RSV) program for DOE/OSS is developing a fieldable prototype for an exterior physical security robot based upon a commercial four wheel drive vehicle. The RSV will be capablemore » of driving itself, being driven remotely, or being driven by an onboard operator around a site and will utilize its sensors to alert an operator to unusual conditions. The Remote Security Station (RSS) program for the Defense Nuclear Agency is developing a proof-of-principle robotic system which will be used to evaluate the role, and associated cost, of robotic technologies in exterior security systems. The RSS consists of an independent sensor pod, a mobile sensor platform and a control and display console. Sensor data fusion is used to optimize the system's intrusion detection performance. These programs are complementary, the RSV concentrates on developing autonomous mobility, while the RSS thrust is on mobile sensor employment. 3 figs.« less

  3. How much does the Supplemental Nutrition Assistance Program alleviate food insecurity? Evidence from recent programme leavers.

    PubMed

    Nord, Mark

    2012-05-01

    To estimate the effect of the US Supplemental Nutrition Assistance Program (SNAP) on the food security (consistent access to adequate food) of recipients, net of the effect of the self-selection of more food-needy households into the programme. The food security of current SNAP recipients and recent leavers is compared in cross-sectional survey data, adjusting for economic and demographic differences using multivariate logistic regression methods. A similar analysis in 2-year longitudinal panels provides additional control for selection on unobserved variables based on food security status in the previous year. Household survey data collected for the US Department of Agriculture by the US Census Bureau. Households interviewed in the Current Population Survey Food Security Supplements from 2001 to 2009. The odds of very low food security among households that continued on SNAP through the end of a survey year were 28 % lower than among those that left SNAP prior to the 30-d period during which food security was assessed. In 2-year panels with controls for the severity of food insecurity in the previous year, the difference in odds was 45 %. The results are consistent with, or somewhat higher than, the estimates from the strongest previous research designs and suggest that the ameliorative effect of SNAP on very low food security is in the range of 20-50 %.

  4. 17 CFR 240.16b-3 - Transactions between an issuer and its officers or directors.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... respect to a derivative security if at least six months elapse from the date of acquisition of the derivative security to the date of disposition of the derivative security (other than upon exercise or... of a derivative security that does not satisfy the conditions of this section is eligible for...

  5. Food Security Framings within the UK and the Integration of Local Food Systems

    ERIC Educational Resources Information Center

    Kirwan, James; Maye, Damian

    2013-01-01

    This paper provides a critical interpretation of food security politics in the UK. It applies the notion of food security collective action frames to assess how specific action frames are maintained and contested. The interdependency between scale and framing in food security discourse is also scrutinised. It does this through an examination of…

  6. 26 CFR 1.475(d)-1 - Character of gain or loss.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... (CONTINUED) INCOME TAXES Inventories § 1.475(d)-1 Character of gain or loss. (a) Securities never held in connection with the taxpayer's activities as a dealer in securities. If a security is never held in connection with the taxpayer's activities as a dealer in securities, section 475(d)(3)(A) does not affect the...

  7. FY 2014 Annual Progress Report - Advanced Combustion Engine Research and Development (Book)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    In the past year, the DOE Hydrogen Program (the Program) made substantial progress toward its goals and objectives. The Program has conducted comprehensive and focused efforts to enable the widespread commercialization of hydrogen and fuel cell technologies in diverse sectors of the economy. With emphasis on applications that will effectively strengthen our nation's energy security and improve our stewardship of the environment, the Program engages in research, development, and demonstration of critical improvements in the technologies. Highlights of the Program's accomplishments can be found in the sub-program chapters of this report.

  8. 10 CFR 95.1 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... regulated by the Commission. This part does not apply to Top Secret information because Top Secret... obtaining facility security clearance and for safeguarding Secret and Confidential National Security...

  9. DOE 2011 occupational radiation exposure

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    none,

    2012-12-01

    The U.S. Department of Energy (DOE) Office of Analysis within the Office of Health, Safety and Security (HSS) publishes the annual DOE Occupational Radiation Exposure Report to provide an overview of the status of radiation protection practices at DOE (including the National Nuclear Security Administration [NNSA]). The DOE 2011 Occupational Radiation Exposure Report provides an evaluation of DOE-wide performance regarding compliance with Title 10, Code of Federal Regulations (C.F.R.), Part 835, Occupational Radiation Protection dose limits and as low as reasonably achievable (ALARA) process requirements. In addition, the report provides data to DOE organizations responsible for developing policies for protectionmore » of individuals from the adverse health effects of radiation. The report provides a summary and an analysis of occupational radiation exposure information from the monitoring of individuals involved in DOE activities. The occupational radiation exposure information is analyzed in terms of aggregate data, dose to individuals, and dose by site over the past five years.« less

  10. Security and Policy for Group Collaboration

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ian Foster; Carl Kesselman

    2006-07-31

    “Security and Policy for Group Collaboration” was a Collaboratory Middleware research project aimed at providing the fundamental security and policy infrastructure required to support the creation and operation of distributed, computationally enabled collaborations. The project developed infrastructure that exploits innovative new techniques to address challenging issues of scale, dynamics, distribution, and role. To reduce greatly the cost of adding new members to a collaboration, we developed and evaluated new techniques for creating and managing credentials based on public key certificates, including support for online certificate generation, online certificate repositories, and support for multiple certificate authorities. To facilitate the integration ofmore » new resources into a collaboration, we improved significantly the integration of local security environments. To make it easy to create and change the role and associated privileges of both resources and participants of collaboration, we developed community wide authorization services that provide distributed, scalable means for specifying policy. These services make it possible for the delegation of capability from the community to a specific user, class of user or resource. Finally, we instantiated our research results into a framework that makes it useable to a wide range of collaborative tools. The resulting mechanisms and software have been widely adopted within DOE projects and in many other scientific projects. The widespread adoption of our Globus Toolkit technology has provided, and continues to provide, a natural dissemination and technology transfer vehicle for our results.« less

  11. Secure FAST: Security Enhancement in the NATO Time Sensitive Targeting Tool

    DTIC Science & Technology

    2010-11-01

    designed to aid in the tracking and prosecuting of Time Sensitive Targets. The FAST tool provides user level authentication and authorisation in terms...level authentication and authorisation in terms of security. It uses operating system level security but does not provide application level security for...and collaboration tool, designed to aid in the tracking and prosecuting of Time Sensitive Targets. The FAST tool provides user level authentication and

  12. Sharing Research Data and Intellectual Property Law: A Primer

    PubMed Central

    Carroll, Michael W.

    2015-01-01

    Sharing research data by depositing it in connection with a published article or otherwise making data publicly available sometimes raises intellectual property questions in the minds of depositing researchers, their employers, their funders, and other researchers who seek to reuse research data. In this context or in the drafting of data management plans, common questions are (1) what are the legal rights in data; (2) who has these rights; and (3) how does one with these rights use them to share data in a way that permits or encourages productive downstream uses? Leaving to the side privacy and national security laws that regulate sharing certain types of data, this Perspective explains how to work through the general intellectual property and contractual issues for all research data. PMID:26313685

  13. Social Security Contributions and Return Migration Among Older Male Mexican Immigrants.

    PubMed

    Aguila, Emma; Vega, Alma

    2017-06-01

    For decades, scholars have studied the effects of immigration on the U.S. social security system. To date, this research has been primarily limited to migrants within the United States and does not consider those who return to their countries of origin. We estimate the proportion of male Mexican return migrants who contributed to the U.S. social security system and analyze their socioeconomic characteristics and migration histories. We also estimate the proportion that receive or expect to receive U.S. social security benefits. Using probit regression on the 2012 Mexican Health and Aging Study (MHAS), we describe the predictors of having contributed to the U.S. social security system among Mexican males in Mexico aged 50 years and older who at some point lived in the United States. We find that 32% of male return migrants reported having contributed to the U.S. social security system, but only 5% of those who contributed, received or expected to receive benefits. Those who reported having contributed spent more years in the United States and were more likely to be U.S. citizens or legal permanent residents than those who did not contribute. Immigrants often pay Old-Age, Survivors, and Disability Insurance taxes using legitimate or illegitimate social security numbers and return to their home countries without collecting U.S. social security benefits. © The Author 2017. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  14. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... DOE such involvement becomes expected prior to the closeout of the award, the recipient or DOE shall... recipient may wish to discontinue the project, in which case the recipient and DOE shall terminate the award..., including DOE officials with whom the recipient normally communicates, except the Director, Office of...

  15. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... DOE such involvement becomes expected prior to the closeout of the award, the recipient or DOE shall... recipient may wish to discontinue the project, in which case the recipient and DOE shall terminate the award..., including DOE officials with whom the recipient normally communicates, except the Director, Office of...

  16. 10 CFR 727.2 - What are the definitions of the terms used in this part?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... information. Computer means desktop computers, portable computers, computer networks (including the DOE network and local area networks at or controlled by DOE organizations), network devices, automated.... DOE means the Department of Energy, including the National Nuclear Security Administration. DOE...

  17. 10 CFR 727.2 - What are the definitions of the terms used in this part?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... information. Computer means desktop computers, portable computers, computer networks (including the DOE network and local area networks at or controlled by DOE organizations), network devices, automated.... DOE means the Department of Energy, including the National Nuclear Security Administration. DOE...

  18. 10 CFR 727.2 - What are the definitions of the terms used in this part?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... information. Computer means desktop computers, portable computers, computer networks (including the DOE network and local area networks at or controlled by DOE organizations), network devices, automated.... DOE means the Department of Energy, including the National Nuclear Security Administration. DOE...

  19. 10 CFR 727.2 - What are the definitions of the terms used in this part?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... information. Computer means desktop computers, portable computers, computer networks (including the DOE network and local area networks at or controlled by DOE organizations), network devices, automated.... DOE means the Department of Energy, including the National Nuclear Security Administration. DOE...

  20. 10 CFR 727.2 - What are the definitions of the terms used in this part?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... information. Computer means desktop computers, portable computers, computer networks (including the DOE network and local area networks at or controlled by DOE organizations), network devices, automated.... DOE means the Department of Energy, including the National Nuclear Security Administration. DOE...

  1. The Impact on Strategic Stability of Ballistic Missile Defense in Eastern Europe

    DTIC Science & Technology

    2009-06-12

    how did we get to this point? And what does it mean for strategic stability? Is there even still such a thing in a post-Cold War and post-Anti...Despite these radical changes to global security since the end of the Cold War, very few examinations of exactly what strategic stability means ...examining the historical definition of the phrase and researching the various perturbations that have resulted from changing national nuclear capabilities

  2. 75 FR 77921 - Office of Administrative Services; Mandatory Declassification Review Address

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-14

    ... relating to national security information in accordance with Executive Order 13526 and directives issued there-under by the Information Security Oversight Office (ISOO). OPIC does not have the authority to classify national security information. Documents that are originally classified outside of OPIC must be...

  3. 20 CFR 422.210 - Judicial review.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES Procedures of the Office of... Social Security Act, or of health services to be provided by a health maintenance organization without...) of the Act). The Social Security Act does not provide for a right to judicial review of a final...

  4. Framework for Flexible Security in Group Communications

    NASA Technical Reports Server (NTRS)

    McDaniel, Patrick; Prakash, Atul

    2006-01-01

    The Antigone software system defines a framework for the flexible definition and implementation of security policies in group communication systems. Antigone does not dictate the available security policies, but provides high-level mechanisms for implementing them. A central element of the Antigone architecture is a suite of such mechanisms comprising micro-protocols that provide the basic services needed by secure groups.

  5. FY 2016 - Stockpile Stewardship and Management Plan

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2015-03-01

    This Department of Energy’s (DOE) National Nuclear Security Administration (NNSA) Fiscal Year Stockpile Stewardship and Management Plan (SSMP) is a key planning document for the nuclear security enterprise.

  6. Los Alamos Neutron Science Center

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kippen, Karen Elizabeth

    For more than 30 years the Los Alamos Neutron Science Center (LANSCE) has provided the scientific underpinnings in nuclear physics and material science needed to ensure the safety and surety of the nuclear stockpile into the future. In addition to national security research, the LANSCE User Facility has a vibrant research program in fundamental science, providing the scientific community with intense sources of neutrons and protons to perform experiments supporting civilian research and the production of medical and research isotopes. Five major experimental facilities operate simultaneously. These facilities contribute to the stockpile stewardship program, produce radionuclides for medical testing, andmore » provide a venue for industrial users to irradiate and test electronics. In addition, they perform fundamental research in nuclear physics, nuclear astrophysics, materials science, and many other areas. The LANSCE User Program plays a key role in training the next generation of top scientists and in attracting the best graduate students, postdoctoral researchers, and early-career scientists. The U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA) —the principal sponsor of LANSCE—works with the Office of Science and the Office of Nuclear Energy, which have synergistic long-term needs for the linear accelerator and the neutron science that is the heart of LANSCE.« less

  7. Data Privacy and Security in Higher Education

    ERIC Educational Resources Information Center

    Williams, Tracy

    2003-01-01

    As institutions review and strengthen their plans to secure confidential data, what proactive role does the human resource professional play as a strategic partner? Why are employees a critical part of the solution? And how are they educated regarding their responsibilities with data security? Datatel's HR product manager shares some…

  8. 12 CFR 703.10 - Monitoring non-security investments.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Monitoring non-security investments. 703.10... INVESTMENT AND DEPOSIT ACTIVITIES § 703.10 Monitoring non-security investments. (a) At least quarterly, a... credit union does not have an investment-related committee, then each member of its board of directors...

  9. 31 CFR 356.5 - What types of securities does the Treasury auction?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... part to distinguish such securities from “inflation-protected” securities. We refer to fixed-principal... years. (2) Treasury inflation-protected notes. (i) Are issued with a stated rate of interest to be applied to the inflation-adjusted principal on each interest payment date; (ii) Have interest payable...

  10. 12 CFR 703.10 - Monitoring non-security investments.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Monitoring non-security investments. 703.10... INVESTMENT AND DEPOSIT ACTIVITIES § 703.10 Monitoring non-security investments. (a) At least quarterly, a... credit union does not have an investment-related committee, then each member of its board of directors...

  11. 76 FR 43534 - Alternative to Minimum Days Off Requirements

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-21

    ... fatigue does not adversely affect public health and safety and the common defense and security. Among... health and safety and the common defense and security by establishing clear and enforceable requirements... public health and safety and common defense and security. B. Alternative to the Minimum Days Off...

  12. 40 CFR 91.1008 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... (CONTINUED) CONTROL OF EMISSIONS FROM MARINE SPARK-IGNITION ENGINES Exclusion and Exemption of Marine SI Engines § 91.1008 National security exemption. (a)(1) Any marine SI engine, otherwise subject to this part... request a national security exemption for any marine SI engine, otherwise subject to this part, which does...

  13. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national security within the meaning of section 502(2) of Public Law 94-187: (1) Shipments made in support of the...

  14. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national security within the meaning of section 502(2) of Public Law 94-187: (1) Shipments made in support of the...

  15. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national security within the meaning of section 502(2) of Public Law 94-187: (1) Shipments made in support of the...

  16. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national security within the meaning of section 502(2) of Public Law 94-187: (1) Shipments made in support of the...

  17. 32 CFR 147.14 - Guideline L-Outside activities.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Adjudication § 147.14 Guideline L—Outside activities. (a) The concern. Involvement in certain types of outside employment or activities is of security concern if it poses a conflict with an individual's security... outside employment or activity indicates that it does not pose a conflict with an individual's security...

  18. 36 CFR 1202.30 - How does NARA safeguard its systems of records?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... records are protected in accordance with the Computer Security Act, OMB Circular A-11 requiring privacy... appropriate administrative, technical, and physical safeguards are established to ensure the security and confidentiality of records. In order to protect against any threats or hazards to their security or loss of...

  19. 36 CFR 1202.30 - How does NARA safeguard its systems of records?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... records are protected in accordance with the Computer Security Act, OMB Circular A-11 requiring privacy... appropriate administrative, technical, and physical safeguards are established to ensure the security and confidentiality of records. In order to protect against any threats or hazards to their security or loss of...

  20. 36 CFR 1202.30 - How does NARA safeguard its systems of records?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... records are protected in accordance with the Computer Security Act, OMB Circular A-11 requiring privacy... appropriate administrative, technical, and physical safeguards are established to ensure the security and confidentiality of records. In order to protect against any threats or hazards to their security or loss of...

  1. 36 CFR 1202.30 - How does NARA safeguard its systems of records?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... records are protected in accordance with the Computer Security Act, OMB Circular A-11 requiring privacy... appropriate administrative, technical, and physical safeguards are established to ensure the security and confidentiality of records. In order to protect against any threats or hazards to their security or loss of...

  2. Underground Test Area Quality Assurance Project Plan Nevada National Security Site, Nevada, Revision 0

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Irene Farnham

    This Quality Assurance Project Plan (QAPP) provides the overall quality assurance (QA) program requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Underground Test Area (UGTA) Sub-Project (hereafter the Sub-Project) activities. The requirements in this QAPP are consistent with DOE Order 414.1C, Quality Assurance (DOE, 2005); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). The QAPP Revision 0 supersedes DOE--341, Underground Test Area Quality Assurancemore » Project Plan, Nevada Test Site, Nevada, Revision 4.« less

  3. Combination Base64 Algorithm and EOF Technique for Steganography

    NASA Astrophysics Data System (ADS)

    Rahim, Robbi; Nurdiyanto, Heri; Hidayat, Rahmat; Saleh Ahmar, Ansari; Siregar, Dodi; Putera Utama Siahaan, Andysah; Faisal, Ilham; Rahman, Sayuti; Suita, Diana; Zamsuri, Ahmad; Abdullah, Dahlan; Napitupulu, Darmawan; Ikhsan Setiawan, Muhammad; Sriadhi, S.

    2018-04-01

    The steganography process combines mathematics and computer science. Steganography consists of a set of methods and techniques to embed the data into another media so that the contents are unreadable to anyone who does not have the authority to read these data. The main objective of the use of base64 method is to convert any file in order to achieve privacy. This paper discusses a steganography and encoding method using base64, which is a set of encoding schemes that convert the same binary data to the form of a series of ASCII code. Also, the EoF technique is used to embed encoding text performed by Base64. As an example, for the mechanisms a file is used to represent the texts, and by using the two methods together will increase the security level for protecting the data, this research aims to secure many types of files in a particular media with a good security and not to damage the stored files and coverage media that used.

  4. Idaho National Laboratory Directed Research and Development FY-2009

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    2010-03-01

    The FY 2009 Laboratory Directed Research and Development (LDRD) Annual Report is a compendium of the diverse research performed to develop and ensure the INL's technical capabilities can support the future DOE missions and national research priorities. LDRD is essential to the INL - it provides a means for the laboratory to pursue novel scientific and engineering research in areas that are deemed too basic or risky for programmatic investments. This research enhances technical capabilities at the laboratory, providing scientific and engineering staff with opportunities for skill building and partnership development. Established by Congress in 1991, LDRD proves its benefitmore » each year through new programs, intellectual property, patents, copyrights, publications, national and international awards, and new hires from the universities and industry, which helps refresh the scientific and engineering workforce. The benefits of INL's LDRD research are many as shown in the tables below. Last year, 91 faculty members from various universities contributed to LDRD research, along with 7 post docs and 64 students. Of the total invention disclosures submitted in FY 2009, 7 are attributable to LDRD research. Sixty three refereed journal articles were accepted or published, and 93 invited presentations were attributable to LDRD research conducted in FY 2009. The LDRD Program is administered in accordance with requirements set in DOE Order 413.2B, accompanying contractor requirements, and other DOE and federal requirements invoked through the INL contract. The LDRD Program is implemented in accordance with the annual INL LDRD Program Plan, which is approved by the DOE, Nuclear Energy Program Secretarial Office. This plan outlines the method the laboratory uses to develop its research portfolio, including peer and management reviews, and the use of other INL management systems to ensure quality, financial, safety, security and environmental requirements and risks are appropriately handled. The LDRD Program is assessed annually for both output and process efficiency to ensure the investment is providing expected returns on technical capability enhancement. The call for proposals and project selection process for the INL LDRD program begins typically in April, with preliminary budget allocations, and submittal of the technical requests for preproposals. A call for preproposals is made at this time as well, and the preparation of full proposals follows in June and closes in July. The technical and management review follows this, and the portfolio is submitted for DOE-ID concurrence in early September. Project initiation is in early October. The technical review process is independent of, and in addition to the management review. These review processes are very stringent and comprehensive, ensuring technical viability and suitable technical risk are encompassed within each project that is selected for funding. Each proposal is reviewed by two or three anonymous technical peers, and the reviews are consolidated into a cohesive commentary of the overall research based on criteria published in the call for proposals. A grade is assigned to the technical review and the review comments and grade are released back to the principal investigators and the managers interested in funding the proposals. Management criteria are published in the call for proposals, and management comments and selection results are available for principal investigator and other interested management as appropriate. The DOE Idaho Operations Office performs a final review and concurs on each project prior to project authorization, and on major scope/budget changes should they occur during the project's implementation. This report begins with several research highlights that exemplify the diversity of scientific and engineering research performed at the INL in FY 2009. Progress summaries for all projects are organized into sections reflecting the major areas of research focus at the INL. These sections begin with the DOE-NE Nuclear Science and Technology mission support area, followed by the National and Homeland Security and the Energy and Environmental Science and Technology areas. The major INL initiatives and the INL's Distinctive Signatures areas complete the project summaries. The appendices provide information on project relevance to DOE missions and major national programs as well as an author index, list of refereed publications and index of key terms.« less

  5. The Fukushima Daiichi Accident Study Information Portal

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shawn St. Germain; Curtis Smith; David Schwieder

    This paper presents a description of The Fukushima Daiichi Accident Study Information Portal. The Information Portal was created by the Idaho National Laboratory as part of joint NRC and DOE project to assess the severe accident modeling capability of the MELCOR analysis code. The Fukushima Daiichi Accident Study Information Portal was created to collect, store, retrieve and validate information and data for use in reconstructing the Fukushima Daiichi accident. In addition to supporting the MELCOR simulations, the Portal will be the main DOE repository for all data, studies and reports related to the accident at the Fukushima Daiichi nuclear powermore » station. The data is stored in a secured (password protected and encrypted) repository that is searchable and accessible to researchers at diverse locations.« less

  6. Laboratory directed research and development FY98 annual report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Al-Ayat, R; Holzrichter, J

    1999-05-01

    In 1984, Congress and the Department of Energy (DOE) established the Laboratory Directed Research and Development (LDRD) Program to enable the director of a national laboratory to foster and expedite innovative research and development (R and D) in mission areas. The Lawrence Livermore National Laboratory (LLNL) continually examines these mission areas through strategic planning and shapes the LDRD Program to meet its long-term vision. The goal of the LDRD Program is to spur development of new scientific and technical capabilities that enable LLNL to respond to the challenges within its evolving mission areas. In addition, the LDRD Program provides LLNLmore » with the flexibility to nurture and enrich essential scientific and technical competencies and enables the Laboratory to attract the most qualified scientists and engineers. The FY98 LDRD portfolio described in this annual report has been carefully structured to continue the tradition of vigorously supporting DOE and LLNL strategic vision and evolving mission areas. The projects selected for LDRD funding undergo stringent review and selection processes, which emphasize strategic relevance and require technical peer reviews of proposals by external and internal experts. These FY98 projects emphasize the Laboratory's national security needs: stewardship of the U.S. nuclear weapons stockpile, responsibility for the counter- and nonproliferation of weapons of mass destruction, development of high-performance computing, and support of DOE environmental research and waste management programs.« less

  7. Rand Corporation National Security Research Division. Annual Report 2010-2011

    DTIC Science & Technology

    2011-01-01

    Approval of Sole-Source DoD Contracts to Native American Organizations A n nuA l R e p o R t 2 0 1 0 – 2 0 11 29 Alternative Fuels for the...average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed...shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1

  8. Manufacturing and Characterization of Ultra Pure Ferrous Alloys Final Report CRADA No. TC02069.0

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lesuer, D.; McGreevy, T. E.

    This CRADA was a.collaborative effort between the Lawrence Livermore National Security LLC (formerly University of California)/Lawrence Livermore National Laboratory (LLNL),and Caterpillar Inc. (CaterpiHar), to further advance levitation casting techniques (developed at the Central Research Institute for Material (CRIM) in St. Petersburg, Russia) for use in manufacturing high purity metal alloys. This DOE Global Initiatives for Proliferation Prevention Program (IPP) project was to develop and demonstrate the levitation casting technology for producing ultra-pure alloys.

  9. Analyzing Global Interdependence. Volume III. Methodological Perspectives and Research Implications,

    DTIC Science & Technology

    1974-11-01

    exposition of their relevance to U. S. - U. S. S.R. security relations is Glenn H. Snyder, "’Prisoner’s Dilemma’ and ’Chicken Models ’ in International...by both. The -9- same dilemma may well occur in some arms acquisitions, fishing, inflation control, or oil production situations. The fact that the...magnitudes) or individually (who goes to jail, who has which arms the other does not, who gets what from their inflation controller or oil production

  10. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Twogood, Richard E

    This is the Final Report for the DOE Phase II SBIR project “Ultra-secure RF Tags for Safeguards and Security.” The topics covered herein include technical progress made, progress against the planned milestones and deliverables, project outcomes (results, collaborations, intellectual property, etc.), and a discussion on future expectations of deployment and impacts of the results of this work. In brief, all planned work for the project was successfully completed, on or ahead of schedule and on budget. The major accomplishment was the successful development of a very advanced passive ultra-secure RFID tag system with combined security features unmatched by any commerciallymore » available ones. These tags have high-level dynamic encrypted authentication, a novel tamper-proofing mechanism, system software including graphical user interfaces and networking, and integration with a fiber-optic seal mechanism. This is all accomplished passively (with no battery) by incorporating sophisticated hardware in the tag which harvests the energy from the RFID readers that are interrogating the tag. Based on initial feedback (and deployments) at DOE’s Lawrence Livermore National Laboratory (LLNL), it is anticipated these tags and their offspring will meet DOE and international community needs for highly secure RFID systems. Beyond the accomplishment of those original objectives for the ultra-secure RF tags, major new spin-off thrusts from the original work were identified and successfully pursued with the cognizance of the DOE sponsor office. In particular, new classes of less sophisticated RFID tags were developed whose lineage derives from the core R&D thrusts of this SBIR. These RF “tag variants” have some, but not necessarily all, of the advanced characteristics described above and can therefore be less expensive and meet far wider markets. With customer pull from the DOE and its national laboratories, new RFID tags and systems (including custom readers and software) for government needs in asset management and tracking were developed. These were tested at a national laboratory and other government facilities, and resulted in immediate procurement actions by the government and deployment of these new systems. Thus, commercialization of the results of this Phase II DOE SBIR was already underway before the end of the SBIR itself. More importantly, operations involving asset management at selected DoE and government sites are already being impacted favorably and could have much broader impacts in the near future.« less

  11. Intelligent Facial Recognition Systems: Technology advancements for security applications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Beer, C.L.

    1993-07-01

    Insider problems such as theft and sabotage can occur within the security and surveillance realm of operations when unauthorized people obtain access to sensitive areas. A possible solution to these problems is a means to identify individuals (not just credentials or badges) in a given sensitive area and provide full time personnel accountability. One approach desirable at Department of Energy facilities for access control and/or personnel identification is an Intelligent Facial Recognition System (IFRS) that is non-invasive to personnel. Automatic facial recognition does not require the active participation of the enrolled subjects, unlike most other biological measurement (biometric) systems (e.g.,more » fingerprint, hand geometry, or eye retinal scan systems). It is this feature that makes an IFRS attractive for applications other than access control such as emergency evacuation verification, screening, and personnel tracking. This paper discusses current technology that shows promising results for DOE and other security applications. A survey of research and development in facial recognition identified several companies and universities that were interested and/or involved in the area. A few advanced prototype systems were also identified. Sandia National Laboratories is currently evaluating facial recognition systems that are in the advanced prototype stage. The initial application for the evaluation is access control in a controlled environment with a constant background and with cooperative subjects. Further evaluations will be conducted in a less controlled environment, which may include a cluttered background and subjects that are not looking towards the camera. The outcome of the evaluations will help identify areas of facial recognition systems that need further development and will help to determine the effectiveness of the current systems for security applications.« less

  12. The Global Threat Reduction Initiative's Orphan Source Recovery Project in the Russian Federation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Russell, J. W.; Ahumada, A. D.; Blanchard, T. A.

    After 9/11, officials at the United States Department of Energy (DOE), National Nuclear Security Administration (NNSA) grew more concerned about radiological materials that were vulnerable to theft and illicit use around the world. The concern was that terrorists could combine stolen radiological materials with explosives to build and detonate a radiological dispersal device (RDD), more commonly known as a “dirty bomb.” In response to this and other terrorist threats, the DOE/NNSA formed what is now known as the Global Threat Reduction Initiative (GTRI) to consolidate and accelerate efforts to reduce and protect vulnerable nuclear and radiological materials located at civilianmore » sites worldwide. Although a cooperative program was already underway in the Russian Federation to secure nuclear materials at a range of different facilities, thousands of sealed radioactive sources remained vulnerable at medical, research, and industrial sites. In response, GTRI began to focus efforts on addressing these materials. GTRI’s Russia Orphan Source Recovery Project, managed at the Nevada National Security Site’s North Las Vegas facility, was initiated in 2002. Throughout the life of the project, Joint Stock Company “Isotope” has served as the primary Russian subcontractor, and the organization has proven to be a successful partner. Since the first orphan source recovery of an industrial cobalt-60 irradiator with 647 curies (Ci) at an abandoned facility in Moscow in 2003, the GTRI Orphan Source Recovery Project in the Russian Federation has accomplished substantial levels of threat reduction. To date, GTRI has recovered and securely disposed of more than 5,100 sources totaling more that 628,000 Ci. This project serves as an extraordinary example of how international cooperation can be implemented by partners with mutual interests to achieve significant goals.« less

  13. Emergency Preparedness for Catastrophic Events at Small and Medium Sized Airports: Lacking or Not?

    NASA Technical Reports Server (NTRS)

    Sweet, Kathleen M.

    2007-01-01

    The implementation of security methods and processes in general has had a decisive impact on the aviation industry. However, efforts to effectively coordinate varied aspects of security protocols between agencies and general aviation components have not been adequately addressed. Whether or not overall security issues, especially with regard to planning for catastrophic terrorist events, have been neglected at the nation's smaller airports is the main topic of this paper. For perspective, the term general aviation is generally accepted to include all flying except for military and scheduled airline operations. Genera aviation makes up more than 1 percent of the U.S. Gross Domestic Product and supports almost 1.3 mission high-skilled jobs in professional services and manufacturing and hence is an important component of the aviation industry (AOPA, n.d.). In both conceptual and practical terms, this paper argues for the proactive management of security planning and repeated security awareness training from both an individual and an organizational perspective within the general aviation venue. The results of a research project incorporating survey data from general aviation and small commercial airport managers as well as Transportation Security Administration (TSA) employees are reported. Survey findings suggest that miscommunication does take place on different organizational levels and that between TSA employees and airport management interaction can be contentious and cooperation diminished. The importance of organizational training for decreasing conflict and increasing security and preparedness is discussed as a primary implication.

  14. 10 CFR 1046.3 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ..., laboratory, office building or other area utilized by the DOE or its contractors or subcontractors for the..., previously referred to as a “security inspector.” Special response team member. A security police officer who...

  15. 10 CFR 1046.3 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ..., laboratory, office building or other area utilized by the DOE or its contractors or subcontractors for the..., previously referred to as a “security inspector.” Special response team member. A security police officer who...

  16. 10 CFR 1046.3 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ..., laboratory, office building or other area utilized by the DOE or its contractors or subcontractors for the..., previously referred to as a “security inspector.” Special response team member. A security police officer who...

  17. Democracy by Coup: The Turkish Government under Military Control (1980- 1983)

    DTIC Science & Technology

    1984-05-01

    See reverse. JAN 47 EDITIO O INOV 65ISOSOLETE UNCLASSIFIED SECURITY CLASSIFICATION OF THItS PAGE (When Doe Entered) UNCLASSIFIED, SECURITY...Germany’s blitzkrieg of Poland , was seen as a real threat to Turkey’s security. In response, Turkey entered into a one-way treaty of mutual assistance with

  18. 6 CFR 13.10 - Default upon failure to answer.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Default upon failure to answer. 13.10 Section 13.10 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.10 Default upon failure to answer. (a) If the Defendant does not answer within the time...

  19. 26 CFR 1.475(b)-2 - Exemptions-identification requirements.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... requirements. (a) Identification of the basis for exemption. An identification of a security as exempt from mark to market does not satisfy section 475(b)(2) if it fails to state whether the security is described in— (1) Either of the first two subparagraphs of section 475(b)(1) (identifying a security as held...

  20. Database Security: What Students Need to Know

    ERIC Educational Resources Information Center

    Murray, Meg Coffin

    2010-01-01

    Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of…

  1. 76 FR 75781 - Treasury Inflation-Protected Securities Issued at a Premium

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-05

    ... Services and Enforcement. Emily S. McMahon, Acting Assistant Secretary of the Treasury (Tax Policy). [FR... principal amount of the security times the number of complete years to the security's maturity). In Notice... Administrative Procedure Act (5 U.S.C. chapter 5) does not apply to these regulations, and because the...

  2. 36 CFR § 1202.30 - How does NARA safeguard its systems of records?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... records are protected in accordance with the Computer Security Act, OMB Circular A-11 requiring privacy... appropriate administrative, technical, and physical safeguards are established to ensure the security and confidentiality of records. In order to protect against any threats or hazards to their security or loss of...

  3. 31 CFR 132.2 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... transaction provider, or any interactive computer service or telecommunications service); and (5) Does not include— (i) Any activity governed by the securities laws (as that term is defined in section 3(a)(47) of the Securities Exchange Act of 1934 (15 U.S.C. 78c(a)(47)) for the purchase or sale of securities (as...

  4. 12 CFR 233.2 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... transaction provider, or any interactive computer service or telecommunications service); and (5) Does not include— (i) Any activity governed by the securities laws (as that term is defined in section 3(a)(47) of the Securities Exchange Act of 1934 (15 U.S.C. 78c(a)(47)) for the purchase or sale of securities (as...

  5. 12 CFR 233.2 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... transaction provider, or any interactive computer service or telecommunications service); and (5) Does not include— (i) Any activity governed by the securities laws (as that term is defined in section 3(a)(47) of the Securities Exchange Act of 1934 (15 U.S.C. 78c(a)(47)) for the purchase or sale of securities (as...

  6. 31 CFR 132.2 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... transaction provider, or any interactive computer service or telecommunications service); and (5) Does not include— (i) Any activity governed by the securities laws (as that term is defined in section 3(a)(47) of the Securities Exchange Act of 1934 (15 U.S.C. 78c(a)(47)) for the purchase or sale of securities (as...

  7. 12 CFR 233.2 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... transaction provider, or any interactive computer service or telecommunications service); and (5) Does not include— (i) Any activity governed by the securities laws (as that term is defined in section 3(a)(47) of the Securities Exchange Act of 1934 (15 U.S.C. 78c(a)(47)) for the purchase or sale of securities (as...

  8. 12 CFR 233.2 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... transaction provider, or any interactive computer service or telecommunications service); and (5) Does not include— (i) Any activity governed by the securities laws (as that term is defined in section 3(a)(47) of the Securities Exchange Act of 1934 (15 U.S.C. 78c(a)(47)) for the purchase or sale of securities (as...

  9. 17 CFR 275.203A-2 - Exemptions from prohibition on Commission registration.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemptions from prohibition on Commission registration. 275.203A-2 Section 275.203A-2 Commodity and Securities Exchanges SECURITIES AND....C. 80b-3a(a)) does not apply to: (a) Nationally recognized statistical rating organizations. An...

  10. 17 CFR 275.203A-2 - Exemptions from prohibition on Commission registration.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Exemptions from prohibition on Commission registration. 275.203A-2 Section 275.203A-2 Commodity and Securities Exchanges SECURITIES AND....C. 80b-3a(a)) does not apply to: (a) Nationally recognized statistical rating organizations. An...

  11. Nevada National Security Site Environmental Report 2016

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wills

    This Nevada National Security Site Environmental Report (NNSSER) was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSERmore » summarizes data and compliance status for calendar year 2016 at the Nevada National Security Site (NNSS) and its two Nevada-based support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). NNSA/NFO directs the management and operation of the NNSS and six sites across the nation. In addition to the NNSA itself, the six sites include two in Nevada (NLVF and RSL-Nellis) and four in other states (RSL-Andrews in Maryland, Livermore Operations in California, Los Alamos Operations in New Mexico, and Special Technologies Laboratory in California). Los Alamos, Lawrence Livermore, and Sandia National Laboratories are the principal organizations that sponsor and implement the nuclear weapons programs at the NNSS. National Security Technologies, LLC (NSTec), is the current Management and Operating contractor accountable for the successful execution of work and ensuring that work is performed in compliance with environmental regulations. The six sites all provide support to enhance the NNSS as a location for its multiple missions. The three major NNSS missions include National Security/Defense, Environmental Management, and Nondefense. The major programs that support these missions are Stockpile Stewardship and Management, Nonproliferation and Counterterrorism, Nuclear Emergency Response, Strategic Partnership Projects, Environmental Restoration, Waste Management, Conservation and Renewable Energy, Other Research and Development, and Infrastructure. The major facilities that support the programs include the U1a Facility, Big Explosives Experimental Facility (BEEF), Device Assembly Facility, Dense Plasma Focus Facility, Joint Actinide Shock Physics Experimental Research Facility, Radiological/Nuclear Countermeasures Test and Evaluation Complex, Nonproliferation Test and Evaluation Complex (NPTEC), Radiological/Nuclear Weapons of Mass Destruction Incident Exercise Site, the Area 5 Radioactive Waste Management Complex (RWMC), and the Area 3 Radioactive Waste Management Site (RWMS).« less

  12. 10 CFR 710.6 - Cooperation by the individual.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... DOE's relevant and material questions, and when requested, to furnish or authorize others to furnish... authorization, including but not limited to, personnel security interviews, DOE-sponsored mental evaluations...

  13. 10 CFR 710.6 - Cooperation by the individual.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... DOE's relevant and material questions, and when requested, to furnish or authorize others to furnish... authorization, including but not limited to, personnel security interviews, DOE-sponsored mental evaluations...

  14. Security: The Fourth Pillar of the Caribbean Community. Does the Region Need a Security Organ

    DTIC Science & Technology

    2016-06-10

    activities disrupt stability, undermine democratic institutions and hinder the economic activity so vital to the region. Geostrategic Significance...of the Caribbean region and CARICOM, as well as an overview of its organization and role as a major regional institution . The chapter also...various national security institutions mandated to address the needs of the specific countries. Among their national security architecture, CARICOM

  15. The changing face of Hanford security 1990--1994

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Thielman, J.

    The meltdown of the Cold War was a shock to the systems built to cope with it. At the DOE`s Hanford Site in Washington State, a world-class safeguards and security system was suddenly out of step with the times. The level of protection for nuclear and classified materials was exceptional. But the cost was high and the defense facilities that funded security were closing down. The defense mission had created an umbrella of security over the sprawling Hanford Site. Helicopters designed to ferry special response teams to any trouble spot on the 1,456 square-kilometer site made the umbrella analogy almostmore » literally true. Facilities were grouped into areas, fenced off like a military base, and entrance required a badge check for everyone. Within the fence, additional rings of protection were set up around security interests or targets. The security was effective, but costly to operate and inconvenient for employees and visitors alike. Moreover, the umbrella meant that virtually all employees needed a security clearance just to get to work, whether they worked on classified or unclassified projects. Clearly, some fundamental rethinking of safeguards and security was needed. The effort to meet that challenge is the story of transition at Hanford and documented here.« less

  16. A Security Analysis on Kempf-Koodli's Security Scheme for Fast Mobile IPv6

    NASA Astrophysics Data System (ADS)

    You, Ilsun; Sakurai, Kouichi; Hori, Yoshiaki

    Recently, the security scheme, proposed by Kempf and Koodli, has been adopted as a security standard for Fast handover for Mobile IPv6. But, it does not prevent denial of service attacks while resulting in high computation cost. More importantly, we find that it is still vulnerable to redirection attacks because it fails to secure the Unsolicited Neighbor Advertisement messages. In this paper, Kempf-Koodli's scheme is formally analyzed through BAN-logic and its weaknesses are demonstrated.

  17. Hidden Costs of Energy: Unpriced Consequences of Energy Production and Use

    NASA Astrophysics Data System (ADS)

    National Research Council

    2011-11-01

    The U.S. Congress directed the U.S. Department of the Treasury to arrange for a review by the National Academy of Sciences to define and evaluate the health, environmental, security, and infrastructural external costs and benefits associated with the production and consumption of energy--costs and benefits that are not or may not be fully incorporated into the market price of energy, into the federal tax or fee, or into other applicable revenue measures related to production and consumption of energy. In response, the National Research Council established the Committee on Health, Environmental, and Other External Costs and Benefits of Energy Production and Consumption, which prepared the report summarized in this chapter. The report estimates dollar values for several major components of these costs. The damages the committee was able to quantify were an estimated $120 billion in the U.S. in 2005, a number that reflects primarily health damages from air pollution associated with electricity generation and motor vehicle transportation. The figure does not include damages from climate change, harm to ecosystems, effects of some air pollutants such as mercury, and risks to national security, which the report examines but does not monetize.

  18. 76 FR 10342 - Availability of Fiscal Years 2011-2016 Draft Strategic Plan and Request for Public Comment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-24

    ... ">[email protected] hq.doe.gov . Michael Holland, Office of the Under Secretary for Science at (202) 586-0505, or e-mail [email protected]science.doe.gov . SUPPLEMENTARY INFORMATION: The DOE was established in... clear goals for DOE's four main business lines: nuclear security, environmental clean-up, science and...

  19. Nevada Test Site Environmental Report 2008

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cathy A. Wills

    2009-09-01

    The Nevada Test Site Environmental Report (NTSER) 2008 was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years’ NTSERs are posted on the NNSA/NSO website at http://www.nv.doe.gov/library/publications/aser.aspx.

  20. Nuclear Science Outreach in the World Year of Physics

    NASA Astrophysics Data System (ADS)

    McMahan, Margaret

    2006-04-01

    The ability of scientists to articulate the importance and value of their research has become increasingly important in the present climate of declining budgets, and this is most critical in the field of nuclear science ,where researchers must fight an uphill battle against negative public perception. Yet nuclear science encompasses important technical and societal issues that should be of primary interest to informed citizens, and the need for scientists trained in nuclear techniques are important for many applications in nuclear medicine, national security and future energy sources. The NSAC Education Subcommittee Report [1] identified the need for a nationally coordinated effort in nuclear science outreach, naming as its first recommendation that `the highest priority for new investment in education be the creation by the DOE and NSF of a Center for Nuclear Science Outreach'. This talk will review the present status of public outreach in nuclear science and highlight some specific efforts that have taken place during the World Year of Physics. [1] Education in Nuclear Science: A Status Report and Recommendations for the Beginning of the 21^st Century, A Report of the DOE/NSF Nuclear Science Advisory Committee Subcommittee on Education, November 2004, http://www.sc.doe.gov/henp/np/nsac/docs/NSACCReducationreportfinal.pdf.

  1. The Challenges of Balancing Safety and Security in Implantable Medical Devices.

    PubMed

    Katzis, Konstantinos; Jones, Richard W; Despotou, George

    2016-01-01

    Modern Implantable Medical Devices (IMDs), implement capabilities that have contributed significantly to patient outcomes, as well as quality of life. The ever increasing connectivity of IMD's does raise security concerns though there are instances where implemented security measures might impact on patient safety. The paper discusses challenges of addressing both of these attributes in parallel.

  2. 78 FR 72131 - Notice of Applications for Deregistration Under Section 8(f) of the Investment Company Act of 1940

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-02

    ... securities and does not propose to make a public offering or engage in business of any kind. Filing Dates... SECURITIES AND EXCHANGE COMMISSION [Release No. IC-30804] Notice of Applications for... by writing to the Secretary, U.S. Securities and Exchange Commission, 100 F Street NE., Washington...

  3. 75 FR 34429 - Petition of Hard Eight Futures, LLC for Exemptive Relief, Pursuant to Section 4(c) of the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-17

    ... conditions, to trade foreign non- narrow-based security index futures contracts where the foreign exchange... futures on broad-based security indexes; (ii) the securities comprising such an index are principally... the person within ten (10) business days that the claimant does not meet the requirements of the...

  4. 31 CFR 132.2 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... (which does not include the activities of a financial transaction provider, or any interactive computer... securities laws (as that term is defined in section 3(a)(47) of the Securities Exchange Act of 1934 (15 U.S.C. 78c(a)(47)) for the purchase or sale of securities (as that term is defined in section 3(a)(10) of...

  5. DOE/DHS/DOT Volpe Technical Meeting on Electric Vehicle and Charging Station Cybersecurity Report

    DOT National Transportation Integrated Search

    2018-03-26

    On November 29-30, 2017, the U.S. Department of Energys (DOE) Office of Policy (OP), in collaboration with DOEs Vehicle Technology Office (VTO), the U.S. Department of Homeland Securitys (DHS) Science and Technology Directorate (S&T) Cyber S...

  6. Internal contamination of an irradiator discovered during security enhancement.

    PubMed

    Harvey, R P

    2014-08-01

    High-risk radioactive sources regulated under Increased Controls Regulations have been protected by licensed facilities, but the federal government has placed significant emphasis on these sources and has developed initiatives to assist radioactive material licensees. The Department of Energy's Global Threat Reduction Initiative (GTRI) Domestic Threat Reduction Program is a voluntary federally funded program for security enhancements of high-risk radiological material. During the hardening or security enhancement process by the United States Department of Energy (U.S. DOE) contractors, a small amount of radioactive contamination was discovered in a Cesium irradiator. Ultimately, it was decided to pursue disposal with U.S. DOE's Off-Site Recovery Program (OSRP). Radiological devices may have a leaking source or known internal contamination that may cause difficulty during security enhancement. If the licensee understands this, it may provide facilities the opportunity to plan and prepare for unusual circumstances.

  7. 78 FR 70934 - Trespassing on DOE Property: Kansas City Plant Facilities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-27

    ..., National Nuclear Security Administration, Kirtland Operations operating area. The facilities are described...). Addition of the Kirtland Operations operating area property does not terminate the prior Kansas City Plant...

  8. Basic Science for a Secure Energy Future

    NASA Astrophysics Data System (ADS)

    Horton, Linda

    2010-03-01

    Anticipating a doubling in the world's energy use by the year 2050 coupled with an increasing focus on clean energy technologies, there is a national imperative for new energy technologies and improved energy efficiency. The Department of Energy's Office of Basic Energy Sciences (BES) supports fundamental research that provides the foundations for new energy technologies and supports DOE missions in energy, environment, and national security. The research crosses the full spectrum of materials and chemical sciences, as well as aspects of biosciences and geosciences, with a focus on understanding, predicting, and ultimately controlling matter and energy at electronic, atomic, and molecular levels. In addition, BES is the home for national user facilities for x-ray, neutron, nanoscale sciences, and electron beam characterization that serve over 10,000 users annually. To provide a strategic focus for these programs, BES has held a series of ``Basic Research Needs'' workshops on a number of energy topics over the past 6 years. These workshops have defined a number of research priorities in areas related to renewable, fossil, and nuclear energy -- as well as cross-cutting scientific grand challenges. These directions have helped to define the research for the recently established Energy Frontier Research Centers (EFRCs) and are foundational for the newly announced Energy Innovation Hubs. This overview will review the current BES research portfolio, including the EFRCs and user facilities, will highlight past research that has had an impact on energy technologies, and will discuss future directions as defined through the BES workshops and research opportunities.

  9. Coding a Weather Model: DOE-FIU Science & Technology Workforce Development Program.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bradley, Jon David

    DOE Fellow, Andres Cremisini, completed a 10-week internship with Sandia National Laboratories (SNL) in Albuquerque, New Mexico. Under the management of Kristopher Klingler and the mentorship of Jon Bradley, he was tasked with conceiving and coding a realistic weather model for use in physical security applications. The objective was to make a weather model that could use real data to accurately predict wind and precipitation conditions at any location of interest on the globe at any user-determined time. The intern received guidance on software design, the C++ programming language and clear communication of project goals and ongoing progress. In addition,more » Mr. Cremisini was given license to structure the program however he best saw fit, an experience that will benefit ongoing research endeavors.« less

  10. 76 FR 38550 - Technical Standard DOE-STD-1095-2011, Department of Energy Laboratory Accreditation for External...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-01

    ... Laboratory Accreditation for External Dosimetry AGENCY: Office of Health, Safety and Security, Department of... Department) is issuing Technical Standard DOE-STD-1095-2011, Department of Energy Laboratory Accreditation... part, to determine whether to accredit dosimetry programs in accordance with the DOE Laboratory...

  11. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...). However, if in the opinion of the recipient or DOE such involvement becomes expected prior to the closeout of the award, the recipient or DOE shall notify the other in writing immediately. If the recipient... disposition. If the recipient and DOE wish to continue the award, even though classified information is...

  12. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...). However, if in the opinion of the recipient or DOE such involvement becomes expected prior to the closeout of the award, the recipient or DOE shall notify the other in writing immediately. If the recipient... disposition. If the recipient and DOE wish to continue the award, even though classified information is...

  13. 33 CFR 150.300 - What does this subpart do?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false What does this subpart do? 150.300 Section 150.300 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: OPERATIONS Vessel Navigation § 150.300 What does this subpart do...

  14. 33 CFR 148.300 - What does this subpart concern?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false What does this subpart concern? 148.300 Section 148.300 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: GENERAL Licenses § 148.300 What does this subpart concern? This...

  15. 33 CFR 150.300 - What does this subpart do?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false What does this subpart do? 150.300 Section 150.300 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: OPERATIONS Vessel Navigation § 150.300 What does this subpart do...

  16. 33 CFR 149.300 - What does this subpart do?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false What does this subpart do? 149.300 Section 149.300 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY....300 What does this subpart do? This subpart provides requirements for lifesaving equipment on...

  17. 33 CFR 148.300 - What does this subpart concern?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false What does this subpart concern? 148.300 Section 148.300 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: GENERAL Licenses § 148.300 What does this subpart concern? This...

  18. 33 CFR 149.300 - What does this subpart do?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false What does this subpart do? 149.300 Section 149.300 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY....300 What does this subpart do? This subpart provides requirements for lifesaving equipment on...

  19. High-Performance Secure Database Access Technologies for HEP Grids

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Matthew Vranicar; John Weicher

    2006-04-17

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysismore » capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist’s computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that "Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications.” There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the secure authorization is pushed into the database engine will eliminate inefficient data transfer bottlenecks. Furthermore, traditionally separated database and security layers provide an extra vulnerability, leaving a weak clear-text password authorization as the only protection on the database core systems. Due to the legacy limitations of the systems’ security models, the allowed passwords often can not even comply with the DOE password guideline requirements. We see an opportunity for the tight integration of the secure authorization layer with the database server engine resulting in both improved performance and improved security. Phase I has focused on the development of a proof-of-concept prototype using Argonne National Laboratory’s (ANL) Argonne Tandem-Linac Accelerator System (ATLAS) project as a test scenario. By developing a grid-security enabled version of the ATLAS project’s current relation database solution, MySQL, PIOCON Technologies aims to offer a more efficient solution to secure database access.« less

  20. Privacy-preserving microbiome analysis using secure computation.

    PubMed

    Wagner, Justin; Paulson, Joseph N; Wang, Xiao; Bhattacharjee, Bobby; Corrada Bravo, Héctor

    2016-06-15

    Developing targeted therapeutics and identifying biomarkers relies on large amounts of research participant data. Beyond human DNA, scientists now investigate the DNA of micro-organisms inhabiting the human body. Recent work shows that an individual's collection of microbial DNA consistently identifies that person and could be used to link a real-world identity to a sensitive attribute in a research dataset. Unfortunately, the current suite of DNA-specific privacy-preserving analysis tools does not meet the requirements for microbiome sequencing studies. To address privacy concerns around microbiome sequencing, we implement metagenomic analyses using secure computation. Our implementation allows comparative analysis over combined data without revealing the feature counts for any individual sample. We focus on three analyses and perform an evaluation on datasets currently used by the microbiome research community. We use our implementation to simulate sharing data between four policy-domains. Additionally, we describe an application of our implementation for patients to combine data that allows drug developers to query against and compensate patients for the analysis. The software is freely available for download at: http://cbcb.umd.edu/∼hcorrada/projects/secureseq.html Supplementary data are available at Bioinformatics online. hcorrada@umiacs.umd.edu. © The Author 2016. Published by Oxford University Press.

  1. 10 CFR 706.1 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS General § 706.1 Purpose. The purpose of this part is to set forth Department of Energy, hereinafter “DOE,” security policies and practices in the area of labor-management relations. ...

  2. 76 FR 35062 - Self-Regulatory Organizations; NYSE Arca, Inc.; Order Granting Approval of Proposed Rule Change...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-15

    ... 65% of the weight of the Fund. The Fund intends to invest in Money Market Securities \\11\\ in order to... derivative instruments. All Money Market Securities acquired by the Fund will be rated investment grade. The Fund does not intend to invest in any unrated Money Market Securities. \\11\\ For these purposes, Money...

  3. 75 FR 25002 - Notice of Applications for Deregistration Under Section 8(f) of the Investment Company Act of 1940

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-06

    ... securities and does not propose to make a public offering or engage in business of any kind. Filing Dates... their securities and do not propose to make a public offering or engage in business of any kind. Filing... SECURITIES AND EXCHANGE COMMISSION [Release No. IC-29263] Notice of Applications for...

  4. 31 CFR 363.45 - What are the rules for judicial and administrative actions involving securities held in...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... judicial proceeding involving competing claims to a security held in TreasuryDirect. (c) Divorce decree. We will recognize a divorce decree that either disposes of a security held in TreasuryDirect or ratifies a... divorce decree does not set out the terms of the property settlement agreement, we will require a...

  5. 31 CFR 363.45 - What are the rules for judicial and administrative actions involving securities held in...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... judicial proceeding involving competing claims to a security held in TreasuryDirect. (c) Divorce decree. We will recognize a divorce decree that either disposes of a security held in TreasuryDirect or ratifies a... divorce decree does not set out the terms of the property settlement agreement, we will require a...

  6. 31 CFR 363.45 - What are the rules for judicial and administrative actions involving securities held in...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... judicial proceeding involving competing claims to a security held in TreasuryDirect. (c) Divorce decree. We will recognize a divorce decree that either disposes of a security held in TreasuryDirect or ratifies a... divorce decree does not set out the terms of the property settlement agreement, we will require a...

  7. 31 CFR 363.45 - What are the rules for judicial and administrative actions involving securities held in...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... judicial proceeding involving competing claims to a security held in TreasuryDirect. (c) Divorce decree. We will recognize a divorce decree that either disposes of a security held in TreasuryDirect or ratifies a... divorce decree does not set out the terms of the property settlement agreement, we will require a...

  8. 31 CFR 363.45 - What are the rules for judicial and administrative actions involving securities held in...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... judicial proceeding involving competing claims to a security held in TreasuryDirect. (c) Divorce decree. We will recognize a divorce decree that either disposes of a security held in TreasuryDirect or ratifies a... divorce decree does not set out the terms of the property settlement agreement, we will require a...

  9. External Service Providers to the National Security Technology Incubator: Formalization of Relationships

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2008-04-30

    This report documents the formalization of relationships with external service providers in the development of the National Security Technology Incubator (NSTI). The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report summarizes the process in developing and formalizing relationships with those service providers and includes a sample letter of cooperation executed with each provider.

  10. ISCR FY2005 Annual Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Keyes, D E; McGraw, J R

    2006-02-02

    Large-scale scientific computation and all of the disciplines that support and help validate it have been placed at the focus of Lawrence Livermore National Laboratory (LLNL) by the Advanced Simulation and Computing (ASC) program of the National Nuclear Security Administration (NNSA) and the Scientific Discovery through Advanced Computing (SciDAC) initiative of the Office of Science of the Department of Energy (DOE). The maturation of simulation as a fundamental tool of scientific and engineering research is underscored in the President's Information Technology Advisory Committee (PITAC) June 2005 finding that ''computational science has become critical to scientific leadership, economic competitiveness, and nationalmore » security''. LLNL operates several of the world's most powerful computers--including today's single most powerful--and has undertaken some of the largest and most compute-intensive simulations ever performed, most notably the molecular dynamics simulation that sustained more than 100 Teraflop/s and won the 2005 Gordon Bell Prize. Ultrascale simulation has been identified as one of the highest priorities in DOE's facilities planning for the next two decades. However, computers at architectural extremes are notoriously difficult to use in an efficient manner. Furthermore, each successful terascale simulation only points out the need for much better ways of interacting with the resulting avalanche of data. Advances in scientific computing research have, therefore, never been more vital to the core missions of LLNL than at present. Computational science is evolving so rapidly along every one of its research fronts that to remain on the leading edge, LLNL must engage researchers at many academic centers of excellence. In FY 2005, the Institute for Scientific Computing Research (ISCR) served as one of LLNL's main bridges to the academic community with a program of collaborative subcontracts, visiting faculty, student internships, workshops, and an active seminar series. The ISCR identifies researchers from the academic community for computer science and computational science collaborations with LLNL and hosts them for both brief and extended visits with the aim of encouraging long-term academic research agendas that address LLNL research priorities. Through these collaborations, ideas and software flow in both directions, and LLNL cultivates its future workforce. The Institute strives to be LLNL's ''eyes and ears'' in the computer and information sciences, keeping the Laboratory aware of and connected to important external advances. It also attempts to be the ''hands and feet'' that carry those advances into the Laboratory and incorporate them into practice. ISCR research participants are integrated into LLNL's Computing Applications and Research (CAR) Department, especially into its Center for Applied Scientific Computing (CASC). In turn, these organizations address computational challenges arising throughout the rest of the Laboratory. Administratively, the ISCR flourishes under LLNL's University Relations Program (URP). Together with the other four institutes of the URP, the ISCR navigates a course that allows LLNL to benefit from academic exchanges while preserving national security. While it is difficult to operate an academic-like research enterprise within the context of a national security laboratory, the results declare the challenges well met and worth the continued effort. The pages of this annual report summarize the activities of the faculty members, postdoctoral researchers, students, and guests from industry and other laboratories who participated in LLNL's computational mission under the auspices of the ISCR during FY 2005.« less

  11. The Future of American Power: Energy and National Security

    DTIC Science & Technology

    2010-02-17

    8 What does it all mean ? .................................................................................................................. 11...renewable energy generation and usage within the United States. What does it all mean ? The United States must prepare for a future where the use of

  12. New Brunswick Laboratory. Progress report, October 1995--September 1996

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    Fiscal year (FY) 1996 was a very good year for New Brunswick Laboratory (NBL), whose major sponsor is the Office of Safeguards and Security (NN-51) in the US Department of Energy (DOE), Office of Nonproliferation and National Security, Office of Security Affairs. Several projects pertinent to the NBL mission were completed, and NBL`s interactions with partners and customers were encouraging. Among the partners with which NBL interacted in this report period were the International Atomic Energy Agency (IAEA), NN-51. Environmental Program Group of the DOE Chicago Operations Office, International Safeguards Project Office, Waste Isolation Pilot Plant (WIPP), Ukraine Working Group,more » Fissile Materials Assurance Working Group, National Institute of Standards and Technology (NIST), Nuclear Regulatory Commission (NRC), Institute for Reference Materials and Measurements (IRMM) in Belgium, Brazilian/Argentine Agency for Accounting and Control of Nuclear Materials (ABACC), Lockheed Idaho Technologies Company, and other DOE facilities and laboratories. NBL staff publications, participation in safeguards assistance and other nuclear programs, development of new reference materials, involvement in the updating and refinement of DOE documents, service in enhancing the science education of others, and other related activities enhanced NBL`s status among DOE laboratories and facilities. Noteworthy are the facts that NBL`s small inventory of nuclear materials is accurately accounted for, and, as in past years, its materials and human resources were used in peaceful nuclear activities worldwide.« less

  13. 75 FR 39266 - Privacy Act of 1974; Department of Homeland Security/ALL-029 Civil Rights and Civil Liberties...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-08

    ... religion, by employees and officials of the Department of Homeland Security. The Department's civil rights... country of origin/race/ religion (CRCL does not solicit this information, it is tracked if individuals...

  14. Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs—Summary Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    O'Neil, Lori Ross; Assante, Michael; Tobey, D. H.

    2013-07-01

    This document is a summarization of the report, Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs, the final report for phase 2 of the SPSP (DOE workforce study) project.

  15. The DOE Geothermal Data Repository and the Future of Geothermal Data

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Weers, Jon; Anderson, Arlene

    We are, right now, in the midst of the Data Revolution. Just as the Industrial Revolution of the early 1800's marked a major turning point in history with changes to manufacturing that influenced almost every aspect of daily life, the proliferation of big data and the evolution of our collective ability to put it to work for us is having a profound impact on our lives today. The U.S. Department of Energy's (DOE) Geothermal Data Repository (GDR) is leveraging new resources, such as the National Renewable Energy Laboratory's (NREL) new secure cloud environment, and cutting edge approaches to data analysis,more » to prepare for the challenges that data from energy and geosciences research presents. This paper will explore some of those challenges, highlight some of the benefits of data analysis, and explain the steps DOE and NREL are taking to ensure the GDR is ready for the future of geothermal data.« less

  16. Lawrence Livermore National Laboratory Environmental Report 2012

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jones, Henry E.; Armstrong, Dave; Blake, Rick G.

    Lawrence Livermore National Laboratory (LLNL) is a premier research laboratory that is part of the National Nuclear Security Administration (NNSA) within the U.S. Department of Energy (DOE). As a national security laboratory, LLNL is responsible for ensuring that the nation’s nuclear weapons remain safe, secure, and reliable. The Laboratory also meets other pressing national security needs, including countering the proliferation of weapons of mass destruction and strengthening homeland security, and conducting major research in atmospheric, earth, and energy sciences; bioscience and biotechnology; and engineering, basic science, and advanced technology. The Laboratory is managed and operated by Lawrence Livermore National Security,more » LLC (LLNS), and serves as a scientific resource to the U.S. government and a partner to industry and academia. LLNL operations have the potential to release a variety of constituents into the environment via atmospheric, surface water, and groundwater pathways. Some of the constituents, such as particles from diesel engines, are common at many types of facilities while others, such as radionuclides, are unique to research facilities like LLNL. All releases are highly regulated and carefully monitored. LLNL strives to maintain a safe, secure and efficient operational environment for its employees and neighboring communities. Experts in environment, safety and health (ES&H) support all Laboratory activities. LLNL’s radiological control program ensures that radiological exposures and releases are reduced to as low as reasonably achievable to protect the health and safety of its employees, contractors, the public, and the environment. LLNL is committed to enhancing its environmental stewardship and managing the impacts its operations may have on the environment through a formal Environmental Management System. The Laboratory encourages the public to participate in matters related to the Laboratory’s environmental impact on the community by soliciting citizens’ input on matters of significant public interest and through various communications. The Laboratory also provides public access to information on its ES&H activities. LLNL consists of two sites—an urban site in Livermore, California, referred to as the “Livermore Site,” which occupies 1.3 square miles; and a rural Experimental Test Site, referred to as “Site 300,” near Tracy, California, which occupies 10.9 square miles. In 2012 the Laboratory had a staff of approximately 7000.« less

  17. Lawrence Livermore National Laboratory Environmental Report 2013

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jones, H. E.; Bertoldo, N. A.; Blake, R. G.

    Lawrence Livermore National Laboratory (LLNL) is a premier research laboratory that is part of the National Nuclear Security Administration (NNSA) within the U.S. Department of Energy (DOE). As a national security laboratory, LLNL is responsible for ensuring that the nation’s nuclear weapons remain safe, secure, and reliable. The Laboratory also meets other pressing national security needs, including countering the proliferation of weapons of mass destruction and strengthening homeland security, and conducting major research in atmospheric, earth, and energy sciences; bioscience and biotechnology; and engineering, basic science, and advanced technology. The Laboratory is managed and operated by Lawrence Livermore National Security,more » LLC (LLNS), and serves as a scientific resource to the U.S. government and a partner to industry and academia. LLNL operations have the potential to release a variety of constituents into the environment via atmospheric, surface water, and groundwater pathways. Some of the constituents, such as particles from diesel engines, are common at many types of facilities while others, such as radionuclides, are unique to research facilities like LLNL. All releases are highly regulated and carefully monitored. LLNL strives to maintain a safe, secure and efficient operational environment for its employees and neighboring communities. Experts in environment, safety and health (ES&H) support all Laboratory activities. LLNL’s radiological control program ensures that radiological exposures and releases are reduced to as low as reasonably achievable to protect the health and safety of its employees, contractors, the public, and the environment. LLNL is committed to enhancing its environmental stewardship and managing the impacts its operations may have on the environment through a formal Environmental Management System. The Laboratory encourages the public to participate in matters related to the Laboratory’s environmental impact on the community by soliciting citizens’ input on matters of significant public interest and through various communications. The Laboratory also provides public access to information on its ES&H activities. LLNL consists of two sites—an urban site in Livermore, California, referred to as the “Livermore Site,” which occupies 1.3 square miles; and a rural Experimental Test Site, referred to as “Site 300,” near Tracy, California, which occupies 10.9 square miles. In 2013 the Laboratory had a staff of approximately 6,300.« less

  18. 2 CFR 3000.20 - Does this part apply to me?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 2 Grants and Agreements 1 2011-01-01 2011-01-01 false Does this part apply to me? 3000.20 Section 3000.20 Grants and Agreements Federal Agency Regulations for Grants and Agreements DEPARTMENT OF HOMELAND SECURITY NONPROCUREMENT DEBARMENT AND SUSPENSION § 3000.20 Does this part apply to me? This part...

  19. 2 CFR 2339.20 - Does this part apply to me?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 2 Grants and Agreements 1 2013-01-01 2013-01-01 false Does this part apply to me? 2339.20 Section 2339.20 Grants and Agreements Federal Agency Regulations for Grants and Agreements SOCIAL SECURITY ADMINISTRATION REQUIREMENTS FOR DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE) § 2339.20 Does this part apply to me...

  20. 2 CFR 3000.20 - Does this part apply to me?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 2 Grants and Agreements 1 2010-01-01 2010-01-01 false Does this part apply to me? 3000.20 Section 3000.20 Grants and Agreements Federal Agency Regulations for Grants and Agreements DEPARTMENT OF HOMELAND SECURITY NONPROCUREMENT DEBARMENT AND SUSPENSION § 3000.20 Does this part apply to me? This part...

  1. 2 CFR 2336.20 - Does this part apply to me?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 2 Grants and Agreements 1 2012-01-01 2012-01-01 false Does this part apply to me? 2336.20 Section 2336.20 Grants and Agreements Federal Agency Regulations for Grants and Agreements SOCIAL SECURITY ADMINISTRATION NONPROCUREMENT DEBARMENT AND SUSPENSION § 2336.20 Does this part apply to me? This part and...

  2. 20 CFR 439.105 - Does this part apply to me?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Does this part apply to me? 439.105 Section 439.105 Employees' Benefits SOCIAL SECURITY ADMINISTRATION GOVERNMENTWIDE REQUIREMENTS FOR DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE) Purpose and Coverage § 439.105 Does this part apply to me? (a) Portions of...

  3. 2 CFR 2339.20 - Does this part apply to me?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 2 Grants and Agreements 1 2011-01-01 2011-01-01 false Does this part apply to me? 2339.20 Section 2339.20 Grants and Agreements Federal Agency Regulations for Grants and Agreements SOCIAL SECURITY ADMINISTRATION REQUIREMENTS FOR DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE) § 2339.20 Does this part apply to me...

  4. 2 CFR 2339.20 - Does this part apply to me?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 2 Grants and Agreements 1 2012-01-01 2012-01-01 false Does this part apply to me? 2339.20 Section 2339.20 Grants and Agreements Federal Agency Regulations for Grants and Agreements SOCIAL SECURITY ADMINISTRATION REQUIREMENTS FOR DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE) § 2339.20 Does this part apply to me...

  5. 2 CFR 3000.20 - Does this part apply to me?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 2 Grants and Agreements 1 2012-01-01 2012-01-01 false Does this part apply to me? 3000.20 Section 3000.20 Grants and Agreements Federal Agency Regulations for Grants and Agreements DEPARTMENT OF HOMELAND SECURITY NONPROCUREMENT DEBARMENT AND SUSPENSION § 3000.20 Does this part apply to me? This part...

  6. 2 CFR 2336.20 - Does this part apply to me?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 2 Grants and Agreements 1 2010-01-01 2010-01-01 false Does this part apply to me? 2336.20 Section 2336.20 Grants and Agreements Federal Agency Regulations for Grants and Agreements SOCIAL SECURITY ADMINISTRATION NONPROCUREMENT DEBARMENT AND SUSPENSION § 2336.20 Does this part apply to me? This part and...

  7. 2 CFR 2336.20 - Does this part apply to me?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 2 Grants and Agreements 1 2011-01-01 2011-01-01 false Does this part apply to me? 2336.20 Section 2336.20 Grants and Agreements Federal Agency Regulations for Grants and Agreements SOCIAL SECURITY ADMINISTRATION NONPROCUREMENT DEBARMENT AND SUSPENSION § 2336.20 Does this part apply to me? This part and...

  8. 2 CFR 2336.20 - Does this part apply to me?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 2 Grants and Agreements 1 2013-01-01 2013-01-01 false Does this part apply to me? 2336.20 Section 2336.20 Grants and Agreements Federal Agency Regulations for Grants and Agreements SOCIAL SECURITY ADMINISTRATION NONPROCUREMENT DEBARMENT AND SUSPENSION § 2336.20 Does this part apply to me? This part and...

  9. 45 CFR 283.1 - What does this part cover?

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 2 2014-10-01 2012-10-01 true What does this part cover? 283.1 Section 283.1 Public Welfare Regulations Relating to Public Welfare OFFICE OF FAMILY ASSISTANCE (ASSISTANCE PROGRAMS...)(2) OF THE SOCIAL SECURITY ACT BONUS TO REWARD DECREASE IN ILLEGITIMACY RATIO § 283.1 What does this...

  10. 45 CFR 286.1 - What does this part cover?

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 2 2014-10-01 2012-10-01 true What does this part cover? 286.1 Section 286.1 Public Welfare Regulations Relating to Public Welfare OFFICE OF FAMILY ASSISTANCE (ASSISTANCE PROGRAMS... Tribal TANF Provisions § 286.1 What does this part cover? Section 412 of the Social Security Act allows...

  11. 45 CFR 283.1 - What does this part cover?

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 2 2011-10-01 2011-10-01 false What does this part cover? 283.1 Section 283.1 Public Welfare Regulations Relating to Public Welfare OFFICE OF FAMILY ASSISTANCE (ASSISTANCE PROGRAMS...)(2) OF THE SOCIAL SECURITY ACT BONUS TO REWARD DECREASE IN ILLEGITIMACY RATIO § 283.1 What does this...

  12. 45 CFR 283.1 - What does this part cover?

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 2 2010-10-01 2010-10-01 false What does this part cover? 283.1 Section 283.1 Public Welfare Regulations Relating to Public Welfare OFFICE OF FAMILY ASSISTANCE (ASSISTANCE PROGRAMS...)(2) OF THE SOCIAL SECURITY ACT BONUS TO REWARD DECREASE IN ILLEGITIMACY RATIO § 283.1 What does this...

  13. 45 CFR 283.1 - What does this part cover?

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 2 2013-10-01 2012-10-01 true What does this part cover? 283.1 Section 283.1 Public Welfare Regulations Relating to Public Welfare OFFICE OF FAMILY ASSISTANCE (ASSISTANCE PROGRAMS...)(2) OF THE SOCIAL SECURITY ACT BONUS TO REWARD DECREASE IN ILLEGITIMACY RATIO § 283.1 What does this...

  14. 45 CFR 286.1 - What does this part cover?

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 2 2011-10-01 2011-10-01 false What does this part cover? 286.1 Section 286.1 Public Welfare Regulations Relating to Public Welfare OFFICE OF FAMILY ASSISTANCE (ASSISTANCE PROGRAMS... Tribal TANF Provisions § 286.1 What does this part cover? Section 412 of the Social Security Act allows...

  15. 45 CFR 283.1 - What does this part cover?

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 2 2012-10-01 2012-10-01 false What does this part cover? 283.1 Section 283.1 Public Welfare Regulations Relating to Public Welfare OFFICE OF FAMILY ASSISTANCE (ASSISTANCE PROGRAMS...)(2) OF THE SOCIAL SECURITY ACT BONUS TO REWARD DECREASE IN ILLEGITIMACY RATIO § 283.1 What does this...

  16. 76 FR 42686 - DOE Response to Recommendation 2011-1 of the Defense Nuclear Facilities Safety Board, Safety...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-19

    ... DEPARTMENT OF ENERGY DOE Response to Recommendation 2011-1 of the Defense Nuclear Facilities... Nuclear Facilities Safety Board, Office of Health, Safety and Security, U.S. Department of Energy, 1000... Department of Energy (DOE) acknowledges receipt of Defense Nuclear Facilities Safety Board (Board...

  17. 31 CFR 356.25 - How does the settlement process work?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false How does the settlement process work? 356.25 Section 356.25 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued...) Determination of Auction Awards; Settlement § 356.25 How does the settlement process work? Securities bought in...

  18. Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols

    PubMed Central

    Nam, Junghyun; Kim, Moonseong

    2014-01-01

    We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. In this paper, we prove the security of the SM2 protocol in the widely accepted indistinguishability-based Bellare-Rogaway model under the elliptic curve discrete logarithm problem (ECDLP) assumption. We also present a simplified and more efficient version of the SM2 protocol with an accompanying security proof. PMID:25276863

  19. [The Clinical Investigation Centers in France: Whatzat? What for? How does it work?].

    PubMed

    Montagne, O; Le Corvoisier, P

    2008-01-01

    For the last 15 years, French university-affiliated hospitals have dramatically modified how biomedical research is conducted in France. Multidisciplinary and technically complex research projects are increasingly difficult to conduct in clinical units. To ensure quality, good clinical practice, and security, platforms dedicated to clinical research with specific staff have been implanted. These units, called Clinical Investigation Centers (CICs), are open to academic and industrial investigators working in the medical fields involving patients and healthy volunteers. The CICs' activities are always closely related to the university hospital research programs and can also serve as a tool for locally implanted clinical and fundamental research teams (INSERM). Nowadays, clinical research requires specific tools and platforms. To enhance French university hospital research efficiency and provide a more open research environment, all investigators, on-site as well as from other institutions, are invited to use these cohesive research facilities and skills to conduct protocols that are fully adapted to their needs in optimal conditions of professional clinical research.

  20. Input from Key Stakeholders in the National Security Technology Incubator

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    This report documents the input from key stakeholders of the National Security Technology Incubator (NSTI) in developing a new technology incubator and related programs for southern New Mexico. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes identification of key stakeholders as well as a description and analysis of their input for the development of an incubator.

  1. The New Pacific Security Environment: Challenges and Opportunities

    DTIC Science & Technology

    1993-01-01

    Retreat 249 Doug Bandow 17. Playing Catch Among the Crystal: Planning Tomorrow’s Pacific Security Today 253 Charles R. Larson viii 18. Does...much it may be in the interest of Asian nations to have us stay. he argues, it is in our interest to leave. Admiral Charles Larson would no doubt...Tomorrow’s Pacific Security Today Charles R. Larson I’M PLEASED TO RFPORT OUR SECURITY POST- ure in the Pacific is in good shape. And I’m optimistic our

  2. Security of the Five-Round KASUMI Type Permutation

    NASA Astrophysics Data System (ADS)

    Iwata, Tetsu; Yagi, Tohru; Kurosawa, Kaoru

    KASUMI is a blockcipher that forms the heart of the 3GPP confidentiality and integrity algorithms. In this paper, we study the security of the five-round KASUMI type permutations, and derive a highly non-trivial security bound against adversaries with adaptive chosen plaintext and chosen ciphertext attacks. To derive our security bound, we heavily use the tools from graph theory. However the result does not show its super-pseudorandomness, this gives us a strong evidence that the design of KASUMI is sound.

  3. Basic research needs to assure a secure energy future. A report from the Basic Energy Sciences Advisory Committee

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    This report has highlighted many of the possible fundamental research areas that will help our country avoid a future energy crisis. The report may not have adequately captured the atmosphere of concern that permeated the discussions at the workshop. The difficulties facing our nation and the world in meeting our energy needs over the next several decades are very challenging. It was generally felt that traditional solutions and approaches will not solve the total energy problem. Knowledge that does not exist must be obtained to address both the quantity of energy needed to increase the standard of living world-wide andmore » the quality of energy generation needed to preserve the environment. In terms of investments, it was clear that there is no single research area that will secure the future energy supply. A diverse range of economic energy sources will be required--and a broad range of fundamental research is needed to enable these. Many of the issues fall into the traditional materials and chemical sciences research areas, but with specific emphasis on understanding mechanisms, energy related phenomena, and pursuing novel directions in, for example, nanoscience and integrated modeling. An important result from the discussions, which is hopefully apparent from the brief presentations above, is that the problems that must be dealt with are truly multidisciplinary. This means that they require the participation of investigators with different skill sets. Basic science skills have to be complemented by awareness of the overall nature of the problem in a national and world context, and with knowledge of the engineering, design, and control issues in any eventual solution. It is necessary to find ways in which this can be done while still preserving the ability to do first-class basic science. The traditional structure of research, with specific disciplinary groupings, will not be sufficient. This presents great challenges and opportunities for the funders of the research that must be done. For example, the applied research programs in the DOE need a greater awareness of the user facilities and an understanding of how to use them to solve their unique problems. The discussions reinforced what all of the participants already knew: the issue of energy security is of major importance both for the U.S. and for the world. Furthermore, it is clear that major changes in the primary energy sources, in energy conversion, and in energy use, must be achieved within the next fifty years. This time scale is determined by two drivers: increasing world population and increasing expectations of that population. Much of the research and development currently being done are concerned with incremental improvements in what has been done in the immediate past; and it is necessary to take this path because improvements will be needed across the board. These advances extend the period before the radical changes have to be made; however, they will not solve the underlying, long-range problem. The Subpanel recommends that a major program be funded to conduct a multidisciplinary research program to address the issues to ensure a secure energy future for the U.S. It is necessary to recognize that this program must be ensured of a long-term stability. It is also necessary that a management and funding structure appropriate for such an approach be developed. The Department of Energy's Office of Basic Energy Sciences is well positioned to support this initiative by enhancement of their already world-class scientific research programs and user facilities.« less

  4. A security/safety survey of long term care facilities.

    PubMed

    Acorn, Jonathan R

    2010-01-01

    What are the major security/safety problems of long term care facilities? What steps are being taken by some facilities to mitigate such problems? Answers to these questions can be found in a survey of IAHSS members involved in long term care security conducted for the IAHSS Long Term Care Security Task Force. The survey, the author points out, focuses primarily on long term care facilities operated by hospitals and health systems. However, he believes, it does accurately reflect the security problems most long term facilities face, and presents valuable information on security systems and practices which should be also considered by independent and chain operated facilities.

  5. E PLURIBUS UNUM Homeland Security versus Homeland Defense Who Does What and to Whom

    DTIC Science & Technology

    2010-04-01

    112 APPENDIX IV: SWOT ANALYSIS ............................................................................. 113 APPENDIX V...violent extremism taking root here in the United States. We don‘t have the luxury of focusing our efforts on one group ; we must protect the country from... group that engages in an activity referred to in subparagraph (A). 12 The National Security Act of 1947 created the National Security Council

  6. Contemporary United States Foreign Policy Towards Indonesia

    DTIC Science & Technology

    2004-01-01

    regard to resolving a number of longstanding territorial disputes, and it has become a cornerstone for the promotion of economic and social development...and stability and security in the region. However, Indonesia is also faced with a variety of social , economic, and internal security issues, most...faced with significant social , economic, and security issues. Thesis Question The thesis question is: Does contemporary US policy promote US national

  7. 10 CFR 706.10 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies and Procedures in... within the scope of the Labor Management Relations Act at the various DOE installations should be conducted in normal fashion whereever possible, on the basis of open hearings, unclassified records and...

  8. 10 CFR 706.10 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies and Procedures in... within the scope of the Labor Management Relations Act at the various DOE installations should be conducted in normal fashion whereever possible, on the basis of open hearings, unclassified records and...

  9. 10 CFR 824.9 - Hearing Counsel.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Hearing Counsel. 824.9 Section 824.9 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY... consistent with the objectives of the Act and DOE security requirements. ...

  10. 10 CFR 824.9 - Hearing Counsel.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Hearing Counsel. 824.9 Section 824.9 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY... consistent with the objectives of the Act and DOE security requirements. ...

  11. 5 CFR 2634.305 - Liabilities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Administrative Personnel OFFICE OF GOVERNMENT ETHICS GOVERNMENT ETHICS EXECUTIVE BRANCH FINANCIAL DISCLOSURE... vehicle, household furniture, or appliances, provided that the loan does not exceed the purchase price of...,000, secured by family automobile purchased for $16,200. 6. Loan balance of $10,500, secured by...

  12. Towards a Scalable Group Vehicle-based Security System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Carter, Jason M

    2016-01-01

    In August 2014, the National Highway Traffic Safety Administration (NHTSA) proposed new rulemaking to require V2V communication in light vehicles. To establish trust in the basic safety messages (BSMs) that are exchanged by vehicles to improve driver safety, a vehicle public key infrastructure (VPKI) is required. We outline a system where a group or groups of vehicles manage and generate their own BSM signing keys and authenticating certificates -- a Vehicle-Based Security System (VBSS). Based on our preliminary examination, we assert the mechanisms exist to implement a VBSS that supports V2V communications; however, maintaining uniform trust throughout the system whilemore » protecting individual privacy does require reliance on nascent group signature technology which may require a significant amount of communication overhead for trust maintenance. To better evaluate the VBSS approach, we compare it to the proposed Security Credential Management System (SCMS) in four major areas including bootstrapping, pseudonym provisioning, BSM signing and authentication, and revocation. System scale, driver privacy, and the distribution and dynamics of participants make designing an effective VPKI an interesting and challenging problem; no clear-cut strategy exists to satisfy the security and privacy expectations in a highly efficient way. More work is needed in VPKI research, so the life-saving promise of V2V technology can be achieved.« less

  13. Learning Competitive Intelligence from a Bunch of Screwballs

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Troy Hiltbrand

    Idaho National Laboratory is the Department of Energy’s (DOE) lead lab for nuclear energy research and is dedicated to supporting the advancement of missions in nuclear energy research, energy and environment, and national security. The laboratory is operated by Battelle Energy Alliance (BEA) and participates both independently and jointly with other labs in the support of work for the DOE and other government organizations. The Information Management department is a key support organization whose purpose is to enable the three key areas supporting the Laboratory mission, Nuclear Energy, National and Homeland Security, and Energy and Environment, are successful. The challengemore » that we face is having relevant information about what these key areas of the Laboratory are working on and how we can best support them in achieving overall mission success. In addition, one of the major challenges that they face comes with knowing their customers and their customer’s needs so that they can successfully execute on their mission. Technology Application Organizations today are dependent on understanding their customers and competitors so that they can respond accordingly, but this can be a difficult and vexing challenge. Customers do not always reveal all of their needs and competitors rarely come out and reveal what they are doing, but this does not mean that hints about their plans are not abundant in information that is readily available. The challenge has always been how to keep track of all that is happening and converting that into useful information. Taking the lead from the “Screwball Division” from World War II, we have the tools available to automate this process and start to mine the Internet to get clues of what our customers and competitors are actively working on. By looking at what is being said and relating that to what else is being said, we can build competitive intelligence and act upon this to further our organizational objectives.« less

  14. 42 CFR 435.219 - Individuals receiving State plan home and community-based services.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... that does not exceed 150 percent of the Federal poverty line (FPL); (3) Meet the needs-based criteria...) Have income that does not exceed 300 percent of the Supplemental Security Income Federal Benefit Rate...

  15. How Much Security Does Your Library Need?

    ERIC Educational Resources Information Center

    Banerjee, Kyle

    2003-01-01

    Explains how to keep library systems healthy and functioning by taking sensible security measures. Examines why hackers would target library systems and how library systems are compromised. Describes tools that can help, including: firewalls; antivirus software; alarms; network analysis tools; and encryption. Identifies several strategies for…

  16. Cryotherapy does not affect peroneal reaction following sudden inversion.

    PubMed

    Berg, Christine L; Hart, Joseph M; Palmieri-Smith, Riann; Cross, Kevin M; Ingersoll, Christopher D

    2007-11-01

    If ankle joint cryotherapy impairs the ability of the ankle musculature to counteract potentially injurious forces, the ankle is left vulnerable to injury. To compare peroneal reaction to sudden inversion following ankle joint cryotherapy. Repeated measures design with independent variables, treatment (cryotherapy and control), and time (baseline, immediately post treatment, 15 minutes post treatment, and 30 minutes post treatment). University research laboratory. Twenty-seven healthy volunteers. An ice bag was secured to the lateral ankle joint for 20 minutes. The onset and average root mean square amplitude of EMG activity in the peroneal muscles was calculated following the release of a trap door mechanism causing inversion. There was no statistically significant change from baseline for peroneal reaction time or average peroneal muscle activity at any post treatment time. Cryotherapy does not affect peroneal muscle reaction following sudden inversion perturbation.

  17. 12 CFR Appendix B to Part 30 - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... any record about an individual, whether in paper, electronic, or other form, that is a consumer report... term does not include any record that does not identify an individual. i. Examples. (1) Consumer... individual who applies for but does not receive a loan, including any loan sought by an individual for a...

  18. 12 CFR Appendix B to Subpart B of... - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... apply: a. Consumer information means any record about an individual, whether in paper, electronic, or... compilation of such records. The term does not include any record that does not identify an individual. i... report that you obtain about an individual who applies for but does not receive a loan, including any...

  19. 12 CFR Appendix B to Subpart B of... - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... apply: a. Consumer information means any record about an individual, whether in paper, electronic, or... compilation of such records. The term does not include any record that does not identify an individual. i... report that you obtain about an individual who applies for but does not receive a loan, including any...

  20. 12 CFR Appendix B to Part 570 - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... apply: a. Consumer information means any record about an individual, whether in paper, electronic, or... compilation of such records. The term does not include any record that does not identify an individual. i... obtain about an individual who applies for but does not receive a loan, including any loan sought by an...

  1. 12 CFR Appendix B to Part 30 - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... any record about an individual, whether in paper, electronic, or other form, that is a consumer report... term does not include any record that does not identify an individual. i. Examples. (1) Consumer... individual who applies for but does not receive a loan, including any loan sought by an individual for a...

  2. Proceedings of the 22nd Annual DoD/DOE Seismic Research Symposium: Planning for Verification of and Compliance with the Comprehensive Nuclear-Test-Ban Treaty (CTBT)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nichols, James W., LTC

    2000-09-15

    These proceedings contain papers prepared for the 22nd Annual DoD/DOE Seismic Research Symposium: Planning for Verification of and Compliance with the Comprehensive Nuclear-Test-Ban Treaty (CTBT), held 13-15 September 2000 in New Orleans, Louisiana. These papers represent the combined research related to ground-based nuclear explosion monitoring funded by the National Nuclear Security Administration (NNSA), Defense Threat Reduction Agency (DTRA), Air Force Technical Applications Center (AFTAC), Department of Defense (DoD), US Army Space and Missile Defense Command, Defense Special Weapons Agency (DSWA), and other invited sponsors. The scientific objectives of the research are to improve the United States capability to detect, locate,more » and identify nuclear explosions. The purpose of the meeting is to provide the sponsoring agencies, as well as potential users, an opportunity to review research accomplished during the preceding year and to discuss areas of investigation for the coming year. For the researchers, it provides a forum for the exchange of scientific information toward achieving program goals, and an opportunity to discuss results and future plans. Paper topics include: seismic regionalization and calibration; detection and location of sources; wave propagation from source to receiver; the nature of seismic sources, including mining practices; hydroacoustic, infrasound, and radionuclide methods; on-site inspection; and data processing.« less

  3. Investigation of Titanium Dioxide and Indium Vanadate-Titanium Dioxide semiconductors for the photocatalytic degradation of aqueous organics

    NASA Astrophysics Data System (ADS)

    Pettit, Sandra L.

    Designing and constructing safe, secure and cost-effective buildings has always been the goal of architects, engineers, developers and community officials. However, in light of recent tragic events, urban security design has become a major concern for both public and private building owners as the threat of terrorism attacks becomes more evident. Modern research and technology have provided a means to counter some of these threats, but there is little doubt that the need for physical security design will continue to increase as long as there are conflicting social, religious, and political agendas in the world. Parallel to this trend, the desire for aesthetically pleasing structures and architecture which pushes the envelope of typical building design make designing a secure, blast and fire resistant building a challenge, as many protective measures clash with the desires of architects. As a result, development of construction materials and technologies with respect to security is on the rise and there is a need for comprehensive solutions. Research into the behavior of stainless steel may prove it to be an elegant and efficient solution to a secure structural design which does not compromise a building's architecture. As a material that is often chosen for its aesthetic appeal, it also exhibits excellent ductility and high stress-strain rates, allowing it to absorb large amounts of energy from blasts before fracturing, compared to carbon steel. Stainless steel also exhibits superior fire-resisting qualities and can perform similarly to carbon steels without unsightly added fire protection. Using stainless steel for elements which have been identified as vulnerable to attack, such as a major column or transfer girder, or elements which can protect the rest of structure from a blast, such as a blast wall, can be an efficient component of a comprehensive urban security design. The challenges associated with the use of stainless steel, which has kept its use in structural design to a minimum, such as higher costs, availability, or special welding procedures, are minimal and will be easily overcome as the use of stainless steel in structure increases and designers and fabricators become more familiar with the material.

  4. ISCR Annual Report: Fical Year 2004

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McGraw, J R

    2005-03-03

    Large-scale scientific computation and all of the disciplines that support and help to validate it have been placed at the focus of Lawrence Livermore National Laboratory (LLNL) by the Advanced Simulation and Computing (ASC) program of the National Nuclear Security Administration (NNSA) and the Scientific Discovery through Advanced Computing (SciDAC) initiative of the Office of Science of the Department of Energy (DOE). The maturation of computational simulation as a tool of scientific and engineering research is underscored in the November 2004 statement of the Secretary of Energy that, ''high performance computing is the backbone of the nation's science and technologymore » enterprise''. LLNL operates several of the world's most powerful computers--including today's single most powerful--and has undertaken some of the largest and most compute-intensive simulations ever performed. Ultrascale simulation has been identified as one of the highest priorities in DOE's facilities planning for the next two decades. However, computers at architectural extremes are notoriously difficult to use efficiently. Furthermore, each successful terascale simulation only points out the need for much better ways of interacting with the resulting avalanche of data. Advances in scientific computing research have, therefore, never been more vital to LLNL's core missions than at present. Computational science is evolving so rapidly along every one of its research fronts that to remain on the leading edge, LLNL must engage researchers at many academic centers of excellence. In Fiscal Year 2004, the Institute for Scientific Computing Research (ISCR) served as one of LLNL's main bridges to the academic community with a program of collaborative subcontracts, visiting faculty, student internships, workshops, and an active seminar series. The ISCR identifies researchers from the academic community for computer science and computational science collaborations with LLNL and hosts them for short- and long-term visits with the aim of encouraging long-term academic research agendas that address LLNL's research priorities. Through such collaborations, ideas and software flow in both directions, and LLNL cultivates its future workforce. The Institute strives to be LLNL's ''eyes and ears'' in the computer and information sciences, keeping the Laboratory aware of and connected to important external advances. It also attempts to be the ''feet and hands'' that carry those advances into the Laboratory and incorporates them into practice. ISCR research participants are integrated into LLNL's Computing and Applied Research (CAR) Department, especially into its Center for Applied Scientific Computing (CASC). In turn, these organizations address computational challenges arising throughout the rest of the Laboratory. Administratively, the ISCR flourishes under LLNL's University Relations Program (URP). Together with the other five institutes of the URP, it navigates a course that allows LLNL to benefit from academic exchanges while preserving national security. While it is difficult to operate an academic-like research enterprise within the context of a national security laboratory, the results declare the challenges well met and worth the continued effort.« less

  5. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sjoreen, Terrence P

    The Oak Ridge National Laboratory (ORNL) Laboratory Directed Research and Development (LDRD) program reports its status to the U.S. Department of Energy (DOE) in March of each year. The program operates under the authority of DOE Order 413.2B, 'Laboratory Directed Research and Development' (April 19, 2006), which establishes DOE's requirements for the program while providing the Laboratory Director broad flexibility for program implementation. LDRD funds are obtained through a charge to all Laboratory programs. This report includes summaries for all ORNL LDRD research activities supported during FY 2007. The associated FY 2007 ORNL LDRD Self-Assessment (ORNL/PPA-2008/2) provides financial data andmore » an internal evaluation of the program's management process. ORNL is a DOE multiprogram science, technology, and energy laboratory with distinctive capabilities in materials science and engineering, neutron science and technology, energy production and end-use technologies, biological and environmental science, and scientific computing. With these capabilities ORNL conducts basic and applied research and development (R&D) to support DOE's overarching mission to advance the national, economic, and energy security of the United States and promote scientific and technological innovation in support of that mission. As a national resource, the Laboratory also applies its capabilities and skills to specific needs of other federal agencies and customers through the DOE Work for Others (WFO) program. Information about the Laboratory and its programs is available on the Internet at http://www.ornl.gov/. LDRD is a relatively small but vital DOE program that allows ORNL, as well as other DOE laboratories, to select a limited number of R&D projects for the purpose of: (1) maintaining the scientific and technical vitality of the Laboratory; (2) enhancing the Laboratory's ability to address future DOE missions; (3) fostering creativity and stimulating exploration of forefront science and technology; (4) serving as a proving ground for new research; and (5) supporting high-risk, potentially high-value R&D. Through LDRD the Laboratory is able to improve its distinctive capabilities and enhance its ability to conduct cutting-edge R&D for its DOE and WFO sponsors. To meet the LDRD objectives and fulfill the particular needs of the Laboratory, ORNL has established a program with two components: the Director's R&D Fund and the Seed Money Fund. As outlined in Table 1, these two funds are complementary. The Director's R&D Fund develops new capabilities in support of the Laboratory initiatives, while the Seed Money Fund is open to all innovative ideas that have the potential for enhancing the Laboratory's core scientific and technical competencies. Provision for multiple routes of access to ORNL LDRD funds maximizes the likelihood that novel ideas with scientific and technological merit will be recognized and supported.« less

  6. Radiological Threat Reduction (RTR) program : implementing physical security to protect large radioactive sources worldwide.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lowe, Daniel L.

    2004-11-01

    The U.S. Department of Energy's Radiological Threat Reduction (RTR) Program strives to reduce the threat of a Radiological Dispersion Device (RDD) incident that could affect U.S. interests worldwide. Sandia National Laboratories supports the RTR program on many different levels. Sandia works directly with DOE to develop strategies, including the selection of countries to receive support and the identification of radioactive materials to be protected. Sandia also works with DOE in the development of guidelines and in training DOE project managers in physical protection principles. Other support to DOE includes performing rapid assessments and providing guidance for establishing foreign regulatory andmore » knowledge infrastructure. Sandia works directly with foreign governments to establish cooperative agreements necessary to implement the RTR Program efforts to protect radioactive sources. Once necessary agreements are in place, Sandia works with in-country organizations to implement various security related initiatives, such as installing security systems and searching for (and securing) orphaned radioactive sources. The radioactive materials of interest to the RTR program include Cobalt 60, Cesium 137, Strontium 90, Iridium 192, Radium 226, Plutonium 238, Americium 241, Californium 252, and Others. Security systems are implemented using a standardized approach that provides consistency through out the RTR program efforts at Sandia. The approach incorporates a series of major tasks that overlap in order to provide continuity. The major task sequence is to: Establish in-country contacts - integrators, Obtain material characterizations, Perform site assessments and vulnerability assessments, Develop upgrade plans, Procure and install equipment, Conduct acceptance testing and performance testing, Develop procedures, and Conduct training. Other tasks are incorporated as appropriate and commonly include such as support of reconfiguring infrastructure, and developing security plans, etc. This standardized approach is applied to specific country and regional needs. Recent examples (FY 2003-2004) include foreign missions to Lithuania, Russian Federation Navy, Russia - PNPI, Greece (joint mission with IAEA), Tanzania, Iraq, Chile, Ecuador, and Egypt. Some of the ambitions and results of the RTR program may be characterized by the successes in Lithuania, Greece, and Russia.« less

  7. Medical ethics surveillance in the Armed Forces.

    PubMed

    Pearn, J

    2000-05-01

    Modern defense services depend on a policy of the vigorous promotion of research to ensure that they retain an advantage in any future operational context. Research involving personnel within the armed forces, however, has certain constraints with respect to contemporary, best-practice medical ethics. Service members are one example of a class of "captive subjects" who require special protection in the context of medical research. (Prisoners, students, children, and the intellectually disabled are other such examples.) The majority of national defense forces now have ethical watchdog groups--institutional ethics committees--that oversee research involving service members. Such groups monitor the special considerations and constraints under which subjects in uniform can volunteer for biological research. These committees audit particularly the ethical themes of confidentiality, equality, and justice. Themes inherent in medical research in the military include the standard Beauchamp-Childress paradigm of autonomy, beneficence, nonmaleficence, and justice, to which are added the traditional military values of loyalty, respect, courtesy, and chivalry. Contemporary thinking is that the general principle of affording service members the opportunity to volunteer for research should be maintained within the constraints of compromised training time, national security, and operational necessity. Most biological research (and its outcome) does not in practice compromise confidentiality or military security. This paper presents an audit of the functioning of one national military medical ethics committee, the Australian Defence Medical Ethics Committee, and presents a discussion of its philosophies and influence within the broader military context. The Australian Defence Medical Ethics Committee believes that most research should, as an a priori condition of approval, be intended for open publication in peer-reviewed journals.

  8. Smart Grid Demonstration Project

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Miller, Craig; Carroll, Paul; Bell, Abigail

    The National Rural Electric Cooperative Association (NRECA) organized the NRECA-U.S. Department of Energy (DOE) Smart Grid Demonstration Project (DE-OE0000222) to install and study a broad range of advanced smart grid technologies in a demonstration that spanned 23 electric cooperatives in 12 states. More than 205,444 pieces of electronic equipment and more than 100,000 minor items (bracket, labels, mounting hardware, fiber optic cable, etc.) were installed to upgrade and enhance the efficiency, reliability, and resiliency of the power networks at the participating co-ops. The objective of this project was to build a path for other electric utilities, and particularly electrical cooperatives,more » to adopt emerging smart grid technology when it can improve utility operations, thus advancing the co-ops’ familiarity and comfort with such technology. Specifically, the project executed multiple subprojects employing a range of emerging smart grid technologies to test their cost-effectiveness and, where the technology demonstrated value, provided case studies that will enable other electric utilities—particularly electric cooperatives— to use these technologies. NRECA structured the project according to the following three areas: Demonstration of smart grid technology; Advancement of standards to enable the interoperability of components; and Improvement of grid cyber security. We termed these three areas Technology Deployment Study, Interoperability, and Cyber Security. Although the deployment of technology and studying the demonstration projects at coops accounted for the largest portion of the project budget by far, we see our accomplishments in each of the areas as critical to advancing the smart grid. All project deliverables have been published. Technology Deployment Study: The deliverable was a set of 11 single-topic technical reports in areas related to the listed technologies. Each of these reports has already been submitted to DOE, distributed to co-ops, and posted for universal access at www.nreca.coop/smartgrid. This research is available for widespread distribution to both cooperative members and non-members. These reports are listed in Table 1.2. Interoperability: The deliverable in this area was the advancement of the MultiSpeak™ interoperability standard from version 4.0 to version 5.0, and improvement in the MultiSpeak™ documentation to include more than 100 use cases. This deliverable substantially expanded the scope and usability of MultiSpeak, ™ the most widely deployed utility interoperability standard, now in use by more than 900 utilities. MultiSpeak™ documentation can be accessed only at www.multispeak.org. Cyber Security: NRECA’s starting point was to develop cyber security tools that incorporated succinct guidance on best practices. The deliverables were: cyber security extensions to MultiSpeak,™ which allow more security message exchanges; a Guide to Developing a Cyber Security and Risk Mitigation Plan; a Cyber Security Risk Mitigation Checklist; a Cyber Security Plan Template that co-ops can use to create their own cyber security plans; and Security Questions for Smart Grid Vendors.« less

  9. Security: Individuals and Leviathans

    DTIC Science & Technology

    2013-05-20

    What is human security and how does it fit in the current world order? The United Nations (UN) proposed human security in 1994 at the end of the Cold... world orders established by Western nations, from the Treaty of Westphalia to the UN, suggesting these have been inadequate leviathans. The argument...the globe, when and where they can. However, as the world becomes more multipolar, these Western liberal nations are likely to be restrained from

  10. Laboratory Directed Research and Development Program Assessment for FY 2008

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Looney, J P; Fox, K J

    2008-03-31

    Brookhaven National Laboratory (BNL) is a multidisciplinary Laboratory that carries out basic and applied research in the physical, biomedical, and environmental sciences, and in selected energy technologies. It is managed by Brookhaven Science Associates, LLC, (BSA) under contract with the U. S. Department of Energy (DOE). BNL's Fiscal Year 2008 spending was $531.6 million. There are approximately 2,800 employees, and another 4,300 guest scientists and students who come each year to use the Laboratory's facilities and work with the staff. The BNL Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) annuallymore » in March, as required by DOE Order 413.2B, 'Laboratory Directed Research and Development,' April 19, 2006, and the Roles, Responsibilities, and Guidelines for Laboratory Directed Research and Development at the Department of Energy/National Nuclear Security Administration Laboratories dated June 13, 2006. The goals and objectives of BNL's LDRD Program can be inferred from the Program's stated purposes. These are to (1) encourage and support the development of new ideas and technology, (2) promote the early exploration and exploitation of creative and innovative concepts, and (3) develop new 'fundable' R&D projects and programs. The emphasis is clearly articulated by BNL to be on supporting exploratory research 'which could lead to new programs, projects, and directions' for the Laboratory. To be a premier scientific Laboratory, BNL must continuously foster groundbreaking scientific research and renew its research agenda. The competition for LDRD funds stimulates Laboratory scientists to think in new and creative ways, which becomes a major factor in achieving and maintaining research excellence and a means to address National needs within the overall mission of the DOE and BNL. By fostering high-risk, exploratory research, the LDRD program helps BNL to respond new scientific opportunities within existing mission areas, as well as to develop new research mission areas in response to DOE and National needs. As the largest expense in BNL's LDRD program is the support graduate students, post-docs, and young scientists, LDRD provides base for continually refreshing the research staff as well as the education and training of the next generation of scientists. The LDRD Program Assessment Report contains a review of the program. The report includes a summary of the management processes, project peer review, and the portfolio's relatedness to BNL's mission, initiatives and strategic plans. Also included are a metric of success indicators and Self Assessment.« less

  11. Empowering Interagency Capabilities: A Regional Approach

    DTIC Science & Technology

    2006-05-25

    National Security Issue of the Early 21st Century”........................................................... 10 What does it all mean ? .............................................................................................................. 12...These issues only increase in the future environment described by both Kaplan and the JOE. What does it all mean ? While each of these views brings

  12. 47 CFR 76.1204 - Availability of equipment performing conditional access or security functions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... system; and (3) Does not provide access to any digital transmission of multichannel video programming or... COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Competitive... security functions. (a)(1) A multichannel video programming distributor that utilizes navigation devices to...

  13. Managing personal health information in distributed research network environments.

    PubMed

    Bredfeldt, Christine E; Butani, Amy L; Pardee, Roy; Hitz, Paul; Padmanabhan, Sandy; Saylor, Gwyn

    2013-10-08

    Studying rare outcomes, new interventions and diverse populations often requires collaborations across multiple health research partners. However, transferring healthcare research data from one institution to another can increase the risk of data privacy and security breaches. A working group of multi-site research programmers evaluated the need for tools to support data security and data privacy. The group determined that data privacy support tools should: 1) allow for a range of allowable Protected Health Information (PHI); 2) clearly identify what type of data should be protected under the Health Insurance Portability and Accountability Act (HIPAA); and 3) help analysts identify which protected health information data elements are allowable in a given project and how they should be protected during data transfer. Based on these requirements we developed two performance support tools to support data programmers and site analysts in exchanging research data. The first tool, a workplan template, guides the lead programmer through effectively communicating the details of multi-site programming, including how to run the program, what output the program will create, and whether the output is expected to contain protected health information. The second performance support tool is a checklist that site analysts can use to ensure that multi-site program output conforms to expectations and does not contain protected health information beyond what is allowed under the multi-site research agreements. Together the two tools create a formal multi-site programming workflow designed to reduce the chance of accidental PHI disclosure.

  14. Training on Transport Security of Nuclear/Radioactive Materials for Key Audiences

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pope, Ronald; Liu, Yung; Shuler, J.M.

    Beginning in 2013, the U.S. Department of Energy (DOE) Packaging Certification Program (PCP), Office of Packaging and Transportation, Office of Environmental Management has sponsored a series of three training courses on Security of Nuclear and Other Radioactive Materials during Transport. These courses were developed and hosted by Argonne National Laboratory staff with guest lecturers from both the U.S. and international organizations and agencies including the U.S. Nuclear Regulatory Commission (NRC), Federal Bureau of Investigation (FBI), the U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA), DOE national laboratories, the International Atomic Energy Agency (IAEA), the World Nuclear Transport Institutemore » (WNTI), and the World Institute for Nuclear Security (WINS). Each of the three courses held to date were one-week in length. The courses delved in detail into the regulatory requirements for transport security, focusing on international and U.S.-domestic requirements and guidance documents. Lectures, in-class discussions and small group exercises, including tabletop (TTX) and field exercises were designed to enhance the learning objectives for the participants. For example, the field exercise used the ARG-US radio frequency identification (RFID) remote surveillance system developed by Argonne for DOE/PCP to track and monitor packages in a mock shipment, following in-class exercises of developing a transport security plan (TSP) for the mock shipment, performing a readiness review and identifying needed corrective actions. Participants were able to follow the mock shipment on the webpage in real time in the ARG-US Command Center at Argonne including “staged” incidents that were designed to illustrate the importance of control, command, communication and coordination in ensuring transport security. Great lessons were learned based on feedback from the participant’s course evaluations with the series of the courses. Since the development of the relevant teaching materials for the course have largely been completed, tailoring the course for targeted audiences becomes a relatively easy task, requiring less effort and providing more flexibility for both the lecturers and future participants. One-day or two-day courses with focus specifically on the U.S. transport security requirements can be delivered, at locations away from Argonne, by one or two principal lecturers to targeted audiences such as regulators, shippers, carriers, state and local law enforcement personnel, and emergency responders. This paper will highlight the lessons learned in hosting previous one-week courses and discuss the development of options for detailed and/or customized courses/workshops for targeted key audiences.« less

  15. Household food security and breast-feeding duration among Canadian Inuit.

    PubMed

    McIsaac, Kathryn E; Stock, David C; Lou, Wendy

    2017-01-01

    There have been few studies investigating the association between food security and breast-feeding duration and none have been conducted among Canadian Inuit, a population disproportionately burdened with food insecurity. We evaluated the association between household food security and breast-feeding duration in Canadian Inuit children. Data were obtained from the Nunavut Inuit Child Health Survey, a population-based cross-sectional survey. The Canadian Territory of Nunavut in 2007 and 2008. Caregivers of Inuit children aged 3-5 years. Participating children were randomly sampled from community medical centre lists. Out of 215 children, 147 lived in food-insecure households (68·4 %). Using restricted mean survival time models, we estimated that children in food-secure households were breast-fed for 16·8 (95 % CI 12·5, 21·2) months and children in food-insecure households were breast-fed for 21·4 (95 % CI 17·9, 24·8) months. In models adjusting for social class, traditional knowledge and child health, household food security was not associated with breast-feeding duration (hazard ratio=0·82, 95 % CI 0·58, 1·14). Our research does not support the hypothesis that children living in food-insecure households were breast-fed for a longer duration than children living in food-secure households. However, we found that more than 50 % of mothers in food-insecure households continued breast-feeding well beyond 1 year. Many mothers in food-secure households also continued to breast-feed beyond 1 year. Given the high prevalence of food insecurity in Inuit communities, we need to ensure infants and their caregivers are being adequately nourished to support growth and breast-feeding, respectively.

  16. U.S. Department of Energy's Bioenergy Research Centers An Overview of the Science

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2010-07-01

    Alternative fuels from renewable cellulosic biomass - plant stalks, trunks, stems, and leaves - are expected to significantly reduce U.S. dependence on imported oil while enhancing national energy security and decreasing the environmental impacts of energy use. Ethanol and other advanced biofuels from cellulosic biomass are renewable alternatives that could increase domestic production of transportation fuels, revitalize rural economies, and reduce carbon dioxide and pollutant emissions. According to U.S. Secretary of Energy Steven Chu, 'Developing the next generation of biofuels is key to our effort to end our dependence on foreign oil and address the climate crisis while creating millionsmore » of new jobs that can't be outsourced.' Although cellulosic ethanol production has been demonstrated on a pilot level, developing a cost-effective, commercial-scale cellulosic biofuel industry will require transformational science to significantly streamline current production processes. Woodchips, grasses, cornstalks, and other cellulosic biomass are widely abundant but more difficult to break down into sugars than corn grain - the primary source of U.S. ethanol fuel production today. Biological research is key to accelerating the deconstruction of cellulosic biomass into sugars that can be converted to biofuels. The Department of Energy (DOE) Office of Science continues to play a major role in inspiring, supporting, and guiding the biotechnology revolution over the past 30 years. The DOE Genomic Science program is advancing a new generation of research focused on achieving whole-systems understanding of biology. This program is bringing together scientists in diverse fields to understand the complex biology underlying solutions to DOE missions in energy production, environmental remediation, and climate change science. For more information on the Genomic Science program, see p. 26. To focus the most advanced biotechnology-based resources on the biological challenges of biofuel production, DOE established three Bioenergy Research Centers (BRCs) in September 2007. Each center is pursuing the basic research underlying a range of high-risk, high-return biological solutions for bioenergy applications. Advances resulting from the BRCs are providing the knowledge needed to develop new biobased products, methods, and tools that the emerging biofuel industry can use (see sidebar, Bridging the Gap from Fundamental Biology to Industrial Innovation for Bioenergy, p. 6). The DOE BRCs have developed automated, high-throughput analysis pipelines that will accelerate scientific discovery for biology-based biofuel research. The three centers, which were selected through a scientific peer-review process, are based in geographically diverse locations - the Southeast, the Midwest, and the West Coast - with partners across the nation (see U.S. map, DOE Bioenergy Research Centers and Partners, on back cover). DOE's Lawrence Berkeley National Laboratory leads the DOE Joint BioEnergy Institute (JBEI) in California; DOE's Oak Ridge National Laboratory leads the BioEnergy Science Center (BESC) in Tennessee; and the University of Wisconsin-Madison leads the Great Lakes Bioenergy Research Center (GLBRC). Each center represents a multidisciplinary partnership with expertise spanning the physical and biological sciences, including genomics, microbial and plant biology, analytical chemistry, computational biology and bioinformatics, and engineering. Institutional partners include DOE national laboratories, universities, private companies, and nonprofit organizations.« less

  17. ICF quarterly report January - March 1997 volume 7, number 3

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Murray, J

    The National Ignition Facility Project The mission of the National Ignition Facility (NIF) is to produce ignition and modest energy gain in inertial confinement fusion (ICF) targets. Achieving these goals will maintain U.S. world leadership in ICF and will directly benefit the U.S. Department of Energy (DOE) missions in national security, science and technology, energy resources, and industrial competitiveness. Development and operation of the NIF are consistent with DOE goals for environmental quality, openness to the community, and nuclear nonproliferation and arms control. Although the primary mission of inertial fusion is for defense applications, inertial fusion research will provide criticalmore » information for the development of inertial fusion energy. The NIF, under construction at Lawrence Livermore National Laboratory (LLNL), is a cornerstone of the DOE's science-based Stockpile Stewardship Program for addressing high-energy-density physics issues in the absence of nuclear weapons testing. In pursuit of this mission, the DOE's Defense Programs has developed a state-of-the-art capability with the NIF to investigate high-energy-density physics in the laboratory with a microfusion capability for defense and energy applications. As a Strategic System Acquisition, the NIF Project has a separate and disciplined reporting chain to DOE as shown below.« less

  18. Data audit as a way to prevent/contain misconduct.

    PubMed

    Shamoo, Adil E

    2013-01-01

    Research misconduct is frequently in the media headlines. There is consensus among leading experts on research integrity that the prevalence of misconduct in research is at least 1%, and shoddy work may even go over 5%. Unfortunately, misconduct in research impacts all walks of life from drugs to human subject protections, innovations, economy, policy, and even our national security. The main method of detecting research misconduct depends primarily on whistleblowers. The current regulations are insufficient since dependence on whistleblowers manifests itself as an accidental hit or miss. No other endeavor in our society depends on such a poor system of discovery of misconduct to remedy it. Nearly a quarter of a century ago, I proposed data audit as a means to prevent/contain research misconduct. The audit has to protect the creative process and be non-obtrusive. Data audit evaluates the degree of correspondence of published data with the source data. The proposed data audit does not require any changes in the way researchers carry out their work.

  19. A scoping review of traditional food security in Alaska.

    PubMed

    Walch, Amanda; Bersamin, Andrea; Loring, Philip; Johnson, Rhonda; Tholl, Melissa

    2018-12-01

    Food insecurity is a public health concern. Food security includes the pillars of food access, availability and utilisation. For some indigenous peoples, this may also include traditional foods. To conduct a scoping review on traditional foods and food security in Alaska. Google Scholar and the High North Research Documents were used to search for relevant primary research using the following terms: "traditional foods", "food security", "access", "availability", "utilisation", "Alaska", "Alaska Native" and "indigenous". Twenty four articles from Google Scholar and four articles from the High North Research Documents were selected. The articles revealed three types of research approaches, those that quantified traditional food intake (n=18), those that quantified food security (n=2), and qualitative articles that addressed at least one pillar of food security (n=8). Limited primary research is available on food security in Alaskan. Few studies directly measure food security while most provide a review of food security factors. Research investigating dietary intake of traditional foods is more prevalent, though many differences exist among participant age groups and geographical areas. Future research should include direct measurements of traditional food intake and food security to provide a more complete picture of traditional food security in Alaska.

  20. Sandia National Laboratories: National Security Missions: Defense Systems

    Science.gov Websites

    Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers

  1. 31 CFR 356.30 - When does the Treasury pay principal and interest on securities?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... the next business day. If a bond is callable, we will pay the principal prior to maturity if we call... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false When does the Treasury pay principal... CIRCULAR, PUBLIC DEBT SERIES NO. 1-93) Miscellaneous Provisions § 356.30 When does the Treasury pay...

  2. Onsite transportation of radioactive materials at the Savannah River Site

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Watkins, R.

    The Savannah River Site (SRS) Transportation Safety Document (TSD) defines the onsite packaging and transportation safety program at SRS and demonstrates its compliance with Department of Energy (DOE) transportation safety requirements, to include DOE Order 460.1C, DOE Order 461.2, Onsite Packaging and Transfer of Materials of National Security Interest, and 10 CFR 830, Nuclear Safety Management (Subpart B).

  3. 20 CFR 411.410 - Does each referral from an EN to a State VR agency require its own agreement?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Does each referral from an EN to a State VR agency require its own agreement? 411.410 Section 411.410 Employees' Benefits SOCIAL SECURITY...' Participation Agreements Between Employment Networks and State Vr Agencies § 411.410 Does each referral from an...

  4. 20 CFR 411.620 - How long does the PM have to recommend a resolution to the dispute?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false How long does the PM have to recommend a resolution to the dispute? 411.620 Section 411.620 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE... Beneficiaries and Employment Networks § 411.620 How long does the PM have to recommend a resolution to the...

  5. 20 CFR 411.410 - Does each referral from an EN to a State VR agency require its own agreement?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false Does each referral from an EN to a State VR agency require its own agreement? 411.410 Section 411.410 Employees' Benefits SOCIAL SECURITY...' Participation Agreements Between Employment Networks and State Vr Agencies § 411.410 Does each referral from an...

  6. 20 CFR 411.410 - Does each referral from an EN to a State VR agency require its own agreement?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Does each referral from an EN to a State VR agency require its own agreement? 411.410 Section 411.410 Employees' Benefits SOCIAL SECURITY...' Participation Agreements Between Employment Networks and State Vr Agencies § 411.410 Does each referral from an...

  7. 20 CFR 411.620 - How long does the PM have to recommend a resolution to the dispute?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false How long does the PM have to recommend a resolution to the dispute? 411.620 Section 411.620 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE... Beneficiaries and Employment Networks § 411.620 How long does the PM have to recommend a resolution to the...

  8. 20 CFR 411.620 - How long does the PM have to recommend a resolution to the dispute?

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false How long does the PM have to recommend a resolution to the dispute? 411.620 Section 411.620 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE... Beneficiaries and Employment Networks § 411.620 How long does the PM have to recommend a resolution to the...

  9. 20 CFR 411.620 - How long does the PM have to recommend a resolution to the dispute?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false How long does the PM have to recommend a resolution to the dispute? 411.620 Section 411.620 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE... Beneficiaries and Employment Networks § 411.620 How long does the PM have to recommend a resolution to the...

  10. 20 CFR 411.620 - How long does the PM have to recommend a resolution to the dispute?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false How long does the PM have to recommend a resolution to the dispute? 411.620 Section 411.620 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE... Beneficiaries and Employment Networks § 411.620 How long does the PM have to recommend a resolution to the...

  11. 10 CFR 706.2 - Basis and scope.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS General § 706.2 Basis and... objectives for labor-management relations in the DOE program, namely: (a) Wholehearted acceptance by... efficient management expected from DOE contractors; (e) Minimum interference with the traditional rights and...

  12. Interagency Federal Laboratory Review Final Report

    DTIC Science & Technology

    1995-05-15

    technology. DOE labs have made unique contributions to national security since the days of the Manhattan Project , in designing, developing, and...Weapons Responsibility Most of DOE’s large multi-program laboratories had their origin in the Manhattan Project , to develop nuclear weapons during and

  13. 17 CFR 230.238 - Exemption for standardized options.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... options. 230.238 Section 230.238 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Exemption for standardized options. (a) Exemption. Except as expressly provided in paragraphs (b) and (c) of this section, the Act does not apply to any standardized option, as that term is defined by section 240...

  14. 12 CFR 41.21 - Affiliate marketing opt-out and exceptions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... relationship with the depository institution's securities affiliate for management of the consumer's securities... institution does not have a pre-existing business relationship with the consumer and none of the other... affiliate that has or has previously had a pre-existing business relationship with the consumer; or (ii) As...

  15. 31 CFR 357.22 - Transfers.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...)) only upon proof of death of an owner. (2) Succession under law of domicile. If a security is registered in a form that does not provide for a right of survivorship, succession shall be determined in... succession. If a security is registered in the name of a representative who has died, resigned, or been...

  16. 31 CFR 357.22 - Transfers.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...)) only upon proof of death of an owner. (2) Succession under law of domicile. If a security is registered in a form that does not provide for a right of survivorship, succession shall be determined in... succession. If a security is registered in the name of a representative who has died, resigned, or been...

  17. 31 CFR 357.22 - Transfers.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...)) only upon proof of death of an owner. (2) Succession under law of domicile. If a security is registered in a form that does not provide for a right of survivorship, succession shall be determined in... succession. If a security is registered in the name of a representative who has died, resigned, or been...

  18. 49 CFR 15.19 - Destruction of SSI.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.19... reconstruction of the information when the covered person no longer needs the SSI to carry out transportation security measures. (2) Exception. Paragraph (b)(1) of this section does not require a State or local...

  19. 10 CFR 824.5 - Investigations.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Investigations. 824.5 Section 824.5 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY... scope, nature and extent of compliance by a person with DOE security requirements specified in § 824.4(a...

  20. 10 CFR 706.10 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Policy. 706.10 Section 706.10 Energy DEPARTMENT OF ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies and Procedures in National Labor Relations Board Proceedings § 706.10 Policy. It is policy of DOE that NLRB cases falling...

  1. 10 CFR 824.5 - Investigations.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Investigations. 824.5 Section 824.5 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY... scope, nature and extent of compliance by a person with DOE security requirements specified in § 824.4(a...

  2. 76 FR 46603 - Security Ratings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-03

    ... impact of the amendments. (b) $1 Billion of Non-Convertible Securities (Other Than Common Equity) Issued... contracts to continue to be able to use Form S-3 and Form F- 3, which would reduce the negative impact the... does not appear to significantly impact the eligibility of WKSI subsidiaries currently eligible to use...

  3. 77 FR 3257 - Transfer of Land Tracts Located at Los Alamos National Laboratory, New Mexico

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-23

    ... DEPARTMENT OF ENERGY Transfer of Land Tracts Located at Los Alamos National Laboratory, New Mexico AGENCY: National Nuclear Security Administration, U.S. Department of Energy. ACTION: Amended Record of Decision. SUMMARY: The U.S. Department of Energy's National Nuclear Security Administration (DOE/NNSA) is...

  4. Does Maternal Employment Influence Poor Children's Social Development?

    ERIC Educational Resources Information Center

    Fuller, Bruce; Caspary, Gretchen; Kagan, Sharon Lynn; Gauthier, Christiane; Hnang, Danny Shih-Cheng; Carroll, Judith; McCarthy, Jan

    2002-01-01

    This study examined the relation between young children's social development and maternal employment among women who entered welfare-to-work programs. Structural equation models provided evidence that indicators of economic security, such as food security and job quality indicators, but not recent employment per se, operated through parenting…

  5. 49 CFR 806.4 - Mandatory review for declassification.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... TRANSPORTATION SAFETY BOARD NATIONAL SECURITY INFORMATION POLICY AND GUIDELINES, IMPLEMENTING REGULATIONS § 806.4... 3-501 of E.O. 12065 must be in writing and should be addressed to: National Security Oversight... specified by section 3-501 of E.O. 12065. If the request does not reasonably describe the information sought...

  6. 49 CFR 15.19 - Destruction of SSI.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.19... reconstruction of the information when the covered person no longer needs the SSI to carry out transportation security measures. (2) Exception. Paragraph (b)(1) of this section does not require a State or local...

  7. 10 CFR 706.10 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Policy. 706.10 Section 706.10 Energy DEPARTMENT OF ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies and Procedures in National Labor Relations Board Proceedings § 706.10 Policy. It is policy of DOE that NLRB cases falling...

  8. 7 CFR 1962.34 - Transfer of chattel security and EO property and assumption of debts.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Food Security Act of 1985 (Pub. L. 99-198) after December 23, 1985, if a loan is being transferred and... closing. If the applicant does not indicate a choice, the loan will be closed at the rate in effect at the...

  9. 12 CFR 41.21 - Affiliate marketing opt-out and exceptions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... relationship with the depository institution's securities affiliate for management of the consumer's securities... institution does not have a pre-existing business relationship with the consumer and none of the other... affiliate that has or has previously had a pre-existing business relationship with the consumer; or (ii) As...

  10. 12 CFR 41.21 - Affiliate marketing opt-out and exceptions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... relationship with the depository institution's securities affiliate for management of the consumer's securities... institution does not have a pre-existing business relationship with the consumer and none of the other... affiliate that has or has previously had a pre-existing business relationship with the consumer; or (ii) As...

  11. 12 CFR 41.21 - Affiliate marketing opt-out and exceptions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... relationship with the depository institution's securities affiliate for management of the consumer's securities... institution does not have a pre-existing business relationship with the consumer and none of the other... affiliate that has or has previously had a pre-existing business relationship with the consumer; or (ii) As...

  12. 48 CFR 1652.224-70 - Confidentiality of records.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... personal data on employees and annuitants that is provided by agencies and OPM, including social security... to audit the contract; (5) As necessary to carry out the coordination of benefits provisions of this... nature that does not identify any individual by name, social security number, or any other identifier...

  13. 48 CFR 1652.224-70 - Confidentiality of records.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... personal data on employees and annuitants that is provided by agencies and OPM, including social security... to audit the contract; (5) As necessary to carry out the coordination of benefits provisions of this... nature that does not identify any individual by name, social security number, or any other identifier...

  14. 20 CFR 404.1614 - Responsibilities for obtaining evidence to make disability determinations.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... make disability determinations. 404.1614 Section 404.1614 Employees' Benefits SOCIAL SECURITY... determinations in those classes of cases described in the written guidelines for which the State agency does not make the determination; or (2) Under international agreements with respect to social security benefits...

  15. 31 CFR 315.39 - Surrender for payment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... establish his or her identity in accordance with Treasury instructions and identification guidelines. The... presenter must record his or her social security number on the face of the security, provided it does not... appear before an officer authorized to certify requests for payment, establish his or her identity, sign...

  16. NASA Aeronautics Research: An Assessment

    NASA Technical Reports Server (NTRS)

    2008-01-01

    The U.S. air transportation system is vital to the economic well-being and security of the United States. To support continued U.S. leadership in aviation, Congress and NASA requested that the National Research Council undertake a decadal survey of civil aeronautics research and technology (R&T) priorities that would help NASA fulfill its responsibility to preserve U.S. leadership in aeronautics technology. In 2006, the National Research Council published the Decadal Survey of Civil Aeronautics. That report presented a set of six strategic objectives for the next decade of aeronautics R&T, and it described 51 high-priority R&T challenges--characterized by five common themes--for both NASA and non-NASA researchers. The National Research Council produced the present report, which assesses NASA's Aeronautics Research Program, in response to the National Aeronautics and Space Administration Authorization Act of 2005 (Public Law 109-155). This report focuses on three sets of questions: 1. How well does NASA's research portfolio implement appropriate recommendations and address relevant high-priority research and technology challenges identified in the Decadal Survey of Civil Aeronautics? If gaps are found, what steps should be taken by the federal government to eliminate them? 2. How well does NASA's aeronautics research portfolio address the aeronautics research requirements of NASA, particularly for robotic and human space exploration? How well does NASA's aeronautics research portfolio address other federal government department/agency non-civil aeronautics research needs? If gaps are found, what steps should be taken by NASA and/or other parts of the federal government to eliminate them? 3. Will the nation have a skilled research workforce and research facilities commensurate with the requirements in (1) and (2) above? What critical improvements in workforce expertise and research facilities, if any, should NASA and the nation make to achieve the goals of NASA's research program? This report continues the good work begun by the Decadal Survey of Civil Aeronautics, and it expands that work to consider in more depth NASA aeronautics research issues related to the space program, non-civil applications, workforce, and facilities.

  17. Army Communicator. Volume 28, Number 1, Spring 2003

    DTIC Science & Technology

    2003-01-01

    SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF PAGES 72 19a. NAME OF RESPONSIBLE PERSON ...does business to meet these requirements and the growing expectations from the president and his staff for instantaneous, global, secure , reliable and...by COL Tim Gibson Do you have access to a secure Internet-protocol router network terminal on a regular basis? If you answered yes, you’re wrong

  18. Secure and Lightweight Cloud-Assisted Video Reporting Protocol over 5G-Enabled Vehicular Networks

    PubMed Central

    2017-01-01

    In the vehicular networks, the real-time video reporting service is used to send the recorded videos in the vehicle to the cloud. However, when facilitating the real-time video reporting service in the vehicular networks, the usage of the fourth generation (4G) long term evolution (LTE) was proved to suffer from latency while the IEEE 802.11p standard does not offer sufficient scalability for a such congested environment. To overcome those drawbacks, the fifth-generation (5G)-enabled vehicular network is considered as a promising technology for empowering the real-time video reporting service. In this paper, we note that security and privacy related issues should also be carefully addressed to boost the early adoption of 5G-enabled vehicular networks. There exist a few research works for secure video reporting service in 5G-enabled vehicular networks. However, their usage is limited because of public key certificates and expensive pairing operations. Thus, we propose a secure and lightweight protocol for cloud-assisted video reporting service in 5G-enabled vehicular networks. Compared to the conventional public key certificates, the proposed protocol achieves entities’ authorization through anonymous credential. Also, by using lightweight security primitives instead of expensive bilinear pairing operations, the proposed protocol minimizes the computational overhead. From the evaluation results, we show that the proposed protocol takes the smaller computation and communication time for the cryptographic primitives than that of the well-known Eiza-Ni-Shi protocol. PMID:28946633

  19. Secure and Lightweight Cloud-Assisted Video Reporting Protocol over 5G-Enabled Vehicular Networks.

    PubMed

    Nkenyereye, Lewis; Kwon, Joonho; Choi, Yoon-Ho

    2017-09-23

    In the vehicular networks, the real-time video reporting service is used to send the recorded videos in the vehicle to the cloud. However, when facilitating the real-time video reporting service in the vehicular networks, the usage of the fourth generation (4G) long term evolution (LTE) was proved to suffer from latency while the IEEE 802.11p standard does not offer sufficient scalability for a such congested environment. To overcome those drawbacks, the fifth-generation (5G)-enabled vehicular network is considered as a promising technology for empowering the real-time video reporting service. In this paper, we note that security and privacy related issues should also be carefully addressed to boost the early adoption of 5G-enabled vehicular networks. There exist a few research works for secure video reporting service in 5G-enabled vehicular networks. However, their usage is limited because of public key certificates and expensive pairing operations. Thus, we propose a secure and lightweight protocol for cloud-assisted video reporting service in 5G-enabled vehicular networks. Compared to the conventional public key certificates, the proposed protocol achieves entities' authorization through anonymous credential. Also, by using lightweight security primitives instead of expensive bilinear pairing operations, the proposed protocol minimizes the computational overhead. From the evaluation results, we show that the proposed protocol takes the smaller computation and communication time for the cryptographic primitives than that of the well-known Eiza-Ni-Shi protocol.

  20. Nuclear waste`s human dimension

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Erikson, K.; Colglazier, E.W.; White, G.F.

    1994-12-31

    The United States has pinned its hopes for a permanent underground repository for its high-level nuclear wastes on Yucca Mountain, Nevada. Nevertheless, the Department of Energy`s (DOE) site research efforts have failed {open_quotes}to adequately consider human behavior and emotions,{close_quotes} write Kai Erikson of Yale University, E. William Colglazier of the National Academy of Sciences, and Gilbert F. White of the University of Colorado. The authors maintain that it is impossible to predict changes in geology, seismology, and hydrology that may affect the Yucca Mountain area over the next 1,000 years. Predicting human behavior in that time frame remains even moremore » daunting, they insist. They admit that {open_quotes}DOE...has been given the impossible assignment to take tens of thousands of metric tons of the most hazardous materials ever created and, in the face of growing opposition, entomb them so that they will do little harm for thousands of years.{close_quotes} The researchers suggest that the government seek a secure, retrievable storage arrangement while it continues its search for safer long-term options.« less

  1. Basic Energy Sciences Program Update

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None, None

    2016-01-04

    The U.S. Department of Energy’s (DOE) Office of Basic Energy Sciences (BES) supports fundamental research to understand, predict, and ultimately control matter and energy at the electronic, atomic, and molecular levels to provide the foundations for new energy technologies and to support DOE missions in energy, environment, and national security. The research disciplines covered by BES—condensed matter and materials physics, chemistry, geosciences, and aspects of physical biosciences— are those that discover new materials and design new chemical processes. These disciplines touch virtually every aspect of energy resources, production, conversion, transmission, storage, efficiency, and waste mitigation. BES also plans, constructs, andmore » operates world-class scientific user facilities that provide outstanding capabilities for imaging and spectroscopy, characterizing materials of all kinds ranging from hard metals to fragile biological samples, and studying the chemical transformation of matter. These facilities are used to correlate the microscopic structure of materials with their macroscopic properties and to study chemical processes. Such experiments provide critical insights to electronic, atomic, and molecular configurations, often at ultrasmall length and ultrafast time scales.« less

  2. 1996 Site environmental report Sandia National Laboratories Albuquerque, New Mexico

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fink, C.H.; Duncan, D.; Sanchez, R.

    1997-08-01

    Sandia National Laboratories/New Mexico (SNL/NM) is operated in support of the U.S. Department of Energy (DOE) mission to provide weapon component technology and hardware for national security needs, and to conduct fundamental research and development (R&D) to advance technology in energy research, computer science, waste management, electronics, materials science, and transportation safety for hazardous and nuclear components. In support of this mission, the Environmental Safety and Health (ES&H) Center at SNL/NM conducts extensive environmental monitoring, surveillance, and compliance activities to assist SNL`s line organizations in meeting all applicable environmental regulations applicable to the site including those regulating radiological and nonradiologicalmore » effluents and emissions. Also herein are included, the status of environmental programs that direct and manage activities such as terrestrial surveillance; ambient air and meteorological monitoring; hazardous, radioactive, and solid waste management; pollution prevention and waste minimization; environmental restoration (ER); oil and chemical spill prevention; and National Environmental Policy Act (NEPA) documentation. This report has been prepared in compliance with DOE order 5400.1, General Environmental Protection.« less

  3. Does the PCEHR mean a new paradigm for information security? Implications for health information management.

    PubMed

    Williams, Patricia A H

    Australia is stepping up to the new e-health environment. With this comes new legislation and new demands on information security. The expanded functionality of e-health and the increased legislative requirements, coupled with new uses of technology, means that enhancement of existing security practice will be necessary. This paperanalyses the new operating environment for Australian healthcare and the legislation governing it, and highlights the changes that are required to meet this new context. Individuals are now more responsible for security and organisations should be prompted to review their security measures in light of the new demands of legislative compliance.

  4. Final Report - Stationary and Emerging Market Fuel Cell System Cost Assessment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Contini, Vince; Heinrichs, Mike; George, Paul

    The U.S. Department of Energy (DOE) is focused on providing a portfolio of technology solutions to meet energy security challenges of the future. Fuel cells are a part of this portfolio of technology offerings. To help meet these challenges and supplement the understanding of the current research, Battelle has executed a five-year program that evaluated the total system costs and total ownership costs of two technologies: (1) an ~80 °C polymer electrolyte membrane fuel cell (PEMFC) technology and (2) a solid oxide fuel cell (SOFC) technology, operating with hydrogen or reformate for different applications. Previous research conducted by Battelle, andmore » more recently by other research institutes, suggests that fuel cells can offer customers significant fuel and emission savings along with other benefits compared to incumbent alternatives. For this project, Battelle has applied a proven cost assessment approach to assist the DOE Fuel Cell Technologies Program in making decisions regarding research and development, scale-up, and deployment of fuel cell technology. The cost studies and subsequent reports provide accurate projections of current system costs and the cost impact of state-of-the-art technologies in manufacturing, increases in production volume, and changes to system design on system cost and life cycle cost for several near-term and emerging fuel cell markets. The studies also provide information on types of manufacturing processes that must be developed to commercialize fuel cells and also provide insights into the optimization needed for use of off-the-shelf components in fuel cell systems. Battelle’s analysis is intended to help DOE prioritize investments in research and development of components to reduce the costs of fuel cell systems while considering systems optimization.« less

  5. Field monitoring and evaluation of a residential gas-engine-driven heat pump: Volume 2, Heating season

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Miller, J.D.

    1995-11-01

    The Federal Government is the largest single energy consumer in the United States; consumption approaches 1.5 quads/year of energy (1 quad = 10{sup 15} Btu) at a cost valued at nearly $10 billion annually. The US Department of Energy (DOE) Federal Energy Management Program (FEMP) supports efforts to reduce energy use and associated expenses in the Federal sector. One such effort, the New Technology Demonstration Program (NTDP), seeks to evaluate new energy-saving US technologies and secure their more timely adoption by the US Government. Pacific Northwest Laboratory (PNL) is one of four DOE national multiprogram laboratories that participate in themore » NTDP by providing technical expertise and equipment to evaluate new, energy-saving technologies being studied and evaluated under that program. This two-volume report describes a field evaluation that PNL conducted for DOE/FEMP and the US Department of Defense (DoD) Strategic Environmental Research and Development Program (SERDP) to examine the performance of a candidate energy-saving technology -- a gas-engine-driven heat pump. The unit was installed at a single residence at Fort Sam Houston, a US Army base in San Antonio, Texas, and the performance was monitored under the NTDP. Participating in this effort under a Cooperative Research and Development Agreement (CRADA) were York International, the heat pump manufacturer; Gas Research Institute (GRI), the technology developer; City Public Service of San Antonio, the local utility; American Gas Cooling Center (AGCC); Fort Sam Houston; and PNL.« less

  6. National Nuclear Forensics Expertise Development Program

    NASA Astrophysics Data System (ADS)

    Kentis, Samantha E.; Ulicny, William D.

    2009-08-01

    Over the course of the 2009 Federal Fiscal Year the United States (U.S.) Department of Homeland Security (DHS), in partnership with the Departments of Defense (DoD) and Energy (DOE), is continuing existing programs and introducing new programs designed to maintain a highly qualified, enduring workforce capable of performing the technical nuclear forensics mission. These student and university programs are designed to recruit the best and brightest students, develop university faculty and research capabilities, and engage the national laboratories in fields of study with application in nuclear forensics. This comprehensive effort constitutes the National Nuclear Forensics Expertise Development Program.

  7. Trip report on IAEA Training Workshop on Implementation of Integrated Management Systems for Research Reactors (T3-TR-45496).

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pratt, Richard J.

    2013-11-01

    From 17-21 June 2013, Sandia National Laboratories, Technical Area-V (SNL TA-V) represented the United States Department of Energy/National Nuclear Security Administration (DOE/NNSA) at the International Atomic Energy Agency (IAEA) Training Workshop (T3-TR-45486). This report gives a breakdown of the IAEA regulatory structure for those unfamiliar, and the lessons learned and observations that apply to SNL TA-V that were obtained from the workshop. The Safety Report Series, IAEA workshop final report, and SNL TA-V presentation are included as attachments.

  8. Network security.

    PubMed

    Chang, Kyle

    2006-01-01

    As you can see, there are a number of different ways to protect your network with different protocols, all of which can be very confusing to people whose core business process is not technology. This article is only a brief synopsis of the dangers that lurk in the corners of the technology world. Therefore, the best course of action is to do as much research as possible rather than falling into a situation of risk and vulnerability by implementing a system or network that does not work with your business. Remember, the technology is there to support your business; the business should not have to work around the technology.

  9. 10 CFR 1008.12 - Exemptions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... individual at the individual's request of the existence of records in an investigative file pertaining to...: Notifying an individual at the individual's request of the existence of records in an investigative file...) Alien Visits and Participation (DOE-52). (B) Clearance Board Cases (DOE-46). (C) Security Correspondence...

  10. 10 CFR 1008.12 - Exemptions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... individual at the individual's request of the existence of records in an investigative file pertaining to...: Notifying an individual at the individual's request of the existence of records in an investigative file...) Alien Visits and Participation (DOE-52). (B) Clearance Board Cases (DOE-46). (C) Security Correspondence...

  11. 10 CFR 1008.12 - Exemptions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... individual at the individual's request of the existence of records in an investigative file pertaining to...: Notifying an individual at the individual's request of the existence of records in an investigative file...) Alien Visits and Participation (DOE-52). (B) Clearance Board Cases (DOE-46). (C) Security Correspondence...

  12. 10 CFR 1008.12 - Exemptions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... individual at the individual's request of the existence of records in an investigative file pertaining to...: Notifying an individual at the individual's request of the existence of records in an investigative file...) Alien Visits and Participation (DOE-52). (B) Clearance Board Cases (DOE-46). (C) Security Correspondence...

  13. Computer assisted audit techniques for UNIX (UNIX-CAATS)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Polk, W.T.

    1991-12-31

    Federal and DOE regulations impose specific requirements for internal controls of computer systems. These controls include adequate separation of duties and sufficient controls for access of system and data. The DOE Inspector General`s Office has the responsibility to examine internal controls, as well as efficient use of computer system resources. As a result, DOE supported NIST development of computer assisted audit techniques to examine BSD UNIX computers (UNIX-CAATS). These systems were selected due to the increasing number of UNIX workstations in use within DOE. This paper describes the design and development of these techniques, as well as the results ofmore » testing at NIST and the first audit at a DOE site. UNIX-CAATS consists of tools which examine security of passwords, file systems, and network access. In addition, a tool was developed to examine efficiency of disk utilization. Test results at NIST indicated inadequate password management, as well as weak network resource controls. File system security was considered adequate. Audit results at a DOE site indicated weak password management and inefficient disk utilization. During the audit, we also found improvements to UNIX-CAATS were needed when applied to large systems. NIST plans to enhance the techniques developed for DOE/IG in future work. This future work would leverage currently available tools, along with needed enhancements. These enhancements would enable DOE/IG to audit large systems, such as supercomputers.« less

  14. Computer assisted audit techniques for UNIX (UNIX-CAATS)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Polk, W.T.

    1991-01-01

    Federal and DOE regulations impose specific requirements for internal controls of computer systems. These controls include adequate separation of duties and sufficient controls for access of system and data. The DOE Inspector General's Office has the responsibility to examine internal controls, as well as efficient use of computer system resources. As a result, DOE supported NIST development of computer assisted audit techniques to examine BSD UNIX computers (UNIX-CAATS). These systems were selected due to the increasing number of UNIX workstations in use within DOE. This paper describes the design and development of these techniques, as well as the results ofmore » testing at NIST and the first audit at a DOE site. UNIX-CAATS consists of tools which examine security of passwords, file systems, and network access. In addition, a tool was developed to examine efficiency of disk utilization. Test results at NIST indicated inadequate password management, as well as weak network resource controls. File system security was considered adequate. Audit results at a DOE site indicated weak password management and inefficient disk utilization. During the audit, we also found improvements to UNIX-CAATS were needed when applied to large systems. NIST plans to enhance the techniques developed for DOE/IG in future work. This future work would leverage currently available tools, along with needed enhancements. These enhancements would enable DOE/IG to audit large systems, such as supercomputers.« less

  15. Telemedicine security: a systematic review.

    PubMed

    Garg, Vaibhav; Brewer, Jeffrey

    2011-05-01

    Telemedicine is a technology-based alternative to traditional health care delivery. However, poor security measures in telemedicine services can have an adverse impact on the quality of care provided, regardless of the chronic condition being studied. We undertook a systematic review of 58 journal articles pertaining to telemedicine security. These articles were selected based on a keyword search on 14 relevant journals. The articles were coded to evaluate the methodology and to identify the key areas of research in security that are being reviewed. Seventy-six percent of the articles defined the security problem they were addressing, and only 47% formulated a research question pertaining to security. Sixty-one percent proposed a solution, and 20% of these tested the security solutions that they proposed. Prior research indicates inadequate reporting of methodology in telemedicine research. We found that to be true for security research as well. We also identified other issues such as using outdated security standards. © 2011 Diabetes Technology Society.

  16. Telemedicine Security: A Systematic Review

    PubMed Central

    Garg, Vaibhav; Brewer, Jeffrey

    2011-01-01

    Telemedicine is a technology-based alternative to traditional health care delivery. However, poor security measures in telemedicine services can have an adverse impact on the quality of care provided, regardless of the chronic condition being studied. We undertook a systematic review of 58 journal articles pertaining to telemedicine security. These articles were selected based on a keyword search on 14 relevant journals. The articles were coded to evaluate the methodology and to identify the key areas of research in security that are being reviewed. Seventy-six percent of the articles defined the security problem they were addressing, and only 47% formulated a research question pertaining to security. Sixty-one percent proposed a solution, and 20% of these tested the security solutions that they proposed. Prior research indicates inadequate reporting of methodology in telemedicine research. We found that to be true for security research as well. We also identified other issues such as using outdated security standards. PMID:21722592

  17. BLOOM: BLoom filter based oblivious outsourced matchings.

    PubMed

    Ziegeldorf, Jan Henrik; Pennekamp, Jan; Hellmanns, David; Schwinger, Felix; Kunze, Ike; Henze, Martin; Hiller, Jens; Matzutt, Roman; Wehrle, Klaus

    2017-07-26

    Whole genome sequencing has become fast, accurate, and cheap, paving the way towards the large-scale collection and processing of human genome data. Unfortunately, this dawning genome era does not only promise tremendous advances in biomedical research but also causes unprecedented privacy risks for the many. Handling storage and processing of large genome datasets through cloud services greatly aggravates these concerns. Current research efforts thus investigate the use of strong cryptographic methods and protocols to implement privacy-preserving genomic computations. We propose FHE-BLOOM and PHE-BLOOM, two efficient approaches for genetic disease testing using homomorphically encrypted Bloom filters. Both approaches allow the data owner to securely outsource storage and computation to an untrusted cloud. FHE-BLOOM is fully secure in the semi-honest model while PHE-BLOOM slightly relaxes security guarantees in a trade-off for highly improved performance. We implement and evaluate both approaches on a large dataset of up to 50 patient genomes each with up to 1000000 variations (single nucleotide polymorphisms). For both implementations, overheads scale linearly in the number of patients and variations, while PHE-BLOOM is faster by at least three orders of magnitude. For example, testing disease susceptibility of 50 patients with 100000 variations requires only a total of 308.31 s (σ=8.73 s) with our first approach and a mere 0.07 s (σ=0.00 s) with the second. We additionally discuss security guarantees of both approaches and their limitations as well as possible extensions towards more complex query types, e.g., fuzzy or range queries. Both approaches handle practical problem sizes efficiently and are easily parallelized to scale with the elastic resources available in the cloud. The fully homomorphic scheme, FHE-BLOOM, realizes a comprehensive outsourcing to the cloud, while the partially homomorphic scheme, PHE-BLOOM, trades a slight relaxation of security guarantees against performance improvements by at least three orders of magnitude.

  18. 20 CFR 411.405 - When does an agreement between an EN and the State VR agency have to be in place?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false When does an agreement between an EN and the State VR agency have to be in place? 411.405 Section 411.405 Employees' Benefits SOCIAL SECURITY...' Participation Agreements Between Employment Networks and State Vr Agencies § 411.405 When does an agreement...

  19. 20 CFR 411.405 - When does an agreement between an EN and the State VR agency have to be in place?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false When does an agreement between an EN and the State VR agency have to be in place? 411.405 Section 411.405 Employees' Benefits SOCIAL SECURITY...' Participation Agreements Between Employment Networks and State Vr Agencies § 411.405 When does an agreement...

  20. 20 CFR 411.405 - When does an agreement between an EN and the State VR agency have to be in place?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false When does an agreement between an EN and the State VR agency have to be in place? 411.405 Section 411.405 Employees' Benefits SOCIAL SECURITY...' Participation Agreements Between Employment Networks and State Vr Agencies § 411.405 When does an agreement...

  1. Exploring the Application of Shared Ledger Technology to Safeguards and other National Security Topics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Frazar, Sarah L.; Winters, Samuel T.; Kreyling, Sean J.

    In 2016, the Office of International Nuclear Safeguards at the National Nuclear Security Administration (NNSA) within the Department of Energy (DOE) commissioned the Pacific Northwest National Laboratory (PNNL) to explore the potential implications of the digital currency bitcoin and its underlying technologies on the safeguards system. The authors found that one category of technologies referred to as Shared Ledger Technology (SLT) offers a spectrum of benefits to the safeguards system. While further research is needed to validate assumptions and findings in the paper, preliminary analysis suggests that both the International Atomic Energy Agency (IAEA) and Member States can use SLTmore » to promote efficient, effective, accurate, and timely reporting, and increase transparency in the safeguards system without sacrificing confidentiality of safeguards data. This increased transparency and involvement of Member States in certain safeguards transactions could lead to increased trust and cooperation among States and the public, which generates a number of benefits. This paper describes these benefits and the analytical framework for assessing SLT applications for specific safeguards problems. The paper will also describe other national security areas where SLT could provide benefits.« less

  2. Building Better Armies: An Insider’s Account of Liberia

    DTIC Science & Technology

    2013-11-01

    penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE NOV 2013 2... inform different ideas about security may not easily translate into a coherent and actionable national se- curity strategy. The human security perspective...and relevance, and by support- 17 ing the creation of a balanced and effective security sector, informed by a clear understanding of its objec- tives

  3. Institutionalizing Sustainability into the Total Army

    DTIC Science & Technology

    2008-03-14

    unsustainable world in which we live has an impact on our national security. Today it is clear that linkages between the environment and security are powerful...U.S. national security interests…” 31 The world is in an unsustainable state as it continues to incur a vast water deficit by consuming water belonging...any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a

  4. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tsai, H. C.; Chen, K.; Liu, Y. Y.

    The US Department of Energy (DOE) [Environmental Management (EM), Office of Packaging and Transportation (EM-45)] Packaging Certification Program (PCP) has developed a radiofrequency identification (RFID) tracking and monitoring system for the management of nuclear materials packages during storage and transportation. The system, developed by the PCP team at Argonne National Laboratory, involves hardware modification, application software development, secured database and web server development, and irradiation experiments. In April 2008, Argonne tested key features of the RFID tracking and monitoring system in a weeklong, 1700 mile (2736 km) demonstration employing 14 empty type B fissile material drums of three designs (modelsmore » 9975, 9977 and ES-3100) that have been certified for shipment by the DOE and the US Nuclear Regulatory Commission. The demonstration successfully integrated global positioning system (GPS) technology for vehicle tracking, satellite/cellular (general packet radio service, or GPRS) technologies for wireless communication, and active RFID tags with multiple sensors (seal integrity, shock, temperature, humidity and battery status) on drums. In addition, the demonstration integrated geographic information system (GIS) technology with automatic alarm notifications of incidents and generated buffer zone reports for emergency response and management of staged incidents. The demonstration was sponsored by EM and the US National Nuclear Security Administration, with the participation of Argonne, Savannah River and Oak Ridge National Laboratories. Over 50 authorised stakeholders across the country observed the demonstration via secured Internet access. The DOE PCP and national laboratories are working on several RFID system implementation projects at selected DOE sites, as well as continuing device and systems development and widening applications beyond DOE sites and possibly beyond nuclear materials to include other radioactive materials.« less

  5. 12 CFR Appendix B to Part 170 - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    .... You shall: 1. Design your information security program to control the identified risks, commensurate... Control Risk D. Oversee Service Provider Arrangements E. Adjust the Program F. Report to the Board G... information does not include: (A) Aggregate information, such as the mean credit score, derived from a group...

  6. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Verce, M. F.; Schwartz, L. I.

    This was a collaborative effort between LLNL and STE to investigate the use of vaporized hydrogen peroxide (VHP®) to decontaminate spore-contaminated heating, ventilation, and cooling (HV AC) systems in a trailer sized room. LLNL's effort under this CRADA was funded by DOE's Chemical and Biological National Security Program (CBNP), which later became part of Department of Homeland Security in 2004.

  7. A Delicate Balance: National Security vs. Public Access

    ERIC Educational Resources Information Center

    Klein, Bonnie; Schwalb, Sandy

    2005-01-01

    Sometimes people want to see data that the government thinks should be kept under wraps. How does the Department of Defense balance the scales of justice while still ensuring information security? In the aftermath of September 11, 2001, the Defense Technical Information Center (DTIC) found itself in the spotlight as journalists, academics, and…

  8. 75 FR 38587 - Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving Proposed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-02

    ... Order Feed, which provides real-time updates every time a new limit order that is not immediately... each instrument series, including the symbols (series and underlying security), put or call indicator, the expiration and the strike price of the series. \\4\\ The ISE Order Feed does not include market...

  9. 17 CFR 240.14a-1 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... a meeting, the earliest date they may be used to effect corporate action. (f) Proxy. The term “proxy... proxy; or (iii) The furnishing of a form of proxy or other communication to security holders under... proxy; or (iv) A communication by a security holder who does not otherwise engage in a proxy...

  10. 78 FR 75350 - Goldenshores Technologies, LLC and Erik M. Geidl; Analysis of Proposed Consent Order To Aid...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-11

    ... that your comment does not include any sensitive personal information, like anyone's Social Security... heightened security screening. As a result, we encourage you to submit your comments online. To make sure... Flashlight App'') to consumers for use on their Android mobile devices. The Brightest Flashlight App...

  11. Changing Homeland Security: Ten Essential Homeland Security Books

    DTIC Science & Technology

    2007-02-01

    the current Strategy should be changed, other elements should be carried over to version 2.0 – if not in specifics, at least in philosophy . For...advocates say we should pay any price to prevent terrorism on our soil); a Libertarian "cure is worse than the disease" school that does not want to

  12. 12 CFR 12.2 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... which a national bank makes or participates in making the purchase or sale of securities, but does not... other property shall be purchased or sold by or for the account; or (2) Makes decisions as to what... the transaction means: (1) In the case of a customer who purchases a security through or from a...

  13. 34 CFR 403.114 - How does a State determine the number of economically disadvantaged students attending vocational...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... TECHNOLOGY EDUCATION PROGRAM What Kinds of Activities Does the Secretary Assist Under the Basic Programs... Children under part A of title IV of the Social Security Act (42 U.S.C. 601). (iii) Benefits under the Food...

  14. 34 CFR 403.114 - How does a State determine the number of economically disadvantaged students attending vocational...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... TECHNOLOGY EDUCATION PROGRAM What Kinds of Activities Does the Secretary Assist Under the Basic Programs... Children under part A of title IV of the Social Security Act (42 U.S.C. 601). (iii) Benefits under the Food...

  15. 34 CFR 403.114 - How does a State determine the number of economically disadvantaged students attending vocational...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... TECHNOLOGY EDUCATION PROGRAM What Kinds of Activities Does the Secretary Assist Under the Basic Programs... Children under part A of title IV of the Social Security Act (42 U.S.C. 601). (iii) Benefits under the Food...

  16. 34 CFR 403.114 - How does a State determine the number of economically disadvantaged students attending vocational...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... TECHNOLOGY EDUCATION PROGRAM What Kinds of Activities Does the Secretary Assist Under the Basic Programs... Children under part A of title IV of the Social Security Act (42 U.S.C. 601). (iii) Benefits under the Food...

  17. 34 CFR 403.114 - How does a State determine the number of economically disadvantaged students attending vocational...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... TECHNOLOGY EDUCATION PROGRAM What Kinds of Activities Does the Secretary Assist Under the Basic Programs... Children under part A of title IV of the Social Security Act (42 U.S.C. 601). (iii) Benefits under the Food...

  18. 20 CFR 404.1351 - When deemed insured status does not apply.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false When deemed insured status does not apply. 404.1351 Section 404.1351 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE... Voluntary Recruitment Act of 1945 (Pub. L. 190 of the 79th Congress). ...

  19. 20 CFR 408.1021 - How does the reconsidered determination affect you?

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false How does the reconsidered determination affect you? 408.1021 Section 408.1021 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS Determinations and the Administrative Review Process Reconsideration...

  20. 20 CFR 408.1021 - How does the reconsidered determination affect you?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false How does the reconsidered determination affect you? 408.1021 Section 408.1021 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS Determinations and the Administrative Review Process Reconsideration...

  1. 20 CFR 408.1021 - How does the reconsidered determination affect you?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false How does the reconsidered determination affect you? 408.1021 Section 408.1021 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS Determinations and the Administrative Review Process Reconsideration...

  2. 20 CFR 408.1021 - How does the reconsidered determination affect you?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false How does the reconsidered determination affect you? 408.1021 Section 408.1021 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS Determinations and the Administrative Review Process Reconsideration...

  3. 20 CFR 408.1021 - How does the reconsidered determination affect you?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false How does the reconsidered determination affect you? 408.1021 Section 408.1021 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS Determinations and the Administrative Review Process Reconsideration...

  4. Contemporary women's secure psychiatric services in the United Kingdom: A qualitative analysis of staff views.

    PubMed

    Walker, T; Edge, D; Shaw, J; Wilson, H; McNair, L; Mitchell, H; Gutridge, K; Senior, J; Sutton, M; Meacock, R; Abel, K

    2017-11-01

    WHAT IS KNOWN ON THE SUBJECT?: Three pilot UK-only Women's Enhanced Medium Secure Services (WEMSS) was opened in 2007 to support women's movement from high secure care and provide a bespoke, women-only service. Evidence suggests that women's secure services are particularly challenging environments to work in and staffing issues (e.g., high turnover) can cause difficulties in establishing a therapeutic environment. Research in this area has focused on the experiences of service users. Studies which have examined staff views have focused on their feelings towards women in their care and the emotional burden of working in women's secure services. No papers have made a direct comparison between staff working in different services. WHAT DOES THIS STUDY ADD TO EXISTING KNOWLEDGE?: This is the first study to explore the views and experiences of staff in the three UK WEMSS pilot services and contrast them with staff from women's medium secure services. Drawing upon data from eighteen semi-structured interviews (nine WEMSS, nine non-WEMSS), key themes cover staff perceptions of factors important for women's recovery and their views on operational aspects of services. This study extends our understanding of the experiences of staff working with women in secure care and bears relevance for staff working internationally, as well as in UK services. WHAT ARE THE IMPLICATIONS FOR PRACTICE?: The study reveals the importance of induction and training for bank and agency staff working in women's secure services. Further, regular clinical supervision should be mandatory for all staff so they are adequately supported. Introduction Women's Enhanced Medium Secure Services (WEMSS) is bespoke, gender-sensitive services which opened in the UK in 2007 at three pilot sites. This study is the first of its kind to explore the experiences of WEMSS staff, directly comparing them to staff in a standard medium secure service for women. The literature to date has focused on the experiences of service users or staff views on working with women in secure care. Aim This qualitative study, embedded in a multimethod evaluation of WEMSS, aimed to explore the views and experiences of staff in WEMSS and comparator medium secure services. Methods Qualitative interviews took place with nine WEMSS staff and nine comparator medium secure staff. Interviews focused on factors important for recovery, barriers to facilitating recovery and operational aspects of the service. Discussion This study provides a rare insight into the perspectives of staff working in UK women's secure services, an under-researched area in the UK and internationally. Findings suggest that the success of services, including WEMSS, is compromised by operational factors such as the use of bank staff. Implications for practice Comprehensive training and supervision should be mandatory for all staff, so best practice is met and staff adequately supported. © 2017 John Wiley & Sons Ltd.

  5. Corrective Action Decision Document/Closure Report for Corrective Action Unit 570: Area 9 Yucca Flat Atmospheric Test Sites, Nevada National Security Site, Nevada, Revision 0

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Matthews, Patrick

    2013-11-01

    This Corrective Action Decision Document/Closure Report presents information supporting the closure of Corrective Action Unit (CAU) 570: Area 9 Yucca Flat Atmospheric Test Sites, Nevada National Security Site, Nevada. This complies with the requirements of the Federal Facility Agreement and Consent Order (FFACO) that was agreed to by the State of Nevada; U.S. Department of Energy (DOE), Environmental Management; U.S. Department of Defense; and DOE, Legacy Management. The purpose of the CADD/CR is to provide justification and documentation supporting the recommendation that no further corrective action is needed.

  6. U.S. Department of Energy Office of Health, Safety and Security Illness and Injury Surveillance Program Worker Health at a Glance, 2000-2009

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Strader, Cliff; Richter, Bonnie

    2013-01-23

    The Worker Health at a Glance, 2000 – 2009 provides an overview of selected illness and injury patterns among the current DOE contractor workforce that have emerged over the 10-years covered by this report. This report is a roll-up of data from 16 individual DOE sites, assigned to one of three program offices (Office of Environmental Management, Office of Science and the National Nuclear Security Administration). In this report, an absences is defined as 40 or more consecutive work hours (5+ calendar days) off the job. Shorter absences were not included.

  7. Nevada National Security Site Environmental Report 2011

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cathy Wills, ed

    2012-09-12

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment,more » Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.« less

  8. Environmental Performance Report 2014. NREL (National Renewable Energy Laboratory)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rukavina, Frank; Myers, Lissa; Elmore, Adrienne

    The purpose of this report is to ensure that the U.S. Department of Energy (DOE) and the public receive timely, accurate information about events that have affected or could adversely affect the health, safety, and security of the public or workers, the environment, or the operations of DOE facilities. This report meets the DOE requirements of the Annual Site Environmental Report and has been prepared in accordance with the DOE Order 231.1B Chg 1, Environment, Safety and Health Reporting.

  9. Towards An Engineering Discipline of Computational Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mili, Ali; Sheldon, Frederick T; Jilani, Lamia Labed

    2007-01-01

    George Boole ushered the era of modern logic by arguing that logical reasoning does not fall in the realm of philosophy, as it was considered up to his time, but in the realm of mathematics. As such, logical propositions and logical arguments are modeled using algebraic structures. Likewise, we submit that security attributes must be modeled as formal mathematical propositions that are subject to mathematical analysis. In this paper, we approach this problem by attempting to model security attributes in a refinement-like framework that has traditionally been used to represent reliability and safety claims. Keywords: Computable security attributes, survivability, integrity,more » dependability, reliability, safety, security, verification, testing, fault tolerance.« less

  10. Conclusions

    NASA Astrophysics Data System (ADS)

    Ahonen, Pasi; Alahuhta, Petteri; Daskala, Barbara; Delaitre, Sabine; Hert, Paul De; Lindner, Ralf; Maghiros, Ioannis; Moscibroda, Anna; Schreurs, Wim; Verlinden, Michiel

    Some say that an increase in security does not necessarily mean a further encroachment on privacy - indeed, security is necessary to protect personal data and our privacy. Networks must be secure, our personal devices, reliable, dependable and trustworthy. But security is a multifaceted term, with many dimensions. We are of the view that an increase in security most likely will encroach upon our privacy in an ambient intelligence world. Surveillance cameras will continue to proliferate. We assume that, whatever the law is, whatever privacy protections government and business say they honour, our telecommunications, e-mails and Internet usage will be monitored to an increasing degree. The same will be true of our interfaces with the world of ambient intelligence.

  11. Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets

    PubMed Central

    2014-01-01

    Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete—the traditional approach for calculating reliability—is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods. PMID:25405226

  12. Security threat assessment of an Internet security system using attack tree and vague sets.

    PubMed

    Chang, Kuei-Hu

    2014-01-01

    Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete--the traditional approach for calculating reliability--is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods.

  13. A scoping review of traditional food security in Alaska

    PubMed Central

    Walch, Amanda; Bersamin, Andrea; Loring, Philip; Johnson, Rhonda; Tholl, Melissa

    2018-01-01

    ABSTRACT Food insecurity is a public health concern. Food security includes the pillars of food access, availability and utilisation. For some indigenous peoples, this may also include traditional foods. To conduct a scoping review on traditional foods and food security in Alaska. Google Scholar and the High North Research Documents were used to search for relevant primary research using the following terms: “traditional foods”, “food security”, “access”, “availability”, “utilisation”, “Alaska”, “Alaska Native” and “indigenous”. Twenty four articles from Google Scholar and four articles from the High North Research Documents were selected. The articles revealed three types of research approaches, those that quantified traditional food intake (n=18), those that quantified food security (n=2), and qualitative articles that addressed at least one pillar of food security (n=8). Limited primary research is available on food security in Alaskan. Few studies directly measure food security while most provide a review of food security factors. Research investigating dietary intake of traditional foods is more prevalent, though many differences exist among participant age groups and geographical areas. Future research should include direct measurements of traditional food intake and food security to provide a more complete picture of traditional food security in Alaska. PMID:29292675

  14. 17 CFR 230.138 - Publications or distributions of research reports by brokers or dealers about securities other...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... of research reports by brokers or dealers about securities other than those they are distributing... research reports by brokers or dealers about securities other than those they are distributing. (a... research reports about securities of an issuer shall be deemed for purposes of sections 2(a)(10) and 5(c...

  15. Does standard deviation matter? Using "standard deviation" to quantify security of multistage testing.

    PubMed

    Wang, Chun; Zheng, Yi; Chang, Hua-Hua

    2014-01-01

    With the advent of web-based technology, online testing is becoming a mainstream mode in large-scale educational assessments. Most online tests are administered continuously in a testing window, which may post test security problems because examinees who take the test earlier may share information with those who take the test later. Researchers have proposed various statistical indices to assess the test security, and one most often used index is the average test-overlap rate, which was further generalized to the item pooling index (Chang & Zhang, 2002, 2003). These indices, however, are all defined as the means (that is, the expected proportion of common items among examinees) and they were originally proposed for computerized adaptive testing (CAT). Recently, multistage testing (MST) has become a popular alternative to CAT. The unique features of MST make it important to report not only the mean, but also the standard deviation (SD) of test overlap rate, as we advocate in this paper. The standard deviation of test overlap rate adds important information to the test security profile, because for the same mean, a large SD reflects that certain groups of examinees share more common items than other groups. In this study, we analytically derived the lower bounds of the SD under MST, with the results under CAT as a benchmark. It is shown that when the mean overlap rate is the same between MST and CAT, the SD of test overlap tends to be larger in MST. A simulation study was conducted to provide empirical evidence. We also compared the security of MST under the single-pool versus the multiple-pool designs; both analytical and simulation studies show that the non-overlapping multiple-pool design will slightly increase the security risk.

  16. 15 CFR Appendix B to Part 30 - AES Filing Codes

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... charity FS—Foreign Military Sales ZD—North American Free Trade Agreements (NAFTA) duty deferral shipments...—Validated End User Authorization C58CCD—Consumer Communication Devices C59STA—Strategic Trade Authorization Department of Energy/National Nuclear Security Administration (DOE/NNSA) Codes E01—DOE/NNSA Nuclear...

  17. 10 CFR Appendix A to Part 824 - General Statement of Enforcement Policy

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... positive incentives for a DOE contractor's: (1) Timely self-identification of security deficiencies, (2..., when verification is received that corrective actions have been implemented, DOE will close the... Administrator who agrees that further enforcement action should not be pursued if verification is received that...

  18. 48 CFR 970.5227-10 - Patent rights-management and operating contracts, nonprofit organization or small business firm...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...-level nuclear waste and spent fuel technology; and (C) National security technologies classified or... Energy (DOE) Patent Counsel assisting the DOE contracting activity. (7) Practical application means to... inventions. (i) Inventions within or relating to the following fields of technology are exceptional...

  19. 48 CFR 970.5227-10 - Patent rights-management and operating contracts, nonprofit organization or small business firm...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...-level nuclear waste and spent fuel technology; and (C) National security technologies classified or... Energy (DOE) Patent Counsel assisting the DOE contracting activity. (7) Practical application means to... inventions. (i) Inventions within or relating to the following fields of technology are exceptional...

  20. 12 CFR 362.1 - Purpose and scope.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... subpart does not cover acting solely as agent for the sale of insurance, securities, real estate, or travel services; nor does it cover acting as trustee, providing personal financial planning advice, or safekeeping services; (2) Interests in real estate in which the real property is used or intended in good...

Top